Professional Documents
Culture Documents
Systems:
Concepts, Methodologies,
Tools and Applications
Volume I
Copyright © 2011 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by
any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies
does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.
Enterprise information systems : concepts, methodologies, tools and applications / Information Resources Man-
agement Association, editor. p. cm.
Includes bibliographical references and index.
Summary: "This three-volume collection provides a complete assessment of the latest developments in enterprise
information systems research, including development, design, and emerging methodologies"--Provided by publisher.
ISBN 978-1-61692-852-0 (hardcover) -- ISBN 978-1-61692-853-7 (ebook)
1. Management information systems. 2. Information technology--Management. 3. Electronic commerce. 4.
Business enterprises--Computer networks.
I. Information Resources Management Association.
HD30.213.E582 2011
658.4'038011--dc22
2010032232
All work contributed to this book set is original material. The views expressed in this book are those of the authors, but not necessarily of
the publisher.
Editor-in-Chief
Mehdi Khosrow-Pour, DBA
Editor-in-Chief
Contemporary Research in Information Science and Technology, Book Series
Associate Editors
Steve Clarke
University of Hull, UK
Murray E. Jennex
San Diego State University, USA
Annie Becker
Florida Institute of Technology USA
Ari-Veikko Anttiroiko
University of Tampere, Finland
In Lee
Western Illinois University, USA
Jerzy Kisielnicki
Warsaw University, Poland
Keng Siau
University of Nebraska-Lincoln, USA
Amar Gupta
Arizona University, USA
John Wang
Montclair State University, USA
Vishanth Weerakkody
Brunel University, UK
Additional Research Collections found in the
“Contemporary Research in Information Science and Technology”
Book Series
Data Mining and Warehousing: Concepts, Methodologies, Tools, and Applications
John Wang, Montclair University, USA • 6-volume set • ISBN 978-1-60566-056-1
Aalmink, Jan \ Carl von Ossietzky University Oldenburg, Germany .............................................. 134
Aguirre, Jose-Luis \ Tecnologico de Monterrey, Mexico ............................................................... 1836
Ajaefobi, Joseph \ Loughborough University, UK ........................................................................... 370
Aklouf, Youcef \ University of Science and Technology, Algeria ..................................................... 329
Aktas, Mehmet S. \ TUBITAK (Turkish National Science Foundation), Turkey .................................. 1
Ali, A. K. Hairul Nizam Pengiran Haji \ Staffordshire University, UK ....................................... 1162
Al-Ibraheem, Nawaf \ KNET, Kuwait .............................................................................................. 752
Alizai, Fahd \ Victoria University, Australia .................................................................................... 487
Alonso, Juan Ignacio Guerrero \ University of Seville, Spain ........................................................ 472
Altintas, N. Ilker \ Cybersoft Information Technologies, Turkey ................................................... 1422
Anbuudayasankar, S. P. \ Amrita School of Engineering, India ................................................... 1537
Antlova, Klara \ Technical University, Czech Republic ................................................................. 1573
Argyropoulou, Maria \ Brunel University, UK .............................................................................. 1447
Arora, Hina \ Arizona State University, USA ................................................................................... 584
Asprey, Len \ Practical Information Management Solutions Pty Ltd, Australia ............................ 1470
Atkins, Anthony S. \ Staffordshire University, UK ......................................................................... 1162
Averweg, Udo \ Information Services, eThekwini Municipality & University of KwaZulu-Natal,
South Africa . 706
Balasundaram, S.R. \ National Institute of Technology, Tiruchirappalli, India .............................. 279
Barik, Mridul Sankar \ Jadapur University, India .......................................................................... 154
Barroso, João \ Instituto Superior de Engenharia do Porto, Portugal .......................................... 1769
Batenburg, Ronald \ Utrecht University, The Netherlands ............................................................ 1349
Ben-Abdallah, Hanene \ Mir@cl Laboratory, Faculté des Sciences Economiques et de Gestion,
Tunisia ......... 427
Boehm, Barry \ University of Southern California, USA ................................................................. 986
Bokma, Albert \ University of Sunderland, UK ................................................................................ 550
Bondarouk, Tanya \ University of Twente, The Netherlands ......................................................... 1379
Boonstra, Albert \ University of Groningen, The Netherlands ...................................................... 1480
Boudreau, Marie-Claude \ University of Georgia, USA ............................................................... 1496
Brahe, Steen \ Danske Bank, Denmark ............................................................................................. 835
Brainin, Esther \ Ruppin Academic Center, Israel ......................................................................... 1295
Brena, Ramón \ Tecnologico de Monterrey, Mexico ...................................................................... 1836
Bruno, Giorgio \ Politecnico di Torino, Italy ................................................................................. 1247
Brydon, Michael \ Simon Fraser University, Canada .................................................................... 1399
Buccella, Agustina \ Universidad Nacional del Comahue, Argentina ............................................. 207
Burbach, Ralf \ Institute of Technology Carlow, Ireland ............................................................... 1370
Burgard, Martin \ Saarland University, Germany ......................................................................... 1013
Burgess, Stephen \ Victoria University, Australia ............................................................................ 487
Bussler, Christoph \ Merced Systems Inc., USA ............................................................................... 128
Čančer, Vesna \ University of Maribor, Slovenia ............................................................................ 1871
Cechich, Alejandra \ Universidad Nacional del Comahue, Argentina ............................................ 207
Cetin, Semih \ Cybersoft Information Technologies, Turkey .......................................................... 1422
Chang, Cheng-Chun \ National Chung Cheng University, Taiwan ................................................. 452
Chang, Shuchih Ernest \ National Chung Hsing University, Taiwan ............................................. 714
Chen, Jinjun \ Swinburne University of Technology, Australia ..................................................... 1081
Chen, Ning \ Xi’an Polytechnic University, China ........................................................................... 544
Chen, Qiyang \ Montclair State University, USA ............................................................................. 533
Chen, Ruey-Shun \ China University of Technology, Taiwan ........................................................ 1605
Cheng, Chen-Yang \ Penn State University, USA .............................................................................. 86
Chia Cua, Francisco \ Otago Polytechnic, New Zealand ................................................................ 346
Chiu, Dickson K.W. \ Dickson Computer Systems, Hong Kong .................................................... 1902
Choudhury, Islam \ London Metropolitan University, UK ............................................................ 1646
Cua, Francisco Chia \ University of Otago, New Zealand ............................................................ 1663
Dan, Wang \ Harbin Institute of Technology, China ....................................................................... 1021
Daneva, Maya \ University of Twente, the Netherlands ................................................................. 1941
Dave, Sumita \ Shri Shankaracharya Institute of Management & Technology, India .................... 1183
Davis, Ashley \ University of Georgia, USA ..................................................................................... 776
de Carvalho Costa, Rogério Luís \ University of Coimbra, Portugal ............................................ 901
de Carvalho, Rogerio Atem \ Federal Center for Technological Education of Campos,
Brazil ............. 99
de Cesare, Sergio \ Brunel University, UK ..................................................................................... 1646
Di Florido, Emily \ Brunel University, UK ..................................................................................... 1646
Díaz, Angel \ Instituto de Empresa Business School, Spain .............................................................. 648
Drias, Habiba \ University of Science and Technology, Algeria ...................................................... 329
Dundon, Tony \ National University of Ireland-Galway, Ireland ................................................... 1370
Dunn, Cheryl L. \ Grand Valley State University, USA .................................................................... 189
Eder, Johann \ University of Klagenfurt, Austria ............................................................................. 566
Eggert, Sandy \ University of Potsdam, Germany .................................................................. 946, 1265
Engbers, Sander \ COGAS BV. Business Unit Infra & Networkmanagement, The
Netherlands ............................................................................................................................... 1379
Erwin, Geoff \ Cape Peninsula University of Technology, South Africa .......................................... 706
Faulkner, Stéphane \ University of Namur Rempart de la Vierge, Belgium .................................. 1141
Feki, Jamel \ Mir@cl Laboratory, Faculté des Sciences Economiques et de Gestion,
Tunisia ......... 427
Ferran, Carlos \ The Pennsylvania State University, USA ............................................................. 1816
Foster, Steve \ University of Hertfordshire and NorthgateArinso, UK ............................................. 250
Furtado, Pedro \ University of Coimbra, Portugal .......................................................................... 901
Ganesh, K. \ Global Business Services – Global Delivery, IBM India Private Limited,
India ........... 1537
Garito, Marco \ Digital Business, Italy ............................................................................................ 823
Garrett, Tony C. \ Korea University, Republic of Korea ........................................................ 346, 1663
Gerard, Gregory J. \ Florida State University, USA ....................................................................... 189
Gerritsen, Bart H. M. \ TNO Netherlands Organization for Applied Scientific Research, The
Netherlands . 921
Ghanbary, Abbass \ MethodScience.com & University of Western Sydney, Australia .................... 668
Ghani, Shehzad Khalid \ Prince Sultan University, Saudi Arabia ................................................ 1960
Gibson, Candace J. \ University of Western Ontario,Canada ......................................................... 292
Goicoechea, Iñigo Monedero \ University of Seville, Spain ............................................................ 472
Gómez, Jorge Marx \ Carl von Ossietzky University Oldenburg, Germany ........................... 134, 508
González-Benito, Óscar \ University of Salamanca, Spain ........................................................... 1730
Grabski, Severin V. \ Michigan State University, USA .................................................................... 189
Green, Rolf \ OneView Pty Ltd, Australia ....................................................................................... 1470
Grieger, Martin \ Accenture, Germany ............................................................................................ 638
Gronau, Norbert \ University of Potsdam, Germany ............................................................. 946, 1265
Gulla, Jon Atle \ The Norwegian University of Science and Technology, Norway .......................... 866
Gunasekaran, Angappa \ University of Massachusetts—Dartmouth, USA ...................................... 21
Gurau, Calin \ GSCM – Montpellier Business School, France ...................................................... 1327
Hachaichi, Yasser \ Mir@cl Laboratory, Faculté des Sciences Economiques et de Gestion,
Tunisia ......... 427
Hajnal, Ákos \ Computer and Automation Research Institute, Hungary ......................................... 972
Halgeri, Pritish \ Kansas State University, USA ............................................................................. 1121
Hartmann, Evi \ SMI Supply Management Institute, Germany ....................................................... 638
Hauc, Anton \ University of Maribor, Slovenia .............................................................................. 1871
Heemstra, Fred \ Open University Nederland and KWD Result management, The
Netherlands ............................................................................................................................... 1847
Helms, Marilyn M. \ Dalton State College, USA ........................................................................... 1605
Hilpert, Ditmar \ Reutlingen University, Germany ........................................................................ 1924
Holmström, Jonny \ Umeå University, Sweden ............................................................................. 1496
Holsapple, Clyde W. \ University of Kentucky, USA ...................................................................... 1099
Hu, Haiyang \ Zhejiang Gongshang University, China .................................................................. 1902
Hu, Hua \ Zhejiang Gongshang University, China ......................................................................... 1902
Huang, Shi-Ming \ National Chung Cheng University, Taiwan ....................................................... 452
Hung, Patrick C. K. \ University of Ontario Institute of Technology, Canada .............................. 1902
Hwang, Mark I. \ Central Michigan University, USA .................................................................... 1657
Ignatiadis, Ioannis \ University of Bath, UK .................................................................................. 1209
Ingvaldsen, Jon Espen \ The Norwegian University of Science and Technology, Norway .............. 866
Ioannou, George \ Athens University of Economics and Business, Greece ................................... 1447
Janssens, Guy \ Open University Nederland, The Netherlands ..................................................... 1847
Jih, Wen-Jang (Kenny) \ Middle Tennessee State University, USA ............................................... 1605
Jiménez-Zarco, Ana Isabel \ Open University of Catalonia, Spain .............................................. 1730
Kabene, Stefane M. \ University of Western Ontario, Canada ........................................................ 292
Kelzenberg, Kai \ RWTH Aachen University, Germany ..................................................................... 68
Kerr, Don \ University of the Sunshine Coast, Australia ................................................................ 1748
Khan, Khaled M. \ Qatar University, Qatar .................................................................................. 1113
Kidd, Paul T. \ Cheshire Henbury, UK ............................................................................................. 314
Kifor, Tamás \ Computer and Automation Research Institute, Hungary .......................................... 972
Kimble, Chris \ Euromed Marseille École de Management, France ................................................. 35
King, Lisa \ University of Western Ontario, Canada ........................................................................ 292
Kolp, Manuel \ Université Catholique de Louvain Place des Doyens, Belguim ............................ 1141
Koopman, Gerwin \ Syntess Software, The Netherlands ............................................................... 1349
Kotzab, Herbert \ Copenhagen Business School, Denmark ............................................................ 638
Koufopoulos, Dimitrios N. \ Brunel University, UK ...................................................................... 1447
Koumpis, Adamantios \ ALTEC S.A., Greece ................................................................................ 1593
Krcmar, Helmut \ Technische Universität München, Germany ....................................................... 169
Krishnankutty, K. V. \ College of Engineering, Trivandrum, India .............................................. 1960
Krogstie, John \ Norwegian University of Science and Technology (NTNU), Norway, &
SINTEF ICT, Norway .................................................................................................................. 731
Kumar, Kuldeep \ Florida International University, USA ............................................................. 1060
Kumta, Gita A. \ SVKM’s NMIMS University, School of Business Management, Mumbai,
India ............. 112
Kusters, Rob \ Eindhoven University of Technology and Eindhoven University of Technology,
The Netherlands ........................................................................................................................ 1847
Lal, Shikha \ Banaras Hindu University (BHU), India .................................................................. 1553
Lämmer, Anne \ sd&m AG, and University of Potsdam, Germany ........................................ 946, 1265
Lane, Jo Ann \ University of Southern California, USA .................................................................. 986
Lastres-Segret, José A. \ University of La Laguna, Spain ............................................................. 1341
Lee, Tzong-Ru \ National Chung Hsing University, Taiwan, ROC ................................................ 1537
Lei, Chang \ Harbin Institute of Technology, China ....................................................................... 1021
León de Mora, Carlos \ University of Seville, Spain ....................................................................... 472
Li, Shing-Han \ Tatung University, Taiwan ...................................................................................... 452
Li, Zhang \ Harbin Institute of Technology, China ......................................................................... 1021
Liang, Xiaoya \ Fudan University, China ......................................................................................... 617
Lin, Chad \ Curtin University of Technology, Australia ................................................................. 1030
Lin, Koong \ Tainan National University of the Arts, Taiwan ........................................................ 1030
Loonam, John \ Dublin City University, Ireland ............................................................................ 1631
Lorenzo, Oswaldo \ Instituto de Empresa Business School, Spain .................................................. 648
Lu, June \ University of Houston-Victoria, USA ............................................................................... 533
Lübke, Daniel \ Leibniz Universität Hannover, Germany ................................................................ 508
Lukácsy, Gergely \ Budapest University of Technology and Economics, Hungary ......................... 972
Mabert, Vincent A. \ Indiana University, USA ............................................................................... 1924
Makuch, Paul \ Institute for Information Systems at German Research Centre for Artificial
Intelligence, Germany ................................................................................................................. 817
Martínez-Ruiz, María Pilar \ University of Castilla-La Mancha, Spain ...................................... 1730
Mathrani, Sanjay \ Massey University, New Zealand .............................................................. 53, 1233
Mazumdar, Chandan \ Jadavpur University, India ......................................................................... 154
McDonagh, Joe \ University of Dublin, Trinity College, Ireland ................................................... 1631
McGaughey, Ronald E. \ University of Central Arkansas, USA ........................................................ 21
McHaney, Roger \ Kansas State University, USA .......................................................................... 1121
McLaughlin, Stephen \ University of Glasgow, UK ...................................................................... 1513
Meza, Justin \ HP Labs, USA ........................................................................................................... 267
Middleton, Michael \ Queensland University of Technology, Australia ........................................ 1470
Millán, Rocío \ University of Seville, Spain ...................................................................................... 472
Millham, Richard C. \ Catholic University of Ghana, Ghana ......................................................... 181
Mishra, Alok \ Atilim University, Turkey .............................................................................. 1279, 1318
Modrák, Vladimír \ Technical University of Košice, Slovakia ........................................................ 625
Mohan, Ashutosh \ Banaras Hindu University (BHU), India ........................................................ 1553
Mohandas, K. \ Amrita School of Engineering, India .................................................................... 1537
Møller, Charles \ Aalborg University, Denmark ............................................................................. 1789
Motwani, Jaideep \ Grand Valley State University, USA ............................................................... 1447
Moynihan, Gary P. \ The University of Alabama, USA ................................................................... 235
Nair, Prashant R. \ Amrita University, Coimbatore, India ............................................................... 596
Nandhakumar, Joe \ University of Warwick, UK ........................................................................... 1209
Nicolescu, Valentin \ Technische Universität München, Germany ................................................... 169
Núñez-Gorrín, José M. \ University of La Laguna, Tenerife, Spain .............................................. 1341
Pahl, Claus \ Dublin City University, Ireland ................................................................................... 997
Paige, Richard \ University of York, UK ............................................................................................. 35
Papajorgji, Petraq \ Center for Applied Optimization, University of Florida, USA ........................ 687
Pardalos, Panos M. \ Center for Applied Optimization, University of Florida, USA ...................... 687
Parthasarathy, S. \ Thiagarajar College of Engineering, India .................................................... 1172
Pei, Z. J. \ Kansas State University, USA ........................................................................................ 1121
Perko, Igor \ University of Maribor, Slovenia ................................................................................ 1871
Petkov, Don \ Eastern Connecticut State University, USA ............................................................... 706
Piazza, Franca \ Saarland University, Germany ............................................................................ 1013
Prabhu, Vittal \ Penn State Unviersity, USA ...................................................................................... 86
Protogeros, Nikos \ University of Macedonia, Greece ................................................................... 1593
Put, Dariusz \ Cracow University of Economics, Poland ............................................................... 1039
Raghu, T.S. \ Arizona State University, USA .................................................................................... 584
Rahayu, Wenny \ La Trobe University, Australia ............................................................................ 879
Rahimifard, Aysin \ Loughborough University, UK ......................................................................... 370
Ramadoss, B. \ National Institute of Technology, Tiruchirappalli, India ......................................... 279
Ramamohanarao, Kotagiri \ University of Melbourne, Australia ................................................ 1081
Rashid, Mohammad A. \ Massey University, New Zealand .................................................... 53, 1233
Reimers, Kai \ RWTH Aachen University, Germany .......................................................................... 68
Ruël, Huub \ University of Twente, The Netherlands & American University of Beirut,
Lebanon ............................................................................................................................. 752, 1715
Rusu, Laura Irina \ La Trobe University, Australia ......................................................................... 879
Salaka, Vamsi \ Penn State Unversity, USA ........................................................................................ 86
Salim, Ricardo \ Universidad Autónoma de Barcelona, Spain, & Cautus Networks Corp.,
Venezuela ... 1816
Sammon, David \ University College Cork, Ireland ...................................................................... 1738
Schoenherr, Tobias \ Michigan State University, USA ................................................................... 1924
Sedera, Darshana \ Queensland University of Technology, Australia ............................................. 958
Sengupta, Anirban \ Jadavpur University, India ............................................................................. 154
Shakir, Maha \ Zayed University, United Arab Emirates ............................................................... 1797
Sharpanskykh, Alexei \ Vrije Universiteit Amsterdam, The Netherlands ...................................... 1196
Sherringham, Keith \ IMS Corp, Australia ............................................................................. 795, 805
Shrivastava, Monica \ Shri Shankaracharya Institute of Management & Technology,
India ........... 1183
Sindre, Guttorm \ Norwegian University of Science and Technology (NTNU), Norway ................ 731
Singla, Ashim Raj \ Indian Institute of Foreign Trade, New Delhi. India ..................................... 1617
Skytøen, Øyvind \ Norwegian University of Science and Technology (NTNU), Norway ................ 731
Soja, Piotr \ Cracow University of Economics, Poland .................................................................. 1039
Soni, Ashok K. \ Indiana University, USA ...................................................................................... 1924
Subramoniam, Suresh \ Prince Sultan University, Saudi Arabia .................................................. 1960
Sun, Chia-Ming \ National Yunlin University of Science & Technology, Taiwan .......................... 1605
Tabatabaie, Malihe \ University of York, UK ..................................................................................... 35
Taniar, David \ Monash University, Australia .................................................................................. 879
Tansel, Abdullah Uz \ Baruch College – CUNY, USA ................................................................... 1461
Targowski, Andrew \ Western Michigan University, USA ............................................................... 397
Tektonidis, Dimitrios \ ALTEC S.A., Greece .................................................................................... 550
ter Horst, Vincent \ Saxion Knowledge Center Innovation and Entrepreneurship,The
Netherlands ............................................................................................................................... 1379
Tounsi, Mohamed \ Prince Sultan University, Saudi Arabia ......................................................... 1960
Trigo, Antonio \ Escola Superior de Tecnologia e Gestão de Oliveira do Hospital,
Portugal ..... 1769
Triviño, Félix Biscarri \ University of Seville, Spain ....................................................................... 472
Triviño, Jesús Biscarri \ University of Seville, Spain ...................................................................... 472
Trojer, Thomas \ University of Innsbruck, Austria ......................................................................... 1902
Tufekci, Ozgur \ Cybersoft Information Technologies, Turkey ...................................................... 1422
Unhelkar, Bhuvan \ MethodScience.com & University of Western Sydney,
Australia ...................................................................................................... 356, 522, 668, 795, 805
Unruh, Amy \ University of Melbourne Australia .......................................................................... 1081
Valerio, Gabriel \ Tecnologico de Monterrey, Mexico .................................................................... 1836
Varajão, João \ Centro Algoritmi and University of Trás-os-Montes e Alto Douro,
Portugal ..... 1769
Varga, László Z. \ Computer and Automation Research Institute, Hungary .................................... 972
Varga, Mladen \ University of Zagreb, Croatia .............................................................................. 1695
Venkataramanan, M.A. \ Indiana University, USA ....................................................................... 1924
Veres, Csaba \ Norwegian University of Science and Technology (NTNU), Norway ....................... 731
Viehland, Dennis \ Massey University, New Zealand ............................................................... 53, 1233
Vining, Aidan R. \ Simon Fraser University, Canada .................................................................... 1399
Vinze, Ajay \ Arizona State University, USA .................................................................................... 584
Vrecko, Igor \ University of Maribor, Slovenia .............................................................................. 1871
Wagner, Thomas \ RWTH Aachen University, Germany ................................................................... 68
Wang, John \ Montclair State University, USA ................................................................................ 533
Wang, Mingzhong \ University of Melbourne, Australia ............................................................... 1081
Wang, Minhong \ The University of Hong Kong, Hong Kong ....................................................... 1060
Wautelet, Yves \ Université Catholique de Louvain Place des Doyens, Belguim .......................... 1141
Werth, Dirk \ Institute for Information Systems at German Research Centre for Artificial
Intelligence, Germany ................................................................................................................. 817
Weston, Richard \ Loughborough University, UK ........................................................................... 370
Wheeler, Zachary B. \ SDDM Technology, USA .............................................................................. 217
Wiggisser, Karl \ University of Klagenfurt, Austria ......................................................................... 566
Wittges, Holger \ Technische Universität München, Germany ........................................................ 169
Wu, Jiming \ California State University-East Bay, USA .............................................................. 1099
Wu, Ming-Chien (Mindy) \ University of Western Sydney, Australia ............................................. 356
Yao, James \ Montclair State University, USA .................................................................................. 533
Yen, David C. \ Miami University, USA ............................................................................................ 452
Zhu, Qin \ HP Labs, USA .................................................................................................................. 267
Zhu, Yaoling \ Dublin City University, Ireland ................................................................................. 997
Zhuang, Yi \ Zhejiang Gongshang University, China .................................................................... 1902
Contents
Volume ,
Section I. Fundamental Concepts and Theories
This section serves as the foundation for this exhaustive reference tool by addressing crucial theories
essential to the understanding of enterprise information systems. Chapters found within these pages
provide an excellent framework in which to position enterprise information systems within the field of
information science and technology. Individual contributions provide overviews of the history of enter-
prise information systems, the impact of information systems on organizations, and overviews on vari-
ous enterprise information system processes such as enterprise resource planning and decision support
systems. Within this introductory section, the reader can learn and choose from a compendium of expert
research on the elemental theories underscoring enterprise information systems.
Chapter 1.1. Principles and Experiences: Designing and Building Enterprise Information
Systems ................... 1
Mehmet S. Aktas, TUBITAK (Turkish National Science Foundation), Turkey
Chapter 1.6. Integrated Research and Training in Enterprise Information Systems ............................. 86
Chen-Yang Cheng, Penn State University, USA
Vamsi Salaka, Penn State Unversity, USA
Vittal Prabhu, Penn State Unviersity, USA
Chapter 1.7. Free and Open Source Enterprise Resources Planning .................................................... 99
Rogerio Atem de Carvalho, Federal Center for Technological Education of Campos,
Brazil
Chapter 1.11. Enterprise Information System Security: A Life-Cycle Approach ............................... 154
Chandan Mazumdar, Jadavpur University, India
Mridul Sankar Barik, Jadapur University, India
Anirban Sengupta, Jadavpur University, India
Chapter 1.14. Semantically Modeled Databases in Integrated Enterprise Information Systems ....... 189
Cheryl L. Dunn, Grand Valley State University, USA
Gregory J. Gerard, Florida State University, USA
Severin V. Grabski, Michigan State University, USA
Chapter 1.15. An Overview of Ontology-Driven Data Integration .................................................... 207
Agustina Buccella, Universidad Nacional del Comahue, Argentina
Alejandra Cechich, Universidad Nacional del Comahue, Argentina
Chapter 1.16. A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local
Government after a Disaster ............................................................................................................... 217
Zachary B. Wheeler, SDDM Technology, USA
Chapter 1.18. Making Sense of e-HRM: Transformation, Technology and Power Relations ............ 250
Steve Foster, University of Hertfordshire and NorthgateArinso, UK
Chapter 1.20. Testing Guidelines for Developing Quality EAI Projects ............................................ 279
S.R. Balasundaram, National Institute of Technology, Tiruchirappalli, India
B. Ramadoss, National Institute of Technology, Tiruchirappalli, India
Chapter 1.21. Technology and Human Resources Management in Health Care ................................ 292
Stefane M. Kabene, University of Western Ontario, Canada
Lisa King, University of Western Ontario, Canada
Candace J. Gibson, University of Western Ontario, Canada
This section provides in-depth coverage of conceptual architectures, frameworks and methodologies
related to the design and implementation of enterprise information systems. Throughout these contribu-
tions, research fundamentals in the discipline are presented and discussed. From broad examinations
to specific discussions on particular frameworks and infrastructures, the research found within this
section spans the discipline while also offering detailed, specific discussions. Basic designs, as well as
abstract developments, are explained within these chapters, and frameworks for designing successful
decision support systems, integrating new technologies, and developing and implementing efficient
processes are included.
Chapter 2.1. Enterprise Information Systems: Aligning and Integrating Strategy, Technology,
Organization and People ..................................................................................................................... 314
Paul T. Kidd, Cheshire Henbury, UK
Chapter 2.2. An Adaptive E-Commerce Architecture for Enterprise Information Exchange ............. 329
Youcef Aklouf, University of Science and Technology, Algeria
Habiba Drias, University of Science and Technology, Algeria
Chapter 2.3. A Structured Approach to Developing a Business Case for New Enterprise
Information Systems ........................................................................................................................... 346
Francisco Chia Cua, Otago Polytechnic, New Zealand
Tony C. Garrett, Korea University, Republic of Korea
Chapter 2.5. Enterprise Modelling in Support of Organisation Design and Change .......................... 370
Joseph Ajaefobi, Loughborough University, UK
Aysin Rahimifard, Loughborough University, UK
Richard Weston, Loughborough University, UK
Chapter 2.7. Designing Data Marts from XML and Relational Data Sources.................................... 427
Yasser Hachaichi, Mir@cl Laboratory, Faculté des Sciences Economiques et de Gestion,
Tunisia
Jamel Feki, Mir@cl Laboratory, Faculté des Sciences Economiques et de Gestion,
Tunisia
Hanene Ben-Abdallah, Mir@cl Laboratory, Faculté des Sciences Economiques et de
Gestion, Tunisia
Chapter 2.8. Migrating Legacy Systems to Web Services Architecture ............................................. 452
Shing-Han Li, Tatung University, Taiwan
Shi-Ming Huang, National Chung Cheng University, Taiwan
David C. Yen, Miami University, USA
Cheng-Chun Chang, National Chung Cheng University, Taiwan
Chapter 2.9. EIS for Consumers Classification and Support Decision Making in a Power
Utility Database .. 472
Juan Ignacio Guerrero Alonso, University of Seville, Spain
Carlos León de Mora, University of Seville, Spain
Félix Biscarri Triviño, University of Seville, Spain
Iñigo Monedero Goicoechea, University of Seville, Spain
Jesús Biscarri Triviño, University of Seville, Spain
Rocío Millán, University of Seville, Spain
Chapter 2.11. Developing and Customizing Federated ERP Systems ................................................ 508
Daniel Lübke, Leibniz Universität Hannover, Germany
Jorge Marx Gómez, University Oldenburg, Germany
Chapter 2.12. Creation of a Process Framework for Transitioning to a Mobile Enterprise ............... 522
Bhuvan Unhelkar, MethodScience.com & University of Western Sydney, Australia
Chapter 2.14. Facilitating Design of Efficient Components by Bridging Gaps Between Data
Model and Business Process via Analysis of Service Traits of Data .................................................. 544
Ning Chen, Xi’an Polytechnic University, China
Chapter 2.15. The Utilization of Semantic Web for Integrating Enterprise Systems ......................... 550
Dimitrios Tektonidis, ALTEC S.A., Greece
Albert Bokma, University of Sunderland, UK
This section presents extensive coverage of the technology that informs and impacts enterprise infor-
mation systems. These chapters provide an in-depth analysis of the use and development of innumer-
able devices and tools, while also providing insight into new and upcoming technologies, theories, and
instruments that will soon be commonplace. Within these rigorously researched chapters, readers are
presented with examples of the tools that facilitate and support the emergence and advancement of en-
terprise information systems. In addition, the successful implementation and resulting impact of these
various tools and technologies are discussed within this collection of chapters.
Chapter 3.1. Data Warehouse Maintenance, Evolution and Versioning ............................................. 566
Johann Eder, University of Klagenfurt, Austria
Karl Wiggisser, University of Klagenfurt, Austria
Chapter 3.2. Information Supply Chains: Restructuring Relationships, Chains, and Networks ........ 584
Hina Arora, Arizona State University, USA
T.S. Raghu, Arizona State University, USA
Ajay Vinze, Arizona State University, USA
Chapter 3.3. Benefits of Information Technology Implementations for Supply Chain Management:
An Explorative Study of Progressive Indian Companies ................................................................... 596
Prashant R. Nair, Amrita University, Coimbatore, India
Chapter 3.7. Enterprise Systems as an Enabler of Fast-Paced Change: The Case of Global B2B
Procurement in Ericsson ..................................................................................................................... 648
Oswaldo Lorenzo, Instituto de Empresa Business School, Spain
Angel Díaz, Instituto de Empresa Business School, Spain
Volume ,,
Chapter 3.8. Extending Enterprise Application Integration (EAI) with Mobile and Web Services
Technologies ....... 668
Abbass Ghanbary, MethodScience.com & University of Western Sydney, Australia
Bhuvan Unhelkar, MethodScience.com & University of Western Sydney, Australia
Chapter 3.10. Impact of Portal Technologies on Executive Information Systems ............................. 706
Udo Averweg, Information Services, eThekwini Municipality & University of
KwaZulu-Natal, South Africa
Geoff Erwin, Cape Peninsula University of Technology, South Africa
Don Petkov, Eastern Connecticut State University, USA
Chapter 3.11. A Voice-Enabled Pervasive Web System with Self-Optimization Capability for
Supporting Enterprise Applications .................................................................................................... 714
Shuchih Ernest Chang, National Chung Hsing University, Taiwan
Chapter 3.12. Achieving System and Business Interoperability by Semantic Web Services ............. 731
John Krogstie, Norwegian University of Science and Technology (NTNU), Norway,
& SINTEF ICT, Norway
Csaba Veres, Norwegian University of Science and Technology (NTNU), Norway
Guttorm Sindre, Norwegian University of Science and Technology (NTNU), Norway
Øyvind Skytøen, Norwegian University of Science and Technology (NTNU), Norway
Chapter 3.15. Real Time Decision Making and Mobile Technologies ............................................... 795
Keith Sherringham, IMS Corp, Australia
Bhuvan Unhelkar, MethodScience.com & University of Western Sydney, Australia
Chapter 3.16. Business Driven Enterprise Architecture and Applications to Support Mobile
Business .............. 805
Keith Sherringham, IMS Corp, Australia
Bhuvan Unhelkar, MethodScience.com & University of Western Sydney, Australia
Chapter 3.18. Convergence in Mobile Internet with Service Oriented Architecture and Its Value
to Business .......... 823
Marco Garito, Digital Business, Italy
Chapter 3.19. Enterprise Specific BPM Languages and Tools ........................................................... 835
Steen Brahe, Danske Bank, Denmark
Chapter 3.20. Semantic Business Process Mining of SAP Transactions ............................................ 866
Jon Espen Ingvaldsen, The Norwegian University of Science and Technology, Norway
Jon Atle Gulla, The Norwegian University of Science and Technology, Norway
This section introduces and discusses the utilization and application of enterprise information systems
around the world. These particular selections highlight, among other topics, enterprise information
systems in multiple countries, data mining applications, and critical success factors of enterprise in-
formation systems implementation. Contributions included in this section provide excellent coverage of
the impact of enterprise information systems on the fabric of our present-day global village.
Chapter 4.3. A Procedure Model for a SOA-Based Integration of Enterprise Systems...................... 946
Anne Lämmer, sd&m AG, Germany
Sandy Eggert, University of Potsdam, Germany
Norbert Gronau, University of Potsdam, Germany
Chapter 4.4. Size Matters! Enterprise System Success in Medium and Large Organizations ........... 958
Darshana Sedera, Queensland University of Technology, Australia
Chapter 4.5. Web Services as XML Data Sources in Enterprise Information Integration.................. 972
Ákos Hajnal, Computer and Automation Research Institute, Hungary
Tamás Kifor, Computer and Automation Research Institute, Hungary
Gergely Lukácsy, Budapest University of Technology and Economics, Hungary
László Z. Varga, Computer and Automation Research Institute, Hungary
Chapter 4.6. System-of-Systems Cost Estimation: Analysis of Lead System Integrator Engineering
Activities ............. 986
Jo Ann Lane, University of Southern California, USA
Barry Boehm, University of Southern California, USA
Chapter 4.8. Data Warehouse and Business Intelligence Systems in the Context of E-HRM.......... 1013
Martin Burgard, Saarland University, Germany
Franca Piazza, Saarland University, Germany
Chapter 4.11. Towards Identifying the Most Important Attributes of ERP Implementations........... 1039
Piotr Soja, Cracow University of Economics, Poland
Dariusz Put, Cracow University of Economics, Poland
Chapter 4.12. Challenges and Solutions for Complex Business Process Management.................... 1060
Minhong Wang, The University of Hong Kong, Hong Kong
Kuldeep Kumar, Florida International University, USA
Chapter 4.15. A Decision Support System for Selecting Secure Web Services................................ 1113
Khaled M. Khan, Qatar University, Qatar
Chapter 4.16. ERP Systems Supporting Lean Manufacturing in SMEs ........................................... 1121
Pritish Halgeri, Kansas State University, USA
Roger McHaney, Kansas State University, USA
Z. J. Pei, Kansas State University, USA
This section includes a wide range of research pertaining to the social and organizational impact of
enterprise information systems. Chapters included in this section analyze the impact of power relation-
ships in system implementation, discusses how enterprise systems can be used to support internal mar-
keting efforts, and demonstrate that perceived shared benefits, system characteristic, and the degree
of knowledge of the system are significant influences on an individual’s willingness to use enterprise
resource planning systems. The inquiries and methods presented in this section offer insight into the
implications of enterprise information systems at both a personal and organizational level, while also
emphasizing potential areas of study within the discipline.
Chapter 5.1. Optimization of Enterprise Information Systems through a ‘User Involvement
Framework in Learning Organizations’ ............................................................................................ 1183
Sumita Dave, Shri Shankaracharya Institute of Management & Technology, India
Monica Shrivastava, Shri Shankaracharya Institute of Management & Technology, India
Chapter 5.2. Authority and Its Implementation in Enterprise Information Systems ........................ 1196
Alexei Sharpanskykh, Vrije Universiteit Amsterdam, The Netherlands
Chapter 5.4. The Impact of Enterprise Systems on Business Value ................................................. 1233
Sanjay Mathrani, Massey University, New Zealand
Mohammad A. Rashid, Massey University, New Zealand
Dennis Viehland, Massey University, New Zealand
Chapter 5.7. Achieving Business Benefits from ERP Systems ......................................................... 1279
Alok Mishra, Atilim University, Turkey
Chapter 5.9. Enterprise Resource Planning Systems: Effects and Strategic Perspectives in
Organizations .... 1318
Alok Mishra, Atilim University, Turkey
Volume ,,,
Chapter 5.10. The Management of CRM Information Systems in Small B2B Service
Organisations: A Comparison between French and British Firms .................................................... 1327
Calin Gurau, GSCM – Montpellier Business School, France
Chapter 5.13. Assessing Information Technology Capability vs. Human Resource Information
System Utilization............................................................................................................................. 1370
Ralf Burbach, Institute of Technology Carlow, Ireland
Tony Dundon, National University of Ireland-Galway, Ireland
Chapter 5.14. Exploring Perceptions about the Use of e-HRM Tools in Medium Sized
Organizations .... 1379
Tanya Bondarouk, University of Twente, The Netherlands
Vincent ter Horst, Saxion Knowledge Center Innovation and Entrepreneurship,
The Netherlands
Sander Engbers, COGAS BV. Business Unit Infra & Networkmanagement,
The Netherlands
Chapter 5.15. Adoption, Improvement, and Disruption: Predicting the Impact of Open Source
Applications in Enterprise Software ................................................................................................. 1399
Michael Brydon, Simon Fraser University, Canada
Aidan R. Vining, Simon Fraser University, Canada
This section presents contemporary coverage of the managerial implications of enterprise informa-
tion systems. Particular contributions explore relationships among information technology, knowledge
management, and firm performance, while others discuss the evaluation, adoption, and technical in-
frastructure of enterprise information systems. The managerial research provided in this section allows
administrators, practitioners, and researchers to gain a better sense of how enterprise information
systems can inform their practices and behavior.
Chapter 6.1. A Domain Specific Strategy for Complex Dynamic Processes .................................... 1422
Semih Cetin, Cybersoft Information Technologies, Turkey
N. Ilker Altintas, Cybersoft Information Technologies, Turkey
Ozgur Tufekci, Cybersoft Information Technologies, Turkey
Chapter 6.2. Measuring the Impact of an ERP Project at SMEs: A Framework and Empirical
Investigation...... 1447
Maria Argyropoulou, Brunel University, UK
George Ioannou, Athens University of Economics and Business, Greece
Dimitrios N. Koufopoulos, Brunel University, UK
Jaideep Motwani, Grand Valley State University, USA
Chapter 6.7. Improving Supply Chain Performance through the Implementation of Process
Related Knowledge Transfer Mechanisms ....................................................................................... 1513
Stephen McLaughlin, University of Glasgow, UK
Chapter 6.8. Meta-Heuristic Approach to Solve Mixed Vehicle Routing Problem with Backhauls
in Enterprise Information System of Service Industry ..................................................................... 1537
S. P. Anbuudayasankar, Amrita School of Engineering, India
K. Ganesh, Global Business Services – Global Delivery, IBM India Private Limited,
India
K. Mohandas, Amrita School of Engineering, India
Tzong-Ru Lee, National Chung Hsing University, Taiwan, ROC
Chapter 6.9. Achieving Supply Chain Management (SCM): Customer Relationship Management
(CRM) Synergy Through Information and Communication Technology (ICT) Infrastructure
in Knowledge Economy.................................................................................................................... 1553
Ashutosh Mohan, Banaras Hindu University (BHU), India
Shikha Lal, Banaras Hindu University (BHU), India
This section addresses conceptual and theoretical issues related to the field of enterprise information
systems, which include issues related to customer relationship management, critical success factors,
and business strategies. Within these chapters, the reader is presented with analysis of the most current
and relevant conceptual inquires within this growing field of study. Particular chapters address the
successes of enterprise resource planning through technology, and presents strategies for overcoming
challenges related to enterprise system adoption. Overall, contributions within this section ask unique,
often theoretical questions related to the study of enterprise information systems and, more often than
not, conclude that solutions are both numerous and contradictory.
Chapter 7.1. Preparedness of Small and Medium-Sized Enterprises to Use Information and
Communication Technology as a Strategic Tool .............................................................................. 1573
Klara Antlova, Technical University, Czech Republic
Chapter 7.2. Doing Business on the Globalised Networked Economy: Technology and Business
Challenges for Accounting Information Systems ............................................................................. 1593
Adamantios Koumpis, ALTEC S.A., Greece
Nikos Protogeros, University of Macedonia, Greece
Chapter 7.5. A Grounded Theory Study of Enterprise Systems Implementation: Lessons Learned
from the Irish Health Services .......................................................................................................... 1631
John Loonam, Dublin City University, Ireland
Joe McDonagh, University of Dublin, Trinity College, Ireland
Chapter 7.6. An Object-Oriented Abstraction Mechanism for Generic Enterprise Modeling .......... 1646
Islam Choudhury, London Metropolitan University, UK
Sergio de Cesare, Brunel University, UK
Emily Di Florido, Brunel University, UK
Chapter 7.8. Analyzing Diffusion and Value Creation Dimensions of a Business Case of Replacing
Enterprise Systems ............................................................................................................................ 1663
Francisco Chia Cua, University of Otago, New Zealand
Tony C. Garrett, Korea University, Republic of Korea
Chapter 7.9. Challenges of Data Management in Always-On Enterprise Information Systems ...... 1695
Mladen Varga, University of Zagreb, Croatia
Chapter 7.10. Studying Human Resource Information Systems Implementation using Adaptive
Structuration Theory: The Case of HRIS Implementation at Dow Chemical Company .................. 1715
Huub Ruël, University of Twente, The Netherlands, & American University of Beirut,
Lebanon
Chapter 7.11. Consequences and Strategic Implications of Networked Enterprise and Human
Resources .......... 1730
Ana Isabel Jiménez-Zarco, Open University of Catalonia, Spain
María Pilar Martínez-Ruiz, University of Castilla-La Mancha, Spain
Óscar González-Benito, University of Salamanca, Spain
Chapter 7.12. An Extended Model of Decision Making: A Devil’s Advocate Workshop ................ 1738
David Sammon, University College Cork, Ireland
Chapter 7.13. Feral Systems and Other Factors Influencing the Success of Global ERP
Implementations 1748
Don Kerr, University of the Sunshine Coast, Australia
This section highlights research potential within the field of enterprise information systems while ex-
ploring uncharted areas of study for the advancement of the discipline. Chapters within this section
highlight new trends in adaptive information integration, as well as the challenges faced in cross-
organizational enterprise resource planning projects. The contributions that conclude this exhaustive,
multi-volume set provide emerging trends and suggestions for future research within this rapidly ex-
panding discipline.
Chapter 8.1. Motivations and Trends for IT/IS Adoption: Insights from Portuguese
Companies......... 1769
João Varajão, Centro Algoritmi and University of Trás-os-Montes e Alto Douro, Portugal
Antonio Trigo, Escola Superior de Tecnologia e Gestão de Oliveira do Hospital, Portugal
João Barroso, Instituto Superior de Engenharia do Porto, Portugal
Chapter 8.3. ERP Trends, Opportunities, and Challenges: A Focus on the Gulf Region in the
Middle East ....... 1797
Maha Shakir, Zayed University, UAE
Chapter 8.4. The Future of ERP and Enterprise Resource Management Systems ........................... 1816
Carlos Ferran, The Pennsylvania State University, USA
Ricardo Salim, Universidad Autónoma de Barcelona, Spain, & Cautus Networks Corp.,
Venezuela
Chapter 8.6. Sizing ERP Implementation Projects: An Activity-Based Approach ........................... 1847
Guy Janssens, Open University Netherland, The Netherlands
Rob Kusters, Open University Netherland, The Netherlands & Eindhoven University
of Technology, The Netherlands
Fred Heemstra, Open University Netherland, The Netherlands & KWD Result
Management, The Netherlands
Chapter 8.7. Conducting Multi-Project Business Operations in SMEs and IS Support ................... 1871
Igor Vrecko, University of Maribor, Slovenia
Anton Hauc, University of Maribor, Slovenia
Vesna Čančer, University of Maribor, Slovenia
Igor Perko, University of Maribor, Slovenia
Chapter 8.9. Enterprise System in the German Manufacturing Mittelstand ..................................... 1924
Tobias Schoenherr, Michigan State University, USA
Ditmar Hilpert, Reutlingen University, Germany
Ashok K. Soni, Indiana University, USA
M.A. Venkataramanan, Indiana University, USA
Vincent A. Mabert, Indiana University, USA
Preface
The data collected by organizations is growing in volume and complexity. As such, businesses are
abandoning traditional methods and relying more heavily on enterprise information systems to aid in
the analysis and utilization of time-sensitive data and organizational knowledge. Enterprise information
systems have gained in popularity and even SMEs, recognizing the competitive advantage afforded by
real-time decision support, have begun to adopt the technologies.
The growth in enterprise information system adoption makes it challenging for experts and practi-
tioners to stay informed of the field’s most up-to-date research. That is why Business Science Reference
is pleased to offer this three-volume reference collection that will empower students, researchers, and
academicians with a strong understanding of critical issues within enterprise information systems by
providing both broad and detailed perspectives on cutting-edge theories and developments. This reference
is designed to act as a single reference source on conceptual, methodological, technical, and managerial
issues, as well as provide insight into emerging trends and future opportunities within the discipline.
Enterprise Information Systems: Concepts, Methodologies, Tools and Applications is organized into
eight distinct sections that provide comprehensive coverage of important topics. The sections are: (1)
Fundamental Concepts and Theories, (2) Development and Design Methodologies, (3) Tools and Tech-
nologies, (4) Utilization and Application, (5) Organizational and Social Implications, (6) Managerial
Impact, (7) Critical Issues, and (8) Emerging Trends. The following paragraphs provide a summary of
what to expect from this invaluable reference tool.
Section 1, Fundamental Concepts and Theories, serves as a foundation for this extensive reference
tool by addressing crucial theories essential to the understanding of enterprise information systems.
Chapters such as Exploring Enterprise Information Systems by Malihe Tabatabaie, Richard Paige, and
Chris Kimble, and Enterprise Systems in Small and Medium-Sized Enterprises by Sanjay Mathrani,
Mohammad Rashid, and Dennis Viehland give an introduction and overview of enterprise information
systems in a contemporary business environment. Free and Open Source Enterprise Resources Plan-
ning by Rogerio de Carvalho adds an important dimension to the under-researched subject of free/open
source enterprise resource planning systems by comparing it to proprietary systems and highlighting its
innovative potential. Additional selections, including Location-Based Service (LBS) System Analysis
and Design by Yuni Xia, Jonathan Munson, and David Wood, and An Overview of Executive Informa-
tion Systems by Gary Moynihan focus on providing backgrounds and introductions to specific concepts
within enterprise information systems. These and several other foundational chapters provide a wealth
of expert research on the elemental concepts and ideas surrounding enterprise information systems.
Section 2, Development and Design Methodologies, presents in-depth coverage of the conceptual
design and architecture of enterprise information systems, focusing on aspects including enterprise
resource planning, service-oriented architecture, and decision support systems. Designing and imple-
menting effective processes and strategies are the focus of such chapters as Development and Design
Methodologies in DWM by James Yao, John Wang, Qiyang Chen, and June Lu, and Enterprise Model-
xxviii
ing in Support of Organisation Design and Change by Joseph Ajaefobi, Aysin Rahimifard, and Richard
Weston. An ERP Adoption Model for Midsize Businesses by Fahd Alizai and Stephen Burgess offers a
model that contains implementation processes, stages, factors, and issues associated with ERP adoption
in midsize businesses. Youcef Aklouf and Habiba Drias’s An Adaptive E-Commerce Architecture for
Enterprise Information Exchange presents architecture that allows partners to exchange information
with other organizations without modifying their own systems. With contributions from leading inter-
national researchers, this section offers copious developmental approaches and design methodologies
for enterprise information systems.
Section 3, Tools and Technologies, presents extensive coverage of the various tools and technologies
used in the development and implementation of enterprise information systems. This comprehensive
section includes such chapters as Real Time Decision Making and Mobile Technologies, by Keith Sher-
ringham and Bhuvan Unhelkar, and Mobile Technologies Extending ERP Systems by Dirk Werth and
Paul Makuch, which describe various techniques and models for using mobile technology to support
enterprise information systems. Extending Enterprise Application Integration (EAI) with Mobile and Web
Services Technologies by Abbass Ghanbary and Bhuvan Unhelkar demonstrates how the technologies of
web services open up the doors to collaborative enterprise architecture integration and service oriented
architecture resulting in business integration. Finally, chapters such as Data Warehouse Maintenance,
Evolution and Versioning by Johann Eder and Karl Wiggisser, and Hybrid Data Mining for Medical
Applications by Syed Hassan and Brijesh Verma present tools to adapt to the challenges of various data
warehousing mechanisms. In all, this section provides coverage of a variety of tools and technologies
that inform and enhance modern enterprise information systems.
Section 4, Utilization and Application, describes how enterprise information systems have been
utilized and offers insight on important lessons for their continued use and evolution. Including chap-
ters such as A Decision Support System for Selecting Secure Web Services by Khaled Khan, and EIS
Systems and Quality Management by Bart Gerritsen, this section investigates numerous methodologies
that have been proposed and enacted in enterprise information systems, as well as their results. As this
section continues, a number of case studies in the use of enterprise information systems are presented
such as Enterprise System in the German Manufacturing Mittelstand by Tobias Schoenherr, Ditmar
Hilpert, Ashok Soni, M.A. Venkataramanan, and Vincent Mabert, and Size Matters! Enterprise System
Success in Medium and Large Organizations by Darshana Sedera. Contributions found in this section
provide comprehensive coverage of the practicality and current use of enterprise information systems.
Section 5, Organizational and Social Implications, includes chapters discussing the organizational
and social impact of enterprise information systems. People-Oriented Enterprise Information Systems
by Giorgio Bruno proposes a notation system called People-Oriented Business Process Notation to solve
the problem of effectively integrating conversation and business processes. Experiences of Cultures in
Global ERP Implementation by Esther Brainin examines how cultural differences in global enterprises
effect the implementation of enterprise resource planning systems. The Impact of Enterprise Systems
on Business Value by Sanjay Mathrani, Mohammad Rashid, and Dennis Viehland explores two case
studies that illustrate how enterprise information systems implementation can impact organizational
functions. This section continues with Authority and Its Implementation in Enterprise Information
Systems by Alexei Sharpanskykh, which discusses how power dynamics effect enterprise information
systems integration and proposes a logic-based specification language for representing power relations.
Overall, these chapters present a detailed investigation of the complex relationship between individuals,
organizations and enterprise information systems.
Section 6, Managerial Impact, presents focused coverage of enterprise information systems as it
relates to improvements and considerations in the workplace. Managing Temporal Data by Abdullah
Tansel addresses modeling and design issues related to temporal databases. Other chapters, such as
xxix
Integrative Information Systems Architecture by Len Asprey, discuss management considerations, docu-
ment and web content management, and the technical infrastructure supporting these systems. In all, the
chapters in this section offer specific perspectives on how managerial perspectives and developments in
enterprise information systems inform each other to create more meaningful user experiences.
Section 7, Critical Issues, addresses vital issues related to enterprise information systems, which
include customer relationship management, critical success factors and the business strategies. Chapters
such as The Feral Systems and Other Factors Influencing the Success of Global ERP Implementations by
Don Kerr, and Challenges in Enterprise Information Systems Implementations by Ashim Singla discuss
the success of enterprise information systems implementation based on technology, people, and processes.
Additional selections, such as An Extended Model of Decision Making by David Sammon, Integrating
Enterprise Systems by Mark Hwang, and Preparedness of Small and Medium-Sized Enterprises to Use
Information and Communication Technology as a Strategic Tool by Klara Antlova address critical suc-
cess factors in the deployment of enterprise information systems.
Section 8, Emerging Trends, highlights areas for future research within the field of enterprise
information systems, while exploring new avenues for the advancement of the discipline. Beginning
this section is ERP Trends, Opportunities, and Challenges by Maha Shakir. This selection provides a
richer understanding of key ERP issues through by discussing emerging industry trends. The evolution
of enterprise resource planning is discussed in The Future of ERP and Enterprise Resource Manage-
ment Systems by Carlos Ferran and Ricardo Salim, and Engineering the Coordination Requirements in
Cross-organizational ERP Projects by Maya Daneva explores the complexity of cross-organizational
enterprise resource planning implementation. These and several other emerging trends and suggestions
for future research can be found within the final section of this exhaustive multi-volume set.
Although the primary organization of the contents in this multi-volume work is based on its eight
sections, offering a progression of coverage of the important concepts, methodologies, technologies,
applications, social issues, and emerging trends, the reader can also identify specific contents by utilizing
the extensive indexing system listed at the end of each volume. Furthermore to ensure that the scholar,
researcher and educator have access to the entire contents of this multi volume set as well as additional
coverage that could not be included in the print version of this publication, the publisher will provide
unlimited multi-user electronic access to the online aggregated database of this collection for the life
of the edition, free of charge when a library purchases a print copy. This aggregated database provides
far more contents than what can be included in the print version in addition to continual updates. This
unlimited access, coupled with the continuous updates to the database ensures that the most current
research is accessible to knowledge seekers.
As a comprehensive collection of research on the latest findings related to using technology to
providing various services, Enterprise Information Systems: Concepts, Methodologies, Tools and Ap-
plications, provides researchers, administrators and all audiences with a complete understanding of the
development of applications and concepts in enterprise information systems. Given the vast number of
issues concerning usage, failure, success, policies, strategies, and applications of enterprise information
systems in organizations, Enterprise Information Systems: Concepts, Methodologies, Tools and Appli-
cations addresses the demand for a resource that encompasses the most pertinent research in enterprise
information systems development, deployment, and impact.
Section I
Fundamental Concepts
and Theories
This section serves as the foundation for this exhaustive reference tool by addressing crucial theories essential
to the understanding of enterprise information systems. Chapters found within these pages provide an excellent
framework in which to position enterprise information systems within the field of information science and technology.
Individual contributions provide overviews of the history of enterprise information systems, the impact of information
systems on organizations, and overviews on various enterprise information system processes such as enterprise
resource planning and decision support systems. Within this introductory section, the reader can learn and choose
from a compendium of expert research on the elemental theories underscoring enterprise information systems.
1
Chapter 1.1
Principles and Experiences:
Designing and Building Enterprise
Information Systems
Mehmet S. Aktas
TUBITAK (Turkish National Science Foundation), Turkey
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Principles and Experiences
that manage all the information that may be as- study are two-fold. First is to describe a generic
sociated with wide-scale SOA-based e-business Information Service architecture, which supports
applications. one-to-many information service implementations
Over the years, independent enterprise e- as local data sources and integrates different kinds
business applications have developed their own of Web Service metadata at a higher conceptual
customized implementations of Information level, while ignoring the implementation details
Service Specifications. These EIS solutions are of the local data-systems. Second is to describe
not interoperable with each other, target vastly the customized implementations two widely-used
different systems and address diverse sets of Web Service Specifications: the WS-I compatible
requirements (Zanikolas & Sakellariou, 2005). Web Service Context (WS-Context) (Bunting, et
They require greater interoperability to enable al., 2003) and Universal Description, Discovery
communication between different systems, so that and Integration (UDDI) (Bellwood, Clement, &
they can share and utilize each other’s resources. von Riegen, 2003) Specifications.
Furthermore, they do not provide uniform inter- The organization of this chapter is as follows.
faces for publishing and discovery of information. Section 2 reviews the relevant work. Section 3
In turn, this creates a limitation on the client-end gives an overview of the system. Section 4 presents
(e.g. fat client-end applications), as the users have the semantics of the Hybrid Service. Sections 5-6
to interact with more than one EIS implementation. present the architectural design details and the
For example, large-scale e-business applica- prototype implementation of the system. Finally,
tions require management of large amounts of Section 7 contains a summary of the chapter.
relatively slowly varying metadata. Another ex-
ample, dynamic Web service collections, gathered
together at any one time to perform an e-business relevAnt Work
operation, require greater support for dynamic
metadata. Previous solutions do not address Unifying heterogeneous data sources under a
management requirements of both large-scale, single architecture has been target of many in-
static and small-scale, highly-dynamic metadata vestigations (Ziegler & Dittrich, 2004). Informa-
associated to Web Services (Zanikolas & Sakel- tion integration is mainly studied by distributed
lariou, 2005). None of the existing solution enables database systems research and investigates how
communication between different e-business to share data at a higher conceptual level, while
applications, so that they can share, utilize each ignoring the implementation details of the local
other’s resources, have unified access interface data systems (Ozsu, 1999; Valduriez & Pacitti,
and address diverse sets of application require- 2004). Previous work on merger between the
ments (OGF GIN-CG). We therefore see this as heterogeneous information systems may broadly
an important area of investigation especially for be categorized as global-as-view and local-as-view
enterprise e-business applications domain. integration (Florescu, Levy, & Mendelzon, 1998).
This chapter introduces a Hybrid Service as a In former category, data from several sources are
EIS that addresses metadata management require- transformed into a global schema and may be
ments of both large-scale, static and small-scale, queried with a uniform query interface. Much
highly-dynamic metadata domains. The main nov- work has been done on automating information
elty of this chapter is to describe the semantics, ar- federation process using global schema approach.
chitecture, and implementation of a EIS integrating In the latter category, queries are transformed into
different Information Services by using unification specialized queries over the local databases and
and federation concepts. The implications of this integration is carried out by transforming queries.
2
Principles and Experiences
Although the global schema approach captures ShaikhAli, Rana, Al-Ali, & Walker, 2003; Verma,
expressiveness capabilities of customized local Sivashanmugam, Sheth, Patil, Oundhakar, &
schemas, it does not scale up to high number Miller; GRIMOIRES). UDDI-M (Dialani, 2002)
of data sources. In the local-as-view approach, and UDDIe (ShaikhAli, Rana, Al-Ali, & Walker,
each local-system’s schema is need to be mapped 2003) projects introduced the idea of associating
against each other to transform the queries. In metadata and lifetime with UDDI Registry service
turn, this leads to large number of mappings that descriptions, where retrieval relies on the matches
need to be created and managed. of attribute name-value pairs between service
The proposed system differs from local-as- description and service requests. METEOR-S
view approaches, as its query transformation (Verma, Sivashanmugam, Sheth, Patil, Ound-
happens between a unified schema and local hakar, & Miller) leveraged UDDI Specification
schemas. It utilizes and leverages previous work by utilizing semantic web languages to describe
on global-as-view approach for integrating het- service entries. Grimories (GRIMOIRES) extends
erogeneous local data services. The previous work the functionalities of UDDI to provide a semantic
mainly focuses on solutions that automates the enabled registry designed and developed for the
information federation process at semantics level. MyGrid project (MyGrid). It supports third-party
Different from the previous work, the proposed attachment of metadata about services and repre-
approach presents a system architecture that en- sents all published metadata in the form of RDF
ables information integration at application level. triples either in a database, or in a file, or in a
To our best knowledge, the proposed system is memory. Although out-of-box UDDI Specification
a pioneer work, as it describes an Information is a widely used standard, it is limited to key-
Service architecture that enables unification and word-based query capabilities. Neither it allows
federation of information coming from different metadata-oriented queries, nor it takes into account
metadata systems. One limitation is that it does the volatile behavior of services. The previous
not scale to high number of local data-systems due work on UDDI-Extensions have centralized and
to low-level manual semantic schema integration. database-based solutions. Thus, they present low
To facilitate testing of our system, we did the low- fault-tolerance and low performance as opposed to
level information federation manually through a decentralized and in-memory based data-systems.
delicate analysis of the structure and semantic of The UDDI Specification is not designed to coor-
each target schema. Since the main focus of our dinate activities of Web Services participating in
research is to explore the information integration a work-flow style applications. Thus, it does not
at application level, we leave out the investigation support data-sharing and metadata management
of a low-level automated information federation requirements of rich-interacting systems.
capability for a future study. The proposed system addresses the limita-
Locating services of interest in Web service tions of previous work by introducing an add-on
intensive environments has recently become architecture, which runs one layer above the
important, since the service oriented architecture implementations of UDDI and its extensions. It
based systems increased in numbers and gain leverages previous work on UDDI and improves
popularity in recent years. The UDDI Specifica- the quality of UDDI-based metadata-systems in
tion is a widely used standard that enables services terms of fault-tolerance and high-performance.
advertise themselves and discover other services. To our best knowledge, this approach is unique,
A number of studies extends and improves the since it improves the qualities of existing imple-
out-of-box UDDI Specification (Open_GIS_Con- mentations of Information Services without
sortium_Inc.; Sycline; Galdos; Dialani, 2002; changing their code. Different from the previous
3
Principles and Experiences
UDDI-work, the proposed system supports data- Context has some limitations as described below.
sharing and manages stateful interactions of Web Firstly, the context service has limited functional-
Services. The proposed research also introduces ities such as the two primary operations: GetCon-
semantics, communication protocols, and imple- text and SetContext. Secondly, the WS-Context
mentation of an extended UDDI version, which Specification is only focused on defining stateful
addresses metadata management requirements of interactions of Web Services. It does not define a
aforementioned application use domains. searchable repository for interaction-independent
Managing stateful interactions of Web Services information associated to the services involved in
is an important problem in rich-interacting sys- an activity. Thirdly, the WS-Context Specification
tems. There are varying specifications focusing does not define a data model to manage stateful
on point-to-point service communication, such Web Service information.
as Web Service Resource Framework (WSRF), The proposed system differs from previous
WS-Metadata Exchange (WS-ME). The WSRF work focusing on point-to-point service com-
specification, proposed by Globus alliance, IBM munication, since it adopts a centralized metadata
and HP, defines conventions for managing state, management strategy to regulate the interactions.
so that collaborating applications can discover, It adopts the WS-Context Specification and
inspect, and interact with stateful resources in a presents an extended version of WS-Context
standard way. The WS-ME provides a mechanism Specification and its implementation. The pro-
a) to share information about the capabilities of totype implementation manages dynamically
participating Web Services and b) to allow query- generated session-related metadata. To our best
ing a WS Endpoint to retrieve metadata about what knowledge, the proposed approach is unique,
to know to interact with them. Communication since none of the previous work on Information
among services is also achieved with a centralized Services implemented the WS-Context Specifica-
metadata management strategy, the Web Services tion to manage stateful interactions of services.
Context (WS-Context) Specification (Bunting, The proposed Hybrid Service leverages the ex-
et al., 2003). The W-Context defines a simple tended WS-Context Service implementation and
mechanism to share and keep track of common improves its quality in terms of fault-tolerance
information shared between multiple participants and high-performance.
in Web service interactions. It is a lightweight
storage mechanism, which allows the participant’s
of an activity to propagate and share context in- HybrId servIce
formation. Although point-to-point methodologies
successfully manage the stateful information, We designed and built a novel Hybrid Information
they provide service conversation with metadata Service Architecture called Hybrid Service, which
coming from the two services that exchange in- provides unification, federation and interoper-
formation. This is a limitation, since they become ability of major Information Services. The Hybrid
inefficient, when the number of communicating Service forms an add-on architecture that interacts
services increased. We find the WS-Context with the local information services and unifies
Specification as promising approach to tackle the them in a higher-level hybrid system. In other
problem of managing distributed session state, words, it provides a unifying architecture, where
since it models a session metadata repository as one can assemble metadata instances of different
an external entity, where more than two services information services. To facilitate testing of the
can easily access/store highly dynamic, shared system, we integrated the Hybrid Service with the
metadata. Even though it is promising, the WS- two local information service implementations:
4
Principles and Experiences
WS-Context and Extended UDDI. We discuss b) extended business service entity (businessSer-
semantics of the Hybrid Service in the follow- vice). We describe the additional/modified data
ing section followed by a section discussing its model entities as follows.
architecture. Business service entity structure: The
UDDI’s business service entity structure contains
descriptive, yet limited information about Web
semAntIcs Services. A comprehensive description of the out-
of-box business service entity structure defined
The semantics of the system may be analyzed under by UDDI can be found in (Bellwood, Clement,
four categories: extended UDDI, WS-Context, & von Riegen, 2003). Here, we only discuss the
Unified Schema, and Hybrid Service Schema. additional XML structures introduced to expand
The extended UDDI Specification extends ex- on existing business service entity.
isting out-of-box UDDI Specification to address These additional XML elements are a) ser-
its aforementioned limitations. The WS-Context vice attribute and b) lease. The service attribute
Specification improves the existing out-of-box XML element corresponds to a static metadata
Web-Service Context Specification to meet the (e.g. WSDL of a given service). A lease structure
aforementioned application requirements. The describes a period of time during which a service
Unified Schema Specification integrates these two can be discoverable.
information service specifications. The Hybrid Service attribute entity structure: A service
Service Schema consists of two small schemas: attribute (serviceAttribute) data structure describes
Hybrid Schema and SpecMetadata Schema. information associated with service entities.
These define the necessary abstract data models Each service attribute corresponds to a piece of
to achieve a generic architecture for unification metadata, and it is simply expressed with (name,
and federation of different information service value) pairs. Apart from similar approaches (Di-
implementations. alani, 2002; ShaikhAli, Rana, Al-Ali, & Walker,
2003), in the proposed system, a service attribute
the extended uddI specification includes a) a list of abstractAtttributeData, b) a
categoryBag and c) a boundingBox XML struc-
We have designed extensions to the out-of-box tures: An abstractAttributeData element is used
UDDI Data Structure (Bellwood, Clement, & to represent metadata that is directly related with
von Riegen, 2003) to be able to associate both functionality of the service and store/maintain
prescriptive and descriptive metadata with service these domain specific auxiliary files as-is. This
entries. This way the proposed system addresses allows us to add third-party data models such as
limitations of UDDI (explained in Section 2) and “capabilities.xml” metadata file describing the
interoperates with existing UDDI clients without data coverage of domain-specific services such
requiring an excessive change in the implemen- as the geospatial services. An abstractAttribute-
tations. We name our version of UDDI as the Data can be in any representation format such
extended UDDI. as XML or RDF. This data structure allows us
The Extended UDDI Schema: The schema to pose domain-specific queries on the metadata
addresses the metadata requirements of Geo- catalog. Say, an abstractAttributeData of a geo-
graphical Information System/Sensor applications spatial service entry contains “capabilities.xml”
by extending the out-of-box UDDI data model. It metadata file. As it is in XML format, a client
includes following additional/modified entities: may conduct a find_service operation with an
a) service attribute entity (serviceAttribute) and XPATH query statement to be carried out on the
5
Principles and Experiences
6
Principles and Experiences
7
Principles and Experiences
information providers manage their own data in find sessionService API call returns a service list
the interaction-dependent context space by using matching the criteria specified in the arguments.
this user-defined identifier. The context value can get sessionDetail: Used to retrieve sessionEntity
be in any representation format such as binary, data structure corresponding to each of the session
XML or RDF. Each context has a lifetime. Thus, key values specified in the arguments. get con-
each context entity contains the aforementioned textDetail: Used to retrieve the context structure
lease structure describing the period of time dur- corresponding to the context key values specified.
ing which it can be discoverable. get sessionServiceDetail: Used to retrieve ses-
WS-Context Schema XML API: We present sionService entity data structure corresponding
an XML API for the WS-Context Service. The to each of the sessionService key values specified
XML API sets of the WS-Context XML Meta- in the arguments. The Proprietary XML API is
data Service can be grouped as Publish, Inquiry, implemented to provide find/add/modify/delete
Proprietary, and Security. operations on the publisher list, i.e., authorized
The Publish XML API: The API is used to users of the system. We adapt semantics for the
publish metadata instances belonging to different proprietary XML API from existing UDDI Speci-
entities of the WS-Context Schema. It extends the fications. This XML API is as in the following:
WS-Context Specification Publication XML API find publisher: Used to find publishers registered
set. It consists of the following functions: save with the system matching the conditions speci-
session: Used to add/update one or more session fied in the arguments. get publisherDetail: Used
entities into the hybrid service. Each session may to retrieve detailed information regarding one or
contain one-to-many context entity, have a lifetime more publishers with given publisherID(s). save
(lease), and be associated with service entries. save publisher: Used to add or update information
context: Used to add/update one or more context about a publisher. delete_publisher: Used to delete
(dynamic metadata) entities into the service. save information about a publisher with a given pub-
sessionService: Used to add/update one or more lisherID from the metadata service. The Security
session service entities into the hybrid service. XML API is used to enable authenticated access to
Each session service may contain one-to-many the service. We adopt the semantics from existing
context entity and have a lifetime (lease). delete UDDI Specifications. The Security API includes
session: Used to delete one or more sessionEntity the following function calls. get_authToken: Used
structures. delete context: Used to delete one or to request an authentication token as an ‘authInfo’
more contextEntity structures. delete sessionSer- (authentication information) element from the
vice: Used to delete one or more session service service. The authInfo element allows the system
structures. The Inquiry XML API is used to pose implement access control. To this end, both the
inquiries and to retrieve metadata from service. publication and inquiry API set include authentica-
It extends the existing WS-Context XML API. tion information in their input arguments. discard_
The extensions to the WS-Context Inquiry API authToken: Used to inform the hybrid service that
set are outlined as follows: find session: Used to an authentication token is no longer required and
find sessionEntity elements. The find session API should be considered invalid.
call returns a session list matching the conditions Using WS-Context Schema XMLAPI: Given
specified in the arguments. find context: Used to the capabilities of the WS-Context Service, one can
find contextEntity elements. The find context API simply populate metadata instances using the WS-
call returns a context list matching the criteria Context XML API as in the following scenario.
specified in the arguments. find sessionService: Say, a user publishes a metadata under an already
Used to find session service entity elements. The created session. In this case, the user first constructs
8
Principles and Experiences
a context entity element. Here, a context entity is businessEntity is used to aggregate one-to-many
used to represent interaction-dependent, dynamic services and sites managed by the same people. The
metadata associated with a session or a service or sessionEntity is used to aggregate session services
both. Each context entity has both system-defined participating to a session. Therefore, businessEn-
and user-defined identifiers. The uniqueness of the tity (from ExtendedUDDI) can be considered as
system-defined identifier is ensured by the system matching concepts with the sessionEntity (from
itself, whereas, the user-defined identifier is sim- WS-Context schema) as their intentional domains
ply used to enable users to manage their memory are similar. The cardinality between these entities
space in the context service. As an example, we differs, as the businessEntity may contain one to
can illustrate a context as in ((system-defined-uuid, may sessionEntities. The second mapping is be-
user-defined-uuid, “Job completed”)). A context tween: ExtendedUDDI.service and WS-Context.
entity can be also associated with service entity sessionService: These entities are equivalent as
and it has a lifetime. Contexts may be arranged the intentional domains that they represent are
in parent-child relationships. One can create a the same. The cardinality between these entities
hierarchical session tree where each branch can is also the same. In the integrated schema, we
be used as an information holder for contexts with unify these entities as service entity. The third
similar characteristics. This enables the system mapping is between ExtendedUDDI.metadata and
to be queried for contexts associated to a session WS-Context.context: These entities are equivalent
under consideration. This enables the system as the intentional domains that they represent are
to track the associations between sessions. As the same. The cardinality between these entities is
the context elements are constructed, they can also the same. We continue unification by merg-
be published with save_context function of the ing the two schemas based on the mappings that
WS-Context XML API. On receiving publishing we identified and create a unified schema. The
metadata request, the system processes the request, Unified Schema unifies matching and disjoint
extracts the context entity instance, assigns a entities of the two schemas.
unique identifier, stores in the in-memory storage The Unified Schema is comprised of the fol-
and returns a respond back to the client. lowing entities: businessEntity, sessionEntity,
service, bindingTemplate, metadata, tModel,
the unified schema specification publisherAssertions. A businessEntity describes
a party who publishes information about a ses-
This research investigates a system architecture sion (in other words service activity), site or
that would support information federation and service. The publisherAssertions entity defines
unification at application-level. To facilitate test- the relationship between the two businessEntities.
ing of such system architecture, a unified schema The sessionEntity describes information about a
is needed. We achieved semantic-level unification service activity that takes place. A sessionEntity
manually through a delicate analysis of the struc- may contain one-to-many service and metadata
ture and semantics of the two schemas: extended entities. The service entity provides descriptive
UDDI and WS-Context. We introduced an abstract information about a Web Service family. It may
data model and query/publish XML API and contain one-to-many bindingTemplate entities that
named it as the Unified Schema Specification. define the technical information about a service
We begin unification by finding the mappings end-point. A bindingTemplate entity contains
between the similar entities of the two schemas. references to tModel that defines descriptions of
First mapping is between ExtendedUDDI.busi- specifications for service end-points. The service
nessEntity and WS-Context.sessionEntity: The entity may also have one-to-many metadata at-
9
Principles and Experiences
tached to it. A metadata contains information get businessDetail: Used to retrieve businessEntity
about both interaction-dependent, interaction- data structure of the Unified Schema corresponding
independent metadata and service data associated to each of the business key values specified in the
to Web Services. A metadata entity describes the arguments. get sessionDetail: Used to retrieve ses-
information pieces associated to services or sites sionEntity data structure corresponding to each of
or sessions as (name, value) pairs. the session key values specified in the arguments.
The Unified Schema XML API: To facilitate get serviceDetail: Used to retrieve service entity
testing of the federation capability, we introduce a data structure corresponding to each of the service
limited Query/Publish XML API that can be car- key values specified in the arguments. get meta-
ried out on the instances of the parts of the Unified dataDetail: Used to retrieve the metadata structure
Schema. We can group the Unified Schema XML corresponding to the metadata key values specified.
API under two categories: Publish and Inquiry. Using the Unified Schema XML API: Given
The Publish XML API: This API is used to these capabilities, one can simply populate the
publish metadata instances belonging to different Hybrid Service with Unified Schema metadata
entities of the Unified Schema. It consists of the instances using its XML API as in the following
following functions: save business: Used to add/ scenario. Say, a user wants to publish both session-
update one or more business entities into the hybrid related and interaction-independent metadata as-
service. save session: Used to add/update one or sociated to an existing service. In this case, the user
more session entities into the hybrid service. Each constructs metadata entity instance. Each metadata
session may contain one-to-many metadata, one- entity has both system-defined and user-defined
to-many service entities and have a lifetime (lease). identifiers. The uniqueness of the system-defined
save service: Used to add/update one or more ser- identifier is ensured by the system itself, whereas,
vice entries into the hybrid service. Each service the user-defined identifier is simply used to enable
entity may contain one-to-many metadata element users to manage their memory space in the context
and may have a lifetime (lease). save metadata: service. As an example, we can illustrate a context
Used to register or update one or more metadata as in the following examples: a) ((throughput,
associated with a service. delete business: Used to 0.9)) and b) ((system-defined-uuid, user-defined-
delete one or more business entity structures. delete uuid, “Job completed”)). A metadata entity can
session: Used to delete one or more sessionEntity be also associated with site, or sessionEntity of
structures. delete service: Used to delete one or the Unified Schema and it has a lifetime. As the
more service entity structures. delete metadata: metadata entity instances are constructed, they
Used to delete existing metadata elements from can be published with “save_metadata” function
the hybrid service. The Inquiry XML API is used of the Unified Schema XML API. On receiving
to pose inquiries and to retrieve metadata from publishing metadata request, the system processes
service. It consists of following functions: find the request, extracts the metadata entity instance,
business: This API call locates specific businesses assigns a unique identifier, stores in the in-memory
within the hybrid services. find session: Used to storage and returns a respond back to the client.
find sessionEntity elements. The find session API
call returns a session list matching the conditions the Hybrid service semantics
specified in the arguments. find service: Used to
locate specific services within the hybrid service. The Hybrid Service introduces an abstraction layer
find metadata: Used to find service entity elements. for uniform access interface to be able to support
The find service API call returns a service list one-to-many information service specification
matching the criteria specified in the arguments. (such as WS-Context, Extended UDDI, or Unified
10
Principles and Experiences
Schema). To achieve the uniform access capability, mapping file of the schema under consideration.
the system presents two XML Schemas: a) Hybrid Then, the system stores the newly-inserted schema
Schema and b) Specification Metadata (Spec- entity instances into the in-memory storage. de-
Metadata) Schema. The Hybrid Schema defines lete_schemaEntity: The delete_schemaEntity is
the generic access interface to the Hybrid Service. used to delete an instance of any schema entities
The SpecMetadata Schema defines the necessary of a given specification. The delete_schemaEntity
information required by the Hybrid Service to be API call deletes existing service entities associ-
able to process instances of supported information ated with the specified key(s) from the system.
service schemas. We discuss the semantics of the On receiving a schema entity deletion request
Hybrid Schema and the SpecMetadata Schema in message, the system processes the incoming mes-
the following sections. sage based on information given in the mapping
file of the schema under consideration. Then the
The Hybrid Schema system, deletes the correct entity associated with
the key. find_schemaEntity: This API call locates
The Hybrid Schema is designed to achieve a schemaEntities whose entity types are identified
unifying access interface to the Hybrid Service. It in the arguments. This function allows the user to
is independent from any of the local information locate a schema entity among the heterogeneous
service schemas supported by the Hybrid Service. metadata space. On receiving a find_schemaEntity
It defines a set of XML API to enable clients/pro- request message, the system processes the incom-
viders to send specification-based publish/query ing message based on information given in the
requests (such as WS-Context’s “save_context” schema mapping file of the schema under con-
request) in a generic way to the system. sideration. Then the system, locates the correct
The Hybrid Service XML API allows the entities matching the query under consideration.
system support one-to-many information service get_schemaEntity: The get_schemaEntityDetail is
communication protocols. It consists of the follow- used to retrieve an instance of any schema enti-
ing functions: hybrid_service: This XML API call ties of a given specification. It returns the entity
is used to pose inquiry/publish requests based on structure corresponding to key(s) specified in the
any specification. With this function, the user can query. On receiving a get_schemaEntityDetail
specify the type of the schema and the function. retrieval request message, the system processes
This function allows users to access an information the incoming message based on information given
service back-end directly. The user also specifies in the mapping file of the schema under consider-
the specification-based publish/query request in ation. Then the system retrieves the correct entity
XML format based on the specification under associated with the key. Finally, the system sends
consideration. On receiving the hybrid_function the result to the user.
request call, the system handles the request based Given these capabilities, one can simply
on the schema and function specified in the query. populate the Hybrid Service using the “save_sche-
save_schemaEntity: This API call is used to save maEntity” element and publish metadata instances
an instance of any schema entities of a given of the customized implementations of information
specification. The save_schemaEntity API call service specifications. The “save_schemaEntity”
is used to update/add one or more schema entity element includes an “authInfo” element, which
elements into the Hybrid Information Service. describes the authentication information; “lease”
On receiving a save_schemaEntity publication element, which is used to identify the lifetime of
request message, the system processes the incom- the metadata instance; “schemaName” element,
ing message based on information given in the which is used to identify a specification schema
11
Principles and Experiences
(such as Extended UDDI Schema); “schemaFunc- information is needed to process the incoming
tionName”, which is used to identify the function request and execute the requested operation on
of the schema (such as “save_ serviceAttribute”); the appropriate information service backend. This
“schema_SAVERequestXML”, which is an ab- information defines the function name, its argu-
stract element used for passing the actual XML ments, return values and the class, which needs to
document of the specific publish function of a be executed in the information service back-end.
given specification. The Hybrid Service requires The MappingRules XML element describes
a specification metadata document that describes all required information regarding the mapping
all necessary information to be able to process rules that provide mapping between the Unified
XML API of the schema under consideration. Schema and the local information service schemas
We discuss the specification metadata semantics such as extended UDDI and WS-Context. The
in the following section. MappingRules element consists of one-to-many
MappingRule sub-elements. Each MappingRule
The SpecMetadata Schema describes information about how to map a unified
schema XML API to a local information service
The SpecMetadata XML Schema is used to de- schema XML API. The MappingRule element
fine all necessary information required for the contains the necessary information to identify
Hybrid Service to support an implementation of functions that will be mapped to each other.
information service specification. The Hybrid Given these capabilities, one can simply popu-
System requires an XML metadata document, late the Hybrid Service as in the following scenario.
which is generated based on the SpecMetadata Say, a user wants to publish a metadata into the
Schema, for each information service specifica- Hybrid Service using WS-Context’s “save_con-
tion supported by the system. The SpecMetadata text” operation through the generic access inter-
XML file helps the Hybrid System to know how face. In this case, firstly, the user constructs an
to process instances of a given specification XML instance of the “save_context” XML document
API. The SpecMetadata includes Specname, (based on the WS-Context Specification) as if s/
Description, and Version XML elements. These he wants to publish a metadata instance into the
elements define descriptive information to help WS-Context Service. Once the specification-
the Hybrid Service to identify the local informa- based publish function is constructed, it can be
tion service schema under consideration. The published into the Hybrid Service by utilizing
FunctionProperties XML element describes the “save_schemaEntity” operation of the Hybrid
all required information regarding the functions Service Access API.
that will be supported by the Hybrid Service. As for the arguments of the “save_sche-
The FunctionProperties element consists of one- maEntity” function, the user needs to pass the
to-many FunctionProperty sub-elements. The following arguments: a) authentication informa-
FunctionProperty element consists of function tion, b) lifetime information, c) schemaName
name, memory-mapping and information-service- as “WS-Context”, d) schemaFunctionName as
backend mapping information. Here the memory- “save_context” and e) the actual save_context
mapping information element defines all necessary document which was constructed based on the
information to process an incoming request for WS-Context Specification. Recall that, for each
in-memory storage access. The memory-mapping specification, the Hybrid Service requires a
information element defines the name, user- SpecMetadata XML document (an instance of
defined identifier and system-defined identifier the Specification Metadata Schema). On receipt
of an entity. The information-service-backend of the “save_schemaEntity” publish operation, the
12
Principles and Experiences
Hybrid Service obtains the name of the schema control capability is responsible for enforcing
(such as WS-Context) and the name of the publish controlled access to the Hybrid Information Ser-
operation (such as save_context) from the pass- vice. The investigation and implementation of
ing arguments. In this case, the Hybrid Service access control mechanism for the decentralized
consults with the WS-Context SpecMetadata information service is left out for future study.
document and obtains necessary information about (3) TupleSpaces Access API allows access to
how to process incoming “save_context” opera- in-memory storage. This API supports all query/
tion. Based on the memory mapping information publish operations that can take place on the Tuple
obtained from user-provided SpecMetadata file, Pool. (4) The Tuple Pool implements a lightweight
the system processes the request, extracts the implementation of JavaSpaces Specification
context metadata entity instance, assigns a unique (Sun_Microsystems, 1999) and is a generalized in-
identifier, stores in the in-memory storage and memory storage mechanism. It enables mutually
returns a response back to the client. exclusive access and associative lookup to shared
data. (5) The Tuple Processor layer is designed to
process metadata stored in the Tuple Pool. Once
ArcHItecture the metadata instances are stored in the Tuple Pool
as tuple objects, the system starts processing the
We designed and built a Hybrid Information tuples and provides the following capabilities. The
Service (Hybrid Service) to support handling first capability is the LifeTime Management. Each
and discovery of metadata associated with Web metadata instance may have a lifetime defined
Services. The Hybrid Service is an add-on archi- by the user. If the metadata lifetime is exceeded,
tecture that interacts with the local information then it is evicted from the TupleSpace. The second
systems and unifies them in a higher-level hybrid capability is the Persistency Management. The
system. It provides a unifying architecture where system checks with the tuple space every so often
one can assemble metadata instances of different for newly added /updated tuples and stores them
information services. into the database for persistency of information.
The third capability is the Fault Tolerance Man-
Abstraction layers agement. The system checks with the tuple space
every so often for newly-added/updated tuples and
Figure 1 illustrates the detailed architectural replicates them in other Hybrid Service instances
design and abstraction layers of the system. (1) using the publish-subscribe messaging system.
The Uniform Access layer imports the XML API This capability also provides consistency among
of the supported Information Services. It is de- the replicated datasets. The fourth capability is
signed as generic as possible, so that it can support the Dynamic Caching Management. With this
one-to-many XML API, as the new information capability, the system keeps track of the requests
services are integrated with the system. (2) The coming from the pub-sub system and replicates/
Request-processing layer is responsible for ex- migrates tuples to other information services where
tracting incoming requests and process operations the high demand is originated. (6) The Filtering
on the Hybrid Service. It is designed to support layer supports the federation capability. This layer
two capabilities: notification and access control. provides filtering between instances of the Unified
The notification capability enables the interested Schema and local information service schemas
clients to be notified of the state changes happen- such as WS-Context Schema based on the user
ing in a metadata. It is implemented by utilizing defined mapping rules to provide transformations.
publish-subscribe based paradigm. The access (7) The Information Resource Manager layer is
13
Principles and Experiences
Figure 1.
Client
Client
Extended WS-Context
ClientHybrid
….
UDDIExtended
API API
WS-Context API Hybrid Mapping
UDDI WS API API
…. Files
WS API
Request
UNIFORMprocessor
ACCESS INTERFACE (XML)
Request processor
Access Control
Access Control
Request processor
TUPLE SPACE ACCESS API Mapping
TUPLE SPACE API
Access Control
Rule
Files (XSLT)
TUPLE SPACE
POOL API SERVICE
A HYBRIGTUPLE POOL
TUPLE
GRID INFORMATION
MEMORY-IN STORAGE
Persistency Dynamic
Persistency Dynamic Caching Fault
Caching Fault Tolerance
Tolerance
Management
Management TUPLE
Management
Management POOL ( JAVA SPACES)
Management
Management Management
Management
TUPLE
TUPLE processor
processor
Filter
Filter PUB PUB-SUB Network
– SUB Network Manager
Manager
ManagerManager PublisherMANAGER
INFORMATION RESOURCE Subscriber
Resource Resource ……
Handler Handler
Extended UDDI WS-Context HYBRID ….
GIS NETWORK
Service - I Service - II CONNECTED….WITH PUB-
DB1 DB2 …
SUB SYSTEM 10 of 34
Extended UDDI WS-Context …..
14
Principles and Experiences
HybrId service
Subscriber
ext uddI Ws-context
...
Publisher
database database
topic based Publish-subscribe
Replica Server-1
messaging system
Wsdl Wsdl
HybrId service HybrId service
the system keeps all locally available metadata second capability is the notification management.
keys in a table in the memory. On receipt of a Here, the system informs the interested parties of
request, the system first checks if the metadata the state changes happening in the metadata. This
is available in the memory by checking with the way the requested entities can keep track of infor-
metadata-key table. If the requested metadata is mation regarding a particular metadata instance.
not available in the local system, the request is Thirdly, if the request is to be handled in the
forwarded to the Pub-Sub Manager layer to probe memory, the Tuple Space Access API is used to
other Hybrid Services for the requested metadata. enable the access to the in-memory storage. This
If the metadata is in the in-memory storage, then API allows us to perform operations on the Tuple
the request processor utilizes the Tuple Space Pool. The Tuple Pool is an in-memory storage. The
Access API and executes the query in the Tuple Tuple Pool provides a storage capability where
Pool. In some cases, requests may require to be the metadata instances of different information
executed in the local information service back- service schemas can be represented.
end. For an example, if the client’s query requires Fourthly, once the metadata instances are
SQL query capabilities, it will be forwarded to stored in the Tuple Pool as tuple objects, the tuple
the Information Resource Manager, which is processor layer is being used to process tuples
responsible of managing the local information and provide a variety of capabilities. The first
service implementations. capability is the LifeTime Management. Each
Secondly, once the request is extracted and metadata instance may have a lifetime defined
processed, the system presents abstraction layers by the user. If the metadata lifetime is exceeded,
for some capabilities such as access control and then it is evicted from the Tuple Pool. The second
notification. First capability is the access control capability is the Persistency Management. The
management. This capability layer is intended to system checks with the tuple space every so often
provide access controlling for metadata accesses. for newly-added / updated tuples and stores them
As the focus of our investigation is distributed into the local information service back-end. The
metadata management aspects of information third capability is the Dynamic Caching Man-
services, we leave out the research and imple- agement. The system keeps track of the requests
mentation of this capability as future study. The coming from the other Hybrid Service instances
15
Principles and Experiences
and replicates/migrates metadata to where the implementation has a Resource Handler that en-
high demand is originated. The fourth capability ables interaction with the Hybrid Service.
is the Fault Tolerance Management. The system Sixthly, if the metadata is to be replicated/
again checks with the tuple space every so often stored into other Hybrid Service instances, the
for newly-added / updated tuples and replicates Pub-Sub Management Layer is used for manag-
them in other information services using the ing interactions with the Pub-Sub network. On
pub-sub system. This service is also responsible receiving the requests from the Tuple Processor,
for providing consistency among the replicated the Pub-Sub Manager publishes the request to the
datasets. As the main focus of this paper is to corresponding topics. The Pub-Sub Manager may
discuss information federation in Information also receive key-based access/storage requests
Services, the detailed discussion on replication, from the pub-sub network. In this case, these
distribution, consistency enforcement aspects of requests will be carried out on the Tuple Pool by
the system is left out as the focus of another paper utilizing TupleSpace Access API. The Pub-Sub
(Aktas, Fox, & Pierce, 2008). Manager utilizes publisher and subscriber sub-
The Hybrid Service supports a federation components in order to provide communication
capability to address the problem of providing among the instances of the Hybrid Services.
integrated access to heterogeneous metadata. To
facilitate the testing of this capability, a Unified
Schema is introduced by integrating different PrototyPe ImPlementAtIon
information service schemas. If the metadata is
an instance of the Unified Schema, such metadata The Hybrid Information Service prototype
needs to be mapped into the appropriate local implementation consists of various modules
information service back-end. To achieve this, such as Query and Publishing, Expeditor, Filter
the Hybrid Service utilizes the filtering layer. and Resource Manager, Sequencer, Access and
This layer does filtering based on the user-defined Storage. This software is open source project and
mapping rules to provide transformations between available at (Aktas). The Query and Publishing
the Unified Schema instances and local schema module is responsible for processing the incom-
instances. If the metadata is an instance of a lo- ing requests issued by end-users. The Expeditor
cal schema, then the system does not apply any module forms a generalized in-memory storage
filtering, and backs-up this metadata to the cor- mechanism and provides a number of capabilities
responding local information service back-end. such as persistency of information. The Filter and
Fifthly, if the metadata is to be stored to the Resource Manager modules provide decoupling
information service backend (for persistency of between the Hybrid Information Service and the
information), the Information Resource Manage- sub-systems. The Sequencer module is respon-
ment layer is used to provide connection with the sible for labeling each incoming context with
back-end resource. The Information Resource a synchronized timestamp. Finally, the Access
Manager handles with the management of local and Storage modules are responsible for actual
information service implementations. It provides communication between the distributed Hybrid
decoupling between the Hybrid Service and sub- Service nodes to support the functionalities of a
systems. With the implementation of Information replica hosting system.
Resource Manager, we have provided a uniform, The Query and Publishing module is respon-
single interface to sub-information systems. The sible for implementing a uniform access interface
Resource Handler implements the sub-information for the Hybrid Information Service. This module
system functionalities. Each information service implements the Request Processing abstraction
16
Principles and Experiences
layer with access control and notification capa- an in-memory storage based on the TupleSpaces
bilities. On completing the request processing paradigm (Carriero & Gelernter, 1989). The
task, the Query and Publishing module utilizes Tuple-processing layer introduces a number of
the Tuple Space API to execute the request on capabilities: LifeTime Management, Persistency
the Tuple Pool. On completion of operation, the Management, Dynamic Caching Management and
Query and Publication module sends the result to Fault Tolerance Management. Here, the LifeTime
the client. As discussed earlier, context informa- Manager is responsible for evicting those tuples
tion may not be open to anyone, so there is a need with expired leases. The Persistency Manager is
for an information security mechanism. We leave responsible for backing-up newly-stored / updated
out the investigation and implementation of this metadata into the information service back-ends.
mechanism as a future study. We must note that to The Fault Tolerance Manager is responsible for
facilitate testing of the centralized Hybrid Service creating replicas of the newly added metadata.
in various application use domains, we imple- The Dynamic Caching Manager is responsible
mented a simple information security mechanism. for replicating/migrating metadata under high
Based on this implementation, the centralized demand onto replica servers where the demand
Hybrid Service requires an authentication token originated.
to restrict who can perform inquiry/publish opera- The Filtering module implements the filtering
tion. The authorization token is obtained from the layer, which provides a mapping capability based
Hybrid Service at the beginning of client-server on the user defined mapping rules. The Filtering
interaction. In this scenario, a client can only ac- module obtains the mapping rule information from
cess the system if he/she is an authorized user by the user-provided mapping rule files. As the map-
the system and his/her credentials match. If the ping rule file, we use the XSL (stylesheet language
client is authorized, he/she is granted with an au- for XML) Transformation (XSLT) file. The XSLT
thentication token which needs to be passed in the provides a general purpose XML transformation
argument lists of publish/inquiry operations. The based on pre-defined mapping rules. Here, the
Query and Publishing module also implements a mapping happens between the XML APIs of the
notification scheme. This is achieved by utilizing Unified Schema and the local information service
a publish-subscribe based messaging scheme. This schemas (such as WS-Context or extended UDDI
enables users of Hybrid Service to utilize a push- schemas).
based information retrieval capability where the The Information Resource Manager module
interested parties are notified of the state changes. handles with management of local information
This push-based approach reduces the server load service implementations such as the extended
caused by continuous information polling. We UDDI. The Resource Manager module separates
use the NaradaBrokering software (Pallickara & the Hybrid System from the sub-system classes. It
Fox, 2003) as the messaging infrastructure and its knows which sub-system classes are responsible
libraries to implement subscriber and publisher for a request and what method needs to be executed
components. by processing the specification-mapping metadata
The Expeditor module implements the file that belongs the local information service
Tuple Spaces Access API, Tuple Pool and Tuple- under consideration. On receipt of a request, the
processing layer. The Tuple Spaces Access API Information Resource Manager checks with the
provides an access interface on the Tuple Pool. corresponding mapping file and obtain informa-
The Tuple Pool is a generalized in-memory stor- tion about the specification-implementation. Such
age mechanism. Here, to meet the performance information could be about a class (which needs
requirement of the proposed architecture, we built to be executed), it’s function (which needs to be
17
Principles and Experiences
invoked), and function’s input and output types, In order to impose an order on updates, each
so that the Information Resource Manager can context has to be time-stamped before it is stored
delegate the handling of incoming request to ap- or updated in the system. The responsibility of the
propriate sub-system. By using this approach, the Sequencer module is to assign a timestamp to each
Hybrid Service can support one-to-many infor- metadata, which will be stored into the Hybrid
mation services as long as the sub-system imple- Service. To do this, the Sequencer module inter-
mentation classes and the specification-mapping acts with Network Time Protocol (NTP)-based
metadata (SpecMetadata) files are provided. The time service (Bulut, Pallickara, & Fox, 2004)
Resource Handler is an external component to implemented by NaradaBrokering (Pallickara
the Hybrid Service. It is used to interact with & Fox, 2003) software. This service achieves
sub-information systems. Each specification has synchronized timestamps by synchronizing the
a Resource Handler, which allows interaction machine clocks with atomic timeservers available
with the database. The Hybrid System classes across the globe.
communicate with the sub-information systems
by sending requests to the Information Resource
Manager, which forwards the requests to the ap- conclusIon
propriate sub-system implementation. Although
the sub-system object (from the corresponding This chapter introduced the principles and expe-
Resource Handler) performs the actual work, the riences of designing and building a web-based
Information Resource Manager seems as if it is Enterprise Information Service. Within this em-
doing the work from the perspective of the Hybrid phasis, it also introduced a novel architecture for
Service inner-classes. This approach separates the an Enterprise Information Service, called Hybrid
Hybrid Service implementation from the local Service, supporting handling and discovery of
schema-specific implementations. not only quasi-static, stateless metadata, but also
The Resource Manager module is also used session related metadata.
for recovery purposes. We have provided a recov- The Hybrid Service is an add-on architecture
ery process to support persistent in-memory stor- that runs one layer above existing information
age capability. This type of failure may occur if the service implementations. Although, it mainly man-
physical memory is wiped out when power fails or ages metadata that maybe associated to Web Ser-
machine crashes. This recovery process converts vices, it can also be used to manage any metadata
the database data to in-memory storage data (from about Web resources on the Internet. It provides
the last backup). It runs at the bootstrap of the Hy- unification, federation and interoperability of En-
brid Service. This process utilizes user-provided terprise Information Services. To achieve unifica-
“find_schemaEntity” XML documents to retrieve tion, the Hybrid Service is designed as a generic
instances of schema entities from the information system with front and back-end abstraction layers
service backend. Each “find_schemaEntity” XML supporting one-to-many local information systems
document is a wrapper for schema specific “find” and their communication protocols. To achieve
operations. At the bootstrap of the system, firstly, federation, the Hybrid Service is designed to sup-
the recovery process applies the schema-specific port information integration technique in which
find functions on the information service backend metadata from several heterogeneous sources
and retrieves metadata instances of schema enti- are transferred into a global schema and queried
ties. Secondly, the recovery process stores these with a uniform query interface. To manage both
metadata instances into the in-memory storage to quasi-static and dynamic metadata and provide
achive persistent in-memory storage. interoperability with wide-range of Web Service
18
Principles and Experiences
applications, the Hybrid Service is integrated Dialani, V. (2002). UDDI-M version 1.0 API
with two local information services: WS-Context specification. Southampton, UK: University of
XML Metadata Service and Extended UDDI XML Southampton.
Metadata Service. The WS-Context Service is
Florescu, D., Levy, A., & Mendelzon, A. (1998).
implemented based on WS-Context Specification
Database techniques for the World Wide Web:
to manage dynamic, session related metadata. The
A survey. SIGMOD Record, 27(3), 59–74.
Extended UDDI Service is implemented based on
doi:10.1145/290593.290605
an extended version of the UDDI Specification to
manage semi-static, stateless metadata. Galdos. Galdos Inc. Retrieved from http://www.
galdosinc.com
GRIMOIRES. (n.d.).UDDI compliant Web ser-
reFerences
vice registry with metadata annotation extension.
Aktas, M. S. (n.d.). Fault tolerant high performance Retrieved from http://sourceforge.net/projects/
information service-FTHPIS-hybrid WS-context grimoires
service Web site. Retrieved from http://www. MyGrid. (n.d.). UK e-science project. Retrieved
opengrids.org/wscontext from http://www.mygrid.org.uk
Aktas, M. S., Fox, G. C., Pierce, M. E. (2008). OGF Grid Interoperation Now Community Group
Distributed high performance grid information (GIN-CG). (n.d.). Retrieved from https://forge.
service. Submitted to Journal of Systems and gridforum.org/projects/gin
Software.
Open_GIS_Consortium_Inc. (2003). OWS1.2
Bellwood, T., Clement, L., & von Riegen, C. UDDI experiment. OpenGIS interoperability
(2003). UDDI version 3.0.1: UDDI spec technical program report OGC 03-028. Retrieved from
committee specification. Retrieved from http:// http://www.opengeospatial.org/docs/03-028.pdf
uddi.org/pubs/uddi-v3.0.1-20031014.htm
Ozsu, T. P. V. (1999). Principles of distributed
Bulut, H., Pallickara, S., & Fox, G. (2004, June database systems, 2nd edition. Prentice Hall.
16-18). Implementing a NTP-based time service
within a distributed brokering system. In ACM Pallickara, S., & Fox, G. (2003). NaradaBrokering:
International Conference on the Principles and A distributed middleware framework and archi-
Practice of Programming in Java, Las Vegas, tecture for enabling durable peer-to-peer grids. In
NV. Proceedings of ACM/IFIP/USENIX International
Middleware Conference Middleware-2003, Rio
Bunting, B., Chapman, M., Hurley, O., Little, M., Janeiro, Brazil.
Mischinkinky, J., Newcomer, E., et al. (2003).
Web services context (WS-context) version 1.0. Pallickara, S., & Fox, G. (2003). NaradaBroker-
Retrieved from http://www.arjuna.com/library/ ing: A middleware framework and architecture
specs/ws_caf_1-0/WS-CTX.pdf for enabling durable peer-to-peer grids. (LNCS).
Springer-Verlag.
Carriero, N., & Gelernter, D. (1989). Linda in
context. Communications of the ACM, 32(4),
444–458. doi:10.1145/63334.63337
19
Principles and Experiences
ShaikhAli. A., Rana, O., Al-Ali, R., & Walker, Verma, K., Sivashanmugam, K., Sheth, A., Patil,
D. (2003). UDDIe: An extended registry for Web A., Oundhakar, S., & Miller, J. (n.d.). METEOR–S
services. In Proceedings of the Service Oriented WSDI: A scalable P2P infrastructure of registries
Computing: Models, Architectures, and Applica- for semantic publication and discovery of Web
tions, Orlando, FL. SAINT-2003 IEEE Computer services. Journal of Information Technology and
Society Press. Management.
Sun_Microsystems. (1999). JavaSpaces specifica- Zanikolas, S., & Sakellariou, R. (2005). A
tion revision 1.0. Retrieved from http://www.sun. taxonomy of grid monitoring systems. Future
com/jini/specs/js.ps Generation Computer Systems, 21(1), 163–188.
doi:10.1016/j.future.2004.07.002
Sycline. Sycline Inc. Retrieved from http://www.
synclineinc.com Ziegler, P., & Dittrich, K. (2004). Three decades
of data integration-all problems solved? In WCC,
Valduriez, P., & Pacitti, E. (2004). Data manage-
3-12.
ment in large-scale P2P systems. Int. Conf. on
High Performance Computing for Computational
Science (VecPar2004). ( [). Springer.]. LNCS,
3402, 109–122.
This work was previously published in Always-On Enterprise Information Systems for Business Continuance: Technologies
for Reliable and Scalable Operations, edited by Nijaz Bajgoric , pp. 58-77 , copyright 2010 by Information Science Reference
(an imprint of IGI Global).
20
21
Chapter 1.2
Evolution of Enterprise
Resource Planning
Ronald E. McGaughey
University of Central Arkansas, USA
Angappa Gunasekaran
University of Massachusetts—Dartmouth, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Evolution of Enterprise Resource Planning
tive, global economic environment. Countries like efficiency and effectiveness through integrat-
China and India are fast positioning themselves as ing, streamlining and improving fundamental
key players and threatening the economic order back-office business processes. Traditional ERP
that has existed for decades. Information Technol- systems were called back-office systems because
ogy (IT) is more sophisticated than ever, yet we they involved activities and processes in which
still struggle with how to best use it in business, the customer and general public were not typically
and on a personal level as well. E-commerce (B2B, involved, at least not directly. Functions supported
B2C, C2C, G2C, B2G) has become commonplace by ERP typically included accounting, manufac-
and M-commerce is not far behind, especially in turing, human resource management, purchasing,
Europe and Japan. In 2007, for the first time, there inventory management, inbound and outbound
are more cell phones than tethered phones in the logistics, marketing, finance and to some extent
US, and increasingly sophisticated cell phones engineering. The objective of traditional ERP
have capabilities that exceed the capabilities of systems in general was greater efficiency, and to
older PCs. This is the backdrop against which we a lesser extent effectiveness. Contemporary ERP
will discuss the evolving enterprise information systems have been designed to streamline and in-
system. At this point we will call it ERP, but is tegrate operation processes and information flows
should become evident in the course of reading within a company to promote synergy (Nikolo-
this manuscript that ERP is a label that may no poulos, Metaxiotis, Lekatis and Assimakopoulos,
longer be appropriate for evolving enterprise and 2003) and greater organizational effectiveness.
inter-enterprise systems. These newer ERP systems have moved beyond
In this chapter we define ERP and discuss the the back-office to support front-office processes
evolution of ERP, the current state of ERP and and activities like those fundamental to customer
the future of ERP. We will emphasize how the relationship management. The goal of most firms
evolution of ERP has been influenced by changing implementing ERP is to replace diverse functional
business needs and by evolving technology. We systems with a single integrated system that does
present a simple framework to explain that evolu- it all faster, better, and cheaper. Unfortunately, the
tion. Some general directions for future research “business and technology integration technology
are indicated by our look at the past, present and in a box” has not entirely met expectations (Koch,
particularly the future of ERP. 2005). While there are some success stories, many
companies devote significant resources to their
ERP effort only to find the payoff disappointing
erP deFIned (Dalal, Kamath, Kolarik and Sivaraman, 2003;
Koch, 2005). Let us examine how we have come
The ERP system is an information system that to this point in the ERP lifecycle.
integrates business processes with the aim of
creating value and reducing costs by making the
right information available to the right people at tHe evolutIon oF erP
the right time to help them make good decisions in
managing resources productively and proactively. The origin of ERP can be traced back to Materi-
An ERP is comprised of multi-module applica- als Requirement Planning (MRP). While the
tion software packages that serve and support concept of MRP was understood conceptually
multiple business functions (Sane, 2005). These and discussed in the 1960s, it was not practical
large automated cross functional systems were for commercial use. It was the availability of
designed to bring about improved operational computing power (processing capability and stor-
22
Evolution of Enterprise Resource Planning
age capacity) that made commercial use of MRP production schedule. Manpower planning and
possible and practical. While many early MRP support for human resources management were
systems were built in-house, often at great expense, incorporated into MRP. Distribution management
MRP became one of the first popular off-the-shelf capabilities were added. The enhanced MRP and
business applications (Orlicky, 1975). In essence, its many modules provided data useful in the fi-
MRP involves taking inventory records, the master nancial planning of manufacturing operations, thus
production schedule, and bills of materials and financial planning capabilities were added. Busi-
calculating time phased material, component ness needs, primarily for operational efficiency,
and sub-assembly requirements (gross and net), and to a lesser extent for greater effectiveness, and
planned orders, delivery dates, and more. Note the advancements in computer processing and storage
term calculating was used rather than forecasting. technology brought about MRP and influenced its
With a realistic MPS, accurate inventory records, evolution. What started as an efficiency oriented
lead times that are known and predictable, and tool for production and inventory management was
current and correct bills of materials, it is possible becoming increasingly a cross functional system.
to calculate material, component, and assembly A very important capability to evolve in MRP
requirements rather than forecast them. The shear systems was the ability to close the loop (control
volume of calculations necessary for MRP with loop). This was largely because of the develop-
multiple orders for even a few items made the use ment of real time (closed loop) MRP systems to
of computers essential. Initially, batch processing replace regenerative MRP systems in response to
systems were used and regenerative MRP systems changing business needs and improved computer
were the norm, where the plan would be updated technology—time-sharing was replacing batch
periodically, often weekly. MRP employed a type processing as the dominant computer processing
of backward scheduling wherein lead times were mode. With time-sharing mainframe systems
used to work backwards from a due date to an the MRP system could run 24/7 and update
order release date. While the primary objective continuously. Use of the corporate mainframe
of MRP was to compute material requirements, that performed other important computing task
the MRP system proved also to be a useful sched- for the organization was not practical for some
uling tool. Order placement and order delivery companies, because MRP consumed too many
were planned by the MRP system. Not only were system resources; subsequently, some companies
orders for materials and components generated opted to use mainframes (now growing smaller
by an MRP system, but also production orders and cheaper, but increasing in processing speed
for manufacturing operations that used those and storage capability) or mini-computers (could
materials and components to make higher level do more, faster than old mainframes) that could
items like sub assemblies and finished products. be dedicated to MRP. MRP could now respond
As MRP systems became popular and more and (update relevant records) to timely data fed into
more companies started using them, practitioners, the system and produced by the system. This
vendors and researchers started to realize that the closed the control loop with timely feedback
data and information produced by the MRP system for decision making by incorporating current
in the course of material requirements planning and data from the factory floor, warehouse, vendors,
production scheduling could be augmented with transportation companies, and other internal and
additional data and used for other purposes. One external sources, thus giving the MRP system the
of the earliest add-ons was the Capacity Require- capability to provide current (almost real-time)
ments Planning module which could be used in information for better planning and control. These
developing capacity plans to produce the master closed loop systems better reflected the realities
23
Evolution of Enterprise Resource Planning
of the production floor, logistics, inventory, and sophisticated back-office systems were more ap-
more. It was this transformation of MRP into a propriately labeled Enterprise Resource Planning
planning and control tool for manufacturing by systems (Nikolopoulos, Metaxiotis, Lekatis, and
closing the loop, along with all the additional Assimakopoulos, 2003).
modules that did more than plan materials—they MRP II was mostly for automating the busi-
planned and controlled various manufacturer re- ness processes within an organization, but ERP,
sources—that led to MRPII. Here too, improved while primarily for support of internal processes,
computer technology and the evolving business started to support processes that spanned enterprise
needs for more accurate and timely information boundaries (the extended enterprise). While ERP
to support decision making and greater organiza- systems originated to serve the information needs
tional effectiveness contributed to the evolution of manufacturing companies, their domain was not
from MRP to MRPII. just manufacturing anymore. Early ERP systems
The MRP in MRPII stands for Manufacturing typically ran on mainframes like their predeces-
Resource Planning rather than materials require- sors, MRP and MRPII, but many migrated to cli-
ments planning. The MRP system had evolved ent/server systems where networks were central
from a material requirements planning system and distributed databases more common. The
into a planning and control system for resources growth of ERP and the migration to client/server
in manufacturing operations—an enterprise systems really got a boost from the Y2K scare.
information system for manufacturing. As time Many companies were convinced of the need to
passed, MRPII systems became more widespread, replace older main-frame based systems, some
and more sophisticated, particularly when used in ERP and some not, with the newer client/server
manufacturing to support and complement com- architecture. After all, since they were going to
puter integrated manufacturing (CIM). Databases have to make so many changes in the old systems
started replacing traditional file systems allowing to make them Y2K compliant and avoid serious
for better systems integration and greater query problems—this was what vendors and consultants
capabilities to support decision makers, and the often told them to create FUD (fear, uncertainty
telecommunications network became an integral and doubt)--they might as well bite the bullet and
part of these systems in order to support commu- upgrade. Vendors and consultants benefited from
nications between and coordination among system the Y2K boost to ERP sales, as did some of their
components that were sometimes geographically customers. Since Y2K, ERP systems have evolved
distributed, but still within the company. In that rapidly, bringing us to the ERP systems of today.
context the label CIM II was used for a short time Present day ERP systems offer more and more
to describe early systems with capabilities now capabilities and are becoming more affordable,
associated with ERP (Lope, 1992). The need for even for SMEs (Dahlen and Elfsson, 1999).
greater efficiency and effectiveness in back-office
operations was not unique to manufacturing, but
was also common to non-manufacturing opera- erP todAy
tions. Companies in non-manufacturing sectors
such as healthcare, financial services, air trans- As ERP systems continue to evolve, vendors like
portation, and the consumer goods sector (Chung PeopleSoft (Conway, 2001) and Oracle (Green,
and Snyder, 2000) started to use MRPII-like 2003) are moving to an Internet-based architec-
systems to manage critical resources, thus the ture, in large part because of the ever-increasing
M for manufacturing seemed not always to be importance of E-commerce and the globalization
appropriate. In the early 90s, these increasingly of business (Abboud and Vara, 2007). Beyond
24
Evolution of Enterprise Resource Planning
25
Evolution of Enterprise Resource Planning
integration is now receiving much attention. services (also require global positioning systems)
Progressive companies desire to do things--all a reality, as well as a host of other capabilities
things--faster, better and cheaper (to be agile), we categorize as M-Business. One can expect to
and they want systems and tools that will improve see ERP geared more to the support of both E-
competitiveness, increase profits, and help them Commerce and M-Commerce. Internet, mobile,
not just to survive, but to prosper in a dynamic and wireless technology should figure prominently
global economy. Today, that means working with in new and improved system modules and capabili-
suppliers, customers and partners like never be- ties (Bhattacharjee, Greenbaum, Johnson, Martin,
fore. Vendors are using the latest technology to Reddy, Ryan, White and McKie, 2002; O’Brien,
respond to these evolving business needs, as 2002; Sane, 2005). Vendors and their customers
evidenced in the products and services they now will find it necessary to make fairly broad, sweep-
offer or plan to offer their customers. Will ERP ing infrastructure changes to meet the demands of
be the all-encompassing system comprised of the E-Commerce and M-Commerce (Bhattacharjee,
many modules and capabilities mentioned, or will Greenbaum, Johnson, Martin, Reddy, Ryan, White
it be relegated to the status of modules/function- and McKie, 2002; Higgins, 2005). Movement
ality in all-encompassing systems for the future? away from client-server systems to Internet based
architectures is likely. In fact, it has already started
(Scheer and Habermann, 2000; Conway, 2001;
erP And tHe Future Abboud and Vara, 2007). New systems will have
to incorporate existing and evolving standards and
New, multi-enterprise business models like Value older systems will have to be adapted to existing
Collaboration Networks, customer-centric net- and evolving standards, and that may make the
works that coordinate all players in the supply transition a little uncomfortable and expensive for
chain, are evolving as we enter the 21st century vendors and their customers. Perhaps the biggest
(Nattkemper, 2000). These new business models business challenge with E-Commerce, and even
reflect an increased business focus on external more so with M-Commerce, is understanding how
integration. While no one can really predict the to use these new and evolving capabilities to bet-
future of ERP very far into the future, current ter serve the customer, work with suppliers and
management concerns and emphasis, vendor other business partners, and to be generally more
plans, and the changing business and technological efficient and effective. Businesses are just begin-
environments, provide some clues about the future ning to understand E-Commerce and how it can
of ERP. We turn our attention now to evolving be used to meet changing business needs as well
business needs and technological changes that as how it changes them, and now M-Commerce
should shape the future of ERP. poses a whole new challenge. E-Commerce and
E-Commerce is arguably one of the most im- M-Commerce pose challenges for vendors and
portant developments in business in the last 50 for their clients. Back-office and front-office
years (Jack Welch reportedly called it the “Viagra processes and activities are being affected by E-
of business”), and M-Commerce is poised to takes Commerce/E-Business and will most certainly be
it place along side or within the rapidly growing affected by M-Commerce/M-Business.
area of E-Commerce. Internet technology has The current business emphasis on intra and
made E-Commerce in its many forms (B2B, B2C, inter organizational process integration and ex-
B2G, G2C, C2C, etc.) possible. Mobile and wire- ternal collaboration should remain a driving force
less technology are expected to make “always on” in the evolution of ERP in the foreseeable future.
Internet and “anytime/anywhere” location based Some businesses are attempting to transform
26
Evolution of Enterprise Resource Planning
themselves from traditional, vertically integrated partners or a value added service provider that
organizations into multi-enterprise, “recombinant coordinates the entire supply chain, and powered
entities” reliant on core-competency-based strate- by a single system serving all participants, could
gies (Genovese, Bond, Zrimsek and Frey, 2001). be the model for the future.
Integrated SCM and business networks will re- Regardless of the means used to achieve greater
ceive great emphasis, reinforcing the importance external integration to complement internal inte-
of IT support for cross enterprise collaboration and gration, the new focus on supporting/facilitating
inter-enterprise processes (Bhattacharjee, Green- inter-organizational processes will be important
baum, Johnson, Martin, Reddy, Ryan, White and to the future of ERP like systems, whatever they
McKie, 2002; Al-Mashari, 2002). Collaborative are called! Solution providers and consultants will
commerce (C-commerce) has become not only a strive to enable companies to communicate and
popular buzz word, but also a capability businesses collaborate with other entities that comprise the
desire/need. C-Commerce is label used to describe extended enterprise (Bhattacharjee, Greenbaum,
Internet-based (at least at present) electronic col- Johnson, Martin, Reddy, Ryan, White and McKie,
laboration among businesses, typically supply 2002; Knapen, 2007). Internet based technologies
chain partners, in support of inter-organizational will unquestionably be key in supporting cross-
processes that involve not necessarily transactions, enterprise ERP in the foreseeable future, and the
but rather information sharing and coordination ASP (also called SAAS—software as a service)
(Sane, 2005). ERP systems, or their successors model may just be the future of ERP in a busi-
will have to support the required interactions and ness world focused on supply chain management
processes among and within business entities, (Burns, 2007). Note that ASP solutions are gener-
and work with other systems/modules that do the ally less costly, and consequently, they reduce one
same. The back-office processes and activities particular component of financial risk—the cost
of business network partners will not exist in a of product obsolescence. It is noteworthy also that
vacuum--many will overlap. There will be great ASP (SAAS) solutions are moving ERP within
need for business processes to span organizational reach of SMEs, as it costs much less to “rent” than
boundaries (some do at present), possibly requir- to “buy.” The lower cost of ASPs makes them
ing a single shared inter-enterprise system that more attractive to SMEs, increasingly targeted
will do it (we might call it a distributed ERP), by vendors seeking new customers (Dahlen and
or at least ERP systems that can communicate Elfsson, 1999; Muscatello, Small and Chen, 2003,
with and co-process (share/divide processing Burns, 2007).
tasks) with other ERP systems—probably the Some expect Web services to play a prominent
most practical solution, at least in the near fu- role in the future of ERP (O’Brien, 2002; ACW
ture. Middleware, ASPs, and enterprise portal Team, 2004; Abboud and Vara, 2007). Web Ser-
technologies may play an important role in the vices range from simple to complex, and they can
integration of such modules and systems (Bhat- incorporate other Web services. The capability of
tacharjee, Greenbaum, Johnson, Martin, Reddy, Web Services to allow businesses to share data,
Ryan, White and McKie, 2002). Widespread applications, and processes across the Internet
adoption of a single ASP solution among supply (O’Brien, 2002) may result in ERP systems of
chain partners may facilitate interoperability as the future relying heavily on the Service Oriented
all supply chain partners essentially use the same Architecture (SOA), within which Web Services
system. Could one ASP database serve all supply are created and stored, providing the building
chain partners? Alternatively, a supply chain portal blocks for programs and systems. Web Service
(vertical portal), jointly owned by supply chain technology could put the focus where it belongs:
27
Evolution of Enterprise Resource Planning
on putting together the very best functional solu- So will it be single source, or best in breed?
tion to automate a business process (Bhattacharjee, The best in breed approach will be good if greater
Greenbaum, Johnson, Martin, Reddy, Ryan, White interoperability/integration among vendor prod-
and McKie, 2002). The use of “best in breed” Web ucts is achieved (Bhattacharjee, Greenbaum,
Service-based solutions might be more palatable to Johnson, Martin, Reddy, Ryan, White and McKie,
businesses, since it might be easier and less risky 2002). There is a need for greater “out of the box”
to plug-in a new Web Service based solution than interoperability, thus a need for standards. Ideally,
replace or add-on a new product module. A greater products will reach a level of standardization where
role for Web Services (the SOA) is expected, and software modules exhibit behavior similar to the
that too would heighten the importance of an plug and play hardware--you just plug in a new
Internet Based Architecture to the future of ERP module, the system recognizes it, configures itself
(Abboud and Vara, 2007; Burns, 2007). It should to accommodate the new module, and eureka, it
be noted that a Service Oriented Architecture is works! While this is much to hope for, increased
not incompatible with ASPs, and in fact it should standardization brought about by developments
make building, maintaining and providing ASP like the Service Oriented Architecture, and
products/services more efficient and effective. XML-based XBRL, might make interoperability
All from one, or best in breed? Reliance on a a reality, though probably not anytime soon. The
single vendor would seem best from a vendor’s fact that some are embracing standards for XML
perspective, but it may not be best from the client’s (Garbellotto, 2007) and more, does provide some
standpoint. While it may be advantageous to have reason for hope, but whether the future of ERP
only one proprietary product to install and operate, software trends toward the single source or best
and a single contact point for problems, there are in breed approach remains to be seen. Regardless
risks inherent in this approach. Switching cost of the direction, integration technologies will be
can be substantial, and if a single vendor does not important in the new breed of modular, but linked
offer a module/solution needed by the client, then enterprise applications.
the client must develop it internally, do without it, Data warehouses, data mining, and various
or purchase it from another vendor. The market analytic capabilities are needed in support of
is in fact changing in some ways because of this front office and back office processes and activi-
situation. The market was about what a product ties involved in CRM, SRM, SCM, Field Service
would do, but it is evolving such that now the Management, business collaboration and more.
focus is on what the product will do in the future Likewise they are important in business intelli-
(Maguire, 2006). Potential customers are “thinking gence (the process and BI systems) and strategic
ahead” and seem better to understand the future management. An important trend at present is
consequences of today’s system choice. Still, it is merging ERP and CRM with BI (Burns, 2007).
not uncommon for a client to be faced with trying Data warehouses will play an important role in
to get diverse products to work together, and the the future of ERP, because they will require data
problems of doing so are well documented. The from ERP and provide data to support decision
single source approach means an organization making in the context of ERP—ERP the process.
must place great faith in the vendor, and with the Ideally, the Data warehouse would be integrated
consolidation and changes taking place among with all front-office, back-office and strategic
enterprise solution providers, that can be risky. systems to the extent that it helps close loops by
Never the less, the “one source” alternative seems providing accurate and timely data to support deci-
most popular at present (Burns, 2007). sion making in any context, in the form of on-line
28
Evolution of Enterprise Resource Planning
analytical processing. Knowledge management Internet (O’Brien, 2002). Back-office systems will
systems (KMS) endowed with neural networks not be unimportant, but they are more mature as
and expert system capabilities should play a key a consequence of past emphasis and many work
role in decision making as they will be capable quite well. Emphasis will be on more thorough
of capturing, modeling and automating decision integration of the modules that comprise back-
making processes. Data warehouses and KMS office systems, integration of back-office systems
should enable future ERP systems to support with front-office and strategic systems, and inte-
more automated business decision making (Bhat- gration of front-office, back-office and strategic
tacharjee, Greenbaum, Johnson, Martin, Reddy, systems with the systems of other organizations,
Ryan, White and McKie, 2002) and they should especially within the context of the supply chain
be helpful in the complex decision making needed (Knapen, 2007). At present greater organizational
in the context of fully integrated supply chain effectiveness in managing the entire supply chain
management. More automated decision making in all the way to the end customer is a priority in
both front-office and back-office systems, should business. The greater emphasis on front-office
eliminate/minimize human variability and error, functions and cross enterprise communications
greatly increase decision speed, and hopefully and collaboration via the Internet simply reflects
improve decision quality. Business Intelligence changing business needs and priorities. A 2004
(BI) tools, which are experiencing a significant ITtoolbox survey of ERP users in Europe, North
growth in popularity, take internal and external America, Asia, India and elsewhere showed
data and transform it into information used in great interest in improved functionality and ease
building knowledge that helps decision makers of integration and implementation (top motives
to make more “informed” decisions—no pun for adding new modules or purchasing new ERP
intended. Current Business Intelligence (BI) tools systems). Furthermore the same survey showed
are largely designed to support strategic planning greatest interest in modules for CRM, Data Ware-
and control but will likely trickle down to lower housing and SCM (top 3 on list). The demand for
level decision makers, where their capabilities will specific modules/capabilities in particular shows
be put to use in tactical and perhaps operational that businesses are looking beyond the enterprise.
decision contexts. BI tools use data, typically This external focus is encouraging vendors to
from a data warehouse, along with data mining, seize the moment by responding with the mod-
analytic, statistical, query, reporting, forecast- ules/systems that meet evolving business needs.
ing and decision support capabilities to support The need to focus not just on new front office
managerial planning and control. The combined tools but also on strategy will encourage greater
capabilities of the data warehouse, KMS and BI vendor emphasis on tools like Data Warehouses
should contribute to faster, better, and less costly and capabilities like Business Intelligence that
(in terms of time and effort involved) decisions at support strategy development, implementation
all organizational levels. They should be helpful and control. A CAMagazine enterprise software
in making decisions in the inter-organizational survey showed that still in 2007, vendors remain
context of supply chain management, where com- focused on providing support for BI and strategic
plexity is increased by the need make decisions planning and control (Burns, 2007).
involving multiple supply chain partners. The evolving environment of business suggests
At least in the near future, it appears that a direction for these comprehensive enterprise
greater emphasis will be placed on front-office systems that would seem to make ERP an inap-
systems, as opposed to back office systems, and propriate label. The Garner group coined the term
sharing data, applications and processes across the ERPII to describe their vision of the enterprise
29
Evolution of Enterprise Resource Planning
system of the future with increased focus on the necessary for competitive reasons, systems have
front office, strategy, and the internet. ERPII was evolved to meet those needs. One can hardly ignore
described as a business strategy and a set of collab- the technological changes that have taken place,
orative operational and financial processes inter- because the current state of technology is a limiting
nally and beyond the enterprise (Zrimsek, 2002). factor in the design of systems to meet evolving
The Gartner Group projected that by 2005 ERPII business needs. From our examination of the evolu-
would replace ERP as the key enabler of internal tion of ERP we would conclude that the next stage
and inter-enterprise efficiency (Zrimsek, 2002). of the evolution will come about and be shaped by
While not there yet, the systems they described the same forces that have shaped each stage, that
are evolving, but the ERPII label was lost! The being evolving business needs and advances in
name that seems to have stuck, at least for now, is technology. We expect ERP (the traditional back
Enterprise Information Systems, or just Enterprise office system) to take its place along with MRP and
Systems. Wikipedia (2007) describes Enterprise MRPII. The functions of ERP will remain impor-
Information Systems as technology platforms that tant and necessary, as have the functions of MRP
“enable organizations to integrate and coordinate and MRPII, but ERP will likely be absorbed by
their business processes. They provide a single something bigger, and ERP itself will take its place
system that is central to the organization and as an integral part of the Internet based enterprise
ensure that information can be shared across all or inter-enterprise system of the future. Whether
functional levels and management hierarchies. that all encompassing system is called Enterprise
Enterprise systems are invaluable in eliminating resource planning, Enterprise suite, Enterprise
the problem of information fragmentation caused Information System, or by a label that currently
by multiple information systems in an organiza- resides in the back of some vendor employee or
tion, by creating a standard data structure.” researchers mind, remains to be seen. One thing
While the ERP label may linger for a while, seems certain, the next stage in the evolution will
ERP will likely be relegated to module(s)/capabil- hinge on the same forces shaping systems of the
ity status, as a name more fitting for the evolving past—business need and technological change.
integrated, inter-enterprise, front office- back of-
fice, strategic systems will replace ERP, in much
the same way that ERP replaced MRPII. conclusIon
30
Evolution of Enterprise Resource Planning
business networks. Whatever the name, current to remain a priority. An environment for busi-
trends suggest certain characteristics which we ness applications much like the “plug and play”
can reasonably expect. This future system will environment for hardware would make it easier
have to support E-commerce and M-commerce, for organizations to integrate their own systems
thus wireless technology, including mobile but not and have their systems integrated with other or-
limited to mobile, and the internet will play a role ganizations’ systems. Such an environment awaits
in the evolving architecture. An Internet-based greater standardization. This ideal “plug and play”
architecture now seems most likely, at least in environment would make it easier for firms to opt
the near future, and it may be a Service Oriented for a “best in breed” strategy for application/mod-
Architecture wherein Web Services are key. The ule acquisition as opposed to reliance on a single
increased emphasis on front-office systems and vendor for a complete package of front-office,
strategic planning and control will likely influ- back-office and strategic systems. At present it
ence new capabilities introduced by vendors for seems that selecting a single vendor is preferred
the next few years. Increased automation of deci- (Burns, 2007). Future developments in computer
sion making is to be expected with contributions (hardware and software) and telecommunications
from Knowledge Management Systems, Data technology will move us closer to effective inter-
Warehouses/Data Marts, and Business Intelligence organizational system integration and make fully
systems fueled by advancements in the field of integrated supply chain management a reality.
artificial intelligence. Greater interoperability of Perhaps we might call the evolving system an
diverse systems and more thorough integration Interprise Resource Planning System, Interprise
within and between enterprise systems is likely Management System, or Interprise Information
31
Evolution of Enterprise Resource Planning
System to emphasize the inter-enterprise nature • Solution vendors embrace standards like
of these systems. Whatever they are called, it XML, the Service Oriented Architecture,
seems that what will be required of them goes and evolving wireless standards with
far beyond what the enterprise resource planning due consideration to global business
(ERP) label would aptly describe, even with the requirements;
“II” (ERPII) added!
From the discussion of ERP’s future one can For researchers and practitioners the advice
extrapolate certain desired capabilities of the in- is simple. The two primary drivers in the evolu-
terprise/enterprise system of the future. Following tion from MRP, to MRPII, to ERP, to ERPII,
is a list of desired/required capabilities: to Enterprise Systems were business need and
technological change. Technological change
• Supports interaction of supply chain part- made possible the development of systems to
ners and inter-organizational processes; meet changing business needs. The needs may
• A single corporate database to facilitate exist for a while before the technology can help
true functional system/module integration; meet them, and the technology can exists for a
• At some point in time, possibly an inter- while before someone recognizes its usefulness
organizational database to integrate supply in meeting a current or evolving business need.
chain partners--maybe supplied by an ASP In either case, the focus should be on monitoring
or some other entity that supports the entire business needs and monitoring technological
supply chain; change. Research that does both and is geared
• Any necessary data transfer among/integra- towards bringing the two together could make
tion of modules is smooth and consistent; significant contributions to business. The ERP
• Possesses flexibility to continuously sup- system of the future, whatever it may be called,
port agile companies responding to dy- will be found at the convergence of business need
namic business environment; and technological change.
• Employs a fluid yet robust architecture re-
flective of evolving enterprise models and
evolving technology like mobile wireless; reFerences
• Utilizes database and data warehouse mod-
els/solutions to support transaction inten- Abboud, L., & Vara, V. (2007, January 23). SAP
sive applications (front office and back of- Trails Nimble Start-Ups As Software Market
fice), query intensive applications, OLAP, Matures. Wall Street Journal, C1.
and any other necessary internal and/or ex- Al-Mashari, M. (2002). Enterprise resource plan-
ternal interaction with the database or data ning (ERP) systems: A research agenda. Industrial
warehouse; Management & Data Systems, 102(3), 165–170.
• Enterprise systems take into account doi:10.1108/02635570210421354
partnering enterprise characteristics like
culture, language, technology level, stan- Arinze, B., & Anandarajan, M. (2003). A frame-
dards, information flows, and provide flex- work for using OO mapping methods to rapidly
ibility to adapt as partnering relationship configure ERP systems. Association for Comput-
changes; ing Machinery. Communications of the ACM,
• Solution vendors form global alliances 46(2), 61. doi:10.1145/606272.606274
with other vendors to better meet needs of
clients in any country;
32
Evolution of Enterprise Resource Planning
Bhattacharjee, D., Greenbaum, J., Johnson, R., Green, J. (2003). Responding to the challenge. Ca-
Martin, M., Reddy, R., & Ryan, H. L. (2002)... nadian Transportation Logistics, 106(8), 20–21.
Intelligent Enterprise, 5(6), 28–33.
Higgins, K. (2005, May 23). ERP Goes On The
Burns, M. (2007, September). Work in process: Road. Information Week, 1040, 52–53.
Enterprise software survey 2007. CAMagazine,
ITtoolbox ERP Implementation Survey.
18-20.
(2004). Retrieved July 7, 2005, from http://
Chung, S., & Snyder, C. (2000). ERP adoption: A supplychain.ittoolbox.com/research/survey.
technological evolution approach. International asp?survey=corioerp_survey&p=2
Journal of Agile Management Systems, 2(1),
Knapen, J. (2007, May 14). SAP Sees Growth
24–32. doi:10.1108/14654650010312570
Ahead. The Wall Street Journal Online, http://on-
Conway, C. (2001). Top 20 Visionaries. [VARbusi- line.wsj.article_print/SB1179166926818022214.
ness: Manhassett.]. Comments of Craig Conway, html accessed 11 November 2007.
1724, 35.
Koch, C. (2004). Koch’s IT Strategy: The ERP
Dahlen, C., & Elfsson, J. (1999). An analysis Pickle. Retrieved June 16, 2005, from http://www.
of the current and future ERP market. Master’s cio.com/blog_view.html?CID=935
Thesis, Industrial Economics and Management.
Kremers, M., & Dissel, H. V. (2000). ERP system
The Royal Institute of Technology, Stockholm,
migrations. Association for Computing Machin-
Sweden.
ery. Communications of the ACM, 43(4), 52–56.
Dalal, N. P., Kamath, M., Kolarik, W. J., & doi:10.1145/332051.332072
Sivaraman, E. (2004). Toward an Integrated
Kumar, K., & Hillegersberg, J. V. (2000). ERP
Framework for Modeling Enterprise Resources.
experiences and evolution. Association for Com-
Communications of the ACM, 47(3), 83–87.
puting Machinery. Communications of the ACM,
doi:10.1145/971617.971620
43(4), 22–26. doi:10.1145/332051.332063
Davison, R. (2002). Cultural complications
Lee, J., Siau, K., & Hong, S. (2003). Enterprise
of ERP. Association for Computing Machin-
integration with ERP and EAI. Association for
ery. Communications of the ACM, 45(7), 109.
Computing Machinery. Communications of the
doi:10.1145/514236.514267
ACM, 46(2), 54. doi:10.1145/606272.606273
Enterprise Information Systems. A definition
Letzing, J. (2007, April 25). Big Rivals Move
from Wikipedia.com http://en.wikipedia.org/
In on Salesforce.com’s Turf. The Wall Street
wiki/Enterprise_information_systems, accessed
Journal, B3G.
20 November 2007.
Lope, P. F. (1992). CIMII: the integrated manufac-
Garbellotto, G. (2007, October). The Data Ware-
turing enterprise. Industrial Engineering (Ameri-
housing Disconnect. Strategic Finance, 59-61.
can Institute of Industrial Engineers), 24, 43–45.
Genovese, Y., Bond, B. A., Zrimsek, B., & Frey,
Markus, M. L., Tanis, C., & van Fenema,
N. (2001). The Transition to ERP II: Meet-
P. C. (2000). Multisite ERP implementa-
ing the Challenges. http://www.gartner.com/
tions. Association for Computing Machinery.
DisplayDocument?doc_dc=101237, accessed
Communications of the ACM, 43(4), 42–46.
on 7 July 2005.
doi:10.1145/332051.332068
33
Evolution of Enterprise Resource Planning
Muscatello, J., Small, M., & Chen, I. (2003). Scheer, A.-W., & Habermann, F. (2000). Mak-
Implementing enterprise resource planning ing ERP a Success. Association for Computing
(ERP) systems in small and midsize manufactur- Machinery. Communications of the ACM, 43(4),
ing firms. International Journal of Operations 57–61. doi:10.1145/332051.332073
& Production Management, 23(8), 850–871.
Soh, C., Kien, S. S., & Yap, J. T. (2000). Cul-
doi:10.1108/01443570310486329
tural fits and misfits: Is ERP a universal solu-
Nattkemper, J. (2000). An ERP evolution. HP tion. Association for Computing Machinery.
Professional, 14(8), 12–15. Communications of the ACM, 43(4), 47–51.
doi:10.1145/332051.332070
Nikolopoulos, K., Metaxiotis, K., Lekatis, N., &
Assimakopoulos, V. (2003). Integrating industrial ACW Team (2004, August 23). SSA Global
maintenance strategy into ERP. Industrial Man- releases converged ERP with manufacturing
agement & Data Systems, 103(3/4), 184–192. capabilities. Asia Computer Weekly, 1.
doi:10.1108/02635570310465661
Willcocks, L. P., & Stykes, R. (2000). The role of
O’Brien, J. M. (2002). J.D. Edwards follows 5 with the CIO and IT function in ERP. Association for
ERP upgrade. Computer Dealer News, 18(12), 11. Computing Machinery. Communications of the
ACM, 43(4), 32–38. doi:10.1145/332051.332065
Sane, V. (2005). Enterprise Resource Planning
Overview. Ezine articles. Retrieved July 2, Zrimsek, B. (2002). ERPII: The Boxed Set. Re-
2005, from http://ezinearticles.com/?Enterprise- trieved July 7, 2005, from http://www.gartner.
Resource-Planning-Overview&id=37656 com/pages/story.php.id.2376.s.8.jsp
This work was previously published in Global Implications of Modern Enterprise Information Systems: Technologies and Applica-
tions, edited by Angappa Gunasekaran, pp. 17-31, copyright 2009 by Information Science Reference (an imprint of IGI Global).
34
35
Chapter 1.3
Exploring Enterprise
Information Systems
Malihe Tabatabaie
University of York, UK
Richard Paige
University of York, UK
Chris Kimble
Euromed Marseille École de Management, France
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Exploring Enterprise Information Systems
transactions, to advertise, etc. In order to under- • The increasing rate of organisational and
stand the effect of organisational and enterprise social change.
changes on use of IT, we start by defining the
nature of an organisation. The current literature By investigating the validity of this assumption,
defines that an organisation is thus about a group and the importance of these factors, this chapter
of elements (human, automated system, structure, aims to contribute a better understanding of Enter-
policy etc) that are arranged in a specific manner prise Information Systems (EIS), their dimensions,
to accomplish a particular purpose (Buck, 2000; their boundaries, and the challenges that arise in
Laudon & Laudon, 2007; Terry, 1975). This defi- their construction and development.
nition applies to small, medium, and large-scale As part of this investigation, and as a result of
organisations. the analysis of the literature that commences in
As we said earlier, a large-scale organisation can the next section, we propose one key challenge
sometimes be designated by the word enterprise. for understanding and building EIS:
However, we find it helpful to be more precise in
defining enterprise; in our view, an enterprise is a • Understanding diverse and volatile stake-
large-scale organisation that is involved in, and must holder requirements.
orchestrate, more than one independent business
processes. We come to this definition by observing To aid in understanding these constructs,
that many organisations, such as small IT houses, we propose the use of goal-oriented modelling
engage in a single business process. Identically techniques; this is discussed in the last section
some large organisations, such as online retailers, of this chapter.
have a single business process. Organisations that The rest of the chapter is organised as follow:
have many different business processes, that must be The background section outlines the challenges
coordinated in some way, such as Mitsubishi, have in large-scale organisations as a motivation for
different requirements and different characteristics. discussing the systems that can address these
Such organisations are often very large scale (e.g., challenges. A specific instance of large-scale
public health organisations) and multi-national. In organisations is an enterprise; hence, section 2
our view, the need to coordinate different business also discusses the requirements of IT systems for
processes is a key characteristic in distinguishing enterprises. One of the main difficulties in this
an enterprise from another organisation. area is the imprecise definition for EIS, and how
This paper investigates the validity of an as- an EIS differs from a general purpose IT system.
sumption regarding the root of complexity of IT Hence, we provide a working definition for EIS
systems in complex organisations, where the IT in this section.
systems support business processes directly. The The Enterprise Information System section
assumption is that complexity is due to the fol- describes EIS in more detail by discussing state-
lowing factors: of-the-art definitions and effective elements, such
as business and organisation, based on a literature
• Increasing size of IT systems and the or- review. The future trend section describes goal-
ganisation itself; oriented modelling techniques as a promising
• The interactions between different IT approach for attacking one of the main challenges
systems; of building an EIS by making the system more
• The involvement of many different or- clear for its stakeholders. Section 4 also provides
ganisations in the constructions and use of an example to clarify this idea.
these IT systems; and,
36
Exploring Enterprise Information Systems
37
Exploring Enterprise Information Systems
38
Exploring Enterprise Information Systems
39
Exploring Enterprise Information Systems
understanding of enterprise systems is critical to tion should be visible. This security policy does
succeed in today’s competitive and ever changing not have any contrast with the idea of enterprise
world (Jessup & Valacich, 2006). processes, which their goal is to let the informa-
A good definition for EIS introduced it as a tion flow seamlessly.
software system with the specific ability to inte- Moreover, (Strong & Volkoff, 2004, p. 22)
grate other software systems of an organisation. defines an ES as a system which its task is to
support and “integrate a full range of business
Enterprise systems integrate the key business processes, uniting functional islands and mak-
processes of a firm into a single software system ing their data visible across the organization in
so that information can flow seamlessly through real time”. This definition adds to the previous
the organization, improve coordination, efficiency, definition, the fact that the data and information
and decision making. Enterprise software is based entailed by the system should be understandable
on a suite of integrated software modules and by all its business processes.
a common central database. The database col- Another definition for enterprise systems is
lects data from and feeds the data into numerous based on legacy systems; a legacy system is an
applications that can support nearly all of an existing computer system or application program,
organization’s internal business activities. When which continues to be used because the company
new information is entered by one process, the does not want to replace or redesign it (Robertson,
information is made available immediately to other 1997). Most established companies, who have been
business processes. Organization, which imple- using a system for long time, are in this group.
ments enterprise software, would have to adopt Legacy systems mainly suffer from deficiency of
the business processes embedded in the software documentation, slow hardware and difficulties in
and, if necessary, change their business processes improvement, maintenance and expansion. How-
to conform to those in the software. Enterprise ever, there is evidence that overtime EIS replaces
systems support organizational centralization by the stand alone applications and the functionality
enforcing uniform data standards and business of legacy systems (Strong & Volkoff, 2004). In
processes throughout the company and a single contrast to enterprise systems, legacy systems are
unified technology platform. (Laudon & Laudon, not designed to communicate with other applications
2007, p. 382) beyond departmental boundaries (Jessup & Valacich,
2006) even if middleware offers a potential solution
This definition seems very specific on what is to adapt the novel parts with the legacy system.
an EIS; however, there are points that are ignored Nevertheless, regarding the price of developing a
by this definition. For example, the argument that middleware, the following question comes to mind:
mentioned when new information is entered by can middleware alone solve the problem of integrat-
one process, the information is made available ing new subsystems with a legacy system?
immediately to all other business processes. How- In short, the common idea in the existing
ever, it can be argued that the information should definitions illustrates that an EIS is about various
be available to the other processes depending on businesses, business processes, organisations,
their access domain. By this, we mean the level information systems, and information that circu-
of access to the information should be different lates across the enterprise. In other words, EIS is
from process to process. It is not reasonable to about the businesses model in the organisation.
expose information to the processes, which do not Therefore, the two main elements of EIS are
require it. Therefore, based on the access level of organisation and business. The two following
processes, only the suitable and updated informa- sections cover these points.
40
Exploring Enterprise Information Systems
The EIS definitions that we extracted from the All the above goals focus on increasing the
literature linked the EIS to organisations (Laudon market demands for products or services.
& Laudon, 2007; Strong & Volkoff, 2004) or Examples of not for the profit organisations
large companies (Jessup & Valacich, 2006) and could be charities, mutual societies, etc, which
we assume that in both cases the definitions refer provide some services for the society. The cus-
to the same concept: organisation. Based on this tomers are also the member of the mutual society;
assumption, it is vital to review the different types therefore, they are the owner of the business. The
of organisations that can influence the different value for money rule exists in this group too. The
types of EIS. Therefore, this section discusses usual way to evaluate the success of this group of
categorise of organisations based on their goals. organisations is to measure how well they achieve
Elizabeth Buck categorises organisations in three their goals considering the available resources.
groups (Buck, 2000): Table 1 illustrates some of the characteristics of
organisations that were described; it also sum-
• Public Organisations marises the different type of organisations.
• Private Organisations By understanding the categories of organisa-
• Not for Profit Organisations tions, we can focus on understanding their goals.
By knowing the goals of organisations we can
The public organisations include central or design and develop an EIS that satisfy the defined
local government, where elected members (e.g., requirements and goals; but there are other ques-
minister) will decide on the goals of organisations, tions in this area: what are the EIS’ goals? Are
and may influence how goals are achieved. The aim the goals of EIS similar to the goals of organisa-
of this type of organisation is to supply services to tions? It seems that EIS’ goals could be a sub set
or for the public, considering a ‘value for money’ of the organisations’ goals. When the EIS’ goals
rule. Examples of this type of organisation can get closer to the goals of organisations it could
be health service, prison, police, social security, become a better EIS. The final and optimistic goal
environmental protection, the armed forces, etc. for an EIS is to improve the goals of the organisa-
Individuals or other private organisations tion it services. However, defining the goals of
own private sectors organisations. This group of an EIS is the path for analysing and developing
organisations can have the following goals: the organisation’s business model and thus the
next section will explore the role of business in
• Satisfy their customer the definition of EIS.
• Satisfy their staff
41
Exploring Enterprise Information Systems
42
Exploring Enterprise Information Systems
Figure 1 illustrates the general structure of a ies (Jessup & Valacich, 2006); hence the concept
business model where the business model includes of EIS has grown to fill this gap.
business processes and business functions. Busi- In short, the common idea in existing defini-
ness processes are “a set of logically related tasks tions illustrates that an EIS amalgamates concerns
performed to achieve a defined business outcome” from various businesses, business processes,
(Davenport & Short, 1990, p. 100). For example, organisations, information systems, and informa-
in the case of BMW, the business processes is put- tion that circulate across an enterprise. In other
ting new orders for part suppliers. When there is a words, it is about the business models of the
new demand for specific car (e.g. model Z5), this organisation. However, a definition for EIS that
new market request creates a business event that just emphasises the financial profit side of busi-
triggers a set of business processes such as increas- nesses for organisations is out of date. In the next
ing the amount of resources for producing the Z5 section, a definition that considers other aspect
(e.g. BP2 in Figure 1), and putting new orders for of organisations, the domain and objectives of
parts suppliers. Each of these business processes is EIS is proposed.
subdivided into different business functions (e.g.
BF2 and BF3 in Figure 1). Examples include the enterprise Information
functions required for inputting new orders such system definition
as checking the parts suppliers’ ability for new
demands, organising the time that is needed for This section proposes a definition for EIS, which
each part to arrive to assembly line, etc. is the result of our analysis of the state-of-the-art
According to (Kaisler, Armoiur, & Valivullah, definitions and of industrial case studies. The defi-
2005, p. 2) “business processes must be modelled nition that considers business and organisational
and aligned across the function, data and infor- aspects of EIS is as follow:
mation systems that implement the processes”. An Enterprise Information System is a software
Therefore, the term business function in our re- system that integrates the business processes of
search refers to the functionality that is required organisation(s) to improve their functioning.
for implementing a business process. Figure 1 is Integration of business processes plays an
a simple explanation for business process model. important role in this definition. Integration could
Each of these business functions can trigger a busi- be accomplished by providing standards for data
ness process too. Moreover, the business processes and business processes. These standards will be
can breakdown to other business processes, which applied to various part of the system such as a
is not shown in this diagram to keep it simple to database or clusters of databases. As the result
understand. The aim of this diagram is mainly of such integration, information may flow seam-
to explain business processes and functions in a lessly.
general business model. Another point in this definition is the software
Understanding business models is helpful for characteristics of EIS. At this stage, we consider
developing EIS because their role is to integrate EIS as a type of Information System; therefore,
a full range of business processes (Strong & this software system includes both humans and
Volkoff, 2004). Before defining the concept of hardware.
EIS, Legacy systems were the type of systems The next term, used in the definition is organisa-
that were developed to handle the requirements of tion. Different types of organisations are discussed
organisations (Robertson, 1997). However, legacy earlier in this chapter. Organisations may include
systems are not designed to communicate with an organisation with its partners, or a group of
other applications beyond departmental boundar- organisations. Table 2 refines the above definition
43
Exploring Enterprise Information Systems
and describes what we propose as the objectives, concern about where the data is and what are the
goals, domain, and challenges of EIS. various resources. As can be seen in this figure,
In addition, Figure 2 describes the definition the bigger rectangle describes the boundaries of
of EIS graphically. Note that BP in this figure are EIS, which is flexible.
business processes. As it can be seen in this figure, The two following sections aim at continu-
each organisation contains various business pro- ing the discussion about EIS by presenting some
cesses. Moreover, in Figure 2, the database could examples in this area. The results of reviewing
be a cluster of databases; however, it is highly these examples lead to a better clarification of
likely that there would be a single interface to what is an EIS and what is not.
exchange data with the database without having a
44
Exploring Enterprise Information Systems
The review of the industrial cases of what might As we were discussing the public, private, and
be considered as an EIS moves our discussion governmental examples for an EIS, the next
toward the example of Mitsubishi. As was men- step is introducing some examples of Informa-
tioned earlier, Mitsubishi with more than 400 tion Systems that are not EIS according to our
companies all around the word is an example of definition.
enterprises (Mitsubishi, 2007). Thirty top-level eBay is one of the well known international
managers manage all the individual Mitsubishi’s Information Systems that focuses in the auction
companies. This does not mean that each company industry. This online market which involves
does not have enough freedom to make their own around 147 million people (Gopalkrishnan &
decisions; it means that this group of thirty manag- Gupta, 2007) provides a platform for individuals
ers will make some of the top-level decisions and or companies to trade their products or services;
they provide the high-level standards that all these but it does not connect the business processes of
companies should consider. In this case, if there is organisations together. Therefore, according to
a computer based system that links various parts our definition, an EIS connects different busi-
of the Mitsubishi organisation (including high- ness processes of organisations or departments
level managers) together and makes information of organisation together to make the information
flow seamlessly between them, then we view this flow seamlessly and thus it seems that based on
system as an EIS. Developing such a system is this characteristic of EIS, eBay is not an EIS. The
a large and complex problem; hence, there is a information system is the element that processes
need for powerful, reusable solutions to develop data and put them online, there is no evidence of
this type of system in a manner that can benefit connection between business processes because
all of the enterprise. it is not a requirement in this Information System.
Another example in this area is the infrastruc- The same argument can be followed in the case of
ture being developed to support the National Amazon, therefore even though it is large-scale
Health Service (NHS) in the United Kingdom and international online shop but it is not an EIS.
where the information systems being developed
to support management of patients’ records and conclusion
prescriptions can be considered as an EIS, because
such IT infrastructure aims to connect independent In short, this section described EIS in more detail
departments within and outside of the NHS. While by providing the definition for EIS. Defining any
we are looking at the NHS, which is a public sec- kind of system is essential for defining its domain
tor organisation, we can raise e-Government as and objectives. Without this basic information,
another example of public sector organisation that the researches on the similar area will not be
may be supported by and hence benefit from, EIS consistent. However, there is no claim that the
infrastructure because it connects various govern- given definition is the only definition for EIS.
mental organisations or departments together to let This definition is based on our studies, observa-
information flow seamlessly between them. tions, interviews, and comparisons on the current
theoretical and practical definitions and case
studies. Part of this ongoing work is presented
in this chapter.
45
Exploring Enterprise Information Systems
To make the results of our study on the defini- sweerde, 2004). Goals are also used in the safety
tion of EIS more clear, two examples are discussed and security research community – for example,
in this section. The earlier examples describe the to present safety cases and safety arguments (T.
case that can be an EIS and the case that cannot Kelly, 2004; T. Kelly & Weaver, 2004) - and in
be an EIS. This categorisation is based on this software assessment (Weiss, Bennett, Payseur,
chapter’s criteria, which is discussed in the given Tendick, & Zhang, 2002).
definition. Hence, each of these cases could be the Kelly (1998) defined a goal as ‘requirements
objective for more discussions on the possibility of statement’, Lamsweerde (2003) used goals as
being an EIS or not. Considering different point of criteria for deriving software architecture. Kim
views and the context of arguments, one Informa- et al (2006) defined goal model from (Axel van
tion System can be an EIS or not. Therefore, it is Lamsweerde, 2003) point of view as a criteria for
crucial to consider the writers’ point of view and designing the architecture for systems; therefore,
given definition, in the preceding examples. the aim of software architect is to implement a
After discussing what can be an EIS, the next system based on the architecture to accomplish
section will focus on an approach for developing goals (Kim, Park, & Sugumaran, 2006). Logically
this type of system. goals are the motivation for developing a system;
therefore, all the stakeholders should have a clear
understanding about the goals of the system. In
Future trends addition, the goals of the system should be realisti-
cally defined before continuing any other step of
Goal-based and goal-oriented thinking is used the development. There are attempts to show the
to plan for the future or to solve problems (Kim, goals in graphical notations such as GSN (Timothy
Park, & Sugumaran, 2006). The concept of us- Patrick Kelly, 1998), Kaos (Axel van Lamsweerde,
ing goal-oriented techniques has been proposed 2001), and (Kim, Park, & Sugumaran, 2006).
as one possible way to manage some of the dif- Moreover, Kaos defines the formal textual notation
ficulties associated with developing large-scale to describe the goals in addition to informal text.
complex systems (Kavakli, Loucopoulos, & This attempt is respectful because it considers the
Filippidou, 1996), particularly the challenge of larger group of audience to understand and benefit
clearly identifying and specifying requirements. from the goal model.
As we discussed in the previous section, an EIS Different stakehold ers require different forms
is an instance of large-scale complex system. This of presentation for their goals. For example, the
section promotes the idea of using goal-oriented high-level manager may not require seeing a for-
modelling techniques for developing EIS by mal explanation of the goals because they may not
briefly discussing them and their roles in defin- understand it; however, they can better understand
ing EIS system requirements. We will summarise an informal explanation in a simple diagram. On
our discussion on goal-oriented techniques by the other hand, there is a good possibility that a
presenting an example of goal graph. programmer’s team, requires the formal expla-
nation for the goals in detail to understand and
Goal oriented techniques implement the system in the correct and expected
way. It is important to bear in mind that goal dia-
Goal oriented techniques have been widely dis- grams are aimed at making the system more clear
cussed in the requirement engineering domain to different stakeholders, therefore goal-oriented
(T. P. Kelly, McDermid, Murdoch, & Wilson, ideas should prevent adding more confusions for
1998; Axel van Lamsweerde, 2001; A. V. Lam- different stakeholders. Any approach that makes
46
Exploring Enterprise Information Systems
the goals of the system more clear for stakehold- unit for representing software behaviour, which
ers should be considered; it can be different goal can be observed at runtime and has a start and
models for different stakeholders. end point of execution”. This paper also argues
The next section explains an approach for de- that most methods in the class diagram can be
signing a goal model. This approach is very high action, but because the runtime of actions should
level without explaining the details. The aim is be observable, the size of the action should be
to introduce a possible approach for developing restricted in a manner that makes it possible to
a goal model to readers. This approach benefits be observed in the software model.
from the information in similar studies in this The issues in this case are the challenges and
area such as (Timothy Patrick Kelly, 1998; Kim, difficulties that occur when developers consider
Park, & Sugumaran, 2006; Axel van Lamsweerde, the implementation and the execution of a system.
2001). These challenges can be a technical difficulties,
or goal conflicts, etc.
designing a Goal model After producing the goals, actions, and prob-
lems lists, the relation between these elements
One of the main reasons for developing unsuc- should be created. The notation here is similar to
cessful software systems is unrealistic planning the notation in (Kim, Park, & Sugumaran, 2006),
and design. Hence, the aim of goal-oriented ap- which is as follows:
proaches, as discussed in the previous section,
is to provide an environment such that different (Gz, An) → Px
stakeholders can understand the goals at dif-
ferent levels of abstraction and decomposition. A represents an action, G represents a Goal,
One way to accomplish this is to use a graphical and z and n are the symbolized identification of
modelling language, such as GSN; another way random variables that present the ID of the goal,
is by documenting the requirements and design for instance, it can be G 1.1.2, which means goal
precisely and accurately using a textual format. with ID 1.1.2. An example of action could be
It is also possible to present the prototype of the 1.1.2/1, which presents the required action that
system and discuss it with various stakeholders. can be done to achieve this goal.
All these approaches and other similar ones could The next notation illustrates the relationship
be beneficial for different type of systems. The between a goal, action, and problem. Following
approach that is discussed in this section is a is an example of this notation:
simple approach for developing a goal model.
The aim is to develop a goal model that can Px → (Gz, An)
present the system’s high-level goals clearly.
Furthermore, it does not involve the details of The above notation means, the Action with ID
the goals or their descriptions; this can help to n which is required for satisfying Goal with ID z
provide an understandable top down model for can cause the problem with ID x. This notation
high-level goals of the system for non-technical describes the case where action that belongs to
decision makers. a goal causes a problem or problems. The next
The basics of this approach for designing a notation describes the case that a problem can be
goal model is to create a list of goals, a list of solved using a specific action:
actions, and a list of occurred problems. Goals
were defined earlier; actions according to (Kim, Px → (Gz, An)
Park, & Sugumaran, 2006, p. 543) “are the atomic
47
Exploring Enterprise Information Systems
The above notation means to solve the problem is shown as a box surrounding it. The big arrow
P with ID x, the Goal G with ID z is required, in the left hand side of the box illustrates the fact
and to satisfy this goal Action with ID n should that this system is one of the information systems
be done. in the defined enterprise. The enterprise in this
In the case that the developer team does not figure is shown using a pyramid, which is mainly
know the required action yet, action n (An) can a symbol of organisation.
be replaced with ‘?’. Before starting to implement To make this figure simple and clear we did
the system, all the question marks (?) should be not include the option that this EIS can be shared
filled with actions as solutions to satisfy goals. and used with other enterprises around the globe.
Nevertheless, in the case that as the result of Note that by having a design for EIS, we try to
limitations in the technology, resources, etc. one have a big picture of enterprise that includes the
or more question mark (?) cannot be replaced by possible changes and extension in the future. The
solution, there could be a bottom-up check to see EIS does not have a local design that cannot be
if the system is still worth implementing; consider- used when changes occur. The current solution
ing the unsolved problem(s), the functionality of for extending a system or merging systems is
the system should not rely on the non available mainly developing middleware, which enterprise
solutions. architect should avoid relying just on middleware.
However as it was discussed before, a goal Considering that in some cases middleware can
model should have different levels of abstractions be so expensive that the organisation’s decision
for different users. Hence, designers should avoid makers may decide to use manual paper based
destroying the purpose of the goal model, which is system instead.
to make the systems goals clear for stakeholders After drawing an overall view of the requested
by mixing and presenting all the information to system, the goal of the system should be defined.
the ones who does not require it. The next sec- Each goal should have its own action, which
tion will provides an example of goal model for acts as a solution for the system and the possible
stroke care. problems. Figure 4 illustrates the goal diagram
for this system. This diagram is very high-level,
example which targeted non-technical decision makers.
This diagram is the starting point for creating a
The aim of the case study is to design the goal complete goal model for this system. As can be
model for a system that collects the data of treat- seen in this diagram, goals have their unit identity,
ment for a specific serious condition. The data which in this case is shown by numbers. These
can be collected from different sources such as numbers makes the traceability of goals possible
doctors, researchers, nurses, emergency staff, etc. within this model. In addition, it is possible to
Moreover, each of these stakeholders can have a implement it in tools for drawing diagrams. This
different way of communicating with the database, is a AND-OR graph and it means the parent goal
for instance, laptop, paper, phone, etc. The role with OR child can be satisfied when at least one of
of this system is to collect the data from various the child goal reach to the solution. It is similar to
sources, analyse them and provide some data as AND-OR in logic mathematic. Furthermore, goal
an output for different purposes. Based on the graph is a weight graph; hence, the goals in the
case study in (Bobrow.D.G, 2002) we can call same level can be prioritised over other goals.
this system a knowledge sharing system. Prioritizing goals is helpful in different context.
Figure 3 illustrates the described system. In For example, in allocating resources or in some
this figure the boundaries of the described system cases, when satisfying a lower priority goal is
48
Exploring Enterprise Information Systems
49
Exploring Enterprise Information Systems
depend on satisfying the higher priority goal. In cases is hardly the leading factor in developing an
general, Figure 4 shows the basic requirements EIS. The basic requirement for research on how to
for the goal graph. We emphasise that the aim of improve the development of EIS is to achieve more
this graph is to provide the high-level clear image knowledge on what an EIS is.
of the system’s goals and present it to the stake- Consequently, the main objective of this chap-
holders to be used for brainstorming for example. ter was to explore the boundaries of EIS; this was
achieved by developing a definition for EIS. This
conclusion definition captured what we believe are the impor-
tant characteristics that should be considered while
In conclusion, this section proposed the future we attempt to build an EIS; characteristics such as
work for the study on how to develop EIS. The organisations, their goals, business processes, and
fact that developing required components for the business model. None of these characteristics
EIS can be similar to other large-scale complex is based on the size of the organisation; therefore,
system makes this field of work valuable; because it can cover different sizes of enterprises, small,
finding better solutions for different challenges medium, or large. Accordingly, this chapter did
of Information Systems provides a platform for not use a specific term such as SME, Small and
developing various kinds of suitable systems. Medium Enterprises, to define EIS.
This effort and study on EIS provides an easier Any discussion of EIS encompasses a number
and safer life for individuals and organisations of facets, including general IT system develop-
that benefit from this type of IT products. It influ- ment, requirements, organisational theory, and
ences the government’s performance, it provides distributed systems technology. Our aim is to
better innovative platform for industries. All more precisely define what an EIS is, and what
these reasons bestow enough motivations for us it is not, to assist in providing better methodolo-
to continue improving this study. gies and techniques for building such increasingly
important software systems. We believe that it
is clear that the volatile requirements of modern
conclusIon organisations require special business processes,
and these business processes cannot be fully
By looking at various ways that the word ‘enterprise’ achieved without IT systems and in some cases
is used, it becomes clear that there is an ambiguity in without an EIS. A high-quality EIS can provide
this term. Yet this term and others such as ‘Enterprise a connection between the different, independent
Architecture’, ‘Enterprise Information System’, etc. business processes in an enterprise.
are increasingly used. This fact encourages us to look As discussed, we argue that goal-oriented
at these terms and clarify them for future use in our modelling techniques are important for helping
research and other relevant ones. The simple defini- to understand what is required for a business or
tion for enterprise is an entity engaged in economic organisation, and for understanding what an EIS
activities. This definition does not cover requirements should provide. Thus, we argue that a first step
for defining an EIS. The argument in this chapter for developing a system for an enterprise is to
illustrates that an EIS covering the requirements of find and justify the enterprise’s goals. When all
any entity engaged in economy activity is simply an the stakeholders have a clear idea about the goals
IS and they can hardly be categorized as a separate of the enterprise, their expectations will be real-
group with the name of EIS. The fact that the number istic in principle; the desired system’s boundary
of people employed by an organisation can increase should be more precisely defined, and in principle
the complexity of the software system in some building the system should be possible. We do not
50
Exploring Enterprise Information Systems
claim that following this approach will provide Fruin, M. W. (1992). The Japanese enterprise
a full guarantee for developing a suitable EIS: system. New York: Oxford University Press.
such systems are always challenging to build, and
GeneralElectric. (2008). Product and services.
goal-oriented techniques only tackle an important
Retrieved September 1, 2008 from http://www.
part of a large problem. Additional research and
ge.com/products_services/index.html
experiments are needed to identify what further
techniques are needed to supplement goal-oriented Gopalkrishnan, J., & Gupta, V. K. (2007). eBay:
modelling for designing, implementing, deploy- “The world’s largest online marketplace” - A
ing, and maintaining Enterprise Information Case Study. Conference on Global Competition
Systems. and Competitiveness of Indian Corporate (pp.
543-549).
Jessup, L., & Valacich, J. (2006). Information
AcknoWledGment
systems today, why is matters (2nd ed.). NJ: Pearson
Education, Inc.
We would like to thank Dr. Fiona Polack for her
valuable suggestions. Kaisler, S., Armoiur, F., & Valivullah, M. (2005).
Enterprise architecting: Critical problems. Paper
presented at the 38th Annual Hawaii Interna-
reFerences tional Conference on System Sciences, Island of
Hawaii, HI.
Bobrow.D.G, W. J. (2002). Community knowledge
sharing in practice: The Eureka story. Society Kavakli, E. V., Loucopoulos, P., & Filippidou,
for organizational learning and Massachusetts D. (1996). Using scenarios to systematically
Institute of Technology, 4, 47-59. support goal-directed elaboration for informa-
tion system requirements. Paper presented at the
Buck, E. (2000). Different Types of organisation. IEEE Symposium and Workshop on Engineer-
NEBS Management/QMD Ltd. Retrieved Sep- ing of Computer Based Systems(ECBS ‘96),
tember 1, 2008 from http://www.teamsthatwork. Friedrichshafen, Germany.
co.uk/Organise%20&%20improve%20team%20
work%201.pdf Kelly, T. (2004). A Systematic approach to safety
case management. Paper presented at the SAE
Clifton, H., Ince, D. C., & Sutcliffe, A. G. (2000). 2004 World Congress, Detroit, MI.
Business information systems (6th ed.). Essex,
England: Pearson Education Limited. Kelly, T., & Weaver, R. A. (2004). The goal struc-
turing notation - A safety argument notation. Paper
Davenport, T. H., & Short, J. E. (1990). The New presented at the 2004 International Conference on
industrial engineering, information technology Dependable Systems and Networks (DSN 2004),
and business redesign. In M. Lewis & N. Slack Florence, Italy.
(Eds.), Operations management: Critical perspec-
tives on business and management (pp. 97-123). Kelly, T. P. (1998). Arguing Safety- A systematic
London and New York: Routledge. approach to managing safety cases. University
of York, York.
Edwards, C., Ward, J., & Bytheway, A. (1993).
The essence of information systems (2nd ed.).
London: Prentice Hall.
51
Exploring Enterprise Information Systems
Kelly, T. P., McDermid, J., Murdoch, J., & Wil- Mitsubishi. (2007). About Mitsubishi. Retrieved
son, S. (1998). The goal structuring notation: A September 1 2008, from http://www.mitsubishi.
means for capturing requirements, rationale and com/e/group/about.html
evidence. In A. J. Vickers & L. S. Brooks (Eds.),
Projects, T. C. C. I. (2004). The challenges of
Requirements engineering at the University of
complex IT projects. Retrieved September 1,
York: University of York.
2008, from http://www.bcs.org/server_process.
Kim, J. S., Park, S., & Sugumaran, V. (2006). php?show=conWebDoc.1167
Contextual problem detection and manage-
Robertson, P. (1997). Integrating legacy sys-
ment during software execution. Industrial
tems with modern corporate applications.
Management & Data Systems, 106, 540–561.
Communications of the ACM, 40(5), 39–46.
doi:10.1108/02635570610661615
doi:10.1145/253769.253785
Lamsweerde, A. v. (2001). Goal-oriented require-
Strong, D. M., & Volkoff, O. (2004). A roadmap
ments engineering: A guided tour. Paper presented
for Enterprise system implementation. IEEE
at the 5th IEEE International Symposium on
Computer Society, 37, 22–29.
Requirements Engineering (RE’01), Toronto,
Canada. Terry, P. (1975). Organisation behaviour. Indus-
trial & Commercial Training, 7(11), 462–466.
Lamsweerde, A. v. (2003). From system goals to
doi:10.1108/eb003504
software architecture. Formal methods for soft-
ware architectures ( . LNCS, 2804, 25–43. Weiss, D. M., Bennett, D., Payseur, J. Y., Tendick,
P., & Zhang, P. (2002). Goal-oriented software as-
Lamsweerde, A. V. (2004). Goal-oriented require-
sessment. Paper presented at the 24th International
ments engineering: A roundtrip from research
Conference on Software Engineering (ICSE ‘02),
to practice. Paper presented at the 12th IEEE
Orlando, FL.
Joint International Requirements Engineering
Conference(RE’04,), Kyoto, Japan.
Laudon, J. P., & Laudon, K. C. (2007). Manage-
ment information systems: Managing the digital
firm (10th ed.). Prentice Hall.
This work was previously published in Social, Managerial, and Organizational Dimensions of Enterprise Information Sys-
tems, edited by Maria Manuela Cruz-Cunha, pp. 415-432, copyright 2010 by Information Science Reference (an imprint of
IGI Global).
52
53
Chapter 1.4
Enterprise Systems in Small
and Medium-Sized Enterprises
Sanjay Mathrani
Massey University, New Zealand
Mohammad A. Rashid
Massey University, New Zealand
Dennis Viehland
Massey University, New Zealand
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Systems in Small and Medium-Sized Enterprises
modules such as supply chain management (SCM) literature. This is a replication study following
or customer relationship management (CRM) a similar approach used by Shakir (2002), who
systems. ES applications connect and manage also investigated aspects of ES implementation
information flows across complex organizations, in the NZ vendor-and-consultant community. The
allowing managers to make decisions based on focus of that study was to identify key drivers in-
information that accurately reflects the current fluencing ES adoption and implementation (e.g.,
state of their business (Davenport & Harris, 2005; Shakir and Viehland, 2004) whereas the focus of
Davenport, Harris, & Cantrell, 2002). In a more in- the current study is to understand how current
tegrated and global market, extended ES offers new implementations in the SME sector differ from
functions and new ways of configuring systems, the earlier implementations in the large enterprise
as well as web-based technology to establish the sector. The current study extends and builds upon
integrated, extended business enterprise (Shanks, existing ES research.
Seddon, & Wilcocks, 2003). The market for ES Semi-structured interviews were conducted
continues to grow despite much speculation on with key players of ES implementations in New
its future in the post millennium era. Although Zealand including ES vendors, ES consultants,
most large enterprises have completed their ES and IT research firms to explore the current ES
implementations by now, the ES market continues implementation scenario. Several measures such
to grow in the small and medium-sized enterprises as the number of users, modules implemented,
(SME) sector. A number of research studies have cost of implementation, number of sites/locations
been conducted to establish and understand the where implemented, industry type, organization
critical success factors for ES implementations size, implementation phases, time to implement,
(e.g., Allen, Kern, & Havenhand, 2002; Bancroft, implementation partners, and levels of customiza-
Sep, & Sprengel, 1998; Holland & Light, 1999; tion were discussed to understand a typical case
Parr & Shanks, 2000; Plant & Willcocks, 2006; of ES implementation and current implementation
Sarker & Lee, 2000; Scott & Vessey, 2002; Skok practices. The empirical findings are analyzed
& Legge, 2001; Sumner, 1999; Yang & Seddon, and reported in this paper. This study has been
2004). However, there has been little research conducted in a New Zealand (NZ) context which
that examines ES implementation at the strategic can be extended to show current trends worldwide.
decision-making process level (Viehland & Shakir,
2005) and compares current implementations in
the SME sector with earlier implementations in reseArcH metHodoloGy
the large organizations. The purpose of this study
is to examine the current ES implementations Using a qualitative research methodology,
scenario in New Zealand. The main objectives data were collected by way of semi-structured
of this study are to explore what is a typical case interviews with ten key respondents in the ES
of ES implementation and to understand how implementation industry. The interviews were
current implementations in the SME sector dif- carried out between February and August 2006.
fer from the earlier implementations in the large The key respondents were senior ES consultants
enterprise sector. The study does so through a or senior managers in the organizations which are
practitioners’ perspective, with interview data key players in the field of ES in New Zealand,
collected from ES vendors, ES consultants, and principally major ES vendors, ES consultants,
IT research firms who are actively engaged in and IT research organizations (see Table 1). The
ES implementation. This approach differs from positions of the respondents included: director
the organizational approach usually found in the professional services, consulting manager, manag-
54
Enterprise Systems in Small and Medium-Sized Enterprises
55
Enterprise Systems in Small and Medium-Sized Enterprises
56
Enterprise Systems in Small and Medium-Sized Enterprises
enterprises, companies like Fonterra, Telecom, may be a SME in NZ it may have some large
and Carter Holt Harvey in NZ. However, in the offshore subsidiaries and therefore the group may
last 5 years due to shift in focus on the SME’s, not necessarily be tiny. For example, Fisher and
SAP is now moving to smaller companies with Paykel might not be considered one of the largest
annual revenues $5M or more and are offering companies in NZ but if you consider its holdings
two different types of solutions. One is similar and offshore organizations, it is quite substantial
to a Microsoft based type solution called “Busi- from the NZ perspective of a large company
ness One”. The other is “All-in-One” and is the category that runs JDE. But typically, we apply
traditional SAP solution. The large enterprises the rule, an SME will be putting in JDE and if it
are probably old SAP or one of the Oracle family is a large enterprise it will be putting E-Business
member customers having implemented either Suite or PeopleSoft.”
PeopleSoft, JD Edwards, or Oracle systems. Now Most informants suggested that the ES
the focus of the software vendors is to compete implementations are typically divided into two
for winning upgrade or add-on contracts from “waves” or phases. The first wave or phase 1 is
such large enterprises. SAP recently bagged such the implementation of core ES modules such as
a contract from Fonterra which is an old loyal finance; materials management including purchas-
customer of SAP. But the main battlefield for new ing, warehousing and inventory; and operational
implementations is in the SME sector. modules including production management, pro-
The Microsoft respondent, who had earlier duction planning, logistics, sales, and distribution.
worked with other vendors (i.e. JD Edwards, Some companies also include HR and payroll in
PeopleSoft, and Oracle), remarked “there’s no the first phase. In the second wave or phase 2, the
such thing as a typical enterprise solution imple- companies implement supplementary modules
mentation in NZ”. According to him, the size of (also called ERP II by Gartner (Zrimsek, 2002)),
enterprises ranges from large with 500 or more which include collaborative scenarios such as
users through to SME with 5 to 10 users at the customer relationship management (CRM), supply
lower end and hence there is no typical orga- chain management (SCM), supplier relationship
nization. He suggested however, the size of an management (SRM), and management services
organization that may drive business intelligence applications such as business intelligence (BI).
(BI) and knowledge capital as information tools Companies consider extending applications to
are the medium to large organizations. Organiza- satellite businesses or international operations
tions that employ 100 plus staff and have an ES in the second phase. These findings differed to
with a user base of more than 40 are more mature the Shakir (2002) study which noted that phase
in the context of using information for business 1 implementations would always include the
benefit. Microsoft’s largest customer in NZ has core modules of financials plus one or two other
a user base of 130 while their smallest customer modules that may include SCM and CRM. This
has just two with majority of customers in the change can be attributed to the larger number of
range of 15 to 50 users in NZ. modules that ES vendors have put into the market
From an Oracle perspective, Oracle has three in the last five years and SME owners being more
ES product lines - Oracle E-Business Suite, ambitious in phase 2 implementations. Findings
PeopleSoft and JD Edwards (JDE) from their from the current study revealed that about 75%
acquisitions. The E-Business Suite and PeopleSoft organizations are still in phase 1 and comprise
are generally implemented in the larger enterprises mostly of new implementations in the SME sec-
and JDE in the SME’s. “Unfortunately, some of tor. Balance 25% organizations are large that have
these lines are blurred because while a company moved into phase 2.
57
Enterprise Systems in Small and Medium-Sized Enterprises
Traditionally, the time for implementation due to the smaller size of organizations and their
used to be more. However, since the focus is limited funds for investment.
now towards SME’s, the implementation time One vendor explained the reason for the high
has decreased. Earlier, processes such as model- costs in large organizations compared to smaller
ling the organization and configuring the design ones is because large organizations have more
used to take time. Now, using accelerators such complex operations and require more customiza-
as preconfigured business processes, the time to tions. Their decision making processes may not
implement has been slashed, and so has the cost be as efficient, and require a lot of change man-
of implementation, which has made these systems agement procedures. On the other hand, smaller
much more affordable for the small businesses. companies are more agile, more decisive, and
In the Shakir (2002) study the length of time to especially more inclined to adopt a best practices
the first phase implementations varied from 2.5 implementation, greatly reducing customization
months to 2 years. However, in the current study and change management costs.
although the time for implementation varied be- Table 3 summarizes the time and costs esti-
tween different informants, the general consensus mates for ES implementations as suggested by
was that currently large projects take around 12 to various participants in the current study based
24 months and SME’s 3 to 12 months to complete. on the size of the project. The costs include soft-
The cost of implementation is related to the ware, number of licenses, hardware, consultancy,
number of modules, their types, the software pack- implementation, customization, and training costs.
age size and brand, the number of user licenses is- Locations are the one or more sites where the
sued, consulting costs, customization levels, along ES is implemented. Findings in this study show
with the vendor or third party implementation cost. that currently more implementations are multi-site
The hardware cost, and the cost of training and while in the earlier years implementations were
change management may be additional. Accord- more single site. This represents a continuing trend
ing to informants in this study, in the SME sector, to more multi-site implementations in NZ, first
cost is the most important factor in selecting an ES observed by Shakir (2002). Traditionally, in large
for implementation. This was attributed by them, organization implementations, each location had
Key Participants Time for Implementation (Months) Cost Based on Project Size (NZ$)
SAP Large – 18 to 36 Very large > $10 M
SME – 6 to 18 Large - $2 M to 10 M
SME - $0.5 M to 2 M
Microsoft Large – 18 to 24 Very large – Multi-million $
Medium – 9 to 12 Mid-market – $0.5 M to 2 M
Small – 3 to 6 Small – $0.1 M to 0.5 M
Oracle Large – 18 to 24 Not answered in figures
SME – 6 to 12
EMDA Consulting Large – 10 to 12 Large > $1 M
SME – 3 to 6 SME – $0.2 M to 1 M
PricewaterhouseCoopers Large – 24 to 48 Very large – $10 M to 50 M
SME – 4 to 12 Large – $2 M to 10 M
SME – $0.5 M to 2 M
IDC Large – 9 to 18 Not answered in figures
SME – 3 to 9
58
Enterprise Systems in Small and Medium-Sized Enterprises
its own implementation. However, companies in best value from a price perspective and from the
the SME sector are now optimizing by using one perspective of having the best experts involved
implementation at multi-locations because they in the project.
are finding it too hard to manage and maintain The post implementation and after sales sup-
separate implementations at all these locations. port from the software vendor or the implementer
“Organizations are realizing its no use having IT to the customer organization normally includes
administrators in all the locations doing a simi- three levels of support (see Figure 1). The first
lar task.” The growth in export markets of NZ level is at the customers’ end where the customers’
companies coupled with availability of Internet- super user (i.e. ES champion), determines whether
capable technology is also driving multi-site ES it is a “how to” question -- where the user does
implementations in NZ. These implementations not know how to use the system -- or something
now are single instance which as explained by SAP else. If the problem is related to the user or an
meant that only one installation of the software organizational issue it is resolved at the first level.
is made to run on one server but the software is If not an end-user problem, then is it a general
used at multiple locations. This environment is business requirement issue? If so, it is referred to
different to the earlier multi-instance where mul- the second level support which is the local vendor
tiple installations of the software were made to implementer or the implementation partner. The
run across the company in one or more locations. second level support determines whether it is a
Typical implementations today are single instance functionality or software performance setting issue
multi-site implementations. Organizations are that requires additional configuration to make it
now implementing ES into one site which is their work and meet the business requirement. Finally,
main manufacturing or business centre and this if the local implementation partner determines
single instance is used by all other subsidiary that the problem is a software bug or a product-
sites, distribution warehouses, and sales offices. related issue it is raised to level three which is
An implementation partner is mostly used for the support channel inside the software vendor.
managing the ES project. Findings revealed that So it is a typically a three tier support model as
while a third party or a consultant implementer shown in Figure 1.
was popular in the past for large organization Customization is the process in which changes
implementations, SME customers now prefer are made to the ES software during the implemen-
the software vendor’s direct involvement. This tation phase to suit the needs of the organization
finding again confirms the Shakir (2002) study where it is being implemented. This happens when
which also noted that vendor driven implemen- the best business practices embedded in the ES
tations were on the increase. A majority of the software do not satisfy the needs of the business,
participants in the current study suggested that and the software is changed to meet the require-
there has been a shift over the last five years. ments of the organization (Davenport & Prusak,
Customers traditionally preferring to work with 1998; Kumar & Van Hillegersberg, 2000).
the big 5 consulting companies for implementation There are two implementation strategies or
are now more inclined to work with the software models. The first is the “comprehensive custom-
vendor directly so that they have a one-stop shop. ization” type when many and sometimes major
Customers are starting to realize that the techni- changes to the software are performed during
cal skills a software vendor provides may not be the implementation to satisfy business require-
possible from consultants. One vendor explained ment. The second is “vanilla” or “out-of-the-box”
what customers feel is that unless they actually when the ES software application is implemented
talk to the software owners, they may not get the without any changes to the software and the
59
Enterprise Systems in Small and Medium-Sized Enterprises
business processes within the organization are encounter difficulties, suffer on cost, schedule
changed to suit the functionality of the software. and performance metrics. The company will also
SAP explained that there is a potential source experience difficulties when attempting to upgrade
of confusion about the extent of customization to a later package release. But on the other hand
as every project needs some form of customer the organizational adaptation to the ES will be
specific reports, customer specific interfaces, and easy and the system will meet the needs of the
customer specific data conversion programs. ES business. The current study revealed that vanilla
software is designed to meet most customization implementations are more common in the SME
requirements by adjusting parameter settings. All category whereas the large organizations are more
modern software vendors now have a software likely to have comprehensive implementations.
architecture that does not require modification to Shakir and Viehland (2004) noted cost as a driver
the core software statements to achieve results. towards vanilla implementations as the two ap-
The user access can be built through parameter proaches has major implications on the change
settings to accommodate specific requirements. management strategy. When the best practice
However, this should not be confused with what is chosen, people issues become top priorities
is called true customization in which the core whereas when the implementation strategy is
software is actually modified. geared towards customization, it is more of a
Findings in this study revealed that organiza- technical challenge. Parr and Shanks (2000) have
tions now view the ES software not as a bunch of reported in their study on different ES implementa-
statements but as pre-defined business processes. tion approaches that vanilla implementations are
These organizations prefer to adhere to the pre- usually single site and comprehensive multi-site.
defined business processes in the software and However, the current study suggests that vanilla
change their own processes to the software’s implementations could be single or even multi-site
requirements. The companies doing this are more and currently more implementations are multi-site.
likely to be successful in capturing the benefits and An implementation is considered new when
controlling the cost of the implementation as this it is implemented in an organization for the first
also helps in future upgrades, and the overall cost time. An upgrade is when a revised version of
of ownership gets reduced. These findings also the software with some additional functionality
confirm the Brehm, Heinzl, and Markus (2001) is implemented to upgrade the existing software
study in which they have estimated that greater the in the current implementation (Dalal, Kamath,
customization, the more will the implementation Kolarik, & Sivaraman, 2004). Add-ons, also called
60
Enterprise Systems in Small and Medium-Sized Enterprises
bolt-ons, include adding new modules to the exist- revealed that typically best-of-breed model was
ing implementation. Replace means change the adopted by many organizations in the past. For
existing implementation with a different vendor’s example, an organization might install HRM
software. The Shakir (2002) study observed that module from PeopleSoft, financials from Oracle
while new implementations were happening in and manufacturing from SAP in the first phase.
SME’s, large organizations were focusing only Then subsequently install bolt-on modules such as
on upgrades and add-ons comprising of 10-15% CRM from Microsoft, SCM from SAP or Oracle,
of the total implementations. However, findings or BI from Cognos in the second phase.
in this study suggest an equal split between new However, both customers and vendors are now
implementations vs. upgrades, add-ons, and re- moving towards single vendor implementation.
placements in NZ organizations. This is because the additional benefit received
In the current study, SAP suggested a 50-50 from a best-of-breed implementation is vastly
split. “We’re definitely focusing on new imple- outweighed by the cost of implementing, main-
mentations because that’s where our goal is. taining, and managing those disparate systems.
However, we have to look after our existing cus- Organizations have realized that although there are
tomer base and as their requirements change, the really good benefits in PeopleSoft, SAP, and Oracle
presentation of our software in their business may for the different modules, the cost to implement
also need change.” In the case of replacements, and maintain is enormous. While they may only
Oracle noted that an organization will replace an get 85% to 90% of the best-of-breed benefit in a
ES only if there is a need to satisfy some major single vendor implementation that is preferable
benefit which remains unsatisfied in their exist- especially since it can save three times the cost
ing system, because it is expensive to replace. It of implementation and maintenance. Vendors
is not just the cost of the software, but it is the also do not release new versions of the software
huge organizational change that the organization exactly at the same time, therefore managing the
has to go through to replace an enterprise system. upgrade path becomes difficult, the investment
Oracle also revealed that in the past this cost was depreciates faster than expected, and organizations
underestimated, but “replacement cost is three are unable to take advantage of the new features
times the cost of upgrade”. Oracle also revealed of the software. This aspect differed from the
the maintenance aspect which included the cost findings of the Shakir (2002) study which noted
of up-grading the ES. “Typically in every five- that while traditional ERP implementations still
year period, companies spend up to four times dominate new implementations, upgrades, add-
the initial purchasing implementation cost, just ons, and replacements appear to favor the best-
to maintain the ES. That is why IT budgets in of-breed model. The best-of-breed model is also a
organizations allocate substantially for upgrade consideration for new implementations, especially
support as opposed to new requirements.” for organizations that operate in niche industries.
Another model used during ES implementa- The application service provider (ASP) imple-
tion is the best-of-breed, as opposed to a single mentation model is one in which a service provider
vendor implementation. The best-of-breed model provides an ES application software as a service
includes implementation of a mix of different ven- or hosting to organizations at a fixed cost for a
dor modules which the vendor specializes in, to specific period (Malcolm, 2002; Pamatatau, 2002).
have the best of everything (James & Wolf, 2000; There was a mixed response from respondents on
Pender, 2000). A single vendor implementation this model. One vendor noted, “ASP pops up every
includes all the modules from a single vendor 5 years and was a bit like an economy that came
as an integrated package. Findings in this study and went and nothing really happened. I’m not
61
Enterprise Systems in Small and Medium-Sized Enterprises
too sure it is addressing a real market requirement provided specific examples in highlighting trends.
need”. Another vendor responded “I don’t think SAP explained that traditionally, over the last 10
this model has picked up at all”. However, yet years, there have been many implementations in
another vendor confirmed that the ASP model is the consumer packaging goods, manufacturing,
used in NZ. “We use it. Customers are happy with forestry, and pulp and paper industries. However,
it. We have time and resources for providing the in the last two years there has been a slight shift
service. There’s a huge market there. These are in the ES market in NZ with several implementa-
small companies that do want an ES and they don’t tions in the retail and utilities industry, and this
mind paying sixty to seventy thousand dollars a trend is likely to continue for the next two years.
year but are not able to spend half a million to one ES maturity in an organization depends upon
million dollars for buying the software. It is not the number of year’s experience the organization
too difficult for these companies to put up a few has had with ES and the stage of ES implemen-
servers each with the latest operating system of tation (Hawking, Stein, & Foster, 2004). This
windows. We’ve got the people and it’s not much concept of ES maturity and the different stage of
of their time, so we can provide this service. There ES implementation is reinforced by the Nolan and
is no trend, but there is a huge market out there if Norton Institute (2000) classification that groups
marketed properly.” Except for this one vendor, implementations into levels of maturity such as
the overall response was not very positive for the beginning where ES is implemented in the past 12
use of the ASP implementation model, either in months, consolidating where ES is implemented
the current ES environment or in the recent past between 1 and 3 years, and mature where ES is
(Shakir, 2002). implemented for more than 3 years.
Another model referred to as the business pro- Findings revealed that most NZ organiza-
cess outsourcing (BPO) or the managed service tions are reasonably mature with ES technology
model was cited by respondents as a growing and IT in general. Most large organizations and
implementation model in a NZ context. In this many SMEs in NZ have been using some form
model outsourcers run a customized managed of ES technology for more than a decade and are
service of ES implementation for customers where at a fairly advanced level of maturity. This also
effectively a single solution is sold to a customer. confirms the Shakir (2002) study which noted
One consultant explained that this is a low cost that although NZ is a small country, technology
commodity solution where the customer prefers is mature and on par with what’s happening in
not to manage the ES. This model positions itself the U.S.
very much in the SME market for example, in out- However, as per the respondents, there are a
sourcing transaction services or specific functions couple of issues in managing ES projects which
like finance, or payroll, or a similar function to a do highlight the slower pace of ES maturity within
third party supplier. “An organization may have the NZ industry. First, many NZ organizations do
implemented Oracle financials or SAP finance for not conduct a proper business justification of their
example, but may be paying, say to IBM, to run implementation. Although some improvement has
the technology and specific functions for them”. been seen in the last couple of years, most NZ
Despite its risks, ES implementation is perva- organizations produce little or no value assess-
sive in many different types of industries (Kumar ments that often lead to weak business cases and
& Van Hillegersberg, 2000; Mabert, Soni, & Ven- insufficient benefit models which cannot be used
kataraman, 2000). A majority of the respondents for benefit tracking. Plant and Willcocks (2006)
noted that ES implementations are covered in most in their study on critical success factors for ES
industry sectors in NZ; however, some respondents implementations have also found an increased
62
Enterprise Systems in Small and Medium-Sized Enterprises
emphasis upon the determination of clear goals now started realizing the value of technology and
and objectives at the project outset as one of the its use to stay ahead of competition.
important factors for ES implementation suc- Findings revealed that the mix between national
cess. Second, many organizations in NZ believe and international ES implementations is a 50-50
implementation of ES is a technology challenge. split in NZ. Respondents noted that on several oc-
However, according to most respondents, it is more casions the implementations started as a national
about change management, people, and processes implementation but quite quickly reached out to
and less about technology. With better business countries like Fiji, Australia, Europe, Singapore
case development, these are two areas in which or wherever the sales and distribution offices
many NZ companies are struggling. are located. Although many NZ companies are
Respondents also revealed that typically when a based in NZ and the reach is national, there is a
new system is implemented, productivity drops for growing trend in NZ organizations to expand to
a period and then goes up again. Oracle suggested global markets therefore now the reach is becom-
the depth of the drop depends upon how well the ing global. This is also supported by the growing
system is implemented, how well the change is export-oriented market of NZ organizations.
managed, how well the business case is defined, Global implementations are also part of multi-
and how well the managers are measuring and national organizations that implement ES within
managing benefits before the organization starts their NZ companies. These implementations are
seeing the benefits starting to flow through. normally “roll-outs” based on a global template
Until a few years ago the majority of orga- that includes standard business processes. The
nizations did not use the ES in its true capacity. “roll-out”, as explained by one consultant, is
ES was used as a financial system, as a central an implementation generated from a template
repository for HRM records, or as a method for customized for an overseas location. The roll-
raising purchase orders. This was because the out starts with a massive data set prepared by
organizations had not thought about what they the first implementation followed by the addi-
were trying to optimize, what benefits they were tion of country specific and localized data. For
trying to bring into the organization, what they example, GST or VAT percentages are different,
were trying to change, how they were trying to the states as part of the addresses are different,
manage the business, and whether they could and therefore a couple of master files which are
actually get the information to manage the busi- country specific are implemented on top of the
ness. However, recently the software vendors have local customer and vendor base that is created. The
started to see several companies trying to find data-set roll-out is established using country spe-
ways to get more value out of their investment. cific data where new country settings override the
Companies have recently started asking how to template settings. A separate dedicated warehouse
establish analytical processes to optimize and for these locations is also included for tracking
realize business value from their ES investment. transactions. However, many NZ companies are
Many NZ organizations have already completed governed by their parent organizations; hence all
their first phase of ES needs and are now extend- the decision making for the ES implementation
ing into the second phase with CRM, SCM, or BI. is done offshore by the parent company, without
Most respondents agreed that the slower pace of much control from the NZ businesses. This is
ES maturity within the NZ organizations is due to nothing new. Implementations based on global
the limited spending power, which is attributable templates and critical decision-making being
to the comparatively small NZ economy. However, made offshore were observed in Shakir’s 2002
this trend is now changing. NZ organizations have study. In summary, ES implementations in NZ
63
Enterprise Systems in Small and Medium-Sized Enterprises
organizations are moving from national towards and SME organization segments. Typical imple-
a global reach either by expansion into overseas mentations in the large organization segment
markets or off-shore ownership. with revenues more than $250M are currently in
phase 2 and the organizations are fairly mature
with their ES. These organizations are likely to be
conclusIon And in the phase of acquiring collaborative scenarios
FurtHer reseArcH like SCM or CRM, or management services
applications such as BI. These can be single or
The main objective of this study was to understand multi-site implementations. The number of users
typical ES implementations and practices in NZ is estimated to be 200 or above and the cost of
and how current implementations in the SME sec- the project is likely to be more than $2M. In the
tor differ from the earlier implementations in the SME segment, typical implementations are in
large enterprise sector. The findings are analyzed organizations with revenue between $50 - 200M.
and summarized in table 4, based on different These implementations are likely to be new with
organizational size segments of the ES market. two or more core ES modules. These can be single
Table 4 suggests the different ES implementation or multi-site implementations with number of
determinants for both large and SME organiza- users in the range of 20 – 200 and the cost of the
tions and explains the relationships between the implementation between $100,000 – 1M.
organization size and the implementation process Many ES implementations in New Zealand
variables. are several years old now however, these com-
It is evident from the table that typical cases panies have only recently started asking how to
of ES implementation in NZ exist in both large actually optimize processes and realize business
Table 4. Determinants for describing typical ES implementation based on organizational size segment
64
Enterprise Systems in Small and Medium-Sized Enterprises
value from their ES investments. Organizations Dalal, N. P., Kamath, M., Kolarik, W. J., &
are establishing analytical processes for tracking Sivaraman, E. (2004). Toward an integrated
benefits continuously improving in taking advan- approach for modeling Enterprise processes.
tage of the technology. Communications of the ACM, 47, 83–87.
The findings of this study are limited to the doi:10.1145/971617.971620
views of professionals from different ES vendors,
Davenport, T. H. (2000). Transforming the Practice
ES consultants, and IT research organizations and
of Management with Enterprise Systems. In Mis-
are limited by a small sample size. There may also
sion Critical (p. 203-235). Boston, MA: Harvard
have been some influence on the responses by the
Business School Press.
commercial interests of the firm the participant
worked for. However, the study has achieved its Davenport, T. H., & Harris, J. G. (2005). Au-
objectives. This is achieved due to the seniority tomated Decision Making Comes of Age. MIT
and experience of the respondents within the or- Sloan Management Review, Summer 2005 46(4),
ganizations interviewed, and the position of these 83-89.
organizations as key players in the ES industry
Davenport, T. H., Harris, J. G., & Cantrell, S.
in New Zealand. Further research is in progress
(2002). The Return of Enterprise Systems: The
to analyze the current practices and the critical
Director’s Cut. Accenture Institute for Strategic
effectiveness constructs of ES in New Zealand
Change.
from the practitioners’ perspectives identified
by this study. Davenport, T. H., & Prusak, L. (1998). Working
Knowledge. Boston, Harvard Business School
Press.
reFerences
Hawking, P., Stein, A., & Foster, S. (2004). Re-
Allen, D., Kern, T., & Havenhand, M. (2002). visiting ERP systems: Benefit Realisation. Paper
ERP Critical Success Factors: An Exploration of presented at the Proceedings of the 37th Hawaii
the Contextual Factors in Public Sector Institu- International Conference on System Sciences,
tions. Paper presented at the Proceedings of the Hawaii.
35th Annual Hawaii International Conference on Hedman, J., & Borell, A. (2002). The impact of
System Sciences, 9/02, Hawaii. Enterprise Resource Planning Systems on Organi-
Bancroft, N. H., Sep, H., & Sprengel, A. (1998). zational Effectiveness: An Artifact Evaluation. In
Implementing SAP R/3 (2nd Edition ed.). Green- F. F.-H. Nah (Ed.), Enterprise Resource Planning
wich, USA: Manning Publications. Solutions & Management (p. 125-142). Hershey,
London: IRM Press.
Brehm, L., Heinzl, A., & Markus, M. L. (2001).
Tailoring ERP systems: A spectrum of choices Holland, C., & Light, B. (1999). A critical success
and their implications. Paper presented at the factors model for ERP implementation. IEEE Soft-
34th Hawaii International Conference on System ware, (May/June): 30–36. doi:10.1109/52.765784
Sciences, Hawaii. James, D., & Wolf, M. L. (2000). A Second Wind
for ERP. McKinsey Quarterly, Issue 2, 100-107.
Kumar, K., & Van Hillegersberg, J. (2000). ERP
Experiences and Evolution. Communications of the
ACM, 43(4), 23–26. doi:10.1145/332051.332063
65
Enterprise Systems in Small and Medium-Sized Enterprises
Mabert, A. M., Soni, A., & Venkataraman, M. A. Scott, J. E., & Vessey, I. (2002). Managing Risks
(2000). Enterprise Resource Planning Survey of in Enterprise Systems Implementations. Commu-
US Manufacturing Firms. Production and Inven- nications of ACM, April 2002, 45(4).
tory Management Journal, 41(2), 52–58.
Shakir, M. (2002). Current Issues of ERP Imple-
Malcolm, A. (2002). Fonterra Rents its Accounting mentations in New Zealand. [Massey University,
Application. Computerworld IDG Communica- Auckland, New Zealand.]. Research Letters in
tion Ltd., 11 July, 2002, Web page: http://www. Information and Mathematical Science, 4(1),
idg.net.nz/webhome.nsf/UNID/8433B6BCB6B 151–172.
E15FECC256BF1007BF560
Shakir, M., & Viehland, D. (2004). Business Driv-
Markus, M., & Tanis, C. (2000). The Enterprise ers in Contemporary Enterprise System Imple-
Systems Experience - From Adoption to Success. mentations. Proceedings of the Tenth Americas
In R. W. Zmud (Ed.), In Framing the Domains of IT Conference on Information Systems, New York,
Research Glimpsing the Future Through the Past 103-112.
(p. 173-207). Cincinnati: Pinnaflex Educational
Shanks, G., Seddon, P. B., & Wilcocks, L. P.
Resources, Cincinnati, USA.
(2003). Second-Wave Enterprise Resource Plan-
Nolan and Norton Institute. (2000). SAP Bench- ning Systems: Implementing for Effectiveness.
marking Report 2000. Melbourne. Cambridge University Press.
Pamatatau, R. (2002, June). The Warehouse Skok, W., & Legge, M. (2001). Evaluating En-
outsources Oracle Management. NZ Infotech terprise Resource Planning (ERP) Systems Using
Weekly, 24, 3. an Interpretive Approach. Paper presented at the
Proceedings of The 2001 ACM SIGCPR Confer-
Parr, A., & Shanks, G. (2000). A Model of ERP
ence on Computer Personnel Research, April, p.
Project Management. Journal of Information Tech-
189-197.
nology, 15(4). doi:10.1080/02683960010009051
Sumner, M. (1999). Critical Success Factors in
Pender, L. (2000). Damned If You Do: Will Inte-
Enterprisewide Information Management Systems
gration Tools Patch the Holes Left By An Unsat-
Projects. Paper presented at the 5th America’s
isfactory ERP Implementation? CIO Magazine,
Conference on Information Systems, Milwaukee,
September 15, 2000. Retrieved from http://www.
Wisconsin, USA.
cio.com/archive/091500_erp.html
Viehland, D., & Shakir, M. (2005). Making Sense
Plant, R., & Willcocks, L. (2006). Critical Success
of Enterprise Systems Implementation. Business
Factors in International ERP Implementations:
Review . University of Auckland, 7(2), 28–36.
A Case Research Approach. Working Paper Se-
ries - 145, London: Department of Information Yang, S., & Seddon, P. B. (2004). Benefits and
Systems, London School of Economics and Key Success Factors from Enterprise Systems
Political Science. Implementations: Lessons from Sapphire 2003.
Paper presented at the 35th Australasian Confer-
Sarker, S., & Lee, A. S. (2000, 13 November 2000).
ence in Information Systems. Hobart, Australia.
Using a case study to test the role of three key social
enabales in ERP implementation. Paper presented Zrimsek, B. (2002). ERPII: The Boxed Set. Re-
at the ICIS 2000, 13 November 2000 http://www. trieved Mar. 4, 2002, from www3.gartner.com/
commerce.uq.edu.au/icis/ICIS2000.html pages/story.php.id.2376.s.8.jsp
66
Enterprise Systems in Small and Medium-Sized Enterprises
This work was previously published in Handbook of Research on Enterprise Systems, edited by Jatinder N. D. Gupta, Sushil
Sharma and Mohammad A. Rashid, pp. 170-184, copyright 2009 by Information Science Reference (an imprint of IGI Global).
67
68
Chapter 1.5
A Conceptual Framework for
Developing and Evaluating ERP
Implementation Strategies in
Multinational Organizations
Kai Kelzenberg
RWTH Aachen University, Germany
Thomas Wagner
RWTH Aachen University, Germany
Kai Reimers
RWTH Aachen University, Germany
AbstrAct IntroductIon
The chapter develops generic strategies for the Market demands are becoming more and more
specification and implementation of an enterprise dynamic, forcing organizations to be flexible
resource planning (ERP) system in a multinational in order to satisfy the needs of their customers
company. After the presentation of a framework (Mabert, Soni, & Venkataramanan, 2001). At the
for categorizing companies by their global busi- same time, organizations face an ever increasing
ness orientation, ERP strategies corresponding to competition through globalization. As a result
each category are derived. Subsequently, various of both phenomena, business organizations tend
implementation strategies are developed for each to act in networks of tightly or loosely coupled
type of ERP strategy; they provide decision mak- productive units. Bartlett and Ghoshal (1998)
ers with a high degree of freedom in specifying identify four different business orientations which
an implementation strategy in accordance with a can be used to describe the structures of multi-
company’s strategic goals. The results are sum- national companies (MNCs). Starting from these
marized in a phase model; the overall approach four business orientations, this chapter presents a
is illustrated by two polar cases. conceptual framework for deriving enterprise re-
source planning (ERP) implementation strategies
DOI: 10.4018/978-1-59904-531-3.ch003
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
69
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
large producer with several distribution centers a general ERP strategy they will provide important
around the world or a federation of several pro- insights regarding the questions of when one could
ducing and distributing companies that form one speak of a global ERP strategy and how important
major company. Is it possible, referring to the it is to have one organizational entity for the whole
above mentioned authors, to call the installed company that can develop and promote the ERP
system across all members of such a unit one big strategy for all sites. In this chapter, we define an
ERP system? ERP strategy as containing the range of system
Following such a scenario, what would have to components that have to be installed in each
be done to standardize the data of each business site, as well as the interfaces and data formats in
unit in such an organization and which benefits which data transfer should be done. The chapter
would result from this effort? How far should will go on to show different generic ways how
standardization go and which areas could be to realize an ERP system according to the global
standardized in a useful manner? Moreover, who ERP strategy (ERP implementation strategy). In
should be in charge of choosing and designing an this context, the problems of tailoring an ERP
ERP system fitting to a company’s requirements system fitting the company’s requirements as
and of keeping the system up and running? Which described by Lehm, Heinzl, and Markus (2001)
organizational units have to be established to lead will be outlined. Since not all strategies require
this venture to success? different implementation strategies, some can be
Many of these questions could not be answered discussed jointly.
in a general way but they should help to consider This chapter focuses mainly on the first
the different aspects of the design process of such phase(s) of an ERP life-cycle (cf. Esteves &
a project. The presented framework tries to support Pastor, 1999, or Markus, Axline, & Tanis, 2000).
the decision makers with a structured approach Given its academic and practical attention, the
facing this task. implementation phase seems to be a crucial one
If the ERP system has been designed in ac- that motivates our focus. The consideration of all
cordance with the company’s requirements, an phases is beyond the scope of this chapter; for a
IT strategy focusing on implementation has to be comprehensive literature review of all phases, we
developed. Karimi and Konsynski (1991) state refer to Esteves and Pastor (2001).
that an IT strategy has to be derived from the
business strategy. Similarly, an ERP strategy has
to be developed which shows the long-term goals busIness orIentAtIon
to be reached by the use of an ERP system. Clem-
mons and Simon (2001) state that a misalignment In 1998, Bartlett and Ghoshal published a book
between business and ERP strategy often causes in which they describe a couple of companies and
ERP implementation delays and failures. (As will how their way of doing business differs. Based
be shown later, there is a need for a centralized on an analysis of these differences, the authors
authority which is in charge of deciding whether conclude why one firm is more successful with
a global ERP strategy is to be developed, and, if its strategy than another. They develop a frame-
so, how to enforce it within the whole company.) work consisting of four types of multinational
In the subsequent sections the work of Bartlett companies. Each type is characterized by a dis-
and Ghoshal (1998) helps to identify four differ- tinct strategy and business orientation that deals
ent types of business orientations for companies. with the allocation and interconnection of the
These are generic views which—in reality—will company’s resources. The term “resource” is not
be mixed in a number of ways, but for developing described in detail but refers to skills, personnel,
70
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
money, knowledge, and so on. Applying these system, and the interconnection of all functional
insights to the topic of this chapter, ERP systems areas. In this context it is negligible how many
should optimize the use of such resources. The functions one site will implement. That means,
different business orientations will be explained one site could just implement one module for sales
in the subsequent sections and provide the basis and distribution, while another needs production
for deriving appropriate global ERP strategies and purchasing too. The integration of the func-
which are discussed in the same sections. The tions does not differ in both cases. On the other
designer of such a system must take into account hand, HQ has to consider all local requirements
that there might be not only positive influences regarding the single sites such as local laws, lo-
on the company’s learning capabilities, but that cal accounting rules, and possibly environmental
side effects could cause changes in organizational stipulations (Krumbholz, Galliers, Coulianos,
values and norms (Butler & Pyke, 2003). Thus, & Maiden, 2000). As a consequence, the ‘how’
ERP implementation goes beyond an IT project: seems to be less complex than the ‘what’. Argu-
it needs the support of top management to enable ably, the planning process for such a system takes
the organizational rebuilding processes. longer than in other company constellations while
the implementation process could be shortened.
Global orientation From a strategic point of view, the MNC with a
global orientation could easily add new plants to
This business orientation is composed of a strong its network because it has a predefined and tested
center that makes all important decisions for the system that just has to be implemented. Besides,
whole company. The decisions made will be the MNC could realize learning curve effects
communicated to the single sites and have to be from previous implementations which should
implemented without any adjustment to local ensure the success of an implementation process
requirements. Through this process the whole at a single site.
company looks—from the customers’ point of Thus, the ERP strategy implies that all sites,
view—alike all over the globe. One implica- including HQ, get one system. In accordance
tion of this orientation is that the whole world is with this ERP strategy, a single implementation
seen as one market which will be supplied with strategy can be developed including estimated
identical products. To ensure the loyalty of each project duration, costs, and scope for the single
site, the sites’ general managers are handpicked sites (the term scope is used to mean the range of
by headquarters (HQ) to control all activities modules that should be implemented in one site).
and to implement the envisioned processes. New HQ determines the design of the system and the
processes have to be developed just once and can rollout sequence for all sites, and defines the pilot
be implemented worldwide in a short time accord- site where the system should be introduced and
ingly. The global orientation is a hub-and-spoke tested for the first time.
kind of network with strong ties of the spokes to
the hub, which is represented by HQ. International orientation
In this setting, HQ will make the decision
to implement an ERP system and what kind of In this orientation HQ partly delegates control to
software will be used. Since the idea is that all the individual sites. Local adjustments are possible
processes should be equal in all sites, the system but the main decisions regarding product policies
has to be developed just once. It can thus easily and strategies are made by HQ. Unlike the global
meet all the above mentioned requirements of orientation, the sites have the opportunity to reject
an ERP system such as one shared database, one HQ’s decisions which strengthens their position.
71
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
As a consequence, core competencies remain IT landscape, implying that the above definition
in the HQ while individual sites could develop of an overall ERP strategy is not applicable in
important business competencies too. such a context. There will be no shared database,
The ERP strategy for this business orientation neither guidelines for one system nor for the range
is similar to that of the global orientation. The of modules that should be established. Regarding
major activities are initiated and coordinated by the whole company, there is no global resource
HQ. The whole company gets one system that—in planning at all.
contrast to the global orientation—is open to ad- Another case occurs if HQ decides to imple-
justments to local requirements. For this purpose ment several modules in order to manage its
the guidelines of the whole implementation have business and satisfy its data needs. Following
to be softened. The core system is developed by that idea, interfaces, including data formats and
HQ but can be reconfigured by local sites. The forms, between the individual sites and HQ have
system has one shared database which helps to be defined. However, this scenario will still not
to collect data centrally and supports decision- meet the requirements of the definition of a global
making processes at the highest management level. ERP strategy because it focuses on HQ only and
Rollout sequence must be harmonized with regard not on the entire organization.
to the interests of the individual sites, which also A third scenario emerges when HQ can de-
includes determination of a pilot site. Due to the velop an ERP template and also has the power to
possibility of local adjustments, the complexity of implement it in the several sites. This scenario
the implementation at a single site as well as of the causes other problems regarding Bartlett and
overall process will increase. Therefore, neither Ghoshal’s definition of a multinational orientation.
the ‘what’ nor the ‘how’ seem to be that simple. Moreover, there will be no need for one shared
If we follow the idea of Huber, Alt, and Österle database or integration of all functional areas
(2000), the use of templates could simplify the because every site manages its own operations.
implementation process and allow the creation of The production line, customers, and suppliers
a standardized way to adjust the system locally. differ from each other. A single database has no
additional benefit for the organization. The only
multinational orientation part of an ERP system that could unite the several
sites is finance, which has to be done in some way
In this orientation the single subsidiaries are by HQ as it acts as a kind of portfolio manager.
loosely coupled to the center. Following the ex- Apparently there will be no fit between a mul-
planations of Bartlett and Ghoshal (1998), every tinational orientation and a global ERP strategy
site is doing business under its own responsibility. if there are no exceptions allowed regarding our
The main strategic focus is differentiation and definition. At that point, the decision makers in
adjustment to local requirements. Because of this kind of MNC have to think about the need for
the absent link between several company sites, an ERP system. Who will benefit from a shared
each site creates its own data and knowledge. database? The answer to that question is fairly
Regarding the definition of a global ERP strategy easy: no one, because each site acts indepen-
given above, the question whether a company dently and reacts to different countries’ markets
has a global ERP strategy or not will have to be and customers, and deals with different products.
assessed based on the power and position of HQ. Possibly, there is no need for some subsidiaries
One possibility is that HQ has no influence over to implement a fully integrated software package
the individual sites. This can mean no influence because of their small size. A globally defined
over any guidelines at all, especially regarding the ERP system will not meet the local requirements
72
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
if there are no major adjustments to the system. Sites that have few local resources or capabilities
Thus, the ERP strategy could consist of just a (competencies) but operate in an important local
minimum—that is, the data connection between market (environment) are labeled black holes. In
the individual sites and HQ in the second scenario contrast, a site that has strong competencies but
described above. Another ERP strategy could be operates in a rather unimportant market is called
that HQ is in charge of supporting implementation contributor (Bartlett & Ghoshal, 1998).
of ERP systems in each site that should connect Because of the specific structure of a trans-
with HQ. Sites will retain their independence national organization, it is unclear who can start
because only the use of any system is dictated, but the initiative for an ERP strategy. People work
neither the system vendor nor the way it will be together on a voluntary basis and the subsidiar-
implemented is centrally prescribed. According to ies can implement and use business practices as
Markus, Tanis, & van Fenema (2000), this strategy they want. Regarding the roles described above,
could lead to a complete disaster for individual it may be argued that the strategic leader has the
sites because there are no learning curve effects, competencies to develop an ERP strategy and
while the possibility of repetition of errors that can might convince other firms in the organization
be made within the ERP implementation is real. to take part in this venture. As soon as some sites
The implementation strategy can be simple implement a jointly developed system, a kind of
because only data formats and forms have to be domino effect could start so that ultimately every
defined which are used for data exchange with HQ. site in the network will join in the ERP project.
Obviously, sites labeled black holes should have
transnational orientation a major interest in advancing their abilities. A
common and integrated database across all sub-
The transnational orientation describes an in- sidiaries—that is the accumulated knowledge of
tegrated network of business units. No site nor individual sites stored in a shared database—will
center has overall control of decisions and strate- be a source for weaker companies to learn in an
gies. Moreover, each site’s general manager has easy and inexpensive way from the experience of
the opportunity to cooperate on each level or in other network participants.
each functional area with other sites. The initiative Thus, the ERP strategy includes the freedom
for such actions can come from the needs of the of module choice and implementation approach
firm at that moment. Bartlett and Ghoshal (1998) in the single sites of the network. The initiative
write about cooperation in research areas and in could be started by a strategic leader with core
developing common business processes in order to competencies in one area, while other design
illustrate the principle of the transnational orienta- processes could be delegated to other sites which
tion. Moreover, they identify different roles which have competencies in a special area. However,
a single site can play. A role depends on the site’s all activities have to be coordinated within this
position along two dimensions: (1) how important network which is a difficult task because there is,
is the site’s national or local environment to the by definition, no HQ or center within this business
firm’s strategy, and (2) what competencies does orientation. The strategy must contain the pos-
the site have? If both dimensions indicate high sibility to use individual parts of the ERP system
levels, then the site will act as a strategic leader in any way and in any combination at each site.
in the network of business units. Otherwise, for
example when a site scores low on each dimen-
sion, the site will be a so-called implementer.
73
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
74
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
transnational organizations or international busi- is done should the standardization process start.
ness orientations. Otherwise existing business advantages could
disappear because of a misalignment between stan-
Mixed-Mode Implementation dardized processes and enterprise requirements.
Standardization could aim at the system/processes,
Mixed-mode implementation dilutes the global the data/data formats, and/or the organizational
rollout and local implementation orientations. structure of sites. The degree of standardization
On the one hand, data must be harmonized to depends on the combination of the three items
generate global economies of scale. On the other mentioned and their characteristics.
hand, there will be a high degree of freedom to If the ERP software is specified, this also
choose an ERP system according to local demands includes business processes according to the
which fits the individual site. These two aspects vendor’s experiences with other ERP implemen-
result most likely in standardization of interfaces tations. Using the same system thus means to
among sites, while hosting and administration introduce similar processes which could be cus-
of the systems remains the responsibility of the tomized by the purchaser. A major advantage of
individual sites. Assuming the transnational this approach lies in the pre-specified interfaces
organization operates in a single industry, there which interconnect the individual system modules.
might be similar processes and data which could Data exchange should thus be easily established.
be joined within a kind of template. By generat- On the other side, there might not be an ideal
ing best-practice solutions, the single sites could alignment between system and site in the case
upgrade their position within the organization and of heterogeneous business processes among the
their market. The template has to grow and evolve different sites (Mabert et al., 2001). The tailoring
over the whole process and so will the degree of of an ERP system and its consequences for the
complexity. This includes the monitoring of new implementation should be considered within the
processes added to the template which might have whole project plan—that is, right at the outset of
side effects or offers new opportunities to already the system design process. There are standard-
finished ERP implementations. This could mean ized process manuals developed by IEEE that
the need to conduct a further project to restructure can be used for this process (Fitzgerald, Russo,
the site or its ERP system to participate in new & O’Kane, 2003).
system settings. Thereby, boundaries of a single Data and data format standardization imply that
ERP blur, implying that the allocation of costs there will be interface specifications that enable
regarding a single ERP implementation becomes data flow between different systems. Besides, the
more difficult for finance and cost accounting. prescribed data formats guarantee an integrated
The mixed-mode orientation would also fit view on all sites on a common basis. As mentioned
a holding company that has to cope with a net- before, that might be limited to data in finance
work of different sites or groups of sites which and accounting departments.
constitute one or more of the above mentioned If the system/processes and/or the data/data
business directions. formats are standardized, some sites in an orga-
nization have to change their processes according
scope of standardization to these specifications. Therefore, departments,
mode of operations, and hierarchical power may
Davenport (1998) advised that an organization have to be changed too. This has to be taken into
must analyze its business to find out about its consideration regarding the expected implemen-
unique business processes. Not until this step tation duration.
75
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
76
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
77
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
egy. In order to evaluate the ERP implementation In the following, the three phases are—by way
strategy after an implementation orientation is of example—illustrated by the two polar cases
chosen, we distinguish three phases: intelligence global rollout and local implementation.
phase, implementation phase, and evaluation
phase. In the first phase, the scope of standardiza- Global rollout
tion is set by HQ which could have major effects
on project duration and costs. If this phase is Intelligence Phase
planned and executed well, it just has to be done
once in the ERP project. In the second phase, there First, there is a scanning phase which comprises
is the choice among a big bang or phased imple- the collection of important information regarding
mentation approach. To analyze this phase in more established business processes, needed data/data
detail, there are other models such as those by formats, interfaces, subsystems, national regula-
Markus and Tanis (2000) or Somers and Nelson tion, and so on. Once this information is gathered,
(2004) who divided the single implementation it is used by a strong moderator (most likely HQ)
into several other phases. Due to the disregard of to generate a template. The moderator identifies
an organization’s business orientation, this view core processes, adjusts these processes to unify
seems to be too limited because the effects on the them, and therefore defines the template’s core
ERP strategy are not considered. The data that processes. The template covers approximately
were collected in the implementation phase must 80-90% of all business processes (Umble et al.,
be analyzed in the third, evaluation phase. After 2003). This could be a time-consuming and ex-
the experiences of prior implementations, the pensive process depending on the number and the
sequence of future implementations could be heterogeneity of sites. Furthermore, this process
rearranged. Depending on the outcomes of this becomes more complicated if the sites are located
phase, the intelligence phase might have to be in different cultural areas (Davison, 2002; Soh,
revised. This model should enable an organization Sia, & Tay-Yap, 2000). Subject to their strategic
to plan its ERP strategy and incorporate learning meaning or role, not all sites have the same stake
effects. in this process.
78
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
Once the template is generated, the actual global In this phase each site has to be examined by
rollout can begin. The usage of the template may local management. The result could be a fully
cause a business process redesign within the sites, customized ERP system, only obeying the con-
but still grants an adaptation to local requirements straints mentioned above. Of course, every single
in the range of 10-20%. Resistance to change implementation bears the same risks of failure.
should be low because all sites were participants Meeting the requirements of the single site will
of the process producing the template. As there increase this phase’s time and money require-
is only limited potential for customization, the ments. Afterwards the system is well tailored to
duration of the implementation phase should be the individual site, but each implementation will
significantly shorter than of the intelligence phase. repeat the whole process over and over again.
The subsequent evaluation phase helps the or- The outcome of the evaluation phase depends on
ganization to improve its project management the kind of implementation procedure. If there
skills and therefore to reduce the time needed to was a bin bang (all sites at one time) approach,
introduce the template into further sites. Mean- no learning effects would be realized and the
while, the sequence of ERP implementations is result of the implementation process might be
checked, for example with regard to excellent unpredictable. If it was a phased implementation,
project management techniques and a well-built learning effects can be realized through “reuse” of
template, so that strategically important sites are processes or parts which could shorten the time
served first. for the next implementation phase.
Figure 2 shows a schematic demonstration
local Implementation of how the allocation of time and money could
differ in the two approaches. We propose these
Intelligence Phase curve progressions because of the above men-
tioned arguments that a global rollout starts with
In contrast to global rollout, only the information a high budget in the intelligence phase to create a
needs of HQ are relevant. After identifying the template, but could reduce implementation costs
important data which every site has to deliver, HQ because of the repetition and learning effects from
determines the data, data formats, and interfaces using the same process over and over again. On the
for interconnection within the structure. This dif- other hand, the costs of the local implementation
fers from the template because it is not a finished start on a low level and increase over the course
system that could be easily implemented in each of the project.
site; instead it creates constraints and demands to
them for their implementation or data support. It
is imaginable that HQ uses the collected data for conclusIon
performance comparison of each site. To reduce
information asymmetries or simplify compari- Implementation of an ERP system possibly takes
son, channels of data interchange may have to years and cost millions (Mabert et al., 2001).
be standardized. Therefore, organizations must manage this process
very carefully. Some approaches try to forecast
79
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
the success of such a step (Magnusson & Nilsson, on the structure of a corporation. The structure of
2004) and distinguish between several dimen- an organization or the orientation of an MNC was
sions. Only rarely, the implied ERP implementa- considered as fixed and given. However, as we
tion strategy of such an organization method is mentioned in the section ‘Changing the Business
mentioned or examined. The exploration of the Orientation’, it could be one of top management’s
relationship between business strategy and—as objectives to use an ERP implementation process
recommended—the derived ERP implementation strategically. This strategic use would imply that
strategy can help: the implementation (process) of ERP systems
has a strong effect on organizations. It would
a. Management to detect and identify the ef- also raise the question whether ERP systems can
fects of the choice of an ERP strategy, and achieve such changes in structure by themselves
b. IT departments (e.g., represented by a CIO) or whether they act as a facilitator only. In the first
to explain the complexity and thus the re- case, the ERP project becomes more complex and
quired support by top management to lead challenging for both top management and project
a (successful) ERP implementation in their management. In the latter one, top management
organization. must consider additional measures which enable
the ERP project to reach the intended change or
The framework developed in this chapter measures that are supported by the ERP project.
gives hints regarding important considerations Top management as well as project management
and possible pitfalls in planning a global ERP must bear in mind that those additional measures
implementation process. Based on these insights can also have negative side effects on each other.
the presented model can help to monitor, control, What kind of measures would be appropriate,
and adjust the derived ERP strategy in order to meet how they support ERP projects and how they are
management’s expectations of the ERP system. supported by such projects, and in what useful
combinations they can be applied are interesting
questions for future research. Furthermore, if
Future trends And one allows for intentional effects of ERP imple-
reseArcH dIrectIons mentation processes on corporate structure, it
becomes necessary to address the question of
In this chapter we implicitly assumed that the unintended effects. These will not only regard
implementation of an ERP system has no effects ERP implementation processes in corporations
80
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
that are actively trying to change their structures, Butler, T., & Pyke, A. (2003). Examining the
but also ERP projects in fixed structures which influence of ERP systems on firm-specific knowl-
were discussed in this chapter. However, we did edge and core capabilities: A case study of SAP
not discuss the implications of unintended effects implementation and use. In Proceedings of the 11th
on ERP implementation processes due to limitation European Conference on Information Systems.
of space and reasons of complexity. The model
Clemmons, S., & Simon, J. S. (2001). Control
presented in this chapter allows for enhancement
and coordination in global ERP configuration.
by future work and research.
Business Process Management Journal, 7(3),
205–215. doi:10.1108/14637150110392665
AcknoWledGment Davenport, T. H. (1998). Putting the enterprise into
the enterprise system. Harvard Business Review,
The authors would like to thank the editors and 76(4), 121–131.
anonymous reviewers for their useful comments
Davison, R. (2002). Cultural complications
and suggestions. Furthermore, the authors would
of ERP. Communications of the ACM, 45(7),
like to thank Guido Schryen of RWTH Aachen
109–111. doi:10.1145/514236.514267
University for his help in editing this chapter.
Earl, M. J. (1993). Experience in strategic infor-
mation systems planning. MIS Quarterly, 17(1),
reFerences 1–24. doi:10.2307/249507
Akkermanns, H., & van Helden, K. (2003). Vi- Esteves, J., & Pastor, J. (1999). An ERP lifecy-
cious and virtuous cycles in ERP implementation. cle-based research agenda. Proceedings of the
European Journal of Information Systems, (11): International Workshop on Enterprise Manage-
35–46. ment Resource Planning Systems (EMRPS) (pp.
359-371), Venice, Italy.
Bancroft, N., Sprengel, A., & Seip, H. (1996).
Implementing SAP R/3: How to introduce a large Esteves, J., & Pastor, J. (2001). Enterprise resource
system into a large organization. Englewood planning systems research: An annotated bibliog-
Cliffs, NJ: Prentice Hall. raphy. Communications of the AIS, 7(8), 1–52.
Bartlett, C. A., & Ghoshal, S. (1998). Manag- Esteves, J., Pastor, J., & Casanovas, J. (2002).
ing across borders—The transnational solution. Monitoring business process redesign in ERP
Boston: Harvard Business School Press. implementation projects. Retrieved April 13, 2007,
from http://coblitz.codeen.org:3125/citeseer.ist.
Bingi, P., Sharma, M. K., & Godla, J. K. (1999). psu.edu/cache/papers/cs/31804/http:zSzzSzwww.
Critical issues affecting an ERP implementation. lsi.upc.eszSz~jesteveszSzBPR_amcis2002.PDF/
Information Systems Management, 16(3), 7–14. esteves02monitoring.pdf
doi:10.1201/1078/43197.16.3.19990601/31310.2
Firestone, J. M. (2002). Enterprise information
Brown, C. V., & Vessey, I. (2000). NIBCO’S portals and knowledge management. Boston:
“big bang.” In Proceedings of the International Butterworth-Heinemann.
Conference on Information Systems.
81
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
Fitzgerald, B., Russo, N. L., & O’Kane, T. (2003). Koch, C. (2001). BPR and ERP: Realizing
Software development method tailoring at Mo- a vision of process with IT. Business Pro-
torola. Communications of the ACM, 46(4), 65–70. cess Management Journal, 7(3), 258–265.
doi:10.1145/641205.641206 doi:10.1108/14637150110392755
Ghosh, S., & Ghosh, S. (2003). Global implemen- Krumbholz, M., Galliers, J., Coulianos, N.,
tation of ERP software—Critical success factors on & Maiden, N. A. M. (2000). Implementing
upgrading technical infrastructure. In Proceedings enterprise resource planning packages in dif-
of the International Engineering Management ferent corporate and national cultures. Journal
Conference—Managing Technologically Driven of Information Technology, 15(4), 267–279.
Organizations: The Human Side of Innovation doi:10.1080/02683960010008962
and Change (pp. 320-324).
Lehm, L., Heinzl, A., & Markus, L. M. (2001).
Gunson, J., & de Blais, J.-P. (2002). Implement- Tailoring ERP systems: A spectrum of choices and
ing ERP in multinational companies: Their their implications. In Proceedings of the 34th Ha-
effects on the organization and individuals at waii International Conference on Systems Science.
work. Retrieved April 13, 2007, from http://
Light, B. (1999). Realizing the potential of ERP
www.hec.unige.ch/recherches_publications/
systems: The strategic implications of imple-
cahiers/2002/2002.07.pdf
menting an ERP strategy: The case of global
Holland, C. P., & Light, B. (1999). A critical suc- petroleum. Electronic Markets, 9(4), 238–241.
cess factors model for ERP implementation. IEEE doi:10.1080/101967899358914
Software, 16(3), 30–36. doi:10.1109/52.765784
Light, B. (2005). Potential pitfalls in packaged
Holland, C. P., Light, B., & Gibson, N. (1998). software adoption. Communications of the ACM,
Global enterprise resource planning implementa- 48(5), 119–121. doi:10.1145/1060710.1060742
tion. In Proceedings of the Americas Conference
Luo, W., & Strong, D. M. (2004). A framework
on Information Systems.
for evaluating ERP implementation choices. IEEE
Hong, K.-K., & Kim, Y.-G. (2002). The critical Transactions on Engineering Management, 51(3),
success factors for ERP implementation: An 322–333. doi:10.1109/TEM.2004.830862
organizational fit perspective. Information &
Mabert, V. A., Soni, A., & Venkataramanan, M.
Management, 40, 25–40. doi:10.1016/S0378-
A. (2001). Enterprise resource planning: Com-
7206(01)00134-3
mon myths versus evolving reality. Business
Huber, T., Alt, R., & Österle, H. (2000). Tem- Horizons, 44(3), 69–76. doi:10.1016/S0007-
plates—Instruments for standardizing ERP sys- 6813(01)80037-9
tems. In Proceedings of the 33rd Annual Hawaii
Madapusi, A., & D’Souza, D. (2005). Aligning
International Conference on System Sciences.
ERP systems with international strategies. Infor-
Karimi, J., & Konsynski, B. (1991). Globalization mation Systems Management, 22(1), 7–17. doi:1
and information management strategies. Journal 0.1201/1078/44912.22.1.20051201/85734.2
of Management Information Systems, 7(4), 7–26.
82
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
Magnusson, J., & Nilsson, A. (2004). A conceptual Scheer, A.-W., & Habermann, F. (2000). Making
framework for forecasting ERP implementation ERP a success. Communications of the ACM,
success. In Proceedings of the International 43(4), 57–61. doi:10.1145/332051.332073
Conference on Enterprise Information Systems
Scott, J. E. (1999). The FoxMeyer Drug’s bank-
(pp. 447-453).
ruptcy: Was it a failure of ERP? In Proceedings
Markus, L. M., Axline, S., Petrie, D., & Tanis, C. of the Association for Information Systems 5th
(2000). Learning from adopters’ experiences with Americas Conference on Information Systems.
ERP: Problems encountered and success achieved.
Soh, C., Sia, S. K., & Tay-Yap, J. (2000). Cultural
Journal of Information Technology, 15(4), 245–
fits and misfits: Is ERP a universal solution?
265. doi:10.1080/02683960010008944
Communications of the ACM, 43(4), 47–51.
Markus, L. M., Tanis, C., & van Fenema, P. C. doi:10.1145/332051.332070
(2000). Enterprise resource planning: Multisite
Somers, T. M., & Nelson, K. G. (2004). A taxono-
ERP implementations. Communications of the
my of players and activities across the ERP project
ACM, 43(4). doi:10.1145/332051.332068
life cycle. Information & Management, 41(3),
Markus, M. L., & Tanis, C. (2000). The enterprise 257–278. doi:10.1016/S0378-7206(03)00023-5
systems experience—From adoption to success.
Sumner, M. (2000). Risk factors in en-
In R.W. Zmud (Ed.), Framing the domains of IT
terprise-wide/ERP projects. Journal
research: Glimpsing the future through the past
of Information Technology, 15, 317–327.
(pp.173-207). Cincinnati, OH: Pinnaflex Educa-
doi:10.1080/02683960010009079
tional Resources.
Umble, E. J., Haft, R. R., & Umble, M. M. (2003).
Ng, J. K. C., Ip, W. H., & Lee, T. C. (1999). A
Enterprise resource planning: Implementation
paradigm for ERP and BPR integration. Inter-
procedures and critical success factors. Euro-
national Journal of Production Research, 37(9),
pean Journal of Operational Research, 146(2),
2093–2108. doi:10.1080/002075499190923
241–257. doi:10.1016/S0377-2217(02)00547-7
O’Leary, D. E. (2000). Enterprise resource
Ward, J., Griffiths, P., & Whithmore, P. (1990).
planning systems: Systems, life cycle, electronic
Strategic planning for information systems.
commerce and risk. Cambridge, UK: Cambridge
Chicester: John Wiley & Sons.
University Press.
Oliver, D., & Romm, C. (2002). Justifying en-
terprise resource planning adoption. Journal
AddItIonAl reAdInG
of Information Technology, 17(4), 199–213.
doi:10.1080/0268396022000017761 Adam, F., & O’Doherty, P. (2000). Lessons from
Reimers, K. (1997). Managing information tech- enterprise resource planning implementations in
nology in the transnational organization: The po- Ireland—Towards smaller and shorter ERP proj-
tential of multifactor productivity. In Proceedings ects. Journal of Information Technology, 15(4),
of the 30th Annual Hawaii Conference on System 305–316. doi:10.1080/02683960010008953
Sciences. Bakos, Y. (1986). Information technology and
corporate strategy: A research perspective. MIS
Quarterly, 10(2), 106–119. doi:10.2307/249029
83
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
Biehl, M. (2007). Success factors for imple- Hanseth, O., & Braa, K. (1998). Technology as a
menting global information systems. Com- traitor: Emergent SAP infrastructure in a global
munications of the ACM, 50(1), 53–58. organization. In R. Hirscheim, M. Newman, &
doi:10.1145/1188913.1188917 J.I. DeGross (Eds.), Proceedings of the 19th In-
ternational Conference on Information systems
Chien, S.-W., Hu, C., Reimers, K., & Lin, J.-S.
(pp. 188-197).
(2007). The influence of centrifugal and centrip-
etal forces on ERP project success in small and Henderson, J., & Venkatraman, N. (1999). Stra-
medium-sized enterprises in China and Taiwan. tegic alignment: Leveraging information technol-
International Journal of Production Economics, ogy for transforming organizations. IBM Systems
107(2), 380–396. doi:10.1016/j.ijpe.2006.10.002 Journal, 38(2&3), 472–484.
Dowlatshahi, S. (2005). Strategic success fac- Huang, S. M., Hung, Y. C., Chen, H. G., & Ku,
tors in enterprise resource planning design and C. Y. (2004). Transplanting the best practice for
implementation: A case-study approach. Inter- implementation of an ERP system: A structured
national Journal of Production Research, 43(18), inductive study of an international company.
3745–3771. doi:10.1080/00207540500140864 Journal of Computer Information Systems, 44(4),
101–110.
Fleisch, E., Österle, H., & Powell, S. (2004). Rapid
implementation of enterprise resource planning Ioannou, G., & Papadoyiannis, C. (2004). Theory
systems. Journal of Organizational Comput- of constraints-based methodology for effective
ing and Electronic Commerce, 14(2), 107–126. ERP implementations. International Journal of
doi:10.1207/s15327744joce1402_02 Production Research, 42(23), 4927–4954. doi:1
0.1080/00207540410001721718
Gattiker, T., & Goodhue, D. (2005). What hap-
pens after ERP implementation: Understanding King, W. (2006). Ensuring ERP implementation
the impact of inter-dependence and differentiation success. Information Systems Management, 22(3),
on plant-levels outcome. MIS Quarterly, 29(3), 83–84. doi:10.1201/1078/45317.22.3.20050601/
559–585. 88749.11
Ghoshal, S., & Bartlett, C. (2001). The multi- Krumbholz, M., & Maiden, N. (2001). The
national corporation as an interorganizational implementation of enterprise resource planning
network. Academy of Management Review, 15(4), packages in different organisational and national
603–625. doi:10.2307/258684 cultures. Information Systems, 26(3), 185–204.
doi:10.1016/S0306-4379(01)00016-3
Gosain, S. (2004). Enterprise information systems
as objects and carriers of institutional forces: The Lall, V., & Teyarachakul, S. (2006). Enterprise
new iron cage? Journal of the Association for resource planning (ERP) system selection: A data
Information Systems, 5(4), 151–182. envelopment analysis (DEA) approach. Journal of
Computer Information Systems, 47(1), 123–127.
Grossman, T., & Walsh, J. (2004). Avoiding the
pitfalls of ERP system implementation. Informa- Luftman, J., Lewis, P., & Oldach, S. (1993).
tion Systems Management, 21(2), 38–42. doi:10. Transforming the enterprise: The alignment of
1201/1078/44118.21.2.20040301/80420.6 business and information technology strategies.
IBM Systems Journal, 32(1), 198–221.
84
A Conceptual Framework for Developing and Evaluating ERP Implementation Strategies
Mahato, S., Jain, A., & Balasubramanian, V. Reimers, K. (2003). International examples of
(2006). Enterprise systems consolidation. Infor- large-scale systems—Theory and practice: Imple-
mation Systems Management, 23(4), 7–19. doi: menting ERP systems in China. Communications
10.1201/1078.10580530/46352.23.4.20060901 of the AIS, 11, 335–356.
/95108.2
Ribbers, P., & Schoo, K.-C. (2002). Program man-
Ng, C., Gable, G., & Chan, T. (2003). An ERP agement and complexity of ERP implementations.
maintenance model. In Proceedings of the 36th Ha- Engineering Management Journal, 14(2), 45–52.
waii International Conference on System Sciences.
Somers, T., & Nelson, K. (2003). The impact of
Parr, A., & Shanks, G. (2000). A model of strategy and integration mechanisms on enterprise
ERP project implementation. Journal of system value: Empirical evidence from manufac-
Information Technology, 15(4), 289–303. turing firms. European Journal of Operational
doi:10.1080/02683960010009051 Research, 146(2), 315–338. doi:10.1016/S0377-
2217(02)00552-0
Rathnam, R. G., Johnsen, J., & Wen, H. J.
(2004/05). Alignment of business strategy and IT Teltumbde, A. (2000). A framework for evalu-
strategy: A case study of a Fortune 50 financial ating ERP projects. International Journal of
service company. Journal of Computer Informa- Production Research, 38(17), 4507–4520.
tion Systems, 45(2), 1–8. doi:10.1080/00207540050205262
Reich, B., & Benbasat, I. (1996). Measuring the Voordijk, H., Van Leuven, A., & Laan, A. (2003).
linkage between business and information tech- Enterprise resource planning in a large construc-
nology objectives. MIS Quarterly, 20(1), 55–81. tion firm: Implementation analysis. Construction
doi:10.2307/249542 Management and Economics, 21(5), 511–521.
doi:10.1080/0144619032000072155
This work was previously published in Enterprise Resource Planning for Global Economies: Managerial Issues and Chal-
lenges, edited by Carlos Ferran and Ricardo Salim, pp. 37-54, copyright 2008 by Information Science Reference (an imprint
of IGI Global).
85
86
Chapter 1.6
Integrated Research and
Training in Enterprise
Information Systems
Chen-Yang Cheng
Penn State University, USA
Vamsi Salaka
Penn State University, USA
Vittal Prabhu
Penn State University, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Integrated Research and Training in Enterprise Information Systems
EIS systems such as Enterprise Resource Plan- tion (CMEI) at the Penn State University focuses
ning (ERP), Customer and Supplier Relationship on training students and working professional
Management (CRM and SRM), and Manufac- in EIS and related enterprise integration issues.
turing Execution Systems (MES). It is widely Further, as part of research at CMEI, projects
accepted that EIS deliver great rewards, but the are undertaken to study the information system
risks these systems carry are equally important. infrastructure for planning in Small Manufactur-
If an organization rolls out an EIS without ana- ing Enterprise (SME). These projects were aimed
lyzing the business implications, the logic of the at improving the operations management for
system may conflict with the logic of the business SMEs with the help of Information Technology
(Subramanian & Hoffer, 2005). This may result (IT). We found many avenues for improvement
in failure of implementation, wasting vast sums both in operations management and information
of money, and weakening important sources of systems, but there were barriers in implementing
organization’s competitive advantage. such projects. These barriers vary from capital
Prior research has investigated and identified and complexity of the systems to human inertia
the critical factors that influence the successful to change. But the key barrier we noticed among
implementation of EIS. Education and training SMEs is the lack of tools or expertise for handling
of employees on EIS is one of the most widely the EIS software. Most of the EIS software avail-
recognized factors (Umble & Haft, 2003) (H. able requires extensive training for its use and
Hutchins, 1998; Ptak & Schragenheim, 2000) maintenance. SMEs cannot afford this training
(Laughlin, 1999). EIS implementation requires the as it involves hiring specialized engineers and
knowledge of the employees to smoothly carry on consultants. Based on our experience with SMEs
the business process and further solve problems and to reduce training costs for EIS deployment
that arise from the new system. Even with good in large manufacturing enterprises, we developed
technical assistance, the complete potential of EIS a rollout plan which encompasses the different
cannot be realized without employees having an settings in an organization that employees use
appreciation of the capabilities and limitations of EIS. The important stages that we identified are
the system (Somers & Nelson, 2001). To make the the Modeling, Planning, Simulation, Integration,
employee training successful, it is agreed that it Execution and Control. We developed prototype
should start early, preferably well before the rollout software for each stage that emulates the func-
of EIS begins. The upper management in large tionalities of typical organizational software.
manufacturing enterprises often underestimate In the following sections, we present an overall
the level of education and training necessary to view of our rollout plan and then elaborate on
implement EIS and as well as its associated costs. the individual stages. In this work, our focus has
It has been suggested that reserving 10–15% of been mostly centered on information systems that
the total EIS implementation budget is a good are typical in manufacturing organizations, but it
practice to ensure the employees receive enough can be readily extend to other industry segments.
training (McCaskey & D. Okrent, 1999) (Umble
& Haft, 2003). With the estimated budgets for
implementing EIS in billions of dollars the cost rollout PlAn For
of training the employees on these systems is a trAInInG In enterPrIse
very sizeable portion (Hong & Kim, 2002). These InFormAtIon systems
costs can be brought down if the employees have a
prior education and training on EIS. Hence, at the The rollout plan developed for training in EIS was
Center for Manufacturing and Enterprise Integra- modeled to follow the different stages that a new
87
Integrated Research and Training in Enterprise Information Systems
88
Integrated Research and Training in Enterprise Information Systems
computing to solve computational prob- important to train the users of an EIS system in
lems in manufacturing. For training pur- enterprise modeling to familiarize them with the
poses, we implemented the RFID-based organization’s business process and provide an
Manufacturing Execution System (MES) understanding of how EIS software drives the
for updating the cutting tool information business process. For the purpose of training
in real-time and built a library for distrib- and conducting related research we developed
uted computing (Cheng & Prabhu, 2007a,, an Integrated Decision Support (IDS) framework
2007b,, 2007c). by enriching the interfaces in Microsoft Visio®
for more specific data collection and modeling
requirements. The customized environment is
enterPrIse modelInG shown in Figure 2.
There exists a number of enterprise modeling
There is a general lack of documentation and stan- techniques employed in the industry and are
dardization of business processes in organizations. discussed by (Kamath, Dalal, Chaugule, Sivara-
This lack of documentation leads to inconsistent man, & Kolarik, 2003). We support a wide range
formats and data. The flow of documents is often of them in IDS for the following reasons: A par-
not clear, leading to gaps in these processes. For ticular modeling tool can be better suitable for
implementation of information systems, it is very expressing a part of the problem; and different
important that an organization has standardized users can have their own preference and comfort
business processes. Enterprise modeling facili- with a particular modeling tool. In one of the case
tates the understanding of business processes and studies we conducted with this tool, we were able
relations that exist within and across the various to work with a defense and aerospace organization
departments of an organization (Kamath, Dalal, to capture their business process and IT infra-
Chaugule, Sivaraman, & Kolarik, 2003). It is structure to identify the requirements for enterprise
89
Integrated Research and Training in Enterprise Information Systems
integration. Further, we were able to evaluate the business model as quickly as possible and in
various available integration choices collabora- as much detail as desired by the user. Once the
tively based on the estimates of cost and complex- business model is captured, it can be simulated
ity. The detailed functioning of IDS along with and desired metrics can be analyzed. The user
the case study is presented in a related work can then iteratively change planning policies
(Salaka & Prabhu, 2006). and quantitative variables of the model, add and
remove components to gain insights under dif-
ferent scenarios. S2S is implemented in object
PlAnnInG And sImulAtIon oriented programming language on the Microsoft
.Net platform. The simulation is executed by hav-
One of the most common information system ing objects, representing business components
deployments in manufacturing is for identifying interacting with each other. Using the develop-
planning requirements. These systems maintain ment interface, business models can be created,
order status and explode it into material and op- modified, saved and merged.
erational requirements based on bill of materials. S2S is currently being used in an academic
Further, these systems act as a bookkeeping tool setting to educate and train students in simulation
and are linked to accounting. Simulation allows for evaluating various planning policies in manu-
the quantitative analysis of the operation policies facturing systems. Further, it has been an attractive
made in the planning phase. As computing power tool for SMEs who lack the capital, experience,
becomes inexpensive, using software simulation and expertise in using other commercial simula-
for analysis is becoming much widely acceptable. tion tools. We demonstrated the use of S2S in
In general the planning phase is strongly tied with SMEs by a case study performed in a wood
simulation where the feasibility and the success of manufacturing enterprise. The details of the case
the proposed plans are evaluated by the developed study are presented in a related work (Salaka,
simulation models. We developed a Sensors to Mehta, & Prabhu, June 2005).
Supplier (S2S) tool that enables both planning
and simulation in manufacturing systems with
their complex structure and behavior. A brief enterPrIse InteGrAtIon
description of the S2S tool is presented in the
following section. Enterprise integration (EI) is creating new business
solutions by effectively utilizing the capabilities
sensor to supplier Planning of existing software applications by allowing
and simulation tool rapid movement of information between them.
EI is strategically important for improved busi-
The S2S simulation tool contains a rich library of ness process management. The market for EI was
components that can be configured to represent valued at $8.3 Billion for the year 2004-2005 and
a particular business. The components support was expected to grow 20% during the year 2005-
different policies and, the user controls decision- 2006 (Salaka & Prabhu, 2006), which indicates
making rules and the quantitative variables. Apart the emphasis on integration in the industry. The
from that, the tool provides an interactive and knowledge of enterprise integration is an essential
intuitive user interface for model development part of training on EIS software for students and
and performance analysis. The elements of the organizational employees to make them realize
modeling tool and their function are shown in the potential of integrated enterprises. As part of
Figure 3. The objective of the tool is to capture our rollout plan, we train students on the con-
90
Integrated Research and Training in Enterprise Information Systems
temporary standards and techniques in EI. The from the source to the tables and columns of the
training plan on integration includes familiarizing destination database. Currently, Schema Lens is
the undergraduate students with typical XML being used as a test bed for a PhD student’s work.
features that are supported currently by most of
the industry software for data integration. For
this, we demonstrate the XML features that are control oF mAnuFActurInG
in Microsoft Office® software and how these systems
features can be used in migrating data between
software applications. Figure 4 shows one of The general idea of control is to use feedback
the demonstrations to the students as part of the mechanism from sensor to adjust a system to
training. For research purposes and acquaint obtain desired results. In a manufacturing sys-
students industry standard integration software, tem, the feedback from shop floor can improve
we developed Schema Lens data level integration business decisions. We developed RFID-based
software, which is described next. Manufacturing Execution System for the purpose
of training and related research in latest advances
schema lens of manufacturing control with the advent of RFID
technology. The current system is modeled to ad-
Figure 5 shows the framework of the software. dress the tool management issues in machining.
Schema Lens transfers the data from a legacy Further, to demonstrate the importance of having
system to a production system extracting schema faster solution frameworks that can take advantage
and data as an XML file from the source database of large data generated from RFID technology
using a Java® application. The front end for the in manufacturing control, we built PennDiCon,
application is a web browser. The browser con- a library for distributed computing. In the fol-
nects to a web application residing in a web server. lowing sections, we detail the functioning of the
Further the web server contacts the destination above system.
database and enables the mapping XML data
91
Integrated Research and Training in Enterprise Information Systems
rFId-based manufacturing tool is attached with a RFID tag that records the
execution system tool’s usage time, preset data (projection, edge
radius, and effective diameter), and operation
Figure 6 illustrates the RFID-based Manufacturing data (speeds, feeds and depth of cut). When the
Execution System framework for tool manage- tool is attached to the spindle, the RFID reader
ment. Each Computer Numerical Control (CNC) on the CNC machine is configured to read the
92
Integrated Research and Training in Enterprise Information Systems
data from the RFID tags. The purpose of this trAnsActIon In enterPrIse
avoids all sources of potential data entry error, InFormAtIon system
tool offsetting errors and possible tool crashes.
After the completion of each operation, the RFID A business transaction is a process that has two
encoder on the CNC machine is programmed to or more partners communicating to synchronize
write the usage time of the tool onto the RFID the related activity states in all information sys-
tag and further update the Quality Performance tems for the purpose of creating customer value.
Management (QPM) system. Based on the demand The transaction system of the outbound business
for tool replacement as scheduled by QPM, a pur- comprises CRM system. CRM enables business to
chase order can be created from ERP in advance track and manage all of their customers’ interac-
to avoid stock shortages and reduce downtime. tions over the lifetime, from first contact through
to purchase and post-sales. On the other hand, the
distributed computing -Penndiconn transaction system in an enterprise constitutes ERP
system. ERP systems execute a fixed sequence of
PennDiCon is a distributed computing library that defined functions such as purchasing or selling.
provides several communication functionalities However, existing CRM or ERP systems fail to
such as peer-to-peer, multicast and broadcast, adapt to frequent requests for changing business
which can be called from C/C++ programs. In processes. Therefore, we developed a workflow
distributed computing environment, any entity system, Process Automation with Web Services
can communicate with another entity or a group of (PAWS), which support modification of business
entities using PennDiCon, allowing it to dynami- logics at runtime. A brief description of the training
cally discover resources in the system. The detailed and research in transaction system is presented in
architecture of PennDiConn along with the case the following section.
study is presented in a related work (Sharma &
Prabhu, 2005). outbound transaction system
93
Integrated Research and Training in Enterprise Information Systems
CRM, point of sale systems, barcode, RFID/EPC, class on manufacturing systems. Typically, this
global data synchronization, EDI, XML, and web training incorporates a day or two of lectures on
services. Students learn the hands-on experimen- how business processes need to work in tandem
tation/demonstrations such as Microsoft CRM, to make a business successful and how an ERP
PC-based POS terminals, scanners, RFID tags software such as SAP® are used in the industry
and readers, and integrated software for store and to accomplish the same. For a small to medium
home office using Microsoft Retail Management size company, ERP software could be in-house
System (RMS). Training course includes a group development software such as TEAM (Total Enter-
project in which students will design and construct prise Application Manger). TEAM was developed
an IT application focused on retail. A single view in Microsoft Access® by Georgia Technology
of all customer interactions, and campaign man- Economic Development Institute, shown in Figure
agement for personalized services using MSCRM 7. By using Visual Basic Application, (VBA),
software is adopted in training. It helps student to students can learn to develop or extend the ERP
learn how to target new customers, and manage software, and also get exposure to the software
marketing campaigns, enabling closer relation- through hands-on exercises.
ships with customers.
Process Automation with Web
Inbound transaction system- erP services (PAWs)
ERP constitutes the typical transaction system PAWS is an automatic workflow system for tool
within an organization. This system provides infor- quotation process within and between the supply
mation systems support for planning, production, chains. It extends the RFID-based MES discussed
marketing, and finance. Hence, it is important to in the previous section. Figure 8 illustrates the
educate students and employees about this soft- framework of PAWS. In PAWS, ERP broadcasts
ware. To learn the prevalent ERP software, we the tool requirements to the web services of cer-
currently have the training on Production Planning tificated suppliers registered with the Universal
module of SAP® part of a senior undergraduate Description Discovery and Integration (UDDI)
94
Integrated Research and Training in Enterprise Information Systems
server. The web services in each supplier’s server industry practitioners benefited from this training.
verify the inventory and price in its own database The following is the summary of training experi-
and respond to the quotation based on its current ences from various stages of the rollout plan:
status. The business logic of the Request for
Quotation (RFQ) process in PAWS decides the • Microsoft Visio has been used to train un-
candidate supplier and starts another RFQ process dergraduate students in enterprise mod-
for logistic provider. This automation workflow eling techniques such as UML and IDS
system not only integrates the inner-business was used as a test bed in a master’s thesis
process including QPM, ERP, and mailing sys- (Salaka, 2004). Further, IDS has been used
tem, but also combines the business-to-business in an industry project to demonstrate its
(B2B) process in the supply chain. Figure 9 shows capabilities to analyze an enterprise’s busi-
the quotation process which broadcasts the RFQ ness process and identify requirements for
synchronous to each supplier. Thus PAWS dem- integration (Salaka & Prabhu, 2006).
onstrates to students the use of work flow systems • In simulation and planning, Sensors to
to automate a transaction process to shrink time Suppliers Chassis (S2S) is being primarily
consuming RFQ process(Cheng & Prabhu, 2007a,, used in two ways. One way to show indus-
2007b,, 2007c). try managers the cost Vs benefit analysis
of various policies in manufacturing sys-
tems. The other use of S2S is in academic
student exPerIences settings where it is being used to educate
students in evaluating various manufactur-
Given the breadth of the proposed rollout plan, ing control policies and as an example to
there is no one course or an example that can be train students in object-oriented software.
used to train the students in the rollout plan. Even Also S2S is being used in an undergradu-
then, different categories of students including ate honors thesis to study the advantages
graduate students, undergraduate students, and
95
Integrated Research and Training in Enterprise Information Systems
of the tie-in between a simulation environ- tandem with ERP and MES systems to au-
ment and an ERP system. tomate an organization’s business process.
• In the integration part of the rollout plan, • The control software developed is being
undergraduate students are trained on used as a test bed in a graduate course to
XML features in software applications study various control algorithms for manu-
useful in integrating software applications. facturing systems. It is also being used by
Further, they are familiarized with web a PhD student for research.
services and the impact of service oriented
architectures on an enterprise’s business
process. Further, the software tool Schema conclusIon
Lens developed is being used as a test bed
for a PhD student’s research. In this work, we identified the need for a rollout
• In transaction, students are trained on map for education and training in implementing en-
SAP® modules to illustrate how busi- terprise information systems (EIS). In accordance,
ness processes need to work in tandem to we proposed a rollout map that encompassed
make a business successful. The students different settings in an organization where em-
are provided login to the SAP® systems to ployees use EIS. Further, we developed prototype
learn some of the software functions and information systems that emulate the ones that are
get familiarized with the typical data flow typical in organizations. This software is currently
among various modules of the SAP® sys- being used in academic settings to educate and
tems that support various business func- train students in using EIS. The current authors
tionalities encountered in an organization. are working to incorporate the rollout plan part of
Further, PAWS, the workflow software de- the courses taught in graduate and undergraduate
veloped, helps to illustrate to graduate stu- curriculum. The student response so far to the
dents how a workflow system can work in training has been very positive. The important
96
Integrated Research and Training in Enterprise Information Systems
takeaway for other researchers and academicians Laughlin, S. (1999). An ERP game plan. The
is that following this rollout plan the students can Journal of Business Strategy, 20(1), 32–37.
be familiarized with the broad spectrum of EIS doi:10.1108/eb039981
systems in a systematic way. In the future, we
Mathew, S. (2003). Quantitative Models for Total
plan to extend this training to small manufacturing
Cost of Ownership of Integrated Enterprise Sys-
enterprises that lack the experience in using EIS.
tems. Pennsylvania State University, University
Park.
reFerences McCaskey, & Okrent, M. D. (1999). Catching
the ERP second wave. APICS––The Performance
Cheng, C. Y., & Prabhu, V. (2007a). Applying Advantage, 34–38:
RFID for Cutting Tool Supply Chain Management.
Proceedings of the 2007 Industrial Engineering Mehta, R. (2003). Software Modeling Tool for
Research Conference, 637-642 Analysis of Manufacturing and Supply Networks.
Pennsylvania State University, University Park.
Cheng, C. Y., & Prabhu, V. (2007b). Complexity
Metrics for Business Process Enabled by RFID N/A. (1998). 7 key elements of a successful
and Web Services. Proceedings of 17th Interna- implementation, and 8 mistakes you will make
tional Conference on Flexible Automation and anyway. APICS 1998 International Conference
Intelligent Manufacturing (FAIM 2007), 812-819 Proceedings. Falls Church, VA, 356–358
Cheng, C. Y., & Prabhu, V. (2007c). Performance Ptak, C., & Schragenheim, E. (2000). ERP: Tools,
Modeling of Business Processes Enabled by RFID Techniques, and Applications for Integrating the
and Web Services. Proceedings of 6th IEEE/ACIS Supply Chain. Boca Raton, FL: St. Lucie Press.
International Conference on Computer and Infor- Salaka, V., Mehta, R., & Prabhu, V. V. (June 2005).
mation Science (ICIS 2007), 718-723 Sensors-to-Suppliers Simulation Modeling of
Hong, K. K., & Kim, Y. G. (2002). The criti- Manufacturing Supply Chains. Proceedings of
cal success factors for ERP implementation: an the 15th International Conference on Flexible
organizational fit perspective. Information & Automation and Intelligent Manufacturing (FAIM
Management, 40, 25–40. doi:10.1016/S0378- 2005), Bilbao, Spain
7206(01)00134-3 Salaka, V., & Prabhu, V. V. (2006). Project Man-
Hutchins, H. (1998). APICS 1998 International agement for Enterprise Integration. The tenth
Conference Proceedings, Falls Church, VA, 1998, IEEE conference on enterprise computing (EDOC
pp. 356–358. 2006), Hong Kong
Kamath, M., Dalal, N., Chaugule, A., Sivaraman, Sharma, A., & Prabhu, V. V. (2005). Computing
E., & Kolarik, W. (2003). A review of enterprise and Communication Quality of Service for Dis-
process modeling techniques. In V. V. Prabhu, tributed Time-scaled Simulation in Heterarchical
S. Kumara & M. Kamath (Eds.), In Scalable Manufacturing Control. International Journal of
Enterprise Systems: An Introduction to Recent Modelling and Simulation.
Advances (pp. 1–32). Boston, MA: Kluwer Aca-
demic Publishers.
97
Integrated Research and Training in Enterprise Information Systems
Somers, T. M., & Nelson, K. (2001). The impact Umble, E. J., & Haft, R. R. (2003). Enterprise
of critical success factors across the stages of resource planning: implementation procedures
enterprise resource planning implementations. and critical success factors. European Journal
Proceedings of the 34th Hawaii International Con- of Operational Research, 146(2), 241–257.
ference on System Sciences, Hawaii, USA, 1–10 doi:10.1016/S0377-2217(02)00547-7
This work was previously published in Encyclopedia of Global Implications of Modern Enterprise Information Systems: Tech-
nologies and Applications, edited by Angappa Gunasekaran, pp. 195-208, copyright 2009 by Information Science Reference
(an imprint of IGI Global).
98
99
Chapter 1.7
Free and Open Source
Enterprise Resources Planning
Rogerio Atem de Carvalho
Federal Center for Technological Education of Campos, Brazil
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Free and Open Source Enterprise Resources Planning
adapt the system to its needs? Maybe this second work has been done on FOS-ERP, this subject is
reason is more complex and much less studied and still a new one, with many topics to be explored
is addressed in many topics later in the chapter. and tendencies to be confirmed, since the num-
Given this raising on FOS-ERP deployment, ber of adopters and the operation times are still
and the relative small number of references to this small in relation to the P-ERP figures. In fact,
subject, instead of simply comparing functional- FOS-ERP is a barely explored research subject.
ities of various different solutions, this chapter As said before, the first academic paper on this
aims to a) present tendencies on open source specific subject was Smets-Solanes & De Carvalho
software in general and open source enterprise (2003); the first paper on evaluating FOS-ERP is
systems that directly influence on FOS-ERP, b) De Carvalho (2006); and the first international
highlight the differences between FOS-ERP and event on FOS-ERP was held in Vienna, Austria,
proprietary ERP (P-ERP) in terms of business also in 20062. These facts show how FOS-ERP is
models, selection, customization and maintenance, a young research area, with relatively very little
and c) identify the challenges and opportunities academic effort put on it until now.
that they offer to stakeholders and developer However, some good work on related topics
communities. can be found. Currently the most in-depth analy-
sis of the economic impact of Free/Open Source
Software (FOSS) in enterprise systems was the
relAted Work one conducted by Dreiling and colleagues (Dreil-
ing, Klaus, Rosemann & Wyssusek, 2005). The
While increasing in market importance, FOS-ERP authors argue that “standards that supposedly open
is still poorly analyzed by academy, where large development by ensuring interoperability tend to
quantities of articles put their research efforts on be interpreted by enterprise systems global players
P-ERP deployment, project management, and according to their interest”. The authors follow
economic aspects (Botta-Genoulaz, Millet & this reasoning showing the deeper consequences of
Grabot, 2005). Research on FOS-ERP software is this: “[global players interests] might be incongru-
rather deficient, and, therefore, a series of relevant ent with the interests of the software industry at
aspects of FOS-ERP, which differentiate them large, those of users organizations, and may also
from P-ERP, are still not well understood. As an have effects on local and national economies.” And
example of this situation, a research conducted more: “despite control of interfaces and standards
on the FOS-ERP evaluation subject, has shown by few software developers, even integration of
how evaluating FOS-ERP brings more concerns the information infrastructure of one single com-
than evaluating P-ERP (De Carvalho, 2006). One pany with one brand of enterprise system cannot
indication that FOS-ERP seems to be another be consolidated over time [citing many other
situation where technology has outstripped the authors].” On the open standards subject, they
conceptual hawsers, is the fact that, according conclude, “software engineering principles and
to Kim and Boldyreff (Kim & Boldyreff, 2005), open standards are necessary but not sufficient
“by September 2005 only one paper about Open condition for enterprise software development
Source ERP (Smets-Solanes & De Carvalho, becoming less constrained by the politics of
2003) has been published in the whole of ACM global players, responsive to user interests, and
and IEEE Computer Society journals and pro- for ensuring a healthy software industry that can
ceedings, whereas more numerous articles have cater for regional market.”
been published in non-academic industrial trade On the innovation side, Dreiling and colleagues
magazines.” Although nowadays more research state that many economists agree to the point of
100
Free and Open Source Enterprise Resources Planning
dominant companies – like the ERP global play- instance is a subject with only a few works on it.
ers – are less disposed to respond to articulated Herzog (2006) presents a very comprehensive
customer requirements, and monopolies as well approach that identifies three different methods
oligopolies tend to stifle product and service inno- for implementing a FOS-ERP solution - select a
vation. Furthermore, “controlling architectures by package, develop one by itself, and integrate best
means of proprietary software and open standards of breed solutions – and five criteria for evaluat-
in the enterprise application industry appears to ing alternatives: functional fit, flexibility, support,
actually preclude innovation that could be of continuity, and maturity. This method introduces
benefit for many users of enterprise systems”, the interesting possibility, not yet well explored
which includes less developed economies. This in practice, of integrating solutions from different
seems to be a serious problem, since adapting is vendors through Enterprise Application Integra-
a crucial point to ERP, which by nature must be tion (EAI) techniques. A successful case study on
adapted to the adopter needs. This conclusion mixing P-ERP solutions is described by Alshawi
reinforces a positive consequence of the freedom and colleagues (Alshawi, Themistocleous & Al-
of manipulating the source code by itself in FOS- madani, 2004) – but the literature lacks examples
ERP: if the vendor changes its contract terms, the on doing the same with FOS-ERP.
client company is not locked in to a particular De Carvalho (2006) also presents an FOS-ERP
solution supplier (Kooch, 2004). Additionally, evaluation method, named PIRCS, that holds some
can two competing companies derive a strategic similarity with Herzog’s3, however stressing more
differential using the same ERP? Although this on risk evaluation, given the strategic nature of
problem can also happen with FOS-ERP, it seems ERP. In fact, according to Caulliraux and col-
to be bigger for P-ERP, since, due to the tightly leagues (Caulliraux, Proença & Prado, 2000) ERP
control over source code, adaptations are limited is strategic, given that “it is a major commitment
to parameterization or high-cost functionality of money, and thus with long range implications
changes through Application Program Interfaces even if only from a financial point of view”, and
(APIs) or proprietary languages, restricting real ERP systems are also important not only as a
differentiation and raising customization costs tangible asset, but “as a catalyst through their
(De Carvalho, 2006). Therefore, if the fact that implementation in the formation of intangible as-
integration among processes can by itself becomes sets and the company’s self-knowledge.” Aiming
a source of competitive advantage (Caulliraux, to include risk considerations, the PIRCS method
Proença & Prado, 2000), this can be extrapolated seeks to identify weaknesses in the FOS-ERP’s
to the possibility of changing source code to drive development environment during its evaluation
an even better advantage. process phases. These phases name the process,
If on one hand FOS-ERP can foster innova- and are summarized as Prepare the evaluation
tion and give more power to adopters, on the process, Identify the alternatives, Rate alterna-
other some important questions are yet to be tives’ attributes, Compare alternatives’ results,
answered, given that this type of FOSS is still a and Select the one that best fits the adopter needs.
newcomer to the enterprise systems landscape. Also related to the strategic nature of ERP,
Even some enthusiasts recognize that FOS-ERP during PIRCS’ Preparation phase, the adopter
vendors service level have much to improve and must define its strategic positioning in relation to
gain experience, while in contrast, P-ERP have the product, behaving as a simple consumer, only
a mature network of consulting partners and a getting the solution from the vendor, or becom-
long history of success and failures (Serrano & ing a prosumer (Xu, 2003), by mixing passively
Sarrieri, 2006). In fact, evaluating FOS-ERP for purchasing commodity parts of the system with
101
Free and Open Source Enterprise Resources Planning
actively developing or customizing strategic ones and the ability to reach more customers through
by itself. Of course, choosing how to behave is not improved pricing flexibility”. Other aspect on
a simple decision in these cases, since it involves the vendor side identified by these authors is that
a series of demands like expertise on the FOS- opening the code can reduce the costs on software
ERP platform and architecture, dealing with the testing and Research & Development tasks. These
developer community – which can mean manag- advantages are stimulating a better market accep-
ing demands of disparate stakeholders (West & tance, according to a Zinnov (2006) study, which,
O’Mahony, 2005), and allocating resources for among other things, shows figures on the raising
development. It is a question of weighting the of venture capitalism participation and the higher
direct and indirect gains of developing parts of penetration in the US enterprise systems market
the system with the shortcomings of doing so. by open source solutions. Furthermore, Goth
Many other subjects related to open software in (2005) affirms that the open software market is
general that affect FOS-ERP should be addressed on a “second wave” towards enterprise software,
to better understand their dynamics. Crowston and and that FOSS business models are finally ready
Howison (2006) assess the health of Open Source for facing this new market challenge. These two
communities as a way of helping checking if an last references points to a general improvement
FOSS is suitable for the adopter or contributor on the relation between FOSS communities and
needs – this kind of assessment can be one of the enterprise systems users.
tools to check a specific FOS-ERP project maturity. Despite the differences, FOS-ERP and P-ERP
Assessing FOS-ERP communities means under- certainly have one thing in common: both have
standing other organizations’ behavior towards the a company behind their deployment activities.
project: since ERP in general are not for individual Although there exist FOS-ERP maintained al-
use, contributors most of times are companies’ most solely by communities formed basically
employees, not free-lancers. Hence, to understand by individuals, like GNU Enterprise, it seems
the differences between this and other types of that only company-sponsored FOS-ERP, such as
open software, it is necessary to understand how Compiere, ERP5, OpenMFG, and SQL Ledger,
commercially sponsored and community built are really successful. In other words, FOS-ERP
FOSS projects behave. According to West and are typically of the commercial open source kind,
O’Mahony (2005), one of the key moments of which “a for-profit entity owns and develops”, ac-
commercial FOSS is the start-up phase: when the cording to Riehle (2007) classification. The next
project code is opened, “an infant community is topics show how FOS-ERP differs from P-ERP,
presented with a large complex system that may present opportunities and challenges that this kind
be harder to decipher”, thus the FOS-ERP creator of software offer to developers and adopters, and
may have to wait until contributions from other finally drawn some conclusions on the subject.
firms become viable and also advantageous - the
main economic incentive for firm participation
is the emancipation from the price and license dIFFerences betWeen
conditions imposed by large software companies Fos-erP And P-erP
(Wang and Chen, 2005), but the potential for doing
such substitution must be only latent in the project. The fact that FOS-ERP expose their code forces
The same type of incentive is identified by Riehle vendors and adopters processes to accommodate
(2007), who stats that solution providers can take the consequence that customization and mainte-
advantage from open source software “because nance can be done by other than the vendor. This
they increase profits through direct costs savings fact means that the adopter is free to choose the
102
Free and Open Source Enterprise Resources Planning
participation level of the vendor in the different defines seven life-cycle phases for any enterprise
phases of the ERP life cycle – meaning that, at entity that are pertinent during its life. These phases,
some extent, vendor participation can be also presented on Figure 1, can be summarized as follows:
customized4. Analyzing the differences between
open source and proprietary ERP depend on side a. Identification: identifies the particular
of the commercial relation the organization is: enterprise entity in terms of its domain and
adopter or vendor. environment.
b. Concept: conceptualizes an entity’s mission,
differences for the Adopter vision, values, strategies, and objectives.
c. Requirements: comprise a set of human,
Selecting an ERP for adoption is a complex pro- process, and technology oriented aspects and
cess, because, besides the size of the task, it is activities needed to describe the operational
an important enterprise component that impacts requirements of the enterprise.
the adopter organization in financial and in self- d. Design: models the enterprise entity
knowledge terms. Therefore, it is important to and helps to understand the system
use a framework to understand how open source functionalities.
alternatives can impact this kind of project. e. Implementation: the design is transformed
The Generalized Enterprise Reference Architec- into real components. After tested and ap-
ture and Methodology (GERAM) is a well-known proved the system is released into operation.
standard that provides a description of all elements f. Operation: is the actual use of the system,
recommended in enterprise engineering and a col- and includes user feedback that can drive to
lection of tools and methods to perform enterprise a new entity life cycle.
design and change with success (IFIP– IFAC, 1999), g. Decommission: represents the disposal of
providing a template life cycle to analyze FOS-ERP parts of the whole entity, after its successful
selection, deployment, and evolution. GERAM use.
Figure 1. GERAM life cycle phases. The design phase is subdivided into preliminary and detailed de-
sign.
103
Free and Open Source Enterprise Resources Planning
Except for decommission and identification, criteria. For FOS-ERP these criteria and others
which are not influenced by licensing models, related specifically to FOSS must be also taken
these phases can be used to better understand into account– remembering that even if the imple-
how FOS-ERP differs from P-ERP, providing mentation represents a smaller financial impact,
key aspects for evaluating alternatives and suc- in terms of a company’s self-knowledge it can
cessively refining objectives, requirements and assume a much bigger importance, since it holds
models, as next subtopics address. not only a inventory of records and procedures,
but also how those records and procedures are
concept realized in technological form – through source
code.
During this phase, high-level objectives are estab- In other words, a FOS-ERP can have a smaller
lished, such as the acquisition strategy, preliminary financial impact but a much bigger knowledge and
time and cost baselines, and the expected impact of innovation impact. Although P-ERP are also highly
ERP adoption. In the case of FOS-ERP, the level parameterized, and adaptable through APIs and/
of involvement of the adopter in development or dedicated programming languages, the access
can be established. In other words, at this point to the source code in FOS-ERP can drive much
the adopter can start considering the possibility better exploration of the ERP’s capabilities, thus
of actively contributing to an open source project, allowing a better implementation of differenti-
becoming a prosumer. Of course, this decision ated solutions.
will be possible only during the more advanced From this standpoint, the strategic positioning
phases, when the adopter better knows the solution of an adopter in relation to a FOS-ERP seems
requisites and the decision alternatives. to be of greatest importance, given the possibil-
ity of deriving competitive advantage from the
requirements and Preliminary source code. Therefore, the adopter must decide
to behave as a simple consumer, only getting the
design solution from the vendor, or become a prosumer,
by mixing passively purchasing commodity parts
Taking as a principle that most software develop- of the system with actively developing strate-
ment (and customization) today is done through gic ones by itself. Thus it is clear that when an
interactive and incremental life cycles, it can be adopter considers FOS-ERP as an alternative, it
considered that there is no clear borderline between should also consider developing parts of it to fit
the requirements and preliminary design phases its requirements – taking into account that, as said
and between the detailed design and implementa- before, this kind of positioning involves allocating
tion phases, thus they are considered together in managerial and technical resources for develop-
this analysis. ment tasks in a FOSS environment.
The requirements phase deals with system’s
functional and non-functional requirements. detailed design and Implementation
The adopter may model some main business
processes – part of the Preliminary Design – as The detailed design phase focus on refining
a way to check how the alternatives fit to them. models, and is associated to business process
At this point FOS-ERP starts to differ more from modeling and parameter identification and value
P-ERP. Evaluating P-ERP involves comparing definition. The implementation phase concentrates
alternatives under the light of functionality, Total on validating, integrating modules, and releasing
Cost of Ownership (TCO), and technological its modules for initial use.
104
Free and Open Source Enterprise Resources Planning
If the adopter decided to participate actively A very interesting point is the openness of
in the selected FOS-ERP project, deeper design parts customized for and sponsored by a specific
decisions are involved, such as creating entire adopter. Maybe the adopter doesn’t want to become
new modules or extending the basic framework. a developer at all – which is most likely to hap-
A consequence of assuming a more active role is pen, but it still wants to keep some tailored parts
to invest more human and financial resources for of the system in secret. In these cases, the vendor
learning the FOS-ERP platform and framework, must adapt the licensing terms for its solution, so
developing and maintaining parts of it, and manag- that general openness of the code is guaranteed,
ing the relationship with the project community. while some client-sponsored customized parts
In that case, customization and maintenance con- can be kept closed5.
tracts must define responsibilities of each part on
the deployment process. For instance, what the operation
vendor should do if the adopter finds a bug in the
original code, written by the first, which is being During the operation phase the resources of the
adapted by the second? What is the priority that entity are managed and controlled so as to carry
the vendor must follow for correcting this bug? out the processes necessary for the entity to fulfill
Actually, is the vendor responsible for correcting its mission. Deviations from goals and objectives
this bug, since for this part the adopter decided or feedbacks from the environment may lead to
to take advantage of the solution’s free license, requests for change; therefore during this phase
therefore exempting the vendor of responsibility system maintenance and evolution occur. During
for the bug? operation the adopter can decide at any moment,
The adopter has the option of assuming dif- unless contractual clauses hinders, to shift to anoth-
ferent grades of involvement for each phase. For er vendor or to assume the system’s maintenance
ordinary modules, like payroll, the adopter can let by itself. Minor changes can also be conducted by
the vendor do the work. However, for strategic the own adopter or even by community individuals
modules, where the adopter believes that it holds that may help on specific matters.
competitive advantage in the related business As a conclusive remark on the differences of
processes, it can take an active role from detailed FOS-ERP on the adopter side, experience has
design to implementation and maintenance, to be shown that most of the times the adopter will not
sure that the business knowledge, or at least the get involved on customization or even maintenance
more precious details that keep the competitive tasks. Still, FOS-ERP can be a good choice, since
advantage, will be kept in the adopter company. it reduces vendor dependency. Moreover, the open-
In that situation the vendor is limited to act as a ness of code on FOS-ERP also makes adapting
kind of advisor to the adopter. One can think that it it to specific needs easier, thus reducing costs in
is possible to keep secrecy on parts of the system customization and further evolution of the software.
by properly contracting a P-ERP vendor, which In other words, the central points to consider are
is true, but the adopter will become dependent cost reduction and freedom of choice. Last but not
of the vendor in a strategic part of the system. least, as a general rule, FOS-ERP also rely on other
Becoming dependent means to wait for other open technologies. For instance, while most P-ERP
vendor’s priorities or pay a high price to become systems export and import data to and from MS-
the priority when changes are needed. Even if Office, FOS-ERP, like ERP5, interact with the also
the P-ERP adopter decides to develop these high- free Open Office. The same is truth for databases
strategic parts, it will have to deal with licensing and operational systems – thus reducing licensing
costs anyway. costs on ERP supportive software too.
105
Free and Open Source Enterprise Resources Planning
differences for the vendor open the code of its own system improvements,
following the general FOSS code of ethics6.
The FOS-ERP vendor business models are a Following the common reasoning about FOSS
consequence of the customer’s freedom of choice pricing, FOS-ERP vendors can take advantage
and of the general open source market character- from open source software because, according
istics. Like in other types of FOSS, if on one hand to Riehle (2007), FOSS “increase profits through
vendors benefit from the community improve- direct costs savings and the ability to reach more
ments and testing work, on the other hand they customers through improved pricing flexibility”,
face the competition of this community when as shown on Figure 2.
dealing with deployment and maintenance. In Figure 2 shows a situation that maybe is more
fact, as previously shown, even an adopter can applicable to partners and free-lance vendors of
become a competitor, at some extent of course. FOS-ERP, which can switch from more expensive
It is important to note that there are three types of proprietary software to less expensive open source
vendor: the original system creator, its partners, software, thus potentially increasing their profit
and free-lance vendors. In the case of partners, margin. The creator organization must know how
a formal, most of times contractual, agreement to manage the community around the project,
is set between them and the system creator. This finding prospective partners, hiring individuals
agreement involves some responsibilities to the that become highly productive on the project
partner, in special, following creator’s deployment whenever possible, and even trying to transform
practices, communicating new business generated free-lancers into partners. Like their proprietary
by the system, opening the source code of new counterparts, FOS-ERP needs a network of part-
and improved parts of the system, and helping in ners that can help on deployment projects where
development tasks managed by the creator. Free- the creator has no conditions to be the main con-
lance vendors are free of these obligations, and as tractor, and finding new markets and customers
a consequence, have no special treatment by the for the system. However, gathering contributors
creator, that expects that the free-lancer at least for a starting FOS-ERP project can be a hard task.
Figure 2. Sales margins and number of customers; (a) The lower price limit determines the customers
the system integrator takes on; (b) Switching from closed source software to open source software can
result in more customers and higher profits (Source: Riehle, 2007, with permission)
106
Free and Open Source Enterprise Resources Planning
As said before, ERP users are organizations, not knowledge on the system platform and
individuals, and therefore the creator must learn framework, and, as customers to the solu-
how to attract partner firms that are willing to tion appears, more money can be invested
contributing to the project without becoming on a growing commitment to the project.
competitors. As a main conclusion, FOS-ERP Additionally, with the raising of venture
vendors must fight hard to form a community capitalism investment on FOSS startups, a
around the project and to retain customers. This smaller firm can even get financed in a way
seems to be a big difference between the open that would be very unlikely to happen if it
and proprietary licensing models, since the risk worked on top of a P-ERP solution, given the
of the vendor loose a client after deployment is restrictions imposed by the global players.
almost inexistent in the current P-ERP dominated b. Challenges: If on one hand it is easier to
market landscape, where global players dictate enter the market, on the other it is harder to
market rules in practice. retain clients: a broader consultancy basis
The differences between FOS-ERP and P-ERP empowers the demand side, making custom-
can led to a shift from the vendor-dominated ers more demanding.
perspective of P-ERP to a more customer-driven
FOS-ERP perspective. These differences in con- Keeping quality level among a heterogeneous
ducting selection, adoption, and selling also bring network of consulting services providers is also
a series of opportunities and challenges for both a major challenge. FOS-ERP in general lack
vendors and adopters, which are addressed in the certification and quality assurance programs that
following topics. guarantee service levels to clients. Moreover,
FOS-ERP skeptics argue that few reliable con-
sulting firms have experience on implementing
oPPortunItIes And them. But exactly those programs keep smaller
cHAllenGes consulting firms way from P-ERP, pushing them
towards FOS-ERP. For a small consulting firm, a
FOS-ERP offer a series of opportunities for actors possible solution to this deadlock is to start with
that are currently out or ill inserted into the ERP smaller, less demanding projects, and then go
market. These opportunities come together with towards bigger ones, as the deployment processes
a series of challenges, as listed below. and related activities gain maturity. This maturity
For smaller consulting firms: will become the competitive advantage of the firm
on a high competitive FOS-ERP market.
a. Opportunities: P-ERP vendors generally For smaller adopters:
impose high costs and a rigid set of rules
for firms that desire to enter their partner a. Opportunities: lower costs open new oppor-
network, raising the difficulties for smaller tunities for Small and Medium Enterprises
firms to become players in this market. In (SME) to become ERP adopters. With
contrast, smaller consulting firms can enter globalization, small firms suffer more and
the FOS-ERP market in an incremental way, more with competition, and when they try to
increasing their commitment to a project as modernize their processes, they hit the wall
new business opportunities appear and bring of global players’ high costs, or have to adopt
more financial income. In other words, firms smaller off-the-shelf (and also proprietary)
can start contributing with small improve- solutions that ties them to a single supplier
ments to the project as a way of gaining that normally doesn’t have a partner network.
107
Free and Open Source Enterprise Resources Planning
In contrast, FOS-ERP are less expensive information on their internal features and
and support can be found in different ways, development processes, on the other hand
including individuals and other SME. it is harder to get information from a dis-
tributed set of partners that sometimes carry
This is also truth for local governments and informal agreements. Social and economical
countries in development in general. FOS-ERP aspects, like reward structures, must be taken
reduce costs, thus helping local governments focus into account to understand the dynamics
on their core business – directly taking care of of FOS-ERP, like in every FOSS, bringing
citizens – and reducing technological dependency more components to be analyzed.
from global players. In fact, FOSS in general is an
opportunity for countries in development to shift For individuals:
from buyers to players in the software industry
(Ouédraogo, 2005). a. Opportunities: FOS-ERP represent an
unique opportunity for an individual to install
b. Challenges: lower costs can also mean that an ERP framework and understand its inter-
adopters have to deal with lower service lev- nals. It is the chance of participating in a big
els, then stressing the necessity of carefully software development project without being
evaluating FOS-ERP options and the matu- an employee of a big company (Spinellis,
rity of their supportive services. Actually, as 2006). Also, the developer can incrementally
said before, consulting certification is yet on gain knowledge of the system, and get free
the early stages for FOS-ERP, thus quality of support from the community, without the
service must be carefully addressed during necessary investment on the P-ERP high
contract negotiation. cost training and certification programs. In
that way an individual can improve his/her
For researchers: employability without investing too much
money on courses, books and certifications.
a. Opportunities: The author has been con- In the future, these advantages can make
tributing to a FOS-ERP project7 since its more free-lance developers enter FOS-ERP
conception. During this time it was possible communities, currently formed mostly by
to know deeply, and sometimes take part of, companies’ employees.
all the process that compose an ERP solu- b. Challenges: learning the internals of a FOSS
tion, from conception and development, to in general means to spend considerable time
business models, deployment, operation in understanding system architecture, design
and maintenance, and evolution. This is a decisions, and specific features. Moreover,
really good opportunity, since most research FOS-ERP in special currently lack books and
papers on ERP are related to deployment courseware in general to help accelerating
and operation, given that P-ERP companies the learning process, and many times the
don’t usually open their projects’ internals individual must count on Web sites, mailing
for researchers. Smaller research groups can lists, discussion forums, and the good will
find their way in this area by getting associ- of community members to acquire deeper
ated to a FOS-ERP project, and contributing knowledge on the framework.
to specific parts of it.
b. Challenges8: If on one hand the openness
of FOS-ERP may give researchers more
108
Free and Open Source Enterprise Resources Planning
conclusIon reFerences
In this chapter Free/Open Source ERP particu- Alshawi, S., Themistocleous, M., & Almadani,
larities, opportunities and challenges were briefly R. (2004). Integrating diverse ERP systems: A
presented. It is important to note that this type of case study. The Journal of Enterprise Information
software inherits all advantages and shortcom- Management, 17(6). Emerald Group Publishing
ings of open source software in general and have Limited, pp.454-462.
some more of both. As a matter of fact, FOS-ERP Botta-Genoulaz, V., Millet, P.-A., & Grabot, B. A.
two main advantages are both directly related (2005). Survey on the recent research literature on
to FOSS: lower TCO given the reduced or non- ERP systems. Computers in Industry, 56, 510–522.
existent licensing costs - including of supportive doi:10.1016/j.compind.2005.02.004
software, like spreadsheets, databases, networking
and operational systems; and the possibility of Caulliraux, H. M., Proença, A., & Prado, C. A. S.
having direct access to the source code whenever (2000). ERP Systems from a Strategic Perspec-
is needed. tive. Sixth International Conference on Indus-
Nevertheless, despite the growing interest on trial Engineering and Operations Management,
this subject, it still has many topics to be explored Niteroi, Brazil.
by researchers and practitioners, given the short
Crowston, K., & Howison, J. (2006). Assessing
period of time that passed since this kind of soft-
the Health of Open Source Communities. IEEE
ware appeared in the market and the relatively Computer, May, 89-91.
small number of users, which indicates that the
list of opportunities and challenges aforesaid is De Carvalho, R. A. (2006). Issues on Evaluat-
a reflection of current tendencies that must be ing Free/Open Source ERP Systems. Research
confirmed and better scrutinized as new deploy- and Practical Issues of Enterprise Information
ments occur. For instance, currently there are no Systems, 667-676. Springer-Verlag
research figures on FOS-ERP success rates. In
Dreiling, A., Klaus, H., Rosemann, M., & Wys-
other words, in this arena, it is necessary that more
susek, B. (2005). Open Source Enterprise Systems:
data on deployment, customization, operation, and
Towards a Viable Alternative. 38th Annual Hawaii
evolution become available so that tendencies may
International Conference on System Sciences,
be confirmed and can become facts and figures.
Hawaii.
Hence, as a relatively new kind of software,
FOS-ERP has a potential to be realized, but many Goth, G. (2005). Open Source Business Mod-
questions about it are yet to be answered. Nev- els: Ready for Prime Time. IEEE Software,
ertheless, their growing commercial acceptance (November/December): 98–100. doi:10.1109/
is a fact, and their lower costs, easier adaptation, MS.2005.157
and potentially more competitive supplier market
Herzog, T. (2006). A Comparison of Open Source
can slowly force a shift in the ERP market from
ERP Systems. Master thesis, Vienna University of
the current vendor perspective to a customer
Economics and Business Administration, Vienna,
perspective.
Austria.
IFIP – IFAC Task Force on Architectures for
Enterprise Integration. (1999). GERAM: Gen-
eralized Enterprise Reference Architecture and
Methodology, 31
109
Free and Open Source Enterprise Resources Planning
Kim, H., & Boldyreff, C. (2005). Open Source Xu, N. (2003). An Exploratory Study of Open
ERP for SME. Third International Conference on Source Software Based on Public Archives. Master
Manufacturing Research, Cranfield, U.K. Thesis, John Molson School of Business, Concor-
dia University, Montreal, Canada.
Kooch, C. (February 01, 2004). Open-Source
ERP Gains Users; http://www.cio.com/ar- Zinnov Research and Consulting. (2006). Penetra-
chive/020104/tl_open.html tion of Open Source in US Enterprise software
market – An Overview. 37.
LeClaire, J. (December 30, 2006). Open Source,
BI and ERP: The Perfect Match?http://www.
linuxinsider.com/story/LjdZlB0x0j04cM/Open-
Source-BI-and-ERP-The-Perfect-Match.xhtml key terms
Ouédraogo, L.-D. (2005). Policies of United Na- ERP: Enterprise Resources Planning, a kind
tions System Organizations Towards the Use of of software which main goal is to integrate all
Open Source Software (OSS) in the Secretariats. data and processes of an organization into a uni-
Geneva, 43p. fied system.
Riehle, D. (2007). The Economic Motivation of ERP Business Models: Broad range of infor-
Open Source Software: Stakeholder Perspectives. mal and formal models that are used by a vendor
IEEE Computer, 40(4), 25–32. to make profit from an ERP system deployment,
customization, and maintenance.
Serrano, N., & Sarrieri, J. M. (2006). Open ERP Evaluation: Process of selecting an
Source ERPs: A New Alternative for an Old Need. ERP package, among various alternatives and in
IEEE Software, (May/June): 94–97. doi:10.1109/ accordance to business processes, information,
MS.2006.78 technology, and strategic requirements.
Smets-Solanes, J., & De Carvalho, R. A. (2003). Free Software: According to the Free Software
ERP5: A Next-Generation, Open-Source ERP Foundation, is a Software that gives to the user
Architecture. IEEE IT Professional, 5(4), 38–44. the freedom to run the program for any purpose,
doi:10.1109/MITP.2003.1216231 study how the program works and adapt it to his/her
needs, redistribute copies, improve the program,
Spinellis, D. (2006). Open Source and Profes- and release his/her improvements to the public,
sional Advancement. IEEE Software, (September/ so that the whole community benefits.
October): 70–71. doi:10.1109/MS.2006.136 Free/Open Source ERP: ERP systems that
Wang, F.-R. He, D., & Chen, J. (2005). Motiva- are released as Free Software or Open Source
tions of Individuals and Firms Participating in Software.
Open Source Communities. Fourth International Free/Open Source Software Adopter Types:
Conference on Machine Learning and Cybernet- According to Xu (2003) it is possible to classify
ics, 309-314. a software user company in accordance to its
positioning in relation to a FOSS: Consumer: a
West, J., & O’Mahony, S. (2005). Contrasting passive role where the adopter will just use the
Community Building in Sponsored and Com- software as it is, with no intention or capability
munity Founded Open Source Projects. 38th An- of modifying or distributing the codes, Prosumer
nual Hawaii International Conference on System an active role where the adopter will report bugs,
Sciences, Hawaii. submit feature requests, post messages to lists.
A more capable Prosumer will also provide bug
110
Free and Open Source Enterprise Resources Planning
fixes, patches, and new features. Profitor: a pas- Movement has also some political connota-
sive role where the adopter will not participate in tions for instance - for the goals of this work
the development process but simply will use the the two terms will be treated as synonyms.
software as a source of profits. Partner: an active 2
The IFIP First International Workshop on
role where the adopter will actively participate in Free/Open Source Enterprise Information
the whole open source development process for Systems/ERP, held during the First IFIP TC8
the purpose of earning profits. International Conference on Research and
Open Source Software: According to the Practical Issues of Enterprise Information
Open Source Initiative, licenses must meet ten Systems – CONFENIS 2006.
conditions in order to be considered open source 3
Despite the fact that these methods hold some
licenses: 1. The software can be freely given similarities, they were developed without
away or sold. 2. The source code must either be having knowledge of each other and were
included or freely obtainable. 3. Redistribution published in a very close range of time:
of modifications must be allowed. 4. Licenses Carvalho’s method was published in April
may require that modifications be redistributed and Herzog’s in June, 2006.
only as patches. 5. No Discrimination Against 4
This is a generic assumption, since in practice
Persons or Groups. 6. No Discrimination Against the vendor can impose specific license terms
Fields of Endeavor. 7. The rights attached to the that keep the software open, but constrain
program must apply to all to whom the program deployment to terms that keep vendor control
is redistributed without the need for execution on it.
of an additional license by those parties. 8. The 5
Although this seems to be nonsense in FOSS
program cannot be licensed only as part of a larger terms, it is a common real life situation in
distribution. 9. The license cannot insist that any FOS-ERP. In fact, the author knows a case
other software it is distributed with must also be where an adopter company sponsored the
open source. 10. License Must Be Technology- whole development of an FOS-ERP dur-
Neutral The official definition of Open Source ing a three-year period, without becoming
Software is very close to the definition of Free a prosumer, and keeping only a specific
Software, however, it allows in practice more algorithm, related to its product pricing
restrictive licenses, creating a category of “semi- schedule, in secret. The original license had
free” software. to be changed to fit this customer demand.
6
In practice, this return from free-lancers
doesn’t happen all the times.
endnotes 7
ERP5 http://www.erp5.com
8
The author considers that these challenges
1
The precise definitions of Free Software and represent, in fact, new research opportuni-
Open Source Software are on the chapter’s ties.
Key Terms list. Although there are differ-
ences between them – the Free Software
This work was previously published in Handbook of Research on Enterprise Systems, edited by Jatinder N. D. Gupta, Sushil
Sharma and Mohammad A. Rashid, pp. 32-44, copyright 2009 by Information Science Reference (an imprint of IGI Global).
111
112
Chapter 1.8
E-Government and ERP:
Challenges and Strategies
Gita A. Kumta
SVKM’s NMIMS University, School of Business Management, Mumbai, India
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
E-Government and ERP
for automating the different steps along the path use of Information & Communication Technology
to fulfilling the order. The major reasons why (ICT) in the right perspective.
companies look at ES can be summarized as:
• Most governments have not changed their
• Integrate financial information processes in any way, and instead have au-
• Integrate customer order information tomated flawed processes.
• Standardize and speed up operational • Government budgets and administration
processes tends to be in departmental silos, but e-
• Reduce inventory governance cuts across departments.
• Standardize HR information • Too much attention to “citizen portals” has
taken attention away from internal gov-
Governments worldwide have been making ernment functioning. There is a big gap
efforts to use information and communications between a web site and integrated service
technologies (ICT) as an instrument of change to delivery.
provide better services to citizens, facilitate work • Governments often underestimate the se-
flow, and provide better governance and transpar- curity, infrastructure, and scalability re-
ency. Popularly known as E-Government, the focus quirements of their applications which im-
has initially been on information dissemination pact the quality of service. (Khalil, Lanvin,
which has now moved on to transactions. What Chaudhry, 2002)
is required is a transformation of the public ad-
ministration which takes a citizen service request Learning from the experiences of the corporates,
and provides a software road map for automating governments today understand the need for a con-
the different steps along the path to fulfilling the sistent and flexible information infrastructure that
request. This cuts across various departments can support organizational change, cost-effective
and it is therefore critical to lay down suitable service delivery and regulatory compliance. ERP is
policies, guidelines and specifications and also therefore needed to meet organizational objectives
redefine processes to facilitate faster proliferation and outcomes by better allocating resources - its
of ICT applications. people, finances, capital, materials, and facilities.
E-government does not happen with more com- Modernization programs however involve a broad
puters or a website. While online service delivery range of activities and require a wide array of skills
can be more efficient and less costly than other and experiences, as these programs affect every-
channels, cost savings and service improvements thing from computers to culture. The objective is
are not automatic. E-government has therefore to reduce administrative overhead and improve
to focus on planning, sustained allocation of core product/service delivery.
budgets, dedication of manpower resources and
above all, the political will. The e-government
field, like most young fields, lacks a strong body essence oF erP In Government
of well-developed theory. One strategy for cop-
ing with theoretical immaturity is to import and Before moving on to the ERP discussion it is
adapt theories from other, more mature fields. necessary to dwell a little on various aspects of
(Flak, Rose, 2005) E-government which is about transforming the
Literature survey on implementations of way government interacts with the governed.
e-governance has brought out the following ob- The E-Government handbook for developing
servations which would help us in redefining the countries identifies three major phases –Publish,
113
E-Government and ERP
Interact and Transact. These however are not government services, available at any time.
sequential phases and hence can be considered Some of the cases are
as major aspects of e-government. In short, e- ◦ The Bhoomi Project. Delivery of land
government utilizes technology to accomplish titles online in Karnataka, India...
reform by fostering transparency, eliminating http://www.revdept-01.kar.nic.in/
distance and other divides, and empowering people Bhoomi/Home.htm
to participate in the political processes that affect ◦ The Government E-Procurement
their lives. (Khalil, Lanvin, Chaudhry, 2002). System in Chile...http://www.com-
Each of the phases is briefly summarized below. praschile.cl/Publico/entrada_publico.
asp
• Publish: Governments generate and also
publish in print large amount of informa- To achieve this it is essential to look at the
tion which can be disseminated to the pub- internal processes of the government, the rela-
lic using ICT. Some of these cases are tionships between various departments, sharing
◦ E-Government Portal of Canada is of information between departments and the IT
considered as one of the best gov- infrastructure required to support these aspects.
ernment portals in the world. http:// The following section indicates the characteris-
www.canada.gc.ca. tics of content, process, people and technology
◦ The JUDIS (Judgment Information required by government to implement the various
System) in India posts court records, initiatives, thereby identifying the essence of ERP
case information and judicial deci- in government (refer to Table 1).
sions. http://indiancourts.nic.in/itin- The E-Government handbook for develop-
jud.htm ing countries has many more case studies listed
• Interact: Interactive e-government in- which highlight these phases. (Khalil, Lanvin,
volves two-way communications, starting Chaudhry, 2002).
with basic functions like email contact Enterprise modernization is therefore a com-
information for government officials or plex, ongoing evolutionary process that involves
feedback forms that allow users to submit the integrated transformation of strategies,
comments on legislative or policy propos- policies, organization and governance structures,
als. Some of the cases are business processes and systems, and underlying
◦ Citizen Space. A section of the British technologies. Only by aligning these elements
Government’s web portal allowing with its business goals can an agency achieve
citizens to comment on government a successful modernization program. (Kirwan,
policy. http://www.ukonline.gov.uk Sawyer, and Sparrow, 2003).
◦ The Central Vigilance Commission The very essence of enterprise modernization
in India allows citizens to file online is integration of processes and connectivity of
complaints about corruption. http:// stakeholders. It therefore involves connecting:
www.cvc.nic.in/vscvc/htm
• Transact: Just as the private sector in de- • Government to government
veloping countries is beginning to make (G2G):Departmental integration of pro-
use of the Internet to offer e-commerce cesses ERP
services, governments will be expect- • Government to businesses (G2B):
ed to do the same with their services. A Information to suppliers and procurement
transact website will offer a direct link to SCM
114
E-Government and ERP
115
E-Government and ERP
116
E-Government and ERP
achieved the basic requirements, organizations port, the challenging task is creating an IT orga-
expected to achieve efficiency and control. Today nization structure to support this process within
the expectation from an ERP system is strategic the government structure.
support adding value to business. Collectively, all
the functionalities of publishing, interacting and High expectation from citizens
transacting now need to be aligned to manage
the entire government business. ERP combines Citizens themselves are becoming increasingly
them all together into a single, integrated software demanding as they compare government services
solution that operates on a single database so that with other services like banking. Citizens do
the various departments can more easily share not want to be transferred from department to
information, communicate with each other and department for an answer to a simple telephone
provide end-to-end service to its stakeholders. query and be forced to queue at public offices to
make a straightforward transaction. They demand
facilities to be offered round the clock. They ex-
cHAllenGes In ImPlementAtIon pect high standards of service, instant access to
oF Ict solutIons information, efficient transactions, and support,
whenever and wherever they need it.
E-governance initiatives are common in most
countries as they promise a more citizen-centric Integration of various Functions
government and reduce operational cost. Unfortu-
nately most of these initiatives have not been able Today it is the era of packaged software which in
to achieve the benefits claimed. Often the reason most cases is exhaustively comprehensive. The or-
for this failure is a techno-centric focus rather ganization therefore needs to change its processes
than a governance-centric focus (Saxena, 2005). to align it to ‘best practices’ incorporated in the
The following challenges faced by organizations software package. However in the excitement to
are equally applicable to governments. implement such solutions one often loses sight of
the fact that each department has its own policies
Acquisition Process and rules that make it unique. “For integration
to work, your internal systems must be working
All government ICT and modernization programs properly,” says Mary Kay DeVillier, director/c-
face major challenges, one of which is the acquisi- business and information resources at Albemarle
tion process. This process requires a holistic view (Mullin, 2000).
of the public administration for identifying and
evaluating the right solution, taking decisions requirement of clean data
regarding outsourcing and managing the whole
implementation as a project. It’s not very difficult Organizations embarking on an ERP initiative
to buy software and hardware that fulfill the needs must take care not to underestimate the amount
of a single division without considering the needs of work needed to develop a clean set of master
of the entire organization. However, if each divi- data. The chart of accounts, citizen data, policies
sion of an organization develops its own business & norms and other mission-critical information
processes and IT infrastructure, the result will be has to be accurate from the start or mistakes will
lack of interoperability, duplicated components, multiply exponentially throughout the system.
functional gaps, and inability to share information. Many an ERP project has been scuttled or gone
Though external consultants do provide sup- south altogether because companies failed to do
117
E-Government and ERP
this kind of basic blocking and tackling early on the government to use the software to improve
(Bartholomew, 2004). the ways they do their jobs is by far the most
critical challenge. Most ERP implementations
standards for Interoperability fail due to resistance to change and poor project
management (Koch). The whole implementation
In order to support these demands the internal has to be taken up as a project clearly identifying
functions of supply chain management assume the scope, cost, time and resource requirements
greater importance. There is tremendous impor- with clear definition of milestones.
tance for rules and procedures in the government.
Unless the records are kept properly, accessing Hidden costs
information and tracing the precedents becomes
time consuming and this is one of the reasons Certain costs which are more commonly over-
for the delays in government administration. The looked or underestimated than others are training,
rules and procedures can be made transparent to integration, customization, testing, data conver-
the citizens, and traceability can be incorporated sion and data analysis which are not adequately
which would improve the pace of effectiveness factored into the budgets. This leads to delay in
of governance by using Information Technology implementation which results in apathy and dis-
(Budhiraja, 2003). satisfaction.
With multiple players and departments increas-
ingly becoming involved in the e-Government
initiatives, standards for e-Government have ImPlementAtIon strAteGIes
become an urgent imperative for interoperabil-
ity. Enterprise solutions would therefore help An ERP system helps the different parts of the
in streamlining operations, be flexible and agile organization share data and knowledge, reduce
enough to respond to the demands of public sec- costs, and improve management of business
tor reforms. processes. In spite of their benefits, many ERP
systems fail (Stratman and Roth, 1999). Many ERP
Information security systems face implementation difficulties because
of workers’ resistance (Aladwani, 2001). Effec-
Managing a secure environment in an era of in- tive implementation of ERP requires establishing
tegrated and seamless service delivery presents five core competencies, among which is the use
an increasing challenge for governments as it can of change management strategies to promote the
be overwhelming and costly without the right infusion of ERP in the workplace (Al-Mashari
infrastructure. While processing sensitive data and Zairi, 2000).
such as citizen and financial information stored During the last few years there have been major
on ERP systems, government organizations want initiatives among different Governments towards
to ensure they take every possible measure to ushering in ICT and its tools in the functioning of
maximize security. Government. The emphasis has been on providing
better services to citizens and in improving the
Project management internal productivity. Cases listed in the Report for
the President’s Management Council in December
To get the most from the software, the people inside 2005 is testimony to this fact (Evans, 2005).
the government have to adopt the work methods The strategies get more focused when we view
outlined in the software. Getting people inside the organization as an open system composed of
118
E-Government and ERP
interdependent components that include Strategy, for the implementation was that all state agencies
Processes, Structure, Technology and Culture as had a say in the project from its earliest stages.
mapped by Scott-Morton in the Management (Douglas, 2002).
of the 1990s equilibrium model (Scott-Morton, Developing a strategic plan and bringing all
1991). This model is depicted in Figure 2. The stakeholders on board are crucial early steps in
salient aspect of this open systems model is that implementing ERP”, said Ken Munson, senior
an impact of change on one component is im- principal in the State and Local Solutions Division
mediately felt on the other components either of AMS Inc., Missouri’s ERP vendor. “The plan
directly or indirectly. has to be well communicated and well bought in,
The ERP implementation strategies can there- not just by the different branches of government,
fore be classified into organizational, technical, but by all levels of each of the branches,” he said.
and people strategies. Organizational strategies (Douglas, 2002).
would cover strategic planning, business align- The Department of Information Technology,
ment, project management and change manage- Government of India, has felt it necessary to create
ment. The technology strategies would cover a rational framework for assessing e-Governance
enterprise architecture, business process mapping, projects on various dimensions. It is desirable that a
data capture and information security. People set of instruments is available to the administrators
strategies would cover communication, managing of those projects to appreciate the various attributes
resistance to change and ongoing support. of a good e-governance project, apply midcourse
corrections, where needed, and steer these projects
strategic Planning in the right direction.(Rao, etal, 2004).
Many problems related to ERP implementa-
The state of Missouri in USA was the first to tion are related to a misfit of the system with the
implement one of the largest government ERP characteristics of the organization. (Markus et
systems which was implemented in phases and al., 2000). ERP ‘tends to impose its own logic
operational by 2001. The finance, budgeting and on a company’s strategy, culture, and organiza-
purchasing functions serve 6,000 end users, and tion’ which may or may not fit with the existing
its human resources and payroll modules serve organizational arrangements. (Davenport, 1998),
9,000. One of the most important keys to success
119
E-Government and ERP
effective Project management tional change process, rather than as the replace-
ment of a piece of technology. (Boonstra, 2005).
Success depends on a well designed implemen- Though change management strategies facilitate
tation plan. An ERP system is the information the success of ERP implementation, many ERP
backbone and reaches into all areas of the busi- systems still face resistance, and ultimately, failure.
ness and value-chain. It is necessary to consider (Aladwani, 2001).
implementation as a project and plan the activities For the reform to succeed, governments need
involving people, processes and technology. to be culturally and technically prepared to un-
SAP’s Accelerated SAP Implementation Meth- derstand and implement change. Procedural and
odology provides a guideline for implementation. legal changes in the decision making and delivery
(Dejpongsarn, 2005). It focuses on five broad processes as well as internal functioning are re-
phases covering quired to make a success of ERP implementation.
120
E-Government and ERP
users and acquirers of data, information and sup- aligned with the Lines of Business) toward
porting technology systems in the world. The E- common ground and common language to
Government program continuously identifies IT facilitate improved information sharing
opportunities for collaboration and consolidation • Provides guidance for implementing
using the Federal Enterprise Architecture (FEA) repeatable processes for sharing data
framework. The framework is a comprehensive Government-wide
business-driven blueprint to enable the federal
government to identify opportunities to leverage enterprise Architecture
technology to:
If each division of an organization develops its
• Reduce redundancy; own business processes and IT infrastructure,
• Facilitate horizontal (cross-federal) and the end result may be lack of interoperability,
vertical (federal, state and local) informa- duplicated Enterprise architecture components,
tion sharing; functional gaps, and inability to share information.
• Establish a direct relationship between IT is required. (Tucker and Debrosse, 2003).
and mission/program performance to sup- To avoid these problems, the federal govern-
port citizen-centered, customer-focused ment now mandates the use of enterprise archi-
government; and tectures (EAs) by federal agencies seeking to
• Maximize IT investments to better achieve obtain funding for any significant IT investment.
mission outcomes. Enterprise architectures act as a kind of roadmap
for the design, development, and acquisition of
The FEA framework and its five support- complex, mission-oriented information systems.
ing reference models (Performance, Business, Creating enterprise architecture requires partici-
Service, Technical and Data) are now used by pation from many areas of the organization and
departments and agencies in developing their a great deal of communication to plan and imple-
budgets and setting strategic goals. Data forms ment each stage of the process. The result is a
the base of a transactional system and hence data roadmap that guides an organization through the
integrity is essential for inter-operability. The FEA modernization process and enables it to achieve
Data Reference Model (DRM) defined by the Of- its goals (Tucker and Debrosse, 2003).
fice of Management and Budget, US, provides a
“common language” for diverse agencies to use managing People and
while communicating with each other and with communication
state and local governments seeking to collaborate
on common solutions and sharing information for Managing the implementation requires a dedi-
improved services (Evans, 2005). cated team with adequate skills and a clear plan
The potential uses of the model have been and agenda. It needs to be managed as any large
summarized as: project with clear milestones and deliverables.
The migration to an enterprise resource planning
• Provides a FEA mechanism for identifying (ERP) system is often fraught with peril. Re-
what data the Federal government has and search and experience show that communication
how it can be shared in response to a busi- is a key mechanism for breaking down barriers
ness/mission requirement to change. Employees are better able to tolerate
• Defines a frame of reference to facilitate change if they understand why the change is
Communities of Interest (which will be important and if they feel the changes are being
121
E-Government and ERP
handled with fairness and transparency. Good birth to a new field of knowledge called Citizen
communication throughout the enterprise builds Relationship Management. (Kannabiran, Xavier,
trust and understanding. People must see how the Anantharaaj, 2005). It is about making better use
changes will affect the organization, the citizens of the considerable amounts of information that
and themselves (Kauzlarich, 2003). The success government already collects (Smith, 2003). CzRM
of implementation of ICT projects depends on is about becoming “citizen-centric” (Nowlan,
attitudinal readiness of the beneficiaries for accept- 2001; Hunter & Shine, 2001).
ing change (Bowonder, Mastakar, Sharma, 2005). A citizen can be defined as a consumer of
public goods and services (Nowlan, 2001). In the
knowledge management emerging e-Governance scenario, citizens should
be treated as customers of business organizations,
Knowledge Management is a combination of where serving citizens is the sole purpose of
culture and technology. Culture drives knowl- governments. Citizen Relationship Management
edge management while technology enables it. (CzRM) is a division of customer relationship
The following characteristics of government based management that focuses specifically on how
on its structure and functions drive its knowledge governmental bodies relate to their constituents
management needs. (Xavier, 2002; Jha & Bokad, 2003).
Post-ERP trends are geared towards increasing
• Knowledge which is actionable informa- customer relationships and analysis of the market
tion (also known as knowledge assets) place for maximum profit. Data mining and Busi-
is a central resource of the government. ness Intelligence now are not only supporters of
Effective functioning of government rests growth but also act as initiators of growth. Today’s
on effective acquisition and dissemination organizations are looking for applications to in-
of knowledge. spire and lead the way. IT is no more an internal
• Similar knowledge requirements spread system of automation but is now an external means
across the states, districts, and other local of customer communication and market analysis
governments. (Tucker and Debrosse, 2003).
• Transfer of people across government de- The services strategy entails building an integra-
partments calls for a repository of knowl- tion layer that is separate and distinct from any of
edge which can be used wherever they the software applications, including ERP. Services
move. extract pieces of data and business logic from systems
• Proactive action is required if governments and databases and bundle them together into units that
want to transform themselves into “an- are expressed in ‘business’ terms. Implementing a
ticipatory governments” to meet the chal- service-oriented architecture can involve developing
lenges of the emerging E-governance era applications that use services, making applications
(Misra, Hariharan, Khaneja, 2003). available as services so that other applications can
use those services, or both. (Ort, 2005).
emerGInG trends Service-oriented architecture (SOA) is the
emerging trend in enterprise computing because
While ERP is concerned with the use of IT for it holds promise of IT becoming more agile in
efficient functioning of government depart- responding to changing business needs. Gartner
ments, attempts are on to morph the customer reports that “By 2008, SOA will be a prevailing
relationship management concepts for creating software engineering practice, ending the 40-year
effective service for the citizens which has given domination of monolithic software architecture”
122
E-Government and ERP
123
E-Government and ERP
Aladwani, A. (1998). Coping with users resistance Davenport, T. H. (1998). Putting the Enterprise
to new technology implementation: an interdisci- into the Enterprise System. Harvard Business
plinary perspective. Proceedings of the 9th IRMA Review, 76(4), 121–132.
Conference, Boston, MA, 17-20 May, pp. 54-9.
Dejpongsarn, N. (2005). ERP Framework with
Aladwani, A. (1999). Implications of some of the mySAP Solution. A presentation.
recent improvement philosophies for the manage-
Douglas, M. (2002). Planning for the Enterprise.
ment of the information systems organization.
New York, (April): 16.
Industrial Management & Data Systems, 99(1),
33–39. doi:10.1108/02635579910249594 Evans, K. S. (2005). Expanding E-Government:
Improved Service Delivery for the American
Aladwani,A. M. (2001). Change management strat-
People Using Information Technology. A Report
egies for successful ERP implementation. [Techni-
for the President’s Management Council Dec 2005
cal paper]. Business Process Management Journal,
7(3), 2001. doi:10.1108/14637150110392764 Flak, L. S., & Rose, J. (2005). Stakeholder
Governance: Adapting Stakeholder Theory To
Apicella, M. (2000). The hand that moves your
E-Government. Communications of AIS, 2005,
business - ERP software moves to the Web, pre-
16, 642-664, 23
senting both pitfalls and opportunities.(enterprise
resource planning) . InfoWorld, (June): 26. Gartner’s Four Phases of E-Government Model.
(2001) USA, Gartner Group. Europa (2001) “E-
Bartholomew, D. (2004). The ABC’s of ERP. CFO
government - Electronic access to public services.
IT, October 5, 2004. http://www.cfo.com/article.
(online)(cited on 20th December, 2003). Available
cfm/3171508/c_2984786?f=Technology_top-
from <URL: http://europa.eu.int/>
stories
Hunter, D. R., & Shine, S. (2001). Customer Re-
Boonstra, A. (2005). Information Systems
lationship Management- A Blueprint for Govern-
as Redistributors of Power Interpreting an
ment. White Paper, Australia, Accenture.
ERP implementation from a stakeholder per-
spective. som.eldoc.ub.rug.nl/FILES/reports/ Jha, B., & Bokad, P. (2003).Managing Multiplicity
themeA/2005/05A06/05A06.pdf of Citizens’ identity -A Taluka level case study.
International Conference on E-Governance,
Bowonder, B., Mastakar, N.,& Sharma, K. J.
1(5), 24-31
(2005). Innovatiive ICT platforms: The Indian
Experience. International Journal of Services Kannabiran, G. Xavier, M. J., & Anantharaaj, A.
Technology & Management, 6(3/4/5), 1-1. (2005). Enabling E-Governance Through Citizen
Relationship Management-Concept, Model And
Budhiraja, R. (2003). Electronic Governance – A
Applications. Journal of Services Research, 4(2)
key issue in the 21st century. A paper by Additional
(October 2004 - March 2005).
Director Electronic Governance Division Ministry
of Information Technology Govt. of India). Kauzlarich, V. (2003). Organizational Change
Management is Key to Program’s Success. Enter-
Carter, M. (2004). Key note address on E-gover-
prise Modernization Issue, fall 2003, 7(2).
nance – Transforming India. National summit–
India: The Knowledge Capital February 17, 2004
124
E-Government and ERP
Khalil, M. A., Lanvin, B. D., & Chaudhry, V. Rao, T. P., & Rama, R. Venkata. V., Bhatnagar, S.
(2002). The E-government Handbook for De- C., & Satyanarayana, J. (2004). “E-Governance
veloping countries. infoDev Program The World Assessment Frameworks (EAF Version 2.0)” Re-
Bank Group. port for Department of Information Technology,
Government of India May 2004
Kirwan, K., Sawyer, D., & Sparrow, D. (2003).
Transforming Government Through Enterprise AMR Research, (2002). The Multibillion-Dollar
Modernization. Enterprise Modernization Issue, Enterprise Performance Planning Market,16
Fall 2003 7(2). August 2002.
Koch, C. (n/a). ABC: An Introduction to ERP Saxena, K. B. C. (2005). Towards excellence in
Getting started with Enterprise Resource Planning e-governance. International Journal of Public
(ERP). http://www.cio.com/article/40323/ABC_ Sector Management, 18(6), 498-513, 16
An_Introduction_to_ERP
Scott-Morton, M. (Ed.). (1991). The corporation
Markus, M. L., Axline, S., Petrie, D., & Tanis, C. of the 90s. Information technology and organiza-
(2000). Learning from adopters’ experiences with tional transformation. Oxford: Oxford University
ERP: Problems encountered and success achieved. Press.
Journal of Information Technology, 15, 245–265.
Smith, A. Opinion (2003). Citizen Relationship
doi:10.1080/02683960010008944
Management. (online) (cited June 12, 2003). Avail-
Microsoft. Enterprise Resource Planning- Manag- able from <URL:http://www.crm-forum.com>.
ing the Lifecycle of Government Business. lead
Stratman, J., & Roth, A. (1999), Enterprise
feature from the Tourism and Travel edition of
resource planning competence: A model, propo-
Microsoft in Government, Worldwide.
sitions and pre-test, design-stage scale develop-
Misra, D. C., Hariharan, R., & Khaneja, M. (2003, ment. 30th DSI Proceedings, 20-23 November,
March). E-Knowledge Management Framework pp. 1199-201.
For Government Organizations . Information
Torres, L., Pina, V., & Acerete, B. (2006, Apr).
Systems Management, 20(2), 38–48. doi:10.120
E-Governance Developments in European
1/1078/43204.20.2.20030301/41469.7
Union Cities: Reshaping Government’s Rela-
Mullin, R. (2000). ERP-2-ERP: “Forging a Pro- tionship with Citizens. Governance, 19(2), 277.
prietary Link” (Brief Article) . Chemical Week, doi:10.1111/j.1468-0491.2006.00315.x
(June): 28.
Tucker, R., & Debrosse, D. (2003). Enterprise
Nowlan, S. (2001). Citizen Relationship Man- Architecture: Roadmap for modernization” En-
agement E-CRM in the Public Sector,USA. terprise Modernization Issue, fall 2003, 7(2)
Pricewaterhouse-Coopers.
Xavier, M. J. (2002, April-June). Citizen Rela-
Ort, E. E. (2005). Service-Oriented Architecture tionship Management- Concepts, Tools and Ap-
and Web Services: Concepts, Technologies, and plications. South Asian Journal of Management,
Tools. Sun Developers Network.http://java.sun. 9(2), 23–31.
com/developer/technicalArticles/WebServices/
soa2/SOATerms.html#soaterms
125
E-Government and ERP
key terms And deFInItIons of reform in the way Governments work, share
information, engage citizens and deliver services
Clean Data: For an organization to function to external and internal clients for the benefit of
effectively, data needs to be easily accessible both both government and the clients that they serve.
to customer sand internal users. Data is dispersed Enterprise Architecture: An organisation has
as governments like business organizations work assigned roles and responsibilities, and established
in silos. To make this data accessible to others data plans for developing products and services. The
conversion is a necessity as multiple sources and scope of Enterprise Architecture can be defined as
input formats, inconsistent styles and complex- encompassing the whole enterprise with confirmed
ity of data structures. For any new system to get institutional commitment to deliver products and
started it is necessary to convert the existing data services, both current and planned with clear tran-
from legacy systems or manual records to fit into sition plans. This in fact would define the organisa-
the new data structures. This is a critical factor in tion structure, functions and the relationships that
ERP implementation projects. By clean data it is would facilitate the organisation to meet its desired
meant that there are no duplicates definitions of goals. This is extremely essential for enterprise
data which cause inconsistency. modernisation. Development of the enterprise
Customization: In an attempt to deal with architecture will typically involve, analysing the
the potential problems presented by existing current architecture which will be a process of
information systems, there is a shift towards the description, documenting the architecture “as-is”
implementation of ERP packages. Generally it or “baseline” architecture, moving on to a defini-
is felt that ERP packages are most successfully tion of the architecture as it is planned to develop
implemented when the standard model is adopted. in the future - the architecture as it should be or
Yet, despite this, customisation activity still occurs “target” architecture which would align with the
reportedly due to misalignment of the functionality vision of the organisation.
of the package and the requirements of those in Enterprise Resource Planning (ERP): It is
the implementing organisation. In such a situation an integrated information system that integrates
the first thought that comes to a layman’s mind is all departments within an enterprise. Evolving out
to modify the software to provide the necessary of the manufacturing industry, ERP implies the
report or layout. Most ERP products are generic. use of packaged software rather than proprietary
Hence, some customisation is needed to suit the software. ERP modules may be able to interface
company’s needs. But optimal customisation in with an organization’s own software with varying
most cases is subjective with no definite rules as degrees of effort, and, depending on the software,
end-users are not always technically equipped to ERP modules may be alterable via the vendor’s
understand the far-reaching implications of the proprietary tools as well as proprietary or standard
changes that they are demanding. There is always programming languages. An ERP system can
a risk of destabilising the core application. Cus- include software for manufacturing, order entry,
tomisation can make or break the implementation accounts receivable and payable, general ledger,
of an ERP. It is therefore necessary to strike the purchasing, warehousing, transportation and hu-
right balance. man resources. The major ERP vendors are SAP
E-Government: Government’s foremost job and Oracle specialising in transaction processing
is to focus on safeguarding the nation / state and that integrates various departments. Information
providing services to society as custodian of the infrastructure, it is the technology infrastructure
nation’s / state’s assets. E-Government can there- required to manage information in an organisa-
fore be defined as a technology-mediated process tion. It consists of the computers, software, data
126
E-Government and ERP
structures and communication lines underlying of public entities and their relationships with each
critical services that society has come to depend other and with the larger world. It addresses issues
on. It consists of information systems which cover such as how public sector organizations are orga-
critical aspects such as financial networks, the nized and managed, how public policy structures
power grid, transportation, emergency services the design of government programs that we rely
and government services. This is required to upon, how our states, cities, and towns work with
implement an ERP system. the federal government to realize their goals and
Inter-Operability: Various departments orga- plan for their futures, how our national govern-
nize work in silos and tend to work independently. ment creates and changes public policy programs
Data forms the basis of a transaction processing to respond to the needs and interests of our nation.
system like ERP which integrates these depart- Service-Oriented Architecture: Service-
ments so that basic data entered once can be used by oriented architecture (SOA) is the emerging trend
many. More efficient exchanging and processing in enterprise computing because it holds promise of
of data is required to provide a seamless execution IT becoming more agile in responding to changing
of a service. Inter-operability therefore means business needs. Implementing a service-oriented
the capability of different departments working architecture can involve developing applications
together to provide a service. that use services, making applications available
Public Administration: Every facet of our as services. A service-oriented architecture is an
daily lives is impacted in some way by the actions information technology approach or strategy in
of the federal, state, or local bureaucracies that which applications make use of services available
manage and organize the public life of the country in a network such as the World Wide Web.
and its citizens. Public administration is the study
This work was previously published in Handbook of Research on Enterprise Systems, edited by Jatinder N. D. Gupta, Sushil
Sharma and Mohammad A. Rashid, pp. 346-361, copyright 2009 by Information Science Reference (an imprint of IGI Global).
127
128
Chapter 1.9
Enterprise Application
Integration (EAI)
Christoph Bussler
Merced Systems, Inc., USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Application Integration (EAI)
In the general case, different back end application in one system has to be applied to all the other
systems store potentially different data about the systems that store the same object. The objects are
same objects like customers or machine parts. replica of each other since all have to be updated in
For example, a part might be described in an ERP the same way so their content is exactly the same.
system as well as in a MRP system. The reason Only when all the objects are updated they are
for the part being described in two different back consistent again and the overall status across the
end application systems is that different aspects back end application systems is consistent again.
of the same part are described and managed. In In the replicated case it must not be possible that
fact, this means that the not necessarily equal the same object exposes different properties like
representation of the object exists twice, once in in the address example above.
every system. If there are more than two systems, A third use case is that applications participate
then it might be very well the case that the same in common business processes. For example, first
object is represented several times. Any changes a part is being purchased through the ERP system
to the object have to be applied to the representa- and upon delivery it is entered and marked as
tion of the object in all systems that contain the available in the MRP system. The business process
object. And, since this distributed update cannot behind this is consisting of several steps, namely
happen simultaneously (in the general case), dur- purchase a part, receive the part, make the part
ing the period of applying the change the same available, and so on. In this case the back end
object will be represented differently until the application systems do not share common data,
changes have been applied to all representations but their data state depends on the progress of a
in all back end application systems. It therefore business process and it has to update the back
can very well be the case that during an address end application systems accordingly. The data
update of a customer object the customer has two will change their state according to the progress
addresses. Some objects representing the customer of the business process. In this sense they share
have already the new address while others still a common business process, each managing the
have the old address. This situation exists until data involved in it.
the distributed update is complete. Furthermore, All these three use cases, while looking quite
in most cases there is no record of how many different from each other, have to be implemented
systems represent the same object. It might be by companies in order to keep their business
the case and actually often it is the case that a data consistent. EAI technology (Bussler 2003)
change is not applied to all objects because it is (Hohpe and Woolf 2003) allows to accomplish
not known which back end application system has this at it provides the necessary functionality as
a representation of the object in the first place. described next.
Only over time these cases will be detected and
rectified, mainly through the resolution of error
situations. enterPrIse APPlIcAtIon
In summary, the same object can be represented InteGrAtIon tecHnoloGy
in different back end application systems, the
updates to an object can cause delays and incon- Enterprise application integration technology
sistencies, and locations of object representations addresses the various scenarios that have been
can be unknown due to missing object registries. introduced above by providing the required func-
A second use case is that precisely the same tionality. In the following the different function-
object is replicated in different back end applica- alities will be introduced step by step. First, EAI
tion systems. In this case the update of the object technology provides a reliable communication
129
Enterprise Application Integration (EAI)
mechanism so that any communication of data back end application system that has interest in
between back end application systems is reliable. specific objects and changes to them subscribes to
This ensures that no communication is lost. This those. Every back end system publishes changes
is often achieved by sending messages through like object creation, update or deletion. If there
persistent and transactional queuing systems (Gray is a subscription that matches a publication, the
and Reuter 1993). Queuing systems store mes- same changes are applied to the subscribing back
sages persistently and transactionally achieving end application system.
an exactly-once message communication. While publish/subscribe technology is quite
EAI technology uses adapters (J2EE Connec- useful, it is not able to implement business
tor Architecture 2007) in order to connect to the process integration (Bussler 2003). In this case
proprietary interfaces of back end application several back end application systems have to be
systems. An adapter knows the proprietary inter- called in a specific order as defined by a business
face and provides a structured interface to the EAI process. Sequencing, conditional branching and
technology. This allows EAI technology to connect other control flow constructs define the invoca-
to any back end application system for which an tion order of the back end application systems
adapter is available. If no adapter is available for dynamically. Publish/subscribe cannot express this
a particular back end application system then a type of multi-step execution and more expressive
new one has to be built. Some EAI technologies technology is required.
provide an adapter development environment EAI technology incorporated workflow
allowing new adapters to be constructed. Adapt- management systems in order to enable more
ers can retrieve data from back end application complex and multi-step executions. Business
systems as well as store data within back end process based integration requirements are ad-
application systems. They therefore enable the dressed through workflows. Through a workflow
communication of the EAI technology with the specification the overall invocation order can be
back end application systems. established and complex processes like human
EAI technology by means of connecting to resource hiring or supply-chain management are
all required back end application systems with possible. Workflow steps interact with back end
adapters can propagate data changes to all of the application systems through adapters whereby
back end application systems. For example, this the workflow steps themselves are sequenced by
allows ensuring that all representations of an workflow definitions.
object in several back end application systems While business process based integration is
can be changed as required. EAI technology is a significant step in the development of EAI
required to process changes in an order preserving technology, it is not sufficient in heterogeneous
fashion to ensure object consistency. For example, environments. For example, different back end
an update of an object followed by a read of the application systems follow in general different
object value must be executed in the given order. data models. If this is the case the same type of
Not following the order would return an incor- data is represented in different ways. For example,
rect value (i.e., the value before instead of after one back end application system might imple-
the update). Any negative consequences of delay ment an address as a record of street name, street
and inconsistencies are avoided by ensuring that number, city and zip code while another back end
every request is processed in the order of arrival. application system might implement an address
In early implementations of EAI technology as two strings, “address line 1” and “address line
publish/subscribe technology was used to establish 2”. If data is transmitted from one back end ap-
the communication rules (Eugster et al. 2003). A plication system to another one the address has to
130
Enterprise Application Integration (EAI)
be mediated from one representation to the other support the EAI problem based on Web Service
representation for the data to be understood by the technology. Other vendors like IBM (IBM 2007),
receiving back end application system. Microsoft (Microsoft 2007) or Oracle (Oracle
2007) are also offering SOA based products. The
architecture underlying Web Service based ap-
current develoPments proaches is called Service-Oriented Architecture
And Future trends (SOA) and standardization work is ongoing, too
(OASIS SOA RM 2007).
The latest development in EAI technology takes Further out are Semantic Web technology based
data heterogeneity into consideration and provides approaches. They are in a research state today but
mediation technology. For example, Microsoft’s can be expected to be available in commercial
Biztalk Server (Microsoft 2007) has a mapping technology later on. A significant effort applying
tool that allows the graphical definition of mapping Semantic Web technology in order to solve the
rules that can transform a message in one format integration problems is the Web Service Modeling
into a message of a different format. Tools from Ontology (WSMO) (WSMO 2007). This ontology,
other vendors follow the same approach. The which is developed by a significant number of
research community is also working on the data organizations, uses Semantic Web Technology to
mediation problem and an overview is given in define a conceptual model to solve the integration
(Rahm and Bernstein 2001). problem that encompasses EAI integration. The
Also, this new generation realizes that back main conceptual elements proposed are ontolo-
end application systems expose not only data gies for defining data and messages, mediators for
but also public processes that define interaction defining transformation, goals for dynamically
sequences of data (Bussler 2003). A public pro- binding providers and web services for defin-
cess allows to determine which messages a back ing the interfaces of communicating services.
end application systems sends or receives and in In order to define a specific EAI integration, the
which order. This allows ensuring that all mes- formal Web Service Modeling Language (WSML)
sages are exchanged appropriately with the back (WSML 2007) is defined. This can be processed
end application system. by a WSML parser. In order to execute B2B
Web Services are a relatively new approach to integration the Web Service Modeling Ontology
communicate data and message over the Internet Execution environment (WSMX) (WSMX 2007)
(Alonso et al. 2004). Web Services are starting is developed. It serves as a runtime environment
to be used in EAI technologies in several places. for integrations defined through WSML. Another
One is for the communication between back end Semantic Web technology based approach is
application systems and the EAI technology itself. OWL-S (OWL-S 2007).
The other place is to define the interface of back Very recently a first standard in the Semantic
end application systems as Web Services. In this Web Service space was established as a W3C
case all back end application systems have a ho- recommendation. It is called SAWSDL and can
mogeneous interface technology they expose and be retrieved at (SAWSDL 2007). The main con-
an EAI technology does not have to deal with the cept behind this standard is the augmentation of
huge variety of interfaces of back end application the WSDL approach for describing Web Service
systems any more. interfaces.
Architectural approaches based on Web Service
technology are emerging. For example, BEA (BEA
2007) provides a whole suite of technologies that
131
Enterprise Application Integration (EAI)
Autonomy Inconsistency
Back end applications are autonomous in their state changes and If a delay happens while changing different representations of the
EAI technology must be aware that since it cannot control the ap- same object inconsistencies can occur if these different representa-
plication’s state changes tions are accessed concurrently
Communication Mediation
EAI technology must provide reliable and secure communication Due to heterogeneity of back end application systems objects are
between back end application systems in order to ensure overall represented in different data models that have to be mediated if
consistency objects are sent between applications
Delay Process management
Changes of objects represented in several back end application Multi-step business processes across back end application systems
systems might not happen instantaneously due to the time required require process management to implement the particular invocation
to do the update and so a delay can occur between the update of the sequence logic
first and the last change Publish/subscribe
Distribution Back end application systems can declare interest in object changes
Back end application systems are distributed in the sense that each through subscriptions that are matched with publications of avail-
has its own separate storage or database management system with able object changes
each being separately controlled and managed Reliability
Duplication The integration of back end application systems must be reliable in
Objects that have to reside in several back end application systems order to neither loose data nor accidentally introduce data by retry
might require duplication in order to ensure back end application logic in case of failures
state consistency Replication
Heterogeneity Replication is a mechanism that insures that changes of an object
Back end application systems are implemented based on their own are automatically propagated to duplicates of this object. The vari-
data model and due to the particular management focus the data ous representations act as if they are one single representation
models differ in general not complying with a common standard Security
Communication of data between back end application systems
through EAI technology must ensure security to avoid improper
access
132
Enterprise Application Integration (EAI)
Alonso, G., Casati, F., Kuno, H., & Machiraju, SAWSDL. (2007). www.w3.org/2002/ws/sawsdl/.
V. (2004). Web Services-Concepts, Architectures
Web Services. (2007). Web Service Activity. www.
and Applications. Springer-Verlag.
w3.org/2002/ws/
BEA. (2007). BEA Systems, Inc. www.bea.com.
WSML. (2007). Web Service Modeling Language.
Bussler, C. (2003). B2B Integration. Springer- www.wsmo.org/wsml
Verlag.
WSMO. (2007). Web Service Modeling Ontology.
Eugster, P., Felber, P., Guerraoui, R., & Kermar- www.wsmo.org
rec, A.-M. (2003). The many faces of publish/
WSMX. (2007). Web Service Modeling Execution
subscribe. [CSUR]. ACM Computing Surveys,
Environment. www.wsmx.org
35(2). doi:10.1145/857076.857078
Gray, J., & Reuter, A. (1993). Transaction Process-
ing: Concepts and Techniques. Morgan Kaufmann.
key terms And deFInItIons
Hohpe, G., & Woolf, B. (2003). Enterprise
Integration Patterns: Designing, Building, and Adapters: Adapters are intermediate software
Deploying Messaging Solutions. Addison-Wesley that understand proprietary back end application
Professional. interfaces and provide easy access interfaces for
EAI technology integration.
IBM. (2007). International Business Machines, Back End Application Systems: Software
Corp. www.ibm.com. systems managing business data of corporations.
Microsoft (2007). Microsoft Corporation. www. EAI Technology: Software systems that pro-
microsoft.com. vide business-to-business integration functionality
by sending and receiving messages and retrieve
OASIS SOA RM. (2007) www.oasis-open.org/ and store them in back end application systems.
committees/tc_home.php?wg_abbrev=soa-rm Process Management: Process management
Oracle (2007). Oracle Corporation. www.oracle. allows defining specific invocation sequences of
com. back end application systems in context of EAI.
Publish/Subscribe: Publish subscribe is a
OWL-S. (2007). OWL-S. www.daml.org/services/ technology whereby interest can be declared and
owl-s/. is matched upon the publication of object changes.
Rahm, E., & Bernstein, P. (2001). A survey Workflow Technology.: Workflow technol-
of approaches to automatic schema matching. ogy is a software component that provides the
The VLDB Journal, 10, 334–350. doi:10.1007/ languages and interpreters to implement process
s007780100057 management.
This work was previously published in Handbook of Research on Innovations in Database Technologies and Applications: Cur-
rent and Future Trends, edited by Viviana E. Ferraggine, Jorge Horacio Doorn and Laura C. Rivero, pp. 837-843, copyright
2009 by Information Science Reference (an imprint of IGI Global).
133
134
Chapter 1.10
Enterprise Tomography:
An Efficient Approach for Semi-
Automatic Localization of
Integration Concepts in VLBAs
Jan Aalmink
Carl von Ossietzky University Oldenburg, Germany
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Tomography
135
Enterprise Tomography
from different perspectives in different semantic able information to see the delta of this semantic
genres. Moreover, a delta operator is supposed to join between points of time t0 and t1. So one can
make the integration difference between points of track the evolution of the integration of a VLBA.
time t0 and t1 visible. Having in mind that VLBAs A comparison of VLBAs (e.g. modified code
consist of heterogeneous constituents, we need to clones) will be possible with our algorithm as
have an abstract holistic view on the normalized well. So it might be very interesting to evaluate
integration aspects. Beyond software, we also take the software Add-On between two releases or the
persistent data, meta data, system logs, business delta in the business data.
process activity journals, virtual and transient In accordance to tomography in medical
data, solution databases, model databases and diagnostics, we utilize a similar metaphor: The
so forth into consideration. So, we not only take Enterprise Tomograph. It is supposed to diagnose
the software of the Enterprise Platform itself into integration aspects of a complex VLBA, perform
consideration but the business data and meta data indexing of all scanned information, and provide
and contextual data as well. time efficient access to the assembled scanned data
Integration is a polymorphic topic. We regard from different semantic perspectives. Especially
integration on different levels of granularity. For the integration aspect delta is supposed to be
instance, on a low level of granularity, dynamic made available for large maintenance and service
method calls can be seen as an integration aspect. teams. Based on this information maintenance
On a medium level of granularity, cross component teams can locate real error symptoms in a VLBA
service consumption can be seen as an integration more easily and they are in a better position to
aspect or security as a cross cutting integration assess the consequences of any change in the
scattered in a VLBA. Registered integration VLBA software and therefore mitigate the risk
content (e.g. message routing rules of integration of inconsistent data processing.
hubs in enterprise service bus) is to be regarded In the scope of this chapter we assume that in
as high level integration. Logistical quantity flow, an enterprise software factory the construction
accounting value flow and financial data flow are procedure of a VLBA is very similar to that of
also prominent examples of integration on high the building industry. The first step is requirement
granularity level. Workflow, Webflow and Process specification, architecture modeling, review and
Integration can be regarded as integration on high acceptance, construction and finally continuous
granularity level as well. maintenance. The construction procedure in both
Developer teams and maintenance teams have industries is quite similar: If architecture models
different perspectives on VLBAs in their daily are in place, the construction procedure starts bot-
work: Developers are primarily assembly focused tom up: Beginning from the foundation and ending
(bottom up), whereas maintainers have the inverted in the construction of the roof, not vice versa.
top down view on a VLBA: Maintainers are Traditional top down model driven approaches
thinking rather in error symptoms and ontologies of Software Engineering do not necessarily meet
provoking the error symptoms (Abdullah, 2001). the needs of service and maintaining teams in
For example, they need to find out for a given the context of VLBAs adequately. Models are
(inconsistent) production order id the involved important, but usually those models are not linked
coding and meta data, the header and items in to the VLBA software. To bridge this technical
the persistency layer, material consumption, con- gap, the Enterprise Tomograph comes into place
firmation items, models, relevant documentation with multiple phase iteration: The Enterprise
etc. In this example we regard integration as a Tomograph knows three phases. The first phase
semantic join between those concepts. It is valu- in concerned with scanning of the VLBA, the
136
Enterprise Tomography
intermediate phase constructs and prepares indices Integration deltas are determined by modified
for efficient access and the third phase provides tree distance algorithms (Lu, et. al., 2001) and
access to integration data. displayed in a structured textual manner.
During the time-consuming scanning proce- Typically integration concepts are best known
dure (parallel crawling of VLBA), the Enterprise by individual developers and maintainers of the
Tomograph orchestrates concept mining algo- VLBA community. They may want to register addi-
rithms. The mining algorithms extract models, tional concept mining algorithms to the integration
software fragments, links of software fragments, ecosystem of the Enterprise Tomograph. In this
business objects, technical objects, meta data, way the integration knowledge of a few integration
solution databases and transforms those to stan- experts can be shared across the community. The
dard ontology representations that are grammar Enterprise Tomograph provides a domain-specific
compliant. The resulting ontology is the integra- search UI and displays the integration aspects. The
tion knowledge representation. We take a subset output can be iteratively refined and may serve
of the ontology representation standards into as input/workload for the Enterprise Engineer
consideration: The concept mining algorithms for further processing. For example, refactoring,
are supposed to map the integration ontology to navigation, semantic tagging, search & replace
rooted unordered labeled trees. The set of rooted within integration genres, multiple breakpoints,
unordered labeled trees are to be indexed and stored code & data compare, undo.
in PAT Arrays (PAT Array as a space efficient and The Enterprise Tomograph itself is dedicated
access optimized data structure of Patricia Tries for service enabling and can be hosted in a VLBA
and suffix trees; PAT Arrays are well known in side-by-side mode. It provides high efficient
genetic engineering and information retrieval). logarithmic access to integration concepts of a
One theme of the Enterprise Tomograph will be VLBA in the space time continuum.
the Enterprise Introspector. It generically calculates Enterprise Tomography is a proposed collab-
the footprint of a business transaction execution in orative index-snapshot based and domain-specific
the persistency layer, the footprint of a service call approach for efficient incremental development
or the footprint of a message choreography process and maintenance of VLBAs in the enterprise
instance between t0 and t1, or the delta between two software industry.
database schema in a specific domain area. Figure 1 outlines the Enterprise Tomography
The basis algorithm of the Enterprise Tomo- approach in the context of cross-organizatorial
graph is a modified DC3-algorithm (difference VLBAs. The Enterprie Tomograph crawler ex-
cover modulo 3 known in information retrieval tracts integration ontology forests from VLBAs,
(Dementiev, 2006; Burkhardt, 2006). It constructs Enterprise Platforms and databases. In-memory
PAT Arrays and stores textual suffixes in a com- indices and delta indices are created. Via search
pressed manner. The set of resulting PAT Arrays UI a full domain-specific search is possible. In
are organized in a genre-layered tenancy concept the Delta Monitor changes of integration concepts
allowing independent user groups working on can be traced.
the global index and updating it in a concurrent
polychronic way. There will be defined a quasi enterprise tomography - use
algebra on the set of PAT Arrays: Delta operator, cases and scenarios
plus operator, pseudo inverse operator.
For instance the plus operator merges 2 indi- First of all Enterprise Tomography supports
ces (PAT Arrays) resulting in one encompassing program comprehension in maintenance and
PAT Array. development phases of VLBAs and Enterprise
137
Enterprise Tomography
Platforms. Views from different semantic per- entities and business data. Depending of the
spectives can be projected on a domain or area search criteria a launch pad can be generated.
of expertise. These views can incrementally be This launch pad points to the appropriate entitiy-
refined to a set of integration concepts of inter- associated operations. In contrast to Page-Rank
est. In this way a dynamic model is derived from prioritization in Web 2.0 search, the Enterprise
the enterprise software and its contextual data. Tomograph prioriztizes integrations concepts in
Maintainers and developers are in the position search result list based on reuse frequency. This
to make assessments for side effects of software means integration concepts with highest reuse
changes and enhancements. frequency appears first. Because of global impact
Furthermore, Enterprise Tomography supports in VLBA software, changing of those integration
refactoring of Enterprise Platforms and VLBAs in concepts requires highest attention.
software engineering development phases. Cross- Regarding real world VLBAs and Enterprise
system where-used lists of integration concepts Platforms there is normally no semantic linkage
can easily be generated. Textual search and replace between coding fragments, metadata, models,
functionality based on the where-used lists can be configuration data, business data, corrections,
provided. The search result list of the Enterprise consulting documents, documentation, process
Tomograph serves as workload for refactoring journals, system logs, training material, and
tasks. In-place navigation to software fragments contextual data. Taking those information sources
and contextual data enables software engineers into consideration, the Enterprise Tomograph
to drill down into the software and business data joins development and maintenance relevant
universe. information and provides ubiquituous search and
The Enterprise Tomograph can be seen as an delta tracking functionality. Integration ontologies
abstract navigation tool for software fragments, serves as an interlingua for the participating sys-
138
Enterprise Tomography
tems. Integration ontology extracting algorithms Enterprise software often is deployed in re-
generate normalized ontologies. With a generic leases. Codelines are the pendants in software
search UI software engineers can locate and vi- logistics. Development teams are focused on
sualize cross-cutting concerns. areas of expertise or domains respectively. Taking
In Test Driven Development (TDD) software functional upward-compatibility into consider-
engineers needs to reiterate business processes. A ation, functionality of lower releases is a subset of
generic inverse operator for business processes is functionality of higher releases. To put it in other
advantageous. Enterprise Introspection as a spezi- words: release n+1 = release n + delta. Typically
alization of Enterprise Tomography is focused on the codbase of delta is significant smaller than the
business data and configuration data of VLBAs and codbase of release n. Release n+1 and release n
Enterprise Platforms respectively. The Enterprise are similar code clones and nearly identical. The
Introspector visualizes the data delta (database Enterprise Tomograph serves as a engineering
footprint) of a business process, of a business trans- environment for controlling the code clones: Incre-
action or of a service call sequence in a domain. mental deltas can be tracked with the delta monitor.
Based on the delta index the Enterprise In- The delta can be visualized in semantic genres.
trospector enables restoring the business process E.g. new service calls, new code fragments, new
data to its former condition. The business process reusables, new business objects, new UI Objects,
chain can be executed again. new metadata or new configuration data between
Traditional IDEs support debugging function- code clone A and code clone B. Corrections to be
ality. Breakpoints can be set directly in coding. made in lower releases have normally to be up-
Conditional breakpoints and watchpoints can be ported to the latest release. This is a prominent
defined. Typically, in enterprise software industry example when code clones comes into play: the
software maintainer are not the authors of the delta ist the correction of release 1..n. . The same
coding they are responsible for. This means it is applies for downports of funktionality to lower
very difficult for software maintainer to identify releases.The Enterprise Tomograph supports to
appropriate breakpoints, not to mention to define add the delta to each individual release.
complex conditional breakpoints. With refinement Sharing integration knowledge amongst
technique, the Enterprise Tomograph supports SCRUM teams and within SCRUM teams is an
software engineers to find appropriate software essential use case. The Enterprise Tomograph
fragments. The contextual data for finding appro- serves as a SCRUM environment. It provides an
priate locations is taken into consideration. infrastructure for sharing integration knowledge
Along the lifecycle of VLBA and Enterprise to be categorized in semantic genres. A full search
platforms, quality management engineers need in a genre and a search on delta in a genre allows
indicators for quality assessment purposes. efficient location of involved integration concepts.
Software metrics and architecure metrics are ap- This supports comprehension of Integration in
propriate means for that purpose. The Enterprise Enterprise Platforms and VLBAs.
Tomograph attach metric figures to integration Generic operations and navigation based on
ontology concepts or generates virtual metric the located integration concepts allow further
entities in tree based formats. Delta tracking of development of the enterprise software. This in-
the metric figures on a domain is facilitated by cludes mass processing on the worklist provided
the Enterprise Tomograph. by search result of the Enterprise Tomograph.
Integrated exception handling and alerting are Changes and enhancements made by the
efficient functions for setting up regulator circuits SCRUM teams can be visualized instantaneously.
in software engineering. In the delta monitor the results can be verified.
139
Enterprise Tomography
140
Enterprise Tomography
can be queried with the production order id. As a enumerates the domains of the dendrogram path
result he gets the data structure of the production beginning from root node to leaf node.
order, the production order instance, persistency, The difference of 2 vectors is calculated by
documentation and the production order software the Enterprise Tomograph Delta Operator. In our
fragments of job floor planning. In the next step example we see the difference of SCM (coding +
he can refine his query for the related components. data at different points of time) on a fixed location.
Now he may want to create new confirmations on Another use case is the comparison of a VLBA at
a production order component. In a subsequent different locations on the y-axis. For example the
step he can track the evolution of the identified difference of a VLBA in a development system and
ontology concepts (in our example the production in a production system can be determined. This
order component confirmations) with the delta means we compare code clones. In this regard
operator of the Enterprise Tomograph. Based on the difference of configuration data in different
the delta results the software engineer has the software locations is valuable information as well.
context of the error symptom as a foundation for On the first sight our approach is similar to
his diagnosis. traditional Web 2.0 search engine techniques.
For deeper understanding Figure 4 displays The VLBA data universe is crawled, indexed
a VLBA in an abstract space-time continuum. A with semantic data organization plus querying
vector in this space represents a dendrogram node via search UI by developer and maintainers. To
index at a point of time . The x-axis represents meet developers and maintainers requirements, we
the instances of the VLBA software and its busi- need to make optimizations in different aspects
ness data persistency at different points of time. as shown in Figure 5. In addition to traditional
The y-axis enumerates the locations of the VLBA approaches, in the Enterprise Engineering context
software within the software landscape. The z-axis we need to focus on domain specific search refine-
141
Enterprise Tomography
142
Enterprise Tomography
ments and a flexible delta calculation based on It supplies rooted unordered labeled trees. Those
domains. Generic operators on generic in memory trees are sequenced. The skewed algorithm DC3
data representations are the main focus of this (difference cover modulo 3) is performed on the
scientific paper. sequenced data. The resulting index and the origi-
Enterprise Tomography is focused on inte- nal sequenced data is compressed and in-memory
gration ontologies and their evolution. It can be organized in an 2 dimensional node-genre grid.
regarded as a special case of ontology integration Each element of this grid points to a compressed
(Abels, et. al., 2005; Nicklas, 2005). PAT Array and its associated sequenced data.
Based on a VLBA dendrogram this procedure
enterprise tomograph - building can be repeated for different data sources, i.e. for
blocks and data Flow different VLBA locations or for different point of
times. Later on the data sources can be compared
The Enterprise Tomograph is divided in building with the Enterprise Tomograph Delta Operator.
blocks for time consuming tasks (data extraction When the developer needs to perform a search
and data organization) and building blocks for in a domain, he selects a dendrogram node. The
time efficient tasks like querying, index merging, node sub-tree is exploded and all node-associated
and visualization. Figure 6 illustrates the anatomy PAT Arrays together with sequenced data are
and high level architecture of the Enterprise To- decoded. The PAT Arrays are merged. The results
mograph. First of all the VLBA dendrogram is are published in the Domain Index Layer. A Query
determined. Based on a dendrogram the Enterprise Engine executes queries based on the domain index.
Tomograph starts the VLBA crawling for contain- Monitor 1 visualizes the search results. Now the
ing nodes. For each node and for each semantic developer may want to refine the search results.
genre an Ontology Mining Algorithm is executed. The search results are sequenced and re-indexed
143
Enterprise Tomography
with DC3 Algorithm. A new PAT Array comes into in Figure 7. Basically for a given dendrogram
being, is coded and placed into a data source which node and a semantic genre a forest of rooted un-
is published to the Domain Index Layer again. ordered labeled trees is determined. The VLBA
The Query Engine searches for the new search data universe serves as the input. Data extraction
pattern and the refined results are displayed again happens with subsequent stemming algorithms
in Monitor 1. This search-refinement round-trip is for filtering significant information relevant to
depicted in Figure 6 with the circular arrow. The the integration context. According to rule sets,
phases of the refinement round-trip can be started ontologies are calculated and normalized. The
asynchronously: While the user is evaluating search resulting trees are annotated with tree hash values
results on Monitor 1, the time consuming PAT Ar- and with tree node hash values as labels.
ray construction via DC3 can be started in parallel The view projects tree nodes to the node set
as preparation for the next refinement query. In of interest. With parameter the behavior of the
this way the user is not aware of interruptions of ontology mining algorithm is influenced. Ontol-
subsequent time consuming index construction. ogy Mining Algorithms reside in a framework
In delta mode of the Enterprise Tomograph, and are orchestrated according to the Inversion
delta calculation is performed on two data sources. of Control Design Pattern. Integration ontology
As explained later on in more detail, domain indi- mining algorithms can be registered by integra-
ces of source m and source n are merged together tion experts.
with watermark data. Delta trees of both tree sets Rooted unordered labeled trees are used for
are determined. Monitor 1 serves for displaying representing integration concepts. An exemplary
of delta trees of source m in full version whereas integration ontology instance is displayed in Figure
Monitor 2 displays delta trees of source n in full 08. Here the business object instance relations,
version. The edit scripts of the delta trees are coding fragments, data persistency, APIs amongst
visualized in Delta Monitor. others are highlighted. Trees containing the inte-
The main part of the VLBA crawling mecha- gration concepts are sequenced to a textual data,
nism is the ontology mining algorithm as outlined that is indexed with DC3 algorithm.
144
Enterprise Tomography
145
Enterprise Tomography
annotated with a label, i.e. with a hash value calcu- trees into consideration. We assume that delta de-
lated by the ontology mining algorithm mentioned termination for unordered non-unique labeled trees
before. Now the question arises which minimal is a relaxative or similar problem in comparison
set of operations need to be performed on tree F to delta determination for unique labeled trees. A
to retrieve tree G. This minimal set of operations proof for this can be made with Simplex Algorithm
is called edit script. The minimal number of edit known in Dynamic Programming (Bille, 2005).
operations is called edit distance. The edit script This issue is not detailed in this paper.
serves as a basis for visual mapping of tree F into In the next section we want to enlighten the
tree G in the Enterprise Tomograph Delta Monitor. skewed DC3 algorithm for PATArray construction.
It is worth noting that as of today delta de- As explained in Figure 10, PAT Array construction
termination for rooted unordered labeled trees is means an indirect lexicographical sort of semi-
considered as NP-complete. Delta determination finite suffixes of a given string. In (Burkhardt,
of ordered labeled trees is much more efficient. 2006) is is proven that this construction consumes
Because of paging in the Delta Monitor, it is not linear operations. The DC3 Algorithm is a skewed
mandatory to determine all tree deltas at a time. divide & conquer algorithm. Basically the steps
Although extremely time consuming procedure mentioned in Figure 10 are executed. A detailed
for large trees, delta determination for reasonable pseudo algorithm and a concrete implementation
sized unordered labeled trees can be performed of DC3 is given in (Burkhardt, 2006).
efficiently on demand at visualization time. PAT Arrays are space efficient data structures
In contrast to the original definition of labeled containing indirect hierarchical lexicographic sort
trees (Shasha, 1992), we take non-unique labeled order according to Patricia Tries. Extended PAT
146
Enterprise Tomography
Arrays accelerates the search procedure. Longest The Delta Operator of the Enterprise Tomo-
Common Prefix LCP can be skipped during search graph is concerned with detecting Delta Trees
(Abouelhoda, et. al., 2005). A drawback of the of two forests originating from different data
extension is the additional space consumption sources. As shown in Figure 12 the intersection
in PAT Array. represents integration ontologies existing in both
PAT Arrays in the context of Enterprise To- data sources A and B. A subset of this intersection
mograph are advantageous because PAT Arrays are delta integration ontologies and needs to be
can be merged in linear time. identified and visualized according to Figure 09.
A PAT Array is the basis for logarithmic in- The delta identification algorithm is explained in
direct search. Assuming all semi-finite suffixes the next section in more detail.
with prefix = search string are to be identified. The basic idea for identifying delta trees is to
A’ points to semi-finite suffixes. A’ is divided in integrate watermarks into the sequenced forest
2 intervals: [left bound...medium] and [medium... text content. As outlined in Figure 12 a watermark
right bound]. Medium serves as a basis for indirect is assembled of a 4 fixed-lenght tuple with hash
comparison: if search string is lower than semi- value of TreeID, hash value of tree, the location
finite suffix of medium then the new right border:= of the tree and the offset of the sequenced tree.
medium otherwise new left border:= medium. The Watermark integration is done for all trees in both
new medium is determined in the middle of the forest A and B. PAT Array construction is done for
new interval. This procedure is re-iterated until the textual content of A and B each. The resulting
border convergence. PAT Arrays are merged. On this constructed PAT
All lexicographical neighbors can be found in Array a binary indirect search is performed for
a row direct behind the location identified previ- the tag <WATERMARK>. Watermark neighbors
ously via indirect logarithmic search. can be found in a sequence. Iterating over this
147
Enterprise Tomography
sequence we can easily determine trees located With this approach we can reuse PAT Array
in A only, in B only, trees in A and B, and delta algorithms for negative doublet recognition of trees,
trees in A and B. Delta trees have a common i.e. delta tree detection. Of course, the administra-
prefix ‘<WATERMARK>Hash Value TreeID’ tive data integrated in the textual content must not
with different hash value tree in consecutive PAT be part of any visualized search result. Appropriate
Array positions. measures can suppress these occurrences.
148
Enterprise Tomography
149
Enterprise Tomography
Another meaningful operator in maintenance With Reed Solomon Codes, retrieval of arbi-
networks is the align operator. Assume the enter- trary n of m fragments suffices for reconstruction
prise software manufacturer wants to deploy a best of the original domain index (Grolimund, 2007).
practice. This best practice (delta) can be added The basics behind is the fundamental theorem
to customers configuration. In this case, adding of algebra (Korner, 2006). If a fragment is dam-
a delta is equivalent to aligning configuration in aged, or not transmitted consistently, the retrieval
a domain. of an additional encoded fragment may be trig-
The align operator can also be applied for code gered (n different consistent encoded fragments
bases. In this way updates of enterprise software are necessary for reconstruction of the original
can be provided. domain index).
The locate operator performs concept location The independent fragment retrieval approach
in integration ontologies. This operator can be ensures an efficient upload and download of large
iteratively be applied for refinement purposes. Enterprise Tomograph domain indices because n
Based on the result other orthogonal operators (n of m) arbitrary encoded fragments can be re-
can be applied e.g. multiple break-point opera- trieved in parallel for reconstructing the original
tor, launch operator, modify operator. The locate domain index (Grolimund 2007).
operator is the basis for refactoring purposes. In addition, with RS-Codes (Reed Solomon
In the P2P network the sender of the encoded Codes) damaged or not consistently transmitted
domain index is the owner of the key. Enterprises encoded fragments can be reconstructed with high
knowing this key are able to decrypt and use the reliability. Encoded fragments contains attached
domain index only. The domain index is divided redundant information (polynom). With polynom
into n fragments. These fragments are redundantly division the correctness can be evaluated. With
encoded and the resulting amount of encoded help of RS erasure codes damaged fragments can
fragments m = n + k is distributed to the peers of be repaired (Forward Error Correction).
the network. The retrieval of the encoded index Figure 15 outlines the interplay of the generic
happens according to an implementation of a operators in the P2P maintenance network.
distributed hash table (DHT).
150
Enterprise Tomography
Enterprise Tomograph with its delta operator Enterprise Tomography is an efficient approach for
has similarities to ontology versioning in ontol- Application Lifecycle Management of VLBAs and
ogy management frameworks (Noy & Musen, Enterprise Platforms. It supports development and
2004). Integration concept location is related to maintenance teams to track incremental changes of
identifying cross-cutting concerns in enterprise integration concepts in VLBA software, business
software. Ontology mining relates to static and data and contextual data. Full domain-specific
dynamic aspect mining in a more abstract sense search of integration concepts, refinement search
(Krinke, 2006). Techniques used in (Hollingsworth and delta search and its visualization is realized
& Williams, 2005) can be seen as a special case with enhanced standard scientific algorithms.
of Enterprise Tomography. Interchangeable enhanced PAT Arrays, PAT ar-
Semantic Integration in VLBAs is covered in ray based delta tree recognition, tree distance
(Brehm & Haak, 2008). In Enterprise Tomography algorithms and tree mappings based on dynamic
integration ontologies are derived from VLBAs. programming are the main algorithms used in
Integration ontologies as an intermediate dynamic Enterprise Tomography. Complexity calculation
model are used for ontology integration. for Enterprise Tomography can easily be derived
Ontology concepts are also used as model from complexity of the individual involved en-
for program comprehension in combination with hanced standard algorithms.
technical unrelated artifacts (Panchenko, 2007). According to VLBA definition, the Enterprise
Tomograph with its generic operators in P2P main-
tenance networks can be regarded as a VLBA. The
business process behind is maintenance service
provisioning for deployed enterprise software.
151
Enterprise Tomography
152
Enterprise Tomography
Panchenko, O. (2007). Concept location and pro- Shasha, D., Statman, R., & Zhang, K. (1992).
gram comprehension in service-oriented software. On the editing distance between unordered la-
In Proceedings of the IEEE 23rd International beled trees. Information Processing Letters, 42,
Conference on Software Maintenance: Doctoral 133–139. doi:10.1016/0020-0190(92)90136-J
Symposium, ICSM, Paris, France (pp. 513–514).
This work was previously published in Social, Managerial, and Organizational Dimensions of Enterprise Information Sys-
tems, edited by Maria Manuela Cruz-Cunha, pp. 232-251, copyright 2010 by Information Science Reference (an imprint of
IGI Global).
153
154
Chapter 1.11
Enterprise Information
System Security:
A Life-Cycle Approach
Chandan Mazumdar
Jadavpur University, India
Anirban Sengupta
Jadavpur University, India
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Information System Security
155
Enterprise Information System Security
156
Enterprise Information System Security
stronger security requirement than basic consumer business with an enterprise easier, know-
transactions such as purchasing a CD or a customer ing that best security practices are adopted
service request. Additionally, confidential docu- by the enterprise.
ments such as financial or health records when • To comply with regulatory requirements
put online, requires enhanced security to ensure and fiduciary responsibilities: Information
personal privacy. Security officers of every enterprise have
In the light of the above discussion, we are a responsibility to ensure the safety and
now in a position to answer the question: “Why soundness of the enterprise, which also
is information security important?”, as it is crucial includes the continuing operation of the
for enterprises to define why they want to achieve enterprise. As a result, enterprises that rely
information security, in order to determine how on computing elements for their business
they will achieve it. Information security is im- must develop policies and procedures that
portant for the following reasons: address not only the protection of informa-
tion assets but also protection of the enter-
• To protect enterprise assets: This is one of prise from liability. For example financial
our primary goals. By “assets” we mean the organizations must protect shareholders’
hardware, software, and information assets investments and maximize return. In ad-
of an enterprise. Hardware assets (Casar, dition, organizations are often subject to
2004) consist of computing systems, com- government regulations, which generally
munication links, and IT sites (or, rooms) stipulate safety and security requirements
in which computing systems are installed. of an organization. Severe penalty is im-
Software assets are the automated and posed on those enterprises which fail to
manual applications that process informa- comply with regulations. In some cases,
tion. Information asset pertains to input, corporate officers who have not properly
processed, output and stored data. performed their regulatory and fiduciary
• To gain a competitive advantage: responsibilities are personally liable for
Developing and maintaining effective se- any losses incurred by the financial institu-
curity measures can provide an enterprise tion that employ them.
with a competitive advantage over its
peers. Information security is particularly Issues, controversIes And
important in the area of e-commerce and fi- Problems oF enterPrIse
nancial services provided over the Internet. InFormAtIon system securIty
It can mean the difference between wide
acceptance of a service and a mediocre Present scenario
customer response. For example, how
many people do you know who would use Information infrastructure consists of technologies
a bank’s Internet banking system if they for gathering, handling, and sharing information.
knew that the system has been success- As the dependence on information infrastructure
fully hacked in the past? Not many. They is significantly increasing there are also rising
would rather go to the competitors for their cases of vulnerability breaches, threats, cyber
Internet banking services. Enterprise secu- attacks and cascading or pervasive failures. They
rity practices instill confidence in custom- are caused due to lack of inherent security in new
ers and employees. This, in turn, makes technologies and protocols, flaws in commonly
potential customers’ decision of doing used products, failures to address security con-
157
Enterprise Information System Security
cerns in system design and use, lack of manage- approach to security is no longer sufficient. The
ment commitment and approach, and lack of user reasons are:
awareness about security.
Organizations such as banking, finance, tele- • The network perimeter is no longer static;
communication, transportation and energy have remote users, contractors, partners, suppli-
infrastructures that are highly interdependent. ers, even web services-based applications
Attacks on one infrastructure can damage other are all allowed network access regardless
infrastructure as well. Concentrated infrastructure of physical location.
attacks could thus have a significant effect on our • Automated attacks often enter the network
national security and economy. through legal TCP ports before creating
A look at the information security requirements havoc on internal systems.
of organizations reveal that the amount of IT assets, • Many attacks come from disgruntled em-
employees and clients using those assets, nature of ployees, not outside hackers. According
their use and geographic distribution of all these to the CSI/FBI 2003 survey (Richardson,
are huge. Even for a medium sized enterprise, 2003), 77% of companies claim that em-
the task of security management is too complex. ployees are the most likely to commit se-
Access to critical assets must be controlled after curity crimes.
considering their specific security needs (like
confidentiality, integrity, and availability needs, As business requirements blur the perimeter
as discussed later in this chapter). Other factors between internal and external users, network avail-
like the dynamic nature of the security require- ability is more important than ever. Thus worm
ment and business context, combined with the and virus-driven interruptions must be minimized
technological infrastructure, patch management, and contained. To do so, security managers are
and security testing, complicate matters. contemplating to apply new technologies to seg-
For years, network security was based upon ment and protect internal networks including
three primary products: firewalls, Vitual Private end-point security, network behavior modeling,
Networks (VPNs) and anti-virus software, but Intrusion Detection/Prevention Systems (IDS/
this security triad has reached its limit. Automated IPS), and internal firewalls.
Internet worms, viruses, and Distributed Denial Today’s reactive network security strategy
of Service (DDOS) attacks are more prevalent brings heartburn to security staff while leaving
and virulent than ever before causing billions enterprises vulnerable to attacks. Fortunately,
of dollars in worldwide damage and impacting this situation faces extinction. Business execu-
companies like Bank of America, Continental tives now realize that security is an important and
Airlines, eBay, and Yahoo. Also, new technologies necessary component of their overall business
like IP telephony, WLANs, and Instant Messaging infrastructure and must be comprehensive and
are gaining rapid acceptance opening up another sound. Over the next few years, companies will
potential avenue for attacks. invest heavily in network security technology
while they formalize policies and improve pro-
the Future cedures. At the same time, security features will
aggregate and integrate into network hardware
For the past 10 years, security managers have fo- and management software. These efforts will
cused their efforts on the network perimeter with help companies establish an enterprise security
the belief that all external users are ‘untrusted’ view while lowering operating costs – a major
while internal users are trusted. This kind of bottleneck of security technology today.
158
Enterprise Information System Security
enterprise Information system of occurring and then protect against them. For
security is a management Issue example, it is possible that an organization could
be subjected to a van Eck monitoring or a high-
Enterprise information system security is not energy radio frequency (HERF) attack, but the
absolute. All security measures are relative. probability is low. It is also important to balance
Information security should be thought of as a business needs with the need for security, assessing
spectrum that runs from very insecure to very the operational impact of implementing security
secure. The level of security for an information measures. Security measures and procedures that
system is dependent on where it lands along that interfere with the operation of an organization are
spectrum relative to that point. There is no such of little value. Those types of measures are usually
thing as an absolutely secure information system. ignored or circumvented by company personnel,
Information security is a balancing act that re- so they tend to create, rather than plug, security
quires the deployment of “proportionate defense”. holes. Whenever possible, security measures
The defenses that are deployed or implemented should complement the operational and business
should be proportionate to the threat. Enterprises needs of an enterprise.
determine what is appropriate in several ways like In other words, enterprise information system
balancing the cost of security against the value security is a management issue where, a fine bal-
of the assets they are protecting; balancing the ance is to be drawn between system efficiency,
probable against the possible; balancing business security expenses and information protection.
needs against security needs.
Enterprises must determine how much it would enterprise Information system
cost to have each system or network compro- security Parameters
mised – in other words, how much it would lose
in monetary terms owing to un-authorized access The goal of enterprise information system security
to the system or information theft. By assigning a is to “enable an organization to meet all of its mis-
monetary value to the cost of having a system or sion/business objectives by implementing systems
network compromised, enterprises can determine with due care consideration of IT-related risks to
the upper limit they should be willing to pay to the organization, its partners and customers”. The
protect their systems. For many enterprises this security goal can be met through the following
exercise is not necessary, because information security parameters (Stoneburner, 2001).
systems are lifeblood of the business. Without
them there is no business. Enterprises also need Availability (of Systems and
to balance the cost of security against the cost of Data for Intended Use Only)
a security breach. Generally, as the investment
in security increases, the expected losses should Availability (Yu, 1990) is a requirement intended
decrease. Companies should invest no more in to assure that systems work promptly and service
security than the value of the assets they are is not denied to authorized users. This objective
protecting. This is where cost benefit analysis protects against:
comes into play.
Moreover, enterprises must balance possible • Intentional or accidental attempts to either
threats against probable threats, as it is not possible perform unauthorized deletion of data or
to defend against every possible type of attack. otherwise cause a denial of service or data.
Therefore it is necessary to determine what types • Attempts to use system or data for unau-
of threats or attacks have the greatest probability thorized purposes.
159
Enterprise Information System Security
160
Enterprise Information System Security
161
Enterprise Information System Security
mation protection, least privilege, process transacting with information systems. This
separation, modularity, layering, and mini- has become an essential requirement for
mization of what needs to be trusted. enterprises both in government and private
sectors.
Prevention services
detection and recovery services
These services (Stoneburner, 2001) aim at prevent-
ing the security breaches from ever happening. Because no system can be made absolute secure,
it is necessary to both detect security breaches and
• Protected communications: In a distrib- to minimize their impact (Stoneburner, 2001).
uted system, the ability to accomplish se-
curity objectives is highly dependent on • Audit: This service enables auditing of se-
secure communications which helps in curity relevant events for intrusion foren-
achieving integrity, availability, and confi- sics and recovery from security breaches.
dentiality of information while in transit. • Intrusion detection and containment:
• Authentication: This service helps in en- This service provides ability to timely de-
suring that a claimed identity is valid. tect signs of intrusions into information
• Authorization: This service enables spec- systems and also to take counter measures
ification and subsequent management of to confine it and minimize the effect.
the allowed actions of a given information • Proof of Wholeness: This service pro-
system. vides the ability to determine that integ-
• Access control enforcement: This service rity of an information system has been
enables enforcement of defined security compromised.
policy of the enterprise, when any subject • Restore ‘secure’ state: This service pro-
requesting access to particular object has vides a way to restore the system state to a
been validated. The level of security ob- known secure state in the event of a secu-
tained in any information system depends rity breach.
not only on the correctness of the access
control decision, but also the strength of solutIons And
the access control enforcement. A common recommendAtIons
access control enforcement mechanism
is to check identity and requested access enterprise Information security
against access control lists. File encryption engineering lifecycle
is another example of an access control en-
forcement mechanism. Information Security (IS) of Enterprises depends
• Non-repudiation: This service enables on several factors. The major determinant is the
the ability to ensure that senders cannot Business Goal; besides, the operation context,
deny sending information and that receiv- technology used, organizational structures and
ers cannot deny receiving it. This service is connectivity also play important roles in determin-
treated as a prevention service because it ing the approach towards IS. The other important
prevents the ability to successfully repudi- concern is that the IS need of an Enterprise is not
ate an action. static, but depends on the dynamics of operation,
• Transaction privacy: This service helps changing business goals, technological upgrades,
in maintaining the privacy of individuals etc. The process of developing and deploying a
162
Enterprise Information System Security
proper IS infrastructure for an Enterprise is not a This leads to the concept of Information Secu-
one-time affair; rather it is a continuous process rity Engineering Life-Cycle, or simply “Security
of analysis, design, monitoring and adaptation to Engg. Life-Cycle” (Anderson, 2001; Sengupta,
changing needs. In many enterprises, the changes 2005). Following phases are considered to be
encountered are frequent. This calls for structured of prime importance for this Life-cycle concept
representation of the different specification docu- (refer Figure 2).
ments and automatic analysis and generation of
them with interoperable representation.
163
Enterprise Information System Security
164
Enterprise Information System Security
165
Enterprise Information System Security
166
Enterprise Information System Security
Biba, K. J. (1975). Integrity Considerations for Richardson, R. (2003). CSI/FBI Computer Crime
Secure Computer Systems, MTR-3153. Bedford, and Security Survey. Hayward, CA: Computer
MA: MITRE Corporation. Security Institute.
Casar, E., Scheer-Gumm, G., & Simons-Felwor, Sengupta, A., Mukhopadhyay, A., Ray, K., Roy,
P. (2004). IT Baseline Protection Manual. Ger- A. G., Aich, D., Barik, M. S., & Mazumdar, C.
many: BSI. (2005). A Web-Enabled Enterprise Security Man-
agement Framework Based on a Unified Model
Clark, D., & Wilson, D. (1989). Evolution of a of Enterprise Information System Security: (An
Model for Computer Integrity, in Report of the Ongoing Project Report), First International Con-
Invitational Workshop on Data Integrity, Gaithers- ference on Information Systems Security, ICISS
burg, Maryland, A.2-1A.2-13. Gaithersburg, MD, 2005. Kolkata, India, Pages 328 – 331: LNCS.
National Institute of Standards and Technology,
NIST Special Publication 500-168: NIST.
167
Enterprise Information System Security
Snare, J., & Kuiper, E. (Eds.). (2005). Information fax machines), magnetic media (tapes and disks),
technology - Security techniques – Information other equipment, cabinets, safes.
security management systems - Requirements, BS Risk Analysis: This term defines the process
ISO/IEC 27001:2005 BS 7799-2:2005. Geneva, of analyzing a target environment and the relation-
Switzerland: ISO. ships of its risk related attributes. This analysis
will identify threat-vulnerabilities, associate those
Stoneburner, G. (2001). Underlying Technical
vulnerabilities with affected assets, identify the
Models for Information Technology Security.
potential for and nature of an undesirable result
NIST Special Publication 800-33. Gaithersburg,
and specify risk mitigating controls.
MD: NIST.
Risk Management: This includes the process
Weiner, E. S. C., & Simpson, J. A. (Eds.). (1991). of assigning priority to, budgeting, implementing
The Compact Edition of The Oxford English Dic- and maintaining the appropriate risk-reducing
tionary. USA: Oxford University Press. measures.
Safeguard: This term represents a risk re-
Yu, C.-F., & Gligor, V. D. (1990). A Specifica-
ducing measure that acts to detect, prevent or
tion and Verification Method for Preventing
minimize loss associated with the occurrence of
Denial of Service. [IEEE.]. IEEE Transactions
a specified threat.
on Software Engineering, 16(6), 581–592.
Security Concern: Security concern of an
doi:10.1109/32.55087
asset is a function of threat and vulnerability of
that asset.
Severity: Level of exploitation of vulner-
key terms And deFInItIons ability on a qualitative scale is defined by the
severity value.
Asset: Asset means anything that has value Software Asset: Application software, System
to an organization. With respect to security, as- software, development tools, and utilities.
set may imply physical resources, or information Threat: Threats are any unwanted activities
contained within the organization. or events that under certain conditions could
Information Asset: Databases, data files, jeopardize either the integrity, confidentiality or
system documentation, user manuals, training availability of information and other assets.
material, operational and support procedures, Vulnerability: This is an inherent weakness
intellectual property, continuity plans, fallback associated with an enterprise asset. It is a condition
arrangements, archived information. that has the potential to allow a threat to occur
Hardware Asset: Computer equipment with greater impact and greater frequency or both.
(processors, monitors, laptops, modems), com-
munication equipment (routers, hubs, PABXs,
This work was previously published in Handbook of Research on Social and Organizational Liabilities in Information Security,
edited by Manish Gupta and Raj Sharman, pp. 118-132, copyright 2009 by Information Science Reference (an imprint of IGI
Global).
168
169
Chapter 1.12
From ERP to Enterprise Service-
Oriented Architecture
Valentin Nicolescu
Technische Universität München, Germany
Holger Wittges
Technische Universität München, Germany
Helmut Krcmar
Technische Universität München, Germany
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
From ERP to Enterprise Service-Oriented Architecture
Our analysis will comprise of an application- focus on data integration and also support process
centered and a technical view, considering changes integration within one company.
in business paradigms and new technologies that The technical basis of an ERP system today is
enabled new kinds of business and process man- usually a Client/Server architecture, where often
agement. Starting at classical ERP systems and more than one application server is connected to
their implementation in SAP R/3, we will move the central database server. The user of a classical
on to the current concept of SOA and Enterprise ERP system most time works with basic business
SOA. This goes along with a change in technical transactions like “create order”, “update customer
architectures as well. The SAP NetWeaver plat- contact data”, “print invoice”, “execute report xy”
form will be presented as an example of complete etc. Changes within such a system due to business
Enterprise SOA platforms. Its most important transactions are usually propagated in “business”
functions will be pointed out and utilizing this realtime meaning a few seconds or minutes.
example, components that are necessary to realize The following figure from Davenport visual-
Enterprise SOA are identified. The light in which izes the architecture of a classical ERP system.
SAP NetWeaver is seen has changed in the last In addition to the facts mentioned before, there
years as not the technical components are in the is usually a wide range of reporting functionality
spotlight anymore but the applications that are for management and stakeholders, based on the
made possible by such a platform. Finally, we will central ERP data.
show the future concept of business webs which There are a lot of advantages that unfold with
will base on Enterprise SOA and conclude our the use of ERP Systems (Vogel and Kimbell 2005;
chapter with an outlook to the further development N.N. 2007) In the following a few of them are
in this area of topic. The structure of our chapter spotlighted:
is illustrated in Figure 1.
• Standardisation
• Integrated “best practice” business
clAssIcAl erP systems knowledge
• Data quality
Classical ERP system can be described as com- • Data- and process integration
mercial software products that are adaptable to • Central authorisation, authentication
company-specific demands. Their typical func-
tional modules include: purchasing, manufac- However, there are also a lot of potential risks
turing, sales, finances, human resources, service related with the use of ERP-Systems.
and in general reporting. Classical ERP systems
170
From ERP to Enterprise Service-Oriented Architecture
171
From ERP to Enterprise Service-Oriented Architecture
tier and the database tier. The front end tier is a new products were based on SAP Basis. This is
fat client that displays all kinds of screens based why a highly integrated system landscape could
on small information packages exchanged with be implemented despite the different systems.
the application tier. The application tier resides By using the same technical layer, all systems
on high performance servers and represents the can communicate and exchange data very easily
application logic and enterprise functionality as utilizing the same functions. These functions are
well as the connection to the database layer. The arranged in a hierarchical structure defined by
databases used for R/3 have been provided by business areas and this way facilitate changes and
different manufacturers and, with their database enhancements of business processes. Furthermore,
product SAPDB, also by SAP itself. By dividing most functions are encapsulated in so called func-
the technical architecture into these three tiers, it tion modules which can be called remotely by
became scalable and could be enhanced by adding another application like another SAP system or
more desktop computers or servers to the tier that a third party product. Therefore communication
lacks computational power. with applications of third party vendors can be
The technical layer of the application tier and established within limitations. This packaging
thus of SAP R/3 systems is called SAP Basis. of functions is also an important step towards
This layer’s characteristics of capital importance a service oriented architecture as will be shown
indclude platform and database independence with later (Buck-Emden 1998).
respect to the interpretation of application source Although the SAP Basis of SAP R/3, as shortly
code. The code is written in SAP’s programming presented above, was already quite flexible and
language called Advanced Business Application enabled the communication to other applications
Programming (ABAP). All of SAP’s out of the box to and from SAP or third party vendors, the degree
functions can be viewed in plain text, edited (with of integration was limited. There was no complete
some limitations) and hence also be enhanced. The integration of functions and data of different
integrated development environment called ABAP applications to create completely new business
workbench can be used for these tasks. Providing processes across system boundaries. Addition-
these possibilities, the platform can be adopted in ally, changing or enhancing crucial functions or
a very flexible way to individual needs. In practice processes was very difficult as the dependencies
however, only few modifications are made to the between systems and function modules were not
source code delivered by SAP because the algo- clearly documented. A fundamental problem of
rithms represent the know-how of many business this technical layer was also its integration into
experts. Framed in other words, the implemented the application layer: SAP Basis could not be used
algorithms are procedures cast into best practices without SAP R/3 or other products based on this
such as how to support a specific process at best. very platform. These issues forced a fundamental
When using SAP R/3 for crucial functions, change to provide a much more flexible technical
enterprises have a data centralization spanning the layer for future business applications.
whole company. Nonetheless SAP R/3 turned out
to be insufficient for the integration of suppliers soA and enterprise soA
and customers as well as for performing in-depth
analysis of business data. Thus new applications We will rely on the following definition of a SOA:
like SAP Customer Relationship Management “SOA is an architectural style whose goal is to
(CRM), Supplier Relationship Management achieve loose coupling among interacting software
(SCM) or the Business Warehouse (BW) were agents. A service is a unit of work done by a ser-
created to meet the growing demands. All these vice provider to achieve desired end results for a
172
From ERP to Enterprise Service-Oriented Architecture
service consumer. Both provider and consumer are Key features of SOA as described by Erl (Erl
roles played by software agents on behalf of their 2005) are:
owners.“ (He 2003) In addition to this definition,
SOA is characterized by intensive use of standards • Self-describing: The service can be fully
(like SOAP, UDDI, etc.) to implement services. described on a formal level; that is, what
But the concept of SOA itself is not connected to a operations are available and which data
technical or business domain. It is a concept of how types can be exchanged. Formal self-de-
functions can be implemented on distributed enti- scription is the basis for automatically gen-
ties, just like the client-server concept or the idea erating proxies. Note that in this context
of object orientation (OO). Both of the mentioned the word “description” does not refer to the
actually can be related to SOA. Services within semantic description.
a SOA could for example be implemented using • Locatable: Potential consumers can locate
an OO programming language. The result could and contact the service. There is a registry
be run technically in an environment that follows for this purpose that operates as a “Yellow
the client server concept. The central components Pages” of services and allows users to
of a SOA are shown in Figure 3. search for services.
The central element within a SOA is the service. • Roughly structured: Services are roughly
Whenever an application wants to use a service, it structured when they return comprehen-
communicates with the service repository (for sive data (for example, a sales order) in re-
example via UDDI) using the (enterprise) service sponse to a service call instead of deliver-
bus as technical backbone. Examples for service ing individual attributes (such as an order
busses include IBM WebSphere ESB, Microsoft quantity).
biztalk, Oracle ESB and SAP XI.. The application • Loosely linked: Services are said to be
front end is used to access the network of services. loosely linked if potential functional
A service itself consists of an implementation changes within the services have no effect
describing the business logic and data. Also it is on the availability of operations. Services
formalized by a service contract (i.e. IDL, WSDL) are considered to be independent if they
and a service interface (i.e. SOAP) (Booth, Haas have no dependencies on other services
et al., 2004). i.e. if the availability of a service is not af-
173
From ERP to Enterprise Service-Oriented Architecture
fected by a potential unavailability or im- NetWeaver is comparable to the SAP R/3 Basis,
proper functioning of any other service. however doess not itself provide any business
• Reusable: Reusability is one of the most functions but is the technical basis for enterprise
important and longest-standing require- applications like SAP Enterprise Resource Plan-
ments in software technology. It aims at ning (ERP) (Woods and Word 2004). Since the
ensuring that components are reused as of- components of this layer are already a few years
ten as possible without modification to the old, the view on this platform has changed. First
functional core or interfaces. we will present the classical component based
view covering the specific technical systems that
Enterprise SOA extends the features of the are part of this platform. Afterwards we will show
SOA concept with a business view on services. the shift from the component based to an applica-
Therefore services additionally have the follow- tion based view that does not care anymore about
ing key features: technical systems but focuses on the application
of a set of systems for business purposes.
• Services represent business services in-
stead of technical services component based view
• Support of inter-organizational collabora- on netWeaver
tion on a business level
The component based view on SAP NetWeaver is
The technical basis of an Enterprise SOA to- also called the “NetWeaver Fridge” because you
day is usually a client-server architecture, where can use specific components of the NetWeaver
many application server and many database serv- platform just as you can take ingredients from
ers are part of the - often regionally distributed your fridge for lunch. This technical fridge con-
- IT-landscape. In contrast to a list of basic ERP sists of four layers representing different aspects
Transactions, Enterprise SOA offers access to high of an enterprise system landscape as well as
level business processes like “hire employee”, two cross-functional areas that are used for all
“produce good”, “distribute good” etc. Seen in other products. We can distinguish the layers
this light one might define Enterprise SOA as the for application platform, process integration,
business glue connecting isolated business tasks, information integration and people integration.
such as the previously mentioned examples, to The general areas are life cycle management and
comprehensive business processes. Working that SAP’s Composite Application Framework (CAF).
way, Enterprise SOA opens the door to realtime The specific layers combine different software
business processes instead of realtime transactions. products of the SAP portfolio. Thus this view on
NetWeaver is a rather technical one (Karch, Heilig
et al., 2005). In Figure 4 you find an overview of
dIFFerent vIeWs on all layers and their elements at which we want to
sAP netWeAver have a closer look.
The application platform consists of three
The presented idea of service oriented architec- elements whereas the DB and OS abstraction is
tures and its use in an enterprise domain forces an integral part of the two other elements. These
the need for a technical platform that can enable two elements are the ABAP and the Java core of
the interaction of the different services. SAP all SAP applications. They are called Web Ap-
developed the currently most complete technical plication Server (Web AS) ABAP and Web AS
layer for Enterprise SOA called SAP NetWeaver. Java. Depending on the application that is to be
174
From ERP to Enterprise Service-Oriented Architecture
executed on the Web AS, either one or both cores ment automated processes by triggering and
are used as a runtime environment. The SAP coordinating data exchange between all kinds
NetWeaver Portal for example needs only the Java of enterprise systems which can be accessed by
core while SAP Process Integration uses both Java the integration broker. A business process can
and ABAP. The Web AS can also be used for therefore automatically manage the selection of
technical purposes like monitoring without enter- the supplier with the best price after receiving all
prise applications building upon it (Heinemann quotations and may subsequently place an order.
and Rau 2003). NetWeaver ‘s process integration layer and the
The process integration layer represents the product of the same name can be regarded as the
elements of an integration broker and of business communication backbone of a modern enterprise
process management which are combined in SAP’s system landscape. It provides centralized functions
product called Process Integration (PI, formerly for data exchange within the landscape and with
Exchange Infrastructure). The integration broker’s systems in supplier or customer domains.
task within NetWeaver is the exchange of data The information integration layer combines
using different formats and protocols. It can for three tasks which are arranged in three different
example convert messages sent via FTP in an applications. Master Data Management (MDM)
XML format to a message for an SAP function and Business Intelligence (BI) can be found in the
module based on one of SAP’s internal protocols. products of the same name while Knowledge Man-
Besides this technical conversion, also changes to agement (KM) is part of the SAP NetWeaver Portal
the content can be processed such as converting which is part of the subsequent layer. MDM helps
the values of the gender (female, male) to values to consolidate data within an enterprise across
for a suitable salutation (Ms, Mr.). Business Pro- system boundaries. The same data is often saved
cess Management (BPM), also known as cross- in different places because of technical reasons.
component BPM (ccBPM), provides functions In many cases this redundancy can be changed so
for workflow management across boundaries of that the data is saved only in one place or at least
single enterprise systems. It can help to imple- synchronization between different databases can
175
From ERP to Enterprise Service-Oriented Architecture
be set up. Thus the same data is available in all and maintenance, upgrade and migration tasks.
connected systems. Using this correct data proper The SAP product supporting these tasks is the
propped business decisions can be made. As the SAP Solution Manager which provides part of
amount of data on which decisions are based on these functions as a first step towards the imple-
can be vast, SAP’s Business Intelligence helps to mentation of ITIL.
arrange and visualize data from different points As a SOA consists of many different small
of view. By using SAP’s Strategic Enterprise services, an integration layer for coordinating the
Management (SEM), balanced scorecards can be steps within a business process is needed. This
used as an enterprise dash board or management layer is the Composite Application Framework
cockpit. While MDM and BI are used for structured (CAF) which allows the development of appli-
data, KM components help to manage unstruc- cations based on the underlying services - web
tured data like files containing different kinds services or SAP function modules provided by
of information. As KM is part of the NetWeaver SAP applications. The implementation of a persis-
Portal it can easily be integrated in the front end tence layer as well as the design of user interfaces
and therefore in daily work. are as well part of this development. In order to
In the layer of people integration, three dif- access backend systems, persistence and user
ferent tasks are combined in 2 applications. On interfaces, the appropriate Java source code can
the one hand one can identify the multi channel be generated. This code is running within the SAP
access provided by SAP’s Mobile Infrastructure NetWeaver Portal providing the connectivity of a
(MI). On the other hand there is SAP NetWeaver Web AS Java and the user interface of the portal
Portal including the tasks of portal, collaboration framework. CAF can be used to have professional
and knowledge management which form the developers generate Java-based applications or
information integration layer. This layer hence to quickly implement an adhoc-workflow called
contains applications for end user communication. guided procedure. By relying on other NetWeaver
The Mobile Infrastructure provides a client server products, a new CAF application or a guided pro-
architecture that enables the synchronization of cedure can take advantage of existing functions
data on mobile devices like PDAs or Notebooks like the connection to third party systems or user
with the enterprise system landscape. This way interface functions.
traveling salesmen have all the data they need to
help customers place an order. The portal itself Application based view
provides a web based framework for arranging and on netWeaver
displaying screens and information. Furthermore
it integrates business process screens providing a As we already pointed out, the component based
single point of entry to front ends in the enterprise view on the NetWeaver fridge is dominated by
system landscape. It can be used to implement a technical aspect. For most scenarios more than
flexible wizards working across system bound- one of these products is necessary to attain the
aries. These basic functions can be enhanced by goal. Thus the NetWeaver fridge has been cut
synchronous or asynchronous collaboration and into slices to show that the NetWeaver platform
knowledge management. does not exist for its own sake, but to enable and
The cross function area of life cycle man- support different IT practices (see Figure 5).
agement covers all activities for running an ap- The result of cutting the NetWeaver fridge into
plication in an enterprise system landscape. This slices are 10 IT practices which shall be discussed
includes the installation preparation of specific now. Each of the practices itself is divided into
applications, customizing activities, monitoring IT scenarios describing concrete activities to
176
From ERP to Enterprise Service-Oriented Architecture
Figure 5. Shift from component based view to application based view on NetWeaver
achieve the target of a scenario, for example 4. Unlike the business information manage-
implementing single sign-on for an application ment that provides functions for proactive
or in a whole system landscape (Nicolescu, Funk work with business data, the business event
et al., 2006). management works by a Push technology.
Whenever important events happen in the
1. The first IT practice called user productiv- company the relevant people will be in-
ity enablement aims at improving the daily formed and can react. Reacting on events is
work of users by providing tools to exchange abstracted to the necessary data and entry to
information between them, any by means of appropriate business transactions for a given
personalization for an easier access to data situation. Main components of this practice
and business processes. This IT practice are again SAP Business Intelligence and SAP
mainly builds upon the SAP NetWeaver NetWeaver Portal.
Portal. 5. End-to-end process integration allows the
2. The Practice of data unification tries to implementation and monitoring of business
consolidate and harmonize data that is stored processes across system boundaries within a
in different databases all over the enterprise. company’s own system landscape and with
As this task is mainly connected in identify- systems of business partners. This way, cru-
ing redundancy and keeping data in different cial processes can be monitored and adjusted
places synchronous, the vital application of centrally. The component providing these
this task is the Master Data Management features is SAP Process Integration.
(MDM). 6. Development and adaptation of enter-
3. Business information management is an prise applications represents the sixth
important support task for decision makers IT practice which includes the creation of
in a company. This practice tries to provide completely new software as well as changing
structured and unstructured information to and enhancing existing functions. Because
make the right decision based on the given development in an enterprise environment
data. As this combines elements of Business poses many challenges, it is supported by
Intelligence and Knowledge Management, components like the Composite Application
BI and portal are the main components of Framework.
this practice.
177
From ERP to Enterprise Service-Oriented Architecture
7. The IT Infrastructure Library (ITIL) plays 10. The last IT practice enterprise service-ori-
an important role in today’s IT management, ented architecture design and deployment
which is why the IT practice of unified covers the areas of planning, developing,
life cycle management covers most of its reusing und maintaining SOA applications.
concepts. An important building block for By separating the formerly monolithic ap-
attaining this goal is the use of the SAP plications into smaller services the adminis-
Solution Manager. trative effort to keep track of these modules
8. The topic of application governance and and to wisely reuse them is a major issue for
security management is covered by the development.
eighth IT practice. It deals with the holistic
management of applications within a system busIness Webs
landscape, addressing issues like commu-
nication and security of the systems. The “Low-Cost Information and communication tech-
Concept of implementing single sign-on nologies, global markets, and global competition
is just one example. As this task affects all have forced enterprises to rethink their traditional,
systems in an enterprise, there is no specific vertically integrated structure. As the cost of col-
component to point out. laboration plummets, it increasingly makes sense
9. While the presented IT practice of data for companies to focus on core competencies
unification aims at the consolidation of data, and partners for all other functions. As a result,
the IT practice of consolidation deals with corporations are transforming into flatter and
all approaches to simplify the whole system more specialized enterprises, linking with sup-
landscape. Examples of these approaches pliers and other businesses to form a larger, more
are service oriented architecture or server open, value-creation entity” (Tapscott 2007) – the
virtualization. business web.
178
From ERP to Enterprise Service-Oriented Architecture
The innovation potential and practical rel- nally value is generated by your community if
evance of the business web is a recent topic for they use your enterprises services within the busi-
ERP Software providers. SAP (Karch, Heilig ness web to enable their own business processes.
et al., 2005; Tapscott 2007) and salesforce.com
(Gilbert 2006) described it as an important shift
in the future similar to the migration from the reFerences
classical world wide web to Web 2.0.
The business web can only be realized if an Booth, D., H. Haas, et al., (2004). Web Services
adequate ecosystem has been set up. The following Architecture. W3C.
figure illustrates such an ecosystem. Buck-Emden, R. (1998). Die Technologie des
In addition to the well know eCommerce or SAP-Systems R/3. München, Addison-Wesley.
supply chain models this ecosystem not only fo-
cuses on special partners but instead on a whole Carr, N. G. (2003). IT doesn‘t matter. Harvard
community. The idea of integrating virtually Business Review, 81(5), 41–49.
everything is not a new one, but it often failed
Davenport, T. H. (1998). Putting the Enterprise
due to high complexity. Enterprise SOA now of-
into the Enterprise System. Harvard Business
fers a concept and appendant tools that allow to
Review, 76(4), 121–131.
manage complexity by partitioning and linking
the emerging parts (partner processes) together. Erl, T. (2005). Service-Oriented Architecture -
Concepts, Technology, and Design. Upper Saddle
River NJ: Prentice Hall.
conclusIon Gilbert, A. (2006). Salesforce CEO’s vision for
‘business Web’. www.news.com. DOI
Companies try to save investments in old appli-
cations by wrapping old code into web services. He, H. (2003). What Is Service-Oriented Archi-
This can be described as a three step approach: tecture.www.xml.org Retrieved 14.06.2007, 2007,
Legacy to SOA is the first step to go. The idea from http://www.xml.com/lpt/a/1292.
is to make your business transactions accessible,
Heinemann, F., & Rau, C. (2003). SAP Web Apli-
independent of the platform they run on and to
cation Server. Bonn: Galileo Press.
abstract from the programming language they
were implemented in. The second step is to map Karch, S., Heilig, L., et al. (2005). SAP NetWeaver.
these services onto different business processes Bonn: Galileo Press.
by focusing on your internal processes and your
Krafzig, D., Blanke, K., et al. (2004). Enterprise
immediate business partners, i.e. customers and
SOA - Service-Oriented Architecture Best Practise.
suppliers. The consequential third step is to extend
Upper Saddle River, NJ: Prentice Hall.
the reach of your services – and along with it the
reach of your business – by integrating them into 56L. (n/a.). SOA Ecosystem. from http://www2.
a business web. sims.berkeley.edu/academics/courses/is290-4/
This demonstrated the power of implementing s02/readings/line56ecosystem.gif.
(Enterprise) SOA. As a first benefit value is gen-
Martin, R., & Mauterer, H. (2002). Systema-
erated by reducing the effort for integrating your
tisierung des Nutzens von ERP-Systemen in der
internal IT-Systems. Then additional value is
Fertigungsindustrie. Wirtschaftsinformatik, 44(2),
generated by offering your direct partners access
109–116.
to your (Enterprise) SOA implementation. Fi-
179
From ERP to Enterprise Service-Oriented Architecture
N. N. (2007). Enterprise resource planning. Re- IT Practice: The application based view on
trieved 8.06.2007, 2007, from http://en.wikipedia. SAP NetWeaver identifies different main use cases
org/wiki/Enterprise_resource_planning. within an enterprise system landscape which are
called IT Practices. In different abstraction levels,
Nicolescu, V., Funk, B., et al. (2006). SAP Ex-
they describe the activities necessary to achieve
change Infrastructure for Developers. Bonn:
the implementation of a specific technical task
Galileo Press.
in a company.
Tapscott, D. (2007) Rethinking Enterprise SAP R/3: SAP R/3 has been released 1992 as
Boundaries: Business Webs in the IT Industry. the first ERP system for very large businesses based
NEWPARADIGM, DOI on a client-server architecture. It was divided in
different functional modules and was the central
Vogel, A., & Kimbell, I. (2005). mySAP ERP For
point of enterprise system landscapes.
Dummies. Indianapolis: Wiley Publishing, Inc.
SAP NetWeaver: Moving from SAP R/3
Woods, D., & Word, J. (2004). SAP NetWeaver to SAP ERP, the technical foundation of SAP
For Dummies. Wiley Publishing, Inc. R/3 SAP Basis was separated from the business
functions and enhanced by many other technical
features. This new technical basis that enables
SOA is called NetWeaver.
key terms And deFInItIons
SOA: SOA is an architectural style whose
goal is to achieve loose coupling among interact-
Business Web: Corporations are transforming
ing software agents. A service is a unit of work
into flatter and more specialized enterprises, link-
done by a service provider to achieve desired end
ing with suppliers and other businesses to form
results for a service consumer. Both, provider and
a larger, more open, value-creation entity – the
consumer are roles played by software agents on
business web.
behalf of their owners.
This work was previously published in Handbook of Research on Enterprise Systems, edited by Jatinder N. D. Gupta, Sushil
Sharma and Mohammad A. Rashid, pp. 316-328, copyright 2009 by Information Science Reference (an imprint of IGI Global).
180
181
Chapter 1.13
Data Reengineering of
Legacy Systems
Richard C. Millham
Catholic University of Ghana, Ghana
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Data Reengineering of Legacy Systems
In this chapter, we will discuss some of the schema, of the source database through various
recent research into data reengineering, in par- reverse engineering techniques, and then the
ticular the transformation of data, usually legacy development of the target database, using this
data from a sequential file system, to a different conceptual schema, using standard database de-
type of database system, a relational database. This velopment techniques. This strategy produces a
article outlines the various methods used in data higher quality database with full documentation
reengineering to transform a legacy database (both as to the semantic meaning of the legacy data, but
its structure and data values), usually stored as this approach is more expensive in terms of time
sequential files, into a relational database structure. and effort that it entails (Hainaut et al., 1993a).
In addition, methods are outlined to transform the Hainaut et al.’s approach first uses the physical
program logic that accesses this database to access conversion strategy to convert data and then
it in a relational way using WSL (wide spectrum uses a trace of the program, which accesses the
language, a formal language notation for software) legacy data, in order to determine how the data
as the program’s intermediate representation. are used and managed. In this way, additional
structures and constraints are identified through
the procedural code. Through an analysis of the
relAted Work application’s variable dependency graph and of the
record and file definitions, data fields are refined,
In this section, we briefly describe the various ap- foreign keys are determined, and constraints on
proaches that various researchers have proposed multivalued fields are discovered. During the
and undertaken in the reengineering of legacy database conceptualization phase, the applica-
data. Tilley and Smith (1995) discuss the reverse tion’s physical constructs of indexes and files are
engineering of legacy systems from various ap- removed and the program’s objects of arrays, data
proaches: software, system, managerial, evolution, types, fields, and foreign keys are transformed into
and maintenance. their database equivalents (Hainaut et al., 1993a).
Because any data reengineering should address Initially, database reengineering focused on
the subsequent modifications to the program that recognizing the legacy database structure and
the program’s data access’ logic entails, Hainaut transforming these structures into a new model
et al. (1993) have proposed a method to transform (Aiken & Muntz, 1993; Joris, 1992; Pomerlani &
this data access logic, in the form of COBOL Blaha, 1993; Sabanis & Stevenson, 1992). The
read statements, into their corresponding SQL values of legacy data were used solely to identify
relational database equivalents. the legacy system’s dependencies in terms of keys
Hainaut et al. (1993) identify two forms of between records (Pomerlani & Blaha).
database conversion strategies. One strategy Aebi and Largo (1994), in the transformation of
(physical conversion) is the physical conversion database structures, recognize that the transforma-
of the database where each construct of the source tion of structural schemas involves many issues.
database is translated into the closest correspond- The first issue is that the different attributes and
ing construct of the target database without any entities of the old system must be mapped to the
consideration of the semantic meaning of the new schema of the transformed database. Con-
data being translated. One of the problems with straints, during the migration from the old to the
this strategy is that the resulting target database new system, may be added, dropped, or changed.
produced is of very low quality. The second Entity sets in the new system may be identified by
strategy (conceptual conversion) is the recovery new attributes or by old attributes with changed
of precise semantic information, the conceptual domains or data types.
182
Data Reengineering of Legacy Systems
Wu et al. (1997), with their “butterfly” ap- dynamic traces along with data flow and depen-
proach, assume that the legacy data are the most dency analyses are some successful techniques
important part of the legacy system and it is the used in data reverse engineering that have been
schema rather than the values of this legacy data obtained from the program understanding phase
that are the most crucial. This legacy data are of program reverse engineering (Cleve, Henrard,
modified in successive iterations with the legacy & Hainaut, 2006; Millham, 2005).
data being frozen and used for reading purposes Aebi and Largo (1994) also recognize problems
only. The “Chicken Little” strategy allows the with the transformation of database values. Some
legacy system to interact with the target system problems include duplicate data being used in the
during migration, using a gateway to serve as a same context, changes in the primary keys of tables
mediator. This gateway is used to translate and often entailing changes in foreign keys of the same
redirect calls from the legacy system to the target table, values of the attribute possibly exceeding its
database system, and then the gateway translates given range, different encoding schemes for data
the results of the target database for use by the values may be used, recording errors incorporated
legacy system and by the legacy database. Al- into the existing data, and no existing distinction
though the legacy system is allowed to interact between unknown and null values.
with the target database during migration, each Hainaut et al. (1993b) outline some practical
data access involves two database accesses: one schema-relational transformations, such as proj-
to the target database and another to the legacy ect-join, extension transformation, and identifier
database (Bisbal, Lawless, Wu, & Grimson, 1999). substitution, that are dependent on the file manager
Bianchi, Caivano, and Visaggio (2000) pro- such as CODASYL, relational, TOTAL/IMAGE,
posed a different method of data reengineering and IMS DBMS in order to function. For other
where the data structures are reengineered rather databases, such as COBOL file structure databases,
than simply migrated. This reengineering involves such transformations are impractical. In the case
the use of several steps. The first step is analyzing of COBOL file structure databases, multivalued
the legacy data through monitoring of calls to the attributes can be represented by list attributes
legacy database from the legacy system (dynamic only. Referential constraints upon files can be
trace). This dynamic trace is used to identify which detected through careful analysis of the COBOL
data could be classified as conceptual (data spe- procedural code, file contents, and secondary keys.
cific to the application domain and that describe Identifying one-to-many relationships in files is
specific application concepts), control (data that accomplished through depicting multivalued,
are used for program decisions or to record an compound attributes B of A as a many-to-one
event), structural (data that are used to organize relationship of B to A. Multirecord types within
and support the data structures of the system), or a sequential file may be portrayed as a many-to-
calculated (data that are calculated by the applica- one relationship. Multivalued attributes, such as
tion). The second step involves redesigning the those used in foreign keys, are represented in the
legacy database after identifying the dependen- relational target model as rows in a separate table
cies among the data. This dependency diagram is with a link to the main referencing table. If the
then converted to a target database schema. After source database is of a network type, a recursive
the legacy data are migrated to the new target relational type may be represented by an entity
schema, the legacy system is then altered such type and two one-to-many or one-to-one relational
that data accesses to the target database reflect types (Hainaut et al., 1993b).
the new database schema (Bianchi et al.). Using
183
Data Reengineering of Legacy Systems
184
Data Reengineering of Legacy Systems
obtained during these translation and analysis logical database structure is derived along with
processes. If one, A, has an array field that forms the necessary subsequent program data access
a dependency in another record B, this depen- transformations. These transformations are based
dency is depicted in a one-to-many relationship on a formal, platform-independent representation
between records A and B. Anti-aliasing of records (WSL) such that the source system, whether
and their fields reduces the number of records COBOL or assembly language, is not important
that refer to the same file but use different names. and the advantages of a formal notation, such as
Calculated data may appear as calculated fields preciseness, are achieved.
in the database schema. Structural data are used WSL equivalentWong and Sun (2006) have
to represent the target database schema. Record been working on detecting data dependencies in
fields that are used as control data may indicate programs using a hybrid UML (unified modeling
a relationship, involving the control data, between language) collaboration and activity diagram that
the record that defines this control data and any is expressed in a platform-independent XML
record(s) enclosed within the control block that (extensible markup language) markup graph.
is governed by that control data (Millham, 2005).
Constraints on data may be determined through
an analysis of their declaration within a program Future trends
or through the use of Hainault et al.’s (1993b)
methods. Because this data reengineering process Because up to 50% of a legacy system’s main-
occurs in conjunction with program reengineering, tenance costs, in terms of program and database
any changes to the underlying database structure changes, can be attributed to changing business
can easily be propagated to the program reengi- rules, there is a strong need to adopt new techniques
neering phase where the program data access in reengineering legacy data and their associated
logic will be altered to reflect these database applications. Jarazabek and Hitz (1998) propose
changes. Through this data reengineering, a more the use of domain analysis and the use of generic
185
Data Reengineering of Legacy Systems
architectural design techniques in reengineer- Because the underlying application(s) that ac-
ing as a method of substantially reducing these cess the legacy database and the legacy database
maintenance costs. Atkinson, Bailes, Chapman, are so intrinsically linked during the data reengi-
Chilvers, and Peake’s (1998) preferred approach neering phase, there is a need to be able to analyze
is to develop interfaces to general persistent data the applications, in a programming-language-
repositories in the direction of generic reengineer- independent way, for data usage and then transform
ing environment design. From these interfaces, these applications’ data accesses and the legacy
binding between the data stores, represented in database, using a set of generic transformations
the target databases, and the underlying applica- and tools, to the target database. Formal notations
tion, which will access this target database, can be (with their programming-language independence,
made. Another method is to use formal-language sets of transformations, and basis in relational
intermediate representations that can represent database theory and software reengineering) have
both the database and program along with a set been proposed as a means to generically analyze
of corresponding transformations to transform the application(s), once in the formal notation’s
the legacy to the target database and transform intermediate representation, for data usage and
the program accessing the legacy database to then transform this analysis into an accurate and
a program capable of accessing the new target meaningful target database schema for database
database without errors. Through the use of reengineering.
formal-language intermediate representations,
a set of generic reengineering tools for both the
legacy database and its underlying application(s) reFerences
could be designed.
Aebi, D. (1997). Data engineering: A case study.
In C. J. Risjbergen (Ed.), Proceedings in advances
conclusIon in databases and information systems. Berlin,
Germany: Springer Verlag.
Data reengineering has gone beyond a simple Aebi, D., & Largo, R. (1994). Methods and tools
physical conversion of a legacy database to its for data value re-engineering. In Lecture notes in
target database. Both Hainaut et al. (1993a) and computer science: Vol. 819. International Con-
Wu et al. (1997) utilize an analysis of the underly- ference on Applications of Databases (pp. 1-9).
ing application(s) accessing the legacy database Berlin, Germany: Springer-Verlag.
in order to determine the database’s underlying
data types and foreign keys. Bianchi et al. (2000) Aiken, P., & Muntz, A. (1993). A framework for
go further in using an analysis of the underlying reverse engineering DoD legacy information
application(s) accessing the legacy database in systems. WCRE.
order to identify the categories of the data be-
Atkinson, S., Bailes, P. A., Chapman, M., Chilvers,
ing used in the application such as whether the
M., & Peake, I. (1998). A re-engineering evalu-
data is used as conceptual, structural, control, or
ation of software refinery: Architecture, process
calculated data and in order to identify the de-
and technology.
pendencies among them. In this manner, a better
determination of the data usage can be made and
a better target database schema can be derived
from analysis of this usage.
186
Data Reengineering of Legacy Systems
Behm, A., Geppert, A., & Diettrich, K. R. (1997). Jarazabek, S., & Hitz, M. (1998). Business-
On the migration of relational schemas and data oriented component-based software development
to object-oriented database systems. Proceed- and evolution. DEXXA Workshop.
ings of Re-Technologies in Information Systems,
Jeusfeld, M. A., & Johnen, U. A. (1994). An
Klagenfurt, Austria.
executable meta model for reengineering of da-
Bianchi, A., Caivano, D., & Visaggio, G. (2000). tabase schemas. Proceedings of Conference on
Method and process for iterative reengineering of the Entity-Relationship Approach, Manchester,
data in a legacy system. WCRE. Washington, DC. England.
Bisbal, J., Lawless, D., Wu, B., & Grimson, Joris, M. (1992). Phenix: Methods and tools for
J. (1999). Legacy information systems: Issues database reverse engineering. Proceedings 5th
and directions. IEEE Software, 16(5), 103–111. International Conference on Software Engineer-
doi:10.1109/52.795108 ing and Applications.
Bohm, C., & Jacopini, G. (1966). Flow diagrams, Kwiatkowski, J., & Puchalski, I. (1998). Pre-
Turing machines, and languages with only two processing COBOL programs for reverse engi-
formation rules. CACM, 9(5), 266. neering in a software maintenance tool. COTSR.
Borstlap, G. (2006). Understanding the tech- Mehoudj, K., & Ou-Halima, M. (1995). Migrating
nical barriers of retargeting ISAM to RD- data-oriented applications to a relational database
BMS. Retrieved from http://www.anubex.com/ management system. Proceedings of the Third
anugenio!technicalbarriers1.asp International Workshop on Advances in Databases
and Object-Oriented Databases (pp. 102-108).
Brodie, M. L., & Stonebraker, M. (1995). Migrat-
ing legacy systems: Gateways, interfaces, and the Millham, R. (2005). Evolution of batch-oriented
incremental approach. Morgan Kaufmann. COBOL systems into object-oriented systems
through the unified modelling language. Un-
Cleve, A., Henrard, J., & Hainaut, J.-L. (2006).
published doctoral dissertation, De Montfort
Data reverse engineering using system depen-
University, Leicester, England.
dency graphs. WCRE.
Pomerlani, W. J., & Blaha, M. R. (1993). An
Hainaut, J.-L., Chandelon, M., Tonneau, C., &
approach for reverse engineering of relational
Joris, M. (1993a). Contribution to a theory of data-
databases. WCRE.
base reverse engineering. WCRE. Baltimore, MD.
Rob, P., & Coronel, C. (2002). Database systems:
Hainaut, J.-L., Chandelon, M., Tonneau, C., &
Design, implementation, and management. Bos-
Joris, M. (1993b). Transformation-based data-
ton: Thomas Learning.
base reverse engineering. Proceedings of the 12th
International Conference on Entity-Relationship Sabanis, N., & Stevenson, N. (1992). Tools and
Approach (pp. 1-12). techniques for data remodeling COBOL applica-
tions. Proceedings 5th International Conference
Janke, J.-H., & Wadsack, J. P. (1999). Varlet:
on Software Engineering and Applications.
Human-centered tool for database reengineer-
ing. WCRE. Tilley, S. R., & Smith, D. B. (1995). Perspectives
on legacy system reengineering (Tech. Rep.).
Carnegie Mellon University, Software Engineer-
ing Institute.
187
Data Reengineering of Legacy Systems
Ward, M. (1992). The syntax and semantics of the databases during the data reengineering phase
wide spectrum language (Tech. Rep.). England: through the use of a gateway that translates data
Durham University. access requests from the legacy system for use
by the target database system and then translates
Weiderhold, G. (1995). Modelling and system
the result(s) from the target database for use by
maintenance. Proceedings of the International
the legacy system.
Conference on Object-Orientation and Entity-
Conceptual Conversion Strategy: A strategy
Relationship Modelling.
that focuses first on the recovery of the precise
Wong, K., & Sun, D. (2006). On evaluating the semantic meaning of data in the source database
layout of UML diagrams for program comprehen- and then the development of the target database
sion. Software Quality Journal, 14(3), 233–259. using the conceptual schema derived from the
doi:10.1007/s11219-006-9218-2 recovered semantic meaning of data through
standard database development techniques.
Wu, B., Lawless, D., Bisbal, J., Richardson, R.,
Domain Analysis: A technique that identifies
Grimson, J., Wade, V., et al. (1997). The butterfly
commonalties and differences across programs and
methodology: A gateway-free approach for mi-
data. Domain analysis is used to identify design
grating legacy information system. In ICECOS
patterns in software and data.
(pp. 200-205). Los Alamos, CA: IEEE Computer
Legacy Data: Historical data that are used by a
Society Press.
legacy system that could be defined as a long-term
Zhou, Y., & Kontogiannis, K. (2003). Incremental mission-critical system that performs important
transformation of procedural systems to object- business functions and contains comprehensive
oriented platform. Proceedings of COMPSAC, business knowledge
Dallas, TX. Multivalued Attribute: When an attribute, or
field, of a table or file may have multiple values.
For example, in a COBOL sequential file, its
corresponding record may have a field, A, with
key terms And deFInItIons
several allowable values (Y, N, D). Translating
this multivalued attribute to its relational data-
Butterfly Approach: An iterative data reengi-
base equivalent model is difficult; hence, lists or
neering approach where the legacy data are frozen
linked tables containing the possible values of
for read-only access until the data transformation
this attribute are used in order to represent it in
process to the target database is complete. This
the relational model.
approach assumes that the legacy data are the
Physical Conversion Strategy: A strategy
most important part of the reengineering process
that does not consider the semantic meaning of
and focuses on the legacy data structure, rather
the data but simply converts the existing legacy
than its values, during its migration.
constructs of the source database to the closest
Chicken Little Approach: An approach that
corresponding construct of the target database.
allows the coexistence of the legacy and target
This work was previously published in Handbook of Research on Innovations in Database Technologies and Applications:
Current and Future Trends, edited by Viviana E. Ferraggine, Jorge Horacio Doorn and Laura C. Rivero, pp. 37-44 , copyright
2009 by Information Science Reference (an imprint of IGI Global).
188
189
Chapter 1.14
Semantically Modeled
Databases in Integrated
Enterprise Information Systems
Cheryl L. Dunn
Grand Valley State University, USA
Gregory J. Gerard
Florida State University, USA
Severin V. Grabski
Michigan State University, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Semantically Modeled Databases in Integrated Enterprise Information Systems
Partly as a result of systems lacking expres- underlying semantic model, many of the current
sive semantics, researchers have been develop- problems can be eliminated.
ing ontologies. Gruber (2008) provides a useful This chapter first presents a normative semantic
definition of ontology: model for enterprise information systems that has
its roots in transaction processing information
“In the context of database systems, ontology systems. We use this model because the majority
can be viewed as a level of abstraction of data of information processed and tracked by informa-
models, analogous to hierarchical and relational tion systems is transactional in nature. We review
models, but intended for modeling knowledge empirical research on semantically modeled in-
about individuals, their attributes, and their formation systems and then provide an example
relationships to other individuals. Ontologies company’s semantic model as a proof of concept.
are typically specified in languages that allow We next discuss how this model can be applied to
abstraction away from data structures and imple- ERP systems and to inter-organizational systems
mentation strategies; in practice, the languages and present future trends and research directions,
of ontologies are closer in expressive power to and provide concluding comments.
first-order logic than languages used to model
databases. For this reason, ontologies are said semantic model development
to be at the “semantic” level, whereas database
schema are models of data at the “logical” or In this chapter, we adopt a definition of an enter-
“physical” level. Due to their independence from prise information system that is based on David et
lower level data models, ontologies are used for al.’s (1999) definition of an accounting informa-
integrating heterogeneous databases, enabling tion system: an enterprise information system that
interoperability among disparate systems, and captures, stores, manipulates, and presents data
specifying interfaces to independent, knowledge- about an organization’s value-adding activities
based services.” to aid decision-makers in planning, monitoring,
and controlling the organization. This definition is
We base our discussion in this paper on the also consistent with much of the research on ERP
Resources-Events-Agents (REA) ontology (Mc- systems. We recommend that the REA ontology
Carthy, 1982; Geerts and McCarthy 1999; 2000; (REA semantic model) (McCarthy, 1982) be used
2004; 2001; 2002; Haugen and McCarthy, 2000) as the core foundation of enterprise information
which is considered an enterprise ontology or a systems due to the model’s robust and general
business domain ontology. Ontologically-based nature. The semantics of the REA model are de-
information systems with common semantics are signed to capture the essential features of value
regarded as a necessity to facilitate inter-organiza- added activities – activities that correspond to
tional information systems (Geerts and McCarthy, exchanges of resources (e.g., giving inventory and
2002). Presently, most inter-organizational data is receiving cash) and transformations of resources
sent via EDI (which requires very strict specifica- (converting raw materials into finished goods). The
tions as to how the data are sequenced and requires basic REA model is presented in Figure 1 using
some investment by adopting organizations). entity-relationship notation (Batini et al., 1992),
The same requirement holds true for web-based however, it has also been implemented in NIAM
systems. There is no or very limited knowledge (Geerts and McCarthy, 1991) and in object notation
inherent in those systems. Alternatively, if trading (Nakamura and Johnson, 1998). The general REA
partners implement systems based on the same model for any particular transaction cycle consists
190
Semantically Modeled Databases in Integrated Enterprise Information Systems
191
Semantically Modeled Databases in Integrated Enterprise Information Systems
• Integration of process (cycle) level models • Scenario history relationships between ab-
into a value-chain level model at a higher stract occurrents and other abstractions,
level of abstraction. e.g. event type-resource type.
• Expansion of process (cycle) level models • Business Process as a description of the
into workflow or task level models at lower interaction between resources, agents, and
levels of abstraction. dual events.
• Separation of components into continuants • Partnering as the purpose of the inter-
(enduring objects with stable attributes that action between resources, agents, and
allow them to be recognized on different commitments.
occasions throughout a period of time) and • Segmentation as a description of the group-
occurrents (processes or events that are in ing of physical categories into abstract
a state of flux). continuant categories.
• Type images that represent category level • Policy or Standard as a description of
abstractions of similar components. the expression of knowledge level rules
• Commitment images that represent agree- between abstract types (e.g. scripts and
ments to engage in future economic events. scenarios).
• Assignment relationships between agents • Plan as a description of the application of a
that represent the designation of an agent script to physical occurrents.
category to work with another agent • Strategy as a description of rules for
category (e.g. salesperson assigned to the execution of a Business Process or
customer). Partnering.
• Custody relationships between agents and
resources that represent the agents that are The semantics contained within the expanded
accountable for various resources. REA model facilitate the information exchange
• CommitsTo relationships between com- between trading partners and likely provide a
mitment images and the resulting econom- needed core foundation for ERP systems. For
ic events. example, research reported by Andros et al. (1992)
• Partner relationships between commitment and Cherrington et al. (1996) found that IBM was
images and the participating agents. able to obtain significant benefits from a semanti-
• Reserved relationships between commit- cally modeled system based on the REA model.
ment images and the resources that are the Reported benefits of the new system included
proposed subject of the future exchange. a significant reduction in the time to process
• Typification description relationships be- employee reimbursements, significant cost re-
tween continuant components and the cate- ductions, and a generally high level of employee
gories to which they belong, e.g. resource- satisfaction. These studies demonstrate how the
resource type relationships. semantic models were used as the basis for systems
• Characterization description relationships design, and then how the resultant systems were
between continuant type images, e.g. agent perceived by the end-users, thereby completing
type-agent type relationships and agent the research loop from design to end-user.
type-resource type relationships. Weber (1986) empirically evaluated the REA
• Typification history relationships between semantic model. His objective was to determine
physical occurrents and their types, indi- whether software practitioners had both identified
cating that the occurrents share the same and solved the same problems as identified by aca-
script, e.g. event-event type. demicians. He found that the REA model fulfilled
192
Semantically Modeled Databases in Integrated Enterprise Information Systems
its objective as a generalized model and that it entation, based in part on accounting artifacts. Part
was a good predictor of the high-level semantics of the compromises are likely due to the fact that
found in all twelve packages. He believed that the software vendors’ products are constantly evolv-
REA model excluded certain types of events such ing in an incremental fashion, and vendors never
as contracts and suggested extensions (many of do a software redesign starting with a clean slate.
which have been subsequently incorporated into Research has demonstrated that organizations
the model). Weber reported that important differ- are able to obtain significant benefits from a
ences in the low-level semantics existed across all semantically modeled system based on the REA
packages, and that these seem to reflect the relative framework (Andros et al., 1992; Cherrington et
complexity of the different packages. Nonetheless, al., 1996). However, even semantically modeled
the clustering of the low-level semantics of the systems are not sufficient to ensure success.
packages according to the REA model allowed for Rather, success is dependent upon a variety of
the identification of similarities and differences factors including top management support and
among the packages, and the likely strengths and corporate philosophy in addition to the benefits
limitations of the package become apparent. On inherent in the semantically modeled system
a datalogical level, Weber found few violations (Satoshi, 1999). Research has also demonstrated
of normal form given the number of fields in the that the REA model is sufficient as a generalized
packages. He concluded that theory was a good model (Weber, 1986; O’Leary, 2004), and the more
predictor of design practice and that the empirical REA-like a system is, the more it is associated
evidence supports normalization theory. with productivity and administrative efficiencies
David (1995) developed a metric to classify (David, 1995).
organizations’ accounting systems characteristics We next present an REA model of a prototypi-
(ASC) along a continuum between traditional cal retail firm. This example will serve as further
general ledger based accounting systems and proof of concept and allow the reader to verify
REA systems. The ASC metric was developed that the semantic data model accurately represents
based upon characteristics that were identified the reality of the described organization, and that
in theoretical research as critical characteristics there is an application of the REA model with
for REA systems. David visited companies in the consistent patterns. First, we will provide a nar-
pulp and paper industry and conducted structured rative for the firm and describe in detail the sales
interviews and used the ASC metric to determine cycle. Then we will describe the components of a
each system’s position on the continuum. Data was REA model (in entity-relationship notation using
also gathered as to the companies’ productivity, guidelines set forth by Batini et al., 1992) that
efficiency, and the company executives’ percep- captures the reality. Finally, we will discuss the
tions of competitive advantage. REA-like systems benefits of the REA model that occur independent
were found to be associated with productivity and of the entity-relationship notation. Our example
administrative efficiencies. is for a company called Robert Scott Woodwinds
O’Leary (2004) compared the REA seman- (RSW), a retail organization that sells, leases
tic model with an enterprise resource software and repairs woodwind musical instruments, and
package. He compared information about SAP sells music supplies. This organizational setting
from various sources and determined that SAP encompasses many of the activities performed by
is consistent with the REA model in its database, most business organizations. While the semantics
semantic and structure orientations. However, of the model are specific to RSW’s environment,
SAP was also found to contain implementation the model provides a generic template for a retail
compromises in the structuring and semantic ori- organization’s semantic model, it also provides
193
Semantically Modeled Databases in Integrated Enterprise Information Systems
a template for leasing organizations, and it has school (usually this means that the children will
significant commonalities with manufacturing rent from RSW, not that the school will purchase
firms in the repair aspects of the business. the instruments from RSW). Following is informa-
tion about RSW’s revenue (including sales, sales
REA Semantic Model Example returns, repairs, and leases) cycle.
194
Semantically Modeled Databases in Integrated Enterprise Information Systems
an instrument is rented out, it is transferred from delivered to the customer at the school during the
“Inventory for Sale” to “Inventory for Rent”. If salesperson’s next sales call, or the customer may
it is later sold, the “Inventory for Rent” category pick up the instruments at the store. Cash receipts
will be decreased. are processed by cashiers and are deposited into
RSW’s salespeople complete sales invoices the company’s main bank account each day. The
and rental invoices for customers. The customer semantic data models for sales and for leases are
may purchase (rent) multiple instruments on a presented in Figures 2 and 3 respectively.
single sales (rental) invoice. Instruments are either
195
Semantically Modeled Databases in Integrated Enterprise Information Systems
As can be seen in the sales revenue data model relationship established between salesperson and
(Figure 2), the original REA template has been customer. Sales personnel can be assigned to
applied. The resource (inventory) is associated many different customers, and a customer has, at
with an economic decrement event (sale) via a most, one sales person assigned to them. The REA
stockflow relationship. The sale event is associ- ontology allows for the inclusion of additional
ated with the internal agent (salesperson) and the entities that managers need information about for
external agent (customer) via control relation- planning, controlling and evaluating individual
ships. There is a duality relationship between and organizational performance. These additions
the economic decrement event (sales) and the do not change the underlying REA template; they
economic increment event (cash receipt). Cash simply add to it. For example, the sales call event
receipt is associated with the resource (cash) via that leads to the sales order event is modeled, and
a stockflow relationship and to the internal agent is linked to the associated resource and agents.
(cashier) and the external agent (customer) via Further, the external agent set has been expanded
control relationships. Note that the cardinalities to include school and district. A customer does not
between sale and cash receipt disclose that a sale need to be associated with a school, and a school
does not require the immediate receipt of cash. may be listed even if no customers from that
Rather, a sale may be paid for at one later point school have begun to trade with RSW. A school
in time, in installments over a period of time, or does not need to belong to a school district (i.e.,
not paid for at all (because of a sale return or bad it is a private school), however, if it belongs to a
debt). Newer aspects of the REA ontology have school district, it can only belong to one school
also been included in this model. The sales order district. A school district has at least one school.
event is a commitment image and is related to the The information presented in the semantic
resulting economic event (sales) via a CommitsTo model is a representation of the reality of the world
relationship. It is also related to salesperson via a of RSW. The cardinalities contain the “business
Control relationship, to customer via a Partner- rules” that are followed by the entities in their
ing relationship, and to inventory via a Reserved relationships. A similar analysis can be performed
relationship. In addition, there is an Assignment for the lease revenue data model (Figure 3), and
196
Semantically Modeled Databases in Integrated Enterprise Information Systems
in fact, the only differences between the two are etc.). This serves as the bill of materials for the
the events of rental order and rental contract in service and allows storage of information about
place of sales order and sale. The observation of the “categories” to which the repair services be-
such commonalities allows for the development of long. Another internal agent is also included, that
common business practices for all revenue activi- of repair person. This allows RSW to track the
ties and facilitates reengineering at the task level. person was responsible for a given repair. This is
In a similar manner to the sales and leases, a similar to any type of job shop or organization that
semantic model of sales returns and lease returns must track employee time (e.g., consulting firms).
can also be created. The sale return data model For simplicity and in the interest of brevity, we
(Figure 4) has the economic decrement sale event do not present the acquisition, payroll or financ-
associated with the economic increment event ing cycles. The acquisition model is similar to the
sale return, and the sale return is associated with revenue cycle, with cash disbursement being the
the subsequent economic decrement event cash decrement event, purchase the increment event
disbursement (the sale return might not result in a and vendor is the external agent. The payroll
cash disbursement if no cash was received at the cycle would be similar to the acquisition cycle
time of the sale; this is represented by the 0 min except that services are acquired from employees
cardinality on the sale return). The rental returns (hence employees act as external agents) instead
data model is analogous (the difference is in the of from vendors or suppliers. The financing
economic increment event of rental return which model is also similar to the acquisition process
is associated with the rental contract, and this except that the resource acquired and consumed
model is not presented in the interest of brevity) is cash. Sometimes the flow of resources may not
The third form of revenue generated by RSW be measurable, for example, in the payroll cycle
is through instrument repair services. RSW offers the resource acquired is employee labor. This is
a variety of repair service types. “Complete over- an intangible resource that may be difficult, if
hauls” are available for many instruments. Prices not impossible to measure in terms of stockflow.
of these complete overhauls vary by instrument The REA ontology requires that such things be
type. “Repad overhauls” are also available for considered and only left out of the model if they
each instrument type. These are less expensive are impossible to implement.
than complete overhauls and price varies by instru- The REA ontology can be implemented using
ment type. Customers may have individual keys alternative notations, including object notation,
replated at a fixed cost per key. Crack repairs will UML, and others. We have chosen to represent
be judged as minor or major and will be priced it with entity-relationship notation because of its
accordingly. Other repairs are also available. The simplicity and widespread use. The benefit of the
semantic model for repair revenue is presented REA ontology is not found in the notation itself,
in Figure 5. but in the repeated application of the pattern to all
In the repair service REA model, more of the of the various business cycles. Consistent use of
features of the newer REA ontology are introduced. the template gives users an ability to understand
Typification is used, with an event to event-type the reality being represented, and it also provides
relationship between repair service and service system reusability and extendibility. Dunn and Mc-
type and also a commitment-commitment type Carthy (2000) describe four benefits of the REA
relationship between repair service order and model. First, the standardized use and definition
service type. The service type entity represents of information structures across organizational
the details of the various repair service types boundaries facilitates electronic commerce, by
RSW can provide (e.g. complete overhauls, repad, enabling the retrieval, sending, and integration of
197
Semantically Modeled Databases in Integrated Enterprise Information Systems
data among business partners or research sources. critical (Bodart et al., 2001), perhaps because of
Second, intellectual complexity is made manage- the semantics inherent in the modeled system.
able by the use of natural primitives that abstract System designers distinguish between entities
to generalized descriptions of structures which in and relationships, with entities being primary
turn cover many thousands of cases with as few (Weber, 1996). Data and process methodologies
exceptions as possible. Third, consistent use of the are easier for novices than the object methodology,
REA pattern can enable system-based reasoning and resulted in less unresolved difficulties during
and learning. Fourth, use of system primitives that problem-solving processes (Vessey and Conger,
closely mirror the underlying phenomena enables 1994), and there is a more pronounced effect
system adaptability. for process-oriented tasks (Agarwal, Sinha, and
It is important to note that the REA ontology Tanniru, 1996a). Experience in process modeling
and other semantic modeling approaches have matters, regardless of whether the modeling tool
been studied at the individual decision-making (process versus object-oriented) is consistent
level, both for system designers and users. Dunn with the experience (Agarwal, Sinha, and Tan-
and Grabski (2002) provided an extensive litera- niru, 1996b).
ture review of individual-level semantic models
research. Overall conclusions of their review semantic models, erP systems,
were as follows. Accounting systems based on the and Inter-organizational systems
REA model are perceived as more semantically
expressive by end users than are accounting sys- The American Production and Inventory Control
tems based on the traditional debit-credit-account Society (APICS, 1998) defined an ERP system
model. Also, accounting systems perceived as as “an accounting-oriented information system
semantically expressive result in greater accuracy for identifying and planning the enterprise-wide
and satisfaction by end-users than do non-seman- resources needed to take, make, ship, and account
tically expressive accounting systems (Dunn and for orders.” David et al. (1999) proposed using
Grabski, 2000). Conceptual modeling formalisms REA as a basis for comparison among systems
are superior to logical modeling formalisms for and ERP packages. This was based, in part, on
design accuracy (Sinha and Vessey, 1999; Kim and Weber (1986) who reported that a comparison at
March, 1995). The ability to disembed the essen- the level of symbol sets made semantic similarities
tial objects and relationships between the objects and differences apparent. Additionally, O’Leary
in complex surroundings depends on a cognitive (2004) compared SAP to the REA model and
personality trait, field independence and leads to determined that SAP is REA-compliant; however,
more accurate conceptual model design (at least SAP has significant implementation compromises
for undergraduate students) (Dunn and Grabski, based on accounting artifacts. Consistent with
1998). The focus on increment and decrement David et al. and based upon the APICS definition
resources and events along with the associated of ERP systems, we believe that REA is a robust
agents to those events is consistent with data- candidate to which ERP systems may be compared
base designers’ thought processes. Additionally, because of its strong semantic, microeconomic
knowledge structures consistent with the REA and accounting heritage. More importantly, we
template’s structuring orientation are associated believe that semantic models must be used as a
with more accurate conceptual accounting data- basis for the information system because of the
base design (controlling for knowledge content, information contained within the semantics.
ability, and experience level) (Gerard, 2005). The Watson and Schneider (1999) also emphasized
lack of mandatory properties with entities is not the importance of ERP systems in providing the
198
Semantically Modeled Databases in Integrated Enterprise Information Systems
process-centered modeling perspective necessary and what resources flow between them. In RSW,
for successful organizations. They emphasized financing is obtained and as a result, cash is dis-
understanding the underlying process model tributed, as needed to the various acquisition
inherent in ERP systems. That is, the underlying processes. Some of that cash is used to acquire
semantics of the system. Further, the SAP R/3 labor, which is then in turn distributed to each of
business blueprint provides four enterprise views; the other business processes. Some of the cash is
process, information, function, and organization. used to acquire instruments and supplies (both
It is in the organization view that the semantic supplies for sale and also supplies used in the
relationships among organizational units are repre- repair services). Some of the cash is used to acquire
sented. As most ERP implementations will require G&A services. The instruments, supplies, G&A
some modifications to meet the specific business services, and labor are received by the three rev-
needs, the analysts, designers, and users need enue processes and are combined in various ways
to understand the changes and their subsequent to generate revenue. The resulting cash is then
planned and unplanned impact. A semantically distributed to the financing process where it is
based model will facilitate this understanding. used to repay financing (including distribution of
The REA ontology provides a high-level defini- earnings to stockholders if this were a corporation)
tion and categorization of business concepts and or to re-distribute cash to the other business pro-
rules, enterprise logic, and accounting conventions cesses. The value chain level demonstrates inte-
of independent and related organizations (Geerts gration opportunities for the enterprise-wide in-
and McCarthy, 2002). The REA ontology includes formation system. Resources that flow from one
three levels: the value chain level, the process level, business process to another can be modeled in the
and the task level. The value chain level models database one time and accessed by the appropri-
an enterprise’s “script” for doing business. That ate business processes. Then as the separate busi-
is, it identifies the high-level business processes ness processes have their events linked to those
or cycles (e.g. revenue, acquisition, conversion, resources, the entire system is integrated and can
financing, etc.) in the enterprise’s value chain be examined at a level of abstraction higher than
and the resource flows between those processes. the individual business process level.
The process level model represents the semantic For inter-organizational system modeling, a
components of each business process. The example fourth level could be added to the REA ontol-
in section 2 depicted the process level of the REA ogy – the value system level. This enables an
ontology for RSW. The task (or workflow) level integration that spans the conceptual models of
of the REA ontology is the most detailed level, each organization to recognize that many busi-
and includes a breakdown of all steps necessary ness activities and phenomena such as electronic
for the enterprise to accomplish the business commerce and supply chain management that
events that were included at the process level. The involve multiple organizations. A company’s
task level can vary from company to company value system consists of its relationships with
without affecting the integration of processes or all other entities with which the company makes
inter-organizational systems; therefore we do not exchanges. For example, a company engages in
present an elaboration of this level (it is also the exchanges with its employees, its suppliers, its
level at which most reengineering occurs). An customers, and its creditors. An enterprise system
illustration of the value chain level for RSW is model at this level would represent the resource
presented in Figure 6. flows between the various types of organizations
The value chain level describes how the busi- in the enterprise’s value system. For example,
ness processes within the company fit together for RSW, the value system model is depicted in
199
Semantically Modeled Databases in Integrated Enterprise Information Systems
Figure 7. Partnering organizations that build their agents. Automated intensional reasoning systems
enterprise databases on the REA ontology will make inferences based on database table inten-
be better able to integrate their databases. This sions, and require completely consistent use of
will probably be best-accomplished using object any underlying pattern such as REA.
technology and artificial intelligence concepts Although REA is being used by some consul-
such as automated intensional reasoning (Geerts tants and software developers, as indicated in the
and McCarthy, 1999) and automated intelligent literature review in section 2 (also see e.g., REA
200
Semantically Modeled Databases in Integrated Enterprise Information Systems
201
Semantically Modeled Databases in Integrated Enterprise Information Systems
202
Semantically Modeled Databases in Integrated Enterprise Information Systems
database technology. Many of the current problems Batini, C., Ceri, S., & Navathe, S. B. (1992).
faced by companies who attempt to install ERP Conceptual Database Design: An Entity Approach.
systems and integration tools such as EDI can be Redwood City, CA: Benjamin Cummings.
minimized by use of common semantic patterns
Bodart, F., Patel, A., Sim, M., & Weber, R. (2001).
that can be reasoned about by intelligent systems.
Should optional properties be used in conceptual
Companies may integrate their systems without
modeling? A theory and three empirical tests.
using identical business practices.
Information Systems Research, 12(4), 384–405.
Non-accounting researchers have conducted
doi:10.1287/isre.12.4.384.9702
most of the existing research on semantic models,
both at the individual level and at the organization Cherrington, J. O., Denna, E. L., & Andros, D. P.
level. Because REA originated in an accounting (1996). Developing an event-based system: The
domain, non-accounting researchers have not case of IBM’s national employee disbursement
embraced it (perhaps because of their lack of system. Journal of Information Systems, 10(1),
awareness of the REA ontology). We hope that by 51–69.
making information about this enterprise ontology
David, J. S. (1995). An empirical analysis of REA
more available to non-accounting researchers who
accounting systems, productivity, and perceptions
are interested in semantically modeled informa-
of competitive advantage. Unpublished doctoral
tion systems we will encourage more interest and
dissertation, Michigan State University.
participation in REA research.
David, J. S., Dunn, C. L., & McCarthy, W. E.
(1999). Enterprise resource planning systems
reFerences research: The necessity of explicating and exam-
ining patters in symbolic form. Working paper,
Abrial, J. R. (1974). Data semantics. In J. W. Arizona State University.
Klimbie, & K. L. Koffeman (Eds.), Data Base
Management. Amsterdam: North Holland Pub- Dunn, C. L., Cherrington, J. O., & Hollander,
lishing Company, (pp. 1-60). A. S. (2005). Enterprise Information Systems: A
Pattern-based Approach, 3rd edition. New York:
Agarwal, R., Sinha, A. P., & Tanniru, M. (1996a). McGraw-Hill Irwin.
Cognitive fit in requirements modeling: A study of
object and process methodologies. Journal of Man- Dunn, C. L., & Grabski, S. V. (1998). The effect
agement Information Systems, 13(2), 137–162. of field independence on conceptual modeling
performance. Advances in Accounting Information
Agarwal, R., Sinha, A. P., & Tanniru, M. (1996b). Systems, 6, 65–77.
The role of prior experience and task character-
istics in object-oriented modeling: An empirical Dunn, C. L., & Grabski, S. V. (2000). Perceived
study. International Journal of Human-Computer semantic expressiveness of accounting systems
Studies, 45, 639–667. doi:10.1006/ijhc.1996.0072 and task accuracy effects. International Journal
of Accounting Information Systems, 1(2), 79–87.
Andros, D., Cherrington, J. O., & Denna, E. L. doi:10.1016/S1467-0895(00)00004-X
(1992). Reengineer your accounting the IBM way.
The Financial Executive, July/August, (pp. 28-31).
APICS. (1998). Defining enterprise resource
planning. http://www.apics.org/OtherServices/
articles/defining.htm.
203
Semantically Modeled Databases in Integrated Enterprise Information Systems
Dunn, C. L., & Grabski, S. V. (2002). Empirical Geerts, G. L., & McCarthy, W. E. (2004). The
research in semantically modeled accounting ontological foundation of REA enterprise infor-
systems. In V. Arnold & S. G. Sutton (Eds.), Re- mation systems. Working paper, Michigan State
searching Accounting as an Information Systems University.
Discipline. Sarasota, FL: American Accounting
Gerard, G. J. (2005). The REA pattern, knowledge
Association (pp. 157-180).
structures, and conceptual modeling performance.
Dunn, C. L., & McCarthy, W. E. (1997). The Journal of Information Systems, 19, 57–77.
REA accounting model: Intellectual heritage and doi:10.2308/jis.2005.19.2.57
prospects for progress. Journal of Information
Gruber, T. (2008). Ontology. In Ling Liu and M.
Systems, 11(1), 31–51.
Tamer Özsu (Eds.) Encyclopedia of Database
Dunn, C. L., & McCarthy, W. E. (2000). Symbols Systems, Springer-Verlag. Found online at http://
used for economic storytelling: A progression from tomgruber.org/writing/ontology-definition-2007.
artifactual to more natural accounting systems. htm (accessed 10/5/07).
Working paper, Michigan State University.
Haugen, R., & McCarthy, W. E. (2000). REA:
Geerts, G. L., & McCarthy, W. E. (1991). Da- A semantic model for internet supply chain col-
tabase accounting systems. IT and Accounting: laboration. Presented at Business Object Com-
The Impact of Information Technology. In B. C. ponent Design and Implementation Workshop
Williams & B. J. Spaul (Eds.), London: Chapman VI: Enterprise Application Integration which is
& Hall, (pp. 159-183). part of The ACM Conference on Object-Oriented
Programming, Systems, Languages, and Applica-
Geerts, G. L., & McCarthy, W. E. (1999). An
tions, October 15-19, Minneapolis, Minnesota.
accounting object infrastructure for knowledge-
based enterprise models. IEEE Intelligent Systems Kim, Y. K., & March, S. T. (1995). Comparing
& Their Applications, (July-August), (pp. 89-94). data modeling formalisms. Communications of the
ACM, 38(6), 103–115. doi:10.1145/203241.203265
Geerts, G. L., & McCarthy, W. E. (2000). Aug-
mented intensional reasoning in knowledge- McCarthy, W. E. (1982). The REA accounting
based accounting systems. Journal of Informa- model: A generalized framework for accounting
tion Systems, 14(2), 127–150. doi:10.2308/ systems in a shared data environment. Accounting
jis.2000.14.2.127 Review, 57(3), 554–578.
Geerts, G. L., & McCarthy, W. E. (2001). Using Nakamura, H., & Johnson, R. E. (1998). Adap-
object templates from the REA accounting model tive Framework for the REA Accounting Model,
to engineer business processes and tasks. The Proceedings of the OOPSLA’98 Business Object
Review of Business Information Systems, 5(4), Workshop IV, http://jeffsutherland.com/oopsla98/
89–108. nakamura.html.
Geerts, G. L., & McCarthy, W. E. (2002). An onto- O’Leary, D. E. (2004). On the relationship between
logical analysis of the primitives of the extended- REA and SAP. International Journal of Accounting
REA enterprise information architecture. Interna- Information Systems, 5(1), 65–81. doi:10.1016/j.
tional Journal of Accounting Information Systems, accinf.2004.02.004
3, 1–16. doi:10.1016/S1467-0895(01)00020-3
204
Semantically Modeled Databases in Integrated Enterprise Information Systems
Rockwell, S. R., & McCarthy, W. E. (1999). Weber, R. (1986). Data models research in ac-
REACH: automated database design integrat- counting: An evaluation of wholesale distribution
ing first-order theories, reconstructive expertise, software. Accounting Review, 61(3), 498–518.
and implementation heuristics for accounting
Weber, R. (1996). Are attributes entities? A
information systems. International Journal
study of database designers’ memory structures.
of Intelligent Systems in Accounting Finance
Information Systems Research, 7(2), 137–162.
& Management, 8(3), 181–197. doi:10.1002/
doi:10.1287/isre.7.2.137
(SICI)1099-1174(199909)8:3<181::AID-
ISAF172>3.0.CO;2-E
Satoshi, H. (1999). The contents of interviews
key terms And deFInItIons
with the project manager of FDWH in IBM Japan.
Proceedings of the 1999 SMAP Workshop, San Business Process: A term widely used in
Diego, CA. business to indicate anything from a single activ-
Scheer, A. W. (1998). Business Process Engineer- ity, such as such as printing a report, to a set of
ing: Reference Models for Industrial Enterprises. activities, such as an entire transaction cycle; in
Berlin: Springer-Verlag. this paper business process is used as a synonym
of transaction cycle. (p. 20)
Sinha, A. P., & Vessey, I. (1999). An empirical Enterprise Resource Planning System: An
investigation of entity-based and object-oriented enterprise wide group of software applications
data modeling. Proceedings of the Twentieth In- centered on an integrated database designed to
ternational Conference on Information Systems. P. support a business process view of the organiza-
De & J. DeGross (Eds.), Charlotte, North Carolina, tion and to balance the supply and demand for its
(pp. 229-244). resources; this software has multiple modules that
Swagerman, D. M., Dogger, N., & Maatman, S. may include manufacturing, distribution, person-
(2000). Electronic markets from a semiotic per- nel, payroll, and financials and is considered to
spective. Electronic Journal of Organizational provide the necessary infrastructure for electronic
Virtualness, 2(2), 22–42. commerce. (p. 2)
Ontologically-Based Information System:
Vessey, I., & Conger, S. A. (1994). Requirements An information system that is based upon a par-
specification: Learning object, process, and data ticular domain ontology, and the ontology provides
methodologies. Communications of the ACM, the semantics inherent within the system. These
37(5), 102–113. doi:10.1145/175290.175305 systems facilitate organizational productivity and
Wakayama, T., Kannapan, S., Khoong, C. M., inter-organizational communication. (p. 3)
Navathe, S., & Yates, J. (1998). Information and Process Level Model: A second level model
Process Integration in Enterprises: Rethinking in the REA ontology that documents the semantic
Documents. Norwell, MA: Kluwer Academic components of all the business process events.
Publishers. (p.20)
Resources-Events-Agents (REA) Ontology:
Watson, E. E., & Schneider, H. (1999). Using A domain ontology that defines constructs com-
ERP systems in education. Communications of mon to all enterprises and demonstrates how those
the Association for Information Systems, 1(9). constructs may be used to design a semantically
modeled enterprise database. (p. 3)
205
Semantically Modeled Databases in Integrated Enterprise Information Systems
Semantically Modeled Database: A database research is needed comparing these two se-
that is a reflection of the reality of the activities mantic models with subsequent evaluations
in which an enterprise engages and the resources of commercially available ERP packages.
and people involved in those activities. The se- 2
The REA framework uses the term business
mantics are present in the conceptual model, but process to mean a set of related business
might not be readily apparent in the implemented events and other activities that are intended
database. (p. 3) to accomplish a strategic objective of an or-
Task Level Model: A third level model in the ganization. In this view, business processes
REA ontology is the most detailed level, which represent a high level of abstraction. Some
specifies all steps necessary for the enterprise to non-REA views define business processes as
accomplish the business events that were included singular activities that are performed within a
at the process level. (p. 6) business. For example, some views consider
Value Chain: The interconnection of business “process sale order” to be a business process.
processes via resources that flow between them, The REA view considers “sale order” to be
with value being added to the resources as they a business event that is made up of specific
flow from one process to the next. (p. 20) tasks, and it interacts with other business
events within the “Sales-Collection” busi-
ness process.
endnotes
1
An alternative semantic model has been
presented by Scheer (1998). Additional
This work was previously published in Handbook of Research on Innovations in Database Technologies and Applications: Cur-
rent and Future Trends, edited by Viviana E. Ferraggine, Jorge Horacio Doorn and Laura C. Rivero, pp. 221-239, copyright
2009 by Information Science Reference (an imprint of IGI Global).
206
207
Chapter 1.15
An Overview of Ontology-
Driven Data Integration1
Agustina Buccella
Universidad Nacional del Comahue, Argentina
Alejandra Cechich
Universidad Nacional del Comahue, Argentina
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
An Overview of Ontology-Driven Data Integration
of the main problems we must face to perform sufficiently comprehensive to support translation
the integration. Autonomy means that users and of all relevant information sources; an ontology
applications can access data through a federated may support consistency management and rec-
system or by their own local system. Distribu- ognition of inconsistent data; etc. Then, the next
tion (Ozsu & Valduriez, 1999) refers to data (or section will analyze several systems using ontolo-
computers) spread among multiple sources and gies as a tool to solve data integration problems.
stored in a single computer system or in multiple
computer systems. These computer systems may
be geographically distributed but interconnected bAckGround
by a communication network. Finally, heteroge-
neity relates to different meanings that may be Recently, the term Federated Databases has
inferred from data stored in databases. In (Cui & evolved to Federated Information Systems be-
O’Brien, 2000), heterogeneity is classified into cause of the diversity of new information sources
four categories: structural, syntactical, system, involved in the federation, such as HTML pages,
and semantic. Structural heterogeneity deals with databases, filing, etc., either static or dynamic. A
inconsistencies produced by different data mod- useful classification of information systems based
els whereas syntactical heterogeneity deals with on the dimensions of distribution and heterogene-
consequences of using different languages and ity can be found in (Busse et al., 1999). Besides, this
data representations. On the other hand, system work defines the classical architecture of federated
heterogeneity deals with having different sup- systems (based on Sheth & Larson (1990)) which
porting hardware and operating systems. Finally, is widely referred by many researches. Figure 1
semantic heterogeneity (Cui & O’Brien, 2000) is shows this architecture.
one of the most complex problems faced by data in- In the figure, the wrapper layer involves a
tegration tasks. Each information source included number of modules belonging to a specific data
in the integration has its own interpretation and organization. These modules know how to retrieve
assumptions about the concepts involved in the data from the underlying sources hiding their data
domain. Therefore, it is very difficult to determine organizations. As the federated system is autono-
when two concepts belonging to different sources mous, local users may access local databases
are related. Some relations among concepts that through their local applications independently
semantic heterogeneity involves are: synonymous, from users of other systems. Otherwise, to access
when the sources use different terms to refer to the federated system, they need to use the user
the same concept; homonymous, when the sources interface layer.
use the same term to denote completely different The federated layer is one of the main com-
concepts; hyponym, when one source contains a ponents currently under analysis and study. Its
term less general than another in another source; importance comes from its responsibility to solve
and hypernym, when one source contains a term the problems related to semantic heterogeneity,
more general than another in another source; etc. as we previously introduced. So far, different
In this paper we will focus on the use of ontolo- approaches have been used to model this layer.
gies because of their advantages when using for In general they use ontologies as tools to solve
data integration. For example, an ontology may these semantic problems among different sources
provide a rich, predefined vocabulary that serves (Stephens, Gangam & Huhns, (2004); Le, Dieng-
as a stable conceptual interface to the databases Kuntz & Gandon, (2004); Giunchiglia, Yatskevich
and is independent of the database schemas; & Giunchiglia, (2005), Buccella, Cechich & Bris-
knowledge represented by the ontology may be aboa, 2003; Buccella, Cechich & Brisaboa, 2004).
208
An Overview of Ontology-Driven Data Integration
209
An Overview of Ontology-Driven Data Integration
sources. The other approach, local-as-view (LAV), ontologies. Changeability refers to the ability of
is based on the definition of the sources as views changing some structures within an information
over the global view. Thus, the information the source, without producing substantial changes in
sources contain is described in terms of this the system components. Finally, scalability refers
global view. to the possibility of easily adding new information
In this section we will focus on how ontology- sources to the integrated system.
based systems address the semantic heterogeneity In order to give a wide view of ontology-based
problems. We have investigated many systems, systems, we divide the approaches into two branch-
which follow some of the approaches of Figure es. On one branch, we briefly analyze systems
2, considering relevant aspects respect to the use proposed during the 90’s decade and no longer
of ontologies. They are, reusability, changeability under research. Table 1 shows our classification
and scalability. These aspects allow us analyze taking into account some of these systems. The
whether quality properties are improved due a columns of the table contain the three relevant as-
particular use of ontologies in a given system. pects within the use of ontologies aforementioned.
The use of ontologies refers to how ontologies A more extensive analysis of these systems can be
help solve data integration problems. Commonly, found in (Buccella, Cechich & Brisaboa, 2005a;
the systems show how ontologies are used to Buccella, Cechich & Brisaboa, 2005b).
solve the integration problems and how ontologies As we can see, SIMS (Ambite et al., 1997)
interact with other architectural components. In and Carnot (Woelk, Cannata, Huhns, Shen &
this aspect the systems describe its ontological Tomlinson, 1993) are scored as “Not supported”
components and the ways to solve the different in the three columns. In the first column this
semantic heterogeneity problems. value means that both ontologies are not reusable
Then, we characterize this feature by means of because both define a global ontology or a single
three quality characteristics: reusability, change- ontology approach in order to integrate data. The
ability and scalability. Reusability refers to the same happens with the second column, change-
ability of reusing the ontologies, that is, ontologies ability, because no support is given by these
defined to solve other problems can be used in a systems to bear changes in the information
system because of either the system supports dif- sources. When one source changes, the global
ferent ontological languages (and) or define local ontology must be rebuilt.
210
An Overview of Ontology-Driven Data Integration
Finally, scalability, is not supported because that most of the new systems do not follow the
again by adding a new information source, the single ontology approach. The inherent disad-
rebuilding of the global ontology is generated. vantages of this type of systems make difficult to
The problem of dealing with the global ontology deal with them. However, some systems such as
approach is that we must manage a global inte- MediWeb (Arruda, Lima & Baptista, 2002) and
grated ontology, which involves administration, DIA (Medcraft, Schiel & Baptista, 2003) apply this
maintenance, consistency and efficiency problems approach but without better results. Only in the
that are very hard to solve. case of DIA the changeability and scalability can
On the other hand, OBSERVER system (Mena, be improved because the global ontology does not
Kashyap, Sheth & Illarramendi, 2000) uses the need to be modified when a source is added; only
multiple ontologies approach to alleviate the an ontology-schema matching table is necessary
problems presented by the single approach. As to add a new database to the integrated system.
each ontology can be created independently, the As a new proposal within the multiple ontology
reusability is fully supported. However, change- approach we can cite OntoGrate (Dou & LePendu,
ability and scalability are semi-supported because 2006). Here, first order logic inference is used to
changes in local ontologies also generate changes find mappings among underlying ontologies. By a
in the mappings. set of rules and user assistance, databases (that are
Finally, the three last systems following the the sources of the system) are translated to source
hybrid ontology approach are scored better. ontologies. Then, these ontologies are merged
Although they propose different and novel ways by applying bridging axioms and a reasoner. In
to improve these characteristics, all these mecha- this system, reusability is not supported because
nisms conclude in good results. For example, in the ontologies are created based on the underly-
InfoSleuth (Bayardo et al., 1997), to add a resource ing databases by using a specific language and
to the system it only needs to have an interface to particularities. For changeability or scalability,
advertise its services and let other agents make the reasoning process must be re-executed over
use of them immediately. the information changed or added. The speed of
On the other branch, we analyze more recent this process will depend on how large the ontolo-
systems widely referred by researchers, although gies are.
some of them are still under development. We use Recently, new approaches have emerged by
the same characteristics in order to analyze the applying the advantages the hybrid ontology
evolution of the systems. For example, we notice approach provides. Some novel approaches are
211
An Overview of Ontology-Driven Data Integration
MOBS (McCann, Doan, Varadarajan & Kramnik, the LAV approach, adding a new source to the
2003), AutoMed (Zamboulis & Poulovassilis, integrated system does not require changes in
2006) and Alasoud et.al (Alasoud, Haarslev & the global view. On the other hand, in the GAV
Shiri, 2005). In MOBS (Mass Collaboration to approach when a new source is added, changes
Build Systems) something different is proposed. over the global view are required. However, scal-
Instead of creating a global ontology based on ability over the global view is easier in this last
underlying domain ontologies, all of them are cre- approach. Finally, considering query processing,
ated at the same time. That is, in this first step the LAV requires reasoning mechanisms in order to
global ontology contains general concepts users answer them. Contrarily, in GAV conventional
want to recover instead of information extracted mechanisms can be implemented.
from underlying sources. Then, initial mappings In order to take advantage of the benefits of
are defined by using a random assignment or a both approaches, a new approach, called global-
schema matching tool. Finally, the mass collabora- local-as-view (GLAV), has been proposed by
tion of this approach is in the user feedback needed (Friedman, Levy & Millstein, 1999). Although
to readjust the system and to define the correct the query process is out of the scope of this work,
mappings. In this way, the ontologies are reusable we consider that a study of query capabilities of
because they can be used by this system or by each proposal shoud be performed. For example,
another one. But changeability and scalability can in (Calvanese, Giacomo & Lenzerini, 2001) two
be tedious because the user collaboration process case studies are presented in order to show the
must be re-run each time something is modified or need of suitable techniques for query answering.
added. In AutoMed and Alasoud et.al approaches
materialized views can be defined. In the case of
Alasoud et.al an integrated view (as a global on- Future trends
tology) is partially materialized to improve query
answering time, and to take advantages of fully Several systems compared here are still in a de-
materialized and fully virtual approaches. In this velopment stage and, as we have explained, some
way, the answers to queries are retrieved from problems should be solved in order to reach a good
materialized as well as virtual views. Besides, the integration. Recent proposals, which are based on
mappings between concepts in the source ontolo- the old ones, try to improve several aspects in order
gies are described in terms of the integrated view. to propose an integral solution. For example, new
Thus, adding a new ontology to this system does systems do not apply a global ontology approach
not require changes in the global view. such as SIMS did, due to problems as scalability
Considering the approach to specify mappings, and changeability.
the GAV approach is generally chosen by the pro- Other proposals applying the others ap-
posals. Only Alasoud et.al and OntoGrade systems proaches (multiple and hybrid), intent to solve
define something similar to the LAV approach. some characteristics of the global approach, but
Advantages and disadvantages of each ap- additional efforts have to be done to reach them.
proach have to be considered when an integration For example, reusability deserves more attention
process is initiated (Cali et.al, 2002). For example, because several ontologies created for the semantic
in the LAV approach restrictions over the sources web might be part (some day) of an integrated
can be defined easily. On the contrary, in the GAV system. In this way, thinking of particular ontol-
approach it is easier to define restrictions over the ogy with specific requirements, as in OntoGrate,
global view. With respect to scalability, following is not such a good idea.
212
An Overview of Ontology-Driven Data Integration
There are several proposals (Euzenat & Sh- ontology-based systems. Among them, we should
vaiko, 2007), which were not analyzed here, only mention the use of automated tools for supporting
implementing methods for semantic matching. the manipulation of ontologies.
These proposals are complementary because they Of course, further characterization is needed
propose mechanisms to create the global view to completely understand the use of ontologies for
or the mappings in an efficient way. Euzenat & data integration. Hope our work will motivate the
Shvaiko (2007) presents a survey that is mainly reader to deeper immerse in this interesting world.
focused on ontology matching proposals. The
task of ontology matching involves the process
of finding relationships or correspondences reFerences
between entities of different ontologies. In this
paper these proposals are not considered because Alasoud, A., Haarslev, V., & Shiri, N. (2005). A
we do not focus on this type of problems but on hybrid approach for ontology integration. Pro-
the functionality of the whole integrated system. ceedings of the 31st VLDB Conference. Trond-
Nevertheless, semantic matching is a crucial area heim, Norway.
that must be analyzed to assess the processes the Ambite, J. L., Arens, Y., Ashish, N., Knoblock,
system involves. C. A., & collaborators (1997). The SIMS manual
Currently, the task of building an integrated 2.0. Technical Report, University of Southern,
system is not easy. By trying to improve some es- California. December 22. Retrieved August 01,
sential aspects, other equally important ones can 2007, from http://www.isi.edu/sims/papers/sims-
be forgotten. For example, in order to improve manual.ps.
methods for finding mappings, more expressive
ontologies are created. But aspects as understand- Arruda, L., Baptista, C., & Lima, C. (2002).
ability and complexity are not taken into account. MEDIWEB: A mediator-based environment
Furthermore, new systems must consider all these for data integration on the Web. Databases and
aspects in order to give an integral solution. Information Systems Integration. ICEIS, 34-41.
Baru, C. (1998). Features and requirements for
an XML view definition language: Lessons from
conclusIon XML information mediation. In W3CWorkshop
on Query Language (QL´98). Boston.
Today, semantic heterogeneity implies many
complex problems that are addressed by using Bayardo, R. J., Jr., Bohrer, W., Brice, R., Cichocki,
different approaches, including ontologies, which A., Fowler, J., Helal, A., et al. (1997). InfoSleuth:
give a higher degree of semantics to the treatment Agent-based semantic integration of information
of data involved in the integration. in open and dynamic environments. Proceedings
We have analyzed several systems accordingly ACM SIGMOD International Conference on
to the use of the ontologies and we have evaluated Management of Data, 195-206.
three important aspects also related with them –
Buccella, A., Cechich, A., & Brisaboa, N. R.
reusability, changeability and scalability. Each
(2003). An ontology approach to data integration.
system has implemented its own solution with
Journal of Computer Science and Technology,
advantages and disadvantages, but some ele-
3(2), 62–68.
ments in common and some original aspects can
be found. There are other important aspects we
could have considered for characterizing current
213
An Overview of Ontology-Driven Data Integration
Buccella, A., Cechich, A., & Brisaboa, N. R. Euzenat, J., & Shvaiko, P. (2007). Ontology
(2004). A federated layer to integrate heteroge- matching. Heidelberg: Spinger-Verlag, (DE), isbn
neous knowledge. In VODCA’04 First Interna- 3-540-49611-4. (pp. 341).
tional Workshop on Views on Designing Complex
Firat, A., Madnick, S., & Grosof, B. (2002).
Architectures. Bertinoro, Italy. Electronic Notes in
Knowledge integration to overcome ontological
Theoretical Computer Science, Elsevier Science
heterogeneity: Challenges from financial informa-
B.V, 101-118.
tion systems. Twenty-Third International Confer-
Buccella, A., Cechich, A., & Brisaboa, N. R. ence on Information Systems, ICIS.
(2005a). Ontology-based data integration: Differ-
Friedman, M., Levy, A., & Millstein, T. (1999).
ent approaches and common features. Encyclope-
Navigational plans for data integration. AAAI/
dia of Database Technologies and Applications.
IAAI, 67-73.
Rivero L., Doorn J., and Ferraggine V. Editors.
Idea Group. Giunchiglia, F., Yatskevich, M., & Giunchiglia,
E. (2005). Efficient semantic matching. In A.
Buccella, A., Cechich, A., & Brisaboa, N. R.
Gomez-Perez and J. Euzenat, editors, ESWC 2005,
(2005b). Ontology-based data integration meth-
volume LNCS 3532, 272-289. Springer-Verlag.
ods: A framework for comparison. Revista Co-
lombiana de Computación 6(1). Goh, C. H. (1996). Representing and reasoning
about semantic conflicts in heterogeneous infor-
Busse, S., Kutsche, R. D., Leser, U., & Weber, H.
mation sources. Phd, MIT, Massachusetts Institute
(1999). Federated information systems: Concepts,
of Technology, Sloan School of Management.
terminology and architectures. Technical Report.
Nr. 99-9, TU Berlin. Goh, C. H., Bressan, S., Siegel, M., & Mad-
nick, S. E. (1999). Context interchange: New
Calí, A., Calvanese, D., Giacomo, D., & Len-
features and formalisms for the intelligent
zerini, M. (2002). On the expressive power of
integration of information. ACM Transac-
data integration systems. In Proceedings of the
tions on Information Systems, 17(3), 270–293.
21st Int. Conf. on Conceptual Modeling, ER, 2503
doi:10.1145/314516.314520
of Lecture Notes in Computer Science. Springer.
Gruber, T. (1993). A translation approach to por-
Calvanese, D., & Giacomo, G. D. (2005). Data
table ontology specifications. Knowledge Acquisi-
integration: A logic-based perspective. AI Maga-
tion, 5(2), 199–220. doi:10.1006/knac.1993.1008
zine, 26(1), 59–70.
Hass, L., & Lin, E. (2002). IBM federated da-
Calvanese, D., Giacomo, G. D., & Lenzerini, M.
tabase technology. Retrieved August 01, 2005,
(2001). A framework for ontology integration. In
from http://www-106.ibm.com/developerworks/
SWWS, 303-316.
db2/library/techarticle/0203haas/0203haas.html.
Cui, Z., & O’Brien, P. (2000). Domain ontology
Kalfoglou, Y., & Schorlemmer, M. (2003). Ontol-
management environment. In Proceedings of the
ogy mapping: The state of the art. The Knowledge
33rd Hawaii International Conference on System
Engineering Review, 18(1), 1–31. doi:10.1017/
Sciences.
S0269888903000651
Dou, D., & LePendu, P. (2006). Ontology-based
Integration for relational databases. SAC, 06,
461–466.
214
An Overview of Ontology-Driven Data Integration
Le, B. T., Dieng-Kuntz, R., & Gandon, F. (2004). Shvaiko, P., & Euzenat, J. (2005). A survey of sche-
On ontology matching problems for building a ma-based matching approaches. Journal of Data
corporate Semantic Web in a multi-communities Semantics, IV, 146–171. doi:10.1007/11603412_5
organization. In ICEIS 2004 Software Agents and
Stephens, L., Gangam, A., & Huhns, M. (2004).
Internet Computing, 236-243.
Constructing consensus ontologies for the Seman-
Litwin, W., Mark, L., & Roussoupoulos, N. (1990). tic Web: A conceptual approach. In World Wide
Interoperability of multiple autonomous data- Web [Kluwer Academic Publishers.]. Internet and
bases. ACM Computing Surveys, 22(3), 267–293. Web Information Systems, 7, 421–442.
doi:10.1145/96602.96608
Wache, H., Vögele, T., Visser, U., Stuckenschmidt,
McCann, R., Doan, A., Varadarajan, V., & Kram- H., Schuster, G., Neumann, H., & Hübner, S.
nik, A. (2003). Building data integration systems (2001). Ontology-based integration of information
via mass collaboration. International Workshop - A survey of existing approaches. In Proceedings
on the Web and Databases. California: WebDB of IJCAI-01 Workshop: Ontologies and Informa-
tion Sharing, Seattle, WA, (pp. 108-117).
Medcraft, P., Schiel, U., & Baptista, P. (2003).
DIA: Data integration using agents. Databases and Woelk, D., Cannata, P., Huhns, M., Shen, W., &
Information Systems Integration. ICEIS, 79-86. Tomlinson, C. (1993). Using Carnot for enterprise
information integration. Second International
Mena, E., Kashyap, V., Sheth, A., & Illarramendi,
Conf. Parallel and Distributed Information Sys-
A. (2000). Observer: An approach for query
tems, 133-136.
processing in global information systems based
on interoperation across pre-existing ontologies. Zamboulis, L., & Poulovassilis, A. (2006). In-
Kluwer Academic Publishers, Boston, (pp. 1-49). formation sharing for the Semantic Web — A
schema transformation approach. In Proceedings
Ozsu, M. T., & Valduriez, P. (1999). Principles of
of DISWeb06, CAiSE06 Workshop Proceedings,
distributed database systems, (2nd ed.), Prentice
275-289.
Hall.
Preece, A., Hui, K., Gray, A., Jones, D., & Cui, Z.
(1999). The KRAFT architecture for knowledge
key terms And deFInItIons
fusion and transformation. In 19th SGES Interna-
tional Conference on Knowledge-based Systems Data Integration: Process of unifying data
and Applied Artificial Intelligence (ES’99). Berlin: that share some common semantics but originate
Springer. from unrelated sources.
Rahm, E., & Bernstein, A. (2001). A survey of Distributed Information System: A set of
approaches to automatic schema matching. [New information systems physically distributed over
York: Springer-Verlag Inc.]. The VLDB Journal, multiple sites, which are connected with some
4(10), 334–350. doi:10.1007/s007780100057 kind of communication network.
Federated Database: Idem FIS, but the in-
Sheth, A. P., & Larson, J. A. (1990). Feder- formation systems only involve databases (i.e.
ated database systems for managing distrib- structured sources).
uted, heterogeneous and autonomous databases. Federated Information System (FIS): A set
ACM Computing Surveys, 22(3), 183–236. of autonomous, distributed and heterogeneous
doi:10.1145/96602.96604 information systems, which are operated together
to generate a useful answer to users.
215
An Overview of Ontology-Driven Data Integration
This work was previously published in Handbook of Research on Innovations in Database Technologies and Applications: Cur-
rent and Future Trends, edited by Viviana E. Ferraggine, Jorge Horacio Doorn and Laura C. Rivero, pp. 471-480, copyright
2009 by Information Science Reference (an imprint of IGI Global).
216
217
Chapter 1.16
A Fundamental SOA Approach
to Rebuilding Enterprise
Architecture for a Local
Government after a Disaster
Zachary B. Wheeler
SDDM Technology, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
The presented enterprise approach and imple- typically accomplished by establishing various
mentation process covers an area that is void in the local agencies and departments. These departments
disaster preparedness and response phase; how- are structured to provide essential services for the
ever, it is applicable in each phase: preparedness, community. For instance, the fire department role
response, and recovery. It is recommended that is to help citizens in immediate danger due to fire,
the presented approach be included as part of the gas, or chemical hazard. The role of the health
disaster preparedness phase, implemented in the department is to establish policy, programs, and
response phase, and eventually expanded in the standards regarding health and health related issues.
recovery phase. The approach is unique because An additional role of the health department is to as-
the enterprise implementation takes place during sist citizens in obtaining basic health care services.
the actual response phase of the disaster and uti- Each established department or agency has a role in
lization of the fundamental SOA leads to further assisting the community and its residents by provid-
expansion during and after the recovery phase. ing relevant services. In a typical municipality, each
The approach introduced in this chapter takes agency has a database of information relating to
advantage of the Zachman framework system the citizens and the services provided to the citizen
model perspective by utilizing Web services on a by the agency. For instance, the police department
local level and introducing a practical but efficient maintains a database of criminals, criminal activity,
method for populating the initial data model. A and citizen complaints. The Department of Human
series of basic assumptions are introduced based Services maintains a database of child immunization
on information regarding the recent Gulf Port, records. In short, each agency maintains a database
Hurricane Andrew, Indonesian Tsunami, and 9/11 and application system to enter data, process data,
disaster events. These assumptions are based on and execute business rules. However, in the wake of
the physical, environmental, and technological an NDMTA, these systems along with other IT as-
conditions immediately after disaster strikes. sets are destroyed or rendered useless. For instance,
The assumptions are there will be limited or non- Hurricane Katrina destroyed most of New Orleans
existent landline and wireless communication, a including property, buildings, human life, landline
lack of ability to use generators for power source, and mobile communications, Internet services, in-
limited or nonexistent Internet and intranet, major tranet services, and essentially incapacitated local
IT system destruction, and the incapacitation of government. In the terror attacks of 9/11, the same
local government services. asset destruction was prevalent within a specified
This chapter addresses the problem of re- geographic area. Hurricane Andrew wreaked havoc
establishing or laying the groundwork for an among Florida communities and followed the same
enterprise architecture for local government during line of asset destruction and local government in-
the response phase of the disaster. Specifically, capacitation as Hurricane Katrina. In each of these
it addresses constructing a high-level data model cases, major response and rebuilding were needed
and fundamental SOA by utilizing the remaining to help reestablish public safety, government, and
local assets, XML, and Web services. services to the remaining citizens. This approach
suggests that reestablishing a basic framework for
IT services can be facilitated during the response
bAckGround phase of a disaster. In that regard, the proposed
approach is unique in that the role of rebuilding
The fundamental role of local government is to typically takes place during the recovery phase
protect the people, provide basic human services, (University of Florida, 1998).
and assist in strengthening communities. This is
218
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
The extended Zachman Framework system In the conclusion, the what, how, and where ques-
model perspective will be utilized to establish high- tions of the ISA will be answered.
level data elements for the model. The utilization
of Web services will be used to lay down a basic
framework for a fundamental service oriented mAIn tHrust oF tHe cHAPter
architecture that can be extended to an enterprise
level once essential government services have been basis for a conceptual data model
restored. In addition, a data collection process is
provided for initial population of the primary data The ISA system model perspective represents the
elements from the remaining survivors. system analyst role in information technology.
The system analyst is responsible for determining
the system model and Zachman the data elements and functions that represent the
business entities and processes. Zachman sug-
In the initial framework provided by Zachman gests introducing all of the entities; however, the
(1987), he identifies five different perspectives construction of all data elements, processes, and
of an enterprise architecture, three views of functions for a local government would be beyond
the enterprise, and introduces the six questions the scope of this chapter, therefore, a high-level
pertaining to an enterprise. The six questions are perspective for core data elements utilized during
what, how, where, who, when, and why. (Table 1) the response phase will be presented.
Zachman provides a clear and concise identi-
fication of the various views of an enterprise and Primary data elements
shows how each view is proper and correct. In
1992, the Zachman framework was extended by One of the main priorities of local government is
Zachman and Sowa (1992). In addition to answer- to provide services to the citizens of the com-
ing the final three questions, they introduce the munity. Regardless of the service provided, most
conceptual graph to represent the ISA and replace government agencies interact with its residents
the “model of the information system” with the and maintain some form of database of citizen
more generic system model reference for row 3 information. In a disaster area, the citizens of the
or the designer perspective. Hence, the various community are the disaster survivors. From a data
perspectives identified by Zachman are scope, acquisition perspective, we can obtain valuable
enterprise model, system model, technology information from the survivors and with this in-
model, and components. Our perspective will formation begin to develop a conceptual data
cover the system model or designer perspective. model for the emerging enterprise. Typically, the
conceptual data model does not show actual data
details of the entities. Instead, the conceptual data
Table 1. Zachman’s enterprise questions model provides a high-level entity view using the
entity relationship diagram (ERD) (Rob & Coro-
Zachman’s Six Enterprise Questions
nel, 2002). Entity details will be provided in
What? What entities are involved?
tabular format for clarity; however, the ERD will
How? How they are processed?
only show the entities and the defined relation-
Where? Where they are located?
ships. Utilizing the following assumptions, we
Who? Who works with the system?
can define each remaining citizen as unique:
When? When events occur?
(Table 2, Table 3, Table 4, and Table 5)
Why? Why these activities are taking place?
219
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
Table 2. Person entity details Table 5. Police entity object relating to person
PERSON POLICE
Unique_Id Not Null Unique_Id Not Null
Unique_ID_Type Not Null Unique_Id_Type Not Null
First_Name Not Null Arrested(Y,N) Not Null
Middle_Name Officer_Id Not Null
Last_Name Not Null Comments
Name_Suffix (i.e. Jr, Sr, etc….) Crime_Id Not Null
Date_of_Birth Not Null
Sex Not Null
Status(Living,Deceased) Not Null • Every entity has a name (names are not
Phone(Optional) unique).
Address_Id • Every entity has or had an associated ad-
dress (address is not unique).
• Every entity has a sex (unique).
Table 3. Address entity details • Every entity will have an identifying
unique number (ID card, green card, fed-
ADDRESS
eral employee identification number, social
Address_Id Not Null
security card, or driver’s license).
Street_Number Not Null
Prefix
Street_Name Not Null Note: Newborns or infants will be given a tempo-
Street_Type Not Null rary generic unique id if they do not have a SSN.
PostDir If we further assume that each remaining sur-
City Not Null vivor (citizen) has an associated address then we
State Not Null can define the following address entity.
Zip We are working under the assumption that local
Current_Address (Y,N) Not Null assets and asset information have been destroyed,
which includes the destruction of roads, streets,
Table 4. Essential local government agencies bridges, highways, and previously existing ad-
dresses. Thus, when the data collection process
Essential Department/Agencies begins, during the response phase, local officials,
for maintaining order and protect- or management can glean a geographic represen-
Police Department
ing the people from physical harm
tation of survivors and establish a basic address
for maintaining control and
administering of basic health ser- information repository. During the recovery phase,
Department of Health
vices including disease and disease old and new street, road, bridge, highway and
outbreak
address information will be added to the system
Emergency Medical for assisting in medical data collec-
Services tion and medical services thus creating a complete address reference or
for cleaning and clearing of debris,
even an address database. For instance, an entity
Department of Public
Works
corpses and other related health that contains parcel information (square, suffix,
hazards
and lot) and an instance that contains ownership
for maintaining fire, gas, and information (owner name, owner address, etc…)
Fire Department chemical controls and basic rescue
operations will be needed, however, during the response
220
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
phase, only the address entity defined above is data elements to begin the construction of our
necessary. The person and address entities are conceptual data model. In the overall enterprise,
termed primary data elements. entities can be identified and added as service
agencies are added or new requirements are
secondary data elements: determined.
extending the core elements
HEALTH Address_Id
221
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
utilization of the data model, Web services, and it will receive a reply in format B. The
SOA. In our approach, we take advantage of WSDL has two basic strengths:
three different definitions of a Web service while ° It enforces the separation between the
saliently maintaining that a Web service, based interface and implementation.
on the Web services architecture, is considered a ° WSDL is inherently extensible.
software system (Guruge 2004).
uddI
• Definition 1: Web services are modular,
self-contained “applications” or applica- • A discovery mechanism used to discover
tion logic developed per a set of open stan- available services.
dards (Guruge, 2004).
• Definition 2: Web services are extensi-
ble markup language (XML) application Although a Web service is a particular imple-
mapped to programs, objects, or databases mentation of a protocol (SOAP), Web services
or to comprehensive business functions description language (WSDL) and UDDI, the Web
(Newcomer, 2002) service is composed of one or more independent
• Definition 3: A Web service is a particular services. A service represents a particular func-
implementation of a protocol (SOAP), Web tion of the system and has a well-defined, formal
services description language (WSDL), interface called its service contract that:
and universal description discovery and in-
tegration (UDDI) (Fermantle, 2002) where • Defines what the service does and
• SOAP • Separates the services externally acces-
• Uses a RPC or a request-response mecha- sible interface from the services technical
nism based on HTTP. implementation (Newcomer 2002).
• Utilizes an XML message format that con-
tains an address, possible header, and body. For instance, a Web service can contain a
• Contains one or more elements. service that performs the function of adding data,
° The elements are defined using another service that performs the function of re-
common interoperable data formats trieving data, and another service that performs
(integers, strings, and doubles). the function of generating reports for management.
° The parameters are maybe encoded A service can be either an atomic (simple) or a
as child elements of a common parent composite (complex) service. An atomic service
whose name indicates the operation and does not rely on other services and are usually
whose namespace indicates the service. associated with straightforward business trans-
• Can be sent over a common transport actions or with executing data queries and data
typically-HTTP. updates (Newcomer, 2002). A composite service
uses other services, has a well-defined service
Wsdl contract, is registered in the service registry, can
be looked up via the service registry, and can be in-
• Offers the ability to describe the inputs and voked like any other service provider (Newcomer,
outputs of a Web service. 2002). Regardless of the service type (atomic or
• Allows a Web service to publish the inter- composite), the services are required to satisfy the
face of a service, thus if a client sends a following basic requirements (Fermantle, 2002):
SOAP message in format A to the service,
222
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
• Technology neutral: Each service is non- services of person and address. An example is
technology dependent and can be invoked presented in the following screen shot for clarity.
through the standardized lowest common The PersonAddress Composite service will be
denominator technologies. used in the initial data collection process for the di-
• Loosely coupled: Each service has a life of saster survivors. The SOAP XML message format
its own, each service remains independent representation for the PersonAddress_Composite
of all other services, and each service does service is provided for clarity.
not have knowledge about other services.
• Support location transparency: Services POST /Primary_Core_Service/Ser-
should have their definition and location vice1.asmx HTTP/1.1
information stored in a repository such as Host: localhost
UDDI and is accessible by a variety of cli- Content-Type: text/xml;
ents that can locate and invoke the services charset=utf-8
irrespective of their location. Content-Length: length
SOAPAction: “http://tempuri.org/
the basic services Primary_Core_Service/Service1/
PersonAddress_Composite”
During the response phase and part of the recov- <?xml version=”1.0”
ery phase, several assumptions are made, such as encoding=”utf-8”?>
limited landlines, limited mobile communications, <soap:Envelope
and limited Internet and intranet services. The xmlns:xsi=”http://www.
main objective, however, is to form a basic frame- w3.org/2001/XMLSchema-in-
work using Zachman’s framework (system model stance” xmlns:xsd=”http://
perspective), Web services, and service-oriented www.w3.org/2001/XMLSchema”
architecture. By maintaining our focus on basic xmlns:soap=”http://schemas.xml-
services for the Web service, a foundation is cre- soap.org/soap/envelope/”>
ated for extending our Web services to a service <soap:Body>
oriented architecture later in the recovery phase. <PersonAddress_Composite
If we utilize the best practice approach of xmlns=”http://tempuri.org/Pri-
Krafzig, Banke, and Slama (2004), we can identify mary_Core_Service/Service1”>
two crucial basic service types: simple data-centric <Person>
services and logic-centric services. A data-centric <Person>
service is used to handle data manipulation, data <Person_ID>string</Person_
storage, and data retrieval (Krafizig, Banke, & ID>
Slama 2004). We can easily incorporate logic- <Person_Id_Type>string</
centric services at a later date to handle business Person_Id_Type>
processing and application logic. In a data centric <First_Name>string</First_
service, an entity can be encapsulated into a service Name>
(Krafizig et al., 2004). This encapsulation acts as <Middle_Name>string</Mid-
data layer and all services developed in the future dle_Name>
will have to access these services to access and <Last_Name>string</Last_
manipulate the data. In this chapter, the primary Name>
data elements are wrapped into services and then a <Name_Suffix>string</Name_
composite service is created that utilizes the simple Suffix>
223
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
224
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
225
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
226
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
Implementation
227
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
228
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
Web servIce trAnsActIons on local data stores and Web servers will decrease
(locAlly) significantly. A more dispersed and hopefully more
robust enterprise will develop while continuing
The ability to apply all or nothing data commit to build on our basic services for the primary
process is paramount in our SOA both on a local agencies. In short, a distributed government and
and wide area network (WAN) scenario. This information technology environment will evolve
all or nothing data commit process is called a that will require distributed transactions process
transaction. The ability to model and implement and distributed transaction systems (DTS). Al-
transactions is a frustrating and difficult task with though there are several distributed transactions
regards to services. According to Newcomer, the system specifications and models to choose from:
difficulty lies in the loosely coupled interfaces of (Figure 1)
services (Newcomer & Lomow, 2004).
On a local level, the two-phase commit transac- • WS-composite application framework.
tion process is ideal as the services are relatively • WS-transactions
close to each other (Newcomer et al., 2004) (they
exist on the same server) and a single uniform data The WS—transaction specification developed
repository is used for the initial data collection. by BEA, IBM, and Microsoft are recommended
Data collection can take place on local servers for our approach. The WS-transaction specifica-
during the response and certain parts of the recov- tion, based on a WS-coordination (WS-C), has the
ery phases and data reconciliation, replication or ability to utilize the two-phase commit process
integration accomplished at specified time frames defined for our local data collection process. In
throughout theses two phases. However, with the fact, the WS-transaction is composed of a family
expansion of our SOA during the recovery and of specifications (Newcomer et al., 2004)
rebuilding phase service transactions will play
an important role. • WS-AtomicTransactions (WS-AT): A
two-phase commit protocol for Web ser-
soA expansion and Web service vices interoperability.
transactions (distributed) • WS-BusinessActivity (WS-BA): An open
nested protocol for long running business
As resources and services expand, the fundamental processes.
SOA will expand to include other services, busi-
ness process and data repositories and the reliance
229
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
• WS-Coordination (WS-C): A pluggable Smart card technology will facilitate data collec-
coordination framework supporting WS- tion and data integrity across the municipality. A
AT and WS-BA. brief description of this technology is presented
for clarity. (Figure 2)
For a more detailed explanation of the imple-
mentation of the WS-transaction, we defer to Integrating smart card and smart
Newcomers et al.’s Understanding SOA with Web card technology
services (2004).
Once the primary data has been collected, the
soA expansion and other survivor data can be recorded onto a smart card
Information systems (SC). Smart card technology has been around since
1968 when German inventors Jurgen Dethloff
The fundamental SOA by design is expandable to and Helmut Grotrupp applied for the first ICC
be inclusive of other services, business processes, related patents with similar applications in Ja-
and data repositories while utilizing the services pan in 1970 and France 1974 (Litronic, 2003) In
developed for the response and recovery phase. 1984, the French Postal and Telecommunications
Over the course of the recovery and rebuilding began using the smart card for telephones and
phases, independent information systems will be by 1996, 150 million smart cards were in use for
developed by vendors. These independent systems this purpose. Over the past 20 years, smart cards
will be integrated into the enterprise (SOA) using
Web service integration tools, XML, and XML Figure 2. Initial high-level Web services infra-
translation. structure
The creation of our enterprise using the ser-
vice-oriented architecture will allow a smoother
integration transition due to the inherent nature
of Web services and XML. Various services,
interfaces, data wrappers, application wrappers,
and application programming interfaces (API’s)
can be developed to extract and utilize data and
business processes within the framework.
230
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
have been used throughout Europe successfully encryption algorithms to make the application
for a variety of purposes. They range from stor- software and data unreadable.
ing bank account information, to storing health Although smart cards remain relatively the
care and health related information, as well as same, they do not perform the same functions.
transportation information (Jacquot, 2003). In the In fact, the function of the smart card is based on
United States, smart cards are beginning to garner two factors: the chip type and the interface used
interest since the events of 9/11 and the increase to communicate with the card reader. In short,
in identity theft. Current U.S. applications for there are three chip types: memory only, wired
the smart card are identity security authentica- logic, and microcontroller.
tion, personal identification, and transportation
services. For thoroughness, a brief description of • Memory-only integrated circuit chip
smart cards and smart card technology is provided. cards (including serial protected mem-
The majority of the background information was ory chip cards): Memory-only cards are
taken directly from the U.S. Government Smart “electronic magnetic stripes” and provide
Card Handbook (GSA Card Handbook, 2004). little more security than a magnetic stripe
card. Two advantages they have over mag-
What is a smart card? netic stripe cards are: (a) they have a high-
er data capacity (up to 16 kilobits (Kbits)
A smart card is a simple plastic card that resembles compared with 80 bytes per track), and (b)
a credit card in size. It is considered a smart card the read/write device is much less expen-
because a small microprocessor and memory is sive. The memory-only chip cards do not
embedded inside the card. A smart is card is used contain logic or perform calculations; they
for storing. In addition to storing data a smart card simply store data. Serial-protected mem-
can also store applications and perform mostly ory chip cards have a security feature not
basic and a few complex calculations. The U.S. found in the memory-only chip card; they
Government Smart Card Handbook provides an can contain a hardwired memory that can-
excellent description of a smart card and we will not be overwritten.
use that description as our basis for the definition • Wired logic integrated circuit chip
of a smart card.Definition: Smart Card: A smart cards: A wired logic chip card contains
card is a credit card-sized device that contains one a logic-based state machine that provides
or more integrated circuits (ICs) and also may encryption and authenticated access to
employ one or more of the following machine- the memory and its contents. Wired logic
readable technologies: magnetic stripe, bar code cards provide a static file system support-
(linear or two-dimensional), contactless radio ing multiple applications, with optional en-
frequency transmitters, biometric information, crypted access to memory contents. Their
encryption and authentication, or photo identifica- file systems and command set can only be
tion. The integrated circuit chip (ICC) embedded changed by redesigning the logic of the IC
in the smart card can act as a microcontroller or (integrated circuit).
computer. Data are stored in the chip’s memory • Secure microcontroller integrated cir-
and can be accessed to complete various process- cuit chip cards: Microcontroller cards
ing applications. The memory also contains the contain a microcontroller, an operating
microcontroller chip operating system (COS), system, and read/write memory that can
communications software, and can also contain be updated many times. The secure micro-
controller chip card contains and executes
231
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
logic and calculations and stores data in The memory only card could be used for both
accordance with its operating system. The human and non-human asset data capture dur-
microcontroller card is like a miniature ing the response phase; however, since we have
PC one can carry in a wallet. All it needs developed a framework for the future enterprise
to operate is power and a communication and we view the survivor data as dynamic and
terminal. consistently changing due to the addition of
agencies and services. Thus, we recommend the
smart card Interfaces contact multi-application cards for issuance to
the survivors. A multi-application card has the
There are two primary types of chip card in- advantage of having multiple applications on a
terfaces—contact and contactless. The terms single card and each application can be managed
“contact” and “contactless” describe the means by a different agency. Thus, when the department
by which electrical power is supplied to the in- of motor vehicles comes online with services the
tegrated circuit chip (ICC) and by which data is citizen can simply show the card to motor vehicle
transferred from the ICC to an interface (or card staff (MVS), MVS will read the primary data off
acceptance) device (reader). Cards may offer both of the card (name, dob, address, etc….), initiate
contact and contactless interfaces by using two the immediate process, update the DMV entity(s)
separate chips (sometimes called hybrid cards) or utilizing data centric and logic centric services
by using a dual-interface chip (sometimes called and finally update the smart card with DMV
“combi” cards). data. Thus we have shown how two separate and
distinct agencies (DOH, DMV) with different
contact smart card functions and data requirements are linked by a
survivors primary data and how information can
• Contact smart cards: A contact smart be added, updated, retrieved and shared using a
card requires insertion into a smart card smart card. A high-level overview is provided in
reader with a direct connection to a con- the following diagram.
ductive micromodule on the surface of the With regard to public safety assets, although the
card. maintenance of data will change over time, it will
• Contactless smart card. remain static for most of the lifetime of the asset.
Integrating smart cards during the response phase
will produce immediate returns for emergency
If the smart card does not have a contact pad then workers and government. For instance, the abil-
the connection between the reader and the card is ity to determine and track food rationing (based
done via radio frequency (RF). Contactless smart on food dispensation), the ability to immediately
cards can exchange data without having to make view a survivors vital signs, and possible treat-
contact with the reader using radio frequency (RF). ments and the ability to identify public and public
Hence, contactless smart card communication safety assets (i.e., street lights, catch basins, down
can take within a perimeter of 10 centimeters or power lines, roadways, alleys, etc).
3.94 inches.
smart card Authentication/
combo smart card Authorization
A combo or hybrid card can have both contact and A natural question that arises with the utilization
contactless communication with the card reader. or implementation of smart card technology with
232
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
our approach is the issue of authentication and It is recommended that the Unique ID (SSN,
authorization. To be fair, authentication has re- drivers license number, green card number, etc.)
ceived the most interest. We define authentication defined in our high level data model be used as
and authorization utilizing Wikipedia dictionary the PIN. Thus, the authentication level provides
(Wikipedia Dictionary): a uniform consistency of the citizen and the de-
fined levels of authorization would apply to the
• Authenticaion is the act of establishing particular (application) service provided (DMV,
or confirming something (or someone) as emergency medical services, etc.).
authentic, that is, that claims made by or
about the thing is true. Authenticaion of
an object may mean confirming it prov- conclusIon
enance. Authentication of a person often
consists of verifying their identity. This chapter strongly emphasizes an implementa-
• Authorization is the process of verifying tion approach that rests on the Zachman system
that a known person has the authority to model perspective. This approach was formulated
perform a certain operation. after the visual confusion of the aftermath of
Hurricane Katrina and the lack of preparedness
With regards to authentication, there exists thereof. It is important to note in the conclusion
three basic types or categories which are: that this approach be considered in the prepared-
ness phase as to circumvent or assist in answering
• Something the user is (e.g., fingerprint or organizational and logistical challenges at the lo-
retinal pattern, DNA sequence (there are cal, state, and federal government level. Natural
assorted definitions of what is sufficient), questions will arise, for instance:
voice pattern (again several definitions),
signature recognition, or other biometric • Where will the back bone of the enterprise
identifier. be located?
• Something the user has (e.g., ID card, secu- • Which agencies and business processes are
rity token, software token, or cell phone). next to come online?
• Something the user knows (e.g., a pass- • Who will be in control of the fundamental
word, a pass phrase, or a personal identifi- enterprise (SOA)?
cation number (PIN)).
The author hopes that viewing this approach
The three authentication categories provide as part of the disaster preparedness phase will
a basis for single factor or multiple factor au- answer many of the organizational and logistical
thentication. In single factor authentication only challenges that face government during and after
one of the categories is used for authentication the disaster.
purposes. If more than one category used for We have attempted to establish a basic
authentication then the authentication process is framework for the development of an enterprise
called: multiple-factored authentication. In our architecture for local government immediately
approach we suggest a two factor authentication after a natural disaster or major terrorist attack.
process using: As a basis for our development, we have applied
Zachman’s system model perspective and defined
• Something the user has (smart card). two basic types of data elements: primary data
• Something the user knows (PIN). elements and secondary data elements. These
233
A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster
elements were then wrapped into simple services GSA. U.G.S.A., (2004). Government Smart Card
and utilized by composite services to establish Handbook.
a Web services environment on a local server
Guruge, A. (2004). Web services theory and
level. The ability to extend the local server level
practice. Burlington, MA: Elsevier Digital Press.
to a broader audience among local government
through the Internet or intranet is obvious. In the Jacquot, J. N. (2003). Application Note 104: Smart
future SDDM technology will continue to refine Cards. Exfo Photonic White Paper.
the concepts and explore the areas of process and
Krafzig, D., Banke, K., & Slama, D. (2004).
functionality in more detail. The expectation is
Enterprise SOA: Service-oriented architecture
that this approach will be deemed practical and
best practices (The Coad Series). Upper Saddle
useful as a model for assisting local government
River, NJ: Prentice Hall.
to gain valuable information from survivors,
assist survivors in medical need, and eventually Litronic, S. (2003). Introduction to smart cards:
provide the basis for a an enterprise utilizing a A White Paper. Retrieved September 2005, from
service-oriented architecture in the rebuilding of www.litronic.com
local government.
Newcomer, E. (2002). Understanding Web servic-
es XML, WSDL, SOAP, and UDDI. Indianapolis,
IN: Addison Wesley.
reFerences
Newcomer, E., & Lomow, G. (2004). Under-
Davis, T. (1998). The role of government in a di- standing SOA with Web services. Indianapolis,
saster. The Disaster Handbook 1998 National Edi- IN: Addison Wesley.
tion Institute of Food and Agricultural Sciences.
Chapter 3, Section 3.7: University of Florida. Rob, P., & Coronel, C. (2002). Database systems:
Design, implementation, & management. Boston:
Erl, T. (2004). Service-oriented architecture: a Course Technology.
field guide to integrating XML and Web services.
Upper Saddle River, NJ: Prentice Hall. Wikipedia, Defining Authentication and Au-
thorization, from http://en.wikipedia.org/wiki/
Fermantle, P. (2002). Enterprise services: Examin- authentication
ing the emerging field of Web services and how it is
integrated into existing enterprise infrastructures. Zachman, J. A. (1987). A framework for informa-
Communications of the ACM, 45(10). tion systems architecture. IBM Systems Journal,
26(3).
This work was previously published in Services and Business Computing Solutions with XML: Applications for Quality Man-
agement and Best Processes, edited by Patrick Hung, pp. 269-287, copyright 2009 by Business Science Reference (an imprint
of IGI Global).
234
235
Chapter 1.17
An Overview of Executive
Information Systems
Gary P. Moynihan
The University of Alabama, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
An Overview of Executive Information Systems
The concept of the executive information emphasized. For example, based on Rockart and
system can be traced to 1982, when Rockart and DeLong’s (1988) original discussion, Turban and
Treacy introduced this term to describe an emerg- Aronson (2001) further define an executive sup-
ing category of information systems. They noted port system as “a comprehensive support system
that there are four critical components to the EIS that goes beyond EIS to include communication,
concept. First, there is the Executive, the human office automation, analysis support, and business
element in the EIS environment. The executive re- intelligence” (p. 308). An important feature, es-
quires timely information, quick inquiry response, pecially to upper-level management, is access to
and systemic ease of use. Information supports external data. Thus, where core EIS functionality
both critical success factor analysis and leading focuses on the processing and presentation of
indicators of potential problems. The third com- information, an ESS implies other communica-
ponent is the system architecture that encompasses tions support capabilities more oriented toward
linkages to the relevant, and the processing of this the second fundamental EIS approach mentioned
data into critical information. The final component above. These communications support capabilities
is the organizational structure that manages the may include e-mail, office automation functions
databases and systems, and maintains information like electronic calendars, and linkages to stock
security. All four components must be integrated market news and industry trends.
for the EIS to be successful. Further, EISs were initially developed to sup-
To do this, an EIS combines two complimen- port a small set of high-level executives within an
tary approaches. According to McNurlin and organization. These systems normally served up to
Sprague (2002), “at its heart, an EIS should filter, 10 or 15 senior executives. The success of these
extract, and compress a broad range of up-to-date initial implementations has led to an expansion of
internal and external information. It should call these systems to support mid-level managers with
attention to variances from plan and also monitor cross-functional information needs. This type of
and highlight critical success factors of the indi- system served up to sixty executives and manag-
vidual executive user” (p. 386). This perspective ers, and has been termed an “extended EIS” In
defines an EIS as a structured reporting system to some cases, EIS, have been adapted to the entire
meet the unique needs of executive management. organization (McLeod and Schell, 2001). Rockart
The second fundamental approach of the EIS, as and DeLong (1988) first observed this migration.
identified by McNurlin and Sprague (2002), is as For this paper, the term “executive information
a human communications support, such that. “the systems” will be used across this spectrum of ap-
managers make requests, give instructions, and ask plications and levels of use, with consideration of
questions to selected members of this network to how the EIS concept has evolved in the process.
get people going on the desired action” (p. 387).
Alter (2002) confirms this by emphasizing the
networks of internal and external contacts used bAckGround
to gather information about specific issues of
current importance, as opposed to only utilizing Historically, the traditional management informa-
formalized information systems. tion systems (MIS) within a company have been
The terms executive information system and developed independently of each other. These
executive support system (ESS) are often used systems typically supported marketing, manufac-
interchangeably (e.g. Laudon and Laudon, 1998). turing, distribution, personnel, accounting, order
Other authors make a distinction between the two, entry, inventory control, and purchasing. They
based upon the fundamental approach used or are used to support organizational planning and
236
An Overview of Executive Information Systems
control, and are capable of producing both sum- data accessed from the appropriate data source.
mary and very detailed reports. Senior managers The presentation manager provides the formatted
have typically tried to utilize these MIS reports executive information in the form of reports to
to identify exceptions and trends that require the user, as well as a means of system access and
management attention. However, in attempting to inquiry. Thus, they only addressed the earliest
assimilate outputs beyond the limited functional phases of decision-making (i.e. isolating problems
areas, MIS systems are frequently deficient in sup- and raising questions). The information output
porting the company-wide perspective required by was considered to be restrictive and inflexible.
executive decision-makers. Although these MIS Review of the literature has noted consider-
systems may be subsequently interfaced, there able work on the development of decision rules
was no true integration. There is a wide variety and computer-based support systems to aid in
of screens and reports provided. Each system entire decision-making process. Decision support
focuses on individual areas of concern, and each systems (DSS) are software systems that utilize
may have its own format under separate security sophisticated algorithmic approaches to solve
access. Timliness of the resulting information problems. Within the DSS, the data processor
may vary based on the specific system execution (i.e. the database management system) controls
and the data that it uses. These reports frequently the access and update of data from external files
take the form of an endless stream of computer and datasources. The modelbase contains the spe-
print-outs or online reports, which the executive cific analytical methods used for processing the
has little or no time to review. There is a limited accessed data. Although decision support systems
capability of providing summarized levels of were originally intended to serve the needs of up-
information, in an appropriate format, for higher per management, they became to tools of analysts
levels of management. Even when the reams of and lower-level managers. A further evolution was
data are condensed and summarized, relevant needed to better meet executive needs. As noted
information is frequently difficult to extract or in Figure 1, the integration of DSS capabilities
understand. Too often decisions were a reaction within the MRS framework led to the emergence
to an event that has already occurred. of the true executive information system.
Briefing books, sometimes referred to as man-
agement reporting systems (MRS), were an early
Figure 1. Executive information system archi-
effort to address these problems by automating
tecture
data acquisition from a wide variety of corporate
systems and databases, and providing online output
in the form of fixed-format reports (e.g. Laudon
and Laudon, 1998). The purpose of a MRS was
to integrate, select, and reduce raw data to valu-
able information; create and distribute finished
quality reports and charts; and to ensure reporting
of consistent information across the corporation.
Management reporting systems tended to be MIS-
based transaction systems linked to a presentation
manager interface. These levels represent the ma-
jor functional components of the MRS, where the
transaction system tracks the status of operations
and reports performance relative to plan based on
237
An Overview of Executive Information Systems
Insertion of the DSS level into this framework manufacturing companies also shared these same
provides a means whereby users can better de- requirements. Perhaps the most important aspect
velop their plans, specify what activities should is that an EIS must meet the information needs
take place, and better organize the operational of the executive user. Determining precisely what
information for executive inquiry. For example, information should be included in the system
Turban and Aronson (2002) describe a pharma- continues to be a major topic of research in this
ceutical company’s product managers utilizing area (e.g. Rainer and Watson, 1995; Walstrom
an EIS-based DSS module to predict the end-of- and Wilson, 1997).
month order status. Similarly, the commercially- The literature particularly notes executives’
available DecisionWeb EIS software provides reliance on critical success factors (CSFs). Criti-
ad-hoc analysis for determining trends and vari- cal success factors consist of a relatively small
ances. As noted in Figure 1, this DSS integration number of easily identified operational goals that
may be executed either by using the presentation are believed to ensure the success of an organiza-
manager as a selection interface, or automatic tion. These CSFs may be derived by the industry,
access from the source database(s). The results the specific firm, the manager, and the broader
of the DSS analysis are then formatted through business environment. For example, McLeod and
the presentation manager for display to the user. Schell (2001) identify “styling, an efficient dealer
Although, DSS and EIS capabilities were initially network, and tight control of manufacturing cost”
considered to be separate and distinct, as reported as critical success factors within the automobile
in the literature, Alter (2002) noted an accelerating industry (P. 332). Rockart and Treacy (1982)
trend during the 1990s towards their integration. argued that the information requirements of an or-
This is frequently expressed through the use of a ganization, and particularly of that organization’s
spreadsheet facility. executives, are shaped by these critical success
factors. The CSFs then determine a smaller data
executive requirements set on which resulting information systems can
focus to best meet the executives’ requirements.
Considerable research has been conducted on the The EIS is subsequently utilized to monitor
informational needs and decision making pro- each of the CSFs according to five categories of
cesses used by executives. Watson et al. (1993) information (Turban and Aronson, 2001). Key
provided a comprehensive survey of the available problem narratives are reports that highlight
research at that time. Executives’ busy schedules overall performance, major problems, and the
preclude either long training sessions or long un- potential underlying reasons for these problems.
interrupted time for system use. Systems must be Associated narrative explanations are often linked
intuitive and easy to use, with very quick response. to supporting tables and graphs. Highlight charts
They must allow “environmental scanning” by display summary information based on the user’s
accessing and integrates a broad range of inter- indicated perspective and judgment. Since they
nal and external data, and support management are personalized to the user’s concerns, they visu-
by exception by highlighting potential problems ally highlight the performance status of priority
and tracking critical data. The EIS should store areas versus respective CSFs. Key factors provide
aggregated data for rapid access, efficiently index specific measures of CSFs, referred to as key per-
and retrieve information, and sort screen data ac- formance indicators (KPIs). These corporate-level
cording to user defined criteria. Although earlier displays usually employ management by excep-
research focused on large corporations, Walters tion to investigate measures of CSFs identified as
et al. (2003) confirmed that executives in smaller problems, or potential problems, on the highlight
238
An Overview of Executive Information Systems
chart. Typical key performance indicators include pictorial menus that can be learned intuitively,
profitability measures, financial ratios, turnover with variances and exceptions highlighted in
rate, sales growth, market share, and demographic color” (p. 611). Users frequently access data and
data. Detailed KPI responsibility reports indicate make selections via touch screen, keyboard, or
the detailed performance of or business areas criti- mouse. Navigation to deeper levels of detail may
cal to the success of the organization. be conducted based on their own selections, or by
following pre-defined paths. The screen displays
Functionality frequently incorporate management by exception
by comparing the planned (or budgeted) perfor-
Consistent with these defined executive user mance with the actual performance of an operation.
requirements, an EIS promotes a proactive an- Accordingly, the executive’s attention is focused
ticipatory style of management by which problem on exceptions to standards. Significant exceptions
indicators are closely monitored based on their (i.e. those beyond a pre-identified threshold) are
CSFs, and timely corrective action implemented automatically identified by the EIS and highlighted
prior to serious problem occurrence. This type (or otherwise brought to the executive user’s atten-
of system may be further defined by having the tion. This saves significant time in sifting through
following characteristics: the data for exception conditions.
This last capability allows the pointing and
1. An easy to use and maintainable graphical clicking on a specific data field for which the
user interface. user desires an additional level of detail. As a
2. Integrated capabilities for data access, analy- result, the components of that data field are then
sis, and control. displayed. EIS systems have a top-level menu,
3. Analysis and report generation across mul- often referred to as an “executive dashboard”
tiple data sources. or “executive scorecard” (Liang and Miranda,
4. On-request “drill down” capability to lower 2001). The intent of the dashboard is to provide
levels of detail. a single-screen display of relevant and critical
5. Depiction of organizational critical success business metrics and/or statuses, frequently fea-
factors. turing stoplight indicators. It is configured with a
6. Functionality for decision support, ad-hoc “hotspot” button at the intersection of the report-
queries and what-if analysis. ing categories and the organization identifiers,
7. Sophisticated tools for system navigation. indicating the appropriate status. (See Figure 2.)
8. Data analysis features. Red, yellow, and green lights are indicated based
9. Advanced report generation. on comparison to preset thresholds, where green
10. Access to a variety of external data sources. indicates a nominal condition, yellow indicates a
warning, and red identifies performance outside of
The resulting combination of capabilities the pre-established boundaries. (Some EIS systems
provides a powerful tool for senior management. also provide audio signals to alert the executive
They can navigate through data hierarchies, view to arriving information.) White indicates that no
data from different dimensions, analyze it, and information is currently available. The colors
create reports tailored to their specific informa- thus allow the user to prioritize his actions, and
tional needs. address potential problems requiring immediate
As noted by Laudon and Laudon (1998), most attention. This enables more efficient and effec-
EIS systems provide “colorful presentations and tive decision-making.
239
An Overview of Executive Information Systems
Clicking on any of these stoplights allows drill are able to track data across multiple months.
down to the desired level of reporting, in order to Drill-down capability exists for visibility to even
indicate the source of any problems. (See Figure further levels of detail.
3.) This concept allows users at various manage- An EIS normally includes tools for modeling
rial to see data details relevant to their position and analysis within its DSS layer. These frequently
and viewing responsibility. For example, the include built-in functions for statistical (e.g.
dashboard may provide a set of KPIs (e.g. revenue trending, regression, and Monte Carlo analysis)
forecasts, gross profit, or inventory levels) with and financial models (such as profitability analy-
drill-down capabilities for each KPI monitored sis, marginal utility, and benefit-cost analysis).
(Bose, 2006).Users at lower levels can view Other functions may include goal-seeking (i.e.
data details specific to their individual business specify the values for the output data and the
function, while users at higher levels can view system will determine the required value of the
summaries across multiple functions. All levels input variable) and forecasting models. This may
240
An Overview of Executive Information Systems
be deployed through the use Excel or similar to their position and viewing responsibility. Users
spreadsheet program linkages in order to create at the lowest levels view data details specific to
graphic comparisons (e.g. by time period; by their functional area, while users at higher levels
product: by region; or by price range). Costlier initially view summaries across subordinate or-
systems include more sophisticated specialty ganizations, but can drill-down for visibility to
analysis built-in programs as part of their on-line further levels of detail. There are several strategies
analytical processing (OLAP) capabilities. OLAP in addressing this problem. Some organizations
supports decision-making based on analysis of adopt a multi-level security system utilizing the
multi-dimensional aggregated (i.e. summary) capabilities of an EIS application development
data. Examples of these include Pilot Software’s software. An alternate approach utilizes a multi-
Decision Support Suite, Informix’s MetaCube level, centralized database system to support data
Product Suite, and Cognos’ PowerPlay. To aid in having different classifications and users having
the decision-making process, interactive support different clearances.
functions are normally available which allow
the user to initiate ad hoc queries and “what-if” development Approach
analysis. What-if analysis is a particularly useful
tool for managers, whereby they can project the The EIS can be coded directly using a conventional
effect of modifications to the input data or other programming language, analogous to any deci-
parameters will have on a resulting decision. sion support system. Accepted DSS development
Construction of an EIS implies the need for a methodology identifies four primary phases: data
security system that will control access to sensitive acquisition, system design, system construction,
information. The EIS, its data and software, must and verification and validation. During the data
be protected at all times from unauthorized access. acquisition phase, the key concepts, relationships
Accepted backup and recovery procedures need to and sources are identified. One major purpose of
be incorporated. Additional security features also the general system design phase is to establish
need to be incorporated that will restrict access to the overall definitions and descriptions of the
data and information outside a specific user’s or- proposed system. This is represented through the
ganization and/or subordinate offices. Multi-level development of a requirements definition (RD)
security for data access needs to be established document. Laudon and Laudon (1998) provide
for any EIS that is used by multiple executives. a series of recommended steps for determining
In addition to prohibiting access to the system by EIS requirements:
unauthorized personnel, the security system must
be multi-level in nature, to restrict access within 1. Identify a set of issue-generating critical
a variety of classifications (Moynihan, 1993b). events.
The security system should also be as transparent 2. Obtain, from the executive, his assessment
as possible to the executive user. Multiple levels of the impact of the critical events on his
of user-input passwords should be avoided Most goals and determine a set of critical issues.
senior managers prefer “one-button” access to 3. Determine three to five indicators which can
their systems. Security supports the integrity of the be used to track each critical issue.
data by ensuring that the data cannot be tampered 4. Obtain, from the executive, a list of potential
with, viewed by outside parties, or that the data information sources for the indicators.
cannot be lost. The security feature enforces the 5. Identify exception heuristics for each
drill-down functionality such that users at various indicator.
levels of the organization see data details relevant
241
An Overview of Executive Information Systems
During the subsequent detailed design phase, drill-down. Utilization of a COTS diminishes
the acquired data and candidate mathematical EIS development cost due to the availability of
models is organized within the RD context. This such product-specific data manipulation tools.
may provoke further investigation into support- The literature review indicates that subsequent
ing models and data. A functional system design maintenance costs for a COT-based system would
document is then developed identifying the overall be substantially less than in-house development
system architecture, processing considerations, (e.g. Watson et al., 1993). A variety of such EIS
and definition of displays and reports. The identi- application software shells are now commercially
fied requirements and functionality can be utilized available, which allow customization to individual
for software selection. The general design is then company needs.
“fine-tuned” to map to the capabilities of the soft- Executive information systems tend to be
ware. This step precedes actual programming of unique in that the implementation (and even
the EIS system. Upon completion of the system’s post-implementation) issues often overshadow
construction, a thorough verification and valida- the actual system development. According to
tion is conducted. Traditional software engineering Rockart and Delong (1988), “the fragmented
techniques, i.e., using a set of predetermined tests, nature of executive work, the high degree of
are generally used to verify the integrity of the environmental uncertainty at this level of the
system. The validation process establishes that organization, and the political ramifications of
the system’s functionality addresses the original providing top management with more and bet-
engineering problem and the user’s needs. ter information, as well as other factors, make
Because executive’s needs may change implementing EIS a special challenge” (p. 158).
rapidly, some developers recommend utilizing While data management may not be considered to
prototyping, also referred to as rapid, application be a significant problem when an EIS prototype
development, to develop an EIS. In this approach, is first installed, the practical barriers to provid-
a series of preliminary working versions, each ing executives with the data that they need can
having progressively more functionality, are con- be a major road block post-implementation. As
structed for demonstration and evaluation. Due such, the system developers must contend with
to the executive user’s expectations, developers a number of issues relating to data availability,
must be certain that the system will work before ownership, infrastructure, integrity, integration
demonstrating it to the user. Each stage of the and management (Moynihan, 1993b). Once the
prototype must have an intuitive user interface, EIS application goes online, the data owners
i.e. one that the executive can learn very rapidly. are responsible for insuring the accuracy of the
Alternatively, a commercial off-the-shelf data. If the data are too old, too detailed, or too
(COTS) product can be utilized. While early EIS summary, or simply wrong, the executives may
systems were programmed exclusively using make the wrong decisions. Procedures need to be
internal company resources, by the mid-1980s instituted in order to insure that the appropriate
Comshare and Pilot Software introduced the data are collected on time, refreshed when nec-
first COTS development products (Watson and essary, consolidated where applicable, and made
Carte, 2000). A COTS product is not an EIS per available in the appropriate format. An underlying
se, but rather a set of software tools with which problem with traditional data management is the
to construct an EIS. They generally include the difficulty of integrating data originally designed
capability for constructing standard executive to meet the needs of isolated applications. This
information features, such as picture menus, problem of decentralized development has lead to
icons, hotspots, key performance indicators, and discrepancies in data definitions, data redundancy,
242
An Overview of Executive Information Systems
and synchronization problems. The resulting lack tential for the system is beneficial and should be
of accessible, quality data often limits executive encouraged. However, the introduction of major
access to information, and hinders system main- modifications too early can result in an unforeseen,
tenance (Moynihan, 1993b). yet interrelated, impact elsewhere in the EIS.
Rather than providing direct linkage to Therefore a strict policy should be established as
source data, one approach to EIS construction early as possible, regarding the type and extent of
recommends the establishment of a separate EIS changes that are permitted before implementation,
database. As noted by McNurlin and Sprague and how post-implementation modifications will
(2002), there is concern that the executive would be handled. The subsequent addition of numerous
need too much detailed knowledge to access, in- enhancements can degrade system efficiency.
terpret, and use the raw source data. Instead, the Judgment must be applied in order to balance
desired data should be extracted from these data system capabilities versus response rate. Rapid
sources, formatted and incorporated into the EIS response is considered vital to the executive user.
database. This information should be organized
into a hierarchical fashion such that highlights are
indicated in the top layer. Most raw data sources trAdItIonAl eIs APPlIcAtIons
contain mostly current data, with little historical
context. In order to be able to identify trends, A variety of executive information system appli-
the EIS database needs to incorporate time series cations have been developed for private industry.
data. Further, the executives need to track exter- By necessity, very large corporations were among
nal sources of information. An EIS that accesses the first to realize the advantages that an EIS
internet-based sources gives executives a greatly could provide. One such representative example
improved ability to assess competitive conditions. is Conoco’s EIS (Belcher and Watson, 1993).
Conversely, this access has its limitations; i.e. Senior management was interviewed regarding
internet-based sources may be of questionable ac- their specific needs, and statistics tabulated on
curacy and reliability. Those data definitions that utilization of specific software applications. The
are closely defined and controlled in an EIS, are system was designed and constructed by in-house
not controlled in these external internet sources. staff with a heavy emphasis on the use of financial
This may lead to confusion as outside informa- and refining capacity models. The completed EIS
tion is merged with the well-defined EIS database has continued to grow in usage and capability,
(McNurlin and Sprague, 2002). including 75 decision support applications which
It is also to be noted that, as executive user were used in some form by over 4,000 Conoco
personnel, become familiar with an EIS and its employees throughout the world (Belcher and
capabilities, these users inevitably begin to iden- Watson, 1993). The cited benefits of the sys-
tify new system “requirements”. Sometimes, this tem included increased productivity, improved
occurs before the system is even formally imple- decision-making, and cost savings.
mented. This user community is used to getting its Pratt and Whitney’s Commercial Engine
own way. Despite the flexibility inherent in most Business purchased Commander, a commercial
EIS systems, some of these requests may involve EIS software package from Comshare, to view
modifications well beyond those originally speci- metrics on customer service and jet engine prod-
fied in the design. Some requests are relatively uct performance (Laudon and Laudon 1998).
easy to accommodate, others are not (e.g. those The Commander software shell was customized
requiring the establishment of a new database). to track critical quality and reliability measures
The fact that users are discovering increasing po- (e.g. parts availability, spares inventories, and
243
An Overview of Executive Information Systems
delivery statuses) for each engine model by the were a variety of Program Office and functional
specific customer. As with many such COTS directorate systems. In March 1992, the MSFC
shells, Commander has graphics facilities, ex- Center Director appointed a steering committee
ception reporting/ variance highlighting and an and working group to begin efforts toward a
easy-to-use system navigation capability. The center-wide EIS (Moynihan, 1993a). The resulting
resulting EIS was used to provide drill down system linked existing communication networks
capabilities to determine the reasons for specific to support both Windows-based and MacIntosh-
engine repairs, and where quality improvements based workstations then used at the Center, with the
should be implemented. The system was initially capability to also support a planned UNIX-based
utilized by approximately 25 executives, but was platform. Based on an analysis of MSFC executive
planned for significantly expanded use (Laudon user requirements, the HOLOS EIS application
and Laudon, 1998). Pizza Uno, a food service shell was purchased. HOLOS provided a compre-
chain, similarly employed the Pilot Software hensive set of tools for constructing standard EIS
OLAP-based (Online Analytical Processing) features, such as picture menus, icons, hotspots,
shell to integrate its existing corporate intranets key performance indicators and drill-down. The
(Turban and Aronson, 2001). The resulting EIS software also allowed multi-dimensional mod-
was characterized by a user-friendly graphical eling with associated calculations, statistical
user interface and an ability to conduct multidi- analysis, regression, and financial- and time-based
mensional analyses across different product lines. functions (Moynihan, 1993a).
For example, marketing executives utilized the Watson and Carte (2000) completed a compre-
system to measure the results of test marketing a hensive survey on the use of EISs in the federal
new menu and how it relates to labor and other government environment. Among the organizations
costs (Turban and Aronson, 2001). they cited include the Internal Revenue Service,
A number of EIS systems have also been the Government Printing Office, Department of
applied to the government environment. One of Commerce, Department of Defense, and the Gen-
the first was an EIS developed for the New York eral Services Administration. Liang and Miranda
State Office of General Services beginning in (2001) note that non-federal public sector EIS
1988. With a budget of $500 M and over 4000 applications remain limited but are anticipated to
employees, the agency needed to consolidate and grow. Among the state and city governments they
integrate its data and information on the “design, cite with active EIS development projects are:
construction, and maintenance of state buildings, Utah, Texas, San Francisco, Albuquerque, and
food and laundry services to both correctional Philadelphia. Recently, the State of Minnesota De-
facilities and health-related institutions, statewide partment of Finance has pursued the development
vehicle management, and centralized printing” of an executive information system. The purpose
(Laudon and Laudon, 1998, p. 612). The system of the system is to permit executive users to access
provided conventional EIS capabilities of status pre-defined views of data stored on legacy state
monitoring, comparison of budgets to actuals, information systems. Conventional EIS capabili-
and financial estimates, with drill-down to view ties (e.g. graphical and tabular formats, drill-down,
details in any category. The EIS was fielded on and exception reporting) have been implemented
a set of networked PCs linked to the agency’s in conjunction with Web-based access (Liang and
mainframe computer. Miranda, 2001). Planned development would
Another early public sector system was the increase user flexibility and functionality with the
center-wide EIS for NASA’s Marshall Space ability to develop what-if analyses, cost projections,
Flight Center (MSFC). Prior to this effort, there and scenario sharing/update.
244
An Overview of Executive Information Systems
245
An Overview of Executive Information Systems
(2003) detail a successful implementation at Huck includes this internet support function in its En-
International, Inc. during 1998 and 1999. Huck terprise Software Suite. Vendors are increasingly
purchased the Baan ERP system to replace a legacy beginning to use the term enterprise information
MRPII hosted on HP3000hardware platform at ten system, or “business intelligence” (BI), to reflect
international sites. In addition to the expected per- this emerging role of EIS (Negash and Gray,
sonnel reductions, cost of information processing, 2003). With the advances in data warehousing
better inventory and order control, and improved and Web-networks, the traditional independent
cash management, the capabilities for improved EIS is continuing to evolve into the concept of the
management decision-making were identified and enterprise (or corporate) portal for business intel-
added as an enhancement to the system. ligence purposes. This portal concept is intended
This type of integration serves to better lever- to better integrate internal company applications
age existing ERP capabilities. For this reason, with a variety of external applications available
EIS has begun to transform into an acronym for via the internet.
enterprise information systems. This connotes an Ease of use has always been a primary re-
organization-wide system that provides consistent quirement for executive information systems.
and integrated managerial information from a Traditionally, this has inferred an intuitive graphi-
company point of view. Different users across cal user interface. To further improve the user
the enterprise can utilize the system for different interface, software vendors have begun to provide
purposes, as well as serving the purposes of top capabilities to quickly customize the EIS for the
executives. Increasingly DSS and traditional EIS specific executive user through the inclusion
capabilities are routinely added to commercially- of a toolbox option for analytical and graphical
available ERP software products. In the SAP ERP objects (Turban and Aronson, 2001). This allows
software package, these capabilities are referred easy customization capabilities. Pilot Decision
to as “strategic enterprise management systems” Suite and Comshare’s DecisionWeb provide two
(Turban and Aronson, 2001). examples of this emerging capability.
However, “ease of use” is also beginning to
imply that the system has sufficient intelligence to
Future dIrectIons automate some (if not all) aspects of the process.
Although EISs are effective in monitoring present
As the EIS concept has expanded and adapted to status, they can neither interpret nor explain. This
serve more levels of management utilizing enter- necessitates a combining of EIS functionality with
prise systems and databases, the term executive artificial intelligence capabilities. As these intel-
information system has begun to lose its relevance. ligent EIS system expand, the task of drill-down
Data warehouse products can provide data in will be progressively automated. By querying a
user-friendly, graphics-oriented query systems, “Why” function, the executive will initiate an
consistent with EIS requirements. These data intelligent agent to conduct the drill-down and
warehouses also provide filtered enterprise-wide ascertain the answer. This will depict the logic
data. The traditional linkage of an EIS to multiple stream to locate and evaluate the significance of
subject area databases, or specific applications key indicators influenced the results. Simple trend-
databases, is being replaced by a data warehouse ing or comparisons can already be determined by
interface. Further, information delivery via the such agents, with automatic alerts provided based
corporate internet is evolving into Web-enabled on comparison to a threshold value. Turban and
support systems to better access internet-based Aronson (2001) report on such a deployment of
information. For example, the SAS Institute EIS-based intelligent agents for improved environ-
246
An Overview of Executive Information Systems
mental scanning, i.e. to monitor specific websites mation output. Future applications of intelligent
for relevant news and pricing data. The collected EIS will automatically incorporate explanations,
data will then be routed for quantitative analysis analyses, and forecasts that will further enhance
by DSS components of the EIS. Results will be the executive’s understanding of this output. They
customized for each executive, and communicated will anticipate potential business problems by
as an e-mail alert. examining leading indicators and alerting users to
As an extension of the ESS aspect, it has been future possibilities, as well as suggesting strategies
proposed that linkages be established to groupware and solutions when provided specific constraints.
to facilitate communication among executives to
solve common problems. (Groupware refers to
collaborative software and technologies beyond reFerences
e-mail or videoconferencing. Lotus Notes is a
common example.) Other authors have proposed Alter, S. (2002). Information Systems: Founda-
architectures for distributed intelligent EISs tion of E-Business (4th ed.). Upper Saddle River,
composed of an integrated framework of intel- NJ: Prentice Hall.
ligent agents, expert systems, neural networks Belcher, L. W., & Watson, H. J. (1993). Assessing
and conventional DSS to support the executive the value of Conoco’s EIS. MIS Quarterly, 17(9),
decision-making process. For example, Bose 239–253. doi:10.2307/249770
(2006) discusses such a framework as the basis
for business intelligence-based enterprise perfor- Bose, R. (2006). Understanding management data
mance management. systems for enterprise performance management.
Industrial Management & Data Systems, 106(1),
43–54. doi:10.1108/02635570610640988
conclusIon Laudon, K. C., & Laudon, J. P. (1998). Manage-
ment Information Systems: New Approaches to
Much of the value of executive information sys-
Organization & Technology (5th ed.) Upper Saddle
tems come from their flexibility. Executives are
River, NJ: Prentice Hall.
free to determine the problems that they need to
address, using the system as an extension of their Liang, L. Y., & Miranda, R. (2001). Dashboards
own thinking process. The most apparent benefits and scorecards: executive information systems for
of EIS are their ability to analyze, compare, and the public sector. Government Finance Review,
highlight trends, frequently through the use of 17(6), 14–19.
graphics. EIS becomes a reality when executives
Marteinek, P., & Szikora, B. (2005). Integrated
access vital information, analyze trends with
enterprise resource planning system. In 28th In-
integrated diagnostics, and can model multiple
ternational Seminar on Electronics Technology
alternatives. To be truly successful, the EIS sys-
(pp. 417-421). IEEE.
tem components must require a minimal level of
support, offer a fast development cycle, and are McLeod, R., & Schell, G. (2002). Management
responsive and adaptable to the changing needs Information Systems (8th ed.). Upper Saddle River,
of executives. NJ: Prentice Hall.
The progressive incorporation of EIS capa-
McNurlin, B. C., & Sprague, R. H. (2002). Infor-
bilities, within the enterprise system, reduces the
mation Systems in Practice (5th ed.). Upper Saddle
quantity of data that an executive must filter while
River, NJ: Prentice Hall.
dramatically increasing the quality of the infor-
247
An Overview of Executive Information Systems
Moynihan, G. P. (1993a). Development of an Walters, B. A., Jiang, J. J., & Klein, G. (2003). Stra-
executive information system for Marshall Space tegic information and strategic decision making:
Flight Center. In B.Y. Kang & J.U. Choi (Eds.) the EIS/CEO interface in smaller manufacturing
Proceedings of the Second International Confer- companies. Information & Management, 40(6),
ence of the Decision Sciences Institute, Vol. 2, 487–495. doi:10.1016/S0378-7206(02)00063-0
Managing the Global Economy: A Decision Sci-
Watson, H., Rainer, R. K., & Koh, C. (1993).
ences Perspective (pp. 606-608), Seoul, Korea:
Executive information systems: a framework for
Sungrim Press.
development and a survey of current practices.
Moynihan, G. P. (1993b). An executive informa- MIS Quarterly, 17(3), 13–29. doi:10.2307/249771
tion system: Planning for post-implementation at
Watson, H. J., & Carte, T. A. (2000). Executive
NASA. Journal of Systems Management, 44(7),
information systems in government organizations.
8–31.
Public Productivity and Management Review,
Negash, S., & Gray, P. (2003). Business intelli- 23(3), 371–382. doi:10.2307/3380725
gence. In 9th American Conference on Information
Systems (pp. 3190-3199).
Rainer, R. K., & Watson, H. J. (1995). The keys to key terms And deFInItIons
executive information systems success. Journal of
Management Information Systems, 12(2), 83–98. Critical Success Factors (CSFs): A relatively
small number of easily identified operational
Rockart, J. F., & DeLong, D. W. (1988). Executive goals that are believed to ensure the success of
Support Systems: The Emergence of Top Man- an organization.
agement Computer Use. Homewood, IL: Down Drill Down Capability: EIS capability to
Jones-Irwin. display details of summary-level information by
Rockart, J. F., & Treacy, M. E. (1982). The CEO allowing the pointing and clicking on a specific
goes on-line. Harvard Business Review, 60(1), data field for which the user desires an additional
84–88. level of detail. As a result, the components of that
data field are then displayed
Turban, E., & Aronson, J. (2001). Decision Support Enterprise Information System: The linkage
Systems and Intelligent Systems. Upper Saddle of EIS and ERP to provide an organization-wide
River, NJ: Prentice Hall. system that provides consistent and integrated
Umble, E. J., Haft, R. R., & Umble, M. M. (2003). managerial information from a company point
Enterprise resource planning: implementation of view.
procedures and critical success factors. Euro- Executive Dashboard (also referred to as
pean Journal of Operational Research, 146(2), executive scorecard): Top-level EIS screen that
241–257. doi:10.1016/S0377-2217(02)00547-7 provides a single-screen display of relevant and
critical business metrics and/or statuses.
Walstrom, K. A., & Wilson, R. L. (1997). An ex- Executive Information System (EIS):
amination of executive information system (EIS) Computer-based system designed to support the
users. Information & Management, 32(1), 75–83. informational needs of senior management.
doi:10.1016/S0378-7206(97)00010-4 Executive Support System (ESS): Often
synonymous with executive information system,
it connotes an expansion of basic EIS functional-
248
An Overview of Executive Information Systems
This work was previously published in Handbook of Research on Enterprise Systems, edited by Jatinder N. D. Gupta, Sushil
Sharma and Mohammad A. Rashid, pp. 67-81, copyright 2009 by Information Science Reference (an imprint of IGI Global).
249
250
Chapter 1.18
Making Sense of e-HRM:
Transformation, Technology
and Power Relations
Steve Foster
University of Hertfordshire and NorthgateArinso, UK
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Making Sense of e-HRM
Human Resource Management’), with potentially the term ‘transformation’ itself is problematic,
significant benefits in terms of cost reduction and since it is often mis-used and abused, covering a
improved service levels (Ashton, 2001; CedarCre- range of activities from simple process redesign
stone, 2006). Organisations make a significant through to dramatic change. One definition that
investment of time and resource in implement- seems to capture the general spirit of current usage
ing e-HRM, with more than $1.5bn pa being is “the process of recreating or reinventing the HR
spent in Western Europe on related software and function—such as re-engineering, restructuring,
implementation (Lykkegaard, 2007). At least 91% implementing new systems or a new HR service
of midsize and large US organisations claim to delivery model, outsourcing or co-sourcing—with
be using web based HR technology in some way the specific intent of enhancing HR’s contribution
(Keebler & Rhodes, 2002).As a consultant work- to the business” (Mercer, 2007).
ing in the e-HRM field, the author has observed Although a recent study by the UK’s pro-
that organisations typically choose one of three fessional HR body, the Chartered Institute for
paths when implementing HR technology: Personnel and Development (CIPD, 2006), pro-
vided evidence that organisations are beginning
• Replication: Simply re-creating the to use technology to enable HR transformation,
content and functions of the existing in practice, the main focus of many software
system(s)—this is typically an IT ‘refresh’ implementation projects remains administrative
activity, often because existing technol- efficiency and HR operational cost reduction
ogy becomes non-viable or is simply out rather than strategic, transformational outcomes
of date. There is generally no intention to (Ball, 2001). As Broderick & Boudreau (1992)
restructure HR/Payroll services. note, “most organisational investments in HR
• Enhancement: New systems provide ad- information technology support only a narrow
ditional functionality (such as self-service, range of administrative decisions” (p.9) and the
improved integration and reporting) but author’s own experience suggests that the state-
are intended to have only an evolutionary ment remains largely true. Projects often pursue a
impact on the overall HR service delivery replication or enhancement strategy, implementing
model. basic functionality during the first phase, then fail
• Transformational: Involving a revolu- to capitalise on the full transformative potential
tionary restructuring of HR service de- of the investment in subsequent phases.
livery, including the use of service cen- Research literature typically explains the
tres, outsourcing and business partnering. impact of e-HRM technology on HR transforma-
E-HRM effectively becomes an enabler for tion under three, non-exclusive themes. The first
these new approaches. of these sees technology as creating more time
to be strategic—as HR processes become more
Reddington, Williamson & Withers (2005) efficient, HR functions are able to devote greater
claim that the greatest benefits of e-HRM arise time to strategic matters. For example, Snell,
when transformational outcomes are pursued and Stuebner & Lepak (2002), suggest that e-HRM
clearly, HR technology has a role to play in support- technology enables organisations to become not
ing the transformation effort. As Boroughs, Palmer only cost-efficient, but also strategic and flexible,
and Hunter (2008) observe, “The development shifting the emphasis towards people management
of human resources is bound inextricably to the processes. The introduction of initiatives such as
technology that serves it” (p.3). While HR trans- HR Business Partners, a concept championed by
formation appears to be the Holy Grail of e-HRM, Ulrich (1997), is therefore enabled through the
251
Making Sense of e-HRM
automation of transactional work. Several other transformation, acting as a stimulus for a fresh
writers, including Davenport (1993); Gourley approach to Human Resource practices and new
& Connolly (1996); Hannon et al (1996); Liff employment relationships. Kovach et al (2002)
(1997) and Tyson & Selbie (2004) also refer to conclude that the engagement of line managers
this transitioning theme. Clearly, HR functions in implementing HR technology exposes line
need to devote time to strategic activity—Lawler managers to HR issues and gives them better
& Mohrman (2003) found that successful HR appreciation of HR practices, with significant
functions tend to invest more time in planning, outcomes for HR transformation. The introduction
organisational design and development, career of technology therefore makes a statement about
planning and management development. How- transformational intent and becomes a powerful
ever, we can be sure that the link is co-relational vehicle for driving change.
not causal—simply having more time will not
make the function more strategic, even though
most studies are light on explaining how the e-Hrm And tHe uk
transition will take place. PublIc sector
Another common theme is that transformation
is achieved through the greater use of strategic The UK Public Sector generally has a poor repu-
information, which refocuses the HR function. tation for Human Resource Management, being
While technology has a strong capability for associated with low status, low influence roles
‘Automating’, it also has the capacity for ‘In- and representing an ‘enclave’ in the personnel
formating’ (a term first used by Zuboff in 1988), profession (Lupton & Shaw, 2001). While some
where informating refers to generating new research (Kelly & Gennard, 1996) found that some
forms of information to empower managers and Personnel1 Directors have developed a strategic
provide data that HR specialists can strategically role in managing the consequences of government
act upon. Othman (2003) for example, refers to changes, in others, the HR role has declined, as
the ‘informated workplace’. Lawler & Mohrman industrial relations issues have seemingly become
(2003) found that the greater use of information less critical. Evidence seems to support the idea
technology may be associated with HR being that the HR function in the public sector is rela-
more of a business partner, arguing that “..it is tively immature and less sophisticated than its
much easier for HR to gather strategic data and private sector counterparts (Harris, 2002).
analyze them in ways that can contribute to form- As a result of the Gershon Report (Gershon,
ing and implementing business strategy” (p.21). 2004), there has been pressure on the UK Public
At its boldest, technology provides opportunities Sector to become more efficient, by reducing over-
for virtual and networked organisations, linking staffing and inefficiency. Transformation of the
e-learning to knowledge management and the HR function has therefore become a key priority
potential for new HR business models. in recent years, awakening an interest in technol-
A third theme is the symbolic nature of ogy. Although e-HRM has been widely used by
technology. Kossek et al. (1994) have noted the private sector over recent years, many public
the role of technology in strategic positioning, sector organisations are now embarking on a pro-
that can “practically and symbolically represent gramme of investment in e-HRM as part of their
the transformation of Human Resources into a transformation strategy, providing an excellent
strategic business partner” (p.137). Likewise, research platform for investigating perceptions
Tansley, Newell & Williams (2001) contend that of technology, its role and the approaches taken
technology plays a critical part in driving HR towards implementation.
252
Making Sense of e-HRM
tHe e-Hrm lAndscAPe tion and are aimed at reducing costs and achieving
HR operational efficiencies through automation.
One barrier to greater understanding of HR The second group, shown in the upper half, are
technology is that a multiplicity of terminology ‘Human Capital’ functions, aimed at supporting
is used—HRIS, HRMS, web portals, e-HR and, people management activities such as performance
of course, e-HRM, all of which serve to confuse management, skills profiling and analytics. Be-
potential users. However, for the purposes of this cause of the wider impact on business outcomes,
chapter, the term ‘e-HRM’ will refer to a fully these functions are more strategically oriented.
integrated, organisation-wide electronic network It has been suggested elsewhere (Foster, 2006)
of HR related data, information, services, data- that the term ‘e-Human Capital Management’, or
bases, tools, applications and transactions, best ‘e-HCM’ should be used to describe these more
summarised as: sophisticated applications of HR technology.
This model, developed by the author, has
The application of any technology enabling man- proved to be highly useful as a strategic planning
agers and employees to have direct access to HR tool to demonstrate the ‘art of the possible’. In
and other workplace services for communication, reality, the impact of HR technology is likely to be
performance reporting, team management, knowl- some combination of process and human capital
edge management and learning…in addition to functions, analysis of which is beyond this chapter.
administrative applications. (Watson-Wyatt, 2002) However, the breadth of literature on these themes
is rich enough to suggest that definitions of e-HRM
Functionality may be categorised into two which focus only on operational or administrative
areas, each of which has different but significant outcomes are likely to be inadequate.
transformational potential. The first of these (Pro- While organisations are becoming more so-
cess Technology—lower half) provides support phisticated and ambitious in their use of e-HRM,
for basic transactions, now well-established and many HR professionals and line managers con-
the foundation of all commercial HR technology. tinue to lack a clear knowledge of its transforma-
These functions include managing payroll, per- tive effect. For some, technology is seen as little
sonal / organisational data and routine administra- more than an ‘electronic filing cabinet’, a basic
253
Making Sense of e-HRM
repository of data, with little understanding of its labelling and categorising to stabilise the stream-
potential for enabling change. As we have seen ing of experience, connecting the abstract with
from the e-HRM landscape model (Figure 1), there the concrete”. This idea of creating ‘order out of
is now a bewildering choice of functionality avail- chaos’ will be familiar to anyone who has been
able, either as a module in a company-wide ERP involved in a technology project, where goals are
solution, as standalone ‘best-of-breed’ software or discovered through social processes involving
as a series of modules in traditional HR software. argument and debate (Daft, 1986).
Arguably, e-HRM technology is advancing faster If we accept that the use of e-HRM is funda-
than many organisations are able to comprehend mental to HR transformation, then being able to
and implement what is available, raising ques- comprehend, plan for and ultimately implement
tions about how organisations make sense of what e-HRM becomes a core organisational capability,
technology can offer. This has critical implications not just for HR teams, but for all business lead-
for the approach to e-HRM. ers. Various explanations are available as to why
organisations differ in their ability to make sense
of e-HRM. One useful concept here is the idea of
mAkInG sense oF e-Hrm ‘absorptive capacity’. Zahra and George (2002),
adopting the earlier work of Cohen and Leventhal
The concept of sense-making has its roots in the (1990), define absorptive capacity as the acquisi-
personal construct theories of Kelly (1955), which tion, assimilation, transformation and exploitation
see our understanding of the world as a social pro- of knowledge to produce a new organisational
cess. Organisations are essentially a collection of capability. Those with higher absorptive capacity
people trying to make sense of what is happening (i.e. those better able to make sense of its potential)
around them through interpretations, translating will naturally be better able to exploit technology2.
events, developing models for understanding and Likewise, group learning processes may also be
assembling conceptual schemes—mapping out seen as important mechanisms in understanding
their world to create an intelligible whole (Daft & and developing technological knowledge. Bonda-
Weick, 1984). E-HRM takes place exclusively in rouk (2006) argues that acceptance of technology
an organizational setting, with technologies that is related to group learning processes, which can
are often new and unfamiliar. In order to interact only be achieved through complex interactions.
with technology, people first have to make sense Using Kolb’s (1984) learning theory, Bondarouk
of it; in this sense-making process, users develop describes a 5 step action-oriented group learning
assumptions, expectations and knowledge of the approach where individuals start to use technol-
technology, which then serve to shape subse- ogy in a haphazard way and gradually, through
quent actions toward it. These perceptions have shared understanding, mutual adjustment occurs
a powerful influence on expectations—Ginzberg in which the use of technology is agreed.
(1981) showed how users’ expectations of tech-
nology influenced their perceptions of it and how
cognitive and ‘micro-level processes’ became tecHnoloGIcAl FrAmes
important to understanding these perceptions. The
mental models formed when exploring technol- Orlikowski & Gash (1994) argue that the concept
ogy are important sense-making devices during of ‘technological frames’ offers a useful analytic
processes of organizational change (Bartunek perspective for explaining and anticipating actions
& Moch, 1987). As Weick (2005 p.411) states and meaning. Frames are related to sense-making
“sense-making starts with chaos and involves and personal constructs, being cognitive structures
254
Making Sense of e-HRM
or mental models that are held by individuals, reference between stakeholders shape the plan-
typically operating in the background with both ning and development of e-HRM, both before
facilitating and constraining effects. These indi- and during implementation. It suggests that this
vidual frames of reference have been described understanding is critical to an organisation’s ability
as “a built-up repertoire of tacit knowledge that to plan for and ultimately deliver HR transforma-
is used to impose structure upon, and impart tion. If stakeholders are unable to make sense
meaning to, otherwise ambiguous social and of technology and agree common (congruent)
situational information to facilitate understand- technological frames, as a minimum there will
ing” (Gioia, 1986 p.56). They have a powerful be issues of resistance and potentially significant
effect on people’s assumptions, expectations and barriers to progressing beyond administration
knowledge about the purpose, context, importance towards transformational HR.
and role of technology. Frames can be both posi-
tive and negative—where they are positive, there
is shared understanding and mutuality, whereas reseArcH metHodoloGy
negative frames can become “psychic prisons”
that inhibit learning because people “cannot Approach
look at old problems in a new light and attack
old challenges with different and more powerful The underlying methodology of the research is
tools—they cannot reframe” (1991 p.4).E-HRM based on the formative work on grounded theory
implementation projects are often intensely po- by Glaser & Strauss (1967). Grounded theory is an
litical in nature, due to the challenges associated inductive approach to theory development that at-
with the cost of investment and the changes to tempts to account for observed behaviour through
ways of working that are involved. Strong frame a series of theoretical propositions. In this case,
congruence may therefore be seen as a critical the focus is on how organisations make sense of
pre-requisite of project success and where frame e-HRM, its use as a transformational tool, how it
incongruence exists, difficulties and conflict may is perceived by HR and line managers and how
arise. Orlikowski & Gash (1994), researching the those perceptions are manifested through to final
introduction of Lotus Notes into a consultancy implementation and use.
organisation, found that three ‘domains’ charac-
terised interpretations of technology: research sample & Approach
• Technology in use: People’s understand- Several methods were used to collect data, the
ing of how the technology will be used on primary method being a series of semi-structured
a day-to-day basis. interviews. Research also included documentary
• Nature of technology: People’s images of analysis, workshops, participatory observation
the technology and their understanding of and the maintenance of a reflective diary. Inter-
its capabilities and functionality. views were aimed at obtaining an insight into
• Technology strategy: Their understand- the sense-making processes of human resource
ing of why the organisation acquired and professionals and line managers with regard to
implemented the technology. the use of e-HRM technology. Participants were
drawn from public sector organisations at dif-
The current research is aimed at exploring ferent stages of their implementation of e-HRM
how various organisational actors make sense of technology, a mix of consultancy clients of the
e-HRM by examining how the various frames of author or obtained via direct approaches through
255
Making Sense of e-HRM
networking at conferences, events etc. Participants Theme 1: Risk-averse, bureaucratic and under-
either used, or expected to use, a range of software valued—An HR function under pressure.
products to meet their e-HRM needs. Some initial It was no surprise to find that interviews sup-
screening was performed against participants to ported the stereotypical idea of a public sector HR
understand the current stage of their project and function, struggling to establish a credible repu-
whether reasonable access could be granted. The tation and highly concerned with demonstrating
organisations participating were: value. The HR functions studied were typically
working under great pressure, with sub-optimal
• 6 Local Councils (with extended access to resources, often failing to deliver a good service.
one Council) Line managers were especially critical of the
• 1 regional police constabulary quality of HR service delivered:They don’t give a
• 2 Government agencies s**t [Council, Line Manager]And:We get a c**p
• 1 Health Authority service [Council, Line Manager]All too often,
interviews portrayed organisations as highly rule-
To date, 41 interviews have been conducted, bound and bureaucratic. Line managers frequently
including HR professionals, HR Directors and line expressed a concern that the HR function was
managers on an individual basis, plus a series of defensive, risk averse and often uninterested in
group workshop discussions with line managers. strategic people development issues:
Interviews lasted between 45 minutes and 2 hours
and were recorded and transcribed for analysis. We’re probably a bit more slaves to the rules of the
Interviewees were encouraged to engage in a broad- processes here. I think probably we made things
ranging discussion in order to provoke responses, a bit difficult for ourselves in areas—we do tend
rather than the interviewer being a ‘speaking to tie ourselves up in knots and I do think it sets
questionnaire’. Views were invited on the context us back, a different way with more freedom would
of e-HRM, including an insight into what progress be good. [Council, Line Manager]
had been made with technology, concerns relat-
ing to its introduction and their perceptions of the Play it safe, rather than make a decision which
impact of technology. They were also asked about needs to be made. We’re less bold in making deci-
the role of the HR function and the people manage- sions, we’re good at administrative decisions but
ment capability of the organisation. Line manager less bold on big decisions. [Council, HR Manager]
access has proved to be challenging—experience
suggests that HR managers are protective of their HR is much more like a sort of emergency plumber
‘customers’ and initially act as gatekeepers. They service, there to give us help when things go wrong,
are often reluctant to give permission to meet line such as where we have a long-term sickness issue
managers until they have at least been through the or for sorting out the back-office processes like
research process themselves. salaries and sickness. [Council, Line Manager]
256
Making Sense of e-HRM
Strategic means assessing the policies, making That’s part of the culture change, we’ve been
sure the council operates in a consistent way trying to give managers more accountability and
and like any organisation employing people, that trust. It’s been a hard year for the centre, because
people abide by it. [Council, HR Manager] they feel they have to check everything—we said
we’re not going to be checking everything in fu-
One recurring theme was that line managers ture. Some of the managers think everything will
seemed to appreciate the contribution of individual get checked. [Government Agency, HR Manager]
HR people but were dismissive of the function as a
whole. A complex relationship exists between line Although not stated so explicitly, other HR
managers and functional HR staff that is beyond managers expressed an aspiration that improved
this chapter to explore. line management capability may be an additional
Theme 2: Line Managers are perceived as outcome of the e-HRM investment, where tech-
lacking people management capability.A second nology acts as the ‘symbolic’ representation of
major theme was a series of strong concerns about a new way of working (see Tansley, Newell &
the capability of line managers in their people Williams, 2001).
management role. HR managers expressed this
in terms of a frustration with line management’s
need for constant ‘hand-holding’ whenever people tHeory develoPment
management issues arose. A common view was
that: Following the structure proposed by Orlikowski
& Gash (1994), research findings were analysed
Some managers would like HR to come along from the perspective of an interpretative techno-
and take away the people management function. logical frames model using the prototype template
[Council, HR Manager] analysis structure. The three core technological
domains form the basis for comparing differing
I see it time and time again, one recent example views about the use, nature and strategy of technol-
is where a senior manager was in a terrible state, ogy, revealing varying degrees of frame congru-
she had never thought that as part of being a ence and some significant frame incongruence.
manager, she would find herself in an employment Technology in use: People’s understanding of how
tribunal, she didn’t have the skills to manage the the technology will be used on a day-to-day basis.
situation. [Council HR Manager] This domain addresses the operational perception
of e-HRM—that is, how technology is being (or
Won’t face up to their responsibilities, disciplinary will be) used to support HR delivery, particularly
processes can take forever because the managers in administrative areas. Without exception, HR
don’t like disciplining, grasping the nettle and managers were enthusiastic about the automating
dealing with it. [Council Line Manager] impact of e-HRM:
There are some managers for whom it’s impossible, What we’re really hoping in terms of the new
they’re managing huge numbers of people, there computer system we’re introducing is that it will
is legislation which requires them to work within take away some of that pressure, particularly
boundaries, they don’t have the luxury to be good on some of the administrative things which will
people managers. [Council, HR manager] now be done automatically. We are relying very
much on this new system doing that. [Council,
HR Manager]
257
Making Sense of e-HRM
Managers will see the benefits quickly… they’re I think it’s good for processing between the manag-
not stupid, they will see it. There’ll be a bit of ers and HR but I think between the staff and the
work, but a lot of gain. So I’m hoping that there managers it’s cut the tie a little bit [Government
will be a balance and the fact that there is a vast Agency, Line Manager]
amount of information available to them that they
will actually appreciate that overall it is a good I think they want the accountability but they don’t
thing for them. [Council, HR Manager] want to fully own the responsibility that goes with
it. I think managers do kind of want it both ways.
There was an attempt at trying to tell us what the The organisation is saying one thing and allow-
benefits were but I don’t think I’ve reaped those ing another. We have to follow it through, let’s
benefits yet. [Government Agency, Line Manager] say it much firmly, much more clearly. [Council
HR Manager]
We were all trained some time ago, it may be that
I haven’t picked up on some of this. I think it’s I’m not sure [managers] would want too many
quite difficult. [Council, Line Manager] fancy functions because they don’t have very much
freedom to act anyway… more sophisticated tools
I remember leaving the training session and think- wouldn’t be that much use to them. [Council, Line
ing, well that’s another load of extra work for me Manager]
for no perceived benefits. I don’t mind putting extra
effort in if I’m going to get something tangible Although there is a broad level of agreement
at the end of it, and I just thought well here we about the potential of e-HRM for administrative
go, we’ve a great deal more to do. [Government improvements, with high expectations about how
Agency, Line Manager] it will be delivered, there appears to be a mismatch
of views about e-HRM in practice, revealing
There was quite a bit of resentment initially about shortcomings in the way that the new systems
the system and I have to say my team were quite had been implemented.
sympathetic, saying this is going to give you a Nature of Technology: people’s images of the
lot more work and feeling sorry for me and they technology and their understanding of its capa-
were kind. [Government Agency, Line Manager] bilities and functionality.This domain deals with
the overall capabilities and potential of e-HRM
Let’s be honest, however you dress self-service up, and the perceived impact on the roles of HR and
you’re giving them an additional task to do that line managers. HR managers generally held a
they didn’t do before, that work doesn’t actually go highly positive view of e-HRM capabilities, with
away and if you transfer it over you can fool yourself several describing it in terms of a ‘magic bullet’,
into thinking you’ve actually made some efficiency solving a variety of process problems. This is not
savings and you haven’t. [Council, HR Manager] uncommon in IT projects and can lead to highly
unrealistic expectations (Markus & Benjamin,
I always preferred the old system, where once 1997). For example:
a year you get a manual form and confirmed.
This system doesn’t pick up those people who Self-service is going through meteoric develop-
have forgotten or can’t be bothered to tell you ment, isn’t it, in terms of the potential of what it
they’ve moved home whereas it it’s just relying on can do, there’s nothing that we can’t do through
remembering to go in. It all sounds a bit dodgy. self-service. [Council, HR Manager]
[Council, Line Manager]
258
Making Sense of e-HRM
It would be the manager’s friend—basically the With the system now, we can do compliance reports
manager would relate completely to that system on who has done appraisals, who hasn’t, who has
and it would help him or her actually manage recorded absence and who hasn’t, and they are
their staff. It gives them all the information they regular kind of reports… it goes to the Directors,
need, members might say we need to know the it goes to members, they go to the chief executive.
turnover in your area. In future, no matter what [Council HR Manager]
the personnel question is that comes up—I want
the manager to feel confident they can interrogate I don’t think that technology is seen as the tool
the system easily and out it comes in a report. for policing us. Managers can get a breakdown
[Council, HR Manager] of absence and there are lots of reports available
for monitoring so in that sense they are getting
It’s partly about being an enabler, a large percent- something out of the system. Staff may not have
age of the personnel staff are out there profession- cottoned on to that yet but I personally think it’s
ally qualified, and I would like them to be using great that we’ve got the information there and
that as much as possible which means having we can do something about it. [Council, Line
fewer of them and fewer of them passing bits of Manager]
paper, also it’s much more motivating for them.
[Council, HR Manager] It will take us out of the role of chasing manag-
ers, having to police them, instead the system
There were two drivers really, one was definitely should help them and only that small minority of
efficiency to get the cost of the service down and managers that aren’t capable will say the system
the other driver was to get a more modern and is coercing them, that the technology isn’t deliver-
professional service to meet the needs of the ing. [Council, HR Manager]
business. They were the two catalysts of change
really, efficiency and modernising the service. However, interviews revealed major frame
[Government Agency, HR Manager] incongruence with regard to the capabilities and
outcomes of e-HRM; whereas HR managers saw
I think a year ago, some managers would have a step change in their capability, line managers
thought ‘I don’t know what HR does’, but they often did not recognise or acknowledge the trans-
are now trying to use HR technology to link into formational outcomes or where e-HRM might
their systems, their processes which in turn makes change or enhance their line roles.
it better for everybody. [Council, HR Manager] Technology Strategy: People’s understanding
of why the organisation acquired and implemented
We do other things around reporting so that on the the technology.This domain addresses the more
personnel intranet site you can set an alert which strategic aspects of e-HRM and is particularly
tells you for example when the latest turnover relevant to transformational objectives. Unless
figures for your department are available so I’ll actors have a common point of reference and
do a report, put it on the intranet and you get an clear understanding of the transformational effect
alert telling you about it. [Council, HR Manager] of e-HRM, a process-focused strategy is likely,
so strong frame congruence about the strategic
When I ask them what they’ve done about absence, objectives of e-HRM would appear to be a pre-
with this new system, they can’t say they don’t requisite. However, we find very different frames
know. [Government Agency, HR Manager] of reference among the two key stakeholder
groups. Some HR Managers took the view that
259
Making Sense of e-HRM
e-HRM would lead to a ‘time-shift’transformation, The whole system coming has completely changed
where the automation or devolvement of adminis- their perceptions they are now beginning to see the
trative workload would allow the HR function to value of it, to take away the tedious systems and
concentrate on strategic issues. Others saw a more they’ll see it pay back for all the work they’ve put
active, direct transformational impact of e-HRM, in, I see self service as a starting point. [Govern-
where the technology itself would enable higher ment Agency, HR Manager]
levels of managerial capability:
The system won’t make us strategic—because we
Eventually, we want to reduce HR administration, have to believe we are already strategic. [Council,
but also it’s about strategic change, giving line HR Manager]
managers the tools to be more effective, that’s what
it boils down to, putting things online, Personal No, I think that’s rubbish. I think because of the
Development Reviews, sickness etc. we’re giving nature of HR you are driven operationally. I think
you all that technology, they will have to deal the biggest barrier is professionals not having
with it in future. [Police Authority/HR manager] the capability to be strategic and really focusing.
[Council HR Manager]
There is a chain—the technology can drive changes
in the way that managers operate and the way we My feeling is that time will just be swallowed up
recruit—I also get really enthusiastic about this. with day to day work. I’ve never yet seen—and
[Council HR Manager] one of the reasons why I’ve been a bit of a wet
blanket in terms of supporting the system—I’ve
It was always seen as a way of helping manag- never yet seen a successful personnel system and
ers do their job better with better management I’ve seen three. The reason is they all get watered
information, understanding learning and devel- down and Personnel say “we can’t do this” and
opment interventions, looking at their record of managers don’t get engaged and the managers
attendance, all of those things, so it was more say that it does nothing for them. [Council, Line
a tool to do your job but not the end in itself. Manager]
[Government Agency, HR Manager]
I don’t think we’ve thought it through. We know
The other aspect to it is that you’d hope that not we’re going to save some costs, but beyond that
only will it allow us to take out posts across the we don’t really know what to expect. [Council,
organisation, but if set up properly it should allow HR Manager]
mangers to manage their teams in a better way.
[Council Line Manager] One finding of concern was that HR Busi-
ness Partners (those staff directly supporting line
Yes, the good ones use the information or know managers in an internal consultancy role) tended
the information is there and will ask us to get to avoided involvement in e-HRM projects, see-
more involved in professional issues rather than ing little or no relevance to technology beyond
processes. The less good ones will still complain administration. It has been difficult to test this
about having to do personnel work. [Council, technological frame, since several planned in-
HR Manager] terviews with Business Partners were cancelled
at short notice. It may be that this subset of HR
managers underestimates or misunderstands the
potential transformational impact of technology,
260
Making Sense of e-HRM
which would also restrict the scope of transfor- HR system? A poor track record of strategic HR
mation programmes. Attempts will be made to engagement is more likely to lead to a belief that
explore this frame further as research progresses. technology will also be poorly implemented. If
this is true, then an analysis of e-HRM limited
to the three technological domains may provide
AnAlysIs oF FIndInGs an inadequate explanation of sense-making
processes. We must also examine the context in
Interviews reveal that HR managers and line which technology operates, in particular the power
managers have very different views of technol- relations between groups of stakeholders, form-
ogy in terms of its day-to-day use, capability and ing a three-way relationship to technology. This
strategic value. Using the technological frames is consistent with Klein and Kleinman (2002),
model developed by Orlikowski and Gash (ibid.), who argue that power relations play a key role in
we can compare attitudes along the three core the social shaping of technology. As a result, the
technological sense-making domains. Table 1 following proposition is made:
summarizes the key themes from interviews in Context is critical: technological frames are
tabular form against these domains: moderated by the power relations between groups
There is an irony lurking here—while the of actors, in this case, the mutual opinions of HR
HR function regards technology as an enabler of teams and line managers.One particularly reveal-
transformation and a tool to enhance its strategic ing interview with a Local Council Line Manager
impact, if the line managers it serves doubt the highlighted the need for transformational e-HRM
general strategic capability, why should they decisions to be taken in the context of a clear HR
trust HR management to introduce a strategic strategy, by a credible HR function:
STAKEHOLDERS
Domain How HR Managers see e-HRM How Line managers see e-HRM
Technology takes lot of time to get working and needs
an investment from users to get benefits; it’s just one
Managers will understand and use the system and
more thing to learn
Technology in use will intuitively grasp the system
HR is ‘dumping its dirty work’
The manager’s friend: alerts, warnings, guidance
Those with experience feel that that the system doesn’t
help them much
Initially see technology as a way of reducing the Technology should bring about process improvement
cost of HR operations, reduced headcount “These things never work”.
Technology seen as a magic bullet, expert system, Technology not likely to be ‘sold’ to managers prop-
giving them greater control over non-compliant erly.
Nature of technology
managers Assume that better management information will be
Believe that e-HRM will make managers better at delivered
their roles Cynicism that it will lead to meta-regulation from the
Believe e-HRM will produce better HR information centre
Strategic aspiration often limited to administration
and HR services
Desire to make long-term shift in HR function (time Technology is an opportunity (but only one among
shift) many other strategies)
Technology strategy
Doubt that technology will bring about a shift in HR needs to prove its operational capability before
strategic focus they can be trusted to implement technology
Technology is unlikely to impact on professional
HR roles
261
Making Sense of e-HRM
Without a clear vision of where the authority needs frame congruence is with regard to line manager
to be, we’re struggling to fit with HR initiatives, capability—line managers believe their colleagues
it’s still an authority with glib statements about don’t take it seriously and HR managers agree
what it wants to do. If it embeds properly, the in- with this, seeing technology as a means of iden-
formation will be invaluable in helping to develop tifying poor managers. One conclusion from this
a strategic approach, but without the information, is that transformational objectives with regard
no, it will struggle to be any more than something to technology are more likely to be supported
that enhances processes. [Council, Line Manager] and shared where good levels of credibility and
capability are in place.
Table 2 sets out these additional ‘power rela- When viewed in conjunction with the three core
tions’ domains, examining how HR managers technological domains, power relations domains
and line managers see one another. For example, offer a new insight into the context of e-HRM
whereas HR managers are likely to believe that implementation. (see Figure 2)
e-HRM will improve strategic information, line
managers often doubt that the HR function has
the ability to deliver strategic e-HRM and deliver
transformative change. Sadly, one key area of
262
Making Sense of e-HRM
263
Making Sense of e-HRM
Bondarouk, T. V. (2006). Action-oriented group Gioia, D. (1986). The Thinking Organization. San
learning in the implementation of information Francisco, California: Jossey-Bass.
technologies: results from three case studies.
Glaser, B. G., & Strauss, A. L. (1967). The discov-
European Journal of Information Systems, 15,
ery of grounded theory: Strategies for qualitative
42–53. doi:10.1057/palgrave.ejis.3000608
research. New Tork NY: Aldine.
Boroughs, A., Palmer, L., & Hunter, I. (2008). HR
Gourley, S., & Connolly, P. (1996). HRM and com-
Transformation Technology: Delivering Systems
puterised information systems—have we missed
to Support the New HR Model. Aldershot: Gower.
a link? Paper presented at conference—strategic
Broderick, R., & Boudreau, J. W. (1992). Human direction of HRM.
resource management, information technology
Hannon, J., Jelf, G., & Brandes, D. (1996). Human
and the competitive edge. The Executive., Spring,
resource information systems: operational issues
6(2), 7-17.
and strategic considerations in a global environ-
CedarCrestone. (2006). CedarCrestone 2006 Hu- ment. International Journal of Human Resource
man Capital Survey: Cedar Crestone. Management, 7(1).
CIPD. (2006). Technology in HR: How to get the Harris, L. C. (2002). The future for the HRM
most out of technology in people management. function in local government: everything has
Wimbledon: CIPD. changed- but has anything changed? Strategic
Change, 11, 369–378. doi:10.1002/jsc.612
Cohen, W., & Leventhal, D. A. (1990). Absorp-
tive capacity: A new perspective on learning and Keebler, T. J., & Rhodes, D. W. (2002). E-HR
innovation. Administrative Science Quarterly, 35, becoming the ‘path of least resistance’. Employ-
128–152. doi:10.2307/2393553 ment Relations Today, 29(2), 57–66. doi:10.1002/
ert.10041
Daft, R. L. (1986). Organization Theory and
Design (2nd ed.). St. Paul, MN: West. Kelly, G. A. (1955). The Psychology of Personal
Constructs Vol 1 and 2. New York: Norton.
Daft, R. L., & Weick, K. E. (1984). Toward a
model of organizations as interpretation systems. Kelly, & Gennard, J. (1996). The role of Person-
Academy of Management Review, 9(2), 284–295. nel Directors on the board of directors. Personnel
doi:10.2307/258441 Review, 25(1), 7-24.
Davenport, T. H. (1993). Process Innovation. Klein, H. K., & Kleinman, D. (2002). The social
Boston M.A: Harvard Business School Press. construction of technology: structural consider-
ations. Science, Technology & Human Values,
Foster, S. (2006). A high tech future. Payroll Man-
27(1), 28–52.
ager’s Review, November 2006, (pp. 38-40).
Kolb, D. A. (1984). Experiential learning. Experi-
Gershon, P. (2004). Releasing Resources to the
ence as the source of learning and development.
Frontline: Independent Review of Public Sector
Englewood Cliffs, New Jersey: Prentice-Hall.
Efficiency. In H. Treasury (Ed.).
Kossek, E. E., Young, W., Gash, D. C., & Nichol,
Ginzberg, M. J. (1981). Early diagnosis of MIS
V. (1994). Waiting for innovation in the Human
implementation failure: Promising results and un-
Resources Department: Godot implements a
answered questions. Management Science, 27(4),
Human Resource Information System. Human
459–478. doi:10.1287/mnsc.27.4.459
Resource Management, Spring, 33(1), 135-139.
264
Making Sense of e-HRM
Kovach, K., Hughes, A., Fagan, P., & Maggitti, P. Snell, S. A., Stuebner, D., & Lepak, D. P. (2002).
(2002). Administrative and strategic advantages Virtual HR departments: Getting out of the middle.
of HRIS. Employment Relations Today, 29(2), In D. B. G. R. L. Henneman (Ed.), Human Re-
43–48. doi:10.1002/ert.10039 source Management in virtual organisations (pp.
81-101). Greenwich: Information Age Publishing.
Lawler, E. E., & Mohrman, S. (2003). HR as a
strategic partner—what does it take to make it Tansley, C., Newell, S., & Williams, H. (2001).
happen? Human Resource Planning, 26(3), 15–29. Effecting HRM-style practices through an in-
tegrated human resource information system:
Liff, S. (1997). Constructing HR information
An e-greenfield site? Personnel Review, 30(3),
systems. Human Resource Management Jour-
351–370. doi:10.1108/00483480110385870
nal, 7(2), 18–30. doi:10.1111/j.1748-8583.1997.
tb00279.x Tyson, S., & Selbie, D. (2004). People processing
systems and human resource strategy. Interna-
Lupton, B., & Shaw, S. (2001). Are public sector
tional Journal of HR Development and Manage-
personnel managers the profession’s poor rela-
ment, 4(2), 117–127.
tions? Human Resource Management Journal,
11(3), 23–38. doi:10.1111/j.1748-8583.2001. Ulrich, D. (1997). Human Resource Champions:
tb00043.x The Next Agenda for Adding Value and Delivering
Results. Boston MA: Harvard Business School
Lykkegaard, B. (2007). Western European Human
Press.
Capital Management and Payroll Applications
Forecast, 2007-2011: IDC. Watson-Wyatt. (2002). B2E/e-HR Survey Results.
Markus, M. L., & Benjamin, R. I. (1997). The Weick, K., Sutcliffe, K. M., & Obstfeld, D. (2005).
magic bullet theory in IT enabled transformation. Organising and the process of sensemaking. Or-
Sloan Management Review, (Winter): 55–58. ganization Science, 16(4), 409–421. doi:10.1287/
orsc.1050.0133
Mercer. (2007). HR Transformation 2.0: It’s all
about the business. Zahra, S. A., & George, G. (2002). Absorptive
capacity: A review, reconceptualisation and ex-
Orlikowski, W., & Gash, C. (1994). Techno-
tension. Academy of Management Review, 27(2),
logical frames: making sense of information
185–203. doi:10.2307/4134351
technology in organisations. ACM Transac-
tions on Information Systems, 12(2), 174–207. Zuboff, S. (1988). In the age of the smart machine.
doi:10.1145/196734.196745 New York: Basic Books.
Othman, R. (2003). On developing the informated
work place: HRM issues in Malaysia. Human
Resource Management Review, 13, 393–406. key terms And deFInItIons
doi:10.1016/S1053-4822(03)00042-1
e-Human Capital Management (e-HCM):
Reddington, M., Williamson, M., & Withers, Technologies that are specifically focused on
M. (2005). Transforming HR: Creating value supporting the people management aspects of an
through people. Oxford: Elesevier:Butterworth- organisation, providing managers with the tools
Heinemann. to support this activity.
Enterprise Resource Planning: (ERP):
Systems such as SAP and Oracle, covering a
265
Making Sense of e-HRM
wide range of business functions such as Finance, out meaning and assembling conceptual schemes.
Manufacturing, Logistics and Procurement. These These sense-making processes are thought to be
large systems typically have a Human Resources critical in influencing the decisions that are made
module. about e-HRM.
HR Transformation: “The process of rec- Technological Frames: Cognitive structures
reating or reinventing the HR function—such as or mental models that are held by individuals
re-engineering, restructuring, implementing new that impose structure on and provide meaning
systems or a new HR service delivery model, out- for social and situational information to facilitate
sourcing or co-sourcing—with the specific intent understanding. They influence our assumptions,
of enhancing HR’s contribution to the business” expectations, and knowledge and can be positive
(Mercer, 2007). and negative.
Human Capital Technology: Systems or parts
of systems that support the management of people,
such as providing decision support, planning and endnotes
employee data.
Process Technology: Systems or parts of
1
Many UK Public Sector organisations still
systems that re aimed at supporting transactional refer to the Human Resources function as
HR processes such as payroll, personal data man- ‘Personnel’. The significance of this is be-
agement, enrolment etc. yond discussion in this chapter.
Sense Making: People in organisations try
2
I see the concept of absorptive capacity as
to understand what is happening around them analogous to a sponge, that becomes full of
by making interpretations, translating events, water and has no further capacity for ideas
developing models for understanding or bringing until more capacity becomes available.
This work was previously published in Handbook of Research on E-Transformation and Human Resources Management Tech-
nologies: Organizational Outcomes and Challenges, edited by Tanya Bondarouk, Huub Ruel, Karine Guiderdoni-Jourdain and
Ewan Oiry, pp. 1-19, copyright 2009 by Information Science Reference (an imprint of IGI Global).
266
267
Chapter 1.19
Mix, Match, Rediscovery:
A Mashup Experiment of Knowledge
Organization in an Enterprise
Environment
Justin Meza
HP Labs, USA
Qin Zhu
HP Labs, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Mix, Match, Rediscovery
most information-rich infrastructures ever built. During the early stages of Web content integra-
With the advent of Web 2.0, mashups, which are tion, when the Web was still young, developers
combinations of content from different sources, were required to manually collect and hand code
have become a hot topic on the Web, gaining information into an HTML page. In information
increasing popularity. According to Program- services, the service provider may need to put
mableweb.com (http://www.programmableweb. the collected data from various sources into a
com/), there are currently 3.09 unique mashups central place such as a database to do further
being created each day, as programmers, Web data processing, such as data normalization, and
developers, and hobbyists continue to blend data to provide an indexing service. Under Web 2.0,
and services from different sources to produce O’Reilly (2005) points out the Web as platform.
entirely unique sets of content. Mashups use the Web itself as the programming
and content delivery platform. Mashups access
What is a mashup? data or information directly from Web sites and
programmatically create dynamically new Web
A mashup is a Web site or a Web application that sites or Web applications, presenting their data in
combines content from more than one source to a more integrated or useful way. Once the mashup
produce something entirely new (Fichter, 2006). process has been established, it will continue to
Sometimes the sources of the content may not automatically read, process, present, and update
be directly related. The newly created Web site the content and data collected from different
resulting from a mashup may provide something sources for the end user in the form of a Web
new or meaningful compared with the content site. Compared to the early stages of Web content
from each individual source. The word mashup integration, there is nearly no manual interven-
originated in the music industry, where it referred tion at any stage of the process. Similarly, in the
to the mixing and blending of two or more tracks information services field, there has traditionally
of recorded music or instruments in order to cre- never existed a central place to aggregate and
ate an entirely new sound track. The concept of normalize data from different sources.
mashups on the Web is not new. Since the start of To begin creating a mashup, there are three
the Web, people have been gathering information necessary components: content or data sources,
from various sources and mashing it together with a mashup algorithm or process, and a presenta-
HTML code to present it in a newer, more useful tion platform.
form: Web pages. In information services and the
field of knowledge organization, the concept of • Content and data sources:These are the
mashups is not new either. In these fields there foundation of any mashup; the raw objects
has historically been a tradition of information the mashup will work with. Without con-
service providers and knowledge organization tent and data, a mashup has no definition.
vendors working with various sources, such as Content and data may be obtained via APIs,
publishers, to collect publication and citation Web feeds, or screen scraping techniques.
information, combine the collected data, and Recently, many providers have taken steps
provide abstracts and indexing services. From the to make their content and data more read-
creation of abstracts and the population of indices, ily accessible. Some have developed ap-
end users are able to find not only publications plication programming interfaces (APIs)
from a specific source, but also publications from to give developers access to their content
a specific area, by a specific author, and so forth. and data via Web protocols such as REST
(Representational State Transfer) and also
268
Mix, Match, Rediscovery
through Web services. Others provide Web mashup include the reduced overhead and
feeds (simple XML documents for content more seamless user experience. Deploying
syndication) in popular formats such as RSS mashups using a combination of client and
or Atom as a means of accessing their content server techniques allows for the greatest
and data. Through the use of APIs and Web flexibility by melding reduced overhead
feeds, developers are given access to content and interactive user experience on the cli-
and data from the system backend and can ent side with the capability of performing
gather and retrieve this data programmati- complicated data retrieval and manipulation
cally. But not all data sources provide such on the server side.
means of programmatically accessing their • Presentation platform: This is where end
content. To get content from these provid- users will see the finished product of a
ers, a technique known as screen scraping mashup and interact with mashed up con-
must be deployed. Screen scraping is the tent. Often, the presentation platform itself
process of retrieving a raw set of mixed will interact with the end user, execute the
data and extracting and formatting it to a mashup process, and then generate mashed
data structure of the developer’s liking to up content—all in one—as is the case with
eventually be processed and mashed up. a client side mashup.
Comparatively, APIs and Web feeds pro-
vide a more reliable source of information,
as they are provided directly by the data’s mAsHuPs on tHe Web
originator. Screen scraping is more or less
a passive mode of data retrieval, adapting With the rapid growth of mashups on the Internet,
to the layout and content of its source Web most can be classified under the following genres:
site. Most modern Web sites tend to change map mashups, photo and video mashups, search
frequently and employ complicated layouts mashups, and news mashups.
in order to keep up with changing artistic A large number of mashups present today
trends, making screen scraping a difficult are map mashups. This may be due in part to the
process to maintain for any extended amount readily available set of API tools and API access
of time. to online map service providers such as Google
• Mashup algorithm or process: This is Maps, Yahoo Maps, Microsoft Virtual Earth, and
where all the magic happens, and where the AOL MapQuest. These tools make it possible for
mashup gets its name: during this design step, programmers, Web developers, and hobbyists
content and data from different sources are to easily mash up data and content with online
cohesively and seamlessly integrated. The maps. Map mashup developers must first obtain
mashup process may reside on the server or geographic information, such as latitude and lon-
on the client side of a given platform or be a gitude, for their data set and then mash the data
combination of the two. On the server side, up into a customized online map. One example
mashups can be deployed using server side of a large-scale map mashup is HousingMaps.
scripting techniques such as CGI, PHP, ASP, com, which mashes up real estate listings from
and so forth. On the client side, mashups Craigslist with Google Maps. A second example,
can be generated directly from an end user’s Chicagocrime.org, combines data from the Chi-
browser through scripting technologies such cago Police Department’s Citizen ICAM Web site
as JavaScript. Some advantages of deploy- with data from Google Maps.
ing a client side as opposed to a server side
269
Mix, Match, Rediscovery
When Google first launched their Map service, knowledge can be defined as a mix of framed
there existed no API to capture its data. Later, experience, values, contextual information, and
one was added, and other online services soon expert insight that provides a framework for
followed suit. In fact, there exist APIs for a variety evaluating and incorporating new experiences and
of services. Some developers mash up photo APIs information. Wilson (2002) states that knowledge
and video APIs with photo and video information. is what we know. Knowledge involves the mental
Others mash up search APIs or consumer market processes of comprehension, understanding, and
place APIs, news source Web feeds and more. learning that go on in the mind and only in the
Technologies such as RSS and Atom feeds for mind, however much they involve interaction with
news stories make it possible to have personalized the world outside the mind, and interaction with
news content delivered directly to the end user. others. From various definitions of knowledge,
In general, mashups can be put into two distinct basically knowledge means knowing facts and
categories: visual mashups and nonvisual mashups information, and knowing how to do something.
(Merrill, 2006). Visual mashups blend data and Knowledge is gained through past experience,
content from different sources and present it in a such as study or investigation.
graphical interface, producing a tangible result for Knowledge often is embedded in documents
the end user. Though nonvisual mashups may not or repositories and in organizational routines,
be as visually appealing, they can nevertheless be processes, practices, and norms. Knowledge is
used to create an integration point and be further also about meaning in the sense that it is context-
utilized for business process, data integration, and specific (Huber, Davenport, & King, 1998).
content integration. How can knowledge be accessible and usable?
Increasingly, individuals and companies are Knowledge organization addresses this question
realizing the potential for use of mashups on a busi- to some extent.
ness intranet or within an enterprise environment. What is knowledge organization? Knowledge
Indeed, although mashups can be creatively used organization is the management and organization
in an amateur realm by developers and hobbyists, of knowledge in a systematic way in order to sup-
they have distinct benefits for businesses as well, port easier access to and retrieval of knowledge
especially in the areas of business process, data (Hodge, 2000). It also encompasses creating,
integration, and content integration. In this article, sharing, and leveraging knowledge. Knowledge
we will describe our experiment with a mashup organization enables the management of a col-
for knowledge organization under an enterprise lection of materials, information, and documents,
environment. which represent recorded knowledge. It forms a
bridge between the user’s information need and
knowledge and the material in the collection. As the user browses,
knowledge organization searches, and navigates, knowledge organization
guides the user toward discovery. Knowledge
What is knowledge? The Random House Diction- organization also helps to answer questions about
ary of the English Language defines knowledge the scope of a collection (Hodge, 2000).
as “acquaintance with facts, truths, or principles, Knowledge Organization has become a wide
as from study or investigation.” Webster’s New interdisciplinary field. It has been broader than
Collegiate Dictionary defines knowledge as “the Library and Information Science focused. Ac-
fact or condition of knowing something with cording to Hjerland (2003), there are also social
familiarity gained through experience or associa- and intellectual forms of knowledge organiza-
tion.” According to Davenport and Prusak (1998), tion. Social forms of knowledge organization are
270
Mix, Match, Rediscovery
related to professional training, disciplines, and process the information, and exchange the results
social groups. The social perspective includes the with other programs. Thus, it will be a universal
social systems of genres and documents and the linked Web for knowledge exchange. Semantic
social system of knowledge producers, knowl- Web as a structure for programmatically access
edge intermediaries, and knowledge users. The and process will open up the knowledge and work-
social system of documents, genres, and agents ings of human kind to the next level. Potentially,
makes available a very complicated structure of it can assist the evolution of human knowledge.
potential subject access points, which may be From the review of knowledge organization,
used in information retrieval. This reflects what we can see, knowledge organization helps the
Huber et al. (1998) describe about knowledge: it user harvest and share knowledge. And finally,
becomes embedded in organizational norms and knowledge organization assists the reuse and
is context-sensitive. leveraging of knowledge to create new knowl-
Both Hodge (2000) and Hjerland (2003) men- edge and stimulate innovation. By exploring and
tion semantic approaches to knowledge organiza- getting familiar with existing knowledge, people
tion. Hodge (2000) states semantic networks and will have more chances to create new knowledge
ontologies as schemes for knowledge organiza- and innovation. Just like what Koestler (1964)
tion. Hjerland (2003) describes the basic unit in describes: “ uncovers, selects, re-shuffles, com-
knowledge organization is the semantic relation bines, synthesizes already existing facts, ideas,
between two concepts. But how to decide how faculties, skills. The more familiar the parts, the
things are grouped together is not an easy question. more striking the new whole.”
This leads to the points brought up by Wilde
(2006), that in any complex environment, it is our experiment
unlikely that it is possible to design and build one
unified knowledge organization system that will In our experiment, we combined HP Labs techni-
meet all requirements and be used by all people. cal report information with HP’s intranet People
Instead, systems often evolve out of practical Finder, and created a mashup: the Technical Re-
needs. He points out that the constant changes port Contextual Viewer. With this combination,
make it challenging to formalize and organize we were able to put recently published technical
knowledge. It will be hard to redesign the system reports under the lab and departmental organiza-
to better reflect the changes once the knowledge tional structure with a tag cloud section for each
organization system and the underlying formaliza- level of the organizational tree based on keyword
tion get bigger and more complex. He proposes a citing frequency within the technical reports. By
mashup model, loosely coupled distributed system scanning the tag cloud, end users are provided with
architecture, for knowledge organization. He also a sense of recent research and developments in
introduces Semantic Web technologies for shared labs and departments, a novel way of organizing
understanding of the different domains covered by and displaying HP Labs technical reports within
the different components for knowledge organiza- an enterprise environment.
tion. The Semantic Web was first thought up by
Tim Berners-Lee. According to Berners-Lee and motivation
Lassila (2001), for the Semantic Web, computers
can access to structured collections of information Initially, this project was begun out of the desire
and sets of rules to be used for automated reason- to allow easier, and more importantly quicker, ac-
ing. By this, people can create many programs cess to already-available data without the hassle of
to collect Web content from diverse sources, processing that data by hand. To us, this meant at
271
Mix, Match, Rediscovery
the very least providing a larger view of the picture, rectory. It allows employees to search for other
but we extended this goal to include a mechanism employees’ contact information while connected
which allowed our end users to narrow down their to the company intranet. People Finder is a Web
queries by sifting through an already optimized application consisting of a simple text box used for
and established infrastructure: the organizational inputting employee search terms that upon data
tree. Again, like in most mashups, the focus was entry dynamically changes to a list box contain-
on harvesting data which was already available ing possible hits from the Enterprise Directory.
for our use but was just not yet connected in a Bearing an intuitive interface, People Finder can
meaningful way. be accessed only from within the internal Web.
Data within the Enterprise Directory is stored
technical reports and the in LDIF (LDAP Data Interchange Format), which
technical report rss Feed presents entries as a group of labeled attributes
and separates entries with blank lines. To query
HP Labs technical reports are research papers, the database, one needs only perform a simple
reports, and articles published by HP Labs. HTTP call to the address of the database, speci-
They provide a means of letting researchers ac- fying which constraints are to be placed on the
cess various research developments, keep pace query results.
with the progress of research, and collaborate The HP Enterprise Directory is available for
on projects internally. They are high-quality, company-wide use and even has documentation
scholarly research papers. Externally available and source code available for sample queries in
technical reports are recognized and indexed by various languages. These important resources
major information services and search engines, are what made People Finder and our Technical
such as Thomson Scientific, Elsevier, Google, Report Viewer possible.
and so forth. Technical reports are managed by
the technical report publication department, who linking It All together
also provides a technical report RSS feed for re-
cent technical reports. The technical report RSS In any mashup application, it is essential that
feed updates researchers with recently published all forms of data speak harmoniously with one
technical reports and provides an alternative way another; often this requires a translator of sorts
for researchers to keep pace with the progress to ensure all forms of data can interact and work
of their research and to collaborate on various together. This translator most often comes in the
projects internally. form of a programming language. The target pro-
gramming language for a mashup is what takes
the various mixed forms of data and translates
tHe enterPrIse dIrectory them into structures which can be manipulated
within the language.
The HP Enterprise Directory is a large internally In our application, we simply took data from the
stored and managed LDAP (Lightweight Data user pertaining to the scope of data to a view based
Access Protocol) database used to store basic on their input from a Web page form, retrieved,
employee information. This information can later extracted, and organized the RSS feed data, and
be retrieved through simple calls to the database queried the LDAP database, retrieving a dataset
from a desktop application, a Web application, containing entries pertaining to the end user’s
or manually through a browser. People Finder scope. When all the data to be mashed up had been
is the frontend interface to the Enterprise Di- extracted, we identified the overlap between our
272
Mix, Match, Rediscovery
Data
Source A
two datasets: the names of authors. Our LDAP database stored variations of employees’ names,
query returned a list of employee names under a allowing us to have a high rate of success when
particular branch of the organizational structure, locating their corresponding tech reports.
and the HP Labs technical report RSS feed con- In the instance where an author publishes a
tained the relevant technical reports associated technical report under a completely different name
with those names. By selectively displaying only from the forms listed in the Enterprise Directory,
those technical reports from the RSS feed that the Technical Report Viewer degrades gracefully:
corresponded to our LDAP queries, we were able it notifies the end user of the problem and presents
to deliver the desired content to our end users. alternative options for tracking down the requested
Mashups by their very nature must be adaptive information. Disadvantages to using data sources
to their data. While it would be nice to design a without specific APIs include the possibility of
mashup solely with the end task in mind, it’s often on-the-fly format changes. Mashups which are
necessary to meet halfway between what the data tactful enough to anticipate these changes and
present is able to offer and what the designer has degrade gracefully to help the user work through
in mind to accomplish. In our own mashup, extra them instead of merely crashing are the norm in
caution was required when dealing with multiple current technology. Figure 1 is a flow chart il-
forms of the names used as keys to match authors lustrating a high-level mashup description.
in the LDAP database to their corresponding In the figure above, the mashup utility gathers
technical reports in the RSS feed. Sometimes data from two sources, extracts the meaningful
authors will publish works under a different name entries, organizes them so they are easier to work
from that which they use at work. In our case, we with, and finally combines them in some fashion.
were lucky that the Enterprise Directory LDAP Content is then generated for the end user with an
273
Mix, Match, Rediscovery
Figure 2. Sample breadcrumb navigation and gathered LDAP data. Note that all breadcrumb links and
researcher data is generated at page access time through inference and user input.
optional process of allowing users to customize the mat below for easy navigation and traversal; if any
data presented to them by querying a different data of these in turn manage employees, that is noted.
set and running the mashup on the new results. It is important to understand that all information
pertaining to the directory structure is inferred
from the Enterprise Directory and is generated
our mAsHuP: on the fly, making it robust against changes in the
tHe tecHnIcAl rePort organizational structure.
contextuAl vIeWer Then the technical reports for the current scope
are presented with links to their authors and the
Upon navigating to the Technical Report Con- paper’s abstracts (links to the papers themselves
textual Viewer frontend, the user is shown recent can be accessed from their respective abstracts).
technical report information at a lab-wide scope, These are organized with the most recent techni-
the largest view possible. At the top of the ap- cal reports appearing first.
plication are two breadcrumb navigation views
showing a linked trail of where the user has When a user navigates to more specific scopes,
traveled, both from a departmental standpoint a tag cloud appears underneath the technical report
as well as by the names of employees and their listings, featuring in weighted font sized relevant
managers. Breadcrumb navigations show a user keywords from the current abstracts. Clicking on
where they have been and how they got to a page one of the tags presents the user with a view of
by creating a trail of linked words denoting the technical report abstracts containing the chosen
sequential order of page accesses for a single ses- keyword.
sion, and can be especially useful in hierarchically
organized Web sites. keyword tag cloud
Underneath the breadcrumb navigation is the
name and a link to relevant contact information for Tag clouds are a stereotypically classified Web 2.0
the employee where the Technical Report Viewer’s concept, although the notion they encapsulate has
scope is rooted. If the employee manages other been around for a much longer time. The idea of
employees, their names are listed in a tabular for- organizing data in such a manner that the most
Figure 3. Keyword tag clouds provide both an easy-to-see glimpse of trends and links to related data.
274
Mix, Match, Rediscovery
relevant portions are more visually accessible has access information? Second is Web accessibility:
always been a key design focus in many media. Is the tag cloud compliant with Web accessibil-
Tag clouds bring this concept to the digital realm, ity standards? Third is how to calculate the term
and do so in a dynamic fashion. frequency. Fourth is how to set the font size range
Several general paradigms may be presented for different term frequencies: As the frequency
when dealing with meaningful tag clouds. changes, the font size range may need to adjust or
be set to accommodate the increase in frequency.
• Capturing keywords: In our application,
tag cloud keywords were captured by tally- our Findings
ing the number of occurrences of each word
present in all abstracts. The mashup we created solved a specific busi-
• Filtering out noise: Once all possible ness problem: quickly and easily finding recently
keywords have been tallied, meaningless published HP Labs technical reports under a
ones (such as articles and prepositions) must lab and departmental organizational structure,
necessarily be sifted out. and providing a way to quickly scan the topics
• Choosing candidates: After noisy data of technical reports as well. One of the primary
has been filtered out, what remains is the reasons for creating enterprise mashups is to solve
keyword dataset, from which it is necessary a specific business problem. Because there was
to choose the N words with the highest hit already data from People Finder at the intranet
counts. level and data from the technical report publica-
• Formatting the tags: In order to present tions system, there was no need to put data from
the tag cloud information in a meaningful these two sources in a third place. The Technical
way, it is often helpful to scale the words Report Contextual Viewer mashup was built to
relative to their frequency of appearance. combine the data from these two sources. Our
This can often be performed by generating mashup was created for data integration and
an absolute weight for each keyword based content integration, two of the key areas of benefit
on how it ranks with every other keyword for enterprise mashups. The Technical Report
and then normalizing this number with Contextual Viewer mashup is a lightweight in-
respect to how it should appear within the tegration, as it relies on data from People Finder
presentation platform (in most cases, a Web and the technical report RSS feed. There is an
browser). intrinsic serviced dependency. In addition, the
Technical Report Contextual Viewer mashup ex-
The tag cloud provides a unique view of the ists only as an add-on to existing technical report
data encapsulated within technical reports. By data to provide a different view; the mashup will
glancing over the tag cloud, one can easily spot not replace the regular technical report process
the most frequently cited abstract keywords. or delivery of data.
Weighting the font size of keywords gives end Our experiment indicates that creating an
users a sense of recent research and developments enterprise mashup might involve the following
in labs and departments, especially key areas. process: gathering data from different sources,
Tag clouds provide a useful kind of visual identifying the match point or the overlap area
display for information and data. There are a few for mashing up, processing the data and generat-
open-ended questions to consider when generat- ing mashed content, and presenting a generated
ing tag clouds. First is usability: Is the tag cloud a mashed content output, as displayed in the chart
user-friendly feature? Does it help users find and below:
275
Mix, Match, Rediscovery
We also identified some best practices for the • Process data and generate mashed con-
process of creating a mashup, especially within tent: As mentioned in the preceding stage,
an enterprise environment. sometimes you may need to do further data
processing and manipulation. You may need
• Gather data from different sources: There to think about how to leverage the existing
is a huge amount of information on the In- services and interfaces for the data. You
ternet. There is a fair amount of information may consider how to handle the data process
on an intranet as well. During the mashup and where to put the data process, such as
preparation stage, one must analyze the on the client side or on the server side. You
sources available and find out which ones are may think about the scalability for future
mashable, easy to extract data and content growth of the mashup. Another consider-
from, and which ones may need a lot of work ation is keeping the mashup as a lightweight
to retrieve the relevant data. integration. You can lower the overhead of
Remember to keep in mind the motiva- IT and business process by eliminating any
tion for creating a mashup: to solve some unnecessary data processing and integration.
business problem or issue. Narrow your Finally, some internal data may be restricted
scope of data sources to those within or confidential. In that case, you will need to
your enterprise purpose, making the pro- consider how to blend and separate secured
cess of identification of data and content data. Governance and standards will come
more efficient and relevant, and in turn into play. There will be policies on who and
allowing the mashup to most succinctly how to classify data sources, who and how
serve the business process and purpose. can access the data source, and who and
Once a set of sources has been identified, how can build and view mashup products.
the owners of the sources may need to be From technology point of view, some se-
contacted for permission. Even if a service is curity architecture should be deployed and
open for internal use, it might still be a good implemented for user access and resource
idea to notify its owner of its intended use. crawling.
If the service was to change in any way in • Present generated mashed content: Once
the future, its owner might take the initiative you have the mashed up content, you need
to notify the developer of the mashup. For to present the content in a user-friendly
an external service provider such as one on way. If there are existing organization and
the Internet, it is always a good idea to read institution standards, you are well advised to
any applicable license agreements for data follow the standards and make the mashup
access restrictions and API documentation. more professional.
• Identify the match point or the overlap
piece for mashing up: Once the relevant To present the secured data in the mashup,
sets of data have been identified, a common you need to have a mechanism to check the user’s
match point or overlap piece must be found credentials.
to link them together. Sometimes, this match
point might not be obvious or some data
processing might need to be done to enable Future develoPment
one to blend and mix the data to create a
more integrated and seamless mashup. With the further development of mashups, indi-
viduals and companies are increasingly realizing
276
Mix, Match, Rediscovery
the promise and potential use of this technology. age existing knowledge to create new knowledge
Some companies are working on tools to make and stimulate innovation.
it easier to develop mashups, especially for non-
programmers. As mentioned before, enterprise
mashups are primary intended to solve certain reFerences
business problems. As business users and domain
experts understand their needs better than do
programmers, the tool will help them to create Berners-Lee, T., & Lassila, O. (2001, May). The
mashups and instant applications to solve their Semantic Web. Scientific American Magazine,
business problems. More and more mashup tools 284, 34-43.
will be developed and deployed in the enterprise Daveport, T. H., & Prusak, L. (1998). Working
environment. knowledge. Boston: Harvard Business School
As for the role of mashups in the enterprise Press.
environment, we can foresee more innovative and
creative uses of mashups to lower IT infrastructure Fichter, D. (2006). Doing the monster mashup.
Online, 30(4), 48-50.
and business process costs, and to solve business
problems. A number of enterprise mashup use Goodman, E., & Moed, A. (2006). Community in
cases are presented here: A mashup combines mashups: The case of personal geodata. Retrieved
a knowledge system—such as publications, re- August 12, 2007, from http://mashworks.net/im-
ports, and documents—with an expert system ages/5/59/Goodman_Moed_2006.pdf
to create a personalized knowledge system or Gruman, G. (2006). Enterprise mashups.
an expert-based knowledge system. A mashup InfoWorld, 28(31). Retrieved August 12,
interlays publications, reports, and documents 2007, from http://www.infoworld.com/
with organizational structure or project teams to article/06/07/28/31FEmashup_1.html
create an organization portfolio or project port-
Hjerland, B. (2003). Fundamentals of knowledge
folio. A mashup blends sale data with sales staff
organization. Knowledge Organization, 30(2),
information to provide further analysis of the sales
87-111.
force. A mashup mixes sale data with geographic
information and product information to provide Hodge, G. (2000). Systems of knowledge orga-
a view of the market per product and per region, nization for digital libraries: Beyond traditional
helping the company to form and improve its authority files. Washington, DC: The Digital
marketing strategy. A mashup combines supply Library Federation.
requests with business units and product lines to Hof, R. D. (2005, July 25). Mix, match, and mu-
provide further analysis of produce process and tate. Business Week, 3942,72.
production efficiency. The list can go on.
All in all, the mashup is an old concept Huber, G. P., Davenport, T. H., & King, D.
(1998). Some perspectives on organizational
equipped with new technologies under the new
memory. Task Force on Organizational Memory.
Web 2.0 environment. More and more enterprise
In F. Burstein, G. Huber, M. Mandviwalla, J.
mashups will be developed to solve business prob-
Morrison, & L. Olfman (Eds.), Presented at the
lems and help business process. Using mashups to 31st Annual Hawaii International Conference on
organize knowledge will help put knowledge in System Sciences.
context, harvest knowledge, and share knowledge.
Therefore, it will help reuse knowledge and lever- Jhingran, A. (2006). Enterprise information mash-
ups: Integrating information, simply. VLDB’06,
32, 3-4.
277
Mix, Match, Rediscovery
Koestler, A. (1964). The act of creation. London: O’Reilly, T. (2005). What Is Web 2.0? Retrieved
Arkana, Penguin Group. August 12, 2007 from http://www.oreillynet.
com/pub/a/oreilly/tim/news/2005/09/30/what-
Linthicum, D. (2007). Enterprise mashups
is-web-20.html
meet SOA. InfoWorld, 29(8). Retrieved August
12, 2007, from http://www.infoworld.com/ Sage. A. P. (2003). Knowledge management. In
article/07/02/19/08FEsaassoa_1.html Access Science. Retrieved August 12, 2007, from
http://dx.doi.org/10.1036/1097-8542.YB030820
Marks, P. (2006). Mashup Web sites are a dream
come true for hackers. New Scientist, 190(2551), Smiragila, R. P. (2002). The progress of theory in
28-30. knowledge organization. Library Trends, 50(3),
330.
Merrill, D. (2006). Mashups: The new breed
of Web app. Retrieved August 12, 2007 from Wilde, E. (2006). Knowledge organization mash-
http://www-128.ibm.com/developerworks/xml/ ups. Retrieved August 12, 2007 from http://dret.
library/x-mashups.html net/netdret/docs/wilde-tikrep245.pdf
Mou, Y., Zhang. S., & Cao. J. (2004). Providing Wilson, T. (2002). The nonsense of “knowledge
knowledge support in business process: A context management.” Information Research, 8(1). Re-
based approach. In Proceedings of the 2004 IEEE trieved August 12, 2007, from http://informationr.
International Conference on Systems, Man and net/ir/8-1/paper144.html
Cybernetics, (Vol. 3, Issues 10-13, pp. 2143-2149).
O’Brien, D., & Fitzgerald, B. (2006). Mashups,
remixes and copyright law. Internet Law Bulletin,
9(2), 17-19.
This work was previously published in International Journal of Knowledge Management (IJKM), edited by Murray E. Jennex,
pp. 65-76, copyright 2008 by Information Science Reference (an imprint of IGI Global).
278
279
Chapter 1.20
Testing Guidelines for
Developing Quality EAI Projects
S.R.Balasundaram
National Institute of Technology, Tiruchirappalli, India
B.Ramadoss
National Institute of Technology, Tiruchirappalli, India
“The greatest challenge to I/S in every large enter- cess of EAI projects depends on so many param-
prises finding better and simpler ways of making eters, ‘testing’ is the most significant phase that
application systems work together more effectively” can ensure the quality as well as the success of EAI
- Gartner Group projects. Components integrated without testing in
EAI systems may affect the enterprise system as a
whole. This chapter focuses on the testing aspects
AbstrAct related to EAI applications. Especially the signifi-
cance of testing for various types of “Integrations”
The rapidly changing nature of business environ- is discussed in detail.
ments requires organizations to be more flexible
to gain competitive advantages. Organizations are IntroductIon
turning into a new generation of software called
Enterprise Application Integration (EAI) to fully Enterprises across the globe have come to the
integrate business processes. It is an activity that realization that within the increasingly complex
integrates and harmonizes an enterprise’s isolated environment of the business world, there is a funda-
business applications, processes and functions mental need for many varied information platforms
involving real time data. Developing quality EAI to be properly enabled and optimized. To possess
projects is quite a big challenge. Even though suc- the state of the art business processes, enterprises
need to go for devising newer approaches to benefit
DOI: 10.4018/978-1-61520-625-4.ch012 the maximum from the underlying Information
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Testing Guidelines for Developing Quality EAI Projects
Technology (IT) (Kumar & Mota, 2009) world. namely the individual components available in
These approaches are strongly based on various the integrated systems, the types of integrations
types of integrations possible within as well as and the environmental factors supporting these
across the enterprises. Majority of the enterprise integrations.
code deals with different types of integrations. Modern enterprises heavily rely on integrations
Integration does not stop with linking various linking systems and business processes using real
fragments of software products. Rather integration time data. Components integrated without testing
can be defined for databases, hardware, network, in EAI systems may affect the enterprise system
people, standards etc. This in turn will result in as a whole. This in turn may result in revenue loss
the following major benefits: and status degradation in the competitive edge.
To overcome this, testing becomes the mandatory
▪ Cost reduction towards expenses incurred process. Testing is an important activity in soft-
in Technologies, Administrations and ware development applications. It is the process
Operations. of determining whether a system has any error or
▪ Improved customer satisfaction not. When testing is essential for simple applica-
▪ Better and faster business decisions. tions, it becomes the most essential activity for
enterprise applications.
Earlier information systems defined point-to- This chapter focuses on the testing aspects
point interfaces from one application to all other related to EAI applications. Especially the signifi-
applications to share information. Defining these cance of testing for various types of “Integrations”
interfaces and managing them were highly dif- is discussed in detail.
ficult as well as challenging. To overcome these
problems the era of Enterprise Resource Planning
(ERP) came into existence. In general, ERP has erP And eAI
focused on the integration of various internal busi-
ness functions to provide “one-system-fits-all” Enterprise Resource Planning (ERP) systems
solution. The implementation of ERP requires a are more popular software applications that have
substantial amount of time and financial commit- emerged to help business managers to implement
ment (Inmon, 2000). As an alternate, Enterprise their business activities. The aim of ERP systems
Application Integration (EAI) automates the inte- is to integrate all data and processes of an organi-
gration process with less effort than that required zation into a unified system (Polson, 2009; Enter-
with ERP. The strength of any EAI totally lies prise, 2009). Typical ERP system will use multiple
on the levels of integration and their supporting components of computer software and hardware
features. At each and every level of integration to achieve the integration. An ERP system may
care must be taken to see whether the integration combine the functionalities of several subsystems
is possible, feasible and durable. Due to techno- of an enterprise such as Inventory Management
logical, physical and conceptual changes, these System (IMS), Marketing Management System
integrations may weaken the entire system. (MMS), Customer Management System (CMS),
Bringing harmony to the entire system by Financial Accounting System (FAS), Supply Chain
linking various entities of the system (entities Management (SCM) System, etc.
-intra as well as inter) is quite a big challenge in ERP systems have certain limitations in defin-
any EAI development scenario. Also, developing ing the complete business processes. Building ef-
successful EAI projects need lot of care to be fective ERP systems is complex and costly. While
taken related to the correctness of various entities, integrating ERP systems with legacy systems,
280
Testing Guidelines for Developing Quality EAI Projects
building necessary interfaces is a critical task. applications in an enterprise (Lee et.al. 2003;
At this point, various integration solutions were EAI-Enterprise, 2009). Typically, an enterprise
developed leading to Enterprise Application Inte- has existing legacy applications and databases
gration (EAI). As enterprises need to streamline and wants to continue to use them while adding
their processes to be competitive, there is a need or migrating to a new set of applications that
for integrating different information systems to exploit the internet, e-commerce and other new
make information consistent and easily accessible technologies. EAI is an emerging generation of
(Hasselbring, 2000; Laudon & Laudon, 2003). As integration software used to integrate and harmo-
a better and highly extensible step, industries are nize an enterprise’s isolated business applications,
moving towards the next generation integration processes and functions even other ERPs. It pro-
system called EAI. vides common, sharable business applications,
In the mid-1990s, EAI was introduced as an functions and services within as well as across the
alternative or supplemental technique for ERP. EAI enterprise. It is clear that industries are moving
is a business computing term which refers to the towards a new era of business computing from a
plans, methods and tools aimed at modernizing, system of point-to-point integration applications
consolidating, and coordinating the computer to a system of EAI applications (see Figure.1).
281
Testing Guidelines for Developing Quality EAI Projects
Software products such as SAP, Oracle ERP, for all the legacy systems such that all the
PeopleSoft, JDEdwards, Siebel and Clarify would procurement orders would be routed through
work well individually, but possibly would create that.
“information islands”. When changes in data oc-
cur, such changes have to be reflected manually
in the related domains. This is not an efficient ap- Features of eAI Projects
proach. To cater to long term scalability solutions,
EAI paradigm came into existence (Enterprise EAI has always focused on integrating new soft-
Application, 2009). The following are some of ware modules or applications with its existing
the commonly used EAI example scenarios (see systems. Over the past decade, EAI solutions
Figure.2): provide the infrastructure and mechanisms for
extending and integrating both old and new appli-
i. Figure 2.a, represents manufacturing systems cation systems. They also provide the facility for
which are linked with EAI that provides a the internet access of an enterprise’s applications
way to communicate with external systems and help enterprises to share the information and
for sales tracking, demand forecasting, and applications. On one hand, though EAI offers lot
maintaining pricing details. of advantages to the enterprise, on the other hand
ii. Figure 2.b, EAI Seebeyond eGate software it poses technological and business challenges
is used to integrate the various individual (UML, 2009; Gorton et al. 2003).
legacy systems with the SAP-based purchase EAI solutions vary in their underlying ap-
order system. In this scenario, the SAP-based proaches and adopt different terminologies and
purchase order system acts as a data hub concepts. The diversity of the EAI approaches
282
Testing Guidelines for Developing Quality EAI Projects
has made selection of an EAI solution difficult. testing concerned with ‘integrations’ is the focus
Consequently, the more the EAI approaches, the of this chapter.
more the EAI solutions, the harder it is for an en-
terprise to find the most suitable solution Mosawil
et al. (2006). Lot of research activities are already tyPes oF InteGrAtIons
in the streamline to improve the performance of
EAI projects. Much of the research is focused An enterprise system is based on business process-
towards certain prime areas such as data mining es and data (Kumar & Mota, 2009). The designer
and reverse engineering applicable to EAI systems or developer of EAI systems must understand and
[(Davis & Aiken, 2000; Stonebraker & Hellerstein, define clearly the amount of work to be done, the
2001). Also, sufficient literature is available on duration required to complete the activity and the
areas such as common messaging middleware types of integrations available in EAI systems.
(Medvidovic, 2002; Young et al. 2002). Sauer et Mainly, EAI projects are characterized by the
al. (2003) have discussed more on activities related availability of different types of integrations with
to encapsulation and wrapping of legacy systems them. Mosawi et al. (2006) have analyzed and
in a component-based approach. But, there exists identified the following types of integrations in
very little information about research activities EAI. (see Figure.3):
on testing of EAI projects. In this regard, the
concern of this work is to concentrate on levels • Data-level EAI: This is the most common
of testing possible in EAI projects. Especially, integration approach to implement. At this
the work highlights the identification of key ar- level, backend data stores are integrated to
eas where testing activities have to be involved enable the movement of data between them.
by the developers in EAI projects. More to say, This deals with the information extraction
283
Testing Guidelines for Developing Quality EAI Projects
from one database, if needed, processing can form part of the integration Mosawil et
that information and updating the same in al. (2006).
another database (Linthicum, 1999; Ruh et • Presentation level EAI: This approach
al. 2000). This approach provides access to allows creating new user interface by re-
a wide range of data and allows data to be mapping the old presentations Mosawil et
reused across other applications (Mosawil al. (2006).
et al. 2006; Vujasinovic et al. 2006). • Process level EAI: It is also called busi-
• Application Interface Level EAI: This ness method as it involves the flow of in-
refers to defining interfaces contained formation and automation of business sys-
within custom or packaged applications tems (Mosawil et al. 2006; Gerrard, 2007).
such as SAP, PeopleSoft or Baan. These It enables the coordination of decisions
interfaces are leveraged to provide access and the management of the dependencies
to business processes and information. between enterprise processes.
Using these interfaces, developers are able • Internal process level EAI: This ap-
to bring many applications together, allow- proach allows tracking the status of busi-
ing them to share business logic and infor- ness process activities internally Mosawil
mation (Mosawil et al. 2006; Linthicum, et al. (2006).
1999). • Cross-enterprise process level EAI: This
• User Interface-level EAI: This approach approach allows sharing processes among
is based on developing a user interface that multiple Business-2-Business (B2B) cor-
imitates end user actions by using screen porate entities. So it is suitable for B2B ap-
scraping or advanced terminal emulation plication integration Mosawil et al. (2006).
(Linthicum, 1999). It is the most primitive
form of EAI that integrates various appli- Problems related to eAI Projects
cations through the user interfaces. Though
not preferable, this approach is the only According to 2008 Gartner research, the global
way of integrating tasks (Kumar & Mota, revenue for the application infrastructure and
2009; Mosawil et al. 2006). middleware software market totaled more than $14
• Method level EAI: This is a more com- billion in 2007, increasing nearly 13 percent from
plicated form of application-level integra- the previous year. Enterprise service buses and
tion and is used less frequently. It involves business process management suites contributed
approaches to share the business logic to this steadfast growth. Focus on EAI project
available within the enterprise. Operations development has considerably increased in vari-
that are common to several applications ous parts of the globe including North America,
are combined to form a single application Western Europe, Japan and Latin America. On
(Linthicum, 1999; Ruh et al. 2000). the other hand, this growth may be slowed down
• Object-level EAI: It encapsulates the busi- due to several issues such as B2B integration
ness logic and data within objects. This in challenges and availability of varieties of tools
turn allows the objects to be linked togeth- and technologies, complex human factors and
er in a plug and play manner to interop- other environmental factors.
erate. This has the highest level of signifi- Though the positive aspects of EAI projects
cance for the enterprise of heterogeneous make them to be acceptable by industries, no
systems and architectures. Legacy systems doubt there exist certain pitfalls or demerits. As
can be wrapped into objects so that they the market changes and grows, enterprises often
284
Testing Guidelines for Developing Quality EAI Projects
struggle to keep up with the fast pace of innova- There are various forms of testing for dis-
tions (How the future, 2009). There exists a basic covering different types of faults and effects in
phenomenon that EAI projects need to wait for software. Testing may be done by the end-user to
completion of the other streams of work in order evaluate the usability or human-interaction issues
to proceed. This leads to the elongation of time of the software. Performance testing is often done
lines. Dependencies and long durations make EAI to assess the behavior of software under special
projects as large and risky, making them particular usage scenarios such as when the system is un-
targets of budget cuts in a recession (Thought der heavy stress of data loading. Ultimately, the
works, 2008). Early adapters of EAI struggled software must be functionally correct in order for
with new technologies and they lacked established it to serve its designated purpose and be accepted
processes to define the EAI architecture and man- by the user.
age project lifecycles and ongoing operations. In software development phase, planning stage
Though solutions can be provided for the above is applicable for development and testing activi-
said problems, the testing of EAI systems has not ties. A software project test plan is a document
attained much significance. that describes the objectives, scope, approach,
EAI projects also involve integrations of ERP and focus of a software testing effort. The process
projects. The software vendors have their own of preparing a test plan is a useful way to think
methodologies for testing ERP products, but through the efforts needed to validate the accept-
they focus on process flows through configured ability of a software product. The following are
components. The behavior of ERP suites are the elements of test plan:
typically controlled by configuration parameters.
Software maintenance is not involved in them. As • Establish objectives for each test phase
testing ERP systems is a time consuming and cost • Establish schedules for each test activity
involving process, needless to say the same may • Determine the availability of tools and
be expected in EAI systems also. Data migration, resources
the prime component of ERPs, may pose chal- • Establish the standards and procedures to
lenges in EAI also. be used for planning and conducting the
tests
• Reporting test results
soFtWAre testInG • Set the criteria for test completion
• Set the criteria for the success of each test
Software testing is the most important phase in any
software development projects, so that we know testing of eAI Projects
whether the project is going to be successful or it
will fail before it goes live. So software testing is a EAI methodologies are widely accepted in main
process of verifying and validating that a software stream market. But, testing which can define qual-
application works as expected and it meets the ity assurance is the most neglected component
business and technical requirements that guided of EAI (EAI Quality, 2009). It is due to the fact
its design and development. The main purpose that, EAI testing is often delayed until the end of
of testing is to find the presence of faults before the project. There is too little time available for
the customer finds them. Even if testing does not the developers to focus on complete testing of
reveal any fault it still provides confidence in the systems before the delivery of the products. More-
correctness of the program. over, defining testing strategies for EAI projects
285
Testing Guidelines for Developing Quality EAI Projects
are challenging ones and also much expertise is link the entities within the enterprises, internal
needed to define such strategies. For the entire or external or other components of the systems.
life span of EAI systems, not much testing tools Within the enterprise, individual subsystems can
are available. The major hurdle is that testing has be linked. Between enterprises, integrations can be
to be focused on various levels of EAI to provide defined. Business partners, consumers and service
quality systems. providers act as external components which can be
EAI systems are mainly characterized by their integrated with EAI systems. The entire system is
individual enterprises, external components and driven through numerous supporting parameters
the integrations. To provide better deliverables, such as networks, devices, technologies, etc.
the testing scenario of EAI projects should focus
on testing these components namely individual testing Individual enterprises
systems, integrations and the environment (see
Figure.4). Here, Ei represents the individual en- Every enterprise is composed of various sub
terprise. Ai, Bi and Ci are individual subsystems of systems and in turn every sub system has numer-
various enterprises. For example, {A1, A2, A3} may ous components related to data, procedures, user
correspond to {MMS, FMS, CRM}. The colored interfaces, objects etc. Testing must be performed
lines indicate the integrations that are possible to at every stage of defining, building and assembling
286
Testing Guidelines for Developing Quality EAI Projects
these individual components. Every component is presentation, and not at the actual inter-connection
tested as separate unit, in isolation, so that when it between applications and data. Special attention
is integrated to the rest of the system, no faults are has to be given for the verification of handshak-
encountered. Same way, every enterprise system ing mechanisms to ensure the proper message
must be tested on the whole before it is integrated delivery in asynchronous system to guarantee
to any other part of the entire application. delivery of message at the presentation. Business
requirements have to be thoroughly understood to
testing on Integrations verify the transactions across the interface.
In general, interface integration requires a lot
Integrations are the key factors defined in EAI of co-ordination and follow ups to be done by
projects. Testing ‘Complex Integration’ involv- the testers. To reduce the failure of EAI projects,
ing many end systems is difficult but identifying application of interface testing is highly recom-
faults at an early stage than at a later stage is less mended.
expensive. Various challenges and possibilities for
designing testing methodologies for EAI projects Method Level
related to integration levels are discussed as fol-
lows (Sauer et al. 2003; Linthicum, 1999; EAI Consider the ‘Update Product Information’
Quality, 2009; Vengayil, 2009; Linthicum, 2001): method. This method can be accessed from vari-
ous applications and there is no need to rewrite
Data Level each method within the respective application.
Since all applications interact with the integrated
An EAI project allows data to be reused across applications through single front end application,
various applications. This limits the ‘real time’ method-level integration requires the integrated
transactional capabilities. EAI solutions depend applications to support a Remote Procedure Call
on asynchronous messages. This in turn poses new (RPC). Testing must be focused on the integrated
problems (concurrency problems and temporal application API which will break the front appli-
conditions). The development/test team must have cation components and the applications that are
complete knowledge about messaging standards coupled with them.
technologies such as XML, Middleware brokers, Verification of failover mechanisms and re-
TCP/IP etc. covery mechanisms are of more important in case
of integration projects. It is almost impossible in
Interface Level a large integration project to orchestrate end-to-
end tests with application test tools. Performance
Application Interface: An EAI solution may be tests defined earlier in the development phase
expected across multiple languages and platforms. may help to avoid the risks associated though
That is, EAI may exist in a heterogeneous environ- this integrations.
ment. Not much standards available for creating
API level integrations across applications with Object Level
varying languages and protocols.
User Interface: This approach is synchronous This object level integration allows the legacy
in its communication style, and requires the origi- system to be wrapped into objects, and participate
nal application to be online. It cannot be scaled, in the object integration. However, this approach
and thus cannot handle more than a few screen is complex and the most difficult approach. Every
interfaces at a given time. It only takes place at the object must be tested with their semantics when
287
Testing Guidelines for Developing Quality EAI Projects
288
Testing Guidelines for Developing Quality EAI Projects
EAI-Enterprise. (2009). EAI-Enterprise Applica- Lee, J., Siau, K., & Hong, S. (2003). Enterprise inte-
tion Integration – Solutions from iWay software. gration with ERP and EAI. Communications of the
Retrieved April 2009, from http://www.iwaysoft- ACM, 46(2), 54–60. doi:10.1145/606272.606273
ware.com/eai-enterprise-application-integration. Linthicum, D. (1999). Enterprise Application
html Integration. Reading, MA: Addison-Wesley
Enterprise. (2009). Enterprise resource planning. Publications.
Retrieved March 2009, from http://moneyterms. Linthicum, D. (2001). B2B application integra-
co.uk/erp/ tion. Reading, MA: Addison-Wesley Publication.
Enterprise Application. (2009). Enterprise ap- Medvidovic, N. (2002). On the role of middleware
plication integration techniques. Retrieved in architecture-based software development. In
April 2009, from http://www.cs.ucl.ac.uk/staff/ Proceedings of the 14th International Conference
ucacwxe/lectures/3C05-02-03/aswe21-essay.pdf on Software Engineering and Knowledge Engi-
Gerrard, P. (2007). Test methods and tools for neering (SEKE), 299-306, New York, ACM Press.
ERP implementations. Testing: Academic and
Industrial Conference Practice and Research
Techniques – MUTATION, 40-46.
289
Testing Guidelines for Developing Quality EAI Projects
Mosawi1, A. A., Zhao, L., & Macaulay, L. (2006). Young, P., Chaki, N., & Berzins, V. & Luqi. (2003).
A model driven architecture for enterprise applica- Evaluation of middleware architectures in achiev-
tion integration. In Proceedings of the 39th Hawaii ing system interoperability. In Proceedingsof 14th
International Conference on System sciences. IEEE International Workshop on Rapid Systems
Prototyping, 108-116, IEEE.
Polson, J. (2008). Why you should use SAP ERP
System. Retrieved December 2008, from www.
planetarticle.net
key terms And deFInItIons
Quality, E. A. I. (2003). EAI quality assurance
a service oriented architecture. Zetta Works. API: An Application Programming Interface
Retrieved March 2009, from http://hosteddocs. is a set of functions, procedures, methods or
ittoolbox.com/ER102904.pdf classes that an operating system, library or service
Ruh, W., Maginnis, F., & Brown, W. (2000). provides to support requests made by computer
Enterprise Application Integration. New York: programs.
John Wiley &Sons Inc., Publications. Data Mining: It is sorting through data to
identify patterns and establish relationships.
Sauer, L. D., Clay, R. L., & Armstrong, R. (2000). EAI: Enterprise Application Integration is a
Metacomponent architecture for software in- process of data and application integration tech-
teroperability. In Proceedings of International nologies which focuses on linking transactional
Conference on Software Methods and Tools (SMT), applications together, typically in real time.
75-84, IEEE. Encapsulation: It is the inclusion of one thing
Stonebraker, M., & Hellerstein, J. M. (2001). Con- within another thing so that the included thing is
tent integration for E-Business. SIGMOD Record, not apparent.
30(2), 552–560. doi:10.1145/376284.375739 Enterprise: An environment where more than
one computer is used. These computers are joined
Thought works. (2008). Thought works: Reces- by a network.
sion news Cios can use, adding value in uncertain Enterprise System: A system that supports
Times – the Agile and lean Advantage. Retrieved enterprise-wide or cross-functional requirements,
June 2008. rather than a single department or group within
UML. (2009). UML™ for EAI. Retrieved April the organization.
2009, from http://www.omg.org/docs/ad/01-09- ERP: Enterprise Resource Planning systems
17.pdf are more popular software applications that have
emerged to help business managers to implement
Vengayil, P. (2009). Quality assurance in EAI their business activities. The aim of ERP systems
projects. Wipro Technologies. Retrieved March is to integrate all data and processes of an orga-
2009, from http://hosteddocs.ittoolbox.com/ nization into a unified system
PV111805.pdf Integration Testing: Integration testing is
Vujasinovic, M., Marjanovic, Z., & Bussler, C. the phase of software testing in which individual
(2006). Data level application integration. [BPM software modules are combined and tested as a
workshops, Springer Verlag Berlin Heidelberg.]. group. It follows unit testing and precedes system
LNCS, 3812, 390–395. testing.
Legacy Systems: A computer system that has
been in operation for a long time, and whose func-
290
Testing Guidelines for Developing Quality EAI Projects
tions are too essential to be disrupted by upgrading TCP) developed to get data from one network
or integration with another system. device to another.
Message-Oriented Middleware: It is the term Testing: It is the process of determining
for software that connects separate systems in a whether a program has any error or not.
network by carrying and distributing messages Test Bed: An execution environment config-
between them. The messages may contain data, ured for testing. May consist of specific hardware,
software instructions, or both together. operating system, network topology, configura-
Metadata: Metadata is Information about the tion of the product under test, other application
data warehouse or data mart system. Metadata or system software, etc.
encompasses all aspects of the data warehouse Test Case: The specification (usually formal)
or data mart system, including technical, human of a set of test inputs, execution conditions, and
and data resources. expected results, identified for the purpose of
QA: Quality Assurance for short refers to making an evaluation of some particular aspect
planned and systematic production processes that of a Target Test Item.
provide confidence in a product’s suitability for Test Data: The definition (usually formal) of
its intended purpose. a collection of test input values that are consumed
Reverse Engineering: Legally sanctioned during the execution of a test, and expected results
method of copying a technology which begins referenced for comparative purposes.
with an existing product and works backward. Validation: Validation is the process of ensur-
RPC: Remote Procedure Call is a program- ing that a product or a process conforms to defined
ming interface that allows one program to use the user needs, requirements, and/or specifications
services of another program in a remote machine. under defined operating conditions.
The calling program sends a message and data to Verification: In the context of hardware and
the remote program, which is executed, and results software systems, formal verification is the act of
are passed back to the calling program. proving or disproving the correctness of a system
SCM: Supply Chain Management is the man- with respect to a certain formal specification or
agement of a network of interconnected businesses property, using formal methods.
involved in the ultimate provision of product and XML: It stands for eXtensible Markup Lan-
service packages required by end customers. guage. XML is the World Wide Web Consortium’s
TCP/IP: Transmission Control Protocol / (W3C) recommended standard for creating for-
Internet Protocol, a set of protocols (including mats and sharing data on the Web.
This work was previously published in Enterprise Information Systems and Implementing IT Infrastructures: Challenges and
Issues, edited by S. Parthasarathy, pp. 167-179, copyright 2010 by Information Science Reference (an imprint of IGI Global).
291
292
Chapter 1.21
Technology and Human
Resources Management
in Health Care
Stefane M. Kabene
University of Western Ontario, Canada
Lisa King
University of Western Ontario, Canada
Candace J. Gibson
University of Western Ontario, Canada
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Technology and Human Resources Management in Health Care
benefits, quality of work life, and support), their regions; ‘rural developed’ regions are those found
training and development, career progression in Westernized remote locations; ‘urban develop-
and promotion. Human resources planning and ing’ refers to city centers in non-industrialized or
effective human resources management are es- low resource/income countries; and rural areas
sential within a single institution or institutions, of the developing world would be considered to
a local region or even at the national level to meet have an increased level of poverty, poor trans-
organizational objectives, requirements and needs. portation and fewer specialized services and
Within the health care field HRM is focused on organizations to provide health care (Goldsmith
making sure that the right mix of health care pro- et al, 1995). These disparities have been attrib-
viders is in place to meet the health care needs of uted to individual, organizational, and economic
citizens, on adequate recruitment and retention (i.e. issues – the lack of coordinated national health
encouraging more people to enter the health care human resources policies being one (Dussault
field and improving working conditions to retain & Franceschini, 2006). Although not a panacea,
them), and increasingly on new paradigms that ICT presents a tool to both manage and improve
adjust the way in which health professionals are aspects of human resources including satisfaction
educated and practice in interprofessional health and retention of personnel, recruitment, train-
care teams (Kabene et al, 2006). ing, improved working conditions and access to
New information and communication needed information. Telemedicine or telehealth,
technology(ies) (ICT), and the growing use of the utilization of telecommunication technology
computers and the Internet, can address many for delivery of health services at a distance (that
of the information, communication, and training is, for diagnosis, treatment, and patient care, as
issues faced by health professionals and hu- well as training and continuing education), can
man resources managers. HRM itself relies on “provide expert-based health care to understaffed
information systems and information needs. All remote sites and to provide advanced emergency
of the activities in health HR management rely care through modern telecommunication and in-
on the existence of information systems that can formation technologies” (Lin, 1999, p. 28).
provide high-quality data that are timely, accurate, Information technologies encompass any tech-
comparable, accessible and relevant. Priority in- nology which processes and communicates data. It
formation areas for HRM are information on the includes: computers, voice, data and image sensing
demographics of the workforce, their education/ and communications devices, graphics devices,
training, geographical distribution, migration or multi-media storage, et cetera. ICT hardware
non migration-related attrition, and employment or devices include those used for sensing (e.g. bar
practice characteristics (Dussault & Franceschini, code scanners, keyboards, mice), communication
2006; Henderson & Tulloch, 2008; Hongoro & (fax, cellular phones, local or wide area networks
McPake, 2004; Wibulpolprasert & Pengpaibon, (LANs and WANs)), analysis (computers - mi-
2003). The focus of this discussion though relates cros, minis, mainframes), and display (monitors,
to the use of ICT to assist in the training, recruit- printers, voice output, television) and the soft-
ment and retention of health professionals. ware applications (operating systems, end-user
Additionally an unbalanced distribution of applications) needed to provide theses services.
health professionals both within countries (urban In analyzing the HRM literature we have con-
versus rural) and between countries (developed centrated on looking at those areas where informa-
versus developing) has been recognized as a wide- tion technology can reinforce and improve some
spread global problem. In this discussion ‘urban of the resource management issues, e.g. increased
developed’ refers to city centers in Westernized retention of health professionals through improved
293
Technology and Human Resources Management in Health Care
working conditions by providing health informa- The term “information needs” refers to the
tion where and when it is needed, providing clinical knowledge required for health care profession-
guidance and support, improved training and edu- als “to carry out patient care and professional
cational opportunities (both initial training and in duties” (Dorsch, 2000, p. 347). According to
continuing professional education), and improved Westberg and Miller (1998), information needs
geographic distribution by providing support for in clinical practice fall on two axes: formal to
rural physicians and professionals in low income informal and general to specific. An example of
countries in the developing world. This review of formal information is peer reviewed literature
the effects of these telecommunication services from controlled scientific studies. Examples of
and current status and use among health care pro- informal information would be unwritten, common
fessionals highlights and emphasizes HRM’s use practices followed at a clinic. Knowledge that is
of technology in health care and suggests where widely available and applies to several categories
improvements can be made. of patients is general knowledge; while findings
in a patient’s chart, for example, would be local
or specific knowledge.
tHe IntersectIon oF Ict In terms of access to information resources all
And Hrm In HeAltH cAre health professionals can be divided into the fol-
lowing three groups (Dorsch, 2000): the served,
Ict and Hrm Issues in urban- underserved, and the unserved. Common among
developed regions all groups is that information is underused, all
face barriers to optimal information use, and all
The practice of medicine is an information-based, prefer referring to colleagues or personal library
knowledge intensive business. Experienced physi- collections over bibliographical sources for
cians use about two million bits of information to acquiring information. Moreover, “information
manage their patients (Smith, 1996). It is estimated literacy is the ability to recognize the need for
in the US that about a third of a doctor’s time is information; to find, organize, evaluate and use
spent recording and synthesizing information and such information for effective decision making
about a third of hospital costs are spent on personal or problem solving; and to apply these skills to
and professional communications (Smith, 1996). independent, life-long learning” (Sheppard and
With an increasing number of medical journals Mackintosh, 1998, p. 192).
and articles (for example over 14 million citations For both urban and rural health care profes-
and abstracts to articles in over 5,000 life sciences sionals, the primary reasons for seeking infor-
journals appear in PubMed/Medline with about mation are related to patient health care. In the
10,000 to 20,000 added weekly) (MEDLINE – ordinary course of patient care family doctors ask
Fact Sheet, 2007); over 5,000 systematic reviews a number of questions dealing with diagnosis,
in the Cochrane Collaboration library database treatment and management of diseases. The most
(Cochrane Collaboration – http://www.cochrane. frequently asked questions relate to the causes of
org), and over 20,000 prescription drugs (e.g. symptoms, what tests may be indicated, doses of
Health Canada – Drug Product Database - http:// drugs, and how a disease should be managed or
www.hc-sc.gc.ca/dhp-mps/prodpharma/data- treated (Dorsch, 2000; Ely et al, 1999). Answers
basdon/index-eng.php) it is impossible for the to most of these questions (64%), with the ex-
average physician to keep that information “in ception of drug prescribing, are not immediately
their heads” to effectively diagnose, prescribe pursued and for those that are, doctors spent an
and treat patients. average of less than 2 minutes pursuing an answer.
294
Technology and Human Resources Management in Health Care
Their preference for resource material to answer 5. automated inventory systems to track and
these questions was readily available print or text manage pharmaceuticals and other medical
sources and human resources (a nearby colleague) and general hospital supplies;
(Dorsch, 2000; Ely et al, 1999). Few questions 6. computerized provider order entry systems
generated either a computer-based search on the for laboratory tests, diagnostic images, drug
Internet or with a CD-ROM resource. Previous prescribing;
studies have shown that most computer applica- 7. decision support systems that will give
tions were too slow or cumbersome to use at the health care providers real-time advice on
bedside or point of care. diagnosis and treatment options based on
During the next decade, we will undoubtedly continuously updated information and best
see the development and deployment of compre- evidence (Anvari, 2007; Westberg & Miller,
hensive electronic health information systems 1999).
incorporating all aspects of in-hospital and out-
of-hospital care. These systems will allow health Use of new electronic record systems will
providers at all levels and across geographic improve the quality of patient care by streamlin-
distances to access information quickly and share ing processes, reducing duplication of orders and
information, improving both patient care outcomes tests, and minimizing the risk of medical errors,
and operational efficiency. Health information such as administration of the wrong drug or dos-
technologies that are being implemented and age, or even the performance of a wrong surgery.
newly emerging technologies that will have an What makes the HR responsibilities of these
impact on health care, health services delivery evolving technologies more difficult is that there
and HRM include: are as yet no hard-and-fast answers to formulate
best-practice guidelines. For example, identi-
1. electronic lifetime health records (EHR) fication cards with radio frequency identifica-
to store data from many sources (e.g., text tion devices for employees allow employers to
and voice notes, medical images, laboratory better maintain a secure workplace, but privacy
values, patient demographics), with avail- advocates say that employers can (and do) abuse
able access from any locale; RFIDs by tracking employee movements at any
2. mobile computing technologies such as or all times, which may modify potential deviant
hand-held computing devices (or personal employee behaviour (Vilamovska et al, 2009).
digital assistants, PDAs), mobile clinical This technology also has the potential to help
assistants designed for both provision and with health-care applications when used to carry
entry of relevant health information at the an employee’s medical records.
point of care (Adatia & Bedard, 2002; 2003); Case studies suggest that security and public
3. picture archiving and communication sys- safety trump personal privacy; such that securing
tems (PACS) that capture, store and provide the workplace, investigating instances of theft or
access to diagnostic images (X-ray films, misconduct, and accounting for employees after
magnetic resonance images, computed to- emergencies, plus providing effective responses
mography scans) from any location; to medical problems are the priorities favoured
4. radio frequency identification (RFID) sys- in designing and operating the systems that use
tems will use radio waves to wirelessly track RFIDs (Vilamovska et al, 2009). Key human re-
hospital patients, and microchips to carry source issues regarding technology and health care
information on medications, laboratory tests, are the dual responsibilities of supervised access
imaging studies and medical devices; to personnel (and personal) data from a standpoint
295
Technology and Human Resources Management in Health Care
of both database security and medical ethics (i.e. When shifts were open, a nurse manager added
monitored access for quality assurance purposes, the shifts to the website. Qualified staff hospital
outcome assessments and disease surveillance) nurses or other pre-approved independent nurses
(Anvari, 2007). bid on their preferential shifts for the best qualify-
Similarly the benefits of a fully electronic ing rate per hour; perhaps even earning more than
record in improved quality of care – increased sharing fees with an agency. The results showed
adherence to care guidelines, enhanced monitoring that for the St. Peter’s case, everybody benefited.
and surveillance, decreased medication errors and In 2003 the bidding system filled 43,400 of St.
decreased utilization of care may outweigh the Peter’s available shift-hours at an average of $37
risks of breaches of privacy and confidentiality per hour, saving the hospital nearly $750,000 over
particularly when safeguards using the technol- the course of a year (Robinson, 2003). Shift bid-
ogy itself can be built in (e.g. audit trails, levels ding and scheduling systems are now widely used
of authorization and access, consent documenta- to ease staffing shortages and result in decreased
tion) (Chaudry et al, 2006; McGraw et al, 2009). agency use and cost savings, improved employee
The benchmark studies on benefits of ICT exist recruitment and retention, reduced administrative
primarily in academic institutions in urban centres time spent scheduling and improved staffing
that have often implemented internally developed practices that optimize the use of the existing
information systems; whether or not, and when, workforce (Kulma & Springer, 2006).
other institutions with commercially available
software solutions can achieve similar benefits, Ict and Hrm Issues in rural
and at what cost are not clear. developed regions
As technology becomes more pervasive in
urban, developed centres, new found mobility Those health professionals characterized as part
will allow a greater dispersion of medical knowl- of the underserved group are primarily the rural
edge and human capital. HRM will need to adopt health professionals in developed regions. This
technology as a strategy to acquire and retain group faces significant barriers to acquiring
knowledgeable, well trained staff. information, especially when compared to their
Technology can also be used in simple yet urban counterparts (Dorsch, 2000). In this survey
innovative ways to solve human resources prob- of information needs, rural health professionals
lems. One real-life example is the following ranked what they perceived to be major barriers to
story found at St. Peter’s Health Care Services, acquiring information. They included: lack of time,
a hospital in Albany, NY. St. Peter’s typically geographic isolation, lack of a library, technology
filled its nursing requirement shortages by hiring illiteracy, lack of equipment (computers), and cost.
agency-based temporary nurses, each costing the As was found with most health professionals,
hospital approximately $54 per hour. These nurses rural health professionals preferred their col-
were seldom familiar with procedures specific to leagues or personal libraries over bibliographi-
St Peter’s, creating inefficiencies financially and cal sources as information sources; for example
procedurally (Robinson, 2003). To address this 63.1% would discuss a decision with a colleague
problem, human resources management, using before adopting clinical methods, while only 17%
an idea borrowed from Priceline.com and eBay, would search the literature for more information.
put together a team of people from information Moreover, when judging the scientific soundness
technology and patient care services to develop of medical information, 90% compared the find-
the “shift-bidding” system. Two months later, ings to their personal experiences, rather than
the hospital launched “St. Peter’s Jobs Online.” appraising “the findings based on study methodol-
296
Technology and Human Resources Management in Health Care
ogy and statistical significance” (Dorsch, 2000, provides training opportunities for hospital staff
p. 347). The average age of health professionals and employees, and can enhance educational
in rural areas in this study was 46 years old, with experiences for primary care practitioners via
17 years of work experience (compared to the consultations with specialists and/or attendance
average age of urban health professionals of 38 at virtual grand rounds (Curran, 2006). The use
years old with 9 years of work experience). Of of these technologies can alleviate some of the
those who had been in practice for less than ten isolation felt by rural health professionals and
years, 80.6% owned computers equipped with CD- reduce the costs, travel time and staff absences
ROM drives, however, among those who had been associated with attendance at distant continuing
practicing for more than 30 years, the percentage education programs.
of computer ownership was only 32.4% (Dorsch,
2000). Throughout the 1990s, use of electronic Ict and Hrm Issues in urban
information resources among rural health profes- developing regions
sionals remained constant. For instance, 40% used
MEDLINE, 25.6% used CD-ROMs for literature Effective human resource practice is crucial for
searching and 44.9% for accessing medical texts. improving the efficiency of the health care sys-
More than half (52%) also used the CD-ROM for tem in developing countries. Because developing
entertainment (Dorsch, 2000). nations have the heaviest burden of disease, it is
In the field of health care, continuing education even more important to use human resources man-
is essential and necessary for all health profes- agement to increase the overall quality of health
sionals in order to ensure that quality health care care and to balance health workforce deployment
is being provided and that access to the most up- with where it is most needed (i.e. usually in rural
to-date and best medical evidence for practice and communities). It is often more difficult for people
care is available. Since health professionals prefer in developing countries and low income nations
their colleagues as an information source above all to provide effective and efficient health care
else, a better means of facilitating communication than those in industrialized countries due to the
among all health care professionals is needed. failure or inability to provide appropriate social
Due to the barriers specifically cited by rural infrastructure for health care due to limited finan-
health professionals, some technologies may be cial resources and budgets, as well as adequate
more useful than others. Those most useful are funding for training or education of health care
audioconferencing (even simple teleconferenc- workers. For example, of the approximate 8.8
ing), videoconferencing, and CD-ROMs (compact million new tuberculosis (TB) infections in 2005,
disc-read only memory) (Curran, 2006; Sheppard 7.4 million (84%) were concentrated in Asia and
& Mackintosh, 1998). The Internet provides sub-Saharan Africa. Nigeria has the highest TB
networks with access to medical databases and burden in Africa, fifth highest in the world, while
online communities of practice, as well as elec- Kyrgyzstan has the second highest tuberculosis
tronic mail (e-mail) (Coma del Coral et al, 2005; burden in Central Asia, after Kazakhstan (Awof-
Curran, 2006). Studies have also shown that, eso et al, 2008). The main human resource issues
although awareness of telemedicine’s applications affecting effective TB control are insufficient
and capabilities among health professionals in quality, quantity and distribution of health workers
rural areas is minimal, the attitudes towards its (Awofeso et al, 2008).
adoption are favourable (Lin, 1999). The deliv- From 2004 to 2007, “government annual
ery of tele-education programs via ICTs enables budgets for tuberculosis control in Nigeria and
the timely dissemination of new developments, Kyrgyzstan averaged US$ 14 million and US$
297
Technology and Human Resources Management in Health Care
1 million respectively, barely enough for staff better social infrastructure. One important aspect
salaries, let alone training” (Awofeso et al, 2008, that technology can do to enhance the effectiveness
p. 2). Training/retraining programs for tuberculosis of HRM is to provide a broader scope of training.
workers may be used as an incentive to influence Virtual universities, networks of institutions and
distribution patterns; either by preferentially fund- professional associations, international standards
ing applicants from high TB prevalence regions of certification and distance learning give people
or by developing and funding distance learning in developing countries more channels to access
and on-site training programs for workers in these higher education and training. An example of
regions. These can include high tech solutions such a distance learning approach for tuberculosis
through Internet or web-based programs as well control and training of doctors and nurses was
as low tech solutions such as correspondence developed jointly by the International Council of
courses and the use of radio or TV narrow casts Nurses, the International Hospital Federation, and
(Zarocostas, 2008). the World Medical Association in 2006 (Awofeso
According to Henderson and Tulloch (2008), et al, 2008). This provides efficient and high qual-
the main causes of health care labour shortages ity tuberculosis training for health care workers
in low income countries include a lack of effec- internationally at a reduced cost.
tive planning, limited health budgets, limited E-health innovations such as electronic health
employment opportunities, low salaries, poor records, telehealth, health knowledge manage-
working conditions, weak support and supervi- ment, health information systems, and clinical
sion, and limited opportunities for professional databases have brought significant change to
development. HRM in health care in developing countries.
The lack of effective human resource practices First, the globalization of communication and the
also result in recruitment and retention problems, advances in information technology offer unprec-
or even brain drain, which make the shortages edented opportunities to improve public health
of local health care workers even worse. The worldwide. Videoconferences, telecommunica-
high demand for doctors and nurses in Western tion, and professional institution networks give
countries attract health care professionals from health care professionals in developing countries
developing countries to migrate with the promise the opportunity to discuss problems with those
of better working conditions, higher remunera- in industrialized nations, and can also create a
tion, and additional work opportunities for family medical network within their own countries. In
members. From 1985 to 1997, in Ghana, it was Thailand, for example, “the launch of the coun-
estimated that the cumulative average annual try’s first communications satellite allowed for
emigration rate was about 14%, which meant the implementation of a nationwide telemedicine
that half of medical graduates emigrated within network by the Ministry of Public Health, cur-
4.5 years, mainly to the United Kingdom and the rently linking 19 hospitals with health facilities
United States. During the same period, 25% of all over the country” (Dussault & Franceschini,
Thai doctors immigrated to the United States, and 2006, p. 10).
most of them never returned (Wibulpolprasert & Information and communication technology
Pengpaibon, 2003). can also help to address the shortage of health care
Although technology innovation may not bring professionals through international volunteering
as significant change to low income countries as programs. These programs, which are supported
to developed countries, the health care system in by large corporations, can connect with each
developing countries does benefit from this, es- other and contact governments in order to send
pecially in urban areas because of the comparably volunteer health care professionals from devel-
298
Technology and Human Resources Management in Health Care
oped countries to the places where they are most very low (only 38.6% of the population can read
needed. For example, the Pfizer Global Health or write) and little of the national budget is spent
Fellows program sent 72 Pfizer employees to on education (only 2.9%). Although training fa-
work with organizations in 19 countries such as cilities to improve literacy have been attempted
Uganda, Kenya, Ghana, South Africa and India in rural Pakistan, they have largely failed due to
from 2003 to 2005, with a goal of promoting a lack of perception of the populations’ need or a
better health by “improving the service delivery clear strategy of what benefits would be gained.
capacity of local partners in poor countries” (Vian Within the rural community agriculture forms
et al, 2007, p. 2). Many of these fellows imparted the basis of the local economy. An innovative
skills or enhanced operations of non-governmental model proposing the introduction of rural kiosk
organizations in HIV/AIDS and other health pro- machines (RKM) within rural community centres
grams providing training to clinical and research and schools has been proposed to provide text,
personnel; strengthening laboratory, pharmacy, audio and video material on agricultural crops and
financial control, and human resources manage- to provide training to rural farmers in their use..
ment systems; and helped to expand organization Machines will be connected via wireless connec-
networks. Local staff also reported the program tions to a central department for regular updates
changed their work habits and attitudes (Vian et of the information. The kiosks will serve at least
al, 2007). Although transferring volunteer health two purposes, one to provide valuable information
care professionals to low income countries can- to enhance the growth and sustainability of crops
not completely solve the shortage problem, it and two to help raise the literacy levels in rural
does relieve, to some extent in the short term, the communities (Sattar, 2007). This kiosk technol-
human resource burden in developing countries. ogy could be easily adapted to provide health
information to rural communities.
Ict and Hrm Issues in rural Within rural communities shifting of tasks to
developing regions health workers with less training may provide
needed preventive health services, basic treatment
As we’ve seen over and over again, human resourc- services, and serve as a liaison between the com-
es are a crucial part of the health care industry and munity and more highly skilled workers in short
the assurance of the delivery of quality health care supply. Well designed programmes using such
with improved health outcomes; however health community health workers with proper support
professionals remain in critically short supply in and supervision have been successful and may
developing countries, particularly in rural regions even reduce the number of medical consultations
(Hongoro & McPake, 2004). One strategy to ad- and hospitalizations (Dussault & Franceschini,
dress this shortage of human resources is to make 2006). However some professional bodies may
use of the capacity within the developed world by themselves prove an impediment to this potential
the promotion of distance learning opportunities solution of task shifting. It was noted that in rural
or provision of training staff through networks Uganda many rural midwives only supervised one
or twinning of medical schools with developing birth per day, yet there was a very high need for
countries. These efforts may be hampered how- those midwives to be cross-trained as nurses to
ever by the lack of interest or funding or cultural do the regular nursing tasks involved in primary
sensitivity in the developed world. care (Hongoro &McPake, 2004). Although the
General literacy levels within a country may larger problem of providing training to these rural
be a major hurdle in recruitment and training of and often remote areas remained, there was also a
any rural workers. Literacy rates in Pakistan are level of protectionism against such cross-training
299
Technology and Human Resources Management in Health Care
300
Technology and Human Resources Management in Health Care
is applied in a more systematic form, rather than Differences in information needs and prefer-
in the current patchy and uneven implementation. ences do not differ greatly from rural to urban
To date, technological advances such as electronic health professionals, rather, it is more dependent
health records are typically instituted by larger on the type of practice whether solo or group
institutions in urban centres with significant re- practice or family physician versus specialist
sources capable of aligning funding with available (Dorsch, 2000). However, there is a difference in
technological expertise. However over time this the frequency of information use in that rural health
technology will facilitate the decentralization of, professionals were found to search for answers to
and access to, expert medical equipment and staff clinical questions and use information sources less
(e.g. telerobotic surgery, telementoring or distance frequently than their urban counterparts (Dorsch,
education). Other changes, such as personnel 2000). Rural health professionals face more sig-
and shift management, as well as core medical nificant barriers for meeting their information
practices (i.e. evidence-based practice, health needs, such as accessibility issues (i.e. the lack of
care teams and interprofessional collaboration) libraries, technological illiteracy, and the lack of
are facilitated by technology. equipment). Demographic barriers may also play a
Additionally, as technology advances, the part; for instance, rural health professionals tended
types of medical care provided are likely to to be older and had been in practice longer. When
change drastically over time, such as minimally compared to urban health professionals, those in
invasive surgical interventions, gene therapy and rural areas on average had lower computer use
personalized medicine (Anravi, 2006). This will and spent less time pursuing clinical questions
have an impact on the shift of medical health care and were, therefore, less likely to use information.
professionals from one sub-specialty to another The nature of the health care profession requires
and new roles for health professionals on the health that all health professionals remain up to date on
care team. Also, this will undoubtedly impact the current methods and research findings. Therefore,
type of health care coverage HR professionals will it is crucial that rural health professionals are able
offer for their employees, and may even evolve to bypass such barriers in order to maintain their
further to define specific benefit coverage for quest for continued education. Technology in the
certain high-impact employees. form of audioconferencing (both by conventional
As the joining of technology and health care telephone and voice over IP), videoconferencing,
moves forward, patient transfers will be replaced CD-ROMs, and Web-based resources can provide
by the transfer of medical expertise from one a link to urban resources and colleagues.
health center to another, e.g. from urban centres Audioconferencing is an ideal tool for rural
to rural communities, and across even greater health professionals because it provides a simple
distances across countries from the developed and convenient means of communication between
world to the developing world. Along with this groups or individuals and its interactive nature
comes the potential accessibility of private patient provides a means to get instant information, sup-
medical information anywhere in the world. The port, and feedback (Curran, 2006; Shepherd &
implications of the information benefit versus Mackintosh, 1998). Videoconferencing provides
privacy duality are huge. Medical records perhaps the opportunity to add a visual link as well as the
represent the most personal and private informa- audio link for simultaneous communication be-
tion regarding patients or employees. As such, the tween two or more sites. It can be used to deliver
responsibility and care of these records require lectures, show practical techniques, or demonstrate
priorities of security from both a technical and clinical procedures; hence making it a great tool
ethical perspective. for continued education (Curran, 2006). However,
301
Technology and Human Resources Management in Health Care
rural health professionals need to have access to In addition, e-mail allows health professionals to
a videoconferencing site or be able to access via send and receive documents quickly, efficiently,
their own computers, either of which may not be and in a cost effective way. Secure networks and/
available. Installation of computers and broadband or encryption can be used to ensure privacy and
transmission of videos can also be a financial confidentiality of transmitted health information.
burden, especially for the small practices or small E-mail lists are also beneficial to rural health
community hospitals found in rural areas. professionals because they allow one to build a
CD-ROMs are disc packages that contain larger network of colleagues and professionals
information usually found in medical texts, but for information sources and feedback. Networks,
can provide far greater interactivity than the usual such as UniNet, allow for continued medical
medical text since it can contain still and animated education; communication tools, such as video
graphics, as well as video sections. Interactive or text conferencing, and reduced costs (such as
features can also provide users with question and long distance phone calls or purchasing costs for
review sections, as well as immediate feedback acquiring books and other materials).
regarding their performance. CD-ROM packages Because developing countries often have lim-
are especially useful for rural health professionals ited budgets to invest in education and training
because they provide information that can be easily of health care professionals, distance education
received at great distances (packages can even be is a feasible option due to its comparably lower
delivered by regular mail service). One drawback cost and equivalent or higher quality. Students
is the data on CD-ROMs is not regularly updated, and trainees can access advanced knowledge
which means health professionals must continue and skills from Western countries without going
to purchase new packages in order to stay up to abroad or even leaving the community. The use of
date. The Internet and the Web browser interface information technology to provide online learning
facilitates the creation of virtual networks which can generate a larger pool of qualified health care
enable a group of users who share a common aspect workers and assist in alleviating the problem of
of knowledge (such as health care) to gather and worker shortages. However, poor infrastructure in
post relevant information or hold discussions on low income countries may still limit the applica-
specific topics. They are “universal, free of lan- tion of technology, particularly, as in the West,
guage or geographical boundaries and [are] open outside of urban centres.
to all interests” (Coma del Corral et al, 2005, p. 2). Although the advances in information and
These networks provide rural health profession- communication technology can greatly increase
als with a means to maintain communication and the efficiency of HRM in health care in developing
collaboration with their colleagues by use of chat countries, problems still exist. Brain drain is one
rooms, text conferencing, e-mail lists, and access of the leading causes of health care professional
to medical databases (e.g. MEDLINE, PubMed, shortages. While Internet-based distance studies
or online publications). provide higher education and training to people
Research shows that the use of such networks in developing countries, these individuals tend
has achieved positive changes in medical care in to leave their home country after they become
rural areas. Studies have shown a decrease in the professionals in order to find better working and
total average of hospital stays due to increased living conditions. It is difficult for governments in
access to information on patient care (Coma del low income countries to retain health care work-
Corral et al, 2005). E-mail provides easy and im- ers by providing financial incentives or increased
mediate contact with colleagues and can reduce remuneration due to their limited financial bud-
time spent waiting for missed or returned calls. gets. As a result, solving the problem of health
302
Technology and Human Resources Management in Health Care
care worker shortages is a long term process. system can be used to predict and manage levels of
Developing countries need to focus on improving recruitment, training, delivery and production needs
infrastructure that allows for information sharing, (Dambisya, 2004). Through the use of such tracking
training and development through technology in and monitoring systems, appropriate training can
order to retain their human capital. be given to workers while being able to maintain
Distance learning abilities such as wireless staffing needs. A strong commitment to rural areas
technology is an opportunity that should not be in training is vital as it shows not only workers, but
overlooked by human resource professionals in the population that they do not need to migrate away
order to meet training needs. It allows remote from rural areas to urban centers to get the quality
access to human capital and creates opportunities training they need. Monetary incentives remain a
for remote training where there once may have popular way of retaining and recruiting health care
been little recourse but to remove the worker to workers in rural developing areas, however other
a centralized location. In rural areas that have incentives can be vitally important. This includes
limited health workers to start with, removing housing, transportation, security and promotion
workers for training for significant amounts of prospects. All of these can then be used to retain
time could mean a significant reduction in services and recruit workers in rural, developing areas. These
and care for the population they serve. Wireless non-financial incentives create an incentive for health
technology such as wireless local area networks care workers to not only stay in the country, but to
and mobile technologies requires only a modest stay in rural areas, as most developing countries are
investment at a central area, and little in the way unable to compete on wages alone.
of remote access. Moving human resources management to a
Ensuring information is focused on the needs state level and no longer spread between various
of a rural population allows not only the infor- regions in the country and developing a com-
mation but the technology to be successfully prehensive national HRM policy was a first step
transferred and sustained. This is critical for a to a more efficient system in Afghanistan. This
long-term commitment in recruitment and train- set the stage for a database to track training and
ing. Use of the Internet for distance learning or other government agency initiatives; a centralized
even use of cell phones can facilitate learning agency working with all levels of government has
yet keep the worker on the front lines as well as a better chance of fulfilling its HR obligations.
minimize costs. In extremely remote locations
use of technology is not always feasible. In such
cases radio communications or even mail can be tHe Future: trAInInG
used to substitute for those learning opportunities And educAtIon
(Awofeso, 2008). Television is another low cost
opportunity of training workers in rural environ- Information and communication technologies
ments. In South Africa the use of televised com- continue to expand and improve. New dimensions
munications allowed the department of health to of interactivity offered through social networking
facilitate some of its training from a centralized and increased connectivity will have an influence
location without having to transport workers to a on human resources and HRM in health care as
training facility (van Rensburg, 2008). well. Once again these technologies will first be
A proper human resource information system rolled out in urban centres and offer improved ways
that collects data on the training quality and support of training and education of health professionals
given to workers is another key success factor in rural, and these urban centres will be able to provide
developing areas. A human resource information these tools to rural and remote regions.
303
Technology and Human Resources Management in Health Care
Within medical schools adoption of computer definitions to illustrative images and interactive
technology has been initially slow. In most cases student exercises. At the same time it provides
introduced to assist in administrative functions an introduction to certain informatics practices
medical schools are increasingly turning to including basic security and use of an EMR for
computer-assisted learning in one form or another patient care (Speedie & Niewoehner, 2003).
(Gordon et al, 1999; Riva, 2000, Ward et al, 2001). More advanced virtual patients, e.g. cyberPa-
The spectrum of computer usage runs from simple tient by CyberActive Technology Ltd (Qayumi &
use of email as a communication tool between Qayumi, 1999), provides not only virtual patient
students and teachers to posting links to helpful cases but the opportunity for the learner to con-
web sites, posting course notes, posting interac- duct a physical examination with auscultation
tive quizzes, animations that supplement lecture and palpation modalities, order laboratory tests
material or provide diagrammatic understanding of (blood tests, EKGs, X-rays, etc), offer a diag-
more complex mechanisms, to the use of computer- nosis, plan treatment and if necessary simulate
based simulations or virtual reality. Information a surgical procedure. Feedback can be provided
and communication technology is now seen as an immediately by the ‘chief surgeon’ or physician,
integral part of the medical school enterprise and or at the end of the case. Patients can be followed
often expected by its students as part of the mode up for months or years after their treatment and
of content delivery. What differentiates medicine management; thus students can revisit patients
though from other forms of learning is the interac- and appreciate the long-term follow-up that oc-
tion with patients and the need to acquire practical curs with ‘real’ patients. Student responses can
skills (physical examination, e.g. assessment of be tracked making this virtual patient simulation
heart and lung sounds, palpation; procedures, suitable for testing purposes.
e.g. injections, inserting IV, suturing, surgical Computational advances in natural language
techniques). Can these tasks be supplemented or processing, 3-D modeling and database reposi-
addressed by computer-based tools? tories have led to the development of even more
sophisticated virtual patients that can respond
with emotions and answer questions with natural
leArnInG WItH vIrtuAl PAtIents language (Hubal et al, 2000). Physical signs are
again available in terms of heart and lung sounds,
The University of Minnesota’s Medical School etc. The virtual standardized patient provides
Virtual Clinic with 70 virtual patients is set up feedback, tracking and recording of responses.
as a web-accessible electronic medical record
with tabs that include health history, lab results,
medications ordered, images (e.g. X-rays), prog- medIcAl sImulAtIons
ress notes and links to teaching items. The virtual
clinic is used by first year medical students, and One more step of complexity introduces a ‘simu-
is also to be used in the IVIMEDS virtual pa- lated’ patient or mannequin linked to a multimedia
tient panel (Voelker, 2003). Students ‘attend’ the computer system to more closely approximate the
weekly clinic by logging into the virtual clinic and bedside learning experience and to allow students
see a group of simulated patients representing a to practice in a stress-free environment in situations
variety of conditions and cultural backgrounds where wrong decisions may literally mean life or
and follow them over time. The underlying tools death. One of the most fully developed simula-
facilitate a variety of educational links for any item tors is ‘Harvey’ a cardiology patient simulator
of information from simple popup windows for developed at the University of Miami Centre for
304
Technology and Human Resources Management in Health Care
Research in Medical Education (CRME) (Gordon pursuing rotations at remote sites” (Jacobs et al,
et al, 1999; http://www.crme.med.miami.edu/ 2003; Project TOUCH (Telehealth Outreach for
harvey_findings.html). Harvey is programmed to Unified Community Health – http://hsc.unm.edu/
present with lifelike vital signs including blood touch). This multi-year collaboration between the
pressure, arterial and venous pulses, heart and University of New Mexico and the University of
lung sounds (with accompanying multimedia Hawaii uses case scenarios as virtual models to
instruction), access to laboratory data, pathology, make the learning of critical concepts relevant
and treatment choices. Harvey has been used by and more life-like. Students are fully immersed
medical students, nursing students, primary care in a representational virtual environment and can
physicians, cardiologists, EMTs, firemen and other see fellow students or team members and interact
health professionals. as if they were physically present even when
Successful simulations/simulators now exist separated by significant distances. The “Flatland’
for anesthesia, emergency medicine, and surgery. environment allows real-time exploration and
In the latter it may be far more preferable to de- manipulation of 3-D objects and images within
velop skills in a simulation environment for a new the virtual world. The application is displayed
or complex medical procedure rather than in the using the Access Grid – a broadband Internet2
traditional apprenticeship model on real patients videoconferencing, multicasting network that
(Gorman et al, 2000). Surgical training has been allows real-time distribution of the learning en-
extended with the marriage of virtual reality or 3-D vironments across academic medical centers and
modeling into the simulation exercise. Manipula- distant training centers.
tions are performed through haptic interfaces that Second Life (http://secondlife.com) is a popu-
not only convey a rich three-dimensional depic- lar virtual world platform that is being used for
tion of the tissue, but can also simulate touch and medical and health education. On the “Healthinfo
pressure. Examples include laparoscopic camera island” (Second Life Medical and Consumer
and cholecystectomy simulators, a VR-based Health Libraries), for instance, librarians have
needle-driving simulator for suturing technique, a provided extensive consumer health information
Web-based surgical training system for abdominal services that users can wander through in a virtual
aneurysm stent graft deployment and a Web-based environment (Boulos et al, 2007).
CardioOp system that allows for the composition
of multimedia fragments that can be reused to suit
the needs of individual learners in cardiac surgery communIty oF leArners/
(Gorman et al, 2000). communItIes oF PrActIce
“Future physicians will be able to rehearse an The Internet can offer a variety of modes for
operation on a projectable palpable hologram establishing communities of learners via discus-
derived from patient-specific data, and deliver the sion boards, chat rooms, virtual seminars and
data set of that operation with robotic assistance I.P. videoconferencing. Peer-to-peer learning is
the next day” Gorman et al, 2000, p. 353 enhanced and encouraged in these settings and
faculty can also act as mentors for students at a
Another example weds all of these elements distance. Virtual advisors were linked to students
into the learning environment (i.e. simulation, an from North American and international medical
immersive virtual reality environment, Internet schools with experienced emergency medicine
technology) to “overcome geographic barriers for faculty mentors in which encounters relied on
delivery of tutorial sessions to medical students electronic or voice correspondence depending
305
Technology and Human Resources Management in Health Care
on their geographical location and preferences. expertise to teach medical students at a distance.
Feedback was positive for both advisors and Their aims are to apply innovative thinking and
advisees (Coates et al, 2004). new learning technologies (e.g. e-learning via
Canada’s first new medical school in over three the Internet, CD-ROM, virtual reality), new ap-
decades, the Northern Ontario School of Medicine, proaches to curriculum planning and instructional
is a collaborative effort between Laurentian Uni- design (e.g. curriculum mapping, outcomes-based
versity in Sudbury, ON and Lakehead University education, electronic study guides, peer-to-peer
in Thunder Bay, ON. It uses a distributed learning learning, a bank of reusable learning objects),
network with advanced information technology and the development of a flexible curriculum that
support to facilitate small group learning for will meet the needs of different students in many
students seeing patients in rural, northern, under- different geographic locations to a new medical
serviced and Aboriginal communities (Rourke, school open to students from around the world
2002). Components of the technology include (Harden & Hart, 2002). Two central features of
an e-learning (virtual learning) environment, the model are the curriculum map and reusable
online collaboration and telehealth (using the learning objects. The curriculum map identifies
existing NORTH network infrastructure), a medi- what, where, when and how students can learn
cal school information portal (on a high-speed and in essence they will be able to follow their
Intranet – the ORION network that connects the own map through the curriculum. On each node of
two universities), e-library (health information the map learning resource material related to that
resources centre), administrative infrastructure node is identified. This material is contained in a
(that include student/faculty/staff access and IT learning repository which contains small, discrete
support services) and IT research support. The self-contained learning objects. Benefits of this
goal is to provide faculty and students with secure, program are seen to be an increased accessibil-
reliable access to curriculum, cohorts, coaches, ity of medical education globally and improved
and faculty regardless of geographic location. medical education that is more responsive to
community needs.
The use of digital technologies through the
InternAtIonAl vIrtuAl Internet and world wide web interface continue
medIcAl scHool (IvImeds) to influence and affect the delivery of health
care and health services and with regard to HRM
This represents a ‘revolutionary’ approach to can provide the venue for training and educa-
medical education leaving the notion of a physi- tion of health workers, access to the medical
cal medical school associated with a teaching literature and knowledge databases providing
hospital far behind (Harden, 2000; Harden & best evidence for clinical care and clinical care
Hart, 2002; http://www.ivimeds.org/). Based in guidelines, continuing education opportunities
Dundee, Scotland and formally launched in 2003 and invaluable links to colleagues and mentors
IVIMEDS builds on the successful experiments that will improve the retention of health profes-
with virtual degrees and virtual universities sionals in remote and rural regions. Considerable
(Pritchard, 2003). An international group of 30 progress and use of these technologies has been
to 40 medical schools (from the US, UK, Europe, made, as we have discussed, and in the next
Australasia) is exploring the feasibility of estab- generation the so-called Web 2.0 technologies
lishing a virtual medical school with a broadly- will have an even greater impact on these activi-
based consortium of dozens of medical schools ties with their emphasis on social connection
that will contribute shared learning resources and and collaboration.
306
Technology and Human Resources Management in Health Care
Web 2.0 technologies take the original Web little actual use of these technologies. Medical
based resources beyond the simple provision of students had both greater familiarity and use,
text, images and video and add a dimension of especially of instant messaging, media sharing
interactivity and social networking that enhance and social bookmarking. There was interest in
professional, patient and consumer interactions the use of Web 2.0 technologies for education
(Boulos & Wheeler, 2007). More common ap- by all groups but both practitioners and students
plications in health and medical education include wanted more training in their use. Other barriers
the use of wikis, web information sites that are for use in education were different learning pref-
editable by anyone; blogs or web logs or online erences, concern about quality of resources, lack
journals that can offer text or multimedia–based of time and difficulties with ICT access (Sandars
discussions in one-way or two-way environments; & Schroter, 2007).
and podcasts or audio files that can be downloaded Since these are interactive tools and devel-
to a user’s computer or audio device and listened oped collectively by a community of interested
to anywhere, anytime (Boulos et al, 2006; Boulos participants the resulting quality can vary greatly.
& Wheeler, 2007). Media sharing sites such as Although some proponents profess a “darwikian”
You Tube contain a number of video presentations theory of survival of the fittest or best, that is not
of educational material available for widespread always the case (for example, good content can
use and the social networking sites, MySpace be replaced by poor content or by misinformation,
and FaceBook, have become areas where patients sites can be hijacked by groups of users with selec-
can find support from fellow patients, students tive points of view) (Boulos & Wheeler, 2007).
can share work and learning, and researchers In some cases those perils can be lessened by the
and health professionals can find like-minded presence of a moderator or access restricted to
individuals to share information and establish only certain individuals, but to a certain extent
connections across the world. Examples of each that defeats the purpose of the original idea of
of these technologies in health education exist, social networking and building free and open
(e.g. Ganfyd a collaborative medical knowledge collaborative networks.
database that anyone can read and medical pro- Many of these web tools require quite high
fessionals can edit – http://ganfyd.org; Clinical bandwidth and high connectivity speeds, infra-
Cases and Images blog from the Cleveland Clinic structure that may be readily available in urban
- http://clinicalcases.org/; Johns Hopkins Medical centres, but may still not be available to those in
Podcasts for health professionals and the pub- remote regions or in low income countries. ICT
lic - http://www.hopkinsmedicine.org/mediaII/ use and penetration continues to expand across
Podcasts/index.html; medical school pathology the globe with the greatest increases over the past
lectures on YouTube – http://www.youtube.com). several years seen in mobile cellular technologies
It is still early days in the use of these tech- and networks. In the developing world mobile
nologies in training and education, and research phones had reached an estimated 49.5% penetra-
is still needed into how these technologies best fit tion rate by the end of 2008 (from almost zero ten
into undergraduate, postgraduate and continuing years ago) (ITU, 2009, p. 1). Fixed Internet access
education of health professionals (Boulos et al, in developing countries is still limited and where
2006; Sandars & Schroter, 2007). A recent survey available is often slow and expensive. Although
of 3,000 medical students and 3,000 medical there is still a digital divide the latest indicators of
practitioners in the UK found that although there ICT use and prevalence indicate that it is slightly
was familiarity with these Web 2.0 technologies closing between countries with high and low ICT
for both personal and educational use, there was levels (which are in turn correlated to high (Europe
307
Technology and Human Resources Management in Health Care
and North America) and low income countries and bioinformatics will mean the addition of new
(central and southern Asia, sub-Saharan Africa)) health professionals to the health care team with
(ITU, 2009, p. 1-2). One encouraging sign for the expertise in the use of these new technologies
coming decade is the increase in, and adoption of, and their integration into a fully electronic health
national eHealth policies that provide a framework information system (Anvari, 2006). Technology, in
for developing and using ICT in the health sec- some instances, will also lead to the disappearance
tor. Although industrialized countries still show of jobs (e.g. medical transcriptionists, radiology
the highest rates of adoption of eHealth policies, film technicians, health records clerks).
African regions projected a doubling of adoption Shifting of care from the hospital and health
of policies and ICT development by the end of facilities to the community and home will also
2008 (WHO, 2006, p. 18-20, 31).. Accompanying mean an increased need for community and
the introduction of policies and infrastructure is home health care workers and expanded roles for
the recognition of the need for building capac- family and community-based physicians, nurse
ity, i.e. the need to train the health workforce in practitioners, and even patients in controlling and
use of the eHealth applications being deployed. monitoring their own conditions and health. In
ICT training of both health science students and many countries there is a lack of national health
continuing education for health professionals is human resources policies and planning to address
relatively stable across all geographic regions with these current and future needs.
roughly two thirds of countries reporting they
have introduced some form of university level
and continuing education in ICT (WHO, 2006, conclusIon
p. 46-47). The need to build human resources
capacity in health informatics and eHealth was Technology in health care overcomes barriers for
reported by responding countries and often cited health professionals in all regions. It minimizes
as a barrier to full eHealth implementation (WHO, distance and accessibility issues, providing a
2006, p. 19). medium whereby information is easily and im-
mediately attained. Technology furthermore
maintains communication between health pro-
HumAn resources: neW roles fessionals and academic sources/centres which
allows for continued education and training. In
The introduction of new technologies and changes addition, it enhances the ability to recruit and
in practice will also have an impact on the types select qualified personnel from all regions for
of health professionals needed in the workforce optimal deployment of human resources by the
in the future. As already mentioned there will be use of HR information systems. Computer and
a need for increased training in the use of ICT for Internet access to health professionals in rural
all health professionals and an increased need for regions have provided a better means of access
health informatics specialists to develop, maintain to critical medical information, distance training
and use these technologies and manage the mas- and continuing education and have improved
sive amounts of health data that will be available medical care services to patients. Although initial
across shared data repositories. set up costs may be substantial, such investments
Multidisciplinary and interprofessional health indicate long term HRM benefits. In developing
care teams will be supported by improved technol- areas, governments – specifically those in urban
ogies. The introduction of robotics and minimally and rural developing regions – need to improve
invasive surgical techniques, pharmacogenetics, technological infrastructures in order to provide
308
Technology and Human Resources Management in Health Care
better telecommunication services. In rural devel- Boulos, M. N. K., & Wheeler, S. (2007). The
oping areas, centralized management will ensure emerging Web 2.0 social software: an enabling
consistent information is being provided to health suite of sociable technologies in health and
professionals, and will provide well developed health care education. Health Information and
HRM strategies in all areas of the government Libraries Journal, 24, 2–23. doi:10.1111/j.1471-
pertaining to health care management. 1842.2007.00701.x
Chaudry, B., Wang, J., Wu, S., Maglione, M.,
Mojica, W., & Roth, E. (2006). Systematic Re-
reFerences
view: Impact of health information technology
Adatia, F., & Bedard, P. L. (2003). Palm reading: on quality, efficiency, and costs of medical care.
2. Handheld software for physicians. Canadian Annals of Internal Medicine, 144, 742–752.
Medical Association Journal, 168, 727–734. Clements, A. (2008). It’s Good to Get a Second
Adatia, F. A., & Bedard, P. L. (2002). Palm read- Opinion. Human Resources, 66. Retrieved No-
ing: 1. Handheld hardware and operating systems. vember 9, 2008 from http://proquest.umi.com/pq
Canadian Medical Association Journal, 167, dweb?did=1582613671&sid=7&Fmt=3&clientI
775–780. d=77774&RQT=309&VName=PQD
Anvari, M. (2007). Impact of Information Technol- Coates, W. C., Ankel, F., Birnbaum, A., Kosiak, D.,
ogy on Human Resources in Healthcare. Health- Broderick, K. B., & Thomas, S. (2004). The virtual
care Quarterly, 10, 84-88. Retrieved November 9, advisor program: linking students to mentors via
2008 from http://www.longwoods.com/product. the world wide web. Academic Emergency Medi-
php?productid=19320&cat=513&page=1 cine, 11, 253–255. doi:10.1111/j.1553-2712.2004.
tb02205.x
Awofeso, N., Dalhatu, A., & Schelokova, I.
(2008). Training of Front-line Health Workers for Coma del Corral, M. J., Luquín, P. A., Guevara, J.
Tuberculosis Control: Lessons from Nigeria and C., Movilla, A. O., Torres, G. T., & Garcia, J. L.
Kyrgyzstan. Human Resources for Health, 6(20). (2005). Utility of a thematic network in primary
Retrieved October 28, 2008 from http://www. health care: a controlled interventional study in a
human-resources-health.com/content/6/1/20 rural area. Human Resource for Health, 3, 4-11.
Retrieved November 9, 2008 from http://www.
Boulos, M. N., Marimba, I., & Wheeler, S. (2006). human-resources-health.com/content/3/1/4
Wikis, blogs and podcasts: a new generation of
Web-based tools for virtual collaborative clinical Curran, V. R. (2006). Tele-education. Jour-
practice and education. BMC Medical Education, nal of Telemedicine and Telecare, 12, 57–63.
6, 41–49. doi:10.1186/1472-6920-6-41 doi:10.1258/135763306776084400
Boulos, M. N. K., Hetherington, L., & Wheeler, Dambisya, Y. A. (2007). Review of Non-financial
S. (2007). Second Life: an overview of the Incentives for Health Care Worker Retention in
potential of 3-D virtual worlds in medical and East and Southern Africa. Regional Network for
health education. Health Information and Librar- Equity in Health in East and Southern Africa, 1-72.
ies Journal, 24, 233–245. doi:10.1111/j.1471- Retrieved October 30, 2008 from http://www.equi-
1842.2007.00733.x netafrica.org/bibl/docs/DIS44HRdambisya.pdf
309
Technology and Human Resources Management in Health Care
310
Technology and Human Resources Management in Health Care
Kabene, S. M., Orchard, C., Howard, J. M., So- Sandars, J., & Schroter, S. (2007). Web 2.0 tech-
riano, M. A., & Leduc, R. (2006). The importance nologies for undergraduate and postgraduate
of human resources management in health care: a medical education: an online survey. Postgradu-
global context. Human Resources for Health, 4, ate Medical Journal, 83, 759–762. doi:10.1136/
20–36. doi:10.1186/1478-4491-4-20 pgmj.2007.063123
Kulma, M., & Springer, B. (2006). Easing the Sattar, K. (2007). A Sustainable Model for Use
bottom-line impact of staffing shortages: A case of ICTs in Rural Pakistan. International Journal
study in shift bidding. Healthcare Financial of Education and Development using Informa-
Management, 60, 92–97. tion and Communication Technology, 3, 89-97.
Retrieved October 30, 2008 from http://proquest.
Lin, J. C. (1999) Applying telecommunication
umi.com/pqdweb?did=1409299671&Fmt=4&cli
technology to health-care delivery. Engineering
entId=11263&RQT=309&VName=PQD
in Medicine and Biology Magazine, IEEE, 28-31.
Retrieved November 9, 2008 from http://ieeex- Schiffbauer, J., O’Brien, J. B., Timmons, B. K.,
plore.ieee.org/xpls/abs_all.jsp?arnumber=775486 & Kiarie, W. N. (2008). The Role of Leadership
in HRH Development in Challenging Public
McGraw, D., Dempsey, J. X., Harris, L., & Gold-
Health Settings. Human Resources for Health, 6,
man, J. (2009). Privacy As An Enabler, Not An
23. Retrieved October 30, 2008 from http://www.
Impediment: Building Trust Into Health Infor-
human-resources-health.com/content/pdf/1478-
mation Exchange. Health Affairs, 28, 416–427.
4491-6-23.pdf
doi:10.1377/hlthaff.28.2.416
Sheppard, L., & Mackintosh, S. (1998). Technol-
Pritchard, L. (2003). Great Scots! Medical
ogy in education: what is appropriate for rural
Education, 37, 493–494. doi:10.1046/j.1365-
and remote allied health professionals? Aust J
2923.2003.01529.x
Rural Health, 6, 189-193. Retrieved November 9,
Qayami, A. K., & Qayami, T. (1999). Com- 2008 from http://www3.interscience.wiley.com/
puter-assisted learning: cyperPatient™ - A journal/119830096/abstract
step in the future of surgical education. Jour-
Smith, R. (1996). What clinical information do
nal of Investigative Surgery, 12, 307–317.
doctors need? BMJ (Clinical Research Ed.), 313,
doi:10.1080/089419399272296
1062–1068.
Riva, G. (2000). From telehealth to e-health:
Van Rensburg, D., Steyn, F., Schneider, H., &
Internet and distributed virtual reality in health
Loffstadt, L. (2008). Human Resource Develop-
care. Cyberpsychology & Behavior, 3, 989–998.
ment and Antiretroviral Treatment in Free State
doi:10.1089/109493100452255
Province, South Africa. Human Resources for
Robinson, K. S. (2003). Online Bidding Fills Health, 6, 15. Retrieved October 28, 2008 from
Nursing Jobs. HRMagazine. Alexandria, 44. http://www.human-resources-health.com /con-
tent/6/1/15
Rourke, J. T. B. (2002). Building the new Northern
Ontario Rural Medical School. The Australian
Journal of Rural Health, 10, 112–116.
311
Technology and Human Resources Management in Health Care
Vian, T., Richards, S. C., McCoy, K., Connelly, Westberg, E. E., & Miller, R. A. (1998). The Basis
P., & Feeley, F. (2007). Public-Private Partner- for Using the Internet to Support the Information
ships to Build Human Capacity in Low Income Needs of Primary Care. Journal of the American
Countries: Findings from the Pfizer Program. Medical Informatics Association, 6, 6–25.
Human Resources for Health, 5, 8-19. Retrieved
Wibulpolprasert, S., & Pengpaibon, P. (2003).
November 18, 2008 from http://www.human-
Integrated Strategies to Tackle the Inequitable
resources-health.com/content/5/1/8
Distribution of doctors in Thailand: Four Decades
Vilamovska, A. M., & Hatziandreu, E. Schindler, of Experience. Human Resources for Health, 1, 12.
H.R., van Oranje-Nassau, C., de Vries, H., & Retrieved November 18, 2008 from http://www.
Krapels, J. (2009). Study on the requirements human-resources-health.com/content/1/1/12
and options for RFID application in healthcare:
World Health Organization (WHO). (2006)
Identifying areas for Radio Frequency Identifica-
Building Foundations for eHealth: Progress of
tion deployment in healthcare delivery: A review
Member States: Report of the Global Observa-
of relevant literature. Rand Europe, European
tory for eHealth. Geneva, Switzerland; WHO.
Commission. Retrieved May 4, 2009 from http://
Retrieved November 9, 2008 from http://www.
www.rand.org/pubs/technical_reports/TR608/
who.int/ehealth/resources/bf_full.pdf
Voelker, R. (2003). Virtual patients help medical
Zarocostas, J. (2008). World Medical Association
students link basic science with clinical care.
scales up training for multidrug resistant tuberculo-
Journal of the American Medical Association,
sis to fight epidemic. BMJ (Clinical Research Ed.),
290, 1700–1701. doi:10.1001/jama.290.13.1700
336, 1155. doi:10.1136/bmj.39584.662130.DB
Ward, J. P. T., Gordon, J., Field, M. J., & Lehmann,
H. P. (2001). Communication and information
technology in medical education. Lancet, 357,
792–796. doi:10.1016/S0140-6736(00)04173-8
This work was previously published in Ubiquitous Health and Medical Informatics: The Ubiquity 2.0 Trend and Beyond,
edited by Sabah Mohammed and Jinan Fiaidhi, pp. 574-595, copyright 2010 by Information Science Reference (an imprint
of IGI Global).
312
Section II
Development and Design
Methodologies
This section provides in-depth coverage of conceptual architectures, frameworks and methodologies related to
the design and implementation of enterprise information systems. Throughout these contributions, research fun-
damentals in the discipline are presented and discussed. From broad examinations to specific discussions on
particular frameworks and infrastructures, the research found within this section spans the discipline while also
offering detailed, specific discussions. Basic designs, as well as abstract developments, are explained within these
chapters, and frameworks for designing successful decision support systems, integrating new technologies, and
developing and implementing efficient processes are included.
314
Chapter 2.1
Enterprise Information Systems:
Aligning and Integrating Strategy,
Technology, Organization and People
Paul T. Kidd
Cheshire Henbury, UK
AbstrAct IntroductIon
The implementation of Enterprise Information One of the expected benefits of Enterprise Informa-
Systems is a difficult task, even for large compa- tion Systems is increased responsiveness, flexibility
nies. It can be even more so for Small and Medium and agility. Yet sometimes these benefits can also be
Size Enterprises (SMEs), for most are seriously delivered through non-technical means, namely by
constrained in terms of time, money and skills. The an appropriate organizational design, based on the
key to successful implementation lies in achieving right choice of organizational design parameters:
an alignment between strategy, technology, organi- differentiation, integration, decision structure, and
zation and people, and also in achieving commit- formalization. And people are also crucial as well,
ment to the new technologies. An implementation for they need the right skills and motivation to de-
method called HiSTOP, which stands for High liver the sought after benefits. But the story does
Integration of Strategy, Technology, Organization not end with these elements, for strategy must also
and People, is described. This method provides a be considered, because different business strategies
means of adjusting all four elements so that each require, in general, different forms of responsive-
is appropriate and also so that all four elements fit ness, flexibility and agility. Therefore the key issues
together. Although the method was initially designed are aligning and integrating these four elements,
with SMEs in mind, the method is also suitable for and dealing with the interactions between them, so
larger companies, hence the chapter considers both that, for example, the needs of the organizational
types of enterprises. The method places emphasis design are reflected in the technology design, and
on development of internal implementation com- vice versa.
petencies. The key foundational principles of the Achieving this alignment and integration is a
method are discussed along with some key findings very difficult thing to bring about, even for big
from early trials. companies with large budgets, capable of buying-in
external skills and expertise to support the whole
DOI: 10.4018/978-1-60566-892-5.ch015
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Information Systems
process of selection, design, and implementation. Armed with this new version of HITOP, which
For Small and Medium Size Enterprises (SMEs) is called HiSTOP (High Integration of Strategy,
the challenges are even more daunting, for most Technology, Organization and People), the
are seriously constrained in terms of time, money chapter will then consider the key components,
and skills. Moreover, SMEs can also be micro which constitute several steps that SMEs and
versions of large enterprises in that they also bring large enterprises can take to improve the imple-
with them a set of internal organizational politics, mentation of Enterprise Information Systems.
conflicts, outdated practices, change resistance, These considerations will involve addressing the
etc., that is to say, the features and problems that process by which the design and implementation
are so often found in large enterprises. work is undertaken, as well as the analysis of the
SMEs therefore provide a challenging en- interrelationships between Strategy, Technol-
vironment with respect to the implementation ogy, Organization, and People. Using HiSTOP,
of Enterprise Information Systems in terms of it becomes possible to begin to consider design
aligning and integrating Strategy, Technology, choices in terms of all four dimensions of the
Organization and People. What therefore can be problem.
done to help such businesses? Answering this The conclusions provide insights into critical
question is the focus of this chapter. success factors with respect to acceptance of the
However, before addressing the above it is method. These factors were identified at an early
necessary to define the theories and concepts upon stage in the development work and were therefore
which the chapter will be built. After providing a used to shape the method to ensure that it would
brief overview of the main challenges, a social not be seen as being overcomplicated or too dif-
shaping of technology approach is presented. This ficult to use. Insights from experiences of using the
method is rooted in sociotechnical theory. The method are also provided. In particular the finding
method, called HITOP (High Integration of Tech- that different modes of use are possible, since it
nology, Organization and People) was developed is not necessary to follow the whole method, and
in the United States in the late 1980s, in the context different parts can be used as required according
of implementation of advanced manufacturing to the inclinations of a particular business and its
technologies within traditional hierarchical mass specific interests and constraints.
production environments operated by large corpo-
rations. The HITOP method provides a means of
considering the organization and people require- bAckGround
ments of computer-based manufacturing technolo-
gies. This method is briefly reviewed, highlighting Failures in the implementation of Information
its underlying philosophy and assumptions, along and Communications Technologies (ICT) have
with its strengths, weaknesses and limitations. been documented in the literature for decades
Following this, a new method is discussed, (e.g. see Kidd (1994), pp 55-56, for an overview
which is an improved, generalized and extended of failures relating to manufacturing ICT). Failure
version of the HITOP method, and which is based here is used in the sense that outcomes fall short
on a broader set of needs and issues, including of expectations (Bignall & Fortune, 1984; Kidd,
those of SMEs, and also addressing the require- 1994 (p 192)). Some key reasons for failure in
ments to align and integrate Strategy, Technology, relation to implementation are:
Organization and People. The improved version
of HITOP is however also relevant to large en- • Technology oriented rather than business
terprises. and market focused investment plans;
315
Enterprise Information Systems
• Inappropriate or non-existent business here is that, whatever the motivation for change,
strategy; there must be a sound business-driven justification
• Failure to link business and Information and for the implementation. Enterprise Information
Communications Technology strategies; Systems implementation should be concerned
• Inadequate assessment of the costs and ben- with achieving a return on investment, and this
efits of investments in new technologies; implies identifying business objectives.
• Neglect of organization and people issues. Defining and prioritizing business objectives is
extremely important. There is universal agreement
These problems were documented in Kidd in the literature about this–if business objectives
(1994), primarily in the context of advanced manu- are not clearly stated and prioritized at the very
facturing technologies and manufacturing related beginning, before embarking upon any sort of
ICT, but there is a pattern as the problems tend to software selection, then the implementation runs
reoccur across time and across different types of the risk of encountering serious problems. With-
ICT. For example, in the world of enterprise-wide out clear and prioritized business objectives it is
systems such as Enterprise Resource Planning unlikely any significant benefits will be achieved.
(ERP) and Enterprise Information Systems, gaps This in effect corresponds to establishing
between corporate expectations and results are strategic fit, meaning that an enterprise should
commonplace. For such systems there is now a achieve alignment between its business envi-
well-documented catalogue of implementation ronment and internal resources, such that these
issues and difficulties, along with prescribed criti- resources support the strategic goals. As Miles
cal implementation factors (e.g. see Davenport, & Snow (1984) have noted, truly outstanding
1998; Holland & Light, 1999; Strong & Volkoff, performance is achieved by companies that
2004; Santhanam et. al. (2006); Guang-hui et. al. achieve a tight strategic fit, both externally with
(2006); Jing & Xun Qiu (2007)). the business environment and internally among
Whilst there are many dimensions and is- strategy, structure and process. And while achiev-
sues to be considered in the implementation of ing strategic fit is crucial to excellence, it is also
enterprise-wide software systems, a number of extremely difficult to bring about.
critical points are worth mentioning. Establishing and prioritizing business objec-
The first critical point is that it is necessary for tives is therefore essential for managing the process
firms implementing enterprise systems to make the of selecting Enterprise Information Systems soft-
strategic choices needed to configure the systems ware and for determining the detailed functional-
and processes. This reduces to being very clear ity required. For example, a prioritized business
about business objectives. objective might be to share order information
There can be many reasons for change–tech- electronically across the business. If this is not
nical or business or both. Existing ICT systems clearly specified up-front, then it is not possible
may be old, costly to maintain, inflexible, and to evaluate packages correctly to find one that
suffering lots of downtime. Or perhaps the need can support this requirement. Moreover, training
for change stems from a broader business per- objectives cannot be specified to ensure that staff
spective, involving factors such as speed of order can use this system functionality effectively.
fulfillment, inventory reduction, improvements in However, it is not enough to just specify ge-
co-ordination and control, and so on. These are neric objectives, for example, improved customer
but a few of the potential benefits of Enterprise service. Such generic statements do not provide
Information Systems, and there are many more sufficient information for decision making and
(e.g. see Shang & Seddon (2002)). The key point there is a danger that ICT specialists will begin
316
Enterprise Information Systems
to make decisions about what functionality is this bridging exercise between ICT and non-ICT
required. As a result, Enterprise Information people are rare, and would normally be brought
Systems priorities will still be out of line with in for specific projects.
business objectives. What is needed is to be very Finally, the third key point is the special nature
specific, for example, improve order processing of Enterprise Information Systems. These are not
and fulfillment by accepting customer orders from functional or department based systems. They
any location into one system, assigning shipment provide access to information right across the
dates to available products in real time, scheduling enterprise. This has job design and organizational
future shipment dates for products not in stock, implications. For example, when people elsewhere
and checking order status at any time. have to take decisions using information generated
A second key point is that of control over in another part of a business, then these people
the implementation process. Implementing an need to understand what the information means
Enterprise Information System can be risky, is (which has training implications). But the business
potentially expensive, and involves a lot of time also needs to decide if jobs and organizational
and effort. Sought after benefits, no matter how structures need to be redesigned to bring people
clearly linked to business objectives, will not using the data closer together, for example to
be achieved if the system is not implemented work in teams, or to be co-located, or to define
correctly, and there are plenty of pitfalls and jobs around the use of particular types of data.
lots of scope for making mistakes. If a company Without such considerations, benefits such as
solely relies on vendors or external consultants speed of response and flexibility may not be fully
for success, then they are likely to experience achieved simply because there is no alignment
a significant shortfall between expectation and between the features of the technology and the
achievement. For example, it is necessary to avoid organizational design.
a circumstance where inadequacies in the Enter- Moreover, the organizational structure itself
prise Information System software are discovered may be outdated and unresponsive, and in need
during the implementation. If this does happen, of modernization. For example, it may be too hi-
then implementation teams will find themselves erarchical, too functional, and be based on narrow
working in a reactive, trouble-shooting mode departmental perspectives that hinder effective
rather than as part of a strategic plan. Consequently team working and cross-functional operations.
costs will increase, schedules will slip and people Such organizations tend to be inappropriate to
will become disillusioned. This is often the cause modern business environments, and often need to
of major Enterprise Information Systems imple- be redesigned to make for more responsiveness
mentations failing to meet business objectives. and flexibility.
However, it can also be a mistake to follow an Consequently, implementing Enterprise In-
entirely in-house approach. The problem of getting formation Systems cannot be done in isolation
business objectives and Enterprise Information from organizational considerations, and some
Systems into full alignment is a significant one, form of organizational alignment, both with the
and will probably require external help. Also, time technology and with the business environment
needs to be spent explaining the business benefits should be undertaken if the expected business
of Enterprise Information Systems to non-ICT benefits are to be fully achieved. Yet, even though
managers. Only after this has taken place, can organizational issues are a critical area, the matter
managers appreciate the role that the Enterprise is often missing from implementation methods,
Information System will play in meeting busi- whether these methods be directed at SMEs or
ness objectives. The skills required to undertake large enterprises. For example, the implementa-
317
Enterprise Information Systems
tion method described by Blackwell et. al. (2006), social sub-system to match the technology, or a
though focused on SMEs, does not provide any mixture of both.
specific means for SMEs to undertake organiza- The Sociotechnical School of thought has been
tional redesign or alignment of the organization articulated in the form of principles, (Cherns,
with strategy and technology. Moreover, even 1976, 1987) that embody the values and key fea-
academic research on the topic of organizational tures of sociotechnical design. These principles,
issues, while strong an analysis of the issues (e.g. of which there are 11, are: Compatibility; Mini-
see Ward et. al. (2005)), generally does not provide mum Critical Specification; Variance Control;
a practical implementation methodology aimed The Multifunctional Principle–Organism vs.
at delivering a means of handling organizational Mechanism; Boundary Location; Information
design. Furthermore, implementation methods Flow; Support Congruence; Design and Human
that claim to be integrated (e.g. see Leem & Kim Values; Incompletion; Power and Authority; and
(2002)), are in fact only integrated in the narrow Transitional Organization.
sense of bringing together a subset of the primary Among the above there is a sub-set of principles
elements, mainly business objectives, economic that are primarily organizational in nature. These
justification, software evaluation and selection, are: TheMultifunctional Principle–Organism vs.
and implementation. Organizational design and the Mechanism; Boundary Location; Information
business of aligning all the components (strategy, Flow; Support Congruence; and Power and
technology, organization and people) are just left Authority.
out of the process. The Multifunctional Principle–Organism vs.
In summary therefore, it can be stated that ad- Mechanism refers to traditional organizations
dressing all three critical areas discussed above is which are often based on a high level of special-
not easy, and requires a process that can: (i) achieve ization and fragmentation of work, which reduces
the necessary alignments; (ii) ensure that the cor- flexibility. When a complex array of responses is
rect decisions are taken; (iii) deliver specifications required, it becomes easier to achieve this variety
that are appropriate, and; (iv) provide a means of if the system elements are capable of undertak-
addressing organization and people issues. ing or performing several functions. Boundary
Location is a principle that relates to a tendency
in traditional hierarchical organizations to or-
mAIn Focus oF tHe ArtIcle ganize work around fragmented functions. This
often leads to barriers that impede the sharing of
existing theories, methods data, information, knowledge and experience.
and concepts Boundaries therefore should be designed around
a complete flow of information, or knowledge,
Key among the existing body of knowledge or materials, to enable the sharing of all relevant
relating to implementation approaches that seek data, information, knowledge and experience. The
to achieve an alignment between technology, Information Flow principle addresses the provi-
organization and people is sociotechnical design. sion of information at the place where decisions
The Sociotechnical School’s central tenant and actions will be taken based on the information.
is that surrounding technology, which can be Support Congruence relates to the design of re-
regarded as a sub-system, there is also a social sub- ward systems, performance measurement systems,
system. These two sub-systems can be designed to etc., and their alignment with the behaviors that
be compatible, either by changing the technology are sought from people. For example, individual
to match the social sub-system, or modifying the reward for individual effort, is not appropriate if
318
Enterprise Information Systems
team behavior is required. Power and Authority nature, it impacts technology as well. It implies
is concerned with responsibilities for tasks, and that what has to be done needs to be defined, but
making available the resources that are needed how it should be done should be left open. In
to fulfill these responsibilities, which involves terms of features and functions of technology,
giving people the power and authority to secure the technology should not be over determined,
these resources. but should leave room for different approaches. It
There is also another sub-set of principles that implies a degree of flexibility and openness in the
largely relate to the process by which technology is technologies. Turning now to Variance Control,
designed. These are: The Compatibility Principle; this is a principle that, as its name suggests, is
The Incompletion Principle; and The Transitional focused on handling variances, these being events
Organization Principle. that are unexpected or unprogrammed. Variances
The Compatibility Principle states that the that cannot be eliminated should be controlled as
process by which technology is designed needs to near to the point of origin of the variance as pos-
be compatible with the objectives being pursued, sible. Some of these variances may be critical, in
implying that technologies designed without the that they have an important affect on results. It is
involvement of users, would not be compatible important to control variances at source, because
with the aim of developing a participatory form not to do so often introduces time delays. Next on
of work organization where employees are in- the list of principles is that of Design and Human
volved in internal decision making. Incompletion Values. This is concerned with quality of working
addresses the fact that when workplace systems life. In the context of the working environment it
are designed, the design is in fact never finished. manifests itself in issues such as stress, motiva-
As soon implementation is completed, its conse- tion, personal development, etc. This principle
quences become more evident, possibly indicating has both a social sub-system dimension and a
the need for a redesign. The Transitional Orga- technology sub-system dimension, in that both
nization principle addresses two quite distinct can be designed to reduce stress, and to enhance
problems when creating new organizations: one is motivation and personal development.
the design and start-up of new (greenfield) work- While these principles are extremely useful
places, the other relates to existing (brownfield) from the perspective of organizational design
workplaces. The second is much more difficult and technology redesign, there are a number of
than the first. In both situations the design team, limitations with respect to Enterprise Information
and the processes it uses, are potentially a tool to Systems. Specifically there is no explicit consider-
support the start-up and any required transitions. ation of, or an attempt to consider, business strat-
What remain from Cherns’ set of 11 socio- egy or the alignment between business objectives
technical design principles, is a sub-set that is and specific organizational characteristics. Nor
significantly technology oriented, although the is there any easy way to link specific features of
principles also have organizational implications. Enterprise Information Systems technology with
The principles in question are: Minimum Criti- organizational requirements. To some extent vari-
cal Specification; Variance Control; Design and ance analysis can contribute to this, but variance
Human Values. analysis does not specifically address technical
The principle of Minimum Critical Specifica- features and consider the organizational implica-
tion states that only what is absolutely necessary tions of these. Moreover, the sociotechnical ap-
should be specified, and no more than this, and proach is highly specialized, and the competencies
that this applies to all aspects of the system: tasks, to undertaken this approach are not commonly
jobs, roles, etc. Whilst this is organizational in found in businesses, both small and large.
319
Enterprise Information Systems
One method, related to the sociotechnical ap- • The determination of requirements and op-
proach, built upon the principles described above, tions for pay, promotion and organizational
and one that tackles the issues of competencies and structure.
technical features, is HITOP, which stands for the
High Integration of Technology, Organisation and The analysis thus provides a direct and
PeopleHigh Integration of Technology, Organiza- ordered consideration of critical technology,
tion and People (Majchrzak et. al., 1991). HITOP organization and people factors, and helps to
is a method that was designed to assist with the identify those factors which require in-depth at-
implementation of advanced manufacturing and tention. The analysis also provides an expanded
information technologies. The HITOP process al- insight into the total organizational and people
lows an analysis to be undertaken of organizational impacts of specific technologies, going well
and job-design implications of critical features beyond skills and training. Identification of
of proposed technologies. It then helps with the people and organizational cost drivers in tech-
identification of key task and skill requirements nology implementation is also another result
so that human resources can be properly planned of the analysis.
and developed to meet operational needs. HITOP allows alternative organizational
HITOP comes in the form of a workbook (Ma- designs and different ways for managing people
jchrzak et. al., 1991), that is in effect, an easy to to be specified, given specific technology plans.
read analysis manual, providing step-by-step guid- HITOP also provides guidance in determining the
ance, rationales for analysis, blank analysis forms, appropriate time for implementing technology
and worked examples. It covers a wide range of plans, and helps to identify those equipment and
issues and is based on a six-stage methodology. system choices that are likely to create the greatest
The first stage of the methodology involves mak- number of people and organizational problems, so
ing an assessment of organizational change:readiness that the implementation team is better prepared
forreadiness for change, which is followed, in the to deal with these problems.
second stage, by an assessment of the technology By performing HITOP analysis, guidance is
that is proposed, to identify its critical features. provided through an iterative, systems based pro-
The third step is an analysis of the essential task cess in which all the critical features of the orga-
requirements, which leads to an assessment of the nization, people and technology environment are
skill requirements. The fifth step is concerned with systematically assessed and all implementable op-
determining how people should be rewarded. The tions are identified. This enables the consequences
final step deals with designing the organizational of major decisions to be understood before those
changes that need to be achieved given the technol- decisions are implemented. As a result, surprises
ogy and people requirements, which leads to the downstream can be reduced and needed changes
generation of a specific implementation plan. The to the technology, the organization, or the people
HITOP design tool therefore provides: involved, can be identified.
Typical benefits of using HITOP include re-
• An assessment of organizational readiness duced implementation time, improved acceptance
for change; of technical changes, and better fit between chosen
• A definition of the critical technical fea- technologies, organizational designs, and people
tures of advanced technologies; skills. All these lead to lower implementation
• The determination of essential job require- costs and the faster delivery of benefits sought
ments, job design options, skills, training from the new technologies (flexibility, cost re-
and selection requirements; ductions, etc.).
320
Enterprise Information Systems
While this approach has many strong features, the HITOP approach has been strengthened, for
and is very good at identifying the organizational example by introducing strategic considerations
and people implications of specific features of the into the process. Also the method has been gen-
technology (called critical technical features), it eralized so that it is no longer just appropriate to
does have a number of limitations, which primar- manufacturing technologies.
ily reflect the context in which it was developed. The revised method that is being developed
Firstly, like the sociotechnical approach, HI- is based on a number of foundational principles.
TOP does not explicitly address strategy. In effect These reflect the circumstances often found in
this is taken as given, along with technical features, SMEs, but the foundational principles are also
and strategy remains invisible during the process. relevant to the needs of larger companies.
Moreover the focus of the HITOP reference The first of these foundational principles relates
manual tends to be on one person undertaking the to the basic approach or underlying philosophy
analysis necessary to figure out the organizational with respect to the balance between the use of
and people implications of a given technology. external and internal expertise. Any company
This is not to say that the method cannot be used engaged in technology implementation, whether
by a multifunctional, multiskilled team, just that this be the implementation of Enterprise Informa-
this team-based approach to implementation is tion Systems, or other technologies, can adopt one
not emphasized or supported in the manual. The of four basic approaches:
method was also developed in the context of large
organizations seeking to implement new technolo- • passive implementation;
gies in existing, rather hierarchical organizational • consultancy-centered implementation;
designs, and as a result the reference manual tends • sub-contracting based implementation;
focus on the implementation of technology, and • company-centered implementation.
tweaking the organization to make this work, and
the language used in the reference manual is rather A passive implementation approach is one
technical in nature. Consequently, it is not the most where no-one is really taking the implementa-
SME-friendly method. In fact, many businesses, tion seriously. Reliance on external consultancy
both large and small, would struggle to understand expertise is small and the development and use
the HITOP jargon used in the manual. of in-house know-how and capabilities is low. A
consultancy-centered implementation is one where
The HiSTOP Method there is a heavy reliance on external consultants
and the development and use of in-house know-
Whatever the limitations of HITOP it is neverthe- how and capabilities is minimal or non-existent.
less a power tool and provides a good starting posi- This is a traditional approach that relies on the
tion for further development. Such development use of external experts. A sub-contracting based
of the method has been undertaken with a view to implementation is one where a lot of external ex-
addressing its weaknesses and providing an even pertise is used, but the process also involves a high
more powerful implementation support tool, and level of development and utilization of in-house
one that also deals with the specific needs of SMEs. know-how and capabilities. Consultants are used
Specifically the focus has been upon making the as sub-contractors to undertake specific tasks and
method more user-friendly, so that it can be used to provide extra manpower. A company-centered
by people who are not experts in organizational implementation involved a high degree of develop-
design or technology implementation, thus making ment and utilization of in-house know-how and
it more suitable for use by SMEs. Additionally, capabilities. Consultants are used in a selective
321
Enterprise Information Systems
way, for example, to help set-up change processes that no-one understood, it would exclude just
and to provide facilitation or to provide specialist about everybody and few would believe in it or the
technical expertise. results that emerge. For these reasons, HiSTOP is
Practical experience suggests that firms being developed to be as simple as possible, but
implementing advanced ICT such as Enterprise without compromising the validity and the power
Information Systems are much more successful of the original HITOP method. One of the chal-
and do things faster if they adopt an approach lenges has therefore been developing a method
that involves a significant development and use that involves a lot of conceptual complexity, but
of internal expertise. In effect this involves com- at the same time, is one that is easy to use.
panies doing their own Enterprise Information The third foundational principle is that the
Systems implementations with external experts method should be a group-based process. Group
supporting the process The method entails training processes are considered to be fundamental to
and developing teams of employees to analyze successful implementation. The implementation
the technology, formulate new organizational ar- of technologies such as Enterprise Information
rangements, plan the implementation and manage Systems require cross organizational working
the changes. and understandings. As such, an approach based
A company-centered method has many ad- upon a small number of experts working in isola-
vantages over the other styles and is particularly tion tends to create an elitist atmosphere. Hiding
effective in terms of: behind questionnaires, audits, process mappings,
etc., experts working in this way rarely establish
• enabling culture change; a working dialogue and establish ownership of
• involving those affected by change and change. When implementing new technologies it is
achieving ownership of the proposed necessary to understand and value the process used
technologies; to implement the technology. Enterprise Informa-
• breaking down organizational barriers and tion Systems implementation is a real opportunity
improving cross-functional communica- to transform organizations–people, culture, at-
tions and understandings; titudes and so on. Moreover, the implementation
• identifying issues that need to be resolved process can be used to establish an environment
to make effective use of the technologies; where it becomes the norm to make better use of
• tapping into local knowledge about exist- the creativity and knowledge of all the people in
ing processes. the company. Using a group process it is possible
to achieve several things:
The second foundational principle adopted for
the development of the HiSTOP method relates • initiate real teaming and cross-functional
to the issue of complexity versus simplicity. It working;
is very easy to create complex and sophisticated • tap into knowledge about what is wrong–
implementation methods that are intellectually people already have a good idea about
pleasing, but this is not very helpful in an industrial problems;
setting. It is highly probable that few people within • open up a vast resource of new ideas;
a business would be able to understand a complex • start to unfreeze the status quo and to gain
method, and even fewer would be willing to use emotional commitment to change.
it. It would be an expert’s tool and as such would
be incompatible with the aim of providing support The fourth foundational principle is that the
for non-experts. It would be full of terminology implementation process should be a dynamic
322
Enterprise Information Systems
one. This means that the implementation team method should make formal links between features
should not spend too much time looking at the of the technology and features of the organization,
existing situation. Instead they should focus on human resource infrastructure and management
what needs to be achieved and then figure out how practices required to support the technology and
to get there and what problems stand in the way. to make effective use of it.
Many consultancy methods begin with a detailed The HiSTOP method will now be described.
analysis of the as-is situation (getting people to It consists of four phases:
fill-in questionnaires, undertaking detailed process
mapping etc). This takes a lot of effort, is pretty • Strategic Visioning and Assessment;
dull and is often not required in such detail. It • Analysis of the Technology;
leads to a lot of information that makes for good • Organizational Design;
consultancy reports, but its value in helping with • Implementation Planing and Execution
the design a new situation is questionable.
Normally it is not necessary to spend a lot of The first phase, Strategic Visioning and Assess-
time and money analyzing and diagnosing work ment, is the point where the strategic dimension is
processes that are about to abandoned or changed considered. At a basic level this involves: establish-
significantly. It is certainly necessary to understand ing and training an implementation group; verify-
the current situation, but the analysis that goes on ing the project benefits and links with strategy;
in most companies goes way beyond understand- and informing people in the organization about
ing. The aim should be to: the project, its business purpose, what is involved
and the process of implementation. This phase can
• use the group’s collective knowledge to also however be used as an opportunity to review
develop an understanding of the work pro- and revise strategy. Importantly also, this phase
cesses that are being used; provides an opportunity to consider the existing
• establish what in the existing work pro- organization design, and to ask questions about
cesses is broken and what needs to be fixed; its appropriateness to the strategy and to consider
• get everybody to reach a common un- what organizational changes may in themselves
derstanding of the as is situation, what is be beneficial, apart from those that might be
wrong and how the new technology will needed to achieve alignment with the Enterprise
help improve the work processes. Information Systems technology.
The second phase, Analysis of the Technology,
Without this common understanding people involves: establishing a common understanding
will not agree about what needs to be done to of the Enterprise Information Systems technology
use technologies such as Enterprise Information and the work process that are affected by the new
Systems, effectively. technologies; identifying major tasks involved in
The fifth and final foundational principle is that the work processes; analyzing variances and their
the implementation method should be structured, impacts; defining the features of the Enterprise
systemic and systematic. This is an important re- Information Systems technology; and establish-
quirement since structure provides a step by step ing organizational needs. This phase leads to a
roadmap to follow and activities to undertake. requirement specification in terms of technology,
Systemic means that the method should address organization and people.
the design of the whole system–technology, The third phase, Organizational Design, in-
organization, human resource infrastructure and volves: establishing organizational design con-
management practices. Systematic means that the straints and evaluation criteria; generating job
323
Enterprise Information Systems
and organizational design options; and evaluation • considering how the information aris-
of options and final selection of new jobs and an ing from the technology can be exploited
organizational design. This stage leads to an orga- throughout the firm.
nizational design that is aligned with both strategy
and the chosen Enterprise Information Systems The implementation of ICTs such as Enterprise
technologies. The organizational structure is Information Systems should aim to identify and
designed based on some identified requirements, deal with technology, organization and human
taking account of organizational design issues such resource characteristics that are mutually interde-
as differentiation, integration, decision structure, pendent. Technical features such as: information
and formalization (Majchrzak, 1992). integration; reliability; flexibility; often generate
The fourth and final phase, Implementation specific needs for communication, or coordination,
Planing and Execution, involves: establishing or problem solving, or decision making, or all four.
what resources are available and who will do what; It is important to recognize that ICT, and this
creating an implementation schedule; and defin- is especially so for Enterprise Information Sys-
ing post-implementation follow-up actions. Once tems, has a dual capability to both automate and
these elements have been defined the enterprise inform (Zuboff, 1988). The informing aspects of
is ready to move into actual implementation, but the technology are often overlooked or not given
will be doing so with the involvement and com- serious attention. Information generated can be
mitment of the different people and functions useful for several purposes:
affected by the implementation project.
Each of the above phases is broken down into • for continuous improvement activities;
smaller steps, and along the process there are tools • to support activities undertaken by people
that support the steps. in other parts of the company;
An important part of the four-phase method, • to build up information about customers,
specifically designed into the method, is the con- process usage, etc.
sideration of information and its use, something
that is crucial to Enterprise Information Systems. It is necessary when analyzing technologies
In many companies technology, organization and such as Enterprise Information Systems to ensure
human resources have been planned and managed that the informing capabilities of the technology
independently of each other. For example, an are being fully exploited and if necessary to
engineer might prepare detailed plans to acquire change the technical specifications or planned
new technology without simultaneously consid- use of the technology or both to ensure that this
ering human resource factors or organizational is achieved.
issues. A result of this independent, asynchronous A useful approach when analyzing Enterprise
planning is failure of the technology to live up to Information Systems is to consider issues of place
its potential. One objectives of the method is to and time. Features of the Enterprise Information
analyze the technology to establish what should be System may affect the place where activities can
done to make the technology work as planned by: or need to be done, or where people can or need
to be located, or where information generated can
• by identifying the requirements and prob- be exploited, or all three. Moreover, features of
lems of the technology; the Enterprise Information System may affect the
• developing an understanding of the organi- time needed to undertake activities, or the time to
zational and human resource consequence transfer generated information, or the time required
of the technology; to respond to events, or all three.
324
Enterprise Information Systems
325
Enterprise Information Systems
326
Enterprise Information Systems
327
Enterprise Information Systems
Ward, J., Hemingway, C., & Daniel, E. (2005). HiSTOP: High Integration of Strategy, Tech-
A framework for addressing the organisational nology, Organization and People
issues of enterprise systems implementation. The Integration: Bringing together enterprise
Journal of Strategic Information Systems, 14(2), subsystems to create an enterprise system fit
97–119. doi:10.1016/j.jsis.2005.04.005 for purpose. These subsystems include strategy,
technology, organization, and people.
Zuboff, S. (1988). In the age of the smart ma-
Strategic Fit: Aligning strategy, technology,
chine: The future of work and power. New York:
organization, and people with the needs of the
Basic Books.
business environment.
Strategically Driven Implementation: An
implementation of Enterprise Information Sys-
key terms And deFInItIons tems driven by strategy, as opposed to a technology
driven implementation where the business strategy
Alignment: The process of achieving stra- is not the primary driver for the implementation.
tegic fit between an enterprise and its business Structured, Systemic and Systematic
environment and arranging resources internally Implementation Method: An implementation
to support that alignment. method that provides a step by step implementa-
Business Objectives for Enterprise Informa- tion roadmap (structured), addressing the design
tion Systems: The specific business objectives of the whole system–technology, organization,
that should be made explicit prior to Enterprise human resource infrastructure and management
Information Systems selection, and which should practices–(systemic), and making formal links
be fully supported by the Enterprise Information between features of the technology and features
System. of the organization, human resource infrastructure
Critical Technical Features: Features of and management practices required to support
technology that have implications for organisation the technology and to make effective use of it
design, specifically in terms of communications, (systematic).
co-ordination, and decision-making.
HITOP: High Integration of Technology,
Organization and People
This work was previously published in Enterprise Information Systems for Business Integration in SMEs: Technological,
Organizational, and Social Dimensions, edited by Maria Manuela Cruz-Cunha, pp. 271-285, copyright 2010 by Business Sci-
ence Reference (an imprint of IGI Global).
328
329
Chapter 2.2
An Adaptive E-Commerce
Architecture for Enterprise
Information Exchange
Youcef Aklouf
University of Science and Technology, Algeria
Habiba Drias
University of Science and Technology, Algeria
Copyright © 2011, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
formats as product catalogs defined separately by architecture used for IT and semi-conductors
different organisations. content. The BP model of RosettaNet named PIP
EC systems are well-conceived to address (Partner Interface Process, RosettaNet, 2001c) can
these different issues, even when the multiples be used with other catalogues. ebXML (ebXML,
sources of information will cause heterogene- 2001a) is a horizontal model defined without any
ity of exchange (Tellmann & Meadche, 2003). relation to any product catalogues, it just describes
To ensure and exchange competitively between some specifications for BP, core component,
partners it will be necessary to have a new view registry, and all pieces required to implement a
about how we describe all concepts involved in global B2B system.
such interactions. As a result, a B2B system is built using the
The main concepts related to EC models are existing standards cited above by overcoming their
a BP concept and a content (payload or useful limits and sharing their different advantages. Also,
data) concept. These two pieces of information are the system will ensure interoperability, which is a
defined separately by each standard in a specific key issue in order to share several product catalogs
format. This article proposes an adaptive archi- with the same architecture. This is the main rea-
tecture that gathers product catalogues standards son why we propose in this article to use product
with EC standards in order to automate exchange ontology1 for characterizing product catalogs and
and purchasing operation. trying to define BP ontology for managing any
A number of standards try to define a global kind of transactions. Shared ontologies play a
and a generic architecture to consider large in- crucial role for supporting an adaptive architec-
dustry sectors and areas. The old one is the UN ture to save time and money and to increase its
initiative: Electronic Data Interchange for Admin- efficiency through B2B transactions.
istration, Commerce, and Transport (EDIFACT) This work aims to define an adaptive in-
(United Nations, 1999). The shortcoming of this frastructure using ontologies for the electronic
generation of approaches like EDIFACT is in the commerce, especially in the B2B framework. The
fact that they require a significant programming exchange of data, information, and knowledge are
effort from organizations to be able to use these the key issues. Two kinds of ontologies can be used
standards. Thus, the cost will is higher for this to improve exchange in such architecture. One
reason. EDIFACT has just been used by small addresses products and services characterization,
number of companies and was not allowed for whereas the other addresses business processes.
small organizations. To overcome this limitation We demonstrate the capability of integration of
and to close this gap in order to reduce cost and to these two kinds of ontologies in a unique and
improve quality of interaction and communication global B2B-layered architecture. The idea is to
between partners, new standards have appeared use several business process ontologies conjointly
in the same time with the development of the with several products ontology in order to ensure
Internet infrastructure. For example, there are reliability and feasibility of such exchange in
some e-commerce portals for online purchasing different ways.
and ordering product from online catalogues— In the first part of this article, we argue that
harbinger.net, mysap.com, verticalNet.com—in ontology for both BP and product is needed to
which transaction content specifications can be automate B2B exchange. In the second part,
rendered easily by standard browsers. In addition the proposed architecture and its three parts are
to XML and EDI initiatives (Westarp, Weitzel, presented. The third part describes the differ-
Buxmann, & König, 1999), a proprietary standard ent components of the system with an overview
(de facto) exists like RosettaNet which is a B2B of objectives and functionalities for each part.
330
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
Finally, the last part shows a case study of the a high operation, a cost project and it is a complex
developed platform using PLIB ontology and the process. According to this, different organiza-
Web services paradigm. tions and industries leaders must work conjointly
in order to drive B2B standards, to define both
content ontology and collaboration in its differ-
ontoloGIes For e-commerce ent implementations steps in order to reach an
ArcHItectures agreement about the shared ontologies.
Therefore, on top of the structure of the ex-
In spite of the promise that e-commerce holds, changed message, two kinds of knowledge need
most implementing organisations have not re- to be modeled and shared across all the partners
ceived the full benefits from their B2B invest- involved in B2B transactions: business process
ments. This is because they use their proprietary knowledge and product and service knowledge.
solutions (backend systems) for modelling BP Such shared conceptualizations are usually called
and for describing product catalogs. In addition, ontologies. Thus, two kinds of standard ontologies
this information doesn’t provide an agreement have to be developed: ontology of products and
among all participants. For this reason, a B2B services on one hand, and ontologies of business
e-commerce exchange requires some consensual processes on the other hand.
decisions about all data shared and all services With this motivation in mind, our objective
used in transactions. As suggested by several is to define a generic architecture allowing the
authors (BIC, 2001; Trastour, Preist, & Colemann, use of any BP interfacing it with any product
2003), it is necessary to have a meta-model that catalogs content. This model could be applied in
states the high-level architectural elements without several areas.
getting into details of their implementations. Such
a model will remain relatively stable over time,
even if technologies, standards, and implemen- tHe ProPosed ArcHItecture
tation details evolve. It also was allowed to split
the work and to select a best-in-class solution This section proposes an exchange model repre-
for each facet of the global system in order to be sented by a layered architecture (Aklouf, Pierra,
adaptive, to ensure scalability and to provide a Ait Ameur, & Drias, 2005) gathering the vari-
highly integrated organization. Ontology is being ous classes of information necessary to ensure a
used to define this global view as an abstraction completely automatic exchange between partners.
level sharing product catalogs and BP descriptions. This exchange model is inspired from several
Thus, product data and BP will be shared and have infrastructures proposed in the literature such as
a same description for all participants in order to ebXML (ebXML, 2001), RosettaNet (RosettaNet,
promote exchange between them. Ontology deals 2001a) OAGI (Randy, 2001), and so on. The model
with interoperability of business contents and of with its three layers is also called an integration
message exchanges among business systems of model within the company processes. This model
different enterprises. makes it possible to integrate processes remotely
If it is clear that ontologies are necessary to between several companies.
be integrated in e-commerce architectures (Mc- These processes can be industrial or logistic.
Guinness, 1999; Jasper, & Uschold, 1999), many Integration can require the installation of a work-
issues and challenges have to be addressed very flow system between organizations (Trastour et
carefully. The implementation of such system al., 2003). This business model has as main objec-
technology is also a key management issue. It is tives, the reduction of the coordination costs as
331
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
well as the reduction of durations of exchange of Figure 1 illustrates the architecture of the
goods and services. model with these three components.
The most categories of information (classes) This architecture allows exchange between two
identified by the model are summarized in the or several partners represented by the systems as
following: A, B ... Z, via interfaces between layers. These
interfaces provide services making it possible to
1. Information that allow a system to locate and deliver the necessary information to the adjacent
discover automatically a partner, which pro- layer. The three levels represent the three parts of
vides the service required by the consumer the system and can work conjointly to increase the
(like a specific search engine for companies automaticity of the B2B exchange model.
and services); The partner must give some technical solu-
2. Information about the supported business tions describing various measurements taken
process, gathering different steps to be fol- and standards chosen to adapt the company local
lowed during collaboration. This is defined system to support a communication with others
by several languages and protocols; partners. This requires on one hand, the exten-
3. Information describing products and ser- sion of the internal information system by tools
vices used in the exchange (products ontolo- belonging to these various levels and, in addition,
gies describe this category of information). the integration of these tools at the local level,
allowing each company to have a uniform global
332
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
system in accordance with the suggested B2B have an effective and a reliable exchange system
model (Aklouf & Drias, 2007). in which the integration of the companies is done
As stated previously, to carry out exchanges with lower cost.
between companies using this model, it is neces- The main objectives of this architecture are:
sary to develop the following points.
• The description of an infrastructure that pro-
• First, use the discovering layer (1) and have poses an intelligent module for discovering
the possibility to locate in an automatic way, and localizing partners who propose services
the company having the capability to answer and eBusiness catalogues: the most known
the requests with the customer requirements standards are UDDI (Dogac, Cingil, Laleci,
whatever their nature might be; & Kabak, 2002) and the ebXML registry.
• Then, once the localization of the partner is • The proposition of a business process ontol-
accomplished, a collaboration agreement is ogy model based on the existing standards
established by the layer business process (2). such as PIP of RosettaNet (RosettaNet,
This layer provides all steps to be followed 2001c), ebXML BPSS (ebXML, 2005),
and executed during the exchange; BPMN (Business Process Management No-
• Finally, the exchange can start with the use tation), BPEL (Business Process Execution
of a format of contents accepted by both Language), and so on.
actors (3). This supposes that a preliminary • And finally, the integration of the exist-
consensus on the nature and the representa- ing industrial catalogues of components
tion of the product catalogs of data exchanged describing objects or services from several
was established previously. industrial sectors. Among them we find,
RNTD, RNBD of RosettaNet (RosettaNet,
objectives of the Proposed 2001b), PLIB (ISO 10303-11, 1994), and so
Architecture on.
The objective of the suggested model is to set Our principal focus is on the definition of an
up an adaptive architecture which can be used open architecture allowing the integration of dif-
as a horizontal or a vertical system. A vertical ferent technologies and knowledge coming from
standard is a system which is specific to some heterogeneous communities. This architecture
kind of activities or some particular products. requires the modeling of business processes adapt-
For instance, RosettaNet is a standard specific to able to the needs and the requirements dictated
semiconductors and electronic information com- by the specificity of these exchanges.
merce. A horizontal standard is a general system
which defines exchange protocols and informa- Architecture Functionalities
tion formats without referencing any product or
service. The standard ebXML is an example of This model presents a set of useful functionalities:
a model which proposes generic and standard-
ized services for the most industry branches and 1. The possibility of adding new functionalities
which can be adapted to particular fields and to the system as a product catalogue model
contexts. This model provides also a collabora- or as a separately developed dictionary;
tive environment allowing industrial managers, 2. The possibility of managing applications
the consortia and the developers of standards, to and data locally or remotely;
work conjointly or in collaboration in order to
333
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
3. The factorization of a set of knowledge as calization might be, could publish its services and
standards and business rules useful for the find and localize in a dynamic way the required
various parts of the system; services. This vision is not yet materialized. There
4. The possibility of modifying the topology are, however, some concrete uses of standards
of the model, following the adoption of new such as UDDI and ebXML. Currently, it is about
standards or the implementation of a new a limited use within a restricted and controlled
tool (ensure evolution of the system – scal- framework: Intranets.
ability-); The fact of indexing the various services of-
5. The flexibility of the model accepting the fered by the same organization is mainly important
adhesion of new partners without modifying if this organization wishes that its services will
the architecture; be used and shared. The importance of having
6. the possibility offered by the loosely coupled a central directory is to guarantee discovery of
aspect of the model, which offers the pos- the services provided by organizations if they are
sibility to take into account competences published (it is like a specialized research engine
and tools proposed by partners in order to for organizations profiles and services). It is exactly
be used by the defined architecture (Aklouf the same case for a Web page which will not be
et al., 2003). visited if it is not referred to in a search engine.
In other words, this component makes it pos-
In the next section we describe separately and sible to determine how company information and
in more details each part of the system. services must be organized in order to allow the
community which divides this directory to have
discovering layer access. This directory or repository must provide a
general schema and each company must publish its
The first task which must be realized by the profile like its services according to this schema.
exchange system consists in finding the partners The repository must support the following
with whom to collaborate. This part of the system principles bases:
must provide exactly the required service and
the contact information about the supplier of • The access to the directory and the suggested
services. To satisfy this requirement, a repository schema is free, without control and limit;
(directory) containing business documents, data, • The access to the data directory is done by
meta-data and necessary mechanisms to research contextual research or through a hierarchical
and discover partners, must be developed. This keys organization;
module must be carried out with the collabora- • The management of the repository is ensured
tion of all partners involved on the development by one or more organizations;
of a technical specification making it possible to • The possibility of having broker space for
publish and retrieve information, the companies’ receiving submissions before the publishing
profiles and the provided services. and validating the data is offered. This space
makes it possible to correct and modify
objectives of the discovering information with some errors.
component
directory Functionalities
The initial goal of this module is to provide a
shared and universal place where each company, The directory must provide to the various com-
whatever its size, its sphere of activity and its lo- panies a set of functions and methods to ensure
the following functionalities:
334
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
1. Exchange messages and business docu- the information system. For this purpose, the
ments; integration of the various applications must be
2. Manage business relationships between implemented correctly.
companies; However, the objective is the piloting of the
3. Communicate data in a standard format; architecture of the exchange model by business
4. Define and save the business process; processes. This part of the model is fundamen-
5. Retrieve the ontology model defining the tal because it is the basis of autonomy and the
contents; agility given to the company in the evolution of
6. Download and install tools for manag- its information system. The assembly and the
ing the various existing ontologies. dismantling of the business functions are made
available to the users from the system without
business Process ontology layer having to call upon the usual supervision of the
technical managers of the information system.
Once the exchange partner is located, it is neces- The goal desired by including various tools
sary to agree on the various steps of the exchange and business process models in this layer is to
scenario from the business process. A business provide a generic and a flexible architecture.
process represents an ordered set of interactions. The characteristic of this multilevel model is in
Each interaction represents an atomic exchange the integrality and the homogeneity of the tools
of messages between partners (Tellmann & and methods which are provided to create the
Meadche, 2003). The emergence of business necessary business processes. These tools will
process modeling standards makes it possible to be discussed in the case study section.
create a rationalization of the analysis methods of
the processes and the creation of a community of business Process ontology
knowledge shared by all exchange actors. Functionalities
The description of the business processes must
be based on formalism and a clear method, which The functionalities of business process ontology
allow a real sharing of this knowledge by the vari- are described as follows:
ous actors (business or computer science). This
formalism must integrate a typology of process, a • Formalize collaborations and the dialogues
strategy of rigorous decomposition which allows between partners based on rules defined by
a homogenization and an optimal visibility of all the process model used;
levels of responsibility. A set of basic rules and • Increase the effectiveness and the quality
ways of making the tools, adapted to the contexts of the exchanges between partners;
of the company—for example, tools like UML, • Ensure interoperability between the vari-
XML (Peltz & Murray, 2004)—make it possible ous processes which reference the various
to answer effectively the customer’s requirements contents;
involved in such exchange. • Ensure the coordination based on the shared
resources. This is related to the scheduling
objectives of the bP ontology and the control of the shared resources (a
component resource is an informational entity handled
by the business process);
The role and all tasks of the company are rep- • Manage the choreography of the business
resented by a set of processes. These processes activities.
are in close connection with the components of
335
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
The goal of Web services is to achieve a uni- pany, and the other is shared by all the actors. This
versal interoperability between applications using last is called ontology in our case. Indeed, the
the Web standards (Randy & Hall, 2001). This is essential objective of the integration of ontologies
why they are basically integrated in the descrip- in the exchange model is to ensure a reliable and a
tion of business processes. Indeed, the automation consensual sharing and managing of data during
and the management of business processes were exchanges. This is provided by ontologies since
historically a difficult challenge for the companies they allow a mature product characterization by
because of the inflexibility of their data-processing ensuring a unique identification of the concepts
infrastructure. The Service Oriented Architecture and their attributes. This identification ensures
(SOA) provides this flexibility. It gives to the a non-ambiguous concept referenced by various
processes the necessary abstraction level for both partner’s applications. Thus, the model integrating
the definition and the execution of the process. ontologies will be characterized by the possibil-
The advent of SOA makes integration disappear ity of separating the contents from the container
as a distinct activity. (process) allowing a separate development on
each level in a flexible way.
content ontology
content ontology Functionalities
Once the partner is localized and the exchange
process well established and defined, it remains The layer which manages the contents specifies
to have a consensus on the data (catalogues of the structure and the semantics of the data as well
products) which will be exchanged. It should be as the refinement constraints and the composition
also guaranteed that the information used by the of the properties such as cardinality. Two types
various systems during exchange is interpreted of ontologies can be used:
without ambiguity.
The management of contents in general cov- 1. The business oriented ontology has as a role
ers, in the data-processing field, the set of steps the identification of the properties related
governing the life cycle of the documents available to the company business and is indepen-
on the information system: from their creation dent from any product or component. This
and validation to the management of the publica- information is necessary to achieve the
tion rules. Contents indicate any information and collaboration and the transactions between
knowledge of a company intended to be exchanged partners.
between several systems. More precisely, contents 2. The product oriented ontology represents
are all document, component, data which can useful information (payload) defining the
be involved as a part of the useful information object of exchange or the products catalogues
(Pierra, 2000). on which the transactions will occur. It is,
in general, a set of classes, properties and
objectives of the content ontology values domains (instances of objects).
The contents management in companies and The utility of this ontological level in the
organizations became a major requirement these exchange model is to provide a common knowl-
last years. From the architecture point of view, a edge sharing of the products used by the actors
content management system intended to be used of exchange and to make sure that the interpre-
by several heterogeneous infrastructures, requires tation of the data will be done in a correct and
two sub-systems, the first is backend to the com- non-ambiguous way.
336
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
The idea to separate the business contents The following sections describe in more detail
from the useful contents is not completely new. the several parts of the architecture.
RosettaNet uses this principle by proposing two
separated dictionaries, one representing the busi- ebxml registry
ness ontology (RosettaNet Business Dictionary
RNBD) and the other representing the products on- The ebXML registry is central to the ebXML
tology (RosettaNet Technical Dictionary RNTD) architecture (Kappel & Kramler, 2003). The
(RosettaNet, 2001b). Let us note that PLIB (Jasper registry manages and maintains the shared in-
& Uschold, 1999) can be used to define separately formation as objects in a repository. Repositories
these two types of ontology either separately or provide trading partners with the shared business
in the same dictionary. semantics, such as BP models, core components,
Once the three defined levels for the model and messages, trading partner agreements, schemas,
the functionalities and the objectives of each part and other objects that enable data interchange
are established, the integration of these different between companies. The ebXML registry is an
modules describes the global exchange model. interface for accessing and discovering shared
The following sections describe the technical business semantics. In this section, we explain
choices adopted and the proposals made for each the registry usages, the business semantic model,
level of the model. and the registry functionality including registry
classification, registry client/server communica-
tions, searching for registry objects, and managing
cAse study registry objects.
Our registry implementation is based on in-
Our work proposes the implementation and the formation in the primary ebXML registry refer-
realization of a B2B platform based on the three ence documents, including the “ebXML Registry
layers described in the previous section. The next Service Specification (ebXML, 2002b)” and the
step is to give answers to the three previously “ebXML Registry Information Model (ebXML,
outlined questions to design a practical solution 2002a).” In a marketplace populated by computer
implementing these different levels. companies with proprietary hardware, operating
First of all, in the discovering layer of our systems, databases, and applications, ebXML
system, gives business users and IT groups control over
their lives. The ebXML registry is not bound to a
1. An ebXML registry (ebXML, 2002b) is database product or a single hardware vendor. It is
developed for this level, in the business designed to interoperate on all kinds of comput-
process layer, ers. An ebXML registry serves as the index and
2. A Web service, based on the PIP2A9 Roset- application gateway for a repository to the outside
taNet BP for product information queries, world. It contains the API that governs how par-
is implemented, and finally, ties interact with the repository. The registry can
3. The content layer uses a PLIB model (ISO also be viewed as an API to the database of items
13584-42, 2003) with its various tools that supports e-business with ebXML. Items in
(PLIBEditor and PLIBBrowser) to search the repository are created, updated, or deleted
and to retrieve the product information through requests made to the registry.
content. Once this part of system is developed (Takher-
oubt & Boudjemai, 2004), the second task is to
define a model to describe business process ontol-
337
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
ogy in both conceptual and technical ways. Web RosettaNet aims to align the BP of supply chain
services are a new paradigm which is used to de- partners. This goal is achieved by the creation
scribe technical business processes (Speck, 2002). of Partner Interface Processes or PIPs. Each PIP
In the next section we give a short overview about defines how two specific processes, running in
this technology and a comparison with ebXML two different partners’ organizations, will be stan-
BPSS and a RosettaNet PIP in order to provide dardized and interfaced across the entire supply
a new model to be used by our proposed model. chain. PIP includes all business logic, message
flow, and message contents to enable alignment
Web service for the bP ontology of the two processes. RosettaNet defines more
layer than one hundred PIPs. The purpose of each PIP
is to provide a common business/data model and
Web services are modular, self-describing applica- documents, enabling system developers to imple-
tions that can be published and located anywhere ment RosettaNet e-Business Interfaces.
on the Web or on any local network. The provider The PIP studied in this article is the PIP2A9
and the consumer of the XML Web service do (Query Technical Product Information) (Roset-
not have to worry about the operating system, taNet, 2001c). The technical product information
the language environment, or the component is the category of information that describes the
model used to create or to access the XML Web behavioural, electrical, physical, and other charac-
service, as they are based on ubiquitous and teristics of products. There are numerous classes
open Internet standards, such as XML, HTTP of customers within the supply chain that need to
or SMTP. An initiative from Microsoft and IBM be able to access product technical information.
to describe the messages between clients and the These include distributors, information providers
Web server, WSDL (Web Service Description (such as Web portal companies, other commer-
Language) (Brydon, Murray, Ramachandran, cial information aggregators, and end-customer
Singh, Streans, & Violleau, 2004), describes and information system owners), engineering, design
defines Web services. It helps the user to set up a engineering, manufacturing, and test engineering.
system using a service ranging from connection As mentioned previously, our work proposes
details to message specification. a definition of a B2B architecture followed by
A WSDL document defines services as a set an implementation of this platform based on the
of network endpoints (ports) that is associated three technologies shown in the above sections.
with a specific binding. This binding maps a The next step uses these standards conjointly to
specific protocol to a port-type composed of one provide a secure, a reliable and an interoperable
or more operations. In turn, these operations are architecture. Each partner providing a service
composed of a set of abstract messages, represent- must affect a URL to its BP. This URL is stored
ing the data. The pieces of data in a message are in a registry (UDDI or ebXML registry). In our
defined by types. case an ebXML registry is developed for this
purpose (Glushko, Tenenbaum, & Meltzer, 1999).
rosettanet business Process The BP will be discovered and retrieved as a set
or a unique Web service. The activities that may
This section presents the mechanisms and the be undertaken during this step are:
approach used to design the Web service using
the BP from RosettaNet named PIP2A9. First, the 1. The use of a RosettaNet BP (in our example,
PIP2A9 role and tasks are introduced, then some the PIP2A9 is a BP for product technical
details about the matching between PIP2A9 and information query );
Web service are outlined.
338
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
2. The integration of PIP2A9 in the ebXML cess is defined by a set of documents exchanged
BP model; on collaborations. Collaborations represent PIPs,
3. The development of a Web service based on and the business documents define the contents.
the resulting BP. This model will be implemented using the Web
Services technology (see Web service section)
Integrating PIP2A9 in the ebxml according to the transformation realized as shown
bPss model the figure 3.
Figure 3 shows the description of the BP (part
The next task will be the integration of the re- A) as a Web Service via WSDL document (part
sulting PIP2A9 in the ebXML BP. This task will B). A PIP represents a document exchange as a
be achieved without any error if the mapping request/ response messages. Each communication
between RosettaNet PIP and the corresponding is described by a document which defines content
part of the ebXML BP is given correctly. A PIP for both request and response.
corresponds to a Binary collaboration or exactly
to a business transaction in the BPSS specifica- PlIb ontology in the content layer
tion. A business transaction in ebXML is defined
by a business transaction activity with document The third and the last level of our architecture is
flows exchange based in general on a request and the content layer. As shown previously, this layer
a response documents. Therefore, each PIP in the defines data and products information for which
RosettaNet model will be integrated in the BPSS the use of PLIB ontology model is proposed. PLIB,
model as a business transaction activity. Figure 2 the Parts Library standardisation initiative, was
defines an excerpt of a BPSS with a PIP example launched at the ISO level in 1990. Its goal is to
document. develop a computer-interpretable representation
Figure 3 shows how the integration is realized of parts library data to enable a full digital infor-
using ebXML and RosettaNet standards in the mation exchange between component suppliers
same process model. An ebXML Business Pro- and users. A PLIB data dictionary (ISO 10330-
Business Document
Description of exchanged Documents
Business Document
Description of collaborations
……..
Collaboration n RosettaNet (PIP)
339
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
(a) (b)
22, 1997; Shenck & Wilson, 1994) is based on sible to create and publish ontology (Shenck, &
the object oriented concepts (Coad & Yourdon, Wilson, 1994; Westarp et al., 1999).
1992): components are gathered in parts families PLIBEditor is a tool which allows users to
that are represented by classes. This set of classes define and to represent graphically and simulta-
is organised in a simple hierarchy of classes on neously a defined ontology and its instances. It
which factorisation/inheritance applies. Such is an application containing two parts on its user
classes are then, precisely described textually, interface, the left part (frame) allows the definition
with technical drawings. of classes, properties and relations between them,
Finally, each class is associated with a set of and the right part defines the ontology population
technical properties, also precisely described (instances). In another way, PLIBEditor defines in
(domain of values, possible measurement unit…). the same application, data and metadata of ontol-
A basic idea of the definition of a PLIB dictionary ogy. PLIBBrowser has the same role as PLIBEditor
is that properties and classes shall be defined si- but it has a Web oriented presentation.
multaneously: applicable properties allow defining
precisely a parts family, and conversely, a parts PlIb characteristics
family determines the meaning of the property
in its particular context. This section presents the three main characteris-
The modelling formalism used in PLIB is the tics that motivate the use of the PLIB ontology/
EXPRESS language (ISO 10330-11, 1994; ISO dictionary model in our infrastructure.
10330-22, 1997). The ontology model of PLIB is
formally defined and a number of tools have been Separation of Definitions and
developed to create, validate, manage or exchange Identifications
ontologies. They are available on the PLIB server
(http://www.plib.ensma.fr) at LISI/ENSMA. The Business partners or software involved in a B2B
basis of all these tools is a representation of on- transaction must have some common understand-
tology in a processable exchange format. It can ing of the various pieces of information they use
be exchanged in various automatically generated during an exchange. Therefore, descriptions and
formats: XML document (SimPLIB DTD), associ- definitions of each piece of exchanged information
ated possibly with XSL page (SimPLIBVIEWER), must be shared between the parties involved in the
EXPRESS physical file or DHTML document exchange. Otherwise, they cannot understand each
(PLIBBrowser). Finally PLIBEditor makes pos- other. PLIB ontologies allow partners to share and
340
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
use the same concepts without transferring their Axis uses WSDL2Java tool which generates a
description each time an exchange is performed. set of skeleton classes and interfaces. The latter
In order to allow this, PLIB separates objects and/ is used as containers for the developed Java code
or concepts identification from their description. of our specific Web service.
One can imagine what description that is local to Once the classes are increased with a PIP2A9
each partner may be, because it was exchanged specific codes (Brydon et al., 2004), a set of Java
earlier. Then, identifications need to be exchanged. Server Pages (JSPs) are developed to test the
service. The general schema of the developed
Universal Identification platform is shown in figure 4.
Since we use in our platform, the new database
One important characteristic of PLIB consists in model (OBDB) cited above, and in order to manage
providing a unique global identifier named BSU data, a new query language is required. The same
(Basic Semantic Unit) for each concept (class, team at LISI laboratory is currently developing a
property, etc.) of the ontology (Pierra, 2000). The new query language. It is named Ontology Query
BSU gives a unique worldwide identification for Language (OntoQL) (Jean, Pierra, Ait-Ameur,
each concept, class, and property, defined in the 2005) and a preliminary version runs on several
ontology. As a result, referencing these concepts OBDB implementations. Among these applica-
during exchange is unambiguous and easy. It is tions of OntoQL, we find the usage we propose in
not necessary to get the whole concept or object; our platform. Moreover, in our architecture, when
its BSU is enough to reference it. the customer tries to select products, he must cre-
ate a query to retrieve the required product. This
Orthogonality query is received and transmitted by our Web
service. The Web service we developed supports
Orthogonality results from universal identifica- this kind of query. To simplify the query creation
tion. Indeed, this concept leads to a total indepen- for the consumer, PLIBEditor has been extended
dence between the two upper level layers. One in order to support a user friendly querying user
may use any confusion of any business protocol interface. This extension allows a user to inter-
(PIPs from RosettaNet or ebXML BP) for the BP actively create the request.
ontology layer, together with any PLIB ontology For more details and comprehension, the sce-
(IEC 61360-4 for electronics components, ISO nario on the client side is described as follows.
13584-511 for fasteners, or ISO 13399 for cutting An interface creates the skeleton of the service
tools) for the products ontology layer. Thus, each implemented using the J2EE platform. It repre-
business process of the Business Process layer can sents a set of classes implementing the interface
use any dictionary of the product ontology layer of the Web service functions. This interface is
in its payload (McGuinness, 1999). responsible of displaying the results in a specific
format according to the specific desire of the cus-
tomer. In our case, PLIBEditor makes it possible
tecHnIcAl InFormAtIon to either create the OntoQL query or display the
results when returned from the server side. Notice
Based on the WSDL (Peltz & Murray, 2004) that the returned content is specific to the OBDB
document, several Web services will be designed model: a set of files representing the products
using the Jbuilder development environment in a PLIB defined format (EXPRESS format)
with the Enterprise version and Axis Box Tool (Schenck & Wilson, 1994). For other formats,
for managing all Web services (Heather, 2001). the customer either creates a specific interface or
341
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
uses its own proprietary existing applications for kinds of ontologies simultaneously in a business
data visualization (Hunter & Grawford, 2002). transaction enables a secure, automatic, and reli-
able B2B exchange.
Based on these two kinds of ontologies and on
conclusIon the standards mentioned above, a new architecture
is proposed. The use of ontology to describe con-
We conclude that many organisations are increas- tent provides a uniform representation of data in
ingly searching for mechanisms and methods to a common and shared format. Moreover, we have
achieve exchange of product catalogs and services shown how B2B architecture can be abstracted and
with minimal cost and without modifying their represented by an adaptive infrastructure based
local systems. Several architectures and standards mainly on three layers. These three parts define
try to accomplish this task both in horizontal and the major concepts required for exchange between
vertical situations. E-commerce consortia like companies. Furthermore, the article has shown
ebXML and RosettaNet are developing standards the need for having a common shared ontology
and initiatives in order to allow interchange of for Business Process used between partners. We
business information among information systems. have developed a Web service platform as ker-
Ontologies aim at providing a shared computer- nel for BP which was integrated to the proposed
sensible representation of domain knowledge, architecture in order to allow independence and
allowing exchange of semantic information across scalability.
heterogeneous systems. Our case study presents the possibility to in-
The article shows that in most exchange archi- tegrate in the same architecture several parts of
tectures, two categories of ontologies are used: several standards simultaneously. For example,
ontologies of products and services and ontolo- we have used ebXML and RosettaNet to design
gies of business processes. Involving these two the BP ontology, PLIB dictionary to describe the
342
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
content ontology and in the last part, the ebXML Dogac, A., Cingil, I., Laleci, G. B., & Kabak,
registry as a directory to localize and retrieve I., (2002). Improving the functionality of UDDI
services and data of partners. For the future, we registries through Web service semantics. Pro-
suggest developing a new collaboration model ceedings of 3rd VLDB Workshop on Technologies
(Khelifa, Aklouf, & Drias, 2008), to be added E-Services (TES-02), Hong Kong, China, August.
to the architecture based on the Grid Services
ebXML Registry Information Model Schema
technology and also studying the possibility to
(2002). Retrieved from http://www.ebxml.org/
integrate other ontology formalisms like OWL-S
specs/ebRIM.pdf
and DAML-S to our platform.
ebXML Registry Services Specification Version
2.1 (2002). Retrieved from http://www.ebxml.
reFerences org/specs/ebRS.pdf
ebXML. (2001). ebXML technical architecture
Aklouf Y. & Drias, H. (2007). Business process specification. May 11. Retrieved from http://
and Web services for a B2B exchange platform. www.ebxml.org
International Review on Computers and Software
ebXML. (2005). Business process team. Business
(I.RE.CO.S). Prize Worthy Prize.
Process Specification Schema v2.0 February.
Aklouf, Y., Pierra, G., Ait Ameur, Y., & Drias,
Gartner Group. (2000). OAGI: Fostering standards
H. (2003). PLIB ontology for B2B electronic
evolution or revolution?. A Gartner Advisory
commerce. 10th ISPE International Conference
Research Note, December 14.
on concurrent engineering: Research and Appli-
cations. Carlton Madeira Hotel, Madeira Island Glushko, R. J. Tenenbaum, J. M., & Meltzer, B.
– Portugal, July 26 – 30. (1999). An XML framework for agent-based e-
commerce. Communications of the ACM, 42(3).
Aklouf, Y., Pierra, G., Ait Ameur, Y., & Drias,
H. (2005). PLIB ontology: A mature solution Heather, K. (2001). Web Service Conceptual Ar-
for products characterization in B2B electronic chitecture 1.0, May 2001, IBM Software Group.
commerce. Special Issue: E-Business Standards.
Hunter, J. & Grawford, W. (2002). Servlet java
International Journal of IT Standards and
guide du programmeur, Edition O’REILLY.
Standardization Research, 3(2). IRMA& IGP
publishing. ISO 10303-11. (1994). Industrial automation sys-
tems: and integration — Product data representa-
BIC. (2001). XML convergence workgroup:
tion and exchange – Part 11: Description Methods:
High-Level Conceptual Model for B2B Integra-
The EXPRESS language reference manual.
tion, Business Internet Consortium, Version: 1.0,
October 5. ISO 10303-22. (1997). Industrial automation
systems and integration. – Product data repre-
Brydon, S., Murray, G., Ramachandran, V., Singh,
sentation and exchange– Part 22: Implementation
I., Streans, B., & Violleau, T. (2004). Designing
methods: Standard Data Access Interface.
Web services with the J2EE™ 1.4 Platform:
JAX-RPC, SOAP, and XML Technologies’. Sun ISO 13584-42. (2003). Industrial automation sys-
Microsystems, January tems and integration. Parts library– Methodology
for structuring Parts Families, ISO, Geneva.
Coad, P. & Yourdon, E. (1992). Object-oriented
analysis. , Englewood Cliffs, N.J.: Prentice Hall.
343
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
Jasper, R. & Uschold, M. (1999). A framework for RosettaNet. (2001). RosettaNet architecture con-
understanding and classifying ontology applica- ceptual model, July.
tions. In B. Gaines, R. Cremer, & M. Musen (Eds.)
RosettaNet. (2001). RosettaNet Implementation
Proceedings 12th Int. Workshop on Knowledge
Framework: Core Specification Version: Validated
Acquisition, Modeling, and Management KAW’99
02.00.00, July 13.
(16-21 October 1999, Banff, Alberta, Canada),
volume I, pages 4–9–1— 4–9–20, Calgary. Uni- RosettaNet. (2001). Specification: PIP Specifica-
versity of Calgary, SRDG Publications. tion Cluster 2: Product Information, Segment A:
Preparation for Distribution, PIP2A9: Query Tech-
Jean S., Pierra G., Ait-Ameur Y. (2005). OntoQL:
nical Product Information, Validated 01.01.01,
An exploitation language for OBDBs VLDB PhD
November 1.
Workshop, 29 Août 2005.
Schenck, D. & Wilson, P. (1994). Information
Kappel, G. & Kramler, G. (2003). Comparing
modelling the EXPRESS way. Oxford University
WSDL-based and ebXML based approaches for
Press.
B2B protocol specification. Martin Bernauer,
Business Informatics Group. Vienna University Spek, A.W.A. (2002). Designing Web services in a
of Technology, Austria. business context. Master Thesis, University of Van
Tilburg. Center of Applied Research, September.
Khelifa, L., Aklouf, Y., & Drias, H. (2008). Busi-
ness process collaboration using Web services Takheroubt, M., & Boudjemai, R. (2004). Etude
resource framework. To appear in Proceedings et Mise en œuvre du registre ebXML dans une
of International Conference on Global Business plate de commerce B2B. Master Thesis. USTHB
Innovation and Development (GBID), Rio de Algeria.
Janeiro, Brazil, January 16-19.
Tellmann, R., & Meadche, A. (2003). Analysis
McGuinness, D. L. (1999). Ontologies for elec- of B2B standard and systems. SWWS, Semantic
tronic commerce. Proceedings of the AAAI ’99 Web Enabled Web Services.
Artificial Intelligence for Electronic Commerce
Trastour, D., Preist, C., & Colemann, D.(2003).
Workshop, Orlando, Florida, July.
Using semantic Web technology to enhance cur-
Peat, B. & Webber, D. (1997). XML/EDI - The rent business-to-business integration approaches.
E-business framework, August 1997, Proceeding of the Seventh IEEE International
Entreprise Distributed Object Computing Con-
Peltz, C. & Murray, J. (2004). Using XML sche-
ference, (EDOC’03).
mas effectively in WSDL design. Proceedings
of the Software Development Conference and Westarp, F. V., Weitzel, T., Buxmann, P., & König,
Expo, March. W.(1999). The status quo and the future of EDI -
Results of an empirical study. In Proceedings of
Pierra, G. (2000). Représentation et échange de
the European Conference on Information Systems
données techniques, Mec. Ind., 1, 397-400.
(ECIS’99).
Pierra G., Dehainsala H., Ait-Ameur Y., & Bel-
latreche L. (2005). Base de Données a Base On-
endnote
tologique: Principes et mise en oeuvre. Appeared
in Ingénierie des Systèmes d’Information (ISI). 1
Ontology defines a shared conceptualiza-
tion. In the case of e-business, it provides a
Randy, E. H. (2001). W3C Web service position
conceptualization of the e-business concepts
paper from Intel. W3C Workshop, April 12.
344
An Adaptive E-Commerce Architecture for Enterprise Information Exchange
This work was previously published in Always-On Enterprise Information Systems for Business Continuance: Technologies for
Reliable and Scalable Operations, edited by Nijaz Bajgoric, pp. 277-293, copyright 2010 by Information Science Reference
(an imprint of IGI Global).
345
346
Chapter 2.3
A Structured Approach
to Developing a Business
Case for New Enterprise
Information Systems
Francisco Chia Cua
Otago Polytechnic, New Zealand
Tony C. Garrett
Korea University, Republic of Korea
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Structured Approach to Developing a Business Case for New Enterprise Information Systems
stages, compose the initiation phase. If the decision big picture of business case development in the
favours adoption, then the implementation phase article, The Role of Business Case Development
proceeds. In the context of implementing the new in the Diffusion of Innovations Theory for EISs
enterprise information systems, the stages in the (hereinafter referred to as The Role of Business
implementation phase consists of pre-production, Case Development...). The structure, suggested
production, post-production (that is, maintenance), in Table 2, delineates the context to the new en-
and confirmation stages. In summary, the busi- terprise information systems. However, prior to
ness case development is a means, and its end is that, certain issues must be addressed:
a business case document.
A complete business case is a formal written • What is the purpose of a business case?
argument and a detailed “point by point” analysis • What should a business case document
(Cannon, 2006, p 4; Carruth, 2001). It purports to contain?
justify the adoption or rejection of investing and • How should the business case be struc-
thereby, implementing the new enterprise informa- tured? How should it be written?
tion systems. The analysis takes into consideration
the stakeholders (Ministry of Health, March 2005),
especially the decision-makers and the end-users. tHe PurPose oF A
Consequently, a business case document is formal, busIness cAse
detailed, and complex.
Using the parlance of “diffusion of innova- A good business case must have a purpose that
tions” (DOI) theory (Rogers, 1962, 2003), a busi- is clear, specific, and relevant to the organisation
ness case document is a communication tool used and the upper managers. The Role of Business
to diffuse the new enterprise information systems, Case Development... mentions “growth and sus-
and to justify their adoption and implementation. tainability” as a strategic goal. That term is too
Diffusion refers to the process by which the execu- broad to be useful in a business case. A similar
tive sponsor, who owns the innovation-decision ambiguous construct is sustainable competitive
process of the new enterprise information systems, advantage (Hammer, 1996; Monczka, Carter,
communicates to the upper managers to get their Petersen, & McDowell, 2006, p 213). A single
approval of the project and funding. detailed statement is far more relevant to the
Diffusion via a business case document for organization than several broad statements. An
a technological product, such as an enterprise actual case study reveals one objective of selecting
information system, must be directed at a single and implementing a proven, up-to-date enterprise
target audience to be effective. The upper managers financial system. The chosen systems must have
represent a chasm that needs to be bridged (Moore, the capacity to meet likely future financial-related
1991). A completed business case document, requirements and growth. This vague objective can
containing relevant information for the managers, be made clearer by citing sustainable competitive
can serve as that bridge. advantages that are strategically valuable to the
In addition to its relevance, a business case organisation, taking into consideration certain
must also be responsible and credible. Therefore, guiding principles (Table 1).
the business case must bring relevance, reputa- Enterprise information systems are the en-
tion, and responsibility (the 3 Rs) into a number abling technologies that foster sustainable com-
of issues and challenges during its development. petitive advantages under certain guiding prin-
This chapter proposes a business case structure, ciples. Table 1 helps to develop the business case
with the 3Rs underlying it. It continues from the backward from the purpose, and includes ALL
347
A Structured Approach to Developing a Business Case for New Enterprise Information Systems
348
A Structured Approach to Developing a Business Case for New Enterprise Information Systems
Table 2. continued
Section Caption Remarks
O 2.2 Recommendations Which option has the executive sponsor chosen and why? The Recom-
mendations section (or the Proposed Project section) may attempt to answer
further questions such as: How does the executive sponsor propose to rally
the support, involvement, and usage? How does the executive sponsor
ensure success?
O 3 METHODS What are the contingency plans? How does the executive sponsor come
about the plan? How reliable is the evidence used to develop the Business
Case?
O 4 Facts and Assumptions This section may form part of the Introduction section.
O Strategic Vision Identify the strategic vision, the guiding principles, and sustainable com-
petitive advantages (Table 1). Assess the key strengths and weaknesses.
This may be incorporated under the future state of the Introduction section.
O Needs Analysis Describe briefly the needs and relevant issues. This section may be incorpo-
rated under the Gaps Analysis of the Introduction section.
O Options Analysis Describe briefly the options considered in this business case. This section
may be incorporated under the Proposed Solutions of the Introduction sec-
tion.
5 Financial Analysis How does the EXECUTIVE SPONSOR explore the sensitivity of key as-
sumptions in the analysis?
E Total Cost of Ownership (TCO) Combine the net present value, discounted cash flows, and total cost of
ownership in the financial analysis. Determine which option enhances the
value to the organisation and not which option has the lowest TCO. Make
sure to scrutinise all “hidden costs.”
E Business Risks How does the EXECUTIVE SPONSOR identify, assess, and resolve the
risks involved?
E 6 NonFinancial ANALYSIS What external factors drive the Business Case? How will the competitive
advantage, macro environments, and stakeholders (competitors, customers,
and vendors) impact the organisation? With what of key assumptions in the
analysis?
E Sustainable Competitive Describe in detail the innovation, its scope, its goals (the sustainable
Advantage(s) competitive advantages in Table 1), and the expected consequences. How
does the innovation fit into, for example, the seamless alignment or the
organisation’s strategy? How does the innovation enhance the competitive
advantage? How does it create the differentiation of the organisation from
its competitors? What is the “compelling reason” why the innovation must
be put into action? What value does the innovation provide?
E Macro environments
E Stakeholder Analysis St Gallen Management Model suggests two approaches. One is the “stra-
tegic stakeholder value.” The other is the “ethically critical stakeholder
value.” The former approach assumes that a balanced consideration of
the long-term interests of all stakeholders is the best way to maximise
shareholder value. The latter approach evaluates all potential stakeholders
equally toward “ethically justifiable legitimacy.” (Rüegg-Stürm, 2005)
E 7 The Proposed Project
Project Plan How does the project plan look like? What are the key milestones? How
abstract or detailed is the project plan? How does the project plan mitigate
the risks of occurrence of undesirable consequences (refer to Appendix A
section)?
The innovation-decision process How did the executive sponsor conduct the initiation phase? What is the
change strategy? How will the executive sponsor implement the new enter-
prise information systems? Reiterate the change strategy, costs, and risks?
349
A Structured Approach to Developing a Business Case for New Enterprise Information Systems
Table 2. continued
Section Caption Remarks
Project Participants How detailed has the Business Case been documented with regards to the
resourcing requirements (that is, the capacity and capability requirements)?
Specifically, what are the skills, experience, and time commitment required
of the project team? What are the skills, experience, and time commit-
ment required within the business after the completion of the innovation-
decision process? How does the executive sponsor propose to manage the
risks related to the resourcing requirements? How does the Business Case
take into account the additional resourcing required through and after the
implementation-decision phase?
E Appendix A UNDESIRABLE CONSEQUENC- Refer to Project Plan section above.
ES TO AVOID
E Appendix B REFERENCE SITES
Legend: E = Essential, O = Optional
the planning activities, resources, and metrics that extended social systems. The systems empower
are critical to the goal (Ministry of Health, 2005, the internal people in the organisation to provide
p 9). Recent research indicates that most success- the best performance with shared information
ful organisations have a crystal clear notion of systems. The systems help to identify and develop
the organisation’s strategy, and how deploying centres of excellence with resources and expertise
information technologies can help actualise that prior to outsourcing. The systems also maximise
strategy. return on information systems investment across
the organisation, maximise the exploitation of op-
A business case Is a portunities, and minimise the risk associated with
two-sided coin the new implementation. All these technological
advantages are about the innovation. However,
The purpose of a business case is to reflect the that is not the purpose of the business case, which
rigour of planning relative to the level of invest- is a reflection of the rigour on the innovation-
ment being undertaken (Ministry of Health, 2005, decision process.
p 3). This is one side of the coin. The other side
relates to justifying the innovation discussed.
On one side, there are sustainable competitive WHAt sHould A busIness
advantages or other reasons to justify the imple- cAse document contAIn?
mentation of the innovation. On the other side is
the purpose of the business case. Justifying the the scope and content of
implementation and matching the best fit pertain business cases vary
to the what and the why questions. Thinking about
the innovation-decision process and substantiating Not only must the business case contain the jus-
the process with the necessary rigour concern the tification of the innovation (what and why) and
how (and why) questions. In the context of the the rigour of the process (how and why), it must
new enterprise information systems, the specific be relevant to the stage of the innovation-decision
sustainable competitive advantage represents process at which it is written. A business case
the primary goals. The enterprise information written at the awareness stage (Stage 1) or match-
systems enable seamless integration (Table 1) of ing stage (Stage 2) differs in scope and content
information across the whole organisation and its with a business case written at the decision stage
350
A Structured Approach to Developing a Business Case for New Enterprise Information Systems
(Stage 3). For example, the Ministry of Health quence of strategically investing or not investing
(2005) of New Zealand has issued guidelines the chosen option (Weill & Ross, 2004).
for the investment in information technology. Its
business case development is composed of three managing risk and defining
stages equivalent to the three stages in the initia- undesirable consequences
tion phase: the strategic analysis, options analy-
sis, and completed business case. Respectively, Aside from the in-depth quality analysis, the busi-
the outputs are the needs and options analysis, ness case must identify important assumptions
both of which are part of the completed business (also referred in Figure 1 of The Role of Business
case document. Each output is a specifically dif- Case Development...). Risk-taking attitude, sus-
ferentiated business case. The needs analysis is tainable competitive advantages, organisational
a business case. So is the options analysis. The innovativeness, politics, cash flows, and total
needs analysis and options analysis represent a cost of ownership are examples of relevant as-
section in the completed business case document. sumptions.
The completed business case inevitably contains Risk is foremost to these assumptions. The
sections that correspond to the three stages of the implementation of new enterprise information
business case development. systems involves risk. How does the organisation
react to risk? The answer can be found in the or-
Analysis, depth, and Quality ganisations past actions.Risk-seeking, innovative
organisations exploit innovative opportunities
The keys to a successful business case are in-depth which have potential for big returns. Risk-averse
analysis and quality. A Risk-adverse organisation organisations are very late adopters of technology,
with an analytical bent will usually spend consider- and are less innovative. To risk-averse organisa-
able time and effort in fully understanding all the tions, the business case must mention similar
aspects and implications of any significant invest- implementations undertaken by competitors or
ment (Carruth, 2001, p 10). Too much analysis other organisations (refer to Appendix A section
is not cost effective. The content of the business in Table 2).
case must limit and highlight few but crucial Managing risk is simply gaining more power
aspects that impact the organisation. Implement- over the uncertainty brought about by the inno-
ing new information systems affect the operation vation-decision process. Borge (2001) suggests
and well-being of the organisation concerned. certain techniques to managing risk:
The question is: Which of these “effects” give
the greatest impacts to the organisation? Thus, • Being aware of the risks by defining, at the
there is a need to limit and highlight the critical start, the possible undesirable outcomes;
factors. The focus is, therefore, on the quality of • Knowing that taking deliberate action can
the information and the depth of analysis. Cannon increase the odds of desirable consequence
(2006, pp. 2-4, 194-252) suggests 29 analytical and decrease the chance of unexpected or
tools, such as balanced scorecards, cost-benefit undesirable consequences;
analysis, critical success factor, life-time cost • Weighing risks vs. benefits
analysis, risk analysis, sensitivity analysis, and
SWOT analysis. The amount of analysis carried Defining all possible undesirable consequences
out is irrelevant. In a good business case, the is easily overlooked or taken for granted because,
analysis must reflect the right depth of a critical as Borge (2001) puts it, there is no universal defi-
factor that impacts the organisation as a conse- nition of a bad outcome. Like the “new idea” to
351
A Structured Approach to Developing a Business Case for New Enterprise Information Systems
exploit, the “undesirable consequence” to avoid will be accountable for diffusing its usage in the
depends on the perspective of the people involved. organisation (Weill & Ross, 2004; refer to project
Therefore, the undesirable consequence must be ownership in the Introduction section of Table 2).
explicit in the business case. As mandated by the
Sarbanes-Oxley Act, the executive sponsor and nPv, dcF, and tco
the project team members should be able to see
the threat early, and understand them before they The net present value is an old measure that most
become clear and present dangers (Green, 2004). accountants and financial professionals rely heav-
Here is a last word on the risky business of ily on valuation to business decision making.
managing risk. The rigour of developing a business One related valuation method is the discounted
case is NOT minimising the risk. It is balancing cash flows (DCF) method. It estimates the current
risk with opportunity to create the best overall market dollar value of the new enterprise informa-
value (for details, refer to the concept of “value tion systems. Based on expected future cash flows
at risk” by Borge). and discount rates, the DCF value drives capital
budgeting and therefore, the innovation-decision
other Important Assumptions process. For organisations with positive cash
flows, the cash outflows for future periods can
The attitude to risk is not the only relevant as- be estimated with a certain degree of reliability.
sumption. There are other assumptions that need Another important concept is the total cost of
to be addressed and identified. For example, how ownership, or TCO for short. The traditional notion
do new enterprise information systems foster of cost is the money paid in exchange for tangible
seamless alignment in the organisation? How does and intangible projects or services, where costs
the proposed implementation fit into the organi- can be either direct or indirect. Before making the
sation’s strategy? Table 1 has suggested certain adoption decision, a capital budgeting analysis will
sustainable competitive advantages. Therefore, be required. It involves breaking down the amounts
how does the business case describe in detail the to be paid. For example, with the enterprise in-
innovation, its scope, its goals (the sustainable formation systems, the acquisition costs include
competitive advantages), and its objectives (the initial software, hardware, installations, training,
expected consequences)? configuration, supporting, and consultation costs.
Corporate culture, specifically the power Other cash outflows are used for maintenance,
structure mentioned in the conceptual framework further training requirements, modifications, sup-
of The Role of Business Case Development..., is ports, and upgrades (Cua & Theivananthampillai,
another basic assumption. A business case may 2006; Piedad, 2001). The initial acquisition cost
rely more heavily on the opinions of the execu- represents a capital expenditure. The subsequent
tive sponsor or any other leaders with powerful ongoing costs are operating expenditures. These
opinions. The mention of the “power” person or so-called operating “expenses” accumulate over
people gives credibility (or reputation, the second time, and equate to at least a third of the initial
R) and responsibility (the third R) to the business acquisition cost (Schweitzer, 2003). They must be
case. If the business case is to diffuse successfully, included in the total cost of ownership, otherwise,
the premise of the corporate culture dictates a they will become hidden costs.
disclosure of ownership of the implementation. Combining the net present value, discounted
Furthermore, IT governance essentially involves cash flows, and total cost of ownership, give to
stating who is the executive sponsor who is financial analysis the much needed context as to
responsible to making the IT decision and who valuation, strategy, finance, and corporate gov-
352
A Structured Approach to Developing a Business Case for New Enterprise Information Systems
ernance (Morin & Jarrell, 2001). There is one the various stakeholders. Some stakeholders are
caveat. TCO is like air. Its absence is fatal, but it the conditions to success. Others affect the creation
must remain discreet and in the background when of value. The purpose of stakeholders analysis is
present. Although determining the lowest TCO is to maximise shareholder value in the longer-term
good, deciding on the option with the lowest TCO (Morin & Jarrell, 2001; Rüegg-Stürm, 2005).
puts emphasis on minimising the cost through
TCO. It is, therefore, not wise. Instead, the ques-
tion to ask is not which option has the lowest structurInG And WrItInG
TCO? Rather, which option enhances the value tHe busIness cAse
to the organisation (Cua & Theivananthampillai,
2006; Morin & Jarrell, 2001)? Using a business report format, the business case
(Table 2) identifies the gaps between the expected
Planning for the Past, future state and the present state (Section 1). The
Present, and Future conclusions on the business case, together with
the recommendations, follow in Section 2. Subse-
In DOI, the innovation-decision process develops quent sections are the methods (Section 3), facts
along a normal course. Imagine the whole project and assumptions (Section 4), financial analysis
as a life cycle consisting of the two major phases (Section 5), nonfinancial analysis (Section 6), and
(the initiation and implementation phases) with the implementation plan (Section 7).
several stages in each phase. The completed As business cases are complex, the executive
business case (the third type of the business case) summary becomes the most important part of the
occurs in the decision stage of the first phase, and business case. Pugh and Bacon (2004) emphasise
effectively links the initiation phase to the imple- the “executive treatment,” and suggest several
mentation phase. Thus, a completed business case approaches of diffusing the innovation via the
must contain the story of the past (what was done executive summary. The upper managers are busy
in the awareness stage and matching stage), the people. They have time to read a summary but
present (the available options and critical factors not an entire proposal. They also have a crucial
to make the decision), and a preview of the project role in the final decision and therefore, they will
management (Nokes, Greenwood, Major, & Good- form their “attitude” towards the business case
man, 2004) with regards to the implementation of in three quick steps: the executive summary
the new enterprise information systems. (first step), the introduction (the second step),
and the conclusions and recommendations (the
nonfinancial Factors third step). By the third step, they usually have
an idea whether or not the executive sponsor has
Other than the sustainable competitive advan- undertaken the necessary rigour in developing the
tages, there are other nonfinancial factors, such business case, and whether or not the business
as the macro environments and the stakeholders. case is worth investing.
These are two of the six categories under the St
Gallen Management Model (Rüegg-Stürm, 2005).
The macro environments are particularly useful conclusIon
in weighing the external circumstances that can
impact on organisation’s growth and sustainability. The key points in the business case are the 3Rs
Organisations often define their success by the (relevance, responsiblity, and reputation) of the
degree to which they are able to meet the needs of strategic value of the new enterprise information
353
A Structured Approach to Developing a Business Case for New Enterprise Information Systems
systems. What value impacts the organisation the Green, S. (2004). Manager’s guide to the Sar-
most? With the relevance brought about by the banes-Oxley Act: Improving internal controls to
strategic value come the in-depth analysis and the prevent fraud. New York: John Wiley & Sons.
quality (not quantity) of information. The project
Hammer, M. (1996). Beyond reengineering: How
ownership in Section 1 and the stakeholder analy-
the process-centered organization is changing
sis in Table 2 concern responsibility, crucial to
our work and our lives. New York: HarperCollins
Sarbanes-Oxley Act and corporate/IT governance.
Publishers, Inc.
Project ownership sets accountability for the deci-
sion and diffusing the usage of the new enterprise Ministry of Health. (2005). Business case guide-
information systems. Stakeholders’ analysis sets lines for investment in information technology.
the social responsibility. The rigour of the busi- Wellington, New Zealand.
ness case development foster a mindset that the
Monczka, R. M., Carter, P. L., Petersen, K. J., &
organisation is able to fully consider risks, and
McDowell, C. P. (2006). Project 10X: The value
that the organisation is able to mitigate the risk
proposition and strategic impact to sourcing
concerned with the initiation and implementation
and supply effectiveness. In J. H. Cavinato, A.
of the new enterprise information systems. The
E. Flynn, & R. G. Kauffman (Eds.), The supply
reputation of the organisation is at stake in this
management handbook (7th ed.) (pp. 209-232).
instance.
New York: McGraw-Hill.
Lastly, the proposed structure in Table 2 is a
blueprint, but should not be used as a boilerplate. Moore, G. A. (1991). Crossing the chasm: Market-
ing and selling disruptive products to mainstream
customers. New York: HarperCollins Publishers.
reFerences
Morin, R. A., & Jarrell, S. L. (2001). Driving
Borge, D. (2001). The book of risk. New York: shareholder value. New York: McGraw-Hill.
John Wiley & Sons, Inc. Nokes, S., Greenwood, A., Major, I., & Goodman,
Cannon, J. A. (2006). Making the business case: M. (2004). The definitive guide to project manage-
How to create, write, and implement a success- ment: Every executive’s fast-track to delivering on
ful business plan. London: Chartered Institute of time and on budget. New York: Financial Times
Personnel and Development. Prentice Hall.
Carruth, B. (2001). Develop a successful busi- Piedad, F. (2001). Total cost of ownership: Prin-
ness case for board approval. Wellington, New ciples and practical applications. Retrieved 17
Zealand: Institute of Chartered Accountants of April 2006, from http://www.phptr.com/articles/
New Zealand. printerfriendly.asp?p=24404
Cua, F. C., & Theivananthampillai, P. (2006). Value Pugh, D. G., & Bacon, T. R. (2004). Powerful
management of sourcing decisions: The cost of proposals: How to give your business the win-
ownership in performance management systems. ning edge. New York: American Management
Paper presented at the Pacific Asian Consortium Association.
for International Business Education & Research Rogers, E. M. (1962). Diffusion of innovations.
(PACIBER) 2006, Cebu, Philippines. New York: The Free Press of Glencoe.
354
A Structured Approach to Developing a Business Case for New Enterprise Information Systems
This work was previously published in Encyclopedia of Information Science and Technology, Second Edition, edited by Mehdi
Khosrow-Pour, pp. 3600-3607, copyright 2009 by Information Science Reference (an imprint of IGI Global).
355
356
Chapter 2.4
Extending Enterprise
Architecture with Mobility
Ming-Chien (Mindy) Wu
University of Western Sydney, Australia
Bhuvan Unhelkar
MethodScience.com & University of Western Sydney, Australia
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Extending Enterprise Architecture with Mobility
by mobile Technologies (Unhelkar, 2006; Barnes, EA (Linthicum, 2000). While EA has successfully
2002). Furthermore, mobility extends the ability managed to integrate these various technologies
of the organization to create dynamic intercon- used by the enterprises (such as Internet-based
nections, in real time, between various parts of its application, reusable components, security and
information networks. This ability to dynamically database components), enterprises are now seek-
interconnect various parts of its data and informa- ing to capitalize on the MT. This has resulted in a
tion through mobility results in “correlations” that need to further extend and integrate mobility into
provide new insights to the organization’s deci- the EA. MT is a significant emerging technology
sion makers and enhance their decision making. that has the potential to influence various organi-
Thus, a Mobile Enterprise Architecture (M-EA), zational applications (Unhelkar, 2005), in addi-
through location-independence, provides greater tional, impact EA as they are technologies without
opportunities for business information systems wires with the ability to communicate through a
to create these dynamic correlations, resulting multiplicity of hand-held devices. The advantage
in greater business advantage than information of mobility comes from its ability to overcome
exchanges over land-based Internet and other “time and location” boundaries that would enable
communication mechanisms. Thus, the objective enterprises to operate effectively real-time respond
of this chapter is to outline a comprehensive frame- to the ever-increasing changes on this competi-
work for incorporation of mobile technologies tive marketplace. The need, therefore, to have a
in an organization’s Enterprise Architecture that comprehensive EA that would enable delivery of
would provide it with competitive advantage. This services to the “location independent” market has
framework is based on the literature review and grown. Along with that need is the need to have a
initial modeling carried out by the lead author at the formal process to incorporate and extend the EA
Mobile Internet Research and Applications Group with mobility. This chapter outlines the process
(MIRAG) at the University of Western Sydney. of enabling such extension and incorporation of
Later, the framework is validated by case studies mobility in EA.
and action research in multinational organizations.
Initial findings suggests an “all encompassing”
approach to MEA in business that considers the enterPrIse ArcHItecture
business processes as well as the social aspects overvIeW
of mobile technologies, is likely to ensure greater
success, as against a pure technical approach. enterprise Architecture background
357
Extending Enterprise Architecture with Mobility
systems that may have been created using differ- prise Solution Architecture (ESA), and Enterprise
ent programming languages, databases, and may Technology Architecture (ETA). Enterprise Busi-
be operating on different technology platforms. ness Architecture (EBA) defines the enterprise
Ross et. al. (2006) and Cook (1996) all state EA business model, process cycles and timing; also
allows integration and coordination across whole shows what functions should be integrated into
enterprise, including internal and external enter- the system. Enterprise Information Architecture
prise. So, in Figure 1 this research extends the (EIA) focuses on the data along with the corre-
original idea to integrate not only IS, but also the sponding data models that should be integrated
people, data, processes, applications, platforms, into the system. Enterprise Solution Architecture
and middleware all should be integrated into EA. (ESA), also referred to as an application selection
This integration makes EA could provide best which is the collection of information systems sup-
solution of internal enterprise. Additionally, ap- porting EBA, which also helps the user to easily
plications of other businesses, which are external understand and use the interface and components.
enterprise users, include the customers, partners, Enterprise Technology Architecture (ETA) is a
suppliers, or all members in a supply chain should consistent set of Information Communication
be enabling to see a unified view of the EA as well. Technology standards and selection of technology
This internal and external enterprise architecture device, which uses technology infrastructures to
integration is the blueprint solution for different support EBA, EIA, and ESA.
generation information systems that already exist EBA focus on the integration of business in-
and / or future applications coordination. formation systems and how the business processes
run. EIS considers on data storage, ESA focus on
enterprise Architecture definition supporting people to easy understand and use,
and ETA collects the technology devices, appli-
Enterprise Architecture represents the enterprise’s cations, middleware, platforms, and standards to
key business system, information/ data, applica- support all the others. Based on it, EA (Figure 2)
tion, technology strategies and their impact on in this research has been defined as a structure of
business processes also the users. META Group integrating business processes with IT supported,
Inc. (2006) and VITA (2006) both demonstrate by providing a visualization enterprise solution
that EA consists of four key components, which of the relationships among the System, Process,
are: Enterprise Business Architecture (EBA), People, and Data in an organization.
Enterprise Information Architecture (EIA), Enter-
Figure 1. EA integrates several generations of EIS (Extended from Kamogawa and Okada, 2004)
358
Extending Enterprise Architecture with Mobility
359
Extending Enterprise Architecture with Mobility
360
Extending Enterprise Architecture with Mobility
city with online access via their mobile devices APPlyInG mobIlIty to
or computers. enterPrIse ArcHItecture
361
Extending Enterprise Architecture with Mobility
in EA to provide the enterprise to have M-service simple figure provides a visualization of the
and M-store. The enterprise can provide 24 hours, M-EA integrating System, Process, People, and
7 days, globalization service and any product Data in an organization in a manner that enables
enquire or technical support to the customers. easy incorporation of Mobile Technologies in its
Inter-organizational integrates all process between business processes. As MT integrates into EA,
extended enterprises, such as supply chain and business processes and IS will have to be reen-
customer relations systems. MT help to upgrade gineered. Following on from the changes to the
the traditional supply chain to Mobility Supply systems and processes, people also need to know
Chain Management (M-SCM), traditional CRM how to use the system to operate the process. As
to Mobility Customer Relationship Management well as the data need to be changed to be adopted
(M-CRM) (Lee, 2006) and trading procurement the new system functions. Therefore, the new M-
to Mobility procurement (M-procurement). This EA model will have to handle these four aspects
research looks at these extensions and integrations of an EA as they have a major impact on the way
in greater brief detail considering capabilities of an organization functions.
MT; moreover, these kinds of extensions and
integrations will also bring EA to Mobility - En- Applying mobile technology
terprise Architecture (M-EA). to enterprise Architecture
The time and location independence of
mobility open up tremendous opportunities for Mobile technology is very user centric and per-
organizations to offer integrated services to their sonalized. For example, the mobile phone is clas-
clients and partners. M-EA brings about not only sified as a necessary gadget for most individuals
internal integration but through extension, also in the 21st century. The uses of mobile devices are
offers much more efficiency to its external sup- very popular specifically with the application of
pliers, customers and other trading partners over 3G Mobile network technology. Mobile network
the Internet. Thus, M-EA will connect existing technology provides better service and real-time
and new systems to enable collaborative opera- response communication between business and
tion within the entire organization in real-time – consumer of EA. Some mobile devices have
providing access among systems on production started to provide with Bluetooth device from last
planning and control, inbound and outbound two years. Bluetooth technology is synchroniza-
logistics, material flows, monitoring functions, tion between a personal computer (PC) server
and performance measurements (Rolstadas and and one or more other mobile terminals (Shuaib
Andersen, 2000). However, EA with mobility and Boulmalf, 2006); Synchronization has been
has the challenges of security, privacy, computing particularly successful in cooperative applica-
power and usability. Our project aims to identify tions, providing access to EA. WiMax can help
these challenges, understand and document them, EA integration much more effectively and update
and work out strategies to handle them, resulting unanimity between all retailers of enterprise. The
in successful EA with mobility. An integrated EA general intra-organizational M-EA application
with mobility will provide immense benefits to integration can use WLAN technology to provide
organizations in extending their business IS to all the employees to access the enterprise system
beyond the organization’s boundaries. anytime, anywhere. VoIP technology helps EA
The literature review conducted as part of to extend the globalization business and also
this study provides a better understanding of the overcome the purchase timing problems though
problem. This problem is the gap between IT different countries. In addition, Hurster et. al.
and IT supported and integrated with MT. This (2006) pointed out that GPS devices and RFID
362
Extending Enterprise Architecture with Mobility
tags and readers have already used on SCM base, The technologies of Web Services build on
systems to improve delivery service and track- top of eXtensible Markup Language (XML), Web
ing production location. RFID Technology helps Services Description Language (WSDL) and
highly location-based tracking, reduces the cost Universal Description, Discovery and Integration
and human-mistake risks, also improves the effec- (UDDI), provide an excellent basis for integrating
tively and efficiency of EA (Schilhavy and Salam, the applications of the enterprise – particularly
2006). Consideration of these six MT is important when they are on separate platforms. There is a
in the exercise to integrate EA – particularly as need, however, to provide wireless glue to EA as
the technologies self as well as their applications outlined here. This would result in strategic in-
are maturing rapidly (Ghanbary, 2006). corporation of apply MT into EA starts on an
Figure 4 shows the integration of mobile enterprise repository which is a comprehensive
technology into enterprise technology architecture system containing all applications and the enter-
by describing it as “Mobile Enterprise Technol- prise model. People can reach the system using
ogy Architecture”. The lower part of the Figure the Internet though the native API/ XML, web
4 demonstrates how the application service and forms, and web service. They can use their mobile,
information/data storage go through the enterprise some with Bluetooth headphone, GPS, PDA,
bus or middleware cooperation. This transfer is portable computer (laptop) though service pro-
a basis to help business processes orchestration vider (WAP), or wireless Hub (HTTP) to connect
reengineering. Moreover, the new processes are with enterprise repositories to access the enterprise
the basis of integration different generation of information systems.
enterprise information systems. The most popular The implementation of M-EA should use
four enterprise information systems are SCM “Current” and “Target”, “As-is” and “To-be”
system, CRM system, ERP system, and financial framework to identify the clearly process migra-
(FI) system cooperation within enterprise archi- tion plan from current different generation EIS to
tecture. RFID technology could specifically sup- the Enterprise target dream architecture - M-EA.
port the SCM system to help tracking the location The manner in which this IT and mobile technol-
of the materials and products. This underside ogy incorporation takes place successfully is
section includes the M-EA business process, studied here through the framework outlined in
system, and data structure. People can hold vari- the migration plan table. Table 1 is a migration
ous mobile devices through mobility server and table plan which lists information system life-
access web service to connect to Internet portal, cycles including description, analysis, design, and
including web and mobile portal to run those implementation plan (Irani et. al., 2003) of current
business process, system and access through data state of enterprise, and desired target state M-EA
363
Extending Enterprise Architecture with Mobility
of enterprise. Firstly, go through people, process, analysis documents of which IT and MT infra-
system, and data migration after applying mobile structures could be extended with current EA as
technology integration to have four M-EA migra- target M-EA opportunities. After the meeting, the
tion plan tables. Then combine and cooperation research team will construct the current EA dia-
these four tables to have the M-EA migration plan grams, also the target M-EA diagram to show
to look down the blueprint of whole structure. how the MT integration to new M-EA can be
Firstly, the research team looks through the matched the enterprise expected extension. More-
enterprise current enterprise information systems over, these diagrams will have be modified through
to understand the key factors of each aspect, and the enterprise meeting to decide which MT ap-
fill into the description section. Then making the plication opportunities they would like to integrate
platform and interoperability diagrams from exist- into their M-EA and how the implementation
ing enterprise information systems to show the processes will be considered. All of the diagrams
reserve assessment indicator for target state. Fol- and documents will be analysis the critical success
low by, the research team sets up a meeting with point to enter into the migration plan table of each
enterprise team to show diagrams and analysis aspect, and then combine them into the compre-
those assessment indicator results and make the hensive M-EA migration plan table.
364
Extending Enterprise Architecture with Mobility
365
Extending Enterprise Architecture with Mobility
ing risk identification and risk planning measures This research envisages continuing effort in
could help to overcome some risks (Ghosh, 2001). the future to enable the researcher to validate the
A possible solution is to build security measures M-EA model. This research currently undertakes
into mobile platforms and applications themselves. case studies and action research in various orga-
Base on above, security is the important part that nizations in practice that will enable validation of
has not been considered in this research. CLEW the initial M-EA model. The initial action research
(Closed Loop Environment for Wireless) is a new suggests enterprises can benefit with the help of
mobile-based technology designed by a company M-EA through its step-by-step framework for
called Alacrity Technology based in Canberra, extending and integrating the existing EA. Further-
Australia (http://www.alacritytech.com.au/). This more, the key factors influencing the construction
technology improves the security of using mobile and collaboration of mobility into the EA of these
technology, and this company- Alacrity is the first organizations; and also the key organizational
action research company of this research project, benefits and challenges of implementing M-EA
aims to improve M-EA security. CLEW technol- model to enterprise are also been focused on in
ogy is introduced as an Intelligent Mobile Internet nearly future.
Interaction (Tatham, 2006). CLEW is more secure
than SMS message, and also records the replies
from the receiver. Messages sent out by CLEW to reFerences
recipients are authenticated by the recipients by
signing off with a password. Therefore, it is much Barnes, S. J. (2002). The mobile commerce value
more secure than SMS, and also if the recipient chain: analysis and future development. Interna-
does not sign off, the backend systems of CLEW tional Journal of Information Management, 22(2),
can send out messages to other pre-agreed people 91–108. doi:10.1016/S0268-4012(01)00047-0
in a list agreed upon with the organization until Burness, L., Higgins, D., Sago, A., & Thorpe,
it schedules the required number of personnel. P. (2004). Wireless LANs – present and future.
Mobile and wireless communications: Key tech-
nologies and future application. British Telecom-
conclusIon And munications Plc.: The IEE.
Future dIrectIon
Buttery, S., & Sago, A. (2004). Future application
This chapter outlines the importance of M-EA of Bluetooth. Mobile and wireless communica-
model as a means of identifying integration chal- tions: Key technologies and future application.
lenges and providing that integration between British Telecommunications Plc: The IEE.
various applications and technologies within the
Cook, M. A. (1996). Building Enterprise Infor-
enterprise. Moreover, this chapter also provides
mation Architectures- Reengineering Information
an overview of EA, MT and applications of M-
Systems. Prentice-Hall, Inc.
EA. This research argued that MT needs to be
integrated with the overall EA and the business Cummins, F. A. (2002). Enterprise Integration:
processes of the enterprise. Such integrated would An Architecture for Enterprise Application and
result in M-EA, it has been identified that would Systems Integration. Canada: Willey Computing
enable the enterprise to conduct business across Publishing, John Wiley & Sons, Inc.
the location and time boundaries. Thus, an inte-
grated M-EA is a powerful tool to help manage
the enterprise’ operation.
366
Extending Enterprise Architecture with Mobility
Film Victoria Australia. (2006). iSH MEDIA. Irani, Z., Themistocleous, M., & Love, P. E. D.
Digital Sanbox Seminar Film Victoria, June (2003). The impact of enterprise application in-
2006. [online]. Available: http://film.vic.gov.au/ tegration on information system lifecycles. [Else-
resources/documents/S2_speaker_Kylie_Robert- vier Science.]. Information & Management, 41,
son_powerpoint.pdf 177–187. doi:10.1016/S0378-7206(03)00046-6
Finkelstein, C. (2006). Enterprise Architecture Kamogawa, T., & Okada, H. (2004). Issues of
for Integration – Rapid delivery methods and E-Business implementation from Enterprise
technologies. Artech House: Boston Lonton. Architecture viewpoint. Proceedings of the 2004
International Symposium on Applications and the
Finkelstein. C. (2006) Enterprise Architecture for
Internet Workshops (SAINTW’04), 2004 IEEE.
Integration: rapid delivery methods and technolo-
gies. U.S.A.: Artech House. Kou, D., Zhao, K., Tao, Y., & Kou, W. (2006).
RFID Technologies and Applications. In W. Kou
Fitch, M. (2004). The use of satellite for mul-
and Y. Yesha (Eds.), Enabling Technologies for
timedia communications. Mobile and wireless
wireless E-Business. Berlin Heidelberg: Springer-
communications: Key technologies and future
Verlag. (pp 89-108).
application. British Telecommunications Plc:
The IEE. Lan, Y., & Unhelkar, B. (2005). Global Enterprise
Transitions: managing the process. Hershey, PA:
Ghanbary, A. (2006). Evaluation of mobile
IGI Golbal.
technologies in the context of their applications,
limitations and transformation. In Unhelkar B. Lee, C. (2006). Mobile CRM: Reaching, acquiring,
(Ed.), Handbook of Research in Mobile Business: and retaining mobile consumers. In Unhelkar B.
Technical, Methodological and Social Perspec- (Ed.), Handbook of Research in Mobile Business:
tives.Hershey, PA, USA: IGI Global. Technical, Methodological and Social Perspec-
tives. Hershey, PA, USA: IGI Global.
Ghosh, A. K. (2001). Security and Privacy for
E-Business. New York: John Wiley & Sons Linthicum, D. S. (2000). Enterprise application
integration. Addison- Wesley information tech-
Guizani, M., & Raju, A. (2005). Wireless Networks
nology series.
and Communications Security. In Y. Xiao, J. Li
and Y. Pan (Eds.), Security and Routing in Wire- META Group, Inc. (2006) Adaptive Enterprise
less Networks,3, 320. New York: Nova Science Architecture. META Group, Inc., CT-USA,
Publishers, Inc. 2004. – Bittler. R. S. private presentation to UWS
Advanced enterprise Information Management
Hammer, M., & Champy, J. (2001). Reengineer-
Systems (AeIMS) Research Group on 13/11/2006
ing the Corporation: A manifesto for business
revolution. London: Nicholas Brealey. Olla, P. (2005). Incorporating commercial space
technology into mobile services: Developing
Hurster, W., Fuychtuller, H., & Fischer, T. (2006).
innovative business models. Hershey, PA, USA:
Mobile Batch Tracking- a breakthrough in supply
Idea Group Inc.
chain management. In Unhelkar B. (Ed.), Hand-
book of Research in Mobile Business: Technical, Oosthuizen, M. (2000). Action research. In K.
Methodological and Social Perspectives., Her- Williamson (Ed.), 2000: Research methods for
shey, PA, USA: IGI Global. students and professionals: information manage-
ment and systems. Centre for information systems:
Charles Sturt University. (pp. 141-158).
367
Extending Enterprise Architecture with Mobility
Pulkkinen, M. (2006). Systemic Management of Tatham, A. (2006). How CLEW could authenti-
Architectural Decisions in Enterprise Architecture cate credit cards to avoid credit card fraud. In
Planning. Four Dimensions and Three Abstraction U. AEIMS research Group (Ed.) (pp. Technical
Levels. Proceedings of the 39th Hawaii Interna- Presentation). Sydney: Alacrity.
tional Conference on System Sciences– 2006 IEEE.
Umar. (2005). IT Infrastructure to Enable Next
Ramakrisham, K. R., Bhattar, R. K., Dasgupta, K. Generation Enterprises. Information Systems
S., & Palsule, V. S. (2006). Review of Wireless Frontiers, 7(3). ISSN:1387-3326.
Technologies and Generations. In Unhelkar B.
Unhelkar, B. (2005, August). Transitioning to a
(Ed.), Handbook of Research in Mobile Business:
Mobile Enterprise: A Three-Dimensional Frame-
Technical, Methodological and Social Perspec-
work. Cutter IT journal, 18(8). Cutter Information
tives., Hershey, PA, USA: IGI Global.
LLC.
Rolstadas & Andersen. B. (2000) Enterprise
Unhelkar, B. (Ed.). (2006). Handbook of Research
Modeling- Improving global industrial competi-
in Mobile Business: Technical, Methodological
tiveness. Kluwer Academic publishers.
and Social Perspectives. Hershey, PA, USA: IGI
Ross, W. J., Weill, P., & Robertson, D. C. (2006). Global.
Enterprise Architecture as Strategy- creating a
U.S. Department of Defense Technical Archi-
foundation for business execution. Boston, MA:
tecture. TOGAF Architecture. The Open Group
Harvard Business School Press.
[Online]. Available: http://www.theopengroup.org
Scheniderman, R. (2002). The Mobile Technology
Virginia Information Technologies Agency.
Question and Answer Book. Amacom: American
(2006). Enterprise Definitions and Models. Com-
Management Association.
monwealth of Virginia [Online]. Available: http://
Schilhavy, R., & Salam, A. F. (2006). Emerging www.vita.virginia.gov/cots/ea/modelAndArchi-
mobile technology and supply chain integration: tecture/index.cfm
Using RFID to streamline the integrated supply
WiMax Forum. (2006). WiMax Forum - Frequency
chain. In Unhelkar B. (Ed.), Handbook of Research
Ask Question, [online]. Available: http://www.
in Mobile Business: Technical, Methodological
wimaxforum.org/technology/faq, WiMax Forum,
and Social Perspectives. Hershey, PA, USA: IGI
WiMax Forum
Global.
Zachman, J. A. (1987). Zachman Framework. The
Shuaib, K., & Boulmalf, M. (2006). Co-Existence
Zachman institute for framework advancement
of WLAN and WPAN Communication Systems.
[Online]. Available: http://www.zifa.com/
In Unhelkar B. (Ed.), Handbook of Research
in Mobile Business: Technical, Methodological
and Social Perspectives, Hershey, PA, USA: IGI
Global. key terms And deFInItIons
Spewak, S. H., & Hill, S. C. (1992). Enterprise Enterprise Architecture (EA): A structure of
Architecture Planning: Developing a Bluepoint for integrating business processes with IT supported,
data, applications, and technology. A Wiley-QED by providing a visualization enterprise solution
publication, John Wiley & Sons, Inc. of the relationships among the System, Process,
People, and Data in an organization.
368
Extending Enterprise Architecture with Mobility
Mobile Enterprise Architecture (M-EA): A lular networks and wireless broadband Internet,
structure of integrating business processes with also encompass communication that is achieved
Information Technology that are supported and without land-based or wired mechanisms
integrated with MT. It integrates business Systems, Service-Oriented Architecture (SOA): Us-
Processes, People, and Data in an organization ing of services to support the business and user
in a manner that enables easy incorporation of requirements, one kind of modern today enterprise
Mobile Technologies in its business processes. architecture.
Mobile Technologies (MT): Used to describe
modern wireless connections such as those in cel-
This work was previously published in Handbook of Research in Mobile Business, Second Edition: Technical, Methodologi-
cal and Social Perspectives, edited by Bhuvan Unhelkar, pp. 487-498, copyright 2009 by Information Science Reference (an
imprint of IGI Global).
369
370
Chapter 2.5
Enterprise Modelling in
Support of Organisation
Design and Change
Joseph Ajaefobi
Loughborough University, UK
Aysin Rahimifard
Loughborough University, UK
Richard Weston
Loughborough University, UK
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Modelling in Support of Organisation Design and Change
371
Enterprise Modelling in Support of Organisation Design and Change
Despite their inherent complexity, typically ness and regularity exist in nature; thus there is
MEs are expected to generate unique behavioural consistency in terms of causes and effects (Alison
responses such that (a) in the short term, profitable et al 2001). Classic organisation theorists: Taylor,
responses are made to changing market require- Fayol, Urwickand Gulick, Mooney and Reilly
ments and (b) in the long term, the enterprise and Weber generally focused on the question of
recomposes and renews itself so that it continues organisational structure and their prescriptions
to thrive. Consequently managers and engineers tended to reflect mechanistic structural prescrip-
responsible for any given ME should deploy tions for centralisation and specialisation of
suitable means of defining ME goals and needed work (Scott & Mitchell, 1976). With increased
leadership and integration mechanisms that will: uncertainty worldwide this kind of approach, and
improve the choice and operation of processes its assumptions about roles in organisations, has
and resource systems (human & technical) lead- increasingly becoming inadequate. However, the
ing to quality, timely and cost effective delivery merits of the mechanistic approach to organisa-
of products and services in response to emerging tion design and change lies in is predictability.
customer requirements, within constraints of By assuming that aspects of activities, jobs, roles
stakeholder desires. It follows that implementing & tasks are predictable then their outcomes and
change in any ME requires understandings about performances can in part be predicted and planned.
and manipulation of complex causal and temporal There may for example be specialised systems of
dependencies between ‘strategic intentions’; ‘pro- roles that are relatively stable over long period
cess designs’; ‘product (and service) portfolios’; of time that have clear reporting relationships.
‘resource configurations’; ‘departmental boundar- Nowadays, however, increasing rates of change
ies and people reporting structures’; ‘manufactur- in organisations is affecting the stability of role
ing policies’; ‘work-organising methods’; and requirements and thereby the suitability of role
‘human and technical resource systems’ (Zhen incumbents. Consequent upon increasing rates
& Weston 2006). of change, traditional assumptions about stable
OD&C (organisation design and change) jobs and thereby roles that are punctuated with
necessitates coherent thinking and action-taking periodic changes may become obsolete in some
amongst groups of people with differing agendas, types of ME. Roles in organisations may endure
desires, concerns, roles, affiliations, responsibili- for relatively long periods but role requirements
ties, competencies and experiences related to the may not (Ashforth, 2001). Though the classic ap-
organisation and its environment (Ajaefobi et al proach (to organisation design and engineering)
2008). Generally OD&C implementation will satisfied the requirements of a steady state business
significantly impact on all ME personnel, such environment (Weston et al, 2001), current busi-
as by changing their status, roles, role relation- ness environments may not be deterministic but
ships, work patterns, use of (personal and group) rather stochastic (Ramenyi, 1998). Furthermore,
productivity tools, fitness to fulfil their roles it has also been observed that classic approaches
and designated workloads, working conditions, to organisational design have often led to rigid
opportunities for personal advancement and organisation structures and systems that can not be
remuneration and so forth. Classic approaches changed with sufficient regularity. The same struc-
to OD&C have previously been developed and tures deliberately imposed to organise targeted
applied by industry and academia (Mintzberg, behaviours and constrain unwanted behaviours
1989). However, most of those classic approaches can placed severe restrictions on responses to
are rooted in developing mechanistic views of emerging requirements. Consequently the abil-
reality with underlying assumptions that: orderli- ity to respond to any new set of requirements or
372
Enterprise Modelling in Support of Organisation Design and Change
373
Enterprise Modelling in Support of Organisation Design and Change
374
Enterprise Modelling in Support of Organisation Design and Change
treat enterprises as complex systems that can be process instances will often not be readily
designed or improved in a structured and orderly predicted.
manner. Thereby better results can be achieved 2. organisations deploy multiple and often
relative to the use of an organisation (re)design interoperating resource systems (human &
approach (Bernus, 2003). As previously discussed, technical) that need to be modelled in terms
real world MEs are complex systems that oper- of needed resource system attributes, such
ate within complex environments. Consequently as competences, capabilities & capacities
EM models will invariable be simplified and they can bring to assigned roles, including
abstracted representations of complex realities. In potential and actual abilities to reach states
theory EM allows the representation of multiple and change states so as to quantify and qualify
aspects of the enterprise in so called model views. relative performances of alternative choices
Those views are aspects of the enterprise relevant of resource system.
to multiple model users who will have differing 3. organisational processes can be modelled at
responsibilities for the ME, thereby allowing the different layers of granularity to represent
user to deploy and possibly develop models of value streams, roles, activities and operations
interest without being disturbed by the overall that can be explicitly be described in terms of
enterprise complexity. required competences to enable marshalling
Public domain approaches to EM almost and matching of available competences that
exclusively adopt a process thinking approach can be brought to bear on multiple process
to representing, defining, analysing and com- instants by people and their supporting tech-
municating organisation entities and systems. nical systems in timely and effective ways
Such a process oriented approach can facilitate 4. a suitable integrating infrastructure is needed
requirements modelling and provides a unifying to link aspects of processes and systems
glue to bring together different aspects (namely: across organisational boundaries to ensure
function, information, resources and organisa- interoperability between processes and re-
tion aspects) of the various ME views required. source systems.
To deploy EM, so as to facilitate organisation
design and change the present authors made the Also assumed is that the realisation of those
following assumptions: modelling requirements necessitates the use of
proven modelling architectures and modelling
1. organisations are set of multiple, dependent, methods with capabilities to abstract and repre-
concurrent operating business processes: sent any organisation aspects of different views
where processes can be conceptualise at that suit modeller, user and other stakeholders’
various levels of abstraction (suited to requirements. Public domain modelling frame-
model users) in terms of ordered set of works were observed to exist that in part provide
value adding activities, inputs, outputs, a viable modelling framework such as: CIMOSA,
events (and their associated materials, IDEF0, PERA, ARIS and GRAI/GIM. Most of
information and control flows). Related to these frameworks are supported by modelling
this assumption is the notion that typically methods that are designed to systemise enterprise
many different instances of these processes model capture and reuse. They usefully provide
need to be organised and resourced so as means of handling organisational complexity, by
to realise the products and services created offering modelling constructs to decompose (gen-
by the enterprise in its life time; and that eral and specific) process networks into process
the qualities, mixes and timings of these segments. Also they were observed to provide
375
Enterprise Modelling in Support of Organisation Design and Change
376
Enterprise Modelling in Support of Organisation Design and Change
that respectively encode: manufacturing system odology. The conceptual model presumes that as
architecture and the information system architec- complex system, an organisation is comprised of
ture with human and organisational architecture three parts namely;
sandwiched between the two. The human and
organisational section provides an architecture • physical system that comprises technical
for describing organisational structures, human and human systems, structured work cen-
positions, roles and training requirements dur- tres and materials that flow through those
ing the life cycle of MEs. PERA prides itself in centres
comprehensiveness, claiming to cover enterprise • operating system that is dedicated to real
life cycle from inception and mission specification time control of physical system
to operational and then plant disposal. • decision system – locus of decisions for the
whole organisation via a hierarchical struc-
Group de recherché en ture organised into decision levels made of
Automatisation Integrere (GrAI) decision centres
• the information system that links the
GRAI methodology (Domeingts, et al, (1995), other systems with one another and the
Wainwright & Ridgeway, (1994), Vernadat, environment
(1996)) was developed at the University of Bor-
deaux in early 1980’s. GRAI is predominantly a GRAI uses two graphical tools: (a) GRAI grid
graphical technique using decomposition principle used to analyse focused parts of the enterprise and
comprising a combination of ‘top-down’ and (b) GRAI nets used to analyse decision centres
‘bottom-up’ approaches to define decision cen- in terms of their activities, resources and mecha-
tres and information required to make a decision nisms. GRAI is supported by GIM methodology
within those centres. GRAI approach is based on which extends the capability of GRAI modelling
three elements: (a) conceptual model, (b) tools framework to cover the entire CIM systems.
& representation rules and (c) application meth-
377
Enterprise Modelling in Support of Organisation Design and Change
cIm open system gies has impacted upon industry with respect to
Architecture (cImosA) specifying requirements (process models) and
structuring and supporting the design of resource
CIMOSA was developed by the ESPRIT consor- systems (human & technical); significant applica-
tium AMICE and validated with ESPRIT projects tion constraints still remain. The present authors
CIMPRES and CODE in multiple case studies observe that enterprise models created naturally
and pilot implementations (Kosanke, 1995). CI- provide semantically rich descriptions of ‘rela-
MOSA reference architecture supports modelling tively enduring’ or static aspects of enterprises
of complete enterprise life cycle (requirement but those models do not readily transform into
definitions, design specifications & implemen- equivalent simulation models needed to analyse
tation descriptions). The goal of CIMOSA is to and thereby to predict short and medium term
provide the industry community with widely enterprise behaviours. In reality, however, most if
usable and accepted CIM concepts to structure not all enterprise systems are subject to significant
CIM systems; namely: (a) enterprise modelling and often on going changes during their life cycle
framework that can accurately represent business and thus necessitate simulation to support ‘what-
operations, support their analysis and design, if’ evaluation of potential process and system
and lead to executable enterprise models, (b) alternatives needed to implement organisational
integrating infrastructure to support application design and change. Standards related to enterprise
and business integration and (d) a methodology engineering and integration such as CEN ENV
based on CIM system life cycle. CIMOSA views 13550 (model execution services) provide a basis
an enterprise as a collection of functional entities for computer based development and execution but
processing enterprise objects to realise products as yet no standard model transformation methods
and services. CIMOSA modelling methodology are reported in the public domain literature that
adopts systematic and hierarchical approach to allow selected segments of enterprise models to
complex systems decomposition. At highest level, be executed within virtual environments (Zelm,
CIMOSA views an enterprise as a collection of 2003). Table 1 highlights the modelling capabili-
domains, each domain consisting of domain pro- ties and constraints associated with the current
cesses (DPs). DPs are core-stand alone processes enterprise modelling methods (Rahimifard &
that interact with one another through exchange Weston, 2007).
of events. DPs can further be decomposed into Researchers at the MSI Research Institute at
business processes (BPs), enterprise activities Loughborough University, UK, have deployed
(EAs) and functional operations (FOs). CIMOSA various public domain modelling architectures
details are summarised in the so called CIMOSA and concepts to developing coherent models of
cube and the reader is referred to the references industrial processes and systems. Those models
mentioned (AMICE, 1993, Zelm, et al 1995 & have supported both large and small scale organi-
Vernadat, 1996). sation design and engineering exercises at sites of
ME collaborators. In so doing MSI has produced
various integrated modelling methodologies in-
enHAncInG modellInG cluding those reported by Monfared et al (2002),
cAPAbIlItIes oF current Chatha et al (2007); Rahimifard & Weston (2007)
em solutIons and Agyapong-Kodua et al (2008). For most of
the integrated modelling methods developed
Although the emergence of public domain en- CIMOSA has provided a backbone modelling
terprise modelling architectures and methodolo- architecture and representational formalisms for
378
Enterprise Modelling in Support of Organisation Design and Change
graphical capture of relatively enduring aspects fines of general enterprise modelling principles.
of case study enterprises. The choice of CIMOSA For example, Monfared et al (2002), described
as a foundation backbone for MSI’s modelling how four types of CIMOSA diagramming template
methodologies was made essentially for reasons, (namely: ‘context diagram’, ‘interaction diagram’,
which include: ‘structure diagram’ and ‘activity diagram’) can be
used as a source of enterprise knowledge which can
• CIMOSA enterprise modelling architec- be reloaded using simulation modelling technolo-
ture and method was through experimental gies. Those templates support enterprise engineer-
application by MSI researchers considered ing projects though stages of model development
to provide the most comprehensive public so that modellers and process engineers can move
domain architecture available; iteratively as they structure and organise:
• CIMOSA provides a public domain open
system architectures that support modelling 1. the ongoing capture of coherent and seman-
of different life phases of complex systems tically rich picture of dependent processes,
from requirements definitions through in such a way that key dependencies can be
implementation descriptions (Kosanke, explicitly represented;
1995, Gransier & Werner, 1995, Vernadat, 2. the reuse of multiple coherent views of
1996); multi- process models in support of process
• CIMOSA provides an extensive set of and system simulation.
modelling constructs and representational
formalisms (particularly process-oriented The use of these templates was reported to be
constructs) to enable users create particular effective in structuring the capture and coherent
models of any aspects of enterprise. representation of multiple static views of enterprise
process attributes at needed levels of abstraction.
The eclectic nature of CIMOSA allows expan- Context diagrams are used to organise process
sion of its modelling capabilities within the con- models into interrelated CIMOSA conformant and
379
Enterprise Modelling in Support of Organisation Design and Change
non CIMOSA conformant domains (DMs), the aspects of specific process instants and lack the
former being the concerned domains. CIMOSA capability to be used in determining and possibly
DMs in the context diagrams are further decom- predicting individual and or collective behaviours
posed into more detailed domain processes (DPs). of system elements. But such predictions are core
Interactions among the DPs triggered by events requirements for organisation design and change
typically result in exchange of (informational, projects in MEs. This is the case because static
material, human, technical and financial) resources EMs are focused on an abstract big picture and its
amongst DPs and these interactions can be rep- decomposition, i.e. on relatively enduring aspects
resented using interaction diagrams. Structure of MEs and do not encode specific time depen-
diagrams are used to formerly attribute relative dencies related to process instants that result as a
enduring organisational relationships that couple consequence of product flows, control flows, ex-
business processes (BPs) and enterprise activities ception instants and time dependent causal effects
(EAs) of a DP while activity diagram templates are that determine factors such as resource utilizations
deployed to explicitly encode relatively short-lived and consumption and associated wastes. On the
descriptions of precedence links used to organise contrary discrete event simulation modelling
the interoperation of BPs and EAs. however can capture and quantitatively describe
Use of CIMOSA ‘context’, ‘interaction’, aspects of dynamic behaviours including queues,
‘structure’ and ‘activity’ diagramming templates stochastic events, product flows, process routes,
enables explicit definition of key structural re- resource utilization, efficiencies, break downs, etc,
lationships between DMs, DPs, BPs and EAs. while dynamic systems modelling instrumented
Typically, those structures will indicate process by qualitative and quantitative causal loop and
segment ownerships, hierarchical ordering, se- continuous simulation models (that can be nu-
quential ordering and precedence relationships, merically integrated) can computer execute and
and necessary interchanges of information, mate- predict dynamic behaviours arising from causal
rial, human resource and finances. dependencies between system variables (Ajaefobi,
Though the diagramming templates enhanced et al 2008). It follows that to support organisation
model creation and descriptions, the models still design and change static models created during
remained static in the sense that they do not encode enterprise engineering projects will in general need
380
Enterprise Modelling in Support of Organisation Design and Change
to be re-encoded into dynamic views using suitable • bottlenecks generating long queues of
simulation techniques with sufficient constructs WIP
to represent enterprise systems behaviours and • long lead times and unbalanced workflows
properties. In simulation views, change parameters • idle resources (within human or technical
that can trigger system redesign and change can systems)
clearly be observed and different possible solu- • poor quality jobs or high error rates
tion options tried in a virtual environment. In • etc.
general the authors’ experiences of ME modelling
have confirmed the commonly held view that In theory enterprise modelling has significant
continuous simulation is best suited to modelling potential to support organisation design and
dynamic behaviours of either large or small scale change projects because EMs:
systems but with essentially a simplified view of
the stochastic nature of products. While discrete a. present interrelated enterprise sub systems
event simulation (DES) is best suited to modelling as models from different view points
small scale systems in which stochastic behaviours b. models created in respect of (a) ‘paint the
need to be clearly understood. Also observed is big picture’ of an enterprise by explicitly
that the use of DES can be key when a common depicting what the enterprise does and clearly
resource is used to realise multiple products with separating this from who/what does what and
a significant product dynamic but that in general at what time. This can enhance stakeholder
the use of DES should be preceded by creating an understandings of the enterprise.
EM (and possibly causal loop modelling) when c. In dynamic views (where EMs are trans-
supporting enterprise engineering projects. formed into models of ME segments using
suitable simulation technology), enterprise
engineers can observe:
common orGAnIsAtIon desIGn ◦ throughputs from which assessment
& cHAnGe (od&c) trIGGers can be made as to whether the organi-
And tHe role oF em sation’s performance is acceptable
given the available resources and time
OD&C projects can be strategically planned or ◦ make informed decision about wheth-
it can come as part of a response to emerging er current best performance can still
requirements. Generally though, OD&C proj- be improved upon, such as by raising
ects in a given enterprise can be triggered by the work input rates and reducing cycle
need to respond to: perceived opportunities; new times by deploying resources with in-
requirements and threats; or in anticipation to creased efficiency
certain events such as new government legisla- ◦ take decisions about what can be
tion, new product launch by a competitor, new changed to improve the quality,
customer requirements and technological change quantity and timelines of the work
(Mullins, 2005). Planned OD&C projects may throughput
also constitute a program within an organisation ◦ observe production system perfor-
to improve its operational efficiency and current mance under changing scenarios in-
best performance. Practical examples of common cluding the impacts if performance
triggers that would naturally lead to organisation metric of the technical systems and
(re)design and change in a typical production the proficiency with which people use
enterprise include: of those technologies are changed
381
Enterprise Modelling in Support of Organisation Design and Change
◦ assess impacts and observe impacts and applications. Manufacturing variables change
of changing competences, commit- at discrete points in time. For example, the time
ment and motivation of the people to complete a manufacturing operation may vary
◦ assess impacts on performances each time the operation is undertaken, which can
of alternative resource systems make discrete event simulators more suitable in
configurations comparison to continuous simulations. In many
◦ can determine policies for improving production situations orders from customers arrive
interoperability and communications at unpredictable times and commonly involve un-
and feedback between people on the certain quantities and mixes of product realisation
shop floor with their managers. at any point in time. This makes it very difficult
to develop equations that adequately characterise
different production scenarios which can be solved
sImulAtIon modellInG (sm) via numerical integration methods. Whereas DES
In suPPort oF od&c models can support enterprise systems perfor-
mance observation and analysis under different
Simulation modelling is an established means of possible scenarios where alternative resource
understanding and predicting systems behaviours configurations are loaded by stochastic order,
which has received great attention in literature. information and material workflows. Knowledge
Simulation technologies have been widely ap- obtained from such performance analysis could
plied in manufacturing and service organisations inform and support management decisions about
(Barber, et al, 2003). Generally, simulated systems OD&C parameters such as:
imitate real systems. Harrison & Petty, (2002)
described why simulation is becoming important 1. what needs to be changed, improved or
tool in science and engineering: supported amongst the processes & systems
deployed by the enterprise to realising spe-
• safety – simulation allows a system to be cific objectives
tested under extreme conditions that could 2. what control measures are needed to improve
not be justified in a real world scenario systems performances and the appropriate
• practicality – with large systems, simula- times to put such measures in place
tion may be the only practical way of ap- 3. how informed decisions can be made about
proaching a problem new competences, capabilities and capacities
• simulation allows what if analysis – this that may be needed by resource systems to
allows the physical system to be built and improve their throughput and the over all
tested under different solution options performance of systems
• simulation is repeatable 4. what training system operators require and
• simulation promotes understanding of sys- the contents of such training based on cur-
tems, particularly if allied with graphics. rent performance and observed gaps
• simulation can be used to verify analytical 5. needed technology to enhance system per-
solutions to problems formance (software and hardware)
6. how to enhance cost engineering by using value
Though continuous simulation has been use- stream maps and activity based costing
fully applied in manufacturing cases, it is discrete 7. what wastes, errors and reworks, etc can be
event simulation (DES) technology that has been reducing thus setting the ground for Lean
adopted in the majority of manufacturing studies manufacturing implementation
382
Enterprise Modelling in Support of Organisation Design and Change
383
Enterprise Modelling in Support of Organisation Design and Change
384
Enterprise Modelling in Support of Organisation Design and Change
385
Enterprise Modelling in Support of Organisation Design and Change
standard modelling techniques. Figure 5 shows In such systems, work item flows will typically
a high level context diagram created to model involve flows of raw material, (sub) components,
interacting domains identified when Woodland sub assemblies and products. Additional work
and its supply chain partners realise a ‘make and items flows may take the form of different in-
deliver furniture to order’ process; while figure formation types (such as customer order types,
6 is one of the structure diagrams generated to works order types, product specification types,
explicitly model elements of business processes etc) which need processing into alternative forms
and enterprise activities. The domains shown in that have increased value in the business context
figure 5 interact with one another at different under study. The term ‘distinctive work item types’
levels via exchange of information and resources implies that ‘significant differences’ in processing
in other to successfully realise ‘make & deliver requirements will be necessary to achieve value
furniture to aggregated order’ process addition as different work item types pass through
the system. Here it is assumed that:
Woodland Production system
(A) ‘cognate work item types’ (such as sub-
Woodlands production system was observed to be product and product item types within the
a multiple value stream production system. Here, same product family) can share a similar
the present authors consider a multiple value value adding process. Therefore also as-
stream production system as being: “any system sumed is that for cognate work item types,
which adds value to two or more ‘distinctive work relatively minor differences between item
item flows’; by realising necessary value add- types (such as dimensional or operation time
ing processing operations through an organised differences) will need to be accommodated
sharing of the (human and technical) resources by the assigned production system during
available to that system”. process set up and process execution. In
386
Enterprise Modelling in Support of Organisation Design and Change
such cases, variation within a product family generate distinctive process dynamics (such
might be accommodated via use of program- as process bottlenecks, inventory level pat-
mable machines and product type sensing terns and so forth). Hence production systems
mechanisms, or by deploying people with used to realise distinctive work item types
the requisite competencies needed to set will likely require correspondingly distinc-
up and process all input item types within tive work centre processing capabilities and
a family. competencies, and distinctive workflow
rules and controls. This requirement is also
(B) ‘distinctive work item types’ will belong likely to be additional to the need to cope
to different product families, in the sense with in-family product variation via the use
that the sub-product and product item types of flexible resource system elements.
belonging to different families will each
require a distinctive value adding process. The Woodland project is still on going but the
Typically this will require alternative pro- progress reported considers the processing of cog-
cessing routes through work centres of nate product types in the assembly shop and how
production systems, and the various work this shop operations could be changed to improve
item flows within each family will likely performance. Following the modelling method
BP71
BP72 BP73
Make Furniture
to Order Spray & Finish Package & Deliver
BP71-1 Furniture Production Furniture
Machine Furniture BP72-1 BP73-1
Components Spray & Rag Carcasses Inspect & Package
and Components Furniture
Store/Transport Components For Assembly (EA711)
BP73-2
Prepare Components for Assembly (EA712) Dry Furniture Carcasses and components (EA721)
BP72-2 Position Furniture in Queue
BP71-2
De-nibble & Reassemble
Assemble Carcasses
Furniture
& Fit Components Load Furniture in Lorries (EA731)
BP72-2
BP71-3 Fix Fittings Notify OP about Dispatch (EA732)
Disassemble Carcasses
& Components for Assembly
Fine Finish Furniture (EA722) Transport furniture to Stockists (EA733)
DP7
BP74 BP75
Support & Implement Produce & Deliver Manage & Maintain Production
Product Introduction Furniture & Transport Capabilities
BP74-1 BP75-1
Program CNC M/Cs & Create Manage Day to Day Utilisation
Jigs for New Furniture of Production Resources
BP74-2 BP75-2
Prototype Machine New Comp Maintain Production Machines
& Facilities
Identify Needed Component Machining & Storage Procedures (EA741) BP75-3
BP74-3 Manage Day to Day Utilisation
Program CNC M/Cs & Create of Transport Resources
Jigs for New Furniture Assembly BP75-4
BP74-4 Service and Maintain Lorries
Prototype Assemble New Comp
BP75-5
Identify Needed Component Assembly & Storage Procedures (EA742) Monitor Use of Domain
BP74-5 Resources & Recommend Change
Prototype Spray & Finish New Comp BP75-6
Monitor Operations of BPs and
Identify Needed Component Spraying Procedures (EA743)
Recommend Change
BP74-6
Prototype Package New Comp
CIMOSA Domain Activity Event Information Human Resource Physical Resource Finance
External Links RHW
Non CIMOSA Domain Flow of Res./Mat. Flow of Process Alternative Flow 1
387
Enterprise Modelling in Support of Organisation Design and Change
388
Enterprise Modelling in Support of Organisation Design and Change
DM2
Raw Material
Supplier
DM1 DM3
Stockists Sub-Product (e.g.
Chair) Supplier
BP71
BP72 BP73
Make Furniture
to Order Spray & Finish Package & Deliver
Furniture Production Furniture
BP71-1 DM6 DM5
Machine Furniture
Components
BP72-1
Spray & Rag Carcasses
BP73-1
Inspect & Package
Business Technology Vendors
Store/Transport Components For Assembly (EA711)
and Components Furniture Management
BP73-2
Prepare Components for Assembly (EA712) Dry Furniture Carcasses and components (EA721)
BP72-2 Position Furniture in Queue
BP71-2
De-nibble & Reassemble
Assemble Carcasses
Furniture
& Fit Components Load Furniture in Lorries (EA731)
BP72-2
BP71-3 Fix Fittings Notify OP about Dispatch (EA732)
Disassemble Carcasses
& Components for Assembly
Fine Finish Furniture (EA722) Transport furniture to Stockists (EA733)
BP74
DP7
Support & Implement
Product Introduction Produce & Deliver BP75
Identify Needed Component Assembly & Storage Procedures (EA742) Service and Maintain Lorries
BP74-5
BP75-5
Prototype Spray & Finish New Comp
Monitor Use of Domain
Identify Needed Component Spraying Procedures (EA743)
Resources & Recommend Change
BP74-6 BP75-6
Prototype Package New Comp Monitor Operations of BPs and
Recommend Change
Identify Needed Component Packaging Procedures (EA744)
Produce Customer
BP72 BP73
BP71
Orders DP7
EA711
Fit Legs
Assemble
Install handles
Others Install
features
chine for cutting operations and secondly, both related resources were also observed. Similarly it
components are needed further down stream for was observed that the human operators working
subsequent assembling. in this section, though apparently were seen to be
From the SM results however, it was observed working all day, their utilisation in terms of time
that the down time due to switching between the spent on value adding operations was also low.
two jobs was rather high. The implication here was It follows that much time is spent on non value
that the machine spends one third of its production adding operations, which is a trigger for change.
time per day on ‘changing over’, thereby contrib- Table 2 shows the ‘as is’ simulation results and
uting significantly to under-utilisation of the said observed utilisation of some selected resources.
machine and its human operator. Furthermore, In summary, 927 product units were assembled
since the said machine feeds other machines further and the minimum time spent by a unit in the
down stream, delays and under-utilisations of other system was about 60 minutes, even though the
389
Enterprise Modelling in Support of Organisation Design and Change
As – Is Scenario
Resource Work Machine Change waiting Queue Operator Total
Types done Utilisation % Over % Utilisation output
%
Cutting machine 1145 61 33 6 114 100 Total = 927
units made
Milling 1 1091 69 _ 31 2 69
Assemble bench 1 633 66 _ 34 2 43
Panel Finishing 1169 97 _ 3 110 98
Finishing 69 _
minimum ‘make span’ of a single unit was as low Consequently, work entry rate and batch sizes
as 12 minutes. This implies that there are delays were increased and safety buffers introduced so
in the system. Figure 8 is the screen print out of that down stream resources are not kept waiting
the ‘as-is’ door assembly simulation. while the cutting machine is processing the first
Following the observations made, a possible batch of the day. Furthermore, it was observed
to be scenario was simulated for this section. that switching between jobs in the cutting ma-
Here, the target was to realise the management’s chine could be done in an average of 10 minutes
goal of 1200 units per week from this section. and that the operators had previously been over
390
Enterprise Modelling in Support of Organisation Design and Change
indulging themselves, hence the new change over in the preceding paragraph, the throughput and the
time for cutting machine was set between 10 -15 resource system utilisations were observed. Fol-
minutes depending on the operator’s competences lowing the observations, suggestions were made
and so called tacit knowledge. The simulation on how the section throughput and over all per-
results showed significant increase in throughput formances could be improved by implementation
from 927 to 1251, representing a 35% increase. certain OD&C principles observed . Suggestions
Furthermore, queues were significantly reduced made were based on consideration of different
especially the queue to the cutting machine. A resource units as components that need for them
closer investigation of the behaviour of the queue to interwork to improve the over all performance
to the cutting machine showed a rising and falling of the assembly shop. Subsequent section briefly
pattern, with a peak value occurring at mid day. The describes the background for component based
same pattern is repeated during weekly simulation approach to organisation design and the role of
run with peak at mid week. This possibly captures enterprise modelling and engineering.
the mood of the human operator who slows down
his pace as the days goes on and then increases
after lunch break. Table 3 shows the performance comPonent-bAsed
results of some selected resource systems. orGAnIsAtIon desIGn And
Adjacent to the door assembly unit is the table cHAnGe APProAcH
assembly section. This section was also encoded
in a simulation (virtual reality) view. Over 3 dozen BPR (Hammer & Champy, 2001) advocates
table types are currently being assembled by a radical approach to organisation design and
Woodland in this unit. However, the authors con- change, involving fundamental rethinking and
solidated them into three broad groups based on the radical redesign of business process to bring about
commonality table features; including complexity, dramatic improvement all critical performance
routing and processing times. In general, products measures. Yogesh (1998) however observed that
belonging to the Woodlands table family are as- 70% of BPR projects reviewed did not yield the
sembled from three main components namely; envisaged dramatic results. Essentially, the reason
table tops (TT), under frames (UDF) and legs given for failed BPR projects was that BPR focus
(TLG). The table assemble operations involved mainly on organisation’s processes leaving other
produced the tables to a design specification us- component parts of the organisation unchanged.
ing primary components that are delivered from OD & C project should take a multi perspective
Woodland machine shop. Like the case described view of the organisation. Similarly, OD&C can-
To – Be Scenario
Resource Types Work Machine Change Waiting Queue Operator Total
done Utilisation % Over % Time % Utilisation % output
Saw machine 1240 66 13 15 0 81 Total =1251
units made
Milling 1 1235 78 _ 22 0 78
% increase
Assemble bench 1 745 78 _ 22 0 80 = 35
Panel finishing 1178 98 _ 2 71 98
Finishing 1267 79 _ 21 268/0 79
391
Enterprise Modelling in Support of Organisation Design and Change
not be realised by merely reshuffling of workers ments. One way of viewing resource systems is
followed by changes in organisational structure that they are building blocks or components with
without changing the process design, procedures embedded range of attributes and characteristics
and work item flows. It follows that OD&C is such as competences/or capabilities that enables
not only a radical process reengineering which them to act individually or collectively to realise
seeks to change process designs and sequences specified business requirements. It follows that
of operation without change to resource systems for organisation design and change to be effec-
compositions, structures and configurations. tive, resource components should be agile and
OD&C projects should take a holistic view of the responsive with inherent ability to be reformed
entire organisation bearing in mind the causal and or reconfigured so that individual and collective
temporal relationships between all organisation behaviours of organisation system components
system components. This can be instrumented could rapidly be aligned to meet specific and
by EM & engineering concepts, which deploys changing business process needs. This implies
multi perspective views of organisation (structure, that organisations should have:
processes, resources & information) and how these
views dynamically interact and impact on one 1. suitable components or building blocks from
another; including the impacts of such interactions which high performance systems are to be
on the over all organisation’s goals. configured
In general, a manufacturing organisation is an 2. organisational structures and associated
open system with inputs from the: mechanisms capable of establishing flexible
linkages between different components, so
• environment (which provides constraints, that systems can be configured rapidly and
demands and opportunities) yet have inherent ability to be reconfigured
• resource systems that realise value adding and reengineered in the event of requirement
operations to deliver products and services changes
• mission and strategies that link resource 3. means of supporting rapid and holistic defi-
systems to processes, opportunities, con- nition and redefinition of system behaviours
straints and demands so that unwanted be- in the form that can be used to help specify,
haviours are constrained implement, control and change individual and
collective behaviours of system components
Responding to requirement changes which to facilitate organisation design and change.
generally will necessitate OD&C is complex and
difficult because it implies changes in most if not Generally though, high performing dynamic
all the organisation inputs including: strategies, systems should be built from components by
policies, processes, procedures, work organisation (a) selecting and programming components
structures and resource systems configurations behaviours and (b) defining and programming
(Nadler, 1993). Weston (1998) suggests that ef- system architectures. This will result in composed
fective and timely responses to change require- resource systems that can be defined in terms
ments will necessitate change capable organisation of their reachable states. To respond to require-
systems and structures. Resource systems are ment changes; (a) component behaviours are
integral parts of organisation that are configured re-selected and re-programmed and (b) system
in a variety of ways to generate different behav- architectures are re-defined and re-programmed,
ioural responses needed by the organisation to thereby resulting in a re-composed or changed
realise specific and emerging business require- system. It follows that system components of
392
Enterprise Modelling in Support of Organisation Design and Change
393
Enterprise Modelling in Support of Organisation Design and Change
elemental low level enterprise activities and opera- Bernus, P. (2003). Enterprise models for enter-
tions and resource units assigned to execute them prise architecture and ISO9000:2000. Annual
can be reorganised to realise improved system Reviews in Control, 27, 211–220. doi:10.1016/j.
performance. arcontrol.2003.09.004
Blethyn, S. G., & Parker, C. S. (1990). Designing
information systems. Butterworth-Heinemann.
reFerences
Bravocco, R. R., & Yadav, S. B. (1985). Require-
Agyapong-Kodua, K., Ajaefobi, J.O., & Weston, ments definitions architecture – an overview. Com-
R.H. (2009). Modelling dynamic value streams puters in Industry, 6, 237–251. doi:10.1016/0166-
to support process design and evaluation. Int. J. 3615(85)90046-6
of Computer Integrated Manufacturing.
Chatha, K. A., Ajaefobi, J. O., & Weston, R. H.
Ajaefobi, J. O., Wahid, B., & Weston, R. H. (2007). Enriched multi-process modelling in
(2008). Proc. of the ICAM, Western Michigan support of the life cycle engineering of business
University, USA. processes. International Journal of Production
Alison, B., O’Sullivia, O.A., Rice, J., Rothwell, A., Research, 45(1), 103–141.
& Sanders, C. (2001). Research skills for students. Christensen, L. C., Johansen, B. W., Midjo, N.,
AMICE (Ed.). (1993). Open system architecture Ornarheim, J., Syvertsen, T. G., & Totland, T.
for CIM, ESPRIT Consortium (2nd ed.). New York: (1995). Enterprise modelling-practices and per-
Springer-Verlag. spectives. In Proc. of the ASME 9th Engineering
Database Symposium, Boston, US.
Ashfort, B. E. (2001). Role transition in organi-
sational life: An identity-based perspective. Mah- Davenport, T. H. (1993). Process innovation: Re-
wah, NJ: Lawrence Erlbaum Associates. engineering work through information technology.
Boston, MA: Harvard Business Press.
Barber, K. D., Dewhurst, F. W., Burns, R. L. D.
H., & Rogers, J. B. B. (2003). Business–pro- Davis, L. E. (1982). Organisational design. In G.
cess modelling and simulation for manufactur- Salvendy (Ed.), Handbook of industrial engineer-
ing management: A practical way forward . ing (pp. 2.1.1-2.1.29). New York: Wiley & Sons.
Business Process Management Journal, 9(4). Doumeingts, G., Vallespir, B., & Marcotte, F.
doi:10.1108/14637150310484544 (1995). A proposal for integrated modelling of
Barber, M. I., & Weston, R. H. (1998). Scoping manufacturing system: Application to the re-
study on business process reengineering: Towards engineering of an assembly shop. Control Engi-
successful IT application . International Journal neering Practice, 3(1), 59–67. doi:10.1016/0967-
of Production Research, 36, 574–601. 0661(94)00065-O
Berio, G., & Vernadat, F. B. (1999). New de- Drucker, P.F. (1990). The emerging theory of
velopments in enterprise modelling using CI- manufacturing. Harvard Business Review, May-
MOSA. Computers in Industry, 40(2), 99–114. June(3), 94-104.
doi:10.1016/S0166-3615(99)00017-2 Evans, J. R., & Lindsay, W. M. (1993). The
management and control of quality (2nd ed.). Min-
neapolis, MN: West Publishing Coy.
394
Enterprise Modelling in Support of Organisation Design and Change
Fox, M. S., & Gruninger, M. (1998). Enterprise Mintzberg, H. (1989). Mintzberg on manage-
modelling. AI Magazine, 109–112. ment: Inside our strange world of organisations.
London: MacMillan.
Goldman, S. L., Nagel, R. N., & Preiss, K. (1995).
Agile competitors and virtual organisation. New Monfared, R. P. (2000). A component–based
York: Van Nostrand Reinhold. approach to design and construction of change
capable manufacturing cell control systems. Un-
Gransier, T., & Werner, S. (1995). Validation of
published doctoral dissertation, Loughborough
CIMOSA. Computers in Industry, 27, 95–100.
University.
doi:10.1016/0166-3615(95)00048-0
Monfared, R. P., West, A. A., Harrison, R., &
Hammer, M., & Champy, J. (2001). Reengineering
Weston, R. H. (2002). An implementation of
the corporation, a manifesto for business revolu-
business process modelling in automotive in-
tion. New York: Harper Business.
dustry. In Proc. of the Instn. of Mech. Engineers,
Handy, C. (1993). Understanding organisations Vol. 216 Part B: Engineering Manufacture (pp.
(4th ed.). New York: Harmondsworth, Penguin. 1413-1427).
Harrison, D. K., & Petty, D. J. (2002). Systems Mullins, L. J. (2005). Management & organisa-
for planning and control in manufacturing. New- tional behaviours (7th ed.). Upper Saddle River,
ness, Oxford. NJ: Prentice Hall.
Harrison, R., West, A. A., Weston, R. H., & Nadler, D. A. (1993). Concepts of management
Monfared, R. P. (2001). Distributed engineering of organisational change. In Mabey, et al (Eds.),
of manufacturing machines. In Proc. of the Instn. Managing Change (2nd ed.). PCB Ltd.
of Mech. Engrs., Vol. 215, Part B Journal of En-
Pandya, K. V., Karlsson, A., Sega, S., & Carrie,
gineering Manufacture (pp. 217-231).
A. (1997). Towards the manufacturing enterprise
Jang, K.-J. (2003). A model decomposition ap- of the future. Int. Journal of Production. Manage-
proach for a manufacturing enterprise in business ment, 17, 502–521.
process reengineering. International Journal
Rahmifard, A., & Weston, R. H. (2007). The
of Computer Integrated Manufacturing, 16(3),
enhanced use of enterprise and simulation model-
210–218. doi:10.1080/0951192021000039594
ling techniques to support factory changeability.
Kosanke, K. (1995). CIMOSA- overview and International Journal of Computer Integrated
status. Computers in Industry, 27, 101–109. Manufacturing, 20(4), 303–328.
doi:10.1016/0166-3615(95)00016-9
Ramenyi, D. (1998). Doing research in business
Martin, J. (2005). Organisation behaviour and and management: An introduction to process &
management (3rd ed.). Florence, KY: Thomson method. London: SAGE Publications.
Learning.
Ross, D. T., & Schoman, K. E. (1977). Structured
Mills, J., Platts, K., & Bourne, M. (2003). Com- analysis requirements definitions. IEEE Trans-
petence and resource architectures. International actions on Software Engineering, SE-3, 6–15.
Journal of Operations & Production Management, doi:10.1109/TSE.1977.229899
3(9), 977–994. doi:10.1108/01443570310491738
395
Enterprise Modelling in Support of Organisation Design and Change
Siemieniuch, C.E., Sinclair, M.A., & Vaughan, Williams, T. J. (1994). The Purdue enterprise refer-
G.M.C. (1998). A method for decision support for ence architecture. Computers in Industry, 24(2-3),
allocation of functions and design of jobs in manu- 141–158. doi:10.1016/0166-3615(94)90017-5
facturing based on knowledge requirements. Int.
Womack, J. P., Jones, D. T., & Roos, D. (1990).
Journal of Computer Integrated Manufacturing.
The machine that changed the world. New York:
Vernadat, F. B. (1996). Enterprise modelling & Oxford Associates.
integrations: Principles and applications. Lon-
Wu, I. L. (1992). Manufacturing systems design
don: Chapman & Hall.
and analysis. London: Chapman & Hall.
Vernadat, F. B. (2004). Enterprise modelling &
Yogesh, M. (1998). Business process redesign:
integration: Myth or reality? France: MACSI/
Business change of mythic proportions? MIS
INRIA & LGIPM, University of Metz.
Quarterly, 121–127.
Wainright, C. E. R., & Ridgeway, K. (1994). The
Zelm, M. (2003). Towards user oriented enterprise
application of GRAI as a framework for manufac-
modelling- comparison of modelling language
turing strategy process, Factory 2000-Advanced
constructs. In R. Jardim-Goncalves, et al (Eds.),
Factory Automation, Conference Publication, No.
Proc. of the 10th ISPE Int. Conf. on CE: Research
398. IEEE Press.
and applications. Madeira Portugal: Swets &
Warnecke, H. J. (1993). The fractal company Zeitilinger.
- a revolution in corporate culture. New York:
Zelm, M., Vernadat, F. B., & Kosanke, K. (1995).
Springer-Verlag.
The CIMOSA business modelling process. Com-
Weston, R. H. (1998). Integration infrastructure puters in Industry, 27, 123–142. doi:10.1016/0166-
requirements for agile manufacturing systems. 3615(95)00018-2
Proc. of Instn of Mech. Engineers., 212(Part B),
Zhen, M., & Weston, R. H. (2006). Simulating
423-437.
dynamic behaviours in complex organisations:
Weston, R. H., Clements, P. E., Shorter, D. N., Case study application of a well structure model-
Hodgson, A. J., & West, A. A. (2001). On the ex- ling approach. In A. Nketsa, et al (Eds.), Proc. of
plicit modelling of systems of human resources. In- the European Simulation and Modelling Confer-
ternational Journal of Production Research, 39(2), ence, Modelling and Simulation (ESM’2006),
185–204. doi:10.1080/00207540010001857 EUROSIS-ETI, Toulouse, France (pp. 390-395).
This work was previously published in Social, Managerial, and Organizational Dimensions of Enterprise Information Sys-
tems, edited by Maria Manuela Cruz-Cunha, pp. 352-378, copyright 2010 by Information Science Reference (an imprint of
IGI Global).
396
397
Chapter 2.6
The Enterprise Systems
Approach
Andrew Targowski
Western Michigan University, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Enterprise Systems Approach
The ES approach became necessary in the “systems administrators” who are the craftsmen
1990s when the complexity of enterprise systems of the Information Age. There are an estimated
became the major issue in systems development 7,000 such data centers in America alone. It is not
and was integrated into thousands of IT solutions. It surprising that that they are inefficient. On average,
was necessary to provide a general, well-modeled only 6% of server capacity is used and nearly the
map of IT systems and services thatcould help in 30% that are no longer in use at all, no one has
understanding the rising enterprise complexity, bothered to remove. Many data centers will be
which had to be contained and explored for the consolidated and given a big reengineering. For
sake of enterprise operations. example, Hewlett-Packard (HP) used to have 85
data centers with 19,000 IT workers worldwide.
trends of enterprise One can expect that it will be cut down to six
systems development facilities in America with just 8,000 employees
by the end of 2008 and the budget cut from 4%
The process of IT-driven enterprise formation will to 2% of revenue (The Economist, October 28,
take sharp turns in the 21st century while more 2008, p. 6).
technologies and standards will be developed
and further challenge business and IT execu- • As a result of such operations integrations,
tives. The single major question for application data centers are becoming factories for
acquisition in the past was “make or buy?” It computing services on an industrial scale.
was assumed that whether an application was Software is increasingly being delivered
“made” or “bought,” it would almost inevitably as an online service and wireless networks
be run inside the enterprise firewall. But in the are connecting to more and more devices..
21st century the IT industry is entering a period All these allow computing to be disag-
of massive innovation and growth in alternative gregated into components or “services,”
delivery models, ranging from in IT terminology. This trend leads to the
development of cloud computing, in which
• EAI through to full-blown BPI, SaaS, and information is permanently stored in serv-
SOA. So now, the costs, risks, benefits, ers on the Internet and cached temporarily
and sustainability associated with each one on clients that include desktops, entertain-
must be carefully evaluated. A 21st-centu- ment centers, table computers, notebooks,
ry enterprise systems portfolio will contain wall computers, handhelds, sensors, moni-
an eclectic mix of delivery models as the tors, etc. Cloud computing is a general
economics of delivery change and technol- concept that incorporates software as a
ogy progresses. It is extremely important service (SaaS), Web 2.0, and other technol-
that any enterprise application strategy is ogy concepts in which the common theme
fully informed about current capabilities of is reliance on the Internet for satisfying the
different delivery models and is aware of computing needs of the users. For exam-
how these may develop over time. ple, Google Apps provides common busi-
ness applications online that are accessed
Before Ford revolutionized carmaking, au- from a user’s web browser, while the soft-
tomobiles were assembled by teams of skilled ware and data are stored on the Google’s
craftsmen in custom-built workshops. Similarly, servers farms. Since cloud computing ap-
most corporate data centers today house armies of plies the Internet for data transportation, it
398
The Enterprise Systems Approach
will be a questionable path for distributing operating worldwide and in which students
corporate data, which, up until now, were in many locations come together in a “vir-
transmitted through private networks. tual classroom” to form a virtual business.
They do not conduct real transactions, nor
The enormous applications of the Internet and do they sell real merchandise. The purpose
its cost and time cutting practices in delivering of the class is simply to learn how to start
services lead to the development of virtual enter- and run a business. The business is usu-
prises, which are organizations without walls but ally replaced at the end of the year for the
with a cyberspace. The virtualization of business next group of students. The students do
and the society takes very convincing forms in business with many companies, and even
the beginning of the 21st century. Hence, one can hold trade fairs and grand openings. One
predict that the following trend in the development of examples of new emerging ES are: e-
of ES will take place: commerce, collaborative communication
(MS SharePoint), and so forth. A more new
• To support the development and operations ES’ development and implementations one
of virtual enterprise (VE), which is a tem- can expect in the near future (Targowski
porary alliance of enterprises that come to- 2009a).
gether to share skills or core competencies
and resources in order to better respond to The financial crisis which touched the world
business opportunities, and whose cooper- in October 2008 should change the development
ation is supported by computer networks. of ES. Since the failure of banks and financial
It is a manifestation of Collaborative institutions has something to do with the enormous
Networks and a particular case of Virtual complexity of created enterprises, which get out
Organization (VO). VO defies the conven- of control? For example Lehman Brothers and
tional rule for operating an organization. It Wachovia Bank were not economically vital and
does so by accomplishing tasks traditional- sustainable firms in 2008 because their business
ly meant for an organization much bigger, practices did not adequately consider the long-
better resourced, and financially stable. A term consequences of their actions. The collapse
company having the technical capability of Enron in the 2000s showed the importance of
with the right human skill set and another internal policies such as maintaining adequate
with the solution may come together to controls and good corporate governance practices
create a VO. The VE (a kind of VO) does on a firm’s sustainability. Environmental steward-
not exist in the physical sense but on an ship requires consideration of how to use natural
electronic network representing a partner- resources in a productive, efficient, and profitable
ship of businesses existing as a nebulous manner. Concern for how goods and services
form of business organization that only ex- are produced, packaged, transported, used, and
ists to meet a market opportunity. Today, recycled calls for examining supply chain poli-
there are numerous virtual enterprises on cies as well as energy and environmental impacts.
the Internet. Virtual Music Enterprises is Social responsibility starts, but does not end, with
one example of a virtual enterprise Virtual the employee and a firm’s hiring, opportunity and
Enterprise California lists several other training practices. The needs of other stakeholders
examples. Another example of a Virtual (suppliers, customers, investors) and their cultural
Enterprise would be an educational class concerns, as well as the community at large and
399
The Enterprise Systems Approach
even the future generations are increasingly impor- tested market space, ripping for growth. Such
tant. Hence, the expected trend in the development strategic moves, termed “value innovation,” create
of ES should lead towards the development of: powerful leaps in value for both the firm and its
buyers, rendering rivals obsolete and unleashing
• Sustainable enterprise and supporting an new demand. It leads to:
appropriate information infrastructure.
Sustainability has been defined as “meet- • Development of value-creation enterprise.
ing the needs of the present without com- Examples of such enterprises include:
promising the ability of future generations Barnes & Noble Bookstores, Cirque du
to meet their needs.” This definition calls Soleil, and Dell Computers which created
for business organizations to operate in a new market space (with a new value for
manner that values the well-being of stake- customers) that outperformed other books
holders (customers, suppliers, employ- stores, cirques, and PC makers. This new
ees and investors) in sustaining economic emerging kind of enterprise will need a
prosperity while also taking care of their new set of key enterprise systems.
employees and the environment. The core
concept of sustainability seeks to encour- Table 1 illustrates a typology of emerging new
age the adoption and implementation of kinds of enterprises, which determine appropriate
practices that aim at the “triple bottom support of enterprise systems.
line:” The ES are not only being implemented in
i. Economic vitality, industrial practice. They also are taught at the uni-
ii. Environmental stewardship, and versity level where courses on enterprise projects
iii. Social responsibility. are not only undertaken, but also are supported by
computer laboratories that introduce students to
While initially, sustainability was viewed as hands-on use of enterprise software such as SAP
primarily focusing on preserving the earth’s re- and MS Dynamics. One of the leaders in this kind
sources, its broader meaning today encompasses of education is the Western Michigan University
the achievement of economic prosperity while and its Business Information Systems Department
caring not only for the planet’s resources, but (Targowski & Tarn 2006).
also for the well-being of employees, society, and The presented solutions define the current state
culture and future generations. Each of the three of the art and provide generic rather than specific
segments of the triple-bottom line will require solutions. Perhaps such an approach will make
businesses to examine and refocus their current the presented solutions more permanent. The
policies and practices, as well as supporting the presented future trends of enterprise systems lead
information infrastructure. to more complex implementations of ES opera-
Companies have long engaged in head-to-head tions. However, more new enterprise systems one
competition in search of sustained, profitable must expect, particularly such ones, which will
growth. They have fought for competitive advan- be supporting virtual enterprise/organization,
tage, battled over market shares, and struggled sustainable enterprise, and value-creation enter-
for differentiation. Yet in today’s overcrowded prise. Solutions as SOA and cloud computing at
industries, competing head-on results in nothing first glance seem to be more effective. However,
but a bloody “Red Ocean” of rivals fighting over a whether will they be more reliable it is a big ques-
shrinking profit pool. Kim and Mauborgne (2005) tion which will be answered in coming practice
developed a strategy of Blue Ocean for uncon- of successful and failing users.
400
The Enterprise Systems Approach
This chapter first defines a concept of the en- as system engineering (Schlager 1956, Goode
terprise systems approach, its evolution, and then & Robert Machol 1957, Chestnut 1967). The
reviews major theoretical and industrial solutions system analysis applications in civil applications
being practiced by this approach. It concludes with led to the development of the system approach for
the assumption that this approach’s success will computer applications design (McDonough 1963,
depend on more defined and applied standards Kanter 1966) and system-oriented approach to the
which should smooth the flaws of information, conceptualization of social dynamics in sociology
communications, and other processes within an (Buckley 1967). Eventually, the system engineer-
enterprise and among enterprises. ing approach was applied as a method of designing
“hard” complex products. Its generalization led
to the conceptualization of the system approach
tHe emerGence oF tHe for “soft” products (Van Gigch (1974).
enterPrIse systems APProAcH In the 1970s and 1980s the supply of com-
prehensive families of mainframe computers
The enterprise systems approach has roots in the (ex. IBM 360 and 370) facilitated the strong
General System Theory, defined by Ludwig von development of computer information systems in
Bertalanffy in 1951 and in Cybernetics defined business and civic/governmental organizations. It
by Norbert Wiener in 1948. Based upon these two was the beginning stage of this kind of applica-
theories, the system analysis has been emerging tions, which eventually led to the development
for military large-scale systems, practiced at the of the “information archipelago” (McFarlan,
RAND Corporation (Hitch 1955). Its applica- McKenny 1983) of disintegrated applications,
tions in military systems were intensified during currently called “legacy systems.” In response to
the first stage of the Cold War and early defined this growing crisis, McFarlan offered a concept
401
The Enterprise Systems Approach
of the “applications portfolio” (1981), a set of a Enterprise Systems expand ERP toward SCM
few key applications which should be controlled (Supply Chain Management) and CRM (Customer
carefully by IT managers, currently called Chief Relationships Management). Today, due to off-
Information Officers (CIO). This strategy was shore outsourcing of manufacturing, the impetus
widely accepted by computer executive since they towards the further development of CAD/CAM
had no challenge of more advanced applications. within ES is less energetic than used to be in the
Eventually, the Application Portfolio led past in the U.S and in Western Europe.
to the long stagnation of the system approach At the beginning 21st century, the enterprise sys-
and its vigorous application in the computer tems approach is popular and has many scholars,
information systems development in practice. practitioners, and writers occupied which improv-
Targowski contrasted this approach with his ideas ing this approach, mostly in the scope of enterprise
of the enterprise systems approach in his book, architecture (Rechting & Maier 1997, Carbone
Architecture and Planning of Enterprise-wide 2004). IBM promotes the so -called the Zachman
Information Management Systems (1990). His Framework as a classification structure often used
hypothesis was that if the enterprise systems are in Information Technology departments by the
properly planned and designed, they will limit the teams responsible for developing and document-
“information archipelago” and provide the tools ing an Enterprise Architecture. The Framework is
for the logical integration of systems within the used for organizing architectural “artifacts” in a
enterprise. A few years later, as a result of Ameri- way that takes into account both who the artifact
can enterprise dynamics stagnation, Hammer and targets (for example, business owner, and builder)
Champy called for Reengineering the Corporation and what particular issue is being addressed (for
(1993), which must lead to radical redesign of a example, data and functionality). These artifacts
company’s processes, organization, and culture may include design documents, specifications,
to achieve a quantum leap in performance. Ever and models. The Zachman Framework is one of
since, the system approach was aimed toward the the earliest Enterprise Architecture frameworks
whole enterprise. (Zachman 1987).
Targowski’s scholar message (1990) was Scott Bernard defines enterprise architecture
weak in the industrial circles, but Hammer and as:
Champy’s bestseller showed the right direction
on how to invigorate ES, at least for IT profes- The analysis and documentation of an enterprise
sionals. Its first step led towards the development in its current and future states from an integrated
of Enterprise Resources Planning (ERP), which strategy, business, and technology perspective
integrated MRP I (Material Requirements Plan- (2005:31).
ning) with MRP II (Manufacturing Resources
Planning). Hence, such software systems, such Its components are limited to: goals and initia-
as SAP, gained world-wide popularity. However, tives; products and services; data and information;
only IBM meant to apply the enterprise systems systems and applications; and networks and in-
approach holistically when it offered Computer frastructure as an Enterprise Architecture Cube.
Integrated Manufacturing (CIM), which contained Enterprise architecture as a business strategy
CAD, CAM, MIS and Office Automation Systems. was recognized by Ross, Weill, and Robertson
Unfortunately, IBM quit this kind of systems (2006) who researched more than 200 compa-
delivery and switched to the promotion of SAP, nies. They found that the successful companies
which is based on early IBM PICS and COPICS were those which operated through the enterprise
systems (without CAD/CAM). Nowadays, the architecture concept. The authors noticed that,
402
The Enterprise Systems Approach
A high-level enterprise architecture creates shared The Schekkerman Model of Enterprise Ar-
understanding of how a company will operate, chitecture is shown in Figure 1. It is a model of
but the convergence of people, process, and tech- extended enterprise, which goes far beyond the
nology necessary to implement that architecture information enterprise architecture.
demands shared understanding of process and For example, a very strong user of enterprise
data at a more detailed level (2005:49). architecture concept is the U.S. Department of
Defense (DOD), which applies a concept of En-
Schekkerman (1995) is one of leading spe- terprise Architecture Framework (DODAF) in
cialists who not only recognized the importance order to (Mosto 2004):
of enterprise architecture but in order to pursue
its farther right development, founded the in- • Define a common approach for describing,
dependent Institute for Enterprise Architecture presenting, and comparing DoD enterprise
Developments (IFEAD) in the Netherlands. architectures
IFEAD publishes professional recommendations • Facilitate the use of common principles,
and provides solutions based on its definition – assumptions and terminology
403
The Enterprise Systems Approach
• System Architecture is like blueprints for • Users’ groups and their system needs
a building • Operational Environment (OE)
• Enterprise Architecture is like urban • Solution Logic (SL)
planning • Solution Assessment (SA)
• State-of-the-art of profession and technol-
However, as far as information enterprise ogy (SA)
architecture is concerned, the main attention in • Peaceful cooperation with the nature (N)
business practice at the beginning of the 21st cen-
tury is turning towards a system of servicing of The enterprise systems’ planning/modeling is
application software and information processing done in such a way that the resulting solutions are
on a large scale within the concept of SOA and expressive and correct. The architectural dimen-
cloud computing. A concept of extended enterprise sions of ES are shown in Figure 2. As George Klir
architecture is still in status nascendi but offers (1985, p. 27) indicates, the architectural system
very promising solutions for more advanced and planning should be described from a proper per-
ambitious firms. spective so as to recognize its overall structure
without being distracted by details.
The ES approach is defined as the art and
tHe enterPrIse systems science of solutions planning applied to fulfill
APProAcH deFIned the practical and the synergetic requirements of
information technology (IT) advanced enterprise
The enterprise systems (ES) approach has roots environments, including users and customers. The
in the system approach, which was initiated at the characteristics that distinguish the work of an sys-
RAND Think Tank of the Air Force in the 1950, tem architect from other man-made structures are:
by such pioneers as Charles Hitch (1955) and
others, who applied this approach in developing • The suitability of the solutions for use by
complex military systems. In the 1990s, when all stakeholders
information systems strategic planning became • The stability and relative permanence of
popular in business enterprises it was evident that solution construction for 15 to 25 years
the enterprise systems’ big-picture can be best • The communication of solutions’ ideas
defined under the form of the enterprise systems and assessment through the open-ended
architecture. configuration.
The enterprise systems approach is based
on the philosophy of the system approach (Klir The modeling of the ES architecture begins,
1985) and management cybernetics (Beer 1981), when the business and IT strategies are defined
graphic-architectural modeling, and was first and is based on the following principles:
defined by Targowski (1990) as a comprehensive
and cohesive solution to the problem of system 1. Cybernetization. A good ES architecture is
development, thus eliminating the fuzziness of viable and capable of growing, and adapting
the “Applications Portfolio” and the “Information to complex, dynamic enterprise operations.
Archipelago” (McFarlan 1981). This architecture should be self-organizing,
The enterprise systems architectural approach with a feedback, and requisite variety.
involves thought and graphic visualization in the 2. Systematization. A good ES architecture is
following dimensions: modeled as a set of components and inter-
relationships in order to accomplish a given
404
The Enterprise Systems Approach
goal and produce results outside of ES, 7. Value Engineering. A good ES architecture
despite of the external obstacles. does not contain unnecessary components
3. Cohesiveness. A good ES architecture makes but only these ones that are proper for a
all components of ES sticking together and given solution.
it supports the enterprise functions and 8. Sustainability. A good ES architecture
processes in a harmonious manner. supports the reliable development and
4. Categorization. A good ES architecture operations of an enterprise in a long-term
requires that ES components are self- perspective, taking into account; economic
contained, independent of each other, and vitality, environmental stewardship, and
planned without repetition in different forms. social responsibility.
5. Primitiveness. A good ES architecture is 9. Open-ended structures. A good ES archi-
based on generic elements and relationships. tecture is open for future improvements
Further extensions of the ES’s functionality and for the insertion of components that are
should have roots in the primitive, generic perceivable though not yet available.
model of a given element.
6. Completeness. A good ES architecture is The application of these principles in the
perceives all major and possible components modeling of ES architecture determines the reli-
of solution logic (SL) and technical orienta- ability, quality, and efficiency of a solution for the
tion (TO). whole enterprise. To the extent that these general
405
The Enterprise Systems Approach
principles are known, they provide limits on what social change in the growing com-
is possible and guidance on what is efficient plexity of social issues,
(Clemson 1984). ◦ Pluralism – representing interest
Functions of the ES architect. The functions groups affected by computer use with
of the ES architect are numerous and include the “fair information practices” and with
technical as well as the sociological aspects of a combination of legal, regulatory,
information management. The ES architect must and security measures to protect the
be an expert in application systems and their hard- public and users,
ware/network infrastructures. He/she must know ◦ Radical criticism – protesting the
how to arrange the many components of these ap- philosophy that computers should be
plications/infrastructures in the most economical allowed to have their own logic of in-
and convenient manner by using graphic modeling dependence, and that mega computer
tools. Such applied sciences are used as system systems should be developed to op-
science, decision science, management, econom- erate automatically without human
ics, information engineering, etc.The ES architect control,
must know how to draft, render and finish in a ◦ De-evolutionism – gaining power of
very good visual manner the expected solution. design and loosing control over use,
The ES architect as a social engineer has a ◦ Computer surveillance – producing
choice of using: organizational benefits, since em-
ployees “better” work.
• Tools of information technology, such as
system analysis and design, programming Because these choices of ES factors, the archi-
high level languages, databases, knowl- tect should have of social awareness about what is
edge bases, utility software for rapid pro- he/she is going to develop. Social awareness can
totyping solutions, be composed of social biases, beliefs, and expecta-
• Stimulations defined in information poli- tions. Social biases are influenced by the choice of
cies on security, privacy, trade, computer IT tools. For example, a technical bias advocates
crime, intellectual property, ethics, and so that technology can solve a social problem, while
forth, a non-technical bias supports the view that such a
• Positions that will influence ES modeling problem can be solved through managerial action
(Mowshowitz 1980): such as leadership or an improved market strategy.
◦ Technicism – using IT as an instru- The choice of stimulations can influence social
ment of progress, where success or beliefs. For example, computers can be seen as
failure depends on the system design strength of the economy or as a threat to an indi-
and implementation; social and po- vidual privacy and autonomy. Social expectations
litical consequences are ignore, are the result of a position taken by the ES architect
◦ Progressive individualism – human- and are determined by the information culture in
izing the system with computers as the scope of values (human and civil rights ver-
helpers to achieve desirable change, sus totalitarian slavery, creativity, and electronic
◦ Elitism – informing and rescuing so- friendship versus alienation), symbols (credits
ciety as the mission of the computer cards equate to a cashless society, computer screens
specialist becomes a mission of a equate to a paperless society), competence stan-
social engineer, which is the most dards (a lack of computer competence equates to
sophisticated method of steering the illiteracy), knowledge centers (data, knowledge,
406
The Enterprise Systems Approach
407
The Enterprise Systems Approach
Solution logic (SL) was oriented towards In the 1990s the first ES architectures are ap-
subsystems using databases; among the most pearing due to the integration of MRP I and MRP
popular were such ones as customer orders, master II into the ERP system complex on the business
schedules, inventory control, and bill of material side of an enterprise. On the technical side of the
processing (BOMP), cost control, and other. The enterprise, CAD and CAM evolved into a CIM
dominant professional was a system designer. The solution (SL). The operational environment (OE)
technical orientation (TO) was on-line process- embraced the whole enterprise and strategic role
ing via remote terminals accessing databases in of IT become a very important factor in a search
real time. The state of the art (SR) was database for business competitive advantage (SA) by Chief
technology and systems assessment was still a Information Officers (CIO). The wide proliferation
cost-benefit analysis. Figure 5 shows a set of of enterprise systems required good GUIs to make
key factors defining systems development in the systems easier to operate by the end-users (SR).
1970s. A system designer applied the MIND III Furthermore, stand-alone PCs were organized into
(practical). LANs, and building networks were connected
In the 1980s the creeping revolution of into MANs and eventually in WANs and GANs,
personal computers (TO) involved in the Com- creating dynamic private computer network grids
puter Age all workers of an enterprise, particu- (TO). Every 18 months personal computers have
larly business professionals, who soon learned been doubled their computing speed, so millions
spreadsheets and word editors (OE). Solution of them had to be recycled as they were replaced
logic (SL) put emphasis on sure applications, by faster units (N). Figure 7 reflects the situation
which were organized in a application portfo- in ES in the 1990s. The MIND I (theoretical) and
lio. The complexity of applications grown and MIND II (creative) as well as MIND III (practi-
required that more attention should be paid on cal) are engaged in the process of developing the
the system life cycle development and end-user ES architectures.
involvement in applications implementation In the 2000s the trend in developing ES takes
(“Joint Application Development”). Hence, a a sharp turn. The public Internet’s web technology
system developer became a key specialist in passes to enterprise networks, creating Intranets
this process (Figure 6). and Extranets (TO).
408
The Enterprise Systems Approach
409
The Enterprise Systems Approach
410
The Enterprise Systems Approach
Figure 10.
411
The Enterprise Systems Approach
412
The Enterprise Systems Approach
413
The Enterprise Systems Approach
Hammer and Champy say that ability to use every thing is right, the computer sends a
insight, imagination, and a willingness to challenge payment to a supplier, even without its in-
all assumptions are key to Business Process Re- voice. About 500 workers were moved to
engineering (BPR). In practice, BPR lets people other jobs, saving on cost.
change not only procedures but their rules. In • IBM Credit, the organization that finances
effect, they may change not only rules of a given computers, software, and service sold by
process but of the entire business. IBM, learned that the actual work required
Reengineering in the 1990s inspired executives to process a new customer could be com-
and managers in thousands of companies to start pleted in only 90 minutes, instead of the
rethinking and redesigning such basic business six days to two weeks it used to take.
practices as customer service, order fulfillment,
product development, etc. For example: The main premise of BPR is based on the
reorientation of business procedures from
• Ford Motor Company found that it em- function-driven to process-driven. Whereas the
ployed 100 times more people in its ac- former has roots in the 19th century bureaucracy,
counts payable department than smaller when each department had its own internal flow
Mazda. After reengineering the process, of information, the latter is based on the cross-
the company cut through the territory functional flow of information, which supports a
of accountants, purchasing department given process, for instance order fulfillment. The
staff, warehouse receiving clerks, and re- BPR Model in Figure 13 illustrates this change
ordered them. Now, a receiving clerk at in business practice.
Ford checks the database for the order and Reengineering approaches defined by Currid
delivery compatibility and quality and if (1995) are:
414
The Enterprise Systems Approach
415
The Enterprise Systems Approach
CAPP (Computer-aide Process Planning), and has 500,000 lines of code and 80,000 database
other ones supporting engineering. Among Op- tables, for 22+ application modules and 800
eration Information Systems one can include; business processes, becoming one of the most
CAM (Computer-aided Manufacturing), CAP complex software in the market, more complex
(Computer-aided Publishing), and other. The than MS Windows.
Inter-organization Systems may be identified by Figure 18 describes the Oracle Enterprise Suite
such ones as; SCM (Supply Chain Management) Software Architecture, which is less complex than
and e-Commerce (B2B, B2C). SAP and more intuitive, design according to the
Based on the EIA the next task will be to se- business cycle.
lect the right enterprise software and develop the Figure 19 depicts the MS Dynamics Enterprise
Enterprise Software Architecture. Software, which is designed mostly for small and
medium size companies in a very “compact” manner.
Microsoft Dynamics enterprise software sup-
tHe enterPrIse soFtWAre ports three most critical functional areas: Financial
ArcHItecture Management; Customer Relationship Manage-
ment and Supply Chain Management, indicating
The Enterprise Software Architecture (ESA) is the trend of integrating business functions/pro-
well described in Figure 16, where the SAP soft- cesses into self-contained system federations. The
ware collaborates with no-SAP software. generic and vendor-independent ESA is defined
The more detailed SAP Software Architecture in Figure 20, where shadow areas identify web-
is shown in Figure 17, where 22 modules/systems technology driven most popular applications in
are presented. Needless to say that this software 2006 (Targowski 2003).
Figure 16. The general enterprise SAP R/3 software architecture (the Targowski model)
416
The Enterprise Systems Approach
417
The Enterprise Systems Approach
418
The Enterprise Systems Approach
419
The Enterprise Systems Approach
etrated by different service-oriented software are designed as a single whole (e.g., SCM, ERP,
modules, particularly web-driven ones. In the CRM), BCA consists of a coalition of Business
past, the integration efforts represented data and Components that communicate either via events
information, now they add processes. (EDA) or via request/reply calls (SOA). The BCA
In order to apply the SOA, applications need offers the following benefits:
to be “deconstructed” into their component ser-
vices – each of which performs a specific business 1) BC are easier to develop since are smaller
function, such as address lookup, customer credit and less complex than whole applications,
check, and so on (Figure 23). Within the SOA 2) BC are reusable,
such services can be assembled and delivered 3) BC are easily deployable and modifiable,
by specialized services throughout the Internet, 4). BC contributes to easier software con-
according to required standards. figuration management.
The Business Component Architecture (BCA) The way of using the web-driven services is
refers to the development of enterprise systems’ described in Figure 25. In this mode, it is necessary
service as a collection of reusable business com- to apply the Web Service Description Language
ponents/services that interact via request/reply (WSDL). The following steps are involved in
(SOA) only. The BCA in some projects includes providing and consuming a service:
the Event-driven Architecture (EDA), which
continue to exchange between different service- 1. A service provider describes its service using
oriented software components (Figure 24). In WSDL, which is inserted into the Service
contrast to traditional, monolithic applications that Directory, which is accessible through the
420
The Enterprise Systems Approach
UDDI (Universal Description, Discovery, guages. Since 1998, the Java Message Service
and Integration) registry for the retrieval of (JMS) has emerged as the dominant industry
services provided by various vendors. standard for enterprise communication, imple-
2. A service consumer queries the Service mented by thousands of companies. Many other
Directory to locate a service provider and find communication standards have been developed
out how to communicate with that service. and the Enterprise Service Bus (ESB) emerged
3. Part of the WSDL provided by the service as a channel for communicating all standardized
provider is passed to the service consumer, messages (Figure 26).
informing about a system of request and The ESB supports development in multiple
responses applied by the vendor. programming languages, becoming a multi-plat-
4. The service consumer uses the WSDL to form enterprise backbone, perhaps the Enterprise
send a request to the service provider. Nervous System (ENS) facilitating; communica-
5. The service provider provides the expected tions, connectivity, transformation, portability
response to service consumer. and security.
421
The Enterprise Systems Approach
Figure 25. The system of using Web-available services (SOAP – SOA Protocol)
422
The Enterprise Systems Approach
tHe enterPrIse
conFIGurAtIons
423
The Enterprise Systems Approach
• Sustainable enterprise, which is economi- with CIOs and triggered the outsourcing the IT
cally vital, environmentally friendly and projects, first inshore and later offshore (looking
socially responsible. for cost advantage). Eventually, due to the latter,
the quality of IT solutions could be in question
The above sequence of the enterprise evolu- and the reliability of solution may be lower.
tion is a simplified model, as is each model. In The nowadays IT-driven enterprise can look
practice, some components of these enterprises as it is shown in Figure 28.
can appear in just one enterprise and very often in
a sequence different than the evolutionary model.
However, very often such enterprises, which have conclusIon
only a piece of each configuration are considered
unfinished solutions with questionable benefits The future of the enterprise systems approach will
of information technology. The purpose of the be more complex as IT is still considered as the main
enterprise evolution is to know its requirements factor in achieving competitive advantage in the
for each configuration’s architecture, budget, Global Economy (Targowski 2009b). Only in the
developmental skills, and the timeline. U.S. are expenditures for information management
So far the development of IT-driven enterprise 15% of GNP, in the range of $ 2 billion (2006).
has been incremental, leading to a mixture of all This enormous amount of financial means will
the presented enterprise configurations with over support the development of IT-driven enterprises.
the budget projects, overwhelming IT workers, Their success will depend on more defined and ap-
who could not cope with such increasing com- plied standards, which should smooth the flows of
plexities. As a result of it, CEOs disconnected information, communications, and other processes.
424
The Enterprise Systems Approach
425
The Enterprise Systems Approach
This work was previously published in Social, Managerial, and Organizational Dimensions of Enterprise Information Sys-
tems, edited by Maria Manuela Cruz-Cunha, pp. 1-30, copyright 2010 by Information Science Reference (an imprint of IGI
Global).
426
427
Chapter 2.7
Designing Data Marts from XML
and Relational Data Sources
Yasser Hachaichi
Mir@cl Laboratory, Faculté des Sciences Economiques et de Gestion, Tunisia
Jamel Feki
Mir@cl Laboratory, Faculté des Sciences Economiques et de Gestion, Tunisia
Hanene Ben-Abdallah
Mir@cl Laboratory, Faculté des Sciences Economiques et de Gestion, Tunisia
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Designing Data Marts from XML and Relational Data Sources
a DW can be used as a source for building data precisely, it presents a DM design method that
marts (DM) that are oriented to specific subjects starts from both a relational database source and
of analyses. XML documents compliant to a given DTD.
Traditionally, the data loaded into a DW/ Besides considering these two types of data struc-
DM is mainly issued from the enterprise’s own tures, our method has three additional advantages.
operational information system. Thus, most cur- First, it provides for a DSS development centered
rently proposed DW/DM construction approaches on decision makers: it assists them in defining
suppose a single, often relational data source; cf., their analytical needs by proposing all analytical
(List, Bruckner, Machacze, & Schiefer, 2002), subjects that could be automatically extracted
(Golfarelli, Maio, & Rizz, 1998), (Cabibbo, L., from their data sources; the automatic extraction
& Torlone, R. 1998), (Moody , & Kortnik, 2000), of DM schemas distinguishes our method from
(Prat, Akoka , & Comyn-Wattiau, 2006), (Zribi, currently proposed ones. Secondly, it guarantees
& feki, 2007), (Golfarelli, Rizzi, & Vrdoljak, that the extracted subjects are loadable fromthe
2001), (Vrdoljak, Banek, & Rizzi, 2003), (Jensen, enterprise information system and/or the external
Møller, & Pedersen, 2001). However, due to the data sources. The third advantage of our design
international competition, enterprises are increas- method is its genericity: It is domain independent
ingly forced to enrich their own data repository since it relies on the structural properties of the
with data coming from external sources. Besides data sources independently of their semantics.
data received from partners, the web constitutes It automatically applies a set of rules to extract,
the main external data source for all enterprises. from the relational database and XML docu-
For instance, an enterprise may need to retrieve ments, all possible facts with their dimensions
from the web data about the exchange rates in and hierarchies.
order to analyze the variation of the quantities To achieve these advantages, our method oper-
of its sold products with respect to the exchange ates in four steps. First, it structurally homogenizes
rates during a period of time. the two types of data sources by converting the
To deal with such an open data source, a DW/ DTD into a relational model. Secondly, it classifies
DM construction approach must, hence, overcome the set of relations issued from both the converted
the main difficulty behind the use of multiple DTD and the repository of the source relational
data sources: the structural and semantic hetero- DBMS. This classification is then used to identify
geneities of the sources. In fact, even though the automatically the facts, measures, dimensions
relational data model is the most commonly used and their attributes organized into hierarchies;
model (Wikipedia encyclopedia, 2008), a DW these identified multidimensional elements are
construction approach must now deal with other modeled as star DM schemas. Finally, the result-
data types and in particular XML documents which ing DM schemas can be manually adapted by
represent the dominant data type on the web. On the decision makers/designers to specify their
the other hand, the semantic data heterogeneity particular analytical needs. The automatic steps
comes into play when the internal and external of our design method allowed us to incorporate
data sources are complementary, e.g., the case of it into a CASE toolset that interactively provides
transactional data between partners. This type of for DM schema adaptation.
heterogeneity remains a challenging problem that The remainder of this chapter is organized as
can be treated either at the data source level or follows. First we overview current DW design
the DW/DM level (Boufares, & Hamdoun, 2005). approaches for relational and XML data sources.
This chapter deals with the structural data Then, we illustrate our four-step DM design
heterogeneity when designing a data mart. More method through a relational data source and a
428
Designing Data Marts from XML and Relational Data Sources
429
Designing Data Marts from XML and Relational Data Sources
for each transaction entity. Each schema is a star Taniar, 2005) also propose a generic method for
schema represented through a fact table and a building an XML DW for XML documents. Their
number of dimension and sub-dimension tables. method first applies a set of cleaning and integra-
Separates star schemas can be combined to form tion operations in order to minimize the number
constellations or galaxies. of occurrences of dirty data, XML structural er-
rors, duplications or inconsistencies. Secondly, it
xml-based design Approaches summarizes data in XML documents to extract
only useful and valuable information in order to
(Golfarelli, Rizzi, & Vrdoljak, 2001) propose a create other XML document(s) used for the con-
method for the design of an XML DW from XML struction of the dimensions. Thirdly, the method
sources. Their method relies on two assumptions: creates intermediate XML documents from the
the existence of a DTD for the XML documents, initial documents; this step focuses on determining
and the conformity of these documents to their the main activity data (data involved in queries,
corresponding DTD. This method designs a DW calculations etc.). Thus, each intermediate docu-
in three steps: 1) DTD simplification mainly to ment linked to other documents represents a fact
flatten nested elements; 2) DTD graph creation document. Finally, the method updates/links all
in order to represent graphically the source struc- intermediate XML documents (fact and dimen-
ture and simplify the manual fact selection; and sion documents), in such a way that relationships
3) construction of an attribute tree for each fact between keys are established, and an XML DW
in the graph; within the attribute tree dimensions is created. In this method, several sub-steps have
and measures are found among the nodes imme- to be accomplished manually by an expert in the
diately linked to the chosen fact. In this method, XML document domain.
the selection of facts and measures is manual Furthermore, (Jensen, Møller, & Pedersen,
and requires the intervention of an expert in the 2001) studied how an OLAP cube can be obtained
domain of the XML documents that will load the from XML data. To build a cube, the DTD of the
future data warehouse. XML documents is transformed into a UML class
In an attempt to improve their method, (Vr- diagram using a set of transformation rules. Once
doljak, Banek, & Rizzi, 2003) developed a semi- the class diagram is obtained, the designer uses
automated process to design XML data warehouses it to specify an OLAP DB model (named a UML
from XML schemas. Once again, in this process, snowflake diagram) through a graphical user in-
facts and measures are chosen manually. For terface. Finally, the UML snowflake diagram is
each selected fact, they 1) build the dependency transformed into relational structures to prepare
graph from the XML schema graph; 2) rearrange the implementation of the OLAP cube. This ap-
the dependency graph to define dimensions and proach is also used by (Ouaret, Z., Bellatreche,
measures; and then 3) create a logical schema. One L., and Boussaid, O., 2007) who starts from XML
main drawback of this method is that it requires schemas instead of the DTD.
an intensive intervention of the designer. In addi- In summary, we notice that:
tion to manually identifying the fact, dimensions
and measures, the designer must also identify the 1. although data-driven approaches for multi-
many-to-many relationships among elements; dimensional design proceed automatically
these relationships are needed to construct the from either E/R or UML, they are based on
dependency graph. conceptual models that companies either do
On the other hand, the authors of (Rusu, not always have, or detain obsolete versions;
Rahayu, & Taniar, 2004) and (Rusu, Rahayu, &
430
Designing Data Marts from XML and Relational Data Sources
2. the few proposed approaches for the design or structured as XML documents compliant to a
of XML-based DM/DW suppose that the given DTD. This method enjoys four main advan-
designer is able to manually identify the tages: 1) It overcomes the problem of absence/
interesting facts to be analyzed. However, obsoleteness of conventional documentation
this identification requires a high expertise (i.e., E/A diagram, UML class diagram). In fact,
both in OLAP domain and, the XML docu- it exploits the recent version of the data source
ment domain; extracted from the DBMS repository or described
3. all methods consider that the candidate DM by XML documents in use; 2) it automates the
built are of the same pertinence whereas main design steps; 3) it assists the designer in
some of these DM may not be useful for the choice of relevant multidimensional concepts
the decisional process; and among those extracted by assigning to each one a
4. the proposed approaches try to represent the relevance level reflecting its analytical potential
main DM properties at a conceptual level by for the decision-making; and 4) it keeps track of
abstracting away details of an envisaged DW the origin of each component in the generated DM
implementation platform. “Unfortunately, schema. This traceability is fundamental both to
none of these approaches defines a set of automatically derive logical representations and
formal transformations in order to: (i) univo- to define ETL processes.
cally and automatically derive every possible
logical representation from the conceptual
model; or (ii) help the designer to obtain dAtA mArt desIGn For
the most suitable logical representation of relAtIonAl And xml sources
the developed conceptual model” (Mazón,
& Trujillo, 2008). Our design method is a bottom-up method for
DM that starts from a relational database source
To overcome these problems, we propose a and XML documents compliant to a given DTD.
bi-source method that builds DM schemas from Unlike existing approaches, ours is composed of
data sources either modeled as relational databases four steps (Figure 1) among which only the last
Figure 1. Designing data mart schemas from XML and relational data sources
DATA SOURCE PRETREATMENT RELATIONS CLASSIFICATION DATA MART CONSTRUCTION DATA MART ADAPTATION
1
DTD
DTD
simplification DTDS
AN_UNIV
2
TYP_ENS NUM_CYC
Entities Relationships
ID NBRE_ETUD
I
Transitiontree
tree
E_MAIL
VOL_HOR_MAT NAT_ENSMT
Transition
NUM_SEM DCS NAT_ENSMT
NUM_TEL_F (ENSEIGNANT)
DCS NUM_SEM
NUM_TEL_M (ENSEIGNANT)
CustomerID Name Address
construction
AN_UNIV
identification
PRE_ENS NBRE_GRP INT_MAT INT_AUD
XML
Customer
R3 (g,k,…,l) Rn (e#,g#,…,y) TYP_ENS
VOL_HOR_ENS_MAT
NBRE_ETUD
NUM_CYC
3 ID E_MAIL
VOL_HOR_MAT
I NAT_ENSMT
Transitiontree
tree
NUM_SEM DCS NAT_ENSMT
NUM_TEL_F (ENSEIGNANT)
XML
DCS NUM_SEM
Transition
NUM_TEL_M (ENSEIGNANT)
CustomerID Name Address
XML enrichment
enrichment
number string
Locality Zip
string string
Adapted Data marts
AN_UNIV
DCS AN_UNIV
6
ENSEIGNEMENT_ASSURE COD_MAT
COD_AUD COD_SEC
GRAD_ENS COD_ENS
MATIERE
Conceptualclass
class
ENSEIGNANT
DB 1’ 4
NOM_ENS NBR_GRP_ENS INT_SEC
schema
DB schema Relationalschema
schema Conceptual AN_UNIV
PRE_ENS NBRE_GRP
VOL_HOR_ENS_MAT
INT_MAT INT_AUD
Relational Relational
TYP_ENS NUM_CYC
identification
DCS AN_UNIV NBRE_ETUD
extraction
E_MAIL
identification Data8mart
VOL_HOR_MAT
generation
NAT_ENSMT
extraction mart
NUM_SEM NUM_TEL_F (ENSEIGNANT) DCS NAT_ENSMT
ENSEIGNEMENT_ASSURE COD_MAT
generation
COD_AUD COD_SEC DCS NUM_SEM
adaptation
PRE_ENS NBRE_GRP INT_MAT INT_AUD
adaptation
TYP_ENS
VOL_HOR_ENS_MAT NUM_CYC AN_UNIV
NBRE_ETUD DCS AN_UNIV
E_MAIL
VOL_HOR_MAT NAT_ENSMT
NUM_SEM DCS NAT_ENSMT
NUM_TEL_F (ENSEIGNANT)
DCS NUM_SEM ENSEIGNEMENT_ASSURE COD_MAT
R2 (e,f,…,h) R1 (a,b,…,c)
COD_AUD COD_SEC
NUM_TEL_M (ENSEIGNANT) GRAD_ENS COD_ENS
R1 (a,b,…,c)
MATIERE
ENSEIGNANT NBR_GRP_ENS INT_SEC
NOM_ENS
R2 (e,f,…,h) TYP_ENS
VOL_HOR_ENS_MAT NUM_CYC
NBRE_ETUD
…. Data marts
NUM_SEM DCS NAT_ENSMT
DCS NUM_SEM NUM_TEL_F (ENSEIGNANT)
NUM_TEL_M (ENSEIGNANT)
Rm (a#,e#,…,z)
Rn (e#,g#,…,y)
5
Relational
Relational schema
schema
integration
integration
431
Designing Data Marts from XML and Relational Data Sources
is manually conducted by the decision makers; in The third step of our design method (data mart
this step, they adapt the automatically constructed schema construction) extracts the multidimen-
DM schemas for their particular needs. sional concepts (facts and their measures, dimen-
As illustrated in Figure 1, our design method sions and attributes organized into hierarchies)
starts with a data source pretreatment step to re- from the classified relations and produces star
solve the structural heterogeneity of the two types models. To automate this step, we define for each
of data sources. For the relational database, this multidimensional concept a set of extraction rules.
step is trivial since it only extracts the database Our rules are independent of the semantics of the
schema (table names, column names and types, data sources and their domain. They rather rely on
and key constraints) from the repository of the the structural semantics of the relations, which is
relational DBMS. On the other hand, for the XML mainly disseminated through the key constraints
documents, it transforms their DTD into a rela- (primary and foreign keys). In addition, our rules
tional schema (i.e., a set of relational tables). To have the merit to keep track of the origin of each
do so, the DTD is first simplified to eliminate any multidimensional concept in the generated data
redundancies. Then, the simplified DTD (noted mart schemas. This traceability is fundamental
DTDs) is reorganized into a set of linked trees during the definition of ETL processes.
that we call transition trees. In addition, since a Finally, the decision makers/designers are
DTD is poor in typing information required for presented with a set of potential data mart sche-
the identification of multidimensional concepts mas that they can adjust to meet their particular
(measures, dimensional attributes …), this step analytical requirements. In this final step (data
scans sample XML documents in order to extract mart adaptation), the decision makers/designers
richer typing information; the extracted types are can add derived data, remove, and/or rename
assigned to the attributes and packed data elements DM schema elements. The application of these
in the transition trees. Based on the existing links adaptation operations is constrained to ensure that
among the typed transition trees, these latter are the resulting schemas are well-formed (Schneider,
transformed into a relational schema. This step 2003) (Salem, Ghozzi, & Ben-Abdallah, 2008),
is concluded by a schema integration phase that e.g., a fact must have at least two dimensions.
merges the two source schemas to produce one Before explaining in detail the above four steps,
semantically coherent schema; it applies exist- in the remainder of this section, we overview the
ing propositions for relational database schema concepts of XML structures and the relational
integration, cf., (Bright, Hurson, & Pakzad, 1994), model.
(Sheth, & Larson, 1990), (Ceri, Widom, 1993),
(Hull, 1997) and (Zhang, & Yang, 2008). basic xml structural concepts
Once the data source pretreatment produces the
integrated relational schema, the design continues An XML document has two types of informa-
with the relation classification step. This latter tion: the document structure and data content;
performs a reverse engineering task by examining XML provides a means for separating one from
the structure of the relations in the source sche- the other in the electronic document. The docu-
mas obtained from the first step. It automatically ment structure is given by opening and closing,
determines the conceptual class of each relation: matching tag pairs (each called an element) and
A relation conceptually either models a relation- the data content is given by the information be-
ship or an entity. This classification optimizes the tween matching tags. In addition, an element can
automatic fact and dimension identification and have attributes whose values are assigned in the
improves its results. opening tag of the element.
432
Designing Data Marts from XML and Relational Data Sources
To define the structure of a set of XML docu- attributes (A1, A2,…, An) each of which is associ-
ments, a DTD document can be used. A DTD is ated with one domain representing the set of its
a context free grammar specifying all allowable possible values. Each attribute Ai is the name of
elements, their attributes, and the element nest- a role played by its domain D in the relation R.
ing structure. Given one DTD, it can be verified Thus, a relation R represents a set of tuples t1, t2,
whether an XML document is conforming to/ … tm. If for any two distinct tuples ti and tj in R
respects the DTD, and if so, the XML document there exists an attribute K such that ti(K) ≠ tj(K)_,
is said to be valid. then such an attribute (set of attributes) is called
Note that there exist other formalisms for a candidate key. It is common to choose one of
describing XML document structures, e.g., XML the candidate keys as the primary key used to
Schema and DCD (Document Content Descrip- uniquely identify tuples in the relation.
tion). However, the DTD is a formalism recom- Furthermore, a set of attributes FK in a relation
mended by the World Wide Web Consortium R1 is a foreign key if the two following rules are
(W3C) (W3C, 2008). For this, we assume in our satisfied: (1) the attributes in FK have the same
method that the structure of an XML document domain as the primary key PK of another relation
is described by a DTD and that the XML source R2, and (2) every value of FK in any tuple t1 in
documents are valid. R1 either occurs as a value of PK for some tuple
A DTD is composed of element types, sub- t2 in R2 or it is null.
element types, attributes, and terminal strings Figure 3 shows an example of a relational
such as ENTITY, PCDATA and CDATA. The database modeling a hotel room booking system.
DTD types are however very limited since all of This example is adapted from the one presented
the types are considered as strings. In addition, a in (Databasedev.co.uk, 2008). In our schema, the
DTD can constrain the occurrences of an element primary keys are underlined and the foreign keys
and a sub-element type through the symbols: “*” are followed by the sharp sign (#) and the name
(a set with zero or more elements), “+” (a set with of the referenced relation.
one or more elements), “?” (an optional element),
and “|” (alternative elements). For more details
about DTD, the reader is referred to (Sahuguet, dAtA source PretreAtment
2000) and (W3C, 2008).
Figure 2 depicts an example of a DTD describ- This first step of our design method aims at
ing e-Ticket documents. An e-Ticket document structurally homogenizing the data sources by
describes the booking in a hotel that a consumer transforming the source DTD into a set of relations
can do and/or the list of concerts that a consumer (i.e., tables). It is conducted through an automatic
can attend. Such documents can be used by an process composed of four stages: DTD simplifica-
online broker that deals with a particular hotel tion, transition tree construction, transition tree
and offers entertainment services (in this case, enrichment and relational schema generation.
concert ticket purchase).
dtd simplification
basic relational model concepts
The simplification of a DTD removes empty
In the relational model (Codd, 1970), a database elements, substitutes and transforms other ele-
is modeled by a set of relations (also called tables) ments. The empty element removal is applied
that forms a relational schema. A relation, denoted to every element that is tagged EMPTY and that
R ( (A1, A2,…, An _), has a name (R) and a list of does not declare an ATTLIST. Such an element
433
Designing Data Marts from XML and Relational Data Sources
has no content in valid XML documents. Thus, Recall that an ENTITY is a variable used to define
it is not useful for the decision process. On the shortcuts for either commonly used text, or text
other hand, the element substitution first replaces that is difficult to type.
each reference to an ENTITY type with the text Finally, the third simplification step applies
corresponding to that entity, and secondly it re- a set of transformations to the DTD to reduce
moves the corresponding ENTITY declaration. the components of its ELEMENT declarations.
434
Designing Data Marts from XML and Relational Data Sources
Our transformations slightly differ from those 1. Flattening which converts a nested definition
presented in (Shanmugasundarma, Tufte, Zhang, into a flat representation where the binary
DeWitt, & Naughton, 1999) and (Yan, & ADA, operators “,” and “|” do not appear inside
2001) and resemble the transformations in (Jensen, any parentheses;
Møller, & Pedersen, 2001). They are of the three 2. Reduction which reduces several consecutive
types depicted in Figure 4: unary operators to a single one; and
435
Designing Data Marts from XML and Relational Data Sources
3. Grouping which replaces multiple occur- hand, a leaf denotes either a PCDATA element,
rences of one sub-element with a single an attribute, or an element identified as the root
occurrence having the most generic operator. node of a transition tree (the same tree if the DTD
contains a recursion). In addition, the arcs of the
All of these transformations are iteratively transition tree can be labeled with the attribute
applied to the DTD until no more transforma- type (ID, IDREF).
tions could be applied. Note that when applying
the third transformation, we may lose the initial Root Determination
order of elements; however, this will not affect the
final result (i.e., the candidate multidimensional We determine the root node of a transition tree
schemas). by one of the following four rules that we have
To illustrate these transformations, let us con- developed in (Hachaichi, Feki, & Ben-Abdallah,
sider the two following XML element declarations 2008-a):
extracted from the example of Figure 2:<!ELE-
MENT Buy (BuyDate, Customer, (ConcertDate, R1. Each DTD element that does not appear in
Concert+)*,TotalPayementB)><!ELEMENT the declaration of any other element is a
Bookings (Customer, DateBookingMade, Time- root of a transition tree.
bookingMade, (BookedStartDate, BookedEnd-
Date, Room )+, TotalPayementDueAmount)> In general, each XML document can be seen as
These elements will be simplified one root element that contains all the elements in
into:<!ELEMENT Buy (BuyDate, Customer, the document. Thus, rule R1 will extract this top-
ConcertDate*, Concert*,TotalPayementB) most element as a root of one transition tree. The
><!ELEMENT Bookings (Customer, Date- application of R1 must however exclude recursive
BookingMade, TimebookingMade, Booked- DTD where all elements are sub-elements of other
StartDate+, BookedEndDate+, Room+, elements (Yan, & ADA, 2001). We treat the case
TotalPayementDueAmount)>where the inner of a recursive DTD in the rule R4.
parentheses are dropped and each element has at
most one operator. R2. Each element that contains at least one non
PCDATA element is a root for a transition
transition tree construction tree.
As shown in Figure 1, the DTD simplification Rule R2 excludes transition trees composed of
step is followed by the construction of transition the root connected to only leaf nodes (PCDATA).
trees for the simplified DTD. In this step, a simpli- Such a tree, in the XML document, can be con-
fied DTD is split into substructures reorganized sidered as a basic data entity, in the sense that it
as trees that we call transitiontrees. These latter cannot represent a relationship. In addition, by
facilitate the relational schema generation from imposing that a transition tree contains at least one
the initial DTD. complex element, R2 ensures that the transition
Each transition tree has a root node, interme- tree represents a relationship.
diate nodes, terminal nodes (leaves) all of which
are connected by directed arcs. The root node R3. Each element contained in the declaration of
and intermediate nodes refer to one element in n elements (n ≥ 2) is the root of a transition
the simplified DTD (noted DTDS). On the other tree.
436
Designing Data Marts from XML and Relational Data Sources
R4. Each element directly or transitively con- In the transition tree construction algorithm,
taining its own declaration is the root of a the function AnnotateNode(e, #) marks any sub-
transition tree. element that is the root of a transition tree with the
symbol #. This annotation is borrowed from the
This rule treats the case of recursive DTD. concept of foreign keys in relational databases; it
Informally, if an element refers to itself in its is useful to link transition trees of the same DTDS
declaration (directly or indirectly), then this ele- and to construct parameter hierarchies. Note that
ment contains a non PCDATA element, and thus, with this annotation, the constructed transition
in accordance with rule R2, this element should trees will have at most a depth of four. Such a
be the root of a transition tree. limited depth accelerates the traversal during the
For our running example (Figure 2), the above DM schema construction step. On the other hand,
four rules identifies eight roots: e-Ticket,Bookings, the function MarkArcType(E, a) annotates the
Consumer, Room, Buy, Concert, City and State. arc from E to a with the type (ID or IDREF) if
the attribute is a unique identifier or an attribute
Transition Tree Construction that points to an ID attribute. Figure 5 shows the
transition trees constructed by this algorithm for
For each identified root, this step constructs a the e-Ticket DTD example.
corresponding transition tree. This requires a
fine scan of the simplified DTDS by applying the transition tree enrichment
algorithm Create_tree (E, DTDS) starting from a
root E (Hachaichi, Feki, & Ben-Abdallah, 2008-b): To build a relational database schema from transi-
tion trees, we need the attribute types (e.g., number,
Algorithm Create_tree (E, DTDS)
date…). However, such typing information is
// E is the current node in DTDS
{ totally absent in the DTD and XML documents.
1.foreach element e in the declara- In fact, a DTD schema declares all data as strings.
tion of Edo { To assign a data type to the attributes and
1.1 AddChildNode(E, e) PCDATA elements in a transition tree, we query a
//add a child e to the node E sample set of XML documents valid with respect
1.2 if ( e is deter-
to the source DTD. For each leaf not marked with
mined as a root) then //e identi-
fied by rules 1 to 4 # (i.e., each attribute and PCDATA element), we
1.2.1 AnnotateNode(e, #) consult the data contained in its corresponding
1.3 elseif (e contains XML tag. Then, we determine a type by scanning
other elements or attributes) then its text value and cast it into one of three appro-
1.3.1 CreateTree(e, priate types: date, number or string. To assist us
DTDS)
with this analysis of the XML documents, there
}
2. for each attribute a in the dec- are several semi-structured query languages for
laration of Edo { XML documents, including XML-QL, Lorel,
2.1 AddChildNode(E, a) UnQL, XQL (from Microsoft), and XQuery (from
2.2 MarkArcType(E, a) W3C). All these languages have the notion of path
//mark arc from E to a by ID or
437
Designing Data Marts from XML and Relational Data Sources
expressions to navigate the nested structures of example (Figure 5) adds the data types to the leaf
XML documents. The application of the enrich- nodes not annotated with the symbol # as shown
ment step on the transition trees of our running in Figure 6.
438
Designing Data Marts from XML and Relational Data Sources
439
Designing Data Marts from XML and Relational Data Sources
5.5.1 If COUNT (Refn) ≥ 2 the tables issued from this step may be re-
then ferred to by relations created in step 5. For
Mark_PK(Refn, Rn);
our example, this step produces the tables
else
ADD_ID (Rn); RoomTypes, RoomFacilities, County and
} //end of algorithm Singer of the Figure 7.
• Step 5 deals with tables referencing other
This transformation algorithm examines the tables. For each such table, this step creates
set of all transition trees and operates according a table with a primary key either the node
to the following five steps: annotated with ID, or the concatenation
of its foreign keys when their number ex-
• Step 1 finds the transition trees composed ceeds one, otherwise an artificial attribute
of a single node. is added as a primary key.
• Step 2 finds theset of nodes all of whose
children are leaves not annotated with #. Figure 7 shows the relational schema generated
• Step 3 transforms each transition tree re- by applying the XML2R algorithm on the transi-
duced to its root r into a single-column ta- tion trees of the e-Ticket DTD. In this schema,
ble with key r. This transformation avoids primary keys are underlined and, foreign keys
the lost of degenerated dimensions and are followed by the sharp sign (#) and the name
ensures that dimensions can be potentially of the referenced relation.
built on these nodes.
• Step 4 builds a table Rn for each node n relational schema Integration
all of whose children are leaves not an-
notated with #. The columns of Rn are the At this stage, we have produced one relational
children of n. If a child a of n a leading schema from the relational database and a second
arc labeled with ID, then it becomes the one from the DTD/XML documents. However,
primary key of Rn; if no such a child ex- these two schemas represent one “virtually single”
ists, then an artificial primary key is gener- data source used to load the DM. Thus, they
ated via the ADD_ID function. Note that must be integrated to represent conceptually one,
440
Designing Data Marts from XML and Relational Data Sources
coherent database. In other words, any semantic into the same model, schema correspondence that
heterogeneity must be resolved at this stage. resolves naming conflicts; and schema fusion that
Quite existing works treat semantic heteroge- produces a global schema by replacing equivalent
neity in relational databases, cf., (Bright, Hurson, schemas, regrouping intersecting schemas and
& Pakzad, 1994), (Sheth, & Larson, 1990), (Ceri, collecting independent schemas. In our method,
Widom, 1993) , (Hull,1997) (Zhang, & Yang, the pre-integration step is treated through our pre-
2008) and XML document storage as relational treatment step, which leaves us with the schema
databases, cf., (Ceri, Fraternali, & Paraboschi, correspondence and fusion steps.
2000), (Deutsch, Fernandez, Suciu, 1999), (Lee, To illustrate the integration step, let us revisit
& Chu, 2000), (Schmidt, Kersten, Windhouwer, our running example (Figures 3 and 7) which re-
& Waas, 2000), (Kappel, Kapsammer, & Retsch- quires only the fusion step. The integrated schema
itzegger, 2001). In addition, selected schema of Figure 8 is produced by applying the following
heterogeneity issues were treated in the context fusion operations:
of XML and relational database integration, cf.,
(Kappel, Kapsammer, Retschitzegger, 2000). • Import the relations Payments,
These works, used in the context of database model PaymentMethods and RoomBands from
transformation, can be also used to resolve the hotel room booking relational schema.
semantic heterogeneity within our design method. • Import the relations SingerBuy and Concert
Overall, the works on relational DB schema from the e-Ticket relational schema.
integration proceed in three steps: Pre-integration • Import the relations Room, RoomTypes,
where the different source models are transformed RoomBands, RoomFacilities, Bookings,
Figure 8. Integrated relational schema issued from e-Ticket and hotel room booking
441
Designing Data Marts from XML and Relational Data Sources
Customer, County, State and City from e- identified, i.e., as a relationship if it originally
Ticket and hotel room booking schemas and models a relationship and as an entity if it models
integrate them using the union operator. an entity. Correctness is less trivial than the two
first properties and it is not satisfied in the two
relAtIon clAssIFIcAtIon following situations: 1) when the primary key of
a relationship is not the concatenation of all its
In current data-driven DW/DM development foreign keys, that is, this primary key can be an
methods, entities and relationships are the key- artificial attribute such as a sequential number; or
stone of the conceptual design. More precisely, 2) when the primary key of a relationship is the
dimensions are often built from entities and date concatenation of attributes coming from empty
dimensions from temporal attributes; whereas entities. Such attributes are never foreign keys
facts are mainly built from n-ary relationships since an empty entity (i.e., entity reduced to its
linking entities and, rarely on entities. However, key) never transforms into a relation. For more
this distinction is not explicitly present in the re- details about empty entities, the reader is referred to
lational model where one single concept is used (Feki, & Hachaichi, 2007-b) where an illustrative
to model both entities and relationships, namely example is given. Table 1 shows the classification
the relational table (or table for short). of the relations presented in Figure 8.
Hence, in order to define a design process that
correctly identifies facts and dimensions from a
relational schema (i.e., a set of relational tables) we dm scHemA constructIon
must first determine the conceptual class of each
table. To do so, we perform a reverse engineering This third design step builds DM schemas mod-
task by precisely examining the structure of the eled as stars through the application of a set of
tables in the sources. In fact, this leads to a scan extraction rules defined for each multidimen-
of the set of attributes composing the primary and
foreign keys of the source tables. Table 1. Source relations classified into entities
We have presented in our previous work and relationships
(Feki, & Hachaichi, 2007-a) how to partition a
set of tables, issued from an operational infor- Relational Tables Conceptual Class
mation system, into two subsets: A subset of Room Entity
tables modeling relationships and another subset RoomTypes Entity
modeling entities. Briefly, a table representing a RoomBands Entity
relationship is characterized by its primary key RoomFacilities Entity
being composed of one or several foreign keys, Payments Entity
whereas a table representing an entity generally PaymentMethods Entity
has its primary key not containing foreign keys. Bookings Relationship
This classification should well form the two sub-
Customer Entity
sets of tables by satisfying three basic properties:
County Entity
Disjointness, Completeness and Correctness. The
State Entity
first property imposes that the two subsets share
City Entity
no common table; this ensures that each table is
Singer Entity
uniquely classified. The completeness property
Concert Entity
ensures that every table has a class. The correctness
Buy Relationship
property recommends that each table is correctly
442
Designing Data Marts from XML and Relational Data Sources
sional concept. Our rules have the merit to be facts without measures, which are considered as
independent of the semantics of the data source. infrequent facts.
In addition, they keep track of the origin (table
name, column name, data type and length…) of measure Identification
each multidimensional concept in the generated
DM schemas. This traceability is fundamental as A fact contains a finite set of measures. In most
we intend to help automating the generation of cases, measures serve to compute summarized
ETL (Extract Transform and Load) procedures to results (e.g., total amount of sales by month and
load the designed DM. year, by mart…) using aggregate functions; hence,
measures have numeric values. Therefore, we ex-
Fact Identification tract measures mainly from fact-tables (i.e., table
on which the fact is built). Furthermore, rarely
To identify facts, we exploit our previous table few additional measures could be extracted not
classification and build a set of facts of first- from a fact-table itself but from tables parallel to
relevance level from tables representing relation- it. Below, we informally explain how we extract
ships and then, a set of facts of second-relevance measures in each of these cases.
level issued from tables representing entities.
This distinction in analysis relevance levels is Measure Identified from a Fact-Table
very useful; it assists the DW designer during the
selection from several generated facts those facts To construct a significant set of candidate measures
that have a higher analysis potentiality. for a fact F-T built on a table T, we exclude key-
In fact, in all DW design approaches it has attributes from the set of numeric attributes of T
been unanimously accepted that a business ac- because keys are generally artificial and redundant
tivity (e.g., Sales, Bill) is generally modeled as data, and they do not trace/record the enterprise
a relationship. This observation incites to limit business activity. Moreover, we have shown in
the construction of facts mainly on relationships (Feki, & Hachaichi, 2007-b) that we must exclude
(Golfarelli, Maio, & Rizz, 1998), (Cabibbo, L., & from T its “non key attributes belonging to other
Torlone, R. 1998), (Feki, Nabli, Ben-Abdallah, & tables” because these attributes really represent
Gargouri, 2008) and rarely on entities (Moody , & keys issued from empty entities. Table 2 shows all
Kortnik, 2000), (Phipps, & Davis, 2002), (Feki, measures extracted from each extracted fact-table.
Nabli, Ben-Abdallah, & Gargouri, 2008). On the
other hand, in practice, not all relationships are
useful to build facts; so we limit the set of facts at
the first-relevance level to those containing a non
Table 2. Facts and measures for the integrated
key numeric attribute. For the integrated schema
schema issued from hotel room booking and e-
of our running example e-Ticket and hotel room
Ticket of Figure 8
booking, we obtain the facts depicted in Table 2
where a fact built on a table T is conventionally Fact Relevance Measure
named F-T. level
consider that each table representing an entity and F-Payments Second PaymentAmount
containing a numeric, non key attribute is a fact at F-Bookings First
TotalPayementDueAmount
TotalPayementDueDate
the second-relevance level (cf., Table 2). Note that
F-Buy First TotalPayementB
the numeric non key attribute condition excludes
443
Designing Data Marts from XML and Relational Data Sources
Measure Identified from Parallel Tables must intervene to define the necessary aggregation
functions which are semantics dependent.
As mentioned above, a second origin of measures
is parallel tables. We adapted the definition of dimension Identification
parallel tables from the concept of parallel re-
lationships which is specific to the E/R model A dimension is generally made up of a finite set
(Seba, 2003). In an E/R diagram, a relationship of attributes that define various levels of details
R1 connected to m entities is said to be parallel (hierarchies), whereas others are less significant
to a relationship R2 connected to n entities (m≤n) but used, for instance, to label results or to restrict
if the m entities linked to R1 are also linked to data processed in queries. These latter are called
R2. By analogy, we define the concept of parallel weak (or non dimensional) attributes. The set of
tables as follows: candidate dimensions for a given fact can be built
Let T1 and T2 be two relationship tables such either on tables modeling entities or attributes.
as T1 and T2 are connected to m and n (m≤ n) Given a fact F-T (i.e., fact build on table T), we
tables respectively; T1 is said to be parallel to T2 consider every table T1 that represents an entity
(noted T1//T2) if and only if the primary key of and that is directly referred by the table T as a
T1 is included in or equal to the primary key of candidate dimension for F-T. Conventionally, the
T2 (Feki & Hachaichi, 2007-c). Note that, in this name of this dimension is D-T1 and its identifier
definition, T1 and T2 are assumed to be relation- is the primary key of T1.
ships because entities could not be parallel; this In addition to dimensions built on tables, we
optimizes the search of parallel tables (Feki, & can build a dimension both on an attribute of a
Hachaichi, 2007-c). In our running example, there special data type (Boolean, temporal) as well as
are no parallel tables. on an attribute issued from an empty entity. Such
Let T1 and T2 be already identified as two fact- a dimension is known in data warehousing as a
tables and let T1 be parallel to T2. The fact F-T1 degenerated dimension. For instance, a Boolean
(built on T1) can receive other measures coming column splits data-rows of its table into two
from the fact F-T2 (built on T2) by aggregating subsets; thus, such an attributecan be an axis of
measures of F-T2 before moving them to F-T1. analysis. In practice, a degenerated dimension is
Since the measures in F-T2 are more detailed than integrated inside the fact.
those in F-T1 (i.e., F-T2 has n-m>0 dimensions A Boolean column b pertinent to a fact-table
more than F-T1), then to move them to F-T1, they T produces for T a candidate, degenerated dimen-
must be aggregated on the set of their uncommon sion named D-b and identified by b. For instance,
dimensions. Note that if the dimension set of a Gender column in a Client database table can
F-T1 is equal to the dimension set of F-T2, then build a dimension D-Gender.
the set of uncommon dimensions between F-T1 Furthermore, the data warehouse community
and F-T2 is empty; therefore, T1 is parallel to T2 assumes a DW as achronological collection of data
and reciprocally. Consequently, the measures of (Kimball, Reeves, Ross, & Thornthwaite, 1998).
both facts F-T1 and F-T2 have the same granular- Consequently, the time dimensionappears in all
ity level and could be seen as two halves of the data warehouses. For this reason, we propose to
same fact; hence, we recommend merging them build dimensionson temporalattributes as follows:
into a single fact conventionally called F-R1-R2. A temporal attribute (date or time) belonging to
In our design method,aggregated measures as a fact-table T timestamps the occurrences of the
well as dimensions used in their calculation are fact built on T; it generates a candidate dimension
automatically identified. However, the designer for T where it is the identifier. For the relational
444
Designing Data Marts from XML and Relational Data Sources
Table 3. Dimensions for the extracted facts Table 4. Parameters for the dimensions of Table
3
Fact Dimension Identifier
D-RoomTypes RoomTypeID Hierarchy parameters
Dimension
F-Room D-RoomBands RoomBandID (From finest to coarsest)
D-Facilities RoomFaciliyID CityID StateID CountyID
D-Customer
F-Pay- D-Customer CustomerID CustomerDOB
ments D-PaymentMethods PaymentMethodID RoomTypeID
D-Customer CustomerID D-Room RoomBandID
D-DateBookingMade DateBookingMade RoomFaciliyID
schema issued from e-Ticket and Hotel room The recursive application of the above two
booking, the above rules produce the dimensions steps on the tables obtained in step a) produces
shown in Table 3. parameters of level higher than two. Table 4 pres-
ents the hierarchy parameters of each dimension
Hierarchy Identification in Table 3.
A parameter may functionally determine some
The attributes of a dimension are organized into attributes within its origin table; these attributes
one or several hierarchies. These attributes are describe the parameter and, therefore, are called
ordered from the finest towards the coarsest descriptive (also non-dimensional or weak) attri-
granularity. In order to distinguish them, we call butes. Descriptive attributes for a parameter p are
these attributes parameters. In addition, any hier- non-key textual or numerical attributes belonging
archy of a dimension d has the identifier of d as to a table supplying p and not belonging to other
its finest parameter (i.e., at the level one) already tables. Among these attributes, those textual are
extracted with d. The remaining parameters (i.e., more significant than numerical ones (Feki, &
those of level higher than one) forming candidate Hachaichi, 2007-a). Table 5 presents for each
hierarchies for d will be extracted in two steps. parameter of Table 4 its associated descriptive
First, we extract the parameters located im- attributes.
mediately after the dimension identifier; each ob-
tained parameter constitutes a hierarchy. Secondly,
for each one, we extract its successor parameters. cAse toolset
Thus, a parameter of level two is either:
To support our design method, we have imple-
a) the primary key of a table of class Entity mented the CAME (“Conception Assistée de
directly referred by a dimension-table d; Magasins et d’Entrepôts de données”) case toolset.
445
Designing Data Marts from XML and Relational Data Sources
446
Designing Data Marts from XML and Relational Data Sources
schemas and adapt them to produce well-formed analytical subjects that could be automatically
schemas (Figure 10). extracted from their data sources. In addition, it
guarantees that the extracted subjects are load-
able fromthe enterprise information system and/
conclusIon or the XML source documents. Furthermore, it
keeps track of the origin of each component of the
In this chapter, we have presented a bottom-up/ generated DM schema; this traceability informa-
data-driven design method for DM schemas from tion is vital for the definition of ETL procedures.
two types of sources: a relational database and We are currently extending our design method
XML documents compliant to a given DTD. Our to deal with other types of data sources and, in
method operates in three automatic steps (Data particular, XML documents with XML schemas
source pretreatment, relation classification, and and object databases. Furthermore, we are ex-
DM schema construction) followed by a manual amining how to integrate adjusted/validated DM
step for DM schema adaptation. It exploits the schemas to design a DW schema loadable from
recent schema/DTD version of a data source to all the considered sources.
automatically apply a set of rules that extract all
candidate facts with their measures, dimensions
and hierarchies. In addition, being automatic, our reFerences
design method is supported by a CASE toolset
that allowed us to evaluate it through several Ben Abdallah, M., Feki, J., & Ben-Abdallah, H.
examples. In this paper, we illustrated the method (2006). MPI-EDITOR : Un outil de spécification
through an e-Ticket DTD used by an online broker de besoins OLAP par réutilisation logique de
and a relational database modeling a hotel room patrons multidimensionnels. In Proceedings of
booking system. the Atelier des Systèmes Décisionnels (ASD’06),
Our design method assists decision makers in Agadir, Morocco.
defining their analytical needs by proposing all
447
Designing Data Marts from XML and Relational Data Sources
Böhnlein, M., & Ulbrich-vom Ende, A. (1999). Codd, E. F. (1970). A relational model of data for
Deriving initial data warehouse structures from large data banks. ACM Communications, 13(6),
the conceptual data models of the underlying 377–387. doi:10.1145/362384.362685
operational information systems. In Proceedings
Databasedev.co.uk. (2008). Sample data models
of the 2nd ACM international workshop on Data
for relational database design. Retrieved July
warehousing and OLAP, Kansas City, Missouri
30, 2008, from http://www.databasedev.co.uk/
(pp. 15-21).
data_models.html
Bonifati, A., Cattaneo, F., Ceri, S., Fuggetta, A.,
Deutsch, A., Fernandez, M., & Suciu, D. (1999).
& Paraboschi, S. (2001). Designing data marts for
Storing semi structured data in relations. In Pro-
data warehouse. ACM Transactions on Software
ceedings of the Workshop on Query Processing
Engineering and Methodology, 10, 452–483.
for Semi structured Data and Non-Standard Data
doi:10.1145/384189.384190
Formats.
Boufares, F., & Hamdoun, S. (2005). Integration
Feki, J., & Ben-Abdallah, H. (2007). Multidimen-
techniques to build a data warehouse using het-
sional pattern construction and logical reuse for
erogeneous data sources. Journal of Computer
the design of data marts. International Review on
Science, 48-55.
Computers and Software, 2(2), 124–134.
Bright, M. W., Hurson, A. R., & Pakzad, S. (1994).
Feki, J., & Hachaichi, Y. (2007). Du relationnel
Automated resolution of semantic heterogene-
au multidimensionnel: Conception de magasins
ity in multidatabases. [TODS]. ACM Transac-
de données. In Proceedings of the Revue des Nou-
tions on Database Systems, 19(2), 212–253.
velles Technologies de l’Information: Entrepôts
doi:10.1145/176567.176569
de données et analyse en ligne (EDA 2007) (Vol.
Bruckner, R., List, B., & Schiefer, J. (2001). De- B-3, pp.5-19).
veloping requirements for data warehouse systems
Feki, J., & Hachaichi, Y. (2007). Conception as-
with use cases. In Proceedings of the 7th Americas
sistée de MD: Une démarche et un outil. Journal
Conf. on Information Systems (pp. 329-335).
of Decision Systems, 16(3), 303–333. doi:10.3166/
Cabibbo, L., & Torlone, R. (1998). A logical jds.16.303-333
approach to multidimensional databases. In Pro-
Feki, J., & Hachaichi, Y. (2007). Constellation dis-
ceedings of the Conference on Extended Database
covery from OLTP parallel-relations. In Proceed-
Technology, Valencia, Spain (pp. 187-197).
ings of the 8th International Arab Conference on
Ceri, S., Fraternali, P., & Paraboschi, S. (2000). Information Technology ACIT 07, Lattakia, Syria.
XML: Current developments and future challenges
Feki, J., Nabli, A., Ben-Abdallah, H., & Gar-
for the database community. In Proceedings of
gouri, F. (2008). An automatic data warehouse
the 7th Int. Conf. on Extending Database Technol-
conceptual design approach. In Encyclopedia of
ogy (EDBT), (LNCS 1777). Berlin, Germany:
data warehousing and mining (2nd ed.). Hershey,
Springer.
PA: IGI Global.
Ceri, S., & Widom, J. (1993). Managing semantic
Giorgini, P., Rizzi, S., & Maddalena, G. (2005).
heterogeneity with production rules and persistent
Goal-oriented requirement analysis for data ware-
queues source. In Proceedings of the 19th Inter-
house design. In Proceedings of the ACM Eighth
national Conference on Very Large Data Bases
International Workshop on Data Warehousing and
(pp. 108-119).
OLAP, Bremen, Germany (pp 47-56).
448
Designing Data Marts from XML and Relational Data Sources
Golfarelli, M., Maio, D., & Rizzi, S. (1998). Kappel, G., Kapsammer, E., Rausch-Schott, S.,
Conceptual design of data warehouses from E/R & Retschitzegger, W. (2000). X-ray - towards
schemas. In Proceedings of the Conference on integrating XML and relational database systems.
System Sciences, Kona, Hawaii. Washington, DC, In Proceedings of the 19th Int. Conf. on Concep-
USA: IEEE Computer Society. tual Modeling (ER), Salt Lake City, USA (LNCS
1920). Berlin, Germany: Springer.
Golfarelli, M., Rizzi, S., & Vrdoljak, B. (2001).
Data warehouse design from XML sources. In Kappel, G., Kapsammer, E., & Retschitzegger, W.
Proceedings of the Fourth ACM International (2001). XML and relational database systems - a
Workshop on Data Warehousing and OLAP At- comparison of concepts. In Proceedings of the
lanta, GA, USA (pp. 40-47). International Conference on Internet Computing
(1) (pp. 199-205).
Hachaichi, Y., & Feki, J. (2007). Patron multidi-
mensionnel et MDA pour les entrepôts de données. Kimball, R., Reeves, L., Ross, M., & Thornthwaite,
In Proceedings of the 2nd Workshop on Decisional W. (1998). The data warehouse lifecycle toolkit.
Systems, Sousse-Tunisia. New York: John Wiley & Sons.
Hachaichi, Y., Feki, J., & Ben-Abdallah, H. (2008). Lee, D., & Chu, W. (2000). Constraints-preserving
XML source preparation for building data ware- transformation from XML document type defini-
houses. In Proceedings of the International Con- tion to relational schema. In Proceedings of the
ference on Enterprise Information Systems and 19th Int. Conf. on Conceptual Modeling (ER), Salt
Web Technologies EISWT-08, Orlando, Florida, Lake City, USA (LNCS 1920). Berlin, Germany:
USA (pp. 61-67). Springer.
Hachaichi, Y., Feki, J., & Ben-Abdallah, H. (2008). List, B., Bruckner, R. M., Machacze, K., &
Du XML au multidimensionnel: Conception de Schiefer, J. (2002). A comparison of data ware-
magasins de données. In Proceedings of the 4èmes house development methodologies case study
journées francophones sur les Entrepôts de Don- of the process warehouse. In Proceedings of the
nées et l’Analyse en ligne (EDA 2008), Toulouse, International Conference on Database and Expert
RNTI, Toulouse, France (Vol. B-4. pp. 45-59). Systems Applications DEXA
Hull, R. (1997). Managing semantic heteroge- Mazón, J.-N., & Trujillo, J. (2008). An MDA
neity in databases: A theoretical prospective. approach for the development of data ware-
In Proceedings of the sixteenth ACM SIGACT- houses. Decision Support Systems, 45(1), 41–58.
SIGMOD-SIGART symposium on Principles of doi:10.1016/j.dss.2006.12.003
database systems, Tucson, AZ, USA (pp. 51-61).
Moody, D., & Kortnik, M. (2000). From enterprise
Inmon, W. H. (1996). Building the data warehouse. models to dimensional models: A methodology for
New York: John Wiley & Sons. data warehouse and data mart design. In Proceed-
ings of the DMDW’00, Suede.
Jensen, M., Møller, T., & Pedersen, T. B. (2001).
Specifying OLAP cubes on XML data. Journal Ouaret, Z., Bellatreche, L., & Boussaid, O. (2007).
of Intelligent Information Systems. XUML star: Conception d’un entrepôt de données
XML. In Proceedings of the Atelier des Systèmes
d’Information Décisionnels, Sousse, Tunisie (pp.
19-20).
449
Designing Data Marts from XML and Relational Data Sources
Paim, F. R. S., & Castro, J. B. (2003). DWARF: An Schmidt, A. R., Kersten, M. L., Windhouwer, M.
approach for requirements definition and manage- A., & Waas, F. (2000). Efficient relational storage
ment of data warehouse systems. In Proceedings and retrieval of XML documents. In Proceed-
of the Int. Conf. on Requirements Engineering, ings of the Workshop on the Web and Databases
Monterey Bay, CA. (WebDB), Dallas, USA.
Phipps, C., & Davis, K. (2002). Automating data Schneider, M. (2003). Well-formed data ware-
warehouse conceptual schema design and evalu- house structures. In Proceedings of the 5th Inter-
ation. In Proceedings of the 4th Int. Workshop on national Workshop at VLDB’03 on Design and
Design and Management of Data Warehouses Management of Data Warehouses (DMDW’2003),
(Vol. 58, pp. 23-32). Berlin, Germany.
Prakash, N., & Gosain, A. (2003). Requirements Seba, D. (2003). Merise - concepts et mise en
driven data warehouse development. In Proceed- œuvre. France: Eni.
ings of the 15th Conference on Advanced Infor-
Shanmugasundarma, J., Tufte, K., He, G., Zhang,
mation Systems Engineering Short Paper Proc.,
C., DeWitt, D., & Naughton, J. (1999). Relational
Velden, Austria.
database for querying XML documents: Limitation
Prat, N., Akoka, J., & Comyn-Wattiau, I. (2006). and opportunities. Proceedings of the 25th VLDB
A UML-based data warehouse design method. Conferences, Scotland.
Decision Support Systems, 42, 1449–1473.
Sheth, A. P., & Larson, J. A. (1990). Feder-
doi:10.1016/j.dss.2005.12.001
ated database systems for managing distrib-
Rusu, L. I., Rahayu, W., & Taniar, D. (2004). On uted, heterogeneous, and autonoumous data-
data cleaning in building XML data warehouses. bases. ACM Computing Surveys, 22(3), 183–236.
In Proceedings of the 6th Intl. Conference on doi:10.1145/96602.96604
Information Integration and Web-based Applica-
Vrdoljak, B., Banek, M., & Rizzi, S. (2003). De-
tions & Services (iiWAS2004), Jakarta, Indonesia
signing Web warehouses from XML schema. In
(pp. 797-807).
Proceedings of the 5th International Conference
Rusu, L. I., Rahayu, W., & Taniar, D. (2005). A Data Warehousing and Knowledge Discovery:
methodology for building XML data warehouses. DaWak, Prague Czech.
International Journal of Data Warehousing and
Widom, J. (1999). Data management for XML
Mining, 1(2), 67–92.
- research directions. IEEE Data Engineering
Sahuguet, A. (2000). Everything you ever wanted Bulletin, Special Issue on XML, 22(3).
to know about DTDs, but were afraid to ask. In
Wikipedia Encyclopedia. (2008). Database. Re-
Proceedings of the International Workshop on the
trieved August 1, 2008, from http://en.wikipedia.
Web and Databases WebDB 2000 (pp. 171-183).
org/wiki/Database
Salem, A., Ghozzi, F., & Ben-Abdallah, H. (2008).
World Wide Web Consortium XML Schema.
Multi-dimensional modeling - formal specifica-
(2008). W3C candidate recommendation. Re-
tion and verification of the hierarchy concept. In
trieved August 1, 2008, from http://www.w3.org/
. Proceedings of the ICEIS, 2008(1), 317–322.
XML/Schema.html
450
Designing Data Marts from XML and Relational Data Sources
Yan, M. H., & Ada, W. C. F. (2001). From XML to responding to that entity, and then it removes the
relational database. In Proceedings of the CEUR corresponding ENTITY declaration, and apply
Workshop. Flattening, Reduction and Grouping transforma-
tions.
Zhang, L., & Yang, X. (2008). An approach to
eXtensible Markup Language (XML): XML
semantic annotation for metadata in relational
is a general-purpose specification for creating
databases. In Proceedings of the International
custom markup languages. It is classified as an
Symposiums on Information Processing (ISIP)
extensible language because it allows the user to
(pp. 635-639).
define the mark-up elements. The main purpose
of XML is to aid information systems in sharing
data, especially via the Internet.
key terms And deFInItIons Model Integration: Model integration produc-
es a single model that combines two or more input
Data Mart: Data marts are analytical data models. The produced model can be represented
stores designed to focus on specific business in the same definitional formalism as the input
functions for a specific community within an models (or in one of the definitional formalisms
organization. A data mart is designed according used by the heterogeneous input models). The
to a specific model, namely the multidimensional expression of the new model must be formally
model that highlights the axes of data analyses. correct within the definitional formalism used.
Data marts are often derived from subsets of a Relational Data Model: The relational data
data warehouse data, though in the bottom-up model was introduced by E.F. Codd in 1970. It
data warehouse design methodology the data is particularly well suited for modeling business
warehouse is created from the union of data marts. data. In this model, data are organized in tables.
Document Type Definition (DTD): A DTD The set of names of the columns is called the
defines the tags and attributes that can be used in “schema” of the table. The relational model is
an XML document. It indicates which tags can the model in most common use today.
appear within other tags. XML documents are Star Schema: The star schema (sometimes
described using a subset of DTD which imposes a referenced as star join schema) is the simplest
number of restrictions on the document’s structure, model of multidimensional schema. The star
as required per the XML standard. schema consists of a few facts (possibly just one)
DTD Simplification: The simplification of referencing any number of dimensions.
a DTD removes empty elements, replaces each
reference to an ENTITY type with the text cor-
This work was previously published in Data Warehousing Design and Advanced Engineering Applications: Methods for Com-
plex Construction, edited by Ladjel Bellatreche, pp. 55-80, copyright 2010 by Information Science Reference (an imprint of
IGI Global).
451
452
Chapter 2.8
Migrating Legacy
Information Systems to Web
Services Architecture
Shing-Han Li
Tatung University, Taiwan
Shi-Ming Huang
National Chung Cheng University, Taiwan
David C. Yen
Miami University, USA
Cheng-Chun Chang
National Chung Cheng University, Taiwan
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Migrating Legacy Information Systems to Web Services Architecture
system to have a services-oriented focus without are two approaches available to migrate the
incorporating general objected-oriented (OO) legacy system to the Web services architecture
or functional oriented feature. In this study, a (Vanston, 2005). The first approach is the legacy
case study and information capacity theory were externalization approach. This approach is usu-
employed to verify/validate that this approach is ally the main alternative available on the current
indeed an effective and a practicable one. market. It generally uses strategic or pointed
forms, along with new types of interface display,
to develop the integrated products (such as “Web
IntrodutIon Scraping”). The other approach is the component
encapsulation approach. This is another viable
Due to the dynamic advancement of information alternative to utilize the component standard
technology (IT), the life cycle of the informa- technology like Common Object Request Broker
tion system (IS) is greatly reduced to a certain Architecture (CORBA) (OMG, 1995; Vinoski,
extent. Generally speaking, the traditional legacy 1997), Component Object Model (COM) (Mi-
information systems possess such undesirable crosoft, 2007), or Enterprise Java Beans (EJB)
characteristics as latency of information, poor (Sun, 2007) to encapsulate the legacy system into
reach, inflexibility, and higher cost of maintenance. the components, and then translate them into a
Furthermore, the traditional system architectures Web Services standard. Ultimately, this second
such as centralized and client/server are frequently approach is migrated to the component-based
incompatible with the requirements and specifi- and transaction-oriented framework (such as IBM
cations which exist in today’s business environ- WebSphere and BEA WebLogic) (Liu, Fekete, &
ment. To be more specific, the legacy information Gorton, 2005; Waguespack & Schiano, 2004).
systems have these aforementioned shortcomings, Both of the aforementioned approaches may not
which have prevented the businesses and/or or- be a bad way for the legacy system to migrate into
ganizations to react/respond dynamically to the the equivalent Web services standards. However,
rapid challenges as they should. Consequently, they normally utilize the hard-cording technique
enterprises have a strong need to utilize the tech- to implement the interface with the correspond-
nology of information system reengineering (ISR) ing standard (Brereton & Budgen, 2000; Kwan
to preserve the value of their legacy systems. & Li, 1999; McArthur, Saiedian, & Zand, 2002).
In this situation, enterprises or software com- Being a traditional structure program, the system
panies are always in a dilemma of redeveloping/ normally has a shorter life cycle and lacks scal-
redesigning their legacy systems to include the ability, feasibility, and reusability. Further, it
newer Web services components (Bouguettaya, would be much more difficult to maintain in the
Malik, Rezgui, & Korff, 2006; Chen, Zhou, & future. On the other hand, if a company is applying
Zhang, 2006; Kim, Sengupta, Fox, & Dalkilic, the component encapsulation approach without
2007). Discarding and redeveloping the existing incorporating appropriate component migrating
systems not only wastes the money allocated for methods, the system still has these aforementioned
software investments, but also causes organiza- shortcomings (Rahayu, Chang, Dillon, & Taniar,
tions to lose competitive advantages to meet 2000). Unfortunately, most alternatives adopted
numerous unanticipated contingencies and/or now by enterprises and/or businesses do not use
uncertainties. the proper component migrating method.
Based on prior study (Ommering, 2005), the Many related studies (Erickson, Lyytinen,
system migration will be one of the best ways to & Siau, 2005; Fong, Karlapalem, Li, & Kwan,
reengineer a legacy system. Traditionally, there 1999; Gall, Klosch, & Mittermeir, 1995; Kwan
453
Migrating Legacy Information Systems to Web Services Architecture
& Li, 1999; Sang, Follen, Kim, & Lopez, 2002) services-oriented or functional-oriented ones.
have presented methods that can be utilized to Additionally, this approach can be employed to
systematically reengineer the legacy system develop a system which will be more flexible and
into the Object-Oriented (OO) or the distributed adaptable to fit better to the constantly-changing
system. However, the Web Services architecture business environment. Furthermore, this proposed
by nature is different from a general distributed approach will no doubt make the conversion
system. The core concept of Web Service is a process easier to integrate with other additional
Service-Oriented Architecture (SOA) (Huang, applications.
Hung, Yen, Li, & Wu, 2006; Stal, 2002). In The remainder of this article is organized as
the SOA environment, resources in a network follows: The second section provides a brief over-
are made available as an independent service view of some legacy systems’ reengineering and
that can be accessed without any knowledge of Web services approaches. The proposed legacy
the underlying platform implementation (Erl, system’s migrating approach and the implementa-
2005). Web services can certainly rely on a Web- tion of a prototype will be discussed in the third
services composition language (WSCL) such as section. The fourth section contains the system
the Business Process Execution Language for implementation using simulation and a real case
Web Services (BPEL4WS) (IBM, BEA Systems, study. A comparison of the proposed approach with
Microsoft, SAP AG, & Siebel Systems, 2002) to others is provided in the fifth section. Finally, the
transform an existing Web service into a new type sixth section concludes this manuscript.
of Web service by employing well-defined process
modeling constructs (Chen, Hsu, & Mehta, 2003;
Curbera, Khalef, Mukhi, Tai & Weerawarana, lIterAture revIeW
2003), enterprise architects believe that SOA can
help businesses respond more quickly and cost- Information Flow for
effectively to fast-changing market conditions business Process (IFbP)
(Sutor, 2006). This style of architecture, in fact,
promotes reusability at the macro level (service) Business Process Management (BPM) is one of
rather than the micro levels (objects). By doing the basic elements of Web services architecture
so, it can greatly simplify interconnection to and (Basu & Kumar, 2002). It can be decomposed of
usage of existing IT (legacy) assets (Carroll & two major phases—process design and diagnosis.
Calvo, 2004). The process diagnosis phase will discover an entire
The purpose of this study is to propose a meth- picture of the business process for an enterprise,
odology which utilizes the existing data design also known as the AS-IS Model. The exploration
of an information system to migrate the legacy of AS-IS Model is a very time-consuming and
system to an SOA system. The benefits include experience-oriented task. As a result, an enterprise
the following items: First, this approach has the has to spend a lot of time and pay huge labor costs
advantage of reengineering the legacy system during the process diagnosis phase. Besides, it is
to various system components from a technical difficult for the process designers to transform
aspect, and use the Web services composition one process model to another equivalent one.
language (WSCL) to translate the existing model There are certain gaps among different process-
into the new Web services architecture. Unlike designing methods. Thus, the study of Shi-Ming
traditional object-oriented approaches, this pro- Huang and Fu-Yun Yu (2004) investigates a
posed methodology migrates the old systems to novel methodology for business process discov-
454
Migrating Legacy Information Systems to Web Services Architecture
455
Migrating Legacy Information Systems to Web Services Architecture
of reengineered systems. The result of the reen- are linked together, they can inter-operate to ac-
gineered system will be a Web-enabled system. complish an even higher level of business function
The proposed migration approach discusses how to (Herzum & Sims, 1998; Jin, Urban, & Dietrich,
process a well-structured object-oriented analysis. 2006; Lee, Pipino, Strong, & Wang, 2004; Vitha-
The research considered the following four fac- rana & Jain; 2000; Zhao & Siau, 2007). The scope
tors—(1) multi-value attributes, (2) inheritance of a component discussed in this article will include
relationships, (3) functional dependency, and the class and its related interfaces together as a
(4) object behavior to ensure the quality of a component. By doing so, it can preserve the simple
reengineered component-based system. Further, execution function of a component from getting
their study considered the migration from three over-complicated. Services are self-describing,
aspects—data, process, and user interface to make open components that can support rapid, low-cost
the applied reengineering process more complete. composition of distributed applications (Papazo-
The comparison of all aforementioned reengi- glou & Georgakopoulos, 2003). Service-Oriented
neering approaches is shown in Table 1, which is components attempt to fulfill users’ requirement.
shown below. In this comparison table, it is noted Consequently, the service providers’ responsibility
that the approach proposed by Huang et al. (2006) is mainly to design/develop the most adaptable
could present a more semantic legacy system with service processes and components for different
a higher quality of components. users. The users just enjoy the content and quality
of the provided service, but do not care about who
business component and service the true service provider is and how to acquire
component definition the service.
Some definitions of service argue that they can
Business components typically emulate a specific be implemented by components (Sprott, 2002).
business entity, such as a customer, an order, or However, in a complex environment, a service
an account. When sets of coherent components can actually include several components (Perrey
456
Migrating Legacy Information Systems to Web Services Architecture
& Lycett, 2003). Therefore, this article considers research reengineers the legacy system to various
that the service is comprised of a number of system system components from the technical aspect,
components, which could simultaneously interact analyzes the model of the legacy system to attain
and integrate with each other. Enterprise has a the business processes from the business aspect,
tendency to keep distance from the composition of integrates the system components and the business
too many small and trivial system components and processes together, and then analyzes the service
hence has a strong reservation about the operation based on processes. Finally, according to this
and management of each other while applying the proposed integrated model, it translates the
services. For this reason, this research defines the model to the Web services composition language
service to be composed of system components to build a Web services architecture. The follow-
from the perspective of users’ requirements. A ing sections discussed below describe each of the
service-oriented feature should be an extension five steps of this proposed approach.
of the component-oriented one, and should be
aimed at satisfying the user’s situation. Step 1: Reengineer
System Components
457
Migrating Legacy Information Systems to Web Services Architecture
Figure 2. Object-oriented migration methodology (Source: Huang, Hung, Yen, Li & Wu, 2006)
steps. This study extends Huang’s methodology • Extended rule 2: In step 3 of Huang’s ap-
to reengineering system components. proach, this article performs a further anal-
The first activity is to employ the model dia- ysis between the functions and external
grams of a legacy system such as DFD, ERD, and entities (or data store). When a dataflow is
system interface as different inputs. There are two connected between two functions, it actu-
extended rules associated with this step and can ally indicates the directional flow of the ar-
be discussed as follows: row from one function to another one. It
is very similar to the control flow used in
• Extended rule 1: In step 1 of Huang’s ap- EPC.
proach, the fact represented from the data
stores and external entities of a DFD can In this step, the authors regard every dataflow
be translated to classes and attributes. In as a method, especially the dataflow between one
some cases, the DFD itself may also imply function and another. Since the aforementioned
a comprehensive system. For this reason, data flow implies that the IS controls the flow of
the DFD can consequently be translated to data in the system, there should be a corresponding
be a system class. method of a system class. An illustrative example
is provided in Figure 3.
458
Migrating Legacy Information Systems to Web Services Architecture
cess from a system perspective. This step applies Using logical symbol (AND, OR,
Step 4 XOR) combine more than one
and extends the “Information Flow for Business EPC(Event) with EPC(Function)
Process” (IFBP) (Huang & Yu, 2004) method to DFD(External Entity) map to
Step 5
analyze the business process. Table 2 illustrates EPC(Information Object)
the idea of this conversion methodology for IFBP. Step 6 DFD(Data store) map to EPC(File)
Again, the first activity is to use DFD of the DFD(‘Data Flow’ connect with ‘Data
Step 7 Store’) map to EPC(Information
legacy system as an input. There are three ex- flow)
tended rules in this step; they are discussed below
and are also shown in Figure 4:
flow is used to connect the function and
• Extended rule 1: The dataflow between
the event, and the information flow is em-
one function and another should be trans-
ployed to connect the function and the ex-
lated to the event element and the associ-
ternal entity.
ated control flow of an EPC. Further, the
• Extended rule 3: This rule is similar to the
function can be connected with various
extended rule 2. The dataflow connected
events by using the control flow.
from a data store or an external entity to
• Extended rule 2: The dataflow connect-
a function should be translated to an event
ed from a function to a Data Store or an
and a control flow. It differs from the afore-
external entity should be translated to be
mentioned extended rule 2 in the direction
an event and a control flow. The control
459
Migrating Legacy Information Systems to Web Services Architecture
460
Migrating Legacy Information Systems to Web Services Architecture
461
Migrating Legacy Information Systems to Web Services Architecture
462
Migrating Legacy Information Systems to Web Services Architecture
463
Migrating Legacy Information Systems to Web Services Architecture
464
Migrating Legacy Information Systems to Web Services Architecture
465
Migrating Legacy Information Systems to Web Services Architecture
In this case study, the legacy accounts receiv- (SOA) is widely adopted as a solution to reengineer
able system (ARS) is a stand-alone system. In enterprise ISs. Using this architecture, the system
order to provide more flexibility, improve the will be more flexible and adaptable to fit to the
corporation’s productivity, and enhance the ca- dramatically-changing business environment,
pability to fit into the capricious business environ- and hence, make it easier to integrate additional
ment, the Web services architecture is chosen. By applications. Obviously, an enterprise will need
using this proposed migration methodology, the to have great synergy to establish such a system.
original seven components and eleven methods The purpose of this research is to propose a mi-
are, in fact, combined into two services. The grating solution to translate the architecture of
proposed approach uses component-based tech- the legacy system to the SOA with a systematic
nology and builds the system based on business approach. This methodology is different from tra-
process. For this reason, it is more suitable for ditional object-oriented approaches (see Table 4),
business process and management. This study which migrates the system to be services-oriented
analyzes service components architecture based without applying general objected-oriented (OO)
on user interaction in the business process, so it or functional oriented features. In this study, the
will be more closely matched with the users’ re- system architecture is implemented according to
quirements. the prototyping development discussed above.
The contribution of this research can be sum-
marized as follows. First of all, this study uses a
conclusIon systematic approach to explore the service pro-
vided by a legacy system. In specific, this research
The advancement of information technology is uses a systematic approach to extract business
rapid. It is hard for an old architecture to keep up flows from the DFD diagram of a legacy system,
with the changes in the current market. Enterprises and analyzes the service provided by the system
need to use the technology of information system from a service perspective. It is indeed a reason-
reengineering (ISR) to preserve the value of their able fit for today’s Web Service environment.
existing legacy systems. Currently, a Web services- Second, this study has tightly coupled the analyzed
based system with Service-Oriented Architecture services and the rebuilt components, which will
466
Table 4 Comparison between the proposed methodology and other similar products and methodologies
467
Migrating Legacy Information Systems to Web Services Architecture
be easily extracted by the legacy system. Conse- gained considerable progress in translating source
quently, this proposed approach will create a more code to information flow such as DFD (Benedusi,
compact system, which may increase the opera- Cimitile, & De Carlini, 1989; Lakhotia, 1995) or
tional efficiency. Third, the proposed methodol- translating into ERD diagram from database (Com-
ogy presented in this study can help locate the puter Associates, Inc., 2006; SyBase, Inc., 2007).
shared semantic between system components and This study placed focus on the conversion
business processes, and use a systematic method methodology, and paid limited attention to the
to integrate the system component and business techniques to develop system components, such
process tightly by carefully analyzing the process. as EJB, CORBA, or COM+. Practically, differ-
Furthermore, this method can be employed to ent composition techniques may have different
build a methodology to translate the traditional ways to implement the Web Services. To this end,
structured analysis to a corresponding service- this study lacks any discussion of the different
oriented framework. This study analyzed the DFD, implementation alternatives to design/develop
ERD, and system user interface to develop busi- the Web Services.
ness processes and system components. In addi- The proposed methodology is tailored to IS’
tion, this study analyzed service to construct a assistance to various business operations. It works
systematic approach, which can be utilized to better in situations such as having complicated
translate the model diagram of a legacy system processes and external transactions. As a result,
into a services-oriented EPC model. The specifi- it does not have sufficient capability in dealing
cations of the Web Service components can be with a simple process or some applications without
easily built in this case, which in turn can help process. Furthermore, other system programming
users to construct Web Service components more and firmware that require specific hardware can-
efficiently. In addition, the IS reengineering tech- not be easily applied with this study.
nique can be utilized to build the prototype based Future work needs to be done towards a full
on the proposed Web Services framework. To this automatic reengineering process to eliminate
end, this study built a prototype to validate this the unexpected human factors and/or possible
proposed methodology. This prototype can guide errors. Further study should also be investigated
users to reengineer the legacy system into a Web to determine the right component implementa-
Service framework. As a result, this research can tion technique. In addition, it is also required to
be a valuable reference for other future studies. enhance the participation of domain knowledge
This study adopted a Rule-Based translation experts. In the future, additional benefit may
methodology, which can be used to improve not include the development of new applications by
only the quality of the design/development, but composing these software components found in
also to enhance the correctness of the original data. the reengineering process in order to accelerate
Some ambiguous or vague wordings presented the development time.
in the original DFD can definitely influence the
quality of a translated process. It is obvious that
every phase should be properly revised, so that AcknoWledGment
the output would better fit the actual practice
performed in the businesses and/or industries. The National Science Council, Taiwan, under
In practice, some organizations can either Grant No. NSC95-2524-S-194-004-, has sup-
have incomplete DFDs or even have no DFDs to ported the work presented in this article. We
perform the system/service design. This study can- greatly appreciate its financial support and en-
not be applied to such organizations. Fortunately, couragement.
techniques such as IS reverse engineering have
468
Migrating Legacy Information Systems to Web Services Architecture
Bouguettaya, A., Malik, Z., Rezgui, A., & Korff, L. Gall, H., Klosch, R., & Mittermeir, R. (1995).
(2006). A Scalable Middleware for Web Databases. Object-oriented re-architecturing. Proceedings of
Journal of Database Management, 17(4), 20–46. the 5th European Software Engineering Confer-
ence (ESEC ‘95).
Brereton, P., & Budgen, D. (2000). Component-
based systems: A classification of issues. IEEE Herzum, P., & Sims, O. (1998). The business
Computer, 33(11), 54–62. component approach. Proceedings of OOPSLA’98
Business Object Workshop IV.
Carroll, N. L., & Calvo, R. A. (2004, July 5).
Querying data from distributed heterogeneous Heuvel, W. V. D., Hillegersberg, J. V., & Papazo-
database systems through Web services. Proceed- glou, M. (2002). A methodology to support Web-
ings of the Tenth Australian World Wide Web services development using legacy systems. IFIP
Conference (AUSWEB 04). Conference Proceedings; Vol. 231, Proceedings
of the IFIP TC8 / WG8.1 Working Conference on
Chen, Q., Hsu, M., & Mehta, V. (2003). How Engineering Information Systems in the Internet
public conversation management integrated with Context (pp. 81-103).
local business process management. Proceed-
ings of the IEEE International Conference on Huang, S. M., Hung, S. Y., Yen, D., Li, S. H., &
E-Commerce, CEC, 2003, 199–206. doi:10.1109/ Wu, C. J. (2006). Enterprise application system
COEC.2003.1210250 reengineering: A business component approach.
Journal of Database Management, 17(3), 66–91.
Chen, Y., Zhou, L., & Zhang, D. (2006). On-
tology-Supported Web Service Composition: Huang, S. M., & Yu, F. Y. (2004). IFBP: A meth-
An Approach to Service-Oriented Knowledge odology for business process discovery based
Management in Corporate Services. Journal of on information flow. Journal of International
Database Management, 17(1), 67–84. Management, 11(3), 55–78.
Computer Associates, Inc. (2006, October 6). IBM. BEA Systems, Microsoft, SAPAG, & Siebel
AllFusion Erwin Data Modeler. Systems (2002, July 30). Business Process Ex-
ecution Language for Web Services, Version 1.1.
Curbera, F., Khalef, R., Mukhi, N., Tai, S., &
Weerawarana, S. (2003, October). The next step
in Web services. Communications of the ACM,
46(10), 29–34. doi:10.1145/944217.944234
469
Migrating Legacy Information Systems to Web Services Architecture
Jin, Y., Urban, S. D., & Dietrich, S. W. (2006). Papazoglou, M. P., & Georgakopoulos, D. (2003).
Extending the OBJECTIVE Benchmark for Evalu- Service-oriented computing. Communications of
ation of Active Rules in a Distributed Component the ACM, 46, 25–28. doi:10.1145/944217.944233
Integration Environment. Journal of Database
Perrey, R., & Lycett, M. (2003, January). Service-
Management, 17(4), 47–69.
oriented architecture. Proceedings of the 2003
Kim, H. M., Sengupta, A., Fox, M. S., & Dalkilic, Symposium on Applications and the Internet
M. (2007). A measurement ontology generalizable Workshops (pp. 27-31).
for emerging domain applications on the semantic
Rahayu, J. W., Chang, E., Dillon, T. S., & Ta-
Web. Journal of Database Management, 18(1),
niar, D. (2000). A methodology for transforming
20–42.
inheritance relationships in an object-oriented
Kwan, I., & Li, Q. (1999). A hybrid approach conceptual model to relational tables. Informa-
to convert relational schema to object-oriented tion and Software Technology, 42(8), 571–592.
schema. International Journal of Information doi:10.1016/S0950-5849(00)00103-8
Science, 117, 201–241.
Sang, J., Follen, G., Kim, C., & Lopez, I. (2002).
Lakhotia, A. (1995, February). Wolf: A tool to Development of CORBA-based engineering ap-
recover dataflow oriented design from source plications from legacy Fortran programs. Informa-
code. Proceedings of the Fifth Annual Workshop tion and Software Technology, 44(3), 175–184.
on Systems Reengineering Technology. doi:10.1016/S0950-5849(02)00005-8
Lee, Y. W., Pipino, L., Strong, D. M., & Wang, Serrano, M. A., Montes, D. O., & Carver, D. L.
R. Y. (2004). Process-embedded data integrity. (1999). Evolutionary migration of legacy systems
Journal of Database Management, 15(1), 87–103. to an object-based distributed environment. Pro-
ceedings of the IEEE International Conference
Liu, Y., Fekete, A., & Gorton, I. (2005). Design-
on Software Maintenance (ICSM’99) (pp. 86-95).
level performance prediction of component-based
applications. IEEE Transactions on Software Sprott, D. (2002). Service-oriented process mat-
Engineering, 31(11), 928–934. doi:10.1109/ ters. CBDi Forum Newsletter.
TSE.2005.127
Stal, M. (2002). Web services: Beyond compo-
McArthur, K., Saiedian, H., & Zand, M. (2002). nent-based computing association for computing
An evaluation of the impact of component–based machinery. Communications of the ACM, 45(10),
architectures on software reusability. Informa- 71–77. doi:10.1145/570907.570934
tion and Software Technology, 44(6), 351–359.
Sun - Java EE. (2007, April 16). Enterprise Ja-
doi:10.1016/S0950-5849(02)00020-4
vaBeans Technology.
Microsoft (2007, April 16). COM: Component
Sutor, B. (2006, May 21). Open standards vs. open
object model technologies.
source: How to think about software, standards,
OMG. (1995). Common Object Request Broker and service-oriented architecture at the beginning
Architecture. of the 21st century.
Ommering, R. V. (2005). Software reuse in SyBase, Inc. (2007, April 16). Sybase Power
product populations. IEEE Transactions on Soft- Designer Redefining Enterprise Modeling.
ware Engineering, 31(7), 537–544. doi:10.1109/
TSE.2005.84
470
Migrating Legacy Information Systems to Web Services Architecture
Vanston, M. (2005, August 21). Integrating legacy Waguespack, L., & Schiano, W. T. (2004).
systems with Web services. The Meta Group Inc. Component-based IS architecture. Information
Systems Management, 21(3), 53–60. doi:10.120
Vinoski, S. (1997, February). CORBA. Integrating
1/1078/44432.21.3.20040601/82477.8
diverse applications within distributed hetero-
geneous environments. IEEE Communications Zhao, L., & Siau, K. (2007). Information media-
Magazine, 14(2), 46–55. doi:10.1109/35.565655 tion using metamodels—An approach using XML
and common warehouse metamodel. Journal of
Vitharana, P., & Jain, H. (2000). Research issues
Database Management, 18(3), 69–82.
in testing business components. Information
& Management, 37(6), 297–309. doi:10.1016/
S0378-7206(99)00056-7
This work was previously published in Advanced Principles for Improving Database Design, Systems Modeling, and Software
Development, edited by Keng Siau and John Erickson, pp. 282-306, copyright 2009 by Information Science Reference (an
imprint of IGI Global).
471
472
Chapter 2.9
EIS for Consumers Classification
and Support Decision Making
in a Power Utility Database
Juan Ignacio Guerrero Alonso
University of Seville, Spain
Rocío Millán
University of Seville, Spain
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
473
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
The joint treatment of all this information al- Most of the studies realized till now use a lot
lows the detection and classification procedures of information related to the client consumption
of non-technical losses. This treatment demands and the economic activity. The present paper raises
the utilization of diverse technologies to adapt the the need to use all the available information about
procedures to the information type that is used. At the client because the utility company distribu-
the same time, it is necessary to design integration tion commercial systems have more information
methods to construct the Information System. available, not only the information relating to
In the present chapter a general revision will consumption. Due to this need, it will be necessary
be done about the Information System checking to first perform an available information study
each of the following points: and to use the inspector knowledge to determine
what information is interesting. Once decided it is
• Objective of the present paper. necessary to determine what technology is most
• The form in which companies realize the adequate to extract the knowledge necessary for
activities related with client consumption the analysis of each information type.
control. The company inspector and expert knowledge
• The methodology adopted by the includes from the structure and information contained
Information System development. in the company commercial system, up to the proce-
• The information management methods dures and devices of the different existing facilities.
that companies have. The available information in utility distribution
• The Information System basic architec- companies has similarity characteristics and it is
ture joined with the integration limits that possible to apply the same techniques to treat the
are established, followed by all module available information.
descriptions.
• Information System verification and vali-
dation methods. overvIeW on FrAud detectIon
• Presentation of experimental results
obtained. Normally, the existing references limit themselves
to the information treatment about the consump-
tion.
obJectIves There exist three precedents directly related to
the topic that is shown in this chapter:
The EIS main objective consists of the accom-
plishment of an exhaustive client analysis, using ▪ F. Biscarri et al. (Biscarri, 2008) proposed
the most available information. This EIS proposes different artificial intelligence techniques
a classification of the different clients analyzed, and statistical methods for non-technical
depending on the found incidents, in this way, it losses detection. These techniques apply
supports the inspector as a Decision Support Sys- various methods that allow the detection
tem on using the knowledge acquired to realize a of anomalous consumption patterns.
classification, depending on the obtained results. ▪ J.R. Galván et al. (Galván, 1998) proposed
To obtain this goal, the EIS must take advantage a technology based on radial basis neural
of all the client information available and apply the networks, using only the consumption evo-
inspector knowledge to this information, in search lution in monthly periods. Also it uses the
of any anomaly or fraud that could mask a problem economic sector indirectly, since is the test
in the client installation (non-technical loss). only uses agricultural clients.
474
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
▪ José E. Cabral (Cabral, 2004; Cabral, 2006) • Telemeasuring. This type needs that in
proposed the application of rough sets to the client installation there be placed
classify categorized attribute values. This MODEMs that communicate the measur-
one is the only found offer capable of taking ing of telematic form to the distribution
advantage of a lot of information from the company.
databases, this system works with dicretized • Manual measuring. This type needs that
information, therefore, it is necessary to a company employee must visit each and
design discretization processes in the infor- every of the registers to take the measure
mation that possesses continuous values. manually.
Another one of the technologies used often The telemeasuring equipment provides a more
for the fraud detection is the forecasting using exhaustive control of the measurements. Never-
artificial neural networks (ANN) with different theless, the manual measuring is normally taken
architectures combined with other methods like: monthly or bi-monthly, which is what normally
data mining (Wheeler, 2000), fuzzy logic (Lau, happens in clients of low tension. This complicates
2008) and temporal series (Azadeh, 2007). This the client consumption analysis, because it reduces
application has a wide representation nowadays the consumption information and it is on this that
since it is used both for energy and for finance the present paper has been tested.
(Hand, 2001; Kou, 2004) and telecommunications An activity that the inspectors and technical
(Daskalaki, 2003). staff realize of the distribution companies are de-
The forecasting load subject is much more fined by the companies by means of procedures.
extensive since it includes short (Hobbs, 1998), In these procedures there are defined actions that
medium (Gavrilas, 2001) and long (Padmakumari, the inspector or technician must do according to
1999) forecasting methods, but it is used for client the goal that they pursue.
sets and not for detecting frauds in specific certain When inspectors or technicians visit the client
client. In other articles there appears the possibil- facilities they must perform the actions that are
ity of adding climatic parameters to increase the specified in a procedure, having ended it, must
forecasting efficiency (Shakouri, 2007). register it in the company commercial system and
the results. Normally, the inspectors or technicians
have the possibility of adding a commentary or
utIlIty dIstrIbutIon comPAnIes some observation. This information provides a
great advantage on the methods and technologies
All utility distribution companies have measure that only use the client consumption information,
equipment installation and information about since they give very important information that
client consumption. Concretely, in specific normally would not be available in the numeric
case of power utilities there are three types of information on the company databases.
samples. These samples depend on installed When an inspector finds a fraud or anomaly in
tension (low, medium or high). Normally, the the client installation this must be communicated
low tension client consumption is more diffi- to the company, which should create a process that
cult to control. Power utilities have million of stores all the information relating to the fraud or
clients with low tension contracts. To control anomaly from its detection until it is corrected.
the consumption of all clients there are mainly These processes are very important in the research
two methods: because of it can be used to determine the effi-
ciency of the automatic methods.
475
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
All these characteristics are normally common adapts to the needs of the activity that is going
in all existing utilities distribution companies who to be used. These Datamarts do not allow it to
have a large number of clients. be employed with online information, but it is
updated in short predefined or even incremental
periods. Normally, the update processes also are
busIness mAnAGement realized during periods of inactivity.
InFormAtIon In addition, also periodically, to perform mas-
sive reviews on a set of clients who satisfy series
All the utility distribution companies store of conditions, so it is necessary to realize batch
great quantities of information about clients. processes that are executed on nightly schedules
Normally these type of companies need a great and initiate the necessary procedures. This one
infrastructure to support and to manage all this is the expedient main source for the companies,
information. At the same time, the infrastructure since normally they are created by inspectors who
allows the company personnel to add, to modify search a certain pattern.
or to eliminate information on the company
database. These type of processes are the most
common and are more numerous than realized metHodoloGy
on the company database.
The companies cannot interrupt these processes The methodology used for this kind of EIS must
because it might provoke an economic loss. Nev- consider the existence of two types of processes:
ertheless, it is necessary to do a series of processes research and development processes.
that need a bigger load on the database, it is mainly This methodology could be used for imple-
performed during the night or at weekends, when menting generic EIS to analysis any kind of infor-
client administrative activities are not necessary. mation. In this chapter, this methodology is used
Another solution why they choose the com- to make a system for treat available information
panies is Datamarts creation. These represent of utility distribution companies in order to make
small images of the original database so that it a classification of losses.
476
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
In the figure 1 the evolutionary methodology done in the extraction phase, by means of
type proposed is shown. Later, each of the phases expert validation. The verification tests
is described briefly: are designed in the knowledge extraction
stage, establishing the evaluation criteria
• Identification. In this phase, the familiar- with the company. The different technol-
ization by the vocabulary and aspects re- ogy integration tests will allow the fitting
lated to the problem subject is made. the different technology processes of the
• Knowledge extraction. This is a research different technologies, in agreement with
phase. It consists of two stages, which can the evaluation criteria established, it will
be realized in parallel: be carried out at the same time as the pro-
◦ Knowledge Acquisiton. The research- cesses of verification, since the unification
ers obtain the necessary knowledge of the different technologies for the correct
to perform the consumers’ analysis functioning of the EIS is necessary.
using the meetings knowledge ac- • Implantation and Maintenance. It is nec-
quisitions with the experts. Also, essary to make a implantation and main-
one seeks to perform a design of the tenance plans that allows to the company
group of tests and the validation cri- assimilate the new EIS.
teria for EIS.
◦ Information Review. The researchers This methodology has been created from the
familiarize themselves with the avail- existing generic methodologies of each one of the
able information on the databases, most common technologies, trying to combine the
which determine the usable informa- different activities accomplishment of develop-
tion for the solution. ment and investigation. In this type of projects in
• Information Preprocessing. In this stage the which competitive companies have been involved,
preprocessing of the available information it is necessary to establish additional processes
in the database is realized in order to facili- that allow a control investigation, establishing
tate the adaptation of the same one and to criteria that determines when a development is
allow the design and structure of the nec- necessary and when an investigation phase has
essary databases. In addition, it establishes been satisfactorily completed.
the design of preprocessing techniques that The example that is shown in this paper pres-
can be used to solve the problem. ents the application of this methodology. EIS for
• Knowledge Assimilation. It has two re- classification losses in power utilities is made.
search stages: This system could be applied to other utilities.
◦ Knowledge Formalization. It estab-
lishes the design and structure of
knowledge base. InteGrAtIon
◦ Information Modelling. Modelling
algorithms to the preprocessed infor- In general, the integration of different modules is
mation are applied. necessary to solve some questions:
• Implementation. The development and
codification process of the knowledge base • The output format of each module for inte-
and modeling process. grating must verify a set of conditions to al-
• Validation, Verification and Integration. low the utilization inside a solid integration.
The acquired knowledge validation is To solve this problem there are two options:
477
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
478
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
In this kind of projects is necessary to use the develops, determines which is the most
best applications for each technology. But, in suitable information presenting form.
some case, it will be necessary to use only one • The company infrastructure. The
application, that integrates all technologies. This Information System must be measured
application is oriented to information treatment correctly to allow the implantation in the
of great volume. Normally, this condition is as- company infrastructure.
sociated to a project that is limited to one or more
applications These conditions are the same for all utilities
distribution companies, because they use very
similar information and have closed volume of
bAsIc ArcHItecture clients.
To determine the influence of these three fac-
The Information System basic architecture is tors it is necessary to do a knowledge extraction
based mainly on: phase, selecting information parts that can contrib-
ute something in the classification and detection
• The type of information that is going to process of non-technical losses.
treat. The nature of the information to treat In this database types there exists informa-
will determine what type of technology is tion of different natures: numerical, date and
most adapted to analyze it, since the same alphanumeric. For each of them, it is necessary
methods for numerical and alphanumeric to investigate the procedure or technology most
information directly cannot be used. adapted for the extraction and treatment. In this
• The way the information is presented to respect, the typical information in the utility dis-
the user. The activities that the employee tribution companies are:
479
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
• Client and contract data. The realized studies on large amount of infor-
• Facility information. mation sets are not useful, due to the long time
• Consumption information. process needed to get results. In addition, the com-
• Inspector documentation and panies need many resources for the information
commentaries. maintenance normal job and new client updates.
All these reasons force the decrease of the study
Once the necessary information is identified sample, allow the extraction in inactivity periods
the procedures for the treatment and analysis (night schedule) and the execution reduction time
could be designed. of the different studies. The previous information
So the different modules that compound this extraction is used creating offline databases with
architecture are shown in Figure 2. all the necessary information, although it is not
The process begins with the different source updated, it allows the acceleration of the investi-
information existence, that in some cases, will gation and depends on the commercial databases
be necessary to apply preprocessing methods, working locally.
because of possible problems existing in the
information getting.
Information System needs user interface to ProPosed ArcHItecture
show the getting of results, this module is essential,
due to DSS Enterprise Information System need The proposed architecture for utility distribu-
some interaction form with the user. In the same tion company client analysis has the following
form, the possibility in which an administrator can modules:
modify or update the system, in some exceptional
times must exist. This interface gives access to • Data Warehousing for the treatment of
each of the modules that make part of the EIS. great volume of information available in
Each one of these modules (1, 2, 3, …) per- power utility companies databases. These
forms a treatment on the information that allows techniques improve the state and quality of
adding new data to the knowledge database. The information, verify the coherence, the in-
goal of each one is to help on the fitting phase and tegrity and several kind of errors (format
on adaptation to different problems, decreasing errors, incorrect values, etc.).
the maximum possible interaction by the admin- • Data Mining for making the power con-
istrator. This information is treated by the DSS sumption studies; the trends and ranges of
module in the decision process according to the consumption are established by means of
stored information. statistical techniques. The studies of con-
sumption ranges are carried out through
the application of a statistic study which
InFormAtIon PreProcessInG searches normal pattern behaviour, but tak-
ing into consideration a series of criterium
The System has to use the necessary information which allow the distinction of one type of
to perform the analysis. The different develop- consumptions from the other.
ment and investigation phases are intended to • Text Mining for analyzing the documenta-
determine what information is used in the analysis tion of inspections made in electrical in-
and what information has be made in order that stallation clients. Initially, this module is
the Information System uses it. made based on experience, using concept
480
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
481
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
is necessary to establish additional criterions to but it does allow use of information in most of
allow the analysis of large quantity of information. the groups:
The Data Mining process in this EIS is limited
to the implementation of a series of statistical 1. Discretized values of the powers to enable
techniques for combined rates and trends of that within each group there is a greater
normal consumption. This module proposes the representation.
idea of a study of normal consumption patterns of 2. The study on the largest possible number of
customers. This operation can not be performed customers, it also may have increased statis-
directly. The methods applied in this EIS began tical representation in each group, although
with a pre-filter that tries to remove clients who it requires a higher processing capacity.
have allegedly anomalous consumption. After the 3. Perform different groups, so that there are
removal with the statistical study of the resulting groups that contain only 4 of those specified
sample, of customer begins. characteristics, and others that use 5 or 6 of
It is necessary to do this study on the largest these features. This way, if the most stringent
possible number of customers since the avail- statistical entity is not sufficient, it can be
ability of more number of clients in the sample compared with less restrictive for a rough
is statistically representative. estimation of client normal consumption.
There is a problem applying this method on all
clients. For example, a customer who has a pub This study also provides additional information
with a capacity exceeding 15 kW on the coast, about the behaviour of each of the groups studied,
does not consume like a warehouse or another as it can be checked whether a certain group of
pub located in interior places. Thus arises the need customers presented a seasonal consumption or
for some kind of division that provides normal an irregular consumption.
patterns of consumption for each of the desired Moreover, this study along with the text min-
characteristics. ing, which will be described in the next section,
During the various investigations and tests, provides an inherent capability of automatic ad-
it has been concluded that there are a number of aptation to the characteristics of the sample to be
key information fields for determining acceptable analyzed, because if you study as many customers
consumption standard patterns: geographical lo- as possible, this will provide information on all
cation, economic activity, billing frequency, time possible cases analysable.
discrimination and contracted power. In addition, Currently, this study must be made on virtually
due to the different patterns that may be found all existing customers in the company, and it has
necessary to establish a temporary division in the provided enough information to analyze different
information for consumption patterns: total annual, types of customers, except in some groups where
seasonal and monthly. These groups provide us there is not enough information.
with divisions within which are defined normal
conditioned patterns by the client characteristics. text mining
The customer consumption comparison who pos-
sess the relevant groups with the same features will The purpose of the Text Mining process is to ana-
provide us an idea of client normal consumption. lyze the content of comments added by different
As can be inferred, the division of a sample can inspectors or alphanumeric fields. These provide
lead to groups that have no statistical significance. useful information in analyzing the consumption
Because of this it is necessary to carry out two of the clients as they provide additional data on the
processes, not to solve the problem completely, status of the facility and the inspector observations.
482
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
The techniques used in this process are reduced be missing if there is not a successful conversion
to the extraction and classification of concepts. of information.
The concepts are a set of one or more words that Validation is a procedure for determining
represent an idea, event, action or real object. In whether the information system does the work
this way, a concept can be anything from a simple for which it was created in a robust and effec-
word to a full term. The classification of these tive. You have to define, first, estimated limits
concepts has been done according to the experience of efficiency to be achieved and make different
of the inspectors and fuzzy techniques to detect prototypes, refining the information system to
similarities between different forms of spelling. equal or exceed the objectives.
The classification of these terms is based on The objectives for information systems are
problems that you want to identify. Thus, this defined in terms of time cost, robustness and effi-
information is used to verify the conclusions of ciency. In general, it is preferable to obtain systems
the analysis of customers. with a temporary low-cost, high efficiency and
Not all clients have this information. In such ruggedness, looking for a good balance, because
cases, the information system can provide all a very robust system is usually less efficient and
that is additional information on the client con- temporary high cost.
sumption and different incidents identified in the In the sense of efficacy, validation of this
information. information system and other systems in the util-
As the implementation result of Text Mining ity distribution subject is quite complex. There
techniques, this yields a dictionary of concepts are mainly two methods to validate the different
to be added to the knowledge base information prototypes that are created:
system. This EIS process was particularly com-
plex because the initial classification was made • Perform analysis of data from a closed set
according to the knowledge provided by experts of customers and, through inspection, to
and inspectors, and has been a large volume of determine whether there is a non-technical
work of classification and verification. loss in the client facilities. This method is
quite common in some references (Cabral,
2004; Cabral, 2006). It presents several
verIFIcAtIon And vAlIdAtIon problems:
metHodoloGy ◦ The method is very inefficient, be-
cause the inspections need time,
The checking is whether the information system because he/she must visit them one
performs the analysis without losing information by one and complete the related
and without making mistakes in this process. This documentation.
requires reviewing the results of each module ◦ The amount of clients that can be
separately and Information System as a whole. reviewed is quite small, since more
Using the EIS cyclically in cases pre-designed, clients will take longer to get results.
we can fix the system so as not to lose information This decreases the probability of find-
and calculations are performed correctly. ing a client with a non-technical loss
The loss of information is one of the most reduction by decreasing the entire
common problems in systems that are created study.
by the merger of several modules. If not properly • Using two samples of the same clients that
designed and constructed, to two modules may are extracted in different moments of time.
483
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
This way you can see which clients have a tion about these clients and they are analyzed in
problem or if they are correct or have not the present Enterprise Information System. As a
been visited. The procedure is to analyze result of this analysis, reports and graphs for each
the information from the oldest sample and client are obtained.
compare the results with the new sample. It has been found that this Enterprise Informa-
This comparison is an investigation pro- tion System provides a complex filtering process to
cess and we must determine whether the prevent clients who are inspected are not actually
detected non-technical losses in the most non-technical losses. In this sense, the Enterprise
recent match what the analysis concludes. Information System provides a filter that removes
Moreover, the possibility of refining the usually between 20% and 70% of clients who
system using the client wrongly classified otherwise would be a wasted expenditure, since in
(as we have information on clients who most cases they do not have non-technical losses.
have not confirmed a non-technical loss). The reports of the Enterprise Information
However, this technique presents a prob- System allow the inspectors and researchers more
lem: it is not possible to establish any con- information about the client and on the problems
clusion on the remaining clients of which presented, as are just and necessary information,
there is no information on the new sample. using graphic information on a temporary basis
(consumption, etc.). Moreover, in these reports,
In the case of this sample of Enterprise Infor- the reasons why the client has been included in a
mation System the second option described has given category can be found.
been proposed, choosing a closed set of customers
in two separate moments of time.
This method has allowed the refinement of conclusIon
the Information System in order to achieve the
correct margins classifications proposed. This paper explores the expert system investiga-
There is an additional problem, which occurs tion in the utility consumption subject, and its
in the two methods and problems in the informa- combination with other technologies to enable
tion. For example, in some cases, companies have the design and construction of an Enterprise
taken measurement of the client facilities, in such Information System.
cases and where the problem is prolonged in time, Particularly, the research focuses on a very
may cause a non-technical loss. In fact, this may little exploited area: the automation of the avail-
mask a fraud. able information analysis for anomalies or fraud
The Enterprise Information System use within classification on utility companies.
the complete project validation procedure used is In the Enterprise Information System discussed
the first method described. in this paper, the main source of complexity was
the huge amount of knowledge required and the
variety of problems that may occur in the client
exPerImentAl results analysis.
The main tasks of investigation, which made
This system analyzes the information to poten- major contributions, focus on:
tial clients identified with non-technical losses
through statistical techniques, neural networks and • Methodology design for classification
artificial intelligence in a practical application in systems with different type of available
a particular company. Then you get all informa- information.
484
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
• Identification and classification of knowl- Daskalaki, S., Kopanas, I., Goudara, M., &
edge necessary. Avouris, N. (2003). Data Mining for decision
• Identification and classification of the anal- support on customer insolvency in telecom-
ysis cases of utility distribution client. munications business. European Journal of Op-
• Use of different information types in the erational Research, 145, 239–255. doi:10.1016/
analysis of clients. S0377-2217(02)00532-5
• Using different integration techniques.
Galván, J. R., Elices, A., Muñoz, A., Czernichow,
• Implementation of the Enterprise
T., & Sanz-Bobi, M. A. (1998, November). Sys-
Information System.
tem For Detection Of Abnormalities and Fraud
• Design and construction of an Enterprise
In Customer Consumption. In 12th Conference
Information System that automates their
on the Electric Power Supply Industry, Pattaya,
adaptation to the different test samples.
Thailand.
• Provides a Decision Support System
(DSS) making through analysis of reports Gavrilas, M., Ciutea, I., & Tanasa, C. (2001, June).
and graphs. Medium-term load forecasting with artificial
neural network models. CIRED2001, Conference
Publication No. 482.
reFerences
Hand, J. D. (2001). Prospecting for gems in credit
Azadeh, A., Ghaderi, S. F., & Sohrabkhani, S. card data. IMA Journal of Management Mathemat-
(2007). Forecasting electrical consumption by ics, 12, 172–200. doi:10.1093/imaman/12.2.173
integration of Neural Network, time series and Hobbs, B. F., Helman, U., Jitprapaikulsarn, S.,
ANOVA. Applied Mathematics and Computation, Konda, S., & Maratukulam, D. (1998). Artificial
186, 1753–1761. doi:10.1016/j.amc.2006.08.094 neural networks for short-term energy forecasting:
Biscarri, F., Monedero, I., León, C., Guerrero, J. accuracy and economic value. Neurocomputing,
I., Biscarri, J., & Millán, R. (2008, June). A data 23, 71–84. doi:10.1016/S0925-2312(98)00072-1
mining method base don the variability of the Kimball, R., & Ross, M. (2002). The Data Ware-
customer consumption: A special application on house Toolkit: The Complete Guide to Dimensional
electric utility companies. In Proceedings of the Modeling (2nd ed.). New York: John Wiley &
Tenth International Conference on Enterprise Sons Computer Publishing.
Information Systems, Volume Artificial Intel-
ligence and Decision Support System (AIDSS) Kou, Y., Lu, C., Sinvongwattana, S., & Huang, Y.
(pp. 370-374). Barcelona, Spain. (2004). Survey of Fraud Detection Techniques.
In Proceedings of the 2004 IEEE Intenational
Cabral, J., Pinto, J., Linares, K., & Pinto, A. (in Conference on Networking, Sensing & Control,
press). Methodology for fraud detection using (pp. 21-23), Taipei, Taiwan.
rough sets. IEEE International Conference on
Granular Computing. Lau, H. C. W., Cheng, E. N. M., Lee, C. K. M.,
& Ho, G. T. S. (2008). A fuzzy logic approach to
Cabral, J., Pinto, J. O. P., Gontijo, E., & Filho, J. forecast energy consumption change in a manufac-
Reis (2004, October). Fraud Detection In Electrical turing system. Expert Systems with Applications,
Energy Consumers Using Rough Sets. In IEEE 34, 1813–1824. doi:10.1016/j.eswa.2007.02.015
International Conference on System, Man and
Cybernetics, (Vol. 4, pp. 3625-3629).
485
EIS for Consumers Classification and Support Decision Making in a Power Utility Database
Padmakumari, K., Mohandas, K. P., & Thiruven- Data Warehouse: This technology proposes
gadam, S. (1999). Long term distribution demand another way to organize the information in da-
forecasting using neuro fuzzy computations. Elec- tabases. The information is specially oriented to
trical Power and Energy Systems, 21, 315–322. the subject related with the problem. This idea
doi:10.1016/S0142-0615(98)00056-8 includes information redundancy but accelerates
the queries.
Shakouri, H., Nadimi, R., & Ghaderi, F. (2008). A
Datamart: It is small image of large database.
hybrid TSK-FR model to study short-term varia-
This image is specially oriented for one specific
tions of electricity demand versus the temperature
objective. Normally, the datamart is made with
changes. Expert Systems with Applications. doi:.
data warehouse technology.
doi:10.1016/j.eswa.2007.12.058
Expert Systems: The expert systems are pro-
Szkuta, B. R., Sanabria, L. A., & Dillon, T. S. grams that it is used for specific problem solution.
(1999, August). Electricity Price Short-Term These systems are made with the knowledge of
Forecasting using artificial neural networks. experts implemented in knowledge base.
IEEE Transactions on Power Systems, 14(3). Inspector: Normally, he (she) represents a
doi:10.1109/59.780895 person that is in company staff. He (she) is a
technician that visit the client facilities and is
Wheeler, R., & Aitken, S. (2000). Multiple Algo-
capable of manipulate the measure equipment
rithms for Fraud Detection. Review Knowledge-
and has the company authorization.
Based Systems, 13, 93–99. doi:10.1016/S0950-
Low Tension: Normally it is the set of clients
7051(00)00050-2
with tension less than 1000 Volts.
MODEM: MOdulator-DEModulator. This
electronic device is used for transmission of
key terms And deFInItIons information by means of modulation of signal.
Rule Based Expert Systems: Expert systems
Client Facilities: This represents from the whose have the knowledge base implemented by
finish of utility line distribution to client home. a set of rules.
Normally, in this facilities, there are measure and Text Mining: It is a technology born under
control equipment for client consumption. Data Mining. Recently, this technology became
Company Commercial System: The com- a great investigation field. The main objective
pany needs a database with the client information. of text mining is the automatic patter extraction
This database has an interface for interaction from unstructured information. The Text Mining
with user. techniques usually use natural language process-
Data Mining: It is a set of techniques based ing (NLP) for categorizing the information of
initially on statistical techniques. Actually, the unstructured information.
present techniques are based on other investiga-
tions related to artificial intelligence. The main
objective of data mining is the automatic pattern
extraction from data.
This work was previously published in Enterprise Information Systems and Implementing IT Infrastructures: Challenges and
Issues, edited by S. Parthasarathy, pp. 103-118, copyright 2010 by Information Science Reference (an imprint of IGI Global).
486
487
Chapter 2.10
An ERP Adoption Model
for Midsize Businesses
Fahd Alizai
Victoria University, Australia
Stephen Burgess
Victoria University, Australia
AbstrAct IntroductIon
This chapter theorizes the development of a concep- The importance of midsize businesses has been
tual ERP adoption model, applicable to midsize busi- recognised in recent decades due to their role of
nesses. The general business factors associated with creating jobs, enhancement of global economic
ERP implementation along with the corresponding activity and most importantly higher growth rate,
organisational benefits are identified. This chapter regardless of their size (Rovere, L & Lebre, R (1996);
also highlights the constraints that confront midsize Acs 1990). To increase their production capabili-
businesses whilst implementing sophisticated ap- ties, they should be vigilant towards adoption of
plications. The needs for ERP adoption can occur the latest technology (Barad, M & Gien, D. 2001)
due to an attempt to be more competitive or due as use of Information Technology (IT) could result
to an external pressure from large businesses to in an increase in innovative activities, resulting in
adopt an ERP application. The proposed conceptual improved productivity and efficiency in business
model uses a strategic approach containing; ERP operations (Correa 1994). Therefore, it is appropri-
implementation processes, stages, factors & issues ate for midsize businesses to utilize their resources
associate with ERP adoption in midsize businesses. and adopt means of automated data transfer both
This research also focuses on identification of strat- internally and externally (Caillaud 2001). Business
egies in the organisational, people and technical applications such as ERP systems could provide a
domains that could be influential for ERP adoption. better way to execute business operations in an ef-
fective, organised and sophisticated way.
DOI: 10.4018/978-1-60566-892-5.ch009
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
An ERP Adoption Model for Midsize Businesses
The adoption of ERP applications in a modern availability, technology understanding and human
day organisation has been described as being one of resources constraints (Rao 2000).
the most innovative developments associated with Assuming the pending shift of ERP adoption
the IT sector (Al-Mashari 2002). ERP systems can to smaller-sized business entities, this chapter
be viewed as sophisticated business applications examines the relevant literature on ERP implemen-
that integrate major functions of different depart- tation as well as highlighting the characteristics
ments (Koch 2003) as its modules allow organiza- of midsize businesses to propose an adoption
tion to improve the functionality of its business model for implementing ERP systems in that
processes (Chung 1999). Hence, ERP software business sector.
modules have the ability; once implemented, to
integrate major activities across the organisa-
tional departments using one integrated software bAckGround
solution (Koch 2003). Amoako-Gyampah (2007)
suggests that ERP systems are integrated software erP systems
developed to handle multiple corporate functions,
allowing companies to synchronise activities, ERP applications were built primarily to integrate
eliminate multiple data sources with provision- different department functions and business pro-
ing of accurate and timely information, obtaining cesses to form a collaborative view of business
better communication among different units to operations in a single IT architecture (Klaus, H.,
meet expectations and reducing cost required to Rosemann, M, Gable, G. 2000). Modern day ERP
manage incompatible legacy systems. In effect, applications are business process centric, evolved
this can greatly assist organisations to carry out to address diverse aspects of corporate business
their operations in more effective and efficient requirements. One aspect of this evolution has
ways and allow the workforce to interact and col- been the ability of ERP systems to be a replace-
laborate in an information-enabled environment. ment for IT legacy systems that were developed in
ERP systems have been developed in the last different functional areas of the business. Another
two decades to replace the common legacy and aspect of ERP success has been the importance of
Material Requirement Planning (MRP) systems such systems to integrate the supply chain so as
that have traditionally been associated with larger to facilitate information flows across all business
enterprises. As the ERP market has evolved and areas— in effect allowing the large corporation to
matured, so have the related hardware and infra- be managed in real time (Turban 2006). The man-
structure technology. The cost of ERP solutions ner in which ERP has applied industry standards
have been reduced to the point where it has now to organisational business processes has also been
become viable for the midsize business sector to recognised as a significant ERP feature (Keller &
consider ERP implementation (Aberdeen 2006). Teufel 1998)— allowing a corporation to espouse
Arguably, the implementation of ERP systems in enterprise wide best practices.
midsize businesses could be viewed simply from Given the evolving nature of ERP systems,
the perspective of applying the success factors there are different point-of-views on how to ex-
already identified for larger businesses to a dif- plore ERP implementations. One view is to focus
ferent set of smaller entities. However, midsize on ERP as a product or commodity in terms of
businesses are unlike their larger business coun- software application (Klaus, H., Rosemann, M,
terparts. They have a diverse range of separate Gable, G. 2000) where ERP modules are integra-
adoption issues that need to be considered when tors of all business processes and data under one
it comes to ERP— issues such as limited finance inclusive umbrella. ERP systems are equipped
488
An ERP Adoption Model for Midsize Businesses
with features that embrace costing, finance, sales, ERP systems to integrate business functions does
contact management, customer relationship man- provide significant tangible and intangible benefits
agement and human resources issues (Rooney et al. (Sandoe, K. Corbitt G. Boykin R. 2001). The
2000). Arguably, each application area becomes a tangible benefits include reduction in employee
central focus in order to understand and facilitate numbers and inventory stock; improvements in
the ERP implementation process. It is important productivity, order management and timely deliv-
to note that getting a desired outcome from ERP eries – all of which can lead to increased profit-
applications can be difficult task due to related ability. The intangible benefits are associated with
constraints involved in its implementation and new/improved business processes; information
customisation (Marnewick, C. & Labuschagne, supply chain visibility; process standardization
L. 2005). Therefore, it is advisable to focus on and enhanced globalization opportunities.
long term business objectives associated with ERP systems also allow an organization to
ERP implementation to understand the complex become more ‘customer centric’, where more
nature of integration processes (Boubekri 2001). accurate/up to date information about customers
A strategic approach could also be a suitable by results in enhanced customer services (Rao 2000).
addressing business needs with respect to the A study conducted by Kennerley et al. (2001) iden-
organisational, technical and people (human) tifies benefits and shortcomings of ERP systems
aspects of ERP implementation. implementation in an organisation. The benefits
across four distinct areas were evaluated relat-
Some Benefits of ERP ing to; corporate organisation, operational plant,
functional divisions and the individual employees.
Turban et al. (2006) highlighted the internal and Kennerley et al. (2001) alludes to the benefits of
external nature of systems integration associated ERP systems implementation being:
with introduction of an ERP system. The internal
integration of systems allows different functional • Improved efficiency and control
areas of business to be presented under a ‘single • An ability to rationalize inventories
umbrella’ leading to many operational benefits. • Enhanced cross border capacity and
External integration benefits promote cross- optimization
collaboration and data exchanges between a firm’s • Increased leverage opportunities with
allied partners, enhancing significant business-to- suppliers
business (B2B) information exchanges as well • Improved resource and management
as improving partner relationship management planning
(PRM).
ERP systems standardize business operations Keller & Teufel (1998) describes the standard-
and automate business functions such as pro- ization imposed on business processes as being
duction, planning, manufacturing, purchasing, another benefit of ERP system implementation.
marketing and human resources into number of Arguably, standardization may come at the ex-
operational modules. These modules are integrated pense of business process flexibility, however
with each other, forming a relationship chain and business process standardization allows industry
can provide significant benefits across the enter- best practice to be adopted by a business with the
prise (Boubekri, 2001). Indeed the selection of commensurate benefits. The level of standardiza-
an ERP module is related to the factors such as tion resulting from the adoption of best practice
business attributes, specific operational needs and standards set by ERP packages might increase
the characteristics of the company. The ability of concerns regarding competitive advantage. For
489
An ERP Adoption Model for Midsize Businesses
successful implementations, existing business pany before ERP systems should be implemented.
knowledge must be translated into application Al-Mashari (2000) also indicates that successful
knowledge by mapping existing business pro- ERP implementation is directly related to organi-
cesses with ERP package embedded processes zational preparedness. Success could be defined
and defining new processes that should fit with as a favourable results or satisfactory outcomes
both new system and organisational needs (Van- in accordance with user expectations. Outcomes
daie 2008). of ERP system projects could be evaluated on
the basis of different factors, such as technical,
ERP System Implementation effectiveness and user experience related factors
(Wei 2008). According to Rao (2000) there is a
A conceptual model for ERP implementation certain level of competence that should be achieved
(the ‘4p’ model) was proposed by (Marnewick, that reflects organizational preparedness when
C. & Labuschagne, L. 2005), addressing four it comes to ERP system adoption— these levels
fundamental aspects of implementation. The related to areas associated with technical, human
model derived its structure from the well-known and management aspects of the organisation.
marketing ‘4Ps’ (people, product, process and A number of other approaches for ERP system
performance). The ERP areas associated with adoption exist. Wilhelm et al., (2000) indicated
4Ps entities are; certain traditional information systems modelling
methods that could be used to reduce the persistent
• People as the customers that represent or- cost of ongoing ERP implementation. As ERP is
ganisational requirements/mindset, defined as integrated business software, the mod-
• Product as software modules that are to be elling required for ERP implementation should
implemented across the business, detail the aspects relating to all abstraction layers
• Process as representing the project’s in integration management. The prime objective
change management issues should be progressing from upper to lower abstrac-
• Performance that is analogous to data tion levels such as enterprise modelling to final
flows associated with business process. coding with complete existing business process
information (Monnerat, Carvalho and Campos
Every aspect in this model has a direct or in- 2008). Edward et al, (2003), (drawing from the
direct impact on ERP implementation processes. work of Esteves & Pastor (1999)) uses the system
This includes identification of organizational life cycle model to explain six different stages
requirements, customization of selected software, of ERP systems adoption— such as adoption,
the installation and subsequent operations and decision-making, acquisition, implementation,
finally the important needs of system training use & maintenance, evolution and retirement.
for personnel. All various proposed levels are ERP has become a strategic survival instrument
important for ERP system adoption, allowing for businesses using information technology to
organisations to progress through implementa- conduct their operations. ERP implementation
tion processes that require all relevant factors to requires a huge investment and greater initiative
be considered (Marnewick, C. & Labuschagne, towards engaging resources such as time, money
L. 2005). and people (Yang, Wu and Tsai 2007). The use
Another approach for ERP implementation has of multi-factor business strategies (as identified)
been alluded to by Al-Mashari (2002) who sug- has been suggested as a suitable approach for
gests that an intense effort is required to highlight adoption or upgrade of an ERP system. Accord-
business and technological requirements of a com- ing to Aladwani (2001), a firm needs to identify
490
An ERP Adoption Model for Midsize Businesses
the various organizational, technical and people availability of adequate resources such as time,
strategies that could be used with the introduction money and skills to run business operations (Barad
of ERP systems. The organizational strategies et. al 2001). For instance, the literature suggests
include proper project management, recognition that the following affects the decision making
of organizational structure and business ideology, process of introducing latest IT applications in
change strategy development and deployment, midsize businesses: lack of resources, availability
appropriate managerial style and available com- of accurate information, lack of skilled labour
munication mechanisms. The technical strategies and management’s ability to adopt new change
address the technology challenges of ERP installa- (Rovere, L. & Lebre, R. 1996). An ERP imple-
tion and include gaining a thorough understanding mentation with a more strategic focus should be
of systems configuration, hardware complexity, of greater importance to senior management that
the capabilities of technical staff to handle pending has firm control over its IT operations. This would
challenges; and access to sufficient resources (time enhance management’s supervision of ERP, result-
and cost associated factors). The people strate- ing in better performance (along with improved
gies associate with ERP systems implementation operational and strategic control) (Ragowsky and
include the ability to identify and manage staff Gefen 2008). Another more strategic issue faced
attitudes towards change, inclusion and involve- by midsize businesses include their continuous
ment of all staff in the implementation process growth requirement and consistency to update
as well as an appropriate ERP training regime. their technological level to meet with the existing
Aladwani (2001) suggest that these strategies have technology standards (Rauof, 1998). The future
significant importance in the ERP implementation growth of midsize businesses depends upon the
process with adherence and use of these strategies use of advanced technologies for enhancement
reducing the likelihood of project failure. of their production capabilities. Use of the latest
technology can help enhance the production ca-
ERP in Midsize Business pabilities by producing good quality products at
cheaper cost and efficient delivery to its customers
ERP systems have been historically associated (Barad et. al 2001).
with implementation projects in large businesses. It has been suggested that information tech-
However; there has been a recent trend for midsize nology in general has created opportunities for
business to also consider adopting ERP systems. midsize businesses to be more competitive in
In this research an organization with 200-500 the marketplace (Rovere, L & Lebre, R (1996).
employees and/or an annual turnover of less than However, midsize enterprises, because of their
US$75 million is defined as a midsize business limited available resources can find it difficult
(Gefen et al. 2005, Yates 2004, APEC 2003, to improve IT support services (such as increas-
Duxbury et al. 2002). ing the number of educated IT professionals on
Midsize businesses are considered to be the staff and/or expanding their IT departments).
backbone of a country’s economy and play a vital In the midsize business arena several internal
role in economic development. They create job and external factors also can govern technol-
opportunities, accelerate economic revival and ogy adoption behaviour. Kennerley et al. (2001)
support industry to boost up economic progress identified internal factors such as lack of training
(Pramukti 2003). Midsize businesses are also vul- and insufficient information/documentation about
nerable and exposed to threats due to their size and IT systems as being problematic; external factors
operability (Sarbutts 2003). The risks associated were associated with the level of support provided
with midsize businesses could be related to the by implementation professionals and also the
491
An ERP Adoption Model for Midsize Businesses
nature of on-going technology upgrades. Accord- becoming a necessity in order to maintain relations
ing to Rao (2000), an ERP solution is expensive with larger enterprises (Rao 2000).
and some midsize companies may not be able to
afford them. Given this observation, Rao (2000) section summary
further indicates that information integration can
be a major motivational factor for midsize busi- Enterprise Resource Planning (ERP) has changed
nesses to implement ERP systems, allowing them the way of doing business by re-engineering and
to approach a level of business flexibility similar redesigning business processes in accordance with
to large enterprises. There is some suggestion that standardised business operations. The literature
smaller type businesses are unaware of the advan- highlights the main objective of having an ERP
tages of ERP technology and how the technology application implemented is to obtain and facilitate
has become necessary for global interaction— an best practice in the business operations. Evidence
issue that, if not addressed, may eventually push also suggests that midsize business play a vital
these businesses out of the market (BRW, 2002). role toward collective productivity of a nation.
In terms of successful ERP adoption, Lee Midsize Business often lacks leadership, strategic
(2000) highlights the concerns of small manu- vision and they mainly focus on day to day opera-
facturers, finding that the benefits associated tions. Implementing a new information system in
with ERP software had yet to be derived. Accord- a midsize business can be a cumbersome process
ing to Alison (2002), ERP systems users are not as there is not much information available for
technological experts and ERP software tends to these businesses to decide what could be a bet-
be less than user-friendly because of challenging ter solution for them. Midsize business are also
interfaces— these findings potentially posing a tend to be influenced by number of factors while
significant user training issue for resource limited selecting an information systems; these could
midsize businesses. With respect to ERP systems be relate to lack of resources such as knowledge
adoption several criteria have been proposed for and skill, availability of time and money. Midsize
small and midsize business to select and implement businesses have also adopted a cautions approach
an appropriate ERP system solution that includes towards ERP applications due to the lack of in-
affordability, supplier knowledge, local support, formation with strategic direction and associated
technical upgradeability and the availability of risks involved in ERP implementation.
the latest technology (Rao 2000).
According to Saccomano (2003) the initial
target market for ERP vendors was big companies erP ImPlementAtIon Issues
that could afford solutions costing millions of And mIdsIZe busIness
dollars at project start up. In recent times, many
multinational companies have restricted their There is considerable amount of evidence sug-
operations to partnering only those midsize com- gesting that companies face problems while
panies that are using compatible ERP software. implementing ERP applications. Millions of
Hence, it becomes essential for many midsize dollars are spent every year to purchase and
companies to adjust their business model and implement ERP products with problems relating
adopt ERP software that is compatible with the to customisation and resulting in over budgeted
large enterprises with which they deal (Rao 2000). delayed implementation (Martin 1998). The nature
Thus, midsize enterprises are increasingly finding of problems faced during ERP implementation is
themselves attracted to ERP solutions and their quite abnormal comparative to implementation of
associated benefits. Additionally, ERP systems are other IT products (Parr et. al. 2000). Some of the
492
An ERP Adoption Model for Midsize Businesses
important aspects in relation to ERP implementa- ERP Vendors & Midsize Businesses
tion are discussed below;
The benefits from ERP applications have been
erP Adoption realised by small manufacturing concerns (Lee
2000). As indicated earlier, the initial target market
Mostly large businesses have already adopted for ERP vendors was large enterprises that could af-
ERP applications to meet with their growing busi- ford to implement a costly application. Later, when
ness needs. Midsize businesses found themselves large enterprise market for ERP systems dried up
attracted to these applications due to their cost by the year 2000 (Saccomano 2003) ERP vendors
effectiveness and collaborative requirements to started focusing on the mid-market bracket. ERP
do business with larger enterprises (Klaus, H., application developing companies such as, SAP
Rosemann, M, Gable, G. 2000). and PeopleSoft have sought to increase their market
Some of the growth factors for ERP in mid- share in the mid-market bracket by boosting their of-
market bracket (midsize businesses) includes; con- fers and developing business specific applications.
tinuous industrialisation and its reliance on small PeopleSoft have also offered database, storage and
& midsize business, adoption of new technologies hardware bind options along with customer support
such as client server and availability of small & features and introducing self service portal with
medium business centric ERP applications and so features to access system availability, account, bill-
forth (Rao 2000). There is a general understanding ing and invoicing visibility (Ferguson, et al. 2004).
that ERP implementation is an expensive process ERP companies are offering extensive support
and midsize businesses cannot afford it but this with the help of their service partners (outsource
does not mean midsize businesses do not need to companies) in relation to business application strat-
have ERP applications. Information integration egy, implementation integration and optimisation
could be one of the major triggering points for services and so forth. Small and midsize business
midsize businesses to implement ERP applications centric packaging is another strategy adopted by
and achieve high levels of business flexibility with some of the ERP vendors to capture major market
their larger counterparts (Rao 2000). share such as, SAP Business by Design; an on
Another important aspect of ERP implementa- demand business solution for midsize businesses.
tion is to understand business needs and customise
ERP products to mould application(s) according ERP Implementation in
to existing business processes or altering busi- Midsize Business
ness function in accordance with ERP standards.
Research indicates that customisation in ERP It is not necessary that small & midsize businesses
application increases the risk of failure and cost should go for ‘high brand’and costly ERP products.
of the project significantly increases comparative They could consider other cheaper alternate ERP
to none customised implementation (Wilhelm et solutions that could serve their business needs (Lee
al. 2000). Higher levels of dissatisfaction amongst 2000). It is also important to note that selecting
ERP application users have been observed due an appropriate solution for small and midsize
to customisation and BPR (business process re- businesses can be difficult; depending upon their
engineering) related issues, impacting mainly on existing information technology management and
cost and duration of the project. ERP vendors have business needs (Wilhelm et al. 2000).
also admitted that generally a customer spends Rao (2000) presented criteria for midsize busi-
more to implement than to buy the software itself nesses to select an appropriate ERP application
(Wilhelm et al. 2000). consisting of following five points;
493
An ERP Adoption Model for Midsize Businesses
• Product affordability: A decision should There are some strategies suggested by Alad-
be made according to the affordability of a wani (2001) for improving ERP implementation
product and its price. processes. These strategies could be categorized
• Knowledge about supplier: An experi- as;
enced supplier should be selected with a
deep understanding of ERP implementa- • Organisational strategies comprising of
tion issues. project management, organizational struc-
• Domestic support: ERP applications are ture, change strategy development and
highly sophisticated requiring greater de- deployment, managerial style, ideology,
gree of hands on knowledge and expertise; communication and so forth.
it would be beneficial to choose a supplier • Technical strategies contain technical as-
who provides domestic/local support. pects of ERP implementation such as, ERP
• Technically upgradeable: Product with installation, configuration, complexity and
upgradeability features should be selected capable technical staff to handle the com-
that will allow the company to upgrade plexities, time - cost factors and so forth.
applications with changes in technology. • People strategies including management
A contract should be established with the and staff related issues towards change
vendor to provide annual upgrade software management, training and level of staff en-
support. gagement in a project.
• Latest Technology: An easily imple-
mentable product should be selected with As mentioned earlier, Marnewick et al., (2005)
user friendly interface with capability to ERP conceptual model that comprises of four
adopt any future modifications. It would components. These components are derived from
be better if product is designed on object marketing 4P’s model (People, Product, Process,
oriented technology and GUI interface. and Performance) and maps on ERP components;
People as Customers mindset, Product as Software,
According to Wilhelm et al., (2000), ERP Process as Change Management and Performance
affordability could be increased by reducing the as Process flow. Change management strategies
cost of implementation and increasing the user are vital to promote steps necessary for adapt-
acceptance. Certain modelling approaches could ability to change. Therefore, it is important to
be used to reduce the cost of implementation such identify factors that influence ERP user acceptance
as; (Wilhelm et al., 2000) (Bueno and Salmeron 2008). Similarly, every other
component also has an impact on ERP implemen-
• Use a reference model to select best prac- tation process (direct or indirect), starting from
tice case for implementation. identification of organisational requirements to
• Modelling techniques to be used while doc- customisation of software, installation to make
umenting requirement definition details. software operational and training for successful
• To make the business logic more under- adoption. These levels have significant importance
standable, the system requirements should and every organisation has to go through them.
be documented with help of conceptual
modelling methods.
• A conceptual model should be used as
starting point for system automation, con-
figuration and customisation (if required).
494
An ERP Adoption Model for Midsize Businesses
• Lack of resources and less control over 1. Bancroft et al., (1998) developed a model
business operations. as result of a comprehensive study carried
• Managers/owner might be more influential out on ERP implementation in three anony-
towards strategic policy making issues and mous multinational companies and with
could make a biased choice consultations of 20 ERP practitioners. This
• The decision maker’s background could be model consists of five phases including; four
less or none technical and could result in pre-implementation phases (‘focus’, ‘as is’,
lesser understanding of technology and its ‘to be’, ‘construction and testing’) and one
implications on the business actual implementation phase (‘go live’). This
• Business might try to resolve sophisticat- model covers all major ERP implementation
ed technical issue with less technological activities, starting from ‘focus’ to ‘go live’
understanding. and is briefly described below;
◦ The Planning (focus) phase con-
Aladwani (2001) indicated some crucial issues sists of initial project activities such
in relation to ERP implementation that includes as, formation of steering commit-
mainly the possible resistance from staff toward tee, project team selection, project
adaptability of the product. If staff considers ERP guide development and project plan
applications as threat to their job, they will develop creation.
negative attitude towards it. The ERP literature ◦ The Analysis (as is) phase consists of
does not provide sufficient help to cope with this business process analysis, initial ERP
problem and it should be considered as a major system installation, business process
threat to ERP implementation. mapping on ERP functions and proj-
To overcome the possible resistance (to change) ect team training etc.
problem, management could engage and com- ◦ The Design (to be) phase includes,
municate with its employees in a more effective high level and detailed designing for
495
An ERP Adoption Model for Midsize Businesses
496
An ERP Adoption Model for Midsize Businesses
each phase. Parr et al. (2000) indicated that additional details for user ac-
for an organisation it is important to have ceptance. It also includes inter-
significant amount of knowledge regarding active prototyping through con-
unsuccessful projects and an experienced stant communication with users.
“Champion” should be appointed with ▪ The Configuration & testing
well defined responsibilities. One large sub-phase includes, develop-
project should be partitioned into several ment of comprehensive configu-
sub-projects that can be identified as vanilla ration, real data population in
implementation. The PPM model consists test instance, building and test-
of three major phases; planning, project and ing interfaces, writing and test-
enhancement. ing reports and finally system
◦ The Planning phase comprises of se- and user testing.
lecting an ERP application, formation ▪ The Installation sub-phase in-
of steering committee, project scope cludes building networks, in-
determination and broad implemen- stallation of desktops & manag-
tation approach, selection of project ing user training and support.
team and determination of resources. (Last four sub-phases are simi-
◦ The Project phase includes a range of lar to the phases described in
activities from identification of ERP Bancroft et al. (1998) model)
modules to installation and cut-over. ◦ The Enhancement phase comprises
As the prime focus of this model is on of stages of system repair, extension
implementation, therefore, this phase and transformation and it may extend
has been divided into five sub-phases: over number of years. This phase en-
set-up, re-engineering, design, con- capsulates the Ross (1998)’s continu-
figuration and testing, installation. ous improvement and stabilization
▪ Setup comprises of project team phases and Markus et al. (2000) on-
selection and structuring with wards and upwards phases.
suitable mix of technical and
business expertise. The team(s) section summary
integration and reporting pro-
cesses are established and guid- ERP implementation has been described as unique
ing principles are established or and different from other software implementations
re-affirmed. due to its strategic impact over business. There
▪ Re-engineering comprises of are number of attempts made to produce an ef-
analysis of current business pro- fective model, providing an appropriate strategic
cess and to determine the level direction for large enterprises while implementing
of process engineering required. sophisticated business applications.
This phase also includes, instal- Based on existing research work, sequence of
lation of ERP application, map- events outlined as stages could be represented as
ping of business processes on follows, (See Figure 1)
ERP functions and training the
project teams.
▪ The Design sub-phase includes
high level designing with
497
An ERP Adoption Model for Midsize Businesses
498
An ERP Adoption Model for Midsize Businesses
• Realistic and achievable expectations from adoption by midsize businesses and their large
the application and implementation. business counterparts. It is important to adopt
• The correct level of resources should be al- a collaborative approach based upon existing
located to achieve maximum outcomes. research work to provide a road map (in form
• Reduce possible staff resistance by over- of ERP implementation models for large scale
coming the fear of change by consistent businesses) and also the strategic approach across
communication and staff engagement. organizational, technical and people domains and
• Mapping out key business processes to a their resource limitations for midsize businesses.
negotiable point where software could be This forms a strong base for the proposed ERP
implemented easily. adoption model described below.
• Data conversation (data reformation from
one application to another) should be per- An erP Adoption model
formed appropriately. for midsize business
• Avoid taking short cuts or quick fixes.
• Technical and hands on training must be A need to investigate ERP implementation is-
provided. sues in relation to their applicability in midsize
business is apparent. The literature outlines
Different research approaches have also been implementation models and strategies for large
used to examine and identify factors that are enterprises to have successful ERP implemen-
critical for successful implementation of ERP tation. This existing knowledge base could be
applications. For example, ERP implementation beneficial to develop a strategic ERP adoption
models (Bancroft (1996), Ross (1998), Markus and model for midsize businesses that should provide
Tanis (1999), Parr et al. (2000)) identify factors a workable solution for their ERP implementa-
associated with ERP implementation stages and tions. In the past, much of ERP research was
the degree of importance of each factor to every described as ‘factor research’ that mainly focused
implementation stage, as do the traditional system upon identifying factors or variables critical to
approach (Edward et al 2003) and marketing de- ERP implementation. More recent research fo-
rived 4Ps model (Marnewick, C. & Labuschagne, cus has been on processes that helps understand
L. 2005). Arguably these methods are reliant on ‘how’ an implementation takes place (Aladwani,
resource intense activities that are necessary in 2001). To take advantage of both perspectives, it
larger and change resistant organizations. Another is important to focus on an integrated approach to
approach to ERP research is to focus on business have a better understanding about issues relating
strategies that allow an understanding of ERP to ERP implementation. The link between factors
implementation as business progresses from one and stages is crucial to analyse the importance
implementation stage into another (Aladwani of different factors with the change in each
2001). The three core strategies (organisational, stage during ERP implementation (Markus et al.
technical and people strategies) could be crucial 2000). This will help to assess what factors are
for an organization to adopt ERP application and affecting which process during certain periods
indeed these three are tangibly identifiable within of time and what impact is seen on the process
the midsize business environment and less prob- itself. Parr et al’s (2000) Project phase model and
lematical to investigate if the study was to focus Markus et. als’ (2000) process theory are useful
purely on business processes. tools to conduct the factor impact analysis while
Clearly, there is a difference between issues developing an ERP adoption model for midsize
that need to be considered while examining ERP businesses.
499
An ERP Adoption Model for Midsize Businesses
The major focus of this research is to develop technical and people strategies identified by Al-
an ERP adoption model for midsize businesses dwani (2001). It also includes the midsize busi-
by critically evaluating the strategic factors and ness specific issues (Barad et. al 2001, Rao 2000,
issues with respect to different stages of imple- Gable 1999, Rovere et. al 1996) identification and
mentation. Given the various resource limita- their management to mitigate any risks associated
tions associated with midsize businesses and the with them. Thus this model adopts an integrated
potential challenges of ERP systems adoption, approach of identifying factors critical to ERP
this study is important in focusing on specific implementation along with the processes crucial
business sector (midsize) as a basis for proposing to every stage of ERP implementation.
a model. The resultant model will contribute to Table 1 provides a detailed view of issues in rela-
an increased understanding of implementation tion to implementation stages and strategies during
processes, factors, strategies and issues in relation the implementation process. The model is designed
to midsize business, enabling them to determine to identify key factors associated with ERP imple-
appropriate solution in accordance with their mentation processes. The intent is to adopt a best
operational needs. practice theoretical base approach by encapsulating
Figure 2 provides a ‘bird’s eye’ view of the existing literature to propose a strategic ERP adoption
complex relationship that exists between the model specifically designed to facilitate the needs of
project implementation phases and strategies midsize businesses. There is an enormous amount of
(organisational, people, technical) with issues research that has been conducted in relation to ERP
relating to midsize business. implementation in large enterprises; that is used to
This model is developed by identifying the help identify many of the ERP implementation issues
ERP implementation stages; defined in Parr et faced by midsize businesses. However, we are also
al.’s (2000) Project Phase model (PPM) (also introducing those factors that relate specifically to
presented byBancroft et al. (1998),Ross (1998), midsize businesses because they are different from
andMarkus and Tanis (2000)ERP implementation large size businesses. Midsize businesses are stra-
models) and the three major strategies impacting tegically fragile and economically less stable with
ERP implementation including organisational, limited operability.
500
An ERP Adoption Model for Midsize Businesses
Now we shall discuss the proposed composition the interrelationship between these two modules
of the model and the importance of the strategic and to suggest activities, strategies and tasks to
mixture being proposed. execute the project efficiently. Midsize businesses
often lack leadership and strategic vision and they
the model mainly focus on day to day operations. Midsize
businesses also tend to be influenced by number of
The model is divided into two major dimensions, factors while selecting an information system and
ERP implementation stages and factors impact- are often limited by their lack of knowledge and
ing implementation, which are represented as a skill. Our model will provide midsize business a
matrix in Table 1. The objective is to underline broader picture of issues that they could encounter
501
An ERP Adoption Model for Midsize Businesses
during the ERP implementation processes and will and updated if necessary. A project manage-
assist them to have a controlled implementation. ment plan should be developed to scope the
project activities, project tasks should be
ERP Implementation Stages scheduled and resources should be identified
and allocated (including time and money).
As shown earlier, different researchers have identi- Accurate and timely information is very
fied planning, set up, engineering, system design, important for midsize businesses to execute
configuration, testing and installation as separate project plans in accordance with their desired
stages but we have consolidated these to align in expectations. Therefore it is important that
accordance with midsize implementation. Markus information should be accurate during entire
et al. (2000) identified ‘chartering’ as a crucial planning process.
stage that contains decision making processes 3. Setup & Re-engineer: To execute the project
leading up to selection of an ERP application. This effectively, it is important to structure the
has been reflected as a pre-planning phase in our project team with the correct mix of technical
model to highlight the need for activities that are and business professionals. As midsize busi-
important for decision making processes leading nesses lack resources, it is crucial for them to
up to selection of a suitable ERP application. decide whether they need to hire or acquire
the necessary skills. Midsize businesses
1. Pre-Planning: It is important for midsize should identify and reassess their available
businesses to perform comprehensive pre- resources (in-house expertise and money)
planning analysis of their existing financial to structure the project team according to
and operational performance indicators. At the standard required for ERP implementa-
the organisational level; strategic planning tion. The cost of implementation could be
for projects becomes vital when risks are significantly high if there is a need of cus-
high and resources are limited. All important tomisation in the application. Therefore, the
decisions leading to financial approval, the organisation’s ideology should be examined
development of a business case, gathering ap- to assess the staff and management’s attitude
propriate business, technical & architectural to change before taking any decisions. The
information should be obtained and shared guiding principles of the project should be
with the appropriate people for an informed identified and a business case analysis should
decision. Midsize businesses should assess be completed to underline the expectations.
the operational significance and collective The ERP application should be installed in
business benefits of the proposed applica- the development environment and business
tion before making any judgements. Change process mapping should take place with
management and risk management plans gap analysis. Internal team training should
should be developed to underline areas that occur to equip existing organisational staff
should be considered during implementation. with the appropriate skill levels. For midsize
2. Planning: This is the first official stage of businesses it would usually be wise to have
the project in which initial project activities right mix of in-house and third party technical
should be performed, such as the identifica- expertise to avoid any surprises in the ‘post
tion of key stakeholders and formation of a go-live’ phase.
governing body and project team selection 4. System Design: This is an important
(including hiring new staff). Change and risk stage in which higher level design should
management strategies should be revisited be completed and approved. Extensive
502
An ERP Adoption Model for Midsize Businesses
503
An ERP Adoption Model for Midsize Businesses
ated with ERP implementation. The questionnaire A total of fifteen to eighteen businesses will be
will investigate the level of usage of ERP systems interviewed and they will be selected depending
in mid-market and specially examine; the strate- upon responses received and their ERP implemen-
gies that led to smooth implementation of ERP tation results. The results of second iteration of the
applications; selection of business solutions for model will be presented to ERP system experts to
a business type; issues and impact of proposed ascertain technological and managerial implica-
strategies during implementation process; fac- tions. The feedback gauged from ERP experts will
tors affecting the implementation processes and confirm the industry findings and potentially also
sequence of activities performed in each imple- identify new or undocumented strategies that are
mentation stage. directly related to the area of research.
The outcome of this survey will be used to The data received from different sources will
generate a first iteration or revised version of ERP be evaluated and result will be used in further
adoption model. refinements of ERP adoption model. The resultant
ERP adoption model derived from this two stage
Stage Two— Industry Case methodology will provide a road map for midsize
Studies & Expert Panel businesses, incorporating strategies that should
be considered in accordance with their situation,
The stage two of investigative methodology will background, financial situation and applicability
consist of multiple case studies. The respondents to implement ERP applications successfully.
of industry survey (stage one) will be asked to
state their interest in a follow up interview. The
purpose of this exercise is to conduct a qualitative conclusIon
analysis to examine each case in depth in order to
understand the individual experiences of midsize This chapter examines the impact of ERP imple-
businesses. This will provide an opportunity to mentation on midsize businesses by discussing
obtain first hand knowledge about organisation factors with reference to strategies and processes
and their understanding of issues in relation to that are important for ERP implementation in
ERP implementation in midsize businesses. The midsize businesses. There are many constraints
strategies adopted by these businesses to over- being identified in relation to ERP implementation,
come issues relating to their implementation of especially when there is a need of their customi-
ERP applications will also be discussed. This sation. Sometimes businesses need to customise
data collection stage will help to identify specific these applications to add or delete features to serve
strategies that these businesses have adopted to their business needs, hence it would be beneficial
help them address certain issues and problematic to identify business requirements and scope the
situations. The case studies will be categorised project objective before its initiation. The chapter
into three levels; also examines the nature of midsize businesses
and argues that ERP adoption is likely to be an
• Midsize businesses that have performed important consideration for these businesses in
ERP implementation, the near future. Midsize businesses are mainly
• Midsize companies that tried to implement dependent upon many internal (organisational)
an ERP application but ‘rolled back’ and and external (wider economic) influential factors.
• Midsize businesses that have not tried Arguably, some internal or external factors might
but considering ERP solution for their force midsize businesses to adopt ERP applica-
problems tions, not only to make them more competitive
504
An ERP Adoption Model for Midsize Businesses
but also due to pressures associated with their sational, people, organisational). The qualitative
larger counterparts. Therefore, it is important to stage of the roadmap involves the capture of
underline factors that could impact midsize busi- individual experiences of midsize businesses
nesses during sophisticated application adoption adoption through the case study method in order to
processes. gain first hand knowledge about the organisations
Implementation of an ERP system is different and the ERP strategies they implemented. Each
from any other software application due to its stage of the roadmap will allow the progressive
impact on business operations and requirement development and refinement of the proposed ERP
to facilitate business needs. There have been a adoption model.
number of attempts made by different research-
ers to produce an effective framework, enabling
businesses to have a strategic direction for ERP reFerences
implementation. ERP implementation models
were developed specifically to focus on the Aberdeen Group. (2006). ERP in the mid-market.
identification of large enterprise implementation Boston: Aberdeen Group, Inc.
requirements and activities/ stages that are crucial Al-Mashari, M. (2002). ERP Systems: A research
for their implementation. It would be beneficial to agenda. Industrial Management & Data Systems,
utilise existing knowledge base while developing 165–170. doi:10.1108/02635570210421354
a strategic model for ERP adoption in midsize
businesses. This model should focus on strategic Al-Mashari, M., & Zairi, M. (2000). Informa-
issues faced by midsize businesses providing tion and business process equality: The case of
guidelines that could help to mitigate associated SAP R/3 implementation. Electronic Journal on
risks to ERP implementation. Information Systems in Developing Countries, 2.
ERP adoption is also discussed from aspect Aladwani, A. M. (2001). Change management
of number of different implementation meth- strategies for successful ERP implementation.
odologies that are traditional, process focussed, Business Process Management Journal, 7(3),
marketing enabled, strategy or process oriented. 266–275. doi:10.1108/14637150110392764
It is argued that a strategic approach focusing on
organisational, technical and people area along- Alison, C. (2002, Dec). Works management.
side with midsize business factor analysis would HortonKir by, 55(12), 30–33.
be desirable while outlining the activities to be
Amoako-Gyampah, K. (2007). Perceived useful-
performed in each implementation stage. Hence, a
ness, user involvement and behavioural inten-
conceptual ERP adoption model would include a
tion: an empirical study of ERP implementation.
strategic approach to investigate and deliver a road
Computers in Human Behavior, 23, 1232–1248.
map to a limited midsize business environment.
doi:10.1016/j.chb.2004.12.002
To test and reform the proposed ERP adoption
model, a methodological roadmap is documented APEC Profile of SMEs. (2003). What is an SME?
that embraced quantitative and qualitative data Definitions and statistical issues. Journal of En-
collection stages and will be tested on Australian terprising Culture, 11(3), 173–183. doi:10.1142/
midsize business market. The quantitative stage S021849580300010X
will be associated with the capture of business
Bancroft, N., Seip, H., & Sprengel, A. (1998).
characteristics that detail the scope of ERP systems
Implementing SAP R/3 (2nd ed.). Greenwich:
adoption and identification of salient aspects of
Manning Publications.
strategy across the three areas of interest (organi-
505
An ERP Adoption Model for Midsize Businesses
Barad, M., & Gien, D. (2001). Linking improve- Ferguson, R.B. (2004). ERP targets the midmarket.
ment models to manufacturing strategies – A meth- eWeek, 21(6), 41.
odology for SMEs and other enterprises. Inter-
Gable, G., & Stewart, G. (1999). SAP R/3 imple-
national Journal of Production Research, 39(12),
mentation issues for small to medium enterprises.
2675–2695. doi:10.1080/002075400110051824
Americas Conference on Information Systems,
Boubekri, N. (2001). Technology Enablers for August 13-15, Milwaukee, WI.
supply chain management. Integrated Manu-
Gefen, D., & Ragowsky, A. (2005). A multi-level
facturing Systems, 12(6), 394–399. doi:10.1108/
approach to measuring the benefits of an ERP sys-
EUM0000000006104
tem in manufacturing firms. Information Systems
BRW. (2002, November). Fast 100 Issue. Cited by Management Journal, 22(1), 18–25. doi:10.1201
Business Technologies for SMEs, October 2003, /1078/44912.22.1.20051201/85735.3
Conference at Sydney.
Keller, G., & Teufel, T. (1998). SAP R/3, process
Bueno, S., & Salmeron, J. (2008). TAM-based oriented implementation. Harlow: Addison-
success modelling in ERP. Interacting with Wesley.
Computers, 20, 515–523. doi:10.1016/j.in-
Kennerley, M., & Neely, A. (2001). Enterprise
tcom.2008.08.003
resource planning: Analysing the impact. Inte-
Caillaud, E., & Passemard, C. (2001). CIM grated Manufacturing Systems, 12(2), 103–113.
and virtual enterprises: A case study in a doi:10.1108/09576060110384299
SME. International Journal of Computer
Klaus, H., Rosemann, M., & Gable, G. G. (2000).
Integrated Manufacturing, 14(2), 168–174.
What is ERP? Information Systems Frontiers,
doi:10.1080/09511920150216288
2(2), 141–162. doi:10.1023/A:1026543906354
Chung, S. H., & Synder, C. A. (1999). ERP ini-
Koch, C. (2008). The ABC of ERP. Enterprise
tiation- A historical perspective. Americas Con-
Resource Planning Research Center. Retrieved
ference on Information Systems, August 13-15,
from http://www.cio.com/research/erp/edit/erp-
Milwaukee, WI, 1999
basics.html
Correa, C. (1994). cited by Aladwani (2001).
Lee, T. T. (2000). Apt ERP alternatives. New
Change management strategies for successful ERP
Straits Times-Management Times.
implementation. Business Process Management
Journal, 7(3), 266–275. Leedy, P. D. (1997). Practical research – Plan-
ning and design (6th ed.). NJ: Prentice-Hall, Inc.
Duxbury, L., Decady, Y., & Tse, A. (2002). Adop-
tion and use of computer technology in Canadian Markus, M. L., Axline, S., Petrie, D., & Tanis, C.
small businesses: A comparative study. In Manag- (2000). Learning from adopters’ experiences with
ing Information Technology in Small Business: ERP: problems encountered and success achieved.
Challenges & Solutions (pp. 22-23). Hershey, Journal of Information Technology, 15, 245–265.
PA: Information Science Publishing. doi:10.1080/02683960010008944
Edward, W. N., Bernroider, N., & Tang, K. H. Markus, M. L., & Tanis, C. (2000). In R.W. Zmud
(2003). A preliminary empirical study of the dif- (Ed.), The enterprise systems experience – From
fusion of ERP systems in Austrian and British adoption to success, in framing the domains of IT
SMEs. Working Papers on Information Processing management: Projecting the future…… through
and Information Management. the past (pp. 173-207).
506
An ERP Adoption Model for Midsize Businesses
Marnewick, C., & Labuschagne, L. (2005). A Rovere, L., & Lebre, R. (1996). IT diffusion in
conceptual model for enterprise resource planning small and medium-sized enterprises: Elements
(ERP). Information Management & Computer for policy definition. Information Technology for
Security, 13(2). doi:10.1108/09685220510589325 Development, 7(4), 169–181.
Martin, M. (1998). An electronics firm will save Saccomano, A. (2003). ERP vendors consolidate.
big money by replacing six people…… not every Journal of Commerce, 4(24), 46.
company has been so lucky. Fortune, 137(2),
Sandoe, K., Corbitt, G., & Boykin, R. (2001).
149–151.
Enterprise Integration. New York: Wiley.
Monnerat, R., Carvalho, R., & Campos, R. (2008).
Sarbutts, N. (2003). Can SMEs ‘do’ CSR? A prac-
Enterprise systems modeling: The ERP5 devel-
titioner’s views of the ways small-and medium-
opment process. [Fortaleza, Ceara, Brazil]. SAC,
sized enterprises are able to manage reputation
08(March), 16–20.
through corporate social responsibility. Journal
Parr, A., & Shanks, G. A. (2000). Model of Communication Management, 7(4), 340–348.
of ERP project implementation. Journal doi:10.1108/13632540310807476
of Information Technology, 15, 289–303.
Taylor, J. (1999). Management Accounting.
doi:10.1080/02683960010009051
Turban, E., Leidner, D., Mclean, E., & Wetherbe,
Pramukti, S. (2003). Establishing synergy
J. (2006). Information Technology Manage-
between small companies and banks. JA-
ment: Transforming Organisations in the Digital
KARTA POST 06/03/2003. Accession Number:
Economy (5th ed.). New York: John Wiley & Sons.
2W81194803776, Business Source Premier
Vandaie, R. (2008). The role of organizational
Ragowsky, A., & Gefen, D. (2008). What Makes
knowledge management in successful ERP imple-
the Competitive Contribution of ERP Strategic.
mentation projects. Knowledge-Based Systems,
The Data Base for Advances in Information Sys-
21, 920–926. doi:10.1016/j.knosys.2008.04.001
tems, 39(2).
Wei, C. (2008). Evaluating the performance of
Rao, S. S. (2000). Enterprise resource planning:
an ERP system based on the knowledge of ERP
business needs and technologies. Industrial
implementation objectives. International Jour-
Management & Data Systems, 100(2), 81–88.
nal of Advanced Manufacturing Technology, 39,
doi:10.1108/02635570010286078
168–181. doi:10.1007/s00170-007-1189-3
Raouf, A. (1998). Development of operations
Wilhelm, S., & Habermann, F. (2000). Making
management in Pakistan. International Journal
ERP a success. Communications of the ACM,
of Operations & Production Management, 18(7),
43(4), 57–61. doi:10.1145/332051.332073
649–650. doi:10.1108/01443579810217602
Yang, J., Wu, C., & Tsai, C. (2007). Selection of
Rooney, C., & Bangert, C. (2000). Is an ERP Sys-
an ERP system for a construction firm in Taiwan:
tem Right for You? Adhesives Age, 43(9), 30–33.
A case study. Automation in Construction, 16,
Ross, J. W. (1998). The ERP revolution: Surviving 787–796. doi:10.1016/j.autcon.2007.02.001
versus thriving. Centre for Information Systems
Yates, I. (2004). 2004 Proved Successful for SAP
Research, Sloan School of Management.
Latin America. Caribbean Business,33(10).
This work was previously published in Enterprise Information Systems for Business Integration in SMEs: Technological, Or-
ganizational, and Social Dimensions, edited by Maria Manuela Cruz-Cunha, pp. 153-174, copyright 2010 by Business Science
Reference (an imprint of IGI Global).
507
508
Chapter 2.11
Developing and Customizing
Federated ERP Systems
Daniel Lübke
Leibniz Universität Hannover, Germany
Copyright © 2011, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Developing and Customizing Federated ERP Systems
and employ 70.6% of all employees nationwide. In changed is worthless if no one knows what the
order to operate efficiently, SMEs need enterprise desired result is.
software, like ERP systems, for managing their Within this chapter we introduce the Feder-
business operations efficiently. However, ERP ated ERP System as a new architecture for ERP
systems impose high costs due to their expensive systems that are especially suited to SMEs. We
purchase, customizing costs and re-customizing describe the overall architectural ideas as well
costs whenever business processes are changed. as our implementation. In the second part we
Thus, business process changes that are neces- present a technique for deriving and discovering
sary to stay competitive become more costly as business processes from textual scenarios – so
before. called use cases known from the software engi-
This inevitably leads to the question how to neering domain.
make ERP systems better suited to SMEs in order
to make them more competitive in the long run.
The answer to this question is decomposed into FederAted erP systems
two parts. The first part is a new architecture for
such systems that can be introduced, operated, Problem Addressed
and maintained cheaper. The second part is en-
gaged with the question on how to come to (new) An ERP system is a standard software system
requirements for the ERP system based on the which provides functionality to integrate and
business processes. A system that can be flexibly automate the business practices associated with
509
Developing and Customizing Federated ERP Systems
the operation or production aspects of a company. The subsystems of the proposed architecture
The integration is based on a common data model are the following:
for all system components and extents to more
than one enterprise sector (see Robey et al., 2002; FERP Workflow System (FWfS)
Rautenstrauch et al., 2003).
However, there are some disadvantages as- The FWfS coordinates all business processes
sociated with conventional ERP systems. The which have to be described in an appropriate
main ones are: XML-based workflow language. A workflow in
this context is a plan of sequentially or parallelly
• In most cases not all of the installed com- chained functions as working steps. Each step
ponents are needed, represents an activity which leads to the creation
• high-end computer hardware is required to or utilization of business benefits. Workflows
run the system, and implicitly contain the business logic of the overall
• customization of ERP systems is very ex- system. The function types that can be contained in
pensive because product specific know-how a workflow in FERP systems are the following:
of experts is necessary.
• Model-based user interface functions, e.g.
Due to the expensive process of installation show, edit, select, control
and maintenance only large enterprises can afford • Database access functions, e.g. read, up-
complex ERP systems, which provide business date
logic for all sectors of the functional enterprise • Application tasks which are connected to
organization. Contrary to these aspects, FERP Web Service calls
systems allow the separation of local and remote
functions whereby no local resources are wasted FERP User System (FUS)
for unnecessary components. Furthermore, single
components are executable on small computers The FUS is the subsystem which implements func-
and due to decreasing complexity of the local tions for the visualization of graphical elements
system installation and maintenance costs sub- and coordinates interactions with end users. This
side, too. subsystem is able to generate user screens at run-
time. Screen descriptions, which have to comply
reference Architecture with the FERP UI standard, are transformed to an
end device-readable format, e.g. HTML in case
Figure 1 gives an overview of the reference ar- of web browsers.
chitecture of a Web Service-based FERP system.
The architecture consists of several subsystems, FERP Database System (FDS)
which are interconnected. Because one of the
main objective of an FERP system is to integrate The FDS is the subsystem which implements
business components of different vendors, all functions for the communication with the FERP
components have to comply with standards. In database. This subsystem is able to interpret XML
this approach these standards are described by structures which comply with the FERP data
using XML schema documents. In order to sepa- standard. The interface differentiates between
rate the three different layers of a typical layered two kinds of requests. Database update requests
architecture of conventional ERP systems, each contain object oriented representations of business
layer is assigned its own standard. entities as XML trees. Database read requests
510
Developing and Customizing Federated ERP Systems
contain X-Path or X-Query expressions specifying which are wrapped in a Web Service. The FWCS
portions of data to be extracted. In both cases the is the subsystem that provides the functionality
request parameters have to be transformed into for the invocation of Web Services. All possible
different types of request statements that vary types of FERP Web Services are specified by the
depending on the type of database management FERP WS standard. This standard contains XML
system (DBMS) that is used. Assuming the use schema definitions that describe Web Service op-
of a relational DBMS (RDBMS), the underlying erations as well as input and output messages. A
data model also has to comply with the FERP data Web Service references these types in its WSDL
standard, which means that the corresponding description. Furthermore this subsystem is able to
table structure has to reflect the XML-Schema search for Web Services, which are defined by a
specifications respectively. The java.net project unique identifier. This way it is possible that dif-
hyperjaxb21 provides a solution to generate SQL ferent Web Service providers implement the same
statements on the basis of XML schema defini- business component type as Web Service. Beside
tions. Another solution is the application of native the implementation of Web Service invocation
XML databases or XML-enabled RDBMS. and search functionality this subsystem is respon-
sible for the interpretation and consideration of
FERP Web Service Consumer non-functional parameters. Examples for those
System (FWCS) parameters are security policies, payment polices,
and Quality of Service (QoS) requirements on the
The business logic of FERP systems is encap- part of Web Service consumers.
sulated in so called FERP business components
511
Developing and Customizing Federated ERP Systems
Figure 3. Process model in YAWL as simplified example for the creation of a purchase order
FERP Web Service Provider System FERP Web Service Directory (FWD)
(FWPS)
The FWD provides an interface for the publica-
The FWPS is the subsystem which implements tion and the searching of FERP Web Services
functions for the provision of Web Services which based on the UDDI standard. The structure of
comply with the FERP WS Standard. The subsys- this registry leans on the FERP WS standard. In
tem includes a Web Server which is responsible for this standard Web Services are assigned to cat-
the interpretation of incoming and outgoing HTTP egories mirroring the predetermined functional
requests which in turn encapsulate SOAP requests. organization of enterprises.
The subsystem provides business components of
the FERP system as Web Services. Prototype development
A connection to the FERP Web Service Di-
rectory allows the publication of Web Services. The following paragraph briefly describes a first
Furthermore this subsystem is responsible for the implementation of the proposed reference archi-
negotiation of common communication policies tecture which is based on open source software
such as e.g. security protocols or usage fees with components. Figure 2 shows the architecture
the requesting client. of our prototype. For the implementation of the
FWfS we chose the workflow engine of the YAWL
project2. The FUS was implemented on the basis
512
Developing and Customizing Federated ERP Systems
of Apache Struts3. Our FDS is mainly based on the calculation of the total sum the Web Service
the API of the Hyperjaxb2 project which in turn returns the completed order as XML document.
uses JAXB4 and Hibernate5. jUDDI6 served as The next workflow task visualizes this XML
basis for implementation of the FWD. The FWCS document. After the user agreed the XML docu-
uses JAX-RPC7 (Java API for XML-based RPC) ment is transmitted to the FERP database system
which is provided by the SUN Developer Network which transforms it to an SQL-INSERT statement
(SDN). Our FWPS uses Apache AXIS8 as basis in the next workflow task.
for the provision of Web Services.
Figure 3 shows an example process model in user Interface Generation
YAWL
Every ERP system needs to be operated by users.
Tasks in our process definitions can be assigned In the end, they need to make decisions, retrieve
to one of the three function types: data or enter new records. While classical ERP
systems offer clients for personal computers only,
• Database communication (in figure 3 indi- now mobile devices, like handhelds and mobile
cated as DB-task) phones are emerging. Because of this situation
• End-user communication (in figure 3 indi- the Federated ERP system will face many types
cated as GUI-task) of clients. Furthermore, these clients need to be
• Web Service communication (in figure 3 easily updatable. For a simple process change it is
indicated as WS-task) not feasible to update hundreds of possibly mobile
or distributed computers. Thus the user interface
All other symbols comply with the graphi- must be managed on the server-side and must be
cal notation of YAWL. The example process platform-neutral.
model demonstrates a workflow for the creation Our approach for minimizing the effort needed
of a purchase order9. The example includes only to develop and customize the user interface is to
one Web Service call which is responsible for automatically generate the interfaces from the
the calculation of the total sum of a purchase business process descriptions. Much research has
order which consists of one or more order items. been done in the field of model-based user interface
Order items include a price and an amount. The (MB-UI), which aims to model user interfaces in
Web Service receives the whole order as XML the way program logic is modeled in UML. Re-
document without total sum. Having finished search in these fields has been going on for more
513
Developing and Customizing Federated ERP Systems
than a decade. For example, (Paterno, 1999) gives strives to reduce the inherent complexity. This
an overview over the field of MB-UI. Numerous is especially important for being useful for the
design environments have been proposed as result targeted, non-expert audience.
of MB-UI. Each differs in the number and type of Because we assume the business process to be
models used (for a thorough overview the reader already modeled, the user interface is expressed by
is referred to (da Silva, 2000). However, most ap- stereotyping business functions. Four stereotypes
proaches share a common element: the task model. have been introduced:
Fortunately, this task model is easily related to
our approach: The business process model is in • Selection: The user shall select data from a
fact a task model on a very high abstraction level collection of possible choices. For example:
(see Traetteberg, 1999). Furthermore, the field Select product from a catalogue.
of MB-UI has matured. Especially insight into • Edit: The user shall edit some information
reasons for failure of some approaches has been object from the data model. For example,
beneficial for our research. Common mistakes edit order.
and problems concerning practical adoption of • Control: The user wants to explicitly in-
MB-UI techniques are listed by (Traetteberg voke some action. This is used to model
et. al., 2004): The biggest problem has been the navigational decisions. For example, “Accept
complexity of the introduced models. While order”.
complex and detailed models give the designer • User: The user has to do something by
the best level of control, such models are difficult himself, e.g. planning, comparing, etc.
to learn, time-consuming to design and hard to
maintain. Therefore, our approach particularly
514
Developing and Customizing Federated ERP Systems
These four actions can be attached to a busi- example, a connector for XForms – an XML
ness function and are visualized by small icons standard for describing input forms - is under
on the left-hand side. The annotated business development and generation of HTML pages is
processes are downloaded by the client software, possible as well for integration into intranet and
which generates user interfaces from these models portal applications. For further discussion on the
and sends the data and user decisions back to the topic of generation of user interfaces from EPC
server. This way, the user interface can be edited models (see Lüecke, 2005; Lübke et. al., 2006).
simply by installing new business process models
on the server. FerP as an soA Instance
For the generation of user interfaces, the data
types are used to look up matching editors. Be- Because of FERP system is based on Web Ser-
cause Web services are based on XML, the data vices and their orchestration, we can say that
types are represented by XML Schema definitions. it is a service-oriented architecture solution
XML Schema defines data types recursively: whereby all functions are available as services
Primitive types can be grouped to complex types. and unambiguously addressable. This system
Complex and primitive types can be grouped to works as follows:
new complex types and so on. Editors are created
by traversing this structure and look for matching 1. The network consists of service consuming
editors registered in the system. At least for each and service providing network nodes.
primitive type, like integers and strings, an editor 2. Each client, which provides an interface
is provided by the system. Therefore, a (possibly to an enterprise is called mandator and is
primitive) editor can be generated for each XML connected to the enterprise database.
Schema. Figure 4 shows a simple generated editor 3. The processing steps of a business process
for a customer record. are stored in the local database of a mandator
Figure 5 shows the hierarchical refinement as workflow. A workflow in this context is
of the example process with user interface ste- a plan of sequentially or in parallel chained
reotypes, and the resulting user interface using functions as working steps in the meaning
a custom editor. The client application shows the of activities which lead to the creation or
processes needing further action by the user, and utilization of business benefits.
the processes which are currently executed by 4. Finding a function within the P2P-network
someone else. This information is given on the means that a request which contains the
right hand side. function type must be send to all service
Since the user interface generation is based providing peers.
on the business process description, context in- 5. After receiving the responses to a function
formation can be given to the user. For example, type request the mandator must elect a net-
descriptions of the currently active business func- work node to be accessed.
tion can be displayed. In our prototype these are 6. A function call contains parameters as busi-
realized by giving tool-tip information. At this ness objects and other (primitive) values that
point it is even possible to integrate experience are delivered to the service providing net-
bases to facilitate the communication between work node. A business object in this context
developers, process designers and end users. is a snapshot of the enterprise database at
Since this approach is based on the process a particular time in a standardized format.
description only, it is possible to generate user Function calls can contain other function
interfaces for different target platforms. For calls.
515
Developing and Customizing Federated ERP Systems
7. A function returns a list of either directly they have to be performed. But even if SMEs
modified business objects or independent have documented business processes, these de-
values that are necessary for subsequent scriptions are typically not suited for software
business object updates (e.g. intermediate development or customization because technical
data). details are missing.
8. Returned business objects must be syn- Therefore, the knowledge of process partici-
chronized with the local database of the pants needs to be externalized into documented
mandator. business processes that are suited to be the basis
for software development and customization
projects because they lack sufficient detail.
busIness Process Within the FERP context, we propose a light-
modelInG In tHe FerP weight approach to elicitate the business processes
context and to generate explicit models from there. These
explicit business process models can be used to
The FERP system is targeted at SMEs. This pre-generate and develop the workflows in FERP
poses some additional challenges besides the systems that are the technical representation of
already outlined technical problems. Especially the business.
the gathering of requirements - and as their most The technique is constrained for this particular
important part business processes – has to be per- context as following:
formed before any implementation of an (F)ERP
system can start. • Easy to use: The technique must easy to use
However, in most SMEs the business processes because SME employees usually do not have
are not defined explicitly, but the organization extensive technical knowledge and no time
as a whole has tacit knowledge of the activities for learning complex techniques.
that are to be performed and the order in which • Easy to understand: When discussing results
it is important that all stakeholders can par-
Table 1.
Use Case #3: Thesis Supervisor hands out topic
Primary Actor Thesis Supervisor
Thesis Supervisor: wants to hand out topic easily and without much paperwork
Stakeholders Student: wants to receive topic quickly
Secretary: wants easy to use/read forms for completing registration
Minimal
A topic is only handed out once at a time
Guarantees
Successs Student knows topic
Guarantees Supervisor knows all needed adminstrative information of the student
Student has achieved at least 80% of credit points
Preconditions
Student has clearance from Academic Examination Office
Triggers Student wants to sign up for a topic
1. Supervisor checks whether the topic is still available or not
2. Supervisor reserves topic for student
Main Success
3. System updates list of current thesis
Scenario
4. Supervisor confirms thesis topic and student’s information to the Academic Examination Office
5. System sends confirmation to student, supervisor and Academic Examination Office
Extensions 1a If topic is not available anymore, then EXIT
516
Developing and Customizing Federated ERP Systems
ticipate and contribute. Therefore, the same of view of a single main actor. The most common
restrictions apply to understanding as they form for documenting use cases are tables as il-
do to usage. lustrated in table 1:
• Lightweight: The technique must quickly The table contains additional information
save time for associated employees. Not like preconditions and success conditions that
much effort may be spend as this would pose express goals and constraints from the business
undue costs and would hinder flexibility. and software point of view that are associated
• Offer basis for later development: The results with the use case.
must be usable by the customization team For our approach, we assume the use cases
later on. The smoother this transition is the to conform to the meta-model as illustrated in
better. figure 6.
The metamodel captures the properties of the
use cases as the basis tabular template. A use case consists primarily of
the main scenario that has a sequence of steps. Each
We use a use case-based approach for interview- step can be extended for operational sequences
ing the users and stakeholders in SMEs and that are not default. Each extension consists of a
documenting the results. new scenario. Each step within a scenario has an
Use Cases (Cockburn, 2005) are a technique actor, i.e. the role or person that is performing the
from the Requirements Engineering community. activity. A use case is written from the perspective
They represent possible scenarios from the point of a main actor that is primarily concerned with
*
Project usecaseset
+sets
inv: this.returnJump.
* scenario !=
+ triggers this.extensionScenario
* 1
+ preconditions +mainScenario scenario
* + extensionScenario
condition usecase 1
+minimal g.
*
+ success g 0..1
decomposition
+ condition 1
* 1..*
{ordered}
*
1 * + extended by
stakeholder Actor step 0..1 extension
+ actor
+ return jump
computer
Human Actor
system
517
Developing and Customizing Federated ERP Systems
the goals the use case has. The goals are repre- Because use cases conforming to the presented
sented by success guarantees. A use case starts metamodel must not contain complex control-
when the trigger applies and may be performed flow constructs, they only require a limited set of
iff all preconditions are met. workflow-patterns (van der Aalst, ter Hofstede,
Because use cases are nearly freely-written Kiepuszewski, & Barros, 2003). Following work-
text, they have the advantage that they are easily flow-patterns are needed within a use case:
comprehendible by all kinds of users and stake-
holders (Lübke, 2006). Furthermore, the tabular • Sequence: A sequence is used to order the
structure imposes a semi-formal format that can steps within a scenario,
be processed by computer programs later on. • Exclusive Choice: For attaching extensions
to a step, this type of split in the control-flow
mapping use cases to business is needed,
Processes • Simple Merge: When extension jump back,
the control-flow is merged with this type of
Use Cases are written from the perspective of merges.
the main actor only. However, a set of use cases
can represent a business process. Therefore, the However, it is necessary to join use cases. This
individual use cases need to be joined together is done by comparing the triggers, preconditions,
into one large process. and success guarantees. The use cases are ordered
The set of use cases and a use case itself can in a way that success guarantees satisfy triggers
represent a business process. The steps within and preconditions of the following use cases.
the use case can be seen as the activities of the Because a success guarantee can satisfy the
business process. The actors of the step become preconditions of more than one use case, and
the actors of the business activities. the precondition and trigger of a use case can be
Figure 7. Joining multiple use cases in EPC notation to a single EPC model
518
Developing and Customizing Federated ERP Systems
satisfied by more than one use case, following 5. The extension scenario is converted like the
workflow-patterns are needed: main scenario
° Extensions of extensions are handled
• Parallel Split: The control-flow of one use recursively
case is split to several use cases because more 6. Return jumps are realized with an XOR-
than one precondition can be satisfied, join
• Generalized Synchronized Merge: The pre- ° The join is introduced before the function
condition can be satisfied by one of many that is the jump target
use cases.
This algorithm is applied to every use case.
Because all business process languages In the following step, the use cases have to be
support these basic workflow-patterns, the gen- joined. Depending on different needs, several
eration can have any language as its target. We join strategies are available:
demonstrate this by generating EPCs that can be
the basis for composing the Web services of an • Large EPC: Generates a single, large EPC
FERP system. model from all use cases.
• Short EPC: Generates an EPC that has a
Generation of event-driven function for each use case. The details of
Process chains the use case are discarded and not displayed.
This type of model is well-suited for discuss-
For demonstrating our approach we chose Event- ing the ordering of use cases and the global
Driven Process Chains (EPCs). They are easy to control-flow.
understand and are therefore well-suited for fos- • Short EPC with hierarchical refinement:
tering communication between the stakeholders EPCs allow function to be detailed in
of FERP systems. other EPCs. This approach combines the
The generation of a single use case is done by advantages of the first two approaches by
applying following algorithm: generating a short EPC and placing a more
detailed EPC for the use case behind every
1. Preconditions and Triggers are converted function.
to events
° If there is more than one event, the events Common to all three approaches is the strat-
will be joined by an AND-join egy for merging the set of use cases to a single
2. Each Step of the main scenario is converted model. The events that have been generated by
to a function the algorithm above are unified, i.e. all events that
° Connected with simple okay-events have the same name are reduced to a single event.
3. Success guarantees are converted to end- Connectors for the control-flow are introduced
events accordingly. This is illustrated in figure 7.
° If there is more than one event, an AND-
split is introduced Advantages of the Use Case-
4. Extensions are introduced with an XOR- Centered Approach
split
° The extension condition becomes an By using textual use cases, it is possible to docu-
event ment and discover business processes. Due to the
use of plain, semi-formal text, they can be used
519
Developing and Customizing Federated ERP Systems
by all involved stakeholders. These stakeholders tive Models and Development Environments: A
do not need to learn a new notation nor do they Survey. In Palanque & Patern`o (Eds.), DSV-IS,
have difficulties while interpreting and validat- volume 1946 of Lecture Notes in Computer Sci-
ing the documented parts of business processes. ence (pp. 207–226). London: Springer.
Use Cases can guide interviews with isolated
IfM Bonn (2008). Schlüsselzahlen Deutschland
stakeholders. The generation generates a global
(Key Indicators Germany). Retrieved December
view by combining the use cases to a large busi-
28, 2008, from http://www.ifm-bonn.org/index.
ness process model. The business process model
php?id=99, 2008-12-28.
is the foundation for later ongoing development.
It can be readily used by developers. Therefore, Lübke, D., Lüecke, T., Schneider, K., & Marx
our approach satisfies the constraints outlined Gómez, J. (2006). Using Event-Driven Process
above nicely. Chains for Model-Driven Development of Busi-
ness Applications. In Nüttgens & Mendling (Eds.),
Proceedings of the XML4BPM 2006.
conclusIon And outlook
Lübke, D. (2006). Transformation of Use Cases
to EPC Models. In M. Nüttgens, F. Rump, & J.
Within this chapter we have presented the FERP
Mendling (Eds.), Proceedings of the EPK 2006.
architecture as an architecture for ERP systems
CEUR Proceedings Vol 224. http://ftp.informa-
that are well-suited for SMEs; such systems can
tik.rwth-aachen.de/Publications/CEUR-WS/
be flexibly altered, and are comparably cheap to
Vol-224/.
install and maintain. However, in order to know
what to change and what to install, business pro- Lüecke, T. (2005). Development of a Concept for
cesses need to be defined first. Within SMEs such Creating and Managing User Interfaces bound
processes need to be documented because usually to Business Processes. Master’s Thesis, Leibniz
no explicit business process documentation exists. Universität Hannover, Germany.
We proposed a use case-centered approach for
Paterno, F. (1999). Model-Based Design and
elicitating the business processes in a way that is
Evaluation of Interactive Applications. London,
comprehensibly by non-tech-savvy people.
United Kingdom: Springer-Verlag.
With the combination of these two parts, SMEs
can introduce and maintain their ERP systems Rautenstrauch, C., & Schulze, T. (2003). Infor-
and can stay competitive in the market. matik für Wirtschaftswissenschaftler und Wirt-
While the FERP architecture was developed for schaftsinformatiker, Berlin.
addressing requirements of SMEs, the architecture
Robey, D., Ross, J., & and Boudreau, M. (2002).
may be suitable for larger companies as well. The
Learning to implement enterprise systems: An
assessment to what extend the architecture can
exploratory study of the dialectics of change.
scale will be part of our future work.
Journal of Management Information Systems,
19(1), 17-46.
reFerences Trætteberg, H. (1999). Modelling Work. Workflow
and Task Modelling. In Vanderdonckt, & Puerta
Cockburn, A. (2005). Writing Effective Use Cases. (Eds.), CADUI (pp. 275-280). Kluwer.
Amsterdam: Addison-Wesley Longman.
Trætteberg, H., Molina, P. J., & Nunes, N. J. (2004).
da Silva, P. P. (2002). User Interface Declara- Making model-based UI design practical: usable
520
Developing and Customizing Federated ERP Systems
1
Hyperjaxb2 – relational persistence for
JAXB objects: https://hyperjaxb2.dev.java.
net/ (last visit October 2006)
This work was previously published in Enterprise Information Systems for Business Integration in SMEs: Technological,
Organizational, and Social Dimensions, edited by Maria Manuela Cruz-Cunha, pp. 286-299, copyright 2010 by Business Sci-
ence Reference (an imprint of IGI Global).
521
522
Chapter 2.12
Creation of a Process
Framework for Transitioning
to a Mobile Enterprise
Bhuvan Unhelkar
MethodScience.com & University of Western Sydney, Australia
AbstrAct IntroductIon
This chapter presents the creation of a process This chapter presents an approach to transitioning
framework that can be used by enterprises in to mobile enterprises. The earlier outline of this
order to transition to mobile enterprises. This approach was published by Unhelkar (2005) and it
framework facilitates adoption of mobile tech- contained three dimensions of a mobile enterprise
nologies by organizations in a strategic manner. A transition framework. Later, based on the research
mobile enterprise transition framework provides undertaken by the author, this transition framework
a process for transition that is based on the fac- was modified and extended to result in a four
tors that influence such transition. The Mobile dimensional framework. This framework is the
Enterprise Transition (MET) framework, outlined core discussion topic of this chapter. A complete
in this chapter, is based on the four dimensions of and in-depth discussion of this process framework
economy, technology, methodology, and sociol- also appears in Unhelkar (2008).
ogy. These four dimensions for MET have been Mobile technologies form the basis of the
identified based on an understanding of people, communications revolution that has resulted in
processes, and technologies. A research project elimination of physical connectivity for people,
undertaken by the author validates these four processes and things. This wireless connectivity
dimensions. has resulted in significant impact on the organiza-
tion of the business and its relationship with the
DOI: 10.4018/978-1-60566-156-8.ch006 customers. The ability of businesses and customers
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Creation of a Process Framework for Transitioning to a Mobile Enterprise
523
Creation of a Process Framework for Transitioning to a Mobile Enterprise
by Elliott and Phillips (2004), a mobile phone is the “what”, “how” and “who” of the process. The
a far more personal device that is carried by an transition process framework thus reveals itself
individual as compared with a desktop personal into four major dimensions as shown in Figure 2
computer. (based on Unhelkar (2003a) and (2008)). These
This nature of wireless connectivity needs to dimensions of mobile transitions are, however,
be understood and incorporated in all dimensions not exclusive to each other. When applied in
of MET (this could be based on discussions such practice, they tend to overlap each other, result-
as Thai et.al (2003); the four dimensions are ing in a cohesive transition process. However,
discussed next). For example, economically, the separate understanding of each of these dimen-
cost of a mobile device has dropped and continues sions is helpful in creating the MET framework
to drop significantly making is obligatory for in the first place. Thus, this discussion starts with
businesses to consider mobility in order to access the theoretical framework and then discusses its
and serve the customer. Technically, it is essential application in practice. The four process dimen-
to consider the “individuality” of the mobile sions for a mobile enterprise transition, as shown
gadgets and their ability to be location-aware (see in Figure 2, can be understood as follows:
Adam and Katos (2005) for the resultant chal-
lenges of security and privacy of individuals that • The Economic dimension deals with the
is different to the challenges in corresponding core business driver of “why” to undertake
land-based connections). The activities and tasks the transition. Costs and competition have
of the methodological dimension should be cre- been the core business drivers for most
ated in a way that properly exploits the hand-held business decisions and they are also true in
gadgets; and socially, mobile transitions need to this case. Reduction in costs and increase
consider the impact of mobility on the socio- in competition encourage the business to
cultural fabric of the society and the correspond- undertake formal MET.
ing changing value systems like work ethics and • The Technical dimension of the mobile
social protocols. Thus, when businesses transitions transformation process considers “what”
from the land-based connectivity paradigm and technologies are used in the transforma-
incorporate wireless connectivity in their business tion, and “what” deliverables are produced
practices, they have to ensure that an individual at the end of the process. Examples of is-
is considered in all their process dimensions as
compared to when the business was organized
only around land-based workstations. Figure 2. Four dimensions of a mobile enterprise
transition framework (based on Unhelkar, 2008)
524
Creation of a Process Framework for Transitioning to a Mobile Enterprise
sues discussed in this dimension include undertaken by the business decision makers of the
devices/gadgets, programming, databases, organization. This decision to transition using the
networking, security and architecture of MET process framework can take the business to
mobile technologies participating in the a global mobile playing field and therefore it has
MET. to be taken carefully and seriously.
• The Methodological dimension of the pro-
cess deals primarily with the question of
“how” to – amongst other things- model tecHnIcAl dImensIon In
and design business processes, approach m-trAnsFormAtIon
methodologies and quality in software pro-
cesses and re-organize business structure This technical dimension of the MET framework is
and its relationship with customers and concerned with the question of “what” technology
employees. to use, and “what” deliverables are produced at the
• The Social dimension of the transformation end of the process. Thus, the technical dimension
process focuses on “who” is involved in and primarily includes the understanding and the ap-
influenced by the process. Typically these plication of the various mobile hardware devices
are the users of the business (e.g. custom- and gadgets, issues of GPS enabled gadgets (3G)
ers and employees) The discussion in this and wireless networking and security. The types
dimension deals with the effect of mobile of devices, their capacity and costs, and their us-
technologies on the socio-cultural aspects ability are of utmost importance in this dimension.
of people’s lives -especially the changing Mobile devices have developed well beyond the
working formats and work ethics– and or- ubiquitous mobile phone, and now include a wide
ganizational and social structures. range of devices like Personal Digital Assistants
(PDA) and wireless computers (typically laptops
The aforementioned four dimensions of MET with inbuilt wireless processors). Each device can
are now discussed in greater detail. have numerous features that need to be considered
when they are incorporated in the business pro-
cesses. For example, the ability of Wi-Fi enabled
economIc dImensIon In mobile gadgets to take photographs onsite and to
m-trAnsFormAtIon instantly transmit them to the business centre has
an invaluable application in processes that are
The question of “why” to “mobilize” provides the related; for example to insurance claims, medical
strategic reason for a business undertaking MET. emergencies and sports. Additional device related
The economic dimension considers the costs of issues include the ability of the devices to function
running the business and maps it with the cost of alone -standalone-, or with other wireless compo-
acquiring mobility. Furthermore, the economic nents; for example, some wireless PCMCIA cards
dimension is also concerned with the competition cannot be connected to the Internet and receive
and how they are putting pressure on the busi- SMS messages simultaneously.
ness. Furthermore, the economic dimension also Functionality of mobile devices are further
investigates the potential effect of mobility on augmented by mobile networks, which play a
customers as well as employees of the organiza- significant role in terms of the device’s abili-
tion in terms of providing efficient service to the ties to browse, locate and transmit information.
customers by conducting the business efficiently. Some examples of technological challenges in
Thus, “why” to “mobilize” is a strategic decision networking include the incorporation of wireless
525
Creation of a Process Framework for Transitioning to a Mobile Enterprise
broadband services, creation of local hotspots for content security) is a vital issue in the technical
services, integration of devices and their software dimension of MET.
with the existing organizational infrastructure, Databases have evolved to content manage-
combination of WLAN (Wireless Local Area ment systems (CMS) that are capable of storing
Network) and WWAN (Wireless Wide Area Net- audios, videos, photos, graphs and charts and many
work), satellite communications and even simple other content formats that could not be stored in a
issues like user access through VPN or dialup standard relational database. Technical dimension
connections. Mobile networking influences the of MET has to, therefore, consider issues like the
breadth of coverage (i.e. area being covered) and type and nature of content, location of contents
the depth of coverage (the amount of information influencing the speed and security of downloads,
being transmitted/received) based on the available duration of content before they are replaced or
bandwidth, speed of transmission, as well as its upgraded, synchronization of contents between the
reliability. At the individual level, the ability of mobile devices and back-end servers, and so on.
infrared and Bluetooth enabled devices and the A mobile process is made up of a diverse
potentials offered by Radio Frequency Identifica- range of heterogeneous mobile infrastructures
tion tags (RFID) are also increasingly playing an including the hardware, operating system, mes-
important role in mobile enterprise transitions. saging systems and databases –which all need to
Wireless connectivity has further provided be integrated to provide mobile functionalities.
opportunities for handheld devices to use com- Although most business applications today are
puting power of other handheld and stationery web-enabled, they also need to be integrated
devices, leading to the creation of wireless Grids further with mobile applications in order to make
(McKnight and Howison (2004), and Unhelkar them mobile-web-enabled applications. Using
(2004). Wireless grids facilitate creation of virtual SMS and MMS, creation of WiFi hotspots and
processors that can be used to deliver far more incorporation of seamless wireless broadband
functionalities than is evident today. For example, through a single ISP are some practical options
wireless grids can provide sufficient computing in such integrations. Some of the integration chal-
power for Mobile Internet Agents (as discussed lenges for mobile infrastructures include issues
by Subramanium et. al (2004)), enabling them to such as the movement of the users, mobile nodes,
perform advanced functions like searching and fluctuating demands on the infrastructure (notably
comparing different products and services on networks and databases), changing security needs
handheld devices. (depending on the type of information required)
Security (as discussed by Godbole (2003) in and reliability (ability to restart transaction from
the context of the Internet) is the next important any point in time).
part of the technical dimension. Mobility provides Finally, usability can also be considered as an
greater opportunity for unscrupulous ‘tapping’ important technical issue (in addition to being a
into the networks, siphoning off data, information sociological issue) in MET–especially as more
and even identities of the users as compared with and more functionality is being provided on small
land-based network. And because many mobile- screen mobile devices. Usability considerations,
enabled business processes (e.g. in healthcare so vividly depicted by Constantine and Lockwood
domain with ambulances) depend heavily on the (1999), need to be extended further when it comes
security of the mobile networks, protection of to mobile devices to ensure information is pro-
sensitive corporate data during transmission to vided succinctly to the users. Wireless Markup
and from a mobile devices (channel security and Language (WML) can play an important part in
526
Creation of a Process Framework for Transitioning to a Mobile Enterprise
removing unnecessary elements from the display fill out his/her time sheets would change with the
of information on mobile devices. advent of mobility in the organization. Or the way
in which a customer enquires about her balance in
a banking environment will change depending on
metHodoloGIcAl dImensIon mobility in the process. Organizational processes,
In m-trAnsFormAtIon primarily dealing with other businesses, but also
related to organizational structure and internal
The methodological dimension of MET primarily management, undergo change when mobility is
deals with the business processes, which can be incorporated in the business. Finally, as discussed
understood as the “manner in which a business by S’duk and Unhelkar (2005), an entire busi-
carries out its activities and tasks”. These activi- ness sector made up of a group or collaboration
ties and tasks deal with both external parties and of businesses could start interacting with each
internally with its employees and management. other through wireless applications and networks,
The modelling of these business processes is resulting in a need to reengineer processes that
complicated by the fact that the users (especially criss-cross an industrial sector. This may result in
customers) have an expanding array of different the need for industrial process reengineering (IPR).
types and models of mobile gadgets available to For example, with mobile connectivity, an airline
them. Not only do organizations making the transi- and a car hire company may need to change their
tion doesn’t have much control on these devices, business processes together to inform an individual
but they are also faced with the ever increasing of changes to flight timings on her hired mobile
expectations by the users that the m-businesses car dashboard; or a hospital, an insurance company
will support their specific gadgets. and a company providing road side assistance may
Whenever a business transitions to a mobile introduce new business processes that facilitates
business, three possibilities emerge with respect their collaboration to provide immediate care and
to its business processes: support to a mobile subscriber who may have met
with an accident. Similarly, advances in wireless
• Firstly, existing business processes are grids further increase the opportunities for an
re-engineered to incorporate mobility; the industrial segment (or a dynamic group) to create
re-engineered processes will be impacted entirely new business processes. For example,
by mobility in terms of location and time the creation of on-the-spot dynamic customer
independence for the users groups at shopping malls and sports venues was
• Secondly, totally new business processes not feasible without the mobile connectivity;
are brought in; as a result to the introduc- with this mobile connectivity businesses are
tion of a mobile technology, and would able to target a group of customers dynamically.
otherwise have not existed and Extending Kanter’s (2003) argument further, for
• Thirdly, some redundant and/or irrelevant future service growth mobile business processes
business processes are dropped and they need to continuously keep the user’s context in
do not make sense with the incorporation mind to be able to fully exploit the dynamicity
of mobility. offered by mobility.
Deshpande et.al (2004), in the Device Indepen-
Each of the aforementioned process changes dent Web Engineering workshop, describe how,
impact the individual user, as well as the organiza- with continuing advances in mobile communica-
tion and even the business sector as a whole. For tion capabilities, and dramatic reduction in costs of
example, the manner in which an employee would mobile devices, the demand for Web access from
527
Creation of a Process Framework for Transitioning to a Mobile Enterprise
many different types of mobile devices has now discussed by Devereaus and Johansen (1994), now
gone up substantially. Incorporation of mobile needs to be further considered in the context of a
Internet access has resulted in a paradigm shift global-mobile society. This is so because when a
in the way businesses and individuals tend to use business enterprise undergoes a MET, it affects
the Internet. For example, customers, instead of the socio-cultural aspects of both individuals and
making a call using a mobile phone may use its the groups they are part of. For example, should
Internet capabilities to locate good consumer deals an individual answer the mobile phone provided
or find convenient service locations for their needs. by the company during his or her private time?
Mobile Internet has also resulted in evolution of Or should the mobile service provider be allowed
the customer relationship management (CRM) to send unsolicited promotional messages to its
systems into what can be called mobile CRM (m- subscribers? While mobility enables people to be
CRM) systems (Arunatileka and Unhelkar, 2003). productive anytime and anywhere, the need to
Reengineering of processes also needs to con- separate personal from official work and respon-
sider the devices that will facilitate the business sibilities are far greater in today’s mobile society.
processes. For example, for corporate solutions, we These social issues related to work ethics and
need to consider whether there are devices already behaviour in an Internet-based society, already
deployed? And if so, can they be reused or are new studied by Ranjbar and Unhelkar (2003), need
devices required to be provided for the business to be further extended and applied in the context
processes? Finally, there is also a need to keep of mobility in an MET.
the software development methodologies in mind The social advantages resulting from mobile
when the MET results in changes to the information technology infrastructures that may impact MET.
systems of the transitioning organization. These For example, in developing nations (and even
methodologies can help in standardization, formal otherwise), the infrastructure costs associated with
modelling of requirements, user-centered designs, land-based Internet connectivity are far higher
understanding the technology of mobile network than corresponding costs of setting up wireless
architectures, and issues in integrating mobile computing infrastructure. This results in an op-
software with the existing software (Godbole, portunity to reach people en masse through the
2003). These technical process considerations will relatively cheap mobile devices, and conducting
result in the implementation of good quality mobile business activities with them. The resulting change
applications and, as a result, would improve the in the social landscape of a country is an extremely
overall quality of service offered by the business interesting phenomena that needs to be studied
to its customers and users. under this third dimension of MET.
528
Creation of a Process Framework for Transitioning to a Mobile Enterprise
Table 1. Mobility considerations in mobile Internet usage by business (based on Unhelkar, 2008)
work is summarised in Table 1. The subsequent as dealing with the third-party credit/debit card
sections describe that usage further from the point organizations that facilitate online payments. Tech-
of view of understanding the MET. nically, devices such as a wireless enabled PDA
or laptop with necessary access and security on
mobile Informative layer the mobile network are required to conduct these
transactions. Methodologically, it will usually be
This is the usage of the Internet to merely provide a transaction with a user “known” to the business
information. As such, this is a one-way transfer (for example, a registered bank user conducting
of information requiring no security. Example of account transactions), requiring businesses to in-
mobile informative usage include broadcasting corporate upfront registration processes in dealing
of schedules, information of products, services with their customers. Socially, the convenience of
or places, and capitalizing on the common Short conducting two-way transactions will affect the
Messaging Service (SMS) feature of mobile individuals, but so will their confidence in the
gadgets. Technically availability and access to a systems being used for such transactions.
mobile device is important to enable provision
of information. However, methodologically, it is mobile operative layer
the individual’s process (or mode of usage of the
device) that influences how the information is This layer deals with moving the core internal
received. Socially, the information layer of mobile business processes (that are typically operational
Internet usage has the potential for degenerating in nature) on to the mobile internet. Common
into mobile SPAM and other unsolicited messag- examples of operative business processes that
ing that is a part of MET challenge. transition to the mobile internet include timesheets
and inventory. Thus, mobile technologies may
mobile transactive layer enable a manager using a simple mobile-enabled
gadget (phone, pager of PDA) to keep track of
During this stage of Internet usage, businesses are employees; or may enable her to keep a tab on the
more serious in conducting business on the Internet inventory and place a re-order at the right time.
than they are during the informative usage. The
transactive usage implies a “two-way” (or more)
communication between the business and the user,
resulting in sales of products and services as well
529
Creation of a Process Framework for Transitioning to a Mobile Enterprise
530
Creation of a Process Framework for Transitioning to a Mobile Enterprise
Arunatileka, D., & Unhelkar, B. (2003). Mobile Kanter, T. (2003, February). Going wireless, en-
Technologies, providing new possibilities in Cus- abling an adaptive and extensible environment.
tomer Relationship Management. Proceedings of Mobile Networks and Applications. ACM Press
5th International Information Technology Confer- New York, NY, USA, 8(1), 37–50.
ence, Colombo, Sri Lanka, December.
Lan, Y., & Unhelkar, B. (2005). Global Enterprise
Brans, P. (2003). Mobilize Your Enterprise: Transitions. Idea Group Publication (IGI press),
Achieving Competitive Advantage through Wire- Hershey, PA.
less Technology. Upper Saddle River, NJ: Hewlett-
Marmaridis, I. (Makis), & Unhelkar, B. (2005).
Packard, Pearson Education as Prentice Hall PTR.
Challenges in Mobile Transformations: A Re-
Constantine, L., & Lockwood, L. (1999). Software quirements modeling perspective for Small and
for Use: a Practical Guide to Models and Methods Medium Enterprises. Proceedings of International
of Usage-centered Design, Addison-Wesley. Also Conference on Mobile Business, ICMB, Sydney
see www.foruse.com
McKnight, L., & Howison, J. (2004). Wireless
Deshpande, Y., Murugesan, S., Unhelkar, B., & Grids: Distributed Resource Sharing by Mobile,
Arunatileka, D. (2004). Workshop on Device Nomadic, and Fixed Devices. IEEE Internet
Independent Web Engineering: Methodological Computing, Jul/Aug 2004 issue, http://dsonline.
Considerations and Challenges in Moving Web computer.org/0407/f/w4gei.htm (last accessed
Applications from Desk-top to Diverse Mobile 19th July, 2004)
Devices. Proceedings of the Device Independent
Ranjbar. M., & Unhelkar, B. (2003). Globalisation
Web Engineering Workshop, Munich.
and Its Impact on Telecommuting: An Australian
Devereaus, M., & Johansen, R. (1994, Global Perspective. Presented at IBIM03 - International
Work: Bridging Distance, Culture and Time, Business Information Management Conference
Jossey-Bass, 38-39 Elliott, G., & Phillips, N. (www.ibima.org), Cairo, Egypt.
(2004). Mobile Commerce and Wireless Comput-
S’duk. R., & Unhelkar, B. (2005). Web Services
ing Systems, Pearson/Addison-Wesley, Harlow,
Extending BPR to Industrial Process Reengineer-
England.
ing. Proceedings of International Resource Man-
Ginige, A., Murugesan, S., & Kazanis, P. (2001). agement Association (IRMA) Conference;http://
A Road Map for Successfully Transforming SMEs www.irma-international.org, San Diego, USA.
into E-Businesses. Cutter IT Journal, 14. 15th to 18th May.
Godbole, N. (2003). Mobile Computing: Security Subramanium, C., Kuppuswami, A., & Unhelkar,
Issues in Hand-held Devices. Paper presented at B. (2004). Relevance of State, Nature, Scale and
NASONES 2003 National Seminar on Network- Location of Business E-Transformation in Web
ing and e-Security by Computer Society of India. Services. Proceedings of the 2004 International
Symposium on Web Services and Applications
Godbole, N., & Unhelkar, B. (2003). Enhancing
(ISWS’04: June 21-24, 2004, Las Vegas, Nevada,
Quality of Mobile Applications through Model-
USA; http://www.world-academy-of-science.org)
ing. Proceedings of Computer Society of India’s
35th Convention, December, Indian Institute of
Technology, Delhi, India
531
Creation of a Process Framework for Transitioning to a Mobile Enterprise
Thai, B., Wan, Seneviratne, A., & Rakotoar- key terms And deFInItIons
ivelo, T. (2003). Integrated personal mobil-
ity architecture: a complete personal mobility Mobile Technologies: Are made up of wire-
solution. [ACM Press New York, NY, USA.]. less network, devices and contents. Mobile tech-
Mobile Networks and Applications, 8(1), 27–36. nologies are at the crux of the communications
.doi:10.1023/A:1021115610456 revolution.
Economic Dimension of MET: Describes the
Unhelkar, B. (2003a). Process Quality Assurance business reasons for undertaking transformation
for UML-based Projects. Boston, MA: Addison- and includes discussions on costs and competition.
Wesley. Technical Dimension of MET: Describes
Unhelkar, B. (2003b) Understanding Collabora- the technologies for transformation and include
tions and Clusters in the e-Business World. We-B devices/gadgets, programming, databases, net-
Conference, (www.we-bcentre.com; with Edith working, security and architecture.
Cowan University), Perth, 23-24 Nov. Methodological Dimension of MET: Deals
primarily with the question of “how” to – amongst
Unhelkar, B. (2004). Globalization with Mobility. other things- model and design business processes,
Presented at ADCOM 2004, 12th International approach methodologies and quality in software
Conference on Advanced Computing and Com- processes.
munications, Ahmedabad, India. Social Dimension of MET: Deals with “who”
Unhelkar, B. (2005). Transitioning to a Mobile is involved in and influenced by the transformation
Enterprise: A Three-Dimensional Framework. and typically it includes the users, customers and
Cutter IT Journal, 18(8). employees of the business.
This work was previously published in Handbook of Research in Mobile Business, Second Edition: Technical, Methodological
and Social Perspectives, edited by Bhuvan Unhelkar, pp. 63-72, copyright 2009 by Information Science Reference (an imprint
of IGI Global).
532
533
Chapter 2.13
Development and Design
Methodologies in DWM
James Yao
Montclair State University, USA
John Wang
Montclair State University, USA
Qiyang Chen
Montclair State University, USA
June Lu
University of Houston – Victoria, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Development and Design Methodologies in DWM
By using a data warehouse, companies can make ing applications (Hoffer, Prescott, & McFadden,
decisions about customer-specific strategies such 2007). A data warehouse schema is viewed as a
as customer profiling, customer segmentation, dimensional model (Ahmad, Azhar, & Lukauskis,
and cross-selling analysis (Cunningham, Song, 2004; Han & Kamber, 2006; Levene & Loizou,
& Chen, 2006). To analyze these large quantities 2003). It typically adopts either a star or snowflake
of data, data mining has been widely used to find schema and a subject-oriented database design
hidden patterns in the data and even discover (Han & Kamber, 2006). The schema design is the
knowledge from the collected data. Thus how to most critical to the design of a data warehouse.
design and develop a data warehouse and how to Many approaches and methodologies have
use data mining in the data warehouse development been proposed in the design and development
have become important issues for information of data warehouses. Two major data warehouse
systems designers and developers. design methodologies have been paid more at-
This article presents some of the currently tention. Inmon, Terdeman, and Imhoff (2000)
discussed development and design methodologies proposed the CIF architecture. This architecture,
in data warehousing and data mining, such as the in the design of the atomic-level data marts, uses
multidimensional model vs. relational entity- denormalized entity-relationship diagram (ERD)
relationship (ER) model, corporate information schema. Kimball (1996, 1997) proposed multidi-
factory (CIF) vs. multidimensional methodolo- mensional (MD) architecture. This architecture
gies, data-driven vs. metric-driven approaches, uses star schema at atomic-level data marts.
top-down vs. bottom-up design approaches, data Which architecture should an enterprise follow?
partitioning and parallel processing, materialized Is one better than the other? Currently, the most
view, data mining, and knowledge discovery in popular data model for data warehouse design is
database (KDD). the dimensional model (Bellatreche & Mohania,
2006; Han & Kamber, 2006). Some researchers
call this model the data-driven design model. Artz
bAckGround (2006) advocates the metric-driven view, which,
as another view of data warehouse design, begins
Data warehouse design is a lengthy, time- by identifying key business processes that need
consuming, and costly process. Any wrongly to be measured and tracked over time in order
calculated step can lead to a failure. Therefore, for the organization to function more efficiently.
researchers have placed important efforts to the There has always been the issue of top-down vs.
study of design and development related issues bottom-up approaches in the design of informa-
and methodologies. tion systems. The same is with a data warehouse
Data modeling for a data warehouse is different design. These have been puzzling questions for
from operational database, for example, online business intelligent architects and data warehouse
transaction processing (OLTP), data modeling. designers and developers. The next section will
An operational system is a system that is used to extend the discussion on issues related to data
run a business in real time, based on current data. warehouse and mining design and development
An OLTP system usually adopts ER modeling methodologies.
and application-oriented database design (Han
& Kamber, 2006). An information system, like a
data warehouse, is designed to support decision
making based on historical point-in-time and
prediction data for complex queries or data min-
534
Development and Design Methodologies in DWM
535
Development and Design Methodologies in DWM
Figure 3. Example of a starflake schema (galaxy schema or fact constellation) (adapted from Han &
Kamber, 2006)
536
Development and Design Methodologies in DWM
same as the data mart in the CIF architecture. MD architectural approaches, namely, the ERD or
architecture uses star schemas, whereas CIF archi- normalization techniques for the data warehouse
tecture uses denormalized ERD schema. This data and the star schema data model for multidimen-
modeling difference constitutes the main design sional data marts. A CIF architecture with only a
difference in the two architectures (Imhoff et al., data warehouse and no multidimensional marts is
2004). A data warehouse may need both types of almost useless and a multidimensional data-mart-
data marts in the data warehouse bus architecture only environment risks the lack of an enterprise
depending on the business requirements. Unlike integration and support for other forms of business
the CIF architecture, there is no physical reposi- intelligence analyses.
tory equivalent to the data warehouse in the MD
architecture. data-driven vs. metric-driven
The design of the two data marts is predomi-
nately multidimensional for both architecture, Currently, the most popular data model for data
but the CIF architecture is not limited to just this warehouse design is the dimensional model
design and can support a much broader set of (Bellatreche & Mohania, 2006; Han & Kamber,
data mart design techniques. In terms of scope, 2006). In this model, data from OLTP systems
both architectures deal with enterprise scope and are collected to populated dimensional tables.
business unit scope, with CIF architecture putting Researchers term a data warehouse design based
a higher priority on enterprise scope and MD on this model as a data-driven design model since
architecture placing a higher priority on business the information acquisition processes in the data
unit scope. With CIF architecture, the information warehouse are driven by the data made available
technology (IT) side tackles the problem of sup- in the underlying operational information systems.
plying business intelligence source data from an Another view of data warehouse design is called
enterprise point of view. With MD architecture, its the metric-driven view (Artz, 2006), which begins
proponents emphasize the perspective of consum- by identifying key business processes that need
ing business unit data. For data flow, in general, to be measured and tracked over time in order
the CIF approach is top-down, whereas the MD for the organization to function more efficiently.
approach is bottom-up. The difference between Advantages of data-driven model include that it
the two in terms of implementation speed and cost is more concrete, evolutionary, and uses derived
involves long-term and short-term trade-offs. A summary data. Yet the information generated
CIF project, as it is at enterprise level, will most from the data warehouse may be meaningless to
likely require more time and cost up front than the user owing to the fact that the nature of the
the initial MD project, but the subsequent CIF derived summary data from OLTP systems may
projects tend to require less time and cost than not be clear. The metric-driven design approach,
subsequent MD projects. MD architecture claims on the other hand, begins first by defining key
that all its components must be multidimensional business processes that need to be measured and
in design. Conversely, CIF architecture makes no tracked over time. After these key business pro-
such claim and is compatible with many different cesses are identified, then they are modeled in a
forms of business intelligence analyses and can dimensional data model. Further analysis follows
support technologies that are not multidimensional to determine how the dimensional model will be
in nature. For MD architecture, retrofitting is populated (Artz, 2006).
significantly harder to accomplish. Imhoff et al. According to Artz (2006), data-driven model
(2004) encourage the application of a combina- to a data warehouse design has little future since
tion of the data modeling techniques in the two information derived from a data-driven model
537
Development and Design Methodologies in DWM
is information about the data set. Metric-driven & Kamber, 2006), with which “an organization
model, conversely, possibly has some key impacts can exploit the planned and strategic nature of
and implications because information derived the top-down approach while retaining the rapid
from a metric-driven model is information about implementation and opportunistic application of
the organization. Data-driven approach is domi- the bottom-up approach” (p. 129), when such an
nating data warehouse design in organizations at approach is necessitated in the undergoing orga-
present. Metric-driven, on the other hand, is at nizational and business scenarios.
its research stage, needing practical application
testimony of its speculated potentially dramatic materialized view
implications.
One of the advantages of data warehousing ap-
top-down vs. bottom-up proach over traditional operational database ap-
proach to the integration of multiple sources is
There are two approaches in general to building that the queries can be answered locally without
a data warehouse prior to the data warehouse accessing the original information sources (The-
construction commencement, including data odoratos & Sellis, 1999). Queries to data ware-
marts: the top-down approach and bottom-up houses often involve a huge number of complex
approach (Han & Kamber, 2006; Imhoff et al., aggregations over vast amount of data. As a result,
2004; Marakas, 2003). Top-down approach starts data warehouses achieve high performances of
with a big picture of the overall, enterprise-wide query by building a large number of materialized
design. The data warehouse to be built is large views (Bellatreche & Mohania, 2006; Jixue, Mil-
and integrated. However, this approach is risky list, Vincent, & Mohania, 2003; Lee, Chang, &
(Ponniah, 2001). A top-down approach is to design Lee, 2004; Theodoratos & Sellis, 1999). One of
the warehouse with an enterprise scope. The focus the common problems related to the materialized
is on integrating the enterprise data for usage in views is view selection. It seems infeasible to store
any data mart from the very first project (Imhoff all the materialized views as we are constrained by
et al., 2004). It implies a strategic rather than an some resources such as data warehouse disk space
operational perspective of the data. It serves as the and maintenance cost (Bellatreche & Mohania,
proper alignment of an organization’s information 2006). Therefore, an appropriate set of views
systems with its business goals and objectives should be selected among the candidate views.
(Marakas, 2003). In contrast, a bottom-up ap- Studies have shown that materialized view selec-
proach is to design the warehouse with business- tion problem is proven to be an NP-hard problem
unit needs for operational systems. It starts with (Bellatreche & Mohania, 2006; Lee et al., 2004).
experiments and prototypes (Han & Kamber, Baralis, Paraboschi, and Teniente (1997); Mistry,
2006). With bottom-up, departmental data marts Roy, Sudarshan, and Ramamritham (2001); and
are built first one by one. It offers faster and easier Theodoratos and Sellis (1997) researched on
implementation, favorable return on investment, solving the materialized view selection problem,
and less risk of failure, but with a drawback of but they considered only the intermediate query
data fragmentation and redundancy. The focus of results that appeared in the given workloads’
bottom-up approach is to meet unit-specific needs execution plan as candidate materialized views
with minimum regards to the overall enterprise- (Lee et al., 2004). As a result, the views were
wide data requirements (Imhoff et al., 2004). excluded from the candidate view space if they
An alternative to the previously discussed two joined the relations not referred to in the queries
approaches is to use a combined approach (Han even though the views could have been used in
538
Development and Design Methodologies in DWM
the optimal query execution plan (Bellatreche & Parallel processing is based on a parallel
Mohania, 2006; Chang & Lee, 1999). Lee et al. database, in which multiprocessors are in place.
(2004) developed a solution for identifying the Parallel databases link multiple smaller machines
candidate view space of materialization, which to achieve the same throughput as a single, larger
demonstrates that the candidate view space can be machine, often with greater scalability and reli-
optimized by join-lossless property, partial-view ability than single processor databases (Singh,
and union-view. These methods can present better 1998). In a context of relational online analytical
results when the database schema, especially the processing (ROLAP), by partitioning data of RO-
join relations, gets more complex. LAP schema (star schema or snowflake schema)
among a set of processors, OLAP queries can be
data Partitioning and executed in a parallel, potentially achieving a linear
Parallel Processing speedup and thus significantly improving query
response time (Datta, Moon, & Thomas, 1998;
Data partitioning is the process of decompos- Tan, 2006). Given the size of contemporary data
ing large tables (fact tables, materialized views, warehousing repositories, multiprocessor solu-
indexes) into multiple small tables by applying tions are crucial for the massive computational
the selection operators (Bellatreche & Mohania, demands for current and future OLAP system
2006). A good partitioning scheme is an essential (Dehne, Eavis, & Rau-Chaplin, 2006). The as-
part of designing a database that will benefit from sumption of most of the fast computation algo-
parallelism (Singh, 1998). With a well performed rithms is that their algorithms can be applied into
partitioning, significant improvements in avail- the parallel processing system (Dehne et al., 2006;
ability, administration, and table scan performance Tan, 2006). As a result, it is sometimes necessary
can be achieved. Singh (1998) described five to use parallel processing for data mining because
methods of partitioning: (1) hashing algorithm to large amounts of data and massive search efforts
distribute data uniformly across disks, (2) round- are involved in data mining (Turban, Aronson,
robin partitioning (assigning a row to partitions in & Liang, 2005). Therefore, data partitioning and
sequence), (3) allocating rows to nodes based on parallel processing are two complementary tech-
ranges of values, (4) schema partitioning to tie a niques to achieve the reduction of query processing
table to a particular partition, and (5) user-defined cost in data warehousing design and development
rules to allocate data in a particular partition. (Bellatreche & Mohania, 2006).
Bellatreche and Mohania (2006) and Bellatreche,
Schneider, Mohania, and Bhargava (2002) on data mining
the other hand offer two types of partitioning:
horizontal and vertical. In horizontal fragmenta- As a process, data mining endeavors require certain
tion, each partition consists of a set of rows of the steps necessary to achieve a successful outcome.
original table. In the vertical fragmentation, each A step common to data mining is infrastructure
partition consists of a set of columns of the original preparation. Without the infrastructure data min-
table. Furthermore, horizontal fragmentation can ing activities simply will not occur. Minimum
be divided into two versions: primary horizontal requirements for the infrastructure are: a hardware
partitioning and derived horizontal partition. The platform, database management system (DBMS)
former one is performed using predicates that are platform, and one or more tools for data mining
defined on that table, the later one results from (Marakas, 2003). The hardware platform, in most
predicates defined on another relation. cases, is a separate platform than that which
originally housed the data. The data mining en-
539
Development and Design Methodologies in DWM
vironment is usually a client/server architecture contrast, data mining is the process of forming
or a Web-based architecture (Turban et al., 2005). general concept definitions by observing specific
To perform data mining, data must be removed examples of concepts to be learned. It is a process
from its host environment and prepared before of business intelligence that can be used together
it can be properly mined. This process is called with what is provided by IT to support company
extraction, transformation, and loading (ETL) decisions (Giudici, 2003). A data warehouse has
process, in which the data is scrubbed/cleaned uses other than data mining. However, the fullest
and transformed according to the requirements use of a data warehouse must include data mining
and then loaded to the hardware platform, usually (Marakas, 2003), which in turn, at an upper level,
a data warehouse or data mart (Han & Kamber, discovers knowledge for the user.
2006; Marakas, 2003; Turban et al., 2005). A
DBMS is the fundamental system for the data-
base. Sophisticated tools and techniques for data Future trends
mining are selected based on mining strategies
and needs. A well-developed infrastructure is to Future information systems research will continue
be a pre-mining assurance for a successful data with the study of problems in information systems
mining endeavor. management, including systems analysis and
Data mining is the analysis of observational design (Banker & Kauffman, 2004). According
data sets to find unsuspected relationships and to Cunningham et al. (2006), there are no agreed
to summarize the data in novel ways that are upon standardized rules for how to design a data
both understandable and useful to the data owner warehouse to support CRM and a taxonomy of
(Hand, Mannila, & Smyth, 2001). Another term CRM analyses needs to be developed to determine
that is frequently used interchangeably with data factors that affect design decisions for CRM data
mining is KDD. KDD was coined to describe warehouse. Enterprises are moving towards build-
all those methods that seek to find relations and ing the operational data store, which derives data
regularity among the observed data and was gradu- from enterprise resource planning (ERP) systems,
ally expanded to describe the whole process of solutions for real-time business analysis. There
extrapolating information from a database, from is a need for active integration of CRM with
the identification of the initial business objectives operational data store for real-time consulting
to the application of the decision rules (Giudici, and marketing (Bellatreche & Mohania, 2006).
2003). Although many people treat data mining as In the data modeling area, to develop a more
a synonym for KDD, there are differences between general solution for modeling data warehouse
the two. Technically, KDD is the application of the current ER model and dimensional model
the scientific method to data mining (Roiger & need to be extended to the next level to combine
Geatz, 2003). Apart from performing data min- the simplicity of the dimensional model and the
ing, a typical KDD process model includes a efficiency of the ER model with the support of
methodology for extracting and preparing data object oriented concepts (Raisinghani, 2000).
as well as making decisions about actions to be
taken once data mining has taken place. The KDD
process involves selecting the target data, prepro- conclusIon
cessing the data, transforming them if necessary,
performing data mining to extract patterns and Several data warehousing and data mining de-
relationships, and then interpreting and assessing velopment and design methodologies have been
the discovered structures (Hand et al., 2001). In reviewed and discussed, followed by some trends
540
Development and Design Methodologies in DWM
in data warehousing design. There are more is- Bellatreche, L., Schneider, M., Mohania, M., &
sues in relation to the topic but are limited due to Bhargava, B. (2002). PartJoin: An efficient stor-
the paper size. Some of the methodologies have age and query execution for data warehouses. In
been practiced in the real world and accepted by Proceedings of the 4th International Conference
today’s businesses. Yet new challenging method- on Data Warehousing and Knowledge Discovery
ologies, particularly in data modeling and models (DAWAK’02) (pp. 109-132).
for physical data warehousing design, need to be
Chang, J., & Lee, S. (1999). Extended condi-
further researched and developed.
tions for answering an aggregate query using
materialized views. Information Processing
Letters, 72(5-6), 205–212. doi:10.1016/S0020-
reFerences
0190(99)00147-7
Ackoff, R. I. (1967). Management misinformation Cunningham, C., Song, I., & Chen, P. P. (2006,
systems. Management Science, 14(4), 147–156. April-June). Data warehouse design to support
doi:10.1287/mnsc.14.4.B147 customer relationship management analyses.
Ahmad, I., Azhar, S., & Lukauskis, P. (2004). Journal of Database Management, 17(2), 62–84.
Development of a decision support system using Datta, A., Moon, B., & Thomas, H. (1998). A case
data warehousing to assist builders/developers for parallelism in data warehousing and OLAP.
in site selection. Automation in Construction, Proceedings of the 9th International Workshop
13, 525–542. doi:10.1016/j.autcon.2004.03.001 on Database and Expert Systems Applications
Artz, J. M. (2006). Data driven vs. metric driven (DEXA’98) (pp. 226-231).
data warehouse design. In J. Wang (Ed.), Ency- Dehne, F., Eavis, T., & Rau-Chaplin, A. (2006).
clopedia of data warehousing and mining (pp. The cgmCUBE project: Optimizing parallel data
223-227). Hershey, PA: Idea Group. cube generation for ROLAP. Distributed and
Banker, R. D., & Kauffman, R. J. (2004, March). Parallel Databases, 19, 29–62. doi:10.1007/
The evolution of research on information systems: s10619-006-6575-6
A fiftieth-year survey of the literature in Man- Giudici, P. (2003). Applied data mining: Statistical
agement Science. Management Science, 50(3), methods for business and industry. West Sussex,
281–298. doi:10.1287/mnsc.1040.0206 England.
Baralis, E., Paraboschi, S., & Teniente, E. (1997). Gorry, G. A., & Scott Morton, M. S. (1971). A
Materialized view selection in multidimensional framework for management information systems.
database. In Proceedings of the 23rd International Sloan Management Review, 13(1), 1–22.
Conference on Very Large Data Bases (VLDB’97)
(pp. 156-165). Han, J., & Kamber, M. (2006). Data mining:
Concepts and techniques (2nd ed.). San Francisco:
Bellatreche, L., & Mohania, M. (2006). Physical Morgan Kaufmann.
data warehousing design. In J. Wang (Ed.), En-
cyclopedia of data warehousing and mining (pp. Hand, D., Mannila, H., & Smyth, P. (2001). Prin-
906-911). Hershey, PA: Idea Group. ciples of data mining. Cambridge, MA: MIT Press.
Hoffer, J. A., Prescott, M. B., & McFadden, F. R.
(2007). Modern database management (8th ed.).
Upper Saddle River, NJ: Pearson Prentice Hall.
541
Development and Design Methodologies in DWM
Imhoff, C., Galemmco, M., & Geiger, J. G. (2004). Ponniah, P. (2001). Data warehousing fundamen-
Comparing two data warehouse methodologies. tals: A comprehensive guide for IT professionals.
(Database and network intelligence). Database New York: John Wiley & Sons, Inc.
and Network Journal, 34(3), 3–9.
Raisinghani, M. S. (2000). Adapting data model-
Inmon, W. H., Terdeman, R. H., & Imhoff, C. ing techniques for data warehouse design. Journal
(2000). Exploration warehousing: Turning busi- of Computer Information Systems, 4(3), 73–77.
ness information into business opportunity. New
Roiger, R. J., & Geatz, M. W. (2003). Data
York: John Wiley & Sons, Inc.
mining: A tutorial-based primer. New York:
Jixue, L., Millist, W., Vincent, M., & Mohania, Addison-Wesley.
K. (2003). Maintaining views in object-relational
Singh, H. S. (1998). Data warehousing: Concepts,
databases. Knowledge and Information Systems,
technologies, implementations, and management.
5(1), 50–82. doi:10.1007/s10115-002-0067-z
Upper Saddle River, NJ: Prentice Hall PTR.
Kimball, R. (1996). The data warehouse toolkit:
Tan, R. B. (2006). Online analytical processing
Practical techniques for building dimensional
systems. In J. Wang (Ed.), Encyclopedia of data
data warehouses. New York: John Wiley & Sons.
warehousing and mining (pp. 876-884). Hershey,
Kimball, R. (1997, August). A dimensional model- PA: Idea Group.
ing manifesto. DBMS, 10(9), 58–70.
Theodoratos, D., & Sellis, T. (1997). Data ware-
Kroenke, D. M. (2004). Database processing: house configuration. In Proceedings of the 23rd
Fundamentals, design and implementation (9th International Conference on Very Large Data
ed.). Saddle River, NJ: Prentice Hall. Bases (VLDB’97) (pp. 126-135).
Lee, T., Chang, J., & Lee, S. (2004). Using rela- Theodoratos, D., & Sellis, T. (1999). Designing
tional database constraints to design materialized data warehouses. Data & Knowledge Engi-
views in data warehouses. APWeb, 2004, 395–404. neering, 31(3), 279–301. doi:10.1016/S0169-
023X(99)00029-4
Levene, M., & Loizou, G. (2003). Why is the
snowflake schema a good data warehouse de- Turban, E., Aronson, J. E., & Liang, T. (2005).
sign? Information Systems, 28(3), 225–240. Decision support systems and intelligent systems
doi:10.1016/S0306-4379(02)00021-2 (7th ed.). Upper Saddle River, NJ: Pearson Edu-
cation Inc.
Marakas, G. M. (2003). Modern data warehous-
ing, mining, and visualization: Core concepts. Wixon, B. H., & Watson, H. (2001). An empirical
Upper Saddle River, NJ: Pearson Education Inc. investigation of the factors affecting data ware-
housing success. MIS Quarterly, 25(1), 17–41.
Mistry, H., Roy, P., Sudarshan, S., & Ramam-
doi:10.2307/3250957
ritham, K. (2001). Materialized view selection and
maintenance using multi-query optimization. In
Proceedings of the ACM SIGMOD International
Conference on Management of Data 2001 (pp. key terms And deFInItIons
310-318).
Dimensional Model: A dimensional model
contains a central fact table and a set of surround-
542
Development and Design Methodologies in DWM
ing dimension tables, each corresponding to one Materialized View: Mmaterialized view are
of the components or dimensions of the fact table. copies or replicas of data based on SQL queries
Dimensions: Dimensions are the perspectives created in the same manner as dynamic views
or entities with respect to which an organization (Hoffer et al., 2007, p. 298).
wants to keep records (Han & Kamber, 2006, p. Metric-Drive Design: Metric-drive design is
110). a data warehousing design approach which begins
Entity-Relationship Data Model: An entity- by defining key business processes that need to
relationship data model is a model that represents be measured and tracked over time. Then they are
database schema as a set of entities and the rela- modeled in a dimensional model.
tionships among them. Parallel Processing: Parallel processing is
Fact Table: A fact table is the central table in the allocation of the operating system’s process-
a star schema, containing the names of the facts, ing load across several processors (Singh, 1998,
or measures, as well as keys to each of the related p. 209).
dimension tables. Star Schema: Star schema is a modeling dia-
Knowledge Discovery in Databases (KDD): gram that contains a large central table (fact table)
KDD is the process of extrapolating information and a set of smaller attendant tables (dimension
from a database, from the identification of the tables) each represented by only one table with
initial business aims to the application of the a set of attributes.
decision rules (Giudici, 2003, p. 2).
This work was previously published in Encyclopedia of Decision Making and Decision Support Technologies, edited by Fred-
eric Adam and Patrick Humphreys, pp. 236-244, copyright 2009 by Information Science Reference (an imprint of IGI Global).
543
544
Chapter 2.14
Facilitating Design of Efficient
Components by Bridging
Gaps Between Data Model and
Business Process via Analysis
of Service Traits of Data
Ning Chen
Xi’an Polytechnic University, China
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Facilitating Design of Efficient Components by Bridging Gaps Between Data Model and Business Process
Mei, 2003). They are usually performed relatively However, the existing enterprise modeling
independently, for different roles employ differ- methods remain largely unharnessed due to the
ent methodologies. The result is in a gap among following shortages: (1) They lack the automation
process model, data model and components, which of analysis mechanism which makes the enterprise
requires significant amount of efforts to fill in the unresponsive to the enterprise changes and increases
gap. Enterprise information system is an appli- the maintaining overhead of the evolution of these
cation with dense data (Martin, 2002) and mass models; (2) Some enterprise models are just con-
data access. Both functional and non-functional ceptual models and should be analyzed by hand.
aspects, such as system response time and data Others employ the complex mathematical models
throughput etc., are satisfied in system integration for analysis, which are hard for the business users
in order to provide efficient data access within to comprehend and manipulate. (3) The knowledge
process execution. Meeting these requirements reuse is difficult for the business users due to the
is a challenge presented to the solution designed, heterogeneity of the enterprise models.
which will greatly affect the efficiency of system In order to tackle the above problems, through
development. Therefore, how to build the relation- deep analysis of business process modeling and
ship model between business process and data data modeling, we extract process data mapping
model, and how to use the orchestration model to and data access flow to build data access com-
automatically generate data access components are ponents for bridging business process and data
two questions that have great impact to software model. Furthermore, a pattern is automatically
development. applied to data access component for facilitating
an efficient service.
relAtIon Works
Process/dAtA
The existing enterprise modeling approaches relAtIonsHIP model
are focused on two domains including peer-to-
peer enterprise system and multilayer Enterprise In present environment for software develop-
Modeling. ment, different tools are used by separate roles
David (2004) presents a loosely coupled in business process modeling, data modeling,
service-composition paradigm. This paradigm software component designing and coding. These
employs a distributed data flow that differs mark- tasks are so independent that the whole software
edly from centralized information flow adopted development becomes rather complex. Take the
by current service integration frameworks, such IBM develop studio as an example, we need to
as CORBA, J2EE and SOAP. Distributed data use modeling and programming tools such as
flows support direct data transmission to avoid WBI-Modeler, Rational Software Architect and
many performance bottlenecks of centralized WSAD-IE (Osamu, 2003). The development
processing. In addition, active mediation is used procedure contains the following steps:
in applications employing multiple web services
that are not fully compatible in terms of data 1. The analyst will analyze requirement to
formats and contents. design the use case using UML.
Martin Fowler and Clifton Nock summarize 2. By analyzing the relationship between
customary patterns of enterprise application ar- enterprise entities, the data model designer
chitecture to accelerate development of enterprise will design the data model, and create the
modeling (Martin, 2002; Clifton, 2003). database on the basis of UML.
545
Facilitating Design of Efficient Components by Bridging Gaps Between Data Model and Business Process
3. The process analyst will design the abstract component, but also these information can be
business process using WBI Modeler. used developer to analyze the process and data
4. The software engineer will design the relationship model, and consequently for devel-
functions and APIs for components using oper to optimize data access activity, produce
RSA. approximate index for data model, create views
5. The developer will implement the software and apply data access patterns (Clifton, 2003),
components and access the database using which can enhance the data access performance
RSA. (Figure 1).
6. The process developer will develop the A business process usually contains some sub
executable process based on the abstract processes, and a sub process usually contains some
process model, and assemble the software activities, where activity is operation on data.
components as web services using WSAD- Let {P1, P2, P3, …Pr, …} be a process set in
IE. process model.
7. The system deployer will run the developed Definition 1: <Frequency of process > Let
business model (EAR file) on WBI-SF. a set PS contain some sub-processes, which are
processes directly or indirectly invoked by a busi-
Obviously, a good command of process or- ness process P , as denoted by PS = {Pr }r ∈I ,
chestration, OOD and UML is a prerequisite for where I is index set. Pr is invoked in process P
a designer to complete the solution design. The N r times, the frequency of process Pr is defined
figure1 presents the relationships among design
flows of business process, software components, as N r / ∑ N r .
r ∈I
and database. Definition 2 <Activity frequency of sub-pro-
cess > If the kth data-access-activity in sub process
Pr is invoked nr ,k times, the activity frequency
dAtA Access comPonent
of sub-process Pr is defined by nr ,k / ∑ nr ,k ,
k ∈I
Identification of Frequent Activity where I is index set.
Definition 3 <Frequency of activity > The
Business process provided much global informa- frequency of activity ar ,k is defined as the ratio
tion on the whole. Not only can these information of times of data access to the total access, i.e.
be used for developer to generate the data access nr ,k / ∑ ∑ nr ,k .
Pr ∈PS k ∈I
546
Facilitating Design of Efficient Components by Bridging Gaps Between Data Model and Business Process
547
Facilitating Design of Efficient Components by Bridging Gaps Between Data Model and Business Process
Figure 2. Toolkit
N client inquiring transaction time of JavaBeans
component and cache pattern component, as shown
in Figure 5. The experimental result shows that
consumption time of data access components with
cache is less than consumption time of JavaBeans
component for big transaction. However, infor-
mation queried by data access components varies
frequently, cost of cache data validation will rise,
due to renewing or substituting cache items of
cache queue in small interval, thus decreasing
performance of data access component. In dif-
ferent scenario, effect of parameter-selection of
cache pattern on performance will be discussed
in future study.
conclusIon
process model and tables in data model; then on the
basis of map relation files, data access component In this chapter, a pattern-based approach to facili-
builder can generate data access components, for tate an efficient service is developed to automate
example JavaBeans or EJB code; finally cache pat- the analysis of large-scale enterprise information
tern builder integrates cache pattern with generated system. The approach will effectively reduce the
data access components (Figure 3 and Figure 4). number of system development problems by auto-
In order to show effect of cache pattern com- matic bridging of the gaps between development
ponent on optimizing data access, we simulate team and system analyst efficiently and effectively.
In addition, automatically generated approach,
548
Facilitating Design of Efficient Components by Bridging Gaps Between Data Model and Business Process
This work was previously published in Services and Business Computing Solutions with XML: Applications for Quality Man-
agement and Best Processes, edited by Patrick Hung, pp. 114-120, copyright 2009 by Business Science Reference (an imprint
of IGI Global).
549
550
Chapter 2.15
The Utilization of Semantic
Web for Integrating
Enterprise Systems
Dimitrios Tektonidis
ALTEC S.A., Greece
Albert Bokma
University of Sunderland, UK
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Utilization of Semantic Web for Integrating Enterprise Systems
definition is application centric and it cannot be two layers for the definition of concepts and the
shared among other heterogeneous applications. association to the application resources.
Tektonidis, Vontas, Hess, and Meschonat (2002) The semantic definition of the concepts is based
have stressed the problem of integration as a on the integration requirements. This implies the
problem of information sharing not as a problem concepts and their relation define the information
of adaptation that is very common case for ERP need to be exchanged. This “integration centric”
systems. approach follows the principals of modern enter-
In the technological level, service oriented prise application integration (EAI) specification
application integration (SOAI), as it is presented (Linthicum, 2004) contrary to traditional integra-
in Linthicum (2004), exploits the capabilities for tion approaches that aim to improve the definition
the functional description of Web services that are based on the semantics of the applications. Figure
used for the actual integration. This section focuses 1 presents the difference between traditional EAI
on the creation of an integration framework based (data transformation) and integration-centric ap-
on SOAI that utilizes semantic Web technologies proach.
(W3C, 2006) in order to enrich the semantics of The formation of an integration centric infor-
the exchanged information. mation definition EAI methodology required the
The approach used follows the ontologies utilization and the adaptation of semantic Web
based enterprise application integration (ONAR) technologies. ONAR methodology utilizes onto-
approach presented by Tektonidis et al. (2005) logical definitions for the definition of semantic
that utilizes Web ontologies to create semantic and uses association techniques in order to as-
conceptualizations of the business concepts that sociate concepts with the information repositories
exist inside an application. This conceptualization of the applications.
is used for the creation and the registration of the
Web services in a UDDI based registry. Figure 1. The difference between data transforma-
tion and semantic integration (Source: Capgemini)
utIlIZInG semAntIc
Web For enterPrIse
APPlIcAtIon InteGrAtIon
551
The Utilization of Semantic Web for Integrating Enterprise Systems
552
The Utilization of Semantic Web for Integrating Enterprise Systems
should be defined based on the requirements of may be divided in different level of abstrac-
the integration. The application centric approach tion. In the previous chapter, domain ontologies
defines differently the concepts according to enabled different levels of ontologies based to
the integration case. Following the example of their abstraction. An integration case in order to
Figure 3 the order concept should have different be complete may be very detailed in the concepts
conceptualization according to the integration that is based on and abstract to the rest of the
case. Thus in a case where the CRM system concepts that are only to be defined for reasons
requires information regarding the consuming of completion. In the example of Figure 3, for
habits of a customer from the financial system and integration case between the financial system
then the order conceptualization would contain and the CRM system information regarding the
only information about the customer name and customer purchasing habits may be very detailed
the product name while the integration between while other concepts like its order delivery date
the production planning system and the financial to be abstract. The abstract part of the ontology
system would include only the delivery date and is part that the application is not able to process
the product name. while the detailed part is data that the application
For the previous simplified example, it is uses in the integration case. Thus ontologies are
stressed that although inside an application the not meant to define the data to be exchanged, but
definition of a concept is univocal inside an inte- their semantics.
grated system the concept may have different The following section presents how ontologies
hypostasis according to the integration case. have been used as modeling technique to define
The requirement is how ontologies would im- semantic conceptualizations.
prove the multiple definition of a concept enable
different conceptualization for each integration
case. Ontologies according to Fensel (2004) are not sHArInG InFormAtIon
created to define data but to represent knowledge. usInG oWl ontoloGIes:
The knowledge of a domain does not follow the tHe onAr metHodoloGy
strict and precise definition of data structure that
is found in E-R diagrams or UML class diagrams. ONAR methodology follows the frame-based
Although ontologies provide an explicit and logic that modern ontology languages use in order
formal definition of a domain this definition to define conceptualizations. During our research,
Figure 3. The graph of a conceptualization ontology produced by ONAR concepts and services designer
553
The Utilization of Semantic Web for Integrating Enterprise Systems
Tektonidis et al. (2003) has found that languages Figure 3 presents the conceptualization of the
like the Web ontology (W3C, 2006) are capable in summary of Deed of Incorporation document
providing us with formal definitions for business used in public administration applications. This
concepts as OWL classes. ontology contains all the concepts (OWL classes)
In comparison with UML class diagrams, and their properties (OWL datatype properties)
OWL is more descriptive enabling the defini- as well as their relation (OWL object properties).
tion of semantics for the business concepts and The conceptualization is not based on the informa-
their attributes. The entities inside the ONAR tion system of the participating local authorities
conceptualization methodology inherit all the (Prefecture, Chamber of Commerce), but on an
features of the OWL classes. However OWL as ontology that is common for all authorities.
an ontology based language often permits the It can be argued that the graph does not rep-
abstract definition of domains. For EAI that can resent a formal OWL structure since for example
lead to the definition of conceptualizations that there are properties (OWL data-types) like the
cannot be reflected to real data since information property “ID” that is presented more that once
systems need to formalize abstract concepts into in the graph. Our framework uses OWL-Lite
data structures. as ontology language however for reasons of
The venture of having an ontology language presentation based on the end users feedback we
for defining information that is exchange between support that this kind of ontology representation
information systems has been confronted with the is more convenient and less complex to users that
definition of a restricted usage of OWL. In this are not familiar to ontology engineering.
attempt, graphical environment was developed in Summarizing the conceptualization capabili-
order the definition of the OWL ontologies to be ties of our framework we are using the OWL-Lite
constrained by certain rules that would prevent and more precisely: (See Figure 4)
from the false usage of OWL. ONAR concepts
and services designer (ONAR, 2006) enables the 1. Inheritance is permitted allowing some class
creation of conceptualization ontologies (OWL) features to be inherited from one class to
providing the business consultant a reduced OWL- another. The relation between the parent
Lite ontology (W3C, 2005). class and child classes follows the same rules
that both object-oriented engineering and
554
The Utilization of Semantic Web for Integrating Enterprise Systems
frame-based logic supports, however mul- defined from only one concept and vice versa.
tiple inheritance is not permitted. This This ensures that in the association of the logical
constraint is due to the fact that in complex model to the system resources will not create
information system polymorphism of some indeterminism.
concepts will unduly increase the complexity Both entities and properties are enriched with
of conceptualization. (a) notional properties like lexical descriptions,
2. Entities are allowed to have properties that (b) the ability to define the inverse of a concept
correspond to OWL datatype properties. A and (c) the ability that a property can potentially
property can belong to more than one entity be derived from another property. These enrich-
and is contrary to the usual principles of ments are used to increase the inference for the
object oriented modeling. This principle semantics of the concepts and their properties
derives from the frame-based logic of OWL inside a model following the OWL principles.
ontologies and extends the object oriented The most important reason for the utilization
engineering where a property belongs to of ontologies is the capability to define semantic
only one class. relations between the concepts of a domain. Me-
3. Relations between concepts can be defined cella and Batini (2000) introduced the concept
using of application wrapper as metalayer enables the
a. Functional property: Defines the redefinition of concepts of the application in order
“one to many” relation between the to be used from other heterogeneous applications.
instances (objects) of two concepts The lack of the inclusion of semantics limits the
b. Inverse functional property: capabilities of EAI approaches like application
Complementary to functional property wrappers and object oriented middleware (OOM)
in order to facilitate lexical descriptions techniques.
c. Symmetric property: Symmetric Defining information using data definition
properties are used to declare the one methods like UML class diagrams or entity rela-
to one elation between the instances tion (E-R) schemas the produced conceptualiza-
(objects) of two concepts. tions unavoidably follow the data structure of an
d. Transitive properties: Contrary to the application. This is the actual limitation that our
definition of OWL in ONAR frame- work needs to overcome. Software engineering
work Transitive properties are used for methods have limited capabilities for semantics
the division of complex concepts. For definition. For example, the semantics in the
example the concept “material” can relation between two concepts that both in UML
have properties regarding its financial or in E-R schemas do not have formal methods
features (prize, cost), logistics features to define.
like (size, weight, quantity) and so Our work has focused on creating semantics
forth. Using transitive properties the in the relations between concepts. The existing
concept can be divided to more than semantics of relations that are expressed in object
one concept according to its semantic. oriented class diagrams in UML or entities rela-
tions (E-R) diagrams pose limits to the semantic
However we have to limit the syntax of OWL, two concepts may have at the logical level.
which permits the existence in a relation of more Therefore adapting the four types of relations
than one concept as ranges and domains. In our (object relations) that are defined in OWL we
approach (in a relation) if the domains contain are achieved to increase the inference capabilities
more than one concept then the range should be of the conceptualizations. The relation between
555
The Utilization of Semantic Web for Integrating Enterprise Systems
concepts in this level represents semantic relation that enables the mapping of the conceptualization
between the concepts. These concepts may have ontology to the system repository.
a syntactic relation, however this is not requisite. The association ontology is related to the sys-
This detaches the definition of the concepts from tem structure and associates the concepts of one
their data realizations. Thus the definition of the conceptualization ontology to the system reposi-
concepts is based to the integration requirements. tory. The ontology enables the definition of the:
Concepts relations are defined based on their
domain and their range. The domain is consisted 1. Category of repository: Category of the
of set of concepts that subject of the relation. The repository defines level of the repository
range for a relation is the object or the objects of (e.g., whether is a flat file system or an
the relation. According to Wache, Vögele, Visser, RDBMS or an application server)
Stuckenschmidt, Schuster, and Neumann (2001) 2. Type of repository: Defines the technology
the definition of information based on ontologies of the repository (e.g. DCOM application
can be unlimited regarding the number of concepts server or JavaBeen application server)
that consist of a domain and the range. However 3. OWL ontology location: The conceptualiza-
in our research based on e-business (Tektonidis tion that the association ontology is related
et al., 2002), e-government (Tektonidis et al., 4. Mapping information: Information that
2005) and e-health (Tektonidis & Bokma, 2005) relates every logical concept to the resources
use cases the simultaneous existence of multiple of the repository like the access method or
domain and range ontology created problems technical information like the data type and
regarding the comprehension of the ontology as the size
well as in the association of the concepts to the
repository of the information system. With the disassociation of the conceptualiza-
tion from the repository of the system and the usage
mapping conceptualizations of the association ontology we have achieved:
to system repositories
1. To increase the reusability of the con-
Developing an approach that is independent from ceptualizations ontologies: The same
the application logic of each application neces- conceptualization ontologies can be used
sitate the existence of mechanisms and technique to different information system.
to associate logical conceptualizations (OWL 2. To reduce cost of maintainability when
ontologies) to the real application repository. In changes happened in to the application
addition, our approach is independent also from repository
the type of the repository (whether is a RDBMS 3. To enable the creation of common vocabular-
or an application server). ies that can be shared between heterogeneous
In our attempt to enrich OWL with elements applications
that would enable as to associate the conceptualiza-
tion to the system we have discovered that these In our work so far we have achieved the ap-
enrichments would create a complex ontology file plication of the ONAR framework to relational
that will carry both semantic and syntactic ele- databases, ODBC compliant repositories and ap-
ments. Another important issue was the portability plication server based on Web services (WSDL).
of the ontologies from different kind of systems. In the near future we aim to include other type
Therefore we have created an association ontology of repositories.
556
The Utilization of Semantic Web for Integrating Enterprise Systems
557
The Utilization of Semantic Web for Integrating Enterprise Systems
the input and the output of the Web service. The onAr Framework Architecture
design of a Web service consists of its syntactic
definition and its semantic description. The requirement and the objective that have been
The syntactic definition defines the input and set in the previous sections required the develop-
the output as well as the behavior of the Web ment of several components that comprise ONAR
service. This definition is based one conceptualiza- framework architecture, presented in Figure 7.
tion of the conceptual schema. Starting from one ONAR framework implementation was based
basic entity the Web service designer can use all on the methodology and in the existing state-of-
the concepts that are necessary for his definition. the-art technologies. The selection of the tech-
The syntactic definition (ONAR service model) nologies that materialize the conceptual compo-
of the service contains all the semantic and syn- nents of the architecture and it is not unique since
tactic relations between the basic entity (primary other technologies may substitute them.
concept) and the secondary concepts. However the conceptual components role and
The ONAR service model (Figure 6) is an XML the architecture materialized into a framework the
document contains the functional description of the ONAR methodology. A summary of the role and
service based on the conceptualization ontology. functionality of the components are the following:
The reason for having a new definition docu-
ment for the syntactic definition of the service,
apart from maintenance purposes, is to increase Figure 7. ONAR prototype system architecture
the portability of the Web services. We have to
implement the necessary functionality that enables
us to automatically generate the source code (C#)
of a Web service based only to the conceptualiza-
tion ontology the association ontology and the
ONAR service model. Therefore, if two applica-
tions share the same conceptualization ontologies
but have different structures (different association
ontologies) they can exchange Web services.
558
The Utilization of Semantic Web for Integrating Enterprise Systems
559
The Utilization of Semantic Web for Integrating Enterprise Systems
We present in the following sections some of It can be argued that the proposed ontology
the features of the integrated environment however representation is closer to the UML class diagram;
further information can be found in the project however it provides a simplified view of the
Web site: http://research.altec.gr/ONAR. ontology without limiting its capabilities.
One of the most important issues in order ONAR Software instances are the software components
framework to facilitate the creation of ontologies that realize integration rules based on ontological
was the representation of ontology. OWL is a definition of the integration case. For the ONAR
frame-based language however according to the prototype system software instances are material-
W3C definition data type properties do not belong ized using Web service technology. The selection
to one class but to a collection of classes. of Web services over other technologies (like
A graphical representation of this principal CORBA, DCOM or EJB) has been based to the
would complicate the design and representation fact that Web services follow the message-oriented
of the ontology. During our research (Tektonidis logic. There are many pros and cons to this selec-
et al., 2005) the representation that is closer to tion, however it remains a technological issue and
the UML class diagram than the ontological the evolution of technologies may in the future
representation used from other tools (Protégé provide better solutions.
OWL plug-in) simplified the representation of The software instance is divided in two parts:
the ontology.
Every class in Figure 9 appears to have a 1. The software instance profile (informative
set of properties that belong only to the class. part) that contains the semantic description
For example, the “ID” property that appears in for the use of the software instance based
“production order”, “production” and “material” on the integration ontology. The structure
is one datatype property that has as domain the of the software instance profile follows the
three classes (Figure 10). principal of OWL-S profile ontology. The
560
The Utilization of Semantic Web for Integrating Enterprise Systems
561
The Utilization of Semantic Web for Integrating Enterprise Systems
562
The Utilization of Semantic Web for Integrating Enterprise Systems
conclusIon And FurtHer Work Corcho, O., Fernández-López, M., & Gómez-
Pérez, A. (2003). Methodologies, tools and
The utilization of ontologies for the conceptual- languages for building ontologies. Where is
ization of existing system based on an integra- their meeting point? Data & Knowledge En-
tion centric approach requires validation and gineering, 46(1), 41–64. doi:10.1016/S0169-
evaluation of our framework. Thus we aim first 023X(02)00195-7
to validate whether ONAR framework can be
Dogac, A., Kabak, Y., & Laleci, G. (2004). Enrich-
applied to a wide variety of Information system.
ing ebXML registries with OWL ontologies for
In this direction over this last year, we have been
efficient service discovery. In Proceedings of the
collecting feedback from the registered user of the
14th International Workshop on Research Issues
framework. Currently we have examined e-busi-
on Data Engineering, Boston.
ness e-health (Artemis, 2005) and e-government
(EU-Publi.com, 2005) integration cases. Eu-Publi.com IST-Project (2005). Facilitating
In addition, we aim to create an evaluation cooperation amongst European public adminis-
framework that will enable us to evaluate ONAR tration employees. Retrieved February 13, 2007,
to existing approaches based on its (a) maintain- from http://www.eu-publi.com
ability, (b) complexity, (c) portability and (d)
Linthicum, D. (2004). Next generation applica-
adaptability in order to assess quantitatively its
tion integration: From simple information to web
performance to other integration frameworks.
services. Addison-Wesley.
Finally, we are currently working on technical
improvements and enrichments of the framework Liu, L., & Halper, M. (1997). Incorporating se-
mainly for its adaptability feature in order for mantic relationships into an object oriented data-
ONAR to be used from different information base system. In Proceedings of the 32nd Hawaiian
systems. International Conference on Systems Science.
Mecella, M., & Batini, C. (2000) Cooperation
of heterogeneous legacy information systems: A
reFerences
methodological framework. In Proceedings of the
W3C (2006). Semantic Web description. Re- 4th International Enterprise Distributed Object
trieved February 13, 2007, from http://www. Com-puting Conference, Makuhari, Japan.
w3.org/2001/sw/ ONAR. (2006). Ontologies based enterprise appli-
Artemis, I. ST-Project (2005). A Semantic web cation integration framework. Retrieved Februaty
service-based P2P infrastructure for the interoper- 13, 2007, from http://research.altec.gr/ONAR
ability of medical information systems. Retrieved OWL. (2006). W3C OWL 1.0 syntax specification.
February 13, 2007, from http://www.srdc.metu. Retrieved February 13, 2007, from http://www.
edu.tr/webpage/projects/artemis/ w3.org/TR/owl-ref/
Chiang, C. (2001). Wrapping legacy systems for Paolucci, M., Kawamura, T., Payne, T. R., &
use in heterogeneous computing environments. Sycara, M. (2002). Semantic matching of web
Information and Software Technology, 43(8), services capabilities. In Proceedings of the In-
497–507. .doi:10.1016/S0950-5849(01)00160-4 ternational Semantic Web Conference (ISWC)
(pp. 333-347).
563
The Utilization of Semantic Web for Integrating Enterprise Systems
Ratnakar, V., & Gil, Y. (2002). A comparison of Tektonidis, D., Vontas, A., Hess, U., & Meschonat,
(Semantic) mark-up languages. In Proceedings of J. (2002). Handling the shop-floor of an industry
the 15th International FLAIRS Conference, Special through ERP systems: A functional integration
Track on Semantic Web, Pensacola, Finland. model. In Proceedings of the International Con-
ference on E-business & E-Work 2002, Prague.
Tektonidis, D., & Bokma, A. (2005). The utiliza-
tion of ontologies for e-health systems integra- Themistocleous, M., Irani, Z., O’Keefe, R., & Paul,
tion. In Proceedings of the 10th International R. (2001). ERP problems and application integra-
Symposium on Health Information Management tion issues: An empirical survey. In Proceedings
Research, Thessaloniki, Greece. of the 34th Hawaiian International Conference on
Systems Science, Big Island.
Tektonidis, D., Bokma, A., Oatley, G., & Salam-
pasis, M. (2005). ONAR: An ontologies-based ser- Wache, H., Vögele, T., Visser, U., Stuckenschmidt,
vice oriented application integration framework. H., Schuster, G., Neumann, H., & Hübner, S.
In Proceedings of the 1st International Conference (2001). Ontology-based integration of informa-
on Interoperability of Enterprise Software and tion: A survey of existing approaches. In Proceed-
Applications, Geneva, Switzerland. ings of the IJCAI-01 Workshop: Ontologies and
Information Sharing, Seattle, Washington.
This work was previously published in Agent and Web Service Technologies in Virtual Enterprises, edited by Nicolaos Proto-
geros, pp. 97-114, copyright 2008 by Information Science Reference (an imprint of IGI Global).
564
Section III
Tools and Technologies
This section presents extensive coverage of the technology that informs and impacts enterprise information systems.
These chapters provide an in-depth analysis of the use and development of innumerable devices and tools, while also
providing insight into new and upcoming technologies, theories, and instruments that will soon be commonplace.
Within these rigorously researched chapters, readers are presented with examples of the tools that facilitate and
support the emergence and advancement of enterprise information systems. In addition, the successful implementa-
tion and resulting impact of these various tools and technologies are discussed within this collection of chapters.
566
Chapter 3.1
Data Warehouse Maintenance,
Evolution and Versioning
Johann Eder
University of Klagenfurt, Austria
Karl Wiggisser
University of Klagenfurt, Austria
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Data Warehouse Maintenance, Evolution and Versioning
transactional data (cell values) are described in at that time. Comparing the numbers of 1990 and
terms of master data (dimensions and dimension 1991, where the organization itself did not change,
members). Whereas today’s commercial systems may indicate a massive increase of inhabitants.
are well prepared to deal with changes in the In reality, the 1991 number also contains the 16.4
transactional data, they are, surprisingly, not able million people of former East-Germany. Eurostat,
to deal with changing master data in a satisfactory for instance, takes this into account, and presents
way. Nonetheless, such changes frequently occur numbers of the united Germany also for the years
(restructuring in organizations, new laws, mergers before 1991. Another example for an unclear
and acquisitions, product portfolio restructuring, inclusion are the Baltic countries or Slovenia.
etc.). All these changes have to be represented in They did not even exist before 1991, but were
the information systems, and thus, must some- parts of other countries, which, of course, never
how be modeled also in the data warehouse. For were parts of the European Union. An alternative
data warehouses the adequate representation and to presenting such “adjusted data” is to display
treatment of such changes is even more crucial the “historical truth”, i.e. include the numbers
than in standard database applications, since data of different countries only after they joined the
warehouses are intended to represent also histori- European Union. This may make sense in some
cal data which – changes occurring – might be situations, in others, such results may be useless.
quite incompatible. An example demonstrating the effect of
A simple example illustrating the problem of changing semantics could be to retrieve the
missing data is querying the number of inhabit- Gross National Product of the countries in the
ants in the European Union for the last 25 years. European Union from 1983 to 2008. Besides
This query seems rather straightforward and the the problems induced by the structural changes
numbers should not leave much space for interpre- described above, i.e. whether and how to include
tation. But, one has to be aware of some changes: numbers for a specific country, this query illus-
First of all, the geopolitical entity “European trates the changing semantics problem: As of
Union” only exists since 1993, succeeding the 1999 and 2002, a common European currency,
“European Community”, which itself was origi- the Euro, was introduced as deposit currency
nally named “European Economic Community”. and cash money respectively, in many – but
Furthermore, in the considered period (1983 to not all – of the member countries. Thus, before
2008), the European Union grew from 12 to 27 1999 the Gross National Product of different
members. Finally, with the reunification of East- countries was expressed in the local currency,
and West-Germany in 1990 one of the member but as of 1999 it is given in Euro. Before 1999
countries had a massive internal reorganization. So for comparing the GNP of different countries,
if querying the number of inhabitants from 1983 to it is obvious that the numbers must be brought
2008, how can the resulting numbers be compared? to a common base, i.e. the same currency, to
When querying this data from the Eurostat website, be comparable. But what about statistics for a
one has to choose the “geopolitical entity” (EU-27, single country? For Austria, 1 Euro exchanges
EU-25, one or more counties, …) for which the 13.7603 Austrian Schillings. So, someone com-
data should be retrieved. If, for instance, EU-25 paring the Austrian Gross National Product from
is chosen, the population for these 25 countries is 1990–2006 without considering the Euro would
returned also for the years before their member- notice a giant retracement in the year 1999. But,
ship. But of course, the overall sum of returned of course, someone who knows about the Euro
inhabitants for the year 1987 does not match the can divide each value given in ATS by 13.7603
real number of people living in the European Union and then compare the values.
567
Data Warehouse Maintenance, Evolution and Versioning
Besides such simple “unit changes” there time consuming and also error prone, espe-
may be also more complex semantic changes for cially if the affected dimensions are large
dimension members. Consider a query analyzing and the changes are rather small.
the unemployment rate in the European Union. 3. Dealing with the influence of structure
Not only that it is calculated in different ways for changes on the cell data: Some structural
various countries, the calculation mode has also changes may have heavy influence on the
been changed several times in the last few years, cell data. One of the main reasons for data
for instance whether people who are attending warehouse maintenance is comparability of
coursed offered by federal employment offices are cell data. Now comparing cell data stemming
counted as unemployed or not. Such calculation from before and after a structural change
methods may be contained in the data warehouse may be very complex or even impossible,
definition as formulae for a certain member. because of the influence of the structure
Generally, the three basic aspects of change changes on the cell data. In this context two
management in data warehouses can be identified major problems can be identified
as follows: a. Missing Data: If elements are inserted
or removed from the structure, cell data
1. Being aware about changes happening: may not be available for the whole pe-
First of all, to be able to manage changes, it riod of analysis (e.g. missing data for
is necessary to be aware of their existence. new countries in the European Union).
This awareness can easily be seen from two b. Incorrect Data: If structure elements
typical reasons for data warehouse structure are changed, their semantics may
changes. The first reason are changes in the change. This could have an influence
real world. that is represented by the data on the calculation of cell values. Thus,
warehouse, for instance creation of a new if comparing cell values from before
department, a merge of different depart- and after the change, equal values may
ments, or new countries joining the European have a different meaning and vice versa
Union.. The second reason for modifications (e.g. different methods for calculating
in the data warehouse are changing require- the unemployment rate).
ments, for instance analyzing not only the
turnover in a company, but also the gain, or These examples illustrate the problems induced
keeping track of unemployment rates, which by changing structures on a very simple level.
were not recorded before. Froeschl, Yamada and Kudrna (2002) call this the
2. Identifying the changes in the system: problem of footnotes in statistics, i.e. many values
As today’s typical data warehouse systems have to be tagged with their correct semantics.
typically do not support changing structure When being aware of such semantic and structural
data, they also may not be able to provide changes, interpreting “strange” results may be
information about them, for instance some cumbersome but possible. But if someone does
sort of a change log, even if the happened, not even know that there were changes, analyzing
e.g. by some automatic ETL process recre- query results may be impossible or, even worse,
ating the data warehouse from its sources. lead to wrong decisions. One possible solution to
The administrator is then, being aware that this problem is data transformation, i.e. viewing
changes happened, in charge of finding the old data under new structures or vice versa. One
modifications and correctly dealing with may define the semantics of a query, and the system
them. Executing this task manually is very has – provided that the necessary information is
568
Data Warehouse Maintenance, Evolution and Versioning
available – the ability to include only the desired as the real world tends to change, such changes
data, exclude undesired data and adjust the data must also be represented in the cube structure.
to the desired structure and semantics. Changes can happen on the schema level, i.e.
dimensions or categories are changed, or on the
instance level, i.e. the members are changed.
bAckGround: tHe Figure 1 shows examples for schema and in-
dAtA WAreHouse stance changes. It contains three different version
mAIntenAnce Problem of a cube structure in a car dealer’s data warehouse.
For sake of simplicity, only the Cars dimension is
The standard architecture and modeling approach depicted. The dealer sells different car models of
for data warehouses is the multidimensional data different brands. Each model has assigned a user
cube. A multidimensional data cube consists of a defined attribute Engine Power. Traditionally, for
set of Dimensions, each of them comprising a set German cars this is given in horsepower, whereas
of Dimension Members (also called simply Mem- for English models it is given in kilowatt. In the
bers). Dimensions are hierarchically organized second version there are various instance changes:
into a set of Categories or Dimension Levels, the new model BMW1 is introduced and Silver
each of them having assigned a set of members. Spirit is renamed to Silver Spirit II. In version 3
The members themselves are also hierarchically there is also a schema change. Due to the merge
structured, accordingly to the categories they are of BMW and Rolls Royce on the one hand and
assigned to. Dimensions and categories define Mercedes and Chrysler on the other hand, a new
the schema of the cube, whereas the members dimension level is introduced. Of course for this
are called the instances. Schema and instances new level also new members are created and the
together define the cube structure. Selecting one existing members are relocated accordingly. The
member from each dimension defines a Data Cell, brand Puch is discontinued, the model attached
containing either a Cell Value or a NIL value. to it is now sold under the brand of Mercedes.
Although there is no standardized terminology The new brand Chrysler with one car model is
in data warehousing till today, these basic terms introduced, whereas the Phantom V is removed
are widely accepted. The terms Fact and Measure from the product portfolio. The attribute for the
are sometimes used with different semantics. In engine power is unified to kilowatt. All these
this chapter they are used as follows: A fact is a structure modifications are due to changes in the
dimension member in the Fact Dimension, repre- data warehouse’s application domain. A modifica-
senting a certain subject of analysis (for instance tion resulting from a changed requirement can for
Turnover). The term measure is used synonym instance be the introduction of a member profit
to cell value. in the facts dimension, depicting the car dealers
wish to keep track of his profit.
Problems of cube From the view of structural changes, these
structure changes reorganizations do not cause any problems. But
what about the data? Table 1 shows the cell data
It is obvious that the cube structure is modeling a for the cube in the years 2005, 2006 and 2007, i.e.
certain part of the real world. For instance, depart- for the Versions 1, 2 and 3 respectively. A possible
ments and divisions of a company will somehow be chart resulting from this data without considering
represented in a cube used in that company. Thus, changes may look like shown in Figure 2. Without
there may be a Company dimension comprising knowing about the changes, interpretation of this
members for the departments and divisions. And, chart is not possible.
569
Data Warehouse Maintenance, Evolution and Versioning
570
Data Warehouse Maintenance, Evolution and Versioning
levels of the maintenance Problem from simple reaggregation to complex data trans-
formations, because, for instance, the unit of a fact
As defined above, the cube’s structure consists of has changed. For the example given above, a data
schema and instances. A data warehouse mainte- adjustment may be the recalculation for the brand
nance system must be able to keep track of changes Mercedes, representing that Model G is now sold
in both of them. Thus, on the schema level it must under this brand.
provide operations for Insertion, Deletion and
Change of dimension and categories. Category Impacts of data Warehouse
changes are, for instance, addition or deletion of changes on cell data
user defined attributes. Also the hierarchical rela-
tions between different categories may be subject The different types of changes in data warehouse
to change. On the instance level, the system must structures affect the assigned cell data in different
provide operations for the Insertion, Deletion ways. The following impacts on the cell data can
and Change of dimension members, as well as be identified:
operations for changing the hierarchical relations
between the dimension members. • Additional Cell Data: Additional data is
Recording and managing structure changes most times expressed by new structure ele-
is only one aspect of the maintenance problem. ments not depending on previously existing
The cell data contained in the data warehouse elements, either on the schema (dimension,
depends on the structure. Thus, modifications categories) or on the instance (dimension
of the structure may lead to inconsistencies in members) level. The problem with ad-
the cell data. So it may have to be adjusted to be ditional cell data is that it is oftentimes
consistent again. Such adjustments could range not available for the past thus, leading to
571
Data Warehouse Maintenance, Evolution and Versioning
missing data. An example could be new sions available or not. This also applies to data
countries joining the European Union. warehouse maintenance. With Data Warehouse
• Removed Cell Data: When dimension Evolution every modification (or every set of
members or categories are completely re- modifications applied in one transaction) of the
moved from the data warehouse structure, structure leads to a new version of this structure
also the assigned cell data should no longer and the previous version is lost. The contained cell
be part of the cube. For instance, data from data has to be transformed to be consistent with the
countries leaving the European Union new structure. Queries can only be executed based
should not be contained in statistics any on the newest structure. With Data Warehouse
longer. Versioning also every modification (or every set
• Restructuring of Cell Data: Restructuring of modifications applied in one transaction) of the
cell data can happen in various forms: ag- structure leads to a new version of this structure,
gregation hierarchies may change, new ag- but the previous version is kept available and may
gregation levels may be created, dimension be restored. Existing cell data does not need to
members may be split or merged, the unit be adapted, but can be stored following is origin
of a fact may change. All these restructur- structure version. This enables queries spanning
ings have in common that the cell data for multiple structure versions.
the new version can – to a certain extent Comparing these two possibilities reveals
– be calculated from the old structure. Not advantages and disadvantages for both of them:
dealing with such changes may lead to When using the evolution approach, one does
incorrect data. Examples for this type of not need to keep track of old versions, which
changes may be the split of a country in reduces data management effort and as all data
the European Union into two independent is adapted to the current version, no adaptations
countries, or the changing the currency. have to be done during runtime, which means a
• Change of Cell Data Calculation: Cell better query performance, compared to the ver-
data may also be calculated from various sioning approach. On the other hand, evolution
external data sources by some given for- lacks the possibility of multiversion queries and
mulae. Such calculation rule may change. as the data has to be transformed, change opera-
Not dealing with such changes may again tions may take quite a long time. The versioning
lead to incorrect data. An example for this approach allows multiversion queries, and data
type may be changing the calculation rule does not have to be transformed when applying
for the unemployment rate. modifications. On the other hand, when running a
• Changing Cell Data: Typically, cell data multiversion query, data may have to be adapted,
contained in a data warehouse is non-vol- which leads to worse performance, compared to
atile, thus not changing any more (Inmon the evolutionary approach. Furthermore, keeping
2005, p. 29). Therefore changing cell data track of past versions is a non-negligible data
is typically not considered during of data management effort.
warehouse maintenance.
Aspects of time in the
data Warehouse evolution data Warehouse
and versioning
Time is a key issue in data warehousing, because
When it comes to changing systems, one question when supporting the decision process, comput-
always arising is whether to keep previous ver- ing historical trends may be necessary (Rizzi and
572
Data Warehouse Maintenance, Evolution and Versioning
Golfarelli, 2006). In data warehouses one can nance where all past versions of the data warehouse
distinguish three different kinds of time: are kept available. Dealing with changes on the
data level, mostly insertion of new data, is not
1. Valid Time of Cell Data: In a multidimen- part of data warehouse maintenance, but part of
sional cube usually the Time dimension is a data warehouse’s normal operation. (Eder and
used to represent the history of changing Wiggisser, 2009, p. 1)
transaction data. Cell data, which is related
to a specific dimension member from the
time dimension is valid at the time point or tHe comet temPorAl
interval represented by that member. dAtA WAreHouse
2. Transaction Time of Cell Data: Based on
the assumption of nonvolatility, for most Eder and Koncilia (Eder & Koncilia, 2001; Eder,
application the transaction time of cell Koncilia, & Morzy, 2002) suggest the COMET
values, i.e. the time when data is current in Metamodel for temporal data warehouses. This
the data warehouse, is not considered to be model is based on the multidimensional data
relevant. When this assumption is violated model. All elements (dimensions, categories,
and transaction data which is already stored dimension members, …) and relations between
in the data warehouse is changed afterwards, them get assigned a timestamp [Ts; Te] where Ts
transaction time bay become an important identifies the first point in time where the given
aspect, as it allows traceability for query element is valid, and Te defines the last point in
results (Rizzi and Golfarelli, 2006). time of the validity of the element. An ending
3. Valid Time of Structure Data: Data ware- timestamp of NOW defines elements for which
house structures need to be maintained. the end of validity is yet unknown. Operations
Structure elements may be inserted, deleted for inserting, deleting, and updating structure
or changed. To be able to determine the data elements are provided, as well as operations for
warehouse’s structure at a given point in changing hierarchical relations between these
time, structures have to be assigned a valid elements, for instance creating a new aggregation
time. Today’s data warehouse systems typi- hierarchy. On the member level, also the complex
cally provide very little support for changing operations Split – i.e. a single dimension member
structures. is separated into several members – and Merge
– i.e. several dimension members are combined
Data warehouse maintenance mostly deals with into a single one – are supported.
the third aspect, i.e. valid time of structure data. An advantage of this approach is its indepen-
Subsuming the above the following definition dence from the data warehouse system in use
can be given for data warehouse maintenance, (Eder, Koncilia, & Wiggisser, 2006). The ver-
evolution and versioning:The process and meth- sioned structure data and the metadata is stored
odology of performing changes on the schema independently from the data warehouse system
and instance level to represent changes in the in a relational database, thus virtually any data
data warehouse’s application domain or require- warehouse system can be supported with tempo-
ments is called Data Warehouse Maintenance. rality. As COMET works independently from any
Data Warehouse Evolution is a form of data particular data warehouse system, the changes log
warehouse maintenance where only the newest between two versions may not always be readily
data warehouse state is available. Data Warehouse available to be integrated in the COMET database.
Versioning is a form of data warehouse mainte- For that purpose, the framework provides a change
573
Data Warehouse Maintenance, Evolution and Versioning
detection mechanism based on directed acyclic far more complex than just such “unit transforma-
graphs. COMET compares the graph representing tions”. For instance in the case of a split, there
the last known structure version in the database may exist different weighting factors for each
to the graph representing the current version in successor, defining the split ratios.
the data warehouse systems and suggests and edit The set of all these transformation functions
script, which represents the differences between may be modeled as a matrix or as a directed acy-
the two graphs. Such a change detection can only clic graph (Eder & Wiggisser, 2008). The matrix
be semiautomatic, because to definitely confirm approach allows simple and intuitive modeling
the calculated differences, external knowledge of the transformation process. The cell data is
which can only be provided by a human user is represented as n-dimensional matrix, transforma-
necessary. tion data is modeled as two-dimensional matrix
The COMET approach supports versioning for each dimension. The transformation is done
and therefore all previous structure versions are by standard matrix multiplication. As many data
recorded. If an element changed at time Ti, a new cubes are only sparsely populated and also the
version of this element with valid time [Ti; NOW] amount of changes is assumed to be rather small,
is created in the relational database. The previous this matrix multiplication is not the most efficient
version is updated by assigning the ending time- way for transformation. The graph approach
stamp Ti-1. For creating a new structure element is intended to give a more efficient representa-
at time Ti, the respective data is inserted into the tion. Cell data and transformation functions are
relational database and given the timestamp [Ti; represented by nodes and edges, respectively.
NOW]. Deleting a structure element at timepoint Thus, only populated cells have to be included.
Ti is done by changing the ending timestamp from As each edge stands for a multiplication and each
NOW to Ti-1. It is important to note that no data is node stands for a cell, it is desirable to have the
physically deleted from the relational database. transformation graph minimized, i.e. containing
All elements with the same end of validity the least possible number of nodes and edges. For
build a so called structure version, which repre- independent transformations – that are transforma-
sents a version of the cube valid at a certain point tions which do not affect different versions of the
of time. Structure versions are contiguous, thus same member – it is possible to change the order
there are no holes in the version history of a cube. in which these transformations are executed, thus
A particular version of a structure element may to minimize the graph.
be part of several structure versions, but within The architecture of a prototypic implementa-
a single structure version, only one version of an tion of the COMET Metamodel, called DWT is
element can be valid. shown in Figure 3[REMOVED REF FIELD].
Between different versions of a dimension The whole system is based on the backend da-
member so called transformation functions are tabase, which contains the versioned structure
defined, which allow to transform the assigned information, the transformation functions and the
cell values between different structure versions cell data. DWT is independent from any specific
with a certain weighting factor w. Such a trans- data warehouse system. For each system to be
formation may for instance be the transformation supported, an import and export interface has to
from Austrian Schillings into Euro for all money be implemented. These interfaces are responsible
related members in the fact dimensions, for which for reading/writing structure and cell data from/
new versions have been created in the year 2002. to the particular system. Structure data read from
In this case the factor w would have a value of an external data warehouse system is compared
0.07267. Of course such transformations may be to the last version stored in the backend database
574
Data Warehouse Maintenance, Evolution and Versioning
575
Data Warehouse Maintenance, Evolution and Versioning
576
Data Warehouse Maintenance, Evolution and Versioning
to capture dynamic aspects by representing the members and hierarchical relations. All of the
data warehouse evolution as a special process. The elements on the instance level are timestamped,
main focus is on the maintenance of evolving data schema elements are not evolvable. Furthermore,
warehouse views. Metadata is provided to keep it contains a so called confidence factor, describing
track of the history of changes in the conceptual the reliability of data, for instance if it is source
and logical schema. Consistency rules are defined or mapped data, and a mapping relationship that
guarantee consistency when quality factors have describes the mapping between two versions of a
to be re-evaluated. dimension member. Operations are only defined
on the member level. There are operations for
Approach of sarda creating new members, removing and reclassifying
(i. e. moving) members, and create associations
Sarda (1999) presents a formal model for a between versions of a member.
temporal data warehouse that supports multiple
hierarchies, a symmetric treatment of dimensions Approach of kaas, Pedersen
and measures and many-to-many relationships and rasmussen
among dimension levels. The authors provide a
mapping from their formal temporal ware house Kaas, Pedersen and Rasmussen (2004) present
model to a relational model. History is recorded their approach for supporting schema evolution
for dimension members as well as for relations for star and snowflake schema. In contrast to
between them. other approaches, this methodology takes into
account the special needs of an evolving star or
Approach of ravat and teste snowflake schema using a relational database as
data storage. They provide a rich set of changing
Ravat and Teste (2000) introduce an object- operations, including operations for inserting and
oriented approach to data warehouse modeling. deleting dimensions, categories and dimension
They define a Warehouse Class Extension (the members. For each of the operations, the impact
instances extracted from the sources) as current on existing queries and the complexity of applying
state, a set of historical states, and a set of archived the operation is evaluated. These evaluations are
states for the instances. Whereas historical states compared for the case of an underlying star and
are available on detailed level, archived states can snowflake schema. From these comparisons the
only be queried on an aggregated level. The main authors conclude that a star schema is more robust
focus is laid on modeling of data warehouses. in case of structure evolution. Data transforma-
tion is not captured in this paper, but considered
Approach of body, miquel, as future work.
bedard and tchounikine
Approach of Golfarelli,
Body, Miquel, Bedard and Tchounikine (2003) lechtenbörger, rizzi and vossen
present their approach for handling evolution in
multidimensional structures. As basis for their Golfarelli, Lechtenbörger, Rizzi and Vossen (2004;
approach they define a temporal multidimensional 2006) present their approach for schema version-
model.Based upon this model a set of evolution ing in data warehouses. Based on a graph model
operators is defined. The multidimensional model (called schema graphs) of the data warehouse
comprises the typical elements of a data warehouse schema they present their algebra for schema
structure, i. e. dimensions, levels, dimension modifications. This approach supports version-
577
Data Warehouse Maintenance, Evolution and Versioning
ing, therefore, past versions are not lost. Based constellation, a report showing the historical truth
on those schema versions the authors describe a and a report showing comparable results. This ap-
mechanism to execute cross-version queries, with proach is limited to basic operations on dimension
the help of so called augmented schemas. For cre- members and does not allow to transform cell data
ating such an augmented schema, an old schema between structure versions.
version is enriched with structure elements from
a subsequent version, so that the data belonging Approach of kAlIdo
to the old schema version can be queried as if it
followed the new version. The KALIDO Dynamic Information Warehouse
(2004) supports some aspects of data warehouse
Approach of malinowski and Zimanyi maintenance. Dealing with changes is realized by
the so called Generic Data Modeling. The data
Malinowski and Zimanyi (2006) present an warehouse model consists of three categories of
approach for representing time-varying data in data: the transaction data, describing the activi-
dimensions. Based on their MultiDimER (Ma- ties of the business and the facts associated with
linowsky & Zimanyi, 2004) they present a set them, the business context data, which is the
of temporal extensions that allow conceptual analog to the instances, and the metadata, which
representation of time-varying levels, attributes among others comprises parts of the schema.
and hierarchies. They describe the versioning With evolving the business context data, instance
of levels and hierarchies. When describing time evolution is supported.
varying levels, they actually refer to modeling
changes in the members contained in this level. comparison of Approaches
With respect to hierarchies, the authors distinguish
between temporal levels and non-temporal rela- After having presented the various approaches,
tions between them, temporal levels and temporal Table 2 shows a classification of them with respect
relations between them, and non-temporal levels to the following features:
and temporal relations between them. Based on
these scenarios the authors extend their Multi- 1. Level of Maintenance: Does the approach
DimER metamodel to include the capability of support schema maintenance, instance
expressing these changes. Additionally, means for maintenance or both of them?
transforming MultiDimER into a classical Entity 2. Type of Historization: Does the approach
Relationship model are proposed. As the approach support versioning or evolution?
is more concerned about conceptual modeling of
changes, considerations about dealing with cell Of course, the desired feature combination
data are not included. would be an approach supporting versioning on
schema and instance level, because this offers
Approach of sAP AG the biggest flexibility. On the other hand, it can
be seen that the current commercial approaches
Besides these scientific approaches, there are both support maintenance only on instance level.
also two commercial products including sup- But nevertheless, selection considering these
port for changing structures in data warehouses. two features only may not be sufficient. Table
SAP AG (2000) presents an approach capable of 3 compares some the approaches (two of them
producing four different types of reports: a report quite established and two rather new ones) with
using today’s constellation, a report using an old respect to a set of additional features. The selec-
578
Data Warehouse Maintenance, Evolution and Versioning
Versioning Evolution
Schema and Instance Eder et al., Malinowski et al. Hurtado et al., Kaas et al.
Schema only Golfarelli et al. Blaschka et al., Quix
Instance only SAP AG, Ravat et al., Sarda, Body et al. Kimball, Yang et al, Kalido
tion of approaches for the comparison is based on 5. Formal Temporal Model: Is a formal model
their similarity, i.e. the selected approaches follow for the temporalization provided?
similar principles, which allows to define a set of 6. Changes in Time/Fact dimension: Does the
features applicable to all of them. A plus in a cell approach allow changes in the Time and/or
expresses that the respective approach supports Fact dimension?
the feature. A minus means that the respective 7. Modeling Technique: Is the approach based
feature is not supported by that approach. on a particulare technique for multidimen-
sional modeling, possibly presented by the
1. Valid time for hierarchical relations: Does authors?
the approach support valid time for the rela-
tions between dimension members? related Problems
2. Valid time for dimension members: Does
the approach support valid time for dimen- Besides the classical maintenance requirements
sion members? of keeping managing structural changes in a data
3. Data transformation or multiversion warehouse, maintenance methodologies can also
queries: Does the approach support que- be used to facilitate so called what-if-analysis.
ries spanning several structure versions or Bebel, Wrembel and others (2004, 2007) present
transformation of cell data between structure an approach for the management of multiversion
versions? data warehouses. They differentiate between real
4. Complex Operations: Does the approach versions and alternative versions. The former are
support operations other then insert, delete, used to historicize data warehouse modifications
update (for instance split or merge)? resulting from real world changes. Alternative ver-
Eder
Hurtado et al. Golfarelli et al. Malinowski et al.
et al.
Valid time for hierarchical relations + + + +
Valid time for dimension members + - - +
Data transformation / multiversion queries + - + -
Complex
+ + - -
operations
Formal Temporal Model + + + +
Changes in Time/Fact dimension + - + -
Modelling
- - + +
Technique
579
Data Warehouse Maintenance, Evolution and Versioning
580
Data Warehouse Maintenance, Evolution and Versioning
instance (i.e. dimension members) level. Not only Dynamic Information Warehouse, K. A. L. I. D.
the structure elements themselves, but also the re- O. (2004). A technical overview. Retrieved May
lations between them may change. When keeping 8, 2007 from http://www.kalido.com
track of structure changes, one has also to decide
Eder, J., & Koncilia, C. (2001). Changes of di-
whether to use an evolutionary or versioning ap-
mension data in temporal data warehouses. In
proach. Keeping available prior versions may for
Y. Kambayashi, M. Mohania, & W. Wöß (Eds.),
instance be necessary for legal reasons. Besides
Proceedings of the 3rd International Conference
managing these structural changes, another im-
on Data Warehousing and Knowledge Discovery
portant aspect of data warehouse maintenance is
(pp. 284-293). Heidelberg: Springer.
dealing with the impact of structure changes on
the cell data. Modifications of structure data may Eder, J., Koncilia, C., & Morzy, T. (2002). The
corrupt the structural and/or semantic consistency COMET metamodel for temporal data ware-
of the associated cell data. houses. In A. Pidduck, et al. (Eds.), Proceedings
There are several approaches dealing with of the 14th International Conference on Advanced
the data warehouse maintenance problem. One Information Systems Engineering (pp. 83-99).
of them, namely the COMET metamodel for Heidelberg: Springer
Temporal data warehouses, is presented in some
Eder, J., Koncilia, C., & Wiggisser, K. (2006).
details. Several other approaches addressing the
Maintaining temporal warehouse models. In L.
data warehouse maintenance problem are shortly
Xu & A. M. Tjoa (Eds.), Proceedings of the IFIP
introduced. After their introduction, some of the
International Conference on Research and Practi-
presented approaches are compared with respect
cal Issues of Enterprise Information Systems (pp.
to several features. Approaches dealing with
21-30). Heidelberg: Springer
problems related to data warehouse maintenance
are presented to mark the boundaries of this re- Eder, J., & Wiggisser, K. (2008). Modeling trans-
search area. formations between versions of a temporal data
warehouse. In Proceedings of ER 2008 Workshops.
Heidelberg: Springer
reFerences
Eder, J., & Wiggisser, K. (2009). Data warehouse
Bellahsene, Z. (2002). Schema evolution in data maintenance, evolution and versioning. In L.
warehouses. Knowledge and Information Systems, Liu & T. Özsu (Ed.), Encyclopedia of Database
4(3), 283–304. doi:10.1007/s101150200008 Systems. Heidelberg: Springer.
Blaschka, M., Sapia, C., & Höfling, G. (1999). On Froeschl, K., Yamada, T., & Kudrna, R. (2002).
schema evolution in multidimensional databases. Industrial statistics revisited: From footnotes to
In M. Mohania & A. M. Tjoa (Eds.), Proceedings meta-information management. Österreichische
of the 1st International Conference on Data Ware- Zeitschrift für Statistik, 31(1), 9-34.
housing and Knowledge Discovery (pp. 153-164). Golfarelli, M., Lechtenbörger, J., Rizzi, S., &
Heidelberg: Springer. Vossen, G. (2004). Schema versioning in data
Body, M., Miquel, M., Bedard, Y., & Tchounikine, warehouses. In S. Wang et al. (Eds.), Conceptual
A. (2003) Handling evolutions in multidimen- Modeling for Advanced Application Domains,
sional structures. In U. Dayal, K. Ramamritham, & ER 2004 Workshops (pp. 415-428). Heidelberg:
T.M. Vijayaraman (Eds.), Proceedings of the 19th Springer.
International Conference on Data Engineering
(pp. 581-591). New York: IEEE Computer Society.
581
Data Warehouse Maintenance, Evolution and Versioning
Golfarelli, M., Lechtenbörger, J., Rizzi, S., & Ravat, F., & Teste, O. (2000). A temporal object-
Vossen, G. (2006). Schema versioning in data oriented data warehouse model. In M. Ibrahim,
warehouses: Enabling cross-version querying J. Küng, & N. Revell (Eds.), Proceedings of the
via schema augmentation. Data & Knowledge International conference on Database and Expert
Engineering, 59(2), 435–459. doi:10.1016/j. Systems Applications (pp. 583-592). Heidelberg:
datak.2005.09.004 Springer
Hurtado, C., Mendelzon, A., & Vaisman, A. Rizzi, S., & Golfarelli, M. (2006). What time is it in
(1999). Updating OLAP Dimensions. In Proceed- the data warehouse? In A. Tjoa & J. Trujillo (Eds.),
ings of the ACM Second International Workshop Proceedings of the 8th International Conference
on Data Warehousing and OLAP (pp. 60-66), on Data Warehousing and Knwoledge Discovery,
New York: ACM Press. DaWaK 2006 (pp. 134-144). Heidelberg: Springer
Inmon, W. (2005) Building the data warehouse SAP. (2000). Multi-dimensional Modeling with
(4th ed.) New York: John Wiley & Sons. BW: ASAP for BW Accelerator. Retrieved May
8, 2007 from http://sap.com
Kaas, C., Pedersen, T. B., & Rasmussen, B. (2004).
Schema evolution for stars and snowflakes. In Sarda, N. (1999). Temporal issues in data ware-
Proceedings of the 6th International Conference house systems. In Proceedings of the Interna-
on Enterprise Information Systems (pp. 425-433). tional Symposium on Database Applications in
Non-traditional Environments (pp. 27-34). New
Kimball, R. (1996). Slowly changing dimensions.
York: IEEE Computer Society
DBMS Magazine, 9(4), 14.
Shahzad, M. K., Nasir, J. A., & Pasha, M. A. (2005).
Kimball, R., & Ross, M. (2002). The data ware-
CEV-DW: Creation and evolution of versions in
house toolkit. (2nd ed.) New York: John Wiley
data warehouse. Asian Journal of Information
& Sons.
Technology, 4(10), 910–917.
Malinowski, E., & Zimányi, E. (2004). OLAP
Vaisman, A., & Mendelzon, A. (2001). A tempo-
hierarchies: A conceptual perspective. In J. Persson
ral query language for OLAP: Implementation
& J. Stirna (Eds.), Proceedings of the 16th Inter-
and case study. In G. Ghelli & G. Grahne (Eds.),
national Conference on Advanced Information
Proceedings of the 8th International Workshop
Systems Engineering (pp. 477-491). Heidelberg:
on Database Programing Languages (pp. 78-96).
Springer.
Heidelberg: Springer
Malinowski, E., & Zimányi, E. (2006). A con-
Wrembel, R., & Bebel, B. (2007). Metadata
ceptual solution for representing time in data
management in a multiversion data warehouse.
warehouse dimensions. In M. Stumptner, S.
Journal on Data Semantics, 8, 118–157.
Hartmann, & Y. Kiyoki (Eds.), Proceedings of
the 3rd Asia-Pacific Conference on Conceptual Yang, J., & Widom, J. (1998). Maintaining tempo-
Modelling (pp 45-54). Newcastle: CRPIT ral views over non-temporal information sources
for data warehousing. In H-J. Schenk, F. Saltor,
Quix, C. (1999). Repository support for data
I. Ramos, & G. Alonso (Eds.), Proceedings of
warehouse evolution. In S. Gatziu et al. (Eds.),
the 1998 International Conference on Extending
Proceedings of the 1st International Workshop on
Database Technology (pp. 389-403). Heidelberg:
Design and Management of Data Warehouses (p.
Springer
4). CEUS-WS.org
582
Data Warehouse Maintenance, Evolution and Versioning
This work was previously published in Data Warehousing Design and Advanced Engineering Applications: Methods for Com-
plex Construction, edited by Ladjel Bellatreche, pp. 171-188, copyright 2010 by Information Science Reference (an imprint
of IGI Global).
583
584
Chapter 3.2
Information Supply Chains:
Restructuring Relationships,
Chains, and Networks
Hina Arora
Arizona State University, USA
T. S. Raghu
Arizona State University, USA
Ajay Vinze
Arizona State University, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Information Supply Chains
chain as well as risks external to the supply chain”. demand surge. In contrast, the Federal Govern-
Efficient supply chains should be responsive to ment relied on redundant capacity maintained in
demand surges and supply disruptions resulting the Strategic Petroleum Reserve to mitigate the
from internal and external vulnerabilities. Demand supply disruptions caused by Hurricane Katrina
surges and supply disruptions are characterized by in the Gulf of Mexico (Gross, 2005).
the probability of their occurrence, the magnitude Responding to demand surges and supply dis-
of the impact, and the ability to cope with them. ruptions therefore requires efficient redistribution
Firms can respond to these vulnerabilities by ei- and reallocation of resources based on real-time
ther, reallocating and redirecting existing capacity decision-making through information sharing and
(this involves prioritizing among customers), or, collaboration. In other words, there is a need for
maintaining redundant capacity (this involves an information-centric view of supply chains that
an inherent trade off between “just-in-time” lean integrates information gathering, collaboration
supply chains and maintaining inventory and and decision making in order to support supply
capacity slack “just-in-case” (Martha and Sub- chain operations and create value for custom-
bakrishna, 2002)). ers. This gives rise to the notion of Information
Mitigating supply chain vulnerabilities re- Supply Chains (ISCs). There are three drivers
quires complex coordination mechanisms among for ISCs, each with unique perspectives to help
a network of entities, systems and organizations. with resiliency in the supply chain. The first is
Various points of contact and information hand- an organizational perspective that examines the
offs leave open the possibility of errors. Effective differences and similarities between traditional
supply chain managers react to such disruptive supply chains and information supply chains in
events by making decisions in real-time (Raghu order to gain a better understanding of informa-
and Vinze, 2004). This requires high levels of tion supply chain requirements. The second is
information sharing, real-time responsiveness, a process orientation that considers the unique
and collaboration. informational challenges that arise in dynamic
Hurricane Katrina provided evidence of the decision-making environments such as those
importance of efficient decision-making, collabo- caused by supply chain disruptions. The third is
ration and information sharing in responding to a technological perspective that investigates the
demand surges and supply disruptions. Wal-Mart use of autonomic computing principles in building
was able to move supplies to areas hit by hurri- a resilient information-based supply chain. The
cane Katrina because it had an emergency opera- next three sections take a closer look at each of
tions center that was staffed around the clock by these orientations in turn. Section 5 presents an
decision-makers who had access to all of the com- illustrative example of how autonomic comput-
pany’s systems (Worthen, 2005). District managers ing principles can be used to build an ISC in the
could call in to request supplies, and the decision context of a healthcare supply chain that has been
makers, with the help of the logistics department disrupted by an Influenza pandemic.
would decide on how to relocate supplies to the
affected area. They also relied on historical point-
of-purchase-data from other hurricanes to forecast InFormAtIon suPPly cHAIns
consumer demand before and after the hurricane,
and used this data to stockpile emergency supplies A supply chain is a network of material, infor-
in distribution centers around the affected areas. mation and cash flows between suppliers (who
Wal-Mart therefore mostly relied on reallocat- provide raw material), manufacturers (who convert
ing and redirecting existing capacity to meet the raw material to final products), distributors (who
585
Information Supply Chains
transport and deliver products to customers), and We therefore define information supply
customers. While material flows from suppliers chains (ISC) as a collection of information and
to the customers, information and cash flows in communication technologies to provide a secure
the opposite direction. integrated decisional environment that enables
Traditional supply chains take an inventory- business partners to collectively sense and respond
based approach, where information is treated as to opportunities and challenges in a networked
a supporting element in the value-adding process, eco-system.
not a source of value itself. The primary focus ISCs differ from traditional supply chains in
is on reducing material-flow lead-time delays. many respects (based on the concept of virtual
However, volatile, unpredictable demand, and value chains, Rayport and Sviolka, 1995). First,
complex coordination mechanisms in today’s ISC shifts away from the traditional supply chain
marketplace is driving the need for a high level model of a linear sequence of activities with de-
of information sharing, real-time responsive- fined points of inputs and outputs, to a matrix of
ness and collaboration. It is therefore becoming potential inputs and outputs that can be accessed
increasingly important to take an information- and distributed through a wide variety of chan-
based approach that concentrates on reducing nels. Second, ISCs use digital assets that are not
information-flow lead-time delays in addition to used up in their consumption. Hence, companies
material-flow lead-time delays. that create value with digital assets may be able
ISCs take an information-centric view of sup- to re-harvest them through a potentially infinite
ply chains, where information is not only used number of transactions. Third, ISCs enable
to support supply chain operations, but also to companies to achieve low unit costs of products
create value for customers. Creating value in the and services thus redefining economies of scale.
ISC involves gathering, organizing, selecting, Fourth, ISCs can help provide value across many
synthesizing and distributing information. In so different and disparate markets. Fifth, transaction
doing, ISCs should provide secure, confidential, costs are much lower in ISCs. Finally, ISCs enable
reliable and real-time access to heterogeneous companies to be market sensitive (demand-driven
information, while ensuring that the right informa- rather than forecast-driven). The differences are
tion is delivered to the intended recipients at the summarized in Table 1.
right time. In other words, security, information These differences not withstanding, ISCs
quality and information lead-time delays are criti- have a lot in common with traditional supply
cal performance determinants in ISCs. chains. They deal with demand and supply (of
Table 1. Differences between traditional supply chains and information supply chains
586
Information Supply Chains
information), raw goods (data), finished goods by monitoring for attacks), but also produce value
(synthesized information), capacity limitations for the customers (say, by alerting the user of an
(hardware and human cognitive limitations), update or system shutdown for maintenance). As
fill-rates, lead-time delays, costs (of searching should be evident from this simple example, in
and synthesizing information), quality of goods, order to create value, the ISC should be capable
and supply chain disruptions. of gathering information from multiple sources,
Given the above characteristics of ISCs, it can compiling complex data, and making appropriate
be seen that they would be most relevant in sec- recommendations. In the case of IT networks,
tors such as Services, Finance, IT and Healthcare. this was traditionally done by the system admin-
Table 2 compares ISC characteristics across these istrator. However, due to bounded rationality
three domains from the organization, process and and cognitive limitations, human administrators
technology perspectives. Consider an IT network can deal with only simple decision making tasks
for instance. The network could be made up of and small amounts of information. In fact, this
several workstations, servers, routers and print- is true of handling disruptions in other dynamic
ers. Workstation users in this scenario are not decision-making environments such as finance
only users of information (such as checking the and healthcare as well. Concepts across these three
print queue, or looking for an idle machine to run varied domains share commonalities in decision-
a complex job), but also creators of information making processes as each of them demonstrate the
(such as a submitted print job). Such an ISC will need for dynamic decision-making.
not only use information to remain functional (say,
Characteristic Domain
IT Finance Healthcare
Stakeholders System administrators, users Stock markets, shareholders Healthcare providers, patients
Information Character- Defined standards, high volume Relatively well defined stan- Heterogeneous standards or lack of
istics of information, real-time or batch dards, high volume of infor- them, high volume of information,
processing mation, real-time information real-time information processing
processing
Business Objectives System availability, reliability, applica- Timely transaction execution, System availability, reliability,
tion performance, security real-time information feed and security, confidentiality, real-time
delivery, security, reduce trading information feed and delivery
cost, maximize returns
Constraints Cognitive limitations of system admin- Information processing, discern- Cognitive limitations of providers,
istrators, limited resources ing macro economic trends and limited resources
analyst information
Resources CPU availability, memory availability, Stock prices, options, capital, Beds, medical staff, medicines, vacci-
intrusion monitoring data credits nations, epidemic surveillance data
Information node char- Peer-to-peer or client-server con- Peer-to-peer Peer-to-peer or client-server con-
acteristic figuration figuration
Domain specific issues Gathering and synthesizing requisite Trading costs Gathering and synthesizing requisite
information, false positives and false information, false positives and false
negatives negatives
Business Value of Auto- Freeing administrators of mundane Synthesizing and responding Enabling collaboration among pro-
nomic Approach tasks, facilitating intrusion detection, to market trends on real-time viders, facilitating epidemic con-
improved services for users. basis trol, improved quality of care for
patients.
587
Information Supply Chains
588
Information Supply Chains
problem can also change autonomously due to Three different decision support mechanisms
external macro-economic trends. In other words, are therefore prevalent in the literature for dynamic
the value of the portfolio is dependent both on the decision making (Gonzalez, 2005; Huguenard and
decisions of the investor, and external economic Ballou, 2006): (a) outcome feedback, in which
trends not in the investor’s control. And finally, decision makers are provided with feedback on
decisions have to be made in real time in order the performance results of their decisions, (b)
to be most effective. cognitive feedback, in which decision makers are
The limitations of bounded rationality are even given instructions on how to perform the decision
more pronounced in dynamic decision-making task, and (c) feedforward, where decision makers
tasks. Decision makers are often unable to compre- are provided with the models and tools to perform
hend the side effects of their actions thereby causing “what-if” analysis of potential decisions. It has
performance to degrade. As Radner (2000) says, been shown that outcome feedback alone is an
“…in any even semi-realistic decision problem, ineffective form of decision support (Lerch and
the DM does not know all of the relevant logical Harter, 2001; Gonzalez, 2005). However, cogni-
implications of what he knows. This phenomenon tive feedback and feedforward in combination with
is sometimes called the failure of logical omni- outcome feedback resulted in better performance
science”. Feedback delays and poor feedback qual- (Sengupta and Abdel-Hamid, 1993).
ity further exacerbate performance. The real-time Outcome feedback requires data gathering and
nature of decisions also introduces an element of analysis capabilities to provide useful information
stress into dynamic decision-making, and in order to the decision makers. Feedforward requires
to cope with this stress, the decision maker reverts simulation and modeling capabilities to provide
to simpler, more task oriented modes of operation, optimal solution alternatives. Cognitive feedback
thereby negatively influencing decision perfor- requires the ability to learn from experience and
mance (Brehmer, 1992). Situational awareness in come up with rules of thumb or action policies.
a dynamic decision making environment requires The effective and efficient functioning of an ISC
two overlapping cognitive activities (Lerch and therefore requires the capability of monitoring
Harter, 2001) that compete for the decision maker’s large amounts of data (knowledge synthesis),
attentional resources: (a) monitoring or tracking analyzing it (situational analysis), planning a
of key system variables for information regarding course of action and executing or recommend-
present and expected conditions, and (b) control or ing it (conflict resolution). The ISC should be
the generation, evaluation and selection of alterna- self-configuring, that is, capable of altering its
tive actions that can change the system. Control problem-determination and conflict resolution
can be achieved through feedback (selecting an solutions in the face of changing business policies.
action based on current system information), or And, it should be self-optimizing, that is, capable
feedforward (selecting actions based on a predicted of providing the optimal solution in the face of
future state of the system). While feedforward changing objectives and constraints.
can improve decision quality, decision makers
are more likely to use available feedback control
than feedforward, since the former requires less AutonomIc comPutInG
cognitive effort. Monitoring and feedback can be enAblement For Iscs
improved through improved collection, processing
and delivery of information. Feedforward can be It should be clear from the previous section, that
improved through modeling and simulation aids building ISCs requires the technology enablement
that project future states of the system. of supply chains. Essentially, there is a need for
589
Information Supply Chains
an information-based view of supply chains with and/or synthesize the quantities stated in the condi-
the capability of monitoring large amounts of data, tion, and execute the stated actions whenever the
analyzing it, planning a course of action based condition is satisfied. Goal policies describe the
on stored knowledge and high level policies, and conditions to be attained without specifying how
executing or recommending a course of action. As to attain them. Goal policies are more powerful
we have seen, these needs play out across domains than action policies because they can be speci-
such as emergency response, IT and finance. The fied without requiring detailed knowledge of that
Autonomic Computing paradigm addresses all of element’s inner workings. Autonomic elements
these requirements, and can be used to implement employing goal policies must possess sufficient
ISCs in all of these domains. modeling and planning capabilities to translate
Autonomic computing has been suggested as goals into actions. Utility policies specify the
a new paradigm to deal with the ever-increasing relative desirability of alternative states either by
complexity in today’s systems (Kephart and Chess, assigning a numerical value or a partial or total
2003). Autonomic systems are composed of self- ordering of the possible states. Utility functions
managed elements. Self-management requires that are even more powerful than goal policies because
the system be self-configuring (capable of goal- they automatically determine the most valuable
driven self-assembly with the help of a central goal in any given situation. Autonomic elements
registry), self-optimizing (especially with respect employing utility policies must possess sufficient
to resource allocation), self-healing (the system modeling and planning capabilities to translate
as a whole should be capable of dealing with the utilities into actions.
failure of any constituent part) and self-protecting The AM also assumes the existence of a com-
(against undesirable system behavior due to bugs mon knowledge base that it continuously uses and
or unanticipated conditions, and against system modifies according to its experiences and policies
penetration by attackers). Each autonomic element (Kephart and Walsh, 2004). For instance, when
consists of an autonomic manager and a set of considering utility policies, the decision problem
managed components. The autonomic manager is essentially one of choosing values of decision
continuously monitors the managed components, variables so as to maximize the utility function.
analyzes the data they generate, plans actions if Since the relation between the decision variables
required, and executes them (the MAPE model) and process outcomes is oftentimes dynamic and
in order to achieve the self-management aspects non-stationary, the agent continuously learns about
of the system. the process outcomes and updates its knowledge
The AM relies on high-level system policies to repository.
guide its goals (White et al, 2004). A policy is a rep- Autonomic elements can therefore be used
resentation, in a standard external form, of desired to gather data, synthesize information, and dis-
behaviors or constraints on behavior. High-level tribute it. The elements rely on their knowledge
system policies refer to high-level objectives set base and high-level policies to decide on what to
by the administrators for the autonomic systems, gather, how to synthesize, and whom to distribute
while leaving the task of how they are achieved to. Every element can therefore be a consumer
to the autonomic managers. At least three forms and a provider of information in the ISC. While
of policy have been identified: action policies, Autonomic Computing has been used in the past
goal policies and utility policies (Kephart and to manage resources in the IT context, it can be
Walsh, 2004). Action policies are typically of the extended to other domains to manage physical
form IF (Condition) THEN (Action). Autonomic resources as illustrated in the next section in the
elements employing these policies must measure healthcare context.
590
Information Supply Chains
An Isc cAse study In ing number of human casualties. This can result in
PublIc HeAltH a demand surge and associated scarcity of health-
care resources such as beds, staffing, supplies and
This section presents an illustrative example of equipment due to demand surges. Surge capacity
how autonomic computing principles can be used is a health care system’s ability to expand quickly
to build an ISC in the context of a healthcare sup- beyond normal services to meet an increased
ply chain that has been disrupted by an Influenza demand. Cooperating through mutual aid at the
pandemic. regional level can help improve surge capacity.
The Healthcare System can be characterized This requires real-time collaboration among vari-
as a collaborative endeavor between physicians, ous entities (such as hospitals and pharmacies) in
patients, healthcare organizations, insurance the Healthcare ISC. However, the complexity of
companies, laboratories and public health that are the resource redistribution and allocation problem
intricately connected in a healthcare information can quickly overwhelm human decision makers.
supply chain (Figure 1). While the IT ISC deals This is because, resource allocation in this context
with IT resources such as memory and CPU usage, results in a dynamic decision making environ-
the healthcare ISC deals with healthcare resources ment. A series of decisions regarding vaccination
such as beds, medicines, vaccinations, and hospital policy, anti-viral allocation and patient priorities
staff. Data in the healthcare ISC typically pertains need to be made. The decisions are interdependent
to the patient in terms of health records, medical in that, the allocation of resources and attention
images etc. The healthcare ISC can create value to one population affects the time and resources
for the patients by ensuring patient data is avail- spent on the remaining populations. This in turn
able to the right entity at the right time, monitoring determines the extent of the pandemic. The state
for epidemics, and optimizing resource allocation of the decision problem can also change autono-
during an epidemic. mously due to virus mutations and other natural
A large-scale public health emergency such as factors. In other words, the state of the pandemic
an epidemic outbreak can result in an overwhelm- at any given moment is dependent both on the
Figure 1. A typical Healthcare ISC. Primary data users are in green, secondary data users are in blue,
and tertiary data users are in orange
Consulting Physician
ID-C-H-R-P-B-I
Clinical Laboratory
ID-R-B-I
591
Information Supply Chains
characteristics of the pandemic, and the decisions the scarcity and improve surge capacity. Therefore,
made by the decision makers. And finally, deci- on encountering a resource shortage, the healthcare
sions have to be made in real time in order to be entities contact an Autonomic Manager (level 3)
most effective. Application of self-management to optimally re-distribute resources between enti-
and self-optimization concepts can greatly relieve ties at the regional level. The Autonomic Manager
the cognitive challenges faced by decision makers uses a “utility policy”, to maximize utilities across
in this context. the various healthcare entities, subject to resource
A prototype system based on these ideas was and cost constraints.
built (Arora, Raghu, Vinze, 2006). Autonomic The Autonomic Toolkit2 is used to implement
principles of self-optimization and self-configu- the Autonomic Manager functionality. Each re-
ration were used to address demand surges in the gional healthcare entity communicates its resource
context of healthcare information supply chains requirements (or excesses) to the Autonomic
that have been disrupted by an epidemic. The Manager in the form of a Common Base Event
system was built using a multi-agent systems (CBE). Effective analysis of event data requires
platform and the Autonomic Computing Toolkit, the data to be reported in a consistent manner.
to illustrate how an autonomic computing ap- Since the data is typically heterogeneous and
proach can facilitate resource allocation decisions distributed, the only way to reliably interpret the
in responding to public health emergencies. The data, correlate it with events from other diverse
multi-agent toolkit, Repast1, was used to simulate sources and respond effectively is to use a com-
a Smallpox outbreak. The Autonomic Toolkit mon event format with a canonical vocabulary.
was used to implement the Autonomic Manager This is accomplished by modeling events using the
functionality. Regional healthcare entities com- CBE, which standardizes the format and content
municate their resource requirements (or excesses) of events and provides the foundation for auto-
to the Autonomic Manager. This information is nomic computing. A CBE describes a situation
analyzed for resource shortages and excesses. A that has occurred. Table 3 shows an example of
utility-based constrained optimization problem, some parts of a Common Base Event that could
constrained by high-level budget and resource be used to report an epidemic outbreak and as-
policies, is used to find the optimal resource sociated resource availability.
redistribution solution. Custom resource models are defined in order
Autonomic computing principles are used to to provide the Autonomic Management Engine
build an ISC in this context as shown in Figure 2.
A smallpox outbreak occurs within a population Figure 2. Autonomic resource allocation proto-
(level 1). Those susceptible to the disease get type system
infected. As the epidemic spreads, casualties start
trickling into the care entities (level 2). Timely
intervention in the form of immunization (to re-
duce the number of susceptibles), quarantine (to
reduce the number of contacts with the infected)
and treatment (to help the infected recover) can
help contain the epidemic. However, the exponen-
tial nature of the spread of epidemics can cause
an overwhelming number of casualties leading
to a scarcity of containment resources. Pooling
resources at the regional level could help alleviate
592
Information Supply Chains
(AME) the requisite information to manage perishable. Third, resources are often required in
healthcare resources. Each regional healthcare bundles. For instance, transferring medicines from
entity communicates its resource requirements one region to another requires trucks and drivers,
(or excesses) to the Autonomic Manager. The just as administering vaccinations requires nurses.
Autonomic Manager uses this information to These additional constraints result in analytically
come up with an optimal allocation mechanism. intractable problems, making it difficult to come
This can be a complex proposition due to a num- up with perfectly optimal solutions under all pos-
ber of reasons. First, resource requirements are sible objectives and constraints. Model execution
often time-bound. For instance, vaccinations are is therefore done in two phases – training and re-
typically effective only in the susceptible stage. finement. During the training phase, agents make
Second, resource availability may also be time- random decision choices and observe process
bound. For instance, resources such as medicines outcomes. This builds a repository of informa-
and vaccinations are consumable, and may also be tion (knowledge base) over time and forms the
593
Information Supply Chains
594
Information Supply Chains
Huguenard, B. R., & Ballou, D. J. (2006). Dis- Rice, J. B., & Caniato, F. (2003, September/Oc-
patcher: A theory-based design for study of real- tober). Building a secure and resilient supply net-
time dynamic decision-making. Proceedings of work. Supply Chain Management Review, 22–30.
the 2006 Southern Association for Information
Sengupta, K., & Abdel-Hamid, T. K. (1993).
Systems Conference (pp. 117-122).
Alternative conceptions of feedback in dynamic
Kephart, J. O., & Chess, D. M. (2003). The vi- decision environments: An experimental inves-
sion of autonomic computing. IEEE Computer, tigation. Management Science, 39(4), 411–428.
36(1), 41–50. doi:10.1287/mnsc.39.4.411
Kephart, J. O., & Walsh, W. E. (2004). An artificial Shim, J. P., Warkentin, M., Courtney, J. F., Power,
intelligence perspective on autonomic computing D. J., Sharda, R., & Carlsson, C. (2002). Past,
policies. Fifth IEEE International Workshop on present, and future of decision support technol-
Policies for Distributed Systems and Networks ogy. Decision Support Systems, 33(2), 111–126.
(pp. 3-12). doi:10.1016/S0167-9236(01)00139-7
Lerch, F. J., & Harter, D. E. (2001). Cognitive Simon, H. (1960). The new science of management
support for real-time dynamic decision making. decision. New York: Harper and Row.
Information Systems Research, 12(1), 63–82.
Sprague, R. H. (1980). A framework for the
doi:10.1287/isre.12.1.63.9717
development of decision support systems. MIS
Martha, J., & Subbakrishna, J. S. (2002, Sep- Quarterly, 4(4), 1–26. doi:10.2307/248957
tember/October). Targeting a just-in-case supply
White, S. R., Hanson, J. E., Whalley, I., Chess,
chain for the inevitable next disaster. Supply Chain
D. M., & Kephart, J. O. (2004). An architectural
Management Review (pp. 18-23).
approach to autonomic computing. IEEE Pro-
Mendonca, D. (2007). Decision support for impro- ceedings of the International Conference On
visation in response to extreme events: Learning Autonomic Computing.
from the response to the 2001 World Trade Center
Worthen, B. (2005). How Wal-Mart beat feds
attack. Decision Support Systems, 43, 952–967.
to New Orleans. CIO Magazine. Retrieved on
doi:10.1016/j.dss.2005.05.025
November 1, 2005, from http://www.cio.com/
Radner, R. (2000). Costly and bounded ratio- archive/110105/tl_katrina.html?CID=13532
nality in individual and team decision-making.
Industrial and Corporate Change, 9(4), 623–658.
doi:10.1093/icc/9.4.623
endnotes
Raghu, T. S., & Vinze, A. (2004, September).
Collaborative self-configuration and learning in
1
http://repast.sourceforge.net/
autonomic computing systems. IBM Proposal.
2
http://www-128.ibm.com/developerworks/
autonomic/overview.html
Rayport, J. F., & Sviokla, J. J. (1995). Exploiting
the virtual value chain. Harvard Business Review.
This work was previously published in Always-On Enterprise Information Systems for Business Continuance: Technologies for
Reliable and Scalable Operations, edited by Nijaz Bajgoric, pp. 205-217, copyright 2010 by Information Science Reference
(an imprint of IGI Global).
595
596
Chapter 3.3
Benefits of Information
Technology Implementations
for Supply Chain Management:
An Explorative Study of
Progressive Indian Companies
Prashant R. Nair
Amrita University, Coimbatore, India
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Benefits of Information Technology Implementations for Supply Chain Management
597
Benefits of Information Technology Implementations for Supply Chain Management
decreased due to the increasing rate of technolo- cause its value to supply chain members was not
gies. In the integrated supply chain model (Fig.1), clearly understood. IT infrastructure capabilities
bi-directional arrow reflects the accommodation provide a competitive positioning of business ini-
of reverse material and information feedback tiatives like cycle-time reduction and implemen-
flows. The manager also needs to understand that tation of redesigned cross-functional processes.
information technology is more than just comput- Three factors have strongly impacted this
ers. It also includes computer data recognition change in the importance of information. First,
equipment, communication technologies, factory satisfying or rather pleasing customers has become
automation, hardware, and services. something of a corporate obsession. Serving the
customer in the best, most efficient, and effective
manner has become critical. Second, information
is a crucial factor in the managers’ abilities to re-
InFormAtIon tecHnoloGy
duce inventory and human resource requirement
As An enAbler oF suPPly
to a competitive level. Information flow plays a
cHAIn mAnAGement
crucial role in strategic planning.
Information sharing between partners in the
Prior to the 1980s, information flow between func-
supply chain is also critical and these integration
tional areas within an organization and between
attempts are accompanied by IT initiatives. Such
supply chain member partners, were paper-based.
IT initiatives include:
This paper-based transaction and communication
is slow. During this period, information was often
• use of bar-coding in logistics systems;
overlooked as a critical competitive resource, be-
598
Benefits of Information Technology Implementations for Supply Chain Management
Early studies on the impact of Electronic IT in SCM enables great opportunities, ranging
Data Interchange (EDI) on Just-in-Time (JIT) from direct operational benefits to the creation of
shipments in the automobile industry showed strategic advantage. It changes industry structures
significant earnings with lowered shipment errors and even the rules of competition. IT is key in
(Srinivasan, 1994). supporting companies creating strategic advan-
In the seven principles of SCM, Anderson
tage by enabling centralized strategic-planning
(1996) pointed out that it is necessary to develop
with day-to-day centralized operations. In fact,
a supply chain-wide technology strategy that sup-
supply chain management tends to become more
ports multiple levels of decision-making and gives
market-oriented because of IT usage.
a clear view of the flow of products, services, and
Cisco reported savings of $500 million by re-
information. For this, an IT system should integrate
capabilities of three essential kinds. structuring its internal operations and integrating
For the short term, the system must be able processes with suppliers and customers with the
to handle day-to-day transactions and electronic help of web-based tools (Berger, 2009). Wal-Mart
commerce across the supply chain and thus help and Proctor & Gamble (P&G) have successfully
align supply and demand by sharing information demonstrated how information sharing can be
on orders and daily scheduling. From a mid-term utilized for mutual advantage. Through sound
perspective, the system must facilitate planning information technologies, Wal-Mart shares point
and decision-making; supporting the demand & of sale information from its many retail outlets
shipment planning and master production schedul- directly with P&G and other major suppliers
ing needed to allocate resources efficiently. To add (Anderson, 1996).
long-term value, the system must enable strategic Celestica, one of the world’s largest electronic
analysis by providing tools such as an integrated manufacturing services companies, has applied
network model, which synthesizes data for use a web-based IT tool to regulate its global supply
in high-level “what-if” scenario planning, to help base (Shore, 2001). IT has helped Celestica to
managers evaluate plants, distribution centers, improve its responsiveness to customers, thus
suppliers, and third-party service alternatives. helping its customer, Dell to maintain its delivery
The functional roles of IT in SCM have been promise to end-users.
outlined as follows (Auramo, 2005):
cHAllenGes In ImPlementInG
obJectIves And beneFIts oF InFormAtIon tecHnoloGy In
InFormAtIon tecHnoloGy In suPPly cHAIn mAnAGement
suPPly cHAIn mAnAGement
Any company that has undertaken the mission of
The objectives of IT in SCM are (Simchi-Levi, implementing an integrated supply chain man-
2003):
agement strategy with the use of IT tools, knows
that one of the greatest challenges that it faces is
599
Benefits of Information Technology Implementations for Supply Chain Management
the significant change in internal culture that is sion, such clarity in global distribution remains
required to make the supply chain redesign suc- largely restricted to major multinationals with deep
cessful. It is not an easy thing to re-condition people pockets and volumes large enough to justify the
to accept change, especially in organizations, hefty initial investment in IT, which can run into
where a certain mindset has prevailed for many millions of dollars.
years. However difficult it may be to accomplish, Towill (1997) states that “to survive, let alone
change can be implemented successfully when win, a company must be part of one or more sup-
directed by a strong and knowledgeable leader, ply chains producing world class performance.”
who understands the tools available for achieving Hence, companies need to work together and
positive change, as well as their role in initiating optimize the complete pipeline by establishing a
and sustaining these changes. seamless supply chain to maximize their market
Integrating new applications with existing and share. Significant and radical improvements in
legacy systems could also pose problems. Incom- individual business performance can be realized
patible systems at buyer and vendor facilities are only with the support of this holistic chain concept.
another management challenge to tackle. Sharing Process manufacturers and IT system vendors are
of data with diverse stakeholders like suppliers working to develop a filter to sift through the bar-
and customers, filtering, and mining data gener- rage of data from process control systems to move
ated and thereby finding “business” value of the important information to higher level IT systems.
data are other issues.
Disconnected enterprise systems create data
redundancy, errors and can lead to costly busi- exIstInG InFormAtIon
ness inefficiencies. Poor coordination between tecHnoloGy tools And
enterprise systems leads to flawed production APPlIcAtIons In suPPly
plans, increased supply chain pressure, and poor cHAIn mAnAGement
customer service. Lack of visibility of orders,
schedules, and shipments can lead to costly ad- electronic data Interchange (edI)
ministrative decision-making processes.
According to Macleod (1994), supply chain Introduced in the 1970s and popularized in the
managers increasingly want to automate all of the 1980s, Electronic Data Interchange (EDI) tech-
supply chain, from forecasting to distribution, and nology has been widely used by firms in supply
to link every element of the chain. More and more chains to facilitate transactions and information
companies want an integrated solution to enable exchanges. EDI is defined as computer-to-com-
them to see the entire supply chain at once. For puter exchange of structured data for automatic
instance, they want to know that if they drill down processing. EDI is used by supply chain partners
to forecast, they can see the demand history, which to exchange essential information necessary for
is a combination of data that has come from sales the effective running of their businesses. These
order processing, inventory management, and the structural links are usually set up between organi-
warehousing system. zations that have a long-term trading relationship.
According to Van Oldenborgh (1994), the abil- For example, some multiple retailers will supply
ity to reduce human intervention along the entire electronic point of sale (EPOS) data directly to
length of the supply chain can help dramatically suppliers, which in turn triggers replenishment of
in cutting logistics costs and boosting customer the item sold. Therefore, the consequence of this
satisfaction. Unfortunately, for many midsize type of strong link is that those suppliers will be
companies in these times of economic reces- able to build a historical sales pattern, which will
600
Benefits of Information Technology Implementations for Supply Chain Management
assist their own demand forecasting activities. EDI all its stores. These scanners updated inventory
also provides timely and accurate information numbers for individual items at point of sale and
about customers’ sales. Moreover, it is utilized enabled headquarters to easily aggregate sales
for sending invoices, bills of lading, confirmation and inventory data at its centralized IT depart-
of dispatch, shipping details, and any information ment. Later in 1987, a satellite communications
between supply chain partners (Rushton, 2000). network installation linked all the stores with
The benefits of EDI are quick process to informa- the headquarters with real-time inventory data
tion, better customer service, reduced paper work, (Johnson, 2002).
increased productivity, improved tracing and
expediting, cost efficiency, and improved billing. enterprise resource
With EDI, supply chain partners can overcome Planning (erP) systems
the distortions and exaggeration in supply and
demand information by improving technologies Enterprise Resource Planning (ERP) systems are
to facilitate real time-sharing of actual demand enterprise-wide information systems used for au-
and supply information. tomating all activities and functions of a business.
These transaction-based information systems are
bar coding and scanner integrated across the whole business. ERP systems
facilitate data capture for the whole business into a
Bar Codes are the representation of a number or single computer package, which provides a single
code in a form suitable for reading by machines source for all key business information activities,
(Rushton, 2000). Bar codes are widely used such as customer orders, inventory, and financials.
throughout the supply chain to identify and track Many companies now view ERP systems from
goods at all stages in the process. Bar codes are a vendors like Baan, SAP, and People Soft as the
series of different width lines that may be presented core of their IT infrastructure. ERP systems have
in a horizontal order, called ladder orientation, or a become enterprise-wide transaction processing
vertical order, called picket fence orientation. For tools, which capture the data and reduce the manual
example, goods received in a warehouse may be activities and tasks, which are normally associated
identified by the warehouse management system with processing financial, inventory, and customer
and added to stock held in the warehouse. When order information. ERP systems achieve a high
put away, the bar code is used to associate the level of integration by utilizing a single data model,
storage location with the bar-coded stock, and on developing a common understanding of what the
dispatch, the stock record is amended. The use of shared data represents and establishing a set of
bar codes can speed up operations significantly. rules for accessing data. In addition to the huge
On the other hand, the problems can occur if bar costs that are involved in procuring an ERP ap-
codes are defaced or the labels fall off in transit. plication, installation of such systems will entail
Bar code scanners are most visible in the checkout widespread change within the organization. It will
counters of supermarkets and hypermarkets. The have implications in terms of Business Process
bar code specifies the name of the product and its Re-engineering (BPR), changes in organizational
manufacturer. Bar codes are also used for track- structure, people, and change management. Many
ing of moving items such as components in PC companies have benefited from using this system
assembly operations and automobiles in assembly while some have experienced severe problems
plants. In 1983, with bar codes printed on most with their application. Generally, they also require
goods, Wal-Mart introduced checkout scanners in a lot of customization and training for each user.
601
Benefits of Information Technology Implementations for Supply Chain Management
602
Benefits of Information Technology Implementations for Supply Chain Management
track sales and available inventory, communicate agriculture, information technology, and fast-
with suppliers in near real-time and receive and moving consumer goods (FMCGs). ITC initiated
incorporate other data, such as seasonal demand its e-Choupal a few years back with a focus to
(Crosby, 2009). streamline its dealings with Indian farmers. This
is one of the mega projects in rural India. It has
covered more than 40,000 villages in ten states,
suPPly cHAIn mAnAGement including Uttar Pradesh, Madhya Pradesh, Andhra
In IndIA: successFul Pradesh, Maharashtra, Rajasthan, and Karnataka.
demonstrAtIons oF With the initial launch in June 2000, e-Choupal
InFormAtIon tecHnoloGy has become one of the largest initiatives in rural
usAGe In IndIAn comPAnIes India. Today, the services through this system
serve more than 50,000 villages through over
tanishq 7,000 kiosks in various states. The initiative was
launched with a view to providing instant access
One of the largest Indian business conglomerates to real-time information in regional languages for
in India, TATA through its group company, TITAN crop cultivation, as well as empowering farmers
industries, wanted to open a new line of jewel- with decision-making ability. A web-based ini-
lery, under the brand name, Tanishq in 1996. The tiative of ITC’s international business division,
supply chain of Tanishq consisted of raw material e-Choupal is one of the leading programs that
suppliers, manufacturing divisions, carry and offer the farmers with the necessary informa-
forward agents (CFA), and retail stores or bou- tion and services for the enhancement of farm
tiques. It was necessary to connect and integrate productivity and improvement of farm-gate price
69 boutiques and 32 CFAs of the new jewellery realization, as well as reduction in transactional
chain. A web-based IT solution, “Gold Mine” was costs. e-Chaupal offers farmers access to the latest
used to connect factory with the boutiques and local and global information on weather, scientific
CFA. The system offered visibility on the status farming practices and market prices at the village
of orders placed by boutiques and production itself through the Web portal - all in Hindi.
was synchronized with an internal ERP system. ITC plans to operate such kiosks so that they
Sales information flowing in from the boutique can create an electronic stock exchange for the
gave managers full track of the effectiveness of marketing of agricultural commodities through the
their marketing programmes, category-wise and use of ICT. The agri-business division of ITC has
price band-wise. Bulletin boards and online dis- implemented e-Choupal project in order to tackle
cussion forums further added to the application. the most pressing demands of the agriculture sector
Today Tanishq is the largest branded jeweler in in India. The solution provided under this project
India with a market share of around 25% (Kan- serves farmers through several essential modes,
nabiran, 2005). as well as addresses their basic needs. Through
the e-Choupal portals, farmers can access the
Itc’s e-choupal: landmark latest local and global information on weather,
in rural deployment scientific farming practices, and market prices at
the village level. It also facilitates the supply of
ITC Limited is one of the premier and diversi- high quality farm inputs as well as purchases of
fied conglomerates in India. From a traditional produce at the farmers’ doorstep. This IT-backed
tobacco and cigarette producer, it has grown into business solution includes a computer, stationed
a group of companies with interests in hotels, at a farmer’s house, and is linked to the Internet
603
Benefits of Information Technology Implementations for Supply Chain Management
via VSAT connection. This single point of com- advantage from the ERP implementation was
munication serves an average of more than 500 regarding the management of inventory. Before
farmers within a radius of 5 km. Each e-Chaupal ERP implementation, the company’s practice of
comes with an expenditure of nearly US $ 3000 monthly inventory reviews frequently led to time
with a maintenance cost of somewhere between lag in processing orders (ERP Implementation at
US $ 100 and US $ 200 annually. However, the BPCL, 2009).
host farmer- sanchalak incurs some operating
expense and gets substantial benefits from all mahindra and mahindra
e-Choupal transactions. From an IT perspective,
the solution is one of the landmarks in the rural Mahindra & Mahindra started its IT initiatives
segment having created an IT-based integrated in 1995 with the launch of a dedicated network
supply chain for the company also. The web- across 8 manufacturing locations, 33 area of-
driven project offers scalability and effectiveness fices and 4 branch offices. In June 1996, M&M
of communication mechanism, as well as real-time launched its website mahindraworld.com, which
information and facilitates collaboration between was one of the first corporate websites in India.
various parties for the full spectrum of farmer In 2000, M&M extended the Intranet to three
needs (Abbas, 2009). websites dedicated to suppliers and dealers of
the automotive and farm equipment sectors. In
bPcl the same year, it started Customer Relationship
Management (CRM) and SCM initiatives, which
In 2001, Bharat Petroleum Corporation Limited helped in analyzing customer buying behavior
(BPCL), a leading player in the Indian petroleum and product development with the help of data
industry, successfully implemented an Enterprise mining tools. In 2003, these initiatives played an
Resource Planning (ERP) solution. Implementa- important part in M&M’s farm equipment divi-
tion began in April 2000 after the company decided sion winning Japan’s prestigious Deming award
to integrate all its activities through the ERP pack- (Dutta, 2009).
age SAP R/3. BPCL divided its IT initiatives into a
three-pronged strategy, wherein it planned to create larsen and toubro
a communication network within the organiza-
tion, create a basic information network for the Larsen and Toubro (L&T) is one of the largest en-
entire corporation, and process transactions with gineering companies in India. Its largest division,
customers all over the country. The strategy was ECC handles turnkey industrial and infrastructure
devised after the company divided the organiza- projects in civil, mechanical, electrical, and in-
tion into six Strategic Business Units (SBU) and strumentation engineering. L&T also offers large
conducted a detailed evaluation of the company as turnkey construction services. Headquartered in
a whole. The organization was restructured to help Chennai and with more than 50 years of experi-
focus on specific customer segments and address ence and expertise, ECC commanded a leadership
their individual needs. SAP R/3 helped BPCL to position in the industry. ECC structured itself into
successfully launch its e-business initiatives, the seven regions in order to handle the complexity in
first of which was to allow its customers to track terms of stage of completion, size of project, and
the status of their orders online. This not only the geo-political situation. Each region catered to
allowed the company to retain existing custom- the demand of specialized construction services in
ers, but also helped in attracting new customers. that region and had its own materials department.
According to company sources, BPCL’s biggest The materials department of ECC also got itself
604
Benefits of Information Technology Implementations for Supply Chain Management
ISO-9002 certified; indicating the level of impor- comprising about 4,000 redistribution stockists,
tance, it gave to the management of its suppliers. covering 6.3 million retail outlets reaching the
ECC adopted a sound and efficient supply chain entire urban population, and about 250 million
management strategy in order to keep the supply rural consumers. Hindustan Unilever distribution
chain costs to the minimum. Its quality policies covers over 1 million retail outlets across India
emphasized minimum landed costs, transparent directly and its products are available in over 6.3
practices, and optimum inventory levels. One con- million outlets in India, i.e. nearly 80% of the retail
stant challenge that ECC faced was in integrating outlets in India. HUL, in its endeavor to move
and collaborating its supply chain participants. The from the existing push-based planning system to
root cause of this challenge was the construction a pull-based system, wanted to develop a SCM
industry itself. The project sites being spread out solution that would ensure informed decisions are
at various locations and the large supplier base made during procurement, manufacturing, replen-
made it difficult for ECC to minimize its supply ishment, and distribution. Specifically, the distri-
chain cost. In order to handle the complex chal- bution operation was suffering because of high
lenge of implementing an effective supply chain margin of errors. This problem was compounded
management system in the company, L&T ECC by increasing instances of out-of-stock inventory,
opted to implement a web-based SCM solution which led to demand-supply mismatches. HUL
built on Microsoft technologies - SQL Server wanted a solution that could provide visibility
2000 and Windows 2000 Server in early 2000. across its entire value chain.
The system worked on an online order and of- An IT-powered system has been implemented
fline delivery strategy. The company could now to supply stocks to redistribution stockists on a
streamline its entire vendor network. ECC also continuous replenishment basis. The objective
arranged a proper training program for its vendors is to catalyze HUL’s growth by ensuring that the
in order to familiarize them with the functioning right product is available at the right place in
of the system (Supply Chain Management in L&T right quantities, in the most cost-effective man-
ECC Division, 2009). ner. For this, stockists have been connected with
the company through an Internet-based network,
Hindustan unilever called RSNet, for online interaction on orders,
dispatches, information sharing, and monitoring.
Hindustan Unilever Limited (HUL) is India’s RS Net covers about 80% of the company’s turn-
largest Fast Moving Consumer Goods (FMCG) over. Today, the sales system gets to know every
company, touching the lives of two out of three day what HUL stockists have sold to almost a
Indians with over 20 distinct categories in home million outlets across the country. RS Net is part
& personal care products, and foods & beverages. of Project Leap, HUL’s end-to-end supply chain,
HUL’s brands like Lifebuoy, Lux, Surf Excel, Rin, which also includes a back-end system connect-
Wheel, Fair & Lovely, Ponds, Sunsilk, Pepsodent, ing suppliers, all company sites, and stretching
Close-up, Lakme, Brooke Bond, Kissan, Knorr- right up to stockists. The IT solution for SCM has
Annapurna, and Kwality Walls are household improved HUL’s proactive planning capability,
names across the country and span many categories manufacturing, and distribution efficiency, which
- soaps, detergents, personal products, tea, coffee, has in turn helped the company ensure a more
branded staples, ice cream, and culinary products. responsive and dynamic system of distribution.
They are manufactured over 40 factories across It has enabled the company gain visibility across
India. The operations involve over 2,000 suppli- its supply chain, reduce distribution lead-time and
ers and associates. HUL’s distribution network, minimize cost incurred on its supply chain. Avail-
605
Benefits of Information Technology Implementations for Supply Chain Management
ability of stock has increased considerably from 65 supports handling the logistics of moving finished
per cent to 90 per cent. HUL has also been able to goods from the source to stores i.e. transportation
distribute its stocks more equitably with marked and warehouse management systems (Pantaloons
decline in mal-distribution from 19 per cent to 6 - Information Technology in the Supply Chain:
per cent of its total volume transported. Manual Case Study, 2009).
intervention has come down from 40 per cent to
sub-zero levels. Direct dispatches from factories edI Implementations in India
to wholesaler network have increased. Hindustan
Unilever, which once pioneered distribution in The EDI network involves the ministry of com-
India, is today using IT to reinvent distribution merce, customs, airlines, ports, directorate gen-
- creating new channels, and redefining the way eral of foreign trade, banks, regional licensing
current channels are serviced. In the process, it authorities, and other organizations. The major
is converging product availability, with brand EDI users in India presently are governmental
communication and brand experience. Although, departments of commerce and customs, port trusts,
HUL was using the ERP solution, “MFG/ PRO,” shipping agents, couriers, custom house agents,
its parent, Unilever is presently implementing educational institutes, importers/exporters, min-
SAP ERP package across all geographies (Supply istry of transport etc. There are two approaches
Chain Management Solution for Hindustan Lever: to implementing EDI. Many large organizations
Case Study, 2009). acquire or build their own proprietary systems,
often in association with their business partners.
Pantaloon The other approach is to work with a VAN (value
added network) provider like VSNL and NIC,
Pantaloon, one of India’s largest retail apparel which provides EDI transaction services, secu-
giants, uses the SAP retail solution in a bid to rity, document interchange assistance, standard
use IT for supply chain management. The solu- message formats, communication protocols, and
tion supports product development, sourcing, communication parameters for EDI (Report of the
procurement, collaboration, and communication CEFACT Rapporteur for Asia, 2009).
between supply chain partners. The solution also
606
Benefits of Information Technology Implementations for Supply Chain Management
key erP Implementations in India frequency signals. The need to minimize operat-
ing costs and employed assets has resulted in the
All the key players in the ERP global market are adoption of radio frequency technology to track
practically present in India. This includes SAP with inventories within a supply chain down to the item
their flagship product R/3, Baan Company with level, thus reducing channel volume and enhancing
their Baan IV product, Oracle with their Oracle forecasting and planning capabilities (D’Avanzo,
Applications and the world-class ERP product, 2004). In this system, data is transmitted by a
Marshall from the rising Indian star Ramco portable device, called a tag, which is read by an
Systems. The other major players in the global RFID reader and processed according to the needs
ERP Market, namely, PeopleSoft has entered the of a particular application. The data transmitted
Indian market only very recently. Yet another by the tag may provide identification or location
leading product MFG/ PRO from QAD has been information, or specifics about the product tagged,
present for a while with its major two customers such as price, color, date of purchase, etc. (RFID
being Hindustan Unilever and Godrej. SAP has Systems, 2009).
been exceptionally successful in India with nearly Reno GmbH, one of Europe’s largest shoe
two-thirds of the Indian market share. The major companies, operating more than 700 stores in 15
industrial houses Tata, Reliance, Essar, Mahindra, countries, plans to embed wireless RFID chips
and Kirloskar have embraced SAP. Baan has been in shoes sold at stores across the continent. Reno
very successful in major manufacturing companies has been using RFID technology to track product
such as TVS. Oracle has been a playing a dominant shipments from its factories to its stores for sev-
role in the telecom centre with a stronghold among eral years but has not yet used the technology to
all cellular phone companies. Ramco Marshall has track individual products inside each store. For
a good client base among the process industry in individual product tracking, wafer-thin RFID chips
the south and a few public sector undertakings are being designed for shoes from Reno’s Asian
(Sadagopan, 2009). production facilities. By integrating RFID tags
into its shoes, Reno aims to curb theft of boxed
products, products on display, and the shoes cus-
emerGInG And neW InFormAtIon tomers try on inside the stores (Schneider, 2003).
tecHnoloGy tools For Schiff Nutrition International, a midsize company
suPPly cHAIn mAnAGement based in Salt Lake City, is a maker of vitamins and
nutritional supplements. Schiff is in the process
radio Frequency of deployment of the RFID technology in order
Identification (rFId) to continue doing business with Wal-Mart. In
2003, Wal-Mart began setting deadlines for sup-
RFID technology is fast replacing bar code in pliers to start using RFID tags on their shipments
various supply chain operations like inventory (Krotov, 2008).
tracking and management. The advantage that
RFID has over the bar code is that it can uniquely software Agents
identify the specific object such as when items
are produced, which lot does the item belong to, A software agent is a software system that has
and when will the items expire. In bar coding, the attributes of intelligence, autonomy, perception
reading device scans a printed label with optical or acting on behalf of a user. Agents can behave
laser or imaging technology. However, in RFID, autonomously or proactively. The intelligence of
the reading device scans a tag by using radio an agent refers to its ability of performing tasks
607
Benefits of Information Technology Implementations for Supply Chain Management
or actions using relevant information gathered as used agents to transform its supply chain network
part of different problem-solving techniques such into a network of software agents, whose behaviors
as influencing, reasoning and application specific are programmed through rules (Cobzaru, 2003).
knowledge. One category of agents, monitoring
and surveillance agents are being used to ob- decision support systems
serve and report on equipment, usually computer
systems. These agents can also keep track of Decision Support Systems (DSS) are a specific
company inventory levels, observe competitors’ class of computerized information systems that
prices and relay them back to the company, watch supports business and organizational decision-
stock manipulation by insider trading and rumors, making activities. A properly designed DSS is
etc. Along with data mining agents, agent-based an interactive software-based system intended to
solutions are being considered for applications help decision-makers compile useful information
in SCM. For example, NASA’s Jet Propulsion from raw data, documents, personal knowledge,
Laboratory has an agent that monitors inventory, and/or business models to identify and solve
planning, and scheduling equipment ordering to problems and make decisions. Typical informa-
keep costs down, as well as food storage facilities. tion that a decision support application might
These agents usually monitor complex computer gather and present would be an inventory of all
networks that can keep track of the configura- current information assets (including legacy and
tion of each computer connected to the network. relational data sources, data warehouses, and data
Air Liquide America LP, a producer of lique- marts) or comparative sales figures between one
fied industrial gases, reduced its production and week and the next week. In SCM, there is always
distribution costs using agents. Merck and Co, a a likelihood of having disagreements among
leading research-driven pharmaceutical company parties for a certain decision-making process.
used agents to help it find more efficient ways to This phenomenon gets worse, when the business
distribute anti-HIV drugs. Proctor and Gamble environment becomes more competitive and tur-
608
Benefits of Information Technology Implementations for Supply Chain Management
609
Benefits of Information Technology Implementations for Supply Chain Management
ing partners to allow them to buy, sell and move lastminute.com have achieved innovative results
products, costs, the introduction of the Internet using ESCs (Gunasekharan, 2004).
has brought about opportunities that allow firms
to transact with other enterprises electronically. collaborative Product commerce
Amazon is one such example. The virtual supply
chain also envisages use of Internet-based ap- Collaborative product commerce (CPC) is a set
plications to transact and exchange information of tools that allows companies to manage product
like product and inventory information with their information and share that information with sup-
downstream or upstream trading partners. Sup- pliers and partners through the web. CPC tools
ply chain initiatives like Collaborative Planning, typically combine information management,
Forecasting and Replenishment (CPFR), Vendor version-control, configuration management,
Managed Inventory (VMI), Efficient Customer workflow-management, and collaborative tools.
Response (ECR) and quick response have been CPC helps a company’s development strategy to
increasingly facilitated in the new e-supply chain become three-dimensional. This is by facilitat-
paradigm. Information sharing among suppli- ing the collaborative development of products,
ers, manufacturers, distributors, and retailers processes, and supply chain strategies such as
are greatly improved. American-On-Line and Build-to-Order (BTO) (Turner, 2001). In the fu-
610
Benefits of Information Technology Implementations for Supply Chain Management
ture, CPC is expected to co-ordinate and control International, a home furnishings textiles exporter,
virtually all supply, design, manufacturing, and headquartered in the small south Indian town
customer-relationship processes. Collaborative of Karur, has deployed RFID tags to reduce its
Product Commerce (CPC) embraces the product operating costs. As a result of this deployment,
design, development, and introduction processes production efficiency at their plants has improved
as well as the associated management of product by over 5 percent (Giridhar, 2009).
data and requires a coalition of internal and external The total RFID market (including tags, readers,
constituencies. The benefits of developing robust software and services) has been growing exponen-
CPC capabilities can be compelling. They typically tially over the last decade. Today it is around US
come in the form of integration of design processes $ 5.5 billion and the forecast is that it may touch
and supply chains, increased revenue and margin, US $ 25 billion by 2015 of which a large chunk
lower operating costs, better customer response, will come from emerging economies like China
JIT processes, and higher quality improvement. and India. This acceleration will be facilitated
Figure 5 shows components of a typical CPC by rapid declines in the RFID tag prices and ex-
solution (True, 2002). tensive use in various applications. One estimate
suggests that the RFID tag market will by several
billion tags today to tens of trillions of tags by
ImPlementAtIons oF emerGInG 2015 (RFID market to reach $7.26Bn, 2009).
InFormAtIon tecHnoloGy Forecasts also project over 1.3 million jobs will
tools In IndIAn comPAnIes be directly created by RFID technology by 2015
(RFID Workforce: Mining the RFID Technology
Several progressive Indian companies are exten- Gold Rush, 2009).
sively adopting emerging IT tools like RFID, web The electronic business market has also grown
services, electronic commerce, and virtual supply by leaps and bounds with the present market space
chains to shore up their supply chain operations. being estimated at almost US $ 1.8 billion (Ashish,
Leading Indian IT service providers like Tata 2009) with several players like Indian railways,
Consultancy Services, Infosys, and Wipro are skumars.com, e-bay, and all leading banks and
developing RFID-based solutions for supply chain financial institutions like ICICI, HDFC, IDBI etc.
management in sectors like manufacturing, retail, Several large manufacturers in India are also
telecom, government, hospitals, and educational architecting virtual supply chains. Maruti-Suzuki,
facilities like libraries. These solution providers the largest car manufacturer in India, which has
are also developing web services based packages more than 200 vendors and suppliers, has con-
to facilitate virtual supply chains, EDI, e-Tailing, nected to all vendors using web services and
and e-Procurement. Retail giants like Pantaloon, high-bandwidth networking. Vendors are linked
ITC, Wills Lifestyle, Madura Garments, Big Ba- through this Internet-based supply chain, which
zaar, and Total Mall have already implemented maintains online information regarding order
RFID at their retail outlets for product tracking status and delivery instructions. These have sub-
and warehouse management. Automobile major, stantially helped in reducing both inventory levels
Mahindra and Mahindra is another early adopter, and lead times required for the supply of various
using RFID for scheduling and logistics manage- components (Harikanth, 2009).
ment (Nallayam, 2009). The manufacturing giant, However, deployment of tools like DSS and
Ashok Leyland, is using RFID for plant assembly software agents for supply chain management
operations. Even small players have started to use in Indian companies is limited. A few IT service
RFID for their supply chain integration. Sabare companies like PTC and Rolta are offering CPC
611
Benefits of Information Technology Implementations for Supply Chain Management
solutions for manufacturing companies, which chain, the merchandize lies for a lesser time in
are mainly used for computer-integrated design the warehouse, thereby eliminating the need for
and manufacturing. Usage of DSS and software additional warehouse space. Earlier, about 20%
agents for SCM are at the research or experimen- of the non-saleable returns from the stores were
tal stages. Indian companies must rapidly adopt attributed to the reason of mishandling at the
these technologies for SCM and derive potential warehouse. With the project in action, since the
benefits. physical handling at the warehouse is reduced, the
percentage of non-saleable garments has reduced
Itc Wills lifestyle – An considerably. With unique identity of each tag,
rFId success story and faster reconciliation, the magnitude of manual
errors was also greatly reduced.
Wills Lifestyle is an apparel company owned by Every garment was also getting about seven
the diversified ITC group. The chain of Wills days earlier to the store. With some garments
Lifestyle stores offers a complete fashion wardrobe getting as much as an extra 10 to 15 day win-
comprising ‘Wills Classic’ formal wear, ‘Wills dow, ITC lifestyle retailing has seen a 2 percent
Sport’ relaxed wear, and ‘Wills Clublife’ evening growth in sales. In addition, the percentage of
wear, along with accessories for both men and manual errors has been reduced greatly because
women. Wills Lifestyle is also rated as among each tag has a unique identity and reconciliation
the top five luxury brands in India. is more accurate. Assuming a 0.1 percent error
In December 2006, Wills Lifestyle added a rate across three lakh products every month, the
technology enabler, RFID to their showrooms and company estimates saving worth US $ 120,000
warehouses. Deployed across 7 retail showrooms a year (Goswami, 2009).
and 2 warehouses, the project reaped wide-ranging
benefits to internal business users as well as mahindra and mahindra–rFId usage
consumers. RFID proved its mettle in terms of for scm in manufacturing sector
speeding up of existing processes, reducing the
time-to-market, efficient material handling, and Mahindra & Mahindra (M&M) is India’s largest
accuracy of books versus physical stock. Dur- farm equipment company and the largest manu-
ing the bar-code era, each piece of garment was facturer of tractors in India with sustained market
individually scanned and lots of manpower was leadership of over 20 years. Mahindra is also
involved, also at the end of the day accuracy of the first tractor company in the world to win the
stocks received/dispatched at the warehouse was Deming Prize. All of M&M’s plants have been
a key concern. With RFID in place, the time taken certified for ISO 9001, QS-9000, and ISO 14001.
to receive 1 carton (about 30 to 35 garments) was Inventory accuracy, shrinkage control, control-
reduced from about 5 to 8 minutes to about 20 ling delays in vendor shipments, and minimiz-
to 30 seconds. With the usage of RFID tunnels, ing dud production schedules were of critical
the output per person increased from 300 to 400 importance to M&M in their drive to improve
pieces per day to about 2000 to 3000 pieces supply chain efficiencies. The need to maintain
per day. Reduced scanning time enabled faster accurate information and avoidance of human
receiving and dispatch of merchandize, thereby errors were the factors that drove M&M to look
reducing the time to market. Thus, an extra 10 to for real-time data capture solutions. SkandSoft
15 day window was available leading to increased Technologies Private Limited, an upcoming IT
contribution to the business by over 2 percent. Ow- service provider, was chosen to provide an user-
ing to increased inventory velocity in the supply friendly, single-window solution to this complex
612
Benefits of Information Technology Implementations for Supply Chain Management
challenge. SkandSoft, after a comprehensive efficient and effective supply chain management
study of M&M’s existing inbound supply chain, technologies, practices, and policies. Customers’
developed an RFID-based SCM solution. The expectations are also increasing and companies
RFID solution was in tune with the evolving are prone to more and more uncertain environ-
specifications of RFID hardware and systems. It ments in the face of increasing competition. To
was also integrated with the legacy SAP MM and survive in these times, companies will find that
APO modules of M&M. The business results after their conventional supply chain integration will
deploying this solution were complete reduction in have to be expanded beyond their boundaries so
manpower involved in physical count check and as to integrate all stakeholders. Adoption of IT
stock verification. Picking and docking personnel tools is vital for such efforts.
saved 32% of their time. The company achieved This chapter discusses the role of IT as an
near-zero shrinkage of the items covered and 14% enabler in supply chain management and also
reduction in costs by FIFO compliance in storage highlights the vast benefits to companies with
(Success stories: Mahindra and Mahindra, 2009). a comprehensive IT strategy. An overview and
deployment of the present alignments of widely
Fedex India virtual supply chain deployed IT tools like EDI, ERP, bar codes, in-
ventory management, transportation management,
Blue Dart Express, is India’s premier integrated air and warehouse management systems is provided.
express carrier and logistic-services provider. Blue Successful IT implementations of SCM of progres-
dart is also the Indian global service participant sive Indian companies are also described. The basic
of Federal Express (FedEx), the world’s leading elements of emerging and new age tools like RFID,
air express transportation company. Using web software agents, decision support systems, web
services, Blue dart has evolved an e-strategy to services, electronic commerce, and virtual supply
integrate all partners and customers with its e- chains are reviewed. Rapid advances in Internet
shipping tools. All 14 of the company’s warehouses technology have changed the way companies do
are connected to this system. All customers can business. Enterprises must harness the power
track their shipments through single or multiple of these emerging information technology tools
waybills online. This solution is also ported to an for supply chain integration and collaboration.
e-mail or mobile response system. Customers can While it has been observed that usage of tools like
register and gain access entire waybill tracking RFID, web services, electronic commerce, and IT
data, which are available for 45 days online. This solutions to facilitate virtual supply chains, has
web-enabled solution with additional features been on the rise, Indian companies are yet to tap
like e-logistics, e-fulfillment, inventory control the vast potential of the application of software
etc, has also been integrated to the ERP system, agents and decision support systems in supply
“COSMATH,” which has been indigenously de- chain management.
veloped by the company (Federal Express India
supply chain, 2009).
reFerences
613
Benefits of Information Technology Implementations for Supply Chain Management
Anderson, D. L. Britt., F. E., & Favre, D. J. Dutta, S., & Kumar, A. (2009). Mahindra &
(1997). The seven principles of supply chain Mahindra’s E-Business Initiatives. ECCH Case
management. Supply Chain Management Review, Collection. Retrieved May 12, 2009, from from
(Spring), 31-41. http://www.asiacase.com/ecatalog/NO_FIL-
TERS/page-ERP-602916.html
Ashish, D. (2009). E-commerce in India. Plugge-
din. Retrieved April 20, 2009, from http://www. ERP Implementation at BPCL. Case Study. (2009).
pluggd.in/india/ecommerce-in-india-irctc-con- Retrieved May 2, 2009, from http://www.icmrin-
tribution-3961/ dia.org/casestudies/catalogue/IT%20and%20
Systems/ITSY005.htm
Auramo, J., Kauremaa, J., & Tanskanen, K. (2005).
Benefits of IT in supply chain management: An Federal Express India supply chain. (2009). Re-
explorative study of progressive companies. trieved May 15, 2009, from http://www.scribd.
International Journal of Physical Distribu- com/doc/2165098/Supply-Chain-Management-
tion and Logistics Management, 35(2), 82–90. at-Fedex-India
doi:10.1108/09600030510590282
Giridhar, C. (2009). India tests RFID waters.
Berger, A. (2009). Five steps to an eSynchronized Electronic Busines. Retrieved May 18, 2009, from
Supply Chain. Retrieved April 27, 2009, from http://www.edn.com/article/CA6388858.html
www.accenture.com/NR/rdonlyres/18099CFB-
Goswami, K. (2009). RFID Speeds Up Wills
1D5F-4FA7-BBC4-862EC465123D/0/esynchro-
Lifestyle Business. Real CIO World. Retrieved
nized_supply_chain_pov_ref.pdf
May 18, 2009, from http://www.cio.in/case-study/
Cobzaru, M. (2003). Agent-based Supply Chain rfid-speeds-wills-lifestyle-business
Management System. Unpublished doctoral dis-
Gunasekharan, A., & Ngai, E. W. T. (2004). Virtual
sertation, University of Calgary, Calgary, Canada.
Supply Chain Management. Production Planning
Coronado, A. E., Lyons, A. C., Michaelides, and Control, 15(6), 584–595. doi:10.1080/09537
Z., & Kehoe, D. F. (2006). Automotive supply 280412331283955
chain models and technologies: A review of
Haag, S., Cummings, M., & Philips, A. (2006).
some latest developments. Journal of Enterprise
Management Information Systems for the Infor-
Information Management, 19(5), 551–562.
mation Age. New York: McGraw Hill.
doi:10.1108/17410390610703675
Harikanth, S. (2009). Maruti Value Chain. OP
Crosby, T. (2009). How Inventory Management
Papers.com. Retrieved May 20, 2009, from
Systems Work. Retrieved May 4, 2009, from
http://www.oppapers.com/essays/Maruti-Value-
http://communication.howstuffworks.com/how-
Chain/167129
inventory-management-systems-work.htm
Harland, C. M. (1996). Supply chain manage-
D’Avanzo, R., Starr, E., & Lewinski, H. V. (2004).
ment: relationships, chains, and networks.
Supply chain and the bottom line: A critical link.
British Journal of Management, 7, 63–80.
Outlook: Accenture, 1, 39–45.
doi:10.1111/j.1467-8551.1996.tb00148.x
Description, U. Discovery and Integration. (2009).
Johnson, A. H. (2002 September 30). Wal-Mart
Retrieved May 12, 2009, from http://uddi.xml.org/
put intelligence in its inventory and recognized
the value of sharing data. Computerworld.
614
Benefits of Information Technology Implementations for Supply Chain Management
Kannabiran, G., & Bhaumik, S. (2005). Corpo- Rushton, A., Oxley, J., & Croucher, P. (2000). The
rate Turnaround through effective supply chain Handbook of Logistics and Distribution Manage-
management: The case of a leading jewellery ment. Glasgow, UK: Bell & Bain Ltd.
manufacturer in India. Supply Chain Management,
Sadagopan, S. (2009). Freqently asked ques-
10(5), 340. doi:10.1108/13598540510624160
tions on ERP in India. ERP Study centre, IIM-B.
Krotov, V., & Junglas, I. (2008). RFID as a dis- Retrieved April 17, 2009, from http://www.iiitb.
ruptive innovation. Journal of Theoretical and ac.in/ss/erp-faq/main4pg1.htm
Applied Electronic Commerce Research, 3(2),
Sammon, D., & Hanley, P. (2007). Case Study:
44–59. doi:10.4067/S0718-18762008000100005
Becoming a 100 per cent e-corporation: ben-
Lee, C., Lee, K. C., & Han, J. H. (1999). A Web- efits of pursuing an e-supply chain strategy.
based Decision Support System for Logistics Supply Chain Management, 12(4), 297–303.
Decision-Making. Paper presented at the meeting doi:10.1108/13598540710759817
of the Academy of Information and Management
Schneider, M. (2003). Radio Frequency Identifica-
Sciences, Myrtle Beach, SC.
tion (RFID) Technology and its Applications in the
Macleod, M. (1994, June). What’s new in supply Commercial Construction Industry. Unpublished
chain software? Purchasing & Supply Manage- doctoral dissertation, University of Kentucky,
ment, (pp. 22-25). Lexington, KY.
Nallayam, R. (2009). RFID Reality Check. Chan- Shore, B. (2001). Information sharing in global
nelworld.in. Retrieved May 16, 2009, from http:// supply chains. Journal of Global Information
www.channelworld.in/specialreports/index.jsp/ Technology Management, 4(3), 27–46.
artId=5013515
Simchi-levi, D., Kaminsky, P., & Simchi-levi, E.
Pantaloons - Information Technology in the Supply (2003). Managing The Supply Chain: The Defini-
Chain. Case Study. (2009). ECCH Case Collec- tive Guide For The Business Professional. New
tion. Retrieved April 16, 2009, from http://www. York: Irwin /Mc Graw Hill.
icmrindia.org/casestudies/catalogue/Supply%20
Srinivasan, K., Kekre, S., & Mukhopadhyay, T.
chain%20Management/CLSCM002.htm
(1994). Impact of Electronic Data Interchange
Report of the CEFACT Rapporteur for Asia. Technology on JIT Shipments. Management
(2009). Retrieved April 19, 2009, from http:// Science, 40(10), 1291–1304. doi:10.1287/
www.unece.org/trade/untdid/download/99cp3.rtf mnsc.40.10.1291
RFID market to reach $7.26Bn in 2008. (2009). Success stories: Mahindra and Mahindra. (2009).
IDTechEx. Retrieved May 27, 2009, from www. Retrieved May 17, 2009, from http://www.skan-
idtechex.com/products/en/articles/00000169.asp dsoft.com/successstories.html#1
RFIDSystems. (2009). Retrieved May 10, 2009, Supply Chain Management in L&T ECC Divi-
from http://epic.org/privacy/rfid sion. (2009). ECCH Case Collection. Retrieved
April 29, 2009, from http://www.icmrindia.org/
Ross, J. (2006). Enterprise Architecture As
casestudies/catalogue/Operations/OPER045.htm
Strategy: Creating a Foundation for Business
Execution. Cambridge, UK: Harvard Business
School Press.
615
Benefits of Information Technology Implementations for Supply Chain Management
Supply Chain Management Solution for Hindu- True, M., & Izzi, C. (2002). Collaborative product
stan Lever. Case Study. (2009). Retrieved May commerce: creating value across the enterprise .
3, 2009, from http://fmcg-marketing.blogspot. Ascet, 4, 27–35.
com/2007/10/supply-chain-management-solu-
Van Oldenborgh, M. (1994). Distribution super-
tion-for.html
highway. International Business, 7(6), 80–84.
Thongchattu, C., & Buranajarukorn, P. (2007). The
Workforce, R. F. I. D. Mining the RFID Technol-
Utilisation of e-Tools of Information Technology
ogy Gold Rush. (2009). RFID Tribe. Retrieved
Towards Thorough Supply Chain Management.
May 27, 2009, from www.rfidtribe.com/news-
Paper presented at the Naresuan University Re-
05-05-11.html
search Conference, Thailand.
Towill, D. (1997). The seamless supply chain -
the predator’s strategic advantage. International
Journal of Technology Management, 13(1), 37–56.
doi:10.1504/IJTM.1997.001649
This work was previously published in Enterprise Information Systems and Implementing IT Infrastructures: Challenges and
Issues, edited by S. Parthasarathy, pp. 323-343, copyright 2010 by Information Science Reference (an imprint of IGI Global).
616
617
Chapter 3.4
Transforming Compensation
Management Practices
through Web-Based
Enterprise Technologies
Xiaoya Liang
Fudan University, China
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Transforming Compensation Management Practices through Web-Based Enterprise Technologies
latest products. This Web solution is revolution- tem. Customized reports are also available to meet
izing how compensation systems are managed in specific needs. Managers can view aggregated
organizations now and in the foreseeable future reports or drill down the reports by department,
(Meade, 2003). Here are some key features and by work groups, or by individual employees
benefits of such a program within an ERP system. (Dulebohn & Marler, 2005). Users can conduct
24/7 accessibility: A Web solution means what-if scenario analyses and simulations in plan-
users can access the program using a standard ning compensation budgets which improve the
Web browser wherever and whenever they wish quality of strategic compensation decision making.
to. Compensation professionals no longer need User-friendly interface: Built on relational
to sit in front of their desktops at central offices data base structure, the Web-based compensa-
in order to process information. Employees can tion software leaves the control of the system in
view their pay and benefits information and update hand of end-users with minimal technical savvy.
their personal profile at home or even at vocation. Unlike prior software systems, it requires no
Integrated functionality: Compensation sys- system-specific training and keeps IT support and
tems are integrated with some other HR and non maintenance at a minimum.
HR systems within the organization. For example, Real-time accurate data: The HR department
a compensation professional can track up-to-date is no longer the sole party responsible for enter-
employee attendance information or performance ing all the data. Employees and line managers
reviews to make corresponding changes in com- are empowered to enter and update data on their
pensation. side. Thus, information is being updated on the
Data automation: Automation of existing Web as it occurs. All the analyses are conducted
processes and procedures has cost saving benefits. using real-time data (Brink & McDonnell, 2003).
Significant data automation relieves HR profes- One stop information center: Human resources
sionals from tedious routine tasks such as data home pages accessible via Internet or company
entry, filing, and report writing. Data importing intranet provide links to Web sites of outsider
and exporting are made easy between other office service providers such as employee stock ad-
applications software. ministrators or health care providers (Gherson
Streamlined workflow: The Web solution & Jackson, 2001).
streamlines all aspects of compensation planning Add-on applications: Self-service through
and implementation, including plan configura- ERP applications enables HR professionals,
tion, modeling and budgeting, plans review and employees, and line managers to focus on their
approval, and data exporting to payroll. In addi- primary value, adding tasks and spending less
tion, by posting current information regarding time on administrative tasks. Line managers can
compensation policies, program description, online view salary budgets, compare budgeting
eligibility explanation, new compensation forms, against actual spending, and take various sal-
and frequently asked questions and answers on the ary actions easily with self-service functions or
Web, that individual employee can access the HR corporate portals (Adamson & Zampetti, 2001).
department and saves a substantial portion of time, Communications between management and em-
which the HR staff used to spend on responding ployees are made easier. MSS allows managers
to requests from employees. take ownership in making compensation decisions
Flexible analytical tools: New compensa- with easy-to-use analytical tools (Gueutal, 2003).
tion software has strong analyzing capabilities. Cedar’s third annual self-service survey shows a
It provides users with online reviews of various continued expansion of self service applications
compensation reports that are pre-built in the sys- on the Web, and most surveyed companies report
618
Transforming Compensation Management Practices through Web-Based Enterprise Technologies
619
Transforming Compensation Management Practices through Web-Based Enterprise Technologies
Standardized functions are part of the new system rable compensation questionnaire which allows
to record knowledge, skills, and abilities (KSAs) customization. Participating organizations can fill
by job, by employee, or by job family. To utilize out the surveys online. Data are entered online and
integrated functionality, competency analysis is are processed to generate wide-range statistics and
tied with performance appraisal, training, recruit- reports. The system can import salary data from
ment, knowledge management, and personnel external data source for comparison and analysis or
administration. For example, an employee’s export internal compensation and benefits details
competency profile will be updated when she/he to spreadsheets for survey compassion.
accomplishes new training or obtains new certifi- Within MySAP HR suite, a module called
cations. Ability to track individual competencies SAP Benchmark Infocube is specially designed
progress is very important for organizations to for market salary data processing. This program
base their pay structure on competency developed performs comparative analysis of compensation
in a competency-based pay plan. packages (including base salary, variable pay, and
PeopleSoft8® includes comprehensive knowl- benefits) using internal and external data with a
edge base for tracking, understanding, and devel- variety of custom report options.
oping employees’ skills base. Examples of this Pay lines represent market pay rates for an
feature are unlimited competencies and review array of benchmarked jobs. An organization uses
ratings. The new system improves performance pay line information to create ranges for each pay
appraisal process to accommodate the needs for grade reflecting its pay policy.
conducting 360 degree job evaluation online. Regression analysis is commonly used to
This process provides multi-source assessment construct a pay policy line with average market
of employee’s skills and job performance and pay rates. Pay lines then define a mid-point base
invaluable feedbacks for future improvement. salary for each pay grade. Depending on how an
Oracle® records employee skill qualification, organization wants to match with market rates, the
competencies, and experiences from their hiring range of minimal and maximal pay can readily
date. Performance appraisal is planned and con- identified. Any Web-based compensation program
ducted online so that the system tracks recent and should include a standard wage/salary table. Users
historical performance appraisal records. set up standard wage/salary tables per job with
Standardized online employee reviews and minimal, maximal, and mid-point base salary
appraisals are offered by My SAP HR. based on pay line information. Standard salary
tables, individual skills and competency profiles,
external structure and job evaluation points make up the manager’s
workbook to determine individual pay levels.
To maintain external equity of its pay practices,
an organization needs to gather market salary data Pay for Performance Programs
and construct pay lines for common job categories.
Salary survey data gives the individual organi- To attract and retain top talents, organizations
zation an estimate of market price of certain jobs. invented various pay for performance programs
Conducting a salary survey requires a great deal such as merit pay, bonus pay, stock options, profit
of time and resources input from compensation sharing, and a few. These pay-for-performance
professionals with the conventional pencil-and- programs are presumably able to differentiate
paper based method. between top performers and bottom performers by
New Web-based compensation programs speed tying their pay levels with individual performance
up collecting salary data with a built-in configu- or their contributions toward organizational goals.
620
Transforming Compensation Management Practices through Web-Based Enterprise Technologies
The basic logic seems simple, but designing and eligibility rules and allocation rules. Managers
implementing such a plan is never easy. To accom- can review and approve bonus pay plans. Data are
modate multiple pay-for-performance plans in one exported to payroll within the integrated system.
integrated compensation system is challenging. Stock options: While managers can grant em-
In designing software programs, venders had to ployee stock options as part of their compensation
strive to balance level of specificity and breath. packages using either managerial self-service
ERP applications are kept flexible and let users application tools or user-defined rewarding plans
define their own variable pay plans. functions within standard compensation systems,
The variable compensation module in People- employee or executive stock option administration
soft® suite can be administered by group, by is not a covered function in common compensa-
individual, or on an ad-hoc basis. Users define tion modules. PeopleSoft® is one exception. The
standard reward rules and identify eligibility PeopleSoft® stock administration module allows
rules to link rewards to jobs, grade, groups, or employees to view their personal stock option
departments. The system supports multiple plans information online, model future stock earnings,
including commission sales plans. Users define check vesting periods, and exercise options. The
commission sales plans with multiple quotas, module helps managers to design and implement
revenue targets, and rate tables per employee. employee stock grants or purchase plans.
Payment methods and schedules, incentives by Incentive plans: Oracle® Incentive Compen-
specific types or products, or services are avail- sation allows users to define revenue classes,
able in the program. Oracle offers similar general compensation terms, rate tables, and quotas.
variable pay functions as Peoplesoft® does. Special features include sales person subledger,
Compensation applications in My SAP HR al- rule-based collection and revenue classification,
lows managers to design and implement innovative credit receiver, and manual adjustment.
reward plans including performance-based pay,
competency-based pay, and various short-term salary Planning
and long term incentives.
Merit pay: The common practice is to tie merit Annual salary planning is the single most important
increase with performance appraisal. New online compensation function and it involves not only
performance appraisals save HR professionals HR professionals, but also line managers and
time from compiling data and coordinating re- other departments such as finance and accounting.
view processes. Managers can view individual Hours of time are spent each year in designing and
performance ratings online and allocate merit administering compensation planning and often
increases using tools such as the performance/ times the plans did not work well.
increase percentage matrix. The matrix provides Web-based compensation software is designed
recommended percentage increase quartile by to streamline the entire compensation planning
rating scores. Managers make informative deci- process as best practices are modeled in the system
sions on individual merit increases. The system to share the success. As an example, Web-based
calculates pay increases and generates reports and compensation tools enable Dell™ to reduce
graphical charts. Data are shared with all related planning cycle from 8 weeks to 3 (Gherson &
systems such as payroll. Promotion pay increase Jackson, 2001).
is handled in the system in a similar manner. PeopleSoft® supports budgeting and salary
Bonus pay: Unlike merit pay, bonus pay is planning by groups and allows multiple budgets.
one-time lump sum money paid to individuals for The system includes employee review functions to
reasons such as recognition rewards. Users define accommodate the needs of employee participation
621
Transforming Compensation Management Practices through Web-Based Enterprise Technologies
622
Transforming Compensation Management Practices through Web-Based Enterprise Technologies
In-house compensation expert and consultan:. Gueutal, H. G. (2003). The brave new world of
E-compensation professionals will convert their HR. In D. L. Stone et al. (Eds.), Advances in
compensation expertise into strategic initiatives by human performance and cognitive engineering
providing executives and line managers with the research (vol. 3, pp. 13-37). Elsevier.
latest global and industry-specific best practices,
Keebler, T. (2001). HR outsourcing in the Internet
current research, and survey findings. They work
era. In A. J. Walker (Ed.), Web-based human re-
together with executive teams on new business
sources (pp. 259-276). New York: McGraw Hill.
solutions (Ulrich, 2000).
Lawler, E. (2000). Rewarding excellence. San
Francisco: Jossey-Bass.
reFerences
Martin, T. (2001). Leveraging technology to
Adamson, L., & Zampetti, R. (2001). Web-based communicate total rewards. The next frontier:
manager self-service: Adding value to the work. Technology and total rewards. Burlington, MA:
In A. J. Walker (Ed.), Web-based human resources IHRIM/World at work.
(pp. 24-35). New York: McGraw Hill. Meade, J. G. (2003). The human resources software
Anderson, L. (2001). Understanding PeopleSoft handbook: Evaluating technology solutions for
8. Sybex. your organization. San Francisco: Jossey-Bass.
Brink, S., & McDonnell, S. (2003). IHRIM go-to- Milkovich, G., & Newman, J. M. (2005). Compen-
guides: e-compensation, the emerging technology sation (8th ed.). New York: McGraw-Hill Irwin.
series. Burlington, MA: IHRIM. Peterson, W. J., Gelman, L., & Cooke, D. (2001).
Cedar (2001). Human resources self-service sur- ERP trends. New York: The Conference Board.
vey. Baltimore: Cedar Inc. Ulrich, D. (2000). From e-Business to e-HR. Hu-
Dulebohn, J., & Marler, J. (2005). E-compensa- man Resource Planning, 23(2), 12–21.
tion: The potential to transform practice? In H. Walker, A. J. (Ed.). (2001). Web-based human
Gueutal & D. Stone (Eds.), The brave new world resources. New York: McGraw Hill.
of e-HR. San Francisco: Jossey-Bass.
Frantzreb, R. B. (2004). Compensation admin-
istration software directories. Roseville, CA: key terms And deFInItIons
Advanced Personnel Systems.
Competency Analysis: People-based ap-
Gerhart, B. (2000). Pay strategy and firm perfor-
proach of job evaluation. It identifies key skills,
mance. In S. R. B. Gerhart (Ed.), Compensation
abilities, and knowledge associated with a par-
in organizations: Current research and practice.
ticular job.
San Francisco: Jossey-Bass.
Employee Self Service: An application
Gherson, D., & Jackson, A. P. (2001). Web-based designed for employees to access related HR
compensation planning. In A. J. Walker (Ed.), information. The ESS system allows employees
Web-based human resources (pp. 83-959). New to input and update personal data, manage benefit
York: McGraw Hill. packages, view compensation information, sign
up for training programs, and review internal job
postings.
623
Transforming Compensation Management Practices through Web-Based Enterprise Technologies
HR Portal: The integrated Web site for em- Pay Lines: Market pay rates for an array of
ployees to visit for HR information and services. benchmarked jobs. An organization uses pay line
It allows employees to customize the appearance information to create ranges for each pay grade
and the content of their own HR portal. reflecting its pay policy.
Job Evaluation: Defines the content, respon- Manager Self Service: An application de-
sibilities, and skill requirement of a particular job signed to assist line managers in HR related
position. Methods used to conduct job evaluation responsibilities. Major functions covered in MSS
are ranking, classification, and point method. are compensation administration, performance
Pay Grade: Grouping jobs with similar value management, recruitment and staffing, time and
based on job evaluation into the same pay range. attendance, and training.
This work was previously published in Encyclopedia of Human Resources Information Systems: Challenges in e-HRM, edited
by Teresa Torres-Coronas and Mario Arias-Oliva, pp. 877-882, copyright 2009 by Information Science Reference (an imprint
of IGI Global).
624
625
Chapter 3.5
Business Process Management
as a Critical Success Factor
in EIS Implementation
Vladimír Modrák
Technical University of Košice, Slovakia
AbstrAct IntroductIon
Nowadays, the implementation of business process It is no doubt that the business process management
management modern tools in companies becomes (BPM) gives companies the fundamentals they
a mater of acceptation of an effective organization need to continuously improve enterprise processes
management. The first ultimate precondition for and structure and get more from their existing ERP
achieving this goal is a properly structured company. investments. It also known, that many approaches
An attention in the study is placed on business pro- have been evolved from research on BPM. On the
cess reengineering due to preparing preconditions other hand there is agreement that business process
for smooth implementation of enterprise information modeling must be an integral part of the methods
system (EIS). Since there are differences between for business process management (Hess & Brecht,
tools of business processes redesign and informa- 1995; Scheer & Nüttgens, 2000; Scheer, 1998). The
tion systems development, then a main focus was effective business process management depends on
on overcoming existing semantic gaps. With aim how well it defines responsibilities and forces an
to solve this problem the specific modeling method employee to take control of their own performance.
has been used that was clear for company’s staff and The first ultimate precondition for achieving this
usable for EIS designers. Used modeling approach goal is a properly structured company.
was supported by QPR software. Since management of Original Equipment
Manufacturing (OEM), where presented study was
conducted, was not confident whether company’s
DOI: 10.4018/978-1-60566-892-5.ch003
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Business Process Management as a Critical Success Factor in EIS Implementation
internal and external activities are univocally organization models and IS architecture-designing
defined, this reality motivated given company to issues are described in the following section. Cur-
change this situation. Particularly, in coherence rent directions in business process modeling are
with ISO 9000:2000 their focus had been oriented dealt in section 3. Then selected methodological
on gradual transformation of functionally oriented aspects of the process modeling technique used
management to process-oriented management for the creation of business process models in
system. In this effort they went through more real case are presented. The final sections discuss
developmental periods that are described in this future trends and some decisive findings from
study. A concurrent attention had been placed on the case study.
business process redesign due to preparing precon-
ditions for smooth implementation of enterprise
information system. bAckGround
The Company pays special attention to the
technical innovations by promoting a modern It is common knowledge that the introduction of
quality management style. Similarly as many other Enterprise Information Systems in SMEs requires
small and medium enterprises (SMEs), company a principal restructuring of the Business processes
started with the traditional vertically arranged (BP) and management systems of an organization,
organizational structure that was represented in a simply Enterprise Reengineering with its typical
graphical form by an organizational chart. It was a steps (see figure 1).
hierarchical structure with a chief executive officer Usually, reengineering project in organization
and other executive at the top, small number lay- presents a complex task, normally assigned to
ers of management below this, with the majority external consultants, with the aim to transform
of employees at the bottom of the pyramid. The the current functionally-oriented organizational
jobs in given organizational structure was grouped model to process-based organizational pattern.
by function into departments such as accounting, Greasley (2004) states that a process-based ap-
sales, human resources, and so on. proach plays crucial role in the implementation
The chapter is structured in the following way. of an information system and claims that process
A theoretical background on an interrelation of mapping and business process simulation support
626
Business Process Management as a Critical Success Factor in EIS Implementation
of current process design. When we want to get the between the system and its environment (Castro et
pertinent information elements into the informa- al., 2002). Zhuang et al. (2007) define a semantic
tion system, we should name the unnamed, make gap in an information system as ‘the inefficacy in
them explicit, and organize them into a simple information transmission through representation,
structure and process. Accordingly, it could be especially when an information bearer is unable
seemed that process based approach is implicit to carry the information that it is supposed to.
in each IS designing technique. In reality, pro- Accordingly, semantic gaps between IS users
cess based approach in IS design rather means a and designers is one of the potential realm in the
transformation of process-oriented organizational deployment of the enterprise information systems
model into a IS design model. applications. Basically, this phenomenon results
Accordingly, organizational structure models from different views of users and designers to IS
might correspond with the architecture of an EIS and their different knowledge levels. The users of
as much as possible. According to Vasconcelos et IS understand it in simplified way as an operation
al. (2005), application architecture of enterprise automation tool, mainly used in data processing
IS has to be a part of an enterprise organizational and accessing. Designers of IS or its part under-
model. In reality, a consistency of enterprise or- stand it principally as HW/SW subsystems and
ganization models and architectures of enterprise their interaction. These contradictory notions are
information system is more or less unusual. In this shown in Figure 2, in which chosen components
connection Kalnins et al.(1998) compared tools are used as an example (Modrák, 2007).
and languages for business process reengineering It is obvious that outlined semantic gap cannot
and found out that ‘higher level business goals be replaced completely. The goal should be to
have not got a real semantic link with other parts reduce it to a level allowing relieving the shortage
of modeling’. The reason of inconsistency of en- made by it, when creating and deploying IS. The
terprise organization models and architectures of way of minimizing this semantic gap is possible
enterprise information system is that information through process modeling approach leading up
system development methodologies have tradi- to merge of process models to process maps in
tionally been inspired by programming concepts, the phase before IS design and development. A
not organizational ones, leading to semantic gaps precondition for exploitation of such process maps
627
Business Process Management as a Critical Success Factor in EIS Implementation
628
Business Process Management as a Critical Success Factor in EIS Implementation
629
Business Process Management as a Critical Success Factor in EIS Implementation
630
Business Process Management as a Critical Success Factor in EIS Implementation
business structure models, which are represented Processes (UEP) from the original arrangement of
by diagrams in the order given (Modrák, 2005): processes. Subsequently, relations between them and
the environment of the enterprise are specified. The
• System diagram, environment is represented in a System diagram by
• Context diagrams, External Entities, with which the system communi-
• Commodity flow diagrams of the first and cates, while their content is not a subject of analysis in
second decomposition stage, the following steps. They usually represent the initial
• State transition diagrams of the first and source of commodity flows, or their end consumer.
second decomposition stage. In fact it represents the starting base of modelling
processes, from which other diagrams are derived
In the sense of the outlined procedure of re- using the principle of process decomposition. Based
designing business processes, the first step of this on the transformation of previous process-oriented
method is the creation of a System Diagram. Its model of organization (showed in figure 4) has been
purpose is to separate so-called Unified Enterprise created System diagram (see figure 5).
631
Business Process Management as a Critical Success Factor in EIS Implementation
Figure 7. (a) Commodity flow diagram (CFD) for the process A2; (b) CFD for the process A3
632
Business Process Management as a Critical Success Factor in EIS Implementation
The objective of the state transition diagrams the level of Commodity flow diagrams of the first
(STDs) is the description of an internal structure stage, up to the level of state transition diagrams.
and mutual relations of tasks and/or activities of An example of the creation of the process map
Elementary Processes. State transition diagrams from two Commodity flow diagrams of the first
describe all of the states that an object can have, stage specified in the previous charts (showed in
the events under which an object changes state Figure 6) is depicted in Figure 9.
and the conditions that must be fulfilled before the Such maps are defining where the business
transition will occur. State Transition Diagrams process starts and ends and are identifying the
are basically used for describing the behavior of specific activities that need to be performed by the
individual objects. Hoverer, STDs have limited process owners. From those maps the managers
possibilities for describing the collaboration be- can easily define critical processes and analyze
tween objects that cause the transitions. This level them in detail. This approach evidently differs
of modeling is also pertinent for IS designers, from the method with which the company ac-
through which proper form modelling technique complished requirements of standard for quality
is selected. The most popular variety of STD in management system.
the programming area of OOD (Object Oriented
Design) is the Harel state chart (Harel, 1987).
Example of one STD drawn by QPR software in Future trends
this study is described in Figure 8.
In analogical way, “STDs of the first stage” According to Van der Aalst (2003) in BPM using
are sequentially decomposed to the level of State information technology dominated data-driven
Transition Diagrams of the second stage. approaches during the last decades. Consequently,
An important condition in the designing and the modeling of business processes was often ne-
subsequent modeling of process diagrams is to glected and existing process structures had been
maintain the consistency of inputs and outputs, so directly adapted to information technology. In the
that it is possible to create process maps, starting at present time, more and more company’s processes
Figure 8. STD of the first decomposition stage for the process A211
633
Business Process Management as a Critical Success Factor in EIS Implementation
Figure 9. Process map fragment by the merging of two CFDs at the first level of decomposition.
are being conducted under the external supervisors ness methodology identifying nine different con-
of information systems that are driven by process cerns that anyone trying to change processes in an
models. However, the role of IS supervision does organization must consider. By Harmon (2007)
not aim at taking on the duties of company man- ‘software architects today would probably refer
agement alike as IS supervision can not guarantee to it as framework’. The combination of BPM
avoiding problems arising from organizational and service-oriented architecture (SOA) style is
changes. When spiking about process based IS, considered as effective methodological approach
one of the most important aspects is the selection for the future, especially for companies with ma-
of techniques for process architecture. White & jor ERP systems. This combined approach can
Miers (2008) states that functional decomposition bring greater flexibility than ERP systems since
should be definitely avoided and recommend integration of these tools with other enterprise
thinking of processes as a dynamic network of applications and business partner applications
interacting process instances. Rummler & Brache can be achieved easier.
(1990) introduced important framework of busi-
634
Business Process Management as a Critical Success Factor in EIS Implementation
dIscussIon And conclusIon presumes that key managers are not only aware of
their role in the specification of requirements on
Competition and changes in the business envi- information system functionalities, but they have
ronment induce the need to constantly adapt and better understanding of organizational context of
improve the company’ business processes. The information system.
solution of this problem requires implementing
an effective business process modeler tool for
visualizing, understanding, analyzing, improv- reFerences
ing and documenting business processes. For the
beginning phase of BPM work it is sufficient to Aggarwal, R. (2004). Making BPM work.
model processes in the manner illustrated by the DM Review, 14(9), Retrieved October 1,
schemes in figure 5 or figure 8. However, software 2008 from http://www.dmreview.com/is-
is often considered the most important in success- sues/20040901/1009167-1.html
fully implementing BPM initiatives (Aggarwal, Browning, T. R. (2002). Process integration using
2004). For this purpose we implemented QPR the design structure matrix. Systems Engineering,
software that supports all key elements of busi- 5(3), 180–193. doi:10.1002/sys.10023
ness processes management - from modeling and
documentation, communicating, measurement and Castro, J., Kolp, M., & Mylopoulos, J. (2002).
analysis, to continuous process management and Towards requirements-driven information sys-
improvement. It served us to create comprehensive tems engineering: Rhe Tropos project. Informa-
business process models with accordance to the tion Systems, 6, 365–389. doi:10.1016/S0306-
presented approach illustrating the current status 4379(02)00012-1
of operations. Due to the fact that QPR software Chrissis, M., Konrad, M., & Shrum, S. (2003).
enables to generate process maps, equally as CMMI: Guidelines for process integration and
was shown in figure 8, it opens a further door to product improvement. Boston: Addison-Wesley.
modern business process management. Moreover,
this software tool can be integrated with other Davenport, T. H., & Short, J. E. (1990). The new
systems using a web-based portal that provides an industrial engineering: Information technology
effective means for communicating, monitoring and business process redesign. Sloan Manage-
and continuously improving business processes. ment Review, 11–27.
Nevertheless, for a successful BPM imple-
Deepak, V. (2007). Simplifying BPM implementa-
mentation, organizations might look beyond the
tions: Business process management. Executive
technology piece of the project and focus on the
Insights Gordian Transformation Partners Inc.
“human-side” of the project as well (Deepak,
Retrieved October 1, 2008 from http://www.
2007).
bptrends.com/resources_publications
Another important finding in this work has
been that enterprise process modeling; analysis and Franken, H. M., de Weger, M. K., & Jonkers, H.
implementation are at the core of business process (1997). Structural and quantitative perspectives
management and optimization of EIS designing. on business process modelling and analysis. In
The gradual transition from traditional hierarchical Proceedings of the 11th European Simulation
function based organization to the process-oriented Multiconference, Istanbul, June 1-4, 1997 (pp.
organization envisages a noticeable change in 595-599). Ghent, Belgium: Society for Computer
company manageress’s perception of business Simulation International.
process redesign in a scope of reengineering. It
635
Business Process Management as a Critical Success Factor in EIS Implementation
Greasley, A. (2006). Using process mapping Modrák, V. (2007). Bridging organizational struc-
and business process simulation to support a ture and information system architecture through
process-based approach to change in a public process (LNCS 4537, pp. 445-455).
sector organization. Technovation, 26(1), 95–103.
Modrák, V., & Manduľák, J. (2008). LPH Vranov
doi:10.1016/j.technovation.2004.07.008
n/T-Case study. In L. Fischer (Ed.), BPM excel-
Harel, D. (1987). A visual formalism for complex lence in practice 2008 – Using BPM for competi-
systems. Science of Computer Programming, 8(3), tive advantage (pp. 51-62). Lighthouse Point, FL:
231–274. doi:10.1016/0167-6423(87)90035-9 Future Strategies.
Harmon, P. (2007). Business process change: Reitzig, R. W., Miller, J. B., West, D., & Kile, R.
A guide for business managers and BPM and L. (2003). Achieving capability maturity model
Six Sigma (2nd ed). San Francisco, CA: Morgan integration maturity level 2 using IBM Rational
Kaufmann Publishers Inc. software’s [White Paper]. Retrieved October
1, 2008 from http://www.cognence.com/pdfs/
Hess, T., & Brecht, L. (1995). State of the art des
CMMI_ProcessAndRequirementsManage-
business process redesign. Wiesbaden, Gabler-
ment_WhitePaper%20v1.0.pdf
Verlag.
Rummler, G., & Brache, A. (1990). Improving per-
Jonkers, H. (1997). The application of hybrid
formance: How to manage the white space on the
modeling techniques for business process per-
organization chart. San Francisco: Jossey-Bass.
formance analysis. In Kaylan & Lehmann (eds.),
Proceedings of the 11th European Simulation Scheer, A.-W. (1998). ARIS – Business process
Multi-conference, Istanbul, Turkey, 1-4 June (pp. frameworks (2nd ed.). Berlin.
779-786).
Scheer, A. W., & Nüttgens, M. (2000). ARIS
Kalnins, A., Kalnina, D., & Kalis, A. (1998) architecture and reference models for business
Comparison of tools and languages for business process management (LNCS 1806, pp. 301-304).
process reengineering. In Proceedings of the Third
Ulrich, M. (2001). Critical success factors in a
International Baltic Workshop on Databases and
business process integration initiative [Tactical
Information Systems, Riga, July, 24-28.
Strategy Group White Papers]. Retrieved October
Kováč, M., & Švač, V. (2007). Knowledge sharing 1, 2008 from http://www.ebizq.net/topics/ bpm/
in project Equal. In EQUAL for Automotive (pp. features/2602.html.
10-12). Technical University of Košice.
Van der Aalst, W. M. P. (2003). Business process
Lopez, H., Massacci, F., & Zannone, N. (2007). management: Past, present, future [BPTrends
Goal-equivalent secure business process re- White Papers]. Retrieved October 1, 2008 from
engineering for e-health. In J. Sztipanovits, et http://www.bptrends.com/resources_publications
al. (eds.), Workshop on model-based trustworthy
Vasconcelos, A., Sousa, P., & Tribolet, J. (2005).
health information systems. September 28 - Oc-
Information system architecture evaluation:
tober 3, Toulouse, France.
from software to enterprise level approaches.
Modrák, V. (2005). Business process improvement Paper presented at 12th European Conference
through optimisation of its structural properties. on Information Technology Evaluation (ECITE
In L. Fischer, (Ed.) Workflow handbook 2005 (pp. 2005), Turku, Finland.
75-90). Lighthouse Point, FL: Future Strategies.
636
Business Process Management as a Critical Success Factor in EIS Implementation
White, S., & Miers, D. (2008). BPMN Modeling Zhuang, Q., Feng, J., & Bao, H. (2007). Mea-
and reference guide. Lighthouse Pt, FL: Future suring semantic gap: An information quantity
Strategies Inc. perspective. 5th IEEE International Conference
on Industrial Informatics, 2, 669-674.
This work was previously published in Enterprise Information Systems for Business Integration in SMEs: Technological, Or-
ganizational, and Social Dimensions, edited by Maria Manuela Cruz-Cunha, pp. 24-36, copyright 2010 by Business Science
Reference (an imprint of IGI Global).
637
638
Chapter 3.6
E-Markets as Meta-Enterprise
Information Systems
Martin Grieger
Accenture, Germany
Evi Hartmann
SMI Supply Management Institute, Germany
Herbert Kotzab
Copenhagen Business School, Denmark
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
E-Markets as Meta-Enterprise Information Systems
639
E-Markets as Meta-Enterprise Information Systems
640
E-Markets as Meta-Enterprise Information Systems
Figure 2. A general supply chain management model (Source: Cooper, Lambert, & Pagh 1997)
From a supply chain management point of artificial adaptive agents by using a “genetic
view, one can identify that the number of articles algorithm-based learning technique.”
on the topic IEMP is very rare (see Gibson, Hanna, Baldi and Borgman (2002) provide a short
& Menachof, 2001). Some contributions solely discussion on different theoretical perspectives
cover buying and selling aspects of IEMPs like on the study of automotive IEMPs (the consortia
auctioning and negotiating (see e.g., Emiliani & Cosivint and Volkswagen’s private market place)
Stec, 2002; Sashi & O’Leary, 2002; Wang, Wang, though their transaction cost economics approach
& Tai, 2002) or the use of electronic market places can be seen as rather superficial as they focus
for logistics integration (see Gudmundsson & on the cost aspect of the theory instead of incor-
Walczuk, 1999). porating other important transaction attributes
Wildemann (2002) has presented more exam- such as uncertainty, asset specificity, frequency,
ples of IEMPs application within the supply chain opportunism or bounded rationality (Williamson
area such as using electronic auctions, online bro- 1975, 1985).
kers, electronic catalogs, or electronic freight stock Especially the contribution of Malone, Yates,
exchanges for electronic procurement, electronic and Benjamin’s (1987)Electronic Markets and
logistics, and customer relationship management. Electronic Hierarchies, shows the importance of
Lee and Whang (2001) have presented a model transaction cost economics for IEMP where they
of an information hub—an approach to Internet- propose the electronic market hypothesis saying
based supply chain integration. The information that by reducing the costs of coordination, IT will
hub approach, which is more commonly known lead to an overall shift toward proportionately
as an e-hub, seems to be a key function that an more use of markets—rather than hierarchies—to
IEMP can provide from a supply chain manage- coordinate economic activity (Malone, Yates, &
ment perspective. Benjamin 1987, p. 484, 496).
Grewal, Comer, and Mehta (2001) investigated
the antecedents of organizational participation in
IEMPs theorizing that ability results from the in- IemP In scm busIness PrActIce
fluence of organizational learning and information
technology capabilities. Alternatively, Heezen and The coupling of IEMP with supply chains shows
Baets (1996) investigate IEMPs’ organizational the necessity to advance the IEMP business model
impact on firms. Oliver (1996) even focuses on from a pure buying-selling platform toward a meta-
641
E-Markets as Meta-Enterprise Information Systems
enterprise information system that all involved transaction reductions can be realized and most
supply chain partners can use for information important efficient monitoring and management
exchange and knowledge sharing. The following of all processes.
business cases demonstrate this idea by a review
of how this business model is applied in five se- chemconnect and elemica:
lected IEMPs that serve different industries and IemPs for the chemical Industry
still exist after the e-market-hype disappeared.
However, consolidation in this market is still ChemConnect, founded 1995, is an independent
ongoing and IEMPs need to further improve their IEMP that aggregates supply and demand of
value-added service portfolio. This includes the chemical products (“match-making”). The goal
development of a sustainable business model that of this IEMP is to minimize the time and the costs
ensures their existence. of negotiating prices and conditions for chemical
Our analysis helps to validate the trend of raw materials, usually on spot-basis. ChemCon-
advancing the IEMP-business model towards a nect facilitates different price mechanisms that
meta-enterprise information sharing system. is (reverse-)auctions and an exchange floor.
More than 40 of the leading chemical companies
cc-hubwoo: A cross-Industrial IemP have invested in ChemConnect. In June 2001
ChemConnect added the Envera network, which
Cc-hubwoo was formed by the 2004 merger of the provides connectivity to exchange transactional
French company Hubwoo-Avisium and its German information about long-term contractual business.
competitor cc-chemplorer. In 2005, Trade-Ranger Furthermore, ChemConnect acquired CheMatch
in the U.S. was acquired. This independent IEMP in January 2002, its only online commodities
is the leading global provider for source-to-pay trading rival in the chemical industry, in a private
electronic solutions and supplier network manage- stock trade. The combined companies handled
ment. The company manages the largest business- $8.8 billion in transactions in 2002 (see “news”
to-business eProcurement community in the world at www.chemconnect.com).
with more than 60 buying corporations from all Elemica provides a neutral, independent, and
business sectors ranging from chemical to retail- open network for secure information sharing
ing, construction to aeronautics, and over 12,000 within pre-established chemical trading partner-
connected suppliers in 44 countries worldwide. ships (contracts are already negotiated off-line).
Cc-hubwoo delivers a full range of solutions The users can electronically connect to the Elemica
and services covering the whole procurement network via a single connection, using either estab-
process from sourcing to invoicing to supplier lished industry standards or a series of proprietary
enablement. The product portfolio allows large translations designed around their ERP systems
companies to automate purchase and procure- (www.elemica.com). This single connection lets
ment processes, connect with suppliers, access them share information with trading partners in the
customized electronic catalogues, and execute Elemica network in real time. Currently, Elemica’s
electronic transactions. Cc-hubwoo’s trading hub main function is to offer order processing capa-
processes 2 million purchase orders representing bility directly connected to the companies’ ERP
€5 billion in customer spend value annually. Cc- systems, or for businesses without ERP systems,
hubwoo enables companies to get transparency, Elemica offers the same services through a Web
consistency and control in their purchasing activi- browser. With the formation of Elemica in August
ties. Besides significant efficiency improvement 2000, the 22 founding companies felt they had
in the order-to-pay cycle, substantial cost per to transform the industry, rather than let industry
642
E-Markets as Meta-Enterprise Information Systems
outsiders attempt to provide a “one-size-fits-all” equipment suppliers (currently 150), and ship own-
solution (www.elemica.com). ers in a comprehensive global network. According
to the tribon.com Web site, the core functionality
WWre: the IemP solution for of Tribon.com is a global database with more
the Grocery retail Industry than 70,000 components that can be accessed by
shipyards, agents and suppliers around the world.
In March 2000, 17 international retailers founded The database contains technical information (e.g.,
the Worldwide Retail Exchange (WWRE) to 3D models, design information, pictures, specifi-
enable participating retailers and suppliers to cations and commercial information provided by
simplify and automate supply chain processes, the suppliers who subscribe to the service). By
thereby eliminating inefficiencies in the supply subscribing to the service, shipyards can access,
chain. The founding members committed equity download and integrate information directly to
and provided the basis for the WWRE to be their design model (e.g., Tribon’s design software).
securely launched. Today, there are a total of 61 Tribon.com is supplemented by e-procurement
member companies worldwide that support the tools such as auctions (www.tribon.com).
IEMP (www.worldwideretailexchange.org).
The WWRE is governed by and for its mem- comparison of the examples
bers and is an independently managed, neutral from an scm Point of view
company. The WWRE enables retailers and sup-
pliers in the food, general merchandise, textile/ Table 2 illustrates the previously described char-
home, and drugstore sectors and aims to reduce acteristics of the five IEMPs—cc-hubwoo (across
costs across product development, electronic industries), ChemConnect (including Envera)
procurement, and other supply-chain processes and Elemica for the chemical industry, WWRE
(www.worldwideretailexchange.org). for the retail industry, and Tribon.com for the
maritime industry.
tribon.com: the IemP solution We also see how well the various SCM busi-
for the maritime Industry ness processes are integrated within the IEMP
solutions allowing meta-enterprise information
In October 2000, Tribon.com was launched as a exchange (see Table 3).
neutral IEMP for the maritime industry. It links The cases also show that there are different
together shipyards (currently 100), maritime approaches of the IEMPs to provide specific
IEMP Characteristics
IEMP
cc-hubwoo X X X X X X X X x
ChemConnect x x X X X x
(Envera) x x x x X
Elemica x x x
WWRE x x x x x x x
Tribon.com x x x (x) (X) x
Legend: 1: vertical; 2: horizontal; 3: buy-side; 4: sell-side; 5: neutral; 6: private; 7: consortia; 8: independent; 9: fix; 10: variable; 11: without;
12: open; 13: closed; (x): fix and variable pricing is available at Tribon.com but not used by the industry
643
E-Markets as Meta-Enterprise Information Systems
services related to the SCM processes. Tribon. After the dot-com crash, the few surviving elec-
com, for example, is specialized in the product- tronic marketplaces redefined themselves as value
development process, the WWRE, on the other added service providers. They have focused more
hand, offers a broad choice of functions related on operational excellence, transitioning from IT
to different SCM processes. Elemica is special- shops to services-led business partners. Today, we
ized in the order-fulfilment process but currently can observe the third stage of digital exchanges.
broadens its portfolio. ChemConnect, on the Leading IEMPs, such as cc-hubwoo, are preparing
other hand, has extended its SCM-process range the way for true business process outsourcing. The
by acquiring other IEMPs—the electronic hub vision is to leverage cross-company, cross-industry
Envera, with similar functionality as Elemica, and strengths, and competencies to enable complete
Chematch, with its commodity-trading floor and outsourcing of non-strategic core services, e.g. the
cc-hubwoo’s product offering covers the entire entire procurement function. To make this happen,
source-to-pay process. common business processes need to be identified
and defined and a unified, Web-based architecture
needs to be developed to enable the process and
conclusIon And outlook system integration (Gass, 2005).
644
E-Markets as Meta-Enterprise Information Systems
Amit, R., & Zott, C. (2000). Value drivers of e- Figallo, C. (1998). Hosting Web communities:
commerce business models. INSEAD Working Building relationships, increasing customer loy-
Paper 2000/06/ENT/SM, 6. alty, and maintaining a competitive edge. New
York: Wiley Computer Publishing.
Archer, N., & Gebauer, J. (2000, Jan. 19-21).
Managing in the context of the new electronic Gass, S. (2005). Reaching For the Real-Time En-
marketplace. In Proceedings of the 1st World terprise: Optimizing the Source-to-Pay Process.
Congress on the Management of Electronic Com- A Brief History of Timing. White Paper.
merce, Hamilton, Ontario, Canada, 2000.
Gibson, B. J., Hanna, J. B., & Menachof, D. A.
Armstrong, A., & Hagel, J. III. (1996). The real (2001, Sept. 13-14). An international analysis of
value of on-line communities. Harvard Business the value of logistics periodicals for teaching,
Review, 74(3), 134–141. research, and outreach purposes. In A. McKin-
non (Ed.), Proceedings of the Logistics Research
Bakos, Y. (1991). A strategic analysis of electronic
Network (LRN) Conference (pp. 149-159). Heriott-
marketplaces. MIS Quarterly, 15(3), 295–310.
Watt University, Edinburgh. London: Institute of
doi:10.2307/249641
Logistics and Transport.
Bakos, Y. (1998). The emerging role of electronic
Grewal, R., Comer, J. M., & Mehta, R. (2001). An
marketplaces on the Internet. Communications of the
investigation into the antecedents of organizational
ACM, 41(8), 35–42. doi:10.1145/280324.280330
participation in business-to-business electronic
Baldi, S., & Borgman, H. (2002). Ownership- markets. Journal of Marketing, 65(3), 17–33.
structures of electronic b2b marketplaces—A doi:10.1509/jmkg.65.3.17.18331
multi-perspective analysis. In H. Buhl, A. Huther
Grieger, M. (2003). Electronic marketplaces: A
& Reitwiesner (Eds.), Proceedings of the Informa-
literature review and a call for supply chain man-
tion Age Economy, Proceedings 5th International
agement research. European Journal of Opera-
Conference on Information Management (pp.
tional Research, 144(2), 280–294. doi:10.1016/
589-603). University of Augsburg.
S0377-2217(02)00394-6
Cooper, M. C., Lambert, D. M., & Pagh, J.
Grieger, M. (2004). Internet-based electronic
D. (1997). Supply chain management: More
marketplaces and supply chain management.
than a new name for logistics. International
Copenhagen: Samfundslitteratur.
Journal of Logistics Management, 8(1), 1–14.
doi:10.1108/09574099710805556 Grieger, M., & Kotzab, H. (2002a, June 13-14).
Supply chain management beyond electronic mar-
Emiliani, M. L., & Stec, D. J. (2002). Realizing
ketplaces—insights from the chemical industry. In
savings from online reverse auctions. Supply
Proceedings of the 14th International NOFOMA
Chain Management: An International Journal,
Conference. Trondheim, Norway.
7(1), 12–23. doi:10.1108/13598540210414355
Grieger, M., & Kotzab, H. (2002b, Oct. 23-27).
Essig, M., & Arnold, U. (2001). Electronic pro-
The use of electronic marketplaces for managing
curement in supply chain management: An infor-
supply chains. The Use of Electronic Marketplaces
mation economics-based analysis of electronic
for Managing Supply Chains. In Proceedings of
markets. Journal of Supply Chain Management,
the 5th International Conference on Electronic
37(4), 43–49. doi:10.1111/j.1745-493X.2001.
Commerce Research. Montreal, Canada.
tb00112.x
645
E-Markets as Meta-Enterprise Information Systems
Gudmundsson, S. V., & Walczuk, R. (1999). The de- Lipis, L. J., Villars, R., Byron, D., & Turner, V.
velopment of electronic markets in logistics. Inter- (2002). Putting markets into place: An e-market-
national Journal of Logistics Management, 10(2), place definition and forecast IDC. Retrieved from
99–113. doi:10.1108/09574099910806021 http://www.idc.com
Handfield, R. B., & Nichols, E. L., Jr. (1999). Liu, S. (1998). Strategic scanning and interpreta-
Introduction to supply chain management. Upper tion revisiting: Foundations for a software agent
Saddle River, NJ: Prentice Hall. support system—Part 1: understanding the con-
cept and context of strategic scanning. Industrial
Heezen, J., & Baets, W. (1996). The impact of
Management & Data Systems, 98(7), 295–312.
electronic markets: The case of the Dutch Flower
doi:10.1108/02635579810241764
Auctions. The Journal of Strategic Information
Systems, 5(4), 317–333. doi:10.1016/S0963- Malone, T. W., Yates, J., & Benjamin, R. I. (1987).
8687(96)80032-1 Electronic markets and electronic hierarchies.
Communications of the ACM, 30(6), 484–497.
Henderson, D. R. (1984). Electronic marketing
doi:10.1145/214762.214766
in principle and practice. American Journal
of Agricultural Economics, 66(5), 848–853. Oliver, J. R. (1996). Market process reengineering
doi:10.2307/1241012 through electronic market systems: Opportunities
and challenges. Journal of Management Informa-
Iacono, S., & Weisband, S. (1997). Developing
tion Systems, 13(3), 113–126.
trust in virtual teams. The 30th Annual Hawaii
International Conference on System Sciences Picot, A., Reichwald, R., & Wigand, R. T. (2001).
(Vol. II, pp. 412-420). Die grenzenlose Unternehmung—Information,
Organisation, und Management (The borderless
Kaplan, S., & Sawhney, M. (2000). E-hubs—The
organization). (4 ed.) Wiesbaden: Gabler.
new B2B marketplaces. Harvard Business Review,
(May-June): 97–104. Sashi, C. M., & O’Leary, B. (2002). The role of
Internet auctions in the expansion of B2B mar-
Kauffman, R. J., & Dai, Q. (2000). Business
kets. Industrial Marketing Management, 31(2),
models for Internet based e-procurement systems
103–110. doi:10.1016/S0019-8501(01)00189-4
and b2b electronic markets: An exploratory assess-
ment. In Proceedings of the 34th Annual Hawaii Wang, K., Wang, E. T. G., & Tai, C. F. (2002). A
International Conference on System Sciences study of online auction sites in Taiwan: Product,
(HICSS-34). IEEE Computer Society. auction rule, and trading type. International Jour-
nal of Information Management, 22(2), 127–142.
Kollmann, T. (2000). Competitive strategies for
doi:10.1016/S0268-4012(01)00050-0
electronic marketplaces. Electronic Markets, 10(2),
102–109. doi:10.1080/10196780050138155 Wildemann, H. (2002). Supply chain management
mit e-Technologien (supply chain management
Lee, H. L., & Whang, S. (2001). E-business and
with e-technology). [Journal for Business Ad-
supply chain integration Stanford global supply
minsitration]. Zeitschrift für Betriebswirtschaft,
chain management forum. Retrieved from http.//
67(3), 1–20.
www.altosvc.com
Williamson, O. E. (1975). Markets and hierarchies:
Analysis and antritrust implications. New York:
The Free Press.
646
E-Markets as Meta-Enterprise Information Systems
Williamson, O. E. (1985). The economic institu- mainly concerned with the sharing of information
tions of capitalism: Firms, markets, relational among members of the supply chain, for example,
contracting. New York: The Free Press. demand information, inventory status, capacity
plans, production schedules, promotion plans,
Wise, R., & Morrison, D. (2000). Beyond the
demand forecasts, and shipment schedules (infor-
exchange: The future of b2b. Harvard Business
mation integration). The second element refers to
Review, 78(6), 86–96.
tightening organizational relationships between
firms (organizational linkage), and the third ele-
ment refers to the redeployment of decision rights,
Web sItes used cc- work, and/or resources to the “best-positioned”
supply chain member (coordination).
Chemconnect: http://www.chemconnect.com Internet-Based Electronic Marketplace
(IEMP): Internet-based meta-enterprise informa-
Elemica: http://www.elemica.com/
tion system that allows participating firms (B-to-B)
Hubwoo: http://www.cc-hubwoo.com/ to interact and to accomplish one or more of the
following market-making activities/transactions:
Tribon.com. http://www.tribon.com
identifying potential trading partners, facilitating
Worldwide Retail Exchange. http://www.world- the exchange of information, goods, services, and
wideretailexchange.org payments and providing an infrastructure that
enables an efficient functioning of the market.
Meta-Enterprise Information System: An
information system that crosses organizational
key terms And deFInItIons
boundaries and involves resources shared between
6C Business Model: A system-oriented view two or more enterprises.
or concept for analyzing meta-enterprise informa- Supply Chain Management: The integration
tion systems. The six Cs are abbreviations for six of key business processes from end user through
subsystems or business models: context, connec- original suppliers, which provides products, ser-
tion, content, commerce, community, and cost. vices, and information that add value for customers
Electronic Marketplace or E-Market: A type and other stakeholders.
of an inter-organizational information systems that Virtual Supply Chain: A supply chain (net-
enables virtual business transactions and allows work) that is connected through electronic links
the exchange of price and product information and characterized by its inherent flexibility to
between buyers and sellers. quickly adopt and adapt to changes in the business
Integrated Supply Chain/Supply Chain environment. Meaning that, new members can be
Integration: A “seamless supply chain” where continually added and old members deleted or
territorial boundaries between trading partners are have roles reassigned to them within the chain. As
eliminated allowing them to operate effectively a result, a virtual supply chain is a combination
as if they were part of one organization. Supply of a computer-based structure and a temporary
chain integration typically encompasses three organized supply chain network.
distinct, albeit related, elements: One element is
This work was previously published in Encyclopedia of Networked and Virtual Organizations, edited by Goran D. Putnik
and Maria Manuela Cruz-Cunha, pp. 475-483, copyright 2008 by Information Science Reference (an imprint of IGI Global).
647
648
Chapter 3.7
Enterprise Systems as an
Enabler of Fast-Paced Change:
The Case of Global B2B
Procurement in Ericsson
Oswaldo Lorenzo
Instituto de Empresa Business School, Spain
Angel Díaz
Instituto de Empresa Business School, Spain
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Systems as an Enabler of Fast-Paced Change
downturn. This triggered revolutionary changes and centralized e-procurement model, designed to
in company processes as they prepared first for reduce costs worldwide. This entailed outsourcing
growth, then for market deceleration, and finally services to a Nordic marketplace for the time-
for the market downturn. For three years Ericsson consuming activities of supplier activation, content
reported heavy operating losses and the company management, and integration with suppliers. This
undertook radical restructuring (e.g., offshoring, phase allowed the company to develop a network
outsourcing, and downsizing). During this period of global suppliers and to obtain greater visibility
the information system infrastructure, based on throughout the whole process.
SAP applications, served as a key enabler of these This study uses Pettigrew’s (1990, 1997)
changes. As described in the chapter, the enterprise framework to structure and analyze fieldwork
system allowed the company to flexibly support factors from the perspective of the Spanish sub-
the majority of actions throughout the growth sidiary. From this analysis emerges a model of
and downturn phases. In light of the above, this evolutionary implementation of B2B procurement
investigation studies how and why enterprise at different organizational stages (local, European,
systems are able to support fast-paced changes. and global). It is based on an in-depth examination
In other words, this chapter presents enterprise carried out from different angles, which include
systems as flexible and responsive infrastructures market and industry, local and global organization,
that enable organizational change. and inter-organizational relations with suppliers
The transformation process comprised three and technological partners, while taking into ac-
phases. Firstly, the Spanish subsidiary implement- count change processes occurring in parallel in
ed the system as an enabler for agility and control other areas of the organization. For each period
in the MRO (materials, repairs, and operations) of study, the research investigated how these
materials procurement process. This was a con- levels interact and how these forces influenced
sequence of the explosive growth of mobile sales the B2B procurement implementation process.
up to December 1999, when the legacy system Furthermore, the study includes a longitudinal
was no longer able to support the unexpected high analysis in order to understand how the results of
demand for materials and services from the sales previous stages influenced the subsequent stages.
and project areas, resulting in a lack of control The relevant success factors inferred by a
over MRO materials and low service levels. The comparison of these experiences are: enterprise
implementation of B2B procurement allowed the systems (ESs) and business alignment, the sup-
company to reduce the number of suppliers, the port of senior management, ES specialists, project
number of employees in the purchase area, and management, change agents, communication
reduce maverick spending1, as well as to develop strategies, organizational commitment, win-win
a process that was both flexible and controlled. relationship with suppliers, and information tech-
In the second phase, in response to the market nology (IT) compatibility.
downturn in 2000, the system was rolled out into Finally, the study links its results to previous
the Iberia Market Unit (Portugal and Spain) as an theory in order to explain the findings, and analyze
enabler of shared services for the purchase-to-pay said findings from the perspective of information
process. This centralization allowed the company system infrastructure and organization flexibility.
to further reduce the number of purchasing em- Based on Anthony and Turner’s (2000) dimensions
ployees throughout the area, to reduce costs of the of information systems flexibility (integration,
purchase-to-pay process by an average of 30%, modularity, and personnel), the study argues that
and to build up a network of regional suppliers. enterprise systems like SAP can be considered
In the last phase Ericsson implemented a global flexible infrastructures for organizations. This
649
Enterprise Systems as an Enabler of Fast-Paced Change
finding contributes to the current debate on from that of the internal processes developed by
enterprise systems flexibility. In actual fact, the the company in response to these drivers.
study supports the rejection of the myth that en-
terprise systems render the business model rigid, external context: market drivers
as it shows how the enterprise system chosen by
Ericsson allowed the purchase organization to Between 1999 and 2000 the telecommunication
evolve quickly from a local-based organization, sector underwent huge growth. Two causes un-
to a regional and finally a global organization in derlie this phenomenon. First was the expansion
a highly dynamic environment. of new telecommunication technologies and
This research was based on the empirical services such as mobile phones, as companies in
evidence and then analyzed using Pettigrew’s the sector competed fiercely to gain market share
(1990, 1997) framework and linked to IT infra- for their mobile phones in different regions. As a
structure flexibility literature. The methodology consequence there were huge investments in the
used was that of in-depth single case study. This facilities and infrastructures required to support
methodology is recommended for the study of mobile networks. Second, this period coincides
“how” questions, and for the understanding of with the technological bubble and the “dot.com”
phenomena in early stages of research (Miles & enterprises market, a phenomenon that also af-
Huberman, 1994; Yin, 1994). Data were collected fected the telecommunications sector, given that
using a variety of techniques: unstructured inter- it provided many of the services demanded by
views, semi-structured interviews, and internal and the new economy.
external documentary review. This triangulation
permits cross-checking. The analysis consisted external context:
of data reduction, data display, and conclusion technology drivers
drawing (Yin, 1998; Miles & Huberman, 1994;
Eisenhardt, 1989). Even though the methodology Although ERP systems had been implemented
used in this study makes it difficult to generalize by the majority of large companies worldwide,
the findings and conclusions, we believe these e-procurement functionalities were initially very
findings can be helpful to practitioners and schol- limited. Hence many companies had decided at the
ars. For practitioners, the study presents ES as a time to develop their own custom-made applica-
flexible infrastructure to enable change. This goes tions, Ericsson’s head office in Sweden among
against common belief and introduces learning to them. Later however, many Internet-based appli-
practitioners involved in the deployment of ES. cations appeared on the market designed to give
For scholars, this study opens up debate vis-à-vis support in specific areas, including e-procurement,
traditional research that views ES as inflexible. to companies using ERP systems. Although a
Further research will doubtlessly enrich the debate. world leader in ERP systems, SAP arrived late
to the boom of Internet-based applications, but
then moved quickly to upgrade its programs
PHAse one: deAlInG and adapt them to a Web-enabled infrastructure.
WItH GroWtH When Ericsson Spain decided to purchase an ef-
fective e-procurement application rather than use
This section describes the first stage in the trans- that developed earlier by Ericsson’s head office,
formation of Ericsson, that of accelerated growth SAP was searching for companies that wanted to
in 1999 and 2000, from the perspective of the implement the SAP e-procurement functionality as
external drivers that generated the growth and a pilot test, in order to fine-tune the first version.
650
Enterprise Systems as an Enabler of Fast-Paced Change
Before 2000 Ericsson’s corporate strategy had The implementation process analysis was adapted
been one of a decentralized global company. from Cooper and Zmud (1990) and Lorenzo and
This meant that Ericsson España (EE) could plan, Diaz (2005). From the analysis of data emerged
execute, and control many of its activities on a an implementation process of six stages: (1) ini-
stand-alone basis. For example, EE had procure- tiation, (2) process design and gap analysis, (3)
ment contracts negotiated locally. At that moment implementation, (4) mutual adaptation of orga-
“each subsidiary concentrated on its own business, nization and technology, (5) supplier adaptation,
and it was unusual to collaborate among differ- and (6) establishment of a routine.
ent countries,” pointed out Rafael Berriochoa,
director of IS and sourcing manager. On the Initiation
other hand, the local IS department developed
and bought software independently, according The implementation of the B2B procurement be-
to its own needs, given that Ericsson’s business gan in 1999 when senior management identified
model permitted internal capabilities in each area the need for a better system for procurement of
or business process. Thus Ericsson owned facto- MRO materials. Explosive market growth and the
ries and R&D centers in different countries. The internalized service culture of “always arriving
company had also deployed an Excellence Center first” had encouraged the need for a faster and
(Ericsson Business Consulting), composed of 160 more flexible execution of business processes.
consultants in Spain. Although customers were satisfied with the high
level of quality and speed of Ericsson’s services,
Internal context: structure, the company had sacrificed efficiency and control
culture, and Processes of its back-office processes. Procurement of MRO
materials exhibited the following shortcomings:
As a consequence of its corporate strategy, EE
developed many core capabilities (e.g., manufac- • Widespread maverick spending:
turing, R&D, and network installation) locally, “Everyone was placing orders to every sup-
along with support processes (e.g., purchase, plier,” pointed out one of the interviewees.
administration, and systems). Creativity, inde- • Invoices without purchase orders.
pendence, and an entrepreneurial spirit were all • Lack of standardized processes: “There
part of the company culture. was a different process for almost every
EE implemented SAP R/3 between 1997 and purchase,” pointed out the project manager.
1998 through its Excellence Center, having been
encouraged by the company’s head office. This In light of the above, the senior management of
project meant having to embark on the standard- EE identified the need to change the MRO procure-
ization of processes and systems throughout the ment process in order to have more control, but
organization. After a period of time, the company without sacrificing the speed and agility required
had extended SAP into many areas or processes. to fulfill market growth. According to the sourcing
The implementation of SAP B2B procurement and business information manager, “The only way
formed part of this diffusion strategy. to work at this market speed was to implement a
B2B procurement application.” At the end of 1999,
EE began implementing SAP B2B procurement.
651
Enterprise Systems as an Enabler of Fast-Paced Change
The aim was to design an efficient, controlled, and • IT capacity and plans for the future, also
flexible process. The company decided to choose based on examinations
SAP because of ensured integration between the
new functionality and the ERP system. For SAP Process design was performed using gap analy-
it was an exceptional opportunity to test and fine- sis of system and process requirements. Although
tune its B2B procurement application. some gaps resulted from this analysis, they were
eventually conciliated (see below, Mutual Ad-
Process Design and Gap Analysis aptation of Organization and Technology). This
exercise was used to establish the to-be process.
The purchase of MRO materials accounted for
24% of annual purchasing costs (about 100 mil- Implementation
lion euros). One of the main shortcomings of
the legacy process was the fact that orders were Implementation of the new functionality took three
placed through “free text,” which meant that the months, from December 1999 to March 2000.
procurement department had to rewrite them The implementation consisted of the creation of
one by one. At that moment the department staff catalogs, the design of workflows, system cus-
comprised 22 people. “Perhaps the purchasing tomization, pilot testing, and training. The project
process was more expensive than the cost of the team was composed of key users, Ericsson’s own
actual product,” the project manager commented. consultants, and the SAP consultants. For SAP it
The process requirements were: was essential to ensure the success of its first B2B
implementation in Spain.
• Simple and user friendly
• Decentralization of the order process to Mutual Adaptation of
employees Organization and Technology
• Use of catalogs with price and predefined
supplier As a result of the gap analysis, adjustments were
• Flexibility for managing the purchasing made to the organization and to the system, in-
of non-codified materials (e.g., marketing cluding:
campaigns)
• Workflows • Change in the procurement depart-
• Automatic conciliation of invoice and ment’s role: Purchasers were to spend
order more time on strategic tasks (e.g., negoti-
• Centralization of negotiation with suppliers ating with suppliers) than on transactional
purchasing tasks.
There was also an evaluation and selection • Decentralization of the order process to
of the suppliers that would continue delivering employees.
materials to the company. The key selection • Clear definition of order approval roles.
variables were: • New role of cataloging in the procure-
ment department: This role was respon-
• Price and quality of the delivered materials sible for the joint design and management
• ISO 9000 of catalogs with suppliers.
• Delivery capacity, based on an examina-
tion of processes at the supplier’s plant
652
Enterprise Systems as an Enabler of Fast-Paced Change
• Personnel reduction—the number of pur- In 2001, although ERP suppliers offered a greater
chasers was reduced from 22 to 4 people. range of e-procurement functionalities, in-house
• Zero stocks of MRO materials, because custom-made applications were the most common
suppliers delivered directly to users within option (AMR Research, 2001). That same year
two days. SAP launched an upgraded and enhanced B2B
• Cost reduction—the cost of an order was procurement functionality called Enterprise Buyer
reduced from €140 to €14. Professional (EBP).
• Reduction of the number of suppliers from
4,000 (listed) to 160 (actives). Internal context: structure,
• 10% reduction in the cost of MRO culture, and Processes
materials.
• Standardized control and discipline Although Ericsson continued to pursue a global
processes. decentralized strategy, the company began to
• SAP programmed new functionalities for consolidate some of the support processes in
its B2B application to improve its products shared services. The aim was to create a more
and satisfy company requirements (e.g., adaptable and flexible business model that per-
free-text catalogs). mitted economies of scale and scope. Execution
• The remaining suppliers achieved high- of the abovementioned strategy entailed creating
er sales volumes and more standardized business support centers (BSCs) for the countries
relationships. in Western Europe, a decision that affected 17
653
Enterprise Systems as an Enabler of Fast-Paced Change
subsidiaries. The BSCs used shared services for ad- in Spain. This reference process took into ac-
ministrative, financial, and purchasing processes. count minor requirements from other countries
The new business model brought significant like France and Holland and was redesigned to
changes in EE’s structure and culture. The admin- create a core model that became the standard for
istrative, financial, and purchasing processes were countries participating in BSC initiatives.
consolidated in two hubs for Western Europe. Sub-
sidiaries defined new roles and were responsible Implementation
for the internal customer relationship management.
This model also meant that EE developed a service The implementation of ep2p and the creation of
culture in back-office departments. the BSCs took six months in all. The ep2p project
Given that the expectations in the telecom consisted mainly of the migration of the former
market changed from an optimistic scenario to a functionality to the new version (EBP). In Spain
conservative one, Ericsson wanted to create a more a good communication campaign was required
flexible and adaptable business model that would to explain to users the need to migrate from one
be able to react to any external contextual change. version to another, even though the former ver-
A study by Cap Gemini Ernst & Young revealed sion had only recently been implemented. The
high operating costs due to a decentralized model project was led by the local purchase area and was
that duplicated resources in all subsidiaries. The supported by Cap Gemini consultants, who then
company subsequently developed the market unit rolled out the system to the other European BSCs.
solution whereby it unified applications in all the
subsidiaries of a market unit. The market unit solu- Mutual Adaptation of
tion was based on a former SAP implementation, Organization and Technology
and incorporated the implementation of the SAP
B2B functionality as the enabler of consolidated This initiative focused on the transactional ele-
purchase-to-pay processes. ments of the purchasing processes. For EE there
were no significant changes in the way the com-
the Implementation of the electronic pany carried out the purchasing process. The main
Purchase-to-Pay Process change was the introduction of a new role called
‘service manager’ in the subsidiaries, responsible
Initiation for the service management of the purchase-to-pay
process. Given that Spain was one of the places
The implementation of the SAP B2B functional- were a BSC was established, the purchasing
ity into the purchase-to-pay process was a Euro- personnel remained the same as before. From a
pean initiative. The project was called electronic technological perspective, this initiative consisted
purchase-to-pay, or just ep2p, and it became a key of merely migrating from one version to another,
enabler of the BSC initiative. One of the BSCs the second of which included a better materials
was established in Madrid to manage Portugal classification functionality.
and Spain. The upgraded functionality (EBP) was
used for this initiative. Supplier Adaptation
Process Design and Gap Analysis From a process and technological perspective,
there were no significant changes in the way
The modeling of the to-be purchase-to-pay process suppliers interacted with EE. However, the new
borrowed from the process already implemented initiatives did imply some major changes in or-
654
Enterprise Systems as an Enabler of Fast-Paced Change
ganizational structure. Ericsson asked suppliers moment, telecom companies (e.g., Telefónica in
to take on the responsibility of the cataloging Spain) began to reduce their investments and to
process. Training programs were needed to achieve restructure their business models.
this objective.
external context:
Establishment of a Routine technology drivers
Once implementation was complete, the company From 2001, there was a significant increase in
and suppliers adapted quickly to the new processes. the offering of B2B procurement functionalities
and marketplace solutions. In 2002, the diffusion
consequences of packaged software for the B2B and electronic
marketplace reached 28% of the market, with
• For EE this initiative meant that it began SAP, Ariba, Commerce One, Oracle, and i2 (AMR
to lose independence in the design and ex- Research, 2001) as main suppliers. Important
ecution of local back-office processes. The electronic marketplace initiatives were adopted in
new consolidated purchase-to-pay process different sectors by firms like Covisint (automo-
allowed the corporation to have more vis- tive), Aero Exchange International (aerospace),
ibility of spending and more control over and ChemConnect (chemical).
the operation.
• This initiative allowed the company an ad- Internal context: structure,
ditional 30% process costs reduction. culture, and Processes
• Suppliers had to catalog all their materials
into the system. The telecom crisis resulted in huge losses for
• Suppliers developed internal cataloging companies. For example, between 1999 and 2002
capabilities. Ericsson’s operating losses totaled €2,000 mil-
• Some local suppliers began to develop lion. As a consequence the company had to make
the capacity to deliver in more than one some hard decisions, for which purpose a crisis
country. committee was set up. One of the first decisions
was to develop a global company, reducing local
PHAse tHree: coPInG WItH capabilities.
tHe mArket doWnturn In 2002, Ericsson carried out a total overhaul
of its business model. The company had to adapt
This section describes the third stage in the quickly to new market conditions. “Our new orga-
transformation process that took place after 2001 nization will put even more emphasis on serving
and entailed the consolidation of back-office our customers, reducing complexity, and applying
processes. our resources more efficiently,” said president
and CEO Kurt Hellstrom (Wireless Newsfactor,
external context: market drivers 2001). One of the main lines of action was to
group subsidiaries located in 140 countries into
Between 2002 and 2003, the telecom market 31 market units. Subsequently EE became part of
downturn decelerated. Recovery remained slow, the EMEA (Europe, Middle East, and Africa) unit.
however, because of the terrorist attacks in New This restructuring meant downsizing employees
York, which extended the economic crisis to other by 24% worldwide. Further measures included
sectors such as airlines and insurance. At that offshoring (e.g., closing down the factory in
655
Enterprise Systems as an Enabler of Fast-Paced Change
Hence Ericsson decided to create a common For Ericsson España this new project brought
global purchasing process for MRO materials. The small changes in relation to the former purchasing
company opted for EBP (SAP’s B2B procurement processes. For example, one of the changes was
tool) for this global initiative. “We work strategi- the simplification of workflows. The centralization
cally to minimize the number of local, unique, and standardization meant that EE lost power over
homegrown solutions so that we can cut costs and local purchasing processes. Where technology was
groom the business support system landscape,” concerned, EE had to migrate to the new version
pointed out Anders Paulsson, purchasing director of SAP’s B2B procurement functionality and had
(IBX Newsletter, 2003). to connect to the IBX marketplace.
The design of the new process was based on a This new project brought the following changes
centralized structure. Some members of this proj- for suppliers: (1) use of the IBX marketplace to
ect team visited EE in order to learn from local interact with Ericsson, (2) catalog management
experience in terms of both implementation and was moved to the IBX marketplace, and (3) the
use of the system. The implementation of the new payment of fees for interacting with Ericsson
process only allowed small deviations from the through the IBX marketplace.
established design.
656
Enterprise Systems as an Enabler of Fast-Paced Change
657
Enterprise Systems as an Enabler of Fast-Paced Change
• During the third stage (2002-2003), the change projects were led by senior management
transformation process of MRO purchases at EE:
at a global level was key for the conver-
sion of the company to a global centralized • During the first stage, senior purchasing
enterprise. A key task for this global ob- management at EE was the main sponsor
jective was the migration of processes and of the transformation process. The pur-
technologies in EE towards the new pro- chasing department assumed responsibil-
cess and the new technology suggested by ity for the change process at all times. This
head office. role included decision making on process
design and the selection of suppliers, proj-
support of senior management ect monitoring, and support for change
management.
As a consequence of the alignment of transfor- • During the second stage, sponsoring the
mation processes to business objectives, all three transformation process was the respon-
658
Enterprise Systems as an Enabler of Fast-Paced Change
sibility of BSC and the local purchasing experience in activity consolidation proj-
units. Subsequently, close relations were ects in global organizations with complex
established between them. A joint monitor- structures. According to the country man-
ing group was made responsible for close- ager for Portugal, this firm also played a
ly controlling migration, change manage- key role in local change management and
ment, and communications. in facilitating good relations between BSC
• Sponsoring the transformation process on and local companies.
a global level was the responsibility of the • During the third stage, the transformation
CEO and of the local purchasing units. A process was supported by the consulting
detailed control was required of head of- firm Accenture and by the implementation
fice for on-time fulfillment of each project team of the IBX portal. Accenture guided
in the rollout. the rollout project in all countries, and IBX
guided the process of catalog updates and
specialists managing suppliers.
659
Enterprise Systems as an Enabler of Fast-Paced Change
• During the first stage, 10 key users were objective was to raise awareness among
designated as project champions and as employees of the economic circumstances
training facilitators. These key users were of the organization and of the importance
secretaries and those responsible for pur- of moving toward centralized processes
chasing in the projects department. and systems in order to reduce costs. In ad-
• During the second and third stages (2001- dition to electronic means of communica-
2003), the change agents (or key users) tion (e-mail, Web sites, and intranet), there
were also designated as project champions was direct communication with key users.
and training facilitators. For the project
leader it was very important to transmit to commitment
these champions the reasons and drivers
that made EE leave a local-sourcing model The commitment of all stakeholders to the trans-
for one of the back-office activities central- formation process was obtained by demonstrating
ized first at the BSC and subsequently at its benefits. The departments of procurement and
the head office in Sweden. finance participated proactively in the definition of
requirements. These were subsequently negotiated
communication with the SAP consultants, who in many cases had
to customize the system to meet organizational
Communication of project objectives and the rea- needs. For the department of systems and IT,
sons for embarking on the project played a pivotal standardizing procurement was critical, as was
role in change management throughout all three compatibility with the existing ERP system. Even
stages. This was achieved through clear intranet, if final users may have perceived the project as an
e-mail, and notice board messages: increase in their day-to-day responsibilities (and
hence may have been prone to resist implementa-
• During the first stage, the objective of the tion), the proposed transformation promised high
communication campaign was to explain service levels, which resulted in commitment.
to all employees the need for better control The explosion of the technological bubble, and
and efficiency in the procurement of MRO its impact on Ericsson, was clearly understood by
materials and services, and to expound the the employees, many of whom accepted early re-
basic characteristics of the technological tirement or negotiated leaves of absence, facilitat-
enabler. ing the commitment to changes that could enable
• During the second stage of transformation, the survival of their business. Comprehending the
the objective of the communication cam- reasons and drivers behind this change process
paign was to explain to all employees the brought commitment from key users and project
need for migration and adjustment of pro- participants. In addition to bonus schemes, there
curement to a new model that could con- was an implicit psychological contract with the
solidate purchases at a European level. It success of the project.
was considered very important that these
changes be related to the transformations support for suppliers
occurring in the marketplace.
• During the third stage, information was At each stage of the transformation process, EE
communicated in progressive fashion, giv- helped suppliers adapt to changes:
en that subsequent changes were to have a
profound impact on the organization. The
660
Enterprise Systems as an Enabler of Fast-Paced Change
• During the first stage, the main support • During the second stage, the selection of
activity was training. This was basic and the new version of SAP’s B2B (EBP) to
only took half a day; and as technological support the purchase-to-payment process
requirements were few (just an e-mail ac- at BSC simplified the new transformation
count), the need for support was limited. process at EE, given that from a techno-
• During the second stage, the main change logical perspective the new project was
for suppliers was the assignment of re- merely a question of migrating to another
sponsibility for the catalog, which had to version of the technology.
include all items purchased. EE supported • During the third stage, the selection of a
its suppliers at the beginning of this pro- new version of EBP to support a central-
cess through training and a support group. ized procurement process at the head office
• During the third stage, the main change for level facilitated the third transformation
suppliers was their integration into the IBX process at EE, as again, from a techno-
marketplace. EE arranged for head office to logical perspective, the new project was
suspend connection fee charges to the mar- merely a question of migrating to another
ketplace portal for a one-year period while version of the technology.
suppliers learned to appreciate the advan-
tages of this new means of communica- dIscussIon on tHe FlexIbIlIty
tion. Also, to reduce language barriers, EE oF enterPrIse systems
supported connection to Spanish suppliers
through a Spanish portal called Opciona, This study links its results to previous theory in
which had alliances with IBX. Opciona order to explain the findings. Hence the findings
and IBX worked closely with suppliers to were analyzed from the perspective of information
streamline the process of updating catalogs. system infrastructure and organization flexibility.
Anthony and Turner’s (2000) study took the first
technological compatibility step toward creating a valid IT infrastructure
flexibility construct. Their findings reveal that
Another relevant factor for each transformation IT infrastructure flexibility can be expressed in
process was the selection and implementation of three factors: two related to technical issues and
technologies that were compatible with or easily one to human issues. They labeled these factors
integrated into existing ones. Ericsson preferred as “integration,” “modularity,” and “IT personnel
to maintain a single-system platform to simplify flexibility,” respectively. The integration factor is
technology management and to ease users’ learn- a merger of the dimensions of IT connectivity and
ing curve: IT compatibility. Connectivity is the ability of any
technology component to attach to any other com-
• During the first stage, the selection of SAP ponent inside or outside the company. Compatibility
for the B2B functionality facilitated the is the ability to share any type of information with
integration of the new MRO procurement any technology component. This factor suggests
process into the existing ERP application. that transparent access into all platforms contributes
It also eliminated the need for middleware, to IT flexibility. The modularity factor is a merger
aided technology management, and meant of the dimensions of application functionality and
that the company could use the learning database transparency. Modularity is the ability to
curve of the previous SAP implementation add, modify, and remove any component of the
as a base. infrastructure with ease. IT personnel flexibility
661
Enterprise Systems as an Enabler of Fast-Paced Change
is related to the depth and breadth of four types systems flexibility. In fact, this study supports
of knowledge and skills: (1) technology manage- the refutation of the myth that enterprise systems
ment knowledge and skills, (2) business functional make for a rigid business model. The study shows
knowledge and skills, (3) interpersonal and man- how the enterprise system chosen by Ericsson
agement skills, and (4) technical knowledge and permitted the purchase organization to evolve
skills. This implies that technical skills alone are quickly from a local-based organization to first
not enough to implement and use IT. a regional and then to a global organization in a
If one evaluates EE’s B2B implementation highly dynamic environment.
experience using Anthony and Turner’s frame-
work, one can argue that enterprise systems such
as SAP are flexible information technologies. The conclusIon
three factors mentioned by Anthony and Turner
are present in the case of EE. These three factors This chapter provides a detailed analysis of
allowed SAP to evolve flexibly according to the organizational transformation of Ericsson
Ericsson’s needs and challenges. First, the inte- in Europe, from the perspective of the Spanish
gration factor allowed the SAP B2B procurement subsidiary. It focuses on how said organizational
functionality to connect smoothly to the SAP transformation was enabled by enterprise systems.
back-office functionalities, such as the financial Specifically the chapter describes this process as
and materials management modules. Addition- taking place in three stages: the implementation
ally, the integration factor allowed the SAP B2B of a B2B procurement application in Spain; the
procurement functionality to share information evolution of this application into a regional B2B
with other organizational departments. procurement platform; and its final transformation
Second, the modularity factor allowed the into a global, pan-European B2B procurement unit.
SAP B2B procurement functionality to add new We argue that this successful and rapid process,
versions to previous implementations with ease. driven by drastic market changes, was partially
In fact, users considered that all migrations were enabled by a B2B procurement enterprise system.
transparent processes. Furthermore, the modular- This process in turn leads us to examine key
ity factor allowed the SAP B2B functionality to success factors in ES-supported global organiza-
modify previous configurations with no problems. tion transformation processes. These factors are:
Finally, the IT personnel flexibility factor allowed alignment with business objectives, support of
the SAP B2B functionality to be implemented senior management, project management, change
and diffused quickly throughout the corporation. agents, communication, commitment, support
Enterprise systems from leading suppliers like given to suppliers, and technological compatibil-
SAP are common tools used by many technical ity. Finally, this analysis suggests that enterprise
specialists and functional users worldwide. There systems can be considered enablers of evolution-
is therefore a reliable supply of SAP knowledge ary change, and that they are more flexible than
around the world that allows companies to rollout managers realize.
the system quickly. Although the study generated concepts and
One can use Anthony and Turner’s (2000) relations shown by the transformation model for
dimensions of information systems flexibility relations with suppliers (Figures 2, 3, and 4), they
(integration, modularity, and personnel) to argue are not generalizable to similar processes in other
that enterprise systems like SAP are flexible companies. Further cases and cross-analysis with
infrastructures for organizations. This finding the current results are required to build a more
contributes to the current debate of enterprise robust model.
662
Enterprise Systems as an Enabler of Fast-Paced Change
663
Enterprise Systems as an Enabler of Fast-Paced Change
perceptions of enterprise systems as inflexible all players in this supply chain seemed to help
tools have varied between the implementation of Ericsson achieve its objective of changing how
a traditional platform and the implementation of it manages relations with its providers. Several
service-oriented infrastructure. questions emerge, including: What level of sup-
With regard to the key factors affecting the port should a company give to its supplier when
transformation process at different levels in a implementing a B2B procurement system? What
global company, it may be interesting to deepen the factors affect the decision pertaining to the level
understanding of how some of these factors work. of support afforded to suppliers?
For example, support for suppliers to implement Two initial strategies for further research can
a B2B procurement may vary depending on the therefore be proposed. The first strategy, aimed at
internal and external contextual characteristics of theory building, is to compare emergent concepts
the client company. For example, in the case of and constructs with extant literature (Eisenhardt,
Ericsson, the strong position of the client com- 1989). The second strategy, designed to develop
pany in an unfavorable business environment for generalizable theory, is to study a reasonable
664
Enterprise Systems as an Enabler of Fast-Paced Change
number of additional cases (e.g., between 4 and Duncan, N. B. (1995). Capturing flexibility of IT
10, according to Eisenhardt, 1989). Finally, further infrastructure: A study of resource characteristics
research can be carried out to test hypotheses that and their measure. Journal of Management Infor-
can emerge from the previous qualitative studies. mation Systems, 12(2), 37–57.
Eisenhardt, K. (1989). Building theories from case
study research. Academy of Management Review,
AcknoWledGment
14(4), 532–550. doi:10.2307/258557
We would like to thank Ericsson España for al- Fan, M., Stallaert, J., & Whinston, A. (2000). The
lowing us to carry out this study. Special thanks adoption and design methodologies of component-
to Rafael Berriochoa (IS and sourcing manager) based enterprise systems. European Journal of
and Cesar Barba (internal consultant and project Information Systems, 9, 25–35. doi:10.1057/
leader). palgrave/ejis/3000343
Please note: This chapter is based on a prelimi-
Lorenzo, O., & Díaz, A. (2005). Process gap analy-
nary study published in the conference proceedings
sis and modelling in enterprise systems. Interna-
of the 2006 European Operations Management
tional Journal of Simulation and Process Model-
Association (EUROMA) conference. It differs
ling, 1(3/4). doi:10.1504/IJSPM.2005.007642
from the original conference proceedings, how-
ever, in two aspects: (1) this chapter extends the Miles, M., & Huberman, A. (1994). Qualitative
analysis to European and global experiences, data analysis, an extended sourcebook (2nd ed.).
and (2) it includes an in-depth discussion of the Thousand Oaks, CA: Sage.
lessons learned through these three experiences
IBX Newsletter. (2003). Global e-procurement a
(local, European, and global).
winner for Ericsson. IBX Newsletter, (3).
Pettigrew, A. (1990). Longitudinal field research
reFerences on change: Theory and practice. Organization
Science, 1(3), 267–292. doi:10.1287/orsc.1.3.267
Allen, B. R., & Boynton, A. (1991). Information
architecture: In search of efficient flexibility. MIS Pettigrew, A. (1997). What is a processual analy-
Quarterly, 15(4), 435–445. doi:10.2307/249447 sis? Scandinavian Journal of Management, 13(4),
337–348. doi:10.1016/S0956-5221(97)00020-1
Anthony, T., & Turner, D. (2000). Measuring the
Flexibility of Information Technology infrastruc- AMR Research. (2001). Application spending
ture: Exploratory analysis of a construct. Journal and penetration report 2002-2003.
of Management Information Systems, 17(1). Wireless Newsfactor. (2001). Ericsson addresses
Cooper, R., & Zmud, R. (1990). Information tech- globalization with sweeping restructuring plan.
nology implementation research: A technological Wireless Newsfactor.
diffusion approach. Management Science, 36(2), Yin, R. (1994). Case study research. Design and
123–139. doi:10.1287/mnsc.36.2.123 methods. Thousand Oaks, CA: Sage.
Davenport, T. (2000). Mission critical: Realizing
the promise of enterprise systems. Boston: Harvard
Business School Press.
665
Enterprise Systems as an Enabler of Fast-Paced Change
Ives, B., Jarvenpaa, S., & Mason, R. (1993). Global Markus, M. (2000). Paradigm shifts—e-business
business drivers: Aligning information technology and business/systems integration. Communica-
to business strategy. IBM Systems Journal, 32(1). tions of the AIS, 1(10).
666
Enterprise Systems as an Enabler of Fast-Paced Change
Markus, M., Tanis, C., & Fenema, P. (2000). Multi- Taylor, D. (1997). Global cases in logistics and
site ERP implementations. Communications of the supply chain management. Thomson Press.
ACM, 43(4), 42–46. doi:10.1145/332051.332068
Tyre, M., & Orlikowski, W. (1994). Windows of
Segev, A., & Gebaur, J. (2001). B2B procure- opportunity: Temporal patterns of technological
ment and marketplace transformation. Infor- adaptation in organizations. Organization Science,
mation Technology and Management, 2(3). 5(1), 98–117. doi:10.1287/orsc.5.1.98
doi:10.1023/A:1011442008251
Westerman, G., & Cotteleer, M. (1999). Tektronix,
Smith, H. L., Dickson, K., & Smith, S. L. (1991). Inc: Global ERP implementation. Boston: Harvard
There are two sides to every story: Innovation Business School Publishing (Case 9-699-043).
and collaboration within networks of large and
small firms. Research Policy, 20(5), 457–469.
doi:10.1016/0048-7333(91)90069-3
endnote
Soh, C., Siew Kien, S., & Tay-Yap, J. (2000).
Cultural fits and misfits: Is ERP a universal solu-
1
Maverick spending refers to purchases made
tion? Communications of the ACM, 43(4), 47–51. outside established processes for ordering
doi:10.1145/332051.332070 goods and services.
This work was previously published in Enterprise Resource Planning for Global Economies: Managerial Issues and Chal-
lenges, edited by Carlos Ferran and Ricardo Salim, pp. 126-146, copyright 2008 by Information Science Reference (an imprint
of IGI Global).
667
668
Chapter 3.8
Extending Enterprise
Application Integration
(EAI) With Mobile and Web
Services Technologies
Abbass Ghanbary
MethodScience.com & University of Western Sydney, Australia
Bhuvan Unhelkar
MethodScience.com & University of Western Sydney, Australia
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
satisfy the needs of Enterprise Architecture (EA). the needs of business, technology, and data systems
Thus far, the concept of Business Integration (http://www.integrationconsortium.org).
(BI) has been mainly focused on integrating the Based on Chase (2006), originally designed
business processes internal to an organization; as a way to develop the technology architecture
however this chapter is an investigation to identify for an organization, TOGAF has evolved into a
how the organizations can extend this integration methodology for analysing the overall business
with those business processes belonging to other architecture. The first part of TOGAF is a meth-
enterprises and how they adapt mobile and Web odology for developing the architecture design,
Services technologies in order to integrate with which is called the Architecture Development
those business processes. Method (ADM). It has the following nine basic
According to Finkelsteing (2006) Enterprise phases:
Architecture (EA) builds on business knowledge
and allows business specialist experts to apply • Preliminary phase: Framework and
their respective knowledge to determine the most principles. Get everyone on board with
effective technology and process solutions for the plan.
the business. • Phase A: Architecture vision. Define
Information and Communication Technology your scope and vision and map your over-
(ICT) architectures have not paid enough attention all strategy.
to integration of the services in the past. Service • Phase B: Business architecture. Describe
Oriented Architecture (SOA) is an architecture your current and target business archi-
that makes the services of a system to interact tectures and determine the gap between
and perform a task supporting a request. SOA them.
is classified as sub-architecture of Enterprise • Phase C: Information system architec-
Architecture. tures. Develop target architectures for
Based on Barry (2003), a Service Oriented your data and applications.
Architecture (SOA) is a part of an EA and can • Phase D: Technology architecture. Create
be viewed as “sub-architecture” of an Enterprise the overall target architecture that you will
Architecture. SOA existed before the advent of implement in future phases.
Web Services. Technologies such as Common • Phase E: Opportunities and solutions.
Object Request Broker (CORBA) and Distributed Develop the overall strategy, determining
Component Object Model (DCOM) afforded what you will buy, build or reuse, and how
the opportunity to create SOA. Web Services is you will implement the architecture de-
ideal technology for developing sophisticated scribed in phase D.
architecture. • Phase F: Migration planning. Prioritize
The Open Group Architecture Framework projects and develop the migration plan.
(TOGAF) is a critical architecture for the effective • Phase G: Implementation governance.
and safe construction of business and information Determine how you will provide oversight
systems. TOGAF provides the TOGAF Architec- to the implementation.
ture Development Method (ADM). TOGAF ADM • Phase H: Architecture change manage-
is a comprehensive, detailed, industry standard ment. Monitor the running system for nec-
method for developing Enterprise Architectures essary changes and determine whether to
Integration (EAI), and related information, appli- start a new cycle, looping back to the pre-
cation, and technology architectures that address liminary phase.
669
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
670
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
its interface available to other services (publish), • The Platform-Specific Model (PSM) adds
other services must be capable of discovering to the PIM the details of a specific comput-
the interface (find), and finally services must ing platform on which the business solu-
be able to connect to one another to exchange tion will be deployed.
messages (bind). The loose coupling of an SOA • Transformations (mappings) are performed
is achieved firstly through the separation of data on these models to progress from a higher
exchange from the software agents involved in level of abstraction to a lower level of
the exchange, and secondly through the discrete abstraction.
nature of the service. • All of this activity is based on internation-
The biggest challenge may be the behaviour ally accepted standards.
of the users to adapt to the developed system. Ac-
cording to Chen, et al, (2006) the consumer of a Businesses that aim to support mobile work-
service is not required to have a detailed knowledge ers and enhance process effectiveness will need
of implementation, implementation language, or to consider extending their process and systems
execution platform of the service. The only concern beyond the workplace (Alag, 2006). According
of the consumer is how a service can be invoked to Godbole, (2006) Mobile Commerce is best
according to the service interface. suited where the consumer is driven by a “sense
Change management and transformation of an of urgency” when they need to have their goods
organization can be very difficult and sensitive is- and services immediately for upcoming functions
sues. Conversely, it can be argued that behavioural and events.
integration is critical to the success of enterprise Every organization on the planet consisting
integration. The technical integration can be a of more than one person has already realised
success but if the organization is not going to in- that their information technology infrastructure
ternalise the enterprise system, the entire project is is effectively a distributed computing system.
a failure. As such, to achieve the maximum benefit To integrate information assets and use infor-
and impact from enterprise integration, we need mation effectively, it must be accessible across
to have both successful technical and behavioural the department, across the company, across the
integration (http://delivery.acm.org). world and more importantly across the service-
The successful architecture confirms that busi- or supply-chain from the supplier, to one’s own
ness requirements and information technology organization, to one’s customers. This means that
design are captured in models. The modelling CPUs must be intimately linked to the networks
technique of abstraction to separate business of the world and be capable of freely passing
concerns from technology concerns (what the and receiving information, not hidden behind
business system needs to do, versus its underlying glass and cooling ducts or the complexities of the
computing platform) is also an important aspect software that drives them. www.omg.org/docs/
of the success of the architecture. omg/03-06-01.pdf
The following issues also could be classified
as the critical factor for the success of the Service
Oriented and Enterprise Architecture: UNDErstANDING sOA
AND WEb sErVIcEs
• To capture business requirements.
• Platform-Independent Model (PIM) by Service-Oriented Architecture is architecture
promoting designing a business solution based on internal and external processes of an
prior to selecting how it will be deployed. organization. Web Services technology is the
671
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
672
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
Figure 3.
673
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
674
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
675
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
676
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
are currently using mobile devices while 30% of the scenario in Which
the respondent use mobile enabled laptops. The Mobile Devices are Used
Figure 8 clearly demonstrates that organizations
have realised that they need to take advantage of The respondents were queried about the use of
mobile technologies. these devices in their business activities. In this
section of the research is identifying the reason
for the use of mobile devices in order to identify
677
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
the use of this technology in the collaborative 1. Mobile technology as a special technology
environment. The Figure 8 depicts the typical improve efficiency in customer meetings.
reasons for the mobile devices in the daily busi- 78.7% of the respondents either agreed or
ness activates. strongly agreed with this proposition.
Figure 8 presents the result by stating that the 2. Mobile technology has been used as a spe-
majority of participants believe that the use of cial tool to advertise in a captured market.
mobility has increased the performance of their 70.4% of the respondents agreed with this
business activities enabling them to have greater proposition.
access to the employee, as well as being accessible 3. Mobile technology as a tool has enabled
by their customers. The use of mobile devices has people to contact with the office for em-
created flexibility, availability and better access. ployees engaged in official travel. 63.8%
Questions 7, 8, 9, 12, 21, 22 and 23 have been agreed to this proposition.
designed to rate the answers on different method 4. Mobile technology has enabled the business
of evaluation. The legends are as followings:VSA to track goods in transit. About 70.5% of the
– Very Strongly AgreeSA – Strongly AgreeAg - responses agreed with this proposition.
AgreeDA – DisagreeSD - Strongly DisagreeVSD
– Very Strongly Disagree The result achieved states that the mobile tech-
Based on these ratings, the following results nology is a major technology which could improve
are extracted from the survey of organizations. In their business activities. Therefore, this technology
the followings the letter P stands for the Point as it could also facilitate this research to enter the new
was presented in the survey called Point number. proposed collaborative environment.
678
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
technology, rather than directly asking about new disregard of their location and time. 72.3%
applications. The results of this question are listed agreed to this proposition.
in Table 4. 5. Mobile technology has created better ac-
cess method for the customer to contact the
1. Mobile technology as a special technology is organization. 85.4% of the responses agreed
very cost efficient. 72.7% of the respondents with this proposition.
either agreed or strongly agreed with this
proposition. Advantage of Mobile
2. Mobile technology has been connecting technology for the business
people while out of the office. 93.8% of the
respondents agreed with this proposition. The question asked about other factors that would
3. Mobile technology has been improving the enhance the demand in introducing or using mobile
business productivity. 71% of the respon- technology in the organization. Four propositions
dents agreed with this proposition. were presented to the respondents to choose from.
4. Mobile technology has enabled employees Table 5 lists the results for the question.
to be more flexible hence they can work
679
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
680
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
681
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
3. Queried whether the ambiguity of the Web 2. Queried whether the training of the em-
Services is the major concern (What it is ployees is the main concern. 61.5% of the
and what it does). 70% of the respondents respondents agreed with this proposition.
agreed with this view. 3. The concept of the competition while col-
4. Queried whether the participants understand laborating (how can you collaborate with
how WS could facilitate collaboration. your competitor). 86.6% of the respondents
Almost 80% of the participants agreed with agreed with this view.
this proposition. 4. The focus will shift to technology rather
than process. Almost 80% of the participants
Methodological Drawbacks of agreed with this proposition.
Adaptation Web services 5. How to manage the change when adapting
the WS technology. Almost 75% agreed with
The question investigated the adaptation to WS the proposition.
technology from the Methodological perspective
presented in Figure 12. social Drawbacks of
Adaptation Web services
1. Queried whether the impact on WS on ex-
isting business process is the main concern The question investigated the adaptation to WS
while adapting the WS. About 64.9% of the technology from the social perspective presented
respondents either agreed or strongly agreed in Figure 13.
with this proposition.
682
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
1. Evaluate the adaptation rate by customer activities while 23% has stated that they are plan-
and the employees. About 60% of the re- ning to adapt it in the near future. The total of 87%
spondents either agreed or strongly agreed of the organizations recognises the importance of
with this proposition. the mobile technology while currently the majority
2. How the competitor react to change. 75% of of these people mainly use their mobile phones
the respondents agreed with this proposition. and mobile enabled laptops.
3. How the technology provide support in order The respondents defined that mobility is a
to trust the competitor. Almost 75% of the great communication tool, make it easier to find
respondents agreed with this view. and locate personnel, create more flexibility and
4. What happens to the organizations already increases the general productivity. The major
in line of collaboration? Almost 65% of the advantage of mobile technology is providing
participants agreed with this proposition. availability to people disregards of their location
5. The legal issues involved in collaboration and time. The study revealed that the accessibility
(Government and the internal policies). is one of the greatest advantage of the collabora-
Almost 65% of the participant agreed with tive organizations therefore the advantage of the
the proposition. mobility (Anywhere – Anytime) could provide
benefit to collaborative organizations.
ANALysEs OF tHE DAtA The survey has also investigated the current
and potential application of mobility, advantages
This section describes the further analyses the and disadvantages of mobility and the improve-
overall assessment of the survey in regards to ments caused by mobility to provide a better
the adaptation of Mobile and Web Services tech- understanding of this technology.
nology as far as these technology are aiding the Interestingly, the survey identified the cost of
collaborative organizations. mobility is not classified as a big disadvantage in
comparison to the benefit it provides. All these
Mobile technology disadvantages and drawbacks seem to be due to
Information (Evaluation) the fact that the technology is new and still evolv-
ing. When there is more commercialisation of the
The mobility appears to be an important tech- technology, applications will become cheaper and
nology for the businesses to precede their daily recurring costs will be less. The decreasing cost of
activities. 63% of the organizations are already technology while the capabilities are improving
using their mobile devices to run their ordinary rapidly is highlighted in (Roth, 1998).
683
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
684
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
organizations. In general, the issues of incompat- Chase, N. (2006, February 14). Introducing the
ible technology, competition, licensing agreement open Group Architecture Framework, Under-
(legal issues) and mistrust are also classified as standing TOGAf and IT Architecture in today’s
additional major concern while adopting the new World.http://www-128.ibm.com/developerworks/
technology. ibm/library/ar-togaf1/ Accessed: 3/04/2007
Chen, X., Wenteng, C., Turner, S. J., & Wang,
Y. (2006). SOAr-DSGrid: Service-Oriented
cONcLUsION AND DIrEctION
Architecture for Distributed Simulation on the
Grid. Proceedings of the 20th Workshop on Prin-
Service Oriented Architecture and Web Services
ciples of Advanced and Distributed Simulation.
were introduced in this chapter extending the men-
ISSN:1087-4097, 0-7695-2587-3
tioned architecture and technologies that support
the Collaborative Business Process Engineering. Chung, J. Y. (2005). An Industry View on Service-
The technical, methodological and social factors Oriented Architecture and Web Services. Proceed-
in order to adopt Web Services technologies by ings of the 2005 IEEE International Workshop on
organizations were also investigated. This chapter Service-Oriented System Engineering (SOSE’05)
has also described a survey carried out in the Syd- 0-7695-2438-9/05 © 2005 IEEE.
ney metropolitan area in large and medium-sized
Curbera, F., Khalaf, R., Mukhi, N., Tai, S., &
organisations, in order to assess the organisations’
Weerawarana, S. (2003, October). The Next Step
concerns, readiness for and adaptability to emerg-
in Web Services. Communications of the ACM,
ing technologies of Mobile and Web Services
46(10). doi:10.1145/944217.944234
technologies. The final result of the survey has
revealed (in fact within the selected sample) that Erl, T. (2004). Service-Oriented Architecture. A
the key personnel of the organisations agree with Field Guide to Integrating XML and Web Services.
the major concerns identified by the study and Pearson Education, Inc. ISBN: 0-13-142898-5
queried in the survey. The above 60% rate has been
Falcone, F., & Garito, M. (2006). Mobile Strat-
the result achieved for every individual question.
egy Roadmap. In B. Unhelkar (Ed.), Handbook
The chapter has presented pictorial illustrations
Resources of Mobile Business. Hershey, PA USA:
of the achieved results and the analyses provided
Idea Group. ISBN: 1591408172
of the collected data are also discussed.
Finkelsteing, C. (2006). Enterprise Architecture
for Integration. Rapid Delivery Methods and Tech-
rEFErENcEs nology. British Library Catalogue in Publication
Data. ISBN: 1-58053-713-8
Alag, H. (2006). Business Process Mobility. In B.
Unhelkar (Ed.), Handbook Resources of Mobile Ghanbary, A. (2006). Collaborative Business
Business. Hershey, PA, USA: IGI Global. USA. Process Engineering across Multiple Organiza-
tions. A Doctoral Consortium. Proceedings of
Barry, D. K. (2003). Web Services and Service- ACIS 2006. Australia: Adelaide.
Oriented Architecture. The savvy Manager’s
Guide. USA: Morgan Kaufmann Publishers. Godbole, N. (2006). Relating Mobile Computing
ISBN: 1-55860-906-7 to Mobile Commerce. In B. Unhelkar (Ed.), Hand-
book Resources of Mobile Business. Hershey, PA
USA: Idea Group. ISBN: 1591408172
685
Extending Enterprise Application Integration (EAI) With Mobile and Web Services Technologies
Harrison, A., & Taylor, J. I. (2005). WSPeer - An The ACM Digital Library. http://delivery.
Interface to Web Service Hosting and Invoca- acm.org/10.1145/610000/606273/p54-lee.
tion. Proceedings of the 19th IEEE International html?key1=606273&key2=4006199511&col
Parallel and Distributed Processing Symposium l=GUIDE&dl=portal,ACM&CFID=11111111
(IPDPS’05). ISBN: 1530-2075/05 &CFTOKEN=2222222#lead-in. Downloaded:
5/10/2006.
http://www.ebizq.net/hot_topics/soa/fea-
tures/5857.html?&pp=1.Downloaded: The open Group Integration Consortium. http://
12/10/2006 www.integrationconsortium.org/docs/W054final.
pdf. Downloaded: 5/10/2006.
Jostad, I., Dustdar, S., & Thanh, D. V. (2005). A
Service Oriented Architecture Framework for Col- UDDI.org. http://www.uddi.org/faqs.html. Down-
laborative Services. Proceedings of the 14th IEEE loaded: 12/10/2006
International Workshops on Enabling Technolo-
Unhelkar, B., & Deshpande, Y. (2004). Evolv-
gies: Infrastructure for Collaborative Enterprise.
ing from Web Engineering to Web Services: A
ISBN ~ ISSN:1524-4547, 0-7695-2362-5
Comparative study in the context of Business
Miller, J., & Mukerji, J. (2003). Model Driven Utilization of the Internet. Proceedings of ADCOM
Architecture (MDA) Guide Version 1.0.1. http:// 2004, 12th International Conference on Advanced
www.omg.org/docs/omg/03-06-01.pdf. Down- Computing and Communications, Ahmedabad,
loaded: 5/10/06 India, 15-18 December
Pasley, J. (2005, May/June). How BPEL and SOA W3Consortium. http://www.w3.org/TR/wsdl.
are changing Web services development. Internet Downloaded; 12/10/2006
Computing, IEEE, 9(3), 60-67. Digital Object
W3Consortium. http://www.w3.org/XML/.
Identifier 10.1109/MIC.2005.56
Downloaded: 12/10/2006
This work was previously published in Services and Business Computing Solutions with XML: Applications for Quality Man-
agement and Best Processes, edited by Patrick Hung, pp. 217-237, copyright 2009 by Business Science Reference (an imprint
of IGI Global).
686
687
Chapter 3.9
Towards a Model-Centric
Approach for Developing
Enterprise Information Systems
Petraq Papajorgji
Center for Applied Optimization, University of Florida, USA
Panos M. Pardalos
Center for Applied Optimization, University of Florida, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Towards a Model-Centric Approach for Developing Enterprise Information Systems
688
Towards a Model-Centric Approach for Developing Enterprise Information Systems
CIM’s are designed by analysts. Parts of a CIM pre-conditions and post-conditions for an opera-
may be supported by software, but in general a tion. The pre- and post-conditions are specified
CIM is software independent. using the Object Constraint Language (OCL),
The platform independent perspective focuses (Warmer & Kleppe, 1999) which is a formal
on the functional capabilities of a system without language for specifying assertions (formally, an
considering any specific platform (or set of plat- “expression language”). Although Meyer’s work
forms) that will be used for its implementation. has been well implemented in several program-
Such a model is referred to as PIM (Platform ming languages (one of these languages is his own
Independent Model) (Object Management Group, language Eifel (Meyer, 1992)), it is not sufficient
2009, OMG/MDA). PIM’s are constructed using to completely generate code from the pre- and
UML and they express the relationships amongst post-conditions of an operation. Even the most
concepts of the domain under study without ardent defenders of this approach (Kleppe, Warmer
referring to any particular computing platform & Blast, 2003) state that total code generation
(Kleppe, Warmer & Blast, 2003; Papajorgji & may not be possible and the corresponding code
Shatar, 2004). has to be added manually in later phases of the
A platform specific perspective enriches a implementation.
platform independent perspective with details
relating to the use of a specific computing plat- the Object constraint
form. In this case, details of the technology used Language (OcL)
for the implementation of the PIM will be part of
the model. A model that represents details of the OCL was first developed in 1995 by a group of
underlying technology is referred to as a Platform researchers at IBM Europe with the goal of creat-
Specific Model (PSM) (Object Management ing a formal language and yet simple to be used
Group, 2000, OMG/MDA, 2009). by software engineers (Warmer & Kleppe, 1999).
Currently the MDA market is evolving. Several Currently OCL is part of the UML standards and
vendors have implemented OMG guide lines using thus available to modelers to apply constraints to
one or the other approach such as Kennedy Carter objects (Kleppe, Warmer & Blast, 2003; Papa-
(Kennedy Carter Inc., 2009), Oliva Nova (Pas- jorgji, Clark & Jallas, 2009; Warmer & Kleppe,
tor & Juan Carlos Molina, 2007), ANDROMDA 1999). Constraints are necessary as they provide
(http://www.andromda.org/), Virtual Enterprise software engineers with a set of well-defined
(http://intelliun.com) (Visual Enterprise, 2009) rules in order to define and control the behavior
to name a few. of objects. Within UML, OCL is used to specify
After analyzing the current state of the MDA invariants, preconditions, postconditions, and
implementation, it is reasonable to say that there other kinds of constraint (Warmer & Kleppe,
are two main responses to the OMG’s defini- 1999). OCL extends the power of UML as it al-
tion: the elaborationist and the translationist lows software engineers to create more expressive
approach. and more precise models.
OCL is purely an expression language: it does
the Elaborationist Approach not have side effects as it does not change the
status of the model (Papajorgji, Clark & Jallas,
The approach, referred to as the elaborationist 2009, Warmer & Kleppe, 1999). OCL is not a
approach, is embraced by the followers of the programming language and thus, it does not al-
school of Meyer (Meyer, 1988). According to the low writing code. When an expression in OCL is
elaborationist view, behavior can defined using evaluated, it simply delivers a value.
689
Towards a Model-Centric Approach for Developing Enterprise Information Systems
Using OCL with UML element of the UML model (Kleppe, Warmer &
Blast, 2003) and the OCL expression expressing
Initially, OCL has been used to specify constraints a certain constraint is always evaluated from the
on objects while defining object’s behavior. The point of view of this particular context. UML pro-
behavior of an object can be expressed using vides a particular stereotype, noted <<invariant>>
preconditions and postconditions on its operations to indicate an invariant constraint. In a class dia-
(Kleppe, Warmer & Blast, 2003; Meyer, 1988; gram constraints are presented between brackets
Warmer & Kleppe, 1999). This approach was in a note as shown in Figure 1. This figure shows
introduced and largely used by Meyer (Meyer, that the context of the constraint is Employee, a
1988) and it is the basis of his “Design by Con- UML class, represented by self.
tract” philosophy of software development. Only
recently, has OCL been used to express other types
of expressions such as specifying initial values for PrEcONDItIONs AND
attributes, specifying derivation rules for attributes POstcONDItIONs
or associations, specifying guard conditions in
state charts and etc (Kleppe, Warmer & Blast, Preconditions and postconditions are an effective
2003). OCL constraints are always connected way to express the semantics of operations and
to an object-oriented model be it a UML model methods (Warmer & Kleppe, 1999). A precondi-
or other type of object-oriented model. In UML, tion is a constraint that must be true at the start of
constraints can be used in different places. the execution of the operation and a postcondition
is a constraint that must be true at the end of the
Invariants execution of the operation. UML provides the
stereotypes <<precondition>> and <<postcondi-
An invariant is a constraint that can be associated tion>> for expressing these kinds of constraints. In
to any UML modeling element. An invariant states a class diagram though, preconditions and postcon-
that the result of the expression must be true for all ditions can be presented using notes similarly as
instances of the UML modeling element any time. in the case of invariant as shown in Figure 1. The
The context of an invariant is always a specific precondition in Figure 1 shows that the amount
690
Towards a Model-Centric Approach for Developing Enterprise Information Systems
must be non negative and the postconditions shows Simons, 2003; McNeile & Simons, 2004). In
that the salary after the increase is equal to the general, the translationist approach is based on
salary before plus the amount. the idea that the behavior of an object can be ex-
pressed using state machines. The main tool for
the translationist Approach expressing object’s behavior in the translationist
philosophy is the Action Language.
The second approach, referred to as the trans-
lationist approach, embraces the early efforts of
Mellor’s state machine for describing behavior ActION LANGUAGE
(Mellor & Balcer, 2002). According to this ap-
proach, only a PIM is needed to represent the For quite sometime the followers of the transla-
conceptual model and it is translated directly to tionist approach have required OMG to launch
code (McNeile & Simons, 2003). This second a Request for Proposals (RFP) in order to define
approach has mostly been used in the embedded the standards for a language that is UML com-
system world, but lately has positioned itself as a patible, executable and complete, implementa-
viable approach to MDA under the name of “Ex- tion independent at a level of abstraction above
ecutable UML”. Executable UML combines an any implementation technology. In 2001 OMG
abstract program model with a platform-specific adopted the Precise Action Semantics for the
model compiler that outputs an executable ap- Unified Modeling Language specification. The
plication. Grady Booch in his talk The Limits of standard was the result of a collaborative work of
Software states: a large industry consortium comprising some of
the best-known companies in the field of software
Today, we’re at the beginning stages of the next engineering such as Rational Software (http://
level. Executable UML is the next logical, and ibm.com), Kabira Technologies (http://www.
perhaps inevitable, evolutionary step in the ever- kabira.com/), Mentor Graphics (http://www.
rising level of abstraction at which programmers mentor.com/), Kennedy-Carter (http://kc.com),
express software solutions. Rather than elaborate Oliva Nova (http://www.care-t.com) and others.
an analysis product into a design product and then The Precise Action Semantics for the UML
write code, application developers of the future standard provides a well-defined and an unam-
will use tools to translate abstract application biguous semantic set of the operations needed to
constructs into executable entities. Someday soon, specify object’s behavior in a UML model. The
the idea of writing an application in Java or C++ level of detail is such that a translation engine (or
will seem as absurd as writing an application in compiler) can completely generate an executable
assembler does today. And the code generated from application from that model. The semantic set
an Executable UML model will be as uninteresting includes operations that support the so-called
and typically unexamined as the assembler pass CRUD (create, read, write, delete) manipula-
of a third generation language compile is today. tion of objects, the generation and handling of
asynchronous events (signals), and all the logi-
Recently, under the same umbrella of the cal constructs to support the definition and the
translationist approach, it has appeared another specification of algorithms. The modeler defines
slightly different method referred to as the event the behavior of objects using a text-based ac-
based approach. This approach considers events tion language. The main characteristics of this
as the focus of the modeling effort (McNeile & language are:
691
Towards a Model-Centric Approach for Developing Enterprise Information Systems
692
Towards a Model-Centric Approach for Developing Enterprise Information Systems
693
Towards a Model-Centric Approach for Developing Enterprise Information Systems
Note that the principle of encapsulation is onto relationship takes as shown in Figure 5. Note
respected during the transformation process; val- that the association takes in Figure 5 is necessary
ues of attributes are accessed only by the object only to visually show that tables student and course
itself. Therefore, both classes Student and Course are linked using the foreign key studentId. It is
attributes are declared private and the correspond- important to note that non foreign keys attributes
ing get and set methods are defined. In a similar may contain the NULL value whereas attributes
way are defined the rules of transformation for that are foreign keys, such as studentId, may
obtaining a relational model from a PIM model not contain NULL values. This observation will
expressed in UML. be clear if the Entity-Relationship (ER) model
obtained by the transformation process is viewed
PIM to Relational Transformation with an ER tool.
Let us consider the same model presented in MDA and Application Development
Figure 4 and transform this PIM into a relational
model. Before presenting the transformation of Objects, Associations and
the model, let us introduce some rules that guide Code Generation
the transformation of attributes defined in classes
Student and Course. Some of these rules are de- Let us consider a simple example to demonstrate
fined as follows (Kleppe, Warmer & Blast, 2003): the power of this approach. Figure 6 shows a
simple model where the relationship between the
• A UML string will mapped onto a SQL objects Client and Address is modeled as a simple
VARCHAR. one-to-one association.
• A UML integer will be mapped onto a SQL The model execution causes the system to
INTEGER. automatically generate the web page as shown in
• A UML date will be mapped onto a SQL Figure 7. Note that there are two input fields for
DATE. both attributes of object Client and a hyperlink
694
Towards a Model-Centric Approach for Developing Enterprise Information Systems
Figure 8. Client- Address relationship modeled owns the part (Booch, Rumbaugh & Jacobson,
as a composition 1999; Papajorgji & Pardalos, 2006). The model
execution will automatically generate the web
form shown in Figure 9. In this case, data entry
for objects Client and Address are presented in
the same web form; data entry fields for the ob-
ject Address (the part) are presented in a tab in
the form where data entry fields for object Client
named Address, that when used, it will display are presented. When the form is submitted, the
another page prompting to enter data for attributes submitted data are used to populate objects Cli-
of object Address. As it is shown in Figure 7, the ent and Address at the same time. The lifecycle
life-cycle of objects Client and Address are com- of both objects are synchronized, they are created
pletely independent: Instances of objects Client and deleted at the same time. Note that object
and Address can be created, modified and deleted Client (the whole) is responsible for creation,
independently. maintenance and destruction of object Address
Figure 8 shows the relationship between Client (the part) (Booch, Rumbaugh & Jacobson, 1999;
and Address modeled as a composition. A com- Papajorgji & Pardalos, 2006).
position is a strong relationship where the whole The above example shows the relevance of
understanding the relationships amongst concepts
695
Towards a Model-Centric Approach for Developing Enterprise Information Systems
Figure 11. Classes, attributes and relationships for the job package
696
Towards a Model-Centric Approach for Developing Enterprise Information Systems
The UML model shown in Figure 13 shows a collection of all job openings in the system. In the
classes with their attributes, methods and relation- event a particular posted job opening is needed it
ships contained in the package jobs. The black dot can be identified using the following instruction:
denotes the root object of the system; it serves as
the starting point for navigating the system. Object TheJobBoard.jobCategorie.select ([: j | j.status
JobBoard is linked to object JobOpening using == “Posted” && j.jobDescription.jobCategory.
the association jobOpenings of cardinality 0 to >name == name])
many. Thus, TheJobBoard.jobOpenings provides
697
Towards a Model-Centric Approach for Developing Enterprise Information Systems
The MDA-based tool used (Visual Enterprise, list of potential values of job categories is created by
2009) has an interesting feature that links the value constraining the domain of association jobCategory
of an attribute to a set of potential values. As shown to contain only the job categories created in the sys-
in Figure 13, attribute category of class JobDescrip- tem. Thus, the values for this domain are defined by
tion is prefixed by the sign “/”. This sign shows that TheJobBoard.jobCategories that returns a collection
the value of attribute category can be selected from of job categories created in the system.
a list of all instances of class JobCategory already Use cases are implemented as processes. Figure
created in the system. Figure 14 shows the formula 15 show how processes can be ensemble to create
for calculating the value of attribute category of class a navigation model that will allow users to launch
JobCategory using the association jobCategory. The different functionalities provided by the system.
698
Towards a Model-Centric Approach for Developing Enterprise Information Systems
One of the advantages of using the MDA approach A new approach that is currently gaining strong
for developing complex enterprise systems is support in the software industry is based on
that the persistence of data is done automatically. considering enterprise solutions as federations
As previously mentioned, MDA tools interpret of services connected via well-defined contracts
the UML model and automatically generate the that define their service interfaces. The resulting
database schema for the corresponding model. system designs are often referred to as Service
Figure 16 shows the database schema generated Oriented Architectures (SOAs) (Brown, Conal-
by Virtual Enterprise tool (Visual Enterprise, 2009) len & Tropeano, 2005, pp. 403-432; Johnston &
for the UML model presented in Figures 11, 12 Brown, pp. 624-636).
and 13. The user has only to define the name of The technology used for developing web-
the database and some other parameters and the services is not relevant to the service a system
database and the functionalities for storing the provides to its users/clients. The view of the
data onto the database are generated by the MDA service should be totally independent from its
tool. Note that the MDA tool does not normalize implementation in some underlying technolo-
the model; therefore it is the user’s responsibil- gies. As previously mentioned in this paper, the
ity to design a UML model that does not require main characteristics of the MDA approach is
normalization. the independence of the model describing the
699
Towards a Model-Centric Approach for Developing Enterprise Information Systems
business from its implementation in underlying the ERP solution and therefore large amounts of
technologies. Therefore, using the MDA approach money must be invested in consultancy for ERP
to design and develop web-services will provide providers.
the same benefits; independence, flexibility and A solution to these problems is the use of
speed in software development. the MDA approach to configure functionalities
MDA provides an environment to design provided by an ERP system. MDA provides
Web services at a more abstract level than that enterpriser managers with a high level model,
of technology-specific implementations. The totally independent of ERP’s target platform, at
technologies implementing Web services depend the level of business processes and expressed
on Port 80. The fact that developers of Web using visual tools. The UML extension proposed
services program directly in these technologies by (Ericsson & Penker, 2000) closely matches
makes software development vulnerable to rapid business modeling standards and complements
obsolescence and is also far too labor-intensive. the UML Business Modeling Profile published
Systems built using MDA exhibit more flex- by IBM (Johnston, 2004).
ibility and agility in the face of technological One of the most relevant efforts to use the MDA
change—as well as a higher level of quality and approach in a context of an ERP implementation
robustness, due to the more formal and accurate is presented by (Dugerdil & Gaillard, 2006). They
specification of requirements and design. have used Eriksson-Penker’s UML profile (Erics-
son & Penker, 2000) and implemented it using
MDA and ErPs IBM’s XDE modeling tool to create a business
modeling environment in the context of an ERP
Enterprise Resource Planning (ERP) systems are implementation.
complex solutions for managing the multi-facet ERPs provide a large amount of functionalities
aspect of modern enterprises. Initially, ERPs were and their use depends on the particular needs of
used only in the context of large corporations. the business model of a corporation. In order to
Currently, there is a stronger effort to use ERPs activate the functionalities of an ERP system,
by small and middle size companies to develop some configuration tables need to be created that
their core information technology systems (van will make available the necessary components/
Everdingen Y., van Hillergersberg & Waarts, modules. As previously mentioned producing
2000). There is a wide spread opinion in the indus- configuration tables is difficult and requires a
try that ERPs can be seen as a viable alternative to detailed knowledge of the ERP system and a
custom application development for the standard considerable amount of manual labor. As the
management needs (Dugerdil & Gaillard, 2006). ERP’s functionalities to be activated depend on
Besides numerous advantages of using ERPs as the business model, then it is natural to develop a
a basis for the IT needs, there are several major business model at a high level of abstraction using
disadvantages that are a serious obstacle for using UML-based visual tools. Constructing a high level
ERPs in a large scale by small and medium enter- business model is also one of the best practices in
prises. One major issue is the inherent complexity ERP implementation (Thomas, 2002). The use of
of ERPs; often their implementation requires a the MDA approach when the target system is an
large dependency on the ERP provider that most ERP requires that the transformations leading a
of the managers would like to avoid at any cost. PIM into a PSM, instead of generating code as it is
Other consequence of the inherent complexity of the case in general, they will generate configura-
ERPs is that most of the clients trying to imple- tion tables that would activate the required ERP
ment them do not have a deep understanding of modules (Dugerdil & Gaillard, 2006).
700
Towards a Model-Centric Approach for Developing Enterprise Information Systems
701
Towards a Model-Centric Approach for Developing Enterprise Information Systems
Lockheed Martin Aeronautics has used the and developers translate models into a program-
OMG’s MDA to develop the F-16 Modular Mis- ming language. The use of MDA narrows the gap
sion Computer Application Software. Their goal existing between developers and modelers and
was to achieve cross-platform compatibility and creates the need for a modeler/developer of high
increased productivity and quality, all in the level. Modeling is a more abstract activity than
context of the demanding environment of avion- coding and therefore, while the market is full of
ics software development (Object Management developers in all major technologies (Java, .NET,
Group, 2000). etc) there is great deficit in high level modelers
Conquest, Inc., is a premier provider of proficient in UML and its various profiles. Train-
advanced large-scale systems and software ing developers to become modelers is a necessity
technology solutions to federal and commercial considering the important savings provided by the
customers. MDA helped facilitate communication use of the MDA approach (Figure 17). The MDA
by graphically representing vast amounts of data approach offers automation of code generation
into discrete views that could be reviewed and that includes:
understood across different organizational groups
and business areas. Modeling also encouraged col- • Automatically generating complete pro-
laboration between groups, helping them identify grams from models (not just class/methods
redundant and non-mission enhancing activities, skeletons and fragments)
and driving significant cost savings (Object Man- • Automatically verifying models at high
agement Group, 2000). A more detailed study that level of abstraction (for example, by ex-
provides reasons and advantages of using the MDA ecuting them)
approach is presented in (Pastor & Juan Carlos
Molina, 2007). Figure 17, borrowed from (Sewal, History teaches us that automation is by far the
2003), presents a convincing list of savings when most effective technological means for boosting
using the MDA approach. productivity and reliability. It will take time and
Currently, the use of the MDA approach is efforts for the MDA to widely be accepted and
rather limited; there is a relatively small number only the future will decide when the MDA will
of developers that master this technology at indus- become a mainstream technology.
trial level. Historically in the software industry,
there is a well defined gap between developers
and modelers/architects and they have very dif-
ferent tasks in the software development process.
Modelers design the system and its architecture
702
Towards a Model-Centric Approach for Developing Enterprise Information Systems
703
Towards a Model-Centric Approach for Developing Enterprise Information Systems
Brown, W. A., Conallen, J., & Tropeano, D. (2005). Johnston, S. (2004). Rational UML profile for busi-
Practical insights into MDA: Lessons from the ness modeling. IBM developerworks. Retrieved
design and use of an MDA toolkit . In Beydeda, from http://www.ibm.com/developerworks/ratio-
S., Book, M., & Gryhn, V. (Eds.), Model-driven nal/library/5167.html.
software development (pp. 403–432). New York:
Kennedy Carter Inc. (n.d.). Retrieved 2009, from
Springer. doi:10.1007/3-540-28554-7_18
Kennedy Carter Web site http://www.kc.com
Dugerdil, P., & Gaillard, G. (2006). Model-driven
Kleppe, A., Warmer, J., & Blast, W. (2003). MDA
ERP implementation. In Proceedings of the 2nd
explained the model driven architecture: Practice
international workshop on model-driven enter-
and promise. Reading, MA: Addison Wesley.
prise information systems.
McNeile, A., & Simons, N. (2003). MDA the
Ericsson, E. H., & Penker, M. (2000). Business
visison with the hole. White Paper, Metamaxim
modeling with UML business patterns at work.
Ltd. Retrieved from http://www.metamaxim.com.
Needham, MA: OMGPress.
McNeile, A., & Simons, N. (2004). Methods of
Frankel, D. S. (2003). Model driven architecture
behaviour modelling a comentary on behaviour
applying MDA to enterprise computing. New York:
modelling techniques for MDA. White Paper,
Wiley Publishing Inc. OMG Press.
Metamaxim Ltd. Retrieved from http://www.
Gasevic, D., Djuric, D., & Devedzic, D. (2006). metamaxim.com
Model driven architecture and ontology develop-
Mellor, S. J., & Balcer, M. J. (2002). Executable
ment. Berlin: Springer.
UML, a foundation for model driven architecture.
Guide, M. D. A. V1.0.1. (n.d.). Retrieved 2003, Reading, MA: Addison Wesley.
from Object Management Group Web site http://
Meyer, B. (1988). Object-oriented software con-
www.omg.org
struction. Englewood Cliffs, NJ: Prentice Hall.
How systems will be built. (n.d.). Retrieved 2009,
Meyer, B. (1992). Eiffel: The language. Upper
from Object Management Group Web site http://
Saddle River, NJ: Prentice Hall.
omg.org
(n.d.). Retrieved 2003, from MDA Guide V1.0.1
Johnston, J. K., & Brown, A. W. (2005). A model
Web site: http://www.omg.org
driven development approach to creating service-
oriented solutions . In Model-driven software Object Management Group. (n.d.). Retrieved
development. New York: Springer. 2009, from Object Management Group Web site:
http://omg.org
Johnston, J. K., & Brown, A. W. (2005). A model
driven development approach to creating service- Object management group [OMG]. (2009). Re-
oriented solutions . In Model-driven software trieved from http://omg.org
development (pp. 624–636). New York: Springer.
OMG Model driven architecture: How systems will
Johnston, J. K., & Brown, A. W. (2005). Model- be built. (2009). Retrieved from http://omg.org
driven development approach to creating service-
OMG/MDA. (2009). How systems will be built.
oriented solutions . In Beydeda, S., Book, M., &
Retrieved 2009, from Object Management Group
Gyhn, V. (Eds.), Model-driven software develop-
Web site http://omg.org
ment. New York: Springer.
704
Towards a Model-Centric Approach for Developing Enterprise Information Systems
Oscar, P., & Juan Carlos Molina. (2007). Model- Sewal, S. J. (2003). Executive justification for
driven architecture in practice. Germany: adopting model driven architecture. Retrieved
from http://omg.org/mda/presentations.html
Papajorgji, P., Clark, R., & Jallas, E. (2009). The
Model driven architecture approach: A framework Thomas, L. J. (2002). ERP et progiciel de gestion
for developing complex agricultural Systems. In integres. Paris: Dunod.
P. Papajorgji & P. M. Pardalos (Eds.), Advances
van Everdingen, Y., van Hillergersberg, J., &
in modeling agricultural systems. New York:
Waarts, J. (2000). ERP adoption bu european
Springer. (Springer Optimization and Its Ap-
midsize companies. Communications of the ACM,
plications).
43(4), 27–31. doi:10.1145/332051.332064
Papajorgji, P., & Pardalos, P. M. (2006). Software
Visual Enterprise. (2009). Retrieved 2009, from
engineering techniques applied to agricultural
http://intelliun.com
systems an object-oriented and UML approach.
New York: Springer. Warmer, J., & Kleppe, A. (1999). The object
constraint language precise modeling with UML.
Papajorgji, P., & Shatar, T. (2004). Using the
Reading, MA: Addison Wesley.
unified modeling language to develop soil water-
balance and irrigation-scheduling models. Envi- Zhu, J., Tian, Z., T., Li, Sun, W., & al, e. (2004).
ronmental Modelling & Software, 19, 451–459. Model driven business process integration and
doi:10.1016/S1364-8152(03)00160-9 management. A case study with bank sinoPac
regional platform. IBM Journal of Research and
Pastor, O., & Molina, J. C. (2007). Model-driven
development.
architecture in practice. Germany: Springer
Verlag.
This work was previously published in Enterprise Information Systems and Implementing IT Infrastructures: Challenges and
Issues, edited by S. Parthasarathy, pp. 140-158, copyright 2010 by Information Science Reference (an imprint of IGI Global).
705
706
Chapter 3.10
Impact of Portal
Technologies on Executive
Information Systems
Udo Averweg
Information Services, eThekwini Municipality & University of KwaZulu-Natal, South Africa
Geoff Erwin
Cape Peninsula University of Technology, South Africa
Don Petkov
Eastern Connecticut State University, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Impact of Portal Technologies on Executive Information Systems
level of impact (if any) of portal technologies on function with Web servers and browsers (Price-
EIS. It proceeds with an overview of these tech- waterhouseCoopers, 2002). With EIS established
nologies, analysis of a survey on the impact of in organisations and the presence of portal tech-
Web-based technologies on EIS implementation, nologies, there is thus a need to investigate the
and conclusions on future trends related to them. link (if any) between EIS and portal technologies.
Web-based technologies are causing a reex-
amination of existing information technology (IT)
bAcKGrOUND ON POrtAL implementation models, including EIS (Averweg,
tEcHNOLOGIEs AND EIs 2003). Web-based tools “are very much suited” to
executives key activities of communicating and
Gartner defines a portal as “access to and interac- informing (Pijpers, 2001). With the emergence of
tion with relevant information assets (information/ global IT, existing paradigms are being altered,
content, applications and business processes), which is spawning new considerations for suc-
knowledge assets and human assets, by select cessful IT implementation. Challenges exist in
target audiences, delivered in a highly personalized building enterprise portals as a new principle of
manner” (Drakos, 2003). Drakos (2003) suggests software engineering (Hazra, 2002). Yahoo® is an
that a significant convergence is occurring with example of a general portal. Yahoo® enables the
portals in the centre. Most organisations are be- user to maintain a measure of mastery over a vast
ing forced to revisit their enterprise-wide Web amount of information (PricewaterhouseCoopers,
integration strategies (Hazra, 2002). A single view 2001). Portals are an evolutionary offshoot of the
of enterprise-wide information is respected and Web (Norwood-Young, 2003). The Web is “a
treasured (Norwood-Young, 2003). Enterprise perfect medium” for deploying decision support
Information Portals are becoming the primary way and EIS capabilities on a global basis (Turban et
in which organisations organise and disseminate al., 1999).
knowledge (PricewaterhouseCoopers, 2001). As the usage of IT increases, Web-based tech-
EIS grew out of the development of informa- nologies can provide the means for greater access
tion systems (IS) to be used directly by executives to information from disparate computer applica-
and used to augment the supply of information by tions and other information resources (Eder, 2000).
subordinates (Srivihok, 1998). For the purposes of Some Web-based technologies include: intranet,
this article, an Executive Information System is Internet, extranet, e-commerce business-to-busi-
defined as “a computerized system that provides ness (B2B), e-commerce business-to-consumer
executives with easy access to internal and external (B2C), wireless application protocol (WAP), and
information that is relevant to their critical success other mobile and portal technologies. The portal
factors” (Watson et al., 1997). EIS are an impor- has become the most-desired user interface in
tant element of the information architecture of an Global 2000 enterprises (Drakos, 2003).
organisation. Different EIS software tools and/or
enterprise resource planning (ERP) software with
EIS features exist. sUrVEy OF WEb-bAsED
EIS is a technology that is emerging in response tEcHNOLOGIEs’ IMPAct ON EIs
to managers’ specific decision-making needs
(Turban et al., 1999). Turban (2001) suggests that The technology for EIS is evolving rapidly and
EIS capabilities are being “embedded in BI.” All future systems are likely to be different (Sprague
major EIS and information product vendors now & Watson, 1996). EIS is now clearly in a state of
offer Web versions of their tools, designed to flux. As Turban (2001) notes, “EIS is going through
707
Impact of Portal Technologies on Executive Information Systems
a major change.” There is therefore both scope sample selected included organisations with actual
and need for research in the particular area of EIS EIS experience with representatives from the fol-
being impacted by portal technologies as execu- lowing three constituencies: (1) EIS executives/
tives need systems that provide access to diverse business end-users; (2) EIS providers; and (3) EIS
types of information. Emerging (Web-based) tech- vendors or consultants. These three constituen-
nologies can redefine the utility, desirability, and cies were identified and used in EIS research by
economic viability of EIS technology (Volonino, Rainer and Watson (1995). A formal extensive
et al., 1995). There exists a high degree of similar- interview schedule was compiled and used for the
ity between the characteristics of a “good EIS” semi-structured interviews. Those were conducted
and Web-based technologies (Tang et al., 1997). during May-June 2002 at organisations in the large
With the absence of research efforts on the impact eThekwini Municipal Area (EMA) in the eastern
of portal technologies on EIS implementations, part of South Africa, including Durban, which is
this research begins to fill the gap with a study of the most populous municipality in the country,
thirty-one selected organisations in South Africa with a geographic area size of 2,300 km2 and
which have implemented EIS. a population of 3.09 million citizens (Statistics
A validated survey instrument was developed South Africa, 2001).
and contained seven-point Likert scale statements The number of surveyed interviewees and
(anchored with (1) Not at all and (7) Extensively) associated percentages per constituency for the
dealing with how an interviewee perceives specific three EIS constituencies are reflected in Table 1.
Web-based technologies impacted his organisa- The respondents in the organisations surveyed
tion’s EIS implementation. The selected Web- reported a wide range of available commercially
based technologies were: (1) intranet; (2) Internet; purchased EIS software tools and/or ERP software
(3) extranet; (4) e-commerce: business-to-business with EIS features. These included Cognos®,
(B2B); (5) e-commerce: business-to-consumer JDEdwards BI®, Oracle®, Hyperion®, Lotus
(B2C); (6) wireless application protocol (WAP) Notes®, Business Objects®, and Pilot®. Cognos®
and other mobile technologies; and (7) any other was the most popular EIS software tool, compris-
Web-based technologies (for example, portal ing 60% of the sample surveyed.
technologies). The questionnaire was adminis- From the data gathered through the authors’
tered during a semi-structured interview process. survey instrument, a tally and associated percent-
A similar approach was adopted by Roldán and age of the perceived degree to which specific Web-
Leal (2003) in their EIS survey in Spain. based technologies impacted the respondent’s
The sample was selected using the unbiased current EIS implementation in the organisations
“snowball” sampling technique. This technique surveyed is reflected in Table 2. Table 2 shows that
was also used by Roldán and Leal (2003). The only seven (22.5%) organisations surveyed report
708
Impact of Portal Technologies on Executive Information Systems
that the Intranet significantly impacted their EIS surveyed. Only one respondent (3.2%) reported
implementation. Intranets are usually combined that WAP and other technologies had extensively
with and accessed via a corporate portal (Turban, impacted the EIS implementation in her organisa-
et al., 2005). The level of impact by the Internet tion. A possible explanation for this result is that
on EIS implementation is slightly lower with six the EIS consultant was technically proficient
(19.4%) organisations surveyed reporting that in WAP technologies. The potential benefits of
the Internet has significantly impacted their EIS mobile access to portals are numerous and self-
implementation. While 24 (77.4%) organisations evident. PricewaterhouseCoopers (2002) notes
surveyed report that the Extranet had no impact that organisations must first establish the benefits
on their organisation’s EIS implementation, the of mobile access to its portal and assess the value
balance of the data sample (22.6%) reports dif- of providing those benefits via mobile access to
ferent degrees of impact. the organisation.
The results in Table 2 show that the vast ma- According to Table 2, three interviewees re-
jority (90.4%) of respondents reports that e- ported that their organisation’s EIS implementa-
commerce: (B2B) has not impacted EIS imple- tions were significantly impacted (“Very much”
mentation in organisations surveyed. A slightly and “Extensively”) by portal technologies. At
lower result (83.9%) was reported for e-commerce: first this may appear to be noteworthy as the
(B2C). One possible explanation for the e-com- portal technology impact on EIS implementations
merce (B2B) and (B2C) low impact levels is that (9.7%) is higher than that on the extranet (6.5%),
the software development tools are still evolving e-commerce: (B2B) (6.4%), e-commerce: (B2C)
and changing rapidly. (6.4%), and WAP and other technologies (3.2%)
WAP and other mobile technologies have impacts. However, it should be noted that the
no (93.6%) or very little (3.2%) impact on EIS impact levels of all the Web-based technologies
implementations. Of the seven Web-based tech- assessed are fairly low. This still means that after
nologies given in Table 2, WAP and other mobile the Intranet and Internet, portal technologies have
technologies have the least impact (combining the third highest impact on EIS implementa-
“Somewhat much,” “Very much,” and “Exten- tions in organisations surveyed. Combining the
sively”) on EIS implementation in organisations results (“Somewhat much,” “Very much,” and
Table 2. Tally and associated percentage of the degree to which specific Web-based technologies impacted
respondent’s current EIS implementation
709
Impact of Portal Technologies on Executive Information Systems
Table 3. Descending rank order of impact levels of Web-based technologies on current EIS implementation
Rank Web-based technology Tally and level of impact on EIS implementations (N=31)
1 Intranet 10 (32.2%)
2 Internet 8 (25.9%)
3 Portal technologies 5 (16.2%)
4 Extranet 3 (9.7%)
4 E-Commerce: (B2C) 3 (9.7%)
6 E-Commerce: (B2B) 2 (6.4%)
7 WAP and other mobile technologies 1 (3.2%)
“Extensively”) for each of the seven Web-based their future EIS implementations, eight (25.8%)
technologies, Table 3 gives a descending ranking respondents were unsure of future impact levels
order of the levels of impact of different Web-based by the extranet. Twelve (38.7%) respondents
technologies on EIS implementations. indicated that it is unlikely that e-commerce:
A tally and associated percentage of the per- (B2B) will impact future EIS implementations.
ceived degree to which specific Web-based tech- Almost half (48.4%) of organisations surveyed
nologies will impact a respondent’s future EIS reported that it is unlikely that e-commerce: (B2C)
implementation is given in Table 4. These are will impact future EIS implementations. WAP
obtained from the data gathered using the authors’ and other mobile technologies have similar
survey instrument. (42.0%) unlikely future levels of impact.
Table 4 reflects that only two (6.4%) organisa- It is striking to note that 21 (67.7%) respon-
tions surveyed reported that it is unlikely that the dents indicated that it is Extremely unlikely that
Intranet will impact future EIS implementations. portal technologies will impact future EIS imple-
The unlikeliness of impact by the Internet on mentations. This result (when combined with the
future EIS implementations is somewhat higher “Slightly unlikely” and “Quite unlikely” degrees)
(16.1%). While seven (22.6%) respondents indi- rises to 24 (75.2%) organisations surveyed. This
cated that is unlikely that the Extranet will impact finding is somewhat surprising considering that
Table 4. Tally and associated percentage of the expected degree to which specific Web-based technolo-
gies will impact respondent’s future EIS implementations
710
Impact of Portal Technologies on Executive Information Systems
portal technologies currently have the third high- levels of Web-based technologies on future EIS
est level of impact on EIS implementations in implementation matches the current rank order
organisations surveyed. An explanation for this levels of impact of Web-based technologies on
finding is that possibly some respondents are not EIS implementations (see Table 3). Second, while
aware of the existence of such technology. Roldán nearly three quarters (75.2%) of respondents
and Leal (2003) report that with the availability of surveyed report that it is unlikely that portal tech-
Web-based technologies “together with the need nologies will impact future EIS implementations
to build something similar to an EIS but focused (see Table 4), seen in the context of the other six
on all members of the organisation has led to the Web-based technologies, portals still appear in the
development of the enterprise information portal top three rankings. This is an important consid-
(EIP) concept, which, to some extent represents eration for IS practitioners when planning future
the latest incarnation of EIS.” According to Trow- EIS implementations. Third, when comparing
bridge (2000), two elements characterise these current and future impact levels of Web-based
systems according to the respondents: EIP “acts technologies on EIS, there is a positive impact
as a single point of access to internal and external trend for all Web-based technologies. The largest
information” and “gives users access to disparate trend increase is the Intranet rising from 32.2%
enterprise information systems.” to 87.1%. As Basu, et al. (2000) report, the use
According to Table 4, combining the positive of Web-based technologies in the distribution of
attitude results (“Extremely likely,” “Quite likely,” information is becoming widespread. These tech-
and “Slightly likely”) for each of the seven Web- nologies will impact future EIS implementations.
based technologies, Table 5 gives a descending The findings of this survey show that while
ranking order of the expected degree to which EIS have a significant role in organisations in
Web-based technologies will impact respondents’ a large South African metropolitan area, their
future EIS implementations. technological base is not affected considerably by
the latest innovations of Web-based technologies,
including portals. A potential limitation of the
FUtUrE trENDs AND research is the localised sample involved in the
cONcLUsION investigation, but given the highly developed IT
infrastructure of most South African companies,
We may notice three significant trends from the our findings can be cautiously generalised for most
data in Table 5. First, this rank order of impact other countries. The role of portals is to integrate
Table 5. Descending rank order of impact levels of Web-based technologies on future EIS implementation
Rank Web-based technology Tally and level of impact on future EIS implementations
1 Intranet 27 (87.1%)
2 Internet 23 (74.2%)
3 Portal technologies 16 (51.6%)
3 Extranet 16 (51.6%)
5 E-Commerce: (B2C) 15 (48.4%)
6 E-Commerce: (B2B) 14 (45.1%)
7 WAP and other mobile technologies 6 (19.4%)
711
Impact of Portal Technologies on Executive Information Systems
Norwood-Young, J. (2003). The little portal that Statistics South Africa. (2001). Census 2001
could. In Wills (Ed.), Business solutions using digital census atlas. Retrieved July 5, 2006
technology platform, 1(4), 14-15. from,http://gis-data.durban.gov.za/census/index.
html [Accessed on 5 July 2006]
712
Impact of Portal Technologies on Executive Information Systems
Tang, H., Lee, S., & Yen, D. (1997). An investi- KEy tErMs AND DEFINItIONs
gation on developing Web-based EIS. Journal of
CIS, 38(2), 49–54. Executive Information System: A comput-
erised system that provides executives with easy
Trowbridge, D. (2000). EIP—More profitable access to internal and external information that is
for integrators than users? Computer Technology relevant to their critical success factors.
Review, 20(5), 20. Extranet: A private Internet that connects
Turban, E. (2001). California State University, multiple organisations.
Long Beach and City University of Hong Kong, Intranet: A private Internet for an organisation.
USA. Personal Communication, 7 October. Portal: Provides access to and interaction with
relevant information assets (information/content,
Turban, E., McLean, E., & Wetherbe, J. (1999). applications and business processes), knowledge
Information technology for management. New assets, and human assets, by select target audi-
York: John Wiley & Sons. ences, delivered in a highly personalised manner.
Turban, E., Rainer, R. K., & Potter, R. E. (2005). Web-based Technologies: Technologies
Introduction to information technology (3rd Ed.). which are core to the functioning of the World
New York: John Wiley & Sons. Wide Web.
Wireless Application Protocol (WAP): A
Volonino, L., Watson, H. J., & Robinson, S. (1995). collection of standards for accessing online in-
Using EIS to respond to dynamic business condi- formation and applications from wireless devices
tions. Decision Support Systems, 14(2), 105–116. such as mobile phones, two-way radios, pagers,
doi:10.1016/0167-9236(94)00005-D and personal digital assistants.
Watson, H. J., Houdeshel, G., & Rainer, R. K., Jr. World Wide Web: The universe of network-
(1997). Building executive information systems accessible information, supported by a body of
and other decision support applications. New software, and a set of protocols and conventions
York: John Wiley & Sons. (http://www.w3.org/WWW).
This work was previously published in Encyclopedia of Internet Technologies and Applications, edited by Mario Freire and
Manuela Pereira, pp. 215-221, copyright 2008 by Information Science Reference (an imprint of IGI Global).
713
714
Chapter 3.11
A Voice-Enabled Pervasive Web
System with Self-Optimization
Capability for Supporting
Enterprise Applications
Shuchih Ernest Chang
National Chung Hsing University, Taiwan
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
of the pervasive nature of empowering people According to a study from Telecom Trends
to use it anywhere and anytime, mobile phone is International, the number of mobile commerce
becoming one of the most pervasive devices in the users worldwide will grow from 94.9 million
world (Chang & Chen, 2005; Ballagas, Borchers, in 2003 to 1.67 billion in 2008, and the global
Rohs & Sheridan, 2006). With the rapid spread of revenues generated from mobile commerce are
mobile phone devices and the convergence of the expected to expand from $6.86 billion in 2003
phone and the personal digital assistant (PDA), to $554.37 billion in 2008 (de Grimaldo, 2004).
there is an increasing demand for a multimodal A report from ZDNetAsia states that more than
platform that combines the modalities of various half of 3G traffic would be voice and voice is
interface devices to reach a greater population still the platform on which our business is run
of users. While there is a growing demand for (Tan, 2005). A study reported by the Kelsey
technologies that will allow users to connect to Group claims that expenditures for speech-related
the Internet from anywhere through devices that services worldwide are expected to reach $41
are not suitable for the use of traditional key- billion by 2005 (The Kelsey Group, 2001). This
board, mouse, and monitor (Zhai, Kristensson & report also estimates a 60-65% average annual
Smith, 2005), the constraints of a typical mobile growth rate for voice services globally by 2005,
device, such as small screen size, slow speed, and with the U.S. market expected to be 20-25% of
inconvenient keyboard, make it cumbersome to this total. A recent example to the continuation
access lengthy textual information (Anerousis & of this trend can be illustrated by an outstanding
Panagos, 2002). In Taiwan, the penetration rate of growth (350 percent increase in quarterly revenue)
mobile phone (104.6%)1 is much higher than the of speech self-service marketplace reported by
penetration rates of other major telecom services, Voxify, Inc. (Market Wire, 2006). It is believed
including local telephone: 58.2%, Internet: 71.3%, that the demand for mobile commerce has created
and broadband Internet: 68.7% (Institute for a market for voice-enabled applications accessible
Information Industry, 2007). However, the same by mobile phone.
survey also shows that the utilization rate of ac- Traditionally, Interactive Voice Response
cessing Internet from wireless devices is relatively (IVR) systems are based on proprietary hardware
low, with a penetration rate slightly lower than and software technology, with development and
50%, mainly because the text-based interaction deployment tightly integrated on the same hard-
between mobile devices and Web sites is very ware platform (Turner, 2004). This has resulted in
limited. However, voice interface does not have high development costs. Non-portable proprietary
these limitations, because voice interaction could software cannot be deployed on different platforms
escape the physical limitations on keypads and and it is also inherently difficult to upgrade or
displays as mobile devices become ever smaller modify (Dettmer, 2003). A multi-modal language
and it is much easier to say a few words than it is needed to support human-computer dialogs via
is to thumb them in on a keypad where multiple spoken input and audio output. As an optimum
key presses may be needed for entering each letter solution, VoiceXML (Voice eXtensible Markup
or character (Rebman, Aiken & Cegielski, 2003). Language), a markup language for creating voice-
Using voice as a medium to operate mobile devices user interfaces, bridges the gap between the Web
also enables user’s hands to engage in some other and the speech world by utilizing speech and
activities without losing the ability to browse the telephone touchtone recognition for input and
Internet through voice commands (Feng, Sears & prerecorded audio and text-to-speech synthesis
Karat, 2006). (TTS) for output (Larson, 2003). It is based on
the World Wide Web Consortium’s (W3C’s) eX-
715
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
tensible Markup Language (XML) and leverages concern for users. A voice Web site may have
the Web paradigm for application development hundreds of pages. When users visit the pages by
and deployment. By having a common language, a phone, they only depend on the voice to navigate
application developers, platform vendors, and tool the site. Users must wait for the voice menus by
providers can all benefit from code portability and sequences, so they spend relatively longer time
reuse. Furthermore, to reduce the cost of build- using the voice channel than a Web browser in
ing and delivery of new capabilities to telephone waiting for and/or selecting their desired choices.
customers, providing voice access to Web-based Unduly designed VUIs will be inefficient and fail
applications is an attractive option. VoiceXML to serve users’ needs for promptness. It not only
makes it possible for companies to write shared causes users’ dissatisfaction, but also introduces
business logic once and focus their resources on unnecessary inefficiency and redundancy to the
developing only the specific user interface for system (especially for the voice recognition and
each device they support. synthesis components). Thus, it is necessary to
Due to the above mentioned facts and analyses, design a voice user interface optimization mecha-
a voice-enabled web system (VWS), utilizing the nism in the voice-enabled Web system (VWS)
voice user interface technology, was designed application. The proposed VWS system would
and implemented through our project conducted apply genetic algorithms (GAs) to find a reason-
in Taiwan. Voice mobile phone was chosen as ably good arrangement of the site map in a voice
the pervasive device for accessing our Internet Web site, so the restructured site map will make
application prototype, a VWS-based service, users’voice browsing experience more responsive.
for two reasons. Firstly, as mentioned earlier the This GA-based VUI optimization mechanism was
penetration rate of mobile phone is much higher implemented as a software application so that it
than the rates of other major telecom services, and can be integrated with the VWS system.
mobile phone is associated tightly with people’s The subsequent sections of this chapter are
daily life. Secondly, the use of speech for input and organized as follows. Section 2 provides the
output is inherent in the minds of mobile phone backgrounds on voice-enabled Web system,
users. The system implemented in this research adaptive Web site, and genetic algorithm. Section
has several advantages over systems using other 3 describes the architecture of the VWS system
mobile devices such as Palm PDA, BlackBerry, and how to generate multimodal user-interface
and Pocket PC. For example, VWS users can obtain pages by using XSLT stylesheet. To illustrate how
information through voice instead of looking at the GA-based VUI optimization process works,
the monitor, and VWS eliminates the requirement the experiment method together with two simple
of keyboard or mouse through the use of voice examples was presented in Section 4. Section 5
user interface. covers more comprehensive experiment results,
Voice channels which differ from the Web and Section 6 concludes this chapter after the
have some limitations. For instance, the greatest discussions.
limitation is that voice channels only support one
type of access, acoustic, from a phone. Tomorrow’s
voice Web sites will serve up voice user interfaces LItErAtUrE rEVIEW
(VUIs) alongside the graphical user interfaces
(GUIs) they serve up today (Teo & Pok, 2003). Voice-Enabled Web system
The primary objective for VUIs must be creating
a positive experience for the users. In addition, A voice-enabled Web system is a system which
getting responses promptly is also an important provides users a voice channel, such as telephone,
716
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
to access Web applications. With voice-enabled its applications related to the users’ activities of
Web systems, firms can provide desirable voice- navigating voice portals with voice commands.
based Internet services, such as online customer V-commerce examples include the use of speech
service, online transaction service, and self-served technology over the telephone in commercial ap-
service, through both the conventional browser plications such as buying cinema/airline tickets,
interface and the new voice interface. Our voice- banking, account transferring, stock trading, and
enabled Web system combines XML based purchasing from mail-order companies (Goose,
mark-up languages, automatic speech recogni- Newman, Schmidt & Hue, 2000;Yamazaki,
tion (ASR), text to speech (TTS), and Web tech- Iwamida & Watanabe, 2004).
nologies. We use the emerging standard markup
language, VoiceXML, which defines a common Adaptive Web site
format to allow people to access Web content via
any phone (Larson, 2003). The VoiceXML uses Web users often get lost on the Internet due to its
XML tags to represent call flows and dialogs. The complicated structure and the information over-
development of the VoiceXML standard by AT&T, load problem. One of the most important func-
IBM, Lucent Technologies, and Motorola has led tions of a Web site is to assist users in searching
to a proliferation in recent years of voice-enabled information by using various Web intelligence
Web systems. By using this standard Web-based methods (Li & Zhong, 2004). One of those ef-
language, data then can be easily exchanged in ficient methods is to construct an adaptive Web
voice-enabled Web systems. site. Adaptive Web sites are sites that automati-
Voice-enabled Web technology is being de- cally improve their organization and presentation
ployed in a broad range of industries such as by learning from visitor access patterns (Kohrs
banking and retailing. With the launch of the & Merialdo, 2001).
first “voice portal”, which provides telephone Joachims, Freitag, and Mitchell (1997) initi-
users with speech-enabled access (via the nature ated an adaptive Web project called WebWatcher,
language interface) to Web-based information and which is a “tour guide” agent for the World Wide
applications, the voice-enabled Web technology Web, and its strategy for giving advice is learned
caught people’s attention. It is speculated that from feedback from earlier tours. WebWatcher
various industries will soon adopt it to develop uses the paths of people who indicated success
suitable Web system to serve their own business as examples of successful navigations. It groups
purposes. Internet portal companies such as AOL people based on their stated interests rather than
and Yahoo and other companies like Tellme Net- customizing to each individual. Perkowitz and
works, Hey Anita, and Internet Speech have been Etzioni (2000) focused on the problem of index
developing voice portals for providing several page synthesis. An index page is a page consisting
services. Generally speaking, a voice portal, like of links to a set of pages that cover a particular
an Internet portal, is a single place where content topic at a site. Their goal is to transform the Web
from a number of sources is aggregated. For ex- site into a better one – a new index page. They
ample, information services such as traffic reports, assume these groups of pages represent coherent
weather reports, stock quotes, bill inquiry/pay, topics in users’ minds, and analyze the Website’s
restaurant/hotel recommendations, department access logs to find groups of pages that often oc-
store promotion information, cinema reviews, cur together in user visits. Su, Yang, Zhang, Xu,
news, and e-mail can be accessed via voice portal. Hu, and Ma (2002) designed an adaptive Web
Recently, an emerging term called “v-commerce” interface based on Web log analysis and Web
has been used to describe the technology and page clustering. They also tried to improve users’
717
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
performance by introducing index pages that mini- (i.e., the Web site structure). The process of our
mize overall user browsing costs. Smith and Ng voice user interface optimization is illustrated
(2003) presented LOGSOM, a prototype system in Figure 1. According to the needs specified in
that organizes Web pages on a self-organizing a time-based or event-driven configuration file,
map (SOM) according to user navigation patterns. VWS can extract its site map and invoke the VUI
They clustered the Web pages according to the optimization mechanism to derive a restructured
users’ navigation behaviors, rather than accord- site map, which is used to substitute the original
ing to the Web content. Instead of organizing the one for providing users a better browsing expe-
Web pages according to the words contained in rience with a more efficient and more effective
the Web pages, they kept track of the interest voice navigation paths.
of the Web users, and organized the Web pages
according to their interest. In this way, the SOM Genetic Algorithm: basic concepts
provided by LOGSOM can be updated regularly
to reflect the current interest of the Web users. Genetic algorithms (GAs), which use randomized
In addition, for the purpose of personalization or search and optimization techniques, are designed
recommendation, many different kinds of adaptive to simulate processes in natural system necessary
Web sites have been explored recently. A simple for evolution, that is, the solutions to a problem
but common example is that some Web sites al- solved by GAs are derived through an evolution-
low users to personalize the sites for themselves ary process, which is based on a mechanism of
such as customizing the lists of favorite links. natural selection to search for an improved solution
Some other more complicated approaches may that optimizes a given fitness function. As shown
use various data mining, Web mining, content- in Figure 2, GA begins with a set of randomly
based filtering, collaborate filtering, and other created solutions called population. Pairs of solu-
techniques to offer users personalized or adapted tions are taken and used to produce offspring of
information and services (Chang, Changchien next generation, that is, a new population. This is
& Huang, 2006; Changchien, Lee & Hsu, 2004; motivated by a hope, that the new population will
Wang & Shao, 2004). be better than the old one. In the selection stage,
As mentioned in the previous subsection, a parent solutions (which are selected to produce
voice-enabled Web system provides landline offspring solutions) are selected according to
and mobile telephone users a new channel for their fitness – the more suitable they are the more
voice-based Web browsing, which allows users
to navigate and traverse the structure of the Web
site entirely by voice. In terms of voice browsing Figure 1. The process of voice user interface
or navigating the VUI structure of voice-enabled optimization
Web sites, it would be more desirable to reduce
users’ navigation time, mainly because of the
one dimensional nature of the voice channel
which causes the users to spend much time in
sequentially listening to various choices. In our
research, a simple genetic algorithm (SGA) based
voice user interface optimization mechanism,
which will be described later in this chapter, was
designed to realize an adaptive voice-enabled
Web site by automatically adapting the site map
718
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
chances they get to reproduce. Crossover operates leads to a more effective algorithm while compar-
on selected parent solutions to create new (off- ing it with an SGA. HGAs may allow to escape
spring) solutions. The simplest way to do that is to from a local optimization and to find better solu-
choose randomly some crossover point and copy tions. SGA is currently used in our initial imple-
everything before this point from the first parent mentation of the VUI optimization mechanism,
and then copy everything after the crossover point and for future research we plan to experiment on
from the other parent. Specific crossover made for various HGA improving approaches, such as ruin
a specific problem can improve performance of and recreate (Misevicius, 2003), tabu search
the genetic algorithm. Mutation, which randomly (Moscato & Cotta, 2003), branch and bound (Al-
modifies the genetic structures of some members Khayyal & Sherali, 2000), and simulated anneal-
of each new generation, is intended to prevent ing (Kirkpatrick, Gelatt & Vecchi, 1983).
falling of all solutions in the population into a
local optimum of the solved problem. Culling,
which takes place each time before going to the systEM ArcHItEctUrE
next generation, is for updating the population.
This iteration/revolution process is repeated until Our VWS prototype was implemented using open
an acceptable or optimum solution is found or technologies including eXtensible HyperText
until some fixed time limit. Markup Language (XHTML), XML, eXtensible
In contrast to the above described simple ge- Stylesheet Language for Transformations (XSLT),
netic algorithms (SGAs) that rely on the concept VoiceXML, MySQL database, Apache Web server,
of biological evolution, the hybrid genetic algo- Apache Tomcat application server, and various
rithms (HGAs), which are based on ideas evolu- Java APIs, such as: Java Servlet, Java Server
tion (Misevicius, 2003; Moscato & Cotta, 2003), Page (JSP), Java Database Connection (JDBC),
apply an improvement procedure to each offspring Java Cryptography Extension (JCE), and others.
or mutated individual. Instead of random solutions, Not only is Java suggested as the “write once,
HGAs operate with the improved solutions. This run everywhere” computer language in writing
application for various smart phones (Chang
& Chen, 2005), but Java’s modular nature al-
Figure 2. The procedure of a genetic algorithm
lows it to expand and develop solutions for new
computational problems. It has been evolving
from a popular client applet language to a cross
platform GUI builder and an application server
platform. This same modular nature now allows
Java to drive wireless and multimodal applica-
tions. Java 2 Platform, Micro Edition (J2ME) is
designed for nonbrowser-based devices and it is
not exactly a subset of Java 2 Platform, Standard
Edition (J2SE) (Sun Microsystems, 2004). J2ME
keeps some of the J2SE core library application
programming interfaces (APIs), but substitutes
others with lightweight components through the
javax.microedition package. As shown in Figure
3, a multimodal application architecture, which
offers new ways of accessing web applications
719
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
from any device at any location, was adopted in this ables the exchange of self-describing information
study by utilizing various modes of interfaces to elements between computers. In addition to com-
interact with end users (Chang and Minkin, 2006). bining XML based mark-up languages, automatic
In addition to the conventional browser inter- speech recognition (ASR), text to speech (TTS),
face and the targeted voice interface, our multi- and Web technologies, our VWS also uses the
modal web system approach also provides the emerging standard markup language, VoiceXML,
ability to access web-based information and ap- which defines a common format to allow people
plications from multiple methods or channels such to access Web content via any phone (Chang &
as a PDA, smart phone, Pocket PC, or Black- Minkin, 2006). There were two options considered
Berry. This multimodal approach facilitates the in our study for enabling telephony hardware to
sharing of the business logic and back-end pro- integrate with the voice server: Intel Dialogic-
cesses in a multiple-tiered application environ- based voice server system and Cisco telephony
ment, and thus freeing up the time and resources platform. The voice server on the Dialogic platform
for concentrating on the design and implementa- utilizes a specialized telephony card manufactured
tion specifics of user interface for each device. by Dialogic, which is connected directly to the
Multimodal applications may use both wireless telephony interface. Calls are then managed by
and voice devices. It is obvious from the name of the Dialogic platform to pass incoming calls to
the platform that J2ME supports wireless tech- the Voice Server application. The other one uses
nologies such as PDA or smart phone. Many the Cisco telephony platform. The voice server
J2ME-enabled devices will support a voice chan- facilitates the deployment of voice applications
nel, and as such may also be used to interact with by interfacing with various voice standards
VoiceXML-based services over the phone voice (Rodriguez et al., 2002). The voice server for
connection. Cisco utilizes the Voice over IP (VoIP) protocol.
To build the VWS prototype, a voice server Normally the voice server would be configured to
was used as the platform that enabled the creation work with a Cisco voice router that has a telephony
of voice applications through industry standards, interface connection. When a phone call is made,
including XML, VoiceXML and Java (Burke, the voice router will convert the call to VoIP and
2001; Rodriguez, Ho, Kempny, Pedreschi, & then redirect the voice packets to the voice server.
Richards, 2002). XML facilitates the concept of The system architecture is illustrated in Figure 4.
application integration and data sharing, and en-
720
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
When Voice Server starts, VoiceXML brows- text to speech (TTS) engine, which is a key com-
ers start up and wait for calls. Each VoiceXML ponent of the voice server, converts VoiceXML
browser works for one telephone call. When a scripts into speech and delivers the voice re-
user places a call to a designated phone number, sponses to the user via telephone channel. The
a computer on the voice site (i.e. the voice server) process will continue, simulating a natural lan-
answers the call and retrieves the initial VoiceX- guage conversation between the caller and the
ML script from a VoiceXML content server, which voice server.
can be a Web server located anywhere on the Web. We decided to use Java servlets to access the
An interpreter on the voice site parses and executes database, and used Java Database Connectiv-
the script by playing prompts, capturing respons- ity (JDBC) to connect to a relational database,
es, and passing the responses to a speech recogni- MySQL. The driver that we used was mysql-con-
tion engine on the voice system. Just as a Web nector-java-3.1.1-alpha-bin.jar, which is available
browser renders HyperText Markup Language for free download at http://dev.mysql.com. Java
(HTML) documents visually, a VoiceXML inter- servlets were used for validating login, construct-
preter on the voice site renders VoiceXML docu- ing user request, processing the request from end
ments audibly and allows telephone users to access user, and generating output results in the form of
services that are typically available to Web users. an XML document (Burke, 2001; Rodriguez et
Once the voice system gets all the necessary in- al., 2002). Afterwards, XSLT was used to convert
formation from the caller, the interpreter translates XML documents (generated by Java servlets) into
them into a request to the VoiceXML content XHTML documents, VoiceXML documents, and
server, i.e. the web server. When the web server WML (Wireless Markup Language) decks to suit
receives the request, it returns a VoiceXML page different devices. XSLT can be used to perform
with either a canned response or dynamically additional tasks within an application that uses
generated VoiceXML scripts, containing the in- XML as its main data representation model (Burke,
formation requested by the caller. Responses are 2001). The voice server, which contains the voice
passed from the Web server to the voice site via recognition and the synthesis engines used to au-
HyperText Transfer Protocol (HTTP). Finally, the tomate the conversation between the site and the
721
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
caller, is set up between the phone and the web in Asia please say TWO, for European countries
server to interpret the VoiceXML documents and please say THREE, ...,” and Joe may opt to say
act as a middleware processor. Any web site can TWO and traverse to N28 of the VUI tree shown
be a VoiceXML content server. Services provided in Figure 5. The interactions between Joe and the
by this VWS system can give subscribers access VWS service continue until Joe navigates to a leaf
to contents offered by different sources of Internet node of the VUI tree. At this point, Joe can finally
applications and services through PSTN (Public listen to the weather information of his interest.
Switched Telephone Network) telephones, wired Instead of formally describing the VUI optimiza-
or wireless. tion mechanism, we would like to show it first by
a simple example, which can easily illustrate not
only the principle and the potential improvement
EXPErIMENt MEtHOD of the VUI optimization process but also the model
FOr VUI OPtIMIZAtION used in the optimization experiments.
Figure 5. A VUI tree for modeling the hierarchically structured site map
722
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
Table 1. The properties of the nodes in the VUI tree shown in Figure 5.
Node Root N1,1 N1,2 N1,3 N2,1 N2,2 N2,3 N2,4 N2,5 N2,6 N2,7 N2,8 N2,9 N2,10
Node access time 5 6 5 4 5 3 6 8 5 4 7 4 8 3
Leaf node access time n/a n/a n/a n/a 16 19 25 24 29 33 27 31 39 42
Node access count n/a n/a n/a n/a 70 100 40 40 60 100 70 100 50 60
In this case, the total time
= 16*70 + 19*100 + 25*40 + 24*40 + 29*60 + 33*100 + 27*70 + 31*100 + 39*50 + 42*60
= 1,120 + 1,900 + 1,000 + 960 + 1,740 + 3,300 + 1,890 + 3,100 + 1,950 + 2,520
= 19,480 (seconds) -------- (1)
3 and 8 seconds, the values of node access count Using the VUI optimization mechanism, we
are only applicable to leaf nodes and randomly can restructure the VUI tree and calculate the new
generated between 40 and 100, and each value of total time. The new tree structure is shown in
leaf node access time is derived from the values Figure 6, in which the nodes annotated with star
of node access time of all nodes on the path from marks [*] were restructured, and the properties
the root navigating to that particular leaf node. of the nodes of the restructured tree are described
For example, the leaf node access time of N2,1 is in Table 2. Note that while the values of node
the summation of node access time values of the access time and node access count on all nodes
root, N1,1, and N2,1 (i.e., 5 + 6 + 5 = 16), and the are unchanged, the values of leaf node access time
leaf node access time of N2,6 is the summation on some leaf nodes are changed because the VUI
of node access time values of the root, N1,1, N1,2, tree is restructured.
N2,4, N2,5, and N2,6 (i.e., 5 + 6 + 5 +8 + 5 + 4 = 33).
Figure 6. A restructured VUI Tree [Nodes with star mark (*) were restructured.]
Table 2. The properties of the nodes in the restructured voice Web site tree
Node Root N1,1 N1,2 N1,3 *N2,2 *N2,1 *N2,3 *N2,6 N2,5 *N2,4 *N2,8 *N2,10 N2,9 *N2,7
Node access time 5 6 5 4 3 5 6 4 5 8 4 3 8 7
Leaf node access time n/a n/a n/a n/a 14 19 25 20 25 33 24 27 35 42
Node access count n/a n/a n/a n/a 100 70 40 100 60 40 100 60 50 70
In the new condition, the total time
= 14*100 +19*70 + 25*40 + 20*100 + 25*60 + 33*40 + 24*100 + 27*60 + 35*50 + 42*70
= 1,400 + 1,330 + 1,000 + 2,000 + 1,500 + 1,320 + 2,400 + 1,620 + 1,750 + 2,940
= 17,260 (seconds) -------- (2)
723
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
In this sample case of using our optimization services. While there are many ways to restruc-
model, the improvement (time decreases) is about ture the VUI tree, in our initial design of the VUI
11.40% ([(1) – (2)] / (1) 0.1139), even though this optimization experiment we only consider the
is just a simple illustration. As voice pages increase most straightforward approach of rearranging the
numerically and calculations are adopted in com- sequence of choices under every nonleaf node.
puterized computations, it is expected that the Other approaches, such as the operation of node
improvements, achieved by GA-based optimiza- promotion/demotion (by moving some nodes
tion approaches for the proposed voice-enabled to higher/lower levels of the VUI tree), and the
Web system, will be very attractive and better creation of extra links (for providing short-cuts to
than the result of this illustration. VUI tree navigation), may be considered in other
experiments conducted in the future. Changing
Genetic Algorithm for the order of child nodes for every nonleaf node
VUI Optimization can create many different restructured VUI trees,
and every VUI tree represents a possible solution.
The VUI optimization process of restructuring a Thus, for a VUI tree with hundreds of nodes, the
voice-enable Web site can be modeled by a tree potential number of restructured VUI trees can
structure (i.e., the VUI tree) as shown in Figure be very high. For example, let’s consider a VUI
5. For each VUI optimization experiment, our tree with 200 nonleaf nodes and assume each
simulation program will create a VUI tree, with nonleaf node has six child nodes (i.e. there are
the values of node access time of all nodes and 6 choices available on each non-leaf node), then
the values of node access count of all leaf nodes there could be potentially up to (6!)200 = 2.9275 *
randomly generated. These values will remain 10571 restructured VUI trees, or possible solutions
unchanged throughout the entire GA evolution to be considered in our problem of VUI optimi-
process. However, since each value of leaf node zation. This permutation procedure is randomly
access time of a leaf node is derived from the applied to all non-leaf nodes of the initial VUI
values of node access time of all nodes on the tree to generate nine more trees, and all these ten
path from the root navigating to that particular trees are put into the population for subsequent
leaf node, it may change when the VUI structure evolutions.
changes. As illustrated in the previous example, In our genetic algorithm, every nonleaf node
each possible solution of this problem can be is encoded by the sequence of choices available
represented by a VUI tree, and the fitness function in that node. For a non-leaf node N randomly
of this GA-based optimization is the total time, selected from tree A, its sequence of choices (or
which is the summations of every leaf node ac- order of child nodes) can be represented as N(A)
cess time multiply leaf node access count. Thus, = 1 2 3 4 5 6 7 8 9, and at the same time, the same
the objective of our optimization process is to non-leaf node N in tree B may have a different
minimize the fitness function: sequence of choices represented as N(B) = 4 5 6
9 1 2 7 3 8. The representations of GA variables
n
F (X ) = ∑ LeafNodeAccessTime (i ) × LeafNodeAccessCount (i ) can also be called chromosomes. Assume that
i =k
our algorithm randomly selects tree A and tree
B from the population, identifies node N for the
crossover operation, and then selects two posi-
The VUI tree of a voice-enabled Web site
tions, for example, the 3rd and the 5th positions,
can be restructured to represent alternative Web
to define how to crossover chromosomes for
site maps offering exactly the same contents and
producing new chromosomes, that is:N(A) = 1 2
724
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
725
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
Table 3. Results of SGA simulations (number of children = fixed; access time = 2 ~ 15; access counts
= 1 ~10,000)
Level Number of Children Iterations Initial Total Time (s) Better Total Time (s) Improvement (%)
2 3 20,000 1,886,608 960,008 49.1
2 4 20,000 5,008,968 2,705,967 46.0
2 5 20,000 9,297,450 5,156,684 44.5
2 6 20,000 14,627,224 9,079,845 37.9
3 3 20,000 7,160,233 3,804,627 46.9
3 4 20,000 25,905,538 16,690,080 35.6
3 5 20,000 65,340,923 45,643,277 30.1
3 6 20,000 155,856,635 109,391,621 29.8
4 3 20,000 33,264,675 23,520,746 29.3
4 4 20,000 139,935,642 107,410,143 23.2
4 5 20,000 431,157,562 331,317,272 23.2
4 6 20,000 1,132,148,584 879,033,227 22.4
5 3 20,000 124,114,791 92,712,893 25.3
5 4 20,000 652,978,855 535,596,066 18.0
5 5 20,000 2,700,049,188 2,450,119,893 9.3
5 6 20,000 8,416,055,793 7,975,813,132 5.2
6 3 20,000 419,713,448 339,456,804 19.1
6 4 20,000 3,194,265,541 2,680,976,660 16.1
6 5 20,000 16,141,177,101 15,988,455,697 1.0
6 6 20,000 60,592,359,070 60,590,742,389 0.0
Table 4. Results of SGA simulations (number of children = varied; access time = 2 ~ 15; access counts
= 1 ~10,000)
Level Number of Children Iterations Initial Total Time (s) Better Total Time (s) Improvement (%)
2 4 to 5 20,000 6,671,516 4,049,286 39.3
2 3 to 6 20,000 5,841,651 3,263,079 44.1
2 2 to 7 20,000 3,803,479 2,071,459 45.5
3 4 to 5 20,000 49,441,465 35,029,192 29.2
3 3 to 6 20,000 34,589,124 24,112,238 30.3
3 2 to 7 20,000 26,332,244 20,114,552 23.6
4 4 to 5 20,000 310,882,476 249067717 19.9
4 3 to 6 20,000 237,910,059 195,086,909 18.0
4 2 to 7 20,000 167,725,927 134,812,794 19.6
5 4 to 5 20,000 1,637,790,586 1,249,947,619 23.7
5 3 to 6 20,000 1,434,332,917 1,258,053,217 12.3
5 2 to 7 20,000 931,088,499 816,875,439 12.3
6 4 to 5 20,000 8,997,595,006 8,892,944,474 1.2
6 3 to 6 20,000 7,832,316,476 7,731,169,501 1.3
6 2 to 7 20,000 4,932,297,039 4,744,909,127 3.8
726
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
Table 5. Results of SGA simulations with more iterations (access time = 2 ~ 15; access counts = 1 ~10,000)
Level Number of Children Iterations Initial Total Time (s) Better Total Time (s) Improvement (%)
5 6 500,000 8,416,055,793 7,087,376,995 15.8
6 6 500,000 60,592,359,070 53,334,886,394 12.0
6 4 to 5 500,000 8,997,595,006 7,338,143,520 18.4
6 3 to 6 500,000 7,832,316,476 6,768,258,648 13.6
pervasive computing will be supplemented by users to connect to the Internet from anywhere
applications used by a wider variety of profession- through devices that are not suitable for the use of
als and by more horizontal applications. Eventu- traditional keyboard, mouse, and monitor. In the
ally the access to the conventional desktop and near future, human-computer voice interfaces will
Internet applications through pervasive devices become important tools for solving the accessibil-
will become very attractive and could lead to ity limitations of conventional human-computer
pervasive computing being used as much in the interfaces. Based on the multimodal architecture,
consumer sector as it is in the enterprise world. this chapter describes how a voice-enabled web
To support various types of pervasive devices system (VWS) prototype could be implemented
in a conventional way, multiple applications to provide an interactive voice channel using an
have to be independently developed with each Apache web server, a voice server, and a Java
to satisfy one type of devices. This practice will servlet engine. We also showed through our
exponentially increase the cost, complexity, and project that multimodal user interface pages could
manageability of a system when new devices or be generated by using technologies including:
changes are introduced. To resolve this issue, our eXtensible Markup Language (XML), eXtensible
project researched on both theoretical concepts Stylesheet Language for Transformations (XSLT)
of the technologies and practical applications of (Burke, 2001), VoiceXML (Larson, 2003), and
the concepts by adopting a new software applica- Java technology (Sun Microsystems, 2004). As
tion architecture (see Figure 3) that enables one a matter of fact, it is also reconfirmed from our
single application simultaneously interfacing with project that voice interfaces may not only help
various types of distributed devices such as PC’s, solve the accessibility limitations of conventional
handheld computers, PDA’s, WAP-enabled wire- human-computer interfaces, but enable mobile
less devices, phones, and others. This multimodal device users’ hands to engage in some other ac-
application architecture overcomes the difficulties tivities without losing the ability to browse the
by singularizing the business and application logic Internet through voice commands.
while expanding device interfaces. Since common In terms of enhancing users’ experience and
business and application logic is centralized, the improving the overall system performance, a
maintenance and enhancement become much GA-based dynamic structure approach, which
easier. Our multimodal web system, VWS, was can restructure the site map according to users’
designed and implemented based on this archi- demand or the overall performance needs of a
tecture to serve as a “proof of concept” example system, was applied to our VWS system. Our
of this new e-commerce application paradigm. experiment results showed that this optimization
Nowadays, mobile and wireless technologies approach may be adopted by an adaptive VWS
are becoming increasingly prevalent, and there is Systems for supporting large-scale enterprise ap-
a growing demand for technology that will allow plications. To ameliorate the rate of convergence
727
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
of the optimization approach used by the adaptive Council, Taiwan, for financially supporting this
VWS system, we plan to add some heuristic rules, work under contract number NSC-96-2221-E-
such as ruin and recreate (Misevicius, 2003) and 005-088-MY2.
tabu search (Moscato & Cotta, 2003), to improve
the simple genetic algorithm used in the VWS
system, which will eventually have the ability rEFErENcEs
of self-learning to optimize itself automatically,
dynamically, and effectively. Al-Khayyal, F. A., & Sherali, H. D. (2000). On
In their influential paper on the challenges as- finitely terminating branch-and-bound algorithms
sociated with nomadic or pervasive computing, for some global optimization problems. SIAM
Lyytinen and Yoo (2002) outline eight research Journal on Optimization, 10(4), 1049–1057.
themes and twenty research questions, covering a doi:10.1137/S105262349935178X
wide range of topics in the heart land of information Anerousis, N., & Panagos, E. (2002). Making voice
systems research. If we are to choose a research knowledge pervasive. IEEE Pervasive Comput-
question posed by them that comes nearest to ing / IEEE Computer Society [and] IEEE Com-
what we do here, it is their research question 1.1, munications Society, 1(2), 42–48. doi:10.1109/
namely: “How do we design and integrate sets of MPRV.2002.1012336
personalized mobile services that support users’
task execution in multiple social and physical Ballagas, R., Borchers, J., Rohs, M., & Sheridan,
contexts?” (Lyytinen & Yoo, 2002, p. 380). Our J. G. (2006). The smart phone: A ubiquitous in-
contribution lies in showing how VWS can be put device. IEEE Pervasive Computing / IEEE
designed to provide an interactive voice channel Computer Society [and] IEEE Communications
using readily available information technology Society, 5(1), 70–77. doi:10.1109/MPRV.2006.18
products, such as Apache web server, the voice Burke, E. (2001). JAVA & XSLT. California:
server, and the servlet engine. Furthermore, we O’Reilly.
describe how multimodal user-interface pages for
supporting various wireless devices have been Chang, S. E., Changchien, S. W., & Huang, R.-H.
implemented by using technologies including (2006). Assessing users’ product-specific knowl-
eXtensible Markup Language (XML), eXtensible edge for personalization in electronic commerce.
Stylesheet Language for Transformations (XSLT), Expert Systems with Applications, 30(4), 682–693.
and Java technologies. The last but never the least, doi:10.1016/j.eswa.2005.07.021
compared with the Web browser based interface
Chang, S. E., & Minkin, B. (2006). The imple-
the voice channel is slower, and therefore, there
mentation of a secure and pervasive multimodal
is a need to apply the optimization techniques,
Web system architecture. Information and Soft-
such as the GA-based algorithm described in this
ware Technology, 48(6), 424–432. doi:10.1016/j.
chapter, to enhance the responsiveness of the VWS
infsof.2005.12.012
based services and applications.
Chang, Y.-F., & Chen, C. S. (2005). Smart phone
- the choice of client platform for mobile com-
AcKNOWLEDGMENt merce. Computer Standards & Interfaces, 27(4),
329–336. doi:10.1016/j.csi.2004.10.001
The editorial efforts and the invaluable comments
from the editor are highly appreciated. The author
would also like to thank the National Science
728
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
Changchien, S. W., Lee, C. F., & Hsu, Y. J. (2004). Kirkpatrick, S., Gelatt, C. D. Jr, & Vecchi, M.
Online personalized sales promotion in electronic P. (1983). Optimization by simulated annealing.
commerce. Expert Systems with Applications, Science, 220(4598), 671–680. doi:10.1126/sci-
27(1), 35–52. doi:10.1016/j.eswa.2003.12.017 ence.220.4598.671
de Grimaldo, S. W. (2004). Mobile Commerce Kohrs, A., & Merialdo, B. (2001). Creating user-
Takes off. Telecom Trends International, Inc., adapted Web sites by the use of collaborative fil-
Virginia. Retrieved November 15, 2007, from tering. Interacting with Computers, 13, 695–716.
http://www.telecomtrends.net/reports.htm doi:10.1016/S0953-5438(01)00038-8
Dettmer, R. (2003). It’s good to talk (speech tech- Larson, J. A. (2003). VoiceXML and the W3C
nology for online services access). IEE Review, speech interface framework. IEEE MultiMedia,
49, 30–33. 10, 91–93. doi:10.1109/MMUL.2003.1237554
Feng, J., Sears, A., & Karat, C.-M. (2006). A lon- Li, Y., & Zhong, N. (2004). Web mining model
gitudinal evaluation of hands-free speech-based and its applications for information gathering.
navigation during dictation. International Journal Knowledge-Based Systems, 17(3), 207–217.
of Human-Computer Studies, 64(6), 553–569. doi:10.1016/j.knosys.2004.05.002
doi:10.1016/j.ijhcs.2005.12.001
Lyytinen, K., & Yoo, Y. (2002). The next
Goose, S., Newman, M., Schmidt, C., & Hue, wave of nomadic computing. Information Sys-
L. (2000). Enhancing Web accessibility via the tems Research, 13(4), 377–388. doi:10.1287/
Vox Portal and a Web-hosted dynamic HTML isre.13.4.377.75
<-> VoxML converter. Computer Networks, 33,
Market Wire. (2006). Voxify Reports Outstanding
583–592. doi:10.1016/S1389-1286(00)00036-0
Growth, Increased Momentum in the Speech Self-
Gulliver, S. R., Serif, T., & Ghinea, G. (2004). Per- Service Marketplace. Retrieved August 10, 2006,
vasive and standalone computing: the perceptual from http://www.findarticles.com/p/articles/
effects of variable multimedia quality. Internation- mi_pwwi/is_200605/ai_n16136434
al Journal of Human-Computer Studies, 60(5/6),
Misevicius, A. (2003). Genetic algorithm hybrid-
640–665. doi:10.1016/j.ijhcs.2003.11.002
ized with ruin and recreate procedure: Application
Institute for Information Industry. (2007). Survey to the quadratic assignment problem. Knowledge-
on the mobile Internet in Taiwan for Q3 2007. ACI- Based Systems, 16(5-6), 261–268. doi:10.1016/
FIND, focus on Internet news and data. Retrieved S0950-7051(03)00027-3
January 2, 2008, from http://www.find.org.tw/
Moscato, P., & Cotta, C. (2003). Gentle introduc-
find/home.aspx?page=many&id=184
tion to memetic algorithms. In F. Glover & G.
Joachims, T., Freitag, D., & Mitchell, T. (1997). Kochenberger (Eds.), Handbook of metaheuris-
WebWatcher: A tour guide for the World Wide tics (pp. 105-144). Boston: Kluwer Academic
Web. In Proceedings of IJCAI-97, Fifteenth Joint Publishers.
Conference on Artificial Intelligence, Nagoya,
Perkowitz, M., & Etzioni, O. (2000). Towards
Japan (pp. 770-775).
adaptive Web sites: Conceptual framework and
case study. Artificial Intelligence, 118, 245–275.
doi:10.1016/S0004-3702(99)00098-3
729
A Voice-Enabled Pervasive Web System with Self-Optimization Capability
Rebman, C. M. Jr, Aiken, M. W., & Cegielski, C. G. Teo, T., & Pok, S. (2003). Adoption of WAP-
(2003). Speech recognition in the human-computer enabled mobile phones among Internet users.
interface. Information & Management, 40(6), Omega: The International Journal of Man-
509–519. doi:10.1016/S0378-7206(02)00067-8 agement Science, 31, 483–498. doi:10.1016/j.
omega.2003.08.005
Rodriguez, A., Ho, W.-K., Kempny, G., Pedre-
schi, M., & Richards, N. (2002). IBM WebSphere The Kelsey Group (2001, March). The global voice
Voice Server 2.0 Implementation Guide. IBM ecosystem (Analyst Report), The Kelsey Group.
Redbooks, IBM.
Toye, E., Sharp, R., Madhavapeddy, A., & Scott,
Roussos, G., Marsh, A. J., & Maglavera, S. (2005). D. (2005). Using smart phones to access site-spe-
Enabling pervasive computing with smart phones. cific services. IEEE Pervasive Computing / IEEE
IEEE Pervasive Computing / IEEE Computer Computer Society [and] IEEE Communications
Society [and] IEEE Communications Society, Society, 4(2), 60–66. doi:10.1109/MPRV.2005.44
4(2), 20–27. doi:10.1109/MPRV.2005.30
Turner, K. (2004). Analysing interactive voice
Smith, K. A., & Ng, A. (2003). Web page cluster- services. Computer Networks, 45(5), 665–685.
ing using a self-organizing map of user navigation doi:10.1016/j.comnet.2004.03.005
patterns. Decision Support Systems, 35, 245–256.
Wang, F. H., & Shao, H. M. (2004). Effective
doi:10.1016/S0167-9236(02)00109-4
personalized recommendation based on time-
Su, Z., Yang, Q., Zhang, H., Xu, X., Hu, Y.-H., & framed navigation clustering and association
Ma, S. (2002). Corellation-based Web document mining. Expert Systems with Applications, 27(3),
clustering for adaptive Web interface design. 365–377. doi:10.1016/j.eswa.2004.05.005
Knowledge and Information Systems, 4, 151–167.
Yamazaki, Y., Iwamida, H., & Watanabe, K.
doi:10.1007/s101150200002
(2004). Technologies for voice portal platform.
Sun Microsystems. (2004). Information on J2ME Fujitsu Scientific and Technical Journal, 40(1),
and J2SE. Retrieved June 2, 2007, from http:// 179–186.
java.sun.com/j2me/ and http://java.sun.com/j2se/
Zhai, S., Kristensson, P.-O., & Smith, B. A.
Tan, A. (May 2005). Voice to dominate 3G traf- (2005). In search of effective text input inter-
fic, says expert. ZDFNetAsia. Retrieved June faces for off the desktop computing. Interacting
2, 2007, from http://www.zdnetasia.com/news/ with Computers, 17(3), 229–250. doi:10.1016/j.
communications/0,39044192,39231956,00.htm intcom.2003.12.007
This work was previously published in Global Implications of Modern Enterprise Information Systems: Technologies and
Applications, edited by Angappa Gunasekaran, pp. 137-155, copyright 2009 by Information Science Reference (an imprint of
IGI Global).
730
731
Chapter 3.12
Achieving System and
Business Interoperability by
Semantic Web Services
John Krogstie
Norwegian University of Science and Technology (NTNU), Norway, & SINTEF ICT, Norway
Csaba Veres
Norwegian University of Science and Technology (NTNU), Norway
Guttorm Sindre
Norwegian University of Science and Technology (NTNU), Norway
Øyvind Skytøen
Norwegian University of Science and Technology (NTNU), Norway
AbstrAct INtrODUctION
Much of the early focus in the area of Semantic Information systems interoperability has become
Web has been on the development of representa- a critical success factor for process and quality
tion languages for static conceptual information; improvement both in private enterprises and the
while there has been less emphasis on how to make public sector (Linthicum, 2003), and recent tech-
Semantic Web applications practically useful in the nological advances to achieve this include web ser-
context of knowledge work. To achieve this, a bet- vices and semantics encoded in ontologies. “The
ter coupling is needed between ontology, service Semantic Web” (Berners-Lee, Hendler & Lassila,
descriptions, and workflow modeling, including 2001) is seen as the next generation of web sys-
both traditional production workflow and interac- tems, providing better information retrieval, better
tive workflow techniques. This chapter reviews services, and enhanced interoperability between
the basic technologies involved in this area to different information systems. The Semantic Web
provide system and business interoperability, and initiative is currently overseen in the semantic
outlines what can be achieved by merging them in web activity of the W3C, and includes a number
the context of real-world workflow descriptions. of core technologies. Some core technologies that
will be relevant to this overview are XML, RDF,
DOI: 10.4018/978-1-60566-146-9.ch010 RDF/S, OWL, and Web Services (SOAP, WSDL,
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Achieving System and Business Interoperability by Semantic Web Services
UDDI). Also newer initiatives such as OWL-S The rest of this chapter is structured as follows:
and WSMO are relevant to our work, and will be The next three sections survey ontologies, service
described in more detail in the article. While these models, and workflow models, respectively. Then
technologies are promising, it can still be argued an integrated approach to enterprise and IS devel-
that alone, they are not sufficient to achieve in- opment is presented, where interoperability among
teroperability in the business domain, allowing for the various systems (and enterprises) would be
a smooth integration between different information a major focus. Finally, the last section provides
systems within and between organizations. For this some concluding remarks.
to be accomplished, it is not enough to describe
ontological metadata about the information and
services available – one also needs to know the bAsE tEcHNOLOGIEs
work context in which the different types of in- AND ONtOLOGy
formation and services are requested. As observed
in (Bubenko, 2007) this is often a challenge, as We here briefly describe core technologies within
many ontologists focus on domain ontologies as the area, including XML, RDF, RDF Schema,
such, more than their potential usage in applica- and ontologies including an overview of OWL.
tions, as well as having limited knowledge of
advances in other areas of conceptual modeling XML
during the last decades. Hence there is a need to
integrate ontologies and service descriptions with XML will receive the least coverage in this re-
models of workflows and business processes. view. It is the most general and widespread of the
Most of the work within these areas focuses on technologies we consider, and is therefore likely
automating routine tasks. While computerization to be familiar to the majority of readers. Basically,
automates routine procedures, knowledge-based XML defines a set of syntax rules that can be used
cooperation remains a challenge, where we see a to create semantically rich markup languages for
role for interactive process models. To the extent particular domains. Once a markup language is
that different enterprises use different modeling defined and the semantics of the tags known, the
languages, the interoperability between various document content can be annotated. The XML
models would also emerge as a challenge in its language thus defined can include specification
own respect, in which case some unification effort of formatting, semantics, document meta-data
might be needed (Opdahl & Sindre, 2007), one (author, title, etc.), and so on. XML allows for the
effort in this direction is the Unified Enterprise creation of elements which are XML containers
Modeling Language (UEML)1, not to be confused consisting of a start tag, content, and an end tag.
with the UML. Because of the flexibility of XML in defining
The purpose of this chapter is as follows: domain specific, meaningful markups, it has been
widely adapted as a standard for application inde-
a) To provide an overview of the relevant pendent data exchange. These properties combine
technologies (ontology, service models, to make XML the foundational technology for the
workflow models, including those being semantic web, providing a common syntax for
based on interactive models). authoring web content. XML provides means for
b) To show how these technologies fit together, syntactic interoperability, as well as ways to ensure
both in theory (presented as “The interoper- the validity of a document, and most importantly
ability pyramid”) and in practice. the necessary syntax to define the meaning of
elements in a domain specific application. On
732
Achieving System and Business Interoperability by Semantic Web Services
the other hand providing the syntax for defining 2. RDF distinguishes between resources and
meaning is only a necessary, but not sufficient properties that are globally qualified, i.e.,
condition for the specification of semantics that are associated with a URI, and those that
allows interoperability are locally qualified. The advantage of a
Building on the XML specification also be- globally qualified resource or property is it
comes necessary because the hierarchical structure can be distinguished from other resources
of XML documents makes them difficult to use for or properties in different vocabularies that
extensible, distributed data definitions. Much of share the same fragment name, in a fashion
the information about relationships in the data is that is analogous to XML namespaces.
implicit in the structure of the document, making 3. As a result of the first two properties, RDF
it difficult to use and update this information in can be used to make statements about Web
a flexible and application independent way. This resources, by relating one URI to another.
is where RDF comes into the picture. 4. It is easy to encode graphs using RDF as it
is based on triples, whereas XML documents
rDF are trees so encoding graphs is more com-
plicated and can be done in several different
The first level at which a concrete data model ways.
is defined on XML is the Resource Description 5. RDF has an explicit interpretation or model
Framework (RDF). Actually, RDF as a data model theory; there is an explicit formal, application
is independent of XML, but we consider it as a independent interpretation of an RDF model
layer extending the XML because of the widely (Hayes, 2004). XML documents also have
practiced XML serialization of RDF in semantic interpretations but they are often implicit in
web applications (RDF/XML2). the processor or parser associated with that
The basic structure of RDF is a triple consisting particular type of XML document.
of two nodes and a connecting edge. These basic
elements are all kinds of RDF resources, and can But in spite of the apparent usefulness of RDF,
be variously described as <things> <properties> there is relatively slow adoption of RDF compared
<values> (Manola & Miller, 2004), <object> with XML (Batzarov, 2004).
<attribute> <value> (Broekstra, Kampman, & There are many possible reasons for this slow
van Harmelen, 2003), or <subject> <predicate> adoption. (Daconta, Obrst, & Smith, 2003) take an
<object> (Powers, 2003). There are alternative optimistic position and attribute the long lead-in
serializations of RDF, including N33, N-Triples4, time to poor tutorials, minimal tool support, and
and Turtle5. Each of these professes some advan- poor demonstration applications, arguing that
tages, for example human readability, but RDF/ once the practical limitations have been overcome,
XML is the normative syntax for writing RDF. adoption will grow rapidly. However, we must not
This relatively simple basic model has several ignore the presence of dissatisfaction with RDF
features that make it a powerful data model for in- in both practitioner and research communities.
tegrating data in dispersed locations (Butler 2002). Some of the challenges for RDF in light of this
dissatisfaction are as follows:
1. RDF is based on triples, in contrast to simple
attribute-value pairs. The advantage of using 1. RDF / XML (or XHTML) integration needs
triples is that this makes the subject of the improvement. The W3C RDF Working
attribute value pair explicit. Group is working on solutions for success-
fully embedding RDF within XHTML (RDF/
733
Achieving System and Business Interoperability by Semantic Web Services
A6), and tools such as SMORE7 purport to non-RDF based, and syntactically much
making HTML markup easier. But so far simpler RSS 2.010.
there are no high profile, compelling appli-
cations to showcase the advantages of RDF. Clearly there is a great deal of work to be done
For example microformats8, which can be in establishing RDF as a core technology that adds
seen as a very simple version of RDF/A but value to the widely adopted XML syntax alone.
are “designed for humans first and machines There are some fledgling ventures launched in
second”, have enjoyed a rapid uptake. For 2007, backed by high profile investors, which
example, both Yahoo! and Google can run attempt to bring the advantages of RDF to main-
specialized searches on microformats. stream social networking applications11. Should
2. The RDF data model can be complex and they become successful, then RDF will become
confusing because it mixes metaphors and more prominent in the public eye.
introduces new concepts that can be tricky But RDF is also important as a foundation
to model. For instance the standard notion layer for Ontologies, making it relatively simple
of RDF as composed of subject-predicate- to express higher level ontological constructs.
object is linguistically derived, but its rela- Implementing ontologies in XML and XML
tionship to concepts in other representations Schema without RDF is tricky for several reasons.
is somewhat unclear, e.g., class-property- In describing a procedure for translating an on-
value (object-oriented), node-edge-node tology into an XML Schema, (Klein et al., 2003)
(graph theory), source-link-destination (web note several important problems. First, superclass/
link), entity-relation-entity (database), and subclass inheritance is problematic and has to be
can cause confusion. One of the particularly overcome with artificial workarounds in the XML
tricky constructs is reification, which intro- specification, and defining multiple inheritance is
duces an unproven modeling construct that is not possible at all in XML/S. Second, the possibil-
foreign to most data modeling communities. ity of fully automating the translation process is
Reification can cause confusion because it questionable, limiting its use for large ontologies.
can be used to arbitrarily nest statements, In order to use RDF as a means of representing
possibly negating the stated truth value of knowledge it is necessary to enrich the language
statements (Daconta, Obrst, & Smith, 2003). in ways that fixes the interpretation of parts of
3. The RDF/XML serialization is confusing the language. As described thus far, RDF does
and difficult to work with, especially in the not impose any interpretation on the kinds of
absence of proper tool support. The striped resources involved in a statement beyond the
syntax (Brickley, 2001) can make it difficult roles of subject, predicate and object. It has no
to understand the proper interpretation of way of imposing some sort of agreed meaning
statements. For instance it is often impos- on the roles, or the relationships between them.
sible to tell whether an XML element in The RDF schema is a way of imposing a simple
the RDF serialization represents an edge, ontology on the RDF framework by introducing
or a node. The complexity of the syntax is a system of simple types.
partially responsible for a relative support
of the RSS1.09 specification. RSS1.0 is an rDF schema
RDF based variant of the popular RSS for-
mat, and is probably the most high profile We have seen that RDF provides a means to
use of RDF on the Internet. However, it is relate resources to one another in a graph based
losing ground in terms of popularity to the formalism connecting subjects to objects via
734
Achieving System and Business Interoperability by Semantic Web Services
predicates. The RDF schema, (RDF/S) provides limiting deficiencies are identified in (Antoniou
modeling primitives that can be used to capture & van Harmelen, 2004):
basic semantics in a domain neutral way. That is,
RDF/S specifies metadata that is applicable to the • Local scope of properties: in RDF/S it is
entities and their properties in all domains. The possible to define a range on properties,
metadata then serves as a standard model by which but not so they apply to some classes only.
RDF tools can operate on specific domain models, For instance the property eats can have a
since the RDF/S meta-model elements will have a range restriction of food that applies to all
fixed semantics in all domain models. The RDF/S classes in the domain of the property, but it
elements are shown in Table 1 and Table 2. is not possible to restrict the range to plants
RDF/S provides simple but powerful modeling for some classes and meat for others.
primitives for structuring domain knowledge into • Disjointness of classes cannot be defined
classes and sub-classes, properties and sub- prop- in RDF/S.
erties, and can impose restrictions on the domain • Boolean combinations of classes are not
and range of properties, and defines the semantics possible. For example Person cannot be
of containers. defined as the union of the classes Male
The simple meta-modeling elements can limit and Female.
the expressiveness of RDF/S. Some of the main • Cardinality restrictions cannot be
expressed.
735
Achieving System and Business Interoperability by Semantic Web Services
• Special characteristics of properties like the chances of mutual understanding are greatly
transitivity cannot be expressed. enhanced.
Perhaps the most publicly visible use for
Ontologies simple ontologies is the taxonomies used for site
organization on the World Wide Web. This allows
A good starting point for understanding what ontol- designers to structure information and users to
ogy entails, is to consider Figure 1, adopted from browse and search. Taxonomies can also help
(Daconta, Obrst, & Smith,2003), which places a with sense disambiguation since the context of
number of knowledge models on a continuum. a term is given by the more general terms in the
As you go from the lower left corner to the upper taxonomy.
right, the richness of the expressible semantics Structured ontologies provide more sophis-
increases. This is shown on the right side of the ticated usage scenarios. For instance, they can
arrow with some typical expressions that have provide simple consistency and completeness
some sort of defined semantics for the particular checks. If all products must have a price then web
model. The names for the knowledge models are sites can automatically be checked for missing
given on the left of the arrow. It is important to or conflicting information. Such ontologies can
note that all of the terms on the left hand side have also provide completion where partially speci-
been called “ontology” by at least some authors, fied information can be expanded automatically
which is part of the source for confusion about by reference to the terms in the ontology. This
the word. expanded information could also be used for
Models based on the various points along the refining search, for instance. Ontologies can also
ontology spectrum have different uses (McGuin- facilitate interoperability, by aligning different
ness, 2003). In the simplest case, a group of users terms that might be used in different applications
can agree to use a controlled vocabulary for their (McGuinness, 2003).
domain. This of course does not guarantee that Now we are in a position to see why the on-
they will use the terms in the same way all the tologies on the most formal end of the spectrum
time, but if all the users including database design- are often taken as the default interpretation in
ers chose their terms from an accepted set, then the context of the semantic web, providing the
conceptual underpinning for “ ... making the
736
Achieving System and Business Interoperability by Semantic Web Services
semantics of metadata machine interpretable” the interpretation of some RDF/S expressions. The
(Staab & Stuber, 2004). But for the semantics of OWL specification defines three sublanguages:
a domain model to be machine interpretable in OWL Full, OWL DL, and OWL Lite: OWL Full
any interesting way, it must be in a format that is upward and downward compatible with RDF
allows automated reasoning in a flexible manner. but OWL DL and OWL Lite are not.
Obviously, taxonomies can specify little in this The names of the three sub languages of OWL
sense. Database schemas are more powerful, but describe their expressiveness, keeping in mind a
limit the interpretation to a single model in terms fundamental tradeoff between expressiveness,
of reasoning over the knowledge base and the only efficiency of reasoning, and support for human
automated reasoning that can be performed is what understanding. OWL Full has constructs that
is allowed by the relational model, i.e., retrieval make the language undecidable. Developers
of tuples actually represented in the database. should therefore only use OWL Full if the other
Formal logic based reasoning about ontologies two sub languages are inadequate for modeling
can consider multiple possible models (Bordiga the relevant domain, or if they wish to maintain
& Brachman, 2003). They are at the same time full compatibility with RDF. Similarly, OWL
more formally constrained and more semantically DL should be used if OWL Lite is not sufficient.
flexible than database schemas. Ontologies based Details of the syntax and semantics can easily be
on different logics can support different kinds of obtained from the technical documentation web
inference, but a minimal set of services should site of the W3C.
include reasoning about class membership, class
equivalence, consistency, and classification (An-
toniou & van Harmelen, 2004). WEb sErVIcEs
The ontology representation language adopted
by the Web Ontology Working Group of the W3C12 There is a great deal of interest about web ser-
is the Web Ontology Language (OWL). OWL is vices (Alonso et al., 2004) and service oriented
a response to a number of requirements (Smith, architectures in general. A useful definition can
Welty, & McGuinness, 2004) including the need be found in (Daconta, Obrst, & Smith, 2003):
for a language with formal semantics that enables “Web services are software applications that can
automated reasoning, and to address the inherent be discovered, described, and accessed based on
limitations of RDF/S as described above. XML and standard Web protocols over intranets,
extranets, and the Internet.” This definition ex-
OWL poses the main technical aspects of web services,
to do with discovery and description, as well as the
According to the original design goal, OWL role of WWW (e.g. XML) technologies for data
was to be a straightforward extension of RDF/S, exchange and communication. Also the definition
guaranteeing downward compatibility such that is abstract enough to exclude low level protocols
an OWL aware processor could also understand like RPC as web services. These core concepts
RDF/S documents without modification. Unfortu- along with the associated technologies are shown
nately this did not succeed because the generality in Figure 2 below.
of some RDF/S elements (e.g. the semantics of It is important to situate the role of Web ser-
class as “the class of all classes”) does not make vices in the real world. (Daconta, Obrst, & Smith,
RDF/S expressions tractable in the general case. 2003) argue that the most important factor for
In order to maintain computational tractability, determining the future of a new technology is not
OWL processors include restrictions that prevent “... how well it works or how “cool” it is ...” but
737
Achieving System and Business Interoperability by Semantic Web Services
service composition
on business adoption. Along this line they see a
bright future for Web services which is being As for service composition (Berardi et al., 2005)
promoted by Microsoft, IBM, Sun, as well as the distinguishes between synthesis, building the
open source community. But why such widespread specification of the composite service from its sub-
support? One reason is the promise of interoper- services, and orchestration, which is the run-time
able systems. Once businesses adopt standardized management of the composite service (scheduling,
web service descriptions, the possibility of ex- invoking sub-services, etc.). Synthesis can be done
changing data and sharing the cost of services either manually or automatically, the latter requir-
increases. In addition, the open standards prevent ing that services have been specified formally. The
monopolization of applications, preventing the orchestration problem for web services has a lot in
dreaded “vendor lock-in” associated with propri- common with similar issues in workflow manage-
etary solutions. Finally, a widespread adoption of ment, which will be discussed in the next section.
Web service protocols means that existing ap- (Dijkman & Dumas, 2004) identify four different
plications can be leveraged by turning them into viewpoints from which the control-flow aspects
Web services. As an example, it is possible for of web services can be described, distinguishing
.NET clients and servers to talk to J2EE servers between choreography, which is a collaboration
using SOAP. between service providers and user to achieve a
The point of all this is that Web services enable certain goal, and orchestration, which is what a
interoperability at the level of business processes service provider performs internally to realize a
without having to worry about interoperating service it provides. (The other two viewpoints
between different applications, data formats, are behavior interface and provider interface).
communication protocols, and so on. We will There are two ongoing standardization efforts
see later in the article that this influences the way related to service composition (Barros, Dumas &
workflows and knowledge based work processes Oaks, 2005), the Web Service Business Process
are modeled and instantiated in particular work Execution Language (WS-BPEL), formerly
environments. known as BPEL4WS, and the Web Service Cho-
As describe above web services must be dis- reography Description Language (WS-CDL).
covered, described, and appropriately connected WS-BPEL (Arkin et al., 2005) is meant to specify
in an implementation independent way. (Berardi both abstract and executable business processes,
et al., 2005) outline 3 different approaches for and the language contains one section of core
web service discovery, on a trade-off between concepts (needed for both kinds of specifications)
ease of provision and accuracy: 1) natural lan- as well as sections with extensions for executable
processes and abstract processes (a.k.a. business
738
Achieving System and Business Interoperability by Semantic Web Services
protocols), respectively. The main viewpoint taken tool seems to be the only one publicly available
in WS-BPEL is that of orchestration, requiring for download.
centralized control of the business process. WS-
CDL (Cavantzas et al., 2005), takes the alternative WsMO
viewpoint of choreography, meaning that this
language is better suited for describing interplay The Web Service Modeling Ontology (WSMO) is
between several independent parties in a shared a prject undertaken by the WSMO Working group
control domain. under the SDK19 project cluster (EU). WSMO
There are several proposed frameworks to consists of three main components: a modeling
facilitate automatic support for describing, finding framework of core elements for semantic web
and composing web services: METEOR-S13, Web services, a formal description language (Web
Service Modeling Ontology (WSMO)14, Internet Service Modeling Language - WSML) and an
Reasoning Service (IRS)15, and OWL-S16. execution environment (WSMX). The WSMO
core elements are
MEtEOr-s
1. Ontologies – provide the formally specified
The METEOR-S project is run at the LSDIS Lab terminology of the information used by all
at the University of Georgia, as a successor of the other components
METEOR project, whose focus was on workflow 2. Goals – objectives that a client wants to
management in a more traditional transaction- achieve by using Web Services
oriented perspective. METEOR-S take a more 3. Web Services – semantic description of web
semantic and dynamic perspective on workflow services including functional capability and
management. The METEOR-S architecture usage interface
consists of three main components: the process 4. Mediators – connectors between compo-
designer, the configuration module, and the execu- nents with mediation facilities for handling
tion environment. The process designer module heterogeneities
supports the design of abstract work processes
represented inWS-BPEL. The Jena toolkit is Each of these elements is further described
used for building and processing ontologies. The by non-functional properties including the Dub-
process configuration module is responsible for lin Core Metadata Set, versioning information,
dynamically finding and binding services for the quality of service information, and other relevant
defined processes. The METEOR-S Web Service annotations.
Annotation Framework (MWSAF)17 tool is used Together these components are able to define
for semi-automatically annotating web services the terminology of the domain and how it relates
with semantics using the WSDL-S18 language. to applications, and to describe the service in terms
The execution environment consists of a logical of its pre-conditions, post-conditions, effects,
layer over a web process execution engine. The and mediators required during the discovery and
execution engine uses proxies for each virtual execution of the service.
partner of the process. To support run-time and Several tools related to WSMO are publicly
deployment-time binding the configuration mod- available, the most important ones being the Web
ule can change the service bound to the proxies. Service Execution Environment (WSMX), the
At the time of writing (December 2007) the Web Service Modeling Toolkit (WSMT), and the
METEOR-S framework is in version 0.8, with a WSML Validator.
couple of finished tools. Currently, the MWSAF
739
Achieving System and Business Interoperability by Semantic Web Services
• Use of domain ontologies • What does the service provide for prospec-
• Description of client requests as goals tive clients? The answer to this question is
• Semantic description of deployed web given in the Service Profile which is used
services to advertise the service.
• Resolution of conceptual mismatches • How is it used? The answer to this question
• Publication and invocation of the described is given in the “process model.” This per-
web services spective is captured by the ServiceModel
class.
The support for these activities is achieved • How does one interact with it? The answer
by the IRS-III server, having the following com- to this question is given in the “ground-
ponents: ing.” A grounding provides the needed de-
tails about transport protocols.
• The SWS library, where the semantic de-
scriptions of web services are stored. Thus each service presents a Service Profile
• Interpreters for choreography and orches- (what it does), is described by a Service Model
tration, respectively (how it works), and supports a Service Grounding
• The Mediation Handler, supporting bro- (how to access it).
kering in the process of selecting, compos- Available implementations for OWL-S include
ing and invoking web services. OWL files for the Upper Ontology of Services
• The Invoker, which communicates with and other relevant ontologies used by this Upper
the service publishing platform, sends in- Ontology. Moreover, a set of relevant tools have
put from the client to the invoked services, been released, mostly by third parties, for instance:
and returns the results back to the client.
• The OWL-S Protégé-based editor22
The IRS server is written in LISP and is avail- • Another OWL-S Editor23 developed at the
able as an executable file. The publishing platforms University of Malta
for web services are available as Java web appli- • ASSAM Web Service Annotator (Hess et
cations. Also available is the WebOnto20 tool for al., 2004)
visualizing and editing IRS-III ontologies defined • Semantic Web Service Composer24
740
Achieving System and Business Interoperability by Semantic Web Services
• OWL-S matcher25, to assess the degree of another. In the OWL-S vision this is a step which
correspondence between different service can detract from the primary purpose of discovery.
descriptions To be sure the translation problems still need to be
solved, but OWL-S assumes this will be possible
comparison of the Frameworks through some form of composition (Ankolekar
et al., 2004). But this has some implications for
While OWL-S is a less comprehensive approach, the use of each system in a specific context, such
there are certain similarities between this and the as the system described in subsequent sections.
WSMO-based approaches. The comparison of the four discussed frame-
works is summed up in Table 3, concerning the
• OWL-S Service Profile ≈ WSMO capa- available support for various activities related
bility + goal + non-functional properties. to the development and running of applications
WSMO separates provider (capabilities) based on semantic web services.
and requester points of view (goals) while As can be seen from this comparison, OWL-S
OWL-S Profiles combine existing capabil- is the framework which is most different from the
ities (advertisements) and desired capabili- others, in the sense that it specifies less of the
ties (requests) surrounding architecture for service and applica-
• OWL-S process model ≈ WSMO Service tion development. While the other three include
Interfaces. The process model in the some kind of supporting tools for all the 7 tasks
OWL-S ServiceModel roughly corre- indicated in the left column of the table, OWL-S
sponds to the interfaces in the WSMO Web has not provided any specific support for publish-
Services descriptions of WSMO. ing, composition, invocation and deployment.
• OWL-S Grounding ≈ WSMO Grounding.
Both provide a mapping to WSDL.
WOrKFLOW AND ENtErPrIsE
Nevertheless, clear differences exist in the PrOcEss MODELING
overall architecture as well as the reliance of
WSMO on explicitly defined mediators. A key The unprecedented flexibility of web services
objective of the WSMO is to define a taxonomy provides a particular challenge for how to integrate
of mediators to translate between message pro- their use in enterprise work practices. On the one
duced by one Web service and those expected by hand, demand based service provision promises
741
Achieving System and Business Interoperability by Semantic Web Services
742
Achieving System and Business Interoperability by Semantic Web Services
organizational roles and actors, tools and appli- is promising for use in flexible systems. Unfortu-
cations. The core terminology of the WfMC is nately the promise is only partially realized since
found in (Fischer, 2001). Importantly, there is a different primitives are used for the two cases,
distinction between process definition (idealized implying that the automation boundary must
process) and instance (actual work). be defined during process design. Additionally,
From past experience with developing flexible BPML has weak support for local change and
groupware and workflow systems (Carlsen, 1998; unforeseen exceptions. A visual notation, for
Jørgensen, 2001, 2003; Jørgensen & Carlsen, BPML, BPMN has been developed and is getting
1999; Natvig & Ohren, 1999), we have defined increasing support both among researchers and in
an interactive models approach to flexible infor- industrial practice (BPMI.org and OMG, 2006).
mation systems (Jørgensen, 2004). Models are The further standardization of BPMN is taken
normally defined as explicit representations of over by OMG, which have also standardized The
some portions of reality as perceived by some Business Process Definition Metamodel (BPDM)
actor (Wegner & Goldin, 1999). A model is ac- which applies MDA principles to provide a con-
tive if it directly influences the reality it reflects. sistent end-to-end approach for business process
Model activation involves actors interpreting the modeling. The development of
model and adjusting their behavior accordingly. BPMN was based on the revision of other nota-
This process can be tions, including UML, IDEF, ebXML, RosettaNet,
LOVeM and EPCs, and stemmed from the demand
• Automated, where a software component for a graphical language that complements the
interprets the model, BPEL standard for executable business processes.
• Manual, where the model guides the ac- Although this gives BPMN a technical focus, it
tions of human actors, or has been the intention of the BPMN designers
• Interactive, where prescribed aspects of to develop a modeling language that can be ap-
the model are automatically interpreted plied for typical business modeling activities as
and ambiguous parts are left to the users well. The complete BPMN specification defines
to resolve. thirty-eight distinct language constructs plus
attributes, grouped into four basic categories of
We define a model to be interactive if it is in- elements, viz., Flow Objects, Connecting Objects,
teractively activated. By updating such a model, Swimlanes and Artefacts. Flow Objects, such
users can adapt the system to fit their local plans, as events, activities and gateways, are the most
preferences and terminology. basic elements used to create Business Process
The Business Process Modeling Language Diagrams (BPDs). Connecting Objects are used
(BPML) (Arkin, 2002) defines a web service to interconnect Flow Objects through different
interface description language, which presents types of arrows. Swimlanes are used to group
obvious promise concerning the present require- activities into separate categories for different
ments. BPML emphasizes low-level execution functional capabilities or responsibilities (e.g.,
and contains several control flow primitives for different roles or organizational departments).
loops (foreach, while, until), branching (manual Finally, Artefacts may be added to a diagram
choice or rule based switch, join), decomposition where deemed appropriate in order to display
(all, sequential, choice), instantiation (call, spawn), further related information such as processed data
properties (assign), tools (action), exceptions or other comments.
(fault), and transactions (compensate). The ability BPDM on its side acknowledges that busi-
to define manual as well as rule based branching ness process definitions are frequently used for
743
Achieving System and Business Interoperability by Semantic Web Services
744
Achieving System and Business Interoperability by Semantic Web Services
can identify the standard Web Services Interfaces User environments are generated dynamically
(WSI). Above this level, there is a lot of work based on the definition of tasks using EEML (Ex-
being performed on specific business process tended Enterprise Modeling Language, (Krogstie,
execution platform, with a possibility to exchange 2008). Forms and components for interacting with
directly using a BPI (Business Process Interface). different model objects are selected and composed
Finally, projects such as EXTERNAL26, MAP- based on generic user interface policies and on the
PER27 and ATHENA28 have provided solutions personal and role-oriented preferences of the users.
for how to interoperate on the enterprise model The dynamically generated work management
level, potentially supporting interoperability interface includes services for work performance,
across models developed using different modeling but also for process modeling and meta-modeling.
languages and different tools (Krogstie, 2007). The model-generated workplace (MGWP) is the
The EXTERNAL project developed an in- main component in this interface. In addition to
frastructure to support networked organizations, the services for performing and managing the
defined in three basic layers: the information task, it contains links to all knowledge in the
and communication technology (ICT) layer (1); process models that is relevant for the task. Since
the knowledge representation layer (2); the work the MGWP is dynamically generated, subject
performance and management layer (3). The to personal preferences, the skill levels of task
“business end” of the infrastructure is layer 3 with performers can be taken into account. Similarly,
support for modeling and implementing customer customized MGWPs for project management
solutions, and generating work environments as can support the project management team. The
personalized and context-sensitive user interfaces contents may include an overview of the proj-
available through portals. The task performers may ect, adopted management principles, applicable
access desktop tools, organizational information methodologies, project work-break-down struc-
systems, web services, or automated processes ture, results, plans and tasks, technologies and
through this user environment. resources, status reporting and calculations (see
Jørgensen, 2004; Krogstie & Jørgensen, 2004).
745
Achieving System and Business Interoperability by Semantic Web Services
The full power of the MGWP is enabled by service-oriented applications, as well as workflow
the first two layers, which enable interoperabil- models including both automated and interactive
ity between applications, services, and data in tasks. The overview of interoperability between
an organizational context. Layer 2 defines how different platforms, together with the example ex-
models and meta-models are represented, used planations of this, illustrates how the combination
and managed and layer 1 defines the execution of these technologies can provide more advanced
platform, software architectures, tools, software interoperability than with current systems.
components, connectivity and communication. We suggest that “interoperability” in the
The key to the integrated functionality of the in- abstract may be an untenable goal, at least in
frastructure is the consistency and interoperability the immediate future. But interoperability in the
of models and service descriptions at all relevant context of dynamic and interactive workflows,
levels. Standards and ontologies can be used across as the next best thing, is very much within our
all levels, and also between levels to make the reach. Important future work on our approach is
interoperation happen smoothly. In addition, the as indicated above related to integrating the results
interactive nature of the models, meaning that the from the current work on semantic web services,
users are free to refine them during execution, in addition to operationalizing the semantic an-
increases their potential as sources of experience notation approach.
and knowledge. As such they document details on
how the work was actually done, not only how it
was once planned. AcKNOWLEDGMENt
Clearly the complexities of such a rich frame-
work must be managed, and this is precisely the Csaba Veres was funded by the Norwegian Re-
role for the fundamental technologies reviewed search Council through the WISEMOD project
in this paper. From a unified data interchange while much of the work behind this paper was car-
format (XML) to a common data model (RDF), ried out. John Krogstie has in addition been funded
and shared conceptualizations (using OWL), it is by the projects ATHENA (http://www.athena-ip.
possible to define services, and the relationships org) and the Norwegian Research Council-project
between services and the tasks they are supposed MONESA. The ideas of this paper were pursued
to support, in a transparent and reproducible way. in the context of the EU NoE project INTEROP
Moreover, the availability of web services can and its continuation INTEROP-VLab, and we
be driven by requirements as documented in real thank other partners of INTEROP for valuable
world workflow models. Vendors could indepen- inspiration. The paper does not represent the view
dently implement solutions with a guarantee that of the funding organizations or project consortia
they will integrate with some existing application and the authors are solely responsible for the
framework. paper’s content.
This paper has provided a survey of relevant tech- Alonso, G., Casati, F., Kuno, H., & Machiraju,
nologies for achieving semantic interoperability V. (2004). Web Services: Concepts, Architecture
in the context of enterprise information systems, and Applications. Berlin: Springer.
namely ontologies, service descriptions, and tool
support frameworks for developing and executing
746
Achieving System and Business Interoperability by Semantic Web Services
Ambriola, V., Conradi, R., & Fuggetta, A. (1997). Berardi, D., Cabral, L., Cimpian, E., Domingue, J.,
Assessing Process-Centered Software Engineer- Mecella, M., Stollberg, M., & Sycara, K. (2005).
ing Environments. ACM Transactions on Software ESWC Semantic Web Services Tutorial. Retrieved
Engineering and Methodology, 6(3), 283–328. 15 Feb, 2006, from http://stadium.open.ac.uk/dip/
doi:10.1145/258077.258080
Berners-Lee, T., Hendler, J., & Lassila, O. (2001).
Ankolekar, A., Martin, D., McGuinness, D., The Semantic Web. Scientific American, 284(5),
McIlraith, S., Paolucci, M., & Parsia, B. (2004). 34–43.
OWL-S’Relationship to Selected Other Technolo-
Bolcer, G. A., & Kaiser, G. (1999). SWAP: Lever-
gies, Technical report, W3C Member Submission
aging the Web To Manage Workflow. IEEE Internet
22 November 2004. Retrieved 1 Feb, 2006, from
Computing, 3(1), 85–88. doi:10.1109/4236.747328
http://www.w3.org/Submission/OWL-S-related/
Borgida, A., & Brachman, R. (2003). Conceptual
Antoniou, G., & van Harmelen, F. (2004). Web
Modeling with Description Logics. In F. Baader,
Ontology Language: OWL. In S. Staab & R.
D. Calvanese, D. McGuinness, D. Nardi, & P.
Studer (Eds.), Handbook on Ontologies (pp. 67-
Patel-Schneider (Eds.) The Description Logic
92). Berlin: Springer.
Handbook: Theory, Implementation and Applica-
Arkin, A. (2002). Business Process Modelling Lan- tions. Cambridge University Press.
guage. Retrieved 23 Aug, 2003, from http://www.
BPMI.org and OMG. (2006). Business Process
bpmi.org/bpmi-downloads/BPML-SPEC-1.0.zip
Modeling Notation Specification. Final Adopted
Arkin, A., Askary, S., Bloch, B., Curbera, F., Specification. Object Management Group, http://
Goland, Y., Kartha, N., et al. (Eds.). (2005) Web www.bpmn.org (February 20, 2006).
Services Business Process Execution Language
Brickley, D. (2001). RDF: Understanding the
Version 2.0, Technical report, OASIS Open, Inc.,
Striped RDF/XML Syntax. Retrieved 25 Sep,
Committee Draft, 21 Dec, 2005. Retrieved 15 Feb
2002, from http://www.w3.org/2001/10/stripes/.
2006 from http://www.oasis-open.org/commit-
tees/download.php/16024/wsbpel-specification- Broekstra, J., Kampman, A., & van Harmelen, F.
draft-Dec-22-2005.htm (2003). Sesame: An Architecture for Storin gand
Querying RDF Data and Schema Information.
Bandinelli, S., Fuggetta, A., Lavazza, L., Loi, M.,
In D. Fensel, J. A. Hendler, H. Lieberman & W.
& Picco, G. (1995). Modelling and Improving
Wahlster (Eds.), Spinning the Semantic Web:
an Industrial Software Process. IEEE Transac-
Bringing the World Wide Web to Its Full Potential
tions on Software Engineering, 21(5), 440–454.
[outcome of a Dagstuhl seminar] (pp. 197-222).
doi:10.1109/32.387473
Cambridge, MA: MIT Press.
Barros, A., Dumas, M., & Oaks, P. (2005). A Criti-
Bubenko, J., Jr. (2007). From Information Alge-
cal Overview of the Web Services Choreography
bra to Enterprise Modelling and Ontologies – A
Description Language. BPTrends (www.bptrends.
Historical Perspective on Modelling for Infor-
com), March 2005, pp 1-24.
mation Systems. In J. Krogstie, A. L. Opdahl &
Batzarov, Z. (2004). Orbis Latinus: Linguistic S. Brinkkemper (Eds.): Conceptual Modelling
Terms. Retrieved 3 Apr, 2005, from http://www.or- in Information Systems Engineering. Berlin:
bilat.com/General_References/Linguistic_Terms. Springer, pp. 1-18.
html
747
Achieving System and Business Interoperability by Semantic Web Services
Butler, H. (2002). Barriers to real world adoption Daconta, M., Orbst, L., & Smith, K. (2003). The
of Semantic Web technologies. Hewlett-Packard. Semantic Web: A guide to the future of XML,
Web Services and Knowledge Management.
Cabral, L., Domingue, J., Galizia, S., Gugliotta,
London: Wiley.
A., Tanasescu, V., Pedrinaci, C., & Norton, B.
(2006). IRS-III: A broker for semantic web services Derniame, J.-C., Kaba, B. A., & Wastell, D. G.
based applications. In I. Cruz et al. (Eds.). Proc. (Eds.). (1998). Software Process: Principles,
ISWC’06, LNCS 4273,201-214. Methodology, Technology. Berlin: Springer
(LNCS 1500).
Carlsen, S. (1997). Conceptual Modelling and
Composition of Flexible Workflow Models. PhD Dijkman, R., & Dumas, M. (2004). Service-
thesis, Dept of Computer and Inforamtion Science, Oriented Design. A Multi-Viewpoint Approach.
Norwegian University of Science and Technology, International Journal of Cooperative Informa-
Trondheim, Norway. tion Systems, 13(4), 337–368. doi:10.1142/
S0218843004001012
Carlsen, S. (1998). Action Port Model: A Mixed
Paradigm Conceptual Workflow Modeling Lan- Fischer, L. (Ed.). (2001). The Workflow Handbook
guage. Proceedings of the 3rd IFCIS International 2001. Lighthouse Point, FL: Workflow Manage-
Conference on Cooperative Information Systems ment Coalition (WfMC).
(CoopIS’98), pp. 300-308. Los Alamitos, CA:
Fox, M., & Grüninger, M. (1998). Enterprise
IEEE CS Press.
Modeling. AI Magazine, 19(3), 109–121.
Cavantzas, N., Burdett, D., Ritzinger, G., Fletcher,
Green, P., & Rosemann, M. (2000). Integrated
T., Lafon, Y., & Barreto, C. (Eds.). (2005). Web
Process Modelling: An Ontological Evaluation.
Services Choreography Description Language
Information Systems, 25(2), 73–87. doi:10.1016/
Version 1.0. Technical report, W3C Candidate
S0306-4379(00)00010-7
Recommendation, 9 Nov, 2005. Retrieved 10
Feb, 2006, from http://www.w3.org/TR/2005/ Haake, J. M., & Wang, W. (1997). Flexible sup-
CR-ws-cdl-10-20051109/ port for business processes: extending cooperative
hypermedia with process support. In Proceedings
Coalition, O. W. L.-S. (2004). OWL-S 1.1 Release.
of GROUP’97, International Conference on Sup-
Retrieved 9 Aug, 2005, from http://www.daml.
porting Group Work. The Integration Challenge.
org/services/owl-s/
Hayes, P. (2004). RDF Semantics. Technical re-
Conradi, R., & Jaccheri, L. (1998). Process
port, W3C, 10 Feb 2004. Retrieved Mar 3, 2005,
Modelling Languages. In J.-C. Derniame, B. A.
from http://www.w3.org/TR/rdf-mt/
Kaba & D. G. Wastell (Eds.), Software Process:
Principles, Methodology, and Techniques (pp. Hess, A., Johnston, E., & Kushmerick, N. (2004).
27-52). Berlin: Springer LNCS 1500. ASSAM: A Tool for Semi-automatically Annotat-
ing Semantic Web Services. In S.A. McIlraith et
Curtis, B., Kellner, M., & Over, J. (1992). Process
al. (Eds.). Proc. ISWC’04, Springer LNCS 3298,
Modeling. Communications of the ACM, 35(9),
320-334.
75–90. doi:10.1145/130994.130998
748
Achieving System and Business Interoperability by Semantic Web Services
749
Achieving System and Business Interoperability by Semantic Web Services
Manola, F., & Miller, E. (2004, 10 Feb). RDF Smith, M., Welty, C., & McGuinness, D. L. (Eds.).
Primer. Retrieved 15 Aug, 2005, from http://www. (2004, 10 Feb). OWL Web Ontology Language
w3.org/TR/rdf-primer/ Guide. Retrieved 25 Feb, 2005, from http://www.
w3.org/TR/owl-guide/
McGuinness, D. L. (2003). Ontologies Come of
Age. In D. Fensel, J. A. Hendler, H. Lieberman & Staab, S., & Studer, R. (Eds.). (2004). Handbook
W. Wahlster (Eds.), Spinning the Semantic Web: on Ontologies. Berlin, Germany: Springer.
Bringing the World Wide Web to Its Full Potential
van der Aalst, W. M. P. (1999). Formalization
[outcome of a Dagstuhl seminar] (pp. 171-195).
and Verification of Event-driven Process Chains.
Cambridge, MA: MIT Press.
Information and Software Technology, 41(10),
Miles, A. (2006, February). 639–650. doi:10.1016/S0950-5849(99)00016-6
RDFMolecules:Evaluating Semantic Web Tech-
Wegner, P., & Goldin, D. (1999). Interaction
nology in a Scientific Application. Available at
as a Framework for Modeling. In P. P. Chen, J.
http://www.w3c.rl.ac.uk/SWAD/ papers/RDF-
Akoka, H. Kangassalo, & B. Thalheim (Eds.),
Molecules_final.doc (Feb 20, 2006)
Conceptual Modeling. Berlin: Springer (LNCS
Natvig, M. K., & Ohren, O. (1999). Modeling 1565), pp. 100-114
shared information spaces (SIS). In GROUP
WfMC. (1999). Workflow Management Coali-
‘99: Proceedings of the international ACM SIG-
tion Interface 1: Process Definition Interchange
GROUP conference on Supporting group work,
Process Model (Technical report No. WfMC
Phoenix, AZ, Nov 14-17, pp. 99-108. New York:
TC-1016-P). Lighthouse Point, FL: Workflow
ACM Press.
Management Coalition.[gs1]
OMG. (2000). Workflow Management Facil-
WfMC. (2002). Workflow Process Definition In-
ity Specification, v.1.2. Needham, MA: Object
terface - XML Process Definition Language (Tech-
Management Group.
nical report No. WFMC-TC-1025). Lighthouse
Opdahl, A. L., & Sindre, G. (2007). Interoperable Point, FL: Workflow Management Coalition.
Management of Conceptual Models, In J. Krogstie,
WSMO Working Group. (2005). The Web Service
A. L. Opdahl & S. Brinkkemper (Eds.), Conceptual
Modeling Language WSML. Retrieved Aug 20,
Modelling in Information Systems Engineering.
2005, from http://www.wsmo.org/wsml/wsml-
Berlin: Springer, pp. 75-90.
syntax
Powers, S. (2003). Practical RDF. Sebastopol,
CA: O’Reilly.
Scheer, A.-W., & Nuttgens, M. (2000). ARIS ENDNOtEs
Architecture and Reference Models for Business
Process Management. In W. M. P. van der Aalst,
1
http://is.uib.no/wiki/UEML/UEML
J. Desel & A. Oberweis (Eds.), Business Process
2
http://www.w3.org/TR/rdf-syntax-gram-
Management (pp. 376-390). Berlin, Germany: mar/
Springer (LNCS 1806).
3
http://www.w3.org/DesignIssues/Notation3
4
http://www.w3.org/TR/2004/REC-rdf-
testcases-20040210/#ntriples
5
http://www.dajobe.org/2004/01/turtle/
750
Achieving System and Business Interoperability by Semantic Web Services
6
http://www.w3.org/2001/ sw/BestPractices/ 20
http://kmi.open.ac.uk/projects/webonto/
HTML/ 2006-01-24-rdfa-primer 21
http://kmi.open.ac.uk/projects/ocml/
7
http://www.mindswap.org/2005/SMORE/ 22
http://www.daml.org/services/ owl-s/tools.
8
http://microformats.org/ html, http:// owlseditor.semwebcentral.org/
9
http://web.resource.org/rss/1.0/spec 23
http://staff.um.edu.mt/cabe2/ supervising/
10
http://www.rssboard.org/rss-specification undergraduate/ owlseditFYP/OwlSEdit.
11
http://www.radarnetworks.com/ html
12
http://www.w3.org/2001/sw/WebOnt/ 24
http://alphaworks.ibm.com/tech/ettk
13
http://lsdis.cs.uga.edu/projects/meteor-s/ 25
http.//owlsm.projects.semwebcentral.org/
14
http://www.wsmo.org/ 26
http://research.dnv.com/external/default.
15
http://kmi.open.ac.uk/projects/irs/ htm
16
http://www.daml.org/services/owl-s/ 27
http://193.71.42.92/ websolu-
17
http://lsdis.cs.uga.edu/ projects/meteor-s/ tion/UI/ Troux/07 /Default.
downloads/mwsaf/ asp?WebID=260&PageID=1
18
http://www.w3.org/Submission/WSDL-S/ 28
http://www.athenaip.org
19
http://sdk.semanticweb.org/index.html
This work was previously published in Global Implications of Modern Enterprise Information Systems: Technologies and
Applications, edited by Angappa Gunasekaran, pp. 172-194, copyright 2009 by Information Science Reference (an imprint of
IGI Global).
751
752
Chapter 3.13
In-House vs. Off-the-Shelf
e-HRM Applications
Nawaf Al-Ibraheem
KNET, Kuwait
Huub Ruël
University of Twente, The Netherlands & American University of Beirut, Lebanon
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
In-House vs. Off-the-Shelf e-HRM Applications
753
In-House vs. Off-the-Shelf e-HRM Applications
like Oracle/Peoplesoft or SAP) or to develop e- system, while off-the-shelf software would cause
HRM systems in-house. As Kovach et al. (2002) difficulties during the integration phase.
describe, a small company might prefer to depend In this study, the authors will concentrate on the
on consultants and outsource all aspects of design, issue of the differences and similarities between
implementation, and operation, while a large com- off-the-shelf and in-house developed e-HRM
pany could prefer to opt for in-house development implementations. We define implementation
of e-HRM systems by their own IT department. broadly, from the first initiation to the evaluation
Widely believed benefits of off-the-shelf systems of results of e-HRM, and semi-technical (i.e.
in general are time-saving, proven system quality, type of applications/functionality/design) and
and availability of expertise through the provider. organizational issues (i.e. change management,
On the contrary, disadvantages of off-the-shelf HR restructuring, etc).
systems are the lack of customization/flexibility Technology plays the role of enabler that helps
and dependency on vendor-expertise. In order HR to deliver the workforce support and manage-
to avoid these down-sides companies might opt ment based on business needs (Gueutal & Stone
for in-house development of an HRIS system. 2005, p. 2). New web technologies have enabled
Exact figures regarding the differences/similari- HR to perform certain paperless tasks that used
ties between off-the-shelf e-HRM and in-house to consume time and human resources in the old
developed e-HRM, do not really exist. ages of HR. Furthermore, technology-enabled
To take further the point issued by Kovach et HR functions have evolved into human capital
al (2002), in case of e-HRM, the acceptance and management (HCM), as Gueutal and Stone (2005,
usage of applications by employees and managers p. 2) agree with Ruël et al. in stating that HCM
is critical to successful implementation and the and e-HR are the responsibilities of everyone in
generation of results. That makes the decision an organization, from employees to executives.
whether to ‘buy or make’ even more important, Nevertheless, Hendrickson (2003, p. 383) stresses
and seems to favor in-house development over the fact that this change in information technology
off-the-shelf implementation. However funded has created significant challenges for HR profes-
knowledge on this issue is lacking so far. sionals to get updated with the latest information
The annual CedarCrestone survey (2006) technology while simultaneously transforming
shows that many organizations lay out more HR processes to e-processes.
expenses for outsourced solutions (mainly off- From these definitions arises a general un-
the-shelf) than they do for in-house development. derstanding of what e-HRM is. In this research,
Three main reasons are explained: organizations e-HRM is the management of an HR network
with in-house software development mostly have that connects employees, managers, and HR staff
fragmented system operations which cause them through web-technology-enabled channels that
to overlook embedded costs within distributed provide them with an electronic access to human
operations; outsourcing assures better view and resources transactions, strategies, policies, and
control of costs; and outsourcing is a solution for practices.
organizations that struggle to control costs due to
the complexity of their operations (HR Technology benefits, Goals, and
Trends to Watch in 2007 2007, p. 1). On the other Objectives of e-HrM
hand, the CedarCrestone survey (2006) notes that
some respondents sense that in-house HR solutions The fast changing world of business stipulates
positively affect employees’ productivity and can organizational flexibility, capability, and rapid
be easily and swiftly integrated into the current response in order to succeed (Lepak & Snell
754
In-House vs. Off-the-Shelf e-HRM Applications
1998, p. 215). Therefore, e-HRM must attain costs it incurs during and after the implementa-
objectives such as strategy-oriented focus, flex- tion stage such as employee turnover, resistance,
ibility, cost containment, and service-providing and confusion.
excellence (Lepak & Snell 1998, p. 215). Strategic A typical agreement by most authors proves
orientation can be achieved by concentrating on that efficiency is a top goal considered by many
the transformational HR activities mentioned in organizations that use e-HRM. Cost reduction
section 2.2, while flexibility can be reached by is also agreed upon to be the main benefit of
updating HR processes, policies, and practices e-HRM. Other benefits might not be as notice-
to counter the rapidly changing business world. able or tangible as efficiency. Lengnick-Hall and
Efficiency, on the other hand, can be achieved by Moritz (2003) divide the outcome of e-HRM into
many ways such as staff reduction, elimination tangible and intangible benefits. Tangible benefits
of manual processes, and timeliness. However, include process and administrative cost reduction,
cost reduction can only be considered beneficial staff reduction, transaction processing speed-up,
if there is no loss of effectiveness or deterioration elimination of information errors, and improve-
of customer service excellence (Schramm 2006, ment in tracking and controlling HR activities
p. 3). Hendrickson (2003) agrees that efficiency (Lengnick-Hall & Moritz 2003, p. 369). Intangible
is one of the goals of implementing e-HRM that benefits are mostly associated with the indirect
can be rendered by increasing number of HR effect of e-HRM on the HR function. Such ben-
transactions and timeliness without affecting efits are improvement in employee productivity
needed resources. and morale, decision making, and information
Another benefit of using e-HRM is the in- sharing. Innovation enhancement and time-to-
creased effectiveness of human resources manage- market acceleration might also be considered as
ment through the use of technology which sim- intangible benefits of e-HRM (Lengnick-Hall &
plifies HR processes and enhances performance Moritz 2003, p. 369).To summarize this section,
(Hendrickson 2003, p. 385). Beer et al. (1984) the author will consider the following main goals
distinguish four different benefits or outcomes of implementing e-HRM within organizations:
from e-HRM: commitment, competence, con-
gruence, and cost effectiveness. Commitment is • Increase efficiency by reducing cost and
achieved by motivating employees to interact with eliminating unnecessary functions.
managers cohesively during changes to achieve • Provide management and employee self-
organizational goals (Ruël et al. 2004, p. 369). service mechanisms.
High competence is when employees learn new • Improve HR’s strategic focus.
tasks and gain competitive skills to enhance their • Achieve client service excellence.
contribution, effectiveness, and creativity. Con-
gruence is also another benefit of implementing
e-HRM that involves structuring the business from On the other hand, different outcomes can be
the inside out in the best interest of stakeholders gained from implementing e-HRM within an
(Ruël et al. 2004, p. 369). Cost effectiveness aims organization. For this research, the following
at increasing the level of economical value based outcomes will be considered:
on the tangible and intangible benefits produced
by the amount of resources spent (i.e. money, time, • Commitment.
human resources, etc). A cost effective e-HRM • Competence.
system, however, is one that provides adequate • Cost Effectiveness.
e-HRM services for the reasonable HR-related • Congruence.
755
In-House vs. Off-the-Shelf e-HRM Applications
756
In-House vs. Off-the-Shelf e-HRM Applications
(Florkowski & Olivas-Luján 2006, p. 687).The of its HR activities with the help of the application
CedarCrestone annual report (2007), on the other sets mentioned above (CedarCrestone annual re-
hand, divides over 30 e-HRM applications into port 2007). On the contrary, CedarCrestone reports
the following groups: that the least business categories to adopt e-HRM
Administrative applications, including core technologies are Retail and Public Administration.
HR functions such as payroll, benefits, and HR The top players in e-HRM application software
management system. This category handles most market are Oracle/PeopleSoft, ADP, SAP, and
of the operational type of HR activities—men- Kronos, as most of the applications mentioned
tioned under section 2.2—that are administered above are supported by these giants and favored
by the HR staff. The report identifies three major by a plethora of HR departments around the world.
activities that belong to this group as payroll, HR
management system, and benefits administration e-HrM Applications Implementation
(CedarCrestone annual report 2007). and Development Approaches
Employee and manager productivity appli-
cations which provide self service transactions The implementation and development of the
that aim at improving service delivery, reducing e-HRM application doesn’t require a set of criti-
cost, and enabling employees and managers to cal success factors or approaches different than
concentrate more on core processes (CedarCre- those constituted by Enterprise Resource Plan-
stone annual report 2007). These applications ning (ERP) projects or large enterprise portal
also provide access to operational HR activities projects, as e-HRM is considered a part of ERP
performed only by managers and employees implementation itself. These large projects differ
such as benefit-related self service (BSS), simple from traditional information system projects in
management reporting (SMR), pay-related self scale, scope, complexity, organizational changes,
services (PSS), employee self services (ESS), time costs, and need for business process reengineering
management self service (TMSS), total benefits (Remus 2007, p. 538). As a result, technical and
statements (TBS), HR-oriented help desk, and business difficulties during the implementation
manager self service (MSS). and development of these systems (including
Strategic HCM applications, such as talent e-HRM systems) are imminent. Literature has
management, training enrollment, competency it that these difficulties are widely spread, but
management, e-learning, compensation, perfor- only fragmented research was done regarding the
mance, succession planning, and career planning. critical success factors and approaches to ERP
These applications transform relational HR activi- implementation (Nah et al. 2001, p. 286). These
ties into their electronic version. approaches were narrowed down to the ones shown
Business intelligence applications comprise in Table 2, which have been previously identified
HR data warehousing, operational reporting, HR by academic articles as shown in the table.
scorecard, and analytics that help develop the stra-
tegic focus of an organization. These applications User Involvement
are the protagonists of e-HRM. They facilitate the
transformational activities that help develop the User involvement in the early stages of the imple-
strategic orientation of the HR function. mentation and development phases of the e-HRM
Looking at the adoption level of e-HRM ap- system allows users to make adjustments to the
plications, Financial Services seem to top other system to satisfy their needs. Consequently, orga-
businesses in leading the e-commerce market of nizational resistance to the new changes implied
human resources management by automating most by the use of the e-HRM applications is minimized
757
In-House vs. Off-the-Shelf e-HRM Applications
Lee & Lee (2001) Nah et al. (2001) Al-Sehali (2000) Remus (2007)
User involvement
Business process reengi-
neering
Planning & strategy
Training &
education
Change
management
Top management support
Effective
communication
Project
management
Constructs/Variables Description
Overview This strategy is used to start a case study research by collecting general information about the organiza-
tion to be researched and the e-HRM system it uses.
Implementations and Develop- The factors affecting the implementation and development of e-HRM system and how the company
ment Approaches deals with them
E-HRM Goals The main goals of implementing the e-HRM system and how they coincide with corporate strategy
E-HRM Activities The HR-related activities offered by the new e-HRM system and how employees work with them
E-HRM Application Charac- The characteristics of the e-HRM software application as defined by ISO 9126 standards
teristics
E-HRM Outcomes The four C’s of HR: commitment, competence, congruence, and cost effectiveness and how they are
impacted after the implementation of the e-HRM system
HRIS Benefits Usefulness and ease of use of the new e-HRM system
and customer satisfaction is increased (Lee & Lee for the e-HRM system to be more effective. Such
2001, p. 208). Change management processes in reengineering mechanism is applied when trans-
this case are minimized and easily controlled. forming HR manual processes to paperless forms.
Reengineering should begin before choosing the
Business Process Reengineering software system to make sure changes are ac-
cepted by the stakeholders and the processes can
Achieving benefits through the implementation actually be aligned with the new system (Nah et
of an enterprise system is impossible without the al. 2001, p. 294).
inevitable alignment of processes and activities
with the new system requirements (Remus 2007; Planning and Vision
Bingi et al. 1999). This means that when a com-
pany implements a new e-HRM system, some of A solid business plan needs to be defined in
the HR processes must be reengineered in order order for the ERP project to be directed toward
758
In-House vs. Off-the-Shelf e-HRM Applications
the proposed strategic and tangible benefits, re- would positively assist the implementation effort
sources, costs, risks, and timeline (Buckhout et (Nah et al. 2001, p. 293). Training and education
al. 1999). This means for e-HRM implementation is a critical step in managing change itself, as
to be successful, a plan must be agreed upon by employees must be educated about the new system
the project manager or the responsible parties to to understand how it changes business processes
follow during the project life cycle. This plan will (Nah et al. 2001, p. 293).
guarantee the alignment of the e-HRM goals and
strategy with the HR and corporate strategies to Top Management Support
ensure maximum effectiveness, integration, and
alignment. Lee and Lee (2001) insist that good One of the most critical success factors for imple-
planning consumes a considerable amount of menting an ERP system is the support and involve-
time prior to implementation. This ensures that ment of top managers in the project during its life
the e-HRM system is thoroughly exploited and cycle (Al-Sehali 2000, p. 79). In order for e-HRM
efficiently implemented to coincide with the implementation to be successful, top managers have
corporate strategies. to approve and continuously support the responsible
parties during the implementation stage to make
Training and Education sure no obstacles prevent or delay the progress of
the project. Also, an executive sponsor should be
Since the e-HRM system offers new methods appointed to coordinate, communicate, and integrate
of processing transformed or new HR activities, all aspects of the project between the development
proper training must be given to all users of the team and top management (Remus 2007, p. 544). The
system. This becomes crucial since the new in- executive sponsor should communicate, integrate,
terface provides functionality that has never been and approve the shared vision of the organization
used before and needs to be related to the newly and the responsibilities and structures of the new
reengineered business processes (Remus 2007, e-HRM system (Nah et al. 2001, p. 291).
p. 544). Education is the catalyst that brings the
knowledge of the users up to the point where they Effective Communication
can familiarize themselves with the new e-HRM
system quickly and sufficiently. Interdepartmental communication as well as com-
munication with customers and business partners
Change Management is a key element in the success of implementing an
ERP system (Remus 2007, p.544). Communica-
Managing change within the organization could tion helps employees and involved parties better
be a full time job by itself, as it requires the understand the new e-HRM system to keep up
management of people and their expectations, with the development and implementation stages
resistance to change, confusion, redundancies, of the project. Employees should also be informed
and errors (Remus 2007, p. 541). For the e-HRM in advance the scope, objectives, activities, and
to be successfully implemented, the organization updates implemented by the new system in order
should realize the impact of this new change on to meet their expectations (Nah et al. 2001, p. 291)
employees, managers, and HR staff and under-
stand its dimensions in order to manage the effects Project Management
with a corporate strategy that is open to change.
Furthermore, emphasis on quality, computing abil- Managing the implementation and development
ity, and willingness to accept the new technology of e-HRM system is a crucial step toward suc-
759
In-House vs. Off-the-Shelf e-HRM Applications
cessful results. The scope of the project must and human resources. Second, risk is minimized
be clearly defined, including aspects such as the by the fact that COTS systems are professionally
amount of systems implemented, involvement of provided and supported by experienced entities.
business units, and the amount of business process Third, COTS vendors take responsibilities of
reengineering needed (Nah et al. 2001, p. 292). A supporting and maintaining the software, which
company must assign a project manager to lead leads to reducing the cost of supporting the soft-
the project of developing and implementing an e- ware itself. Fourth, COTS systems are virtually
HRM system professionally according to profound up to date as vendors keep investing in develop-
business rules. The project itself must have clearly ing the software itself (Silverman 2006, p 10).
defined business and technical objectives and goals It is also known as a fact that most IT managers
corresponding to the project deliverables (Remus first evaluate COTS software when money and
2007, p. 543). Such E-HRM goals (mentioned in time-to-market are at the top of the priority list
section 2.3) are embedded within the different (Traylor 2006, p 20). This evidence makes it clear
e-HRM activities (mentioned in section 2.2) as that off-the-shelf software saves on time and
part of the project management scheme. money resources. On the contrary, disadvantages
of off-the-shelf systems are illustrated by the lack
recent studies on e-HrM of customization/flexibility and the dependency
Application Implementation on vendor-expertise. Amons and Howard (2004)
insist that buying an already-made software pack-
An essential step in e-HRM implementation and ages will increase time and other resources spent
development is the decision whether to buy an on the integration and deployment phases of the IT
off-the-shelf e-HRM systems (in many cases project. Indeed, COTS systems need to be perfectly
part of an Enterprise Resource Planning (ERP) aligned and integrated within the practices of the
package such as Oracle/Peoplesoft or SAP), or to organization, and deployed in a matter that best fits
develop such systems in-house. As Kovach et al. the company’s vision. One particular disadvantage
(2002) describe, a small company might prefer to of COTS is of an intangible nature; when most
depend on consultants and outsource all aspects companies adjust their practices to conform to
of design, implementation, and operation, while the COTS software standard offerings they lose
a large company could prefer to opt for in-house their competitive advantage, as their technology-
development of e-HRM applications by their based processes become replicas of each other
own IT department. Widely believed benefits of (Carr 2003, p. 6). For e-HRM, this means that
commercial off-the-shelf (COTS) systems in gen- companies cannot strategically position their HR
eral are time-saving, proven system quality, and activities or improve its strategic orientation by
availability of expertise through the provider. Fur- the use of electronic means.
thermore, COTS systems help reduce the amount Although it is believed that off-the-shelf soft-
of time and resources used during the design and ware usually contains industry’s best practices,
implementation phases of the software project, as but Yeow and Sia (2007) posit that the notion that
the software is already professionally designed “best practices” are context-free and can be con-
and implemented to fit most of customer’s needs veniently acquired, stored, used, and transferred
(Amons & Howard 2004, p. 50). Silverman (2006) across organizations is questionable. For example,
offers a few reasons why most organizations opt implementing off-the-shelf ERP systems such
for COTS solutions. First, avoiding lengthy and as Oracle, PeopleSoft, and SAP, in the context
complex software design and development cycles of non-US/European and non-private organiza-
(by using COTS solutions) saves time, money, tions (i.e. governmental institutes in Kuwait) can
760
In-House vs. Off-the-Shelf e-HRM Applications
be quite challenging and might not even fit the To take further the point issued by Kovach et
environment’s needs. Any discrepancies between al (2002), in case of e-HRM the acceptance and
the organization’s needs and the off-the-shelf usage of applications by employees and managers
software’s features will most likely affect the is critical to successful implementation and the
overall project success (Lucas et al., 1988; cited generation of results. That makes the decision
by Yeow and Sia 2007, p. 2) whether to ‘buy or build’ even more important,
In order to avoid these down-sides, companies and seems to favor in-house development over
might opt for in-house development of an HRIS off-the-shelf implementation. However funded
system. Building e-HRM applications in house knowledge on this issue is lacking so far. The
requires a special team of developers that is fully annual CedarCrestone survey (2006) shows that
skilled and dedicated to do the job of designing many organizations lay out more expenses for
and implementing the software. One of the rea- outsourced solutions than they do for in-house
sons companies choose to develop their HRIS development. Three main reasons are explained:
in-house is that they can design the software organizations with in-house software development
precisely to fit the organizational goals, as they mostly have fragmented system operations which
know their own processes better than anyone else cause them to overlook embedded costs within
(Zizakovic 2004, p. 4). This way companies gain distributed operations; outsourcing assures better
the competitive advantage and have full control view and control of costs; and outsourcing is a
of their proprietary software. solution for organizations that struggle to control
Pearce (2005) provides three key elements costs due to the complexity of their operations
for software implementation and development. (HR Technology Trends to Watch in 2007 2007, p.
First, organizations must consider the function 1). On the other hand, the CedarCrestone survey
of the IT application (i.e. e-HRM applica- (2006) notes that some respondents sense that
tion) to determine the level of standardization in-house HR solutions positively affect employ-
required by the operations of the application ees’ productivity and can be easily and swiftly
and whether COTS software can provide these integrated into the current system, while off-the-
standard operations (Pearce 2005, p. 93). For shelf software would cause difficulties during the
example, e-HRM activities such as payroll and integration phase.
benefits can be suitably offered by COTS sys-
tems. Second, organizations must consider the theoretical Framework
life cycle of the application and how it will be
modified, updated, maintained, and supported The suggested framework for this research is
over the years to come (Pearce 2005, p. 94). depicted in Figure 2. This framework combines
This consideration helps organizations to set the main elements discussed in the literature
forth a long-term strategic plan for its e-HRM review. Since studies on the different e-HRM
practices in order to continue sharpening its applications are scarce, this framework is used
competitive edge. The third key element in primarily to study different elements of imple-
deciding on the best software implementation menting software applications and to focus pre-
strategy is to consider the return on investment, dominantly on implementing e-HRM software
or ROI. Pearce (2005) insists that companies applications and the effect they might bring onto
must practice the strategy of weighing the as- the HR function.
sociated costs of implementing and developing This framework suggests three dependant
different software methods against the potential stages of e-HRM systems’ implementation and
outcome of the IT project itself. deployment. First stage is the e-HRM software
761
In-House vs. Off-the-Shelf e-HRM Applications
implementation and development approaches, means of less value than the other stages. It repre-
which is affected by the type of system used by sents the outputs and benefits an HR department
the organization—whether it is a commercial off- aims for during the e-HRM transformation. These
the-shelf e-HRM system or one that is developed outputs consist of the “four C’s of HR”—namely
in house. Another factor affecting this stage is commitment, competence, cost effectiveness, and
the predetermined e-HRM goals as suggested congruence—and user benefits suggested by the
in the literature review. E-HRM goals constitute Technology Acceptance Model—such as useful-
the implementation and development approaches ness and ease of use.
and set a course of action to be followed during
all three stages. The second stage consists of the
main elements of e-HRM application deployment MEtHODOLOGy
such as e-HRM activities handled by the system,
application types, and application characteristics. Deciding which research strategy to adopt depends
These application criteria help an HR department solely on the nature of the research question and how
to provide the necessary e-HR functions to accom- the author plans to answer it. The strategy consists
plish the goals mentioned in the first stage and meet of a plan with clear objectives derived from the
the needs of the stakeholders. Note that each of the research question and specifies the sources from
e-HRM activity types fit under at least one of the which to collect data (Saunders et al. 2003, p. 90).
e-HRM application types. Furthermore, e-HRM Since the aim of this research is to compare the two
application and activity types, and the application types of e-HRM system implementation methods,
characteristics are interdependent (represented the author assumes a comparative, descriptive case
by the up-down arrow). For example, relational study strategy. A Comparative study scrutinizes the
e-HRM activities such as training, recruitment, differences and similarities between the two e-HRM
and performance management depend mainly on implementation methods, whilst a descriptive study
the level of reliability and usability of the e-HRM attempts to construct a precise profile of the different
system, while functionality and efficiency of the e-HRM system implementation methods (Robson
e-HRM system might change with the type of e- 2002; cited in Saunders et al. 2003, p. 97). Further-
HRM activity types. The last stage is not in any more, the descriptive study is a perfect strategy
762
In-House vs. Off-the-Shelf e-HRM Applications
that helps with the proliferation of the inductive by Oracle, called “Oracle ERP”. The rea-
research approach. This strategy helps to reach a son this company was chosen because of
theoretical conclusion about the outcome and level the amount of experience it had with the
of effectiveness induced by both implementation e-HRM system and the strong reputation it
methods. A case study research strategy implies possessed in the Kuwaiti marketplace.
the use of detailed and empirical investigation • Case Study 2: The second case study was
within the real context of a particular phenomenon conducted on a governmental institute that
(Cassell & Symon 2004, p. 323). While the case had gained its competitive advantage main-
study strategy provides a good challenge and a ly through leveraging its IT capabilities to
source of new hypotheses of an existing theory, provide the latest technological trends to
it can also help with the creation of a new theory its customers. The reason this organization
using different means of data collection methods was chosen is that it was one of the few
such as questionnaires, interviews, observation, local companies that had developed their
and documentary analysis (Saunders et al. 2003, p. e-HRM system in house.
93). This, indeed, makes a perfect strategy that fits
the research philosophy and approaches suggested The main constructs used in this research are
in the previous sections, as Cassell and Symon shown in the table below. These variables can then
(2004) agree that the case study strategy begins be used to create a set of questions that help the
with a primitive framework which then will be researcher with gathering appropriate research
reproduced or developed under a new theoretical data for analysis. This process is called the “op-
framework that makes sense of the collected data erationalization of construct” and is explained in
and can be systematically examined for plausibil- the next section.
ity. This strategy also facilitates the collection of
data through multiple research instruments such Operationalization of constructs
as participant observation, direct observation, in-
terviews, focus groups, and documentary analysis Boiling down the constructs into research ques-
(Cassell & Symon 2004, p. 325). Consequently, this tions helps the researcher with the design of
means that a variety of research instruments can the appropriate research instruments to be used
be utilized to understand how the different e-HRM to collect and test enough data about the com-
implementation methods affect the HR function. mercial off-the-shelf and in-house developed
All in all, case study strategy can be considered e-HRM systems. By doing so, the constructs are
a prudent choice for this research as it offers a “operationalized” so that they can be measured
flexible environment for the researcher to work accordingly. Table 3 shows the operationalization
with and attempts to collect as much information of constructs mentioned in the previous section.
as necessary to conclude how the two E-HRM
systems can be compared and contrasted.For the research Instruments
purpose of this research, two descriptive case
studies were conducted on local organizations Case study is a strategy that includes multiple
that have been chosen according to the e-HRM methods (or instruments) suited to research
system they used: questions that require detailed understanding of
a particular phenomenon due to the large amount
• Case Study 1: This case study was con- of data collected in the context (Cassell & Symon
ducted on a well known company that uses 2004, p. 323). For this research, the following data
a commercial off-the-shelf e-HRM system collection instruments were used:
763
In-House vs. Off-the-Shelf e-HRM Applications
764
In-House vs. Off-the-Shelf e-HRM Applications
Table 3. continued
Constructs/ Definition/Dimension Operationalization of Constructs
Variables
e-HRM Activities
Operational Activities Routine HR tasks such as payroll, atten- - Transformed operational activities
dance, vacation, etc - New operational activities introduced by e-HRM
- Effect of e-HR operational activities on HR function
Relational Activities Internal and external relational activities - Transformed relational activities
such as recruitment and selection, training, - New relational activities introduced by e-HRM
performance management, etc. - Effect of e-HR relational activities on HR function
Transformational HR activities aimed at improving the - Transformed transformational activities
Activities strategic orientation of the HR department - New transformational activities introduced by e-HRM
such as knowledge management, compe- - Effect of e-HR transformational activities on HR function
tence management, strategic redirection,
downsizing, upsizing, rightsizing, etc
e-HRM Application Characteristics
Functionality How the e-HRM system functions with - Fulfilment of stated needs
regards to suitability, accuracy, interoper- - Appropriate set of HR functions
ability, and security - Expected results
- Information and data security
Reliability How reliable the e-HRM system in deliver- - System maturity
ing HR needs - Fault tolerance
- Recoverability
Usability How easy is it to understand, learn, and - Understandability
operate the e-HRM system - Learnability
- Operability
- Attractiveness
Efficiency Performance of the e-HRM system with re- - Time utilization
gards to time and other resources utilization - Resources utilization
Maintainability The stability of the e-HRM system when - Analyzability
analyzed, changed, and tested - Changeability
- Stability
- Testability
Portability How the e-HRM system can adapt new - Adaptability
requirements, be installed in different - Installability
environment, coexist with other software - Co-existence
programs, and can be replaced - Replaceability
e-HRM Outcomes
Commitment Employees commitment to organization - Change in level of employee commitment to organization
due to the implementation of the new e-
HRM system
Competence Development of employees competencies - Influence of e-HRM on employee competencies
due to the implementation of e-HRM
Cost Benefits of implementing e-HRM such as - Cost of delivering e-HRM practices and services such as staff
Effectiveness providing adequate e-HRM services should turnover and resistance
outweigh costs such as employee resistance - Benefits versus costs
and turnover
Congruence The effect of e-HRM on the level of con- - Relationship between managers and employees
gruence between employees’ own goals and - Relationship between employees
those of the organization
HRIS Benefits
Usefulness How useful the e-HRM system is in en- - Enhancement of employee performance
hancing employee performance
Ease of Use Easiness of performing e-HRM activities - Effort needed to perform e-HRM tasks
765
In-House vs. Off-the-Shelf e-HRM Applications
766
In-House vs. Off-the-Shelf e-HRM Applications
organizations were preferred by the author as they structuring and business process reengineering
are more likely to adopt e-HRM technologies at took place. The aim of this BPR was to transform
early stages of their life cycle. all business processes into the IT era, including
the transformation of the HR practices into e-HR
Data Analysis Methods technologies. The main steps of reengineering
were diagnostics, analysis, and implementation.
Intensive interviews were first conducted at both HR reengineering (i.e. transformation to e-HR
sites and recorded on a digital recorder, and then using Oracle ERP) was 30% of the whole BPR
transcribed into separate sets of data for each process of the organization. It took about 3 years
case. The data was then categorized into mul- to progress through the diagnostics, analysis, and
tiple sections according to the operationalization implementation stages, and about one year to
Table 3. complete the transformation of the HR function.
In order to implement such a big change within a
large organization, the bureaucratic and centralized
FINDINGs culture needed to be changed as well. This culture
was changed to reflect the open environment that
The data analysis starts with transcribing the re- accepted change and forward movement.
corded interviews to capture as much necessary As for why this organization opted for Oracle
data as possible. The transcripts are then studied ERP, it was recommended by the Chairman to
and paragraphs rephrased and rearranged under choose this system as the best offer because of
the corresponding instruments depicted in the its flexibility, changeability, adaptability, and
framework. reputation between other vendors such as SAP
The following sections contain those analyzed and Anderson. The second reason was that the
transcripts from both case studies, where case 1 IT department at this company didn’t have the
represents the company that uses off-the-shelf qualified resources to implement such a fully in-
Oracle ERP, and case 2 represents the governmen- tegrated enterprise system that could support the
tal institute that has developed its own e-HRM new structure and culture. As a matter of fact, the
system in house. Data collected from each case is IT department was mostly outsourced to a third
displayed side by side according to the theoretical party that was able to arrange and manage the
instruments to show a clear comparison between e-commerce transformation. Oracle ERP needed
the two different systems. lots of customizations to remove unwanted pro-
cesses such as taxation and add or modify the HR
e-HrM Overview processes to fit the company’s HR needs.
About 80% of manual work was eliminated
The aim of this section is to explain some of the by the new system. The BPR, along with the ERP
general issues associated with the implementation implementation, has caused the reduction of man-
of the e-HRM systems of both cases. The overview power from 900 to approximately 200, as most
allows the researcher to get a feel of the researched processes were eliminated, reduced, or outsourced.
systems before getting into the detailed interviews The other 20% of manual and paperwork cannot
that would confirm or refute the propositions sug- be changed due to the nature of the work that
gested in the theoretical framework. requires to be done in professional and manual
Case 1: The implementation of Oracle ERP way such as memorandums and official letter.
system started in 2004. Before that, in 2001, an Case 2: The e-HRM system was developed
initiative from the Board to perform a total re- by the Systems Development team in this or-
767
In-House vs. Off-the-Shelf e-HRM Applications
768
In-House vs. Off-the-Shelf e-HRM Applications
tion and deployment stages are overwhelmingly Factors that affect off-the-shelf e-HRM imple-
critical due to the fact that off-the-shelf systems mentation the most are business process reengi-
need to be customized to properly bolt onto the neering, planning, and project management. The
company’s environment. It took case 1 a whole reason being is that HR process reengineering and
year to completely integrate and deploy Oracle project management are two essential elements
ERP. On the other hand, as Amons and Howard handled professionally by the vendor within a
(2004) suggest, design and development stages well organized plan to implement off-the-shelf
are lengthy using in-house developed software, e-HRM software. In other words, vendors do not
especially with the second case in this research just deliver the software, but they rather manage
where the development team’s experience was the whole project through planning, reengineering,
limited. training, and implementation. From a realist point
Looking at the development and implementa- of view, one can also conclude that implement-
tion approaches, a general theme can be depicted. ing off-the-shelf e-HRM system is a professional
When implementing either e-HRM system (i.e. experience that must be handled by those who
COTS or in-house developed), the organizations are most skilled and knowledgeable about the
look for satisfying the HR’s department needs product itself, where this knowledge needs to be
as the main user, and the needs of all other us- transferred to the acquiring party in an organized
ers such as employees and managers. However, and well planned manner.
some approaches might be emphasized more A new predominant factor has been extracted
than others according to the type of e-HRM during this research, which affected the implemen-
system. For example, when implementing in- tation of e-HRM systems at both cases. Teamwork
house developed e-HRM systems, the users are plays an essential role in implementing e-HRM
continuously involved, trained, and educated systems as it triggers a synergistic effect between
throughout the product life cycle to ensure that the teams involved in the transformation project.
the software works for the best interest of its Cross-functional teams work cohesively in both cases
users, and to build a high level of trust in the to achieve planned targets and meet project gates.
IT department. This new experience for the IT Flexibility, timeliness, and elimination of
department meant a new challenge and a new manual processes are advocates of efficiency when
chance to prove its competence. Also, change implementing both e-HRM systems. Increasing
management and communication management efficiency, therefore, is the most critical goal of
had to be perfected to provide the proper support transforming the HR function to e-HR. Efficiency
for the development team and to make sure no can also be measured by the amount of HR staff
conflict or confusion would cause the deteriora- reduced after the implementation. In both cases,
tion of trust between key players. As for project less staff members could handle more tasks us-
management, the second case believes that or- ing the e-HRM systems. Providing employee and
ganizations who develop their e-HRM software manager self services also came on the top of
in house must appoint a project manager from most effective e-HRM goals list. ESS and MSS
within the development team for two reasons. are implemented within both e-HRM systems to
First, it is best to manage this first experience in provide easy access for employees to perform
house to avoid conflict of interest and to impose multiple e-HRM services swiftly and without
more control on decision making. Second, no interaction with the HR office. Third, achieving
one knows how to orchestrate the development service excellence is considered crucial for orga-
team and leverage their capabilities better than nizations that develop e-HRM software in house.
a person who works closely with them. It is concluded through this research that when
769
In-House vs. Off-the-Shelf e-HRM Applications
an e-HRM system is developed in house, users’ Comparing the e-HRM outcomes of the two
expectations of results are at peak, due to the fact cases, an apparent theme emerges. Because of the
that this software is developed under the same amount of trust, confidence, and support shown to
organizational culture, by staff that commemorate the in-house development team during the design,
this same culture. Last and perhaps least consid- development, and implementation stages, employ-
ered by both cases is the goal of improving the ees’commitment may substantially increase. As the
strategic focus. It is evident that due to the lack of HR senior staff at case 2 phrases it: “supporting
market competition in Kuwait, companies spend the hometown team eventually pays off.” Another
less effort to improve their strategic orientation. reason for such a phenomenon is due to the amount
Operational, relational, and transformational of customer satisfaction implemented into the
e-HRM activities are common between the two system, as most of the users’ needs are catered for
systems. However, these types of e-HRM activi- to create a system that best fits those needs. Cost
ties become the most competitive advantage of effectiveness, on the other hand, is most favored by
in-house developed e-HRM systems. It is con- those organizations that use off-the-shelf system.
cluded through this research that when developing Traylor (2006) agrees that although the amount of
an e-HRM system that best fits the users’ needs, money spent on acquiring, integrating, and support-
many of those needs become reality in an attempt ing the enterprise off-the-shelf system is incredibly
to achieve maximum customer satisfaction and high, more cost effectiveness is achieved for both
meet those high expectations. The outcome of implementation and ongoing maintenance. Case 1
this phenomenon is a system that harbors the best felt that using the renowned Oracle ERP system and
practices of off-the-shelf e-HRM systems with the support package offered by the vendor avoided
a competitive twist tailored to the last details of software obsolescence in the long run, as profes-
users’ needs. sional software providers keep on implementing
As for the e-HRM application characteristics, the latest technologies into their provided services.
supporters of off-the-shelf systems (i.e. case 1) Another outcome observed by the first case was
believe that corporations such as Oracle and SAP changing the attitude of employees, which remains
implement the markets best practices into their questionable. The change in attitude might have
software solutions to gain a competitive advan- been partially affected by the open environment
tage and increase market share. This leads to the created during the e-HRM transformation, but it
creation of state-of-art enterprise solutions such is believed that the organizational-level business
as Oracle ERP. Also, case 1 agrees with Silverman process reengineering had the bigger effect on
(2006) that risk of implementing off-the-shelf e- people’s attitude.
HRM systems is minimized by the fact that those Finally, usefulness and ease of use become
systems are professionally provided and supported natural effects of implementing both e-HRM sys-
by experienced entities. On the other hand, soft- tems. However, both benefits are most noticed by
ware quality characteristics as depicted by ISO the users of in-house developed e-HRM systems
9126 might not have been seriously considered because those systems are made to specifically
by the amateur development team of the second fit the user’s needs.
case. This might have been caused by the fact that The Table 5 provides a summary of those
software development is not in conjunction with findings and a clear comparison between the two
this organization’s profession. However, features systems with regards to the variables in the sug-
like accuracy, suitability, security, reliability, gested framework.
usability, and maintainability become adhesive
during the design and development phases.
770
In-House vs. Off-the-Shelf e-HRM Applications
771
In-House vs. Off-the-Shelf e-HRM Applications
Table 5. conitnued
Further research can be done to determine the best The comparison between off-the-shelf and in-
practices for implementing e-HRM systems in the house developed e-HRM applications has been
Kuwaiti context. Yeow and Sia (2007) found out, exploited in this research to find out the dif-
from a social constructivist point of view, that “best ferences and similarities between development
practices” are socially enacted knowledge that and implementation approaches, e-HRM goals,
requires organizational power through politics, e-HRM activities, application types and charac-
and discourse to influence different technological teristics, and the outcome of implementing both
assumptions, expectations, and knowledge until systems. Realism philosophy was used to extract
this difference is resolved into what is logically facts about the suggested theoretical framework
called “best practices”. This means that politics introduced in chapter three. Further, two cases
and discourse in the context of Kuwaiti organiza- were used as the best candidates for this research
tions can be studied to determine what the best because of the different corporate cultures and
practices are for implementing e-HRM systems. markets they operated in, which lead to more
Another augmented approach to future research interesting remarks.
could be done after the fact that e-HR transforma- Looking back at the theoretical framework
tion in Kuwait has reached its maturity and the developed in chapter three, one can suggest a
market is saturated with diverse organizations few minor adjustments. One of the elements that
that use different e-HRM systems. Infusing e- became irrelevant to this comparative study was
HRM technologies in Kuwait’s organizations is the e-HRM application types. E-HRM systems
inevitable, however it could be long before any are divided into four main types as described in
such technologies are enforced by cultural values the literature, namely administrative, employee/
and/or organizational needs due to the fact that manager productivity, strategic HCM, and busi-
legislations for electronic technologies have yet ness intelligence applications. Each of these sets
to be considered by Kuwaiti laws. handles a number of e-HRM activities (i.e. opera-
tional, relational, and transformational activities).
However, these application types do not provide
relevant information and, therefore, cannot be
772
In-House vs. Off-the-Shelf e-HRM Applications
used as a credible variable of the theoretical as- the most due to the fact that these systems are
sumptions that are made about the differences and handled professionally by the vendors.
similarities between off-the-shelf and in-house Increasing HR efficiency is a critical objective
developed e-HRM systems. Another adjustment behind implementing both e-HRM systems. This
would be to add “teamwork” as one of the major goal can be mainly achieved through increasing
factors affecting the implementation and develop- the flexibility and timeliness of HR processes and
ment of the e-HRM systems, as it was observed eliminating a big portion of the manual processes.
greatly by both cases. Reducing HR manpower is a consequent effect of
Generally, the decision of choosing between the e-HR transformation that can also be counted
off-the-shelf and in-house developed e-HRM is as an efficiency measure.
dependent on factors such as the IT department The fact that an e-HRM system is developed
capabilities, amount of time and resources spent and supported internally by the IT department
on development and implementation phases, and increases the level of pride and support by users
the purpose of e-HR transformation. We saw that toward the system and the team who develops it.
when companies plan a total business process re- This high level of support instantiates high con-
engineering, for example, the best practice would gruence between employees and line managers,
be to seek the assistance of professional services and improves the alignment between departmental
that can provide enterprise-level qualities. and organizational goals. Furthermore, employees’
One of the most interesting findings in this re- commitment increases as the level of confidence
search is that when e-HRM systems are developed and support of the “home-made” e-HRM system
in house, users’ expectations are high. Also, trust increases. On the contrary, companies who imple-
and confidence levels in the development team ment off-the-shelf e-HRM systems increase cost
must be increased in order for the development effectiveness during the life cycle of the product
to meet those high expectations. On the other due to the fact that those systems are “built to last”.
hand, organizations who implement a certain off-
the-shelf e-HRM system automatically develop a
high level of trust in the professional expertise of rEFErENcEs
the provider. This is due to the fact that software
providers implement industry’s best practices Al-Sehali. Saud, H. (2000). The Factors that Af-
and software quality (i.e. ISO 9126) into their fect the Implementation of Enterprise Resource
solutions to gain a competitive advantage and Planning (ERP) in the International Arab Gulf
increase market share. States and United States Companies with Special
Teamwork and cross-functional team coop- Emphasis on SAP Software. D.I.T. dissertation,
eration are on the top list of factors affecting University of Northern Iowa, Iowa.
the development and implementation of both Amons, P., & Howard, D. (2004). Buy it, Build it,
systems, as they create a synergistic environment or Have it Built? Catalog Age, 21(3), 50.
that leads to more efficiency and effectiveness.
User involvement, effective communication, and Ball, K. S. (2001). the use of human resource infor-
change management are the most critical success mation systems: a survey. Personnel Review, 30(6),
factors for implementing in-house developed 677–693. doi:10.1108/EUM0000000005979
E-HRM software. On the other hand, planning Beer, M., Spector, B., Lawrance, P., Mills, Q.,
and vision, project management, and business & Walton, R. (1984). Managing Human Assets.
process reengineering are factors that affect the New York: The Free Press.
implementation of off-the-shelf e-HRM systems
773
In-House vs. Off-the-Shelf e-HRM Applications
Bingi, P., Sharma, M. K., & Godla, J. (1999). Hendrickson, A. R. (2003). Human resource
Critical issues affecting an erp implementation. information systems: backbone technology of
Information Systems Management, 16(3), 7–14. contemporary human resources. Journal of Labor
doi:10.1201/1078/43197.16.3.19990601/31310.2 Research, 24(3), 381–394. doi:10.1007/s12122-
003-1002-5
Buckhout, S., Frey, E., & Nemec, J. Jr. (1999).
Making ERP succeed: turning fear into prom- HR Technology Trends to Watch in 2007 (2007).
ise. IEEE Engineering Management . RE:view, HR Focus, 84(1), 1.
116–123.
International Organization for Standardization.
Carr, N. G. (2003). IT doesn’t matter. Harvard (ISO) (2001). ISO/IEC: 9126 Software Engineer-
Business Review, 81(5), 41–49. ing – Product Quality – Part 1: Quality Model –
2001. Retrieved November 21, 2007 from http://
Cassell, C., & Symon, G. (2004). Essential
www.iso.org.
Guide to Qualitative Methods in Organizational
Research. London: SAGE Publications. Kovach, K. A., Hughe, A. A., Fagan, P., & Magitti,
P. G. (2002). Administrative and strategic advan-
CedarCrestone 2006 HCM Survey: Workforce
tages of HRIS. Employment Relations Today,
Technologies and Service Delivery Approaches
29(2), 43–48. doi:10.1002/ert.10039
– 9th Annual Edition.
Lee, C., & Lee, H. 2001. Factors Affecting En-
CedarCrestone 2007-2008 HR Systems Survey:
terprise Resource Planning Systems Implementa-
HR Technologies, Service Delivery Approaches,
tion in a Higher Education Institution. Issues in
and Metrics – 10th Annual Edition.
Information Systems, 2(1), 207-212. Retrieved
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. November 24, 2007 from http://www.iacis.org.
(1989). User acceptance of computer technology:
Lengnick-Hall, M. L., & Mortiz, S. (2003). The
a comparison of two theoretical models . Man-
impact of e-HR on the human resource manage-
agement Science, 35(8), 982–1004. doi:10.1287/
ment function. Journal of Labor Research, 24(3),
mnsc.35.8.982
365–379. doi:10.1007/s12122-003-1001-6
Exclusive IOMA Survey: What do Users Like (and
Lepak, D. P., & Snell, S. A. (1998). Virtual HR:
Dislike) About Their HRIS? (2002, December).
strategic human resource management in the
IOMA’s Payroll Manager’s Report, 02(12), 1.
21st century. Human Resource Management
Florkowski, G. W., & Olivas-Luján, M. R. Review, 8(3), 215–234. doi:10.1016/S1053-
(2006). The diffusion of human resource infor- 4822(98)90003-1
mation technology innovations in US and non-
Madill, A., Jordan, & A., Shirley, C. (2000). Objec-
US firms. Personnel Review, 35(6), 684–710.
tivity and reliability in qualitative analysis: realist,
doi:10.1108/00483480610702737
contextualist and radical constructionist episte-
Gueutal, H. G., & Stone, D. L. (2005). The mologies. The British Journal of Psychology,
Brave New World of eHR: Human Resources 91(1), 1–20. doi:10.1348/000712600161646
Management in the Digital Age. San Francisco:
Nah, F. F., Lau, J. L., & Kuang, J. (2001). Critical
Jossey-Bass.
factors for successful implementation of enterprise
systems. Business Process Management Journal,
7(3), 285–296. doi:10.1108/14637150110392782
774
In-House vs. Off-the-Shelf e-HRM Applications
Ngai, E. W. T., & Wat, F. K. T. (2006). Human re- Wright, P. M., & Dyer, L. (2000). People in the
source information systems: a review and empiri- E-business: New Challenges, New Solutions.
cal analysis. Personnel Review, 35(3), 297–314. Working paper 00-11. Center for Advanced Human
doi:10.1108/00483480610656702 Resource Studies, Cornell University.
Pearce, J. (2005). In-house or out-source? three Yeow, A., & Sia, S.K. (2007). Negotiating “Best
key elements for it development. Franchising Practices” in Package Software Implementation.
World, 37(4), 93–95. Information and Organization. Retrieved from
doi:10.1016/ j.infoandorg.2007.07.001.
Remus, U. (2007). Critical success factors
for implementing enterprise portals: a com- Yumiko, I. (2005). Selecting a software package:
parison with erp implementations. Business from procurement system to e-marketplace. The
Process Management Journal, 13(4), 538–552. Business Review, Cambridge, 3(2), 341–347.
doi:10.1108/14637150710763568
Zizakovic, L. (2004). Buy or Build: Corporate
Ruël, H., Bandarouk, T., & Looise, J. K. (2004). Software Dilemma. Retrieved November 11, 2007,
E-HRM: innovation or irritation. an explorative from http://www.insidus.com.
empirical study in five large companies on
Web-based HRM. Management Review, 15(3),
364–380.
KEy tErMs AND DEFINItIONs
Ruta, C. D. (2005). The application of change
management theory to the HR portal implementa- BPR: Business Process Reengineering
tion in subsidiaries of multinational corporations. BSS: Benefit-related Self Service
Human Resource Management, 44(1), 35–53. COTS: Commercial Off-The-Shelf
doi:10.1002/hrm.20039 E-HRM: Electronic Human Resources Man-
agement
Saunders, M., Lewis, P., & Thornhill, A. (2003). ERP: Enterprise Resource Planning
Research Methods for Business Students, 3rd edi- ESS: Employee Self Services
tion. Essex: Pearson Education Ltd. HCM: Human Capital Management
Schramm, J. (2006). HR technology Competen- HRIS: Human Resources Information Systems
cies: New Roles for HR Professionals. HRMaga- HRM: Human Resources Management
zine, 51(4), special section, 1-10. ISO: International Organization for Stan-
dardization
Silverman, R. (2006). Buying better to buy better. IVR: Integrated Voice Response
Contract Management, 46(11), 8–12. MSS: Manager Self Services
Thaler-Carter, R. E. (1998). Do-it-yourself soft- PSS: Pay-related Self Service
ware. HRMagazine, (May): 22. ROI: Return on Investment
SMR: Simple Management Reporting
Traylor, P. (2006). To buy or to build? That is the TBS: Total Benefits Statement
question. InfoWorld, 28(7), 18–23. TMSS: Time Management Self Service
Valverde, M., Ryan, G., & Soler, C. (2006). Dis-
tributing HRM responsibilities: a classification of
organisations. Personnel Review, 35(6), 618–636.
doi:10.1108/00483480610702692
This work was previously published in Handbook of Research on E-Transformation and Human Resources Management Tech-
nologies: Organizational Outcomes and Challenges, edited by Tanya Bondarouk, Huub Ruel, Karine Guiderdoni-Jourdain and
Ewan Oiry, pp. 92-115, copyright 2009 by Information Science Reference (an imprint of IGI Global).
775
776
Chapter 3.14
Enterprise Resource Planning
Under Open Source Software
Ashley Davis
University of Georgia, USA
AbstrAct INtrODUctION
Open source software is becoming more prevalent Open source software (OSS) is becoming a promi-
in businesses today, and while still a relatively im- nent part of the business infrastructure landscape.
mature offering, open source enterprise resource However, open source application software is still
planning (OS-ERP) systems are becoming more in its infancy. Success of open source enterprise
common. However, whether or not an OS-ERP pack- resource planning (OS-ERP) systems will signify
age is the right software for a given organization is a coming of age of open source applications. There
a little researched question. Building on the current are many factors that will determine if OS-ERP
real options thinking about platform acquisitions, systems are a valuable option for corporations,
this chapter proposes the five most critical factors to and thus whether OS-ERP systems will become as
consider when evaluating an OS-ERP package. To prominent as other open source offerings like Linux
adequately do this, a great deal of detail about the or JBOSS. This chapter will inform the reader of
current offerings in OS-ERP software is presented, the current state of OS-ERP in the global context,
followed by a review of the real options theory and and explain to potential adopters of OS-ERP the
thinking behind using these factors to evaluate OS- important factors to consider in evaluating an OS-
ERP options. The international implications of OS- ERP option.
ERP are presented in the “Future Trends” section. First, a common language for defining OS- ERP
systems will be developed. Second, the current
state of OS-ERP software will be explored. Third,
DOI: 10.4018/978-1-59904-531-3.ch004
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Resource Planning Under Open Source Software
the business models of OS-ERP vendors will be initiatives of the past, it does not adequately
exposed. Fourth, the advantages and disadvantages cover all that “open source” includes today. This
of customization of OS-ERP software will be is in contrast to proprietary software where the
explained. Fifth, the factors for valuing OS-ERP license generally does not allow for distribution
options using real options theory (Fichman, 2004) of the source code and is not free of cost. Evolu-
are defined. Finally, the global adoption of ERP tion and commercialization of OSS have led to
software is explored. many products being labeled “open source” that
are not free of cost. As well, proprietary software
(software controlled and offered by vendors for
bAcKGrOUND a price) that give access to the code are termed
open source, while there is no licensing to support
The first necessary requisite for understanding OS- the open source model of software development.
ERP systems is to define a common language for Proprietary software that allows access to the
talking about OS-ERP applications. This includes source code still leaves the control of the source
defining exactly what an OS-ERP application en- code, what is included in the source code in future
tails and whether the software meets the definition versions, in the hands of the vendor, who may be
of open source software. There is much ambigu- less accepting of contributions of code than an
ity in the popular press about what is and is not open source community.
OSS; this is only confounded when ERP systems However, even under the most stringent of
claim to be open source. To clarify these issues, open source (OS) definitions, there have been
the next section will explain historical context of many great open source successes. For example,
OSS. Secondly, open source licensing issues are MySQL is an open source database server that
explained. Then, the issue of open source ERP has grown phenomenally since its inception in
functionality is addressed. Lastly some examples 1995. MySQL AB is the company that supports
of OS-ERP software are provided. the MySQL product. This product is free and the
source code is available to everyone under the
History of Open source software GNU General Public License (GPL). Licensing
will be discussed in more detail in the next section.
Open source software has a rich history, from an MySQL is currently backed by several venture
initial chaotic beginning out of a hacker culture capitalists and is without debt (MySQL, 2007).
(Raymond, 1999) to its current manifestation as There were over 12 million downloads of MySQL
a foundation for profit-seeking corporations such in 2006, and 2,500 new customers started using
as JBOSS (Watson, Wynn, & Boudreau, 2005), MySQL to power Web sites, critical applications,
Compiere Inc., and Red-Hat Linux. As open packaged software, and telecommunications in-
source has evolved, the definition of open source frastructure. MySQL is just one example of the
software has changed and the open source ecosys- success of OS software in the infrastructure space.
tem has grown. Previously, open source software Other examples in infrastructure offerings include
was defined in terms of two characteristics: (1) JBOSS and Linux.
licenses that give programmers the ability to view, In terms of business applications, there are
change, enhance open source code, and distribute fewer major success stories. SugarCRM, however,
the source code without discrimination (Feller & is one of the most successful open source business
Fitzgerald, 2000; Open Source Initiative, 2005); applications. SugarCRM is a customer relationship
and (2) the software is free of cost. While this management software package (packaged soft-
definition was sufficient, for pure open source ware is that which offers a “set of functionality” in a
777
Enterprise Resource Planning Under Open Source Software
complete state that does not require programming) 1. Apache License Version 2.0: “Subject to
that is available under a “custom” open source the terms and conditions of this License,
license.1 SugarCRM has over a million downloads each Contributor hereby grants to You a
and about 1,000 customers (SugarCRM, 2007). perpetual, worldwide, non-exclusive, no-
ERP systems—large packaged integrated business charge, royalty-free, irrevocable copyright
applications that include intensive functionality license to reproduce, prepare Derivative
in the following areas: marketing and sales, ac- Works of, publicly display, publicly perform,
counting and finance, production and materials sublicense, and distribute the Work and such
management, and human resources2—are relatively Derivative Works in Source or Object form.”
less prolific than these major success stories in the As with all licenses, it is recommended that
open source space. However, as the rest of this a full review of the license is conducted be-
chapter outlines, there are several open source fore working with any open source software
ERP offerings becoming available. It waits to (Apache, 2007).
be determined which of these applications will 2. Mozilla Public License 1.1: This license
become widely used in businesses. allows for access to the source code for
review and modification. This is a copy-
Open source Licenses left license, meaning that all modifications
involving the original source code are sent
Licensing plays a big role in definitions of OSS. back to the originator of the software. As
As of 2006, the Open Source Initiative (OSI) with all licenses, it is recommended that a
recognizes nearly 60 different open source li- full review of the license is conducted be-
censes (Open Source Initiative, 2006). Given fore working with any open source software
this number of licenses, and that OSI is not the (Mozilla, 2007).
only organization that provides accreditation of 3. GNU GPL:“GNU is a recursive acronym
licenses,3 it is understandable that the definition for ‘GNU’s Not Unix’; it is pronounced
of open source is not stable. Many companies guh-noo, approximately like canoe…the
have turned to a dual-licensing strategy, making GNU General Public License is intended to
their code available under general public license guarantee your freedom to share and change
(GPL) but also offering a commercial license free software—to make sure the software is
(Rist, 2005). Given this large number of licensing free for all its users.” Users of software under
options and business models, it is understandable the GNU GPL can use, modify, improve,
that there is confusion as to what software really and redistribute such software. As with all
is open source software. licenses, it is recommended that a full review
Open source software still must allow access of the license is conducted before working
to the source code, as mentioned above. So, OS- with any open source software (GNU, 2007a,
ERP systems are defined to allow access to the 2007b).
code. However, under what terms this is available,
including for what cost, is a question. For the However, some software companies create
purposes of understanding OS-ERP software, one their own licenses with their own implications
must assume that the cost is not necessarily free. for what “open source” means to their software.
For the OS-ERP packages in this chapter, three In the OS-ERP space, examples include:
general license types are utilized:
1. OpenMfg:“…the license OpenMFG uses
allows companies to view and modify source
778
Enterprise Resource Planning Under Open Source Software
code, as well as make contributions to the recommended that a full review of the license
source code” (Caton, 2006). However, this is conducted before working with any open
license does not allow for distribution of the software.
source code. So, by definition, this is not
what is generally meant by “open source” Table 1 outlines current OS-ERP offerings,
software. As with all licenses, it is recom- licensing, and Web sites where more can be learned
mended that a full review of the license is about the software.
conducted before working with any software. The popular press has referred to all of the
2. avERP: This license includes no license software listed in Table 1 as OS-ERP, even those
fees, no charge for updates, no fees charged with cost. ERP systems are the backbone of an
for own programming, no obligation to pay organization, and the cost of the initial license is
or purchase anything at anytime, no obliga- only part of the total cost of ownership (TCO) of
tion for use of services, and it is possible an ERP system or any software package. Organi-
to alter all program modules if wished and zations cannot rely on vendors and analysts to
includes source code (HK-Software, 2007). provide accurate TCO estimates. One practitioner
It does not appear that redistribution of the notes, “…no matter how honest they try to be,
software is allowed. As with all licenses, it neither vendor nor analyst can ever fill in all the
is recommended that a full review of the variables of the TCO formula…The unique com-
license is conducted before working with bination of resources, both machine and human,
any software. at work within your organization is something
3. OpenPro: This is software built on open only you can fully understand” (McAllister, 2005).
source technologies that allows access to One estimate of the costs that make up TCO in-
the source code. However, there is a license cludes hardware and software, technical services,
fee involved, and the right to distribute the planning and process management, finance and
software is not explained on the Web site administration, training, user support, peer sup-
(OpenPro, 2007). As with all licenses, it is port, and application development (DiMaio, 2004).
779
Enterprise Resource Planning Under Open Source Software
However, migration costs, testing, system integra- the functionality of each ERP application is also
tion, and so forth must be included in determining important. The maturity of the proprietary ERP
the total cost of switching to any software pack- market has allowed convergence as to what con-
age. For a breakdown of some of the costs to stitutes ERP functionality. For most, an acceptable
consider, please see the cost comparison pro- general definition of ERP systems is as follows:
vided by Nolan (2005). The comparison of costs ERP systems are complex, modular software in-
between proprietary ERP and OS-ERP systems tegrated across the company with capabilities for
is not readily known, as “the lack of large-scale most functions in the organization. As mentioned
implementations (of OS-ERP) eliminate a direct in the “History of Open Source” section, ERP
comparison with enterprise solutions, such as systems include functionality in the following
mySAP Business Suite or Oracle E-Business suite” areas: marketing and sales, accounting and finance,
(Prentice, 2006). However, even getting an ac- production and materials management, and human
curate TCO is not adequate when deciding resources. Many times supply chain management
whether to use open source software (DiMaio, and customer relationship management are also
2004, 2007). For OS-ERP software, the decision included in ERP packages. It is beyond the scope
is more complex because this decision crosses of this chapter to list and define whether each open
the bounds of the entire organization. Decision source system that claims to be ERP actually con-
makers involved in evaluating ERP systems are tains ERP functionality. For practitioners looking
aware that even for proprietary systems, the cost to acquire OS-ERP software and academicians
estimates vary wildly (Cliff, 2003), and thus when looking to do OS-ERP research, a thorough as-
considering OS-ERP solutions, TCO (as complex sessment of whether a particular system contains
as it is) will be but one evaluative criterion. ERP full ERP functionality is required. This is more of
evaluative criteria are often handled by complex an issue in OS-ERP systems since most of these
request for proposal processes involving outside systems are fairly new and a consensus has not
experts. Beyond this expertise, this chapter pro- been achieved as to what is actually an OS-ERP
poses factors for valuing OS-ERP options (see system. In the OS-ERP market, many of the claims
the “Real Options Value of OS-ERP” section) that of what functionality constitutes an OS-ERP
should be considered in addition to these complex system is blurry:
TCO estimates.
As well, the business model (see the “Open One characteristic of open source is that differ-
Source Vendor Models” section) behind open ent projects define their category’s feature sets
source offerings will explain why cost is not as in different ways. This is especially true of ERP
much of an issue in the definition of OS-ERP packages. Linux-Kontor, for example, defines
systems. However, a pure definition of OS-ERP ERP without accounting, focusing instead on
would not include AvERP, OpenPro, or OpenMFG customer management, order entry, invoicing,
because, although all allow access to modify and and inventory. TUTOS, on the other hand, calls
change the code, these packages either charge a itself ERP but more closely resembles a groupware
license fee or do not allow for re-distribution of suite. Clearly, some research is needed to make
the software (as mentioned above). sure you’re really getting what you expect in this
category. (Rist, 2005)
Functionality of Os-ErP
Another concern with open source software
For those interested in understanding the OS-ERP is that the offerings are changing rapidly, so for
phenomena, a solid foundation of understanding up-to-date and complete information, the Web
780
Enterprise Resource Planning Under Open Source Software
sites listed in Table 1 are the best sources for Os-ErP Examples
information about the offerings and the platforms
on which the software is built/supports. However, There are many different flavors of OS-ERP pack-
just to provide a flavor of the offerings, Table 2 ages, mostly because each package grew from a
provides a cursory look at the functionality being particular need (as OSS offerings often do). For
offered by these software products (OS-ERP) at example, Fisterra grew from a custom applica-
the time of this work. Again, since functionality is tion built for an automotive glass replacement
hard to pin down, (for example, if a package only and repair company (Fisterra, 2007). Versions
lists “HR” as its offering, does this mean benefits of the Fisterra product specifically intended for
administration is included?), those interested in this industry are now called Fisterra Garage.
this software should contact the company directly This new name allows distinction from Fisterra
for the most accurate and up-to-date information. 2—a generic ERP released in 2004. In this case,
proprietary ERP definitions apply, in that the
package has what most would define as full ERP
functionality. However this is not always the case
(as noted above).
781
Enterprise Resource Planning Under Open Source Software
The industry origins of the ERP package are Augustin is founder of VA Linux (VA Software)
important, as many times these are industry solu- and launched SourceForge.net, the largest open
tions that work best for the original industry. This source development site on the Internet (Compiere,
is akin to SAP providing excellent manufacturing 2006b). These new additions to the board indicate
functionality because of its origins in the manu- an interest in growth by Compiere.
facturing industry. Another example of OS-ERP However, Compiere faces many challenges,
starting in a specific industry is OfBiz, which for example a group of developers decided to
started with an emphasis on the retail industry “fork”4 and created Adempiere ERP, CRM, &
(Adamson, 2004). SCM Bazaar (commonly referred to as Adem-
piere). Forking (Raymond, 1999) is not unusual
in the open source community. OFBiz also has a
AssEss tHE Os-ErP LANDscAPE forked version called Sequoia. Sequoia in Febru-
ary 2006 was renamed Opentaps, meaning Open
In the OSS arena, infrastructure products like Source Enterprise Application Suite. The issue of
Linux, Perl scripting language, and My SQL forking is not new in open source software and
database management systems have been very thus is an issue in open source ERP applications
successful and thus very prominent. Given that as well. As mentioned earlier, forking usually
the developers of open source software were occurs when a group of developers decides that
many times the users of open source software, the current direction of the project is not as they
this success is predictable. Less predictable is would like; take for example what happened with
the success of open source software when used to Compiere’s fork Adempiere. Adempiere was
develop applications. Most of the time, develop- started in September 2006 after “a long running
ers are developing the application for users that disagreement between Compiere and the commu-
are very different from themselves. The users of nity that formed around the project” (Adempiere,
applications are not technical, and their require- 2006). The developers behind Adempiere felt that
ments are very different from those of technical Compiere was focusing on “commercial/lock-in”
users—thus the criticism that open source software aspects of the project, and decided to create a new
is not “user friendly” or has a usability problem version that could focus more on the community
(Nichols & Twidale, 2003). This issue is impor- and the “sharing/enriching” aspects of the project.
tant to OS-ERP, as possibly the entire organiza- Jorg Janke refutes these allegations, nonetheless
tion will interface with the OS-ERP application, forking has occurred.
rather than only IT people directly working with
infrastructure products. Geographic Origins, Age, and
OS-ERP is a quickly changing environment. Networks of Os-ErP Projects
For example, Compiere, one of the most well-
known open source ERP companies, announced At this time, there is very little research (academic
Andre Boisvert as chairman of the board and chief or practitioner) into the global status of open source
business development officer in May 2006. Jorg ERP. It is clear that there are many vendors out
Janke (founder of Compiere) noted that Boisvert’s there offering open source packages in multiple
success in “applying the open source business languages—indicating an international audience.
model to markets traditionally monopolized by Also, the packages analyzed for this research have
proprietary software vendors is definitely a plus” geographically dispersed locations, if any location
(Compiere, 2006a). Then, in July 2006, Compiere is listed at all. Many times in an open source ERP
added Larry Augustin to its board of directors. Mr. project, the Web serves as the primary location for
782
Enterprise Resource Planning Under Open Source Software
783
Enterprise Resource Planning Under Open Source Software
multinational implementation success with OS- ERP, CRM, & SCM Bazaar at #11; and Compiere
ERP systems is raised. At this time, the limited at #14. There is clearly activity happening at the
and varying functionality (see Table 2), and lack site that hosts these projects (http://sourceforge.
of large-scale implementations precludes direct net/top/mostactive.php?type=week). This is a
comparison with solutions like mySAP Business sign of strength for these OS-ERP projects. Also,
suite or Oracle E-Business suite (Prentice, 2006). in trying to assess the value of OS-ERP options,
VC funding and project activity would certainly
Venture capital Funding and Project positively impact the prospect for network domi-
Activity in Oss and Os-ErP nance of the OS-ERP. More will be discussed on
this topic in the “Real Options Value of OS-ERP”
The open source market is heavily funded by section of this chapter.
venture capital firms, Guth and Clark (2005)
in the Wall Street Journal estimated that $290
million was invested in open source in 2004. OPEN sOUrcE VENDOr
However, open source ERP companies are lag- bUsINEss MODELs
ging in maturity and thus their numbers for VC
funding are much lower. Currently, two open Open source vendors have many different business
source ERP companies are funded by venture models. When working with a piece of open source
capitalists: OpenBravo (Serrano & Sarriegi, 2006) software, it is important to understand which type
and Compiere (Hoover, 2006). Both companies of organization/business model is in use by any
are funded with $6 million. particular vendor. Table 4 defines the business
Given the importance of the community to models that have been used to describe what is
open source project value, SourceForge.com tracks happening with open source firms in general. The
the most active projects daily. As of November most simple understanding of these models can be
5, 2006, three OS-ERP projects fall in the top 15 drawn from Bonaccorsi, Giannangeli, and Rossi
most active: Openbravo ERP at #7; Adempiere (2006) with Pure OS and Hybrid business models.
The Pure OS model includes firms that only offer
OS products or OS solutions. The Hybrid busi-
Table 5. OS-ERP
ness model includes all the others that play and
Software Size of Organization Targeted profit in the OS space. Hybrid business models
Compiere Small, Medium mix products, types of licenses, and sources of
OpenMFG Small, Medium Manufacturers revenues. As academicians and practitioners, it
OfBiz * is important to understand what type of vendor
Tiny ERP *
is included in any OS project undertaken. As
OpenPro Small, Medium, Large (1-1,000+ users)
can be seen from the plethora of business model
WebERP *
types, the objectives and goals of each type of
business will differ and may impact the quality
ERP5 Small, Medium, Large
of service or the types of products that the vendor
Adempiere Small, Medium
offers. Organizations should consider the business
avERP Small, Medium (1-300 employees)
model of any OS vendor with whom they engage
Fisterra Small, Medium
in business, as the model and the viability of the
OpenBravo Small, Medium
vendor will impact the value of the OS-ERP op-
GNUe Small, Medium, Large
tion. Proprietary vendors do not have this range
Value ERP Small, Medium, Large
of business models, so this is not an issue with
784
Enterprise Resource Planning Under Open Source Software
proprietary ERP systems. OS-ERP option value more in the “Real Options Value of OS-ERP”
and its relation to business model will be discussed section of this chapter.
785
Enterprise Resource Planning Under Open Source Software
786
Enterprise Resource Planning Under Open Source Software
ERP systems—and more specifically, OS-ERP Benaroch & Kauffman, 1999; Clemons & Gu,
systems—tend to allow for future options. 2003; Santos, 1991; Taudes, 1998, 2000). Table
Option valuation will be performed multiple 7 provides important background information
times throughout the life of a project. This is not about these studies.
a one-time pre-implementation exercise. This is For valuing the option of OS-ERP, I propose
important: as implementation techniques have thinking more in line with the thinking behind
changed, so have the options that are afforded McGrath (1997), McGrath and MacMillian
by technology positioning investments. For ex- (2000), Chen and Chen (2005), and Fichman
ample, a company may look at the option value of (2004). These studies apply real options thinking
implementing specific modules of an ERP system. to a qualitative options valuation method. For
Future options may be to continue to implement example, McGrath (1997) provides factors that
other modules of this system, to implement an influence the option value of a technology posi-
integrated best-of-breed addition, to use these tioning option. This framework was expanded
modules as a stand-alone part of their system, with explicit items to characterize each factor in
to integrate this module back to existing legacy later work (McGrath & MacMillan, 2000). This
systems, and so forth. This approach would be theory of real options for technology positioning
in congruence with current project management focuses on the factors that are necessary for spe-
practices, where the project is analyzed at different cific domains: new product development and
steps to ensure the project is proceeding satisfac- R&D type research. Although there are many
torily. Likewise, the option value of investment similarities in R&D investments and IT platform
should be analyzed periodically to determine how investments, there are also many differences
to proceed with the option5—the emphasis being (Fichman, 2004).
here that option value does change with time and These differences are explained by drawing
thus should be examined over time. from four complementary perspectives: technol-
Most of the studies of real options in a tech- ogy strategy, organizational learning, innova-
nology context have used a rigorous finance- tion bandwagons, and technology adaptation to
influenced quantitative methods for evaluating develop 12 factors identified as antecedents of
the value of real options (Benaroch, 2000, 2002; option value in IT platform investments (Fich-
787
Enterprise Resource Planning Under Open Source Software
788
Enterprise Resource Planning Under Open Source Software
789
Enterprise Resource Planning Under Open Source Software
also considering its use. Future research should at- be tested through rigorous research. This could
tempt to explore the value gained and experiences be done by looking at how much customization
of organizations actually using OS-ERP systems. is actually done to OS-ERP packages, and how
upgrades and maintenance are handled on these
customized systems. ERP customization litera-
FUtUrE rEsEArcH DIrEctIONs ture would benefit from such research. This is a
partial list of possible future research directions.
OS-ERP is a very little researched area. Future All of the topics covered in this chapter: factors
research should be performed that rigorously in- for evaluating options, global OS-ERP systems,
terviews OS-ERP participants about motivation, and OS-ERP organizations require much more
as this will add to the current literature about OSS research for academia to build a complete and
motivation (several motivation articles are listed coherent picture of OS-ERP and its impacts.
in the Additional Reading section). Many open
source software initiatives fill a gap in functional-
ity and thus are interesting to programmers. ERP rEFErENcEs
systems are mature enough to lack such gaps, and
thus figuring out what interests programmers that Adamson, C. (2004). Java.net: The source for
take part in OS-ERP projects could shed more light Java technology collaboration. Retrieved No-
on the issue of motivation. Also, OS-ERP in the vember 4, 2006, from http://today.java.net/pub/a/
global context is an area ripe for research. Case today/2004/06/01/ofbiz.html
study research of a large multinational implemen- Adempiere. (2006). Adempiere: It’s just a com-
tation of OS-ERP would inform academia as to munity—Nothing personal. Retrieved from http://
how large organizations work with open source adempiere.red1.org/
communities and whether the functionality of-
fered by OS-ERP systems is adequate in such a Apache. (2007). Apache license, version 2.0. Re-
setting. Survey research with global companies trieved March 8, 2007, from http://www.apache.
might shed light on the differences in compa- org/licenses/LICENSE-2.0.html
nies that adopt OS-ERP solutions and those that Benaroch, M. (2000). Justifying electronic bank-
choose proprietary solutions. Global public sector ing network expansion using real options analysis.
research is also needed, as the motivations and MIS Quarterly, 24(2), 197. doi:10.2307/3250936
evaluation criteria for public sector organizations
is noted in the popular press to be different from Benaroch, M. (2002). Managing information
private companies. technology investment risk: A real options per-
To build on the ideas in this chapter, the five spective. Journal of Management Information
factors should be included in a survey of those Systems, 19(2), 43–84.
that have adopted and not adopted open source
Benaroch, M., & Kauffman, R. (1999). A case
research to determine how these factors impacted
for using real options pricing analysis to evalu-
the decision, and whether there were future impli-
ate information technology project investments.
cations of any of these factors on the success of the
Information Systems Research, 10(1), 70–86.
OS-ERP implementation. Each factor should be
doi:10.1287/isre.10.1.70
further researched in terms of options evaluation in
the OS-ERP domain. For example, the author has
posited that OS-ERP is closer to custom software
than to packaged software. This assertion should
790
Enterprise Resource Planning Under Open Source Software
Bonaccorsi, A., Giannangeli, S., & Rossi, C. Fichman, R. G. (2004). Real options and IT
(2006). Entry strategies under competing stan- platform adoption: Implications for theory and
dards: Hybrid business models in the open source practice. Information Systems Research, 15(2),
software industry. Management Science, 52(7), 132–154. doi:10.1287/isre.1040.0021
1085–1097. doi:10.1287/mnsc.1060.0547
Fichman, R. G., Keil, M., & Tiwana, A. (2005).
Caton, M. (2006). OpenMFG: ERP basics and Beyond valuation: “Options thinking” in IT project
more. eWeek, 23, 44-45. management. California Management Review,
47(2), 74–96.
Clemons, E. K., & Gu, B. (2003). Justifying
contingent information technology investments: Fisterra (2007). Fisterra.org: A short history.
Balancing the need for speed of action with Retrieved March 8, 2007, from http://community.
certainty before action. Journal of Management igalia.com/twiki/bin/view/Fisterra/ProjectHistory
Information Systems, 20(2), 11–48.
Fitzgerald, B. (2006). The transformation of open
Cliff, S. (2003, 3/6/2003). Survey finds big varia- source software. MIS Quarterly, 30(3), 587–598.
tion in ERP costs. Computer Weekly, 8.
Gattiker, T., & Goodhue, D. (2004). Understand-
Compiere. (2006a). Andre Boisvert joins Compiere ing the local-level costs and benefits of ERP
team. Retrieved from http://www.compiere.org/ through organizational information processing
news/0522-andreboisvert.html theory. Information & Management, 41, 431–443.
doi:10.1016/S0378-7206(03)00082-X
Compiere. (2006b). Compiere appoints open
source thought leader to its board of directors: GNU. (2007a). GNU general public license, ver-
Larry Augustin will help drive continued growth sion 2, June 1991. Retrieved March 8, 2007, from
of leading open source ERP and CRM provider. http://www.gnu.org/licenses/gpl.txt
Retrieved November 3, 2006, from http://www.
GNU. (2007b). GNU’s not Unix! Free software,
compiere.org/news/0724-augustin.html
free society. Retrieved March 8, 2007, from http://
DiMaio, A. (2004). Look beyond TCO to judge www.gnu.org/
open source software in government. Gartner
Gross, P. H. B., & Ginzberg, M. J. (1984). Barriers
(G00123983).
to the adoption of application software packages.
DiMaio, A. (2007). When to use custom, propri- SOS, 4(4), 211–226.
etary, open-source or community source software.
Guth, R., & Clark, D. (2005). Linux feels growing
Gartner (G00146202).
pains as users demand more features. Wall Street
Feller, J., & Fitzgerald, B. (2000). A framework Journal, (August 8), B1.
analysis of the open source software development
HK-Software. (2007). HK-Software features and
paradigm. In Proceedings of the 21st International
modules, reasons for using AvERP. Retrieved
Conference in Information Systems (ICIS 2000).
March 8, 2007, from http://www.hk-software.
Ferguson, R.B. (2006). Open-source ERP grows net/h-k.de/content/doc_138099-3-5-1.php
up. eWeek, 23(27), 26-27.
Hoover, L. (2006). Compiere is on the move—
again. NewsForge The Online Newspaper for
Linux and Open Source.
791
Enterprise Resource Planning Under Open Source Software
Krishnamurthy, S. (2005). An analysis of open Nolan, S. (2005). Knowing when to embrace open
source business models. In J. Feller, B. Fitzgerald, source. Baseline, (48), 76.
S. Hissam, & K.R. Lakhani (Eds.), Making sense
Open Source Initiative. (2005). Open source defi-
of the bazaar: Perspectives on open source and
nition. Retrieved from http://www.opensource.
free software. Boston: MIT Press.
org/
Lancashire, D. (2001). Code, culture and cash:
Open Source Initiative. (2006). OSI Web site.
The fading altruism of open source development.
Retrieved October 24, 2006, from http://www.
First Monday, 6(12).
opensource.org/licenses/
Levin, R., Mateyaschuk, J., & Stein, T. (1998).
OpenPro. (2007). OpenPro: The open source ERP
Faster ERP rollouts. Information Week.
software solutions that give you more value and
Liu, L., & Steenstrup, K. (2004). ERP selection more features. Retrieved March 8, 2007, from
criteria for Chinese enterprises. Gartner (COM- http://www.openpro.com
22-0114).
Prentice, B. (2006). The advent of open-source
McAllister, N. (2005). You can’t kill TCO. Info- business applications: Demand-side dynamics.
World, (August): 29. Gartner (G001412).
McGrath, R. G. (1997). A real options logic for Raymond, E. S. (1999). The cathedral and the
initiating technology positioning investments. bazaar: Musings on Linux and open source by
Academy of Management Review, 22(4), 974–996. an accidental revolutionary. Sebastopol, CA:
doi:10.2307/259251 O’Reilly and Associates.
McGrath, R. G., & MacMillan, I. C. (2000). As- Rist, O. (2005). Open source ERP. InfoWorld,
sessing technology projects using real options 27(32), 43–47.
reasoning. Research-Technology Management,
Santos, B. L. D. (1991). Justifying investments in
43(4), 35–49.
new information technologies. Journal of Manage-
Mozilla. (2007). Mozilla public license, version ment Information Systems, 7(4), 71.
1.1. Retrieved March 8, 2007, from http://www.
Serrano, N., & Sarriegi, J. (2006). Open source
mozilla.org/MPL/MPL-1.1.html
software ERPs: A new alternative for an old
MySQL. (2007). The world’s most popular open need. IEEE Software, 23(3), 94–97. doi:10.1109/
source database: About MySQL AB. Retrieved MS.2006.78
March 8, 2007, from http://www.mysql.com/
Soh, C., Kien, S. S., & Tay-Yap, J. (2000). Cul-
company/
tural fits and misfits: Is ERP a universal solution?
Nah, F. F. H., & Zuckweiler, K. M. (2003). ERP Communications of the ACM, 43(4), 47–51.
implementations: Chief information officer’s per- doi:10.1145/332051.332070
ceptions of critical success factors. International
Soh, C., & Sia, S. K. (2004). An institutional per-
Journal of Human-Computer Interaction, 16(1),
spective on sources of ERP package-organization
5–22. doi:10.1207/S15327590IJHC1601_2
misalignments. The Journal of Strategic Infor-
Nichols, D., & Twidale, M. (2003). The usability mation Systems, 13(4), 375–397. doi:10.1016/j.
of open source software. First Monday, 8(1). jsis.2004.11.001
792
Enterprise Resource Planning Under Open Source Software
Soh, C., & Sia, S. K. (2005). The challenges of Crowston, K., & Howison, J. (2005). The social
implementing “vanilla” versions of enterprise structure of free and open source software devel-
systems. MIS Quarterly Executive, 4(3), 373–384. opment. Retrieved from http://www.firstmonday.
org/issues/issue10_2/crowston/index.html
Spinellis, D. (2006). 10 tips for spotting low-
quality open source code. Enterprise Open Source Fitzgerald, B., & Kenny, T. (2004). Developing
Journal, (September/October). an information systems infrastructure with open
source software. IEEE Software, 21(1), 50–55.
Sugar, C. R. M. (2007). SugarCRM: Commercial
doi:10.1109/MS.2004.1259216
open source. Retrieved March 8, 2007, from http://
www.sugarcrm.com/ Gallivan, M. J. (2001). Striking a balance between
trust and control in a virtual organization: A con-
Taudes, A. (1998). Software growth options.
tent analysis of open source software case studies.
Journal of Management Information Systems,
Information Systems Journal, 11(4), 277–304.
15(1), 165–185.
doi:10.1046/j.1365-2575.2001.00108.x
Taudes, A. (2000). Options analysis of software
Gattiker, T. F., & Goodhue, D. L. (2005). What hap-
platform decisions: A case study. MIS Quarterly,
pens after ERP implementation: Understanding
24, 227. doi:10.2307/3250937
the impact of inter-dependence and differentiation
Watson, R., Wynn, D., & Boudreau, M. C. (2005). on plant-level outcomes. MIS Quarterly, 29(3).
JBOSS: The evolution of professional open source
Hars, A., & Ou, S. S. (2002). Working for free?
software. MIS Quarterly Executive, 4(3), 329–341.
Motivations for participating in open-source
Watson, R. T., Boudreau, M.-C., York, P., Greiner, projects. International Journal of Electronic
M., & Wynn, D. (2006). (forthcoming). The busi- Commerce, 6(3), 25–39.
ness of open source. Communications of the ACM.
Hertel, G., Niedner, S., & Herrmann, S. (2003).
Motivation of software developers in open source
projects: An Internet-based survey of contribu-
ADDItIONAL rEADING tors to the Linux kernel. Research Policy, 32(7),
1159–1177. doi:10.1016/S0048-7333(03)00047-7
Al Marzoug, M., Zheng, L., Rong, G., & Grover,
V. (2005). Open source: Concepts, benefits, and Krishnamurthy, S. (2002). Cave or community?
challenges. Communications of the AIS, (16), An empirical examination of 100 mature open
505-521. source projects. First Monday, 7(6).
Benkler, Y. (2002). Coase’s penguin, or, Linux Lacy, S. (2005). Open source: Now it’s an eco-
and the nature of the firm. The Yale Law Journal, system. Business Week, (October): 7.
112(3), 369–446. doi:10.2307/1562247 Lerner, J., & Tirole, J. (2002). Some simple eco-
Brown, C. V., & Vessey, I. (2003). Managing the nomics of open source. The Journal of Industrial
next wave of enterprises systems: Leveraging Economics, 50(2), 197.
lessons from ERP. MIS Quarterly Executive, Liang, H., & Xue, Y. (2004). Coping with ERP-
2(1), 65–77. related contextual issues in SMEs: A vendor’s
perspective. The Journal of Strategic Informa-
tion Systems, (13): 399–415. doi:10.1016/j.
jsis.2004.11.006
793
Enterprise Resource Planning Under Open Source Software
Mabert, V. A., & Watts, C. A. (2005). Enterprise Zhao, L., & Elbaum, S. (2003). Quality assurance
applications: Building best-of-breed systems. under the open source development model. Journal
In E. Bendoly & F.R. Jacobs (Eds.), Strategic of Systems and Software, 66, 65–75.
ERP extension and use. Stanford, CA: Stanford
University Press.
Madanmohan, T. R., & Krishnamurthy, S. (2005). ENDNOtEs
Can the cathedral co-exist with the bazaar? An
analysis of open source software in commercial
1
http://www.sugarcrm.com/crm/SPL-The
firms. First Monday, (Special Issue #2). Retrieved SugarCRM Public License Version (SPL)
from http://firstmonday.org/issues/special10_10/ consists of the Mozilla Public License
madanmohan/index.html Version 1.1, modified to be specific to
SugarCRM. Please see the actual license to
Nelson, M., Sen, R., & Chandrasekar, S. (2006). understand the terms of this license.
Understanding open source software: A research 2
Intensive and complete functionality for
classification framework. Communications of the ERP vendors includes the aforementioned
AIS, 17(12), 266–287. functional areas, though the specifics of
Niederman, F., Davis, A., Greiner, M. E., Wynn, what is included in each functional area may
D., & York, P. (2006). A research agenda for be termed differently by different vendors
studying open source II: View through the lens (i.e., Oracle and SAP); however, both offer
of referent discipline theories. Communications much of the same functionality and this
of the AIS, 18. base functionality is what is intended by the
author when discussing ERP systems. For
Niederman, F., Davis, A., Wynn, D., & York, P. details about this functionality, see SAP.com
(2006). A research agenda for studying open source or Oracle.com.
I: A multi-level framework. Communications of 3
See the Free Software Foundation Web site
the AIS, 18. at http://www.fsf.org/licensing/licenses/ for
Stewart, K., & Gosain, S. (2006). The impact of another source for OSS licensing resources.
ideology on effectiveness in open source soft-
4
“Forking” is not unusual in open source com-
ware development teams. MIS Quarterly, 30(2), munities. Forking refers to taking the code
291–314. in a separate direction, usually a direction
not intended by those managing the open
Watson, R. T., Boudreau, M.-C., Greiner, M., source project. There are dissenting opinions
Wynn, D., York, P., & Gul, R. (2005). Governance as to whether this is cause for alarm for the
and global communities. Journal of International original open source project.
Management, 11(2), 125–142. doi:10.1016/j.int- 5
For a review of potential option outcomes,
man.2005.03.006 see Fichman et al. (2005).
6
Open source is defined as firms that supply
OS-based offerings, even if the offering
includes proprietary solutions.
This work was previously published in Enterprise Resource Planning for Global Economies: Managerial Issues and Chal-
lenges, edited by Carlos Ferran and Ricardo Salim, pp. 56-76, copyright 2008 by Information Science Reference (an imprint
of IGI Global).
794
795
Chapter 3.15
Real Time Decision Making
and Mobile Technologies
Keith Sherringham
IMS Corp, Australia
Bhuvan Unhelkar
MethodScience.com & University of Western Sydney, Australia
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Real Time Decision Making and Mobile Technologies
un-assured service delivery. Advances in mobile The familiar example is a hall porter, who by
technology are likely to create further challenges putting a favourite wine in a hotel room collects
to these searches and sorts as they bring in addi- a reward. The hall porter takes the data elements
tional dimensions of location-independence and (arrival at that hotel, to the appropriate room, at
personalization. that correct time and with the wine) and because
The need for the rendering of information the elements are required and understood they are
in context, as part of work-flow, to any device information. Context is given to the information
anywhere anytime to enable real time decision (managing the relationships between pieces of
making is the goal of many organisations. The information and used with work-flow) to achieve
mobile enablement of business, as discussed by knowledge, which is then applied at the right time
Sherringham and Unhelkar (2008a) in a separate in the right way to realise a profit (Ghanbary and
chapter in this book, is expected to further drive Arunatileka 2006).
the demand for real time decision making ser- The business imperative of the data – wisdom
vices (Ghanbary 2006). The emergence of real conversion has been widely noted, e.g. Macmanus
time decision making, the elements required to et al. (2005), but the significance of the value
achieve that process and the implications of mo- stack lies in the importance of providing context
bile technologies in real time decision making are through managing relationships between pieces
discussed in this chapter. of information and by the integration of informa-
tion with work-flow. Within mobile business,
the significance of location provides additional
DAtA – WIsDOM VALUE stAcK context to the information.
Resolution of the data – knowledge conversion
A record in a database, a marketing video or a allows the right information to be presented at the
company’s financial report are all data. Data only right time in the right way to the right audience,
becomes information when it is analysed, under- providing two advantages. Firstly, the need for
stood and needed. With the application of experi- users to have advanced information management
ence and skills information becomes knowledge skills to complete the most rudimentary of tasks
and when such knowledge is applied at the right is reduced. Secondly, the difficulty of managing
time in the right way, knowledge becomes wisdom information on the small screen of current mo-
(power /profit). This data to wisdom conversion bile devices is removed. Resolution of the data–
is illustrated in Figure 1. knowledge conversion to service both business
and mobile business will allow mobility to realise
its true significance through the provision of real
Figure 1. Data – Wisdom value-stack
time decision making (Raton 2006) and provide
business with a major competitive advantage
(Ekionea 2005).
796
Real Time Decision Making and Mobile Technologies
is supplied dynamically as the road is traversed pieces of information often need to be drawn to-
and everything that is needed to make a foreign gether, i.e. the relationships between elements of
exchange trade is rendered to any device anywhere information need to be provided to give context.
anytime for decision and execution (Gupta 2006). Information relationships are managed using a
The key elements of real time decision mak- metadata framework that provides all of the sup-
ing are summarised in Figure 2 and are discussed porting details to give context and by linking it
as follows. to steps in a work-flow. A metadata framework
Consolidated Repository – Information for includes classification schema, versioning details,
real time decision making is accessed from vir- role based access, security and privileges, as well
tual consolidated repositories that combine spatial as device specific information and spatial needs.
data, database data, transactional data and docu- Use of metadata to manage information re-
ments (including images). To stop the duplication lationships is critical in the data to knowledge
of effort, information is single sourced from vir- conversion and is a prerequisite to the provision
tual consolidated repositories. Within these re- of more sophisticated mobile business services.
positories, content is separated from presentation Work-flow – By defining and integrating
and from mechanism of delivery. Archiving, information to process, knowledge can be pre-
backup, recovery and version control, are all sented in context for real time decision making
performed on the repositories on behalf of the (Ekione and Abou-Zeid 2005). The user is taken
user, freeing up both the end user and the end- through a series of recipes (process and informa-
device (Sherringham 2005). tion combined in sequence - recipes) to realise the
The benefits of distributed computing power required outcomes. The combination of informa-
shall continue within the mobile computing en- tion relationships and work-flow together provide
vironment but unlike the desktop environment context and allows the conversion of data into
where data were trapped locally, consolidated information and to knowledge. The challenge is
data storage ensures that data are single sourced the development and maintenance of the standard
and that data are not stored for extended periods recipes by audience and of the virtual consolidated
of time on the end device (Sherringham 2008). contextual information bases.
To effectively support mobile computing, large When providing mobile business services and
centralised databases shall be replaced with virtual products, it is ease of use that influences user ac-
consolidated contextual information bases (Yang ceptance and product adoption. The use of clearly
and Wang 2006). defined recipes to guide the user to the assured
Information Relationships – To achieve outcome is part of the mobile business solution.
knowledge and to make decisions, different
797
Real Time Decision Making and Mobile Technologies
Unified search – Search shall be unified processing or archiving for compliance shall also
across all data types and tightly integrated with be part of the messaging environment.
work-flow. Search harnesses the information Presentation – With a resolution of the infor-
relationships to provide context and uses role- mation to be provided, the provision of context
based access and other usability information to and work-flow, the remaining element is the pre-
provide focused results. The effectiveness of a sentation to the end of device. The interface will
search capability is a pivotal tool to the provision consist of a series of intuitive icons that provide
of services on mobile devices. the user with the required business functionality.
Artificial intelligence – Work-flow, search Invoking an icon changes the interface to reflect
and information relationships are all expected to the task on-hand with the work-flow embedded.
merge into one layer that is artificial intelligence. The ability to customise and personalise the inter-
It is the presence of artificial intelligence that will face would also exist, together with an integrated
liberate the end user and empower mobile business. search (Sherringham and Unhelkar 2008b).
Security – As part of the overall security
issue, a metadata framework facilitates the se-
curity provision and management because of the Ict INDUstry trENDs AND
application of user access rights to the specific rEAL tIME DEcIsION MAKING
information elements.
Messaging – Real time decision making Involving telecommunications companies, hard-
requires a unified messaging environment to ware and software suppliers, content providers
combine voice, data, text, images and video. To and consulting services, real time decision making
guarantee service delivery the messaging environ- on any device anywhere anytime is an emerg-
ment needs to be architected around the FedEx ing trillion dollar business opportunity that will
model, where the quality of hand-off, the message, underpin business operations. The emergence of
the delivery and storage of the message are all real time decision making from the evolving use
separated and utility infrastructure underpins the of the Internet is shown in Figure 3.
message processing. Brochureware remains a major use of the In-
Supporting the messaging environment are ternet and will transition to mobile devices. Al-
the device and asset management functionality though the Internet is increasingly being used to
and capability, including locational information. support transaction processing, many opportuni-
Tagging of messages for application specific ties for development still exist because the trans-
Figure 3. Evolution of the Internet and the emergence of real time decision making
798
Real Time Decision Making and Mobile Technologies
action processing capability is still in its infancy development, enterprise architecture, business
and advanced and complex transaction processing process and information management (Alag 2006).
is currently not well supported. Basic transaction Iconic interface – Currently, an iconic inter-
processing is starting to be seen on mobile de- face is the most effective approach for providing
vices but complex transaction processing requires a common and intuitive interface on the small
some significant changes in business processes screen of a mobile device through to the more
and resolution of security and authentication spatial screen real estate of the plasma television
before a wide adoption on mobile devices occurs. set. Iconic interfaces are increasingly used for
The emergence and growth of collaboration many features of applications with the display
is the focus for much of the ICT industry and is automatically changing to reflect those most
increasingly providing other business opportuni- relevant features to the needs of the user, e.g.
ties. Collaboration includes Web 2.0, with social Apple’s I-phone and the latest release of Microsoft
networking, business networking and the need for Office. The ability to personalise the interface and
entertainment. The greater use of the Internet for to be independent of location are extra features
messaging and the convergence of telecommuni- to be seen within mobile devices.
cations with the computer are also aspects of the Features to functionality - Whilst the trend
collaboration stage in the evolution of the Internet for more and more features to be supplied within
and mobile business. Whilst mobile devices will software applications that are used by fewer
play a significant role within collaboration, the people is still strongly present, this trend is set
maturity of business processes and of manage- to change because of the need for a functionally
ment frameworks remains an issue for business driven iconic interface on mobile devices. An
collaboration. iconic interface that includes work-flow and which
The natural extension of collaboration is real changes to reflect the functionality required by
time decision making. Effective collaboration a user to achieve an outcome, removes the user
requires that the right information be shared with from the need for intimate knowledge of feature
participants so that informed decisions can be driven software. The successful software of the
made and then executed. With the provision of future delivers functionality and NOT features.
information in context linked to work-flow, real Application consolidation - The use of an
time decision making promises to add significantly iconic interface that invokes functionality in-
to business capabilities. stead of features creates a blurring in the need
Whilst many business talk about collaboration for distinct killer applications because it is about
and the provision of collaboration services, the bringing elements of functionality together to
value lies in real time decision making because meet a need. The focus will no longer be on
of its higher value and range of opportunities. launching an application to complete a task but it
Compared with the Internet wave that swept is about conducting a task and bringing together
through society when Web sites and the Internet the functionality necessary to achieve the required
came to the fore, the changes seen in society as a outcomes. Whilst Microsoft’s use of Outlook as a
result of real time decision making will transform master application to drive desktop functionality
humanity. Strategically aligning both business and is another step in the seamless integration of ap-
ICT now to support and adopt real time decision plications, this approach is still evolving.
making is required. Microsoft PowerPoint allowed people to be a
Real time decision making brings together presenter. Microsoft Word allowed people to be
some key and innovative technologies (Table I) a typist and Microsoft Excel allowed people to
whilst providing a unified approach to software be accountants. It was Microsoft’s close linking
799
Real Time Decision Making and Mobile Technologies
Table I. Summary of ICT trends impacting upon real time decision making
of killer applications with its operating system end device but also some bad trends occurred.
that allowed for standardisation of the desktop Firstly, the end device was burdened with more
environment and led to market dominance. In the and more applications which has caused update
world of real time decision making and mobile and coordination problems. Secondly the benefits
devices, it is the seamless integration of elements of consolidated data storage and work-flow were
of functionality that shall lead to standardisation lost. Furthermore, content was no longer separated
and dominance over mobile computing, desktop from presentation and mechanism of delivery.
computing and enterprise computing (Armstrong Through real time decision making and the
2006). demands from mobile business, some of the best
Return of sound practices – In the mainframe practices can be returned to ICT (Kaliszewski
environment, the end device was dumb and ev- 2006). To work effectively, the end device (mo-
erything was done centrally on a mainframe. The bile device) will be smart but it cannot become
introduction of the PC realsied the benefits of overloaded like the desktop PC. The bulk of the
distributed computing power and of an intelligent work will be done at the server end with results
800
Real Time Decision Making and Mobile Technologies
only being displayed on the mobile device and the computer, with television, with the gaming console
prompt for the next stage of the process. The mobile and with the music and video player.
end device remains simple and easily managed. Whilst the PC environment was characterised
Using mobile devices to access contextual in- by an integration of killer applications with an
formation from consolidated contextual informa- operating system that led to standardisation, the
tion bases means that the benefits of consolidated mobile business environment is different. Within
data storage linked to work-flow shall be seen the mobile business environment, there is a de-
within mobile business. The separation of content cline in the importance of killer applications but
from presentation and mechanism of delivery sees a greater significance in elements of business
the return of another good practice and a requisite functionality. Close integration of elements of
for real time decision making is implemented. In business functionality through an iconic interface
addition, real time decision making requires that with the mobile device operating system is the
the business logic and processing rules (Lucas path to standardisation and market dominance
2005) be stored in contextual databases and not in for software vendors.
the source code – a return to good coding practices. Data storage – The demand for data stor-
Software as a Service (SaaS) – The provi- age capability is set to rapidly increase. It is not
sion of Software as a Service is in its infancy and so much in the storage of transaction data and
the mobile opportunities for SaaS are still to be documents that will further significantly pressure
realised. Much of SaaS is still very application data storage but it is the growth in imaging for
specific and there have been concerns about the work-flow, results for simulation, images from
quality and applicability of code supplied with surveillance and services for entertainment. The
SaaS. Real time decision making and the elements storage will not be on the end device but on the
of business functionality in the interface is a natural server in global virtual consolidated databases
extension to current SaaS. Mobile business will (Raisinghani 2006).
provide many new opportunities for SaaS. Consolidated contextual information bases
End device and operating system – Like – Real time decision making and mobile business
any other market, the evolution of the desktop depends upon the use of contextual information
environment led to a highly diversified market bases to underpin its operation. These databases
with many players in hardware, software and shall function along distributed lines and shall be
killer applications. As the market evolved and viewed as one virtual global consolidated informa-
matured, standards came into effect and it is this tion base. The database software to support con-
standardisation which drove the consolidation solidated contextual information bases requires
and the creation of market dominance by a few a new generation of object orientated databases.
key players. Whether it is a user on a mobile device or a wire-
Within the emerging mobile business market, less napkin holder, these consolidated contextual
the de-facto standard for hardware, both server information bases will service millions of devices.
and end device, is still to be defined. The operat- Context based searching – Contextual based
ing system, for both the server and end device, is searching is key to the operation of real time
also in need of standardisation. Market dominance decision making. The leading search capabilities
comes with being the de-facto standard. The op- present currently are not only data type specific,
portunities that come from standardisation in the e.g. documents or transaction data, but because of
mobile market are more extensive because of the the lack of context and work-flow, the searching is
convergence of the mobile phone with the laptop not contextual. Development of contextual based
801
Real Time Decision Making and Mobile Technologies
searching provides any given business with an be realised. Whilst a unified approach may cur-
unprecedented business opportunity and control rently be absent from the industry, the business
over mobile business globally. opportunity is too great for the collaboration not
Artificial intelligence – Contextual based to occur.
searching, the management of information rela- Whilst the demands of mobility shall be the
tionships and linking to work-flow are necessary major driver in realising real time decision mak-
for real time decision making but the challenge ing on any device anywhere anytime, it is the
is the sheer volume of data that currently exists, telecommunications network that underpins real
plus that which will evolve going forward. It is time decision making. Major telecommunications
simply not possible for humans to classify and companies like Verizon and British Telecom are
context this volume of information by audience; deploying fibre optic networks to support not only
nor meet the dynamic nature of information and an integrated communications environment but
the evolving needs. Artificial intelligence shall also the whole scale future transmission of data.
be used. Whilst the mobile dominates the last step to the
Contextual based searching, the management end user, the bulk of data traffic movement shall
of information relationships (metadata) and work- remain the fibre optic backbones. The future shall
flow shall all merge to form a layer of artificial see an operating system layered on the routers and
intelligence (Figure 2). The existing use of pattern fibre optics of the telecommunication network to
matching and predictive capabilities in artificial form one global virtual mainframe to support real
intelligence shall be expanded upon to include time decision making.
perceptive and awareness capabilities. Artificial Whilst the emergence of artificial intelligence
intelligence shall initially come to the fore in er- is the critical layer in the solution that supports
ror and exception handling for routine transaction real time decision making (Figure 2), at least one
processing because the majority of information more layer is to still to be developed, that of voice.
accessed in business is as part of routine transac- Gone will be the days of data entry and manage-
tion processing and it is standardised transaction ment through a keyboard, voice shall be the key
processing that underpins business operations mechanism. Other bio-recognition solutions are
(Moonis 2006). The potential applications of also expected to be developed.
artificial intelligence within mobile are almost The ICT industry has seen standardisation of
limitless and with artificial intelligence present the operating system and of application. Standar-
on all hand held devices, all fixed devices (nap- disation has occurred at the desktop and is being
kin holders, fridges, PCs and TVs), the market seen at the enterprise level. Whilst standardisation
opportunity is unprecedented. of the mobile device is still to be realised, the real
opportunity is standardisation of the marketplace.
Business operates in market places, e.g. banks and
FUtUrE DIrEctION standards to operate globally, and the opportunity
to standardise the marketplace ICT awaits (the
Even though real time decision making is still emergence of marketplace computing).
emerging and there is much work to be done to see Access to information shall become a consumer
its full realisation, some future trends are already right in the knowledge era. In the knowledge era,
starting to be identified. Real time decision mak- information shall underpin society and like power
ing is an emerging trillion dollar industry that will and water, the Internet and knowledge will be a
evolve over the next 10-years and collaboration utility. Of all the utilities (gas, water or electricity),
between key players is how the opportunity will and of all the infrastructures (roads, ports, rail or
802
Real Time Decision Making and Mobile Technologies
communications), the knowledge utility will be Alag, H. S. (2006). Business Process Mobility.
the most demanding and the most valuable. In Unhelkar B. (Ed.), Handbook of Research
in Mobile Business: Technical, Methodological
and Social Perspectives. Hershey, PA, USA: IGI
cONcLUsION Global
Armstrong, M. (2006). A handbook of management
Living in the knowledge era provides many op-
techniques: a comprehensive guide to achieving
portunities and rewards to the individual, to busi-
managerial excellence and improved decision
ness and to society. For humanity to realise its true
making, Rev. 3rd ed. London: Kogan Page
potential in the knowledge era, users need to be
freed from the need for advanced information skills Balthazard, P. A., & Cook, R. A. (2004). Orga-
and empowered by real time decision making on nizational Culture and Knowledge Management
any device anywhere anytime. Information in con- Success: Assessing the Behaviour-Performance
text, sourced from virtual consolidated contextual Continuum. Paper presented at the Proceeding
information bases and integrated with work-flow of the 37th Hawaii International Conference on
for delivery through a common interface across System Sciences, Hawaii, USA.
devices is what is required. Artificial intelligence
Ekionea, J. B., & Abou-Zeid, E. (2005). Knowl-
is how contextual based searching is achieved
edge Management and Sustained Competitive
and how the relationships between information
Advantage: A Resource-Based Analysis. Paper
managed to give context.
presented at the IRMA Conference, SanDiego,
Real time decision making is a trillion dollar
USA.
business opportunity that is set to evolve over
the next 10-years and to become the de-facto Ghanbary, A. (2006). Evaluation of mobile
industry standard. Whilst the demands of mobil- technologies in the context of their applications,
ity shall drive the evolution of real time decision limitations and transformation. In Unhelkar B.
making, it is the benefits derived in routine busi- (Ed.), Chapter 42 of book: Handbook of Research
ness transaction processing that will be the initial in Mobile Business: Technical, Methodological
incentive for realisation. Beyond this, however, and Social Perspectives. Hershey, PA, USA: IGI
lies the moral responsibility for realising real time Global
decision making for the betterment of humanity
Ghanbary, A., & Arunatileka, D. (2006). Enhanc-
because knowledge is freedom and knowledge is
ing Customer Relationship Management through
the liberator from poverty and tyranny.
Mobile Personnel Knowledge Management
(MPKM). Proceedings of IBIMA International
Conference. IBIMA 2006. Bonn, Germany. 19-
rEFErENcEs
21 June.
Adair, J. E. (2007). Decision making & problem Gupta, J. N. D. (2006). Intelligent Decision-
solving strategies 2nd edition, Philadelphia: making Support Systems Foundations, Applica-
Kogan Page tions and Challenges. London: Springer-Verlag
London Limited
Kaliszewski, I. (2006). Soft computing for complex
multiple criteria decision making. New York,
NY: Springer
803
Real Time Decision Making and Mobile Technologies
Lucas, H. C. (2005) Information technology: Yang, C. C., & Wang, F. L. (2006). Information
strategic decision making for managers. Hobo- Delivery for Mobile Business: Architecture for
ken, NJ: Wiley Accessing Large Documents through Mobile
Devices. In Unhelkar B. (Ed.), Chapter 18 of
Macmanus, D. J., Snyder, C. A., & Wilson, L. T.
book: Handbook of Research in Mobile Business:
(2005). The Knowledge Management Imperative.
Technical, Methodological and Social Perspec-
Paper presented at the IRMA Conference 2005,
tives. Hershey, PA, USA: IGI Global.
San Diego, USA.
Moonis, A. (2006) Advances in Applied Artificial
Intelligence. Proceedings of 19th International
KEy tErMs AND DEFINItIONs
Conference on Industrial, Engineering and Other
Applications of Applied Intelligent Systems, IEA/ Activity Objects: A series of objects invoked
AIE 2006, Annecy, France, June 27-30. Berlin from a standard iconic interface that provide busi-
Heidelberg: Springer-Verlag GmbH. ness functionality because they contain the neces-
Raisinghani, M. S. (2006). M-Business: A Global sary content, images, business logic, processing
Perspective. In Unhelkar B. (Ed.), Chapter 31 of rules, work-flow and presentation rules.
book: Handbook of Research in Mobile Business: Contextual Search: Searching of information
Technical, Methodological and Social Perspec- in context so that useful results are obtained.
tives. Hershey, PA, USA: IGI Global. FedEx Model: A model for the operation of
a unified messaging environment based on the
Raton, B. (2006). Autonomous mobile robots: proven principles to move messages (parcels)
sensing, control, decision-making, and applica- around the world by leading logistics companies.
tions. FL: CRC/Taylor & Francis Information Bases: The next generation of
Sherringham, K. (2005). Cookbook for Market databases but instead of storing data, information
Dominance and Shareholder Value: Standardising is stored in context.
the Roles of Knowledge Workers. Athena Press: Information Relationships: The associa-
London. (p. 90). tions between elements of information to provide
context and convert information to knowledge.
Sherringham, K. (2008). Catching the Mobility Knowledge Utility: Like power and water,
Wave Information Age April-May 2008 (p. 5). knowledge shall become a utility infrastructure
Sherringham, K., & Unhelkar, B. (2008a). Ele- that underpins humanity.
ments for the Mobile Enablement of Business. Marketplace Computing: Standardised com-
In (Unhelkar et al. 2008) Handbook of Research puting (tightly integrated hardware and software)
in Mobile Business: Technical, Methodological operating at the marketplace level to allow busi-
and Social Perspectives – 2nd Edition, IGI Global. nesses to interact effectively in a marketplace.
Business currently standardises at the enterprise
Sherringham, K., & Unhelkar, B. (2008b). Busi- level but to operate effectively, standardisation
ness Driven Enterprise Architecture and Applica- shall be at the marketplace level.
tions to Support Mobile Business. In (Unhelkar Real Time Decision Making: The provision
et al. 2008) Handbook of Research in Mobile of information in context and integrated with
Business: Technical, Methodological and Social work-flow in real time to any device anywhere
Perspectives. 2nd Edition, IGI Global anytime is needed so that decisions can be made.
This work was previously published in Handbook of Research in Mobile Business, Second Edition: Technical, Meth-
odological and Social Perspectives, edited by Bhuvan Unhelkar, pp. 173-181, copyright 2009 by Information Science
Reference (an imprint of IGI Global).
804
805
Chapter 3.16
Business Driven Enterprise
Architecture and Applications
to Support Mobile Business
Keith Sherringham
IMS Corp, Australia
Bhuvan Unhelkar
MethodScience.com & University of Western Sydney, Australia
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Business Driven Enterprise Architecture and Applications to Support Mobile Business
806
Business Driven Enterprise Architecture and Applications to Support Mobile Business
disparate Web sites and the sending of e-mails on their business processes and users (Cummins,
that are not coherently managed and an in built 2002). Through defining the ICT necessary to sup-
hidden cost with a failure to guarantee service port knowledge workers as an assembly line for
delivery is seen. knowledge workers and by addressing the issue of
ncumbent within the desktop environment and integration of information with work-flow (driven
within many enterprise architectures is the isola- by how the customer interacts), the necessary
tion of data in disparate silos with a resulting elements of enterprise architecture can be readily
duplication of effort. A scarcity of context for the defined and the necessary integration required
information and a lacking of integration with determined. This assembly line approach lever-
work-flow further increases hidden costs because ages the modelling capabilities of Model Driven
of the time spent trying to find information. The Architecture to develop platform independent
demand by customers for mobile business ser- models and solutions (McGovern et al. 2004).
vices and because of the constraints imposed by In addition to assembly techniques, there are
mobile devices, a redefinition of enterprise archi- several other principles that have been have been
tectures and an optimisation of the desktop envi- standard engineering practices for many years
ronment shall result.a which can be brought to ICT, applications and
The small screen size inherent in current mobile enterprise architecture to support mobile busi-
devices means that if mobile business services are ness and align information management with
to be provided and accepted by the user, all of work-flow:
the information management currently required
will need to have occurred before delivery to the • Market maturity: The maturity of
mobile device. Mobile business will drive the the market in which mobile business is
implementation of real time decision making. occurring
Instead of users searching and sifting through • Business dynamics: How a business re-
information, the right information is presented at sponds to the forces of markets, customers,
the right time in the right way to allow decisions suppliers and legislation.
to be made, e.g. our favourite restaurants bid in • Business maturity: The maturity of a
real time to achieve our patronage on any device business in the application of ICT.
anywhere anytime (Sherringham and Unhelkar • Utility infrastructure: ICT as a utility in-
2008b). frastructure for mobile business.
The demand for real time decision making
from mobile business is expected to be one of the Market maturity – As mobile business offer-
main drivers for the provision of mobile business ings are brought to market, businesses will operate
services, resolution of information management in an emerging market (size, share or offering).
and for the realignment of ICT to support busi- In such emerging markets there are few standards
ness needs. and the market is highly dynamic. Solutions need
to be rapidly developed and quickly changed to
support growth and product diversification. As
ALIGNMENt DrIVErs FOr Ict markets mature, product diversification is re-
WItHIN MObILE bUsINEss quired, specialist needs arise and standards start
to develop. Change becomes less prevalent and
Having the correct enterprise architecture is an en- the focus moves to assured delivery and scalable
terprise’s key business system, information / data, growth.
application, technology strategy and it impacts
807
Business Driven Enterprise Architecture and Applications to Support Mobile Business
In highly mature markets, standards dominate, and reconstruct events impact upon the solution
e.g. ATMs or air-craft. Government compliance design considerations.
is stringent and only a few players can effectively Customers are highly dynamic and are often
compete. In mature markets, utility infrastructure very demanding. New customers are added regu-
is the order of the day. A different level of enter- larly to systems and products are quickly shipped
prise architecture is required to operate in all of in response to demand. Rapid and frequent updates
these markets and to supporting evolving mobile are required to ensure currency of information to
business. service customers. Mobile business solutions that
Business dynamics – Even within a market support customers often require sustained and
and its sector and segment, business needs are frequent network connectivity with user authen-
dynamic and are not uniform. Business is driven by tication and transaction validation.
market forces, government legislation, customer Standing orders and long term contracts are
demand and costs (Figure 2) and although a lot of often in place with suppliers and much of the
commonality of function exists across business, supply process is automated. The ability to place
different types of business and different areas of a routine order from a mobile device and to track
business have differing needs. delivery requires connectivity to the network but
Markets are often highly dynamic and where frequent updates are not required.
business is heavily impacted by market trends, Business maturity – Within an organisation,
the need for dynamic real time information and different areas of business are at different levels
fast updates prevail. Mobile business offerings in their respective markets, in their mobile busi-
that support dynamic markets are often high ness enablement and in their ability to apply ICT
volume in nature with a strong focus on support- to business. This diversity is a powerful tool for
ing real time updates. business growth, enterprise architecture align-
Legislative changes are often slow but regularly ment and in application development because it
have a significant impact, e.g. Sarbanes Oxley Act provides an upgrade path for application sophisti-
(Bowersox et al. 2007). Less dynamic and more cation, business maturity and mobile enablement.
considered solutions with extensive audit capa- By looking at the next level of performance up
bilities are required to support legislative needs. from current operations, the goal of achieving
The ability to record mobile business transactions that level of performance and operation can be
set and achieved without the need to reinvent the
wheel. Successive levels of performance can be
Figure 2. Business factors impacting enterprise progressively realised (Figure 3).
architecture and solution design in mobile business Utility infrastructure – With ICT being an
assembly line for knowledge workers and its
critical role within business and mobile business,
ICT plays the role of a utility infrastructure with
the following principles included within its design:
808
Business Driven Enterprise Architecture and Applications to Support Mobile Business
809
Business Driven Enterprise Architecture and Applications to Support Mobile Business
conduct business into the interface. Rather than the appropriate activity object that delivers the
having icons launching software applications required business functionality, e.g. those for a
(the desktop) or control elements (adjust volume sales process (Figure 5A). As its name implies and
on an I-phone), they launch objects of business to be discussed subsequently, an activity object
functionality, e.g. pay an account. is an object of business functionality that when
An iconic interface has other advantages in- invoked, implements the task required off it. An
cluding the use of icons is intuitive and spans lan- activity object contains images, data, processing
guages; the interface can be readily customised to rules and business logic necessary to complete
reflect branding and personal preferences; and the the purpose it has been created for.
interface presents a common environment across Invoking one activity object would implement
different devices and operating systems. One other the other activity objects required for the process.
advantage that becomes more significant to mobile Using the sales process example, objects for
business is that an end user defined and process prospecting, product details, account details,
driven iconic interface would also eliminate the contact details, events management and financials
need for specific applications because it is about could all be included. Activating the account
presenting the required elements of functional- object (Figure 5B) would initiate a series of
ity only irrespective of where it resides within a other objects, e.g. credit management, service
software application suite. management, account update, company and con-
An interface consisting of a series of icons that tact details, account creation and update, and
invoke business functionality can be created in guarantees and warranties. An object hierarchy
real time to reflect specific needs i.e. the interface exists and this extends from the interface through
automatically refreshes to reflect the changing the hierarchy into the event specific details and
activities being undertaken by a user. The interface finally, the underlying code.
would also include the supporting elements to This activity object approach allows common
complete an activity, i.e. seamless interface into objects of functionality to be established, e.g.
searching and messaging, whilst connecting to banking. A hierarchy of activity objects exists to
other tasks without the need for cumbersome menu reflect standardised processes and these activ-
driven navigation. The interface embeds business ity objects are drawn together and presented as
logic and supports standardised processes. required. These activity objects can be included
Whether the icon is on a desktop PC or a in multiple processes and accessed from within
mobile device, clicking an icon would invoke and across enterprises on any device.
Figure 5. Definition of activity objects: A) Sales object, B) object hierarchy, C) object structure
810
Business Driven Enterprise Architecture and Applications to Support Mobile Business
Any activity object (Figure 5C) is made of • Activity object databases: Database for
the following: the configurable rules, images, etc. for the
activity objects that flow through into the
• Content: The content that an activity ob- interface.
ject needs to use and process. Content shall • Exceptions databases: Details on how to
be for both the activity objects themselves handle exceptions for a given activity ob-
and their functionality. ject in a given circumstance.
• Images: The images that an activity object • Messaging databases: Handling the ren-
needs to use and process. Images are for dering of information to multiple devices
both the activity object itself and for its irrespective of location and time. This in-
functionality. cludes device configuration and manage-
• Business logic: This is the actual business ment information.
logic an activity object uses for completion
of its processing task. This simple approach of defining activity
• Processing rules: These are the rules that objects from the user interface into the enterprise
define how an activity object operates, i.e. architecture has many advantages including:
what information, images and business
logic an activity object needs to process. • Solutions are driven by the end user as the
• Work-flow: This is the work-flow in which customer interacts – gain their buy in and
an activity object resides, i.e. the context support.
of the activity object. This allows users to • The required information and businesses
work their way through a process to the re- processes are readily determined.
quired outcome. • The solutions required to support operation
• Presentation rules: The rules that go to are defined.
create or make an activity object, i.e. what • The required enterprise architecture and
information, images and business logic an applications are determined.
activity object needs to function and how • Simply rendering activity objects to an end
the activity object functions. device with all of the required elements
ready for implementation has many ad-
Supporting the activity objets is a series of vantages to the implementation of mobile
virtual contextual information bases that allow business.
the activity objects to function.
The use of activity objects has the following
• Information databases: Information that impacts:
provides the required knowledge within an
activity object. • Seamless iconic interface: The interface
• Information relationship databases: is a series of icons managed within one
Manage informational relationships that coherent framework which invoke func-
transforms information to knowledge. tionality. The interface encapsulates the
• Rule processing databases: Providing required work-flow which integrates and
the rules for work-flow, business logic and refreshes as required. Such an interface
processing of the information, i.e. a recipe works on any device (desktop or mobile)
compiler. providing ready business functionality, in-
tuitive use and ease of training.
811
Business Driven Enterprise Architecture and Applications to Support Mobile Business
812
Business Driven Enterprise Architecture and Applications to Support Mobile Business
MObILIty, ActIVIty ObJEcts AND tected around the FedEx model, where the
MODEL DrIVEN ArcHItEctUrE quality of hand-off, the message and the
delivery and storage of the message are all
The Model Driven Architecture approach and the separated and utility infrastructure used.
use of activity objects comes to the fore when it A business model driven architecture ap-
comes to mobile computing and the demand for proach services the needs of a unified mes-
mobile services (Lee et al. 2004). Many incum- saging environment.
bent solutions with their inefficiency in accessing • Error and exception handling: Effective
information and an absence of the unification of and efficient transaction processing is all
information with work-flow, become almost inef- about how the errors and exceptions are
fective in servicing mobile devices. Cumbersome managed. Whilst addressing the quality of
interfaces that do not deliver outcomes can not be hand-off issues is part of the solution, hav-
used on mobile devices because of their screen ing dedicated processes to mange errors
size. Unlike the desktop PC, the storing of data and exceptions is also required. Specific
locally on an end device is no longer an option. objects to handle errors and exceptions can
Complex business applications rich in features be defined and called in sequence until the
that people rarely use are not easily transferred issues are resolved.
to mobile devices (Paavilainen 2001). • Hand-off: Integration of information, in-
Simplicity, with clear interfaces that deliver tegration between systems, integration of
outcomes is what works on the mobile device. The context and work-flow all rely on an effec-
need for effective and efficient mobile interfaces tive quality of hand-off between different
shall in turn impact upon the incumbents in the elements. Self contained objects with all of
desktop environment and create both a common the required elements provide an effective
interface across devices and an optimised sup- solution for ensuring a quality of hand-off.
porting infrastructure. • Security: The topic of security is complex
Other areas where the application of mobility and is the subject of much concern and ex-
leverages model driven architecture include: tensive discussion (Nand 2006). An object
approach helps to facilitate the security be-
• Information Relationships: To be effec- cause the necessary role-based access and
tive, information needs to be delivered in functionality is included within the object.
context for decision making. Context is Additional security features and capabili-
given by managing the relationships be- ties can be included as elements within the
tween information through a metadata objects.
framework that integrates with work-flow.
• Work-flow: Activity objects include their Mobility and the demand for mobile services
own work-flow and business logic but their is what will drive the development of object ori-
strength comes in the combining of stan- entated solutions that shall manifest on both the
dard activity objects together to provide a desktop and in the enterprise. Delivering objects
consolidated work-flow. of functionality to a mobile device, as required
• Messaging environment: Mobility re- with all of the necessary information, business
quires a unified messaging environment logic and work-flow has several advantages:
combining voice, data, text, images and
video. To guarantee service delivery the • Across platform – A common interface
messaging environment needs to be archi- with standard user driven functionality can
813
Business Driven Enterprise Architecture and Applications to Support Mobile Business
be delivered across devices and platforms. dardised objects can be used defined and
This provides the end user with what they applied across many processes and areas
need irrespective of which device they use of business, application development be-
and location in which they operate, i.e. “my comes much more responsive to dynamic
desk where I want it and how I want it”. business needs.
• Consolidated information-bases – With
the creation of virtual consolidated infor-
mation-bases, information can be single FUtUrE DIrEctIONs
sourced. Information is no longer trapped
on the end device and all of the archiving Real time decision making and activity objects
and backup are conducted at the server. have many uses within both mobility and in the
• Smart end devices – The benefits of dis- wider enterprise business application of ICT. One
tributed computing power are realised of the evolving needs is in the application of gam-
without all of the complexities inherent to ing solutions to business training, education and
the desktop environment. The end device simulation. Gaming is one of the fastest growing
is a smart device. The benefits of lower services of mobile computing and whilst gaming
cost, ease of use and better asset manage- offers many market opportunities in its own right,
ment are transparent. it is the wider business use from mobile devices
• Information management simplification that are to be realised. Flight simulators and their
– The inefficiency of the desktop environ- use has been widely applied to train and skill staff
ment and the need for advanced informa- and to provide experience in handling difficult
tion management skills to manage ver- situations. The next level is to assist in business
sions, locations, formats and applications decision making through simulation and what-if
is not sustainable on the mobile device. scenarios. Strong visual presentation and a rich
Information presented at the right time in immersive and interactive experience to provide
the right way to any device anywhere any- scenarios and identify issues and outcomes is a
time is required. The optimisation neces- major area where model driven architecture and
sary for mobility shall also drive changes activity objects shall be used. The simulation and
in the desktop environment. modelling results shall be accessible from mobile
• Defines ICT required – A business focused devices as well as the desktop.
model driven architecture approach helps The provision of Software as a Service (SaaS)
determine the business need, is driven is in its infancy and the mobile opportunities
by the business process, the information for SaaS are still to be realised. Much of SaaS
required is identified and integrated to is still very application specific and there have
work-flow. At this point the ICT solution been concerns about the quality and applicability
necessary to support a business and how it of code supplied with SaaS. The activity object
should be deployed is transparent. approach is the natural extension of SaaS; with
• Responsive to business need – Business only those activity objects required being rendered
is very dynamic and one of the existing as a service.
challenges is trying to define requirements The development of mobile computing will
against a rapidly changing business envi- see a proliferation of solutions and services
ronment. An object approach allows those and an incredible diversity of offerings. As the
objects required to be combined in real market matures, standards shall come into play
time to meet business needs. Since stan- and consolidation shall be seen. Standardisation
814
Business Driven Enterprise Architecture and Applications to Support Mobile Business
lower costs and guarantees service delivery and Lee V., Schneider H., & Schell R. (2004). Mobile
in turn this creates market dominance. Being the Applications: Architecture, Design, and Develop-
de-facto market standard is how a business gains ment. Hewlett-Packard Development Company
market dominance. The software of the future is L.P., publishing by Pearson Education as Prentice
not feature rich applications but tightly integrated Hall Professional Technical Reference.
activity objects drawn together as needed to deliver
McGovern, J., Ambler, S. W., Stevens, M. E.,
outcomes. Being the de-facto standard for activity
Linn, J., Sharan, V., & Jo, E. K. (2004). Foreword
objects shall lead to standardisation of the desktop,
by O. Sims. In A Practical Guide to Enterprise
at the enterprise, at the mobile device level and
Architecture. Pearson Education, Inc.
in turn, at the marketplace level (the emergence
of marketplace computing). Nand, S. (2006). Developing a Theory of Portable
Public Key Infrastructure (PORTABLEPKI) for
Mobile Business Security. In Unhelkar B. (Ed.),
cONcLUsION Chapter 27 of book: Handbook of Research in
Mobile Business: Technical, Methodological
Mobile business and the demand for real time and Social Perspectives., Hershey, PA, USA:
decision making is a powerful driver for aligning IGI Global.
ICT and applications to deliver the ICT infrastruc-
Paavilainen J. (2001). Mobile business strategies:
ture necessary for mobile business. The use of a
understanding the technologies and opportunities.
standard iconic interface and activity objects that
Wireless Press; Addison-Wesley in partnership
invoke business functionality provides an effective
with IT Press.
solution for delivering mobile business services,
whilst resolving the information management and Sherringham, K. (2005). Cookbook for Market
work-flow issue and aligning enterprise architec- Dominance and Shareholder Value: Standardis-
ture and application development. ing the Roles of Knowledge Workers. London:
Athena Press. (p. 90).
Sherringham, K. (2008, Apirl/May). Catching the
rEFErENcEs
Mobility Wave Information Age. (p. 5).
Bowersox, D. J., Closs, D. J., & Cooper, M. B. Sherringham, K., & Unhelkar, B. (2008a). Ele-
(2007). Supply Chain Logistics Management, 2nd ments for the Mobile Enablement of Business. In
edition. McGraw-Hill Companies, Inc.: Irwin (Unhelkar et al. 2008) Handbook of Research in
Cummins, F. A. (2002). Enterprise Integration: Mobile Business: Technical, Methodological and
An Architecture for Enterprise Application and Social Perspectives. (pp. xxx –yyy).
Systems Integration. Canada: Willey Computing Sherringham, K., & Unhelkar, B. (2008b). Real
Publishing, John Wiley & Sons, Inc. Time Decision Making and Mobile Technologies.
Lan, Y., & Unhelkar, B. (2005). Global Enterprise In (Unhelkar et al. 2008) Handbook of Research
Transitions: managing the process. Hershey, PA: in Mobile Business: Technical, Methodological
IGI Global. and Social Perspectives. (pp. xxx –yyy).
Soley, R. & OMG Staff Strategy Group (2000).
Model Driven Architecture. Object Management
Group. White Paper.
815
Business Driven Enterprise Architecture and Applications to Support Mobile Business
This work was previously published in Handbook of Research in Mobile Business, Second Edition: Technical, Meth-
odological and Social Perspectives, edited by Bhuvan Unhelkar, pp. 214-224, copyright 2009 by Information Science
Reference (an imprint of IGI Global).
816
817
Chapter 3.17
Mobile Technologies
Extending ERP Systems
Dirk Werth
Institute for Information Systems at German Research Centre for Artificial Intelligence, Germany
Paul Makuch
Institute for Information Systems at German Research Centre for Artificial Intelligence, Germany
AbstrAct INtrODUctION
Nowadays the majority of enterprises use En- Enterprise Resource Planning (ERP) systems have
terprise Resource Planning (ERP) software to become the IT backbone of most enterprises. Sev-
improve their business processes. Simultaneously, eral publications, articles and surveys mention that
mobile technologies which can be used within ERP almost 70-80% of Fortune-1000 enterprises use
have gained further importance. This is because ERP systems to improve their business processes.
ERP, together with mobile technologies, offers ERP systems have changed the way enterprises
a wide spectrum of synergies and both have a conduct their business as many functionalities,
significant impact on enterprise efficiency. The which only a few years ago had be done manually,
improvement possibilities in ERP due to mobility now are automatically provided by the system.
range from sales activities, over logistic processes, Similar to the Internet, technologies have
up to effects on the human resource management. largely grown in the last years. E.g. mobile phones
have become a standard communication device in
most countries. In the near future mobility and flex-
DOI: 10.4018/978-1-60566-156-8.ch041
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Mobile Technologies Extending ERP Systems
ibility will be a key issue that will enable organiza- • Branch neutrality: ERP software is nor-
tions to withstand competition in an environment mally not aligned to a specific branch
characterized by increasing cost pressures. Using • Operating efficiency: the special emphasis
mobile technologies for commercial purposes is placed on efficiency, not on technology
is one option that can certainly make business • Modularity: There are enclosed areas of
processes more efficient. This chapter discusses activity within the software, called modules
mobile business has opened new opportunities in • Integration: All business activities as an
ERP systems. Furthermore, we also discusses vari- aggregate are continuously supported
ous other business processes that are influenced by • Standard software: ERP systems are not
mobile technologies (e.g. buying train tickets via designed for individual purpose. In fact
the mobile phone). However, it should be noted they are sold on an anonymous market,
that the influence of mobile technologies is not but of course they can be customized, i.e.
limited to consumer interactions. Also, established adapted to fit customer needs.
applications can be enriched by mobile technology
resulting in new or improved functionalities. This ERP systems differ from each other in their
chapter explores the impact of mobile technology complexity, range of functions and procurement
on ERP systems and demonstrate some use cases costs. First it depends on the branch the enterprise
where such technology can significantly improve operates using ERP technology. With an ascending
ERP functionality. number of suppliers or products, more modern
warehouse systems or new distributions chan-
nels, the complexity of such a system increases.
ErP systEMs Second, the size of the enterprise including their
whole network matters. Small and medium sized
Enterprise Resource Planning Software offers a businesses don’t need the same range of functions
spectrum of activities which support enterprises like a worldwide operating multinational company.
to organize important business processes by pro- This certainly has an influence on the price of the
viding multimodular software applications. ERP software solutions, e.g. small sized businesses can
systems have evolved in the middle of the 1990s install standard versions, whereas concerns need
from manufacturing resource planning (MRPII) specially developed additional modules. Third,
systems. Such systems aim to plan and steer the the number of users working with the ERP system
output generation within an enterprise. They com- plays an important role. The more accounts work
prise of all logistic activities, from the purchase simultaneously, the more powerful hardware is
planning and execution through the manufacturing needed to guarantee an unproblematic process.
planning, steering and supervision to the sales and Last, the technological base used to realize an ERP
after-sales activities. MRPII systems mainly cover system, especially the database and the program-
the logistical view of the enterprise. Extending ming language, is a key factor determining the
MRPII systems by human resource management complexity and the range of functions.
and by financial management has resulted in ERP In the future, ERP systems will be increas-
systems, that aim to cover all activities and busi- ingly standardized. Therefore the flexibility and
ness processes within an enterprise. Nowadays mobility of user interfaces will play a more and
every business transaction can be monitored, more important role in order to generate additional
analyzed and evaluated. advantages.
The performance properties of ERP systems
are:
818
Mobile Technologies Extending ERP Systems
MObILE tEcHNOLOGy addition, the costs for mobile devices like PDAs
are continuously decreasing and far away from
Mobile technology is newer than ERP systems. comparable notebook prices. In terms of realizing
The first technological achievements covered the saving potentials the localizability aspect probably
mobile speech transmission using analog mobile plays the most important role. For example RFID
phones. At the end of the 1990s, the technology tags allow enterprises to improve their logistic
has broadened by two streams: On the one side activities (see point “Logistic improvements”).
the digitalization of mobile technology, on the In the next sections we will discuss potential
other side the inclusion of text and data services. advantages by presenting a use case to each im-
Besides, the mostly used service is the short mas- provement field.
sage service (SMS), originally developed for usage
in the global systems for mobile communications
(GSM). Today, several kinds of mobile devices sALEs IMPrOVEMENt,
are available on the market. It ranges from simple cOst rEDUctION
GSM mobile phones, over ultramodern personal
digital assistants (PDA) connected via the univer- Sales can be increased by using mobile technology
sal mobile telecommunications standard (UMTS), in order to extend the functionality of ERP systems.
up to radio frequency identification (RFID) tags In order to get a better idea of the improvement
which can simplify warehouse processes. potentials we take a look at the example of the
By using portable terminals and mobile data “traveling salesman”. His main fields of activity
transfer technology, users establish a connec- are customer acquisition, providing information
tion to wireless firm-owned network services. to customer, product sales and their ordering and
They are locally and temporally independent after-sale activities. These tasks are normally sup-
and always available. As a result they are able to ported by the ERP system, e.g. new customers
make transactions from almost every place on the have to be set up with their individual customer
earth. Additionally, portable terminals are easier number. All customer orders, including their
to operate and have a shorter boot time than lo- content, volume and value are registered and can
cally installed user interfaces due to the fact that be tracked up on the basis of a voucher. With a
decentralized devices normally only include the mobile device this information can be entered
essential range of functions. As far as security or accessed wherever the salesman, respectively
is concerned the software or the hardware nor- the customer is located. Furthermore, constantly
mally includes personal identification processes, updated price lists can be presented and products
e.g. a subscriber identity module (SIM) card or can be ordered online, including such special
password protection. This is necessary to ensure services like delivery time determination. This
that third parties are not able to enter the network allows both to increase customer satisfaction and
and see or manipulate enterprise information. As business efficiency. On the one side the enterprise
each network user has its own mobile device and is able to respond fluidly to changing conditions
the corresponding account, personalization pos- in customer demand as the salesman is always
sibilities are nearly unlimited, i.e. it is possible to directly linked to the development and purchase
define different views and accesses to the central department via mobile technology. Thus produc-
database. Personalization allows users to work tion can be flexibly adapted and it is not necessary
more effective because everyone is allowed to to estimate potential sales figures, i.e. the risk
individually determine its preferred properties. of wasted production capabilities as a result of
This also leads to more cost-effectiveness. In non-saleable goods is significantly reduced. On
819
Mobile Technologies Extending ERP Systems
the other side the complexity of the ERP system • After sales activities: Even after the sell-
is decoupled. Only the functions needed for ing process, the RFID tags remain on the
salesman’s activities are supported by the mobile products and can be used for automatic re-
device, unnecessary and complex features of the plenishment, reclamation or exchange pro-
system are removed, respectively not available. cedures and after-sales disposal activities.
By embedding automatic synchronize and update
functions the employee spends a minimum of its Due to relatively high costs of the needed
working time on administrating the ERP system. transponder technology RFID was only used in
big business logistics, e.g. in container handling
facilities. As costs of the obligatory hardware are
LOGIstIcs IMPrOVEMENt decreasing the usage of the technology becomes
more and more efficient for other purposes. Point-
With regard to cost efficiency ERP supported of-Sales will use RFID in order to accelerate sale
enterprise warehouse systems gain in importance. activities or to reduce consignment and personnel
In the near future the new generation of the radio costs. E.g. a supermarket can save costs by provid-
frequency identification (RFID) standard will help ing fully automatic cash desks. It is not necessary
to save expenses. The RFID concept is based on to scan each product a consumer wants to buy,
contactless data transmission by electromagnetic not even a visual contact has to be established,
alternating fields [Hertel J., Zentes J., Schramm- as several RFID data carriers can be ascertained
Klein, H. (2005)]. Special RFID tags serve as within one single read operation. All goods within
data volumes and allow the reading, processing the customer’s shopping carriage are identified by
and changing of chip contained information. The driving through a scanner unit.
main application possibilities are quiet varied
[ECR-D-A-CH (2003); Füßler (2004)]:
HUMAN rEsOUrcE IMPrOVEMENt
• Production: After production goods are
individually equipped with an RDIF tag In this section we discuss improvement potentials
which allows identifying their position at for human resources (HR) by looking at the ac-
every step of the supply chain. counting of travel expenses. ERP systems also
• Stocks monitoring: RFID technology support automatic note of expenses. If an employee
allows to trace the receipts of goods, the comes back from a business travel and wants its
warehouse process itself, and outgoing travelling expenses to be reimbursed, the system
goods. As periodically recurring inventory only needs the payment vouchers, the employee
processes always retain a lot of employees, number and the release signal for clearing the
mobile devices in correspondence with the payment. With mobile technology this operation
RFID technology can help to make count- can be accelerated once again. Contemporary to
ing operations more efficient, i.e. easier the prepayment of the employee, the vouchers can
and faster. All stocks can be counted by be digitally submitted to the office, the system
scanning the RFID tags with a mobile validates the sums and pays the bill, e.g. paying bus
scanner unit, e.g. a modern PDA extended and train ticket via mobile phone. Since April 2007
by a radio frequency receiver. Especially there is a pilot project with twelve participating
with regard to homogeneous stocks, docu- German cities, providing such a service to their
mentation operations can be accelerated. citizens. The system is nationally standardized
and was developed by member firms and groups
820
Mobile Technologies Extending ERP Systems
This chapter explored new ways of enriching Business Process: A target-oriented, logical
standardized ERP systems with modern mobile sequence of activities which can be performed
technology. Mobile components or devices enable by multiple collaborating organisational units by
enterprises to make their business processes more using information and communication technolo-
efficient. Via wireless networks employees are gies. This system of functions makes a substantial
permanently linked to the ERP system, are able to contribution to the generation of added value.
work online and can use the saved time for more Enterprise Resource Planning (ERP)
productive activities. Systems: Integrated packages of standardized
The cases we presented above give a general software applications supporting the resource
overview of possible new business opportunities planning of an enterprise. Financial, logistical and
if ERP systems are used in connection with mobile human resource related business processes can be
devices. They will have a significant influence improved by using an ERP system.
on future activities within an enterprise. With Mobile Business: Describes the initiation and
increasing technological performance of mobile the entire support, execution and maintenance of
devices the structure of an ERP system will be business transaction between business partners by
changing from a centralized main system into a the use of wireless electronic network communi-
network consisting of independently operating and cation technology and mobile devices.
interlinked mobile devices. The discussion in this Mobile Business Processes: Integrate mobile
chapter can be further enhanced by subjecting it solutions into classic business processes. Mobile
to research validation that is currently outside the work leads to new collaborative opportunities,
scope of this chapter. improves the enterprise workflow and enables the
transaction of digital business processes.
821
Mobile Technologies Extending ERP Systems
Mobile ERP: Solutions extend traditional ERP Sensory ERP: A concept for next generation
systems by location-independently collecting and ERP systems. It enables the ERP system to auto-
exchanging data via mobile devices and wireless matically acquire data and supervise enterprise
transfer mechanisms. Standardized interfaces states and events by using sensors (e.g. RFID
allow a direct and steady connection to the ERP tags and gates, GPS tracker, etc.). Interfacing
hardware and lead to more flexible and efficient between the physical world and the ERP system
business processes within an enterprise. is no longer performed through human workers,
Radio Frequency Identification (RFID) but this data is collected by sensors that directly
System: Allows contactless data transmission by assess the physical states and that are part of the
electromagnetic alternating fields and is often used real world itself. By this, the error rate signifi-
for automatic identification and data acquisition. cantly decreases and business processes become
more efficient.
This work was previously published in Handbook of Research in Mobile Business, Second Edition: Technical, Meth-
odological and Social Perspectives, edited by Bhuvan Unhelkar, pp. 440-444, copyright 2009 by Information Science
Reference (an imprint of IGI Global).
822
823
Chapter 3.18
Convergence in Mobile
Internet with Service
Oriented Architecture and
Its Value to Business
Marco Garito
Digital Business, Italy
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Convergence in Mobile Internet with Service Oriented Architecture and Its Value to Business
SOA environment can further enhance the capabil- RFID in different situations, according to their
ity and possible outcome of RFID and Bar code. technical features
The chapter outlines advantages and disadvantages The advantages of RFID can be classified as
for both of them, providing examples of how they follows (Lahiri, 2006; Garfinkel, Rosenberg 2006;
co-exist and how they can create value. Ascential 2005):
rFID and bar code • RFID tag can be read without any physical
contact between the tag and the reader
Radio frequency identification (RFID) is one of • The data of RFID can be rewritten sev-
the most interesting technologies today: its use eral times with no diminishing quality or
impacts a large number of protagonists in private integrity
and business environment but it also raises simple • A line of sight is not required for an RFID
and dramatic issues in legal, social and political reader to read a tag
affairs. RFID have histories back to 1930 and 1940, • The range can vary from few centimetres
when the British Army, during WW 2 pioneered to some metres
RFID to identify their own aircraft returning home • Storage capability of a tag is unlimited
from bombing Europe. Early radar systems could • A reader can read different tags within its
spot an incoming airplane but not its type (Lahiri, reach for a limited time
2006; Garfinkel, Rosenberg 2006; Ascential 2005) • A tag can be structured to perform unlim-
RFID uses radio waves to detect physical items ited duties
(both living and inanimate) and therefore the range • The data quality is 100% guaranteed
of identifiable object includes everything and
everywhere: RFID is an example of automatic RFID has its limitation that can be summarized
identification technology through which an item as it follows
is automatically detected and classified. Bar code,
biometric, voice identification and optical char- • RFID do not work well or not work at all
acter recognition systems are other example of with RF-opaque items or RF-absorbent
automatic identification. items
The RFID environment consists of a set of • Surrounding conditions may affect
mandatory and optional components: Mandatory performance
parts are: tag, reader, antenna controller. Sensor, • There is a limit for how many tags can be
actuator, host and software system and com- read within a time slot
munication infrastructure are the optional parts. • Hardware set up may limit performance
The table below describes the types and usage of • The technology is still immature
824
Convergence in Mobile Internet with Service Oriented Architecture and Its Value to Business
Bar code is a scheme representing textual of data capacity, up to 3750 number of characters;
information; the symbols are generally vertical Three dimensional which is a linear bar code
lines, spaces, squares and dots: the bar code is integrated in a surface (Lahiri, 2006; Garfinkel,
probably the newest technology as the first patent Rosenberg 2006; Ascential 2005)
was issued in 1949 and the first application of bar Bar codes are read by scanners which flash a
code technology was a rail car tracking system, light through the bar code area: during this process,
implemented in 1960 (Lahiri, 2006; Garfinkel, the scanner measures the intensity of the light
Rosenberg 2006; Ascential 2005). The method reflected by the white and dark area of the bar
encoding letters and numbers using these elements code: the dark area absorbs light, the white area
is defined as symbology, which has the following reflect back the light. The light pattern is captured
characteristics: and translated by a photodiode or photocell into
an electric signal which is again converted into
• Symbology with better encoding technique digital data, represented as ASCII characters.
leads to error free and efficient encoding: This same data has been incorporated within the
• Better character density can represent more bar code at the origin (Lahiri, 2006; Garfinkel,
information per unit physical area Rosenberg 2006; Ascential 2005).
• Better error checking capability enables The advantages are (Lahiri, 2006; Garfinkel,
data reading even in those cases where the Rosenberg 2006; Ascential 2005):
some components are damaged or missing
• Rapid and accurate data collection;
It is possible to have three different categories • Increased operation efficiency;
of symbols: linear, with vertical lines with differ- • Reduced operation costs;
ent spaces with the white spaces separating two • The shortcomings are:
adjacent lines, with an overall maximum number of • Bar code can be easily damaged
50 characters; two dimensional with high storage
825
Convergence in Mobile Internet with Service Oriented Architecture and Its Value to Business
• Reader efficiency can be affected by envi- rFID and bar code Application; An
ronment conditions Example In travel Industry
• Presence of obstacles does not allow the
scanner to read the bar code RFID and Bar Codes coexist though with mobile
• Speeded items do not allow the scanner devices. In a joint initiative Finnair and Nokia
working properly have implemented a new initiative to manage
ground-based staff: work assignment are directly
The following Table 2 summarizes advan- transmitted via mobile so employees can directly
tages and disadvantages in RFID and Bar code tackle their job tasks and when they have finished,
all by listing specific and relevant characteristics, their mobile device can read the RFID tags lo-
based on the considerations made above cated at each key point locations and this data is
However both RFID and Bar code are not routed to the central management database. Again
immune of common disadvantages and the table Finnair and TDC mobile are piloting a test to use
below provides an overview mobile device to check in: the initiative is called
The situation described above enables to “Mobile bar code boarding pass”. After buying
conclude that a replacement or takeover of RFID the ticket, passengers check in by mobile, on the
technology against Bar code is unlikely to hap- internet or at the check-in desk and they receive
pen: RFID is still an immature and developing a message with a 2-dimension bar code on their
technology compared to a widely consolidated mobile phone; once at the airport, passengers
and used Bar code. It is possible to see many retrieve the message and scan it for checking
areas of improvement for both of them based on luggage, security screening and when boarding
the analysis done so far and at the moment the the aircraft: no further paper-based boarding card
logical conclusion is that RFID and Bar code can is needed (Toro, 2007)
co-exist and many of the applications for RFID
can be located out of the reach of current Bar code rFID Applications Examples
scenario where business needs require something
else or other than Bar Code (Lahiri, 2006; Garfin- Mobil introduced a “Speedpass” System in
kel, Rosenberg 2006; Ascential 2005). 1997 to fast track the payment to their petrol
stations network: the system was later extended
to convenience stores of Mobil. In 2001, the
company augmented their Speedpass services to
McDonald’s, in 2004 Mobil entered an agreement
with Stop & Shops stores to test whether or not
826
Convergence in Mobile Internet with Service Oriented Architecture and Its Value to Business
Mobil’s customers could buy their grocery and get a cash back and even utilize fidelity vouchers
food.: most likely, car drivers on the move do not in view of current or future purchases.
have enough time, to dedicate to shopping task This is also an extremely powerful way to
and the speed concept underneath demonstrates capture data for marketing research and analy-
how mobile technology can enhance traditional sis because while scanning the product, the
shopping experience in everyday life (Lahiri 2006, information is automatically transmitted to the
Garfinkel and Rosenberg 2006). central database which can thus calculate trends
Another example of RFID use can be retrieved and attractiveness of the same product, the other
in hospitals where three types of RFID can be products bought in combination with it and the
identified: those to track people and items around success of a promotion campaign with real time
the premises, those to safeguard use of medical information transmitted directly to the back office
equipment and those to assist medical staff in of the store chain to organize replenishment in a
their daily job. Different situations but each of timely manner. Therefore, self service check-out
them can interact providing a unique view of kiosks is not just a way to reduce the number of
hospital’s environment. RFID can provide the cashiers and reduce the space.
needed granularity to properly asses moments, The availability of complex and aggregated
people or objects, even at home, when the need data about products in retail industry, within a
is to monitor the wellbeing of elderly people or bar code also play an important role in health and
children needing special care and attention (Lahiri safety in food and many regulations around the
2006, Garfinkel, Rosenberg 2006).. world prescribe very specific and rigid rules for
Still an example in retail industry, RFID and fresh and perishable food products. Each store
tag technology play an important role in asset can retrieve on daily basis the use by date food
protection in not food products: expensive items products and pull out each item from the regular
and items that can be easily hidden by shoplift- shelf space or organize a dedicate space where
ers are protected by visible or invisible tags that these same items can be sold at a reduced price.
must be removed at the check out points: in this This happens in many stores around London area:
case, RFID and Bar code technology can coex- as the risk for the retail shop is to throw away
ists because they cover two different needs. Once food and therefore asset, it is a better off to try to
the tag has been removed (so the customer can sell as much as possible, even at a reduced price,
pass through the exit grid without no alarm be- relying on the fact that customers may be more
ing activated), the same item can be scanned for tempted to buy items when their price is lower
payment process: eventually, the recording of than usual for immediate consumption at home.
the transaction is transferred to the back office There are some though some concerns about
enabling the marketing analysis described privacy and more broadly pervasive computing
because these are emerging technologies far from
bar code Applications Examples being stable yet: a tag reader can detect and collect
information from any belongings, document or
The largest deployment of Bar code technology shop items bought elsewhere (the ringing alarm
happened in retail industry: the major retail chains at the exit gate grids many people experience is
(Wal-Mart in US, Tesco, Asda and M&S in UK an example). The main deployment of tagging and
for example, but list could continue) have recently RFID is in retailer and supply chain environment
adopted their stores with self check-out points or therefore privacy is not an issue in such a circum-
kiosk, enabling thus customer to scan their shop- stance; however when this technology is applied
ping products, pay by cash or credit/debit card, and attached to consumer good at item level.
827
Convergence in Mobile Internet with Service Oriented Architecture and Its Value to Business
It is now time to introduce the Service Oriented to respond to competitive market and rapidly de-
Architecture concept to analyze how wireless velop new solutions and at the same time change
technologies can be deployed in a dynamic and business models by gathering real time informa-
user oriented way tion through sensitive applications and services
(Sonic 2006; Cisco 2005; Plumtree 2005, Symons
service Oriented Architecture (sOA) 2005). The table 4 if properly understood and
implemented, opens the door to the semantic web,
Service oriented architecture can be defined as where content and applications are exchanged,
a method to conceive, implement and distribute captured and analyzed real time, enabling thus to
business functions, data or applications, based adopt and deliver sensitive answers to business
on geography or across enterprise, enabling the needs. RFID and Bar code do this by capturing
reconfiguration of new business processed when data from the end point and transferring it back
necessary; there are some key points which must to the source, at the opposite end, to eventually
be taken into account (Sonic 2006; Cisco 2004 and change the characteristics of the original data itself
2005; Plumtree 2005, Sprott 2004, Symons 2005): It is now necessary to move onto the next
step and possibly describe the IT and Business
• SOA is based on WWW standards architecture Today’s enterprises require a new
• The services or, more precisely, the content IT strategy, one that will improve their ability
of SOA allows business flexibility to respond to competitive pressures and market
• SOA can incorporate best practice to create demands.
design aimed to develop and enhance busi-
ness processes From sOA to service Oriented
• SOA covers existing system (Sonic 2006; Network Architecture
Cisco 2004 and 2005; Plumtree 2005,
Sprott 2004, Symons 2005) The emerging solution takes advantage of a more
flexible, adaptive, and feature-rich IT architecture:
The combination of these characteristics Service-Oriented Network Architecture. It helps
demonstrates and confirm the fit between the enterprises evolve their existing infrastructure
RFID/Bar codes described below and the real- into an Intelligent Information Network (IIN)
ization and distribution of services, applications that supports new IT strategies, including service-
or content through SOA: the difficulties and the oriented architecture (SOA), Web services, and
challenges brought in by new technology develop- virtualization and mobile. By integrating advanced
ment dictates to implement a model to facilitate capabilities enabled by intelligent networks,
the evolution of business process and supporting enterprises reduce complexity and management
technology (Sonic 2006; Cisco 2005; Plumtree costs, enhance system resiliency and flexibility,
2005, Ascential 2005). The table below provides and improve usage and efficiency of networked
a practical example about the moment in business assets. It allows enterprises to use their network as
development terms, in which mobile technologies a strategic asset that properly aligns IT resources
can be adopted. with Business priorities. The result is lower total
The key for a successful adoption and dis- cost of ownership (TCO) and increased revenue,
tribution of mobile technology based on SOA which over time enable organizations to shift an
infrastructure is an evolving and continuous increasing proportion of their IT budgets toward
alignment between Business and Technology and strategic investment and business innovation
the capability of IT to properly support Business
828
Convergence in Mobile Internet with Service Oriented Architecture and Its Value to Business
(Sonic 2006; Cisco 2004 and 2005; Plumtree • Interactive services layer: this layer opti-
2005, Sprott 2004, Symons 2005). mizes communications between applica-
Service oriented networks architectures are tions and services in the application layer
based on a three-layer design by taking advantage of intelligent network
functions such as embedded security, iden-
• Application layer: this layer includes all tity, and quality-of-service (QoS) features.
software used by end users within the en-
terprise for business purposes (such as en- The 7 OSI (Open System Interconnection) lay-
terprise resource planning and customer ers, described in Figure 5, provide the ground for
relationship management) and software understanding where the spoken mobile technolo-
used for collaboration (for example, uni- gies can be successfully implemented (Simeneau
fied messaging and conferencing). 2005, White 2001). Since tags store information,
• Networked infrastructure layer: this layer which may include location data, not all intel-
interconnects devices at critical points in ligence need be held in corporate networks and
the network (campus, data center, network enterprise systems. Exchange of information may
edge, metropolitan-area network [MAN], be restricted to tags and readers may be processed
WAN, branch offices, and tele-worker lo- by a local server via a LAN, or aggregated and
cations) and facilitates transport of services passed on to a distribution centre.
and applications throughout the enterprise. Many organizations are starting with RFID
pilots within the confines of their own environ-
829
Convergence in Mobile Internet with Service Oriented Architecture and Its Value to Business
830
Convergence in Mobile Internet with Service Oriented Architecture and Its Value to Business
needs to step in and take the lead to properly sup- Robinson 2000) and it is possible to understand
port the roll out of the deployment by facilitating how SOA environment can additionally enhance
the required change in process and organizational the capability with flexibility, speed of implemen-
structure and capturing inputs from the market tation, standardization of protocols and business
and to translate into competitive advantage (La- practices, reducing the uncertainty of a relatively
hiri, 2006; Garfinkel, Rosenberg 2006; Ascential new wireless technology. From an end user point
2005) This means having a clear understanding of view, this scenario can be considered as an ex-
of priorities and issues of RFID deployment and ample of MIMO (Multiple Inputs Multiple Output)
the table below describes them all based on the where companies are able to capture and assess
deployment phase, with the left side being the relevant business information about processed
starting point and markets for a wider and heterogeneous set
Over the years, computer systems and networks of sources at the very same time (Lahiri, 2006;
enabled the tracking of product across the supply Garfinkel, Rosenberg 2006; Ascential 2005, Cisco
chain to make sure that items departing from point 2004 and 2005, Sprott 2004)
A could get point B: in a retail environment, this
is a crucial step to replenish shelves on time and Mobile business, sOA
based on customers’ demand. The acid test is given and semantic Web
by when the shopper decides which product to
select off the shelf and when the shopper decide Mobile technologies introduce advantages that
to buy it again after being satisfied by the product cannot be obtained with fixed connectivity: these
itself (Lahiri 2006, Garfinkel, Rosenberg 2006, include localization and personalization. Previous
Cisco 2004 Brown and Wiggers 2005). paragraphs demonstrate this is valid for RFID
The analysis carried out on previous para- and Bar codes because these allow the delivery
graphs allow us to state the case for SOA as of customized and customizable information and
suitable vehicle for a relatively secure and fast data to user both on local or remote role (Coyle
deployment of the spoken mobile technologies: 2004; Sheshagiri, Sadeh, Gandon 2004)
SOA and service oriented network architecture The Semantic Web is an initiative supported
environment is a flexible enough infrastructure to by W3C aimed to support semantic meaning and
host mobile devices which can now interact with context for internet resources: in such an environ-
other existing applications and systems, both in ment, web services are an enabler for applications
back end or front end side of the company’s IT which can communicate with other automatically
and Business structure. via the internet (both fixed and wireless) using
The ever growing complexity and need of ac- standard internet protocol. It has been demon-
curate and timely information about process and strated and explained that such an opportunity
market data requires the availability of easy to use also exists for RFID and Bar code and SOA can be
and portable devices. Mobile technology can be the delivery platform for these protocols. (Coyle
successfully implemented as extension of Sup- 2004; Sheshagiri, Sadeh,Gandon 2004)
ply Chain Management, Customer Relationship All together these technologies open a com-
Management, business-to-employees for safety pletely new scenario for mobile computing, espe-
and security monitoring and the workflow of real cially because device capability and sophistication
time data and information may be transferred to is increasing and new enhanced devices reach
Enterprise Resource Planning and Business Intel- the market at a fast pace. The wireless network
ligence and more broadly to the whole organization therefore extend the richness and reach of the
and externally to Business Partners (Kalakota, traditional web, which means that there is a need
831
Convergence in Mobile Internet with Service Oriented Architecture and Its Value to Business
to add meaning to the data that’s is generated and the market at the Rocks area, a concert at Opera
delivered; the broader scope of semantic web House and the Mardi’ Gras Parade. With the
is hence to support the mapping of current and “Exploration” step, it is possible, for example to
future system, protecting the universality of the view some pictures or the places, the map to get to
web with the localized scenario. Once again, a each of them and the timetable for the events and
scenario that fits with RFID and Bar code/ (Coyle eventually restart the loop to shortlist and schedule
2004; Sheshagiri, Sadeh,Gandon 2004) the visit according to user’s own preferences.
Location Based Services and disseminated
Mobile semantic Web @ Work: applications across multiple infrastructures and
Mspace converging fixed/mobile hubs and devices is
another confirmation of the suitability of SOA
MSpace Mobile is a Semantic Web application and mobile semantic web as proper environment
enabling people explore the world around them by enabling and delivering enriching user experience:
leveraging contexts that are meaningful to them in a business-to-business standpoint, more relevant
in time, space and subject (Mulholland, Collins, for this paper, the same comprehensive view of
Zdrahal 2005, Wilson, Russell, Smith, Owens data and information can be achieved by integrat-
and Schaefel 2005). People unfamiliar with any ing RFID and Bar codes and replacing the de-
city, Sydney for example, may find their physical
location to be the main context around which they
Figure 8. Workflow for Mspace
wish all other requests to circulate (Mulholland,
Collins and Zdrahal 2005, Wilson, Russell, Smith,
Owens and Schaefel 2005).
Query like “which are main attractions at
Circular Quay and Sydney CBD I’d like to see
during the weekend within a walking distance from
Sydney Tower” can be gathered in the “Selection”
field of the diagram below, which contains the
main parameters: Sydney, CBD and Circular Quay
area, Sydney tower, weekend events”
The next step is provided by the “Organization”
process which collects the available events on
display during any given weekend: for example,
832
Convergence in Mobile Internet with Service Oriented Architecture and Its Value to Business
scribed tourist scenario with a proper business Business overview of service oriented service
environment. network architecture (2005). Cisco Systems. http://
www.cisco.com/en/US/netsol/ns477/network-
ing_solutions_white_paper0900aecd803efff3.
cONcLUsION shtml
Cisco Internet Business Solution Group. (2004).
It has been demonstrated how mobile technology
“2010” The retail roadmap for chief executives.
can successfully benefit the business when IT
Cisco Systems US. http://newsroom.cisco.com/
and Business align toward a clear understanding
dlls/2004/ts_011204.html
of targets and when companies are able to capi-
talize on market input. It has been proven, also, Cisco Systems. (2005). Business overview of
how innovative and “off the shelf” mind set can service oriented network architecture.http://www.
create real changing experience for customers cisco.com/sona
and companies. It has also been demonstrated
Coyle, F. (2004). Mobile computing, web services
how a service oriented (network) architecture is
and the Semantic Web: Opportunities for m-
one of the best hubs of business requirements and
commerce. Computer Science department, School
technology features to deliver applications and
of engineering, Southern Methodist University,
contents through mobile devices. This technology
Dallas, Texas.
can deliver a unique view of processes, data and
end standpoint in several environments Dubey, A., & Wagle, D. (2007). Delivering
As the technology is still in its early stage, its software as a service. The McKinsey Quarterly.
potential is not well understood in each aspect and http://www.mckinseyquarterly.com/article_ab-
privacy is one of the most important. Once mobile stract_visitor.aspx?ar=2006&L2=4&L3=43&sr
applications are layered on network infrastructure id=17&gp=0
with shared programs and features, they are part
Garfinkel, S., & Rosenberg, B. (2006). RFID. Ap-
of the internet and exposed to its risk and threats.
plications, security and privacy. In S. Lahiri RFID
Sourcebook. New Jersey: Pearson Education.
rEFErENcEs Kalakota, R., & Robinson, M. (2000). E-Business
2.0: Roadmap for Success. Addison Wesley.
A new service oriented architecture (SOA) matu-
rity model (2006). Sonic Software Corporation. Mulholland, P., Collins, T., & Zdrahal, Z. (2005).
http://www.sonicsoftware.com/solutions/ser- Bletchley Park Text: Using mobile and semantic
vice_oriented_architecture/soa_maturity_model/ web technologies to support the post-visit use of
index.ssp online museum resources. UK: Knowledge Media
Institute, The Open University.
Brown, D., & Wiggers, E. (2005). Planning for
proliferation. The impact of RFID on the network. Retail and consumer goods – RFID deployment
http://newsroom.cisco.com/dlls/2005/Whitepa- (2005). Ascential Company – white paper, US.
per_031105.pdf http://knowledgestorm.fastcompany.com/fastco/
search/keyword/RFID+TAG/RFID+TAG
833
Convergence in Mobile Internet with Service Oriented Architecture and Its Value to Business
Sheshagiri, M., Sadeh, N. M., & Gandon, F. (2004). KEy tErMs AND DEFINItIONs
Using Semantic Web services for context aware
mobile awareness. Mobile Commerce laboratory, Bar Code (also barcode): A machine-readable
School of Computer Science, Carnegie Mellon representation of information (usually dark ink on
University. a light background to create high and low reflec-
tance which is converted to 1s and 0s).
Simeneau, P. (2005). The OSI model: Understand- Open Systems Interconnection Basic Ref-
ing the seven layers of computer network. Global erence Model (OSI Reference Model or OSI
Knowledge LLS. Model): An abstract description for layered
Sprott, D. (2004). Service oriented architecture: An communications and computer network protocol
introduction for managers. CBDI Forum, Ireland. design.
http://www.cbdiforum.com/report_summary. Radio-Frequency Identification (RFID):
php3?topic_id=20&report=709&order=member_ An automatic identification method, relying on
type&start_rec=0 storing and remotely retrieving data using devices
called RFID tags or transponders.
Strategic decision on SOA (2005). Plumtree Semantic Web: An evolving extension of
Software Inc. LLP while paper US http://www. the World Wide Web in which the semantics of
plumtree.com information and services on the web is defined,
Symons, C. (2005). IT strategy maps. A tool making it possible for the web to understand and
for strategic alignment. Forrester Research US. satisfy the requests of people and machines to use
http://www.forrester.com/Research/Document/ the web content.
Excerpt/0,7211,38215,00.html Service-Oriented Architecture (SOA):
A software architecture where functionality is
Toro, R. (2007). Bon voyage. W3 IBM com grouped around business processes and packaged
corporate. as interoperable services.
White, W. S. (2001). Enabling eBusiness integrat- Service Oriented Network Architecture:
ing technologies, architectures and applications. Emerging technology based on network infra-
Wiley. structure particular set up which is similar to
Service oriented architecture but based on a dif-
Wilson, M., Russell, A., Smith, D. A., Owens, ferent approach.
A., & Schaefel, M. C. (2005). mSpace Mobile: A
Mobile Application for the Semantic Web. IAM
Research Group School of Electronics and Com-
puter Science University of Southampton.
This work was previously published in Handbook of Research in Mobile Business, Second Edition: Technical, Meth-
odological and Social Perspectives, edited by Bhuvan Unhelkar, pp. 584-594, copyright 2009 by Information Science
Reference (an imprint of IGI Global).
834
835
Chapter 3.19
Enterprise Specific BPM
Languages and Tools
Steen Brahe
Danske Bank, Denmark
AbstrAct INtrODUctION
Many enterprises use their own domain concepts Business Process Management (BPM) is currently
when they model business processes. They may also receiving much focus from the industry. Top man-
use technology in specialized ways when they imple- agement demands to understand and control their
ment the business processes in a Business Process business processes and agility to adjust them when
Management (BPM) system. In contrast, BPM tools market conditions change. This can be achieved
often provide a standard business process modeling through Process Aware Information Systems
language, a standard implementation technology and (Dumas et al.,2005). A BPM system (Jablonski
a fixed transformation that may generate the imple- and Bussler,1996; Leymann and Roller, 2000) is
mentation from the model. This makes the tools one example of such a system. It allows execution
inflexible and difficult to use. This chapter presents and automation of a business process that can be
another approach. It applies the basic model driven described explicitly as an executable workflow.
development principles of direct representation and Although the hype about BPM and process
automation to BPM tools through a tool experiment automation is high, previous work has shown that
in Danske Bank. We develop BPM tools that capture it is relatively complex to understand, model and
Danske Banks specific modeling concepts and use implement a business process as an executable
of technology and which automate the generation of workflow (Brahe, 2007). First the process must
code. An empirical evaluation reveals remarkable be understood, second it must be formalized and
improvements in development productivity and modeled at a highly conceptual and logical level,
code quality. We conclude that BPM tools should and third the process design must be transferred to
provide flexibility to allow customization to the technology. Many software vendors have complete
specific needs of an enterprise. BPM tool suites for modeling and implementing
business processes. Such tools are mostly based
DOI: 10.4018/978-1-60566-669-3.ch002 on a predefined process modeling language like
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Specific BPM Languages and Tools
the Business Process Modeling Notation (BPMN) should be able to model its business processes
(White, 2006) for capturing the business process directly in enterprise specific concepts, decide on
at the conceptual level and one technology like a target platform and write transformations that
the Business Process Execution language (BPEL) encapsulate its specific use of technology, and
(BPEL, 2003) for implementing the process. These that automate the generation of code.
tools also assume a fixed development process This leads us to the research question which
where only two models exist, i.e. the conceptual we will answer through this chapter: Does an en-
business process and the implementation. terprise specific BPM tool improve the efficiency
Using such tools causes two challenges for and quality of modeling and implementing busi-
an enterprise that has specific requirements to ness processes, how difficult is it to create, and
its development process, uses its own modeling is it worth the effort?.
concepts and uses technology in specialized ways; We use a design research approach to answer
First, a standardized modeling notation does not this question; We will implement above hypothesis
allow users to use domain concepts and may con- though an experiment where we develop BPM
tain too many modeling constructs which makes languages, tools and transformations for a specific
the tool difficult to use. The models may also be enterprise. Successively, these will be empirically
difficult to understand and use as a communica- evaluated to show the validity of the hypothesis.
tion media. Second, transformation of a model We use Danske Bank, the second largest financial
into implementation must be done manually as institute in northern Europe, as a case study. In
the enterprise may use a variety of technologies lack of sufficient industrial standards, Danske
to implement the process and not only e.g. BPEL Bank has defined its own development process
as many state-of-the-art tools support today. and uses a number of different tools to support it.
Even if one technology as e.g. BPEL is used, the This has caused several challenges as described
enterprise may be using its own implementation by Brahe (2007).
patterns which cannot be generated because the A prototype tool was developed to show that
transformations are hard-coded into the BPM tools. it provide value to develop BPM tools fitted for
The approach behind current BPM tools is the needs of a specific enterprise. The prototype
similar to the extinct Computer Aided Software illustrates that it is possible to do model driven
Engineering (CASE) tools from the 90es. They development of a business process with nearly
also often used a standard modeling language, 100% code generation. The prototype is fitted
one implementation technology and a standard- specially for Danske Banks development process
ized transformation. Their limited flexibility in and consists of three different Domain Specific
supporting enterprise specific standards was one Languages (DSLs) (Mernik et al., 2005) and cor-
of the reasons why they were never accepted responding editors that are used to model a business
(Windsor, 1986; Flynn et al., 1995). process and related information. Furthermore, the
This chapter takes another approach than state- tool provides transformations between the DSLs
of-the-art BPM tools. In order to avoid the CASE and a transformation to BPEL. These transforma-
trap we must come up with an approach that allows tions capture implementation patterns specific for
an enterprise to use its own modeling notations and Danske Banks modeling standards and use of the
specific use of technology. Our hypothesis is that implementation technology. Manual changes can
this can be achieved through applying the basic be introduced into the generated BPEL code by a
model driven development (Stahl et al., 2006) persistence utility feature.
principles of direct representation and automation We use a fictitious Project called Customer
(Booch et al., 2004) to BPM tools; An enterprise Quick Loan throughout the chapter. First, we il-
836
Enterprise Specific BPM Languages and Tools
lustrate the current development process in Danske Support for executing and automating business
Bank and the observed challenges of using current processes is achieved through different process
BPM tools. Second, we show how the prototype execution engines. One of them is batch execution
tool eliminates these challenges. We conclude that of process implementations in PL1 and COBOL.
BPM tools customized to a specific enterprise Another one is a BPM system from IBM, where
potentially have a huge effect on the efficiency of the business processes are implemented in BPEL.
a project team and will result in implementations The BPM system has been extended in areas
with fewer errors. where business requirements were not fulfilled.
However, we also conclude that developing For example, the enterprise has created its own
BPM tools from scratch requires high expertise Human Task Manager to handle and distribute hu-
and much effort and is a strategic decision that man tasks that are part of an executable workflow
many enterprises will not take. What we need is and its own task portal where process participants
a tool based framework that allows the enterprise claim and execute human tasks. Furthermore, it
to customize languages, transformations and tools has specific uses of BPEL fault handlers and has
to their specific needs instead of develop them defined specific strategies of capturing business
from scratch. and technical faults during process execution.
The rest of the chapter is organized as fol- Danske Bank has defined its own development
lows. Section 2 introduces Danske Bank and process as no standardized development process
related work. Section 3 introduces the fictitious as e.g. the Rational Unified Process (Kroll and
Customer Quick Loan project. Section 4 discusses Kruchten, 2003) was sufficient to fulfill their
challenges regarding the development process requirements. Business and IT solutions are de-
and used modeling tools. Section 5 abstracts the veloped as one for any business problem. This is
development process into metamodels and algo- in contrast to most development methodologies
rithms for transforming models into code. Based which focus on producing software solutions.
on this abstraction, the developed BPM tools are It is based on service oriented principles (Erl,
described in section 6. Section 7 describes an em- 2005) where business requirements are mapped
pirical evaluation of the tool. Section 8 discusses into required business services and processes.
the results and section 9 summarizes the chapter All important stakeholders are represented at a
and outlines future work. project team to ensure that different issues are
addressed. This includes defining efficient busi-
ness processes and specifying and developing IT
bAcKGrOUND systems that may support them. A project team
includes business process participants, business
This section introduces Danske Bank and presents analysts, solution architects, system developers
related work. and test specialists. Most requirements and design
decisions are captured in models. They are used
Danske bank for documentation and communicative purposes
and as blueprints for the implementation. The
Danske Bank has grown to become the largest development process includes specialized model-
financial group in Denmark - and one of the ing notations and creation of different modeling
largest in northern Europe. It comprises a variety artifacts.
of financial services such as banking, mortgage
credit, insurance, pension, capital management,
leasing and real estate agency.
837
Enterprise Specific BPM Languages and Tools
838
Enterprise Specific BPM Languages and Tools
Figure 1. Business events for the Customer Quick Loan project modelled as a UML class diagram in
Rational Software Modeler.
839
Enterprise Specific BPM Languages and Tools
The Solution Process Flow for the primary busi- COBOL for batch execution, and finally some
ness event, ApplyForLoan, is illustrated in Figure may not be implemented by IT at all. The project
2. It consists of four logical tasks; the automatic team decides to automate the execution of the Ap-
ApproveLoan task will make a risk calculation of plyForLoan process by implementing it in BPEL.
the customer. If the risk is high, the loan request is Two kind of physical specifications now have to
rejected; a process participant will be notified by be made: BPEL process design, also called Control
the Reject task of type UserExperience, and will Flow Behavior, and a Workflow Specification,
have to send a rejection message to the customer which contains additional information required
using an application interface. If the risk is low, to implement the Solution Process Flow and all
the loan, or possible several loans applied for at its tasks in the BPM system.
once, will be created by the automatic Create-
Loans tasks, and a confirmation will be sent to control Flow behavior
the customer by the Confirm task.
The project team has examined the local service The Solution Process Flow is the starting point
repository for existing services and has found for the Control Flow Behavior, a model of the
that two existing service operations called in a physical implementation in BPEL which is also
sequence will fulfill the requirement for a Confirm created using Websphere Business Modeler. Three
task in the Solution Process Flow. Therefore, the physical design decisions make them different.
Confirm task is further broken down and modeled This is described in the following three sections.
in a separate sub process as illustrated in Figure
3. First, a service operation is invoked to create Separate vs. Inlined Subprocess
the content of the confirm message, and second, a
service operation is invoked to send the message It must be decided if the Solution Process Flow
by SMS, email or letter. should be implemented as one BPEL process,
or if it should be broken down into several. Ex-
Physical Design tracting parts of the process into sub processes
has advantages: More than one developer can
Some business processes may be implemented simultaneously work on the construction, it is
in BPEL, others may be implemented in PL1 or easier to make a change and deploy a small sub
Figure 2. Solution Process Flow for the ApplyForLoan business event modeled in Websphere Business
Modeler.
840
Enterprise Specific BPM Languages and Tools
841
Enterprise Specific BPM Languages and Tools
implemented by three different patterns; Servi- data values in three to five different languages
ceOperation, MultipleInstances and Bundle. Tasks must be described to be presented to the process
of type Manual and UserExperience are always participants in the task portal, and rules about
implemented using a HumanTaskManual or a Hu- earliest start of the task and a possible deadline
manTaskGUI pattern. The patterns are explained and several others also has to be specified. The
a later section. When modeling the Control Flow HumanTaskGUI task further has a link to an
Behavior, these pattern names are used to clas- existing application interface where the process
sify all tasks in the same way as the Automatic, participant has to handle the task. It must also
Manual and UserExperience classifiers were used be specified which data values from within the
in the SPF model. Table 1 lists how tasks from running BPEL process instance the link should
the ApplyForLoan Solution Process Flow have transfer to the business system. For the process
been mapped to the Control Flow Behaviour. itself, additional information also has to be
The implementation pattern to be used in the specified. This includes input data for the pro-
physical design is determined from the task type cess, allocation rules, and description in several
in the SPF and the description of the task in the languages for presentation in the task portal.
corresponding System Use Case. All information for one task is specified in
a MS Word document and is called a Workflow
Workflow specific Information Task Specification. A Word template is available
for each task type which describes required in-
Much information has to be specified to implement formation. Six task specification documents are
the Control Flow Behavior in the BPM system. For created for the ApplyForLoan process.
a ServiceOperation task this includes information
about which service operations to invoke, input bPEL construction
and output data structures, exception handling and
escalation of errors, if the task must be restarted All required information and design decisions
in case of failures during service invocation etc. are now available, and the BPEL process can be
A task of type HumanTaskManual or Human- constructed after the Control Flow Behavior and
TaskGUI is a task handled by humans. Process Workflow Specification have been completed.
participants will be able to list, claim and execute A system developer now maps the Control
such a task from a task portal. For both type of Flow Behavior into a BPEL process. From the
tasks following information is needed; groups Workflow Specification he is able to specify input/
allowed to claim and execute a task are defined output data, set attributes about the process as
as Allocation Rules, labels, descriptions and e.g. when it is valid from, if it is a long running
process etc. Also other systems as e.g. Danske
Banks proprietary Human Task Manager can be
Table 1. Solution Process Flow tasks mapped into populated with allocation rules specified in this
Control Flow Behavior. document. Each task in the Control Flow Behavior
is mapped to the BPEL implementation based on
Task Implementation pattern
the developer’s knowledge of BPEL implemen-
AssessRisk ServiceOperation
tation patterns in Danske Bank. Each task type
CreateLoans Bundle
introduced in previous section has a certain BPEL
CreateContent ServiceOperation
template and an algorithm for how to implement
SendMessage ServiceOperation
it. The pattern names and corresponding BPEL
Reject HumanTaskGUI
templates are illustrated in Table 2.
842
Enterprise Specific BPM Languages and Tools
The Service Operation pattern invokes a service The service operation invoked in the loop may
operation and incorporates specific way of using initiate another process or thread that runs con-
logging and fault handling. All service operations currently. For some business scenarios the main
in Danske Bank throw a Technical Fault, which is business process is not allowed to continue before
caught by the fault handler for the Invoke node. all initiated processes behind these service invoca-
The fault handler forces the invoke node into tions have finished. Danske Bank has extended the
stopped state. BPM system with infrastructure functionality that
The MultipleInstances pattern is a loop con- allows such a mechanism. In the BPEL process it
taining a service invocation as implemented by is called the Bundle pattern and is implemented
the Service Operation pattern. It is similar to the as the MultipleInstances pattern followed by an
workflow pattern “Multiple instances without event. At runtime after invoking the service op-
priori runtime knowledge” (van der Aalst et al., eration a number of times, the main process will
2003). wait until all the initiated concurrently running
processes have finished. The BPM infrastructure
extension will be notified about the state change
Table 2. Danske Bank specific BPEL implementa- and will fire the event that will cause the BPEL
tion patterns. The dots are replaced with infor- process to continue executing.
mation from the Control Flow Behavior and the The HumanTaskManual and GUI patterns
Workflow Specification documents. are implemented by invoking a specific service
operation exposed by Danske Banks Human Task
Pattern name BPEL template Manager followed by an event node. The transla-
ServiceOperation <assign name=. .>. .</assign> tion of a task and its related information is purely
<invoke name=..>
<catch faultName=TechFault . .> manual, even though it is the same patterns that
.. are implemented multiple times.
</catch>
</invoke> Above descriptions only show a subset of the
MultipleInstances <assign name=. .>. .</assign> implementation steps that the developer has to go
<while name=. .> through when implementing the tasks from the
<assign name=. .>
<invoke name=..> Control Flow Behavior. Common for all patterns is
<catch faultName=TechFault> that data mappings also have to be specified before
..
</catch>
invoking a service operation. Control flow logic
</invoke> also has to be specified by the developer. This is
</while> described at the edges that connect the tasks in
Bundle <assign name=. .>. .</ assign> the Control Flow Behavior model.
<while name=. .>
<assign name=. .>
<invoke name=..>
<catch faultName=TechFault>
.. A NEED FOr cUstOMIZED tOOLs
</catch>
</ invoke>
</while> The development team faces several challenges
<receive name=..>. .</receive> in using the described BPM tools and develop-
HumanTask <assign name=. .>. .</assign> ment process:
<invoke name=SetTaskInQueue>
<catch faultName=TechFault>
Difficult to use domain concepts. Danske
.. Bank has defined its own concepts for modeling
</catch>
business processes, but it is not possible to create
</ invoke>
models by directly using these concepts. Tools
843
Enterprise Specific BPM Languages and Tools
have been twisted and tweaked to force them to The core of the problem is that the com-
behave as desired. The usability is low and it is mercial tools used presume one development
hard to use the models for communicative means. process defined by the software vendor, a fixed
Difficult to comprehend information. A set of modeling languages and a specific way to
number of different tools are used to describe use the implementation technology. This is in
and specify how a business process should be deep contrast to the requirements from Danske
implemented. The developer and the architect Bank who found the standard development pro-
therefore need to look into several different tools cess and standard notations insufficient for their
and models to find relevant information. needs. They need to build their own development
Missing traceability and consistency. It is process into the tools, to use their own modeling
difficult to find relevant models because trace- notations and artifacts and to define their own
ability between models is handled by textual use of technology.
descriptions. Furthermore, a model created in one
tool cannot refer to models created in other tools.
Consistency between models must therefore be AbstrActED DEVELOPMENt
handled manually. PrOcEss
Imprecise data definitions. The data defini-
tions can only be interpreted by humans. For In order to develop tools that address above chal-
instance, the name and version of the service lenges, we need a formal description of required
operation is specified in the MS Word Workflow information and transformational algorithms. In
Specification document. this section we therefore use the Customer Quick
Because of above challenges, transformation Loan example to abstract the development pro-
of models and information from specification cess into metamodels and transformations. First,
and physical design into physical artifacts as we give an overview of the current development
e.g. BPEL have to be done purely manually. The process and describe requirements to a model
system developer needs to open models in Ratio- driven development process. Second, we intro-
nal Software Modeler and Websphere Business duce the abstracted development process, which
Modeler and retrieve information manually, and uses the metamodels and transformations that we
he/she must open many MS Word documents to will develop in this section. Last, we define these
get detailed information about design decisions. metamodels and describe algorithms of how to
Although model driven development is the goal carry out the transformations. The metamodels
of the development process, the result is mere a and transformation algorithms form the basis for
document driven development process. the prototype tool described in next section, which
For the simple example of the ApplyForLoan has been developed specific for Danske Bank.
business process, the number of models and docu-
ments get high even for a simple example with only current Development Process
four tasks. One RSM model, two WBM models and
about 10 word documents make up the specification. Figure 5 gives an overview of the development pro-
It is quite difficult to comprehend the large amount cess described in previous section, and illustrates
of distributed information required for constructing the created artifacts as well as design decisions.
the BPEL code. Further, the construction process The artifacts are depictured with rounded boxes
is inefficient and error-prone as much of the infor- to indicate they are not precisely modeled, and the
mation from the specification has to be manually clouds indicate decisions that are not documented
reentered into the physical artifacts. but instead put directly into models or code. Much
844
Enterprise Specific BPM Languages and Tools
of the information required through the develop- and then generate the implementation code. In our
ment process is described as plain text. A human example this means transformation of a Solution
must read and interpret it to be able to construct Process Flow into a Control Flow Behavior from
the implementation. The cloud between the Solu- which the BPEL implementation and related
tion Process Flow and the Control Flow Behavior documents can be generated. In general, three
illustrates that decisions about how the physical basic requirements must be fulfilled to enable
design are taken by the architect or developer; an efficient model driven development process:
First, for each sub process modeled in the SPF it
must be decided if it should be implemented as Information and design decisions must be speci-
an inlined flow or as a separate process. Second, fied precisely in models.
additional functionality must be specified. By Transformation between models must be for-
defining the Control Flow Behavior from scratch, mally described.
but inspired by the Solution Process Flow, the Information added to generated models or code
possibility to have tool based consistency check must survive future transformations.
between them is lost. The Control Flow Behavior
model needs to be manually updated each time the Creating precise models requires availability
Solution Process Flow changes. The cloud between of languages or metamodels that support modeling
the Control Flow Behavior model and the BPEL standards and which allow modeling of all required
code indicates decisions taken by the developer information in a precise manner. As Danske Bank
about BPEL specific information as e.g. the name has created its own notations and use technology
of the project where the code is being developed, in specific ways, they need to be able to express
default package name, target namespace to use in this in their models.
the BPEL process, if generated WSDL files are
kept in separate directories, etc. Abstracted Development Process
Figure 5. Current development process with main modeling artifacts and decision points. The clouds
indicate that decisions are not documented, and the rounded boxes indicate that no metamodels are
used.
845
Enterprise Specific BPM Languages and Tools
Figure 6. New development process with metamodels and transformations. Information is specified
precisely by using the Eventmap, SPF, WFSpec, BPELCodeGen and ModelInjections metamodels.
It further uses a ModelInjection metamodel, The Control Flow Behavior model has dis-
and a BPELCodeGen metamodel. They are used to appeared as it is indirectly generated from the
capture decisions currently taken in the “clouds”. Solution Process Flow, the WFSpec model and
The metamodels form the basis for algorithms that theModelInjection model. The development pro-
can generate models and code. The BPELCode- cess illustrated in Figure 6 has been implemented
Gen metamodel is used to describe specific BPEL in the prototype tool described in next section
implementation decisions, while the WFSpec that uses the metamodels to capture information
metamodel and the ModelInjection metamodel precisely and transformations to automate the
are used to describe the three differences between generation of the BPEL implementation.
the Solution Process Flow and the Control Flow
Behavior described in a previous section. Metamodels
Decisions about how to implement sub pro-
cesses modeled as part of the Solution Process The five metamodels introduced above will now be
Flow is captured by the WFSpec metamodel. It described. They have been developed by analyzing
also specifies workflow specific information for the current development process. This includes
each task in the Solution Process Flow. discussions with development teams, enterprise
Additional technical functionality is modeled architects and examination of educational material.
as separate process fragments, also called model
injections as it is to be injected at a specific point in Eventmap Metamodel
the Solution Process Flow to generate the Control
Flow Behavior. Process fragments are modeled The Eventmap metamodel, depictured in Figure 7,
using the Solution Process Flow metamodel. The expresses how events can be modeled and related.
relation between a process fragment and where to The metamodel has incorporated all information
inject it is captured by a ModelInjection metamodel. that previously was described as plain text in
The implementation patterns to be used for MS Word documents. Inheritance has been used
implementing tasks in the Solution Process Flow to define the External and Timedependent event
are documented by the WFSpec metamodel, for types and requirement for different information.
instance that an Automatic task is implemented by An abstract Event metaclass contains attributes for
the ServiceOperation or the Bundle implementa- information common for both types of events while
tion pattern. the TimedependentEvent and the ExternalEvent
846
Enterprise Specific BPM Languages and Tools
Figure 7. Event map (EventMap) metamodel. An event can either be external or timedependent and
consists of a number of scenarios.
subclasses contain specific attributes, which were in MS Word documents. A WFSpec model re-
previously described in MS Word documents. fers directly to a Solution Process Flow model
instead of referring to a Control Flow Behavior
Solution Process Flow Metamodel model, as this is not explicitly modeled after the
introduction of the Model Injection concept in
A Solution Process Flow is constructed for previous section. Much information is required by
each event modeled in the event map. The SPF the WFSpec metamodel, therefore only selected
metamodel is illustrated in Figure 8. It is a simple parts of it are described here. The SPF4WFM
flow based metamodel that reminds much of a metaclass is the main element. It refers to a
UML activity diagram. The difference is the use Solution Process Flow model and has several
of the domain specific task types, i.e. Automatic, attributes specifying information required for
Manual and UserExperience, and the domain implementing the BPEL process, e.g. a deadline
specific edges, i.e. ProcessConnection, Dialog- rule, process lifetime information, allocation
Connection and ProcessDialogConnection. rules about process responsibility, department
owner, process type etc. Many of these attributes
Workflow Specification Metamodel are specific for Danske Bank as a BPEL process
implemented in the BPM system is a part of
The Workflow Specification (WFSpec) metamod- a larger proprietary case system that extends
el, illustrated in Figure 9 is a formalization of the commercial BPM system with additional
the Workflow Specification previously defined functionality.
847
Enterprise Specific BPM Languages and Tools
Figure 8. Solution Process Flow (SPF) metamodel. Tasks are modeled by the Automatic, Manual, User-
Experience and SubProcess tasks types and connected in a control flow by using edges of type Process,
Dialog or ProcessDialog.
848
Enterprise Specific BPM Languages and Tools
Figure 9. Workflow specification (WFSpec) metamodel. The SPF4WFM metaclass refers to a Solution
Process Flow and contain a number of TaskSpecifications. A task specification refers to a task in a Solu-
tion Process Flow and can be of type Manual, UX, Automatic or SubProcess
849
Enterprise Specific BPM Languages and Tools
metamodel keeps track of all process fragments has been modeled and the ModelInjection model
to inject and where to inject them in a Solution created, and BPEL specific attributes have been
Process Flow model. defined in the BPELCodeGen model. Algorithm 3
merges information from these three models with
transformations information from the Solution Process Flow model
and generates BPEL code and related artifacts.
Now, when all information required during the Only control flow logic and data mappings have
development process can be stored precisely in not been generated.
models, we are able to explicitly define the trans-
formation algorithms illustrated in Figure 6 that
depictured the abstracted development process. tOOL DEVELOPMENt
Here, we only give a short description of the
algorithms. Detailed descriptions in pseudo code In this section we describe a tool called Danske
can be found in Brahe (2008). Bank Workbench (DBW) that was developed as
part of this research. It implements the metamod-
From Event to Solution Process Flow els and transformations described in last section.
Hence, it directly supports Danske Banks devel-
One Solution Process Flow model has to be cre- opment methodology, modeling concepts and use
ated for each event in the eventmap. Algorithm of technology.
1 in Figure 6 creates an empty Solution Process
Flow model. It is named and stored according to tool Architecture
Danske Banks standards. The analyst and the ar-
chitect model the behavior of the business process Danske Bank Workbench is built on Eclipse plat-
inside the generated model. form (Eclipse, 2008) and various Eclipse open
source projects. The Eclipse Modeling Framework
From SPF to Workflow Specification (EMF) (Budinsky et al., 2003) has been used for
defining the abstract syntax, or metamodels of the
Algorithm 2 in Figure 6 generates the Workflow DSLs, that have been implemented. The concrete
Specification (WFSpec) model based on the syntax of the DSLs and editor support have been
Solution Process Flow model. It is named and implemented by using the Graphical Modeling
stored according to Danske Banks standards. A Framework (GMF, 2008), while openArchitec-
TaskSpecification class is generated and added to tureWare (oAW) (oAW, 2007) has been used to
the WFSpec model for each task in the Solution implement the semantics of the DSLs as model-
Process Flow. The WFSpec model contains all to-model and model-to-text transformations.
required information, but all attributes contain Danske Bank Workbench consists of several
default values. Successively the architect therefore independent tools for developing the different
fills it with correct information. artifacts in the development process. These are
depictured in Figure 10, which also illustrates
Generation of the BPEL Implementation dependencies to other Eclipse projects. The
names of the projects conform to the names of
The BPEL implementation can be generated by the metamodels previously described.
Algorithm 3 in Figure 6. All required information
has been specified; information about each task is
stored in the WFSpec model, process fragments
850
Enterprise Specific BPM Languages and Tools
Figure 10. Overview of Danske Bank Workbench and its dependencies of other Eclipse projects.
Metamodels and Editors the initial node. When a model injection or a sub
process is detected, the corresponding process
All metamodels have been modeled in Rational fragment or sub process is be interpreted and BPEL
Software Architect as UML class diagrams. Each code generated, which must then be merged into
of these were exported as an XMI representation the partly generated BPEL code. It requires much
of UML and imported into Eclipse by using the book keeping handling the associations between
EMF model creation wizard which comes as a models as four different models, i.e. SPF, WFSpec,
part of the EMF project. The GMF editors were ModelInjection and BPELCodeGen are used as
created based on the EMF metamodels. Figure input to the transformation. A number of utility
11, Figure 12 and Figure 13 illustrate the GMF functions have been written in Xtend and in Java
based Eventmap, SPF and Workflow Specification to support this.
(WFSpec) editors in action.
tool Utilities
transformations
Several tool utilities have been developed to
The three transformation algorithms described enhance usability of Danske Bank Workbench
previously have been implemented in oAW. Algo- and to smoothen the use of the different tools.
rithm 1 and 2 has been implemented as model-to- The users of the tools are guided from one step
model transformations using the Xtend language. in the development process to the next by using
Algorithm 3, which is supposed to generate BPEL these utilities.
code, has been implemented as a model-to-text
transformation using the Xpand language. The Transformation Execution
implementation is quite complex. It is imple-
mented as a graph transformation that recursively One kind of tool utility is the generation of “the
runs through the SPF control flow starting with next” development artifact in the development pro-
851
Enterprise Specific BPM Languages and Tools
Figure 11. Event map editor with events for the CustomerQuickLoan project. External and Timedepen-
dent events can be modeled directly from the tool palette and required information can be specified as
properties.
cess, i.e. execution of transformation workflows The executed action looks up the defined service
that implement Algorithm 1, 2 and 3. They are operation in (a mock up of) Danske Banks cen-
implemented as actions that appear on the context tralized service repository, retrieve definitions of
menu when the user right-clicks on an event in an data structures and updates the WFSpec model
Eventmap model, at the canvas for an SPF model with these.
and at the canvas for a WFSpec model.
Persistence of Manually
Service Repository Data Extract Changed BPEL Code
The architect has to find definitions of input and Generated BPEL code needs to be updated with
output data structures for service operations and data mapping and control flow logic. A small
put them into the WFSpec model. The user right- persistence framework has been developed that
clicks on a task specification for an Automatic allows the developer to persist logic from within
task and chooses “Retrieve Repository Data”. an assign node or a control link in a separate file.
852
Enterprise Specific BPM Languages and Tools
Figure 12. Solution Process Flow editor. The ApplyForLoan process is modeled. Task and connection
types are available from the tool palette. The concrete syntax is customized for tasks as well as edges.
Figure 13. WFSpec editor with task specifications for the ApplyForLoan process. Information can be
modeled precisely for Automatic, Manual and UserExperience tasks.
853
Enterprise Specific BPM Languages and Tools
The developer simply right-clicks on the assign (Figure 16b). An empty Solution Process Flow is
node or control link and chooses “Persist element”. now generated in a subfolder named “SPF” and
The action creates a separate file where the assign is given the same name as the business event. It
or control flow logic is persisted. Next time the is then modeled by either the business analyst or
transformation that implements Algorithm 3 is the solution architect. Tasks may now be modeled
executed, the changed BPEL code is overridden, directly as Automatic, Manual or UserExperience
but successively, the persisted changes are copied (as defined by the SPF metamodel) by dragging
into the newly generated BPEL code. them directly onto the canvas from the tooling
palette. Connections of type Process, Dialog or
customer Quick Loan retooled ProcessDialog are also directly available.
854
Enterprise Specific BPM Languages and Tools
Figure 14. Workflow for using tools through the customized development process. Letter tags refer to
screen dumps in Figure 16. A thick arrow indicates a tool utility while a thin arrow indi
Figure 15. File structure of the Customer Quick Loan project containing all generated files.
855
Enterprise Specific BPM Languages and Tools
856
Enterprise Specific BPM Languages and Tools
857
Enterprise Specific BPM Languages and Tools
858
Enterprise Specific BPM Languages and Tools
of the process instance to either “Approved” or Subsequently, the BPEL code generator can use
“Rejected” depending of the outcome of the As- these data structures to create a correct WSDL
sessRisk task. document for the service operation. Without
They right click on the control link in the Solu- this import utility, the developer had to find data
tion Process Flow that connects the AssessRisk definitions and create XSD schemas manually.
task with the CreateLoans, and the Reject task
and choose “Create Injection”. An empty model Code Generation
is created under the Injections folder and is auto-
matically opened in an SPF editor. The developer The developer sets parameters for the code genera-
models the process fragment as one automatic tion in a BPELCodeGen model before executing
activity (Figure 16l) and generates the Workflow the BPEL code generation. Previously, these de-
Specification for it (Figure 16m). sign decisions were not documented. Figure 16r
The book keeping of Model injections are illustrates that the developer has selected default
handled by the ModelInjection model. This model values for the code generation; The BPEL code
is illustrated in Figure 16q. It contains one injection will be generated in the same project as where the
that has two important properties; the injection models are, and WSDL files will be located in the
point in the Solution Process Flow, which is the same directory as the BPEL file. The developer
ID of the control link, and the process fragment generates the BPEL code by right-clicking on the
to inject (SPF to Inject) at the injection point. WFSpec model and chooses “Generate BPEL”
Before having the WFSpec metamodel and (Figure 16n).
editor, all the design decisions were modeled in Figure 15 shows the Customer Quick Loan
the Control Flow Behavior without any reuse of project and all files generated through the de-
the Solution Process Flow, and required additional velopment process and Figure 16p shows the
information was defined in textural documents. generated BPEL code opened in the Eclipse open
Now, the project team has modeled three processes; source BPEL editor. Only the event map has
one SPF, one subprocess and one process frag- been created manually. The rest of the artifacts
ment. They are all modeled in the same language have been created by tool utilities supporting the
and have each a corresponding WFSpec model. enterprise specific development process. Hence,
the file structure follows specified standards, and
Synchronizing Data the traceability between models can be ensured.
Without Danske Bank Workbench these artifacts
All automatic task specifications must be synchro- and all the information bookkeeping are handled
nized with the centralized Service Repository to manually by the project team.
obtain correct input and output data definitions.
Figure 16o shows the selected CreateContent task
specification in the WFSpec model for the Confirm EVALUAtION
subprocess. The modeler has right-clicked on it
and selected “Retrieve Repository Data”. The op- The tool was evaluated through an empirical test
eration name for the CreateContent specification which involved five people employed at Danske
has been set to CREATECONTENT. The same Bank. They have all worked as workflow develop-
operation name exists in the service repository, ers. Two of them have experiences from working
which can also be seen in the figure. The action as - or closely together with - a business analyst,
now retrieves data definitions from the repository and one of them is a solution architect. They used
and populates the WFSpec model with these. Danske Bank Workbench to model an event map,
859
Enterprise Specific BPM Languages and Tools
a Solution Process Flow and a Workflow Specifi- work. This is reflected in question 6, 7, 9, 10 and
cation and generate the BPEL code. The business 11. They all got an average score at 5 out of 6,
scenario was the same as presented in this chapter. which is equal “Better”. One of the developers
They got a one-page description of how to use suggested that data and control link logic should
the tool. From the description they used about also be modeled to allow 100% code generation.
30-40 minutes to complete the exercise. They Some of the developers were quite skeptical about
filled out questionnaires with 12 questions and the quality of the generated code as they suspected
were interviewed about their experiences with the that manually written code would perform better
tool. Each question asked about the experience than generated one (question 8). However, they
of using the tool compared to current practice in thought that the number of errors would be lower
Danske Bank. The questions and their ratings can in generated code compared to manually written
be found in Table 3. code (question 12).
The developers found that the tool would im- The evaluation has several limitations; The
prove their productivity significantly and it would number of participants could be increased and in-
be easier to work with. Especially, they were happy clude a more diverse population of people, the case
with the Danske Bank specific modeling capabili- could be extended to a realistic business scenario,
ties. It was much easier and intuitive to work with and the questions could be accomplished with
domain specific modeling. Further, it was easier to measurements of the number of errors in-, and the
comprehend the workflow specific information that efficiency of the code. Further, a control group of
had to be specified for the Solution Process Flow developers could use the current method and tools
(question 1-5). Some of the developers suggested in Danske Bank at the business scenario, and the
that validation rules would improve the develop- results from the two groups could be compared.
ment process as a modeler would be caught if However, making a realistic evaluation of a
required information was not specified. prototype tool in an industrial setting is extremely
In general, they found that model driven difficult. It is hard to get permission to use time
development would help improving their daily from the right people, the tool is not mature enough
Table 3. Questions and answers for the empirical evaluation. The ratings were: 1 is “Much worse”, 2
is “worse”, 3 is “a little worse”, 4 is “a little better”, 5 is “better” and 6 is “much better”
860
Enterprise Specific BPM Languages and Tools
for large scale testing, and the tool requires more Restrictions on the SPF. The prototype only
development to model a realistic business scenario. supports a one-to-one relationship between a
Despite these limitations, the evaluation of the Solution Process Flow and a BPEL implemen-
tool shows that it provides significant improve- tation. In reality there are often cases where an
ments over the current use of commercial tools SPF might be divided to several BPEL processes
in Danske Bank. or several SPF’s may be merged into one BPEL
implementation.
Implementing above items in Danske Bank
DIscUssION Workbench is a demanding task; First, it requires
further analysis of requirements in Danske Bank.
We have used Danske Bank Workbench for model- Second, it requires design and implementation
ing and implementing the ApplyForLoan business of several advanced tool utilities. Especially, the
process. The exemplification of the tool and the last item may show up to be very hard to specify
empirical evaluation has shown that the develop- and implement.
ment process becomes more efficient as the different
experts are supported directly in their work. They are
able to use familiar domain concepts directly in the sUMMAry AND FUtUrE WOrK
modeling tools, they are guided to provide correct
information, and execution of the transformation In the introduction of the chapter we postulated
algorithms has been automated. We have shown that general purpose business process modeling
that it is possible to define and utilize a number of and implementation tool suites are not feasible
DSLs and tools to effectively support an enterprise for many enterprises. Using the case study of
specific development process for business process Danske Bank and an example we showed that a
modeling and implementation. development team faces many challenges when
Danske Bank Workbench is a prototype, and they use standard modeling languages and tools
therefore it has a number of limitations and points but have to use enterprise specific modeling nota-
for improvements; tions, follow an enterprise specific development
Consistency checking. We have not defined process and use technology in specialized ways.
methods, nor implemented tools to check consis- We abstracted the development process into
tency between different models. metamodels and transformational algorithms and
Validation and modeling constraints. Vali- developed a tool called Danske Bank Workbench,
dation rules and constraints on how a model can fitted specially for Danske Bank. The tool imple-
be constructed should be specified by the team mented the model driven development principles
responsible for defining the metamodels. These of direct representation and automation as it al-
rules and constraints should be handled by the lowed creating models directly in Danske Bank
modeling tool to avoid creation of invalid models. specific concepts and it automated the generation
Controlflow. Several controlflow structures of lower level models and code.
cannot be handled by the transformation such as We saw through the example that it is possible
cyclic behavior and loop constructs. to achieve an efficient model driven development
Data mapping. It might improve the proto- process where a project team collaborate to create
type and the development process to abstract the different modeling abstractions of a business pro-
definition of data mappings to either the WFSpec cess with tool based transformations and ensured
model or to a generated Java class which would synchronicity between the different modeling
be responsible for the data mapping. abstractions. Using the tool, information only
861
Enterprise Specific BPM Languages and Tools
has to be defined once, and it is easy to compre- tool-based frameworks that feature extensions of
hend. Knowledge of implementation patterns is predefined BPM languages, editors and visualiza-
reused by automated transformations. Several tool tions to a specific enterprise. It would require less
utilities support the development process which investment and it would be easer for an enterprise
makes Danske Bank Workbench very efficient without experienced tool developers to customize
to work with. An empirical evaluation of the tool BPM tools instead of develop them from scratch.
confirmed this. Hence, we have confirmed the
hypothesis that was set up in the introduction,
which stated that applying the basic model driven rEFErENcEs
development principles of direct representation
and automation to BPM tools would solve many Bézivin, J., Hammoudi, S., Lopes, D., & Jouault,
of the experienced challenges. F. (2004). An experiment in mapping Web services
Danske Bank Workbench was not difficult to implementation platforms (Tech. Rep. LINA,
to build as many language workbenches exist University of Nantes).
for building metamodels, editors and transfor- Booch, G., Brown, A., Iyengar, S., Rumbaugh,
mations (though it did require deep insight in J., & Selic, B. (2004). An MDA Manifesto. Busi-
various Eclipse technologies and MDD concepts). ness Process Trends - MDA Journal. Retrieved
However, it has several limitations, and it only from http://www.bptrends.com/publication-
addresses a small subset of business processes that files/05-04%20COL%20IBM%20Manifesto%20
may be modeled. It requires much more effort to -%20Frankel%20-3.pdf
make it a production ready tool that can be used by
the organization. Despite a promising prototype, Bordbar, B., & Staikopoulos, A. (2004a). Mod-
our guess is that only a very limited number of elling and transforming the behavioural aspects
enterprises will go the way and implement their of web services. In Third Workshop in Software
own tools. While it may be economical beneficial Model Engineering (WiSME2004) at UML, Lis-
to develop ones own tools, there might be politi- bon, Portugal.
cal reasons not to do so. To answer the research Bordbar, B., & Staikopoulos, A. (2004b). on
question set up in the introduction we can now say, behavioural model transformation in Web ser-
“Defining and developing a model driven de- vices. In Conceptual Modelling for Advanced
velopment tool to support an enterprise specific Application Domain (eCOMO) (pp. 667-678).
business process development process seems Shanghai, China.
promising. It will heighten the productivity of
development teams and probably cause fewer BPEL. (2003). Business process execution lan-
errors in implementations. However, it requires guage for Web services (BPEL4WS). Version
a high degree of expertise in model driven devel- 1.1.Retrieved from http://www-128.ibm.com/
opment methodology and technology to develop developerworks/library/specification/wsbpel
such a tool. It will probably be unachievable for
Brahe, S. (2007). BPM on top of SOA: Experi-
most enterprises”
ences from the financial industry. In G. Alonso,
Although language workbenches provide
P. Dadam, & M. Rosemann (Eds.), BPM2007
huge support in development of model driven
(LNCS 4714, pp. 96-111).
development tools, it should be much easier to
customize ones own BPM languages and tools. For
future research we therefore suggest to work on
862
Enterprise Specific BPM Languages and Tools
863
Enterprise Specific BPM Languages and Tools
Ledeczi, A., Maroti, M., Bakay, A., Karsai, G., Tolvanen, J.-P., & Rossi, M. (2003). MetaEdit+:
Garrett, J., Thomason, C., et al. (2001). The Defining and using domain-specific modeling
generic modeling environment. In Workshop on languages and code generators. In OOPSLA ’03:
Intelligent Signal Processing. Budapest, Hungary. Companion of the 18th annual ACM SIGPLAN
Retrieved from http://www.isis.vanderbilt.edu/ conference on Object-oriented programming,
Projects/gme/GME2000 Overview.pdf. systems, languages, and applications (pp. 92-93).
New York: ACM.
Leymann, F., & Roller, D. (2000). Production
workflow: Concepts and techniques. Prentice Hall. van der Aalst, W. M. P., Hofstede, A. H. M.,
Kiepuszewski, B., & Barros, A. P. (2003). Work-
List, B., & Korherr, B. (2005). A UML 2 profile
flow patterns. Distributed and Parallel Databases,
for business process modelling. In Perspectives
14(1), 5–51. doi:10.1023/A:1022883727209
in Conceptual Modeling, ER 2005 Workshops
(LNCS 3770, pp. 85-96). White, S. (2006). Business process modeling
notation (Version 1.0). Available at http://www.
MDAGuide. (2003). MDA Guide Version 1.0.1.
bpmn.org/Documents/OMG-02-01.pdf.
Retrieved from http://www.omg.org/docs/
omg/03-06-01.pdf. Windsor, J. (1986). Are automated tools changing
systems analysis and design? Journal of Systems
Mernik, M., Heering, J., & Sloane, A. M. (2005).
Management, 37(11), 28–33.
When and how to develop domain-specific lan-
guages. ACM Computing Surveys, 37(4), 316–344.
doi:10.1145/1118890.1118892
KEy tErMs AND DEFINItIONs
Murata, T. (1989). Petri nets: Properties, analysis
and applications. Proceedings of the IEEE, 77(4), BPM Tools: A collection of modeling and
541–580. doi:10.1109/5.24143 implementation tools specialized for modeling a
oAW. openArchitectureWare. Retrieved from business process and implement it as a workflow
http://www.openarchitectureware.org. in a workflow language.
Control Flow Behavior: A physical model of
Skogan, D., Grønmo, R., & Solheim, I. (2004). a business process. It specifies how the process
Web service composition in UML. In Eighth should be implemented in BPEL.
IEEE International Enterprise Distributed Object Domain Specific Language: (DSL) A special-
Computing Conference (EDOC’04) (pp. 47-57). ized programming or a modeling language that
Stahl, T., Völter, M., Bettin, J., Haase, A., & allows expressing solutions directly in concepts
Helsen, S. (2006). Model-driven software devel- of a problem domain.
opment: technology, engineering, management. Eventmap: A model of all business events that
Wiley. may occur in a given business context.
Model Driven Development: A development
Swithinbank, P., Chessell, M., Gardner, T., Grif- paradigm that focuses on using models in software
fin, C., Man, J., Wylie, H., & Yusuf, L. (2005). development. Models are used for analysis, simu-
Patterns: model-driven development using IBM lation, verification and code generation
rational software architect. IBM Redbooks. Avail- Model Transformation: A model transfor-
able at http://www.redbooks.ibm.com/abstracts/ mation takes one or several source models and
sg247105.html?Open. generates one or several target models, or tex-
864
Enterprise Specific BPM Languages and Tools
This work was previously published in Handbook of Research on Complex Dynamic Process Management: Techniques for
Adaptability in Turbulent Environments, edited by Minhong Wang and Zhaohao Sun, pp. 23-56, copyright 2010 by Information
Science Reference (an imprint of IGI Global).
865
866
Chapter 3.20
Semantic Business Process
Mining of SAP Transactions
Jon Espen Ingvaldsen
The Norwegian University of Science and Technology, Norway
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Semantic Business Process Mining of SAP Transactions
The magnitude of data sources in a running ERP Ontologies tend to grow huge and complex, and
system is large, and within SAP there are several both domain expertise and ontology modeling
event and transaction logs that can be analyzed expertise are needed in ontology engineering
with process mining. (Gulla, 2006). In the underlying databases of SAP
In this process mining work, we use transac- systems there are lots of structured data that can
tion data that describe document dependencies be extracted to form and populate ontologies. In
between executed transactions. A transaction in semantic business process mining of SAP trans-
a SAP system can be viewed a small application. actions, we can exploit available data structures
An example of a transaction is “ME51 – Create to limit the extent of ontology engineering work.
Purchase Requisition”. As the name indicates, One particular challenge with process mining
this transaction enables a user to create a purchase of SAP transactions is the many-to-many relation-
requisition. “ME51” is the unique identifier for ship between transactions and defined business
this transaction, called the transaction code. Such a processes. Figure 1 shows an example from
transaction would produce a purchase requisition, the business process hierarchy in SAP. In SAP
which further can be referred to by a purchase order systems, business processes are defined at four
created in another transaction, like “ME21 – Cre- levels, “Enterprise Area”, “Scenario”, “Group”
ate Purchase Order”. By tracing such document and “Business Process”. At the second lowest
dependencies, we are able to extract transaction level, Figure 1 shows two business processes,
sequences that can be explored and analyzed with “Subsequent debit for empties and returnable
use of process mining. packaging” and “Sales activity processing (stan-
Data in the underlying databases of SAP sys- dard)”. As shown in the hierarchy, both of these
tems contain business processes can involve the transaction
“V+01: Create Sales Call”. The transaction logs
• Transactional data – Daily operations, such in SAP systems contain no information about busi-
as sales orders and invoices. ness process context. If we do process mining on
• Master data – Business entities such as transaction logs where “V+01: Create Sales Call”
customers, vendors and users. occurs, there is no available data that explicitly
• Ontological data – Metadata for interpreta- states whether this transaction was carried out in
tion and structuring of instances. the context of “Subsequent debit for empties and
returnable packaging”, “Sales activity processing
The transactional data are the basis building (standard)” or another business process.
blocks for process mining analysis and describe Transaction sequences themselves can be used
events that are carried out. In the transactional as input to process mining algorithm to extract
data we typically find execution timestamps and flow models and performance indicators. How-
relations to involved master data sources. The ever, if we could map the executed transactions
ontological data in SAP databases can be used to precisely to concepts in the defined business
extract descriptions of the transactions and related process hierarchies, we would be able to extract
entities. For instance, in the SAP database there business process models with aggregated levels,
are table structures that contain full text descrip- and relate performance indicators to higher level
tions of transactions and business processes and process definitions.
their internal relationships. In this chapter we will show how transaction
Construction and maintenance of ontologies is sequences extracted from SAP systems can be
work-intensive and has so far been a bottleneck enriched with relations to ontological concepts
to realization of many semantical technologies. and we will evaluate three techniques for mapping
867
Semantic Business Process Mining of SAP Transactions
executed transactions with the standard business Contemporary information systems (e.g.,
process hierarchies in SAP. WFM, ERP, CRM, SCM, and B2B systems)
record business events in so-called event logs.
Process mining takes these logs to discover
bAcKGrOUND process, control, data, organizational, and social
structures (van der Aalst, 2007). Within the BPM
In the past year, Semantic Web technology has life-cycle, process mining can be applied to gather
gained a substantial interest from Business Pro- knowledge about the past and find potentials for
cess Management (BPM) research. Traditional change and optimization.
process mining has successfully been shown to Approaches for semantic process mining have
extract flow models that describe how activities been proposed by incorporating ontologies, refer-
and organizational units depend on each other in ences from elements in event logs to ontological
dynamic business process environment. Semantic concepts and ontological reasoners. Ontologies
business process mining (SBPM) takes advantages define the set of shared concepts necessary for
of the rich knowledge expressed in ontologies the analysis, and formalize their relationships
and associated process instance data and extracts and properties. The references associate mean-
semantic models that enable reasoning in a wider ings to syntactical labels in event by pointing to
context than traditional process mining. SBPM defined ontology concepts. The reasoner supports
has been proposed as an extension of BPM with reasoning over the ontologies in order to derive
semantic web and semantic web service technolo- new knowledge, e.g., subsumption, equivalence,
gies in order to increase and enhance the level of etc. (Alves de Medeiros, 2008).
automation that can be achieved within the BPM Alves de Medeiros (2007) point out two im-
life-cycle (Alves de Medeiros, 2007; Ma 2007). portant potentials for leveraging process mining
868
Semantic Business Process Mining of SAP Transactions
869
Semantic Business Process Mining of SAP Transactions
Figure 2. Three SAP tables that are used to describe events related to the creation of purchase orders.
more in detail in separate database tables. USR03 human knowledge is used to structure and place
is one of the tables that describe SAP users in different concepts into hierarchical levels, but the
detail. It contains the full name of the user and population of ontological concepts are done by
describes which department the user belongs to. use of data available in the SAP tables.
LFA1 include vendor details such as their location, In real systems, the three tables in figure 2
specified by country, district and city. involve many more attributes that describe the
Based on data found in the EKKO table, we entity properties. To limit the extent of this ex-
are able to extract events for creations of purchase ample, we have only involved a subset of avail-
orders. Data in the two other tables can be used to able attributes. By including other attributes and
populate two distinct ontologies; one describing related tables into this simple process mining
the breakdown of the company into departments example, we can enrich the event further with
and employees, and one describing how coun- context details and link the event to other events
tries, districts, cities and vendors relate to each like creation of purchase requisition and receipt
other. Figure 3 shows how our example data can of order confirmations and goods.
describe events in detail and relate them to struc- In SA-MXML, the event information and on-
tured ontological data. In both of the ontologies, tologies are is stored in separate files. The event
Figure 3. An example of a “Create purchase order” event that is related to two ontological concepts
870
Semantic Business Process Mining of SAP Transactions
log files describe the process instances that are possibilities within its transactions, where detailed
carried out, the work items they consist of, rela- functions are carried out. Examples of business
tions to aggregated process definitions, involved scenarios, process groups and processes for the
users, and execution timestamps. These elements sales enterprise area are shown in figure 1.
can further point to ontological concepts by use In this paper we will focus on the sales enter-
of Uniform Resource Identifiers (URIs) . prise area for evaluating techniques for mapping
entries in transaction logs to defined business
MAPPING EXEcUtED processes. The sales enterprise area deals with the
trANsActIONs tO DEFINED tasks of performance utilization and thus organizes
bUsINEss PrOcEssEs the business relationships in the market. The task of
this enterprise area is to provide customers with the
Much process mining work assumes that event goods produced in the enterprise, or with financial
logs extracted from the IT systems contain rela- or other services offered by the enterprise. This
tions between the executed events and higher level includes the planning and control of distribution
business process definitions. Such information is channels, from advertisement, inquiry and quota-
very helpful if we want to do delta analysis. That tion processing, sales order processing, delivery
is, comparing the actual processes with predefined processing, invoicing, and down to checking of
process models. By comparing the predefined incoming payments (Keller, 1998).
process models with models discovered by use A process can be carried out by completing
of process mining, discrepancies between them one or more transactions. Figure 4a shows how
can be detected and used to improve the processes many processes transactions are involved in within
(van der Aalst, 2005). the enterprise area “sales”. Most transactions are
By linking entries in SAP transaction logs to only involved in one single process, and in aver-
aggregated business process definitions we can age a transaction is involved in 1.55 processes.
lift the models and performance indicators that we This means that for very many of the transactions
discover from process mining from a somewhat in a transaction log we can identify the correct
system technical level to higher business levels. process easily.
Predefined business process hierarchies are On the other hand, there are a significant num-
available and serialized in database tables in SAP ber of transactions that occur in many processes.
systems. As shown in Figure 1, this hierarchical For the enterprise area “sales” some transactions
structure consists of four levels. An enterprise area occur in up to eight processes. These transactions
depicts a business structure, which represent a can be seen as the most common transactions, and
homogeneous unit in the sense of process-oriented these are the transactions we find most frequently
structuring. Examples of enterprise process areas in the transaction logs. For such transactions, it
are enterprise planning, production and sales. is much more challenging to identify the correct
Business scenarios are assigned to a particular process for a given execution context.
enterprise process area, and describe on an ab- Figure 4b shows that the number of transactions
stract level the logical business flow across dif- a process can involve vary significantly. In total
ferent application areas involving the processes. the sales enterprise area consists of 59 standard
Process groups contain individual processes that processes, and in average a process involves
are bundled such that they can be visualized 10.92 transactions. Most processes contain only
more easily. Processes describe the smallest self- a handful of transactions, but there are processes
contained business sequences and represent the that can involve close to a hundred transactions.
871
Semantic Business Process Mining of SAP Transactions
Figure 4. a) Distribution of process occurrences per transaction within sales. b) Number of transaction
per process
872
Semantic Business Process Mining of SAP Transactions
Figure 5. A transaction sequence where each entry is mapped to a defined business process.
incorporating neighbor transactions of a transac- transaction codes that are included to describe
tion we have more information about the execu- the specific execution context more in detail. As
tion context and are more likely of identifying a the last two transactions are only present in the
unique and correct business process definition. process “Sales activity processing (standard)” the
Figure 1, shows an example of two processes that other process, “Subsequent debit for empties and
both include the transaction “V+01: Create Sales returnable packaging”, would not be considered as
Call”. If we have a transaction sequence where this a candidate process for this execution of “V+01:
transaction, “VC02: Change Sales Activity” and Create Sales Call”.
“VC03: Display Sales Activity” occurs together, Graph operations are an alternative approach
we can include all the three transactions to form that views the set of candidate solutions as a
a query and retrieve a business process context. graph with nodes and edges. The problem that
In a Lucene1 search environment, such a query motivated this approach is that several standard
could be expressed as +”V+01” “VC02” “VC03”. SAP processes contains exactly the same set of
The plus sign states that the following transaction potential transactions. For instance, “Master trans-
code is required to exist in the result set entries, fer for contact documents”, “Message transfer for
and this plus sign is used in front of the transaction billing documents”, “Message transfer for sales
code that we want to map with a business process documents”, and ”Message transfer for supplies”
definition. The other query terms express optional are all processes that involve exactly the same set
873
Semantic Business Process Mining of SAP Transactions
Figure 6. Typical sales processes and their transactions. The process sequences are read from left to
right.
874
Semantic Business Process Mining of SAP Transactions
Figure 7. Test set of ten transaction sequences where each entry is labeled with a correct business
process.
The test transaction sequences and their business indexing of processes identify the correct mapping
process annotations are shown in Figure 7. in 45% of the test cases. For simple lookup and
Figure 8 shows how to which extent each ap- graph operations the average scores are 42% and
proach is able to identify the correct mapping for 31% respectively. In four of the test cases they
the twelve test sequences. In average search and have the same score.
Figure 8. Percentage scores for how many correct business process mappings the three approaches are
able to identify. The scores are shown as bars for each of the 12 tests.
875
Semantic Business Process Mining of SAP Transactions
876
Semantic Business Process Mining of SAP Transactions
mining and ontological reasoning. Process min- concepts. As the reusability of such enterprise
ing is used to find out how people and systems specific ontologies are low, tools that utilize
work. Ontological reasoning provides answers available data to assist or automate parts of the
to test hypotheses, and data mining can extract ontology engineering process is of great value.
descriptive and predictive models that support In this paper we have shown how available
the whole picture. data structures in SAP systems can be utilized to
If the core of ERP systems was originally populate ontologies and construct transaction logs
designed for business process management and for semantic business process mining. We have
monitoring of process instances we would not in particular focused on the challenge of making
need techniques to identify mappings between use of the business process hierarchy definitions
historical transaction executions and defined available in SAP systems. Three approaches for
business processes. Traces of process instance mapping entries in transaction sequences with pre-
information in transaction logs would create defined business process hierarchies are evaluated,
valuable opportunities for using process mining and the results from these evaluations shows that
to describe the real business flow and measuring it is difficult to completely automate the process
the deviations against business process definitions of identify such mappings. By including a more
and procedures. However, as large software ven- complete information picture around the execution
dors needs to be backwards compatible with older of transactions, we can limit the solution spaces
systems and customers, it is difficult to do major and increase the probability of identifying correct
modification of the kernel design. Until traces of business process mappings.
process instance information are provided in the Correct mappings between transaction log
event log structures, a process miner needs tools entries and defined business processes, enable
that can assist the mapping of transaction execu- process mining techniques to construct models
tions and defined business processes. that are lifted from a somewhat system technical
transaction flow focus up to aggregated levels that
describe higher level business terms. This makes
cONcLUsION process mining models valuable both for IT and
business people.
Transaction logs in SAP systems contains sub-
stantial amount of context information that can
be utilized to create references from the execu- rEFErENcEs
tion instances to ontological concepts. Also, SAP
databases contain ontological data that describe Alves de Medeiros, A. K., Pedrinaci, C., van der
relations between concepts involved in transaction Aalst, W. M. P., Domingue, J., Song, M., Rozinat,
executions. This availability of context informa- A., et al. (2007). An outlook on semantic business
tion and ontologically structured concepts reduce process mining and monitoring. In OTM 2007
manual ontology engineering work and make SAP Workshops (pp. 1244-1255). New York: Springer.
systems a promising arena for semantic process Alves de Medeiros, A. K., van der Aalst, W. M.
mining. P., & Pedrinaci, C. (2008). Semantic process min-
General ontologies, like the Process Mining ing tools: Core building blocks. Paper presented
Ontology, are important for semantic interpreta- at the 16th European Conference on Information
tion of common process mining terms. However, Systems, Galway, Ireland.
customized domain ontologies are also important
for being able to reason over enterprise specific
877
Semantic Business Process Mining of SAP Transactions
Gulla, J. A., Borch, H. O., & Ingvaldsen, J. E. van der Aalst, W. M. P., & Weijters, A. J. M. M.
(2006). Unsupervised keyphrase extraction for (2005). Process mining. In M. Dumas, W.M.P. van
search ontologies. In Natural Language Process- der Aalst & A.H.M ter Hofstede (Ed.), Process
ing and Information Systems (pp. 25-36). New aware information systems (pp. 235-255). Wiley
York: Springer. Interscience
Ingvaldsen, J. E., & Gulla, J. A. (2007). Prepro-
cessing support for large scale process mining of
SAP transactions. In Business process manage- KEy tErMs AND DEFINItIONs
ment workshops (pp. 30-41). New York: Springer.
Process Mining: Research area that aims at
Keller, G., & Teufel, T. (1998). SAP R/3 process creating tools for discovering process, control,
oriented implementation. Reading, MA: Addison- data, organizational and social structures from
Wesley. event logs.
Ma, Z., Wetzstein, B., Heymans, S., & Anicic, D. SAP Systems: ERP solutions delivered by
(2007). Semantic business process repository. In SAP for large organizations.
Proceedings of the International Workshop on Semantic Business Process Management
Semantic Business Process Management (SBPM (SBPM): An extension of BPM with semantic web
2007), CEUR Proceedings. and semantic web service technologies in order
to increase and enhance the level of automation
Pang, C., Eschinger, C., Dharmasthira, Y., & Mo- that can be achieved within the BPM life-cycle
toyoshi, K. (2007). Market share: ERP software, Transaction: A small application within SAP
worldwide, 2006. Gartner report. systems that have a unique transaction code.
Pedrinaci, C., & Domingue, J. (2007).Towards an Transaction Log: Data source in a transaction
ontology for process monitoring and mining. In based information system that describes histori-
Proceedings of the Workshop on Semantic Busi- cal events.
ness Process and Product Lifecycle Management Transaction Sequence: An ordered chain of
(SBPM-2007), CEUR-WS events that describe transaction carried out, how
they depend on each, when they were executed,
van der Aalst, W. M. P., Reijers, H. A., Weijters, and relations to involved entities like users, ven-
A. J. M. M., van Dongen, B. F., Alves de Me- dors, products, etc.
deiros, A. K., Song, M., & Verbeek, H. M. W.
(2007). Business process mining: An industrial
application. Information Systems, 32(1), 713–732. ENDNOtE
doi:10.1016/j.is.2006.05.003
van der Aalst, W. M. P., van Dongen, B. F., Gün-
1
Lucene is an open source information
ther, C. W., Mans, R. S., Alves de Medeiros, A. K., retrieval library, supported by the Apache
Rozinat, A., et al. Verbeek, H. M. W., & Weijters, Software Foundation. See: http://lucene.
A. J. M. M. (2007). ProM 4.0: Comprehensive apache.org/
support for real process analysis. In Petri Nets
and Other Models of Concurrency – ICATPN
2007 (pp. 484-494). New York: Springer.
This work was previously published in Handbook of Research on Complex Dynamic Process Management: Techniques for
Adaptability in Turbulent Environments, edited by Minhong Wang and Zhaohao Sun, pp. 416-429, copyright 2010 by Informa-
tion Science Reference (an imprint of IGI Global).
878
879
Chapter 3.21
Mining Association Rules
from XML Documents
Laura Irina Rusu
La Trobe University, Australia
Wenny Rahayu
La Trobe University, Australia
David Taniar
Monash University, Australia
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Mining Association Rules from XML Documents
(Laurent, Denilson, & Pierangelo, 2003). The concerned with analysing texts within the XML
first immediate problem for the researchers was document, structural clarification is concerned
how to represent the data contained in the old with determining similar documents based on
relational databases using this new format, so their content (Nayak, 2005; Nayak et al., 2002).
various techniques and methodologies have been Discovering association rules is looking for
developed to solve this problem. Next, the users those interesting relationships between elements
realised that they not only required storing the data appearing together in the XML document, which
in a different way, which made it much easier to can be used to predict future behaviour of the
exchange data between various applications, but document. To our knowledge, this chapter is the
they required getting interesting knowledge out first work that aims to put together and study the
of the entire volume of XML data stored as well. existing techniques to perform the mining of as-
The acquired knowledge might be successfully sociation rules out from XML documents.
used in the decisional process to improve business
outcomes. As a result, the need for developing new
languages, tools, and algorithms to effectively Background
manage and mine collections of XML documents
became imperative. The starting point in developing algorithms and
A large volume of work has been developed, methodologies for mining XML documents was,
and research is still pursued to get solutions that naturally, the existing work done in the relational
are as effective as possible. The general idea and database mining area (Agrawal, Imielinski, &
goal for researchers is to discover more power- Swami, 1993; Agrawal & Srikant, 1998; Ashrafi,
ful XML mining algorithms that are able to find Taniar, & Smith, 2005; Ashrafi, 2004; Daly & Ta-
representative patterns in the data, achieve higher niar, 2004; Tjioe & Taniar, 2005). In their attempt
accuracy, and be more scalable on large sets of to apply various relational mining algorithms to
documents. The privacy issue in knowledge dis- the XML documents, researchers discovered that
covery is also a subject of great interest (Ashrafi, the approach could be a useful solution for min-
Taniar, & Smith, 2004a). ing small and not very complex XML documents,
XML mining includes both the mining of but not an efficient approach for mining large and
structures as well as the mining of content from complex documents with many levels of nesting.
XML documents (Nayak, 2005; Nayak, Witt, & The XML format comes with the acclaimed
Tonev, 2002). The mining of structure is seen extensibility that allows the change of structure,
as essentially mining the XML schema, and it that is, adding, removing, and renaming nodes in
includes intrastructure mining (concerned with the document according to the information nec-
mining the structure inside an XML document, essary to be encoded in. Furthermore, using the
where tasks of classification, clustering, or as- XML representation, there are a lot of possibilities
sociation rule discovering could be applied) and to express the same information (see Figure 1 for
interstructure mining (concerned with mining the an example) not only between different XML
structures between XML documents, where the documents, but inside the same document as well
applicable tasks could be clustering schemas and (Rusu, Rahayu, & Taniar, 2005a).
defining hierarchies of schemas on the Web, and In a relational database, it is not efficient to
classification is applied with name spaces and have multiple tables to represent the same data
URIs [uniform resource identifiers]). The min- with different field names, types, and relationships
ing of content consists of content analysis and as the constraints and table structures are defined
structure clarification. While content analysis is at the design time. In an opposite manner, a new
880
Mining Association Rules from XML Documents
Figure 1. Different formats to express the same information using the XML structure
881
Mining Association Rules from XML Documents
cess, and it is compulsory that they are observed purchases in a store for March 2005 and June 2005
by the determined rules. In the Apriori algorithm, might come as two separate static XML documents
all the large k-itemsets are determined, start- if the business process stores the data at the end of
ing from k=1 (itemsets with only one item) and each month). Dynamic XML documents contain
looping through D (the set of all transactions) to data that are continuously changing in time (an
calculate its support and the confidence. If they online bookstore, for example, will change its
are not validated against the minimum required, content, represented as an XML document, from
the k-itemset is considered to be not large and is one day to another, or even multiple times dur-
pruned. The algorithm assumes that any subset ing the same day depending on the e-customers’
of items that is not large determines its parent behaviour).
(i.e., the itemset that contains it) to not be large, Most of the work done in the area of mining
and this improves the speed of the process a lot. association rules from static XML documents use
At the end, when all the large itemsets are found, classical algorithms based on the Apriori algo-
association rules are determined from the set of rithm, described before in the overview section,
large itemsets. while a number of non-Apriori-based approaches
have been developed as well. In this chapter we
Overview of XML Association Rules will analyse at least one of each type of algorithms.
In case of dynamic XML documents, the fo-
For the XML documents, finding association cus is on mining association rules out of historic
rules means finding relationships between simple versions of the documents or out of the effective
or complex elements in the document: in other set of changes extracted between two successive
words, finding relationships between substructures versions. The difference between two versions
of the XML document. For example, in an XML of the same XML document is named delta, and
document containing details of the staff members it can be (a) structural delta, when the difference
and students in a computer-science university between versions is done at the schema level, or (b)
department, including details of their research content delta, when the difference is calculated at
publications, an association rule could be “Those the content level (Chen, Browmick, & Chia, 2004).
staff members who publish their papers with X
publisher received an award, and this happens
in 75% of cases.” Later in the chapter (see the Discovering Association
section on Apriori-based approaches), we give Rules from Static
some examples of how the generic concepts of XML Documents
transaction and item are perceived by the XML
association rules. We will also show how the con- As specified in the background section, some
cepts of support and confidence are used by the of the XML association rule mining techniques
presented approaches as they need to be correct use the Apriori general algorithm (Agrawal et
with regard to the total number of XML transac- al., 1993; Agrawal & Srikant, 1998) as a starting
tions that need to be mined. point for developing new methodologies specific
Our analysis is split in two subsections based to the XML document format and extensibility,
on the type of XML documents mined, that is, while completely different techniques have been
(a) static XML documents and (b) dynamic XML developed as well. The following analysis is
documents. Static XML documents contain data split in two subsections depending on the type of
gathered for a specific period of time that do not mining algorithm used, that is, (a) Apriori-based
change their content (for example, details about approaches and (b) non-Apriori-based approaches.
882
Mining Association Rules from XML Documents
Figure 2. Example of a direct association-rule mining algorithm using XQuery (Wan & Dobbie, 2003,
2004)
883
Mining Association Rules from XML Documents
Figure 3. Example of an XML document presented as a tree (research.xml) with the identified context,
body, and head
884
Mining Association Rules from XML Documents
tions D relevant to the mining problem (Braga, The working document is defined in the first
Campi, Ceri et al., 2002). Referring again to our line, then the context, body, and head areas are
example (Figure 3), we may want to look for as- defined together with the minimum support and
sociation rules considering all the authors in the minimum confidence required for the rules. The
document, but only for publications after the year WHERE clause allows constraint specification;
2000, so a constraint needs to be defined on the in this example, only publications after 2000 will
“year” attribute of each publication element (not be included in the context of the operator.
visible in the graph, but existing in the original The XMINE RULE operator brings some
XML document). improvements, which could not be solved by the
If we talk about an association rule as an impli- direct association rule mining algorithm in one
cation X→ Y, X is the body of the rule and Y is the step which uses XQuery, described at the begin-
head of the association rule. The body and head ning of the section, as follows:
are always defined with respect to the context of
the rule as the support and the confidence will be •)>> The context, body, and head of the operator
calculated and relevant only with respect to the can be as wide as necessary by specifying
established context. In the XML association rule multiple areas of interest for them as parts
case, the body and the head will be, in fact, two of the XML document or even from differ-
different lists of nodes, that is, substructures of the ent XML documents.
context list of nodes; only nodes from these two •)>> When specifying the context, body, and
lists will be considered to compose valid XML head segments, a variable can be added to
association rules. take some specific values that enhance the
We exemplify the above described concepts, context selection facility.
that is, context identification, context selection, •)>> A GROUP clause can be added to allow the
and the head and body of the rules, by using the restructuring of the source data.
XMINE RULE operator (Braga et al., 2003) on
the working example in Figure 3, that is, the We exemplify how the first feature can be
“research.xml” document. implemented using the same working example,
We visually identify the mentioned concepts that is, the “research.xml” document. Suppose we
in Figure 4, which details the algorithm proposed now want to determine rules between publishers
by Braga et al. (2003) and Braga, Campi, Ceri, and keywords, that is, to find which publishing
et al. (2002). companies are focusing on specific areas of re-
Figure 4. Mining association rules from an XML document using the XMINE RULE syntax
885
Mining Association Rules from XML Documents
Figure 5. The syntax of the XMINE RULE operator introduced by Braga et al. (2003)
search. See Figure 5 for a visual representation al., 2003) because it limits from the beginning the
of the new body and head selections. possibility to find and extract other rules (involv-
The main difference from the one-step mining ing other parts of the documents).
approach (Wan & Dobbie, 2003, 2004) is that the
three-step algorithm (Braga et al., 2003; Braga, Extracting Association Rules
Campi, Ceri et al., 2002; Braga, Campi, Klemet-
tinen et al., Klemettinen, 2002) does not work For the one-step mining approach, Figure 2
directly on the XML document all the way down exemplifies the XQuery implementation of the
to the phase of extracting the association rules; generic Apriori algorithm. It mainly performs the
instead, the first phase, that is, preprocessing, has following steps. Starting from the 1-itemsets (i.e.,
as a final output a relational binary table (R). The itemsets with one single item), a k-itemset (k>1)
table is built as follows (the authors suggest the is built by extending the (k-1)-itemset with a new
use of the Xalan, 2005, as an XPath interpreter item. For each itemset, the support is calculated as
in the actual implementation): (a) The fragments a percentage of the total number of transactions that
of the XML document specified in the context, contain all the items of the itemset. If the itemset
body, and head are extracted and filtered by ap- is not frequent (large) enough (i.e., its support is
plying the constraints in the WHERE clause (in less than the minimum support required), it will
case one exists), (b) the XML fragments obtained be removed (pruned), and the algorithm continues
by filtering the body and head will become col- with the next itemset until all the large itemsets are
umns in the relational table R, (c) the XML frag- determined. Before the calculation of an itemset’s
ments obtained by filtering the context will become support to decide on pruning or keeping it, the
rows in the table R, and (d) by applying a contains itemset is considered to be a candidate itemset
function (which, for a given XML fragment x and (i.e., possibly large) if all its sub sets are large
an XML fragment y, returns 1 if x contains y, and (i.e., observe the minimum support required).
0 otherwise), the binary relational table R is ob- The association rules are determined from the
tained, which will be used during the rule-extrac- largest itemsets extracted, and for each of them
tion step to determine binary association rules a confidence is calculated as follows: For a rule
applicable to the XML document. X→Y, its confidence is equal to the percentage
The selection done during the preprocessing of transactions containing X that also contain Y.
phase, by specifying the context, the body, and In the three-step approaches presented in the
the head of the association rules, is considered previous subsection, after obtaining the binary
by some researchers not generic enough (Ding et table R in the preprocessing phase, any relational
886
Mining Association Rules from XML Documents
association rule algorithm can be applied (e.g., were based on the Apriori algorithm sequence.
generic a priori) to get the relationship between The main feature is that this framework (Feng,
the binary values in the table, which represent Dillon, Wiegand, & Chang, 2003) considers
the existence of an XML fragment inside another in more detail the specific format of the XML
XML fragment. The steps of the generic Apriori documents, that is, their possible representation
algorithm have been detailed in the previous para- as trees. We recall that at the beginning of the sec-
graph. In the particular case of the binary matrix tion on Apriori-based approaches, we proposed a
R, the rows of the matrix will be transactions to translation of the terms transaction and item into
be mined by the algorithm. The binary knowledge some concepts more specific to XML association
extracted at this step will signify the simultaneous rule mining. The non-Apriori-based framework
presence of fragments from the body or head in discussed in the current section proposes a dif-
the selected context. ferent mapping of the above terms to tree-like
structured XML documents.
Postprocessing Phase The work of Feng et al. (2003) aims to dis-
cover association rules from a collection of XML
After the extraction of the binary association documents rather than from a single document,
rules from the relational table during the second hence each XML document or tree corresponds
step, they will be transformed back into XML- to a database record (transaction), where each
specific representations of the discovered rules. XML fragment (subtree) corresponds to an item
We remember from the preprocessing step that the in the transaction. In this context, the framework
filtered XML fragments obtained by applying the proposed intends to discover association rules
body and head path queries on the XML docu- among trees in XML documents rather than among
ment became columns in the table, while filtered simple-structured items. Each tree is named a
XML fragments obtained by applying the context tree-structured item and is a rooted, ordered tree
path queries became rows. Reversing the process, having its nodes classified into (a) basic nodes with
together with the new knowledge determined, no edges emanating from them and (b) complex
that is, the association rules between the binary nodes, which are internal nodes with one or more
values, we get an XML structure in which each edges emanating from them. In Figure 7 we pres-
<rule> element has two attributes, support and ent some of the concepts introduced to define the
confidence, and two child elements, <body> and framework for mining XML association rules.
<head>, where the fragments of the body and head
participating in the rule are listed. An example
of the result of applying the XMINE algorithm
Figure 6. Example of XML association rules ob-
is presented in Figure 6, in which the following
tained by applying the XMINE RULE algorithm
rules are given: “Author A → Author H has 85%
support and 20% confidence” and “Author H and
Author B → Author A has 70% support and 22%
confidence.”
Non-Apriori-Based Approach
887
Mining Association Rules from XML Documents
Figure 7. Example of two tree-structured items in the framework for mining XML association rules as
proposed by Feng et al. (2003)
In Figure 7, there are two tree-structured items, nodes sharing the same parent. For example,
the <PERSON> and <ITEM> elements, ex- in Figure 7, Posi(n2,4)=last() means the Title
tracted from the order.xml example document node with the Star War Game content is the
(Feng et al., 2003), in which the nodes n1,1, n2,1, title of the last ordered CD.
n2,2, and n2,3 are complex, while n1,2, n1,3, n1,4, n2,4,
n2,5, and n2,6 are basic. The edges inside the trees In this framework, a well-formed tree is a tree
are labeled depending on the type of relationship that observes three conditions: (a) It has a unique
between the nodes. There are two types of labels root node, (b) for any chosen edge in the tree, if
attached to edges: ad (ancestor-descendant) and it is labelled ad, it will link a complex node with
ea (element-attribute). In Figure 7, the edge that a basic node, while if it is labeled ea, the source
connects the PERSON with the Profession node node needs to be a complex node, and (c) all the
is labeled ea because Profession is an attribute of constraints are correctly applied, that is, a level
the PERSON in the XML document. All the constraint can be applied only on an ad edge, while
other edges are labeled ad as they represent con- an adhesion constraint can be applied only on an
nections between a parent node and a child node. ea edge. Using the above described concepts, the
There are three types of constraints that can be subtree concept (subitem) is defined based on the
imposed on nodes and edges, as follows. definition of the subtree relationship. A tree T
with root r is a subtree of the tree T’ with root r’
1. )>> Level constraints: If e is an ad relationship (noted T ≤tree T’) if and only if there is a node n’
nsource→ntarget, Level (e)=m (m integer) means in T’ such that r is a part of n’ (noted r ≤node n’).
that ntarget is the mth descendant of the nsource. We refer the reader to the original paper (Feng et
2. )>> Adhesion constraints: If e is an ea rela- al., 2003) for more details and explanations on
tionship nsource→ntarget, Adhesion(e)=strong these concepts.
means that ntarget is a compulsory attribute of Finally, the association rule is defined as an
nsource, while Adhesion(e)=weak means that implication T1→T2 that satisfies two conditions.
ntarget is an optional attribute of the nsource.
3. )>> Position constraints: They refer to the actual 1. )>> X ⊂ T, Y ⊂ T and X ∩ Y = ∅, where T is the
contextual position of the node among all the set of tree-structured items and
888
Mining Association Rules from XML Documents
2. )>> For any Tm and Tn ∈ (X ∪ Y), there is no tree presented in this chapter consists of the way they
Tp that can satisfy the conditions Tp ≤tree Tm perceive the notion of item, which they consider
and Tp ≤tree Tn. in their mining algorithms. While the former ones
extract the items to be mined as a list of nodes
An example of the association rule in terms by querying the XML document for a specific
of tree-structured items (named XML-enabled path, for the last one, each subtree (substructure)
association rules by the authors) is presented in in the XML document tree representation is an
Figure 8. item and the framework actually looks to discover
The rule exemplified in Figure 8 tells that if a association rules between the substructures of the
male person orders a CD with the title Star War document.
Game, he will also order two books, that is, Star Another significant difference resides in the
War I and Star War II, in this order. Though an number of XML documents allowed by the al-
algorithm to implement the above described gorithms and the degree of the complexity of the
framework is still under development, the obtained documents (levels of nesting). Sometimes we may
association rules are powerful as they address the want to find association rules from a single XML
specific format of the XML documents; the as- document (e.g., books in a library) or from two or
sociated items are hierarchical structures, not more XML documents (e.g., documents containing
simple nodes. Furthermore, they carry the notion books in a library, one containing personal details
of order, as exemplified by rule in Figure 8. of the authors and the third containing sales of the
books for a period of time). If we have a collection
Summary of Association of XML documents, it is probable that we will
Rule Mining Techniques for get more interesting information by analysing all
Static XML Documents the documents together instead of one at a time.
The simple (one-step) XML association rule
To conclude this section, we make some com- mining techniques (Wan & Dobbie, 2003, 2004)
ments on the major differences between the above are considering one single document, with a
discussed XML association rule techniques and simple structure (see Figure 2a), for example, an
the degree of the possible generalization of them, XML document containing transactions in a su-
considering both the number of XML documents perstore, with the corresponding purchased items.
mined at once and the structure of these docu- The authors state that their proposed algorithm
ments, together with some experimental results “works with any XML document, as long as the
of the authors. structure of it is known in advance” (p. 94), but
The main difference between the Apriori-based they consider that applying their algorithm to an
approaches and the non-Apriori-based framework XML document with a more complex structure
889
Mining Association Rules from XML Documents
is still an open issue from the performance point time in the future for business purposes. In this
of view. case, a high degree of redundancy might appear,
The three-step approaches (Braga et al., 2003; and the user will end up with a large collection
Braga, Campi, Ceri et al., 2002; Braga, Campi, of XML documents in which a large amount of
Klemettinen et al., 2002) are designed to work information is repeated.
with more complex-structured XML documents The issue for researchers was how to efficiently
(see the example in Figure 3 with five levels of store all these versions so the user will be able to
nesting). Still, the structure of the document needs get a historic version of the document with as less
to be known in advance as the context, body, and redundancy of information as possible. Moreover,
head of the association rules should be defined at a new question was raised about what kind of
the beginning of the algorithm. The authors ac- knowledge can be discovered from the multiple
knowledge that, even if the experiments were done versions of an XML document; the goal in the
without considering efficiency as a main concern, case of mining dynamic XML documents would
the results proved excellent performance when be to find a different type of knowledge than can
using the Xalan (2005). Also, the experimental be obtained from snapshots of data. For example,
results showed that only a small percentage of time some parts of the XML document representing the
was spent for preprocessing and postprocessing the online store could change more often, and some
XML document, while the actual mining was the other parts could change together; for instance,
slowest phase. The authors reckon that any future deletions could appear more often than updates,
step in the XQuery development to allow more and so on. All this information could be usefully
complex conditions in filtering XML documents utilised by the end user in making business deci-
will determine a substantial improvement of the sions related to the online store’s content.
mining step’s efficiency and speed. In this section, we will first refer to the work
done for versioning XML documents, that is,
methodologies that efficiently store the chang-
Discovering Association ing XML documents in a way that allows the
Rules from Dynamic fast retrieval of the historic versions. They will
XML Documents include our own proposed solution to the issue of
versioning dynamic XML documents to collect
As specified in the background section, this section all the changes between versions in a single XML
details some of the work done for dynamic XML document, named consolidated delta. Finally, we
document versioning and mining. A dynamic XML will describe our proposed solution for mining
document is one that is continually changing its association rules from changes supported by the
content and/or structure in time depending on the dynamic XML documents.
data requested to be stored at a certain moment. Most of the methodologies addressing the
An example could be the content of an online issue of versioning XML documents are based
bookstore, where any change in the number of on the concept of the delta document (Cobena,
existing books, their prices, and/or availability Abiteboul, & Marian, 2005; Marian, Abiteboul,
will affect the content of the XML document that Cobena, & Mignet, 2001). This is calculated and
stores this information. The possible user (e.g., the built by comparing two consecutive versions of
online store manager) might decide to store each the XML document and recording the changes
new version of the XML document, which results that have been taking place.
after each change, so he or she would be able to XML versioning techniques come to solve two
refer to the history of the store’s content at any main issues (Zhao, 2004), as follows:
890
Mining Association Rules from XML Documents
1. )>> The querying time can be improved by operations capable to transform the initial version
limiting the amount of data that need to be of the document (Di) into the final version (Di+1).
queried if the result of the same query in the Furthermore, based on the observation that the
previous state of the document is already delta ∆i is not enough to transform Di+1 back into
known. Di, the authors introduce the notion of completed
2. )>> Storing historical structural deltas (the actual delta. This is a delta that contains more informa-
changes) of the XML documents can help tion and works both forward and backward, being
to find knowledge (e.g., association rules) able to obtain Di or Di+1 when the other version
not just for snapshot data (as in mining static is available.
XML documents), but also considering their In our working example (Figure 9), the for-
evolution in time. ward, backward, and completed deltas are shown
in Figure 10.
For a better understanding of the differences In the example in Figure 10, T1 is the tree
between the XML versioning techniques, we rooted at node 11, that is, the <price> node, while
will exemplify them on two versions of an XML T2 is the tree rooted at node 3, the <name> node.
document (catalog.xml), which contains data These two trees will be included in the com-
about some products in an online store (Figure 9). pleted delta XML document. In the delete and
A change-centric management of versions in insert sequences, the first parameters are the par-
an XML warehouse was first introduced by Mar- ent node, the second parameters are the affected
ian et al. (2001). They consider a sequence of node positions, and the third parameters are the
snapshots of XML documents and, for each pair trees rooted at the affected nodes. In the update
of consecutive versions, the algorithm calculates sequences, the first parameters are the affected
a delta document as the difference between them. nodes, the second ones are the new values, while
Delta ∆i is a sequence of update, delete, and insert the third parameters are the old values.
Figure 9. Two consecutive versions of the same XML document, catalog.xml, with corresponding IDs,
in both XML document format and trees
891
Mining Association Rules from XML Documents
In this approach (Marian et al., 2001), a pre- For our working example, the minimum edit
sumptive XML warehouse will need to store the script generated by X-Diff would be:E= {delete
initial version of an XML document together with (3), update (5, “Available”), update (7,300), insert
all the completed deltas calculated in time so the (4, (Price, 160)}.
model will be able to successfully solve different As it can be noticed, the insert operation does
versioning requests. At the same time, the authors not include the position of the new inserted node
acknowledge that one of the most important issues because the X-Diff technique is focused on the
in their approach is the storage of the redundant unordered XML trees, and the position of the node
information (e.g., both the old version and new is not considered important for the algorithm.
version of elements consecutively updated will A novel way of storing changes in time with
be stored in the completed deltas). less overhead was proposed by Rusu, Rahayu, and
Another change detection algorithm, X-Diff, Taniar (2005b). In this approach, earlier versions
was proposed by Wang, DeWitt, and Cai (2003), of the documents can be easily queried and the
focusing on unordered XML document trees degree of redundancy is very small. Our algorithm
(where the left-to-right order among siblings is replaces the way of storing differences between
not important). They argue that an unordered tree two versions of an XML document in deltas and
model is more appropriate for most applications keeping all the deltas in the warehouse with a
than the ordered model (where both the ancestor- new concept of consolidated delta, in which
descendant and the left-to-right order among changes between versions are recorded in a new
siblings are important) and propose a methodol- XML document, modified any time a new ver-
ogy that detects changes in XML documents by sion appears. The main idea is to build a single
integrating specific XML structure characteristics (consolidated) XML delta document containing
with standard tree-to-tree correction techniques. all the changes supported by the versioned XML
We do not detail here the X-Diff algorithm, but document in the T1–Tn period of time by introduc-
mainly, it performs the followings steps to deter- ing a new temporal element (namely, <stamp>)
mine the minimum-cost edit sequence that is able to store the changes at each time stamp for each
to transform document D1 into document D2. (a) altered element. Each <stamp> element has two
It parses the D1 and D2 documents and builds the attributes: time to store the time stamp and delta
associated T1 and T2 trees while at the same time, to store the type of change (delta can take one of
it computes an XHash value for every node used the values inserted, modified, or deleted).
to represent the entire subtree rooted at the node. To exemplify the consolidated delta approach,
(b) It compares the XHash values for the roots and Figure 11 shows another set of changes that have
decides if the trees are equivalent (when the XHash been applied to the document in Figure 9. The
values are equal); otherwise, it calculates min(T1, changes between Version 1 and Version 2 are re-
T2) as a minimum-cost matching between trees. corded in the first consolidated delta (left), which
(c) It determines the generated minimum-cost edit is built starting from the initial version (Version 1),
script E based on the min (T1,T2) found at step b. adding the <stamp> elements as explained before.
892
Mining Association Rules from XML Documents
Similarly, after another set of changes happen at If a parent is deleted at the time Ti, all its children
time T3 (Version 3), new <stamp> elements are will be deleted so they will not appear in the
added and the consolidated delta is updated to consolidated delta for that particular time stamp
reflect these (right). Every time the consolidated or for any time stamp after that.
delta is modified to reflect new changes, there To get a high speed in building the consoli-
are rules to be observed in order to increase the dated delta, we assign unique identifiers to ele-
efficiency of the algorithm and eliminate the re- ments in the initial XML document and store the
dundancy as much as possible; we list them here, maximum ID value. When new elements are in-
as follows. (a) If all the children are unchanged, serted in a following version, they will receive
the parent is unchanged. If a parent is unchanged at IDs based on the existing maximum ID so at any
the time Ti, its children are not marked (stamped) time, one element will be uniquely identified and
for that particular time stamp; they will be easily we will be able to track its changes.
rebuilt from the existing previous versions of their The two big advantages of the consolidated
parents. (b) If any of the children are modified, approach are the following: (a) There is a very
deleted, or inserted, the parent is modified. If a small degree of redundancy of the stored data
parent is modified at the time Ti, all its children as unchanged data between versions will not
will be stamped, each with their own status, that be repeated, and (b) it is enough for the user to
is, modified, inserted, deleted, or unchanged. (c) store the calculated consolidated delta to be able
Figure 11. Example of the consolidated delta after two series of changes applied to the initial XML
document catalog.xml
893
Mining Association Rules from XML Documents
to get an earlier version of the document at any has the modified value, if the element is a complex
time. We have tested the algorithm of building the one (it has children), we analyse the changes for
consolidated delta and it has excellent results for each of its children elements; they may have a
various dimensions of XML documents. modified, deleted, added, or unchanged value as
well. If the element is not a complex one, we take
Versioning Dynamic XML its value. (b) When the delta has the inserted
Documents Using the value, if it is a complex element, all its children
Consolidated Delta Approach were inserted, too; so, we take their values as they
are returned for the Ti time stamp. If the element
The consolidated delta is a very efficient tool is not a complex one, we take its value. (c) When
when the user wants to retrieve an old version the delta has the deleted value, if the parent ele-
of the document. Suppose the latest version of ment was deleted (together with its children) at
the document is at the moment Tn in time (see the time Ti, the consolidated delta will contain the
Figure 12), and the user wants to determine the deleted value for the delta and no children details;
effective look (structure and content) for the XML consequently, the element will not appear in the
document at a moment Ti, where i<n (i=3 in the built version document. (d) When the delta has
example in Figure 12). Using the consolidated the unchanged value, we know a complex un-
delta, he or she does not need to re-create the changed element does not include its unchanged
entire set of intermediate documents from Tn to children; so if we find an unchanged element, we
Ti (Tn→Tn-1, Tn-1→Tn-2….Ti+1→Ti). Instead, the will query backward for each of the Ti-1, Ti-2, and
consolidated delta can be directly queried to get so forth, and earlier time-stamp changes until we
the elements that have <stamp> elements with a get to a version without an unchanged delta at-
Ti value of the time attribute. This query will not tribute or until we get to the initial D1 version of
return at once the entire structure and content the document (included in the consolidated delta
of the XML document at the moment Ti — this as a starting point).
would be an ideal output. We still have to query
backward in the history of certain elements, but Mining the Changes Extracted
only for a limited number, that is, the unchanged from Dynamic XML Documents
ones as the modified or inserted elements will
contain the actual values at the time Ti. In our view, there are two different ways to ap-
When an earlier version is required, the con- proach the task of mining dynamic XML docu-
solidated delta document is scanned starting from ments. Supposing there is a collection of versions
the root, and for each element, the algorithm of n dynamic XML documents stored in an XML
determines if the delta attribute has one of the data warehouse, composed by using one of the
modified, deleted, added, or unchanged values, above presented methods, the user might be in-
building, at the same time, the required Di version terested in discovering either of the following:
of the document as follows. (a) When the delta
Figure 12. Using consolidated delta to get an earlier version of an XML document
894
Mining Association Rules from XML Documents
a. )>> Interesting knowledge (in our case, associa- & <description> inserted value=“good book” &
tion rules) that can be found in the collection <price> inserted value=“25”;
of historic versions of the document(s) In a generalized Apriori-based algorithm,
b. )>> Association rules extracted from the actual the set of items I will be the list of all distinct
changes between versions, that is, from the elements from the initial XML document. In our
differences recorded in delta documents example, I = {<catalog>, <product>, <status>,
<name>, <description>, <price>}. The extracted
There was some work done to discover fre- changes will form the set of transactions D, where
quently changing structures in versions of XML each transaction T from D is a set of items from
documents (Chen et al., 2004; Zhao, Bhowmick, I represented by one set of changes extracted for
Mohania, & Kambayashi, 2004; Zhao, Bhowmick, one time stamp Ti, 2<i<n. A possible association
& Mandria, 2004) applicable more to discovering rule will be an implication X→Y where X, Y ⊂ I
the first type of knowledge (Case a above). We and X ∩ Y =∅. The rule’s support and confidence
do not detail them here; instead, we will propose will be calculated with regard to the total number
a novel method of mining changes extracted of changes extracted. Dynamic association rules
from dynamic XML documents (applicable for discovered in this way could give precious infor-
the second type of knowledge, Case b above) by mation about the relationship between changes af-
using the consolidated delta described earlier in fecting specific parts of the initial XML document.
the previous subsection. Mainly, mining is done For example, it could be found that the insertion
by extracting the set of changes for each time Ti of new products determine a fall in the availability
(2<i<n, where n is the total number of versions of certain products. We are currently working on
and Ti is the time of each set of changes) as a set implementing and proving the efficacy of this
of transactions. After that, we mine them apply- mining algorithm.
ing one of the classic algorithms for discovering
association rules, for example, the a priori one Summary of Association
(Agrawal et al., 1993). Because the implementa- Rule Mining Techniques for
tion of the actual algorithm is still under review, Dynamic XML Documents
we will give only a general description of the
technique using an example. In this section, we have presented some of the
We consider again the consolidated delta ex- state-of-the-art work in the area of recording
ample in Figure 10. If we extract only the changes changes between versions of dynamic XML
from the consolidated delta for each of the times documents, detailing more on the consolidated
T2 and T3, we get the following two transactions: delta approach, which is an effective way to store
At time T2 → <catalog> modified & <prod- successive changes of the documents in a single
uct> modified & <name> deleted & <price> document. Then, we have presented an algorithm
inserted value=“160” & <status> modified for extracting a historic version of the document
value=“Available” & <price> modified val- at any time where its versions are stored by us-
ue=300; ing the consolidated delta approach. Finally, we
At time T3 → <catalog> modified & <prod- presented our view on mining the set of changes
uct> modified & <description> modified value=“A extracted for a given period of time.
new stuff” & <price> modified value=“150” & The methods presented for storing the changes
<price> modified value=“400” & <product> in- between versions of the XML documents are all
serted & <status> inserted value=“Not available” using the concept of delta as a difference between
two consecutive versions of the XML document,
895
Mining Association Rules from XML Documents
but each approach comes with its own definition static XML documents need to know from
and implementation as the target is to find the most the beginning which are the specific ar-
efficient representation that is easy to interrogate eas they need to look at to find either the
and mine later on. While the work of Marian et antecedent or the consequent of the asso-
al. (2001) proposes building a consolidated delta ciation rule. In this context, future work is
as a set of instructions able to reverse the initial needed to improve the existing methodolo-
version of the document to the final one and vice gies in terms of generalization (Buchner,
versa for ordered XML documents, the technique Baumgarten, Mulvenna, Bohm, & Anand,
introduced by Wang et al. (2003) is similar but 2000; Garofalakis, Rastogi, Seshadri, &
focuses on unordered XML documents. A different Shim, 1999). Finding algorithms with a
approach is given by Rusu, Rahayu, and Taniar high degree of generalization is imperative
(2005), in which the proposal is to record the as scalability is a priority for the current
historic changes in one single document, named and future XML-driven applications.
consolidated delta, that is easy to be queried when •)>> Mining association rules from dynamic
the user needs to extract an old version of the XML documents (i.e., documents that
document. The same consolidated delta approach change their content in time to allow dif-
can be used to perform the mining of association ferent formats of data): Dynamic mining
rules out of the set of changes applied to the initial is still a very young area in which a lot of
document, returning possible interesting informa- research has been undertaken. From our
tion about the relationships between changes and perspective, intense activity in this field
their influences on the XML document’s behaviour will be noticed soon as Web applications
in the future. are used on a large scale and manipulate
dynamic data. Besides association rules,
researchers are looking to find other types
Future Trends of patterns in dynamic XML documents,
that is, structural changes from an XML
In this section, we present our view on the future document version to another, and content
trends in the area of mining XML documents, changes. Our next research work is to im-
considering how the existing work answers pos- plement and evaluate a mining algorithm
sible user needs. able to discover association rules and other
types of knowledge from the sequence of
•)>> Mining association rules from static actual changes of dynamic XML docu-
XML documents (i.e., documents that ments. The outcome of this work will be
are not changing their content in time): very useful in finding not only what the
In this area, the majority of the research patterns are in the changing documents,
work has been focused not so much on de- but also how they relate to one another and
termining generic association rules (what how they could affect the future behaviour
type of knowledge can be extracted from of the initial XML document.
a certain XML document or from a col-
lection of XML documents), but more
on seeking a confirmation of possible as- Conclusion
sociation rules between elements or parts
of the document. For example, the major- This chapter is a systematic analysis of some of the
ity of the presented algorithms for mining existing techniques for mining association rules
896
Mining Association Rules from XML Documents
out of XML documents in the context of rapid Ashrafi, M. Z., Taniar, D., & Smith, K. (2005).
changes and discoveries in the Web knowledge An efficient compression technique for frequent
area. The XML format is more and more used to itemset generation in association rule mining.
store data that now exist in the traditional rela- In Proceedings of International Conference in
tional-database format, and also to exchange them Advances in Knowledge Discovery and Data Min-
between various applications over the Internet. ing (PAKDD 2005) (LNCS 3518, pp. 125-135).
In this context, we presented the latest dis- Heidelberg, Germany: Springer-Verlag.
coveries in the area of mining association rules
Ashrafi, M. Z., Taniar, D., & Smith, K. A. (2004a).
from XML documents, both static and dynamic,
A new approach of eliminating redundant associa-
in a well-structured manner, with examples and
tion rules. In Database and expert systems appli-
explanations so the reader will be able to easily
cations (LNCS 3180, pp. 465-474). Heidelberg,
identify the appropriate technique for his or her
Germany: Springer-Verlag.
needs and replicate the algorithm in a develop-
ment environment. At the same time, we have Ashrafi, M. Z., Taniar, D. & Smith, K. A. (2004b).
included in this chapter only the research work ODAM: An optimized distributed association
with a high level of usability in which concepts rule mining algorithm. IEEE Distributed Systems
and models are easy to be applied in real situations Online, 5(3).
without imposing knowledge of any high-level
Braga, D., Campi, A., & Ceri, S. (2003). Discover-
mathematics concepts.
ing interesting information in XML with associa-
The overall conclusion is that this chapter is a
tion rules. Proceedings of 2003 ACM Symposium
well-structured tool very useful for understand-
on Applied Computing (SAC’03) (pp. 450-454).
ing the concepts behind discovering association
rules out of collections of XML documents. It is Braga, D., Campi, A., Ceri, S., Klemettinen,
addressed not only to the students and other aca- M., & Lanzi, P. L. (2002). A tool for extracting
demics studying the mining area, but to the real XML association rules. Proceedings of the 14th
end users as a guide in creating powerful XML International Conference on Tools with Artificial
mining applications. Intelligence (ICTAI ’02) (p. 57).
Braga, D., Campi, A., Klemettinen, M., & Lanzi,
P. L. (2002). Mining association rules from XML
References
data. In Proceedings of International Conference
Agrawal, R., Imielinski, T., & Swami, A. N. on Data Warehousing and Knowledge Discovery
(1993). Mining association rules between sets of (DaWak 2002) (LNCS 2454, pp. 21-30). Heidel-
items in large databases. Proceedings of the ACM berg, Germany: Springer-Verlag.
International Conference on Management of Data Buchner, A. G., Baumgarten, M., Mulvenna, M.
(SIGMOD 1993) (pp. 207-216). D., Bohm, R., & Anand, S. S. (2000). Data mining
Agrawal, R., & Srikant, R. (1998). Fast algorithms and XML: Current and future issues. Proceedings
for mining association rules. In Readings in data- of 1st International Conference on Web Information
base systems (3rd ed., pp. 580-592). San Francisco: System Engineering (WISE 2000) (pp. 127-131).
Morgan Kaufmann Publishers Inc.
897
Mining Association Rules from XML Documents
Chen, L., Browmick, S. S., & Chia, L. T. (2004). Nayak, R. (2005). Discovering knowledge from
Mining association rules from structural deltas XML documents. In J. Wong (Ed.), Encyclopedia
of historical XML documents. In Proceedings of of data warehousing and mining (pp. 372-376).
International Conference in Advances in Knowl- Hershey, PA: Idea Group Reference.
edge Discovery and Data Mining (PAKDD 2004)
Nayak, R., Witt, R., & Tonev, A. (2002). Data
(LNCS 3056, pp. 452-457). Heidelberg, Germany:
mining and XML documents. Proceedings of
Springer-Verlag.
the 2002 International Conference on Internet
Cobena, G., Abiteboul, S., & Marian, A. (2005). Computing (pp. 660-666).
XyDiff tools: Detecting changes in XML docu-
Rusu, L. I., Rahayu, W., & Taniar, D. (2005a).
ments. Retrieved February 2006, from http://www.
Maintaining versions of dynamic XML docu-
rocq.inria.fr/gemo
ments. In Proceedings of the 6th International
Daly, O., & Taniar, D. (2004). Exception rules Conference on Web Information System Engi-
mining based on negative association rules. In neering (WISE 2005) (LNCS 3806, pp. 536-543).
Computational science and applications (LNCS Heidelberg, Germany: Springer-Verlag.
3046, pp. 543-552). Heidelberg, Germany:
Rusu, L. I., Rahayu, W., & Taniar, D. (2005b). A
Springer-Verlag.
methodology for building XML data warehouses.
Ding, O., Ricords, K., & Lumpkin, J. (2003). International Journal of Data Warehousing and
Deriving general association rules from XML Mining, 1(2), 67–92.
data. Proceedings of the ACIS 4th International
Tjioe, H. C., & Taniar, D. (2005). Mining asso-
Conference on Software Engineering, Artificial
ciation rules in data warehouses. International
Intelligence, Networking and Parallel/Distributed
Journal of Data Warehousing and Mining, 1(3),
Computing (SNPD’03) (pp. 348-352).
28–62.
Feng, L., Dillon, T., Wiegand, H., & Chang, E.
Wan, J. W., & Dobbie, G. (2003). Extracting
(2003). An XML-enabled association rules frame-
association rules from XML documents using
work. In Proceedings of International Conference
XQuery. Proceedings of the 5th ACM International
on Database and Expert Systems Applications
Workshop on Web Information and Data Manage-
(DEXA 2003) (LNCS 2736, pp. 88-97). Heidel-
ment (WIDM’03) (pp. 94-97).
berg, Germany: Springer-Verlag.
Wan, J. W., & Dobbie, G. (2004). Mining as-
Garofalakis, M. N., Rastogi, R., Seshadri, S., &
sociation rules from XML data using XQuery.
Shim, K. (1999). Data mining and the Web: Past,
Proceedings of International Conference on Re-
present and future. Proceedings of the 2nd Work-
search and Practice in Information Technology
shop on Web Information and Data Management
(CRPIT 2004) (pp. 169-174).
(WIDM 1999) (pp. 43-47).
Wang, Y., DeWitt, D. J., & Cai, J. Y. (2003). X-Diff:
Laurent, M., Denilson, B., & Pierangelo, V. (2003).
An effective change detection algorithm for XML
The XML Web: A first study. Proceedings of the
documents. Proceedings of the 19th International
International WWW Conference (pp. 500-510).
Conference on Data Engineering (ICDE 2003)
Marian, A., Abiteboul, S., Cobena, G., & Mignet, (pp. 519-530).
L. (2001). Change-centric management of ver-
World Wide Web Consortium. (W3C). (n.d.). Re-
sions in an XML warehouse. The VLDB Journal,
trieved February 2006, from http://www.w3c.org
581–590.
898
Mining Association Rules from XML Documents
Xalan. (2005). The Apache Software Foundation: Zhao, Q., Bhowmick, S. S., Mohania, M., &
Apache XML project. Retrieved December 2005, Kambayashi, Y. (2004). Discovering frequently
from http://xml.apache.org/xalan-j/ changing structures from historical structural
deltas of unordered XML. Proceedings of ACM
XQuery. (2005). Retrieved February 2006,
International Conference on Information and
from http://www.w3.org/TR/2005/WD-xque-
Knowledge Management (CIKM’04) (pp. 188-
ry-20050915/
197). Heidelberg, Germany: Springer Berlin.
Zhao, Q., Bhowmick, S. S., & Mandria, S. (2004).
Discovering pattern-based dynamic structures
from versions of unordered XML documents. In
Proceedings of International Conference on Data
Warehousing and Knowledge Discovery (DaWaK
2004) (LNCS 3181, pp. 77-86). Heidelberg, Ger-
many: Springer-Verlag.
This work was previously published in Services and Business Computing Solutions with XML: Applications for Quality
Management and Best Processes, edited by Patrick Hung, pp. 176-196, copyright 2009 by Business Science Reference
(an imprint of IGI Global).
899
Section IV
Utilization and Application
This section introduces and discusses the utilization and application of enterprise information systems around
the world. These particular selections highlight, among other topics, enterprise information systems in multiple
countries, data mining applications, and critical success factors of enterprise information systems implementation.
Contributions included in this section provide excellent coverage of the impact of enterprise information systems
on the fabric of our present-day global village.
901
Chapter 4.1
QoS-Oriented Grid-Enabled
Data Warehouses
Rogério Luís de Carvalho Costa
University of Coimbra, Portugal
Pedro Furtado
University of Coimbra, Portugal
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
QoS-Oriented Grid-Enabled Data Warehouses
2002; Venugopal et al, 2006). Most of the works SLOs may be used by the Community Scheduler
on data grids considers the use or management to negotiate with Local Schedulers the establish-
of large files, but grid-enabled Database Manage- ment of Service Level Agreements (SLA). But
ment Systems (DBMS) may be highly useful in SLOs can also be used to provide some kind of
several applications from distinct domains (Nieto- differentiation among users or jobs. Execution
Santisteban et al, 2005; Watson, 2001). deadline and execution cost’s limit are some
On the other hand, data warehouses are mostly example of commonly used SLOs.
read-only databases which store historical data We consider here the use of deadline-marked
that is commonly used for decision support and queries in grid-based Data Warehouses. In such
knowledge discovery (Chaudhuri & Dayal, 1997). context, execution time objectives can provide
Grid-based data warehouses are useful in many some differentiation between interactive queries
real and virtual global organizations which are and report queries. For example, one can establish
generating huge volumes of distributed data. that interactive queries should be executed by a 20
In such context, the data warehouse is a highly seconds deadline and that report queries should be
distributed database whose data may be loaded executed in 5 minutes. In fact, different deadlines
from distinct sites and that should be transparently may be specified considering several alternatives,
queried by users from distinct domains. like the creation of privileged groups of users that
But constructing effective grid-based applica- should obtain responses in lower times or like
tions is not simple. Grids are usually very hetero- providing smaller deadlines for queries submitted
geneous environments composed by resources by users affiliated to institutions that had offered
that may belong to distinct organization domains. more resources to the considered grid-based data
Each domain administrator may have a certain warehouse.
degree of autonomy and impose local resource Data placement is a key issue in grid-based
usage constraints for remote users (Foster, 2001). applications. Due to the grid’s heterogeneity and
Such site autonomy is reflected in terms of to the high cost of moving data across different
scheduling algorithms and scheduler architec- sites, data replication is commonly used to improve
tures. The hierarchical architecture is one of the performance and availability (Ranganathan &
most commonly used scheduling architecture in Foster, 2004). But most of the works on replica
Grids (Krauter et al, 2002). In such architecture, selection and creation in data grids consider ge-
a Community Scheduler (or Resource Broker) is neric file replication [e.g. (Lin et al, 2006; Siva
responsible to transform submitted jobs into tasks Sathya et al, 2006; Haddad & Slimani, 2007)].
and to assign them to sites for execution. At each Therefore, the use of specialized data placement
site, a Local Scheduler is used to manage local strategies for the deployment of data warehouses
queues and implement local domain scheduling in grids still remains an open issue.
policies. Such architecture enables a certain degree In this chapter, we discuss the implementation
of site autonomy. of QoS-oriented Grid-enabled Data Warehouses.
Besides that, in Grids, tasks are usually speci- The grid-enabled DW is composed by a set of
fied together with Service Level Objectives (SLO) grid-enabled database management systems, a set
or Quality-of-Service (QoS) requirements. In fact, of tools provided by an underlying grid resource
in many Grid systems, scheduling is QoS-oriented management (GRM) system and hierarchical
instead of performance-oriented (Roy & Sander, schedulers. We combine data partitioning and
2004). In such situations, the main objective is replication, constructing a highly distributed da-
to increase user’s satisfaction instead of achiev- tabase that is stored across grid’s sites, and use a
ing high performance. Hence, the user-specified QoS-oriented scheduling and a specialized replica
902
QoS-Oriented Grid-Enabled Data Warehouses
selection and placement strategy to achieve high from a scalability problem: if a wide variety of
QoS levels. distributed heterogeneous resources is available,
This chapter is organized as follows: in the considering all the resources’ individual char-
next Section we present some background on data acteristics when scheduling job execution may
grids and grid-enabled databases. Then, we discuss become very time consuming. In the hierarchical
QoS-oriented scheduling and placement strategies architecture, a Community Scheduler (or Resource
for the Grid-based warehouse. In the following, Broker) is responsible to assign job execution to
we present some experimental results. Next, we sites. Each site has its own job scheduler (Local
draw conclusions. At the end of the chapter, we Scheduler) which is responsible to locally schedule
present some key terms definitions. the job execution. The Community Scheduler and
Local Schedulers may negotiate job execution
and each Local Scheduler may implement local
DAtA GrIDs AND GrID- resource utilization policies. Besides that, as the
ENAbLED DAtAbAsEs Community Scheduler does not have to exactly
know the workload and characteristics of each
The Grid is an infra-structure that provides available node, this model leads to greater scal-
transparent access to distributed heterogeneous ability than the centralized scheduling model.
shared resources, which belong to distinct sites In the Decentralized model, there is no Central
(that may belong to distinct real organizations). Scheduler. Each site has its own scheduler, which
Each site has some degree of autonomy and may is responsible to schedule local job execution.
impose resource usage restrictions for remote Schedulers must interact to each other in order to
users (Foster, 2001). negotiate remote job execution. Several messages
In the last decade, some Grid Resource Man- may be necessary during the negotiation in order
agement (GRM) Systems [for example, Legion to do good job scheduling, which may impact the
(Grimshaw et al, 1997) and Globus Toolkit (Foster system’s performance.
& Kesselman, 1997)] were developed in order to Some of the GRM systems have built-in
provide some basic functionality that is commonly scheduling policies, but almost all enable the
necessary to run grid-based applications. Autho- user to implement its own scheduling policy or to
rization and remote job execution management use application-level schedulers. In this context,
are among the most common features in GRM some general purpose application level schedul-
systems. Some of them also provide data man- ers were designed [e.g. Condor-G (Frey et al,
agement-related mechanisms, like efficient data 2001) and Nimrod-G (Buyya et al, 2000)]. These
movement [e.g. GridFTP (Allcock et al, 2005)] general purpose generally consider some kind
and data replica location [e.g. Globus Replica of user-specified requirement or QoS-parameter
Location Service – RLS (Chervenak et al, 2004)]. (e.g. job’s deadline), but may fail to efficiently
In terms of grid job scheduling, there are three schedule data-bound jobs.
basic architectures (Krauter et al (2002): central- Query scheduling strategies for data-bound
ized, hierarchical and decentralized. In the first jobs were evaluated by Ranganathan & Foster
one, a single Central Scheduler is used to schedule (2004). Data Present (DP), Least Loaded Sched-
the execution of all the incoming jobs, assigning uling (LLS) and Random Scheduling (RS) were
them directly to the existent resources. Such ar- compared. In RS, job execution is randomly
chitecture may lead to good scheduling decisions, scheduled to available nodes. In LLS, each job
as the scheduler may consider the characteristics is scheduled to be executed by the node that has
and loads of all available resources, but suffers the lowest number of waiting jobs. Both in RS
903
QoS-Oriented Grid-Enabled Data Warehouses
and LLS, a data-centric job may be scheduled marked queries among grid-enabled databases
to be executed by a job that does not store the when several replicas of the same data are present
required data to execute such job. In this case, at distinct sites.
remote data is fetched during job execution. In In Grids, data replicas are commonly used to
the DP strategy, each job is assigned to a node that improve job (or query) execution performance
stores the job’s required input data. Ranganathan and data availability. Best Client and Cascading
& Foster claim that, in most situations, DP has Replication are among the dynamic file replica-
better performance than LLS and RS (as doing tion strategies evaluated by Ranganathan & Foster
data movement across grid’s nodes may be very (2001) to be used in the Grid. In both models, a
time consuming). new file replica is created whenever the number
There are several parameters that should be of access to an existent data file is greater than a
considered when scheduling data-centric jobs. threshold value. The difference among the meth-
These include the size of the job’s input and ods resides on where such new file is placed. The
output data, and the network bandwidth among ‘best client’ of a certain data file is defined as the
grid’s nodes. Park & Kim (2003) present a cost node that has requested for each more times in a
model that use such parameters to estimate job’s certain time period. In the Best Client placement
execution time at each node (both considering strategy, the new replica is placed at the best cli-
that a job can be executed at the submission site ent node. In the Cascading Replication method,
or not, and that it may use local or remote data the new file is placed at the first node in the path
as input). Job execution is scheduled to the node between the node that stores the file that is being
with the lowest predicted execution time. replicated and the best client node.
Although very promising, the grid-enabled The Best Client strategy is used as an inspi-
database management systems were not largely ration for the Best Replica Site strategy [(Siva
adopted for a long time (Nieto-Santisteban et al, Sathya et al, 2006)]. The main different among
2005; Watson, 2001). Watson (2001) proposed the the this strategy and the original Best Client is
construction of a federated system with the use that in Best Replica Site the site in which the
of ODBC/JDBC as interface for heterogeneous replica is created is chosen considering not only
database systems. In more recent work, web ser- the number of access from clients to the dataset,
vices are used as interface to database management but also the replica’s expected utility for each site
systems. Alpdemir et al (2003) present an Open and the distance between sites. Sathya et al (2006)
Grid Services Architecture [OGSA – (Foster et al, also propose two other strategies: Cost Effective
2002)]-compatible implementation of a distributed Replication and Topology Based Replication. In
query processor (Polar*). A distributed query the first one, a cost function is used to choose in
execution plan is constructed by basic operations which site a replica should be created (the cost
that are executed at several nodes. function evaluates the cost of accessing a replica
Costa & Furtado (2008c) compares the use at each site). In the latter, database replicas are
of centralized and hierarchical query schedul- created at the node that has the greatest number
ing strategies in grid-enabled databases. The of direct connections to other ones.
authors present that hierarchical schedulers can Topology related aspects are also considered
be used without significant lose in the system’s by Lin et al (2006) in order to choose replica loca-
performance and can also lead to good levels of tion. The authors consider a hierarchical (tree-like)
achievement of Service Level Objectives (SLOs). grid in which database is placed at the tree root.
In Costa & Furtado (2008b) the authors propose Whenever a job is submitted, the scheduler looks
the use of reputation systems to schedule deadline- for the accessed data at the node in which the job
904
QoS-Oriented Grid-Enabled Data Warehouses
was submitted. If the necessary data is not at such tHE DIstrIbUtED QOs-
node, then the schedulers asks for it at the node’s OrIENtED WArEHOUsE
parent node. If the parent node does not have a
replica of the searched data, then the scheduler Data warehouses are huge repositories of historical
looks for it at the grandparent node, and so on. data. They are subject-oriented: a certain subject
Whenever the number of searched nodes is greater (revenue, for example) is analyzed considering
than a defined value, a new data replica is created. several distinct measures (e.g. time period). Each
Such newly created replica is placed at the node analyses measure domain is called a dimension.
that maximizes the number of queries that can be Therefore, the DW is a multidimensional space.
answered without creating new replicas. Such space is commonly represented in relational
Maximizing the economic value of locally databases as star schemas (Chaudhuri & Dayal,
stored data is the objective of the strategy proposed 1997), with several distinct dimension tables and
by Haddad & Slimani (2007). In such strategy, a huge facts table. The dimensions tables store
there is a price to access each data fragment. information about the analyze measures domains.
Each node tries to foresee the future price of the The facts table stores data that represents the events
fragments and stores the ones that are forecasted of the real world and pointers to dimensions tables.
as the most valuable. Figure 1 presents an example of a star schema (in
Most of the abovementioned strategies are the remaining of this chapter, tables are considered
oriented for file-based grids. Others are related to be conceptually organized in a star schema).
to best-effort oriented scheduling in grid-enabled The Grid-based data warehouse is accessed
databases. But all of them are somehow related by users of geographically distributed sites which
to the aspects we deal with in the next Sections. may or may not belong to the same real orga-
In the next Section, we discuss the architecture nization, but that are put together within a grid
and scheduling for the QoS-oriented grid-based infrastructure. Each site may share one or more
distributed data warehouse. resources to the grid. Examples of possible shared
905
QoS-Oriented Grid-Enabled Data Warehouses
resources are storage systems, computer clusters is considered the first tier and stores cached data.
and supercomputers. Database servers at remote sites compose the
Data warehouses are usually deployed at a second tier. The scheduling algorithm tries to
single site. But that may not be the most effec- use the locally stored data to answer submitted
tive layout in a grid-based DW implementation. queries. If it is not possible, then remote servers
In fact, in such environment, placing the entire are accessed.
database at a single site would be more expensive The Globus Toolkit is used by Wehrle et al
and time consuming than creating a distributed (2007) as an underlying infrastructure to imple-
DW that uses the available distributed resources ment a grid-enabled warehouse. Facts table data
to store the database and to execute users’ queries. is partitioned across nodes participating nodes
It is important to consider that not only users and dimension data is replicated. Some special-
are distributed across distinct grid sites but also ized services are used at each node: (i) an index
that the warehouse’s data may be loaded from service provides information about locally stored
several sites. data; and (ii) a communication service is used to
Hence, in the distributed Grid-based DW, access remote data. Locally stored data is used to
data is partitioned and/or replicated at nodes answer incoming queries. If the searched data is
from distinct sites and may be queried by any not stored at the local node, then remote access
grid participant. is done by the use of the communication service.
This strategy and the abovementioned Olap-
best-Effort Approaches for enabled strategy do not provide any autonomy
Grid-Enabled Warehouses for local domains.
906
QoS-Oriented Grid-Enabled Data Warehouses
In order to reduce data movement across sites replicated to distinct sites, what would increase
(improving the system’s performance) the grid- the system’s degree of parallelism. Besides that,
based DW tables are physically distributed across depending on the selection predicate, some queries
different sites. Such distribution is represented at a may access only a set of the smaller fragments,
Global Physical Schema (GPS). Ideally, the physi- which would be faster than accessing the whole
cally used data distribution strategy is transparent original site source-based fragment. These two
to users, which should submit queries considering situations are represented in Figure 2. Therefore,
a unified Logical Model (LM). even at the global level, other partitioning criteria
Grids are highly heterogeneous environments. should be used together with the site source at-
At each site, different types of resources may be tribute. The use of the most frequently used equi-
available (like shared-nothing and shared-disk join attributes as part of the partitioning criteria
parallel machines, for example). It is somewhat for the facts table can improve performance, by
difficult to find an intra-site allocation strategy reducing data movement across sites when execut-
that is optimal in the several possible situations. ing queries [as it does in shared-nothing parallel
Therefore, each site may use its own local physi- machines (Furtado, 2004b)].
cal allocation strategy (e.g. Multi-Dimensional Besides facts table’s partitions, each site should
Hierarchical Fragmentation – MDHF (Stöhr et also store dimension tables’ data. Full replication
al, 2000) or Node-Partitioned Data Warehouse of dimension tables across all sites may be done
strategy - NPDW (Furtado, 2004). Each site’s to reduce inter-site data movement during query
existent relations are represented in a Local Site execution and to improve data availability. Such
Physical Schema (LSPS). This assumption fits strategy is feasible when dimension tables are
well with the idea of domain autonomy, which is small (this also facilitates system management).
one of the grid’s characteristics. But when large dimension tables are present, they
In the generic grid-based DW, nodes from can be fragmented both at intra-site and inter-sites
any site can load data to the database. But the levels in order to improve performance and QoS-
same data cannot be loaded from distinct sites. levels. Intra-site dimension table fragmentation
This leads to the idea that each piece of data has strategy depends on the locally chosen physical
a single site (to which we call Data Source Site) allocation strategy (which is dependent on the
that is its primary source. In order to reduce data type of locally available resources, as discussed
movement across grid’s sites (considering the earlier). Inter-sites large dimension tables’ frag-
abovementioned geographically related access mentation should be done using a strategy similar
patters), each site should maintain a copy of the to the one of facts table fragmentation: initially,
facts data it has loaded into the DW (in this chapter, dimension data should remain at its Data Source
we consider that tables in the LM are organized in Site. Inter-site replication is done when necessary.
a star schema). This generates a globally physi- Derived partitioning of the facts table can also be
cally partitioned facts table which uses the values done, improving the system’s performance as join
of a site source attribute as partitioning criteria. operations can be broken into subjoins that are ex-
Depending on the implementation, the site ecuted in parallel at distinct sites. Although the use
source attribute values may be combined with of facts table derived partitioning depends on the
values of other existent dimensions. In fact, the semantics of stored data, such kind of partitioning
repartitioning of each facts table site source-based should be used together use the aforementioned
fragment into several smaller fragments can partitioning based on the site source attribute.
benefit the system in several ways. For instance, In the case of large dimension tables’ frag-
in such situation, each smaller fragment can be mentation, some data replication may also oc-
907
QoS-Oriented Grid-Enabled Data Warehouses
Figure 2. Examples of benefits on the use of smaller facts table fragments at the global level
cur. For instance, let’s consider a grid-DW of a Derived facts table partitioning may be used. Each
nation-wide retail store. There are several sites site stores the partitions from which the site is
participating in such grid-DW, each one at a the Data Source Site. Large dimension tables are
distinct state. In such warehouse, a (large) dimen- fragmented and small dimension tables replicated
sion table stores information about customers. at all sites. A fragmented site source dimension
Such table may be fragmented according with table (each site storing only its own information)
the location in which the customer buys. Initially, should be used. Such data distribution strategy is
each customer’s information would be at a single represented in Figure 3. Facts table’s fragments are
site. But when a certain customer travels (or replicated across grid’s sites in order to improve
moves) to another state and buys at stores from performance and availability.
such state, his/her information may also appear
in the state’s database. When there is dimension the Qos-Oriented Query scheduling
table (fragment) replication at distinct sites, a
replica consistency strategy may be necessary. Users submit queries to the grid-based DW
There are several works in the literature about considering the Logical Model. Ideally, the
algorithms to efficiently maintain replica con- physically used data distribution strategy should
sistency in distributed and grid-based databases be transparent to users. Hence, the first phase in
[e.g., (Akal et al, 2005; Breitbart et al, 1999; query scheduling is transforming the submitted
Chen et al, 2005)]. query (job) into other ones (tasks) that access
Hence, in the GPS, the facts table is partitioned the physically distributed global relations. Such
by the combination of the site source attribute with transformation is similar to the ones presented at
the other most frequently used equi-join attributes. (Furtado, 2004b).
908
QoS-Oriented Grid-Enabled Data Warehouses
The generated tasks are assigned to sites by the Local Scheduler should transform the glob-
a Community Scheduler. At each site, a Local ally specified query into the ones that should be
Scheduler is responsible to manage task execu- locally executed. Besides that, results merging
tion. If domain specific physical layout is used, should also be done at local site level in order to
the Local Scheduler must also do the conversion send back a single result, which is correspondent
of the globally specified task into other queries to the query (task) the site has received.
that access the physically existent relations. The
Community Scheduler specifies the necessary
requirements (execution deadlines) of each task EVALUAtING IF A sLO
(rewritten query) in order to execute the user’s cAN bE AcHIEVED
query by the desired QoS level. Then, there is a
task execution negotiation phase among the Com- Let’s consider a user-submitted query Q with a
munity Scheduler and Local Schedulers, in order deadline interval d. The system must estimate
to verify if each of the rewritten queries (tasks) the query’s total execution time (tet) and com-
can be executed by its deadline. If any task can- pare it with d in order to verify if the query can
not be executed by the specified deadline, then or cannot be executed by its deadline. When the
user is notified that the required SLO cannot be system estimates that the execution can be done
achieved and a new one must be specified, or the according to the specified SLO (d ≥ tet), it starts
query execution would be canceled. query execution. Otherwise, query execution is not
The Community Scheduler assigns queries started and user is informed that the established
to sites considering the Global Physical Model. SLO cannot be achieved.
Hence, if local domain uses some data partitioning In order to predict the tet value, the system
policy different from the one used at the global estimates the execution time of each of the query’s
level (e.g. large dimension table partitioning, as tasks (task finish time – tft), considering three key
in the abovementioned NPDW strategy), then time components for each query (task):
909
QoS-Oriented Grid-Enabled Data Warehouses
(i) The query execution time at a local site (local On the other hand, the Community Scheduler
execution time - let); does not have control of intra-set data placement
(ii) The necessary time to transfer required data and query execution. Therefore, it is somewhat
to the site (data transfer time – dtt); difficult to make such module estimate tasks’
(iii) The necessary time to transfer the query’s execution time. Such estimation is done by local
results back from the chosen site (results schedulers. In fact, in QoS-oriented scheduling,
transfer time – rtt). the Community Scheduler does not have to know
the exactly necessary time to execute a query:
The tft value of a single task at a certain site local schedulers must commit themselves to
is computed by Equation 1. An upper bound es- execution the assigned queries by a certain time
timated value for the users’ query execution (tet) interval. Such interval is the maximum value that
is obtained by Equation 2. let (mlet) can assume in order to finish the user’s
query execution by the specified SLO.
tft = let + dtt + rtt (1) Hence, for each task, the Community Scheduler
computes the mlet value (Equation 4) and uses
tet = Max(tft) (2) such value as a task deadline when negotiating
with local schedulers.
To estimate the value of tft, the Community
Scheduler must have some estimative of its com- mlet ≤ d − (dtt + rtt ) (4)
ponents. First of all, it predicts the values of dtt
and rtt, with the support of a grid infrastructure Figure 4 presents a general view of the SLO-
network monitor tool [like the Network Weather aware scheduling model.
Service – NWS - (Wolski, 1997)]. Such tool
is used to predict network latency (L) and data
transfer throughput (TT) between sites. The Com- LOcAL scHEDULErs AND
munity Scheduler uses such predicted values for sErVIcE LEVEL AGrEEMENts
network characteristics together with estimated
dataset sizes (obtained by database statistics) to When estimating if a user’s query can be executed
predict dtt and rtt (a predicted transfer time (tbs) by the proposed deadline, the Community Sched-
of a dataset of size z between sites i and j can be uler must consider the necessary time to execute
obtained by Equation 3). each rewritten query at local sites (let). But not
only the Community Scheduler does not have
z total control of the execution environment, but
tbsi , j = L +
TT (3)
910
QoS-Oriented Grid-Enabled Data Warehouses
also each site can have local domain policies that tion are QoS-oriented, which means they intend
can constraint the use of local resources by remote to increase the system’s SLO-achievement rate
users. Therefore, the necessary time to execute (SLO-AR).
each task should be predicted by local schedulers. The SLO-AR (Costa & Furtado, 2008b) is
But in QoS-oriented scheduling, each site a performance metric that aims to indicate how
may not inform the Community Scheduler the well a system is performing on executing jobs by
exact predicted query execution time. On the specified service level objectives. It is defined
other hand, local schedulers should commit as the relation between the number of queries
themselves to execute the negotiated query by whose execution finishes by the required deadline
a certain deadline (mlet) that is specified by the (N) and the number of queries in the submitted
Community Scheduler. When a local scheduler workload (W).
agrees to execute a query by a certain deadline, Therefore, the SLO-Oriented replica selection
it makes a SLA (Service Level Agreement) with and placement strategy aims at increasing the
the Community Schedule. number of queries that the system executes by
When a SLA is signed, the local scheduler is the specified SLOs. In order to do that, a benefit-
committed to execute the query by the negotiated based mechanism is implemented by a Replication
deadline. But it can, for instance, reorder local Manager (RM), as it is described below.
query execution (do not have to execute each of the
incoming queries as fast as possible) or change the
number of queries that are concurrently executed INtEr-sItE QOs-OrIENtED
at the local DBMS (multi-programming degree). DyNAMIc rEPLIcAtION
The QoS-OES (Costa & Furtado, 2008) sched-
uler is an example of QoS-oriented query scheduler The RM monitors the number of times that a
that can be used in such context. Such module SLO-objective cannot be achieved due to the
is a generic external scheduler that is used as a inexistence of a certain dataset (e.g. facts table
middleware between the DBMS and its users. The fragment) at a certain site and computes the total
QoS-OES is capable to estimate query execution benefit value (β) that the system would have if
time in a multi-query environment and to commit a replica of such dataset is created. When β is
itself to execute a submitted query by a certain greater than a threshold value, the system considers
deadline, as soon as the specified deadline time is the possibility of creating the data replica at the
greater than the predicted query execution time. evaluated site (at this point we refer that replicas
of input datasets are created. Latter in this chapter,
caching and replication for Qos we discuss how to determine if such datasets are
fact’s table fragments or computed chunks).
Grids are highly heterogeneous environments In order to implement such policy, when the
in which the use of database replicas can lead Local Scheduler cannot execute the task (query)
to great performance improvement and to high by the specified mlet time, it should evaluate if it
QoS levels. But as the problem of choosing the would achieve the specified deadline if a replica
optimal number of database replicas and doing of a given dataset is present at the site.
the optimal placement of such replicas into the When the Local Scheduler predicts that it
nodes of a distributed environment is NP-hard would achieve the required task’s deadline if a
(Loukopoulos & Ahmad, 2000), some heuristics certain replica is locally stored, it informs the
should be used. The heuristics used in this Sec- Replication Manager what is such replica. In such
911
QoS-Oriented Grid-Enabled Data Warehouses
situation, the value of β for the specified dataset that a certain deadline would be achieved if its
is incremented by a certain δ value (benefit of the site stores a local copy of a certain fragment, it
considered input data set replica to the system), as informs the Replication Manager which consid-
represented in Equation 5. However, the δ value ers such fragment as a dataset that is candidate
of each task should vary over time, in order to for inter-site replication. Such fragment may be
differentiate the benefit for old queries from the replicated or not depending on its benefit for the
ones for newer queries. Therefore, a time discount system.
function may be used in order to compute δ, as As discussed before, each site is autonomous
presented in Equation 6. to implement its own data placement (and repli-
cation) strategy. Besides that, each site may also
β = ∑ δi (5) implement its own data caching mechanism. There
i are some caching mechanisms that are benefited
∆t by the multidimensional nature of warehouse data.
−
δi = e
λ
(6) Chunked-based caching (Deshpande et al, 1998;
Deshpande & Naughton, 2000) is one of those
In Equation 6, Δt represents the time window specialized mechanisms for the DW.
between the task execution time (of the query that In chunk-based caching, DW data to be stored
would be benefited by the input dataset replication) in the cache is broken up into chunks that are
and current time and λ enables the use of different cached and used to answer incoming queries.
time intervals [as defined in (Huynh et al, 2006)]. The list of necessary chunks to answer a query is
Whenever β is greater than a threshold value broken into two: (i) chunks that may be obtained
for a certain dataset/site, the site is marked as a (or computed) from cached data; and (ii) chunks
candidate to receive a replica of the considered that have to be recovered from the data warehouse
dataset. Indeed, the replica is immediately cre- database. In such method, sometimes it is possible
ated if there is enough disk space. Otherwise, to compute a chunk from chunks from different
the system would have to evaluate if some of the levels of aggregation (each aggregation level cor-
existent data replicas (of another datasets) should responds to a group-by operation) (Deshpande &
be replaced or not by the new replica candidate. In Naughton, 2000).
order to do that, RM also maintains the benefits Such computed chunk based mechanism may
score of existing dataset replicas. Such score is be implemented by local schedulers to implement
computed in the same way that β and δ values of local caching. But chunks of results or computed
inexistent replicas are computed. If the β value chunks can also be considered as candidates for
of an existing replica is lower than the one of a replication by Replication Manager. In such con-
replica candidate, then a replica replacement is text, when a local scheduler evaluates that a certain
done. Otherwise, the system maintains the already missing chunk would enable the site to execute a
existing replicas. task by a certain deadline that would be achieved
without such chunk, the local scheduler must send
to the Replication Manager the identification of
LOcAL cAcHING AND INtrA- such chunk. Then, the RM would consider the
sItE rEPLIcA cANDIDAtEs chunk as a dataset candidate for replication in
its benefit-based dynamic replica selection and
Facts’ table fragments are natural candidates for placement mechanism.
inter-site replication, as discussed previously in
this Chapter. When a Local Scheduler evaluates
912
QoS-Oriented Grid-Enabled Data Warehouses
913
QoS-Oriented Grid-Enabled Data Warehouses
(ii) Best Client (BC) and (iii) Data Least Loaded The obtained SLO-AR values are represented
(DLL). Variations of the BC strategy are used by in Figure 7. All the evaluated dynamic replication
Ranganathan & Foster (2001) and Siva Sathya methods lead to good SLO-AR. Such success
et al (2006). The DLL is used by Ranganathan & ensures the quality of the used QoS-oriented
Foster (2004). Both in the BC and in DLL, each hierarchical scheduling model. But the obtained
site monitors the number of data access at the data results also present the benefits of the proposed
replicas it stores, computing the number of times QoS-aware dynamic data replication and place-
the fragment was requested. When such number is ment, as it was the method that leads to the highest
greater than a threshold value, a fragment replica value of SLO-AR.
is created at another site. In BC, the fragment In Figure 8 we present the measured through-
replica is created at the site that has more times put for the evaluated strategies. Once again, the
demanded for the considered fragment. In DLL, proposed QoS-aware replication strategy leaded
fragment replica is created at the site that has the to the highest values in the two tested network
least remaining work to execute. configurations. This happens because such place-
914
QoS-Oriented Grid-Enabled Data Warehouses
ment strategy has the same objective of the used In Figure 10, we present the number of created
query scheduling strategy. Therefore, not only it replicas per site for the Hierarchical Topology.
increases the number of queries that the Commu- Let’s analyze site 6: such site is almost the most
nity Scheduler agrees to execute but also lead to powerful one and it is the site that have the high-
a better resource utilization than the other replica est number of submitted queries. This is also the
selection and placement methods. site on which the BC method created the highest
The number of created replicas per method was number of data replicas. But as the BC method
almost the same and no method created a huge places too much replicas at such site, the scheduler
number of replicas for the same data fragment assigns too much queries for site 6 (what puts it
(as show in Figure 9). In fact, the success of the into a too high load situation and decreases per-
QoS-aware scheduling method is mostly related formance, leading to a lower SLO-achievement
to its replica placement strategy. rate) or schedules queries to other sites that are
915
QoS-Oriented Grid-Enabled Data Warehouses
Figure 10. Number of facts table fragments at each site in hierarchical topology
near site 6 but that do not have the same data cONcLUsION
replicas (in such case, data movement is done
during query execution, which also decreases the Grid-based data warehouses are useful in many
system performance). global organizations which generates huge vol-
On the other hand, the QoS-aware placed umes of distributed data that should be transpar-
high number of replicas at sites 3-5 than the other ently queried by the organizations participant’s.
methods. Such sites are of medium powerful ones In such environment, the Grid is used as basic
and are relatively near of sites 1, 2 and 6 (the infrastructure for the deployment of a large dis-
three sites with the highest number of submitted tributed mostly read-only database. But due to
queries). This way, many of the queries submit- the grid’s special characteristics, like resource
ted at sites 1, 2 and 6 can be executed at sites 3-5 heterogeneity, geographical dispersion and site
with a good performance (no database copy is autonomy, the efficient deployment of huge data
done during execution, only results - which are warehouses over grid-connected sites is a special
relatively small in size - are transferred through challenge.
sites during query execution). In contrast, the In this chapter, we present QoS-oriented
DLL strategy placed many replicas on not so scheduling and distributed data placement strat-
powerful sites (like 10 and 7). This happened as egies for the grid-based warehouse. We discuss
the DLL strategy evaluated that such sites had a the use of a physically distributed database, in
small size of pending work. But such sites take which tables are both partitioned and replicated
too much time to execute a query, and the Com- across sites. The use of facts’ table partitioning and
munity Scheduler rarely assigns query execution replication is particularly relevant as grid users’
for such sites. Therefore, the replicas created by queries may follow geographical related access
DLL were somehow of less utility to the system. patterns. Inter-site dimension tables fragmenta-
tion and replication are done in order to achieve
good performance in query execution but also to
reduce data movement across sites, which is a
costly operation in grids.
916
QoS-Oriented Grid-Enabled Data Warehouses
Incoming queries are rewritten into another Alpdemir, M., Mukherjee, A., Paton, N., Watson,
ones (tasks) that are assigned to sites by a Local P., Fernandes, A., Gounaris, A., & Smith, J. (2003).
Scheduler based on Service Level Agreements OGSA-DQP: A service-based distributed query
between the Community Scheduler and Local processor for the Grid. In Proceedings of UK e-
Schedulers The use of a hierarchical scheduling Science All Hands Meeting.
model leads to good SLO-achievement rates and
Bird, I. & The LCG Editorial Board (2005). LHC
also maintains site autonomy, as each site’s Lo-
Computing Grid Technical Design Report [LCG-
cal Scheduler may implement its own scheduling
TDR-001, CERN-LHCC-2005-024].
strategy.
Dynamic data replication is very important in Breitbart, Y., Komondoor, R., Rastogi, R., Seshadri,
grid-based data bound jobs. In the grid-enabled S., & Silberschatz, A. (1999). Update propagation
warehouse, dynamic replication of facts table protocols for replicated databates. SIGMOD Re-
fragments or of computed chunks is important cord, 28(2), 97–108. doi:10.1145/304181.304191
to improve the systems’ performance. The QoS-
Chaudhuri, S., & Dayal, U. (1997). An over-
oriented dynamic replica selection and placement
view of data warehousing and OLAP tech-
is especially important to increase the SLO-
nology. SIGMOD Record, 26(1), 65–74.
achievement rate in grid-enabled warehouses.
doi:10.1145/248603.248616
Chen, G., Pan, Y., Guo, M., & Lu, J. (2005). An
rEFErENcEs asynchronous replica consistency model in data
grid. In Proceedings of Parallel and Distributed
Akal, F., Türker, C., Schek, H., Breitbart, Y., Grabs, Processing and Applications - 2005 Workshops
T., & Veen, L. (2005). Fine-grained replication (LNCS 3759, pp. 475-484).
and scheduling with freshness and correctness
guarantees. In Proceedings of the 31st interna- Chervenak, A. L., Palavalli, N., Bharathi, S., Kes-
tional Conference on Very Large Data Bases selman, C., & Schwartzkopf, R. (2004). Perfor-
(pp. 565-576). mance and scalability of a replica location service.
In Proceedings of the 13th IEEE international
Akinde, M. O., Böhlen, M. H., Johnson, T., Lak- Symposium on High Performance Distributed
shmanan, L. V., & Srivastava, D. (2002). Efficient Computing (pp.182-191).
OLAP query processing in distributed data ware-
houses. In Proceedings of the 8th international Costa, R. L. C., & Furtado, P. 2008. A QoS-oriented
Conference on Extending Database Technology: external scheduler. In Proceedings of the 2008
Advances in Database Technology. (LNCS 2287, ACM Symposium on Applied Computing (pp.
pp. 336-353. 1029-1033). New York: ACM Press.
Allcock, W., Bresnahan, J., Kettimuthu, R., & Costa, R. L. C., & Furtado, P. (2008). QoS-oriented
Link, M. (2005). The Globus striped GridFTP reputation-aware query scheduling in data grids. In
framework and server. In Proceedings of the Proceedings of the 14th European Conference on
2005 ACM/IEEE Conference on Supercomputing Parallel and Distributed Computing (Euro-Par).
(pp.54-65). Costa, R. L. C., & Furtado, P. (2008). Scheduling
in Grid databases. In Proceedings of the 22nd
international Conference on Advanced informa-
tion Networking and Applications – Workshops
(pp. 696-701).
917
QoS-Oriented Grid-Enabled Data Warehouses
Deshpande, P., & Naughton, J. F. (2000). Aggre- Huynh, T. D., Jennings, N. R., & Shadbolt, N.
gate aware caching for multi-dimensional queries. R. (2006). An integrated trust and reputation
In Proceedings of the 7th international Conference model for open multi-agent systems. Autonomous
on Extending Database Technology: Advances in Agents and Multi-Agent Systems, 13(2), 119–154.
Database Technology vol. 1777 (pp. 167-182). doi:10.1007/s10458-005-6825-4
Deshpande, P. M., Ramasamy, K., Shukla, A., & Krauter, K., Buyya, R., & Maheswaran, M.
Naughton, J. F. (1998). Caching multidimensional (2002). A taxonomy and survey of grid resource
queries using chunks. In A. Tiwary & M. Franklin management systems for distributed computing.
(Eds.), Proceedings of the 1998 ACM SIGMOD Software, Practice & Experience, 32(2), 135–164.
international Conference on Management of Data doi:10.1002/spe.432
(Seattle, Washington, United States, June 01 - 04,
Lawrence, M., & Rau-Chaplin, A. (2006). The
1998) (pp. 259-270). New York: ACM Press.
OLAP-Enabled Grid: Model and query process-
Foster, I. Kesselman, C. Nick, J., & Tuecke, S. ing algorithms. In Proc. of the 20th international
(2002). The physiology of the grid: An open grid Symposium on High-Performance Computing in
services architecture for distributed systems in- An Advanced Collaborative Environment (HPCS).
tegration (Globus Project Tech Report).
Lima, A., Mattoso, M., & Valduriez, P. (2004).
Foster, I., Kesselman, C., Tsudik, G., & Tuecke, S. Adaptive virtual partitioning for OLAP query
(1998). A security architecture for computational processing in a database cluster. In Proceedings
grids. In Proceedings of the 5th ACM Conference of the Brazilian Symposium on Databases (SBBD)
on Computer and Communications Security. CCS (pp. 92-105).
‘98 (pp. 83-92).
Lin, Y., Liu, P., & Wu, J. (2006). Optimal placement
Foster, I. T. (2001). The anatomy of the grid: En- of replicas in data grid environments with locality
abling scalable virtual organizations. In Proceed- assurance. In Proceedings of the 12th international
ings of the 7th international Euro-Par Conference Conference on Parallel and Distributed Systems
on Parallel Processing (LNCS 2150, pp. 1-4). - Vol 1 (2006) (pp. 465-474).
Furtado, P. (2004). Workload-based placement Loukopoulos, T., & Ahmad, I. (2000). Static and
and join processing in node-partitioned data ware- adaptive data replication algorithms for fast in-
houses. In Proceedings of the 6th International formation access in large distributed systems. In
Conference on Data Warehousing and Knowledge Proc. of the 20th Intern. Conference on Distributed
Discovery (LNCS 3181, pp. 38-47). Computing Systems (ICDCS).
Furtado, P. (2004). Experimental evidence on Nieto-Santisteban, M. A., Gray, J., Szalay, A.,
partitioning in parallel data warehouses. In Pro- Annis, J., Thakar, A. R., & O’Mullane, W. (2005).
ceedings of the 7th ACM international Workshop When database systems meet the grid. In CIDR
on Data Warehousing and OLAP (pp. 23-30). (pp. 154-161).
Haddad, C., & Slimani, Y. (2007). Economic Park, S., & Kim, J. (2003). Chameleon: A resource
model for replicated database placement in Grid. scheduler in a data grid environment. In Proceed-
In Proceedings of the Seventh IEEE international ings of the 3st international Symposium on Cluster
Symposium on Cluster Computing and the Grid Computing and the Grid. IEEE Computer Society.
(pp. 283-292). IEEE Computer Society.
918
QoS-Oriented Grid-Enabled Data Warehouses
Poess, M., & Othayoth, R. K. (2005). Large Wolski, R. (1997). Forecasting network perfor-
scale data warehouses on grid: Oracle database mance to support dynamicscheduling using the
10g and HP proliant servers. In Proc. of the 31st network weather service. In Proceedings of the
international Conference on Very Large Data 6th IEEE international Symposium on High Per-
Bases (pp. 1055-1066). formance Distributed Computing (August 05 - 08,
1997) (pp. 316). IEEE.
Ranganathan, K., & Foster, I. (2004). Computa-
tion scheduling and data replication algorithms for
data Grids. In Grid resource management: State of
the art and future trends (pp. 359-373). Norwell, KEy tErMs AND DEFINItIONs
MA: Kluwer Academic Publishers.
Community Scheduler: It is a specialized
Roy, A., & Sander, V. (2004). GARA: A uniform middleware, responsible for matching users’ jobs
quality of service architecture. In Grid resource requirements with the available resources in a
management: State of the art and future trends grid by the interaction with local schedulers. It
(pp. 377-394). Norwell, MA: Kluwer Academic assigns jobs to sites through a process that, besides
Publishers. requirement matchmaking, can also comprise
Siva Sathya, S., Kuppuswami, S., & Ragupathi, some kind of negotiation with local schedulers.
R. (2006). Replication strategies for data grids. Sometimes it is also called Resource Broker or
International Conference on Advanced Comput- Meta-scheduler.
ing and Communications. ADCOM 2006 (pp Data Grid: A Grid environment whose ser-
123-128). vices are mainly used to deal with (including to
store, process, replicate and move) huge volumes
Stöhr et al, 2000 Stöhr, T., Märtens, H., & Rahm, of distributed shared data or over which are ex-
E. 2000. Multi-Dimensional Database Allocation ecuted grid-based applications that consume or
for Parallel Data Warehouses. In Proceedings of generate huge volumes of data.
the 26th international Conference on Very Large Grid: The term Grid is a basic infrastructure
Data Bases. 273-284. used to interconnect and provide access to widely
Transaction processing council benchmarks distributed, and possibly heterogeneous, shared re-
(2008). Retrieved from http://www.tpc.org sourced that may belong to distinct organizations.
Grid Resource Management System: It is the
Venugopal, S., Buyya, R., & Ramamohanarao, resource management system that runs over the
K. (2006). A taxonomy of Data Grids for dis- grid and is used to manage the available shared
tributed data sharing, management, and pro- resources, providing a wide range of services (like
cessing. ACM Computing Surveys, 38(1), 3. efficient data movement, replica management
doi:10.1145/1132952.1132955 and remote job submission and monitoring) to
Watson, P. (2001). Databases and the grid. UK grid-based applications.
e-Science Technical Report Series. Grid-Enabled Databases: A set of Database
Management Systems (DBMS) which are physi-
Wehrle, P., Miquel, M., & Tchounikine, A. (2007). cally distributed and are queried by grid users
A grid services-oriented architecture for efficient through the use of a middleware together with a
operation of distributed data warehouses on Grid Resource Management System.
Globus. In Proceedings of the 21st international Quality-of-Service (QoS): The term was first
Conference on Advanced Networking and Ap- coined in the networking-related field in order to
plications (AINA) (pp. 994-999). identify the ability of a certain technology to do
919
QoS-Oriented Grid-Enabled Data Warehouses
resource reservation in order to provide different characteristics (like performance and availabil-
priority to distinct applications or users. More ity) of the provided services. It may also define
recently, it can also be used as a users’ satisfac- guarantees and penalties (for the case of non
tion degree or the ability to provide predictable compliance with the SLA).
performance levels that are according to users’ Service Level Objective (SLO): It is a tar-
expectations. get value used to measure the performance of a
Service Level Agreement (SLA): An agree- service provider in what concerns to a specific
ment that is firmed between a service provider characteristic, like response time or throughput.
and a service consumer, and which defines the Its definition may also contain information about
service levels (possibly in terms of Service Level how the SLO is measured and the measurement
Objectives) that should be provided for several period.
This work was previously published in Data Warehousing Design and Advanced Engineering Applications: Methods for Com-
plex Construction, edited by Ladjel Bellatreche, pp. 150-170, copyright 2010 by Information Science Reference (an imprint
of IGI Global).
920
921
Chapter 4.2
EIS Systems and Quality
Management
Bart H.M. Gerritsen
TNO Netherlands Organization for Applied Scientific Research, The Netherlands
AbstrAct INtrODUctION
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
EIS Systems and Quality Management
the delivered quality in business processes at all ISO 9001 does not prescribe any quality
levels in the organization, board to shop floor. The management system in particular but frames the
information needed to know and control quality process of designing, implementing and operating
performance goes hand in hand with other daily one, defining guiding principles, requirements
operational information within the organization and and key elements it ought to contain for proper
consequently, quality information will typically functioning: the what to, not the how to. Orga-
be residing in emerging Enterprise Information nizations can tailor and scale a QMS framework
Systems (EIS). This is why in this chapter we will to their own needs and chose the implementation
discuss quality management within the context they see fit, as long as the standardized good qual-
of EIS systems, seen from the angle of SME’s. A ity management practices remain honored. The
QMS is not the same as an information system; an detailed design and operating of a QMS is critical
information system (e.g., an EIS system) supports to its success, however, and ultimately critical to
the implementation of a QMS. the success of the organization as a whole.
One of the principle and widest-spread standards Designing a fit-for-purpose QMS requires thor-
to design and implement a QMS is ISO 9001, ough understanding of business strategy and busi-
belonging to the ISO 9000-family of standards. ness processes and the readiness to align the QMS
The most recent version of this standard is ISO with the business processes, vice versa. Generally,
9001:2008. Figure 1 based on the 2006 ISO an- alignment and fine tuning is something for the long
nual survey figures (ISO, 2006) shows the world haul, and of continuous concern. Niven, in (Niven,
wide adoption of the standard. 2005) estimates that at present at most 10% of
Figure 1. Global uptake of ISO 9001:1994 (solid bars) and 9001:2000 (hatched bars) up to 2006; China
is now the country with the largest number of ISO 9001-based QMS (approx. 200000), comparable to
Europe as a whole. Source: (ISO, 2006).
922
EIS Systems and Quality Management
the organizations actually achieves their strategic • How to store recorded quality performance
objectives. The problem is often (particularly for in the EIS system?
small SME’s) that expertise is lacking and attention • How to determine correct timing and pre-
slips away after the QMS has been introduced; dictive power for lead quality performance
compare (Woodhouse, 2004). This is like buying indicators, allowing off-target perfor-
an advanced piece of equipment without learning mance and defects to be remedied before
to operate it optimally: the cost is taken while the repair becomes impossible?
deeper benefits never come in sight. Ultimately, • How to determine whether the hierarchy
quality is something to be embedded and fused of performance indicators coherently and
with daily operational processes in order to be unambiguously supports strategic control?
effective and efficient; quality drives productivity. • How to attain a flexible QMS implementa-
tion in which organizational change is ad-
Research Questions opted swiftly and which allows for appro-
priate up- and downscaling of activities?
In view of emerging EIS systems, the question • How to retrieve the correct actual qual-
is how to assure proper and lasting alignment ity performance data again from the EIS
and how to obtain a coherent view on quality system;
performance across the organization, such that it • How to archive and maintain a history of
can be managed and kept inline with the quality quality performance data within the EIS
targets defined. More specifically, research ques- system, allowing reconstruction at any one
tions arising, are: time in the past of the then present quality
performance?
• How to define a quality performance strat- • How to effectively and efficiently build up
egy and measurable quality performance an evidence-based track record of qual-
targets; how to store this typically un- ity performance within the EIS system,
structured strategy description in an EIS for auditing, approval and endorsement
system? purposes?
• How to measure actual quality perfor- • How to combine secondary EIS data with
mance of each of the business processes? quality performance data in root cause
• How to design and implement the quality analysis so as to explore the deeper causes
performance indicators (often referred to of ill-performance?
as: key performance indicators, or KPI’s) • How to combine performance data across
for each of the business processes in the organizational borders, in case of supply
organization, including strategic control chain, delivery chain or partners delivering
processes? bundled products;
• How to determine a working definition, a
proper format and a fit-for-purpose accu- Quality in this context is not just product qual-
racy for each of the performance indica- ity; it is also about controlling all processes so that
tors; does the EIS systems support storage the outcome is under control and about manage-
of this format? ment aspects targeting customer satisfaction. A
• How to compute and aggregate actual more accurate definition of quality will be given
quality performance figures from EIS sys- further down. A (key) performance indicator is a
tem residing data? metric expressing the result of a measurement of
923
EIS Systems and Quality Management
the performance of a business process. KPI’s take • EIS systems do support the access rights
the form of business data typically processed and and roles to grant all employees proper ac-
stored in a database on a computer system. Key cess to the shared parts of the QMS and
performance indicators will be explained in detail, quality performance information, and to
in the sections ahead. The term key performance block improper modifications or manipu-
indicator (KPI) has become so common in practice lations of managed data;
that we also use KPI to refer to quality perfor- • EIS systems are efficient enough to sup-
mance. A lead performance indicator expresses a port recording of performance data and up-
future performance, for instance expected annual and downscaling efficiently;
turnover based on current performance. Lead in- • EIS systems can combine quality perfor-
dicators and lag indicators (which record results mance data of suppliers, wholesalers, re-
in the past) will also be discussed in detail in the tailers, etc., all having impact on customer
sections ahead. perceived quality and satisfaction;
In the past two decades, great advancements • EIS systems support the kind of transac-
have been made with respect to the above research tions needed to operate a QMS;
questions, see for instance (Adams & Frost, 2008; • EIS systems support reporting of qual-
Ahmad & Dhafr, 2002; Cobbold & Lawrie, 2002b; ity performance at all levels in the
Hernandez-Matias, Vizan, Perez-Garcia, & Rios, organization;
2008; Hubbard, 2007; Kaplan & Norton, 1996b; • EIS systems require different skills when
Kaplan & Norton, 2001b; Kaplan & Norton, containing quality performance data;
2001a; Kaplan & Norton, 2001a; Kaplan & Nor-
ton, 2006; Kaplan & Norton, 2004a; Niven, 2005; This chapter addresses these issues.
Woodhouse, 2004). None of these contributions In order to understand the requirements on the
discusses the above research questions in the EIS system we need to understand how quality
context of EIS systems, however. Consequently, performance is measured, the role of key per-
it is unclear whether: formance indicators and bad performance alerts
therein and finally the role of root cause analysis,
• EIS systems are suited to store structured in case management intervention is needed.
and unstructured pieces of data and infor-
mation related to a QMS; Research Approach
• EIS systems adequately support storage of
causal and other relationships; Approaches to design effective QMS systems
• EIS systems allow lead indicators to quan- covering all relevant aspects in an organization
titatively forecast future scores, trends and have been primarily developed in the nineties and
performance; the beginning of this century (see the early work
• EIS systems can provide evidence-based in (Kaplan & Norton, 1992). Kaplan and Norton
quality track records; can it keep track of take the constantly transforming organization and
approvals and results of plan-do-check-act the organization’s strategic planning as the start-
cycles for instance; can it reconstruct qual- ing point, transforming organizational strategy
ity performance at any one moment back into measurable strategic objectives to which a
in time, for instance in case of a customer target can be assigned. A Strategy Map (Kaplan
claim or complaint? Can it show (evidence & Norton, 2004a; Kaplan & Norton, 2004b; Ka-
of) continuous improvement over a certain plan & Norton, 2004c; Kaplan & Norton, 2004c)
period for instance? and a Destination Statement (Cobbold & Lawrie,
924
EIS Systems and Quality Management
2002a) define the strategic change desired and a guiding principles and main elements. After this
time frame for the transition, while a Balanced background information, we further focus on the
Score Card (BSC) is commonly used to combine design and characteristics of KPI’s needed to learn
different views and aspects of the transition in a the requirements for their embedding in an EIS
single overview (Cobbold et al., 2002b; Kaplan system. The characteristics of properly designed
et al., 1992; Kaplan & Norton, 1993; Kaplan & KPI’s will be discussed, with special attention to
Norton, 1996a; Kaplan et al., 1996b; Kaplan et the dynamics (the timing, say) of lead indicators.
al., 2001a; Kaplan et al., 2001b). This makes the Concluding this chapter, an outlook onto the future
BSC one of the output forms, to be delivered by of performance-based management will be given.
the EIS system; more on this later.
Strategic objectives to transform the organiza-
tion and the products and services it delivers, can IsO 9001 OVErVIEW
only be successfully accomplished if its critical
success factors (CSF’s) are satisfied. Causal rela- brief History of IsO 9001
tionship analysis reveals how one critical success
contributes to the next critical success. Critical Quality initiatives go as far back as the fifties and
success factors can be monitored using KPI’s. In Japan is generally seen as the cradle of industrial
fact, this cascade shows how strategic planning quality programming. Deming’s early work on
is made measurable and manageable down to statistical process control (SPC) is generally seen
the operational level; the bottom up cascade of as the birth of quality control, one of the main
KPI’s reports how well the organization’s actual elements of quality management. The idea behind
performance contributes to realizing the desired quality management efforts is that by controlling
transformation at strategic level. This approach the variability in every process, a greater consis-
leads to very flexible, effective quantitative quality tency in output results can be obtained. During
management system implementations and com- the seventies and eighties, quality management
bining them with the efficiency of EIS systems and QMS systems gained worldwide attention.
appears very attractive. Flexibility is an important Starting out with US Army and NATO initiatives,
aspect in the context of the growing demand for most notably AQAP, the idea of quality manage-
mass customization and agile manufacturing; ment gradually invaded industry at large. Out of
more on this later. various national standardization efforts, the desire
For the research approach followed in this grew to come to a standardized worldwide qual-
chapter, we will adopt the above outlined approach ity management framework. To that extent ISO
and analyze in every step the requirements and and more specifically its TC 176/SC2 committee
consequences for the implementation in an EIS started working on this global standard, beginning
system. This chapter thus seeks to present answers of the eighties, resulting in the first version of
to the above defined research questions. Not all the ISO 9001 in the late eighties. After its initial
aspects are equally important: emphasis will be on 1987 version, ISO 9001 was updated in 1994
the design and embedding in an EIS of the KPI’s. (ISO 9001:1994) and 2000 (ISO 9001:2000) and
lastly in 2008, formally tagged ISO 9001:2008.
Organization of this chapter Today, over a million organizations worldwide
have adopted one of the above management
The remainder of this chapter is organized as fol- frameworks, with highest penetrations in the
lows: firstly, a brief overview of ISO 9001 will realms of engineering and material technologies
be presented, among other things discussing its (International Organization for Standardization
925
EIS Systems and Quality Management
ISO, 2008). Some 100 countries participate in whether a private enterprise, public agency or
and/or follow the ISO 9001 standardization ef- non-governmental organization: an organization
fort nowadays, with over 150 countries being an must constantly strive to a lasting and better sat-
ISO-member and users spread across nearly 180 isfaction of its customers (shareholders, partners,
countries (Figure 1). the public, the environment …). The constant
transition organizations find themselves in is
Other Quality Management also approached as a quality controlled business
standards process (the strategic control process) and thus
subject to quality management.
With environmental objectives becoming ever Main principles contributing to the above
more compelling, ISO 9001-based QMS systems philosophy are:
are occasionally replaced or complemented by
ISO 14001-based systems. The ISO 14000 family • A written QMS must be available and ac-
of standards deals with environmental manage- cessible to every employee and customer;
ment. Total Quality Management (TQM) can • Targeted actions and performance must be
be regarded as a broader and deepened form of verified and validated periodically;
quality management. It lays strong emphasis on • The QMS must take a quantified approach:
quality awareness everywhere in the organization it must regularly record quality perfor-
and in its supply and delivery chains. It shares, mance scores (or: KPI scores) and set them
among others, the quality performance manage- off against agreed target values;
ment characteristics with ISO 9001. • A process-based approach, with plan-do-
check-act cycles (PDCA) to drive quality
Main Principles of IsO 9001 and to repair defects;
• Procedures to report and handle defects;
Satisfied customers stand central in the ISO • Active promotion, commitment and in-
9001 and all quality management is directed to volvement of senior management;
just that. Keeping customers satisfied is not just • Central roles and responsibilities shall be
a matter of products being free of deficiencies. formalized and assigned;
The customer’s explicit and implied needs and • Regular auditing (internally, externally, or
expectations should be satisfied by the product by the customer) shall be conducted;
and evidently, the product must comply with • The QMS must be effective and efficient
regulatory and generally implied sustainability and support continuous improvement.
demands. All this makes quality a subjective at-
tribute that depends on customer perception. That There is no room and no need to go into more
is why an organization must make quality explicit detail here. In the sections following, the relevant
at beforehand and approve to live up to it so that details will be further discussed in relation to their
customers can rely on the design, manufacturing, embedding in an EIS system.
environmental footprint, servicing, etc. to be inline
with their expectations. All businesses processes Main Elements of a typical
should be mastered such that process output is IsO 9001-based QMs
guaranteed to be within specified quality bounds,
contributing to a customer satisfying product, A typical ISO 9001-based QMS consists of the
now and in the future. No organization is static, following main elements:
926
EIS Systems and Quality Management
927
EIS Systems and Quality Management
BSC (Kaplan et al., 1992) not only reports on KPI the above marked process. Once the design has
scores, but has been designed such during QMS been validated, it can be operated.
design, that it also assists in the understanding
of collective performances and mutual relation- stEP 1: starting from strategy
ships among individual objectives: what drives
what. Business Activity Monitoring (BAM) is the At board level, a balance has to be found between
acquisition, processing and presentation of real strategic planning and strategic control. The
time information (e.g., KPI scores) on activity and pressure on organizations to timely adjust their
performance within an organization. strategy is ever increasing, due to reasons such
as globalization, sustainability, exploding energy
A Generic stepwise Approach costs, rapidly changing consumer preferences,
mass customization and many others. First step
Following the research approach as outlined in for an organization is to assess its present state
the Introduction and the above definitions, we of excellence, for instance by means of capabil-
can now compile the following generic approach ity-maturity-modeling (CMM), benchmarking,
to designing and implementing a QMS, linking position auditing or using any other Business
KPI’s to strategy, and the realization of strategic Excellence Model approach.
transition to actual performance. Following the A Balanced Scorecard (BSC) captures central
Kaplan and Norton approach top down – bottom KPI’s from various strategic perspectives: custom-
up in an iterative process, we arrive at the steps er-oriented processes, operational performance,
as in Table 1. financial performance, and what is commonly
In practice, the above stepwise approach is denoted as the learning, (experience, knowledge…)
neither fully top-down nor bottom-up, but a mid- and growth perspective. The anatomy of the BSC
dle-out process that iterates until an effective and looks like in Figure 3. The relative weights put on
efficient network of coherent indicators has been each of the perspectives may vary from organization
established. A scorecard design and the indicators to organization and is a matter of how organizations
populating it are in fact strongly intermingled, see themselves, their orientation, and the maturity
and simultaneously and iteratively developed in level they position themselves in. A successful
Table 1. stepwise translation of strategy and strategic change into KPI’s and verification that the KPI’s
as designed contribute to understanding quality performance up to board level.
STEP 1: At board level, strategic objectives are being outlined in the Strategic Planning process and translated into measurable objectives,
for instance by collecting them in a destination statement, describing what should be realized within say three years from now. Strategic
change (transition) is thus put under Strategic Control. Global CSF’s are being identified, a first version of a BSC is being designed
STEP 2: At the management levels below board level (Production Control), these objectives and their CSF’s are further worked out in
smaller (measurable) goals, linking up the operational processes. A cause-effect analysis is used to identify and verify causal relationships
(Causal Analysis) between CSF’s at subsequent levels;
STEP 3: Per CSF and for each operational process, one or more KPI’s are determined, along with all their characteristics.
STEP 4: Next, bottom up a verification and calibration process is conducted to learn how lower level KPI scores aggregate at the next higher
level and how their indication contributes to the performance measurement at the next level. Aspects like interpretation, accuracy, missing
values, lead times etc. are verified and validated;
STEP 5: Finally, arriving back at the board level, the final verification is being conducted, which should reveal as to whether the progress
towards reaching the destination can be monitored and controlled indeed (Strategic Control), whether ill-performance is timely signaled
and risks and opportunities can be monitored and controlled adequately on the basis of BSC and its KPI’s.
928
EIS Systems and Quality Management
Figure 2. Generic approach to design and implement a QMS, using an EIS system.
Figure 3. Anatomy of a BSC. What drives what (arrows) depends (among others) on the organization’s
maturity level, orientation and ambitions.
transition to a next maturity level can be interpreted & Rosenbaum, 2003; Brun, Caridi, Salama, &
as a demonstration of continuous improvement. Ravelli, 2006).
A first version of the BSC is typically designed What (KPI in a) perspective drives what other
in parallel to the design of Strategy Map and Des- (KPI in a) perspective, is among other things de-
tination Statement. More detailed scorecards may pending on the organization’s maturity level. Many
be designed afterwards and cascading scorecards of today’s organizations find themselves in a stage
may be used to aggregate results from various in which operational performance drives financial
levels of the organization (Bukh & Malmi, 2005). performance. Learning organizations (knowledge-
Suppliers performances can be also be linked oriented, human capital-oriented organizations)
up (Angerhofer & Angelides, 2006; Bostorff go one step further: self-organization and learning
929
EIS Systems and Quality Management
930
EIS Systems and Quality Management
Table 2. Left to right: building op compound types of KPI’s out of simple types and their evolution into
benchmark KPI’s like OEE. Left of the solid bar are the structured KPI types, right of the solid bar are
the unstructured types. They can either be processed into structured types or stored as unstructured
raw data.
931
EIS Systems and Quality Management
specific KPI’s ... and you can’t measure what you can’t
describe
Occasionally, sheer competing KPI’s can be
found. As an example, consider a research orga- In the context of this discussion, a measure-
nization’s ICT-network. The yearly operational ment is defined as follows (Hubbard, 2007): a
cost per seat of the network may be one KPI measurement is a set of observations that reduces
(target: < 8000 € per seat per year) while yearly uncertainty where the result is expressed as a
productive research hours may be another KPI quantity. Notice that a measurement is never an
(target: > 1200 hours per researcher per year) and exact number: there is always some uncertainty
the quality of research (target: >85% satisfactory associated with each measurement. A clear and
to the customer) a third. Perfect corrective and concise description is needed of what we want
preventive maintenance by the ICT department to measure exactly: the object of measurement.
may easily bring that first target in reach. But Just a name of some phenomenon or variable
at the same time, excessive network down time (indicator) is not enough. The same goes for
may obstruct reaching productive research hours a measurement method. Apart from the quite
(second KPI scores) and jeopardize the quality of measurable phenomena, organizations have a
work. By combining the three KPI’s into a single number of less-obviously-measured-but-vital-
OEE (Table 2), optimization can be done by low- to-know things, like quality of management and
ering the one or raising the other but not at the employee motivation. In modern literature, these
expense of the others and whilst optimizing the phenomena are commonly known as intangibles,
common (global) outcome. Neither availability e.g. (Hubbard, 2007).
of the network alone, nor performance in terms
of productive hours alone, nor quality alone is Lag and Lead Indicators
specific enough for the overall objective; only
the OEE, taking all three as input, multiplying KPI’s can be subdivided in lag and lead indicators
them, is specific enough. (Nudurupati, Arshad, & Turner, 2007; Woodhouse,
2000). A lag indicator reports on a past perfor-
Measurable KPI’s mance, lead indicators are indicators that flag
the advent of an event or state while emerging.
A well-known quote in quantified quality manage- Examples are:
ment reads (Kaplan et al., 2004c):
• Tooling speed decrease may indicate tool
You can’t manage what you can’t measure ... wear, causing productivity to be in peril;
932
EIS Systems and Quality Management
• A rising chisel temperature may indicate level to obtain proper productivity. According to
wear and breakdown to arrive; the measured KPI values (black solid dots), this
• Decreasing income tax agency website level is predicted to be reached after 3-4 days; the
visits may indicate a better understood in- predicted failure point is indicated in the diagram.
come tax form and consequently less pro- The alert level is predicted to be reached slightly
cessing and reviewing capacity needed at after 3.4 days; an alert with the KPI score at day
the agency next year; three allows for intervention lead time of 0.8 days.
• Employee dissatisfaction may be a lead-in If not sufficient, the alert level can be raised and
for employee absence due to illness. the alert will be issued earlier. This example is
highly simplified, to illustrate the various aspects
Lead indicators require careful (lead) timing, discussed inhere. In real practice, correct timing
depending on the underlying process dynamics of lead variables is much more complicated.
and the intervention model. With process dynam- Furthermore, it is good practice to verify and
ics being such that the targeted value (controlled validate adequate functioning of the KPI, includ-
object) can grow out of control in say 4 days, a ing timing and alert levels (the dynamics of the
monthly KPI is useless as a predictor. An hourly KPI). Scenario play, Monte-Carlo simulation
or perhaps a daily KPI would be sufficient, al- and determining confidence intervals can help
lowing for timely intervention. Critical alert to estimate reliable alert and intervention levels,
levels and lead time to intervention should also so that the actual maintenance moment is right
be taken into account. Lead time to intervention to stay on-target. The whole process of alerting,
(total response time included) should be sufficient responding and scheduling of the intervention
to allow for intervention as designed to unroll. (in total: lead time to intervention) must fit in
Timing is generally not a (big) issue for lagging the time span between alert and failure point,
KPI’s, which commonly average or sum up and together with the intervention time itself. For
log past performances over some time interval. further details, refer to (Brun et al., 2006; Dixon
Figure 4 shows an example of timing of a et al., 1983; Edgar, 2004; Hernandez-Matias et
lead variable. The tooling speed indicates tool al., 2008; Hubbard, 2007).
wear, which must stay above a critical bottom
Figure 4. Timing example for a tooling speed KPI. After 3 to 4 days, the tooling speed sinks below a
critical bottom level and the tool needs replacement and/or readjustment. Measuring the KPI value
daily predicts that failure point (here, after approx. 3.8 days) with sufficient accuracy to allow a timely
alert for intervention.
933
EIS Systems and Quality Management
Figure 5. Finding KPI’s means balancing what we need to know and the penalty of not knowing versus
what we can tell you and the value of that information.
Figure 6. KPI scores versus actual state; erroneous missing of bad performance (type-II errors) should
be zeroed out. False red alerts (type-I) are costly and slow down performance, but are not immediately
catastrophic. The balance is a costs/risk tradeoff.
934
EIS Systems and Quality Management
(Hubbard, 2007). Simplicity of computation and measurements pay off as long as they cost less
interpretation is to be traded off against chances than the EOL reduction gained (Figure 7).
of a false alert (a false red, taking a traffic light This theoretical framework may help to de-
metaphor again) or an unjustified performance termine the “right” quality of measurements and
OK (unjustified green). See Figure 6. What false information to support decision making. Com-
rates to tolerate is a matter of balancing the costs puting EVI values at beforehand is complicated,
and the risks. however. Hubbard suggests to compute the EVI
This brings us with the issue of the value of to exclude uncertainty altogether, i.e. computing
knowing and the cost of not knowing: the more the Expected Value of Perfect Information (EVPI).
we know, the smaller the uncertainty and the better Since it excludes the entire uncertainty (EOL-
the decision making, but also: the higher the cost. after = 0), by definition EVPI is the EOL of the
Where is the tradeoff? What are the chance and the chosen alternative without additional information.
cost of being wrong? Generally, lost opportunities Examples can be found in (Hubbard, 2007).
are capitalized and information that can reduce
the chances of missing an opportunity is assigned standardized and benchmark KPI’s
a value (Hubbard, 2007; Woodhouse, 2004). The
cost of being wrong is the difference between the For many applications, lists of useful KPI’s have
wrong chosen alternative (based upon the current been compiled and disclosed through internet.
information) and the best alternative (should one Branches and professional communities in chemistry,
have had perfect information). Opportunity Loss construction, health care, etc. are starting to collect
(OL) is the cost made for an alternative that turns and standardize KPI’s, to support self-assessment
out to be wrong, Expected Opportunity Loss and benchmarking. For further details and pointers
(EOL) is thus the chance times the cost of choos- to resources, see (Califf, Gibbons, Brindis, & Smith,
ing a wrong alternative. Reducing the uncertainty 2002; Campbell, Roland, & Buetow, 2000; Dolan,
about the best alternative reduces the chances of 2001; Drummond, O’Brien, Stoddart, & Torrance,
making the wrong choice and hence the EOL. 1997; Gouscos, Kalikakis, Legal, & Papadopoulou,
The difference in EOL before and after additional 2007; Holden, 2006; Nudurupati et al., 2007; Puig-
measurement is the Expected Value of Information janer & Guillen-Gosalbez, 2008; Schultink, 2000;
(EVI) resulting from those measurements. Extra Van den Eynde, Veno, & Hart, 2003).
Figure 7. The reduction of EOL (solid curve) versus the additional measurement cost (dashed curve) to
achieve that. As long as the loss reduction ∆loss exceeds the cost of additional measurements ∆cost, extra
measurements pay off, modified after (Hubbard, 2007).
935
EIS Systems and Quality Management
936
EIS Systems and Quality Management
this context is a collection of planned preventive REQUIREMENT 31: An EIS system shall
or corrective actions needed to restore proper allow for a documented validation up to strategic
quality performance. An intervention model is a control level;
compound structured object capturing information REQUIREMENT 32: An EIS can present
on actors to intervene, when intervention should pointers to root cause analysis objects associated
take place (lead time), the actions to undertake, to each KPI to allow verification of the indication
the (elapsed) time required and the way in which reflected by the KPI;
intervention is to be approved. Apart from a
scheduled intervention, the EIS shall support the
recording of a realized intervention, registering QMs AND EIs systEMs
what action has been conducted. Alternately, an
EIS may store a service level agreement (SLA), The above listed requirements partly overlap.
as a model of intervention; Furthermore, they have to be evaluated against
REQUIREMENT 29: An EIS system shall EIS technological characteristics as we understand
be capable of conducting transaction processing, them today. This will be done next.
alerting and reporting synchronously with limited
latency; (distributed) system latency and human Data types required
response time need to be taken into account when
verifying and validating lead indicator dynamics, Evaluating the above requirements, the following
just like time zone differences data types shall be supported by the EIS:
Documents (unstructured data types) may be
stEP 5: Verification contained:
strategic control
• In original format by a Document type;
Finally, verification and validation is carried out as • In restricted format (e.g., PDF) by a
to whether on-target KPI scores adequately indicate Document type or in a BLOB;
progress towards strategic change accomplish- • Scanned, in image format by a Document
ment, and reversely whether off-target KPI scores type or in a BLOB;
relate to strategic control under-performance. It • Or in the form of a hyperlink to an external
is also important to verify if all relevant aspects document;
of strategic change (transition) are covered by
the KPI’s. Commonly, the report mechanism up Typical EIS systems are expected to sup-
to board level is the BSC on which the KPI’s are port these types (except Document type), both
collected in a coherent scheme (Figure 3). Deeper
analysis can help to verify whether the indications Table 4. QMS-required data types.
from the designed BSC and their mutual relation-
ships provide a valid image of the current state of Structured data types Unstructured data types
organizational performance they reflect. Sensitivity • Regular types R-DBMS (int, • Document type
analysis, confidence intervals, scenario play can all String…), or: • BLOB data type
• Standard object types in • Hyperlink data type
be helpful instruments to investigate that. OODB
Important for the requirements on EIS systems: • Date Time type
• Actor type
REQUIREMENT 30: An EIS system shall be • Transaction
capable of presenting KPI values organized as in • Release/Version
• Flag data type (validated,
the designed BSC; archived, …)
937
EIS Systems and Quality Management
systems using relational data storage technology system. The first stage (data creation) may take
(RDBMS) and object-oriented storage technology place outside the scope of an EIS system, but data
(OODBMS). acquisition may be supported. Statistical analysis
is another function that may but not necessarily
KPI score Lifecycle is supported by an EIS system.
Measured KPI scores are to be evaluated
A KPI score lifecycle looks as follows; also refer against target values. The ISO principle of continu-
to (Nudurupati et al., 2007): ous improvement entails a regular sharpening of
the target value; an organization should evaluate
• data creation whether the target can be raised to a higher perfor-
◦ data source management mance level. Target values are coupled one-to-one
◦ data measurement equipment to the KPI, also have a history and versions, but
management typically have a lifecycle and refreshment cycle
◦ measured object collection much longer than that of the KPI itself, typically
◦ data measurement and acquisition yearly. Also, access rights and credentials needed
◦ data collection and structuring/ to modify target values are completely different
packaging from those of KPI scores themselves.
◦ data registration
◦ data transmission or reporting relationships
• data processing
◦ data intake With respect to relationships: optional and manda-
◦ data structure validation tory relationships of the type 0-to-1, 1-to-1, 1-to-n
◦ data completeness and integrity check and n-to-m should be supported by the EIS. This
◦ data access rights validation includes not only relationships among structured
◦ (singular) data quality control types but also among structured and unstructured
◦ data analysis and validation types and among unstructured types. EIS systems
◦ data equivalence estimation and may be expected to comply with this requirement.
transaction processing assignment
• data storage Ownership
◦ data ownership assignment
◦ data access rights assignment All data and all relationships can be assigned an
◦ data release and version assignment ownership (type Actor) and access rights. Higher
◦ data relationships (description etc.) stages of Business Excellence Models, Capability
assignment Maturity Models, etc. require that KPI’s and all
• data statistical quality control constituent measurements are documented and
• data and relationship interpretation managed, for instance by a Custodian, or a Data
• data distribution Manager. Change proposals for measurements and
• data release and version management change proposals for EIS systems must be merged
• data quality control and auditing and become in fact one and the same.
• data archiving
• data destruction transaction Processing
There are no stages in the above lifecycle that Apart from the regular transaction processing,
are not supported in some form by a typical EIS the following specific processing features shall
938
EIS Systems and Quality Management
be offered by the EIS system: and also stored in or aggregated from a single EIS
subsystem, to maintain optimal system character-
• Locked processing, single item or cascad- istics with respect to:
ing, with roll-back mechanism;
• Constrained insertion and deletion • Flexibility;
to enforce mandatory data item and • Modularity;
relationships; • Extendibility;
• Archiving data items with all related data;
• Modify Actors (for instance Ownership) See Figure 8. Flexibility, modularity and
on a group (release, version…) of data; extendibility are important aspects of system
• Online validation and online auditing, in a integration and system architecture. In the em-
work flow manner; bedding of KPI’s no unnecessary subsystem
• Manage (contain, handle and archive) un- dependencies are to be introduced. A proper
structured data items; Strategic objectives-CSF’s-Process and KPI’s
• Verify the validity of an external reference mapping onto subsystems may help to achieve
(hyperlinked object); this: Customer-relationship KPI’s in the CRM
• Manage externally referenced data objects subsystem, resource-related KPI’s in the ERP
(documents); subsystem, etc.
For lead KPI’s to function correctly, retrieval,
Preferably: computation, and in fact the availability of the EIS
(subsystems) must satisfy the timing requirements
• Apart from sorting and searching struc- as specified. For further details, refer to (Wier,
tured types (according to their value), Hunton, & HassabElnaby, 2007).
searching the content of unstructured types
is preferred;
FUtUrE trENDs
Data Volume
Issues, controversies, Problems
The EIS system must be capable of storing the and Potential solutions
KPI scores over a longer period of time. Archived
data may reside online or moved to some back- Organizations and their role in society changed
ground storage (tape, vault, WORM …). During and will continue to change. A historical over-
the design of the QMS, an estimate can be made view of enterprises and their industrial, economic
with respect to the expected data volume. and societal position can be taken from (Mokyr,
2005). Edgar, in (Edgar, 2004) identifies four
Data Distribution epochs, with quality movement, the previous
epoch, merging with the present 21st –century
Data distribution is typically through a web inter- enterprise view epoch. Traditionally, (for profit)
face and is not further discussed here. organizations sought to raise business revenues
and shareholder values through high outputs while
EIs subsystems minimizing productions costs. Today, product
quality and operational excellence are generally
Different KPI’s may originate from different EIS no longer sufficient to survive. Firstly, both LSE’s
subsystems. Preferably, KPI’s are associated with and SME’s are facing globalization forcing them
939
EIS Systems and Quality Management
Figure 8. Flexibility, modularity and extendibility are important aspects of system integration and system
architecture. In the embedding of KPI’s no unnecessary subsystem dependencies shall be introduced. A
proper Objectives-CSF’s-Process and KPI’s mapping onto subsystems may help to achieve this.
to reconsider the organization of their activities; in the twenty first century, organizations cannot
outsourcing, supplier chain networks, strategic operate in splendid isolation: they are (forced to
partner alliances, bundled products, alternate be) aware and confronted with public demands
delivery channels like online sales and the like, in on sustainability, setting forth ethical, societal,
a more or less global context. In the US in 2005, environmental expectations to comply with.
less than 5% of the retail activities took place on Organizations are foreseen to transform even
the Internet, in 2010 this figure is expected to go more rapidly in the future, to keep up with chang-
up to some 13% (Johnson, 2005). There is no room ing economic and societal demands (Amaravadi
to go further into these developments, see for in- Ch, 2003; Ein-Dor, 2003; Fuller, 2003a; Fuller,
stance (Gerritsen, 2008), also see (Hoogeweegen, 2003b; Hassan & McCaffer, 2002; Hoogeweegen
van Liere, Vervest, Hagdorn van der Meijden, & et al., 2006; Stevenson, 2000; Tsoukas & Shep-
de Lepper, 2006) for further details. herd, 2004; Warhurst, 2005). Contrary to classi-
Secondly, customers, having a global overview cal economical theory, China managed to show
over available options, prices and conditions, tremendous growth in SME start-ups without
nowadays find themselves in a strongly developed having a capitalist regime (Fuller, 2003b). Or-
consumers market, and act conformingly. More- ganizations will further virtualize (participate in
over, customers came to demand personalization, complex, geographically dispersed, dynamic and
options, connectivity and additional bundled fea- constantly changing alliances), become more open
tures through appropriate packaging, commonly and transparent to gain trust and confidence, and
grouped under the term mass customization. A much more agile when it comes to opting-in on
third factor is formed by increasingly compelling new opportunities. Organizations will understand
regulations and compliance demands. A fourth and exploit the fact that they are visible 24/7:
important factor is the increase of financial and branding, imaging, reputation and all other shine
fiscal models organizations (including SME’s) factors (Woodhouse, 2004), become dominant,
can choose from. Organizations develop or recon- although it is up to the customer to evaluate and
sider their strategic asset portfolio and changed acknowledge these qualities. Company culture will
their views on investments accordingly. Finally, radically change: the distance between managers
940
EIS Systems and Quality Management
and workers will diminish and shared company Branches, collectives, interest groups, etc.
knowledge will become a central asset. will seek to standardize KPI’s and large-scale
Virtualization will also bring about the need programmes and databases will emerge on in-
to share formally strictly internal data and infor- ternet (www.kpilibrary.com) to support self- and
mation with supply and delivery chain and with mutual excellence assessment, ultimately lever-
partners (Puigjaner et al., 2008). The intellectual ing the global quality of life (e.g. HEDIS, UN
property concerns will become more important, Habitat (Holden, 2006). Emerging examples are
compared to today. Sharing knowledge (learning the Capability Maturity Model modeling (CMM)
organization) empowers virtual companies and and EFQM assessment techniques (European
partnerships but new management models are Foundation Quality Management), the South
needed to render this process successful. African Excellence Model, all developed along
QMS-es tend to integrate with other per- the lines of TQM (Ahmad et al., 2002; Cobbold et
formance management frameworks, like asset al., 2002a; Woodhouse, 2000). The construction
management (see Figure 9). The recent PAS industry developed the Construction Best Practice
55, ISO 9001, ISO14001 and other develop- Programme (CBPP) that serves similar purposes
ments are expected to converge into a generic (Nudurupati et al., 2007).
performance-oriented management framework.
Lifecycle management will become a leading
principle. Product, material and knowledge loops cONcLUsION
will be closed, which means that for instance car
manufacturers take in cars they produced at the For large as well as medium and small enterprises
end of the lifecycle. Manufacturers will more and and other organizations, designing, implementing
more act as an owner, offering the product as an and using a QMS can naturally and swiftly be
asset to customers. integrated in EIS systems using either relational
Figure 9. The embedding of quality management in an asset value-centered asset management framework,
after (Woodhouse, 2004). Further development may converge into a generic performance management
framework (© 2004, The Woodhouse Partnership Ltd. Used with permission)
941
EIS Systems and Quality Management
or object-oriented storage technology. A number of Ahmad, M. M., & Dhafr, N. (2002). Establish-
requirements must be met, however, as discussed ing and improving manufacturing performance
in this chapter. Both structured and unstructured measures. Robotics and Computer-integrated
data and information shall be accommodated for, Manufacturing, 18, 171–176. doi:10.1016/S0736-
as well as historical data, verification, validation 5845(02)00007-8
and approval information, version and release
Amaravadi Ch, S. (2003). The world and busi-
and extensive roles and access rights models.
ness computing in 2051. The Journal of Strategic
The design of adequate KPI’s is a key step and
Information Systems, 12, 373–386. doi:10.1016/j.
interpreting them correctly during operational
jsis.2001.11.012
use, requires thorough cause-effect and accuracy
and sensitivity knowledge on the KPI. Report- Angerhofer, B. J., & Angelides, M. C. (2006). A
ing of the recorded KPI scores commonly takes model and a performance measurement system for
place using a balanced scorecard, which groups collaborative supply chains. Decision Support Sys-
KPI scores logically, perspective by perspec- tems, 42, 283–301. doi:10.1016/j.dss.2004.12.005
tive, so as to express maximum insight and as-
Bostorff, P., & Rosenbaum, R. (2003). Supply
sist maximally in adequate decision making. At
chain excellence; A handbook for dramatic im-
various organizational levels up to board level,
provement using the SCOR model. New York:
this evaluation instrument serves to monitor the
AMACOM; American Management Association.
delivery of performance and quality according to
the targets agreed upon. This approach facilitates Brun, A., Caridi, M., Salama, K. F., & Ravelli, I.
factual decision making and management control (2006). Value and risk assessment of supply chain
processes. Large, medium and small enterprises management improvement projects. International
and other organizations may implement systems Journal of Production Economics, 99, 186–201.
like this to increase customer satisfaction with doi:10.1016/j.ijpe.2004.12.016
zero defects whilst saving resources. Databases
Bukh, P. N., & Malmi, T. (2005). Re-examining
of more or less best practice KPI’s are starting to
the cause-and-effect principle of the balanced
appear on internet, realm-by-realm.
scorecard. In G.Jonsson & J. Mouritsen (Eds.),
In the future, more generic forms of perfor-
Accounting in Scnadinavia - Northern Lights (pp.
mance management are going to be seen, emerging
87-113). Malmo: Liber & Copenhagen Business
from the merger of present forms, like quality
School Press.
management and asset management. Although
ISO 9001 was considered in the above discus- Califf, R. M., Gibbons, R. J., Brindis, R. G., &
sion, all that has been said also applies to other Smith, S. C. (2002). Integrating Quality into the
quality approaches, like Total Quality Manage- Cycle of Therapeutic Development. Journal of the
ment (TQM), for ISO 9001 extensions like ISO/ American College of Cardiology, 40(11), 1895–
TS 16949:2002 for the Automotive industry and 1901. doi:10.1016/S0735-1097(02)02537-8
largely also for ISO 14001:2004.
Campbell, S. M., Roland, M. O., & Buetow, S.
A. (2000). Defining Quality of Care. Social Sci-
ence & Medicine, 51, 1611–1625. doi:10.1016/
rEFErENcEs
S0277-9536(00)00057-5
Adams, C. A., & Frost, G. R. (2008). Integrating
sustainability reporting into management prac-
tices. Accounting Forum.
942
EIS Systems and Quality Management
Cobbold, I., & Lawrie, G. (2002a). Classification Fuller, T. (2003b). Small bisness futures in society
of balanced scorecards based on their intended (Introduction). Futures, 35, 297–304. doi:10.1016/
use. PMA Conference. Berkshire, UK: 2GC Ltd. S0016-3287(02)00082-4
Cobbold, I., & Lawrie, G. (2002b). The devel- Gerritsen, B. H. M. (2008). Advances in Mass
opment of the balanced scorecard as a strategic customization and adaptive manufacturing. In
management tool. PMA Conference. Berkshire, I. Horvath & Z. Rusak (Eds.), TMCE 2008 (pp.
UK: 2GC Ltd. 869-880). Delft, Netherlands: Delft University.
Daniel, R. D. (1961). Management information Gouscos, D., Kalikakis, M., Legal, M., & Papado-
crisis. Harvard Business Review, 39(Sept-Oct). poulou, S. (2007). A general model of performance
and quality for one-stop e-Government service
Dixon, W. J., & Massey, F. J. (1983). Introduc-
offerings. Government Information Quarterly, 24,
tion to statistical analysis. (3rd ed.) New York:
860–885. doi:10.1016/j.giq.2006.07.016
McGraw-Hill Book Company.
Hassan, T. M., & McCaffer, R. (2002). Vision of
Dolan, P. (2001). Output measures and valuation in
the large scale engineering construction industry in
health. In M.F.Drummond & A. McGuire (Eds.),
Europe. Automation in Construction, 11, 421–437.
Economic evaluation in health care (pp. 46-67).
doi:10.1016/S0926-5805(01)00074-7
Oxford: Oxford University Press.
Hernandez-Matias, J. C., Vizan, A., Perez-Garcia,
Drummond, M. F., O’Brien, B., Stoddart, G. L., &
J., & Rios, J. (2008). An integrated modelling
Torrance, G. W. (1997). Methods for the economic
framework to support manufacturing system
evaluation of health care programmes (2nd ed.).
diagnosis for continuous improvement. Robotics
Oxford: Oxford University Press.
and Computer-integrated Manufacturing, 24,
Edgar, Th. F. (2004). Control and operations: 187–199. doi:10.1016/j.rcim.2006.10.003
When does controllability equal profitability?
Holden, M. (2006). Urban Indicators and the Inte-
Computers & Chemical Engineering, 29, 41–49.
grative Ideals of Cities. Cities (London, England),
doi:10.1016/j.compchemeng.2004.07.013
23(3), 170–183. doi:10.1016/j.cities.2006.03.001
Ein-Dor, Ph. (2003). The world and business com-
Hoogeweegen, M., van Liere, D. W., Vervest, P.
puting in 2051: from LEO to RUR? The Journal
H. M., Hagdorn van der Meijden, L., & de Lepper,
of Strategic Information Systems, 12, 357–371.
I. (2006). Strategizing for mass customization by
doi:10.1016/j.jsis.2001.11.011
playing the business networking game. Decision
Forster, N. S., & Rockart, J. F. (1989). Critical Support Systems, 42, 1402–1412. doi:10.1016/j.
success factors: An annotated bibliography (Rep. dss.2005.11.007
No. CISR WP No. 191, Sloan WP No. 3041-89).
Huang, H.-C. (in press). Designing a knowledge-
Cambridge, MA: Sloan School of Management,
based system for strategic planning: A balanced
MIT.
scorecard perspective. Expert Systems with Ap-
Fuller, T. (2003a). If you wanted to know the plications.
future of small business what questions would
Hubbard, D. W. (2007). How to measure anything;
you ask? Futures, 35, 305–321. doi:10.1016/
Finding the value of intangibles in business. John
S0016-3287(02)00083-6
Wiley & Sons, Inc.
943
EIS Systems and Quality Management
Hwang, W. T., Tien, W. T., & Shu, C. M. (2007). Kaplan, R. S., & Norton, D. P. (2001b). Trans-
Building an executive information system for forming the balanced scorecard from performance
maintenance efficiency in petrochemical plants measurement to strategic management: Part II. Ac-
-- an evaluation. Trans IChemE, Part B . Pro- counting Horizons, 15(2), 147–162. doi:10.2308/
cess Safety and Environmental Protection, 85, acch.2001.15.2.147
139–146. doi:10.1205/psep06019
Kaplan, R. S., & Norton, D. P. (2004a). How
International Organization for Standardization strategy maps frame an organization’s objectives.
ISO. (2008). ISO in figures for the year 2007 Financial Executive, 20(2), 40–45.
Geneva: ISO Central Secretariat.
Kaplan, R. S., & Norton, D. P. (2004a). Measur-
ISO. (2006). [ISO International Organization for ing the strategic readiness of intangible assets.
Standardization. Retrieved from ttp://www.iso. Harvard Business Review, 82(2), 52–63.
org]. Survey (London, England), 2006.
Kaplan, R. S., & Norton, D. P. (2004b). Strategy
Johnson, C. (2005). US e-commerce: 2005 to maps: Converting intangible assets into outcomes.
2010, a five year forecast and analysis of US Boston, MA: Harvard Business School Press.
online retail sales. Forrester Research.
Kaplan, R. S., & Norton, D. P. (2004c). Strategy
Kaplan, R. S., & Norton, D. P. (1992). The bal- Maps; Converting Intangible Assets into Tangible
ance scorecard - measures that drive performance. Outcomes. Boston: Harvard Business School
Harvard Business Review, 70(1), 71–79. Press.
Kaplan, R. S., & Norton, D. P. (1993). Putting the Kaplan, R. S., & Norton, D. P. (2004c). The
balanced scorecard to work. Harvard Business strategy map: Guide to aligning intangible as-
Review, 71(5), 134–140. sets. Strategy and Leadership, 32(5), 10–17.
doi:10.1108/10878570410699825
Kaplan, R. S., & Norton, D. P. (1996a). The bal-
anced scorecard. Boston, MA: Harvard Business Kaplan, R. S., & Norton, D. P. (2006). Alignment:
School Press. Using the balanced scorecard to create corporate
synergies. Boston, MA: Harvard Business School
Kaplan, R. S., & Norton, D. P. (1996b). Using
Press.
the balance scorecard as a strategic management
system. Harvard Business Review, 74(1), 75–85. Kim, H.-S., & Kim, Y.-G. (2008). A CRM perfor-
mance measurement framework: its development
Kaplan, R. S., & Norton, D. P. (2001a). The
process and application. Industrial Marketing
strategy-focused organization. Strategy and
Management.
Leadership, 29(3), 41–43.
Mather, D. (2003). CMMS: A timesaving imple-
Kaplan, R. S., & Norton, D. P. (2001a). Trans-
mentation process. Boca Raton, FL: CRC Press.
forming the balanced scorecard from performance
measurement to strategic management: Part I. Ac- Mokyr, J. (2005). The gifts of Athena; Historical
counting Horizons, 15(1), 87–106. doi:10.2308/ origins of the knowledge economy. Princeton, NJ:
acch.2001.15.1.87 Princeton University Press.
Niven, P. R. (2005). Balanced scorecard diag-
nostics; Maintaining maximum performance.
Hoboken, NJ: John Wiley & Sons, Inc.
944
EIS Systems and Quality Management
Nudurupati, S., Arshad, T., & Turner, T. (2007). Ugwu, O. O., & Haupt, T. C. (2007). Key per-
Performance measurement in the construction formance indicators and assessment methods for
industry: An action case investigating manufac- infrastructure sustainability -- a South African
turing methodologies. Computers in Industry, 58, construction industry perspective. Building and
667–676. doi:10.1016/j.compind.2007.05.005 Environment, 42, 665–680. doi:10.1016/j.build-
env.2005.10.018
Puigjaner, L., & Guillen-Gosalbez, G. (2008).
Towards an integrated framework for supply chain Van den Eynde, J., Veno, A., & Hart, A. (2003).
management in the batch chemical process indus- They look good but don’t work: a case study of
try. Computers & Chemical Engineering, 32, 650– global performance indicators in crime prevention.
670. doi:10.1016/j.compchemeng.2007.02.004 Evaluation and Program Planning, 26, 237–248.
doi:10.1016/S0149-7189(03)00028-4
Rockart, J. F. (1986). A primer on critical success
factors. In C.V.Bullen (Ed.), The rise of managerial Warhurst, A. (2005). Future roles of business in
computing: The best of the center for Information society: The expanding boundaries of corporate
Systems research (pp. 383-423). Cambridge, MA: responsibility and a compelling case for part-
Sloan School of Management, MIT. nership. Futures, 37, 151–168. doi:10.1016/j.
futures.2004.03.033
Schultink, G. (2000). Critical environmental indi-
cators: Performance indices and assessment meth- Wier, B., Hunton, J., & HassabElnaby, H. R.
ods for sustainable rural development planning. (2007). Enterprise resource planning systems
Ecological Modelling, 130, 47–58. doi:10.1016/ and non-financial performance incentives: The
S0304-3800(00)00212-X joint impact on corporate performance. Int.J.of
Accounting Information Systems, 8, 165-190.
Stevenson, T. (2000). Will our futures look dif-
ferent, now? Futures, 32, 91–102. doi:10.1016/ Woodhouse, J. (2000). Key performance indica-
S0016-3287(99)00069-5 tors. Retrieved from http://www.TWPL.com
Tsoukas, H., & Shepherd, J. (2004). Coping with Woodhouse, J. (2004). Closing the loop: sustain-
the future: developing organizational foresight- able implementations of improvements. In ERTC
fulness (Introduction). Futures, 36, 137–144. Reliability & Asset Management Conference; Oil,
doi:10.1016/S0016-3287(03)00146-0 Gas, Petrochem & Power Industries.
This work was previously published in Enterprise Information Systems for Business Integration in SMEs: Technological,
Organizational, and Social Dimensions, edited by Maria Manuela Cruz-Cunha, pp. 300-325, copyright 2010 by Business Sci-
ence Reference (an imprint of IGI Global).
945
946
Chapter 4.3
A Procedure Model for a SOA-
Based Integration of Enterprise
Systems
Anne Lämmer
sd&m AG, Germany
Sandy Eggert
University of Potsdam, Germany
Norbert Gronau
University of Potsdam, Germany
AbstrAct INtrODUctION
Enterprise systems are being transferred into a Enterprise resource planning systems (ERP sys-
service-oriented architecture. In this article we tems) are enterprise information systems designed
present a procedure for the integration of enter- to support business processes. They partially
prise systems. The procedure model starts with or completely include functions such as order
decomposition into Web services. This is followed processing, purchasing, production scheduling,
by mapping redundant functions and assigning dispatching, financial accounting and controlling
of the original source code to the Web services, (Stahlknecht & Hasenkamp, 2002). ERP systems
which are orchestrated in the final step. Finally an are the backbone of information management in
example is given how to integrate an Enterprise many industrial and commercial enterprises and
Resource Planning System and an Enterprise focus on the management of master and transac-
Content Management System using the proposed tion data (Kalakota & Robinson, 2001). Besides
procedure model. ERP systems, enterprise content management
Copyright © 2011, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Procedure Model for a SOA-Based Integration of Enterprise Systems
systems (ECM systems) have also developed into SOA is suitable for a process oriented, distributed
companywide application systems over the last integration (Schönherr, 2005). However, the ad-
few years. ECM solutions focus on indexing all dressed goals of component orientation and SOA
information within an enterprise (Müller, 2003). are similar: different enterprise systems are con-
They cover the processes of enterprise-wide nected through one interface, and a cross-system
content collection, creation, editing, managing, data transfer and the reusage of objects or com-
dispensing and use, in order to improve enterprise ponents is enabled. Thereby a service represents
and cooperation processes (Koop, Jäckel, & van a well-defined function which is generated in
Offern, 2001; Kutsch, 2005). In order to man- reaction to an electronic request (Burbeck, 2000).
age information independently, ECM combines The SOA approach offers a relatively easy way
technologies such as document management, to connect, add and exchange single services,
digital archiving, content management, workflow which highly simplifies the integration of similar
management and so forth. The use of ECM sys- systems (e.g., enterprise take-over). Moreover,
tems is constantly on the rise (Zöller, 2005). This SOA offers a high degree of interoperability and
leads to an increasing motivation for enterprises modularity (Behrmann & Benz, 2005), which
to integrate the ECM systems within the exist- increases the adaptability of enterprise systems
ing ERP systems, especially when considering (Gronau et al., 2006).
growing international competition. The need for The SOA approach is based on the concept of
integration is also eminently based on economi- service. The sender wants to use a service and in
cal aspects, such as the expense factor in system doing so the sender wants to achieve a specific
run time (Schönherr, 2005). For a cross-system result. Thereby the sender is not interested in
improvement of business processes, enterprise how the request is processed or which further
systems have to be integrated. requests are necessary. This is the idea of SOA,
where services are defined in a specific language
and referenced in a service index. Service request
rELAtED WOrK and data exchange occur via use of predefined
protocols (Dostal, Jeckle, Melzer, & Zengler,
service Oriented Architecture as an 2005; Küster, 2003).
Integration Approach This service orientation can be used on
different levels of architecture. The grid archi-
A number of integration approaches and concepts tecture is a common example of infrastructure
already exist. They can be differentiated by in- level (Bermann, Fox, & Hey, 2003; Bry, Nagel,
tegration level (for example data, functions or & Schroeder, 2004). On the application level an
process integration) and integration architecture implementation usually takes place in terms of
(for example point-to-point, hub & spoke, SOA) Web services.
(Schönherr, 2005). This article presents an ap- The use of Web services offers the possibil-
proach to integrating enterprise systems by way ity of reusing raw source code, which is merely
of building up service-oriented architectures. transferred to another environment (Sneed, 2006).
This integration approach is of special interest The benefit of this transfer is the re-usage of per-
and will be described in more detail. fected (old) algorithms. The main disadvantage
The concept of service orientation is currently is the necessity of revising the raw source code
being intensively discussed. It can be differenti- in order to find possible dependencies (Sneed,
ated from component orientation by its composi- 2006). This is also true for enterprise systems. It
tion and index service (repository). Additionally, is not efficient to reuse the entire old system, but
947
A Procedure Model for a SOA-Based Integration of Enterprise Systems
rather only significant parts of it. To accomplish or dependencies of code parts or components.
this it is necessary to deconstruct the old enter- Other types of symptoms are possible. In general,
prise system and to locate the source code parts the answer to questions concerning the measure
which can effectively be reused. Our approach of interesting items provides hints for possible
uses self-diagnosis for finding these source code symptoms.
locations. This analysis will be considered in the Self-diagnosis can be categorized by the
third integration step. symptom acquisition method. Active and passive
self-diagnosis must also be distinguished. In this
self-Diagnosis context, the program or source code is the crucial
factor for a division between active and passive
As just described, our approach uses self-diagnosis self-diagnosis. A fundamental basis for either
for location of useful source code. For this, the alternative is an observer or monitor.
method of self-diagnosis will be presented and the Using passive self-diagnosis, the monitor
differences to other approaches will be shown. detects and collects symptoms and information.
Some approaches for transformation of legacy- It can either be activated automatically or manu-
systems into a SOA exist already. However, these ally (Gronau et al., 2006). If you know which
approaches see the whole system as one service. items need to be observed and the point where
The system gets a service description for using this information can be gathered, you only have
this service in a SOA. Our approach differs in that to monitor this point. This is what passive self-
it deconstructs the system for a tailored need. For diagnosis does. For example: if you want to know
this, the method of self-diagnosis is used. how often a button is pressed, you have to find
Self-diagnosis can be defined as a system’s where the button-event is implemented in the
capacity to assign a specific diagnosis to a detected code and observe this button-event.
symptom. The detection of symptoms and assign- In active self-diagnosis, the program’s func-
ment are performed by the system itself without tion or modules are the active elements. They
any outside influence (Latif-Shabgahi, Bass, & send defined information to the monitor and act
Bennett, 1999). The mechanism of self-diagnosis independently if necessary. The monitor is used
has been detected surveying natural systems; it can as receiver and interprets the gathered informa-
partly be applied to artificial systems as well. tion and symptoms. The main advantage of ac-
The first step of self-diagnosis is the detection tive self-diagnosis is the possibility of detecting
of symptoms. Usually the detection of one existing new symptoms, even if no clear diagnosis can
symptom is not sufficient to make an indisputable be made before the problems become acute and
diagnosis. In this case, more information and data are forwarded to other systems. In contrast, us-
have to be gathered. This can be described as ing passive self-diagnosis, the monitor can only
symptom collection. In a second step the symp- inquire about specific data. In this case, a response
toms are assigned to a specific diagnosis. Depend- or further examination is only possible if the
ing on the diagnosis, corresponding measures can problem is already known. For example: if you
be taken (Horling, Benyo, & Lesser, 2001). do not know the location of all the buttons and
Symptoms are a very abstract part of self- or the code component for the button-event, you
diagnosis. These symptoms can be a high network will have to recognize all events with their initial
load in distributed systems, missing signals, or point and filter them with the monitor. The monitor
buffer overload of the hardware layer. For enter- does not have to know how many buttons exist or
prise systems the symptoms can be the frequency where their code is located, but the buttons have
of usage of user interface elements by the user
948
A Procedure Model for a SOA-Based Integration of Enterprise Systems
to “know” to register with the monitor. These are services, which is orchestrated in the last step.
the requirements of active self-diagnosis. The process includes taking the old ERP
The assembly of diagnosis points depends on system; deconstructing it into different abstrac-
the application context and the software system. tion levels such as functional entities or business
The required time and effort cannot be specified; objects, searching for redundant entities, allo-
it depends on the design and implementation of cating the code fragments dependent on these
the software system. functional entities and encapsulating them. This
Self-diagnosis can also be employed for the results in many independent functional entities,
examination of source-code usage and interde- which can be described as a service. They have
pendences. Depending on the desired information, different abstraction levels and have to compose
different points of diagnosis have to be integrated and orchestrate with, for example BPEL-WS.
into the source-code. This composition and orchestration is the way
Different points of diagnosis have to be deter- of integration.
mined in order to allow for the allocation of code
parts to various fields and functions. Therefore Deconstruction of systems
context, programming language, and software
system architecture must be considered. First, the systems which are to be integrated are
Our approach uses this method to locate code deconstructed into services. The challenge of
parts that can be collected into components. As this step depends on the number of particular
we will demonstrate later in this article, we need services, which could span the range from one
to locate functions and enterprise systems busi- single service per system, up to a definition of
ness objects. every single method or function within a system
This method can be used for the detection of as a service. In the case of a very broad defini-
code parts which are possible services. Diag- tion, the advantages, such as easy maintenance
nosis points must thereby be integrated into the and reuse and so forth, will be lost. In case of a
system source code, and software dependencies very narrow definition, disadvantages concerning
analyzed. performance and orchestration develop; the con-
As we discussed earlier in this article, the figuration and interdependencies of the services
main challenges in integration of legacy enter- become too complex.
prise systems like ERP and ECM are, first, the This article proposes a hierarchical approach
deconstruction and second, the allocation of code. which describes services of different granular
To address these challenges, we have developed a qualities on three hierarchical levels. Areas of
procedure model which will be described next. function of a system are described as the first
of these levels (Figure 1, Part 1). For example,
an area of functions could include purchase or
PrOcEDUrE MODEL sales in the case of an ERP system or, in the case
of ECM systems, archiving or content manage-
In the following, a procedure model that integrates ment. An area of function can be determined on
general application systems within a company is the abstract level by posing questions about the
presented. The procedure model begins with the general “assigned task” of the system. The dif-
deconstruction of systems into Web services. This ferences between the three hierarchical levels
is followed by a mapping of redundant functions can be discovered by answering the following
and the assignment of original source code to Web questions:
949
A Procedure Model for a SOA-Based Integration of Enterprise Systems
Result : The services on the first level which constitute the basic task.
Result: The services on the second level which are contributed by the
different functions
Question 1: Which tasks, functions and basic functions appear more than
once?
950
A Procedure Model for a SOA-Based Integration of Enterprise Systems
1. Question: What are the tasks of the particu- Preparation and Mapping
lar system? The answers resulting from this
step correspond to services on the first level, The main advantage of Web service architecture
which constitute the general task—for ex- is the high degree of possible reuse. By division
ample sales, purchasing, inventory manage- into three hierarchical levels, a detection of similar
ment or workflow management, archiving functions is made possible, especially on the level
or content management. These tasks are of functionality and business objects. In some
abstract and describe main functionalities. cases an adjustment of the functions is neces-
They consist of many other functions which sary in order to serve different contexts of use.
are the objects of the next level. Therefore, the next step consists of integration
2. Question: Which functionality derives on different levels and the mapping of identical
from every single task? The answers to functions (Figure 1, Part 2). This step poses the
this question correspond to the services following questions:
on the second level that are contributed by
the various functions. These functions are 1. Question: Which tasks, functions and busi-
more detailed than the general tasks. They ness objects appear more than once? For
describe what the tasks consist of and what example, most applications contain search
they do—for example, calculate the delivery functions. Some applications have functions
time, identify a major customer, or constitute for check in and check out. ERP systems
check-in and e-mail functionalities. For these calculate the time for many things with the
functions the application needs data, which same algorithm under different names.
can found in the third level. 2. Question: Are these multiple functions and
3. Question: Which business objects are uti- objects-redundant, that is superfluous, or do
lized by both systems? This answer consists they provide different services? Some func-
of the number of business objects that will tions may have the same name but perform
be used as basic objects in both systems, different tasks.
for example article data, customer data or 3. Question: Can these multiple functions and
index data. objects be combined by way of appropriate
programming? For the functions ascertained
In this procedure model, all possible levels in Question 2 to be similar functions with
of service deconstruction are addressed; yet the different names the possibility of integrating
realization on all hierarchical levels constitutes them into one has to be analyzed.
an individual task.
The result of this step is a 3-stage model dis- The advantage of this mapping is the detection
playing the services of an application. The data- of identical functions, which may by only named
level, that is the integration of databases, is not differently while completing the same task. In
further examined at this point since it is not an doing so, the benefit of reuse can be exploited to a
integral part of our model, the aim of which is to high degree. Additionally, this part of the survey
wrap functions as Web services without altering allows for a minimization of programming, due
them or the original source code. The data level to the encapsulation of multiple functions. Only
is not touched by this process. those functions which share a high number of
similarities, but nevertheless complete different
tasks, have to be programmed differently; they
can be merged by reprogramming.
951
A Procedure Model for a SOA-Based Integration of Enterprise Systems
It is important to note that for this part the language, making possible the reuse of source
deconstruction consists of an abstract level and code in service oriented architecture.
is in the functional view. In the following step, If redundant services have been detected in
this will change from a functional view to a code Part 2, which need to be reengineered, then the
view. reengineering happens now.
952
A Procedure Model for a SOA-Based Integration of Enterprise Systems
check in identify delivery time check out check in email connection create index te rms
953
A Procedure Model for a SOA-Based Integration of Enterprise Systems
The basic functions of an ERP system are pur- such as invoices or new articles. The estimation
chasing, sales, master data management, inven- of analogy of different functions, particularly
tory management und repository management. in enterprise systems where implementation is
Document management, content management, different, lies in the expertise of the developer.
records management, workflow management and Another example is the service “check in/check
portal management are basic functions of ECM out”. This service is a basic function of both ERP
systems. Subsequently, the areas of functions and ECM systems and is now to be examined for
are disaggregated into separate tasks. Business possible redundancy. After determining that the
objects are classified such as the business object services “check in” or “check out” are equal, the
“article” or “customer”. Thus, segmentation in service will be registered as a basic function only
areas of functions, tasks of functions and business once. Services which are not equal but related
objects is achieved and a basis for the reusage of will be checked in another step and either unified
services is created. with suitable programming or, if possible, spilt
into different services. The results of this step are
Part 2: Preparation of Integration/ the classification of services from ERP and ECM
Mapping systems into similar areas and the separation of
redundant services. The following table shows
The results of the first step of the segmentation are examples of separated services.
separation of services of differentiated granularity By this separation of both enterprise systems, a
per system. According to the procedure model, the higher degree of re-usage and improved complex-
mapping on the different areas will be arranged ity handling of these systems is achieved. For the
in the second step. For that purpose, the potential application of services, a service-oriented archi-
services described will be examined for similari- tecture (SOA) which defines the different roles
ties. On every level of hierarchy, the functional of participants is now required (Burbeck, 2000).
descriptions (answers to questions in Part 1) of ser-
vices are checked and compared with each other. Part 3: Detection and Assignment of
If functions or tasks are similar, they will have services to code Fragments
to be checked for possibility of combination and
be slotted for later reprogramming. One example As already described in the general introduction,
of such similarity between functions is “create the identification of functions to be segmented
index terms”. Most enterprise systems include in the source code constitutes one of the biggest
the function “create index terms” for documents challenges in a transfer to service-oriented archi-
954
A Procedure Model for a SOA-Based Integration of Enterprise Systems
tecture. As part of this approach, the method of Web services with help of workflow technologies
self-diagnosis is suggested. Appropriate points (Leymann, 2003). In BPEL, a process is defined
of diagnosis will be linked to the source code in which is started by a workflow system in order
order to draw conclusions from used functions to to start a business process.
associated class, method or function in the original Web services are addressed via a graphical
source code. Through the use of aspect oriented representation with a modelling imagery of WS-
programming, aspects can be programmed and BPEL. The business process is modelled inde-
linked to the classes and methods of the application pendently from the original enterprise systems.
system. Necessary data, such as the name of the Since in the first integration step, the systems
accessed method, can be collected by accessing were separated by their tasks and functions, now
the respective classes and methods (Vanderperren, all of the functions are available for the business
Suvée, Verheecke, Cibrán, & Jonckers, 2005). process as well.
Based on a defined service, “order transaction”,
all the names of methods which are necessary
for the execution of “order transaction” must be cONcLUsION
identified. To wrap the service “order transaction”,
for example to combine it with a Web service The procedure model for the integration of ap-
description language, the original methods need plication systems as it has been presented in this
be searched for and encapsulated. Additionally, paper is an approach that has been successfully
the reprogramming of redundant functions is deployed in one case. Currently the assignment
part of the phase of identification and isolation ability and the universality are being tested. The
of services. This, as well, is only possible if the self-diagnosis, that is the assignment of source
original methods are identified. code to services via aspect oriented programming,
constitutes a bigger challenge.
Part 4: Orchestration of Web A verification of costs and benefits cannot
services be given sufficiently; however, several examples
show convincing results and suggest a general
The last integration phase is used to compile Web transferability. The complexity in such a realiza-
services. The previous steps had to be completed tion cannot be specified. Particularly for bigger
in preparation for the procedure model. The Web and complex systems, the cost-to-benefit ratio
services now are completely described and have has to be verified. Despite this, it must be rec-
a URI to be accessed. Now, only the composition ognized that the assignment of code fragments
and the chronology of requests of the specific Web to functions is not an easy task. If one observes
services are missing. For the orchestration the every method call a high number of calls must
Web service business process execution language be analyzed. Visualization can be helpful for
(WS-BPEL) is recommended. The WS-BPEL was analyzing, since method calls belonging together
developed by the OASIS-Group and is currently will build a cluster in the emerging network. The
in the process of standardization (Cover, 2005). observation of method calls is possibly not the
If the Web services present a function with a most optimal way for very complex systems. If
business process, the WS-BPEL is particularly the functional view of services in Part 1 is not
suitable for orchestration of Web services (Lübke, part of the business object layer, but only of the
Lüecke, Schneider, & Gómez, 2006). Essentially, general task layer, one can reduce the numbers of
BPEL is a language to compose (Leymann & diagnosis points. The possibilities depend on the
Roller, 2000) new Web services from existing programming language and their constructs.
955
A Procedure Model for a SOA-Based Integration of Enterprise Systems
Finally, the approach presented above de- Bry, F., Nagel, W., & Schroeder, M. (2004).
scribes a procedure model for service-oriented Grid computing. Informatik Spektrum, 27(6),
integration of different application systems. The 542-545.
integration proceeds using Web services which
Burbeck, S., (2000). The Tao of e-business
thereby improve the integration ability, interoper-
services. IBM Corporation. Retrieved January
ability, flexibility and sustainability. The reusable
12, 2008, from http://www.ibm.com/software/
Web services facilitate the extraction of several
developer/library/ws-tao/index.html
functions and combination of these into a new
service. This allows for reuse of several software Cover, R. (2004). Web standards for business
components. process modelling, collaboration, and choreog-
Altogether, Web services improve the adapt- raphy. Retrieved January 12, 2008, from http://
ability of software systems to the business pro- xml.coverpages.org/bpm.html
cesses and increase efficiency (Hofman, 2003). To
Dostal, W., Jeckle, M., Melzer, I., & Zengler, B.
give an example of the realization of the procedure
(2005). Service-orientierte architekturen mit Web
model, an integration of an ERP- and ECM-system
services [Service oriented architectures with web
was chosen. The reasons for this choice consist
services]. Spektrum Akademischer Verlag.
in targeted improvement of business aspects and
increasing complexity of both application systems. Gronau, N., Lämmer, A., & Andresen, K. (2006).
Dealing with this complexity makes integration Entwicklung wandlungsfähiger auftragsab-
necessary. Through mapping, redundant functions wicklungssysteme [Development of adaptable
can be detected and as a consequence, a reduction enterprise systems]. In N. Gronau, A. Lämmer
of the complexity is made possible. Regarding the (Eds.), Wandlungsfähige ERP-Systeme (37-56).
adaptability and flexibility of affected application Gito Verlag.
systems, Web services are a suitable approach for
Gronau, N., Lämmer, A., & Müller, C. (2006).
integration. In particular, it is the reuse of services
Selbstorganisierte dienstleistungsnetzwerke im
and an adaptable infrastructure which facilitate
maschinen- und anlagenbau [Self organized
the integration.
service networks at engineering]. Industrie-
In addition to all of this, we expect to discover
Management, 2, 9-12.
additional advantages concerning maintenance
and administration of affected application sys- Hofmann, O. (2003). Web-services in serviceori-
tems. entierten IT-Architekturkonzepten [Web services
in service oriented concepts of IT architecture].
In H.-P. Fröschle (Ed.), Web-services. Praxis der
rEFErENcEs Wirtschaftinformatik, HMD 234, dpunkt Verlag,
Wiesbaden 2003, S.27-33.
Behrmann, T., & Benz, T. (2005). Service- Horling, B., Benyo, B., & Lesser, V. (2001) Using
oriented-architecture-ERP. In T. Benz (Ed.), self-diagnosis to adapt organizational structures.
Forschungsbericht 2005 Interdisziplinäres Institut Computer Science Technical Report TR-99-64,
für intelligente Geschäftsprozesse. University of Massachusetts.
Berman, F., Fox, G., & Hey, T. (2003). Grid Issing, F. (2003). Die softwarestrategie für web-
computing. Making the global infrastrucure a services und unternehmensinfrastrukturen der
reality. Wiley. firma Sun Microsystems [Software strategy
for web services and enterprise infrastructures
956
A Procedure Model for a SOA-Based Integration of Enterprise Systems
of Sun Microsystems]. In H.-P. Fröschle (Ed.), tributed Processingm, PDP’99 IEEE Computer
Web-Services (pp. 17-26). Praxis der Wirtschaf- Society (pp. 97-104).
tinformatik, HMD 234, dpunkt Verlag.
Lübke, D., Lüecke, T., Schneider, K., & Gómez,
Kalakota, R., & Robinson, M. (2002). Praxishand- J. M. (2006). Using event-driven process chains
buch des e-business [Practice e-business]. Book of of model-driven development of business appli-
practice financial times. Prentice Hall, 317ff. cations. In F. Lehner, H. Nösekabel, & P. Klein-
schmidt (Eds.), Multikonferenz wirtschaftsinfor-
Koop, H. J., Jäckel, K. K., & van Offern, A. L.
matik 2006 (pp. 265-279). GITO-Verlag.
(2001). Erfolgsfaktor content management—Vom
Web-content bis zum knowledge management Müller, D. (2003). Was ist enterprise-content-
[Success factor enterprise content management— management? [What is enterprise content
from web-content to knowledge management]. management?] Retrieved January 14, 2008,
Vieweg:Verlag. from http://www.zdnet.de/ itmanager/strat-
egie/0,39023331,2138476,00.htm
Küster, M. W. (2003). Web-services—Verspre-
chen und realität [Web services—promises and Schönherr, M. (2005). Enterprise applikation
reality]. In H.-P. Fröschle (Ed.), Web-services (pp. integration (EAI) und middleware, grundlagen,
5-15). Praxis der Wirtschaftinformatik, HMD architekturen und auswahlkriterien [Enterprise
234, dpunkt Verlag. application integration (EAI) and middleware,
fundamentals, architectures and criteria of choice].
Kutsch, O. (2005). Enterprise-content-manage-
ERP Management, 1, 25-29.
ment bei finanzdienstleistern—Integration in
strategien, prozesse und systeme [Enterprise con- Scheckenbach, R. (1997). Semantische geschäfts-
tent management at financial service provider— prozessintegration [Semantic integration of busi-
Integration at strategies, processes and systems]. ness processes]. Deutscher Universitäts:Verlag.
Deutscher Universitäts: Verlag.
Stahlknecht, P., & Hasenkamp, U. (2002). Einfüh-
Kuropka, D., Bog, A., & Weske, M. (2006). Se- rung in die wirtschaftsinformatik [Introduction to
mantic enterprise services platform: Motivation, business computing] (10th ed). Springer Verlag.
potential, functionality and application scenarios.
Sneed, H. M. (2006). Reengineering von legacy
In Proceedings of the 10th IEEE International
programmen für die wiederverwendung als web
EDOC Enterprise Computing Conference (pp.
services [Reengineering of legacy software for
253-261). Hong Kong.
reuse as web services]. In Proceedings zum Work-
Leymann, F., & Roller, D. (2000). Production shop Software-Reengineering und Services der
workflow—Concepts and techniques. Prentice Multikonferenz Wirtschaftsinformatik.
Hall International.
Vanderperren, W., Suvée, D., Verheecke, B.,
Leymann, F. (2003). Choreography: Geschäftspro- Cibrán, M. A., & Jonckers, V. (2005). Adaptive
zesses mit web services [Choreography: Business programming in JAsCo. In Proceedings of the
processes with web services]. OBJECTspektrum, 4th International Conference on Aspect-Oriented
6, 52-59. Software Development. ACM Press.
Latif-Shabgahi, G., Bass, J. M., & Bennett, S. Zöller, B. (2005). Vom archiv zum enterprise
(1999). Integrating selected fault masking and content management [From archive to enterprise
self-diagnosis mechanisms. In Proceedings of content Management]. ERP Management, 4,
the 7th Euromicro Workshop on Parallel and Dis- 38-40.
This work was previously published in Always-On Enterprise Information Systems for Business Continuance: Technologies
for Reliable and Scalable Operations, edited by Nijaz Bajgoric, pp. 265-276, copyright 2010 by Information Science Refer-
ence (an imprint of IGI Global).
957
958
Chapter 4.4
Size Matters!
Enterprise System Success in
Medium and Large Organizations
Darshana Sedera
Queensland University of Technology, Australia
AbstrAct INtrODUctION
Organizations invest substantial resources in ac- Enterprise System (ES) is an ideology of planning and
quiring Enterprise Systems, presumably expecting managing the resources of an entire organization in
positive impacts to the organization and its functions. an efficient, productive, and profitable manner, and
Despite the optimistic motives, some Enterprise is manifested in the form of configurable information
System projects have reported nil or detrimental system packages (Laukkanen, Sarpola et al. 2007). The
impacts. This chapter explores the proposition Enterprise System vendors promote a fully integrated
that the size of the organization (e.g. medium, core business processes through the organization where
large) may contribute to the differences in benefits seamless integration of the information flowing from
received. The alleged differences in organizational one functional area to the other.Amongst the myriad of
performance are empirically measured using a prior benefits, Enterprise Systems said to deliver key benefits
validated model, using four dimensions employing like: cost reduction, productivity improvement, quality
data gathered from 310 respondents representing improvement, customer service improvement, better
27 organizations. resource management, improved decision-making and
planning, and organizational empowerment (Shang
DOI: 10.4018/978-1-59904-859-8.ch016 and Seddon 2002).
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Size Matters!
Organizations devote substantial resources and many not receiving anticipated benefits, where
and time on acquiring an Enterprise System, the traditional market leveling with ES vendors
presumably expecting positive impacts to the moving into the SME market segment – this chap-
organization and its functions. These extensive ter discusses whether the organization size has an
ES implementations are typically measured in influence over the benefits brought-to-bear by the
millions of dollars Pan et al (2001), and for many Enterprise System. This study aims to contribute to
organizations they represent the largest single IT the encyclopedia by investigating the relationship
investment. The substantial resource requirements of organizational size with the performance of the
for Enterprise Systems have restricted Enterprise system (commonly referred to as System Success).
System market to the Medium-Large organizations Although prior research (Raymond 1985; DeLone
with many suggesting that ES are best suited for 1988; Raymond 1992; Lai 1994) has contributed
Large Corporations (Hillegersberg and Kumar to our understanding of IS and organization size,
2000). Recent changes in market place, wherein few have empirically assessed influence of orga-
the demand for Enterprise Systems from large nizational size for contemporary IS success. More
organizations has plateau, vendors are attempting importantly, instead of resorting to the customary
to shift their emphasis into the Small-Medium approach of considering large and medium-sized
Enterprises (SMEs) with scaled-down ES prod- organizations as one homogenous group receiving
ucts (Piturro 1999; Everdingen, Hillegersberg et equal benefits, this study aims to bring forth the
al. 2000). differences between these two groups using four
Measuring the impacts of Enterprise Systems system related dimensions. This study presented
takes on special importance since the costs and herein investigates the influence of organization
risks of these large technology investments rival size on ES performance. ES impacts are empiri-
their potential payoffs. Often carefully rational- cally measured using information received from
ized in advance, ES investments are too seldom 310 responses representing 27 organizations that
systematically evaluated post-implementation had implemented a market leading Enterprise
(Thatcher and Oliver 2001). Welsh and White System solutions in the second half of 1990.
(1981) differentiated the small and large organi- The chapter begins with a historical overview
zations using such aspects like time, skills, and of literature on size as an important determinant.
resources – where the medium organizations The broad contextual overview begins by differ-
lacking all three compared to their counterparts. entiating characteristics of the medium vs. large
D’Amboise and Muldowney (1988) argue that the organizations and demonstrating the impact of
lack of resources has made smaller organizations such contextual factors on System success. The
more vulnerable to the environmental effects research context is introduced next followed by
and misjudgments forcing them to allocate more discussions on the research methodology and data
time to adjusting to, rather than devoting time on collection instrument. The final section demon-
predicting and controlling. The resource lack of strates the observed differences between the two
constraints has been found to hinder IT adoption organizational sizes and research implications.
(Baker 1987; Cragg and Zinatelli 1995; Iacovou,
Benbasat et al. 1995; Proudlock, Phelps et al.
1999), and to negatively affect IS implementation bAcKGrOUND
success (Thong 2001) and IT growth (Cragg and
King 1993) in SMEs. Prior research suggests that organizational context
With the aforementioned background – where is a determinant of Information System (IS) suc-
organizations devote huge resources acquiring ES cess. Researchers have concluded that medium
959
Size Matters!
organizations have distinctive and unique needs ficulty associated in small businesses information
compared to large organizations (Raymond 1985; systems: (1) software problems, (2) hardware
DeLone 1988; Lai 1994) and therefore, the re- problems and (3) implementation problems.
search findings of large organizations cannot be DeLone (1981) studied the relationship be-
generalized to small to mid-sized firms. tween the size of a manufacturing firm and IS usage
Schultz and Slevin (1975) and Ein-Dor and and concluded that firm size is: (1) directly related
Segev (1978) were among the very first point out to the age of the firm’s computer operations, (2)
the importance of organizational factors in man- inversely related to the amount of external pro-
aging Information Systems. In their early work, gramming that is used, (3) directly related to the
Ein-Dor and Segev (1978) proposed a framework portion of revenues allocated to Electronic Data
after studying Management Information System Processing (EDP), and (4) inversely related to the
(MIS) in which they identified organization size percentage of EDP costs that are used for computer
as a critical variable. Ein-Dor and Segev (1978) equipment. He also explained that smaller firms
identified ten (10) organizational variables with experience more computer related problems than
direct or indirect influence on the impact of an their larger counterparts. Melone (1985) found
IS. The identified variables are: (1) organization that managers in small to mid-sized organiza-
size, (2) maturity, (3) structure, (4) time frame, tions rate accounting and inventory control as the
(5) psychological climate towards [CB] IS, (6) most frequently used and important applications,
organizational situation, (7) rank of responsible and reported that inventory control was the most
executives, (8) location of responsible executives, problematic aspect of computer usage in such
(9) steering committee location and rank and (10) organizations. Nickel and Seado (1986) reputed
resources. They found that the organization size similar findings using 121 small businesses stat-
had special importance because of its influence ing that budgeting and inventory control were
on resource availability, requirements necessary the primary uses of IS in small organizations.
for integration of professional units within an Farhoomand and Hrycyk (1985) reported lack of
organization, degree of formalization of orga- technical staff as a substantial issue for the small
nizational systems, and lead time for planning to mid-sized companies.
and implementation. Furthermore, Ein-Dor and A study by Cooley et al. (1987) identified the
Segev (1978) recognized organization size as importance of user-friendly interfaces and lower
an uncontrollable variable and stated that [CB] implementation costs as key factors affecting end
IS projects are less likely to succeed in smaller users in small to mid-sized organizations. Mon-
organizations compared to larger organizations. tazemi (1988) investigating the aforementioned
Bilili and Raymond (1993) described SME preposition, confirmed the impact of organization
decision making process as reactive, informal, size on end user satisfaction.
and intuitive. (Doukidis, Lybereas et al. 1996; An organization has two basic options when it
Proudlock, Phelps et al. 1999) asserted the op- decides to implement a computerized application;
portunistic, day-to-day focus of the small to (1) to have its own staff develop the software, or
mid-sized organizations in relation to Informa- (2) to acquire packaged software from a vendor
tion Systems. Whisler (1970) studied nineteen (Raymond, 1985). Turner (1992) stated that as
insurance companies and reputed that firm size a firm increases in size, it would demand more
was directly related to performance of IS. Cheney sophisticated software. Even though that this argu-
(1983) identified various factors that would affect ment is intuitive, it suggests a correlation between
a small business firm’s success or failure in using organization size and the adoption of package
information systems and found three areas of dif- software. Turner (1992) specifically emphasized
960
Size Matters!
the importance of small to mid-tier organizations ogy adoption. They found that as business size
obtaining assistance from external sources rather increased, the importance of expectations from
than developing applications in house. To the the [social] environment increased. However, they
contrary, Raymond (1985) found that small firms observed a negative correlation with the impor-
are capable of developing, implementing and tance of intra-firm consequences and control over
administering their own applications in-house, the potential barriers for IS adoption. Hong and
compared to their larger counterparts, specifying Kim (2001) explored the ‘fit perspective’ in 34
that small organizations could maintain an IS Enterprise System installations where organiza-
with minimal financial, technical and personnel tional size was implicitly considered as a critical
requirements. The resource constraints has lead contingency variable.
SMEs to follow an incremental approach to IT In classifying organizations in the small →
investments, which, in turn, may result in isolated medium → large spectrum, many authors use the
and incompatible systems, as well as decreased number of employees as the sole classifier. For
flexibility (Levy and Powell 1998). Raymond example in a recent study (Laukkanen, Sarpola
(1992) emphasized on the advantages of small to et al. 2007), SMEs are defined here as enterprises
mid-sized firms in developing in-house applica- with fewer than 250 employees, wherein the small
tions rather than adopting packaged software from organizations defined as companies with less than
commercial vendors. They further added that end 50 employees and large organizations are simply
user computing, (where the user have direct control classified as those companies that do not meet
over their computing needs) is more appropriate the definition of SMEs and have more than 250
to such organizations than adopting a packaged employees (Chau 1994; Chau 1995). However,
software application. it is unrealistic to associate a 50 staff (or less)
Many researchers have alluded to the skill organizations with a large scaled traditional En-
scarcity for information systems in Small to terprise System implementations as such systems
mid-sized organizations (Bilili and Raymond are targeted at larger counterparts. Though the
1993; Levy and Powell 1998; Mitev and Marsh number of employees in a company provides some
1998). Laukkanen et al. (2007) suggest that the indication to the size of the Enterprise System,
resource constraints faced by SMEs may hinder at times it can be quite misleading due to not all
their ability to maintain technology up to date, employees having access to an Enterprise System.
while at the same time forcing them to consider For example, in a Health and Pharmaceutical
their investments in IT as something that should organization – where the majority of the staff is
last for a long time (Levy and Powell 1998). on medical duties (e.g. doctors and nurses) – the
Soh et al. (1992) investigated the importance of actual Enterprise System users will be a small
external consultants on computerization success proportion of the total number of employees.
in small businesses, concluding that the level of In recent years, Sedera et al (2003) suggest the
computer system usage in small businesses with use of number of user licenses to determine the
consultants is higher than that of small businesses size of the organization for Enterprise System
without consultants. Further, they added that small discussions. They suggest keeping 1000 (or over)
businesses that engage consultants are less likely concurrent user licenses as a benchmark for large
to complete there IS project on time and within organizations and anything below classifying as
budget. Harrison (1997) using the Theory of medium enterprises.
Planned Behaviour (TPB) to explained technol-
961
Size Matters!
The empirical data collection was conducted A survey instrument was designed to opera-
across 27 public sector agencies running live tionalize 27 measures of ES-success depicted
the market leading Enterprise System. These 27 in Figure 1 (See details in (Gable, Sedera et al.
agencies were the first Australian state agencies 2003; Sedera and Gable 2004). All items were
to have implemented common financial manage- scored on a seven-point Likert scale with the end
ment software state-wide namely. In 1995 the state values (1) ‘Strongly disagree’ and (7) ‘Strongly
Government commenced implementation of the Agree’, and the middle value (4) ‘Neutral’. The
Financials module across all state Government draft survey instrument was pilot tested with a
agencies (later followed by Controlling, Materi- selected sample of staff of the state Government
als Management and in some agencies Human Treasury Department. Feedback from the pilot
Resources) and soon became one of the largest round respondents resulted in minor modifications
Enterprise System installations in Australia. The to survey items. The survey gathered additional
state Government approach was very much fo- demographic details on respondents’ employment
cused on using the Enterprise System as a common title (e.g. Director, Business Analyst, Applica-
reporting and financial management tool. The tion programmer). Furthermore, the respondents
objectives of the new financial system were to were asked to provide a brief description of
provide a financial management system to state their involvement with the Enterprise System.
Government agencies that would: (1) support the Supplementary information on the organizational
‘Managing for Outcomes’ (MFO) framework and structure, characteristics of the Enterprise System
financial management improvement activities, (2) (i.e. modules in use and hardware in place) and
encourage best practice resource management the number of users in each agency was gathered
across state Government, (3) facilitate the consoli- from objective sources.
dation of state Government financial information, In addition to the 27 items of Figure 3, the
(4) meet the business needs of agencies and (5) questionnaire included two criterion items aimed
achieve economies of scale in main operations. at gauging the respondent’s perception of overall
Despite the claimed benefits by most of the ES-success: (1) ‘overall…the impact of [the name
agencies, a relatively smaller agency that provides of the Enterprise System] on the agency has been
corporate services to a group of other agencies positive’ and (2) ‘overall… the impact of [the
demonstrated their dissatisfaction with their Enter- name of the Enterprise System] on me has been
prise System. Even though the Enterprise System positive’.
provided rich functionality to this organization,
the senior management believed that the system
in place was too complex and too expensive to rEsULts AND ANALysIs
operate in a smaller organization. After three years
of using the implemented Enterprise System, A total of three hundred and nineteen (319)
the agency decided to replace that with a local, responses from twenty-seven (27) public sector
small scaled Enterprise System. The contextual agencies were received. Nine responses were
background further questions the preposition removed from the analysis due to missing values
in discussion – whether the organizational size and perceived frivolity. Using the number of SAP
influences the benefits you receive. user licenses, the sample was divided into two
962
Size Matters!
mutually exclusive representing the respondents ernment. All participated agencies having: (1) the
from medium organizations and large organiza- same Enterprise System software application, (2)
tions. Organizations with more than 1000 SAP user the similar versions of the Enterprise System, (3)
licenses considered as large agencies and the rest in the same phase of the ES life cycle, and (4)
were medium agencies. Additional criteria were installed Financial Accounting and Controlling,
established (i.e. Number of employees, dispersion Materials Management modules created a unique
of the organization) to be used in the grouping ex- homogeneous environment increasing the com-
ercise to supplement the principal criterion, where parability of the data.
the initial classification was unclear. Figure 2(a) The one-way analysis of variance (ANOVA)
shows the break down of organizations, classified F-test was chosen as the method for conducting
into medium and large organizations and Figure the analysis of the Likert scale data. For each
2(b) shows the classification of respondents segre- variable measured with Likert scale the statistics
gated into the two agency cohorts. All indications reported include the arithmetic mean (mean) and
suggest that this distribution is representative of standard deviation (std dev.) of the responses in
users of the Enterprise System in the state Gov- each company group, the significance of group
963
Size Matters!
mean differences (sig.) indicated by F-test, and mean scores of each success dimension and their
the group sizes (n). If a significant difference was corresponding measures.
found in ANOVA at the 0.05 level, paired t-tests
comparisons were conducted to see which of
the company groups differ from each other. The systEM QUALIty
criterion item (Overall, the impact of [the name
of the Enterprise System] on the agency has been The quality of a system under investigation is a
positive) was used to establish the peripheral dif- multifaceted phenomenon. The system quality
ferences between the two cohorts. Analysis of our construct is designed to capture how the system
survey data indicates that significant differences performs from a technical and design perspective.
exist between the medium-sized, and large or- Nine validated measures have been employed
ganization with a high F value of 5.22. It is also in this study. Results depicted in Figure 5, it is
observed that the large organizations demonstrate evident that for all 09 measures on Enterprise
a higher mean score for the criterion item over System Quality, large organizations demonstrate
the medium organizations. relatively larger mean scores compared to their
Encouraged by the findings above, using the smaller counterparts. Moreover, the following
averages of each of the four success dimensions, observations are made in relation to the measures
we conducted an independent sample t-test to of system quality. All, but two measures (flexibility
further explore the differences between the two and customization), have received below scale-
organizational sizes with regards to the dimen- median (4) values for the large organizations. To
sions. the contrary, for medium organizations, 6 of the
Results depicted in Figure 4 indicate significant 9 measures report below scale-median scores.
differences between the two organizational sizes in The two cohorts demonstrate substantial dif-
three of the four success dimensions. The differ- ferences in mean scores across IT-sophistication
ences are observed in System Quality, Individual and the employment of system features. Similarly,
Impacts and Organization Impacts. the mean scores on Enterprise System meeting
Having determined that two organizational the requirements of the organization demonstrate
sizes demonstrate significant differences in rela- differences between the medium and large co-
tion to the Enterprise System success dimensions, horts, with large reporting high mean scores. It
the chapter now attempts to identify where those is noticed with some interest that system centric
differences exists and whether an Enterprise Sys- attributes such as: integration and customization
tem investment favors a particular organizational do not demonstrate strong differences between
size. In order to establish this, we now look at the the two cohorts.
964
Size Matters!
965
Size Matters!
relation to Information Relevance and the format individual benefits received to the medium scaled
of the reports. organizations with substantial differences in all
four perspectives.
INDIVIDUAL IMPAct
OrGANIZAtIONAL IMPActs
Individual impact is concerned with how the
Enterprise System influences the performance The impact of an Enterprise System on organiza-
of the individual user. Individual impact tends to tional performance is some-what difficult to isolate
encompass a broad range of subjective measures from the general organizational performance
such as: confidence in decisions made, improve- indicators. The eight measures of the ES-success
ments in decision-making, and the time to reach a measurement model purportedly isolate the impact
decision (Ein-Dor, Segev et al. 1981; Sirinivasan of the system with the one of the organization. The
1985; Kim and Lee 1986). Dickson et al. (1977) analyses of the mean scores for the 08 measures
provided early insights into Individual Impact support all observations above favoring the large
citing decision quality, decision time, decision organizations.
confidence, and estimated outcomes. Though It is also observed that the medium organiza-
individual productivity and decision making ef- tions report substantially lower mean scores for
fectiveness have been mentioned in prior studies five out of the eight measures. The biggest dif-
as impacts from the system, the potential benefits ferences were seen in facilitation of e-business
from the Enterprise System exceeds those and in- through Enterprise Systems and the introduction
cludes aspects such as – facilitating organizational of optimal business process changes. The three
learning and information recall and awareness cost related aspects: (1) reduction of organization
through organizational transparency. costs, (2) reduction of staff and (3) operational
Observing mean scores reported in Figure 7, costs reductions have received below median
similar patters are observed to the previous two scores for both organizational cohorts (See Figure
success dimensions with large organizations 8 for details).
receiving more benefits from the Enterprise Sys-
tem. More importantly, the mean score analysis
demonstrates a bleak picture of the amount of
966
Size Matters!
967
Size Matters!
968
Size Matters!
d’Amboise, G., & Muldowney, M. (1988). Man- Gable, G., Sedera, D., et al. (2003). Enterprise
agement theory for small business: attempts and Systems Success: A Measurement Model. Pro-
requirements. Academy of Management Review, ceedings of the 24th International Conference
13(2), 226–240. doi:10.2307/258574 on Information Systems, Seattle, Washington,
Association for Information Systems.
DeLone, W. H. (1981). Firm Size And The Char-
acteristics Of Computer Use. MIS Quarterly, 5(4), Harrison, D. A., Mykytyn, J. P. P., & Riemensch-
65–77. doi:10.2307/249328 neider, C. K. (1997). Executive Decisions about
Adoption of Information Technology in Small
DeLone, W. H. (1988). Determinants Of Success
Business: Theory and Empirical Tests. Information
For Computer Usage In Small Business. MIS
Systems Research, 8(2), 171–196. doi:10.1287/
Quarterly, 12(1), 50–61. doi:10.2307/248803
isre.8.2.171
Dickson, G., & Senn, J. (1977). Research In
Hillegersberg, J. V., & Kumar, K. (2000). ERP
Management Information Systems: The Minne-
experience and evolution. Communications of
sota Experiments. Management Science, 23(9),
the ACM, 43(4), 23–26.
913–923. doi:10.1287/mnsc.23.9.913
Hong, K.-K., & Kim, Y.-G. (2001). The Critical
Doukidis, G. I., & Lybereas, P. (1996). Informa-
Success Factors For ERP Implementation: An
tion systems planning in small businesses: A
Organizational Fit Perspective. Information &
stage of growth analysis. Journal of Systems and
Management, 40(1), 25–40. doi:10.1016/S0378-
Software, 33(2), 189–201. doi:10.1016/0164-
7206(01)00134-3
1212(95)00183-2
Iacovou, C. L., & Benbasat, I. (1995). Electronic
Ein-Dor, P., & Segev, E. (1978). Organizational
data interchange and small organizations, adoption
Context And The Success Of Management Infor-
and impact of technology. MIS Quarterly, 19(4),
mation Systems. Management Science, 24(10),
465–485. doi:10.2307/249629
1064–1077. doi:10.1287/mnsc.24.10.1064
Kim, E., & Lee, J. (1986). An Exploratory Con-
Ein-Dor, P., Segev, E., et al. (1981). Use Of
tingency Model Of User Participation And MIS
Management Information Systems: An Empirical
Use. Information & Management, 11(2), 87–97.
Study. Proceedings of the 2nd International Confer-
doi:10.1016/0378-7206(86)90038-8
ence on Information Systems, Cambridge, Mas-
sachusetts, Association for Information Systems. Lai, V. S. (1994). A Survey Of Rural Small Busi-
ness Computer Use: Success Factors And Deci-
Everdingen, Y., & Hillegersberg, J. (2000).
sion Support. Information & Management, 26(6),
ERP adoption by European midsize companies.
297–304. doi:10.1016/0378-7206(94)90027-2
Communications of the ACM, 43(4), 27–31.
doi:10.1145/332051.332064 Laukkanen, S., & Sarpola, S. (2007). Enter-
prise size matters: objectives and constraints
Farhoomand, F., & Hrycyk, G. P. (1985). The
of ERP adoption. Journal of Enterprise In-
Feasibility Of Computers In The Small Business
formation Management, 20(3), 319–334.
Environment. American Journal of Small Busi-
doi:10.1108/17410390710740763
ness, 9(4), 15–22.
969
Size Matters!
Levy, M., & Powell, P. (1998). SME flex- Rainer, J. K. R., & Watson, H. J. (1995). The
ibility and the role of information systems. Keys to Executive Information System Success.
Small Business Economics, 11(2), 183–196. Journal of Management Information Systems,
doi:10.1023/A:1007912714741 12(2), 83–99.
Mabert, V. A., & Soni, A. (2000). Enterprise Re- Raymond, L. (1985). Organizational Charac-
source Planning Survey Of U.S. Manufacturing teristics And MIS Success In The Context Of
Firms. Production and Inventory Management Small Business. MIS Quarterly, 9(1), 37–52.
Journal, 41(2), 52–58. doi:10.2307/249272
Mabert, V. A., & Soni, A. (2003). The impact of Raymond, L., & Bergeron, F. (1992). Personal
organizationsize onen terprise resource planning DSS success in small enterprises. Information &
(ERP) implementations in the US manufacturing Management, 22(5), 301–308. doi:10.1016/0378-
sector. Omega, 31, 235–246. doi:10.1016/S0305- 7206(92)90076-R
0483(03)00022-7
Saaksjarvi, M. T. V., & Talvinen, J. M. (1993).
Melone, S. C. (1985). Computerising small Integration And Effectiveness Of Marketing Infor-
business information systems. Journal of Small mation Systems. European Journal of Marketing,
Business Management, (April): 10–16. 27(1), 64–79. doi:10.1108/03090569310024567
Montazemi, A. R. (1988). Factors Affecting Schultz, R. L., & Slevin, D. P. (1975). Implemen-
Information Satisfaction In The Context Of The tation and organisational validity: An empirical
Small Business Environment. MIS Quarterly, investigation. Implementing operational research /
12(2), 238–256. doi:10.2307/248849 management science. R. L. Shultz and D. P. Slevin.
New York, Elsevier, North-Holland: 153-182.
Nickell, G. S., & Seado, P. C. (1986). The Im-
pact Of Attitudes And Experience On Small Sedera, D., & Gable, G. (2004). A Factor and
Business. American Journal of Small Business, Structural Equation Analysis of the Enterprise
10(1), 37–48. Systems Success Measurement Model. Inter-
national Conference of Information Systems,
Pan, S. L., Newell, S., et al. (2001). Knowledge
Washington, D.C.
Integration As A Key Problem In An ERP Imple-
mentation. Proceedings of the 22nd International Sedera, D., Gable, G., et al. (2003). ERP Success:
Conference on Information Systems, New Orleans, Does Organization Size Matter? Proceedings of
Louisiana, Association for Information Systems. the 7th Pacific Asia Conference on Information
Systems, Association for Information Systems.
Piturro, M. (1999). How midsize companies are
buying ERP. Journal of Accountancy, 188(3), Shang, S., & Seddon, P. B. (2002). Assessing
41–48. And Managing The Benefits Of Enterprise
Systems: The Business Manager’s Perspective.
Proudlock, M. J., & Phelps, B. (1999). IT adoption
Information Systems Journal, 12(4), 271–299.
strategies: Best practice guidelines for professional
doi:10.1046/j.1365-2575.2002.00132.x
SMEs. Journal of Small Business and Enter-
prise Development, 6(4), 240–252. doi:10.1108/ Sirinivasan, A. (1985). Alternative Measures
EUM0000000006678 Of System Effectiveness: Associations And
Implications. MIS Quarterly, 9(3), 243–253.
doi:10.2307/248951
970
Size Matters!
Soh, C. P. P., & Yap, C. S. (1992). Impact of KEy tErMs AND DEFINItIONs
consultants on computerisation success in small
businesses. Information & Management, 22, Enterprise System: Customizable, standard
309–319. doi:10.1016/0378-7206(92)90077-S software solutions that have the potential to link
and automate all aspects of the business, incor-
Thatcher, M. E., & Oliver, J. R. (2001). The impact porating core processes and main administrative
of technology investments on a firm’s produc- functions into a single information and technology
tion efficiency, product quality, and productivity. architecture.
Journal of Management Information Systems, Individual-Impact: A measure of the extent
18(2), 17–45. to which [the IS] has influenced the capabilities
Thong, J. Y. L. (2001). Resource constraints and and effectiveness, on behalf of the organization,
information systems implementation in Singa- of key-users.
porean small business. Omega, 29(2), 143–156. Information-Quality: A measure of the qual-
doi:10.1016/S0305-0483(00)00035-9 ity of [the IS] outputs: namely, the quality of the
information the system produces in reports and
Turner, J. S. (1992). Personal DSS success in on-screen.
small business. Information & Management, 22, Organizational-Impact: A measure of the
301–308. doi:10.1016/0378-7206(92)90076-R extent to which [the IS] has promoted improve-
Welsh, J. A., & White, J. F. (1981). A amall busi- ment in organizational results and capabilities.
ness is not a little big business. Harvard Business Public Sector: The public sector is the part of
Review, 59(4), 18–32. economic, administrative and Governance process
that deals with the delivery of goods and services
Whisler, T. (1970). The Impact Of Computers On by and for the government.
Organizations. New York, NY, Praeger Publishers. SAP: SAP [used to denote SAP R/3 software]
is a market leading Enterprise System software.
System-Quality: A measure of the perfor-
mance of [the IS] from a technical and design
perspective.
This work was previously published in Handbook of Research on Enterprise Systems, edited by Jatinder N. D. Gupta, Sushil
Sharma and Mohammad A. Rashid, pp. 218-231, copyright 2009 by Information Science Reference (an imprint of IGI Global).
971
972
Chapter 4.5
Web Services as XML Data
Sources in Enterprise
Information Integration
Ákos Hajnal
Computer and Automation Research Institute, Hungary
Tamás Kifor
Computer and Automation Research Institute, Hungary
Gergely Lukácsy
Budapest University of Technology and Economics, Hungary
László Z. Varga
Computer and Automation Research Institute, Hungary
973
Web Services as XML Data Sources in Enterprise Information Integration
The integration of web services with the rela- Another problem was that the results provided by
tional data sources includes two important tasks: XQUERY require further transformation before it
modeling the web services in the SINTAGMA is returned to SINTAGMA. For these reasons we
system and querying the XML data returned by decided to implement a query engine as described
the web service. in this chapter.
Modeling web services in SINTAGMA is a
reverse engineering task that seems to be straight-
forward, however it is necessary. Most tools tHE sINtAGMA APPrOAcH
available for modeling web services represent
the opposite approach: they create WSDL from The main idea of our approach is to collect and
UML. Although there exist tools for modeling manage meta-information on the sources to be
WSDL in UML (e.g. http://wsdl2xmi.tigris.org/) integrated. These pieces of information are stored
or modeling XSD in UML (e.g. supported by an in the model warehouse of the system in a form of
XML editor), we did not find a tool that combines UML-like models, constraints and mappings. This
the two in the appropriate way from our point of way we can represent structural as well as non-
view. WSDL modeling tools focus on the structure structural information, such as class invariants,
of the WSDL, but do not provide the model of the implications, etc. All of our modeling constructs
message schema contained (or imported) within have well defined semantics.
the WSDL. XSD modeling tools do not provide The process of querying these models is called
information about WSDL specific information mediation. Mediation decomposes complex
such as SOAP protocols and network locations. integrated queries to simple queries answerable
Another problem is that, although models in SIN- by individual information sources and, having
TAGMA are similar to UML, models generated obtained data from these, composes the results
by the available tools cannot be used directly be- into an integrated form. For mediation, we need
cause SINTAGMA has an own modeling language mappings between the separate sources and the
(called SILan) and not all UML components/ integrated model. These mappings are called
features are supported by SINTAGMA. These abstractions because often they provide a more
are the reasons why the new modeling procedure abstract view of the notions present in the lower
(described in this chapter) is needed. level models.
There are tools for querying XML, the most We handle models of different kinds. From one
well-known tools are XPATH and XQUERY. We point of view we can speak of unified models and
studied the possibility of transforming SQL-like local models. Unified models are created from
queries supported by SINTAGMA to XQUERY other ones in the process of integration, while
statements. However we found that the SQL-like the local models represent particular informa-
query language and XQUERY are essentially dif- tion sources. More importantly, we distinguish
ferent. XQUERY is based on the XML instance, between application and conceptual models. The
and not on the schema: it is possible to query application models represent the structure of an
XML fragments in the XML instance given by existing or potential system and because of this
XPATH expressions, but not XML fragments they are fairly elaborate and precise. Conceptual
corresponding to specific complex type defini- models, however, represent mental models of
tion (class instances in our terms). The problem user groups, therefore they are more vague than
is that, if the schema is recursive, to query the application models.
instances of a complex type would require (theo- Access to heterogeneous information sources
retically) infinite number of XPATH expressions. is supported by wrappers. Wrappers hide the syn-
974
Web Services as XML Data Sources in Enterprise Information Integration
tactic differences between the sources of different WSDL is structured as follows. Within the
kind (e.g. RDBMS, XML, Web services, etc.) by root <definitions> element, child element <types>
presenting them to upper layers uniformly as UML encapsulates the XSD definitions (XSD schema)
models. Wrappers also support queries over these of different data types and structures used in
models as they are capable of directly accessing message contents. It is followed by a series of
the types of data sources they are responsible for. <message> declarations that refer (in the <part>
elements) to the types defined previously. <port-
Type> element(s) wrap a sequence of <opera-
WEb sErVIcE INtEGrAtION tion> elements representing abstract operations,
each having <input> and <output> (and optional
In the following we briefly overview the most <fault>) elements that refer to the defined mes-
important concepts of web services and introduce sages. <binding> element(s) specify the transport
the modeling language of SINTAGMA called protocol and message formats for the set of opera-
SILan. Then we describe in detail how different tions listed in <portType>. Finally, the <service>
web services can be represented by models and element contains one or more <port> elements,
queried in the system. Finally, we discuss sample each linked to a <binding>, and a network loca-
web service models. tion in the <soap:address> child element. (We use
the soap namespace prefix to indicate elements
Web services belonging to the SOAP URI. WSDL namespace
prefixes are omitted. XSD elements will be pre-
Web services aim to provide some document or fixed by xs.)
procedure-oriented functionality over the network In this chapter, we consider web services
that can be accessed in a standardized way, typi- conforming to Basic Profile Version 1.1 of Web
cally using SOAP (Simple Object Access Proto- Service Interoperability Organization6 . For
col3) message exchange over HTTP. simplicity, we assume document-literal style
SOAP is an XML based protocol for exchang- messaging protocol, one targetNamespace in the
ing structured and typed information between XSD type definition, and one service in the WSDL
peers. SOAP messages consist of an <Envelope> with one port and (potentially) several operations.
element followed by child element <Body>. Body In document-literal style, message contents are
entries will be referred to as the message content entirely defined by the XSD schema within the
throughout this chapter. WSDL. We note that none of the above constraints
The interface of a web service is described in are theoretical limitations of our approach, and are
WSDL (Web Services Description Language4), typically met by web services in practice.
which is based on XML. In WSDL, a set of opera-
tions with input and output messages are described Modeling in sINtAGMA
abstractly to define a network endpoint. These
endpoints are then bound to concrete protocol Different data sources are modeled uniformly in
and message serialization format. A web service SINTAGMA using the modeling language of the
is defined as a collection of ports that are bound system called SILan. This language is based on
to the network endpoints defined previously. UML (Unified Modeling Language, see Fowler
The location of ports and protocol bindings are & Scott 1998) and Description Logics (see Hor-
specified by SOAP extensibility elements in the rocks 2002), and the syntax resembles IDL7, the
WSDL. Messages are defined using the XSD Interface Description Language of CORBA.
(XML Schema Definition5) type system.
975
Web Services as XML Data Sources in Enterprise Information Integration
The main constructs are classes and associa- complex type definition. Simple type definitions
tions, since these are the carriers of information. A restrict built-in XML types (or other simple types)
class denotes a set of entities called the instances by giving enumerations, minimum, maximum
of the class. Similarly, an n-ary association denotes values, etc. Complex type definitions combine a
a set of n-ary tuples of class instances called links. set of element declarations, or declare XML at-
In a binary association one of the connections tributes, respectively. To each element declaration
can be declared composite, which means that cardinality can be assigned to specify optional or
the instance at the composite end is part of the multiple occurrences for the element. Simple and
instance at the other end (and is not part of any complex type definitions can also be extended,
other instance). Composition associations are also restricted by other type definitions. We note that
referred to as compositions for short. Connections there are many features of XSD omitted here for
of associations can be declared as input, which clarity considerations.
means that the association can only be queried if The SINTAGMA model is obtained by
all the input ends are available. Associations also transforming the XSD description to a SILan
have multiplicity that is used to define cardinality representation. A unique SILan class is assigned
constraints, e.g. one-to-one, one-to-many rela- to each complex type with unique name. Simple
tions. Classes and associations have unique name type element declarations (having a built-in XML
within a model. type or simple type definition) within a complex
Classes can have attributes which are defined type are added as SILan attributes of the class.
as functions mapping the class to a subset of values The name of the attribute is given the name at-
allowed by the type of the attribute. Attributes tribute of the element declaration, and the SILan
have unique names within a class and are one of type is derived from the built-in XML type ac-
the SINTAGMA supported types. cording to a predefined mapping. Complex type
Invariants can be specified for classes and element declarations within a complex type are
associations. Invariants give statements about represented by composition associations between
instances of classes (and links of associations) that classes assigned to different complex types.
hold for each of them. Invariants are based on the Compositions are named uniquely, connection
language OCL (Object Constraint Language, see end aliases are given by the name attribute of the
Clark & Warmer 2002.). element declarations (used at navigation), and oc-
currence indicators (minOccurs, maxOccurs) are
Modeling Web services converted to the appropriate multiplicity of the
composition (e.g. 1..1, 1..*). Simple type element
Modeling web services in SINTAGMA basically declarations with multiple occurrences cannot be
means the construction of a SILan representation represented as simple class attributes in SILan.
of data structures and data types used in com- Therefore separate classes are created wrapping
munication with the web service. The schemes simple types that are then connected to the original
of different web service messages are defined by container class by composition association with
an XSD language description in the <schema> the appropriate multiplicity. Optional attributes
element in the WSDL (or imported here). cannot be expressed in SILan. Their values are
The schema typically consists of a set of simply set to null at query (see next section) if
element declarations, simple and complex type they are absent, instead of creating compositions
definitions. Element declarations declare named with optional multiplicity. The default String
XML elements with type corresponding to a type is assigned to XML types that cannot be
built-in XML type (e.g. int, string), simple or represented precisely in SILan (e.g. date). These
976
Web Services as XML Data Sources in Enterprise Information Integration
types will hold the string content of the related erations which are represented by associations.
XML element. Simple type restrictions are added Web service invocation, however, requires ad-
as attribute invariants, complex type extensions ditional details of the WSDL that are stored as
are indicated by inheritance relations between the metadata in the model (used by the Web Service
corresponding classes. Wrapper component). One is the network location
Message schemes modeled above are then of the web service that is obtained from the
associated with web service operations: an as- <soap:address> element of the port. The other is
sociation is created between classes representing the namespace of the XML messages used in the
input and output messages for each operation in communication with the web service that is
the WSDL. Associations are named uniquely, given by the tartgetNamespace attribute of the
and end connections corresponding to input mes- <schema> element.
sages are labeled as <<input>> in SILan (angle In practice, web services can be more compli-
quotes notation corresponds to UML’s stereotype cated. It may occur that a web service uses several
notation). Connection aliases of associations are schemes and namespaces that require introducing
given the element names wrapping input and namespace metadata into different classes instead
output XML messages of the operation (referred of using a single, global namespace in the model.
in <part> element in WSDL). A WSDL can declare several ports combining web
An example WSDL fragment of a simple add service operations at different network locations.
web service is shown in Figure 1 together with In this case, the network location(s) need to be
the created SILan model and the corresponding assigned to the associations representing opera-
UML class diagram. tions instead of the model.
The constructed model contains every single When a web service uses rpc protocol
data that can be passed to or returned by the web (<soap:binding>), <part> elements that are de-
service in terms of classes, compositions and at- clared at input and output messages are wrapped
tributes, as well as the different web service op- first in input and output classes, which are then
Figure 1. An example WSDL fragment of a simple add web service together with the created SILan
model and the corresponding UML class diagram (© 2008 Á. Hajnal, T. Kifor, Luckácsy, L.Z. Varga,
Used with Permission)
977
Web Services as XML Data Sources in Enterprise Information Integration
Box 1.
connected by the operation association. In the
case of document style binding no such problem SELECT addOperation.AddResponse.result,
occurs, since these classes are already created at addOperation.AddResponse.Details.time
FROM addOperation
processing the schema. A single <part> element WHERE addOperation.AddOperation.op1=1 AND
is allowed in message definitions that refer to addOperation.AddOperation.op2=2
them. Web services not conforming to WS-I Basic
Profile, using encoded messaging style, WSDL
arrays, non-SOAP protocols, etc., need further Operation’s input parameters are given by
workaround, which is omitted here for clarity constraints in the WHERE part of the query.
considerations. Constraints use the ‘=’ operator, in the form of
Class.field=value, which have value assignment
Querying Web services semantics with respect to the input parameters.
through sINtAGMA The ‘.’ operator is used to refer to a class attribute
in SILan, but it is also used to navigate along
SILan query language is an object oriented query associations or compositions. For example, Class1.
language designed to formulate queries over association1.field1 denotes attribute field1 in the
SINTAGMA models. The syntax is similar to class referred by association1 in Class1. Naviga-
SQL used at relational databases: a SILan query tion is used to assign values to input parameters
is composed of SELECT, FROM, WHERE parts. starting from the association representing the
The SELECT keyword is followed by a comma operation. In the case of several input parameters,
separated list of class attributes (columns) of inter- the list of assignments is separated by the AND
est, FROM part enumerates classes (tables) whose logical operator. This way, arbitrary complex web
instances (rows) we search among, and WHERE service inputs can be formulated. For example,
part specifies constraints that must be satisfied by input parameters op1, op2 of addOperation are
all the instances in the result. On the other hand, given values by the query shown in Box 2.
SILan is an object oriented language that relies Queries for models representing web services
on UML modeling, and SILan also supports OCL are executed by the Web Service Wrapper com-
expressions in queries by which we can specify ponent. The passed query is parsed first, then the
navigations through objects. appropriate SOAP message is constructed and
In contrast to relational databases functional sent to the web service provider. Starting from
data sources require input to populate the “da- the association in the query and collecting all the
tabase” with data before the query can actually constraints for the input side (navigations towards
be executed. In the case of web services, input the input end) an XML tree is constructed that
includes the name of the web service operation combines all the web service inputs. Navigations
and the input parameters of the operation. are represented by wrapper XML elements, and
When models representing web services are attribute constraints are represented by simple
queried in SINTAGMA, the web service operation
must be given in the FROM part as the associa-
tion representing the operation. For example, the Box 2.
web service operation called addOperation of the
example in Figure 1 is queried by the construct SELECT addOperation.AddResponse.result,
addOperation.AddResponse.Details.time
below (relevant parts are highlighted in boldface FROM addOperation
characters) (see Box 1). WHERE addOperation.AddOperation.op1=1 AND
addOperation.AddOperation.op2=2
978
Web Services as XML Data Sources in Enterprise Information Integration
XML elements with content corresponding to the content of the XML element. If the child element
constant value. Navigations and constraints that corresponds to a composition (complex type), the
refer to the same instance are unified in the XML child node is processed recursively (considering
tree. The namespace of the XML fragment is set the referred class), and a relation is created from
accordingly to the namespace metadata in the the current row to the new row in another table
model (targetNamespace of the schema) that is representing the child node. Class attributes for
then wrapped in an appropriate SOAP envelope. which no appropriate child element can be found
The input SOAP message composed for the are set to null. The textual content of XML ele-
query of the addOperation is shown below: ments are converted to the proper attribute type
at filling field values. The input SOAP message
<SOAP-ENV:Envelope ...> content sent to the web service provider previously
<SOAP-ENV:Body> is also loaded into the internal database in the same
<AddOperation xmlns=”http:// way. An example answer SOAP message and the
add.com”> associated classes, attributes are shown in Box 3.
<op1>1</op1> The query specifies the set of classes and at-
<op2>2</op2> tributes of interest in the FROM and SELECT
</AddOperation> parts. Note that in SILan it is allowed to query
<SOAP-ENV:Body> associations as well as compositions in the FROM
</SOAP-ENV:Envelope> part, and give navigations to attributes in the
SELECT part. The WHERE part declares con-
When the SOAP message is sent to the internet straints for the instances by constant constraints,
location of the web service (stored as metadata where class attributes are compared to constant
in the model), the requested operation will be values using relational operators, or by association
executed by the web service provider. Results are constraints that must hold between instances.
sent back to the Web Service Wrapper component The Web Service Wrapper component, in the
as another SOAP message, and, unless SOAP fault knowledge of the temporary internal database,
(e.g. missing input parameters) or no response can execute the query similarly to an SQL engine.
errors occur, a temporary internal “database” is Basically, the result is constructed by taking the
populated with data. Cartesian product of the instances of the relevant
The internal database is set up by mapping classes (listed in the FROM part). Constraints in
the content of the answer SOAP message to the the WHERE part are checked for each n-tuple
model. First, the XML document root is added of instances, and if all of them are satisfied, the
as instance to the class representing operation’s
output, then child nodes are processed recursively
considering the model schema: XML sub-elements Box 3.
are added as attributes of the current instance, if
they are simple, or added as new instances in the <SOAP-ENV:Envelope ...>
<SOAP-ENV:Body>
corresponding classes, respectively, if they are <AddResponse> ◄ instance in class addResponse
complex. Intuitively, it means that a new row is <result>3</result> ◄ attribute result of the addResponse
instance
created for the root element in the table of op- <Details> ◄ instance in class details
eration output, and field values are obtained by <time>0.01s</time> ◄ attribute time of the details instance
</Details>
iterating through all child elements. If the name of </AddResponse>
the child element corresponds to a class attribute <SOAP-ENV:Body>
</SOAP-ENV:Envelope>
(simple type), the value of the field is given by the
979
Web Services as XML Data Sources in Enterprise Information Integration
selected attributes (SELECT part) are added to Queries for the model are executed transpar-
the result. The result of the query for the add web ently by the wrapper that communicates with the
service operation contains a single row with field web service using SOAP. Necessary inputs are
result containing integer value 3, and field time obtained from the query, the appropriate request
containing the string representing the execution message is constructed, and sent to the web
time of the operation, e.g. 0.01s. service provider automatically. Result data are
extracted from the answer message, and returned
sample Web service to SINTAGMA.
Models in sINtAGMA An example screenshot of the SINTAGMA
system is shown in Figure 2, where Amazon’s
We have implemented the Web Service Wrapper web service is queried.
component for SINTAGMA and applied it to
several web services ranging from simple ones
(such as Google SOAP Search API providing three DIGItAL LIbrAry DEMONstrAtION
operations) to complex ones (such as Amazon E- APPLIcAtION
Commerce Service providing over 30 operations
with transactions). In the previous section we have seen how a
After entering the URL of the WSDL the model single web service can be modeled and que-
of the web service is built automatically. It can ried in SINTAGMA. In this section we show
be viewed, browsed in a graphical user interface, a digital library application that demonstrates
and queries can be composed for the model. SILan the integration of web services with the help of
abstractions can be created by which web services SINTAGMA. The digital library application is
can participate in integration scenarios. Namely, an OpenURL resolver application developed in
the web service model can be connected to other the SINTAGMA project. OpenURL8 is a NISO
models representing different data sources, for standard9 for identifying documents with different
example other web services or relational databases. types of metadata (for example author, title, ISBN,
Figure 2. Amazon’s web service is queried in SINTAGMA (© 2008 Á. Hajnal, T. Kifor, Luckácsy, L.Z.
Varga, Used with Permission)
980
Web Services as XML Data Sources in Enterprise Information Integration
ISSN) using the URL format. The following is manually and the local application models (lower
a sample OpenURL: http://viola.oszk.hu:8080/ models) for the targets (in our case for Amazon
sokk/OpenURL_Servlet?sid=OSZK:LibriVisio and for the Hungarian National Library) using
n&genre=book&aufirst=Jeno&aulast=Rejto&is the wrappers. Then we have created abstractions
bn=963-13-5374-5&title=Quarantine%20in%20 (relations) between the upper model and the lower
the%20Grand%20Hotel&date=2005 models (one for each data source). The OpenURL
The first part of the URL is a link resolver, resolver application queries the upper model and
in the above example viola.oszk.hu:8080/sokk/ sees it as one single target.
OpenURL_Servlet. The other part contains the If there is a new target we only have to gen-
metadata of the documents, in the above example erate a new lower model using the SINTAGMA
parameters like the first and last name of the au- wrapper and create an abstraction between the
thor, the ISBN code and the title of the book. The new model and the upper model. If the protocol
same OpenURL can be created by several sources or the data model of the target changes we only
(for example in articles containing citations from have to regenerate the lower model and modify
the identified document or in a document meta the old mapping (or create a new one) between
database like The European Library10). In our the lower and the upper model. We do not have to
demonstration application the query OpenURL is modify, recompile and redeploy the source code
created by a web based user interface as shown of the client application.
on Figure 3. The document identified by the First we created the following upper (concep-
OpenURL can be located in several target places. tual) model of the openURL resolver in SILAN
In our demonstration application, as shown on (see Box 4).
Figure 3, the target places are the Amazon book This model is simple because it contains an
store, which is a web service information source OpenURLDescription, which contains the param-
providing XML data services, and the Hungar-
ian National Library, which contains a relational Figure 3. Digital library demonstration applica-
database. tion architecture (© 2008 Á. Hajnal, T. Kifor,
The OpenURL resolver has to search in sev- Luckácsy, L.Z. Varga, Used with Permission)
eral places using different protocols and different
data model for the different possible targets of the
document, therefore our OpenURL resolver ap-
plication uses the different wrappers of SIN-
TAGMA to integrate the different data models of
the different protocols.
SINTAGMA executes the queries for the
targets and collects the result into a single uni-
fied model. The OpenURL resolver queries this
unified model only and does not need to know
the details of the lower level protocols and data
models. As long as the OpenURL model remains
the same, the OpenURL resolver does not need
to be changed even if the protocol or the lower
level data model changes.
We have created an OpenURL unified con-
ceptual model in SINTAGMA (upper model)
981
Web Services as XML Data Sources in Enterprise Information Integration
Box 4.
sponding elements in the Amazon model and the
model OpenURLModel { OpenURL, because there are direct connections
class OpenURL { between the elements, except the author name,
attribute Integer id;
};
where the Amazon author name is the concatena-
class OpenURLDescription { tion of the first and last name of the author in the
attribute Integer id;
attribute Integer openURL;
OpenURL model (see Box 5).
attribute String auFirst; The second abstraction is between the applica-
attribute String auLast; tion model of the Zing SRW service of the Hun-
attribute String title;
attribute String issn; garian National Library and the conceptual
attribute String isbn; model of OpenURL. This abstraction is again a
attribute String pubDate;
}; direct mapping between the corresponding ele-
class SearchResult { ments (see Box 6).
attribute Integer id;
attribute Integer openURLDescription; The last step was to query the conceptual
attribute String source; model of OpenURL from our Open URL re-
attribute String author;
attribute String title;
solver. We used the Java library of the distributed
attribute Integer stock; SINTAGMA system to create the SINTAGMA
attribute String link;
attribute String price;
query. The following is the SINTAGMA query
}; of the sample OpenURL mentioned at the begin-
association AnswerOfQuestion { ning of this section (see Box 7).
connection::OpenURLModel::OpenURLDescription as inp;
connection::OpenURLModel::SearchResult [1..1] as outp Creating models and mappings between the
navigable ; models do not need a programmer, only a knowl-
};
}; edge engineer who knows the business area (library
system in our case). This is possible because
SINTAGMA raised the problem to a higher ab-
eters of the query OpenURL, a SearchResult, straction level and the OpenURL resolver can use
which contains the parameters of the search result,
and an AnswerOfQuestion, which connects the
OpenURL query with the search result. The re-
solver queries this model only and does not know Box 5.
about the different data models below this model.
map bundle Amazon_OpenURLModel between Amazon and
Then we generated the lower model of Ama- OpenURLModel {
zon and Hungarian National Library. We only abstraction nev3 (isop: Amazon::ItemSearch_OPERATION,
isr: Amazon::ItemSearchRequest,
had to pass the WSDL of the applications to the items: Amazon::Items,
SINTAGMA wrapper and it created the models item: Amazon::Item ->
ourl: OpenURLModel::OpenURL) {
automatically. These models are very complex constraint
and not shown here, because the data models of isop.itemSearch.Request = isr and
isop.ItemSearch.Items = items and
the Amazon and the Zing SRW (the web service items.Item = item and
used by Hungarian National Library) web services isop.itemSearch.SubscriptionId = “0W2KPT35S-
FFX0RVEK002” and
are complex. isr.ResponseGroup = “Small” and
The next step was to create two abstractions. isr.SearchIndex = “Books”
implies
The first abstraction is between the application isr.Author = ourl.auLast.concat(“ “.concat(ourl.auFirst)) and
model of Amazon and the conceptual model of ourl.result_isbn = item.ASIN and
OpenURL. This abstraction connects the corre- ourl.origin = “Amazon”;
};
982
Web Services as XML Data Sources in Enterprise Information Integration
Box 6. Box 7.
cONcLUsION AcKNOWLEDGMENt
This chapter presented how XML data provided The authors acknowledge the support of the
by web services and relational data can be inte- Hungarian NKFP programme of the SINTAGMA
grated. The main tool to integrate web services project under grant number 2/052/2004. We also
with relational data is the Web Service Wrapper would like to thank all the people participating
component of the SINTAGMA Enterprise In- in this project.
formation Integration system. This component
makes easy the integration of XML data services
with relational databases, because the data model rEFErENcEs
of web services is automatically created by the
Web Service Wrapper of the SINTAGMA system. Benkő, T., Lukácsy, G., Fokt, A., Szeredi, P.,
Based on these application level data models a Kilián, I., & Krauth, P. (2003). Information Integra-
knowledge engineer can create a unified concep- tion through Reasoning on Meta-data. Proceeding
tual model of all data sources, as well as abstract of the workshop, AI moves to IA’’, IJCAI 2003,
mapping between the unified conceptual model Acapulco, Mexico, (pp. 65-77).
and the application level models. Then the concep-
tual model can be queried from the SINTAGMA Calvanese, D., De Giacomo, G., Lenzerini, M.,
system which hides the diversity of different data Nardi, D., & Rosati, R. (1998). Description
sources. The set of data sources can be extended Logic Framework for Information Integration,
easily by generating the application level data Principles of Knowledge Representation and
model for the new data source and creating an Reasoning, (pp. 2-13).
abstraction between the new application model
and the existing conceptual model. The source
983
Web Services as XML Data Sources in Enterprise Information Integration
Clark, T., & Warmer, J. (2002). Object Modeling Vasiliu, L., Harand, S., & Cimpian, E. (2004).
with the OCL: The rationale behind the Object The DIP Project: Enabling Systems & Solutions
Constraint Language. Springer. For Processing Digital Content With Semantic
Web Services. EWIMT 2004 European Workshop
Fowler, M., & Scott, K. (1998). UML Distilled: Ap-
on the Integration of Knowledge, Semantics and
plying the Standrad Object Modeling Language.
Digital Media Technology.
Addison-Wesley.
Grigorova, V. (2006). Semantic Description of
Web Services and Possibilities of BPEL4WS. In-
ADDItIONAL rEADING
formation Theories and Application, 13, 183–187.
Horrocks, I. (2002). Reasoning with Expressive Apps, A., & MacIntyre, R. (2006). Why
Description Logics: Theory and Practice. In Pro- OpenURL? D-Lib Magazine, 12(5). doi:10.1045/
ceeding of the 18th International Conference on may2006-apps
Automated Deduction (CADE 2002) (pp. 1-15). Baader, F., Calvanese, D., McGuinness, D., Nardi,
Lukácsy, G., Benkő, T., & Szeredi, P. (2007). D., & Patel-Schneider, P. (2003). The Description
Towards Automatic Semantic integration. In 3rd Logic Handbook, Theory, Implementation and
International Conference of Interoperability for Applications. Cambridge University Press.
Enterprise Software and Applications (I-ESA Booch, G., Jacobson, I., & Rumbaugh, J. (1999).
2007). The Unified Modeling Language User Guide.
Varga, L. Z., Hajnal, A., & Werner, Z. (2004). Addison-Wesley.
An Agent Based Approach for Migrating Web Cerami, E. (2002). Web Services Essentials.
Services to Semantic Web Services. Lecture Notes O’Reilly & Associates.
in Computer Science Vol. 3192, Springer-Verlag
GmbH, Heidelberg, Germany. In C. Bussler & D. Chawathe, S., Garcia-molina, H., Hammer, J., Irel,
Fensel (Eds.), Artificial Intelligence: Methodol- K., Papakonstantinou, Y., Ullman, J., & Widom,
ogy, Systems, and Applications 11th International J. (1994). The Tsimmis Project: Integration of
Conference, AIMSA 2004, Varna, Bulgaria, Sep- Heterogeneous Information Sources. Proceedings
tember 2-4, 2004, Proceedings, (pp. 371-380). of IPSJ Conference. (pp. 7-18).
ISBN-3-540-22959-0. Hepp, M., Leymann, F., Domingue, J., Wahler, A.,
Varga, L. Z., Hajnal, Á., & Werner, Z. (2005). The & Fensel, D. (2005). Semantic Business Process
WSDL2Agent Tool. In R. Unland, M. Klusch, & Management: A Vision Towards Using Semantic
M. Calisti (Eds.), Software Agent-Based Applica- Web Services for Business Process Management.
tions, Platforms and Development Kits. Whitestein Proceedings of the IEEE International Conference
Series in Software Agent Technologies, (pp. 197- on e-Business Engineering (ICEBE 2005), (pp.
223). Viaduktstrasse 42, CH-4051 Basel, Switzer- 535-540). IEEE Computer Society.
land, Springer Group, ISBN 3-7643-7347-4, 2005. Hodgson, C. (2005). Understanding the OpenURL
Framework. NISO Information Standards Quar-
terly, 17(3), 1–4.
Kline, K., & Kline, D. (2001). SQL in a Nutshell.
O’Reilly & Associates.
984
Web Services as XML Data Sources in Enterprise Information Integration
This work was previously published in Services and Business Computing Solutions with XML: Applications for Quality
Management and Best Processes, edited by Patrick Hung, pp. 82-97, copyright 2009 by Business Science Reference (an
imprint of IGI Global).
985
986
Chapter 4.6
System-of-Systems
Cost Estimation:
Analysis of Lead System
Integrator Engineering Activities
Jo Ann Lane
University of Southern California, USA
Barry Boehm
University of Southern California, USA
AbstrAct
engineering activities described in Electronic
As organizations strive to expand system capa- Industries Alliance (EIA) 632 (“Processes for
bilities through the development of system-of- Engineering a System”). This research further
systems (SoS) architectures, they want to know analyzed effort and schedule issues on “very
“how much effort” and “how long” to implement large” SoS programs to more clearly identify
the SoS. In order to answer these questions, it is and profile the types of activities performed by
important to first understand the types of activi- the typical LSI and to determine organizational
ties performed in SoS architecture development characteristics that significantly impact overall
and integration and how these vary across differ- success and productivity of the LSI effort. The
ent SoS implementations. This article provides results of this effort have been captured in a
results of research conducted to determine types reduced-parameter version of the constructive
of SoS lead system integrator (LSI) activities and SoS integration cost model (COSOSIMO) that
how these differ from the more traditional system estimates LSI SoS engineering (SoSE) effort.
Copyright © 2011, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
System-of-Systems Cost Estimation
987
System-of-Systems Cost Estimation
calibration
necessary or obsolete information, and how to Recent LSI research conducted by reviewing
maintain dynamic networks so that component LSI statements of work identifies the following
system “nodes” can enter and leave the SoS. typical LSI activities:
Today, there are fairly mature tools to support
the estimation of the effort and schedule associ- • Concurrent engineering of requirements,
ated with the lower-level SoS component systems architecture, and plans
(Boehm, Valerdi, Lane, & Brown 2005). However, • Identification and evaluation of technologies
none of these models supports the estimation of to be integrated
LSI SoSE activities. COSOSIMO, shown in Figure • Source selection of vendors and suppliers
1, is a parametric model currently under develop- • Management and coordination of supplier
ment to compute just this effort. The goal is to activities
support activities for estimating the LSI effort in a • Validation and feasibility assessment of SoS
way that allows users to develop initial estimates architecture
and then conduct tradeoffs based on architecture • Continual integration and test of SoS-level
and development process alternatives. capabilities
• SoS-level implementation planning, prepara-
tion, and execution
Level 0 sOs
Level 1
s1 s2 sm
Level 2 s11 s12 s1n s21 s22 s2n sm1 sm2 smn
COTS Assessment and Integration for COTS-based Components Levels 1-n COCOTS
988
System-of-Systems Cost Estimation
• On-going change management at the SoS affiliates have identified key size drivers and cost
level and across the SoS-related integrated drivers for LSI effort and are shown in Table 1.
product teams to support the evolution of Because there are concerns about the avail-
requirements, interfaces and technology. ability of effort data from a sufficient number of
SoS programs to support model calibration and
With the addition of this new cost model to the validation, current efforts are focusing on defining
constructive cost model (COCOMO) suite of cost a “reduced parameter set” cost model or ways to
models, one can easily develop more comprehen- estimate parts of the LSI effort using fewer, but
sive estimates for the total SoS development, as more specific, parameters. The following para-
shown in Figure 2. graphs present the results of this recent research.
Further observations of LSI organizations in-
dicate that the LSI activities can be grouped into
LsI EFFOrt EstIMAtION three areas: 1) planning, requirements manage-
APPrOAcH ment, and architecting (PRA), 2) source selection
and supplier oversight (SS), and 3) SoS integration
As mentioned above, key to an LSI effort estima- and testing (I&T). There are typically different
tion model is having a clear understanding of the parts of the LSI organization that are responsible
SoSE activities performed by the organization as for these three areas. Figure 3 illustrates, con-
well as which activities require the most effort. In ceptually, how efforts for these three areas are
addition, it is important to understand how these distributed across the SoS development life cycle
SoSE activities differ from the more traditional phases of inception, elaboration, construction,
systems engineering activities. Analysis presented and transition for a given increment or evolution
in Lane (2005) describes how the typical LSI of SoS development.
SoSE activities differ from the more traditional Planning, requirements, and architecting begin
system engineering activities identified in EIA early in the life cycle. As the requirements are
632 (Electronic Industries Alliance, 1999) and the refined and the SoS architecture is defined and
Software Engineering Institute (SEI) Capability matured, source selection activities can begin to
Maturity Model Integration (CMMI) (Software identify component system vendors and to issue
Engineering Institute, 2001). Subsequently, Del- contracts to incorporate the necessary SoS-en-
phi surveys conducted with USC CSSE industry abling capabilities. With a mature SoS architecture
989
System-of-Systems Cost Estimation
and the identification of a set of component systems needs and desires. As the effort ramps down in
for the current increment, the integration team can the transition phase, efforts are typically ramping
begin the integration and test planning activities. up for the next increment or evolution.
Once an area ramps up, it continues through the By decomposing the COSOSIMO cost model
transition phase at some nominal level to ensure into three components that correspond to the three
as smooth a transition as possible and to capture primary areas of LSI SoSE effort, the parameter set
lessons learned to support activities and plans for each COSOSIMO component can be reduced
for the next increment. Boehm and Lane (2006) from the full set and the applicable cost drivers
describe how some of these activities directly made more specific to the target area. Table 2 shows
support the current plan-driven SoS development the resulting set of size and cost drivers for each
effort while others are more agile, forward looking, of the three primary areas. This approach allows
trying to anticipate and resolve problems before the model developers to calibrate and validate
they become huge impacts. The goal is to stabi- the model components with fewer parameters
lize development for the current increment while and data sets. It also allows the collection of data
deferring as much change as possible to future sets from organizations that are only responsible
increments. For example, the planning/require- for a part of the LSI SoSE activities. Finally, this
ments/architecture group continues to manage approach to LSI SoSE effort estimation allows
the requirements change traffic that seems to be the cost model to provide estimates for the three
so common in these large systems, only apply- areas, as well as a total estimate—a key request
ing those changes to the current increment that from USC CSSE industry affiliates supporting
are absolutely necessary and deferring the rest this research effort.
to future increments. The architecture team also Detailed definitions and proposed ratings for
monitors current increment activities in order to these parameters may be found in Lane (2006).
make necessary adjustments to the architecture to The following provides a brief description of each
handle cross-cutting technology issues that arise of the COSOSIMO parameters. Note that several
during the component system supplier construc- of the COSOSIMO parameters are similar to those
tion activities. Likewise, the supplier oversight defined for the constructive systems engineering
group continues to monitor the suppliers for risks, cost model (COSYSMO) and are identified in the
cost, and schedule issues that arise out of SoS descriptions below.
conflicts with the component system stakeholder
990
System-of-Systems Cost Estimation
cOsOsIMO size Drivers framework. Note: This does NOT include inter-
faces internal to the SoS component systems, but
Number of SoS-Related Requirements1 it does include interfaces external to the SoS and
between the SoS component systems. Also note
This driver represents the number of requirements that this is not a count of total interfaces (in many
for the SoS of interest at the SoS level. Require- SoSs, the total number of interfaces may be very
ments may be functional, performance, feature, dynamic as component systems come and go in
or service-oriented in nature depending on the the SoS environment —in addition, there may be
methodology used for specification. They may multiple instances of a given type of component
also be defined by the customer or contractor. system), but rather a count of distinct protocols
SoS requirements can typically be quantified at the SoS level.
by counting the number of applicable shalls,
wills, shoulds, and mays in the SoS or marketing Number of Independent Component
specification. Note: Some work may be required System Organizations
to decompose requirements to a consistent level
so that they may be counted accurately for the The number of organizations managed by the
appropriate SoS-of-interest. LSI that are providing SoS component systems.
The number of distinct net-centric interface This driver represents the number of operational
protocols to be provided/supported by the SoS scenarios that an SoS must satisfy. Such scenarios
991
System-of-Systems Cost Estimation
include both the nominal stimulus-response thread communication latency, interoperability, flexibil-
plus all of the off-nominal threads resulting from ity/adaptability, and reliability. This parameter
bad or missing data, unavailable processes, net- should be evaluated with respect to the scope of
work connections, or other exception-handling the sub-model to which it pertains.
cases. The number of scenarios can typically be
quantified by counting the number of SoS states, Team Cohesion1
modes, and configurations defined in the SoS
concept of operations or by counting the number Represents a multi-attribute parameter, which
of “sea-level” use cases (Cockburn, 2001), includ- includes leadership, shared vision, diversity of
ing off-nominal extensions, developed as part of stakeholders, approval cycles, group dynam-
the operational architecture. ics, integrated product team (IPT) framework,
team dynamics, trust, and amount of change in
Number of Unique Component responsibilities. It further represents the hetero-
Systems geneity in stakeholder community of the end us-
ers, customers, implementers, and development
The number of types of component systems that team. For each sub-model, this parameter should
are planned to operate within the SoS framework. be evaluated with respect to the appropriate LSI
If there are multiple versions of a given type team (e.g., PRA, SS, or I&T).
that have different interfaces, then the different
versions should also be included in the count of Team Capability
component systems.
Represents the anticipated level of team coopera-
cOsOsIMO cost Drivers tion and cohesion, personnel capability, and con-
tinuity, as well as LSI personnel experience with
Requirements Understanding1 the relevant domains, applications, language, and
tools. For each sub-model, this parameter should
This cost driver rates the level of understanding be evaluated with respect to the appropriate LSI
of the SoS requirements by all of the affected team (e.g., PRA, SS, or I&T).
organizations. For the PRA sub-model, it includes
the PRA team as well as the SoS customers and Process Maturity
sponsors, SoS PRA team members, component
system owners, users, and so forth. For the SS A parameter that rates the maturity level and
sub-model, it is the understanding level between completeness of the LSI’s processes and plans.
the LSI and the component system suppliers/ For each sub-model, this parameter should be
vendors. For the I&T sub-model, it is the level of evaluated with respect to the appropriate LSI
understanding between all of the SoS stakeholders team processes (e.g., PRA, SS, or I&T).
with emphasis on the SoS I&T team members.
Tool Support1
Level of Service Requirements1
Indicates the coverage, integration, and maturity
This cost driver rates the difficulty and critical- of the tools in the SoS engineering and manage-
ity of satisfying the ensemble of level of service ment environments. For each sub-model, this
requirements or key performance parameters parameter should be evaluated with respect to
(KPPs), such as security, safety, transaction speed,
992
System-of-Systems Cost Estimation
the tool support available to appropriate LSI team cols in the SoS framework. Two COSOSIMO
(e.g., PRA, SS, or I&T). sub-models use this parameter, and it should be
evaluated in each case with respect to the LSI
Cost/Schedule Compatibility activities covered by the sub-model of interest.
Analyze existing
literature Concurrency and
Perform
Step 1 Behavioral feedback implied...
analyses
Step 2 Identify relative
significance
Perform expert-judgment
Step 3
Delphi assessment,
formulate a-priori model
Step 4
Gather project
data
Determine Bayesian
Step 5 A-Posteriori model
Step 6 Gather more
data; refine model
Step 7
993
System-of-Systems Cost Estimation
cOsOsIMO cOst MODEL oped. Finally, the expert judgment and actual data
DEVELOPMENt MEtHODOLOGy models are combined using Bayesian techniques.
In this process, more weight is given to expert
The COSOSIMO cost model is being developed judgement when actual data is not consistent or
using the proven cost model development meth- sparse, and more weight is given to actual data
odology developed over the last several years at when the data is fairly consistent and experts do
the USC CSSE. This methodology, described in not strongly agree.
(Boehm, Abts, Brown, Chulani, Clark, & et al., Since technologies and engineering ap-
2002), is illustrated in Figure 4. proaches are constantly evolving, it is important
For COSOSIMO, the literature review has to continue data collection and model analysis
focused on the definitions of SoSs and SoSE; the and update the model when appropriate. Histori-
role and scope of activities typically performed cally, this has led to parameters related to older
by LSIs; and analysis of cost factors used in re- technologies being dropped and new parameters
lated software, systems engineering, and COTS added. In the case of COSOSIMO, it will be im-
integration cost models, as well as related system portant to track the evolution of SoS architectures
dynamics models that investigate candidate SoSE and integration approaches and the development
cost factors. of convergence protocols.
The behavioral analyses determine the poten- For COSOSIMO, each of the sub-models will
tial range of values for the candidate cost drivers go through this development process. Once the
and the relative impact that each has on the overall sub-models are calibrated and validated, they
effort associated with the relevant SOSE activities. may be combined to estimate the total LSI effort
For example, if the stakeholder team cohesion is for a proposed SoS development program. To
very high, what is the impact on the PRA effort? date, several expert judgment surveys have been
Likewise, if the stakeholder team cohesion is conducted and actual data collection is in process.
very low, what is the resulting impact on PRA
effort? The results of the behavioral analyses are
then used to develop a preliminary model form. cONcLUsION
The parameters include a set of one or more size
drivers, a set of exponential scale factors, and a LSI organizations are realizing that if more
set of effort multipliers. Cost drivers that are re- traditional processes are used to architect and
lated to economies/diseconomies of scale as size integrate SoSs, it will take too long and too much
is increased are combined into an exponential effort to find optimal solutions and build them.
factor. Other cost drivers that have a more linear Preliminary analysis of LSI activities show that
behavior with respect to size drivers are combined while many of the LSI activities are similar to
into an effort multiplier. those described in EIA 632 and the SEI’s CMMI,
Next, the model parameters, definitions, LSIs are identifying ways to combine agile
range of values, rating scales, and behaviors are processes with traditional processes to increase
reviewed with industry and research experts us- concurrency, reduce risk, and further compress
ing a wideband Delphi process. The consensus overall schedules. In addition, effort profiles for
of the experts is used to update the preliminary the key LSI activities (the up-front effort associ-
model. In addition to expert judgement, actual ated with SoS abstraction, architecting, source
effort data is collected from successful projects selection, systems acquisition, and supplier and
covering the LSI activities of interest. A second vendor oversight during development, as well as
model, based on actual data fitting, is then devel- the effort associated with the later activities of
994
System-of-Systems Cost Estimation
integration, test, and change management) show Lane, J. (2005). System of systems lead system
that the percentage of time spent on key activities integrators: Where do they spend their time and
differs considerably from the more traditional sys- what makes them more/less efficient. (Tech. Rep.
tem engineering efforts. By capturing the effects No. 2005-508.) University of Southern California
of these differences in organizational structure Center for Systems and Software Engineering,
and system engineering processes in a reduced Los Angeles, CA.
parameter version of COSOSIMO, management
Lane, J. (2006). COSOSIMO Parameter Defini-
will have a tool that will better predict LSI SoSE
tions. (Tech. Rep. No. 2006-606). University
effort and to conduct “what if” comparisons of
of Southern California Center for Systems and
different development strategies.
Software Engineering, Los Angeles, CA.
Maier, M. (1998). Architecting principles for
rEFErENcEs systems-of-systems. Systems Engineering, 1(4),
267-284.
Blanchette, S. (2005). U.S. Army acquisition – The
Pressman, J., & Wildavsky, A. (1973). Implementa-
program executive officer perspective, (Special
tion: How great expectations in Washington are
Report CMU/SEI-2005-SR-002). Pittsburgh, PA:
dashed in Oakland. Oakland, CA: University of
Software Engineering Institute.
California Press.
Boehm, B., Abt, C., Brown, A., Chulani, S., Clark,
Sage, A., and Cuppan, C. (2001). On the systems
& et al. (2000). Software cost estimation with CO-
engineering and management of systems of sys-
COMO II. Upper Saddle River, NJ: Prentice Hall.
tems and federations of systems. Information,
Boehm, B., Valerdi, R., Lane, J., & Brown, A. Knowledge, and Systems Management 2, 325-345.
(2005). COCOMO suite methodology and evolu-
Software Engineering Institute (2001). Capabil-
tion. CrossTalk, 18(4), 20-25.
ity maturity model integration (CMMI) (Special
Boehm, B., & Lane, J. (2006). 21st century report CMU/SEI-2002-TR-001). Pittsburgh, PA:
processes for acquiring 21st century systems of Software Engineering Institute.
systems. CrossTalk, 19(5), 4-9.
United States Air Force Scientific Advisory Board
Cockburn, A. (2001). Writing effective use cases. (2005). Report on system-of-systems engineering
Boston: Addison-Wesley. for Air Force capability development. (Public
Release SAB-TR-05-04). Washington, DC:
Electronic Industries Alliance. (1999). EIA Stan-
HQUSAF/SB.
dard 632: Processes for engineering a system.
Valerdi, R (2005). The constructive systems en-
Jamshidi, M. (2005). System-of-systems engineer-
gineering cost model (COSYSMO). Unpublished
ing - A definition. Proceedings of IEEE System,
doctoral dissertation, University of Southern
Man, and Cybernetics (SMC) Conference. Re-
California, Los Angeles.
trieved January 29, 2005 from http://ieeesmc2005.
unm.edu/SoSE_Defn.htm
995
System-of-Systems Cost Estimation
ENDNOtE
1
Adapted to SoS environment from CO-
SYSMO (Valerdi, 2005).
This work was previously published in Encyclopedia of Emerging Systems Approaches in Information Technologies: Con-
cepts, Theories, and Applications, edited by David Paradice, pp. 204-213, copyright 2010 by Information Science Reference
(an imprint of IGI Global).
996
997
Chapter 4.7
Consistency and Modularity
in Mediated Service-Based
Data Integration Solutions
Yaoling Zhu
Dublin City University, Ireland
Claus Pahl
Dublin City University, Ireland
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
tion solution for Web service-enabled information implementations provides the necessary flexibil-
systems. Difficulties arise from the high degree ity and modularity to deal with complexity and
of complexity in data structures in many business consistency problems. Two central questions to
and technology applications and from the problem the data integration problem and its automation
of heterogeneity of data representation in applica- shall be addressed in this investigation:
tions that cross organisational boundaries.
The emergence of the Web services platform • How to construct data model transforma-
and service-oriented architecture (SOA) as an ar- tion rules and how to express these rules in
chitecture paradigm has provided a unified way to a formal, but also accessible and maintain-
expose the data and functionality of an information able way is central.
system (Stal, 2002). The Web services platform • How integration can be facilitated through
has the potential to solve the problems in the data service composition to enable interoper-
integration domain such as heterogeneity and ability through connector and relationship
interoperability (Orriens, Yang and Papazoglou, modelling.
2003; Haller, Cimpian, Mocan, Oren and Bussler,
2005; Zhu et al., 2004). Our contribution is an in- We show how ontology-based semantic data
tegration technology framework for Web-enabled models and a specific declarative data query and
information systems comprising of transformation language called Xcerpt (Bry and
Schaffert, 2002) and its execution environment can
• Firstly, a data integration technique based be combined in order to allow dynamic data trans-
on semantic, ontology-based data models formation and integration. We focus on technical
and the declarative specification of trans- solutions to semantically enhance data modelling
formation rules and and adapt Xcerpt and its support environment
• Secondly, a mediator architecture based on so that it can facilitate the dynamic generation
information services and the construction of Xcerpt query programs (in response to user
of connectors that handle the transforma- requests) from abstract transformation rules.
tions to implement the integration process.
998
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
The integration itself can be defined using trans- XSLT is the most widely used XML data inte-
formation languages. gration language, but suffers from some limitations
Information integration has the objective of within our context due its is syntactical focus and
bringing together different types of data from operational language.
different sources in order for this data to be ac-
cessed, queried, processed and analysed in a • Semantics: Only the syntactical integra-
uniform manner. Recently, service-based plat- tion of query and construction part of a
forms are being used to provide integration solu- XSLT transformation program is specified,
tions. In the Web services context, data in XML but consistency in terms of the semantics
representation, which is retrieved from individu- can not be guaranteed.
al Web-based data services, needs to be merged • Modularity: XSLT does not support a join
and transformed to meet the integration require- or composition operator on XML docu-
ments. Data schema integration cannot be fully ments that allows several source XML
automated on a syntactic level since the syntactic documents to merged into one before be-
representation of schemas and data does not con- ing transformed.
vey the semantics of different data sources. For • Maintainability: XSLT transformations
instance, a customer can be identified in the con- are difficult to write, maintain, and reuse
figuration management repository by a unique for large-scale information integration. It
customer identifier; or, the same customer may is difficult to separate the source and target
be identified in the problem management reposi- parts of transformation rules as well as the
tory by a combination of a service support identi- filtering constraints due to its operational
fier and its geographical location, see Figure 1. character without a separation of query and
Ontology-based semantic data models can rec- construction concerns.
tify this problem by providing an agreed vocabu-
lary of concepts with associated properties.
Figure 1. Two schema diagrams of the global data model that need to be integrated (© 2008, Claus
Pahl. Used with permission).
999
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
Due to these drawbacks, we propose semantic are represented as concepts in the ontology. The
data models and a declarative query and transfor- concept Customer is defined in terms of its proper-
mation approach providing more expressive power ties – data type-like properties such as a name or
and the ability to automatically generate query an identifier and also object type properties such
and transformation programs as connectors for as a collection of services used by a customer.
services-based data integration in Web-enabled Three concept descriptions, using the existential
information systems. A range of characteristics of quantifier “∃” here, express that a customer is
XML query and transformation languages beyond linked to an identification through a supportID
XSLT, which have been studied and compared property, to a name using the custName property,
(Jhingran, Mattos and Pirahesh, 2002; Lenzerini, and to services using Services. In some cases,
2002; Peltier, Bezivin, and Guillaume, 2002), led these properties refer to other composite concepts,
us to choose the fully declarative language Xcerpt sometimes they refer to atomic concepts that act
(Bry and Schaffert, 2002) as our transformation as type names here. Technically, the existential
platform (Zhu, 2007). quantification means that there exits for instance
a name that is a customer name.
1000
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
Figure 2. Information architecture overview (© 2008, Claus Pahl. Used with permission)
corresponding global XML schema representation between different participant data representa-
for the customer element is: tions can be derived. This construction needs to
address a number of specific objectives regarding
<!ELEMENT Customer (Service, the transformation rules:
System) >
<!ATTLIST Customer • Modularity of transformation rules is need-
supportID ID ed for the flexible generation and configu-
custName Name > ration of transformation rules by allowing
these rules to be specific to particular data
Here, the principle of this mapping becomes elements,
clear: ontology concepts are mapped to XML • Consistency needs to be addressed for the
elements and specific predefined atomic con- reliable generation and configuration of
cepts serve to represent simple properties that are transformation rules by allowing seman-
mapped to XML attributes. We have focused on tics-preserving rules to be constructed
the core elements of ontologies and XML data here automatically.
to highlight the principles. Description elements
of XML such as different types of attributes or Based on a data-oriented domain ontology and
option and iteration in element definition can also two given local data models (source and target,
be captured through a refined property language. expressed as XML schemas) that are mapped
In particular the Web Ontology Language OWL onto the ontology, the rule construction process
provides such constructs (W3C, 2004). is based on three steps:
1001
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
1002
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
Xcerpt distinguishes two types of specifica- and transformation programs that integrate dif-
tions: ferent data services:
1003
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
1004
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
Figure 4. Transformation specification in Xcerpt based on goal chaining with one goal-based query
program and two supporting transformation rules (© 2008, Claus Pahl. Used with permission)
Figure 5. The composite rules for customer transformation in Xcerpt (© 2008, Claus Pahl. Used with
permission)
1005
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
1006
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
Figure 6. Component view of a mediator Web service with interactions (© 2008, Claus Pahl. Used with
permission)
• Connector generation service. This com- by composing each Xcerpt query with the cor-
ponent is responsible for generating con- responding transformation rules. In an Xcerpt
nectors for transforming messages both en- query program, there is only one goal query,
tering the WS-BPEL engine from service which will be processed first. The goal query is
clients and leaving the WS-BPEL engine made up of composite transformations rules that
from data provider services according to in turn are made up of ground rules that read XML
the global data model. data from external resources. The process begins
by expanding each composite query according to
The active components, provided as informa- the definitional data mappings that are stored in
tion services, are complemented by two reposi- a rule repository. The rule chaining mechanism
tories: in Xcerpt needs the goal query and all supporting
queries in one query program at runtime.
• Transformation rule repository. The re- The Xcerpt runtime engine reads XML-based
pository allows the reuse of rules and can resources and populates them into data terms
support multiple versions of service pro- before the query terms can start to evaluate them.
viders and mediator services. The drawback is that all resources identifiers have
• Schema repository. The repository stores to be specified inside a query program rather than
the WSDL metadata and the XML schema be passed into a query program as parameters.
information for the Web service provid- Consequently, we adapted the Xcerpt approach to
ers and the mediator Web service. The processing transformation requests in an informa-
schema information is used to validate the tion integration solution. The resource identifiers
XML documents at runtime before they are not hard-coded in ground rules in our setting
are integrated and returned to the client in order to achieve the desired loose coupling to
applications. achieve flexibility and reusability. These resource
identifiers are invisible to the connector construc-
connector Generation tion service. Xcerpt does not support automatic
query program construction by default, although
The construction of a service connector means it provides the necessary backward rule chaining
to generate an executable Xcerpt query program technique to evaluate a chain of queries.
1007
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
1008
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
crucial solutions for the information integration Bry, F., & Schaffert, S. (2002). Towards a De-
problem are drawn from mediated architectures clarative Query and Transformation Language
and data model transformation, allowing the for XML and Semistructured Data: Simulation
XML data from local schemas to be consistently Unification. In Proceedings Intl. Conference on
transformed, merged and adapted according to Logic Programming. LNCS 2401, (pp. 255-270).
declarative, rule-based integration schemas for Heidelberg, Gerrnany: Springer-Verlag.
dynamic and heterogeneous environments. We
Daconta, M. C., Obrst, L. J., & Smith, K. T. (2003).
have proposed a declarative style of transformation
The Semantic Web – a Guide to the Future of
based on a semantic, ontology-based data model,
XML, Web Services, and Knowledge Management.
with implicit source model traversal and target
Indianapolis, USA: Wiley & Sons.
object creation. The development of a flexible
mediator service is crucial for the success of the Garcia-Molina, H., Papakonstantinou, Y., Quass,
service-based information systems architecture D., Rajaraman, A., Sagiv, Y., & Ullman, Y. D.
from the deployment point of view. Our solution (1997). The TSIMMIS approach to mediation:
based on the query and transformation language Data models and languages. Journal of Intel-
Xcerpt is meant to provide a template for other ligent Information Systems, 8(2), 117–132.
similar languages. One of our central objectives doi:10.1023/A:1008683107812
was to introduce an integration solution from a
Haller, A., Cimpian, E., Mocan, A., Oren, E., &
technical perspective.
Bussler, C. (2005). WSMX - a semantic service-
A number of extensions of our approach would
oriented architecture. In Proceedings Intl. Confer-
strongly benefit its flexibility. Essentially, we
ence on Web Services ICWS 200 5, (pp. 321-328).
plan to address the trends outlined in the previ-
ous section. Systems evolution and legacy system Jhingran, A. D., Mattos, D., & Pirahesh, N. H.
integration shall be addressed through a more (2002). Information Integration: A research
transformation systems-oriented perspective on agenda. IBM Systems Journal, 41(4), 55–62.
integration. We are also working on an integration
Karastoyanova, D., Wetzstein, B., van Lessen, T.,
of service ontologies and general data-oriented do-
Wutke, D., Nitzsche, J., & Leymann, F. (2007).
main ontologies for service-oriented architectures.
Semantic Service Bus: Architecture and Imple-
mentation of a Next Generation Middleware. In
Proceedings of the Second International Workshop
rEFErENcEs
on Service Engineering SEIW 2007, (pp. 347-354).
W3C – the World Wide Web Consortium. (2004). Lenzerini, M. (2002). Data integration: A theo-
The Semantic Web Initiative. Retrieved March 9, retical perspective. In Proceedings Principles of
2008 from http://www.w3.org/2001/sw. Database Systems Conference PODS’02, (pp.
Alonso, G., Casati, F., Kuno, H., & Machiraju, V. 233-246).
(2004). Web Services – Concepts, Architectures Orriens, B., Yang, J., & Papazoglou, M. (2003).
and Applications. Berlin, Germany: Springer A Framework for Business Rule Driven Web
Verlag. Service Composition. Jeusfeld, M.A. & Pastor,
O. (Eds.), In Proceedings ER’2003 Workshops,
LNCS 2814, (pp. 52-64). Heidelberg, Germany:
Springer-Verlag.
1009
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
Payne, T., & Lassila, O. (2004). Semantic Web Szyperski, C. (2002). Component Software: Be-
Services. IEEE Intelligent Systems, 19(4), 14–15. yond Object-Oriented Programming – 2nd Ed.
doi:10.1109/MIS.2004.29 New York, USA: Addison-Wesley.
Peltier, M., Bezivin, J., & Guillaume, G. (2001). Widom, J. (1995). Research problems in data
MTRANS: A general framework, based on warehousing. In Proceedings of 4th International
XSLT, for model transformations. In Proceed- Conference on Information and Knowledge Man-
ings of the Workshop on Transformations in UML agement, (pp. 25-30).
WTUML’01. Retrieved 21 July 2008 from: http://
Wiederhold, G. (1992). Mediators in the archi-
citeseer.ist.psu.edu/581336.html
tecture of future information systems. IEEE
Reynaud, C., Sirot, J. P., & Vodislav, D. (2001). Computer, 25, 38–49.
Semantic Integration of XML Heterogeneous
Zhang, Z., & Yang, H. (2004). Incubating Services
Data Sources. In Proceedings IDEAS Conference
in Legacy Systems for Architectural Migration.
2001, (pp. 199–208).
In Proceedings 11th Asia-Pacific Software Engi-
Rosenberg, F., & Dustdar, S. (2005). Business neering Conference APSEC’04, (pp. 196-203).
Rules Integration in BPEL - A Service-Oriented
Zhu, F., Turner, M., Kotsiopoulos, I., Bennett, K.,
Approach. In Proceedings 7th International
Russell, M., Budgen, D., et al. (2004). Dynamic
IEEE Conference on E-Commerce Technology,
Data Integration Using Web Services. In Pro-
(pp. 476- 479).
ceedings 2nd International Conference on Web
Rouvellou, I., Degenaro, L., Rasmus, K., Eh- Services ICWS’2004, (pp. 262-269).
nebuske, D., & McKee, B. (2000). Extending busi-
Zhu, Y. (2007). Declarative Rule-based Integra-
ness objects with business rules. In Proceedings
tion and Mediation for XML Data in Web Service-
33rd Intl. Conference on Technology of Object-
based Software Architectures. M.Sc. Thesis.
Oriented Languages, (pp. 238-249).
Dublin City University.
Schaffert, S. (2004). Xcerpt: A Rule-Based Query
and Transformation Language for the Web. PhD
Thesis, University of Munich.
ADDItIONAL rEADING
Seltsikas, P., & Currie, W. L. (2002). Evaluating
the application service provider (ASP) business textbooks
model: the challenge of integration. In Proceed-
ings 35th Annual Hawaii International Conference Bass, L. Clements, & P. Kazman, R. (2003).
2002. 2801 – 2809. Software Architecture in Practice. 2nd Edition.
Boston, USA: Addison-Wesley.
Stal, M. (2002). Web Services: Beyond Compo-
nent-based Computing. Communications of the Krafzig, D., Banke, K., & Slama, D. (2004).
ACM, 45(10), 71–76. doi:10.1145/570907.570934 Enterprise SOA: Service-Oriented Architecture
Best Practices. Upper Saddle River, USA: Pren-
Stern, A., & Davis, J. (2004). Extending the Web
tice Hall.
services model to IT services. In Proceedings
IEEE International Conference on Web Services, Mahmoud, Q. H. (2004). Middleware for Com-
(pp. 824-825). munications: Concepts, Designs and Case Studies.
Indianapolis, USA: John Wiley and Sons.
1010
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
1011
Consistency and Modularity in Mediated Service-Based Data Integration Solutions
Velegrakis, Y., Miller, R., & Mylopoulos, J. (2005). Yang, Y., Peng, X., & Zhao, W. (2007). An Au-
Representing and Querying Data Transformations. tomatic Connector Generation Method for Dy-
In Proceedings of the 21st International Confer- namic Architecture. In Proceedings International
ence on Data Engineering ICDE’05. (pp. 81-92). Computer Software and Applications Conference
COMPSAC 2007. (pp. 409-414).
Willcocks, P., & Lacify, C. (1998). The sourc-
ing and outsourcing of IS: Shock of the New? P.
Willcocks and C. Lacity (Eds.), Strategic Sourc- standards
ing of Information Technology: Perspective and
Practices. Chichester, UK: Wiley. Object Management Group. (2003). Model-
Driven Architecture MDA Guide V1.0.1. OMG.
This work was previously published in Services and Business Computing Solutions with XML: Applications for Quality
Management and Best Processes, edited by Patrick Hung, pp. 98-113, copyright 2009 by Business Science Reference
(an imprint of IGI Global).
1012
1013
Chapter 4.8
Data Warehouse and Business
Intelligence Systems in
the Context of E-HRM
Martin Burgard
Saarland University, Germany
Franca Piazza
Saarland University, Germany
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Data Warehouse and Business Intelligence Systems in the Context of E-HRM
are further indicators showing the ever-growing The data warehouse stores the data in multidi-
importance of these systems. On the other hand, mensional data structures, so-called cubes, in
publications concerning these system categories order to provide optimized analysis possibilities
in the context of e-HRM, except for short discus- (e.g., Inmon, 2005). The administration system
sions to some isolated topics as online recruiting supports the data modeling, the ETL-scheduling,
(Lin & Stasinskaya, 2002), enterprise resource the user administration, and the monitoring. As
planning (Ashbaugh & Miranda, 2002), or human some data become obsolete and do not have to be
resource information systems (Kovach, Hughes, accessible for the ongoing management analysis
Fagan, & Magitti, 2002) are rather scarce. Data they can be stored in the archiving system. Fur-
warehouse and business intelligence systems are thermore the archiving system allows backup of
commonly used in sales or marketing depart- the data. To manage the huge amount of data
ments. In contrast, their use in HR departments stored in a data warehouse, information about the
is relatively low (Watson et al., 2001). However, data, so-called metadata, such as calculation rules,
the adoption of these systems in the context of e- content description, or usage documentation, is
HRM offers new potentials to the management of necessary. The depicted components constitute
human resources. In the following their technical the data warehouse system which is the basis for
and functional aspects are depicted. analysis activities performed by using a business
A data warehouse is defined as a “subject- intelligence system.
oriented, integrated, non-volatile and time-variant Business intelligence systems subsume differ-
collection of data in support of management’s ent technologies and methods to access and ana-
decisions” (Inmon, 2005, p. 29). So the main task lyze the data stored in a data warehouse (Turban,
of the data warehouse is to integrate the data from Aronson, & Liang, 2005). The core components
a variety of different source systems existing inside of business intelligence systems are OLAP and
and outside a company in a single data base and data mining.
to store the data in a multidimensional structure
which is optimized to support the management’s
analysis activities. In doing so the operative sys- Figure 1. Reference architecture of data warehouse
tems are no longer charged with the reporting and business intelligence systems
requests of the management which resulted in
poor system performance.
The data warehouse is the core component of
the data warehouse system which further consists
of several components (see Figure 1): the extrac-
tion, transformation, and loading system (ETL-
system), the administration system, the archiving
system, and the metadata repository.
To integrate the data in the data warehouse the
ETL-system enables the extraction of data from
different source systems. Furthermore the ETL-
system transforms the data to eliminate syntactic
and semantic defects and harmonizes the structure
and value of the data. After the transformation
the relevant data is loaded into the data warehouse.
1014
Data Warehouse and Business Intelligence Systems in the Context of E-HRM
Although there is no explicit definition of Besides OLAP, data mining constitutes another
OLAP in literature the common understanding core component of business intelligence systems.
of OLAP refers to the possibilities to consolidate, Data mining aims at revealing unknown patterns
view, and analyze data according to multiple di- from large databases (Fayyad, Piatetsky-Shapiro,
mensions (Codd, Codd, & Salley, 1993). The fast & Smyth, 1996). A variety of methods from dif-
analysis of shared multidimensional information ferent areas such as statistics, machine learning,
(FASMI) concept characterizes OLAP by means and artificial intelligence are subsumed under the
of five attributes: fast, analysis, shared, multidi- concept of data mining. All of these methods aim
mensional, and information (Pendse & Creeth, at generating hypotheses out of the data without
1995). The attribute fast refers to the requirement any precedent assumption of coherences in the
that the data request has to be fulfilled quickly and data. This constitutes the main difference to OLAP.
the user performing the analysis does not have to OLAP is based on the user’s ability to overlook
wait long for a system response. Following the the data which describe a specific situation. But
FASMI concept an average timeframe of five especially, in very complex decision situations,
seconds characterizes the response time of OLAP- where the coherences of data are unknown and
requests. Analysis, as a further attribute of OLAP, hence can not be analyzed by user driven inter-
denotes the ability to cope with business logic and active queries, data mining can provide further
to facilitate the user’s analysis activities. The data information. The most important functions of
can be analyzed interactively by the user without data mining are classification, segmentation, and
any programming knowledge. The attribute shared association analysis.
refers to the need to implement the necessary Classification consists of examining the stored
security and integrity requirements to be fulfilled data and assigning them to one of a predefined set
by OLAP. Customarily several users try to analyze of classes. Based on preclassified data, a model
the same data at the same time. Hence an appro- is automatically generated. This model allows
priate update locking and authorization concept assigning of unclassified data to a certain class.
has to be assured. Furthermore, multidimension- Applied methods are, for example, rule induction,
ality constitutes a characteristic of OLAP. OLAP discriminant analysis, or multilayer perception
provides a multidimensional conceptual view of (Berry & Linoff, 2004; Cho & Ngai, 2003).
the data which means that relevant measures can Segmentation is the task of grouping hetero-
be analyzed by multiple different dimensions. geneous data into more homogenous subgroups,
In addition, OLAP provides the possibilities to so-called clusters. In contrast to classification,
analyze the data on different hierarchical levels. segmentation does not rely on predefined classes
Measures such as headcount, for instance, can be but rather generates clusters during the segmenta-
analyzed on a detailed disaggregated level (e.g., tion process. It is up to the user to determine the
headcount of a certain department) and on an meaning of the resulting clusters. Applied segmen-
aggregated level (e.g., headcount of the whole tation methods are, for example, cluster analysis
company). The operations for such an interactive or self-organizing maps (Berry & Linoff, 2004).
hierarchical analysis are called drill-down and The association analysis aims at finding fre-
roll-up. Finally information as the fifth attribute quently appearing combinations of data. It can
refers to the allocation of the requested data in a be distinguished into two types. While the static
transparent way. The FASMI-concept integrates association analysis identifies simultaneously
especially the user requirements and delivers an existent combinations, the sequential association
appropriate characterization of OLAP. analysis includes the temporal aspect and discov-
1015
Data Warehouse and Business Intelligence Systems in the Context of E-HRM
ers the successive appearance of data (Agrawal, more importance for the HR management (e.g.,
Imelienski, & Swami, 1993; Agrawal & Srikant, Srinivasa & Saurabh, 2001). In the following an
1995). exemplary application of an HR relevant analysis
using OLAP is depicted.
For the HR management a detailed report on
tHE ADOPtION OF DAtA the number of sick persons for instance might
WArEHOUsE AND bUsINEss be important. The relevant personnel data are
INtELLIGENcE systEMs IN stored in a cube (see Figure 2) containing the
tHE cONtEXt OF E-HrM dimensions division, region, and time, and the
measure number of sick persons. As OLAP is not
Although the use of data warehouse and business limited to three dimensions, further dimensions,
intelligence systems in the context of e-HRM such as line manager, qualification, and so forth,
is rather scarce, usage offers a high potential to are conceivable. According to the depicted char-
support and improve HRM. These systems can be acteristics of OLAP an HR manager can navigate
adopted in all business areas where comprehen- by using different operations; for instance, with
sive, sophisticated, and data intensive analyses the operation slicing it is possible to filter the
are required to support decisions. Therefore, number of sick persons in 2006 for all divisions
their adoption is appropriate for all HR tasks in all regions. The operation dicing enables one
such as recruitment, appraisal, development, and to see the number of sick persons for 2004 and
compensation. 2005 for the finance and production divisions for
Following Figure 1, a data warehouse contain- America and Europe, for example.
ing only personnel relevant data can be referred Furthermore, OLAP supports a hierarchical
to as HR data warehouse. Thereby, the main analysis. In this context it might be of interest to
reason to adopt a data warehouse system in the analyze the number of sick persons of the finance
context of e-HRM is the lack of consistency of division in America in 2006 in more detail. Using
HR information available in existing separate HR drill-down, a detailed report on the number of
information systems and hence the impossibility sick persons for every quarter in 2006 can be
of appropriate analysis and reporting (Van Wessel, generated (see Figure 3). Furthermore drill-down
Riebers, & de Vries, 2006). This inconsistency is is not restricted to one level so HR managers can
caused by a fragmented system-landscape sup- also navigate to months, weeks, and days to receive
porting the HR tasks. HR applications often have more specific information. In return the roll-up
been developed in different functional areas (e.g., operation allows for the analyzing of data on a
payroll, benefits, staffing, time and attendance) or more aggregated level.
geographic regions (e.g., North America, Europe, These examples illustrate the analysis possi-
Asia Pacific). An HR data warehouse allows the bilities of OLAP which can be employed in any
integration of relevant personnel data from the HR task such as recruitment, appraisal, compen-
internal and external HR data sources and enables sation, and development. OLAP is based on the
comprehensive analysis opportunities by employ- user’s ability to survey the data and to navigate
ing business intelligence systems. In consideration correspondently. While a HR data warehouse
of the proceeding outsourcing of HR activities stores HR data and the actual coherences of the
and the loss of personal relationships between data are not always obvious, data mining extends
the employee and the HR department (Lepak & the analysis possibilities to the context of complex,
Snell, 1998), the ability to generate information data-rich situations. Data mining reveals unknown
about the employees out of HR data will gain patterns out of the data which can be used to sup-
1016
Data Warehouse and Business Intelligence Systems in the Context of E-HRM
Figure 2. Illustration of an OLAP cube and examples for slicing and dicing
port HR relevant decisions. In the following ex- automatically by the classification algorithm and
emplary applications of data mining in selected is based on the stored attributes describing an
HR contexts are depicted. applicant. The unknown pattern revealed by data
The data mining function classification can mining consists on the relationship between ap-
be used to support and accelerate the applicant plication data and productivity. This will enable
selection process for example. Using the clas- an automatic preselection of potential employees
sification methods applicants can be allocated to and hence support the HR manager to select em-
predefined classes indicating the productivity of ployees with assumable high productivity. A lot
an employee. The classes’ high, medium, and low of further application possibilities are conceivable
sales premiums might serve as indicators show- such as the analysis of the termination behavior
ing the productivity of an employee, for example of employees. It might be of interest to identify
(Cho & Ngai, 2003). The allocation is performed the employees, who tend to sign off, and develop
1017
Data Warehouse and Business Intelligence Systems in the Context of E-HRM
corresponding retention measures. Based on his- can be compared to the career planning and lead
torical data concerning terminations, classification to adjustments if significant differences appear.
methods provide the possibility to automatically The depiction of the selected possibilities to
classify all employees into the classes of poten- adopt data mining in the context of e-HRM could
tially terminating and nonresigning employees. reveal that the main potentials and benefits depend
This information can be used by the HR depart- on the decision support in complex and data-rich
ment to develop target-oriented retention measures decision situations to enable the creation of more
(Min & Emam, 2003). target-oriented personnel measures.
Segmentation, as a further function of data
mining, generates homogeneous clusters of em-
ployees which can be used, for example, to create FUtUrE trENDs
a personnel portfolio. Hence, the segmentation
reveals additional information about the employ- Considering the growing amount of HR data and
ees concerning their affiliation to a certain cluster. the corresponding necessity to store and analyze
So it might be conceivable to generate clusters these data, the application of data warehouse
based on the attributes qualification, gender, and business intelligence systems enable the HR
age, and position of an employee which leads to management to handle these data and perform
homogeneous clusters of employees concerning comprehensive HR planning and controlling.
the named attributes such as the cluster of the old, These systems will develop standard analytical
high qualified managers and the cluster of the systems in all business areas, as well in the HR
young, high qualified specialists. Based on this area. In this article some application possibilities
information the development of cluster-specific and their benefits were introduced, nevertheless
training measures, for instance, is possible. research is necessary to systematically evaluate
Finally, the association function can deliver the application of these systems in the context
useful information for the HR department. The of e-HRM. Research should cover recruitment,
association analysis reveals frequently appearing compensation, appraisal, and development as
combinations of data. Based on the personnel data core tasks of HRM and develop reference data
stored in a HR data warehouse the association models and application scenarios to improve the
analysis might reveal, for example, frequently decision-making process of HR managers. These
appearing combinations of a particular merit- systems are very complex and cost-intensive,
appraisal and a certain supervisor. This information hence their implementation and employment do
can be used for further examinations concerning not automatically lead to benefits for the HRM.
the bias of this supervisor. Furthermore, the in- Reference data models and application scenarios
tegration of the temporal aspect into the analysis facilitate the use of these systems and enable the
can be reached by applying the sequential asso- exhaustion of the potential benefits introduced
ciation analysis. So it might be of interest to the in this article.
HR manager to reveal which successive steps are
actually necessary to reach a certain position in
the company. The result of the sequential analysis cONcLUsION
is a frequently used career path to reach this po-
sition (e.g., the employee attends a management New technologies such as data warehouse and
seminar then receives a high merit-rating, then business intelligence systems enable consolidated
works in a foreign country, and finally gets the storage and innovative analysis of personnel
promotion). These revealed existing career paths data. In this article the technical and functional
1018
Data Warehouse and Business Intelligence Systems in the Context of E-HRM
aspects of data warehouse and business intel- Cho, V., & Ngai, E. (2003). Data mining for
ligence systems were introduced. Based on the selection of insurance sales agents. Expert Sys-
general functionalities of these systems their tems: International Journal of Knowledge Engi-
application and possible benefits in the context neering and Neural Networks, 20(3), 123–132.
of e-HRM were depicted. It could be shown that doi:10.1111/1468-0394.00235
both systems are applicable in e-HRM. The HR
Codd, E.-F., Codd, S.-B., & Salley, C.-T. (1993).
data warehouse system serves as an integrated data
Providing OLAP to user analysts: An IT-mandate.
storage which contains relevant personnel data
White paper Codd associates. Retrieved Septem-
from multiple widespread HR-applications exist-
ber 6, 2006, from http://www.dev.hyperion.com/
ing in a company. The analysis methods provided
resource_library/white_papers/providing_olap_
by the business intelligence system extend the
to_user_ analysts.pdf
customarily applied methods of HR planning and
controlling. Thereby OLAP allows the interactive Fayyad, U. M., Piatetsky-Shapiro, G., & Smyth, P.
multidimensional analysis of personnel data and (1996). From data mining to knowledge discovery:
data mining reveals hidden coherences in the data an overview. In U. Fayyad, G. Piatetsky-Shapiro,
which can be used to optimize decision-making P. Smyth, & R. Uthurusamy (Eds.), Advances in
processes of HR managers. knowledge discovery and data mining (pp. 1-34).
Camebridge MA: The MIT Press.
Humphries, M., Hawkins, M., & Dy, M. (1999).
rEFErENcEs
Data warehousing: Architecture and implementa-
Agrawal, R., Imelienski, T., & Swami, A. (1993). tion. Upper Saddle River, NJ: Prentice Hall.
Mining association rules between sets of items in Inmon, W.-H. (2005). Building the data ware-
large databases. In P. Buneman & S. Jajodia (Eds.), house. Indianapolis: Wiley Publishing.
Proceedings of the ACM SIGMOD Conference on
Management of Data (pp. 207-216). Washington, Kovach, K., Hughes, A., Fagan, P., & Maggitti, P.
D.C.: ACM Press. (2002). Administrative and strategic advantages
of HRIS. Employment Relations Today, 29(2),
Agrawal, R., & Srikant, R. (1995). Mining se- 43–48. doi:10.1002/ert.10039
quential patterns. In P. S. Yu & A. Chen (Eds.),
Proceedings of the International Conference on Lepak, D., & Snell, S. A. (1998). Virtual HR: Stra-
Very Large Data Bases (VLDB) (pp. 3-14). Taipei, tegic human resource management in the 21st cen-
Taiwan: IEEE Computer Society. tury. Human Resource Management Review, 8(3),
215–234. doi:10.1016/S1053-4822(98)90003-1
Ashbaugh, S., & Miranda, R. (2002). Technology
for human resources management: Seven ques- Lin, B., & Stasinskaya, V. (2002). Data ware-
tions and answers. Public Personnel Management, housing management issues in online recruiting.
31(1), 7–20. Human Systems Management, 21(1), 1–8.
Berry, M., & Linoff, G. S. (2004). Data mining Marks, W., & Frolick, M. (2001). Building cus-
techniques for marketing, sales and customer tomer data warehouses for a marketing and service
relationship. Indianapolis: Wiley. environment: A case-study. Information Systems
Management, 18(3), 51–56. doi:10.1201/1078/4
3196.18.3.20010601/31290.7
1019
Data Warehouse and Business Intelligence Systems in the Context of E-HRM
Min, H., & Emam, A. (2003). Developing the KEy tErMs AND DEFINItIONs
profiles of truck drivers for their successful re-
cruitment and retention: A data mining approach. Business Intelligence System: Subsumes dif-
International Journal of Physical Distribution ferent technologies and methods such as OLAP
& Logistics Management, 33(2), 149–162. and data mining to analyze the data stored in a
doi:10.1108/09600030310469153 data warehouse.
Data Mining: Subsumes a variety of methods
Pendse, N., & Creeth, R. (1995). The OLAP report. to extract unknown patterns out of a large amount
Retrieved September 6, 2006, from http://www. of data. Data mining methods originate from the
olapreport.com area of machine learning, statistics, and artificial
Srinivasa, R., & Saurabh, S. (2001). Business intelligence. The main tasks of data mining are
intelligence and logistics (white paper). Retrieved classification, segmentation, and association
September 18, 2006, from http://www.dmreview. analysis.
com/whitepaper/wid328.pdf Data Warehouse: A subject-oriented, inte-
grated, time-variant, and nonvolatile collection
Turban, E., Aronson, J., & Liang, P. (2005). Deci- of data. The data are usually stored in multidi-
sion support systems and intelligent systems (7th mensional cubes, an optimized way to provide
ed.). Saddle River, NJ: Prentice Hall. data for analyze purposes.
Van Wessel, R., Ribbers, P., & de Vries, H. (2006). Data Warehouse System: Consists of several
Effects on IS standardization on business process components. The core component is a data ware-
performance: A case in HR IS company standard- house as a database and further components are
ization. In R. H. Spraque (Ed.), Proceedings on the ETL-system, administration system, archiving
39th Hawaii International Conference on System system, and metadata repository.
Sciences. Los Alamitos, CA: IEEE Computer HR Data Warehouse: A specific data ware-
Society Press. house for HR data. The company’s HR relevant
data is collected, integrated, and stored with the
Watson, H. J., Annino, D. A., Wixom, B. H., aim of producing accurate and timely HR manage-
Avery, K. L., & Rutherford, M. (2001). Current ment information and supporting data analysis.
practices in data warehousing. Information Sys- OLAP Operations: To analyze the data in
tems Management, 18(1), 47–56. doi:10.1201/1 OLAP cubes navigation and hierarchical analysis
078/43194.18.1.20010101/31264.6 are differentiated. Navigation operations are, for
Watson, H.-J., Wixom, B. H., Hoffer, J. A., An- instance, slicing and dicing. Roll-up and drill-
derson-Lehman, R., & Reynolds, A. M. (2006). down support the hierarchical analysis. Thereby,
Real-time business intelligence: Best practices at the roll-up operation allows for analyzing data
continental airlines. Information Systems Manage- on a more aggregated level and drill-down is the
ment, 23(1), 7–18. doi:10.1201/1078.10580530/ reverse operation.
45769.23.1.20061201/91768.2 Online Analytical Processing (OLAP): Re-
fers to the possibilities to consolidate, view, and
analyze data according to multiple dimensions.
The fast analysis of shared multidimensional in-
formation (FASMI) concept characterizes OLAP
by means of five attributes.
This work was previously published in Encyclopedia of Human Resources Information Systems: Challenges in e-HRM,
edited by Teresa Torres-Coronas and Mario Arias-Oliva, pp. 223-229, copyright 2009 by Information Science Reference
(an imprint of IGI Global).
1020
1021
Chapter 4.9
Implementation of ERP in
Human Resource Management
Zhang Li
Harbin Institute of Technology, China
Wang Dan
Harbin Institute of Technology, China
Chang Lei
Harbin Institute of Technology, China
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Implementation of ERP in Human Resource Management
functions (Davenport, 1998) (see Figure 1). But the suggests emerging research opportunities within
early development stage of ERP in enterprises was the domain of the topic.
all along with the center of production and sales
course. Until recently, research has empirically
supported the positive relationship between cor- bAcKGrOUND
porate financial performance and HRM function,
and managers have also realized that HRM can ERP, a term coined by the Gartner Group, is not
deliver organizational excellence and competitive simply a tool that provides singular outputs, but
advantage for enterprises (Boudreau & Ramstad, rather an infrastructure that supports the capa-
1997; Huselid, 1995; Wright, McMahan, Snell, bilities of all other IT-based tools and processes
& Gerhart, 2001). The HRM module was intro- utilized by a firm (Enslow, 1996). Shang and Sed-
duced into ERP, forming a highly integrated and don (2000) classified the different types of ERP
efficient resource system with the other function benefits as: IT infrastructure benefits, operational
modules of ERP. However, there are still many benefits, managerial benefits, strategic benefits,
HRM-related problems that may result in the and organizational benefits. Palaniswamy (2002)
failure of ERP projects arising. So, there have pointed out that the failures of ERP projects were
been regular appeals to scholars for more research not because the software were coded incorrectly,
about the implementation of ERP systems in the rather the companies failed to understand the real
HRM perspective in the last few years (Barrett organizational needs and systems required to solve
& Mayson, 2006). their problems to improve performance. Lynne,
This article introduces the functions of an HRM Axline, Petrie, and Cornelis (2000) analyzed the
module in ERP systems from the fields of human adopters’ problems with ERP including project
resource planning, recruitment management, phase problems, problems with product and
training management, time management, perfor- implementation consultants, shakedown phase
mance management, compensation management, problems, underestimating data quality problems
and business trip arrangement. Then it analyzes and reporting needs, and so on.
five HRM-related problems that may block the Within the managerial literatures, a coherent
enterprises from implementing ERP successfully, approach provides a conceptual basis for as-
and it provides reasonable recommendations. serting that human resource is a key source of
Finally, the article discusses future trends and competitive advantages, since it offers a unique
contribution to value creation, rarity, imperfect
imitability, and non-substitutability of a firm’s
Figure 1. Function modules of an ERP system
strategic resources (Bellini & Canonico, 2007).
Stone (2007) considered the past, present, and
future of HRM theory and research. He concluded
that HRM theory and research has considerable
potential to enhance organizational efficiency
and effectiveness. Ashbaugh and Rowan (2002)
summarized the technology features of a modern
HRM system (see Table 1).
In addition, some scholars have already studied
the relationship or connection of ERP implemen-
tation with HRM. For instance, Ashbaugh and
Rowan (2002) argued that the major difference
1022
Implementation of ERP in Human Resource Management
between ERP and its predecessors (e.g., MRP II) Based on the requirements of enterprises, manag-
is the linkage of financial and HRM applications ers can use the HRM module of an ERP system to
through a single database in a software application establish human resource planning conveniently.
that is both rigid and flexible. Wright and Wright The ERP system assists the decision making of
(2002) listed two of the most-cited HRM risks in managers by simulating the performance of hu-
an ERP system: lack of user involvement and inad- man resource planning and comparing the data.
equate training. Hsu, Sylvestre, and Sayed (2006) Additionally, the ERP system is also able to analyze
supplied another often-overlooked HRM factor or forecast the human resource planning costs by
when implementing an ERP system—that is, the integrating relevant information.
result of high stress levels on the staff, particularly
in the finance or accounting departments, which Recruitment Management
are already under stress from the heavy workload
in a legacy system. Li (2001) studied the HRM Recruitment should be taken as a significant
function module in an ERP system. He insisted investment because human resources are the
that the practical HRM system should be built up foundational assets of an enterprise. To keep
to improve incentive mechanism and to strengthen advantages in competition, the human resources
the training of employees while applying ERP. department must have a reasonable recruitment
system to select talents for enterprise. The ERP
system can support recruitment management in
IMPLEMENtAtION OF ErP three ways. First, it optimizes the recruitment
rELAtED tO HrM process to reduce the workload. Second, it offers
scientific management to recruitment costs. Third,
Functions of the HrM it provides useful information for the decision
Module in ErP system making on recruitment management.
1023
Implementation of ERP in Human Resource Management
1024
Implementation of ERP in Human Resource Management
1025
Implementation of ERP in Human Resource Management
1026
Implementation of ERP in Human Resource Management
with the human resource department electronically Ashbaugh, S., & Rowan, M. (2002). Technology
through the human resource portal (Lai, 2006). for human resources management: Seven ques-
The basic expectations are that using e-HRM will tions and answers. Public Personnel Management,
decrease costs, will improve the human resource 31(1), 7–20.
service level, and will give the human resource
Barrett, R., & Mayson, S. (2006). Exploring the
department space to become a strategic partner
intersection of HRM and entrepreneurship: Guest
(Rual, Bondarouk, & Velde, 2007).
editors’ introduction to the special edition on HRM
When we combine the ERP II concept with
and entrepreneurship. Human Resource Manage-
e-HRM technology, we find a valuable issue to
ment Review, 16(4), 443–446. doi:10.1016/j.
study—that is, the research about the implemen-
hrmr.2006.08.001
tation of ERP II based on e-HRM. Additionally,
we can also study other details of this issue ac- Bellini, E., & Canonico, P. (2007). Knowing com-
cording to different countries, cultures, industries, munities in project driven organizations: Analys-
and so forth. ing the strategic impact of socially constructed
HRM practices. International Journal of Project
Management, (September): 29.
cONcLUsION
Boudreau, J. W., & Ramstad, P. M. (1997).
Measuring intellectual capital: Learning from
As IT continues to development, there will be
financial history. Human Resource Manage-
more and more enterprises adopting ERP systems.
ment, 36, 343–356. doi:10.1002/(SICI)1099-
ERP can extend the traditional functions of HRM
050X(199723)36:3<343::AID-HRM6>3.0.CO;2-
greatly and also heighten the importance of HRM
W
in enterprises. Enterprises that implement ERP
must perfect the functions of HRM to raise the Bowen, D. E., & Ostroff, C. (2004). Understand-
success rate, so to enhance the whole management ing HRM-firm performance linkages: The role
level of enterprises. A poignant hope is that this of the strength of the HRM system. Academy of
article will be helpful to both scholars and practi- Management Review, 29, 203–221.
tioners who wish to improve the current situation
Classe, A. (2001). Business-collaborative com-
of ERP implementation.
merce—the emperor’s new package. Accountancy,
(November).
rEFErENcEs Davenport, T. H. (1998). Putting the enterprise into
the enterprise system. Harvard Business Review,
Ahmad, S., & Schroeder, R. G. (2003). The im- (July-August): 121–131.
pact of human resource management practices on
operational performance: Recognizing country Drucker, F. P. (1999). Management challenges
and industry differences. Journal of Operations for the 21st century (p. 97). New York: Harper-
Management, 21, 19–43. doi:10.1016/S0272- Collins.
6963(02)00056-6 Edwards, J. (1999). Three-tier client—server at
Al-Marshari, M. (2002). Enterprise resource plan- work. New York: John Wiley & Sons.
ning (ERP) systems: A research agenda. Industrial Enslow, B. (1996). Which comes first: ERP or
Management & Data Systems, 102(3), 165–170. supply chain planning projects? Gartner Group
doi:10.1108/02635570210421354 Best Practices and Case Studies.
1027
Implementation of ERP in Human Resource Management
Hsu, K., Sylvestre, J., & Sayed, E. N. (2006). Pasmore, W.A., & Mlot, S. (1994). Developing self-
Avoiding ERP pitfalls. Journal of Corporate managing work teams: An approach to successful
Accounting & Finance, (May-June): 67–74. integration. Compensation and Benefits Review,
doi:10.1002/jcaf.20217 26(4), 15–23. doi:10.1177/088636879402600403
Huselid, M. A. (1995). The impact of human Payne, W. (2002). The time for ERP? Work Study,
resource management practices on turnover, 51(2), 91–93. doi:10.1108/00438020210418827
productivity, and corporate financial performance.
Pfeffer, J. (1995). Producing sustainable competi-
Academy of Management Journal, 38, 635–672.
tive advantage through the effective management
doi:10.2307/256741
of people. The Academy of Management Execu-
Koch, C. (2002). The ABCs of ERP. CIO Maga- tive, 9, 55–69.
zine, (February).
Rual, J. M. H., Bondarouk, V. T., & Velde, M.
Kumar, K., & Hillegersberg, J. V. (2000). ERP (2007). The contribution of e-HRM to HRM
experiences and evolution. Communications of the effectiveness: Results from a quantitative study
ACM, 43(4), 24–26. doi:10.1145/332051.332063 in A Dutch ministry. Employee Relations, 29(3),
280–291. doi:10.1108/01425450710741757
Lai, W. H. (2006). Implementing e-HRM:
The readiness of small and medium sized Schonberger, R. J. (1994). Human resource
manufacturing companies in Malaysia. Asia management lessons from a decade of total qual-
Pacific Business Review, 12(4), 465–485. ity management and re-engineering. California
doi:10.1080/13602380600570874 Management Review, 36(4), 109–123.
Li, Y. F. (2001). Thoughts about the ERP human Shang, S., & Seddon, P. B. (2000). A comprehen-
resource management. Journal of Yunnan Uni- sive framework for classifying the benefits of ERP
versity of Finance and Economic, 17(10), 12–16. systems. Proceedings of the 6th Americas Confer-
ence on Information Systems (pp. 1005-1014).
Lynne, M. M., Axline, S., Petrie, D., & Cornelis,
T. (2000). Learning from adopters’ experiences Siau, K. (2004). Enterprise resource planning
with ERP: Problems encountered and success (ERP) implementation methodologies. Journal
achieved. Journal of Information Technology, of Database Management, 15(1), 1–4.
15, 245–265. doi:10.1080/02683960010008944
Stone, D. L. (2007). The status of theory and
Moller, C. (2003). ERP II—next-generation ex- research in human resource management: Where
tended enterprise resource planning. Proceedings have we been and where should we go from here?
of the 7th World Multi-Conference on Systemics, Human Resource Management Review, 17(2),
Cybernetics and Informatics. 93–95. doi:10.1016/j.hrmr.2007.04.005
Nilakant, V. (1994). Transdisciplinary approach to Sun, X., & Xu, W. (2006). Research on ERP and
a theory of performance in organizations. Human enterprise’s human resources informatization.
Systems Management, 13(1), 41–48. Science Technology Information Development &
Economy, 16(7), 229–230.
Palaniswamy, R. (2002). An innovation-diffusion
view of implementation of enterprise resource
planning (ERP) systems and development of a
research model. Information & Management, 40,
87–114. doi:10.1016/S0378-7206(01)00135-5
1028
Implementation of ERP in Human Resource Management
Wright, P. M., McMahan, G. C., Snell, S. A., the computer systems of different areas of the
& Gerhart, B. (2001). Comparing line and HR business—production, sales, marketing, finance,
executives’ perceptions of HR effectiveness: Ser- human resources, and so forth—and run them off
vices, roles, and contributions. Human Resource a single database. Also defined as an application
Management, 40, 111–123. doi:10.1002/hrm.1002 and deployment strategy to integrate all things
enterprise-centric.
Wright, S., & Wright, A. (2002). Information
Human Resource: The people that staff and
system assurance for enterprise resource planning
operate an organization.
systems: Unique risk considerations. Journal of
Human Resource Management (HRM):
Information Systems, 16, 99–113. doi:10.2308/
The function within an organization that focuses
jis.2002.16.s-1.99
on recruitment of, management of, and provid-
Yang, J.Y., & Zhao, X.W. (2003). Research on ing direction for the people who work in the
HRM in ERP system. Journal of Beijing Institute organization.
of Technology, (August), 73-77. Information Technology (IT): The collection
of technologies that deal specifically with process-
ing, storing, and communicating information, in-
cluding all types of computer and communications
KEy tErMs AND DEFINItIONs
systems as well as reprographics methodologies.
Manufacturing Resource Planning (MRP
Electronic Human Resource Management
II): A method for the effective planning of all
(e-HRM): The planning, implementation, and
resources of a manufacturing company, includ-
application of information technology for both
ing functions of business planning, production
networking and supporting at least two individual
planning and scheduling, capacity requirement
or collective actors in their shared performing of
planning, job costing, financial management,
HR activities.
forecasting, and so forth.
Enterprise Resource Planning (ERP): An
approach to the provision of business support
software that enables companies to combine
This work was previously published in Encyclopedia of Information Science and Technology, Second Edition, edited by Mehdi
Khosrow-Pour, pp. 1856-1862, copyright 2009 by Information Science Reference (an imprint of IGI Global).
1029
1030
Chapter 4.10
A Study of Information
Requirement Determination
Process of an Executive
Information System
Chad Lin
Curtin University of Technology, Australia
Koong Lin
Tainan National University of the Arts, Taiwan
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Study of Information Requirement Determination Process of an Executive Information System
respect to IRD and EIS. Key findings and issues or inaccurate requirement specifications, lack of
identified from the case study are also presented. user involvement, lack of flexibility of computer-
The chapter examines these findings and issues based information systems, poor communication,
in light of these organizations’ IRD practices, different worldviews of the systems analysts, and
and concludes by providing some lessons for EIS other factors (Guinan, Cooprider, & Faraj, 1998;
project implementation. Kirsch & Haney, 2006). Each of these will be
discussed briefly in the subsections that follow.
1031
A Study of Information Requirement Determination Process of an Executive Information System
1032
A Study of Information Requirement Determination Process of an Executive Information System
1033
A Study of Information Requirement Determination Process of an Executive Information System
theme 1: Problems in the users. The users felt that their ability to participate
Using IrD Methodology in the IRD process could be enhanced by having
such a group session.
The interview data suggest that there was a gen- Instead, the IRD process for this EIS project
eral agreement among the users that no ISD/IRD was, as perceived by the users, merely a question-
methodology, tool, or problem-solving methodol- and-answer exercise. Although the users were
ogy had been used by the external systems analyst given the opportunity to raise any questions and
during the IRD process with users for the EIS concerns about the existing systems as well as the
project. Instead, only an interview was carried forthcoming EIS, the problem was that there was
out by the external systems analyst to gather the no prior information given to the users before the
required information from the users. For example, IRD sessions. The users felt that they were not
one user said, “It felt very much like questions to given any time and information to prepare for the
which I was responding because it’s an interview meetings with the systems analyst. The problem
like that....I didn’t feel that I was settling into was compounded by the lack of follow-up by
something that I was participating in. So it’s very the systems analyst. The users did not take part
much like a question and answer.” The user had in the rest of the EIS project and were critical of
expected some sort of methodology to be used the project sponsors and the systems analyst for
by the systems analyst during the IRD sessions. not consulting them about the project. The re-
The researchers’ observation had supported their searchers were told privately by one of the project
claims. Some of the users suggested that the use sponsors that the systems analyst was instructed
of a proven methodology and diagram would be not to involve the users further in other phases
valuable for the IRD process. of the project. The project sponsors were getting
However, the sponsors and systems analyst impatient with some of their users regarding their
claimed that some sort of methodologies had been information requirements.
used during the IRD sessions, although this had
not been observed by the researchers. For example, theme 3: Lack of User satisfaction
the systems analyst said, “I worked loosely to
various methodologies, sort of used in the past, Most users were unhappy with the IRD process
in particular, Arthur Andersen’s Method One and of this EIS project and were not impressed by
APT. But they tended to direct more on experience the performance of the project sponsors and, in
and referencing the documents.” Furthermore, particular, the systems analyst. For example, one
the systems analyst went as far as saying that the user was very critical of the project sponsors and
use of diagrams such as DFDs and ERDs would the systems analyst and said, “I think what they
confuse the users. Most of the users interviewed need to do is to give the user an understanding of
by the researchers had rejected this claim. what they have envisaged the EIS system should
be able to do and where it fits….Also, they should
theme 2: Lack of User Involvement articulate in a way that someone who is not a
systems person can understand.” None of the
All users indicated that their contributions to the users were given enough information and time
IRD sessions had been hampered by the lack of to prepare for the IRD process. For example, one
information. In addition, rather than having several user complained and said, “If people are going
IRD sessions with the systems analyst, most users to be involved [in the IRD process], they need to
suggested that a group session would be far more know why...” The problem had been compounded
effective as it tended to create synergy among the by the instruction by the project sponsors not to
1034
A Study of Information Requirement Determination Process of an Executive Information System
spend too much time listening to the requirements past records, chances are we will. And when that
of the users, and also the fact that the scope of the happens, everyone will pass the buck. The MIS
project was unclear. type of people will say, ‘but I’ve fulfilled what
you have told us.’” All users felt that this had
theme 4: Lack of Project scope been repeated to some extent in this EIS project. A
good example of this was the lack of information
Both users and the systems analyst complained given to the users by the systems analyst before
about the lack of scope and information for this the IRD session.
EIS project. Some of the ideas put forward by the The EIS project had also appeared to be plagued
users included the following: (a) A group session with politics. Many users interviewed were un-
should be deployed to elicit users’ requirements happy with the way that the project sponsor had
and needs, (b) more research should be conducted been given a significant role in this EIS project.
by the systems analyst before the IRD process, On the other hand, the project sponsors also re-
and (c) more information about the purpose of vealed that they were getting impatient with some
the visits by the systems analyst should be given of the users within the organization. The project
beforehand. sponsors had admitted to the researchers that they
As mentioned previously, the reason for not did not get along with some of the users. To make
giving the proper information to the users before the matter worse, the systems analyst also agreed
the meetings could be due to the fact that the with the view expressed by some of the users that
instruction given by the project sponsors to the this EIS project was likely to fail as a result of
systems analyst was to finish the IRD phase as the prevailing culture and politics existing within
soon as possible. For example, the systems analyst the organization. Both the systems analyst and the
said, “Problems that I had with this particular case users had seen many ISD project failures before,
is not being so much with gathering of informa- both within and outside the organization.
tion requirements from users....The problem I had Overall, most of the key issues identified from
with IRD is perhaps, not being able to maintain a this study are largely consistent with the literature.
limited scope.” The systems analyst was having However, the research has further identified that
difficulty in maintaining a limited scope of the lack of user satisfaction and the organizational
EIS project and hence was not able to tell the us- culture and politics also have a major impact on
ers exactly what the project was going to be like. the success of the implementation of EIS projects.
1035
A Study of Information Requirement Determination Process of an Executive Information System
to align business operations with the tactical and ments for the EIS, the lack of user involvement,
strategic goals of the organization. In addition, and user dissatisfaction. It was also surprising to
BI encompasses software for extraction, trans- hear from the systems analyst himself and most
formation, and loading (ETL); data warehousing; users that they were not very optimistic that this
multidimensional or online analytical processing EIS project would succeed due to a long history
(OLAP); data analysis; and data mining. How- of ISD project failures within the organization.
ever, there are still some challenges to overcome A contribution of this short article is that it has
before BI can be used and implemented more further identified that a lack of user satisfaction
widely. These include recognizing BI projects as and issues regarding the organizational culture
cross-organizational business initiatives, engaging and politics have a major impact on the success
business sponsors, and developing an automated of the implementation of EIS projects.
Web intelligence system to extract actionable orga-
nizational knowledge by leveraging Web content.
rEFErENcEs
1036
A Study of Information Requirement Determination Process of an Executive Information System
Douglas, H. (2003). A user-oriented model of Lauesen, S., & Vinter, O. (2001). Preventing
factors that affect information requirements deter- requirement defects: An experiment in process
mination process quality. Information Resources improvement. Requirements Engineering, 6(1),
Management Journal, 16(4), 15–32. 37–50. doi:10.1007/PL00010355
Duggan, E. W., & Thachenkary, C. S. (2004). Miles, M. B., & Huberman, A. M. (1994). Qualita-
Supporting the JAD facilitator with the nominal tive data analysis: An expanded sourcebook. CA:
group technique. Journal of Organizational and Sage Publications.
End User Computing, 16(2), 1–19.
Poon, P. P., & Wagner, C. (2001). Critical success
Eisenhardt, K. M. (1989). Building theories from factors revisited: Success and failure cases of
case study research. Academy of Management information systems for senior executives. Deci-
Review, 14(4), 532–550. doi:10.2307/258557 sion Support Systems, 30, 173–418. doi:10.1016/
S0167-9236(00)00069-5
Guinan, P. J., Cooprider, J. G., & Faraj, S. (1998).
Enabling software development team performance Robertson, S., & Robertson, J. (1999). Master-
during requirements definition: A behavioral ing the requirements process. Harlow, England:
versus technical approach. Information Systems ACM Press.
Research, 9(2), 101–125. doi:10.1287/isre.9.2.101
Salmeron, J. L. (2002). EIS evolution in large
Havelka, D. (2002). Requirements determination: Spanish business. Information & Management,
An information systems specialist perspective of 40, 41–50. doi:10.1016/S0378-7206(01)00130-6
process quality. Requirements Engineering, 6(4),
Spina, M. J., & Rolando, J. A. (2002). JAD on
220–236. doi:10.1007/PL00010361
a shoestring budget: CrossTalk. The Journal of
Havelka, D., Sutton, S. G., & Arnold, V. (2001). Defense Software Engineering, 15(7), 26–28.
Information systems quality assurance: The effect
Sutcliffe, A. G. (2000). Requirements analysis
of users’ experiences on quality factor percep-
for socio-technical system design. Information
tions. Review of Business Information Systems,
Systems, 25(3), 213–233. doi:10.1016/S0306-
5(2), 49–62.
4379(00)00016-8
Khalil, O. E. M. (2005). EIS information: Use
Urquhart, C. (2001). Analysts and clients in orga-
and quality determination. Information Resources
nizational context: A conversational perspective.
Management Journal, 18(2), 68–93.
The Journal of Strategic Information Systems, 10,
Kirsch, L. J., & Haney, M. H. (2006). Requirements 243–262. doi:10.1016/S0963-8687(01)00046-4
determination for common systems: Turning a
Walter, B. A., Jiang, J. J., & Klein, G. (2003). Stra-
global vision into a local reality. The Journal
tegic information and strategic decision making:
of Strategic Information Systems, 15, 79–104.
The EIS/CEO interface in smaller manufactur-
doi:10.1016/j.jsis.2005.08.002
ing companies. Information & Management, 40,
Klein, H. K., & Myers, M. D. (1999). A set of 487–495. doi:10.1016/S0378-7206(02)00063-0
principles for conducting and evaluating inter-
Wu, I., & Shen, Y. (2006). A model for explor-
pretive field studies in information systems. MIS
ing the impact of purchasing strategies on user
Quarterly, 23(1), 67–94. doi:10.2307/249410
requirements determination of e-SRM. Informa-
tion & Management, 43, 411–422. doi:10.1016/j.
im.2004.11.004
1037
A Study of Information Requirement Determination Process of an Executive Information System
Wu, J. (2000, February 10). Business intelligence: Executive Information System (EIS): It
What is business intelligence? DM Review, 1-2. provides organizations with a powerful yet simple
tool to view and analyze key factors and perfor-
mance trends in the areas of sales, purchasing,
production, finance, and so forth.
KEy tErMs AND DEFINItIONs
Information Requirements Determination
Business Intelligence (BI): It is the process (IRD): It is a set of activities used by a systems
of monitoring and analyzing business transaction analyst when assessing the functionality required
processes to ensure that they are optimized to meet in a proposed system.
the business goals of the organization. Joint Application Development (JAD): It
Data Mining: It is an information extraction is a process originally developed for designing
activity whose goal is to search large volumes a computer-based system. It brings together
of data for patterns and discover hidden facts business users and IT professionals in a highly
contained in databases. focused workshop.
Data Warehouse: It is a relational database Rapid Application Development (RAD): It
that is designed for query and analysis, and usu- is a methodology for compressing the analysis,
ally contains historical data that are derived from design, build, and test phases into a series of short,
transaction data. iterative development cycles.
This work was previously published in Encyclopedia of Decision Making and Decision Support Technologies, edited
by Frederic Adam and Patrick Humphreys, pp. 807-813, copyright 2008 by Information Science Reference (an imprint
of IGI Global).
1038
1039
Chapter 4.11
Towards Identifying the
Most Important Attributes
of ERP Implementations
Piotr Soja
Cracow University of Economics, Poland
Dariusz Put
Cracow University of Economics, Poland
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Towards Identifying the Most Important Attributes of ERP Implementations
1040
Towards Identifying the Most Important Attributes of ERP Implementations
The goal of this paper is an attempt to dis- eral parties participating in ES adoption: vendors,
cover the most desired attributes of a model ERP consultants and IS/IT managers. They should pay
implementation project. The article is based on attention to improve not only the quality of ERP
research conducted among a few dozen companies products, but also user’s knowledge and involve-
introducing an ERP system into their organisations ment. They should also be aware of the importance
in Poland. In order to achieve the paper’s goal, of choosing suitable consultants and suppliers
the statistical methods of element grouping were (Wu & Wang, 2007). Furthermore, emphasizing
employed, which allowed us to extract the groups the role of knowledge transfer, McGinnis and
of homogenous projects that were then ordered on Huang (2007) introduced the idea of constituting
the basis of the measure of achieved success. This a knowledge-sharing community which may play
procedure allowed us to distinguish the projects the crucial role of a platform that can be used to
having the most desirable characteristics, as well provide a common frame of reference to all ERP
as those with the least desirable attributes. activities. The authors also highlight the concept
that the actual implementation does not finish the
whole adoption endeavour, which should be still
LItErAtUrE rEVIEW monitored and handled after the system rollout.
The quality of the actual implementation process
The idea of discovering issues determining the influences the course of the post-implementation
success of enterprise system (ES) implementation phase. In particular, Nicolaou (2004) suggests five
projects attracted the attention of a considerable critical dimensions which affect the whole adop-
number of researchers. There are a great many tion project, including the post-implementation
research approaches which investigate numer- stage. These issues relate to the review of overall
ous issues and employ various understandings project scope and planning, the review of driving
of project success. The works differ in various principles for project development, the effective-
aspects, i.e. the employed methodologies and ness of misfit resolution strategies, the evaluation
chosen variables. Some scholars examine the of attained benefits, and the evaluation of learning.
actual implementation process, others focus on the The enterprise system adoption projects differ
post-implementation phase, there are also those greatly as regards the scope of the implementa-
who treat ES adoption as a continuous endeavour tion. In general, the most complicated full-scope
without a clearly defined end point. The inves- and highly-integrated enterprise system adoption
tigated issues vary from technological, through projects are perceived as more likely to bring
organisational to those connected with people, the best benefits for the company. This issue is
and from operational to strategic considerations. illustrated by Ranganathan and Brown (2006),
The following section summarises major find- who conclude that a company’s announcement of
ings achieved by prior research connected with ERP adoption positively influences stock market
the attributes and characteristics of successful ES returns. The authors suggest that the greater the
adoption projects. project’s scope (in terms of number of locations
Among many issues analysed by research- and the extent of introduced functionality) the
ers, knowledge seems to play a paramount role stronger the influence.
in enterprise system adoption. In particular, the Researchers highlight the need for identify-
researchers emphasize the need of adequate ing adequate characteristics of enterprise system
knowledge transfer from external consultants in order to achieve its successful adoption. The
to clients in an adopting organisation (Ko et al., enumerated features which appear to be the most
2005). This process should be dealt with by sev- important encompass system quality (Kositanurit
1041
Towards Identifying the Most Important Attributes of ERP Implementations
et al., 2006) together with other quality dimen- process improvement and ought to have dual
sions related to information and service (Chien focus: operational and strategic. The authors
& Tsaur, 2007), and perceived usefulness of the demonstrate that firms which had only opera-
system (Amoako-Gyampah, 2007). In particular, tional focus achieved lower performance than
on the basis of research conducted among 571 those having dual or strategic focus. In short,
respondents and employing Technology Accep- the discussion above illustrates that enterprise
tance Model, Amoako-Gyampah (2007) suggests system adoption should be first and foremost an
that users’ intention to use an ERP might depend organisational and business project. It should be
more on how useful they perceived the system treated as a business-led endeavour, in contrast to
than on their level of involvement or how easy it an IT related initiative (e.g., Law & Ngai, 2007;
will be to use the system. Furthermore, the author Nicolaou, 2004; Tinham, 2006).
advocates that perceived usefulness influences The ES adoption project needs constant
the users’ involvement and beliefs concerning monitoring as regards employed resources, both
the necessity of changes. However, on the other internal and external. As far as internal resources
hand, Amoako-Gyampah points out the role of are considered, Peslak (2006), on the basis of the
legacy systems and related people’s habits and opinions of over 200 top financial executives,
expertise, which may negatively influence their advocates that cost and time were found to be
attitudes towards ERP. major determinants of project success and should
Identifying the desired features of the enterprise be carefully measured and monitored. Further,
system is a necessary condition for successful the author also points out that the use of external
adoption. However, equally important is the ap- consultants for implementation should be carefully
propriate implementation process, during which controlled since it was found to adversely impact
one of the most crucial issues is to achieve an cost performance.
alignment between the system’s capabilities and The enterprise system adoption projects form
the company’s needs. Sharma and Vyas (2007) a very diverse group differing in several aspects.
emphasize this issue by talking about the synergy This issue is discussed by Stensrud and Myrtveit
between technology and management, which is (2003), who examined 30 ERP projects using
advocated as an important element influencing Data Envelopment Analysis Variable Returns to
the success of ERP adoption. Scale (DEA VRS) to measure the productivity of
Enterprise system adoption is inevitably con- software projects and employed the method to
nected with some extent of organisational changes identify outstanding projects of ERP systems that
which are carried out in the adopting company. may serve as role models. As a result, they suggest
The more radical approach to organisational that the average efficiency among investigated
changes is called business process reengineering projects is approximately 50%. Furthermore,
(BPR), while the less radical method bears the the authors notice that there were significant
name of business process improvement (BPI) differences in productivity between projects in
(Law & Ngai, 2007). Schniederjans and Kim various industries. Therefore, one should exhibit
(2003), on the basis of a survey conducted among caution when benchmarking and comparing proj-
115 US electronic manufacturing firms, advocate ects across industries. The authors suggest that
that business process change should precede the performance assessments should include both
enterprise system implementation. Furthermore, productivity and quality indicators, and it should
Law and Ngai (2007), drawing for the experience also take into account other external factors such
of 96 companies, conclude that during enterprise as schedule constraints.
system adoption firms should undertake business
1042
Towards Identifying the Most Important Attributes of ERP Implementations
As regards the difficulties with the comparison and logistics activities. The idea of limited benefits
of different ES adoption projects, the impact of achieved by small and medium-size companies
organisational size on ES project conditions was is reflected in the research of Sun et al. (2005),
studied by several researchers. The majority of who conclude that as the implementation schedule
authors defined organisational size taking into increases, the cost increases accordingly, while
consideration the number of employees; other the achievement increases to some point, beyond
studies understood the size of a company in terms which there is no significant achievement benefit.
of the level of revenues (Mabert et al., 2003) or
defined the size of an ES project as a number of
installed licences of the system (Sedera et al., rEsEArcH MEtHODOLOGy
2003). While investigating ES projects, the schol-
ars employed research approaches based on case This study is based on exploratory research con-
studies, interviews and surveys. Their respondents ducted among enterprises introducing an ERP
were mainly adopters; however, some studies also package into their organisations. A field study
enquired system supplier representatives (e.g., was adopted as a general research approach, and
Mabert et al., 2003). a questionnaire was employed as a data-gathering
The results of prior works illustrate that in the technique (e.g., Boudreau et al., 2001). The
case of small firms, the most important issues research question posed in this study could be
comprise available human resources and system expressed as follows: What are the most desired
fit into company’s organisation (Bernroider & attributes of an ERP implementation project?
Koch, 2001; Buonanno et al., 2005; Mabert et The research questionnaire was comprised
al., 2003; Muscatello et al., 2003; Raymond & of questions with a mixture of scale, multiple
Uwizeyemungu, 2007), which result in a shorter choice and open questions. The purpose of these
implementation time, lower costs, and lack of the queries was to provide demographic data and
need for significant organisational changes (Adam details necessary to assess project conditions and
& O’Doherty, 2000; Bernroider & Koch, 2001; implementation effects. The list of respondent
Mabert et al., 2003). The paramount significance enterprises was prepared on the basis of reports
of human resources in the case of small and analysing the ERP market in Poland and databases
medium-size companies is expressed by Sun et containing companies’ address data. The resulting
al. (2005), who claim that a great emphasis during list contains firms that introduced an ERP pack-
ERP implementation should be placed on people. age into their organisations with a broad scope,
It is worth noting that the issues connected estimated on the basis of available data.
with organisational changes are not perceived The questionnaire was directed toward the
unambiguously by researchers: some point out people playing leading roles (the project leader, if
the lack of willingness to perform organisational possible) in the implementation. With the help of
changes in the case of small firms, others claim the questionnaire, data has been gathered regarding
that small companies are more likely to change the conditions of implementation projects, efforts
their processes to fit the system (Mabert et al., incurred, as well as results achieved. The collected
2003). The cited research works also suggest that data contain various pieces of information regard-
benefits realized by small and large companies ing both the implementation process and achieved
differ: larger firms achieve greater benefits, with a results. Part of the data contains objective items,
special emphasis on a financial indicators improve- while the other (subjective) include respondents’
ment, while smaller companies accomplish first individual evaluations. The achieved collection of
and foremost the improvement of manufacturing projects is varied; hence, an attempt to identify the
1043
Towards Identifying the Most Important Attributes of ERP Implementations
model object, having the most desired attributes In the research conducted, two agglomeration
which led to the completion of implementation methods were employed: hierarchical Ward’s
goals, is not an easy task. method (e.g., El-Hamdouchi & Willett, 1986),
The group of objects was characterised by which is the most commonly used agglomerative
12 attributes, which were divided into 3 distinct method employed for forming clusters (Everitt,
subsets. In the first subset, there were input indi- 1993) and non-hierarchical k-Means method. The
cators of an implementation process—let us call aim of Ward’s method is to join objects together
them “effort indicators”. The second group was into ever increasing sizes of clusters using a
comprised of variables relating to the implementa- measure of similarity of distance. K-means, on
tion results—called “effect indicators” (see Table the other hand, is a simple non-parametric clus-
1). The third, one-element subset, contained the tering method that minimises the within-cluster
calculated variable being a synthetic measure of variability and maximises the between cluster
implementation success, which was calculated variability. The k-means method requires that
on the basis of data gathered from the enterprises the number of clusters is specified beforehand
(Soja, 2004). In the next stage of the research, (National Statistics 2001 area classification,
this measure was used to establish the hierarchy 2001). One possibility for obtaining the number
of the groups. is to run Ward’s method and use the outcome as
The success synthetic measure, based on the initial configuration for k-means.
understanding of success in the information sys- Since in the k-Means method a researcher
tems domain (e.g., Lyytinen, 1988), employs 5 has to arbitrarily provide the number of clusters,
partial measures: (1) the actual scope of an imple- the two-phased approach is common in cluster
mentation with respect to the planned implemen- analysis research. In the first stage, the hierarchical
tation, (2) the actual duration with respect to the method is applied in order to determine a prelimi-
assumed duration, (3) financial budget with regard nary number of clusters (e.g., Ward’s method),
to the planned budget, (4) users’ level of satisfac- and in the second step the actual classification of
tion from the system introduced, and (5) the ex- objects using the k-Means method takes place (e.g.,
istence and achievement of project goals (Soja, Everitt et al., 2001). This approach was adopted
2006). during this research and is illustrated in Figure 1.
The procedure is aimed at the separation of
object groups which are similar to each other but
differing to a greater extent from the objects be-
Table 1. Implementation effort and effect variables longing to the remaining groups (e.g., Kaufman
& Rousseeuw, 1990). Firstly, the standardization
Effort variables Effect variables
of variables was carried out, which allowed us to
• Company size measured • Actual duration time of an remove the excessive influence of variables hav-
by number of employees implementation (AD)
(Size) • Measure of financial budget ing a wide range of values from the outcome of
• Planned duration time spending with regard to the the research. In the next step, the Ward’s hierar-
of an implementation planned budget (Bud)
(PD) • Implemented scope (Scope) chical grouping method was applied. On the basis
• Zero-one variable bear- • User satisfaction indicator (US) of a distance diagram obtained, two decisions
ing information whether • Level of achievement of project
the MRP Explosion goals (Goal) were made:
module was implemented • Subjective measure of positive
(MRP) effects of an implementation (PE)
• Number of implement- • Subjective measure of negative 1. Some objects were excluded from further
ed modules except MRP effects of an implementation (NE) processing. The objects most dissimilar to
Explosion (Mod)
other items or those forming small, two-
1044
Towards Identifying the Most Important Attributes of ERP Implementations
element groups, were treated as accidental cluster, the average value of success measure
measurement. Their exclusion allowed us, was calculated using synthetic success measures
at the next stage, to receive more homog- evaluated for objects belonging to a particular
enous clusters, containing objects the most group, and on the basis of this value, hierarchy of
similar to each other and laying closer to the the group was determined. The cluster having the
hypothetical centre of a cluster. greatest average value of success measures was
2. The k value was selected for the applied k- recognised as containing objects with the most
Means method. The greater the k, the more desired characteristics. Simultaneously, the cluster
the clusters. These clusters tend to be smaller with the least average value of success measures
and contain more similar objects. A small k was recognised as having objects with the least
means, on the other hand, fewer groups and desirable attributes.
more diverse objects within each subset. In Within each of these two extreme groups, one
order to determine the k value, the distance object having the smallest distance from the hypo-
diagram achieved with the use of Ward’s thetical centre of a cluster was distinguished. The
method was employed. After excluding object coming from “the best” group was regarded
objects dissimilar to other items, the visual as exemplar (a model implementation), while the
analysis of number clusters in the diagram object extracted from the group having the least
was performed. average value of success measure was perceived
as anti-exemplar (an anti-model implementation).
During the next stage, the k-Means method Since the calculation was performed three times,
was applied. The calculations were performed three exemplars and three anti-exemplars were
three times: (1) for effort indicators only, (2) for extracted, characterising the most needed and,
effect indicators only, and (3) for all eleven in- also, the least desirable attributes of variables
dicators of effort and effect together. As a result, describing efforts, effects as well as efforts and
the separated groups of similar objects were ex- effects jointly (in some cases two objects were
tracted, together with the distance of each object distinguished, since both were equidistant from
from the hypothetical centre of a cluster. For each the centre).
1045
Towards Identifying the Most Important Attributes of ERP Implementations
rEsEArcH DAtA 1000 workers, and constitutes more than one fifth
of the companies researched. The second larg-
During the research, 223 enterprises were con- est group is made up by the biggest companies
tacted and 68 (30%) answers were obtained from employing over 1000 workers, which represents
enterprises representing the whole country and 20% of enterprises evaluated. Certainly, the least
various industries. From among the questionnaires numerous group is formed by small companies,
received, 64 were accepted for further analysis. employing not more than 100 workers.
All enterprises investigated in this study represent The implementation projects researched make
companies which introduced an ERP system into up quite a diverse group when project duration
their organisations. The companies classified by time is taken into consideration. Among the com-
industry type are described as shown in Table panies examined, there are projects lasting not
2, where the number of companies belonging to more than a couple of months, as well as imple-
particular industries was provided. As can be easily mentations with a duration time longer than 3
seen, the vast majority of companies comprise of years. Table 4 illustrates the number of projects
manufacturing enterprises (75%). as regards planned and actual duration time.
For the purpose of analysis, this study ad- The examined projects are also diverse as
opted the criterion defining enterprise size as the regards to the implementation scope defined by
number of employees. The understanding of
“small” and “large” companies is derived from
the European Community’s definition for small Table 3. Companies by number of workers
and medium-sized companies (e.g., The Commis- Number of workers n %
sion of the European Community, 1996).
20 to 50 3 5%
The investigated enterprises differ significantly
51 to 100 3 5%
in their size regarding the number of employees,
101 to 200 10 16%
which can be seen in Table 3. It contains, in sub-
201 to 300 10 16%
sequent rows, the number of companies (column
301 to 500 11 17%
n) employing a number of workers which falls
501 to 1000 14 21%
within a specified range. The largest group is
over 1000 13 20%
formed by companies employing from 501 to
1046
Towards Identifying the Most Important Attributes of ERP Implementations
1047
Towards Identifying the Most Important Attributes of ERP Implementations
further processing – they were different in each The outcome of the division of object collec-
case. The longer the vertical line on the diagram tion with the help of k-Means method is pre-
(see Figure 2, Figure 3, and Figure 4), the less the sented in Table 9. The clusters are ordered from
observation is similar to the others. Those which the largest to the smallest average value of success
were represented by the longest lines or consti- measure. This means that the group having a
tuted small two-element groups where excluded. smaller identifier contains objects with more
Table 8 contains the list of objects together with desired properties from an implementation effi-
the ultimate cardinality of the object sets used in ciency point of view. Along with each object
further research. This table also includes the k identifier, the distance from the hypothetical
value determined on the basis of the analysis of centre of an appropriate cluster was placed. The
object clusters classified for further processing.
Figure 2. Distance diagram obtained with the use of Ward’s method applied for 4 effort variables
Figure 3. Distance diagram obtained with the use of Ward’s method applied for 7 effect variables
1048
Towards Identifying the Most Important Attributes of ERP Implementations
Figure 4. Distance diagram obtained with the use of Ward’s method applied for all 11 variables
Table 8. List of objects excluded from further processing on the basis of Ward’s distance diagram analysis
(see Figures 2, 3, 4)
table also contains an average success measure well planned: actual implementation time is
determined for each cluster. similar to the planned one (although in all cases
slightly exceeded), and budget is only insignifi-
Exemplar and Anti-Exemplar cantly exceeded. Correspondingly, the planned
Objects’ characteristics scope of an implementation was 100 percent
completed. Predictably, the level of goals achieve-
On the basis of the data obtained by employing ment is very high (equal to 3 to 5, where 5 is a
k-Means method, the exemplar and anti-exemplar maximum value), and the satisfaction level of
objects were chosen. The achieved results were users is estimated at the level of 4 (maximum 5)
put together in Table 10. in all cases. Furthermore, the great advantage of
The data in Table 10 allow us to draw certain subjective positive effects indicated by respon-
conclusions regarding the characteristics of ex- dents over negative effects demonstrates user
emplar and anti-exemplar objects. In all three satisfaction, and, indirectly, project success.
cases, exemplars are characterised by quite a long The objects distinguished as anti-exemplars are
implementation time. The whole undertaking is characterised mainly by a short planned imple-
1049
Towards Identifying the Most Important Attributes of ERP Implementations
Table 9. Hierarchy of clusters obtained with the use of k-Means method, determined on the basis of
average success measure
Group For 4 effort variables For 7 effect variables For all 11 variables
ID
Object identifiers Average Object identifiers Average Object identifiers Average
(distance from cluster success (distance from cluster success (distance from cluster success
centre in parentheses) measure centre in parentheses) measure centre in parentheses) measure
1 A27(.328), A31(.068) .8339 A01(.209), A03(.134) .8528 A27(.232), A31(.251) .8339
A42(.395), A48(.542) A35(.166), A43(.172) A42(.347), A48(.432)
A52(.277), A57(.277) A44(.122), A56(.200) A52(.298), A57(.234)
A60(.082) A57(.217) A60(.179)
2 A22(.000), A35(.117) .8013 A08(.255), A14(.127) .7979 A01(.191), A10(.261) .8059
A39(.000), A51(.117) A33(.079), A38(.281) A30(.166), A44(.232)
A52(.133), A62(.166) A50(.233)
3 A08(.216), A11(.247) .7553 A21(.215), A25(.131) .7950 A08(.303), A13(.220) .7983
A13(.104), A15(.158) A27(.156), A46(.248) A16(.252), A23(.301)
A16(.250), A20(.126) A60(.038) A43(.282), A49(.285)
A23(.065), A43(.096) A56(.162), A65(.203)
A45(.219), A53(.142) A66(.153), A68(.201)
A56(.038), A59(.294)
A65(.038), A66(.038)
A68(.158)
4 A01(.188), A04(.188) .7536 A10(.294), A11(.230) .7853 A07(.243), A09(.187) .7812
A30(.154), A46(.383) A19(.265), A20(.285) A17(.219), A26(.206)
A50(.195), A55(.394) A40(.224), A47(.254)
A58(.238) A50(.167), A51(.142)
5 A05(.282), A07(.101) .7402 A13(.161), A16(.255) .7681 A33(.192), A38(.285) .7679
A09(.142), A10(.225) A17(.086), A36(.174) A46(.279), A59(.288)
A14(.303), A19(.142) A65(.168), A66(.123) A62(.176)
A26(.142), A29(.318)
A44(.033), A64(.396)
6 A06(.094), A17(.059) .6525 A09(.102), A23(.253) .7671 A02(.272), A04(.432) .6902
A40(.071), A41(.093), A30(.215), A39(.160) A21(.286), A25(.310)
A47(.108) A42(.156), A49(.177) A55(.228)
A59(.196), A68(.167)
7 A28(.140), A33(.244) .6363 A04(.396), A06(.222) .6499 A06(.265), A11(.263) .6746
A34(.257), A36(.235) A22(.331), A29(.249) A15(.284), A19(.279)
A38(.292), A54(.133) A34(.310), A64(.286) A40(.274), A45(.449)
A62(.177), A67(.140) A47(.304), A64(.463)
8 A15(.122), A45(.122) .6327 A36(.112), A67(.112) .6023
Note: Exemplar and anti-exemplar objects are bold
mentation time, together with a relatively large estimated to be lower than in the case of positive
number of implemented modules. In decidedly implementations (below 3 except for 2 cases). The
most cases, the companies did not implement users perceive a somewhat small number of posi-
the MRP module; therefore, they could not be tive and negative effects from the implementation,
treated as the most extensive projects introducing and, what seems to be interesting, their number is
a system in its full functionality. The budget was similar, and in 3 cases there were more positive
exceeded, which could suggest that the project effects than negative ones.
was not properly planned. In these companies, It is worth noting that the R/3 package from
the implementation scope was not entirely re- SAP was implemented in the case of exemplar
alised; therefore, the level of goal completion is projects obtained on the basis of both effort vari-
1050
Towards Identifying the Most Important Attributes of ERP Implementations
ables and effects variables. However, on the other Table 11, where the clusters having the objects
hand, an exemplar project which was distinguished with the most desired characteristics are depicted,
on the basis of all variables introduced the IFS and in Table 12 containing data regarding clusters
system. The interesting fact is that in the case of with the worst objects. The first table comprises
effect variables, both exemplar and anti-exemplar two parts (instead of three) because the analysis
projects implemented the R/3 package, and both performed with the use of effort variables and
were from the food industry. Practically all model all variables yielded the same exemplar groups
objects introduced foreign packages, only one “all containing the same objects.
variables’ anti-exemplar” object implemented The analysis of data put together in Tables 10
Polish software (Manager II). The results show and 11 leads to certain general conclusions regard-
that there is no single ERP package connected ing the implementation process in those pattern
with exceptional implementation performance. companies. The objects included in exemplar
clusters represent various industries, while the
Exemplar and Anti-Exemplar anti-exemplar groups mainly comprise companies
clusters’ characteristics from chemical (6 companies out of 12) and food
(4 companies) industries. Planned duration time
In order to verify the observations achieved on is longer in exemplar clusters than in anti-exem-
the basis of exemplar and anti-exemplar object plar groups, while the number of implemented
analysis, for all extreme clusters (containing the modules is similar or even bigger in anti-exemplar
best and the worst objects), the basic statistics were groups. This means that, in the case of anti-ex-
estimated (average, minimum and maximum) on emplar projects, the implementation duration time
the basis of attribute values of objects belonging was estimated too optimistically. The implemen-
to particular clusters. The results are presented in tation scope is near 100 percent among exemplars
1051
Towards Identifying the Most Important Attributes of ERP Implementations
Table 11. Average, minimum and maximum values of variables estimated for clusters containing objects
with the best parameters
Table 12. Average, minimum and maximum values of variables estimated for clusters containing objects
with the worst parameters
and is considerably lower among anti-exemplars. comes; however, to a lesser extent than among
User satisfaction is definitely greater in the case exemplar projects.
of exemplar clusters; furthermore, the apparent The exemplar group extracted on the basis
advantage of subjective positive effects over of both effort and all variables consists of the
negative results was observed. Nevertheless, in largest companies employing more that 1000
the case of anti-exemplar clusters, positive effects people. This suggests that in the largest enterprises
were more often recognised than negative out- the ERP implementation brings about the best
1052
Towards Identifying the Most Important Attributes of ERP Implementations
results. However, within this group, on average sent mainly food, but also metal, machin-
less that 4 system modules were introduced, and ery, and other industries. However, on the
none of the projects installed an MRP Explosion other hand, almost all anti-exemplar com-
module. Hence, these implementations can not be panies were manufacturing enterprises.
recognised as the most complicated. On the other • The lowest success level in implementing
hand, the most complicated full-scope implemen- ERP system was reached by companies op-
tations make up the majority of projects reaching erating in food and chemical industries, as
the best effects, i.e. belonging to the exemplar well as those belonging to the group of me-
group obtained on the basis of effect variables. dium enterprises as regards to the number
Namely, 57 percent of the “best effects” exemplar of employees. Therefore, the results sug-
implementations introduced an MRP Explosion gest that company industry can be a signifi-
module and the projects of this kind, on average, cant factor for the project success.
installed 4 other modules. • Implementations tended to be more suc-
The exemplar groups contain projects imple- cessful in large enterprises of 1000 or more
menting only foreign systems, mainly those most employees. On the other hand, implemen-
popular among implementations researched, tations ended with failure, i.e. achieved a
i.e. R/3, IFS, and MMRP. Naturally, this can be very low level of success measure, mainly
partially explained by the frequency of their oc- among medium sized enterprises of 500 to
currence. However, the presence of well known 1000 employees.
foreign packages, which have mature software • Exceptionally good effects were achieved
solutions and implementation methodologies by companies implementing an ERP sys-
rooted in long-term experience, suggests that the tem within its full functionality. Moreover,
system solution reliability is the deciding factor. all anti-exemplar clusters include only par-
On the other hand, practically all exemplar pack- tial projects. Thus, the integrating aspect
ages were present among anti-exemplar projects of a system is seen when it embraces the
or clusters. This suggests that the deciding factor company holistically.
is not only the system itself, but rather the way
it is implemented into a particular organisation. The above-mentioned observations raise the
issue of ERP system fit, i.e., whether a particular
system solution fits a given company, and, also,
DIscUssION OF FINDINGs whether a company really needs such a compli-
cated system. A good illustration of this is the fact
Lessons Learned that chemical companies were present among the
worst performers. However, none of them used
On the basis of the research results, the following the packages renowned for their outstanding
observations can be made. performance in chemical industry, like SAP R/3
(Stefanou, 2001).
• The company type does not seem to be a Furthermore, the results suggest that a par-
factor deciding about ERP implementation ticular system solution is not a factor determining
success. Companies obtaining the best ef- project success. It turned out that the particular
fects as a consequence of ERP implementa- package was present both among outstanding
tion are mainly manufacturing enterprises, projects and worst performers. Instead, the way
though it is difficult to indicate any specific of introducing the system seems to play a vital
industry that they belong to – they repre- role for project outcome.
1053
Towards Identifying the Most Important Attributes of ERP Implementations
comparison with Prior research hand, Sun et al. (2005) emphasize that for small
and medium sized companies people related issues
This study’s findings, claiming that the company are of paramount importance.
type does not seem to be a deciding factor in The results illustrating the vital need for an
ERP implementation success, partially support adequate amount of time planned for an imple-
the findings of Ettlie et al. (2005). Namely, the mentation project are consistent with findings
authors concluded that the strategic predictors regarding difficulties during enterprise system
of a successful enterprise system deployment do implementation and impediments to its success.
not depend on a company’s industry, which is The prior studies recognize mainly organisational
defined very broadly as the firm’s core activity: problems connected with time over-runs (Kremers
manufacturing versus service. This definition of & van Dissel, 2000; Soja, 2008; Themistocleous
a company’s industry seems equivalent to the et al., 2001) and the alignment of organisational
understanding of company type employed by this structure with enterprise system (Kim et al., 2005;
study. Nonetheless, this research results imply that Wright & Wright, 2002). This study’s results con-
a company’s actual industry plays a crucial role firm the findings of Peslak (2006) who perceive
and that practitioners have to pay special attention time and budget as the major determinants of
while implementing ERP system in chemistry project success. ES adopting companies should
and food industries companies. These findings use time wisely and adequately plan education and
are consistent with the results of Stensrud and training so that when the system goes live, users are
Myrtveit (2003), who concluded that there were comfortable with it and understand what they are
significant differences in productivity between supposed to be doing, how and why. This should
projects in different industries, and, also, that also be ongoing long after the implementation is
projects conducted in the process industry were complete (Tinham, 2006).
the least efficient. The second impediment most often recog-
As regards the role of company size in enter- nized by prior research, i.e. the alignment of
prise system adoption, as was already mentioned, organisational structure with enterprise system,
there are mixed results presented by various re- is illustrated by the issue of system fit and imple-
searchers. This study’s findings also contribute to mentation scope, raised by this study outcome.
this debate and suggest that results achieved by Prior research suggests that the issue of system
large companies are greater than by small firms, fit especially concerns smaller companies, who
which supports the findings of some prior research tend to suffer more from the system misfit (e.g.,
(e.g., Mabert et al., 2003). In particular, they are Soja & Paliwoda-Pękosz, 2007). The idea of fit
consistent with the results of Sun et al. (2005) between the system characteristics and the com-
and their claims that small and medium sized pany’s needs is highlighted by Peslak (2006), who
companies’ achievement increases to some point, advocates that modification to enterprise systems
beyond which there is no significant achievement should be minimized since they negatively affect
benefit. Nonetheless, we must bear in mind that both cost and time performance.
there are other research works suggesting that the The fit between the system features and com-
benefits achieved by small and large companies panies’ needs is also connected with the scope of
are similar (e.g., Shang & Seddon, 2000). Also, an implementation project perceived in terms of
there are research works suggesting that difficul- introduced functionality. This study’s findings
ties experienced during enterprise system adoption illustrate that better results were achieved by
generally do not differ across company size (Soja companies which implemented greater scope of
& Paliwoda-Pękosz, 2007). However, on the other ERP modules. These results are consistent with
1054
Towards Identifying the Most Important Attributes of ERP Implementations
the findings of Ranganathan and Brown (2006) portance of a project and the lack of care
who discovered that the announcements of ERP during execution.
adoptions created greater abnormal stock market • It is necessary to be careful in the case of
returns for ERP adoptions with greater functional implementation projects conducted in the
scope than for those with lesser functional scope. food and chemical industry – the proj-
Finally, the outcome of this study is consistent ects in companies representing those two
with the research works illustrating that enterprise branches most often ended with failure.
system implementation should be treated as a This also suggests the need for further re-
business-led project, in contrast to an IT related search on the influence of a company’s in-
initiative (Law & Ngai, 2007; Nicolaou, 2004; dustry on the project as a whole.
Tinham, 2006). In particular, this study’s results • The implementers should pay special at-
reveal that the best projects demonstrated the tention to the choice of a particular system
greatest number of declared goals and the highest solution. They have to ensure the proper
level of goals’ achievement. This suggests that the fit between a system and the adopting
best projects among the sample investigated were organisation.
treated as business-driven endeavours.
cONcLUsION
Implications for Practitioners
The study examines the ERP implementations
Taking the research results into consideration, and, using the statistical methods of elements
a series of suggestions for practitioners dealing grouping, extracts the projects with best and worst
with ERP projects could be formulated. Making parameters. The core contribution of this paper
use of these suggestions can have a positive influ- is that it illustrates the new method of estimating
ence on an implementation project course and its ERP implementation success factors by employ-
final outcome. ing combined methods of clustering analysis. The
study’s results can be useful for practitioners as
• The implementation endeavour has to they suggest some recommendations towards ERP
be well planned – the best results were implementation improvement. These suggestions
achieved by companies where actual dura- emphasise the need for the proper organisation
tion time was similar to the planned time; of the project and the issue of system fit to the
also budget was as planned or only insigni- particular business environment. Furthermore, this
ficantly exceeded. It is necessary to ensure study should benefit the academic community as
adequate time for system implementation; it shows an innovative method of investigating the
haste can be a factor causing problems and issues influencing ERP project outcome. Further
having influence on a weak ultimate effect. research can enhance the process described by
In the research conducted, projects from introducing more variables capturing project’s
the weakest group had an average time effects and efforts, and, also can establish new
planned and usually exceeded this time. categories of projects’ estimation, such as imple-
• Special attention should be paid to partial mentation efficiency. The main limitation of this
scope implementations; according to the study is the sample of respondents. Though the
results obtained, such implementations too number of research participants is quite substantial
often end with failure. This could be con- (64), further analysis should cover more compa-
nected with an underestimation of the im- nies and ensure better distribution of projects.
Particularly, this suggestion applies to package
1055
Towards Identifying the Most Important Attributes of ERP Implementations
type, since having comparable samples of adopt- El-Hamdouchi, A., & Willett, E. (1986). Hier-
ers of various packages would allow us to better archic Document Classification Using Ward’s
investigate the issues connected with a system fit Clustering Method. In Proceedings of the 9th
and its performance. The results also suggest the International ACM SIGIR Conference on Research
need for further research on the projects’ condi- and Development in Information Retrieval. New
tions depending on a company’s industry. York: ACM Press, pp. 149-156.
Ettlie, J. E., Perotti, V. J., & Joseph, D. A. (2005).
Strategic predictors of successful enterprise
rEFErENcEs
system deployment. International Journal of
Adam, F., & O’Doherty, P. (2000). Lessons from Operations & Production Management, 25(10),
enterprise resource planning implementation in 953–972. doi:10.1108/01443570510619473
Ireland – towards smaller and shorter ERP projects. Everdingen, Y., Hillegersberg, J., & Waarts,
Journal of Information Technology, 15, 305–316. E. (2000). ERP adoption by European midsize
doi:10.1080/02683960010008953 companies. Communications of the ACM, 43(4),
Amoako-Gyampah, K. (2007). Perceived Useful- 27–31. doi:10.1145/332051.332064
ness, User Involvement and Behavioral Intention: Everitt, B. S. (1993). Cluster Analysis. Edward
an Empirical Study of ERP Implementation. Arnold, London.
Computers in Human Behavior, 23, 1232–1248.
doi:10.1016/j.chb.2004.12.002 Everitt, B. S., Landau, S., & Leese, M. (2001).
Cluster Analysis. London: Edward Arnold
Bernroider, E., & Koch, S. (2001). ERP selection
process in midsize and large organizations. Busi- Holland, C., Light, B., & Gibson, N. (1999). A
ness Process Management Journal, 7(3), 251–257. Critical Success Factors Model for Enterprise Re-
doi:10.1108/14637150110392746 source Planning Implementation. In Proceedings
of the 7th European Conference on Information
Boudreau, M., Gefen, D., & Straub, D. (2001). Systems ECIS, Copenhagen Business School,
Validation in IS Research: A State-of-the-Art Copenhagen, Denmark, 273-287.
Assessment. MIS Quarterly, 25(1), 1–16.
doi:10.2307/3250956 Kaufman, L., & Rousseeuw, P. J. (1990). Find-
ing Groups in Data: An Introduction to Cluster
Buonanno, G., Faverio, P., Pigni, F., Ravarini, A., Analysis. New York: John Wiley & Sons
Sciuto, D., & Tagliavini, M. (2005). Factors affect-
ing ERP system adoption: A comparative analysis Kim, Y., Lee, Z., & Gosain, S. (2005). Impedi-
between SMEs and large companies. Journal ments to successful ERP implementation process.
of Enterprise Information Management, 18(4), Business Process Management Journal, 11(2),
384–426. doi:10.1108/17410390510609572 158–170. doi:10.1108/14637150510591156
Chien, S.-W., & Tsaur, S.-M. (2007). Investigat- Ko, D. G., Kisrch, L. J., & King, W. R. (2005). An-
ing the Success of ERP Systems: Case Studies in tecedents of Knowledge Transfer from Consultant
Three Taiwanese High-Tech Industries. Comput- to Clients in Enterprise System Implementations.
ers in Industry, 58(8-9), 783–793. doi:10.1016/j. MIS Quarterly, 29(1), 59–85.
compind.2007.02.001
1056
Towards Identifying the Most Important Attributes of ERP Implementations
Kositanurit, B., Ngwenyama, O., & Osei-Bryson, Muscatello, J. R., Small, M. H., & Chen, I. J.
K.-M. (2006). An Exploration of Factors that (2003). Implementing ERP in small and midsize
Impact Individual Performance in an ERP Envi- manufacturing firms. International Journal of Op-
ronment: An Analysis Using Multiple Analytical erations & Production Management, 23, 850–871.
Techniques. European Journal of Information doi:10.1108/01443570310486329
Systems, 15, 556–568. doi:10.1057/palgrave.
National Statistics 2001 area classification (2001).
ejis.3000654
Area classification for statistical wards. http://
Kremers, M., & van Dissel, H. (2000). ERP System www.statistics.gov.uk/about/methodology_by_
Migrations. Communications of the ACM, 43(4), theme/area_classification/wards/downloads/
53–56. doi:10.1145/332051.332072 area_classification_for_statistical_wards_meth-
ods.pdf, retrieved 2006-01-20.
Law, C. C. H., & Ngai, E. W. T. (2007). ERP
Systems Adoption: An Exploratory Study of the Nicolaou, A. I. (2004). ERP Systems Implemen-
Organizational Factors and Impacts of ERP Suc- tation: Drivers of Post-Implementation Success,
cess. Information & Management, 44, 418–432. Decision Support in an Uncertain and Complex
doi:10.1016/j.im.2007.03.004 World, The IFIP TC8/WG8.3 International Con-
ference, 589-597.
Loh, T. C., & Koh, S. C. L. (2004). Critical ele-
ments for a successful enterprise resource plan- Parr, A., & Shanks, G. (2000). A Taxonomy of ERP
ning implementation in small- and medium-sized Implementation Approaches. In Proceedings of the
enterprises. International Journal of Production 33rd Hawaii International Conference on System
Research, 42(17), 3433–3455. doi:10.1080/0020 Sciences HICSS, Maui, Hawaii, USA, 2424-2433.
7540410001671679
Peslak, A. R. (2006). Enterprise Resource Plan-
Lyytinen, K. (1988). Expectation failure concept ning Success. An Exploratory Study of the
and systems analysts view of information sys- Financial Executive Perspective. Industrial Man-
tems failures: Results of an exploratory study. agement & Data Systems, 106(9), 1288–1303.
Information & Management, 14(1), 45–56. doi:10.1108/02635570610712582
doi:10.1016/0378-7206(88)90066-3
Ranganathan, C., & Brown, C. V. (2006). ERP
Mabert, V. A., Soni, A., & Venkataramanan, M. Investments and the Market Value of Firms.
A. (2003). The impact of organization size on Information Systems Research, 17(2), 145–161.
enterprise resource planning (ERP) implementa- doi:10.1287/isre.1060.0084
tions in the US manufacturing sector. International
Raymond, L., & Uwizeyemungu, S. (2007). A pro-
Journal of Management Science, 31, 235–246.
file of ERP adoption in manufacturing SMEs. Jour-
McGinnis, T. C., & Huang, Z. (2007). Rethinking nal of Enterprise Information Management, 20(4),
ERP Success: A New Perspective from Knowl- 487–502. doi:10.1108/17410390710772731
edge Management and Continuous Improvement.
Sarkis, J., & Gunasekaran, A. (2003). Enterprise
Information & Management, 44(7), 626–634.
resource planning – modeling and analysis . Eu-
doi:10.1016/j.im.2007.05.006
ropean Journal of Operational Research, 146,
McNurlin, B. C., & Sprague, R. H., Jr. (2002). 229–232. doi:10.1016/S0377-2217(02)00545-3
Information Systems Management in Practice.
5th edition, Upper Saddle River.
1057
Towards Identifying the Most Important Attributes of ERP Implementations
Schniederjans, M. J., & Kim, G. C. (2003). Imple- Soja, P. (2008). Difficulties in Enterprise System
menting Enterprise Resource Planning Systems Implementation in Emerging Economies: Insights
with Total Quality Control and Business Process from an Exploratory Field Study in Poland. In-
Reengineering . International Journal of Opera- formation Technology for Development. Special
tions & Production Management, 23(4), 418–429. Issue on Information Technology Investments in
doi:10.1108/01443570310467339 Emerging Economies, 14(1), 31–51.
Sedera, D., Gable, G., & Chan, T. (2003). ERP Soja, P., & Paliwoda-Pękosz, G. (2007). Towards
Success: Does Organization Size Matter? In the Causal Structure of Problems in Enterprise
Proceedings of the Pacific Asia Conference on System Adoption. In Proceedings of the 13th
Information Systems (PACIS), 10–13 July, Ad- Americas Conference on Information Systems,
elaide, South Australia, 1075-1088. Keystone/Colorado, USA.
Shang, S., & Seddon, P. B. (2000). A Compre- Stefanou, C. J. (2001). A framework for the
hensive Framework for Classifying Benefits of ex-ante evaluation of ERP software. European
ERP Systems. In Proceedings of the 6th Americas Journal of Information Systems, 10(4), 204–215.
Conference on Information Systems, Long Beach, doi:10.1057/palgrave.ejis.3000407
CA, USA, 1005-1014.
Stensrud, E., & Myrtveit, I. (2003). Identifying
Sharma, A., & Vyas, P. (2007). DSS (Decision High Performance ERP Projects. IEEE Transac-
Support Systems) in Indian Organised Retail tions on Software Engineering, 29(5), 398–416.
Sector, Indian Institute Of Management. doi:10.1109/TSE.2003.1199070
Soh, C., & Sia, S. K. (2005). The challenges of Sun, A. Y. T., Yazdani, A., & Overend, J. D. (2005).
implementing “vanilla” version of enterprise Achievement Assessment for Enterprise Resource
systems. MIS Quarterly Executive, 4(3), 373–384. Planning (ERP) System Implementations Based
on Critical Success Factors (CSFs). International
Soja, P. (2004). Success Factors in ERP Systems
Journal of Production Economics, 98, 189–203.
Implementations. Result of research on the Polish
doi:10.1016/j.ijpe.2004.05.013
ERP market. In Proceedings of the 10th Americas
Conference on Information Systems AMCIS, New The Commission of the European Community.
York, USA, 3914-3922. (1996). (96/280/EC) Commission recommenda-
tion of 3 April 1996 concerning the definition of
Soja, P. (2005). The Impact of ERP Implementa-
small and medium-sized enterprises. In Official
tion on the Enterprise – an Empirical Study. In
Journal No. L 107 30/04/1996, pp.4-9.
Proceedings of the 8th International Conference
on Business Information Systems, Poznan, Poland, Themistocleous, M., Irani, Z., O’Keefe, R. M.,
389-402. & Paul, R. (2001). ERP Problems and Applica-
tion Integration Issues: An Empirical Survey. In
Soja, P. (2006). Success factors in ERP systems
Proceedings of the 34th Hawaii International
implementations: lessons from practice. Journal
Conference on System Sciences.
of Enterprise Information Management, 19(4),
418–433. doi:10.1108/17410390610678331 Tinham, B. (2006). Your Guide to Choosing and
Implementing ERP. Manufacturing Computer
Solutions.
1058
Towards Identifying the Most Important Attributes of ERP Implementations
Wright, S., & Wright, A. M. (2002). Informa- Wu, J.-H., & Wang, Y.-M. (2007). Measuring
tion System Assurance for Enterprise Resource ERP Success: The Key-Users’ Viewpoint of the
Planning Systems: Unique Risk Considerations. ERP to Produce a Viable IS in the Organization.
Journal of Information Systems, 16(Supplement), Computers in Human Behavior, 23, 1582–1596.
99–113. doi:10.2308/jis.2002.16.s-1.99 doi:10.1016/j.chb.2005.07.005
This work was previously published in Global Implications of Modern Enterprise Information Systems: Technologies
and Applications, edited by Angappa Gunasekaran, pp. 114-136, copyright 2009 by Information Science Reference (an
imprint of IGI Global).
1059
1060
Chapter 4.12
Challenges and Solutions
for Complex Business
Process Management
Minhong Wang
The University of Hong Kong, Hong Kong
Kuldeep Kumar
Florida International University, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Challenges and Solutions for Complex Business Process Management
1061
Challenges and Solutions for Complex Business Process Management
1062
Challenges and Solutions for Complex Business Process Management
to provide sufficient flexibility and adaptability gests. Business processes are best viewed as
in BPM, many researchers are investigating the networks, in which a number of actors collabo-
approaches and techniques for developing BPM rate and interact to achieve a business goal. A
systems for an increasingly turbulent environment. business process displays complexity because of
In perusing this, most studies have focused on multiple interactions of its internal components
the capabilities that are based on present process and interaction between the process and its en-
structures of an organization and provide rapid vironment (Melão et al., 2000). In recent years,
response to changes that lead to temporary and business environments have been changing from
short term fluctuations in the organization’s ac- centralized-and-closed to distributed-and-open.
tivities. Efforts to improve flexibility in business Business processes are becoming increasingly
processes can be found in numerous studies on complex and dynamic as they seek to cope with
adaptive workflow/process modeling, workflow/ a wide range of internal and external interactions
process monitoring, and exception management and changes. In this situation, BPM should be
(Casati et al., 1999; Chiu et al., 1999; Weske, 2001; able to manage a number of components and their
Wang et al., 2002, 2005a; K. Kumar et al., 2006). complex interactions in business processes, in par-
On the other hand, while faced with revolutionary ticular in continuously changing and interplayed
changes, an organization needs more flexibility environment (Wang et al., 2006a; K. Kumar et al.,
to rearrange its internal or intra-organizational 2006). Furthermore, attention should be paid to
structures and processes. Efforts can be found situations where dynamic collaboration and soft-
in research on business process analysis and connection between business partners is playing
redesign, and business process reconstruction an increasingly important role (K. Kumar, 2001;
or reengineering, which enable new forms of Wang et al., 2008b). This needs both informa-
working and collaborating within an organiza- tion technologies and managerial capabilities to
tion or in cross-border businesses (Hammer et adapt the organization structure and its decision-
al., 1993). With the recent growth of electronic making and communication processes in order
services, a business process can be dynamically to facilitate cross-hierarchical, cross-functional,
established by connecting or composing appropri- cross-product/service, and cross-market capability
ate services based on market demand (A. Kumar development.
et al., 2002; Petrie et al., 2003; K. Kumar et al., In this context, we need to shift from the
2007). A worldwide network of organizations can mechanistic view of workflow paradigm which
be formed through process composition over the focuses on static and structure features of business
Internet (Casati et al., 2001). process. Instead, business processes can be viewed
as complex dynamic systems that adapt to continu-
ously changing and unpredictable environments
cHALLENGEs OF bUsINEss in order to survive. This requires the integration
PrOcEss MANAGEMENt of organizational, managerial, and technological
issues in understanding and managing business
business requirement processes. In addition to a set of logically related
tasks, more aspects need to be taken into account
To business, dealing with changes is a fact of such as environment awareness; knowledge for
everyday life that must be exploited. Real-world process management; flexible resource coordina-
processes are often much messier than what the tion; and so on.
typical input-transformation-output view sug-
1063
Challenges and Solutions for Complex Business Process Management
1064
Challenges and Solutions for Complex Business Process Management
structure can be decomposed into sub-functions, that are visible and those that are hidden. Hidden
sub-processes, sub-areas, and in other ways. Al- components lying inside a black box (the task
ternative decompositions correspond to different module) are isolated from other parts and are
ways of dividing the responsibilities. allowed to vary without changing much in other
While pursuing modularization, choosing right parts. This provides flexible process structures by
granularity of the component is an important issue permitting uncertainty as well as accommodating
in decomposing complex systems. The identity of changes.
any unit as the module is not fixed, but determined
by the level of analysis we choose (Schilling,
2003). Granularity is the size of the unit under DcAr ArcHItEctUrE FOr
consideration. It refers to the degree to which a cOMPLEX PrOcEss MANAGEMENt
system can be separated and reorganized. For ex-
ample, a company is generally divided into depart- Based on the above investigation of BPM chal-
ments, the departments into groups, and the groups lenges (3rd section) and the modularity theory for
into employees. Systems of large components managing complexity (4th section), we propose the
are called coarse-grained, and systems of small DCAR architecture for developing BPM systems,
components are called fine-grained. Granularity which includes decomposition of complex pro-
is a relative concept that can be precisely defined cesses (D); coordination of interactive activities
only in a specific context (Elfatatry, 2007). For (C); awareness of dynamic environments (A); and
instance, if a component implements all functions resource selection and coordination (R).
of a banking system, then it can be considered
coarse grained; if it supports just credit-balance Decomposition of complex
checking, it is considered fine-grained. The greater Processes (D)
the granularity, the more the flexibility, but the
greater the overheads of synchronization and According to the modular architecture, a business
communication. To maximize the performance process can be decomposed into tasks, task into
of modularization, a complex system must be sub-tasks, and so on. Interactions between sub-tasks
analyzed and implemented by choosing right within a task are often encapsulated within the task;
granularity of the components. A tradeoff between interactions between tasks are encapsulated within
modularity and integrity should be considered their higher-level process or task. This raises the
to ensure overall system performance (Garud et issue on how we decompose complex processes.
al., 2003). Traditional workflow approaches have selected
With respect to business process management, “task” as the basic module for building process
modularity supports two things. First, modularity management systems. A business process can be
increases the range of “manageable” complexity. decomposed into a number of semi-dependent and
It does this by limiting the scope of interactions interrelated tasks. These tasks are then linked to each
between various components by encapsulating other in a pre-established and usually sequential
some components (such as data, resources, knowl- inter-relationship or dependency. With the extension
edge, and responsibility of a specific task) and of business processes from intra-organizational to
their interactions inside the task module, thereby inter-organizational scope, we need to deal with
reducing the amount and range of interweaving interactions within an organization as well as
that occurs in an interconnected process. Second, interactions across organizations. Moreover, the
modularity accommodates uncertainty. Through complexity of BPM is increased by interweaving
modularity, components are partitioned into those of inter- and intra-organizational interactions.
1065
Challenges and Solutions for Complex Business Process Management
1066
Challenges and Solutions for Complex Business Process Management
1067
Challenges and Solutions for Complex Business Process Management
1068
Challenges and Solutions for Complex Business Process Management
1997). This separation allows for crafting process object oriented computing technologies to BPM
structures that enable switching between different (Jennings et al., 2002; Wang et al., 2005b; Ley-
resources options for implementing a process, as mann et al., 2002; Kammer et al., 2000; Weske,
shown in Figure 2. It creates an environment in 1998). The aspiration of these modular comput-
which the means for reaching a goal are evalu- ing technologies have facilitated the modeling
ated and selected for optimized performance. The of process architecture by modular software
success of the model is highly dependent on the architectures (object, component, Web service,
match between the requirements and satisfiers and software agent), thereby creating analogs of
that deliver the services. One way to ensure this the business process in software. Each paradigm
balance is to model the integration or composition represents a philosophy of perception, abstraction,
of business processes as a management problem and decomposition of complex systems in order
which involves: 1) the separation of requirements to deal with changes. As the modular computing
from the means for realization, and 2) the dynamic paradigms and technologies become popular,
selection and allocation of available resources to researchers often attempt to employ and integrate
requirements. them in creating business process management
solutions.
However, different modular technologies have
INVEstIGAtION OF MODULAr different philosophical beliefs with respect to
cOMPUtING tEcHNOLOGIEs how a complex system should be decomposed in
order to tackle changes (Elfatatry, 2007). These
There has been a proliferation of studies about technologies are usually applied in BPM without
the application of agent, service, component, and identifying the real rationale for their use in BPM
1069
Challenges and Solutions for Complex Business Process Management
1070
Challenges and Solutions for Complex Business Process Management
1071
Challenges and Solutions for Complex Business Process Management
the logical separation of service need from service (service providing party). Acting as an intermedi-
fulfillment. Delivering software as a service brings ary between two or more parties in negotiating
about new business models and opportunities of agreements, brokers use appropriate mediating
software development and service provision in techniques or processes to improve the dialogue
demand-driven dynamic environment. between the parties, aiming to help them reach
an agreement. Normally, all parties must view the
Agent-Oriented computing (AOc) mediator as neutral or impartial.
Autonomy is the power or right of self-gov-
Recently the Agent-Oriented Computing paradigm ernment. It refers to the capacity of a rational
has gained popularity among researchers who at- individual to make an informed, uncoerced
tempt to develop complex systems for business decision. “Autonomous” means that the actor is
process management (Jennings et al., 2002; Wang independent, i.e., the actor can decide what to do
et al., 2005b). Terms such as “autonomous agent” and how to do it. An autonomous agent therefore
and “agency” are now commonly used in computer is a system situated in, and part of, an environ-
science literature. On the other hand, a rich body of ment, which senses the environment, and acts on
literature on the concept of Agency and the role of it, over time, in pursuit of its agenda as derived
agents already exists in the institutional econom- from its principal. As an agent acts on behalf of the
ics and business field. We attempt to reconcile the principal, the agent cannot be fully autonomous.
various terms from the two research traditions. The principal may give the agent different levels
Actor is someone who performs an act, i.e., of choice in performing the task. For example,
does something. An actor may be a person, an the principal can tell the agent what to do, but
organizational unit, or a computer program. An leave it to the agent to decide as to how to do it.
actor may be completely autonomous, that is, it Software Agent. In computer science, the term
acts of its own volition. If the actor is authorized “agent” is used to describe a piece of software or
to do something on behalf of someone else, the code that acts on behalf of a human user or an-
actor is an “agent” of the other party. other program in a relationship of agency. It may
Agent is an actor (performer) who acts on the denote a software-based entity that could enjoy
behalf of a principal by performing a service. the some properties of autonomy (agents operate
The agent provides the service when it receives without the direct intervention of its principal
a request for service from the principal. The humans), social ability (agents communicate with
principal-agent relationship is found in most em- other agents), reactivity (agents perceive their
ployer-employee relationships. A classic example environment and respond to changes in a timely
of agency relationship occurs when stockholders fashion), and pro-activity (agents do not simply
hire top executives to run the corporation on their act in response to their environment, but are able
behalf. To manage the relationship between a to exhibit goal-directed behavior by taking some
principle and an agent of the principle, agency initiative) (Jennings et al., 2002). The agent-based
theory is concerned with various mechanisms used computing paradigm is devised to help computers
for aligning the interests of the agent with those know what to do, solve problems on behalf of hu-
of the principal such as piece rates/commissions man beings, and support co-operative working.
and profit sharing (Eisenhardt, 1989). The behavior of software agents is empowered by
Broker is a special type of agent that acts on human and implemented by software.
behalf of two symmetrical parties or principals – Agent-Oriented Computing (AOC) is based on
the buyer and seller. A broker mediates between the idea of delegating tasks and responsibility of a
the buyer (service requesting party) and the seller complex problem to a group of software agents. It
1072
Challenges and Solutions for Complex Business Process Management
emphasizes autonomy and mutual co-operation of properties for solving complex problems, while
agents in performing tasks in open and complex Web services are characterized by their open ac-
environments. A complex system can be viewed cess standards and protocols over the Internet.
as a network of agents acting concurrently, each While a Web service may only know about itself,
finding itself in an environment produced by its agents often have awareness of other agents and
interactions with the other agents in the system. their capabilities as interactions occur among the
AOC is used to model and implement intelligent agents. Agents are inherently communicative,
solutions to semi- or ill-structured problems, which whereas Web services are passive until invoked.
are too complex to be completely characterized Agents cooperate autonomously and flexibly, and
and precisely described. AOC offers a natural by forming teams and coalitions can assemble
way to view and describe systems as individual higher-level and more comprehensive services.
problem-solving agents pursuing high-level goals However, current standards or languages for Web
defined by their principals. It represents an emerg- services do not provide for flexible composing
ing computing paradigm that helps understand and functionalities, such as brokering and negotiation
model complex real-world problems and systems, in e-marketplaces (Huhns, 2002). Web services
by concentrating on high-level abstractions of are inherently less autonomous and independent
autonomous entities (Wooldridge et al., 1999). than software agents.
AOC vs. OOP. From a software engineering Against this background, there is a movement
point of view, Object-Oriented methodologies towards combining the concept of Web services
provide a solid foundation for Agent-Oriented with software agents. W3C introduced a concept,
modeling. AOC can be viewed as a specialization where software agents are to be treated as the
of OOP. OOP proposes viewing a computational foundation for Web services architecture - “A
system as made up of modules that are able to Web service is an abstract notion that must be
communicate with one another. AOC specializes implemented by a concrete agent”. AOC may take
the framework by representing the mental states SOA into new dimensions to model autonomous
and rich interactions of the modules (agents). and heterogeneous components in uncertain and
While objects emphasize passive behavior (i.e., dynamic environments. The integration of Web
they are invoked in response to a message), agents services with software agents can function as
support more autonomous behavior, which can computational mechanism in their own right,
be achieved by specifying a number of rules for thus significantly enhancing the ability to model
interpreting the environmental states and knowl- and construct complex software systems. It will
edge for governing multiple degrees of freedom be a promising computing paradigm for efficient
of activities. In relation to this, mechanisms of enterprise service selection and integration.
knowledge acquisition, modeling, and mainte-
nance have become important foundation for reconciling OOP, cbD,
building of autonomous agents. sOA, and AOc
AOC vs. SOA. Software agent is a software-
based entity that enjoys the properties of autonomy, From OOP and CBD to SOA and AOC, the
social ability, reactivity, and pro-activity. Web practice of software programming has evolved
service is a software application in the Web based through different development paradigms. At
on open standards. Though both of them are com- the conceptual level, these concepts and ap-
puter applications that perform tasks on behalf of proaches are complementary and built upon each
principals (human beings or other programs), the other; all have a role to play in designing and
focus of software agents is on their autonomous managing software systems. Each method shift
1073
Challenges and Solutions for Complex Business Process Management
came about in part to deal with greater levels services. This special type of agent works as
of software complexity. In all cases, the way to an intermediary between service requesters and
manage complexity is by decomposing a complex service providers, coordinating on behalf of the
system or process into smaller modules that can two parties by taking into account of service re-
be designed independently, i.e., modularization. quirements, qualities, costs, constraints, and so on.
Modularization ensures easy maintenance and
updates of complex systems by separating the
high-frequency intra-module linkages from the APPLyING MODULAr cOMPUtING
low-frequency inter-module linkages, limiting tEcHNOLOGIEs IN cOMPLEX bPM
the scope of interactions between the modules by
hiding the intra-module relations inside a module In the 5th section we propose the DCAR architec-
box. Based on the idea of modularity, constructs ture for developing complex process management
such as objects, components, software agents, and systems, which includes decomposition of com-
Web services have been continuously invented plex processes (D); task coordination (C); aware-
and evolved for developing software applications. ness of environmental changes (A); and resource
OOP provides a foundation for software engi- selection and coordination (R). This provides the
neering that uses objects and their interactions to foundation to identify the BPM requirements for
design applications and computer programs. CBD employing appropriate technologies in develop-
provides a coarser grained construct for larger sys- ing flexible BPM systems. In the 6th section we
tems, and separates interface from the behavior of clarify and explicitly define the similarities and
the construct for supporting public communication differences between the four modular technolo-
between the components which know about each gies: OOP, CBD, SOA, and AOC. In this section
other before runtime. SOA goes further by using we will show how these technologies can be used
XML-based and network-addressable interface as to implement the proposed BPM architecture.
well as XML-based messages and standard proto-
cols for open communication among all software Decomposition of complex
applications in Internet. Different from OOP, CBD, Processes (D)
and SOA, AOC is used to model and implement
solutions to semi- or ill-structured problems, which Business processes display complexity as a result
are too complex to be completely characterized of interactions of their internal components and
and precisely described. Agent is used to perform interaction of the process with its environment.
more autonomous activities in solving complex A process can be decomposed into a set of tasks,
problems. To achieve this, knowledge or rules for task into sub-tasks, and so on, through several
governing the behavior of an agent are separated layers in a network hierarchy. Tasks or sub-task
from the behavior of the agent. components can be delegated to software objects,
In computer science, the terms object, compo- components, agents, and services, as actors of
nent, software agent, and Web service describe a the tasks, which interact and communicate in
piece of software that performs some action on performing the process.
behalf of human beings, like an agent or actor. In To deal with interactions across different
addition to an actor, the agent can also be a broker, organizations, SOA proposes “service” as a high
which mediates between the service requesting level view of the building block of a process. A
party and the service providing party. In terms process is composed of a set of services, each of
of broker, software agent can be used to search which is provided by an individual organization.
appropriate applications to perform requested By using SOA, the inter-service interactions are
1074
Challenges and Solutions for Complex Business Process Management
separated from intra-service interactions; the of autonomous software entities, which are able
complexity of both is maintained at different to perform decision-based coordination of their
layers. Moreover, we can take advantage of reus- activities.
ability, inter-operability, and extensibility of Web In AOC, after decomposing a complex pro-
services on the basis of open standards to cater cess into a number of loosely coupled tasks in
for business process integration and interopera- a flat hierarchy, we may delegate the tasks to a
tion over the Web. number of autonomous agents, each working both
The highly dynamic and unpredictable nature autonomously and collaboratively throughout the
of business processes makes agent-based approach whole process. In complex process management,
appealing. AOC assigns business applications’ it is impossible to predefine all activities and
main activities to autonomous agents. Such agents interactions at design time. Instead, we define
are flexible problem solvers that have specific the goal or role of each agent, and specify a set
goals to achieve and interact with one another to of rules for governing the behavior of the agent.
manage their autonomy and interdependency in Agents operate asynchronously and in parallel.
business processes. AOC is well suited for complex This results in an increase in overall speed and
process situations that are not all known a priori, robustness in BPM. The failure of one agent does
cannot be assumed to be fully controllable in their not necessarily make the overall system useless,
behaviors, and must interact on a sophisticated where other agents may adjust and coordinate their
level of communication and coordination (Wang behavior reactively and proactively to the change.
et al., 2005b).
Awareness of Dynamic
Flexible task coordination (c) Environments (A)
A business processes is made up of a number The complexity of business processes comes not
of task components that interact with dynamic only from interactions of their internal compo-
behavior. OOP uses objects to hide behavior and nents, but also from interaction of the process with
data, supporting communications among small its environment. To manage business processes
objects, e.g., functions of tasks. CBD extends in a dynamic environment, we need to be able
OOP by supporting interaction among components to continuously perceive the environment, and
(e.g., tasks), i.e., coarser grained constructs, using make real-time decisions on the process. Objects,
public communication interface. SOC goes further components, and services are normally unable to
by using XML-based and network-addressable behave in dynamic environments. Agent-based
interface as well as XML-based messages and software entity is able to sense and recognize the
standard protocols for open communication among situation and determine appropriate actions upon
BPM applications over the Internet. the situations.
While OOP, OBD, and SOA mainly support Unlike the ECA (event-condition-action)
structured communications among tasks or task rules in workflow systems that enable reaction to
components, AOC are able to support ill-structured certain events, AOC goes further by incorporat-
interactions. To coordinate the interactions in dy- ing all environmental information into a mental
namic situations, flatter hierarchies, decentralized state that watches over the whole environment.
autonomous units, and decision-based coordina- Individual events are put together for a compre-
tion mechanisms are required, where AOC is hensive understanding; ambiguous information
directly applicable. AOC supports decentralized is understood after appropriate interpretation and
control and asynchronous operations by a group reasoning (Wang et al., 2006a). As shown in Figure
1075
Challenges and Solutions for Complex Business Process Management
3, information about the environment (e.g., events, under various constraints. The complexity arises
activities, and resources) is sensed and interpreted from the unpredictability of solutions from service
by the agent on the basis of predefined scheme and providers (e.g., availability, capacity, and price),
rules. In case that information is unanticipated or the constraints on the services (e.g., time and cost
comes as a complete and total surprise, it will be constraint), and interdependencies among the ser-
sent to human manager for manual processing. vices. A service solution to an individual service
Moreover, AOC supports prediction of future involved in an integrated process may not have
state of the environment for purpose of proactive a view of the whole service, very often resulting
actions. Different from passive response to cur- in incoherent and contradictory hypotheses and
rent events, proactive behavior has an orientation actions (Wang et al., 2006b).
to the future, anticipating problems and taking To deal with the problem, AOC can be used
affirmative steps to deal with them rather than for decentralized decision making and coordina-
reacting after a situation has already occurred. It tion. In process integration, decision-making and
refers to the exhibition of goal-oriented behaviors coordination among services can be modeled as
by taking initiatives. a distributed constraint satisfaction problem, in
which solutions and constraints are distributed
Flexible resource coordination (r) into a set of services and to be solved by a group
of agents (brokers) on behalf of service requesters
As discussed, the rise of Internet-mediated e- and providers. In this context, service-based pro-
Business brings the era of demand-driven and cess integration is mapped as an agent-mediated
resource-based soft connections of business orga- distributed constraint satisfaction or optimiza-
nizations. A business process can be dynamically tion problem. Individual services are mapped to
established by connecting or composing services variables, and solutions of individual services
provided by different organizations. SOA provides are mapped to values. A distributed constraint
a real platform for resource selection and alloca- satisfaction or optimization problem consists of a
tion in order to implement seamless and flexible set of variables, each assigned to an agent, where
integration of business processes over the Internet. the values of the variables are taken from finite
However, it is a complex problem to search and discrete domains. Finding a global solution
appropriated services from a large number of re- to an integrated process requires that all agents
sources as well as schedule and coordinate them find the solutions that satisfy not only their own
1076
Challenges and Solutions for Complex Business Process Management
1077
Challenges and Solutions for Complex Business Process Management
Hammer, M., & Champy, J. (1993). Reengineer- Kumar, K., van Fenema, P. C., & von Glinow, M.
ing the corporation: A manifesto for business A. (2007). Offshoring and the global distribution
revolution. London: Brealey. of work: Implications for task interdependence
theory and practice. In First Annual Research
Holland, J. (1995). Hidden order: How adapta-
Conference and Workshop on Offshoring. North
tion builds complexity. Cambridge, MA: Perseus.
Carolina
Huhns, M. N. (2002). Agents as Web ser-
Leymann, F., Roller, D., & Schmidt, M. T. (2002).
vices. IEEE Internet Computing, 6(4), 93–95.
Web services and business process management.
doi:10.1109/MIC.2002.1020332
IBM Systems Journal, 41(2), 198–211.
Jennings, N. R., Faratin, P., Norman, T. J., O’Brien,
Melão, N., & Pidd, M. (2000). A conceptual frame-
P., & Odgers, B. (2002). Autonomous agents for
work for understanding business processes and
business process management. International
business process modeling. Information Systems
Journal of Applied Artificial Intelligence, 14(2),
Journal, 10(2), 105–129. doi:10.1046/j.1365-
145–189.
2575.2000.00075.x
Kammer, P. J., Bolcer, G. A., Taylor, R. N., Hi-
Mintzberg, H. (1979). The structuring of organi-
tomi, A. S., & Bergman, M. (2000). Techniques
zations. NJ: Prentice Hall.
for supporting dynamic and adaptive workflow.
Computer Supported Cooperative Work, 9(3-4), Mowshowitz, A. (1997). Virtual organization.
269–292. doi:10.1023/A:1008747109146 Communications of the ACM, 40(9), 30–37.
doi:10.1145/260750.260759
Kumar, A., & Zhao, J. L. (2002). Workflow support
for electronic commerce applications. Decision Petrie, C. J., & Bussler, C. (2003). Service
Support Systems, 32(3), 265–278. doi:10.1016/ agents and virtual enterprises: A survey. IEEE
S0167-9236(01)00114-2 Internet Computing, 4, 68–78. doi:10.1109/
MIC.2003.1215662
Kumar, K. (2001). Technology for support-
ing supply chain management: Introduction. Rumbaugh, J. (1991). Object-oriented modeling
Communications of the ACM, 44(6), 58–61. and design. Englewood Cliffs, N.J.: Prentice Hall
doi:10.1145/376134.376165
Sanchez, R., & Mahoney, J. T. (2003). Modular-
Kumar, K., & Narasipuram, M. M. (2006). Defin- ity, flexibility, and knowledge management in
ing requirements for business process flexibility. In product and organization design. In R. Garud, A.
Seventh Workshop on Business Process Modeling, Kumaraswamy, & R.N. Langlois (Eds), Managing
Development, and Support. CAiSE in the modular age: Architectures, networks, and
organizations (pp. 362-389). Blackwell Publish-
Kumar, K., & van Dissel, H. (1996). Sustainable
ing Limited.
collaboration: Managing conflict and cooperation
in interorganizational systems. MIS Quarterly, Schilling, M. A. (2003). Towards general modular
20(3), 279–300. doi:10.2307/249657 systems theory and its application to interfirm
product modularity. In R Garud, A. Kumaraswamy,
& R.N. Langlois (Eds.), Managing in the modular
age: Architectures, networks, and organizations
(pp. 172-216). Blackwell Publishing Limited.
1078
Challenges and Solutions for Complex Business Process Management
Simon, H. A. (1977). The new science of manage- Wang, M., & Wang, H. (2002). Intelligent agents
ment decision. Englewood Cliffs, N.J.: Prentice- supported flexible workflow monitoring system. In
Hall Proceedings of the14th International Conference
on Advanced Information Systems Engineering
Simon, H. A. (1981). The sciences of the artificial.
(CAiSE’02) (LNCS 2348, pp. 787-791).
Cambridge, MA: MIT Press.
Wang, M., & Wang, H. (2005b). Intelligent agent
Simon, H. A. (2003). The architecture of com-
supported business process management. In Pro-
plexity. In R Garud, A. Kumaraswamy, & R.N.
ceedings of 38th Hawaii International Conference
Langlois (Eds), Managing in the modular age:
on System Sciences (HICSS-38). IEEE Computer
Architectures, networks, and organizations (pp.
Society Press.
15-44). Blackwell Publishing Limited.
Wang, M., & Wang, H. (2006a). From process
Szyperski, C. (2002). Component software:
logic to business logic - A cognitive approach
Beyond object-oriented programming. Bosoton:
to business process management. Information
Addison-Wesley Professional.
& Management, 43(2), 179–193. doi:10.1016/j.
van der Aalst, W. M. P., & van Hee, K. M. (2002). im.2005.06.001
Workflow management: Models, methods, and
Wang, M., Wang, H., & Xu, D. (2005a). The design
systems. Cambridge, MA: MIT Press.
of intelligent workflow monitoring with agent
Volberda, H. W. (1999). Building the flexible firm: technology. Knowledge-Based Systems, 18(6),
How to remain competitive. Oxford University 257–266. doi:10.1016/j.knosys.2004.04.012
Press
Weske, M. (1998). Object-oriented design of
Wang, M., Cheung, W. K., Liu, J., Xie, X., & a flexible workflow management system. 2nd
Lou, Z. (2006b). E-Service/process composition East-European Symposium on Advances in Da-
through multi-agent constraint management. tabases and Information Systems (LNCS 1475,
International Conference on Business Process pp. 119-130).
Management (BPM 2006) (LNCS 4102, pp.
Weske, M. (2001). Formal foundation and concep-
274-289).
tual design of dynamic adaptations in a workflow
Wang, M., & Kumar, K. (2008a). Developing flex- management system. In Proc. HICSS-34. Maui,
ible business process management systems using Hawaii
modular computing technologies. In Proceedings
Wolters, N. J. (2002). The business of modularity
of Eighth Global Conference on Flexible Systems
and the modularity of business. PhD Thesis, Eras-
Management (GlOGIFT-08). Hoboken, NJ.
mus Research Institute of Management, Rotterdam
Wang, M., Liu, J., Wang, H., Cheung, W., & Xie, X.
Wooldridge, M., & Jennings, N. R. (1999).
(2008b). On-demand e-supply chain integration:
software engineering with agents: Pitfalls and
A multi-agent constraint-based approach. Expert
pratfalls. IEEE Internet Computing, 3(3), 20–27.
Systems with Applications, 34(4), 2683–2692.
doi:10.1109/4236.769419
doi:10.1016/j.eswa.2007.05.041
1079
Challenges and Solutions for Complex Business Process Management
This work was previously published in Handbook of Research on Complex Dynamic Process Management: Techniques for
Adaptability in Turbulent Environments, edited by Minhong Wang and Zhaohao Sun, pp. 1-22, copyright 2010 by Information
Science Reference (an imprint of IGI Global).
1080
1081
Chapter 4.13
Multiple-Step Backtracking
of Exception Handling
in Autonomous Business
Process Management
Mingzhong Wang
University of Melbourne, Australia
Jinjun Chen
Swinburne University of Technology, Australia
Kotagiri Ramamohanarao
University of Melbourne, Australia
Amy Unruh
University of Melbourne, Australia
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
1082
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
Figure 1. PRS-style structure for BDI agent. (Adapted from (d’Inverno, Luck, Georgeff, Kinny, & Wool-
dridge, 2004))
1083
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
Figure 2. Event driven and means-end reasoning for BDI system execution
2004) and 3APL (Dastani, Riemsdijk, Dignum, other extreme, backtracking is applied to go back
& Meyer, 2003). through all the work that previously been done
The plan matcher will retrieve an event from in planning in a depth-first searching manner.
the queue and search through the plan library to Despite the feasibility of backtracking requires
find the set of plans which can handle this event a rigid execution tree structure, it becomes the
in that certain situation (determined by its beliefs). most widely applied for exception handling in
There might be more than one suitable plan found, multi-agent systems because it fits nicely to the
and the plan selector will choose one of them and hierarchical program architecture and enables
append it into the intention stack. Finally, the systematic and platform-level recovery support.
intention is executed, which results in internally To back track one step in the execution tree
updating the BDI state, including beliefs, desires needs some compensation. Many existing agent
and intentions, or externally operating to sense programming languages provide some basic
and change the environment. support for modeling exceptions and their com-
Since agents usually work in open, dynamic and pensations. They usually use a specified event to
error-prone environment, they are more liable to trigger a new plan to define compensating actions.
conflicts and eventually failures. Without dealing For example, 3APL (Dastani et al., 2003) allows
with these problems appropriately, agent system using plan revision rules to define compensating
can only remain as an experimental toy. Therefore, actions for a specified event. dMARS (d’Inverno
substantial effort is carried out with attentions et al., 2004) allows encoding of maintenance
to automate exception handling and execution conditions, as well as success and failure actions,
resumption, thus making agent programming a into a task definition. However, all of them lack
serious platform to developers for developing a systematic way to organize and manage those
complex applications. exceptions and compensations, making complex
On one extreme, replanning is proposed to have system design and interaction management dif-
a fresh start by throwing away all the work that ficult and sometimes impossible.
has been previously done in planning. However, Some researchers propose to apply trans-
it is too computationally expensive and rarely action concepts to help build systematic and
practical because it requires complete knowledge automatic platform for robust agent execution.
about the environment and business domain and TOMAS (Ramamohanarao, Bailey, & Busetta,
involves a lot of programming efforts. On the 2001) applies a nested transaction model as the
1084
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
1085
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
ing has happened. However, ACID transactions each level starting from that ancestor (Kamathy
require an activity to obtain full control of, and & Ramamritham, 1996).
exclusive access to, its resources. In contrast to Another proposal is called sphere of joint
database applications where transactions can lock compensation (Kamathy & Ramamritham, 1996).
records to get exclusive access, and can restore any A collection of tasks in a workflow is grouped
data from history, workflow tasks in nature usu- into a sphere S such that either all the tasks of S
ally work in an open environment and operate on complete successfully or all of them are compen-
physical objects where actions “always commit” sated. Thus a sphere is basically a failure-atomic
and it is impractical or even impossible to satisfy unit. Spheres can overlap and be nested. Actually
either requirement. For example, a flight reserva- spheres are relaxed transactions with the property
tion task cannot lock the schedule to avoid flight of atomicity and consistency. The problem is how
changes or restore a bank account to the original to define the scope of the sphere.
amount by itself when cancelling a booking. Although these methods can guarantee the
Thus, traditional transaction mechanisms need to correctness of the system execution, they do not
be extended for an open and shared environment consider issues related to the context changes
before they can be applied to workflow systems. arising from dynamic and complex environment.
The extended transaction models in workflow For example, when a branch of the execution tree
systems usually focus on the inter-dependency fails, other possible solutions need to wait until the
among the participating tasks. The overall recovery completes. If the running environment
workflow process is treated as a big transaction for recovery has become different from initial
which organizes all participating tasks in a tree execution or design assumption, the overall sys-
structure to ensure the criterion of correctness and tem is taken down even though sometimes there
reliability. Each task node is considered as sub- are clear other approaches existing to continue
transaction which may not be required to hold all the execution for achieving the business goals.
ACID properties. The relationships among these As such, a more flexible recovery mechanism is
sub-transactions are depicted by task dependen- required to organize transactional recovery and
cies which can ensure the execution order and forward execution in complex interacting systems.
execution correctness.
Based on the dependencies among tasks, the A Motivating Example
workflow management system can generate plans
to execute. Theoretically when exceptions occur, A travel management system with the goal of pre-
the system can retrieve all affected tasks and co- paring a holiday for the customers is illustrated in
ordinate them to handle the exceptions together. Figure 3. All alternatives at the choice points are
Generally, the failure of a task at a given level may eligible for selection. Let us assume the system
or may not affect its parent step. If it does, then chooses California as the tour destination from
the parent is to be rolled back and the procedure all three possible places. Then it tries to book the
is repeated until a parent task is reached that is not flight and the hotel. After that, it chooses Sailing
affected. From this point on, a parent task may try as the entertainment plan. Finally, it begins to rent
an alternative child step to compensate or restart. a yacht. Unselected branches during the execution
Then the overall process is a two-phase remedy are cut off to simplify the presentation.
where the first phase, called the bottom-up phase, If yacht renting fails, traditional backtracking
determines the highest ancestor task affected by mechanism will go back to the choice point of
the failure of the current task and a second phase, Entertainment and try Disneyland. However, if
called the top-down phase, undoes the changes at tickets for the Disneyland are sold out, the system
1086
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
1087
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
The application domain has a predefined set achieve the goal of holiday arrangements for the
of business rules. For a certain goal in a specified system than to undo its payment of the booking
environment, it is broken down into sub-goals deposit.
by matching it with corresponding plans. Each Principle 2. Cleaning up a side effect of a
subgoal can be achieved by delegating to some failed selection Scp (i ) can have lower priority
agents, or being decomposed further with appropri- compared with trying its alternatives, or achieving
ate plans. Compared with conventional workflow the system’s goal.
systems, the proposed BPM execution model is Compensation is usually used to release the
more dynamic and adaptive to the environment consumed resources which are necessary for
because the execution tree is constructed at run other attempts. However, it is the approach, not
time according to the real situation. For the pur- the purpose. All unrelated compensations can be
poses of the approach we describe in this chapter, processed in parallel with or even after the achieve-
we can assume without loss of generality a plan ment of the goal to improve system throughput
is a task to achieve. Thus, we will use task and and efficiency. The applicability of this principle
plan interchangeably. is based on the fact that system plans are dynami-
During the plan matching process for a goal, cally composed when their events are triggered
there may exist more than one feasible plan. Then, and their preconditions are satisfied. However,
it is said the system has a choice point which is in resource-bounded situation compensation may
a key concept in our model. have a higher priority.
Definition 1. A choice point of the execution Principle 3. If the system is consistent, any
tree records the applicable plans found by plan plan in its plan library can be selected for execu-
matcher to deal with a certain goal. It is denoted as tion if the plan preconditions are met.
cpgoal = {p1, p2 , , pn } where pi is an applicable These rules allow us to continue system execu-
plan. Scp (i ) stands for the selection of plan pi tion at any legal choice point after current execu-
by plan selector. tion encounters interruption. In other words, it is
Because the BPM system is modeled and built not necessary to conservatively roll back before
by following BDI agent systems, its execution trying other paths. The execution flow just needs
shares the same features as multi-agent systems. to “jump” back to an appropriate choice point and
Principle 1. After a plan has made a change continue. We will give a more detailed description
to the environment, if the whole system is still in of this concept in the next section.
a semantically consistent state satisfying system
constraints, this state is acceptable even though
the actions are later shown to be futile in working FLEXIbLE EXcEPtION
towards a goal. HANDLING MODEL
This rule allows the execution of the BPM
system to be treated in terms of independent small We first explain the multiple-step backtracking
plan fragments. Each such fragment can be en- mechanism which maintains a tradeoff between
capsulated in a transaction which can externalize replanning and rigid backtracking for exception
its result after termination without causing long handling and recovery. We then describe how we
running transactions. For example, even if the can incorporate the open nested transaction model
travel management system cannot arrange any to encapsulate plan execution and backtracking
entertainment in California, the existence of flight to gain the system level support for concurrency
and hotel booking does not prevent it from trying control and automatic recovery.
other options. Moreover, it is more important to
1088
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
intermediate steps according to the evaluation of new selected branch ( Scp (s ) | i £ n ) may have
i
the real time condition. Therefore, even in case three types of coordination with respect to their
step-by-step backtracking is invalid because of the resource share or competition. Different type of
environment changes, the system can still survive coordination leads to different processing strategy.
by recovering and continuing the execution flow
from a higher level of control. This section at first • Scp ( f ) does not consume any resources
n
introduces and defines the key concepts related which will be used by Scpi (s ) . That is,
to the flexible backtracking mechanism, and then Scp ( f ) has no access to the resources
shows the details about the backtracking algorithm n
which must be guaranteed as precondi-
for the recovery. Finally, the proposed approach tions of Scp (s ) . In this case, Scp (s ) can be
is summarized and compared with the generally i i
started directly prior to addressing the fail-
applied handling methods. ure. However, there could be a background
thread reclaiming the resources consumed
Key Concepts for Multiple- by Scp ( f ) .
Step Backtracking n
• Scp (s ) shares some resources with Scp ( f )
i n
However, there are still enough resources
The system can use the knowledge of its set of
choices at each choice point to decide which sub- left for Scp (s ) after the consumption by
i
stitutable plan to choose if exceptions occur later. Scp ( f ) . The handling method of this case
n
Definition 2. A choice point stack contains the is the same as the first type. As shown in
choice points the system has met chronologically. Figure 4 (a) and (b), the execution can
It is denoted as cp _ stack = {cpn , cpn −1, , cp1 }
jump directly to arrange travel at different
where cpi is the choice point occurred at time i .
destination because flight and hotel book-
When there is a failure of execution, it must
ings have not spent anything, or only spent
happen at one branch of cpn . The system can look a small amount of money. The refund pro-
through its stack for another applicable branch of cess can be ignored, or be carried out in
a certain past choice point to continue achieving parallel with the goal achieving or even af-
its goal. If possible, the new selected branch can ter the goal of the agent has been achieved.
be identical to the failed one as a retry. We call
• Scp (s ) shares some resources with Scp ( f )
this process a “jump”. i n
of which too much has been used for
1089
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
end if
transaction structure tailored for BDI agents, end foreach
thus enabling the build of robust and reliable end for
BPM systems with architecture-level support of }
Func jump() {
ifsystem execution failsthen
As shown in Algorithm 1, the overall execution ifevalAndTry() failsthen
flow of “jump” mainly consists of three parts backOneStep();
end if
operating on the data structure of choice point end if
stack. (Table 1) }
The choice points (including their sets of choic-
es) encountered during the execution are stored
into the stack as one static data structure of the ing the execution in accordance with the traversal
BPM system. The stack is built and updated dur- along its execution tree structure. As the system
1090
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
traverses down the execution tree, it pushes the a new selected branch. backOneStep() randomly
choice point it meets into the stack. When there selects a branch at the last choice point and cre-
is a failure preventing forward execution, the ates new subgoals to achieve its preconditions if
execution jumps back to a previous choice point. “jump” can not find an appropriate substitutable
Meanwhile, all choice points coming after the se- plan. This step relies on the means-end reasoning
lected one are removed from the stack altogether. ability of BDI agents, and suspends the forward
Note that the selected choice point becomes the execution of the agent until compensation or other
top element of the stack to indicate the current measures are taken. The compensation process
execution flow. These operations guarantee the generally comes from two methods. One is to
correctness of the following theorem. compensate back step by step like sagas (Hec-
Theorem 1. If a choice point cpi appears in tor & Kenneth, 1987); another is to generate a
the stack, all and only its ancestor choice points compensation plan for all the backtracked steps
are present in the stack at the same time. altogether (Eiter, Erdem, & Faber, 2004). With
Proof. Let cpa be the ancestor choice point the choice point stack, the method jump() can be
of cpi . Only two possibilities can result in that added into the system deliberation cycle (Figure
cpa is not present in the stack: cpa has not been 2) as a general exception handling mechanism.
For the failed branch, its compensation may
visited at all or cpa has been jumped by. In the
be carried out in parallel or after the execution of
first case, cpi should also not be visited, and in
its alternatives. Thus, the result of the compensa-
the latter case cpi should also be jumped by.
tion may falsify the validity of the plan chosen in
However, this is conflict to the fact that cpi is in “jump” process.
the stack. Therefore, all ancestor choice points of However, if the compensation does not over-
cpi are in the stack. correct, but only partially or completely recover
Let cp j be a choice point in the stack which is existing side effects, the order of execution will
not the ancestor of cpi , then cp j can only either not affect the final result. Non-over-correction
be a descendant of cpi , or have no relationship is denoted as comp(r ) £ invl (r ) where invl (r )
with cpi at all. In the first case that cp j is the represents the amount of involved resource r in
descendant of cpi , cpi can not be the top ele- normal execution and comp(r ) is the reversal
ment of the stack because cp j should be visited of r in the corresponding compensation. For
later than cpi . In the second case, cp j is not on example, if there is a refund for flight booking,
the passenger will not pay more fines than the
the path from the root to cpi . In other words, cp j
airfare, nor the air company refund more than
can not be visited since it is not reachable in the
the airfare.
execution towards cpi , thus being unable to be in
Theorem 2. The result of compensation to the
the stack. Therefore, only ancestor choice points
failed branch ( Scp ( f ) ) will not affect the valid-
of the top element are in the stack.
ity of the execution of the new selected branch
buildStack() is invoked by the plan selector in
Figure 2 to build up the choice point stack for the ( Scp (s ) ) if the compensation has the feature of
“jump” process. evalAndTry() is the core method non-over-correction.
which searches through the stack to find a quali- Proof. If the compensation occurs before any
fied plan to run in case of exception. This method other progress is made, it can not invalidate the
utilizes event-driven feature of BDI agents. During latter “jump” process.
this part, compensation to a failed branch may be For the compensation to occur after
carried out in parallel with or after the execution of “jump”, the initial resources r and the mini-
1091
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
mum requirement rmin for Scp ( f ) and Scp (s ) we introduce the operation evalAndTry(), which
satisfy r ³ rmin . Otherwise, they cannot be evaluates each choice point to find if there is a di-
saved as choice point options in the stack. If rectly applicable plan. If one is found, it is selected
Scp ( f ) consumes resources cons(r ) , the se- for execution without waiting for the completion
of compensation. So, the backtracking in our
lection of Scp (s ) means r − cons(r ) ≥ rmin .
approach follows the journey of evalAndTry() ||
Thus, the compensation is unable to in-
compensate(). If this procedure fails to find an
validate the execution of Scp (s ) after releas-
applicable plan from any branch of the choice
ing some resources back. Conversely, if
point stack, the execution pattern is converted to
Scp ( f ) produces resources prod (r ) , we get
compensate(nearestCP ) || try() . The compen-
r + prod (r ) − comp(r ) ≥ r ≥ rmin under the sation must complete before try() if and only if
feature of non-over-correction after the com- the previous execution has consumed too much
pensation. Then the precondition of Scp (s ) is resources to allow continuation. Our approach will
still guaranteed. have higher throughput because compensation and
the substitutable plan can execute in parallel, and
Relation to Existing Approaches goal achievement becomes more efficient.
The approach implicitly makes the assump-
There are three primary possible strategies for tion that certain domain knowledge, such as goal
recovery: replanning, which discards previous preconditions and action effects, can be modeled
work; plan patching, which continues the current with sufficient accuracy for such decisions. If this
execution plan after repairing the cause of failure; were not the case in some contexts, compensa-
and backtracking, which tries all alternatives in a tion can make subsequent actions more robust,
depth-first searching manner. since it helps avoid interactions that are not well
Replanning should be the last resort because modeled. Thus doing the compensation first can
it is expensive to deploy. Plan patching is the be adopted as the default handler to make the
most preferable approach; however, it is usu- system more robust.
ally not available because of uncontrollability In fact, we can make some modifications to
of the environment. Backtracking remains as the last two functions of Algorithm 1 to simulate
the most feasible strategy which can be carried different backtracking strategies. For example,
out systematically and protects existing work as if evalAndTry() is constrained so that it will not
much as possible. Moreover, it can be mapped return a directly executable plan, our approach
to nested transaction structures and fulfilled by becomes very similar to the standard one.
compensation. In case no eligible plans are found from the
Our model is essentially a variant of backtrack- choice point stack, the system will make the replan
ing strategy to support and enable flexible recovery. from the existing situation to continue the execu-
However, we do not follow the standard backtrack- tion, as described in the function backOneStep().
ing journey of compensate(nearestCP ) - try() Compared with merely replanning, our approach
where compensate(nearestCP ) compensates uses the previous plan as a guide for further plan-
the works done after the nearest choice point, ning; therefore tries to keep finished work as much
and try() will select a different branch to run. as possible to be valid.
Here, “–” denotes sequential execution while “||” Our method is more general than the conser-
denotes parallel. vative backtracking when plans in different tree
Instead, we argue that achieving the goal has branches become more and more independent.
higher priority than doing compensation. Thus, The introduction of a transaction manager also
1092
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
frees programmers from considering low-level drawbacks of applying open nested transaction
error-prone details of concurrency control. (Eiter, directly into BPM systems, such as the requirement
Erdem, & Faber, 2004) describes a similar method of a rigid and static execution structure.
which recovers from execution problems by back- A plan may contain complex internal structure
tracking to a past nondeterministic choice point, with respect to the goal decomposition, but it is its
from which the system tries to “repair” the causes interfaces, not its implementation details, that are
of failure and then continues. However, their aim the concerns of the user. The internal execution
is to generate a reverse plan to compensate back of the plan is a black box for its caller.
to a previous point and retry from there, which Definition 4. A plan is an atomic unit of
also follows the compensate-then-retry pattern. work from the observer’s point of view. Before
Their approach can be adopted to generate a the plan p is performed, it is in the start state
compensation plan for the failed execution path. S 0 , and after it finishes, it is in the end state Sn
denoted as S 0 p
→ Sn .
transactional Execution Figure 5 shows the interface of a plan. Plan p
and its state changes are constrained by enabling
The open nested transaction model will be inte- conditions (EC), invariants (I) and termination
grated into the BPM execution platform to provide conditions (TC). p can begin to execute if and
system level support of automatic recovery and only if its enabling conditions are satisfied, that
concurrency control. The proposed platform brings is S 0 ⊨ EC Ù I where ⊨ means satisfying. The
the following benefits: change from S 0 to Sn is consistent if the invari-
ants of the plan are satisfied. The termination
• It guarantees modularity and failure ato- conditions specify the desired outcome, or cor-
micity of plans. Thus, programmers only rectness criteria, of executing p. It is also possible
need to deal with two situations: the plan that exogenous events, unanticipated interactions
succeeds completely or fails without side between agents, or non-deterministic action results
effects. For example, if renting a yacht may cause plan to be aborted when invariants are
fails, the system will return back to the violated. The possible outcomes of p are:
choice point of Entertainment with the
details about the incomplete deal with the
• Consistent if Sn satisfies I, denoted as
yacht company abstracted out.
I (Sn ) Þ Sn ⊨ I .
• It enforces automation of exception han-
• Inconsistent if Sn dissatisfies I, denoted as
dling and execution resumption. For ex-
ample, after returning back to the choice ¬I (S n ) ⇒ Sn ⊭ I .
point of Entertainment automatically, the • Correct if Sn is consistent and satis-
system can retry renting again or choose to fies TC, denoted as TC (Sn ) Þ Sn ⊨
visit Disneyland instead. TC ∧ I ⊆ TC .
• The nested structure of transactions also • Consistent but not correct if Sn is con-
matches the tree structure of plan composi- sistent but not satisfies TC, denoted as
tion elegantly. It provides inter- and intra- ¬TC (Sn ) ∧ I (Sn ) ⇒ (Sn ⊭ TC ) Ù (Sn ⊨
task level support for distribution and con- I ) ∧ I ⊂ TC .
currency control.
Two kinds of plan models, an atomic plan and
The flexible backtracking recovery strategy a composite plan, have been discussed above, they
introduced in this chapter also helps to avoid the
1093
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
map to the same underlying model. Whether a plan cause it is fully integrated with the Java platform
is viewed as atomic, or composed of other plans, and programming environments, 3APL-M is a
depends upon the abstraction level at which it is good prototyping tool for cognitive agents. Fur-
considered. If we need to access a plan’s internal ther, programs written in 3APL-M can be easily
organization, we model it as compositional. If migrated into 3APL because they share similar
we just need to use its functionality as a building underlying language concepts and programming
block, we model it as an atomic plan. constructs.
To avoid conflicts when accessing the shared JBoss Transaction Service is employed as the
resources such as bank account or available hotel transactional execution manager, which guaran-
rooms, traditional lock mechanisms are applied. tees the isolation of parallel plans. Its TxCore
However, it is a requirement that the lock is ob- transaction engine supports both closed and open
tained only when the resource is visited and re- nested transaction and presents programmers with
leased as soon as possible after the visit. Otherwise, a toolkit of Java classes which can be invoked by
it is likely to cause the problem of long-running 3APL-M agents directly to obtain desired proper-
transactions which result in low efficiency and ties, such as persistence and concurrency control.
even deadlock. As long as the system is consistent, As shown in Figure 3, a root goal of the system
cascading rollback is avoided. is decomposed into subgoals recursively, result-
ing in a tree structure. Each subgoal is achieved
through a transaction-like function as shown
IMPLEMENtAtION AND in Algorithm 2. They are then organized in an
EXPErIMENts open nested transaction structure. Whenever an
exception occurs, the execution of that transac-
We have built a prototype of reactive workflow tion is taken over by the function jump() shown
using 3APL-M (Koch, 2005) and JBoss Transac- in Algorithm 1. jump() will fork two threads: one
tion Service (formerly Arjuna Transaction Service) is used to continue the execution at an earlier
(JBoss Inc., 2006) to simulate the travel arrange- choice point, and the other is used to compensate
ment example. the failed plan. (Table 2)
3APL-M is a lightweight version of 3APL Because the rollback operation of traditional
(Dastani et al., 2003) and distributed under the database transactions is usually not applicable in
GNU GPL. Its source code remains much simpler dynamic and open environments, it is not invoked in
by leaving out supplementary components of the prototype. Instead, if jump() succeeds, the failed
3APL, such as integrated development environ- task is allowed to commit, and its side-effects will be
ment. It behaves as a programming library whose undone by its counterpart compensating transaction.
API allows a Java application to call 3APL logic The “jump” algorithm is opportunistic, as
and deliberation structures, and vice-versa. Be- it makes the assumption that the failure of one
1094
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
1095
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
1096
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
tures of BDI agents, the open nested transaction JBoss Inc. (2006). JBoss transactions 4.2.2 trans-
model is tightly integrated into the BPM system. action core programmers guide. Retrieved May
Both BDI data structures and the deliberation 7, 2008, from JBoss Inc.: http://labs.jboss.com/
cycle are leveraged to maximize the functionality jbosstm/docs/4.2.2/manuals/pdf/core/Program-
of transaction management. mersGuide.pdf
Jennings, N. R. (2001). An agent-based ap-
proach for building complex software systems.
rEFErENcEs
Communications of the ACM, 44(4), 35–41.
d’Inverno, M., Luck, M., Georgeff, M. P., Kinny, doi:10.1145/367211.367250
D., & Wooldridge, M. (2004). The dMARS archi- Kamathy, M., & Ramamritham, K. (1996).
tecture: A specification of the distributed multi- Correctness issues in workflow management.
agent reasoning system. Journal of Autonomous Distributed Systems Engineering, 3, 213–221.
Agents and Multi-Agent Systems, 9(1-2), 5–53. doi:10.1088/0967-1846/3/4/002
doi:10.1023/B:AGNT.0000019688.11109.19
Klein, M., Rodriguez-Aguilar, J. A., & Dellarocas,
Dastani, M., Riemsdijk, B. v., Dignum, F., & C. (2003). Using domain-independent exception
Meyer, J.-J. C. (2003). A programming language handling services to enable robust open multi-
for cognitive agents goal directed 3APL. In Pro- agent systems: The case of agent death. Autono-
gramming Multi-Agent Systems (pp. 111-130). mous Agents and Multi-Agent Systems, 7(1-2),
Springer Verlag. 179–189. doi:10.1023/A:1024145408578
Ehrler, L., Fleurke, M. K., Purvis, M., & Savari- Koch, F. (2005). 3APL-M: Platform for light-
muthu, B. T. R. (2006). Agent-based workflow weight deliberative agents. Retrieved 7 May, 2008,
management systems (WfMSs). Information from http://www.cs.uu.nl/3apl-m/docs/3aplm-
Systems and E-Business Management, 4(1), 5–23. manual.pdf
doi:10.1007/s10257-005-0010-9
Nagi, K. (2001). Transactional agents: Towards
Eiter, T., Erdem, E., & Faber, W. (2004). Plan a robust multi-agent system. Berlin, Heidelberg:
reversals for recovery in execution monitoring. In Springer-Verlag.
10th International Workshop on Non-Monotonic
Reasoning (pp. 147-154). Ramamohanarao, K., Bailey, J., & Busetta, P.
(2001). Transaction oriented computational
Georgakopoulos, D., Hornick, M. F., & Manola, models for multi-agent systems. In Proceedings
F. (1996). Customizing transaction models and of 13th IEEE International Conference on Tools
mechanisms in a programmable environment with Artificial Intelligence (ICTAI) (pp. 11-17).
supporting reliable workflow automation. IEEE IEEE Computer Society, Washington, DC, USA.
Transactions on Knowledge and Data Engineer-
ing, 8(4), 630–649. doi:10.1109/69.536255 Rao, A. S., & Georgeff, M. P. (1995, June 12-14,
1995). BDI agents: From theory to practice. In
Gray, J., & Reuter, A. (1993). Transaction pro- Proceedings of the First International Confer-
cessing: Concepts and techniques. San Francisco: ence on Multiagent Systems (pp. 312-319), San
Morgan Kaufmann. Francisco, California, USA.
Hector, G.-M., & Kenneth, S. (1987). Sa-
gas. SIGMOD Record, 16(3), 249–259.
doi:10.1145/38714.38742
1097
Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management
Souchon, F., Dony, C., Urtado, C., & Vauttier, S. objectives. It has four key data structures: beliefs,
(2004). Improving exception handling in multi- desires, intentions and plans.
agent systems. In Software Engineering for Multi- Choice Point: For a certain goal of the system,
Agent Systems II (Lecture Notes in Computer if plan matcher finds more than one eligible plan,
Science Vol. 2940) (pp. 167-188). Springer Verlag. the corresponding node in the execution tree is
marked as a choice point.
Tripathi, A., & Miller, R. (2001). Exception
Choice Point Stack: A choice point stack
handling in agent-oriented systems. In Advances
contains the choice points the system has met
in exception handling techniques (LNCS 2022,
chronologically.
pp. 128-146).
Consistent: The plan execution is consistent
Unruh, A., Bailey, J., & Ramamohanarao, K. if it terminates at state Sn in which invariants are
(2004). Managing semantic compensation in a satisfied.
multi-agent system. In International Conference Correct: The plan execution is correct if it
on Cooperative Information Systems (LNCS terminates at state Sn in which both invariants and
3290). termination conditions are satisfied.
Jump: A jump is a continuation of the system
Weikum, G., & Schek, H.-J. (1992). Concepts
execution flow at another selectable plan implied
and applications of multilevel transactions and
by elements of its choice point stack.
open nested transactions. In Database transaction
Non-Over-Correction: The compensation
models for advanced applications (pp. 515-553).
process only partially or completely recovers the
San Francisco: Morgan Kaufmann Publishers, Inc.
side effects made by the normal execution. Let
Woolridge, M. (2001). Introduction to multiagent invl (r ) represent the amount of involved resource
systems. John Wiley & Sons, Inc. r in normal execution and comp(r ) is the reversal
of r in the corresponding compensation, then
comp(r ) £ invl (r ) .
Plan: A plan is an atomic unit of work from
KEy tErMs AND DEFINItIONs the observer’s point of view. It is constrained
by enabling conditions (EC), invariants (I) and
BDI agent: A software entity embedded in
termination conditions (TC).
certain environment and behaves reactively to
the changing situation in order to meet its design
This work was previously published in Handbook of Research on Complex Dynamic Process Management: Techniques for
Adaptability in Turbulent Environments, edited by Minhong Wang and Zhaohao Sun, pp. 251-270, copyright 2010 by Informa-
tion Science Reference (an imprint of IGI Global).
1098
1099
Chapter 4.14
A Resource-Based Perspective
on Information Technology,
Knowledge Management,
and Firm Performance
Clyde W. Holsapple
University of Kentucky, USA
Jiming Wu
California State University–East Bay, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Resource-Based Perspective on IT, KM, and Firm Performance
between IT and firm performance. Because the the research models investigating determinants of
return on IT investments seems to be contingent, superior firm performance. Thus, the work would
scholars call for more research into why IT may be of value not only to practitioners striving to
not benefit business, how to make IT effective, achieve and sustain business success, but also to
and what are the key determinants of the success researchers interested in identifying determinants
of IT (Dehning & Richardson, 2002). of better firm performance.
Meanwhile, considerable research attention This study contributes to such investigation.
has been devoted to the importance of KM in More specifically, the purpose of this chapter is to
the rapidly changing, competitive, and dynamic theorize a triangle of relationships among IT, KM,
business environment (Holsapple & Wu, 2008). and firm performance, and to develop a theoreti-
Modern organizations are turning to KM practices cal model with testable hypotheses that improve
and applications to foster the creation, integration, our understanding of the effects of IT and KM on
and usage of knowledge assets that enable them firm performance. The theoretical foundation of
to compete in an increasingly global economy. In this paper is embedded in the resource-based view
light of this, researchers have attempted to provide of the firm and prior work by Holsapple and his
empirical evidence of the strategic consequences colleagues. The current study contributes to the
that KM can bring to organizations (Grant, 1996). literature in a number of ways. First, this study
For example, based on the survey data collected is among the first to recognize that KM may play
from 177 firms, Chuang (2004) finds that greater an important role in the link between IT and firm
KM capabilities are significantly associated performance. Thus, the study may provide a plau-
with greater competitiveness and that social KM sible explanation for why some previous research
resource has a significant impact on competitive has failed to discover a significant relationship
advantage. Similarly, in a survey-based inves- between IT and firm performance. Second, we
tigation of the link between KM activities and examine the determinants of firm performance
competitiveness, Holsapple and Singh (2005) by introducing and employing a new perspective,
observe that the KM activities of interest can be which focuses on the collective impacts of IT and
performed in ways that improve organizational KM. Such a perspective may broaden our approach
competitiveness, and can do so in each/all of four to identifying determinants of firm performance.
ways: enhanced productivity, agility, innovation, Third, we present methods to measure relevant
and reputation. variables. Therefore, the current chapter is useful
Although there exist studies on IT-firm perfor- and effective in guiding future empirical research
mance relationship and on KM-firm performance in this regard. Finally, this study also investigates
link, these studies have paid insufficient attention the relationship between IT and KM, which has
to the full map of relationships among IT, KM, so far received relatively little research attention.
and firm-level return, and have placed relatively The remainder of the chapter is organized as
less emphasis on the collaborative effect of IT follows. In the next two sections, we review the
and KM on firm performance (Wu, 2008). Given state of IT and KM. Then, we present the research
the inseparability of IT and KM, and the strategic model and hypotheses, followed by a section in
importance of the two, a thorough investigation which we discuss methods for measuring the
of both their joint and separate roles in firm per- variables. Finally, we provide a brief summary
formance is necessary. Such investigation would of the contributions provided by this research.
enrich not only the theoretical understanding of
the mechanism for competitive advantage, but also
1100
A Resource-Based Perspective on IT, KM, and Firm Performance
1101
A Resource-Based Perspective on IT, KM, and Firm Performance
and how), while information can be considered as generating new knowledge through derivation
a message focusing on the awareness of something or discovery, acquiring valuable knowledge from
(who and what) (Bennet & Bennet, 2003). Others outside sources, selecting needed knowledge from
contend that modern computer technology can also internal sources, altering the state of knowledge
make sense of situations, learn from its experi- resources, and embedding knowledge into orga-
ences, and derive/discover new knowledge – in nizational outputs (Holsapple & Joshi, 2004).
addition to message handling (Holsapple 2005). In KM is becoming increasingly important and
this vein, knowledge is something that is conveyed prevalent for many reasons. To succeed in today’s
in representations (e.g., linguistic, symbolic, digi- dynamic global economy, organizations must re-
tal, mental, behavioral, material patterns) that are duce their cycle times in production, operate with
usable to some processor (e.g., human mind) and minimum fixed assets and costs, shorten product
can be categorized as being descriptive (character- development time, improve customer service and
izations of the state of some system – who, what, product quality, enhance employee productivity
when, etc.), procedural (characterizations of how and performance, provide innovative products
to do something), or reasoning (characterizations and services, modernize and reengineer business
of logic or causality). In this view, information process, and increase agility and flexibility (Gupta
is one gradation of descriptive knowledge, but it et al., 2004). All these critical business activities
can be operated on by other types of knowledge require continued efforts to acquire, create, docu-
(i.e., procedures and logic). ment, share, and apply knowledge by employees
Holsapple and Joshi (2004, p. 593) define and teams at all organizational levels. Because
knowledge management as “an entity’s system- of the importance of KM to success, organiza-
atic and deliberate efforts to expand, cultivate, tions have invested heavily in it. According to
and apply available knowledge in ways that add IDC, global business spending on KM was rising
value to the entity, in the sense of positive results from $2.7 billion in 2002 to $4.8 billion in 2007
in accomplishing its objectives or fulfilling its (Babcock, 2004). The company also estimated that
purpose.” Thus, KM involves any activities of in the United States, KM spending reached $1.4
1102
A Resource-Based Perspective on IT, KM, and Firm Performance
billion in 2001 and $2.9 billion in 2006, exhibit- study recognizes three categories of KM influ-
ing an average annual growth rate of over 20% ences: managerial, resource, and environmental.
in these five years (Motsenigos & Young, 2002). The study also identifies five major knowledge
KM has also attracted tremendous attention manipulation activities: acquisition, selection,
from researchers. Figure 2 exhibits the trend of generation, assimilation, and emission, as well as
publications for KM as tracked by Google Scholar four major managerial activities that constituted
from 1995 to 2007. For each year, the number of the managerial influences: leadership, coordina-
publications referring to “knowledge manage- tion, control, and measurement.
ment” is shown. Such publications were 513 in
1995, or about 10 per week, and exponentially
increased to 12,600 in 2005, or about 243 per rEsEArcH MODEL
week. This indicates that two weeks’ publications AND HyPOtHEsEs
in 2005 are almost equal to whole year’s publica-
tions in 1995 and that the average annual growth Drawing on the resource-based view (RBV) of the
rate in these 10 years is astonishing – 236%! To put firm and prior empirical findings, we introduce a
this KM trend in perspective, we compare it with conceptual model positing that IT and KM both
the traditional business discipline of operations play an important role in predicting firm perfor-
management (OM), for which Google Scholar mance, and that KM performance is highly related
reports 1,190 publications in 1995, ramping up to IT capability. As depicted in Figure 3, the model
to 3,760 in 2005. Figure 2 also shows the trend includes a new variable – IT-KM Competence,
of publications for OM. which is also conceptualized as a key anteced-
One important research stream in this field ent of firm performance. Below we describe and
focuses on the KM ontology that offers a com- discuss the new variable and the conceptual links
prehensive understanding of KM phenomena in the research model.
(Holsapple & Joshi, 2004). While specifying
the conceptualization of the KM domain, the
Figure 2. Publication trends for knowledge management and operations management. Source: Google
Scholar, March 24, 2008
1103
A Resource-Based Perspective on IT, KM, and Firm Performance
1104
A Resource-Based Perspective on IT, KM, and Firm Performance
1105
A Resource-Based Perspective on IT, KM, and Firm Performance
speed, and connectivity of computers and Inter- performance by allowing companies to achieve six
net technologies can considerably enhance the major business values: (1) generate new revenue
efficiency of a business process, as well as com- from online sales, (2) reduce costs via online trans-
munications and collaboration among the people action, (3) attract new customers through online
responsible for its management, implementation, marketing and advertising, (4) increase customer
and maintenance (Wade & Hulland, 2004). For loyalty and retention by providing Web-based
example, many Fortune 500 companies count on customer service and support, (5) develop new
enterprise resource planning (ERP) systems to Web-based markets and distribution channels, and
reengineer, automate, and integrate their market- (6) develop and sell digital goods such as music
ing, manufacturing, sales, distribution, finance, track, video stream, online game, and flight ticket
and human resource business processes (O’Brien (O’Brien & Marakas, 2007; Wheeler, 2002).
& Marakas, 2007). IT capability can be a key enabler of superior
IT capability used for production and op- firm performance by improving communication
erations can improve performance of companies and collaboration within an organization. IT,
that must plan, monitor, and control inventories, especially network technologies, provides basic
facilities, and the flow of products and services. infrastructure and platform for communication,
Many manufacturing and production systems can coordination, and collaboration among the mem-
efficiently deal with the operation and mainte- bers of business teams and workgroups. In other
nance of production facilities; the establishment words, such IT capability enables employees and/
of production goals; the acquisition, storage, or managers at all levels to work together more
and distribution of production materials; and the easily and effectively by helping them share infor-
scheduling of equipment, facilities, materials, mation with each other, coordinate their individual
and labor required to fulfill an order (Laudon efforts and use of resources, and work together
& Laudon, 2006). Thus, computer-integrated cooperatively on joint projects and assignments
(or –aided) manufacturing enables organizations (O’Brien & Marakas, 2007). For example, knowl-
to reduce the cost and time of producing goods edge experts, technicians, computer specialists,
by simplifying, automating, and integrating all and R&D engineers may form a virtual team for
production and support processes (O’Brien & a KM system development project. The commu-
Marakas, 2007). Moreover, such manufacturing nication, coordination, and collaboration among
helps companies achieve highest product quality the team members may rely heavily on IT-based
by bridging the gap between the conceptual design applications such as email, instant messaging,
and the manufacturing of finished goods. newsgroup, videoconferencing, discussion forum,
IT capability is the key to electronic commerce, and a Web-based database for convenient and im-
which refers to the use of digital technology and mediate access to work-in-progress information.
the Internet to execute major business processes Such improved communication and collaboration
of developing, marketing, selling, delivering, can significantly increase the quality of the team
servicing, and paying for products and services work.
(Laudon & Laudon, 2006; O’Brien & Marakas, Adopting the resource-based view of the firm,
2007). Electronic commerce is transforming information systems researchers suggest that IT
firms’ relationships with customers, employees, capability has an impact on firm performance.
suppliers, distributors, retailers, and partners into For example, Mata and colleagues (1995) point
digital relationships using networks and the In- out that managerial IT skills are scarce and firm
ternet (Laudon & Laudon, 2006; Wheeler, 2002). specific, and thus likely to serve as sources of
More important, it can dramatically improve firm sustained competitive advantage. Focusing on
1106
A Resource-Based Perspective on IT, KM, and Firm Performance
the differential effects of various IT resources is likely to stimulate organizational learning be-
on customer service performance, Ray and col- cause individuals and teams become to believe
leagues (2005) argue that such factors as IT are that learning can help their company to handle
valuable resources because they enable firms to change, uncertainty, and complexity in the ever-
increase the efficiency or effectiveness of business changing business environment. KM helps define
processes compared to what would be the case and specify what should be learned, when it should
if these resources were not exploited. Similarly, be learned, and who should be learning it. KM
Bharadwaj (2000) contends that organizations can also create a culture of peer collaboration and
successful in developing superior IT capability open communication, both leading to a setting
will enjoy superior financial performance by conducive to organizational learning. Moreover,
boosting revenues and/or reducing costs. In line KM activities of knowledge acquisition and
with the resource-based view of the firm and the generation promote organizational learning by
literature, we therefore hypothesize: motivating individuals to obtain new knowledge
from external sources or from existing knowledge,
H2:IT capability is positively related to firm and to make it suitable for future use.
performance. KM can improve firm performance not only
by facilitating organizational learning but also by
KM Performance and encouraging knowledge sharing. A core principle
Firm Performance of KM is to make knowledge sharing easier and
timely, and to encourage employees and manag-
As mentioned earlier, the RBV indicates that ers to work together in ways that will incorporate
knowledge is a unique company resource (Grant, knowledge shared among them. Consequently,
1996). Therefore, KM can also be viewed as such one important goal of KM is to boost productivity
resource important to firm performance because it and efficiency by building a set of methods and
allows the firm to better leverage its knowledge. tools to foster appropriate flows of knowledge.
KM facilitates organizational learning, which For instance, to align with the strategy of pos-
keeps organizations in tune with trends and sessing a platform for quick and easy knowledge
developments in their business, and thus helps sharing on global scale, Xerox developed Eureka,
them perform better. Here, organizational learn- an intranet based communication system, in 1996
ing refers to individual learning, team learning (Barth, 2000). The system is linked with a corpo-
(i.e., learning in small or large groups), or entire rate database that helps service technicians share
organization-level learning (Bennet & Bennet, repair tips. There are more than 36,000 tips in the
2003). All these levels of learning are necessary system which can be accessed by about 19,000
for an organization eager to possess the requisite Xerox technicians via their laptop computers
knowledge to improve performance. From a KM (Barth, 2000). The increasing importance of KM
perspective, organizational learning is critical and also motivates managers to develop a reward and
should be nurtured and made an integral part of personnel evaluation structure favoring knowl-
KM strategy. Organizational learning also reflects edge sharing activities. Reward and punishment
an organization’s capacity to acquire or generate standards help define acceptable behavior. By
the knowledge necessary to survive and compete incorporating desired KM behavior into annual
in its environment (Bennet & Bennet, 2003). performance evaluation, an organization may
KM can change an employee’s attitude toward improve its own performance by encouraging
learning and its impact on an organization’s such critical activities as knowledge sharing and
competitive position (Wu, 2008). Such change foregoing organizational learning.
1107
A Resource-Based Perspective on IT, KM, and Firm Performance
1108
A Resource-Based Perspective on IT, KM, and Firm Performance
1109
A Resource-Based Perspective on IT, KM, and Firm Performance
1110
A Resource-Based Perspective on IT, KM, and Firm Performance
Holsapple, C. W., & Joshi, K. D. (2004). A for- Karimi, J. K., Somers, T. M., & Bhattacherjee, A.
mal knowledge management ontology: Conduct, (2007). The role of information systems resources
activities, resources, and influences. Journal of in ERP capability building and business process
the American Society for Information Science outcomes. Journal of Management Information
and Technology, 55(7), 593–612. doi:10.1002/ Systems, 24(2), 221–260. doi:10.2753/MIS0742-
asi.20007 1222240209
Holsapple, C. W., & Singh, M. (2003). The Laudon, K. C., & Laudon, J. P. (2006). Manage-
knowledge chain model: Activities for competi- ment information systems: Managing the digital
tiveness. In C. W. Holsapple (Ed.), Handbook on firm. NJ: Prentice Hall.
knowledge management 2: Knowledge directions
Liao, C., & Chuang, S. (2006). Exploring the role
(pp. 215-251). Berlin/Heidelberg, Germany:
of knowledge management for enhancing firm’s
Springer-Verlag.
innovation and performance. In Proceedings
Holsapple, C. W., & Singh, M. (2005). Perfor- of the 39th Hawaii International Conference on
mance implications of the knowledge chain. In- System Sciences.
ternational Journal of Knowledge Management,
Mata, F. J., Fuerst, W. L., & Barney, J. B. (1995).
1(4), 1–22.
Information technology and sustained competitive
Holsapple, C. W., & Wu, J. (2008). In search of a advantage: A resource-based analysis. MIS Quar-
missing link. Knowledge Management Research terly, 19(4), 487–505. doi:10.2307/249630
& Practice, 6(1), 31–40. doi:10.1057/palgrave.
Mathiyalakan, S., Ashrafi, N., Zhang, W., Waage,
kmrp.8500170
F., Kuilboer, J., & Heimann, D. (2005, May 15-18).
Huff, S. L., & Munro, M. C. (1985). Informa- Defining business agility: An exploratory study.
tion technology assessment and adoption: A In Proceedings of the 16th Information Resource
field study. MIS Quarterly, 9(4), 327–340. Management Association International Confer-
doi:10.2307/249233 ence, San Diego, CA.
InformationWeek. (2007). Global IT spending to Motsenigos, A., & Young, J. (2002). KM in the
reach $1.48 trillion in 2010, IDC says. Retrieved U.S. government sector. KMWorld. Retrieved
from http://www.informationweek.com/news/ from http://www.kmworld.com/Articles/Edito-
management/outsourcing/showArticle.jhtml;js rial/Feature/KM-in-the-U.S.-government-sec-
essionid=JB4IADNZACBP2QSNDLRSKH0C tor-9397.aspx
JUNN2JVN?articleID=196802764&_reques-
Newbert, S. L. (2007). Empirical research on the
tid=885619
resource-based view of the firm: An assessment
Jones, K. G. (2004). An investigation of activi- and suggestions for future research. Strategic Man-
ties related to knowledge management and their agement Journal, 28(2), 121–146. doi:10.1002/
impacts on competitiveness. Unpublished doctoral smj.573
dissertation, University of Kentucky.
O’Brien, J. A., & Marakas, G. (2007). Introduction
to Information Systems (13th ed.). McGraw-Hill/
Irwin.
1111
A Resource-Based Perspective on IT, KM, and Firm Performance
Ray, G., Muhanna, W. A., & Barney, J. B. (2005). tion processing and handling, such as computer
Information technology and the performance of hardware, software, telecommunications, and
the customer service process: A resource-based databases (Huff & Munro, 1985).
analysis. MIS Quarterly, 29(4), 625–652. IT Capability: Refers to an organization’s
ability to identify IT meeting business needs,
Tanriverdi, H. (2005). Information technology
to deploy IT to improve business process in a
relatedness, knowledge management capability,
cost-effective manner, and to provide long-term
and performance of multibusiness firms. MIS
maintenance and support for IT-based systems
Quarterly, 29(2), 311–334.
(Karimi et al., 2007).
Wade, M., & Hulland, J. (2004). Review: The IT Relatedness: Is defined as “the use of com-
resource-based view and information systems mon IT infrastructures and common IT manage-
research: Review, extension, and suggestions for ment processes across business units” (Tanriverdi
future research. MIS Quarterly, 28(1), 107–142. 2005, p. 317).
IT-KM Competence: Is defined as a firm’s IT
Wheeler, B. C. (2002). BEBIC: A dynamic ca-
and KM ability and resources that are peculiar to
pabilities theory for assessing net-enablement.
achieving and sustaining business success.
Information Systems Research, 13(2), 125–146.
Innovation: Refers to the ability of creating
doi:10.1287/isre.13.2.125.89
valuable and useful new product, new services,
WITSA. (2000). Digital planet 2000. Arlington, new technology, or production process (Liao &
VA: World Information and Technology Services Chuang, 2006).
Alliance. Knowledge: Refers to a fluid mix of framed
experience, values, contextual information, and
Wu, J. (2008). Exploring the link between
expert insight that offers a framework for interpret-
knowledge management performance and firm
ing, assimilating, and integrating new experiences
performance. Unpublished doctoral dissertation,
and information (Davenport & Prusak, 1998).
University of Kentucky.
Knowledge Management: Is “an entity’s sys-
tematic and deliberate efforts to expand, cultivate,
and apply available knowledge in ways that add
KEy tErMs AND DEFINItIONs value to the entity, in the sense of positive results
in accomplishing its objectives or fulfilling its
Agility: Refers to an organization’s ability to purpose” (Holsapple and Joshi 2004, p. 593).
detect changes, opportunities, and threats in its KM Performance: Is the degree to which
business environment and to provide speedy and KM activities harness organizational resources to
focused responses to customers and other stake- achieve the goals or purposes of KM initiatives.
holders by reconfiguring resources and processes A Resource: Can be defined as a rare and
and/or by developing strategic partnerships and inimitable firm-specific asset that adds value to
alliances (Mathiyalakan et al., 2005). firms’ operations by enabling them to implement
Information Technology: Can be defined as a strategies that improve efficiency and effective-
broad range of technologies involved in informa- ness (Karmi et al., 2007).
This work was previously published in Handbook of Research on Contemporary Theoretical Models in Information Systems,
edited by Yogesh K. Dwivedi, Banita Lal, Michael D. Williams, Scott L. Schneberger and Michael R. Wade, pp. 296-310,
copyright 2009 by Information Science Reference (an imprint of IGI Global).
1112
1113
Chapter 4.15
A Decision Support System for
Selecting Secure Web Services
Khaled M. Khan
Qatar University, Qatar
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Decision Support System for Selecting Secure Web Services
1114
A Decision Support System for Selecting Secure Web Services
it is unlikely that managers only assess the business ware component indicating a relative strength of
functionalities that Web services provide for their the security properties of the component. Payne
organizational need. They should also consider the (2002) proposes a seven step methodology to guide
security implications of using Web services with the process of defining security metrics. Berinato
their applications. The decision making process (2005) argues for a constant measure of security
of selecting security-aware Web services requires incidents and it could be used to quantify the ef-
a systematic approach. A decision support system ficiency of the deployed security functions. The
could aid managers with an automated system. National Institute of Standards and Technology
In the current practice, IS managers use Web (Swanson, Bartol, Sabato, Hash, & Graffo, 2003)
services without properly assessing the security defines a security metrics guide for information
compliances of the services (Khan, 2006, 2007). technology systems. The document provides
Managers could use decision support systems guidance on how an enterprise through the use
which could significantly improve the selection of metrics identifies the security needs, security
process of secure Web services. controls, policies, and procedures.
Many decision making techniques already
published in the literature can be used for the
selection of an entity among various alternatives. sEcUrIty DEcIsION
Classical multi-attribute utility theory (MAUT) sUPPOrt systEM (sDss)
by Keeney and Raiffa (1976), analytical hierarchy
process (AHP) by Saaty (1980), and a recent ap- The environment of the proposed SDSS system
proach by Besharati, Azram, and Kannan (2005) consists of a preprocess and the architecture
for the selection of product design are among these as illustrated in Figure 1. The preprocess has
approaches. MAUT has been used in many ap- two related activities: (i) specification of the
plication domains for modeling decision maker’s security requirements or security objectives
preferences for ranking a set of alternative deci- of the identified functionality, and (ii) gather-
sions. AHP has been extensively used in market- ing security properties of the candidate Web
ing and management areas. However, using any services. These two preprocess activities are
of these models in security issues has not been required in the process of constructing the
reported yet. An agent-based DSS methodology alternatives. Managers identify what security
reported in Choi, Kim, Park, and Whinston (2004) requirements their enterprise system needs
and a market-based allocation methodology from the Web services. This essentially sets
(Parameswaran, Stallaert, & Whinston, 2001) are the security requirements consistent with the
not also applicable in the security arena. Although enterprise-wide security requirements and as-
these two DSS methodologies are used in product surances. For example, a financial enterprise
selection, their applicability in the selection of system needs a service for calculating tax offset.
secure software product is limited. Many third-party Web services may offer this
Most research works in the area of Web ser- functionality with various security functions
vices security often focus on how to make Web such as confidentiality of data, integrity of the
services secure. Some papers propose various calculated data, and so forth. The managers must
security metrics models as reported in Berinato determine what type of security the identified
(2005) and Payne (2002). Khan (2006) proposes functionality will have. Security requirements
a scheme for assessing security properties of related to the functionality may be determined
software components. The assessment scheme based on the threats, vulnerabilities, and risks
provides a numeric score to the candidate soft- associated with the functionality.
1115
A Decision Support System for Selecting Secure Web Services
1116
A Decision Support System for Selecting Secure Web Services
1999). The CC provides evaluation measures of The example in Figure 3 illustrates the secu-
security by means of a common set of require- rity requirements of the functionality calculate
ments of the security functions of a system, and a tax. The functionality has two security require-
set of evaluation measures. The entire approach is ments: user data protection and authentication,
quantitative and it describes the security behavior as shown in level-2 nodes. Each of the two re-
of functions expected of an information system. quirements has equal importance as shown with
CC gives a comprehensive catalogue of high the value 50. The user data protection has one
level security requirements and assurances for security property as shown at level-2 node:
information systems products. CC consists of 11 encrypted(amount, ID). This property is further
classes for generic grouping of similar types of decomposed into two attributes: the key length
security requirements: security audit, communica- should be 128-bit and encryption algorithm should
tion, cryptographic support, user data protection, be RSA. The requirement authentication has a
identification and authentication, security man- security attribute: digital_signature(service_pro-
agement, privacy, protection of system security vider). This property has one attribute: algorithm
functions, resource utilization, system access, and used which should be RSA. This information will
trusted path and channels. be stored in the knowledge base.
The criteria are formulated in a tree structure. In this example, several key issues are ad-
The idea is to decompose a complex decision mak- dressed in order to check the conformity of user
ing component into simpler subcomponents that data protection and authentication. For instance,
are easily quantifiable and comparable in terms of if the user data protection is achieved by means of
values. In other words, security requirements are encrypted data, then next issues include what is
modeled into smaller subcomponents using a tree the length of the key and which algorithm is used
structure. The root of the tree (level 0) is the name in the encryption. These are the specific criteria
of the functionality. Each node at level-1 represents to check whether a Web service could provide
a CC security class such as user data protection, the required functionality with the desired level
authentication, security audit, and so forth. Level-2 of confidentiality of tax data.
and lower level nodes represent the decomposed
security attributes of the requirements. The value
associated with the each level-1 node signifies the stOrING sEcUrIty PrOFILE
relative importance of the node compared to other
nodes at the same level. All values irrespective of the The security information about each Web ser-
total number of nodes at level-1 must be summed vice gathered in the preprocess are entered into
up to 100. Figure 3 illustrates an example. the system. The format of data is the same as
1117
A Decision Support System for Selecting Secure Web Services
shown in Figure 3. SDSS provides a template in calculated on the basis of the presence or absence
order to capture the security requirements of the of certain security properties in the Web services.
candidate services. Let us consider a scenario. For example, if a node with a value 40 at level-1
Assume we have selected three candidate Web has full compliance with the security criteria, the
services called A, B, and C. All these services point will be 40 out of 100.
provide the same functionality, calculate tax, but IS managers can evaluate the rating of the
with varying security properties. Web service A candidate services and make a decision regard-
supports user data protection with encryption us- ing which Web service will be selected. They can
ing a key length of 256-bit, but does not provide also modify or adjust the security requirements
authentication. Service B provides authentication differently and get a different rating of the same
with digital signature using RSA algorithm, but set of Web services. However, it is also possible
does not support user data protection. All of the to add newly identified security properties with
data are entered into the system. the profile of a candidate Web service and process
Logic programming (Baral & Gelfond, 1993) the properties for a new rating.
can be used as a formal reasoning tool to character-
ize the security requirements and security profiles
of the candidate Web services. The simple struc- FUtUrE trENDs
ture of the logic program allows us to represent a
complicated form of security knowledge and its We plan to implement the proposed approach as a
properties, and yet it is based on mathematical prototype in order to test its applicability. We are
logic (Das, 1992). In logic programming, security currently evaluating some existing tools such as
properties can be expressed in symbolic notations smodels and lparse (Syrjanen, 2000) which could
such as encrypted, digital_signature. Some of be utilized as the supporting components of the
the properties are identical with those defined in SDSS in order to facilitate the inference mecha-
BAN logic (Burrows, Abadi, & Needham, 1989). nisms. The approach can be further expanded
to select Web services with other nonfunctional
properties such as usability, maintainability, reus-
GENErAtING ALtErNAtIVEs ability, and so forth. Further research includes the
automatic verification of the security profile of
This is the heart of the SDSS. This component Web services with their implementation. The more
produces a comparative rating of all candidate Web challenging research could be directed to automate
services based on the conformity of their security the significant activities of the preprocess, such
profiles with the enterprise-wide security criteria. as automatic gathering of security profiles about
Inference rules are used to calculate the deviation the Web services.
between the security criteria and the profiles. This
component uses a rule-based approach in order
to make a comparative rating of the candidate cONcLUsION
services. Security properties are reasoned about
with the inference rules of logic programming. The article has presented a framework for a se-
The inference rules are applied to check whether curity decision support system for selecting Web
the security profile of a Web service is matched services with appropriate security assurances.
with the security requirements of the enterprise The article argues that the selection process of
system. The rating of a candidate service is based appropriate Web services for the enterprise ap-
on a value ranging from 0 to 100. The points are plication needs an automatic tool support such as
1118
A Decision Support System for Selecting Secure Web Services
SDSS. The approach could be automated to aid Common Criteria. (1999). Common criteria for
enterprise decision support systems. This can be information technology security evaluation (ISO/
used in strategic planning of information systems IEC 15408). NIST. Retrieved December 6, 2007,
as well. The main contribution of this article is from http://csrc.nist.gov/cc/
a framework for the assessment of Web services
Das, S. K. (1992). Deductive databases and logic
security properties on which further work could
programming. Addison-Wesley.
be initiated. The evaluation method presented
here is considered flexible enough, as security Finlay, P. N. (1994). Introducing decision support
requirements can be altered by the IS managers systems. Oxford, UK, Cambridge, MA: NCC
as they see appropriate for their needs. Blackwell; Blackwell Publishers.
Haag, S., Cummings, M., McCubbrey, D., Pinson-
neault, A., & Donovan, R. (2000). Management
rEFErENcEs
information systems: For the information age,
Alter, S. L. (1980). Decision support systems: Cur- (pp. 136-140). McGraw-Hill Ryerson Limited.
rent practice and continuing challenges. Reading, Keeney, R. L., & Raiffa, H. (1976). Decisions
MA: Addison-Wesley Pub. with multiple objectives. New York: John Wiley
Baral, C., & Gelfond, M. (1993). Representing and Sons.
concurrent actions in extended logic programming. Khan, K. (2007). Selecting Web services with
In Proceedings of the 13th International Joint security compliances: A managerial perspective.
Conference on Artificial Intelligence, Chambery, To appear in Proceedings of the Pacific Asia Con-
France (pp. 866-871). ference on Information Systems (PACIS).
Berinato, S. (2005, July). A few good metrics. Khan, K., & Han, J. (2006, April). Assessing
CIO-Asia Magazine. Online version http://www. security properties of software components: A
csoonline.com/read/070105/metrics.html software engineer’s perspective. In Proceedings
Besharati, B., Azram, S., & Kannan, P. K. (2005). of the Australian Software Engineering Confer-
A decision support system for product design ence, IEEE Computer Society.
selection: A generalized purchase modeling ap- Parameswaran, M., Stallaert, J., & Whinston, A.
proach. Decision Support Systems, 42, 333–350. B. (2001, August). A market-based allocation
doi:10.1016/j.dss.2005.01.002 mechanism for the DiffServ framework. Decision
Burrows, M., Abadi, M., & Needham, R. (1989, Support Systems, 31(3), 351–356. doi:10.1016/
December). A logic of authentication. ACM S0167-9236(00)00143-3
Operating Systems Review, 23(5), 1-13. A fuller Payne, S. (2002). A guide to security metrics.
version was published as DEC System Research SANS Institute.
Centre Report Number 39, Palo Alto, California,
February. Power, D. J. (1997). What is a DSS? The Online
Executive Jo971021.htmlurnal for Data-Intensive
Choi, H. R., Kim, H. S., Park, Y. J., & Whinston, Decision Support, 1(3). Online version http://
A. B. (2004, March). An agent for selecting www.taborcommunications.com/dsstar/97/1021/
optimal order set in EC marketplace. Decision
Support Systems, 36(4), 371–383. doi:10.1016/
S0167-9236(03)00027-7
1119
A Decision Support System for Selecting Secure Web Services
This work was previously published in Encyclopedia of Decision Making and Decision Support Technologies, edited by Fred-
eric Adam and Patrick Humphreys, pp. 211-217, copyright 2008 by Information Science Reference (an imprint of IGI Global).
1120
1121
Chapter 4.16
ERP Systems Supporting Lean
Manufacturing in SMEs
Pritish Halgeri
Kansas State University, USA
Roger McHaney
Kansas State University, USA
Z. J. Pei
Kansas State University, USA
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
ERP Systems Supporting Lean Manufacturing in SMEs
1122
ERP Systems Supporting Lean Manufacturing in SMEs
The methodology debate has not been with- technologies and the resultant rise of e-business
out controversy and opposing philosophies have (Kent, 2002) have forced most SMEs to revisit
emerged as different means to address the same their production control methodologies and re-
basic problem (Spearman & Zazanis, 1992). evaluate where they stand in relation to ERP use
Nowhere is this situation more apparent than and Lean manufacturing implementation. As at-
where manufacturers are torn between two camps titudes have changed and information exchange
concerning production control (Piszczalski, 2000). increased, Lean practitioners have begun to
One embraces Enterprise Resource Planning adopt supportive ERP software to facilitate their
systems (ERP) where for the past two decades, advanced Lean manufacturing initiatives and al-
organizations have spent billions of dollars and low the rich compilation of organizational data
countless hours installing enterprise wide systems and production history take them to a new level
(Bradford, Mayfield & Toney, 2001). The other of operational excellence (Bragg, 2004).
camp is Lean manufacturing (Piszczalski, 2000),
pioneered in Japan by Toyota Motor Corporation Lean Enabled ErP Development
but now embraced in the U.S. by literally thousands
of firms, particularly SMEs (Bartholomew, 1999). The area of Lean enabled ERP software has be-
ERP and Lean have emerged from funda- come the subject of many recent and important,
mentally different approaches to production. As ongoing developments. However, very few re-
a result, misconceptions that Lean and ERP ap- searchers have examined this area to discuss the
proaches do not mix well have emerged (Steger- availability of Lean enabled ERP systems (Halgeri,
Jensen & Hvolby, 2008). In some cases, these et al, 2008). Additionally, not many researchers
misconceptions have gone as far to argue that describe the Lean toolset features offered by ERP
ERP systems are actually the antithesis of Lean vendors. This article will attempt to rectify that
manufacturing and are largely responsible for by discussing the differences between ERP and
a variety of inefficiencies (Nakashima, 2000). Lean methodologies and then examining available
Others say ERP is a waste of money and time in Lean toolsets provided by several ERP vendors.
no uncertain terms. For instance, in 1999, Bar- The article will go on to provide a list of ERP
tholomew reported opponents of ERP as saying: vendors offering support in Lean manufacturing
We are staying away from ERP because it doesn’t then provide additional details on several selected
work. To do both ERP and Lean jeopardizes the vendors together with the expected benefits of
success rate of either (Bartholomew, 1999). their software solutions.
This opinion is one side of many arguments
both pro and con. Others have said: only by us- Enterprise resource Planning (ErP)
ing computer systems (ERP) manufacturers can
possibly get their arms around the Herculean ERP is defined as a method for the effective plan-
task of recognizing the multitude of constraints ning and controlling of all the resources needed
and issues that inevitably impact operations and to take, make, ship and account for customer
planning (Piszczalski, 2000). To them, it is obvi- orders in a manufacturing, distribution or service
ous that ERP systems have an important purpose company (Miller, 2002). ERP software attempts
in gathering enterprise data that can and should to integrate all departments and application
be used in conjunction with Lean methodologies modules into one computer system to serve each
(Bradford, Mayfield & Toney, 2001). department’s needs from a central repository.
Added to competitive pressures, the explosive ERP effectively eliminates standalone computer
growth of information and telecommunications systems for each functional business silo or soft-
1123
ERP Systems Supporting Lean Manufacturing in SMEs
ware module (e.g. manufacturing/production, software without changing the business model to
warehousing, accounting, marketing, logistics, match encoded best practices can result in fewer
human resources, finance, etc.) and replaces them benefits, and may even decrease efficiency and
with an integrated program composed of various productivity. Additionally, employees must be
modules representative of required components trained to use both new software and new busi-
of an organization’s business. The primary differ- ness processes in the conduct of their work tasks.
ence is that these components are now linked with Another disadvantage relates to cost factors. ERP
a common database therefore giving all entities systems can be expensive to install and run. Hid-
within the organization the ability to share and den costs also exist. For example, training, data
view desired information while eliminating data conversion, testing, and updates all add to the price
entry and update redundancies, and effectively tag. Of course, these costs are generally part of
enhancing communication with easy access to any organizational information system and should
work flows. (Koch, 2008). Additionally, ERP be viewed within that perspective.
solidly integrates all necessary business functions,
such as production planning, accounting, purchas- Lean Manufacturing
ing, inventory control, marketing, sales, finance,
and human resources, into a single system with Lean manufacturing is a term given to a family
a shared database (Li, Liao & Lei, 2006) which of related methodologies that seek to streamline
enables a variety of automatic data collection not production processes. Sometimes Lean is re-
previously possible. ferred to as Just-in-Time (JIT) manufacturing,
As a direct result of ERP systems’ abilities kanban system, Toyota Production System, or
to collect data and improve the ease of informa- flow manufacturing. A primary feature of Lean
tion sharing, several other advantages generally manufacturing how it uses demand to pull items
result from its use. For example, ERP systems into inventory and through the manufacturing
consistently improve SMEs’ productivity, as the process. Lean attempts to sequence these items
systems eliminate the need for multiple entries of on flow lines to maximize resource utilization
identical data, reduce the possibility of errors and (Kent, 2002). A key goal of Lean manufacturing
inconsistencies, and reduce time spent on needless is the continuous reduction and even eventual
phone calls and inquiries to other departments. elimination of all waste in the production process
Other advantages provided to SMEs using ERP (Mekong Capital, 2004; Strategosinc, 2008).
systems include improved tracking and forecast- In general, Lean manufacturing seeks to mini-
ing abilities, better customer service, ability to mize all the resources (including time) used in
standardize manufacturing processes more easily, various enterprise activities. A key aspect of Lean
and in some instances, cost savings after initial is to identify and reduce or eliminate non-value-
start-up costs are recouped (Jacobs, 2007). added activities in design, production, supply chain
While ERP systems possess numerous advan- management, and streamline customer interac-
tages, key disadvantages also exist. For instance, tion. Lean principles and practices aim to reduce
ERP systems require extensive installation and cost through the relentless removal of waste and
configuration processes that may take from three through the simplification of all manufacturing
months to a year or more depending on the size and and support processes (Miller, 2002) consistent
complexity of the organization. For some SMEs with continuous quality improvement techniques.
this may be less of an issue since less customiza-
tion may be required. ERP systems often demand
reengineering business processes. Installing the
1124
ERP Systems Supporting Lean Manufacturing in SMEs
1125
ERP Systems Supporting Lean Manufacturing in SMEs
While not sounding too different, the basic use the actual end customer demand to drive the
philosophy between these two approaches is manufacturing process as much as possible. Pull
significant. First, in a push system, a production systems attempt to match the rate of production
job begins on a start date computed by subtract- for each product to the rate of customer consump-
ing an established lead time from the date the tion (Steger-Jensen & Hvolby, 2008) as it occurs.
goods are required, usually for shipping or for This has the net effect of reducing inventories and
assembly (Spearman & Zazanis, 1992). A push holding down costs throughout the supply chain.
system schedules the release of work based on A pull system is characterized by the practice of
demand. The key factor here is access to historic downstream work centers pulling stock from pre-
data that aids in the development of forecasts for vious operations (Spearman & Zazanis, 1992). In
items to be produced. Release time has to be fixed other words, nothing is produced by the upstream
and cannot be modified easily for unexpected supplier until the downstream customer signals a
changes in the manufacturing system or product need (Kent, 2002). Work is coordinated by using
being manufactured. Figure 1 represents a general an information flow up the supply chain, having
push production system. originated with the end consumer of the product
In a push system, information from the master (Spearman & Zazanis, 1992). Figure 2 shows a
production schedule (MPS) flows downstream typical pull system.
toward the finished goods inventory and is com- Information flows from the finished goods
puter generated (Kent, 2002) based on history and inventory (the customer) upstream towards the
current orders. The MPS becomes the plan used raw material inventory and in many SMEs can be
by a company for production. The MPS consid- conveyed visually by the use of a kanban (Kent,
ers all work currently in-house and develops an 2002). Many systems are now completely run
aggregate plan based on forecasts for individual by automated computer-driven systems. Other
parts, actual orders on hand, expectations for or- differences between traditional ERP systems and
ders, and available capacity (Lee & Adams, 1986). Lean manufacturing are summarized in Table 1.
A pull system takes the opposite approach and
at its center is inherent flexibility. Pull systems
1126
ERP Systems Supporting Lean Manufacturing in SMEs
Advantages of ErP over Lean their immediate point of interaction. This can
inhibit the design of better products.
ERP can provide advantages over Lean. For in- Lean can create the low cost, efficient opera-
stance, researchers have claimed ERP, in general, tions needed for survival. However, that is not
is more applicable to more manufacturing firms the only goal of most companies where long term
than Lean (Spearman, Woodruff & Hopp 1990) survival is also an important consideration. Thus,
and that Lean should be used in high volume in many SMEs, plant software adoption and the
production environments with relatively few part use of historic data is expected to rise. And of
types (Bonvik, Couch & Gershwin, 1997) but not course, the plant operations that can better respond,
other environments. innovate, and share information will find greater
In addition to a number of functionalities, opportunities for cost savings, future goods, and
software can extend visibility into the plant. customers (Greene, 2004).
Kanban management systems can communicate Software can bring capabilities to the plant
current demand to suppliers, but generally fails environment that are difficult or even impossible
to illuminate quality or other shop floor issues. to achieve by any other mechanism. Of course, not
Lean manufacturing’s line-of-sight management every production operation will require all of the
can also fall short since it typically also does not capabilities available in software systems, but for
help internal departments serve customers beyond those needing to achieve specific goals, certain
1127
ERP Systems Supporting Lean Manufacturing in SMEs
features can be crucial. It is possible SMEs not Potential for Linking ErP and Lean
specifically interested in implementing Lean may
still acquire software tools typically found in ERP Some academics and industry analysts have im-
or other enterprise systems for use in their envi- plied that ERP is old school and Lean manufactur-
ronments. Several examples of these features are: ing has replaced it. Others, of course, disagree,
saying those claims are akin to saying the auto-
• Track and Trace: Many industries re- mobile chassis is obsolete because a new engine
quire full product histories that track all has been invented (Miller, 2002). It is important
materials back to their sources for qual- to make a distinction between an ERP and Lean
ity and other reasons. Required or not, a manufacturing. ERP can be thought of as a large
track and trace feature makes great busi- scale software system for linking all parts of the
ness sense. Not only can warranty costs be firm and encouraging best practice business pro-
reduced but brand image can be protected. cesses. Lean manufacturing is one of these best
Additionally, recall costs can be better con- practices mostly focused in the manufacturing
trolled and supply problems can be identi- area. At least, that’s one productive way of view-
fied and suppliers rated and ranked. Most ing the synergy that may emerge from a marriage
ERP software systems include this feature. of the two methodologies.
• Performance Dashboard: Managers need As an example of how the broader set of
access to performance data and a perfor- organizational data can benefit Lean manufac-
mance dashboard provides access to in- turing, consider a shortcoming of many Lean
formation as it is acquired. Timely and initiatives. Often, these initiatives make rapid
accurate views of data are essential to im- progress then the rate of improvement plateaus.
proving business performance. The difficulty of managing pull operations in an
• Work Instruction Tools: Lean manufac- environment where demands and product mix
turing relies on work standardization. In widely fluctuate is partly responsible for this
many new software systems developed to plateau (Bragg, 2004). Another difficulty might
support Lean and in many ERP systems, be related to incomplete data. Imagine a 30%
best practices down to the work instruction reduction in process cycle time resulting from
level are maintained. An easy way to en- a Lean kaizen event that does not get formally
sure quality and efficiency is through the communicated to marketing, procurement,
maintenance of up-to-date work instruc- material planning, customer order management
tions. This functionality often comes from or the capacity planning functions (Metzger,
specialized vendors and ERP software 2008). What is perfectly obvious in manufac-
providers. turing may not be communicated up the supply
• Resource Allocation Tools: Production chain to other business operations. Visual pull
systems with responsibility to produce systems developed for a local process must be
multiple products often face resource al- communicated and linked through ERP to sus-
location problems. This may include work tain the Lean program results across the SME
fixtures, capital equipment, or even skilled (Metzger, 2008). This is especially important
workers. Finite capacity scheduling sys- when the SME maintains separate production
tems and other resource allocation tools and business facilities.
have been developed to aid with these Having access to additional business data may
situations. lead to understanding where bottlenecks may
still occur, or what operations may be further
1128
ERP Systems Supporting Lean Manufacturing in SMEs
optimized. Without historic data combined with by 50%, while sales volumes increased by 35%
analytic tools, this can become increasingly dif- (Nakashima, 2000). These improvements are by
ficult or even impossible. The data associated no means insignificant.
with an ERP can help identify these constraints
to optimize demand flow manufacturing (Bragg, ErP Vendors Offering Lean tools
2004).
Other challenges to Lean include trying to Many ERP vendors have introduced “enablers”
modernize manual kanban methods that use that incorporate Lean manufacturing best prac-
printed cards, which work well within SMEs tices into their systems. These enablers include a
with contained environments or “line of sight” variety of new modules, database items, toolsets,
manufacturing facilities. Major difficulties can and business process modifications that create new
result when these systems are extended across functionality in existing software (Nakashima,
the plant and to suppliers, since breakdowns in 2000). The following sections describe these
manual kanbans get lost at the local level (Bragg, features in more detail (Halgeri, 2008):
2004). Typical approaches for Lean used by most
SMEs today do not provide an optimal return Toolset # 1: Just-in-Time
on investment for companies (Steger-Jensen &
Hvolby, 2008) and financial data regarding each A key difference between ERP implementation
part of the operation may not be collected. and Lean manufacturing has been the approach
Lean enabled modules offered by ERP suppli- to production. Since ERP has traditionally used a
ers and specialist suppliers may help overcome push production system, adopting a philosophy of
many of these challenges (Bragg, 2004). In fact, pull production has been a challenge. Many ERP
ERP vendors are starting to offer new solutions vendors have begun to add a JIT toolset to their
aimed to bridge the gap between the shop floor best practices procedures as a step in this direc-
and ERP (Nakashima, 2000; Bradford, Mayfield, tion. A primary functionality of this tool extends
& Toney, 2001). These solutions may be offered in the pull concept through the entire supply chain
the form of Lean modules or add-on components from suppliers to customers. Of course, incorpo-
(Bradford, Mayfield & Toney, 2001). rating just-in-time features encourages flexible,
Benefits gained by implementing Lean-en- small lot deliveries of parts and materials without
abled ERP modules can be illustrated by the fol- the need for traditional purchase orders and this
lowing example provided by Nakashima (2000). can be difficult to implement in an ERP system
Cerberus, a New Jersey-based manufacturer of (Nakashima, 2000).
commercial fire detection systems, and division One vendor, Oracle, and its Flow Manufactur-
of Siemens, implemented Lean techniques and ing software includes multiple component replen-
American Software’s Flow Manufacturing ap- ishment routines that support multiple component
plication to achieve significant increases in both demand patterns. This flexible approach to JIT
flexibility and productivity. Before implementing procurement helps eliminate stock-outs. The
Flow Manufacturing application, a new model software automates material replenishment pro-
would be produced every 15-30 days. After imple- cesses through the creation of a self-regulating pull
menting Flow Manufacturing, multiple models production system. Oracle also offers Feeder Line
come off the production line every 20 seconds Synchronization processes that can create specific
(Nakashima, 2000). Productivity increased by JIT schedules for complex, dependent demand to
as much as 15-20%, floor space was reduced by ensure parts are delivered when needed. This is
25-30%, finished goods inventory was reduced ideal for products that must be built specifically
1129
ERP Systems Supporting Lean Manufacturing in SMEs
for customer orders, or are highly customized information management (from order taking to
or variable. Using additional features, required delivery), as well as material transformation (from
components and parts can be ordered to ensure incoming raw materials to finished goods) are all
delivery at the perfect time to become available key to conducting a value stream analysis. VSA
during production. Stable, predictable demand demonstrates process steps for elimination, modi-
can use kanban management processes but more fication or improvement both with and without
complex demand can access both ERP data and investment. A Value Stream Mapping (VSM) tool
use JIT concepts for delivery (Oracle, 2006). can be implemented to further improve this analy-
sis by graphically illustrating current and desired
Toolset # 2: Convertors to Transform processes in the value stream. This makes it easier
Multi-Level Bills-of-Material into to understand and implement recommendations
Flat Bills with Event Sequencers derived from earlier or ongoing Value Stream
Analysis activities (McManus & Richard, 2002).
Many ERP vendors have begun to offer function- Several vendors offer both VSA and VSM
ality intended to eliminate traditional MRP-based support in their ERP software systems. First,
bills-of-material that simulate the manufacturing Pelion’s ERP system is noted for its strengths
process and establish start and due dates for each in VSM. Their EASYVSM workbench software
department. These time-phased and shop floor adapts to specific production environments to re-
control routings are converted into flat bills without duce manufacturing cycle times and to streamline
sub-assemblies or parent assembly product rout- work processes. Additionally, non-value added
ing. These converters transform multilevel bills- work can be identified and eliminated. This helps
of-material into flat bills with event sequencers, increase customer responsiveness and satisfaction
emulating processes used in Lean manufacturing (Pelion Systems, 2008). The following features
(Nakashima, 2000). of EASYVSM have been documented as mecha-
nisms to improve product and material flows
Toolset # 3: Analysis and Mapping Tools (QSG Team, 2006):
1130
ERP Systems Supporting Lean Manufacturing in SMEs
turing offers Graphical Line Designer to aid in changes can impact the work process as much as
visualization of current value streams and to the bill-of materials (Nakashima, B. 2000). Many
create maps which can be redesigned into bal- ERP systems have begun to implement this feature.
anced line operations and in ways that eliminate
waste and redundancy. Graphical Line Designer Toolset # 6: Kanban Control
defines standard processes and associates them and Management
with configurable models, product families, and
networks or processes. Each individual process Simple flow manufacturing, particularly in SMEs,
is linked to a set of primary and feeder processes often will not require enterprise software. Many
and can be identified as rework where relevant. successful manufacturers use kanban tags instead
Overall, users are able to focus on events important of work orders, however, this works best only in
to quality improvement initiatives (Oracle, 2006). situations where production is steady and product
demand stable with few changes (Turbide, 2005).
Toolset # 4: Demand Smoothing As production becomes more complex with greater
variation, changes, and customers, specialty
The focus of demand smoothing tools are to ac- kanban will be required. Special situations such
cumulate forecasts and customer demands and then as promotional peaks, seasonal demand, long
provide graphical analyses of requirements for lead-time supplies, and highly customized orders
daily production. This functionality is a natural fit can lead to difficulties in the kanban environment
for ERP systems since forecasting is often based on (Bragg, 2004). As demand changes, manual kan-
historical data. Most demand smoothing tools also bans can become more difficult to manage thus
consider important resources needed to complete changes harder to track (Garwood, 2002).
the recommended production (Nakashima, 2000). According to Bragg (2004) another difficulty
An ERP package that offers demand smooth- associated with manual kanban relates to loss. He
ing is Manugistics. It specializes in support for reports that up to 1% of manual kanbans gets lost
dynamic pricing techniques. Additionally, it can every day (Bragg, 2004). Manual kanbans are also
be integrated with production planning software hard to track and often labor intensive (Bragg,
modules. Manugistics smoothes demand through 2004). Simplicity can come at a cost.
dynamic pricing. So if demand exceeds produc- ERP software vendors have created support
tion capabilities, pricing is raised and vice versa. modules that address many kanban control and
This helps manufacturers proactively stabilize management problems. A promising solution has
demand so production rates more closely mirror been to offer electronic kanbans that continue to
sales (Bragg, 2004). Other ERP vendors offering allow plant floor operations to capitalize on the
demand smoothing include Oracle, SAP, and IFS. advantages of kanban but at the same time provide
access to a greater range of organizational data
Toolset # 5: Engineering and intelligence to optimize the use of resources.
Change Orders This enables smarter scheduling together with the
benefits of kanban. A much larger segment of the
Engineering change orders can be a huge dis- manufacturing community can benefit (Turbide,
ruption to workflow. Workflow or other similar 2005). Additionally, ERP systems can provide
technology to communicate engineering changes additional analysis tools which can help recalcu-
to the production line can be implemented using an late the size and number of kanban bins required.
ERP system to more easily and more immediately This can be done on-the-fly and used to alert key
signal the factory floor. This can be important since personnel of expected changes. Manual kanbans
1131
ERP Systems Supporting Lean Manufacturing in SMEs
1132
ERP Systems Supporting Lean Manufacturing in SMEs
The Configurator software can be used to select generally achieved by using visual Kanban cards
a number of pre-finished products, to create a sales that can be tags, labels, containers, or electronic
kit, or a standard bill of material to request the signals (Turbide, 2005).
manufacture of a custom product (CTS, 2008). One of the available ERP systems offering
Backflush is the deduction from inventory support in Orderless Manufacturing is TTW’s
records of the component parts used in an as- WinMan software. It uses an empty container as
sembly or subassembly by exploding the bill of a signal to trigger internal replenishment. These
materials by the production count of assemblies empty containers further indicate completion of
produced (Cox and Blackstone, 2008). In other a finished product and backflushing of the com-
words, inventory can be backflushed to remove ponent material. In order to help complete the
raw material from inventory, instead adding to transaction, TTW has designed a set of internal
finished goods inventory or to inventories of Kanban cards which can be bar code scanned.
stocked sub assemblies. In Lean manufacturing, (WinMan, 2003). Oracle Flow Manufacturing
backflushing should be a routine transaction for records completions of assemblies without having
material issues. Activity reporting and inventory to create work orders (Oracle, 2006).
level updates can be replaced by the performance
of all inventory transactions upon completion of a ErP Vendors Offering Lean support
single unit (Nakashima, 2000). In some plants, the
replenishment signal for a bin is generated from a As is evident from the list of Lean-enabled features
backflush, since this saves the waste of creating now being supported in ERP systems, a number
Kanban cards and scanning them. of vendors have begun to enter the marketplace.
Oracle Flow Manufacturing backflushes all the Table 2 provides a list of some of these vendors
components and performs resource and overhead and their primary Lean-enabled software mod-
transactions upon recording the assembly comple- ules. Three of these vendors are then explored
tion. Oracle Flow Manufacturing allows scrap- in more detail.
ping assemblies and returning from scrap at any
operation using either scheduled or unscheduled Vendor #1: Oracle
flow schedules. A scrap transaction will cause all
the components through the scrap operation to be Oracle is considered a leader in Lean-manufac-
backflushed (Oracle, 2006). turing implementation within its ERP system.
According its research, Oracle had over 100
Toolset # 8: Orderless companies using its Flow Manufacturing module,
Flow Manufacturing and as many as four times that amount used its
Kanban software (Bragg, 2004). Oracle Flow
Traditional batch production is controlled through Manufacturing has been implemented as part
work orders which, by Lean standards, include too of the Oracle E-Business Suite (Oracle, 2006).
much waste (Turbide, 2005). Kanban-based flow Oracle considers Flow Manufacturing as crucial
manufacturing is conducted without work orders to its e-commerce strategy. Because of this, Flow
– and therefore without the waste associated with Manufacturing has been promoted as effective in
work orders. Flow manufacturing is characterized the reduction of product cycle times, inventories,
by production lines and/or cells in which work and process complexity. In addition, Oracle claims
is pulled or moves piece-by-piece through the the software will simplify production, and help
process and not in batches (Turbide, 2005). This meet production demand at affordable prices
pull based work flow in the production line is (Kent, 2002). Of course, none of these features
1133
ERP Systems Supporting Lean Manufacturing in SMEs
would be possible without the synergy offered systems (Lee & Adam, 1986; WinMan, 2006).
by coupling Lean with the wide array of ERP Table 3 provides a list of several Lean-enabled
enterprise data. tools offered by Oracle (Oracle, 2006):
Additionally, Oracle’s software allows users to
create simulations of expected Lean environment Vendor #2: TTW
changes. Several simulation tools allow experi-
mentation with line balancing, optimized product TTW’s Windows ERP product, WinMan is par-
flows, and Heijunka sequencing (Wheatley, 2007). ticularly suited for use by SMEs. This product
Oracle’s software not only supports kanban from features an integrated manufacturing management
assembly to the supplier base, it also includes system designed specifically for the needs of
tools to provide users with the capability to view small to midsized enterprises. Since it manages
historic demand and optimize the size and number both manufacturing and business operations,
of system kanban cards (Wheatley, 2007). Various including bill of materials, purchasing, material
researchers and practitioners have reported a great requirements planning (MRP), inventory planning
deal of success with Oracle’s Lean enabled ERP and control, and master production scheduling
1134
ERP Systems Supporting Lean Manufacturing in SMEs
Feature Description
Value Stream Mapping Identifies opportunities for improvement
Value Stream Analysis Visualizes opportunities for improvement
Line Design and Balancing Supports mixed model production of standard or configured products
Just-in-Time Procurement Pull-based, kanban replenishment chain supported to improve inventory turns. Also, supports
synchronized component replenishment for configured or build-to-order components.
Electronic Work Methods Lean manufacturing execution workstation supported for operators thus enabling move
toward paperless shop floor.
Backflushing Scrap transaction generated automatically causing all components to be backflushed
Kanban Supports kanban transactions with Mobile Supply Chain Applications (MSCA) module
Orderless Flow Manufacturing Allows recording of completions of assemblies without having to create work orders
Sequencing and Scheduling Capability Produces directly to customer order
(MPS), it can help control all aspects of an SME of related tools. Table 4 illustrates (CTS, 2008;
(Global Shop Solution, 2008). WinMan, 2006).
TTW reports several success stories related
to WinMan implementations including Lantech Vendor #3: Pelion Systems
being about to grow its share of the stretch-wrap
machinery market from 35 percent to 50 percent. Unlike other ERP vendors, Pelion Systems’ suite
Capricorn Cars Parts increased its inventory of products is developed as third party software to
turnover by 188% and increased its parts port- augment existing ERP applications. The primary
folio from 1,800 to 15,000 while experiencing objective of Pelion’s software is to reduce exces-
a marginal increase in overhead costs (WinMan, sive lead time and lot size obstacles through the
Athena Controls 2008). use of Lean manufacturing practices (Garwood,
Since many SMEs utilize the benefits offered 2002). Pelion calls its primary software Demand
with Lean practices, WinMan provides a number Flow Technology. The approach is to combine a
Feature Description
Support for Just-in-Time External Kanban generates bar coded kanban cards for pre-selected suppliers and allows
manufacturers to pull inventory on demand from the shop floor
Demand Driven Manufacturing Eliminates non-value added activities and reduces inventory by using pull manufactur-
ing techniques
Push/Pull Flexibility Ability to process back to back orders in both purchasing and manufacturing and simulates
the pull concept while still utilizing traditional push purchase orders and manufacture
orders
Line Design and Sequencing. Product Configuration workbench allows selection of various options on the fly dur-
ing the sales order process. Guided by pre-selected logic. May offer inclusion and/or
exclusion rules.
Orderless Flow Manufacturing Uses an empty container as a signal to trigger internal replenishment. Empty containers
may signal completion of finished product and trigger backflushing of the component
material
Backflushing Backflushing is deduction from inventory records of component parts used in an as-
sembly or subassembly
1135
ERP Systems Supporting Lean Manufacturing in SMEs
Feature Description
Value Stream EasyVSM workbench determines key breakthrough improvement opportunities, helps distinguish between value-
Analysis added and non value-added activities.
Value Stream Map- Delivers visual roadmap of Kaizen and other improvements, increases visibility and aids in communication
ping
Lean Engineering: Defines flow as a means of driving Lean process layouts and aids in continuous improvement effects
Lean Material Flow Aids in material flow design, strategic inventory decisions, stock out reductions, pull signal methods in all parts of
production, inventory turnover. Supports rapid analysis of dynamic material requirements
Line Design and Matches product mix with demand volume (both actual and forecast) with factory resources. Provides alerts to
Sequencing potential resource allocation bottlenecks
Kanban Control Enables real-time coordination on dynamic demand-pull requirements; tracks fulfillment performance and ensures
and Management production goals met in effective, timely fashion
1136
ERP Systems Supporting Lean Manufacturing in SMEs
that can further improve Lean practices. Added possible. More ERP vendors will add Lean tools
then are benefits associated with having business and continue to improve those already in use.
software integrated and tied to the same database.
ERP vendors are competing with best-of-breed
software vendors to understand and offer solutions cONcLUsION
to support best practice implementations of Lean
production (Michel, 2002). A Lean-enabled ERP Overall, this research suggests Lean manufactur-
implementation must necessarily include a variety ing has been successfully integrated with ERP
of new modules, procedures, practices and toolsets software as a best-of-breed approach useful
to add new functions to existing ERP software to many SMEs and other manufacturers. With
(Nakashima, 2000). These modules often include: global competition heating up, small and medium
value stream analysis, value stream mapping, enterprises (SMEs), more than ever, must have
lean engineering, lean material flow, line design access to superior software systems and tools.
and sequencing, backwash capability, kanban This article has described how ERP (Enterprise
management, and others. Resource Planning) and Lean manufacturing
A variety of software packages and functional- have been implemented in various ways. In early
ity have emerged. Table 6 adapted from Halgeri incarnations, ERP systems were considered a
(2008) provides a glimpse at these cross refer- hindrance to Lean manufacturing efforts and were
enced with the three vendor solutions this article criticized for encouraging large inventories and
explored in more depth. slower production. In more recent years, it has
Certainly the future of ERP systems will in- become apparent that SMEs must seek the best
clude more Lean-enabled tools and continue to of both worlds and use the benefits of ERP and
capitalize on the synergy derived from the using retain the nimbleness provided by Lean. Linking
best Lean practices within an environment of ERP and Lean methods can lead to competitive
automatic data collection and access. SMEs will advantage as demonstrated in a number of soft-
continue to derive benefits from appropriate scaled ware solutions offered by vendors such as Oracle
versions of ERP systems without losing their edge TTW, and Pelion. These tools represent the future
in terms of nimbleness and ability to react to their of SMEs and their use of ERP systems.
customers’ needs. Larger organizations will gain
greater access to the methods developed in smaller
organizations and will find closer links and bet-
ter communication along the entire supply chain
1137
ERP Systems Supporting Lean Manufacturing in SMEs
Burton, T. T., & Boeder, S. M. (2003). The Lean Halgeri, P., Pei, Z. J., Iyer, K. S., Bishop, K., &
extended enterprise: Moving beyond the four walls Shehadeh, A. (2008). ERP systems supporting
to value stream excellence. Fort Lauderdale, FL: Lean manufacturing: A literature review. 2008
J. Ross Publishing. International Manufacturing Science & Engineer-
ing Conference (MSEC), Evanston, IL, USA.
Cheng, T. C. E., & Podolsky, S. (1993). Just-in-
time manufacturing: An introduction (2nd ed.). Jacobs, R. (2007). Enterprise resource planning
London: Chapman & Hall. (ERP) - A brief history. Journal of Operations
Management, 25(2), 357–363. doi:10.1016/j.
Cox, J., & Blackstone, J. (Eds.). (2008). APICS jom.2006.11.005
dictionary (12th ed.). Chicago, IL: APICS Educa-
tional Society for Resource Manage. Kent, J. F. (2002). An examination of traditional
ERP and Lean manufacturing production con-
CTS. (2008). Manufacturing software reviews. trol methods with a view of flow manufacturing
Retrieved July 20, 2008 from http://www.cts- software as an alternative. MS thesis, University
guides.com/manufacturing.asp of Oregon.
1138
ERP Systems Supporting Lean Manufacturing in SMEs
Koch, C. (2008). ABC: An introduction to ERP. Miller, G. J. (2002). Lean and ERP: Can they
CIO. Retrieved March 18, 2008, from http:// co-exist? Retrieved July 19, 2008 from http://
www.cio.com/article/40323/ABC_An_Introduc- facilitatorgroup.net/pdf/LeanERPCoExist.pdf
tion_to_ERP/1
Nagendra, P. B., & Das, S. K. (1999). MRP/SFX:
Koh, L., & Simpson, M. (2005). Change and A kanban-oriented shop floor extension to MRP.
uncertainty in SME manufacturing environ- Production Planning and Control, 10(3), 207–218.
ments using ERP. Journal of Manufacturing doi:10.1080/095372899233172
Technology Management, 16(6), 629–653.
Nakashima, B. (2000). Lean and ERP: Friend or
doi:10.1108/17410380510609483
foe? Advanced Manufacturing (September) Re-
Lee, T. S., & Adam, E. E. Jr. (1986). Forecasting trieved July 20, 2008 from http://www.advanced-
error evaluation in material requirements planning manufacturing.com/index.php?option=com_stati
(MRP) production-inventory systems. Manage- cxt&staticfile=informationtech.htm&Itemid=44
ment Science, 32(9), 1186–1205. doi:10.1287/
Oracle (2006). Oracle Flow Manufacturing
mnsc.32.9.1186
datasheet. Retrieved July 19, 2008 from ttp://
Li, Y., Liao, X. W., & Lei, H. Z. (2006). A knowl- www.oracle.com/applications/manufacturing/
edge management system for ERP implementa- flow-manufacturing-data-sheet.pdf.
tion. Systems Research and Behavioral Science,
Paez, O., Dewees, J., Genaidy, A., Tuncel, S.,
23(2), 157–168. doi:10.1002/sres.751
Karwowski, W., & Zurada, J. (2004). The Lean
McManus, H. L., & Richard, L. M. (2002). Value manufacturing enterprise: An emerging socio-
Stream analysis and mapping for product develop- technological system integration. Human Fac-
ment. In Proceedings of 23rd ICAS Congress (pp. tors and Ergonomics in Manufacturing, 14(3),
6103.1-6103.10). Toronto, Canada. 285–306. doi:10.1002/hfm.10067
Mekong Capital. (2004). Introduction to Lean Pelion Systems. (2008). Pelion Systems Solu-
manufacturing for Vietnam. Retrieved August tions. Retrieved July 22, 2008 from http://www.
30, 2008 from http://www.mekongcapital.com/ pelionsystems.com/solutions.asp
Introduction%20to%20Lean%20Manufactur-
Piszczalski, M. (2000). Lean vs. information sys-
ing%20-%20English.pdf
tems. Automotive Manufacturing & Production,
Metzger, B. (2008). Linking Lean and ERP systems 112(8), 26–28.
together for sustained advantage [White paper
Poppendieck, M. (2002) Principles of Lean think-
of TriMin Systems, Inc.]. Retrieved August 30,
ing (pp. 1-7). Poppendieck LLC.
2008 from http://www.triminmfg.com/images/
KnowledgeBase/Metzger.pdf Rashid, M. A., Hossain, L., & Patrick, J. D. (2002).
The evolution of ERP systems: A historical per-
Michel, R. (2002). Multiple paths to Lean: De-
spective. Hershey, PA: Idea Group.
tector Electronics, Norlen turn to specialized
Lean manufacturing solutions. Manufacturing Seradex. (2007). Lean Manufacturing - Seradex
Business Technology. Retrieved July 20, 2008 ERP Solutions. Retrieved September 3, 2008 from
from http://www.mbtmag.com/article/CA254538. http://www.seradex.com/ERP/Lean_Manufactur-
html?q=Lean+ERP+software ing_ERP.php
1139
ERP Systems Supporting Lean Manufacturing in SMEs
Spearman, M. L., Hopp, W. J., & Woodruff, D. Turbide, D. A. (2005). Five ways ERP can help
L. (1999). A hierarchical control architecture for you implement Lean. EPICOR Software. Retrieved
constant work-in-process (CONWIP). Journal July 16, 2008 from http://whitepapers.zdnet.com/
of Manufacturing and Operations Management, abstract.aspx?docid=351964.
2(3), 147–171.
Wheatley, M. (2007). ERP is needed to sustain the
Spearman, M. L., & Zazanis, M. A. (1992). Push gains of Lean programs. Manufacturing Business
and pull production systems: Issues and com- Technology. Retrieved July 18, 2008 from http://
parisons. Operations Research, 40(3), 521–532. www.mbtmag.com/article/CA6450623.html
doi:10.1287/opre.40.3.521
WinMan. (2003). WinMan and Lean systems - A
Steger-Jensen, K., & Hvolby, H. (2008). Review white paper on integrating WinMan with Lean
of an ERP System Supporting Lean Manufactur- systems. Retrieved August 20, 2008 from http://
ing. In T. Koch (Ed.), International Federation www.winmanusa.com/PDF/WinMan_Lean_Sys-
for Information Processing (IFIP), Volume 257, tems.pdf
Lean Business Systems and Beyond (pp. 67-74).
WinMan. (2006). Athena Controls. Retrieved
Boston, MA: Springer.
August 20, 2008 from http://www.winmanusa.
Strategies, A. R. C. (2007). The when, why and com/success.asp
how of ERP support for Lean. SYSPRO, 1-22. Re-
Womack, J. P., & Jones, D. T. (1996). Beyond
trieved July 18, 2008 from http://www.syspro.com
Toyota: How to root out waste and pursue per-
Strategosinc (2008). Origins & history Lean fection. Harvard Business Review, (September-
Manufacturing. Retrieved July 18, 2008 from October): 140–158.
http://www.strategosinc.com/just_in_time.htm
Team, Q. S. G. (2006). Manufacturing can ac-
tively manage their value streams with Pelion’s
next generation EasyVSM tool. Retrieved July 20,
2008 from http://www.qsoftguide.com/cm/index.
php?blog=2&p=254&more=1&c=1&tb=1&pb=1
This work was previously published in Enterprise Information Systems for Business Integration in SMEs: Technological, Or-
ganizational, and Social Dimensions, edited by Maria Manuela Cruz-Cunha, pp. 56-75, copyright 2010 by Business Science
Reference (an imprint of IGI Global).
1140
1141
Chapter 4.17
Specifying Software Models
with Organizational Styles
Manuel Kolp
Université Catholique de Louvain Place des Doyens, Belguim
Yves Wautelet
Université Catholique de Louvain Place des Doyens, Belguim
Stéphane Faulkner
University of Namur Rempart de la Vierge, Belgium
AbstrAct INtrODUctION
Organizational Modeling is concerned with Analyzing the organizational and intentional con-
analyzing and understanding the organizational text within which a software system will eventu-
context within which a software system will ally operate has been recognized as an important
eventually function. This chapter proposes orga- element of the organizational modeling process
nizational patterns motivated by organizational also called early requirements engineering (see
theories intended to facilitate the construction of e.g., (Anton 1996, Dardenne, van Lamsweerde
organizational models. These patterns are defined & Fickas 1993, Yu 1995)). Such models are
from real world organizational settings, modeled founded on primitive concepts such as those
in i* and formalized using the Formal Tropos of actor and goal. This chapter focuses on the
language. Additionally, the chapter evaluates the definition of a set of organizational patterns that
proposed patterns using desirable qualities such as can be used as building blocks for constructing
coordinability and predictability. The research is such models. Our proposal is based on concepts
conducted in the context of Tropos, a comprehen- adopted from organization theory and strategic
sive software system development methodology. alliances literature. Throughout the paper, we
use i* (Yu 1995) as the modeling framework in
DOI: 10.4018/978-1-60566-146-9.ch006 terms of which the proposed patterns are presented
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Specifying Software Models with Organizational Styles
and accounted for. The research reported in this structure of an organization. Section 3 details two
paper is being conducted within the context of organizational patterns – the structure-in-5 and
the Tropos project (Giorgini, Kolp, Mylopoulos the joint venture – based on real world examples
& Pistore 2004, Giorgini, Kolp, Mylopoulos of organizations. These patterns are modeled in
& Castro 2005), whose aim is to construct and terms of social and intentional concepts using the
validate a software development methodology for i* framework and the Formal Tropos specification
agent-based software systems. The methodology language. Section 4 identifies a set of desirable
adopts ideas from multi-agent system technolo- non-functional requirements for evaluating these
gies, mostly to define the implementation phase patterns and presents a framework to select a pat-
of our methodology. It also adopts ideas from tern with respect to these identified requirements.
Requirements Engineering, where actors and goals Section 5 overviews the Tropos methodology.
have been used heavily for early requirements Finally, Section 6 summarizes the contributions
analysis. The project is founded on that actors of the chapter and overviews related work.
and goals are used as fundamental concepts for
modeling and analysis during all phases of soft-
ware development, not just early requirements, or strUctUrING OrGANIZAtIONs
implementation. More details about Tropos can
be found in (Giorgini et al. 2005). The present Organizational structures are primarily studied by
work continues the research in progress about Organization Theory (e.g., (Mintzberg 1992, Scott
social abstractions for the Tropos methodology. In 1998, Yoshino & Rangan 1995)), that describes
(Kolp, Giorgini & Mylopoulos 2002a), we have the structure and design of an organization and
detailed a social ontology for Tropos to consider Strategic Alliances (e.g., (Dussauge & Garrette
information systems as social structures all along 1999, Gomes-Casseres 1996, Morabito, Sack &
the development life cycle. In (Giorgini, Kolp & Bhate 1999, Segil 1996)), that model the strate-
Mylopoulos 2002, Kolp, Giorgini & Mylopoulos gic collaborations of independent organizational
2002b, Kolp, Giorgini & Mylopoulos 2006), we stakeholders who have agreed to pursue a set of
have described how to use this Tropos social ontol- agreed upon business goals.
ogy to design multi-agent systems architectures, Both disciplines aim to identify and study
notably for e-business applications (Kolp, Do & organizational patterns that describe a system
Faulkner 2004). As a matter of fact, multi-agent at a macroscopic level in terms of a manageable
systems can be considered structured societies of number of subsystems, components and modules
coordinated autonomous agents. In the present inter-related through dependencies.
paper, which is a extended and revised version of In this chapter, we are interested to identify,
(Kolp, Giorgini & Mylopoulos 2003), we empha- formalize and apply, for organizational modeling,
size the use of organizational patterns based on patterns that have been already well-understood
organization theory an strategic alliances for early and precisely defined in organizational theories.
requirements analysis, with the concern of model- Our purpose is not to categorize them exhaustively
ing the organizational setting for a system-to-be nor to study them on a managerial point of view.
in terms of abstractions that could better match The following sections will thus only insist on
its operational environment (e.g., an enterprise, patterns that have been found, due to their nature,
a corporate alliance, . . .) interesting candidates also considering the fact
The paper is organized as follows. Section 2 that they have been studied in great detail in the
describes organizational and strategic alliance organizational literature and presented as fully
theories, focusing on the internal and external formed patterns.
1142
Specifying Software Models with Organizational Styles
1143
Specifying Software Models with Organizational Styles
and ensures communication and feedback with local dimension and interact directly with other
the auction issuer who is responsible for issuing partners to exchange resources, such as data and
the bidding. knowledge. However, the strategic operation and
coordination of such an organization, and its ac-
strategic Alliances tors on a global dimension, are only ensured by
the joint management actor in which the original
A strategic alliance links specific facets of two or actors possess equity participations. We describe
more organizations. At its core, this structure is a and model examples of joint ventures in Section 3.
trading partnership that enhances the effectiveness The arm’s-length pattern implies agree-
of the competitive strategies of the participant ments between independent and competitive,
organizations by providing for the mutually ben- but partner actors. Partners keep their autonomy
eficial trade of technologies, skills, or products and independence but act and put their resources
based upon them. An alliance can take a variety and knowledge together to accomplish precise
of forms, ranging from arm’s-length contracts to common goals. No authority is lost, or delegated
joint ventures, from multinational corporations from one collaborator to another.
to university spin-offs, from franchises to equity The hierarchical contracting pattern iden-
arrangements. Varied interpretations of the term tifies coordinating mechanisms that combine
exist, but a strategic alliance can be defined as arm’s-length agreement features with aspects of
possessing simultaneously the following three pyramidal authority. Coordination mechanisms
necessary and sufficient characteristics: developed for arm’s-length (independent) charac-
teristics involve a variety of negotiators, mediators
• The two or more organizations that unite to and observers at different levels handling condi-
pursue a set of agreed upon goals remain tional clauses to monitor and manage possible
independent subsequent to the formation contingencies, negotiate and resolve conflicts and
of the alliance. finally deliberate and take decisions. Hierarchi-
• The partner organizations share the ben- cal relationships, from the executive apex to the
efits of the alliances and control over the arm’s-length contractors restrict autonomy and
performance of assigned tasks. underlie a cooperative venture between the parties.
• The partner organizations contribute on a The co-optation pattern involves the incor-
continuing basis in one or more key stra- poration of representatives of external systems
tegic areas, e.g., technology, products, and into the decision-making or advisory structure
so forth. and behavior of an initiating organization. By
co-opting representatives of external systems,
In the following, we briefly present organiza- organizations are, in effect, trading confidentiality
tional patterns identified in Strategic Alliances. and authority for resource, knowledge assets and
The joint venture will be studied in details in support. The initiating system has to come to terms
Section 3. with the contractors for what is being done on its
The joint venture pattern involves agreement behalf; and each co-optated actor has to reconcile
between two or more intra-industry partners to and adjust its own views with the policy of the
obtain the benefits of larger scale, partial invest- system it has to communicate.
ment and lower maintenance costs. A specific joint
management actor coordinates tasks and manages
the sharing of resources between partner actors.
Each partner can manage and control itself on a
1144
Specifying Software Models with Organizational Styles
Direction Edition
1 Campaigns Director 2 Editors IT
1 Creative Director 4 Copy writers 1 IT manager
1 Administrative Director 1 Network administrator
1 Finance Director Documentation 1 System administrator
1 Media librarian 1 Analyst
Campaigns Management 1 Resource librarian 1 Computer technician
2 Campaign managers 1 Knowledge worker
3 Campaign marketers
1 Editor in Chief Administration Accounts
1 Creative Manager 3 Direction assistants 1 Accountant manager
4 Manager Secretaries 1 Credit controller
Graphics 2 Receptionists 2 Accounts clerks
6 Graphic designers 2 Clerks/typists 2 Purchasing assistants
2 Photographers 1 Filing clerk
1145
Specifying Software Models with Organizational Styles
modeling framework for organizational modeling clouds, hexagons and rectangles; respectively,
(Yu 1995), which offers goal-and actor-based and dependencies have the form depender →
notions such as actor, agent, role, position, goal, dependum → dependee.
softgoal, task, resource, belief and different kinds GMT is a company specialized in telecom
of social dependency between actors. Its strate- services in Belgium. Its lines of products and
gic dependency model describes the network of services range from phones & fax, conferencing,
social dependencies among actors. It is a graph, line solutions, internet & e-business, mobile solu-
where each node represents an actor and each tions, and voice & data management. As shown
link between two actors indicates that one actor in Figure 2, the structure of the commercial or-
depends on the other for some goal to be attained. ganization follows the structure-in-5. An Execu-
A dependency describes an “agreement” (called tive Committee constitutes the Strategic Apex. It
dependum) between two actors: the depender and is responsible for defining the general strategy
the dependee. The depender is the depending ac- of the organization. Five chief managers (fi-
tor, and the dependee, the actor who is depended nances, operations, divisions management, mar-
upon. The type of the dependency describes the keting, and R&D) apply the specific aspects of
nature of the agreement. Goal dependencies the general strategy in the area of their compe-
represent delegation of responsibility for fulfill- tence: Finances & Operations is in charge of
ing a goal; softgoal dependencies are similar to Budget and Sales Planning & Control, Divisions
goal dependencies, but their fulfillment cannot Management is responsible for Implementing
be defined precisely (for instance, the apprecia- Sales Strategy, and Marketing and R&D define
tion is subjective or fulfillment is obtained only Sales Policy and Technological Policy.
to a given extent); task dependencies are used in The Divisions Management groups managers
situations where the dependee is required to per- that coordinate all managerial aspects of product
form a given activity; and resource dependencies and service sales. It relies on Finance & Opera-
require the dependee to provide a resource to the tions for handling Planning and Control of prod-
depender. As shown in Figure 1, actors are repre- ucts and services, it depends on Marketing for
sented as circles; dependums – goals, softgoals, accurate Market Studies and on R&D for Tech-
tasks and resources – are represented as ovals, nological Awareness.
1146
Specifying Software Models with Organizational Styles
The Finances & Operations departments • The dependencies between the Strategic
constitute the technostructure in charge of man- Apex as depender and the Technostructure,
agement control (financial and quality audit) and Middle Line and Support as dependees
sales planning including scheduling and resource must be of type goal
management. • A softgoal dependency models the stra-
The Support involves the staff of Marketing and tegic dependence of the Technostructure,
R&D. Both departments jointly define and sup- Middle Line and Support on the Strategic
port the Sales Policy. The Marketing department Apex
coordinates Market Studies (customer position- • The relationships between the Middle Line
ment and segmentation, pricing, sales incentive, and Technostructure and Support must be
. . .) and provides the Operational Core with of goal dependencies
Documentation and Promotion services. The R&D • The Operational Core relies on the
staff is responsible for defining the technological Technostructure and Support through task
policy such as technological awareness services. and resource dependencies
It also assists Sales people and Consultants with • Only task dependencies are permitted be-
Expertise Support and Technology Training. tween the Middle Line (as depender or de-
Finally, the Operational Core groups the Sales pendee) and the Operational Core (as de-
people and Line consultants under the supervision pendee or depender).
and coordination of Divisions Managers. They
are in charge of selling products and services to To specify the formal properties of the pattern,
actual and potential customers. we use Formal Tropos (Fuxman, Liu, Mylopoulos,
Figure 3 abstracts the structures explored in the Roveri & Traverso 2004), which extends the primi-
case studies of Figures 1 and 2 as a Structure-in-5 tives of i* with a formal language comparable to
pattern composed of five actors. The case studies that of KAOS (Dardenne et al. 1993). Constraints
also suggested a number of constraints to supple- on i* specifications are thus formalized in a first-
ment the basic pattern: order linear-time temporal logic. Formal Tropos
1147
Specifying Software Models with Organizational Styles
provides three basic types of metaclasses: actor, al. 2004) for more details). Special predicates can
dependency, and entity (Giorgini, Kolp & Mylo- appear in the temporal logic formulas: predicate
poulos 2002). The attributes of a Formal Tropos JustCreated(x) holds in a state if element x exists
class denote relationships among different objects in this state but not in the previous one; predicate
being modeled. Fulfilled(x) holds if x has been fulfilled; and predi-
cate JustFulfilled(x) holds if Fulfilled(x) holds in
Metaclasses this state, but not in the previous one.
Actor:= Actor name[attributes] [creation-prop- In the following, we only present some
erties] [invar-properties][actor-goal] specifications for the Strategic Management and
With subclasses: Operational Management dependencies.
Agent(with attributes occupies: Position, play:
Role) Actor StrategicApex
Position(with attributes cover: Role) Actor MiddleLine
Role Actor Support
Dependency:= Dependency name type mode Actor Technostructure
Depender name Dependee name [attributes] Actor OperationalCore
[creation-properties] [invar-properties] [fulfill- Dependency StrategicManagement
properties] Type SoftGoal
Entity:=Entity name [attribute] [creation-prop- Depender te: Technostructure, ml: MiddleLine,
erties][invar-properties] su: Support
Actor-Goal:= (Goal|Softgoal) name mode Dependee sa: StrategicApex
FulFillment(actor-fulfill-property) Invariant
Classes: Classes are instances of Metaclasses. ∀dep: Dependency (JustCreated(dep) →
Consistent(self, dep)) ∀ag: Actor - Goal
In Formal Tropos, constraints on the lifetime (JustCreated(ag) → Consistent(self, ag))
of the (meta)class instances are given in a first- Fulfillment
order linear-time temporal logic (see (Fuxman et
1148
Specifying Software Models with Organizational Styles
∀dep: Dependency (dep.type = goal ∧ dep.de- Core) that implement (ImplementedBy) the Op-
pender = sa ∧ erationalManagaemnt goal.]
(dep.dependee = te dep.dependee = ml dep.de- In addition, the following structural (global)
pendee = su)) ∧ properties must be satisfied for the Structure-in-5
Fulfilled(self) → ♦Fulfilled(dep) pattern:
1149
Specifying Software Models with Organizational Styles
1150
Specifying Software Models with Organizational Styles
dependency model. Airbus assumes two roles: Duferco (Italy), Usinor (France) – that also par-
Airbus Industrie and Airbus Joint Venture. tially owns Cockerill-Sambre (Belgium) through
Airbus Industrie deals with demands from the Arcelor group – and Sogepa (Belgium), a public
customers, Customer depends on it to receive investment company, representing the Walloon
airbus aircrafts or maintenance services. The Region Government. Usinor has also brought its
Airbus Joint Venture role ensures the interface for subsidiary Carlam in the alliance.
the four partners (CASA, Aerospatiale, British Roughly speaking, the aim of a steel manufac-
Aerospace and DASA) with Airbus Industrie turing company like CARSID is to extract iron
defining Airbus strategic policy, managing con- from the ore and to turn it into semi-finished steel
flicts between the four Airbus partners, defending products. Several steps compose the transforma-
the interests of the whole alliance and defining tion process, each step is generally assumed by a
new aircrafts specifications. Airbus Joint Venture specific metallurgic plant:
coordinates the four partners ensuring that each
of them assumes a specific task in the building of • Sintering Plant. Sintering is the prepara-
Airbus aircrafts: wings building for British Aero- tion of the iron ore for the blast furnace.
space, tail unit building for CASA, cockpit build- The minerals are crushed and calibrated to
ing and aircraft assembling for Aerospace and form a sinter charge.
fuselage building for DASA. Since Aerospatiale • Coking Plant. Coal is distilled (i.e., heat-
assumes two different tasks, it is modeled as two ed in an air-impoverished environment in
roles: Aerospatiale Manufacturing and Aerospa- order to prevent combustion) to produce
tiale Assembling. Aerospatiale Assembling de- coke.
pends on each of the four partners to receive the • Blast Furnace. Coke is used as a combus-
different parts of the planes. tion agent and as a reducing agent to re-
Carsid (Carolo-Sidérurgie) is a joint venture moves the oxygen from the sinter charge.
that has recently arisen from the global concentra- The coke and sinter charge are loaded
tion movement in the steel industry. The alliance, together into the blast furnace to produce
physically located in the steel basin of Charleroi in cast iron.
Belgium, has been formed by the steel companies
1151
Specifying Software Models with Organizational Styles
• Steel Making Plant. Different steps (de- ments, rich gases from the different plants, go-
sulphuration, oxidation, steel adjustment, droon, naphtalin, etc.) to external industries such
cooling, . . .) are necessary to turn cast iron as vehicle (automobile, train, boat, . . .) manufac-
into steel slabs and billets. First, elements turers, foundries, gas companies, building com-
other that iron are remove to give molten panies. It is also in charge of the proper environ-
steel. Then supplementary elements (tita- ment policy, a strategic aspect for steelworks that
nium, niobium, vanadium, . . .) are added are polluting plants. Most important, Carsid has
to make a more robust alloy. Finally, the been set up with the help of the Walloon Region
result – finished steel – is solidified to pro- to guarantee job security for about 2000 workers
duce slabs and billets. in the basin of Charleroi. Indeed, the steel indus-
• Rolling Mill. The manufacture of semi-fin- try in general and the Walloon metallurgical basins
ished products involves a process known in particular are sectors in difficulty with high
as hot rolling. Hot-rolled products are of unemployment rates. As a corrolar, the joint ven-
two categories: flat (plates, coiled sheets, ture is committed to improve regional economy
sheeting, strips, . . .) produced from steel and maintain work in the region. Carsid has then
slabs and long (wire, bars, rails, beams, been contractually obliged to plan maintenance
girders, . . .) produced from steel billets. investment (e.g., blast furnace refection, renova-
tion of coke oven batteries, . . .) and develop
Figure 5 models the organization of the Carsid production plans involving regional sub contrac-
joint venture in i*. Carsid assumes two roles Carsid tors and suppliers. Since steelmaking is a hard
S.A. (”Société Anonyme” – the english equivalent and dangerous work sector, Carsid, like any
is ”Ltd”) and Carsid Joint Venture. other steelworks, is legally committed to respect,
Carsid S. A. is the legal and contractual inter- develop and promote accident prevention stan-
face of the joint venture. It handles the sales of dards.
steel semi-finished products (bars, plates, rails, The Carsid joint venture itself coordinates the
sheets, etc. but also slabs, billets) and co-products steel manufacturing process. The sintering phase
(coke that does not meet blast furnace require- to prepare iron ore is the responsibility of Duferco
1152
Specifying Software Models with Organizational Styles
Sintering Plant while Usinor Coking Plant, dis- Part of the Joint Venture pattern specification
tills coal to turn it onto coke. The sinter charge is in the following:
and coke are used by Cokerill Blast Furnace to
produce cast iron by removing oxygen from sinter. Role JointManagerPrivateInterface Goal
Duferco Steel Making Plant transforms cast iron CoordinatePatterns
into steel to produce slabs and billets for Carlam Role JointManagerPublicInterface
Rolling Mill in charge of the hot rolling tasks. Goal TakeStrategicDecision
Carlam (Carolo-Laminoir). Sogepa, the public SoftGoal RepresentPartnershipInterests
partner, has the responsibility to develop regional Actor Partner
initiative to promote Carsid activities, particularly
in the Walloon Region and in Belgium.
Figure 6 abstracts the joint venture structures and the following structural (global) properties
explored in the case studies of Figures 4 and 5. must be satisfied:
The case studies suggest a number of constraints
to supplement the basic pattern: • ∀jmpri1, jmpri2: J
ointManagerPrivateInterface
• Partners depend on each other for provid- (jmpri1 = jmpri2)
ing and receiving resources. [Only one instance of the joint man-
• Operation coordination is ensured by the ager]
joint manager actor which depends on • ∀p1, p2: P artner, dep: Dependency (((dep.
partners for the accomplishment of these depender = p1 ∧ dep.dependee = p2) ∨
assigned tasks. (dep.depender =
• The joint manager actor must assume two p2 ∧ dep.dependee = p1)) → (dep.type
roles: a private interface role to coordinate = resource))
partners of the alliance and a public inter- [Only resource dependencies between
face role to take strategic decisions, define partners]
policy for the private interface and repre- • ∀jmpri: JointManagerPrivateInterface, p:
sents the interests of the whole partnership Partner, dep: Dependency((dep.dependee
with respect to external stakeholders. = p ∧ dep.depender = jmpri)
→dep.type = task)
1153
Specifying Software Models with Organizational Styles
[Only task dependencies between (Wooldridge & Jennings 1995) in the way that
partners and the joint manager, with they undertake action and communication in
the joint manager as depender] their domains. It can be then difficult to predict
• ∀jmpri: JointM anagerPrivateInterf ace, individual characteristics as part of determining
jmpui: JointM anagerPublicInterf ace, the behavior of the system at large. Generally,
dep: Dependency ((dep.depender = jmpri predictability is in contrast with the actors ca-
∧ dep.dependee = jmpui) pabilities to be adaptive and responsive: actors
→ (dep.type = goal ∨ dep.type = must be predictable enough to anticipate and plan
softgoal)) actions while being responsive and adaptive to
[Only goal or softgoal dependencies unexpected situations.
between the joint manager roles] Security. Actors are often able to identify
• ∀dep: Dependency, p1: Partner ((dep.de- their own data and knowledge sources and they
pender = p1 ∨ dep.dependee = p1) → may undertake additional actions based on these
((∃p2: P artner(p1≠ p2 ∧ (dep.de- sources (Woods & Barbacci 1999). Strategies
pender = p2 ∨ dep.dependee = p2)) ∨ for verifying authenticity for these data sources
(∃jmpi: J ointM anagerP rivateInterf by individual actors are an important concern in
ace ((dep.depender = jmpi ∨ dep. the evaluation of overall system quality since,
dependee = jmpi)))) in addition to possibly misleading information
[Partners only have relationships with acquired by actors, there is the danger of hostile
other partners or the joint manager external entities spoofing the system to acquire
private interface] information accorded to trusted domain actors.
• ∀dep: Dependency, jmpi: J ointM anagerP Adaptability. Actors may be required to adapt
rivateInterf ace ((dep.depender = jpmi ∨ to modifications in their environment. They may
dep.dependee = jpmi) → include changes to the component’s communica-
((∃p: P artner((dep.depender = p ∨ tion protocol or possibly the dynamic introduction
dep.dependee = p))) ∨ (∃jmpui: J of a new kind of component previously unknown
ointM anagerP ublicInterf ace ((dep. or the manipulations of existing actors.
depender = jmpui ∨ dep.dependee = Generally, adaptability depends on the capabili-
jmpui)))) ties of the single actors to learn and predict the
[The joint manager private interface changes of the environments in which they act
only has relationships with the joint (Weiss 1997), and also their capability to make
manager public interface or partners] diagnosis (Horling, Lesser, Vincent, Bazzan &
Xuan 1999), that is being able to detect and deter-
EVALUAtION mine the causes of a fault based on its symptoms.
However, successful organization environments
Patterns can be compared and evaluated with tend to balance the degree of reactivity and predict-
quality attributes (Shaw & Garlan 1996), also ability of the single actors with their capabilities
called non-functional requirements (Chung, to be adaptive.
Nixon, Yu & Mylopoulos 2000) For instance, Coordinability. Actors are not particularly
the requirements seem particularly relevant for useful unless they are able to coordinate with
organizational structures (Do, Faulkner & Kolp other agents. Coordination is generally (Jennings
2003, Kolp et al. 2006): 1996) used to distribute expertise, resources or
Predictability (Woods & Barbacci 1999). information among the actors (actors may have
Actors can have a high degree of autonomy different capabilities, specialized knowledge, dif-
1154
Specifying Software Models with Organizational Styles
ferent sources of information, resources, respon- prevent failure, different actors can have similar
sibilities, limitations, charges for services, etc.), or replicated capabilities and refer to more than
solve interdependencies between actors’ actions one actor for a specific behavior.
(interdependence occur when goal undertaken Modularity (Shehory 1998) increases effi-
by individual actors are related), meet global ciency of service execution, reduces interaction
constraints (when the solution being developed overhead and usually enables high flexibility. On
by a group of actors must satisfy certain condi- the other hand, it implies constraints on inter-
tions if is to be deemed successful), and to make organization communication.
the system efficient (even when individuals can Aggregability. Some actors are parts of
function independently, thereby obviating the need other actors. They surrender to the control of the
for coordination, information discovered by one composite entity. This control results in efficient
actor can be of sufficient use to another actor that workflow execution and low interaction overhead,
both actors can solve the problem twice as fast). however prevents the organization to benefit from
Coordination can be realized in two ways: flexibility.
As an illustration, we evaluate the patterns
• Cooperativity. Actors must be able to with respect to coordinativity, predictability,
coordinate with other entities to achieve fallibility-tolerance and adaptability. The evalu-
a common purpose or simply their local ation can be done in a similar way for the other
goals. Cooperation can either be communi- non-functional requirements. Due to the lack of
cative in that the actors communicate (the space, we refer the author to the bibliography for
intentional sending and receiving of sig- the other attributes.
nals) with each other in order to cooperate
or it can be non-communicative (Doran, • The structure-in-5 improves coordinativ-
Franklin, Jennings & Norman 1997). In ity among actors by differentiating the data
the latter case, actors coordinate their co- hierarchy -the support actor -from the con-
operative activity by each observing and trol hierarchy -supported by the operational
reacting to the behaviour of the other. In core, technostructure, middle agency and
deliberative organizations, actors jointly strategic apex. The existence of three dif-
plan their actions so as to cooperate with ferent levels of abstraction (1 -Operational
each other. Core; 2 -Technostructure, Middle Line and
• Competitivity. Deliberative negotiating Support; 3 -Strategic Apex) addresses the
organization (Doran et al. 1997) are like need for managing predictability. Besides,
deliberative one, except that they have an higher levels are more abstract than lower
added dose of competition. The success of levels: lower levels only involve resources
one actors implies the failure of others. and task dependencies while higher ones
propose intentional (goals and soft-goals)
Availability. Actors that offer services to other relationships. Checks and control mecha-
actors must implicitly or explicitly guard against nisms can be integrated at different levels
the interruption of offered services. of abstraction assuming redundancy from
Fallibility-Tolerance. A failure of one actor different perspectives and increase con-
does not necessarily imply a failure of the whole siderably fallibility-tolerance. Since the
organization. The organization then needs to check structure-in-5 separates data and control
the completeness and the accuracy of information hierarchies, integrity of these two hierar-
and knowledge transactions and workflows. To chies can also be verified independently.
1155
Specifying Software Models with Organizational Styles
1156
Specifying Software Models with Organizational Styles
towards the satisfaction of another one. For in- adopt from (Giorgini, Mylopoulos, Nicchiarelli &
stance, in Figure 7, Joint Venture contributes Sebastiani 2002) both qualitative and a numerical
positively to the satisfaction of Distributivity axiomatization for goal (requirements) modeling
and negatively to the Reliability. In addition, primitives and label propagation algorithms that
relationships “++” and “– –” model a situation are shown to be sound and complete with respect
where the satisfaction of a requirement implies to their respective axiomatization. In the following,
the satisfaction or denial of another goal. In Figure a brief description of the qualitative algorithm.
7, for instance, the satisfaction of Structure-in-5 To each requirement R, we associate two vari-
implies the satisfaction of requirements Reliability ables Sat(R), Den(R) ranging in {F, P, N} (full,
and Redundancy. partial, none) such that F > P > N, representing
The analysis for selecting an organizational the current evidence of satisfiability and deni-
setting that meets the requirements of the system ability of the requirement R. E.g., Sat(Ri) > = P
to build is based on propagation algorithms pre- states there is at least a partial evidence that Ai is
sented in (Giorgini, Mylopoulos, Nicchiarelli & satisfiable. Starting from assigning an initial set
Sebastiani 2002). Basically, the idea is to assign of input values for Sat(Ri), Den(Ri) to (a subset
a set of initial labels for some requirements of the of) the requirements in the graph, we propagate
graph, about their satisfiability and deniability, and the values through the propagation rules of Table
see how this assignment leads to the labels propa- 3. Propagation rules for AND (respectively OR)
gation for other requirements. In particular, we relationship are min-value function for satisfiabil-
Table 3. Propagation rules for satisfiability in the qualitative framework. A dual table is given for deni-
ability propagation.
+ - ++ --
G2→ G1 G2→ G1 G2→ G1 G2→ G1
Sat(G1) min{ Sat(G2), P } min{ Sat(G2), P } Sat(G2) N
Den(G1) N N Sat(G2)
1157
Specifying Software Models with Organizational Styles
1158
Specifying Software Models with Organizational Styles
cONcLUsION rEFErENcEs
Modelers need to rely on patterns, styles, and idi- Anton, A. I. (1996). Goal-based requirements
oms, to build their models, whatever the purpose. analysis. In Proceedings of the 2nd Int. Conf.
We argue that, as with other phases of software On Requirements Analysis, ICRE’96’, Colorado
development, organizational modeling can be Spring, USA, pp. 136–144.
facilitated by the adoption of organizational pat- Bates, L. D. V. (2006), Advertising Agency. At
terns. This paper focuses on two such patterns and http://www.ldv.be.
studies them in detail, through examples, a formal-
ization using Formal Tropos, and an evaluation Chung, L. K., Nixon, B., Yu, E., & Mylopoulos, J.
with respect to desirable requirements. There have (2000), Non-Functional Requirements in Software
been many proposals for software patterns (e.g., Engineering. Kluwer Publishing.
(Kolp, Do & Faulkner 2005)) since the original
Dardenne, A., van Lamsweerde, A., & Fickas, S.
work on design patterns (Gamma, Helm, Johnson
(1993). Goal-directed requirements acquisition.
& Vlissides 1995). Some of this work focuses
Science of Computer Programming, 20(1–2),
on requirements patterns. For example, (Konrad
3–50. doi:10.1016/0167-6423(93)90021-G
& Cheng 2002) proposes a set of requirements
patterns for embedded software systems. These Do, T. T., Faulkner, S., & Kolp, M. (2003).
patterns are represented in UML and cover both Organizational multi-agent architectures for in-
structural and behavioral aspects of a requirements formation systems. In Proc. of the 5th Int. Conf.
specification. Along similar lines, (Fowler 1997) on Enterprise Information Systems, ICEIS’03’,
proposes some general patterns in UML. In both Angers, France, pp. 89–96.
cases, the focus is on requirements analysis, and
Doran, J. E., Franklin, S., Jennings, N. R.,
the modeling language used is UML. On a dif-
& Norman, T. J. (1997). On cooperation in
ferent path, (Gross & Yu 2002) proposes a sys-
multi-agent systems. The Knowledge Engi-
tematic approach for evaluating design patterns
neering Review, 12(3), 309–314. doi:10.1017/
with respect to non-functional requirements (e.g.,
S0269888997003111
security, performance, reliability). Our approach
differs from this work primarily in the fact that Dussauge, P., & Garrette, B. (1999). Coopera-
our proposal is founded on ideas from Organiza- tive Strategy: Competing Successfully Through
tion Theory and Strategic Alliances literature. We Strategic Alliances. Wiley and Sons.
have already described organizational patterns
Fowler, M. (1997), Analysis Patterns: Reusable
but to be used for designing multi-agent system
Object Models. Addison-Wesley.
architectures (Kolp et al. 2006) and e-business
systems (Kolp et al. 2004). Considering real world Fuxman, A., Liu, L., Mylopoulos, J., Roveri, M.,
organizations as a metaphor, systems involving & Traverso, P. (2004). Specifying and analyzing
many software actors, such as multi-agent sys- early requirements in tropos. Requirements En-
tems could benefit from the same organizational gineering, 9(2), 132–150. doi:10.1007/s00766-
models. In the present paper, we have focused 004-0191-7
on patterns for modeling organizational settings,
Gamma, E., Helm, R., Johnson, J., & Vlissides,
rather than software systems and emphasized the
J. (1995). Design Patterns: Elements of Reusable
need for organizational abstractions to better match
Object-Oriented Software. Addison-Wesley.
the operational environment of the system-to-be
during organizational modeling.
1159
Specifying Software Models with Organizational Styles
Giorgini, P., Kolp, M., & Mylopoulos, J. (2002), Kolp, M., Do, T., & Faulkner, S. (2004). A social-
Multi-agent and software architecture: A com- driven design of e-business system. In Software
parative case study. In Proc. of the 3rd Interna- Engineering for Multi-Agent Systems III, Research
tional Workshop on Agent Software Engineering, Issues and Practical Applications. Edinburg, UK,
AOSE’02’, Bologna, Italy, pp. 101–112. pp. 70–84.
Giorgini, P., Kolp, M., Mylopoulos, J., & Castro, Kolp, M., Do, T., & Faulkner, S. (2005). Introspect-
J. (2005). A requirements-driven methodology for ing agent-oriented design patterns. In S. K. Chang,
agent-oriented software. In B. Henderson-Sellers (ed.), Handbook of Software Engineering and
& P. Giorgini, (Eds.), Agent Oriented Methodolo- Knowledge Engineering, 3, Recent Advances’,
gies. Idea Group Publishing, pp. 20–46. World Scientific, pp. 151–177.
Giorgini, P., Kolp, M., Mylopoulos, J., & Pistore, Kolp, M., Giorgini, P., & Mylopoulos, J. (2002a).
M. (2004). The tropos methodology. In M.-P. G. Information systems development through social
F. Bergenti & F. Zambonelli, (eds.), Methodolo- structures. In Proc. of the 14th Int. Conf. on Soft-
gies and Software Engineering for Agent Systems. ware Engineering and Knowledge Engineering,
Kluwer, pp. 89–105. SEKE’02’. Ishia, Italy, pp. 183–190.
Giorgini, P., Mylopoulos, J., Nicchiarelli, E., Kolp, M., Giorgini, P., & Mylopoulos, J. (2002b),
& Sebastiani, R. (2002). Reasoning with goal Organizational multi-agent architecture: A mobile
models. In Proceedings of the 21st International robot example. In Proc. of the 1st Int. Conf. on
Conference on Conceptual Modeling (ER 2002). Autonomous Agent and Multi Agent Systems,
Tampere, Finland, pp. 167–181. AAMAS’02’. Bologna, Italy, pp. 94–95.
GMT. (2006). Gmt consulting group. http://www. Kolp, M., Giorgini, P., & Mylopoulos, J. (2003).
gmtgroup.com/. Organizational patterns for early requirements
analysis. In Proc. of the 15th Int. Conf. on Ad-
Gomes-Casseres, B. (1996). The alliance revolu-
vanced Information Systems, CAiSE’03’. Velden,
tion: the new shape of business rivalry. Harvard
Austria, pp. 617–632.
University Press.
Kolp, M., Giorgini, P., & Mylopoulos, J. (2006).
Gross, D., & Yu, E. (2002). From non-functional
Multi-agent architectures as organizational
requirements to design through patterns. Require-
structures. Autonomous Agents and Multi-Agent
ments Engineering, 6(1), 18–36. doi:10.1007/
Systems, 13(1), 3–25. doi:10.1007/s10458-006-
s007660170013
5717-6
Horling, B., Lesser, V., Vincent, R., Bazzan, A.,
Konrad, S., & Cheng, B. (2002). Requirements
& Xuan, P. (1999). Diagnosis as an integral part
patterns for embedded systems. In Proc. of the
of multi-agent adaptability. Technical Report
10th IEEE Joint International Requirements En-
UM-CS-1999-003, University of Massachusetts.
gineering Conference, RE’02’. Essen, Germany,
Jennings, N. R. (1996). Coordination techniques pp. 127–136.
for distributed artificial intelligence. In G. M. P.
Mintzberg, H. (1992). Structure in fives: Designing
O’Hare & N. R. Jennings, (eds.), Foundations
effective organizations. Prentice-Hall.
of Distributed Artificial Intelligence. Wiley, pp.
187–210.
1160
Specifying Software Models with Organizational Styles
Morabito, J., Sack, I., & Bhate, A. (1999). Orga- Weiss, G. (Ed.). (1997). Learning in DAI Systems.
nization modeling: Innovative architectures for Springer Verlag.
the 21st century. Prentice Hall.
Woods, S. G., & Barbacci, M. (1999). Architec-
Scott, W. R. (1998). Organizations: Rational, tural evaluation of collaborative agent-based
natural, and open systems. Prentice Hall. systems. Technical Report SEI-99-TR-025, SEI,
Carnegie Mellon University, Pittsburgh, USA.
Segil, L. (1996). Intelligent business alliances:
How to profit using today’s most important stra- Wooldridge, M., & Jennings, N. R. (1995). Intel-
tegic tool. Times Business. ligent agents: Theory and practice. The Knowledge
Engineering Review, 2(10).
Shaw, M., & Garlan, D. (1996). Software Archi-
tecture: Perspectives on an Emerging Discipline, Yoshino, M. Y., & Srinivasa Rangan, U. (1995).
Prentice Hall. Strategic alliances: An entrepreneurial approach
to globalization. Harvard Business School Press.
Shehory, O. (1998). Architectural properties of
multi-agent systems. Technical Report CMU-RI- Yu, E. (1995). Modelling Strategic Relationships
TR-98-28, Carnegie Mellon University. for Process Reengineering. PhD thesis, University
of Toronto, Department of Computer Science.
Wautelet, Y., Kolp, M., & Achbany, Y. (2006).
S-tropos: An iterative spem-centric software
project management process. Technical Report
IAG Working paper 06/01, IAGISYS Information
Systems Research Unit, Catholic University of
Louvain, Belgium. http://www.iag.ucl.ac.be/wp/.
This work was previously published in Global Implications of Modern Enterprise Information Systems: Technologies
and Applications, edited by Angappa Gunasekaran, pp. 91-113, copyright 2009 by Information Science Reference (an
imprint of IGI Global).
1161
1162
Chapter 4.18
Mobile Strategy for
E-Business Solution
Anthony S. Atkins
Staffordshire University, UK
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Mobile Strategy for E-Business Solution
1163
Mobile Strategy for E-Business Solution
similar to the e-society i2010, which the European and Value Chain (Porter, 2001), strategic tools for
Commission is developing for a European Infor- mobile applications appear to be limited (Varshney
mation Society that promotes growth and jobs in and Vetter, 2002; Chen and Nath, 2004), with little
the EU (Hines, 2007). John Hopkins Hospitals has financial appraisal. A framework to assess strategic
implemented mobile applications to assists in their applications of mobile technology and pertinent
medical activities, such as e-prescriptions. This infrastructure is outlined to assist business manag-
implementation saves the hospitals $1,000 per ers in making financial and technological decisions
day by providing the pharmaceutical information in mobile business environments.
and the medicine that the patient needs (Brian,
2006). The use of data retrieval through a mobile
device can be similarly used in warehousing; EXtENtION tO M-cOMMErcE
Wal-Mart stocks can be identified using Radio
Frequency Identification (RFID) tags read from a Improved computing infrastructure has provided
special mobile RFID reader (Sliwa, 2006). Nissan e-business with an advantage, because it allows
automobiles have a similar approach with CRM global accessibility from any access points either
activities that allow the salesperson to answer wired or wirelessly. The e-business serves its
customer queries on the spot (Greengard, 2006). purpose by providing the capability to achieve
There are two types of mobile data retrieval revenue from low costs distribution and increased
technologies, which are classified as web-enabled sales from the global market. Customers are able
and standalone. The Web-enabled architecture to access these websites not only from their homes,
involves mobile devices to send and retrieve but also in cyber cafes, public hotspots where the
information from a centralised database. With users can access the internet using wireless LANs
the standalone database, the data are distributed and even on a mobile phone. The development
and stored on the mobile devices. The database of 3G mobile phones and PDAs now have the
can share the data among mobile devices, but ability to capture pictures and send them through
the original data remain in the mobile device for MMS (Multimedia Messaging Service). The
example using PDAs for collecting questionnaire 3G phones also allow video calls, video clips,
data. The type of wireless technology used, such and surfing of the internet via GPRS (General
as Wireless Local Area Network (WLAN), Wifi, Packet Radio Service) or CDMA (Code-Division
Bluetooth and WiMax, will also affect the type of Multiple Access), rather than through the classic
mobile application that a company can apply in WAP (Wireless Access Protocol). Users are now
their business activities. The most popular ones are able to view web pages via their mobile devices
Bluetooth and Wi-fi connections which are simple depending whether their phones support Hyper-
and less expensive to use. Japanese Wagamama Text Mark-Up Language (HTML) or WAP capa-
restaurant chains in the UK (Terry, 2006) apply bilities. The increasing amount of mobile phone
this type of mobile devices. Wi-fi applications are users within the next decade (Roto, 2007), would
more technically diverse as they can support both enable businesses to sell products electronically
Personal Digital Assistants (PDA) and computer over the mobile platform, similar to earlier e-
laptops. The evolution of mobile technology has business concepts. One example of this is Ring
provided new opportunities by extending mobile tones, which has generated over $600 million
infrastructure into the business, which enables the in sales via consumers mobile phones (Mobile
business to gain competitive advantage. Although Youth, 2006). An example of a mobile applica-
there are many strategic tools and techniques tion that assists in improving business activities
available such as Porter’s competitive analysis is the PDA insurance quota service (Serbedzija,
1164
Mobile Strategy for E-Business Solution
2005). This application has been implemented ment of 3G technologies and the introduction of
in Germany where young adults find the idea WiMax can involve around 47,000 base stations
of using a PDA device to electronically search in the UK of which two thirds of these installa-
insurance quotations for their automobiles very tions are on existing buildings. Another concern
useful, particularly as they are able to electroni- in the usage of mobile phones by the public is the
cally enter their details via the mobile device. As location awareness that traces the user’s mobile
a result, insurance companies in Germany have location anywhere in the world by satellite or cel-
used these PDA’s as their after sales activities to lular location awareness. This technology is similar
improve their Customer Relationship Manage- to the use of locating GPS (Global Positioning
ment (CRM) performance with their customers. System) which can be exploited by the military
Unfortunately not all mobile technology can be or police authorities with mobile users having no
applied to every business activities. Therefore, knowledge of being monitored.
strategic tools and techniques are needed to assist
companies in applying mobile applications into
their business activities (Atkins, et al., 2006). MObILE APPLIcAtIONs
The literature indicates that most mobile business FrAMEWOrK
applications are an extension of e-business rather
than a separate technology (Sliwa, 2004; UPS, Strategic planning is often used in starting a new
2007; Hadfield, 2006; www.e-health-insider.com, product or in improving business activities in a
2004; Cyber-Lab, 2005). competitive environment. Managers often use
strategic tools for forward planning, or to propose
a new solution to increase business profits. The
HEALtH, sAFEty, AND planning usually involves identifying weaknesses,
PrIVAcy IssUEs or opportunities in the business environment. The
use of strategic management tools can provide
This advancement of mobile devices has also helpful insights in competing against competi-
brought about health and safety concerns of the tors (Ghalayini and Noble, 1996). Some business
intense usage and associated radiation could lead strategic tools involve applying new technology or
to cancer problems in the future (www.who.int, merging with other business services to cut costs
2006). The radio frequency that mobile phones (Shaffer and Srinivasan, 2005). Other strategies
produce when they are on standby is very small, suggest concentrating on the source of income,
but during call times the type of wavelength it can such as ensuring customer satisfaction, or im-
emit is around 2 GHz during active transmission. proving relations with the suppliers and buyers.
The constant exposure to these mobile phones Some strategic ideas are ineffective because of the
can cause ‘heating’ or ‘thermal’ effect to the ear inability to predict environmental changes, coordi-
when the user makes the call. This thermal effect nation, and communication with the suppliers and
has made the general public perceive that mobile the customers. Identifying a strategic tool that can
phones could cause cancer (www.who.int, 2006). be used in specific business tends to be difficult
The effect on the brain when exposed to using this because of the array of tools available. Business
mobile technology is obviously a concern by the tools such as the SWOT (Strength, Weaknesses,
general public. The World Health Organisation Opportunities and Threats) and PEST (Political,
(WHO) has indicated general health awareness Economical, Socio-Cultural and Technological)
and the possible dangers of mobile devices and of are commonly used for marketing and in IT for
excessive use (www.who.int, 2006). The develop- business strategy. Strategic tools and techniques,
1165
Mobile Strategy for E-Business Solution
such as the Strategic Grid (McFarlan et al, 1984), financial scorecard has four types of perspective
Porter’s Five Forces (Porter, 2001), Value Chain as shown in Section A: the Financial, Customer,
(Porter, 2001), IT Business Alignment tool (Hen- Learning, and Growth, and Internal Business
derson, 1993), can improve business activities Process respectively. Each of these perspectives
and assist in providing competitive advantage. evaluates the strength and weaknesses of the
The proposed Mobile Business Application business by assessing the previous records of its
Framework, in Figure 1, is an aid to business activities. An example of the use of the scorecard
management in decision making within the three is when a company is considering implementing
regions of user mobility. The framework consists a mobile technology to improve the inventory
of two sections, firstly the Financial Scorecard, system using Radio Frequency Identification
as shown in Section A of Figure 1. The Financial (RFID) technology. The company could evaluate
Scorecard is used to assess the business process; the expected benefits by using the process cycle
activities and financial standing, similar to a cost of the Financial Scorecard.
benefit analysis, and can identify the weaknesses
and opportunity of the company (Lorsh, 1993). • In Part 1 of Figure 1, the process cycle of
The Financial Scorecard helps the business to mea- the Financial Scorecard starts with the
sure performance and resolve customer relations Financial Perspective. Management assess
and strategy issues. Figure 1 illustrates that the Financial Perspective, looking at previous
1166
Mobile Strategy for E-Business Solution
records or accounts of the business activi- bands of mobile usage. These bands are colour
ties, to set objectives, measures and opera- coded to signify ‘critical data transfer,’ which
tional goals. At the end of the business pro- indicates the importance of data transmission
cess, the management can view the record to the business applications. The three different
and comment on the Management regions differentiate the types of mobile device
Initiatives. This feedback checks if the and determine how the software application can
business has reached their intended goals be implemented in relation to business operations.
or requires additional procedures to en- The type of mobile device, or application, used
hance their business. in the business is shown by the vertical axis of
• These Scorecard procedures are repeated the diagram. The Intranet and Extranet region of
for the Customer, Learning and Growth, the framework, illustrated in Figure 1, can apply
and the Internal Business Perspective. a fully integrated mobile device or customised
• The Internal Business Process uses the application using normal mobile phones, such as
Mobile RFID Technology to enhance Wal-Mart Wireless Inventory Checking (Sliwa,
stock location processes in the warehouse. 2004). Also users within the Internet region can
The Management Initiatives column indi- use normal mobile devices but they will link or
cated in Part 2 of Figure 1 will be used to visit a web-enabled e-commerce database, to
record the success factor at the end of the connect to an application, for example an SMS
implementation. vending machine (SAFECOM, 2007).
• As the cycle repeats, the Management
Initiatives for the Financial Perspective are
assessed and recorded, to monitor the ef- MObILE bUsINEss APPLIcAtION
fects of implementing a mobile technology FrAMEWOrK ON WAL-MArt
in the business. This iterative process is re-
peated for the Customer, and the Learning Wal-Mart stores provide a range of goods including
and Growth Perspective. grocery goods, clothing, to electronics and frozen
• After completing the cycle (anti-clockwise goods all in affordable prices (Sliwa, 2004). The
in Part 1 of Figure 1) the Internal Business current IT infrastructure of Wal-Mart is based on
Process for implementing the mobile tech- the provision of the efficient ‘upstream’ supply
nology is assessed against the target goals chain system. Their main intent is to support its
as shown in Part 3. strategy by providing support for the most effi-
cient stock control, warehousing and distribution
In Figure 1, Section B illustrates the strategic systems in the business (Cyber-Lab, 2005). The
framework and identifies the type of mobile de- application of RFID technology has significantly
vice that would be suitable to the business. The improved their upstream supply chain. They are
framework indicated in Part 1 illustrates a radial able to keep costs to a minimum by keeping track
wave, or a ripple, which depicts the mobility range of Point-Of-Sales (POS) system and delivery
for mobile applications involving the Internet, Ex- times of the suppliers. Radio Frequency Identi-
tranet, and Intranet (Mobile Application Region). fiers (RFID) or identity tags, are small devices
These three regions are shown on the horizontal that look like label tags. They function by emit-
axis of the Framework. The implementation of ting small radio signals, which can be read by
the mobile RFID technology is contained within an RFID reader that can display a considerable
the warehouse, consequently this is an Intranet amount of data tagged on them. Such devices are
region. In each region, there are also circular commonly used for locating and identifying stock
1167
Mobile Strategy for E-Business Solution
1168
Mobile Strategy for E-Business Solution
• The use of these RFID tags is to identify ogy within their business for order taking. WiMax,
crates incoming and outgoing crates of the can be normally used to overcome geographical
Wal-mart warehouses. boundaries or avoid the problem of implementing
• The overall goal of the implementation is cables. The proposed mobile strategic framework
to improve the business activity by reduc- has been applied to several mobile commercial
ing costs and time taken to locate specific applicants is outlined (Pg Haji Ali, 2007; Pg Haji
supplier and inventories. Ali and Atkins, 2007). It demonstrates the use of a
Financial Scorecard to evaluate how the business
At the “Integrated Mobile/Device and Applica- cost effectiveness and departmental goals within
tion” stage shown in Figure 2 of the framework the company can be assessed, allowing managers
will determine the type of critical data transfer. The to identify and align strategic initiatives to the
data transferred between the centralised database business (Lorsch, 1993). In the case of mobile
and mobile devices will include type of stock, technology, the strategic framework assesses the
date, content and location of the crates. suitability of mobile devices for the business and
The following includes additional features considers the type of security and applications
into the system:- appropriate for a particular mobile device. The
mobile strategic framework is designed to assist
• Contingency arrangements include a bar- mangers to make informed decisions and increase
code or serial no. which the user can key competitive advantage in mobile infrastructure
in manually in the event that the RFID tag enhancements.
is damaged.
• In this instance, the original data transfer
is likely to be of the ‘High’ classification, rEFErENcEs
because a delayed delivery may result in a
severe chain reaction (i.e. compound ship- Alexander, L. (2007). Are Wireless Networks
ment delays) due to their use of a just in Safe?’ Retrieved 15 February 2007:-http://blogs.
time system. cio.com/node/656
Atkins, A. S., & Pengiran Haji Ali, A. K. Hairul
Nizam, & Shah, H. (October, 2006) Extending
cONcLUsION e-business applications using mobile technol-
ogy. In proceedings of International Confer-
The strategic framework tool presented here is ence on Mobile Technology, Applications and
designed to help managers identify where mobile Systems, IEE Mobility Conference. Bangkok
technology can enhance their strategic business Thailand. Retrieved from http://doi.acm.
operations. The business strategy should align org/10.1145/1292331.1292381
with IT strategy, organisational infrastructure and
information system infrastructure, in order to pro- Brian, K. (2006). Lowering Health Care Costs
vide competitive advantage. Wi-fi and Bluetooth Out-of-the-Box. Retrieved 27 September 2006:-
technologies are popular in businesses because of http://wireless.sys-con.com/read/40975.htm
the effective wireless range. The short wireless
British Red Cross. (2004). First aid at your finger-
range allows a more secure system, as the data
tips. Retrieved 6 July 2007:-http://www.redcross.
transmission signal may be contained within the
org.uk/news.asp?id=41091
business area. Japanese restaurant Wagamama
(Terry, 2006) has implemented Bluetooth technol-
1169
Mobile Strategy for E-Business Solution
Chen, L., & Nath, R. (2004). A Framework for Jarvenpaa, S. L. (2006). Internet Goes Mobile:
Mobile Business Application. Int. J. Mobile How Will Wireless Computing Affect Your Firm’s
Communications, 2(4), 368–381. doi:10.1504/ Internet Strategy? Retrieved at May 2006:-http://
IJMC.2004.005857 web.hhs.se/cic/about/blkcoffee/Internet_Mo-
bile_6-19_sj.pdf
Cyber-Lab. (2005). A Supermarket uses RFID
to Control Stock Inventory. Retrieved 12 April Lorsch, J. W. (1993). Smelling Smoke: Why
2006:-http://www2.cpttm.org.mo/cyberlab/rfid/ Boards of Directors Need the Balanced Scorecard.
wal-mart.html.en Balanced Scorecard Report, September-October,
pp. 9.
E-Health Insider. (2005). Addebrooke’s installs
SMS Patient reminder system. Retrieved at 1 McFarlan, F. W., James, L. M., & Philip, P. (1983).
March 2006:-http://www.e-health-insider.com/ The Information Archipelago – Plotting a Course.
news/item.cfm?ID=1236 Harvard Business Review, 61, 145–155.
Farhoomand, A., & Ng, S. P. (2003). Creating Sus- Mobile Youth. (2005). Retrieved 3 April 2006:-
tainable Competitive Advantage Through Inter- http://www.mobileyouth.org/my_item/ringtone_
networked Communities. Communications of the sales_build_600_mn_2005_revenues
ACM, 46(9), 83–88. doi:10.1145/903893.903898
Pg Hj Ali, A. H. N. (2007). Mobile Business
Ghalayini, A. M., & Noble, J. S. (1996). The Application. Masters by Research, Computing
Changing Basis of Performance Measure- Science, Faculty of Computing, Engineering
ment. International Journal of Operations and Technology, Staffordshire University, United
& Production Management, 16(8), 63–80. Kingdom – unpublished thesis.
doi:10.1108/01443579610125787
Pg Hj Ali, A. H. N., & Atkins, A. S. (2007, June). A
Greengard, S. (2001). Customer Services Goes Strategic Business Tool For Mobile Infrastructure.
Wireless. Business Finance, 35. Wireless Ubiquitous Computing, International
Conference on Enterprise Information Systems,
Hadfield, W. (2006). Police get Streetwyse to
Funchal, Portugal. (pp.23-32).
mobile ID checks. Computer Weekly, 4, 6.
Porter, M. E. (2001, March). Strategy and the
Haines, L. Digital divide is self-repairing, says
Internet. Harvard Business Review, 63–78.
UK gov (2005). Retrieved 5 February 2007:-http://
www.theregister.co.uk/2005/09/06/digital-divide/ Roto, V. (2007). Browsing on Mobile Phones.
Retrieved at 6 June 2007:-http://www.research.
Harrington, (2006). Standard and Guidelines
att.com/~rjana/WF12_Paper1.pdf
WHO. Retrieved 15 February 2007:-http://http://
www.who.int/peh-emf/standards/en/ Savi Technologies. (2007). Savi’s RFID Solu-
tions. Retrieved 6 June 2007:-http://www.savi.
Henderson, J. C., & Venkatraman, N. (1993).
com/index.shtml
Strategic Alignment: Leveraging Information
Technology for Transforming Organisations. IBM Savvas, A. (2007, February). Mobility is increas-
Systems Journal, 32(1), 4–16. ingly key to strategy. Computer Weekly, 13, 12.
1170
Mobile Strategy for E-Business Solution
Serbedzija, N., Fabiunke, M., Schön, F., & Beyer, KEy tErMs AND DEFINItIONs
G. (2006). Multi-Client Car Insurance. Proceed-
ings of the IADIS International Conference WWW/ Bluetooth Technology: Short-range wireless
Internet (ICWI) 2005, 2, 30-34. 19-22 October, radio technology for connecting small devices,
Lisbon, Portugal, ISBN: 972-8924-02-X such as wireless PDAs and laptops, to each other
and connect them in a wireless network.
Shaffer, D., & Srinivasan, M. (2005). Agile IT E-Business: Electronic Business is any busi-
through SOA Requires New Technologies: How ness process that relies on an automated informa-
Not to Fall Into the Trap of Applying Archaic tion system.
Integration Technologies! Retrieved at 6 June M-Payment: Mobile Payment is the process
2007:-http://www.alignjournal.com/index. for payment of goods or services with a mobile
cfm?section=article&aid=310 device such as a mobile phone, Personal Digital
Sliwa, C. (2004). Wal-Mart CEO prom- Assistant (PDA), or other wireless devices.
ises ‘tough love’ approach to RFID use. Re- Mobile Business Application: Commercial
trieved at 5 April 2006:-http://www.computer- usage of mobile electronic transaction in busi-
world.com/mobiletopics/mobile/technology/ ness operations.
story/0,10801,89011,00.html Mobile Technology: Use of mobile telephony,
mobile computing, and miscellaneous portable
Terry, L. (2006). Wireless Business and Technol- electronic devices, systems, and networks.
ogy. Serving up wireless. Retrieved 10 January Strategic Framework: A framework to pro-
2006 from:-http://wbt.sys-con.com/read/40916. vide a focused solution for assisting in business
htm decision-making.
UPS. (2005). Embracing Technology. Retrieved Wi-Fi: Wireless Fidelity commonly used to
19 September 2005 from:-http://www.ups.com/ broaden wireless interface of mobile computing
content/corp/about/history/1999.html devices, such as laptops in Local Area Network
(LAN).
Varshney, U., & Vetter, R. (2002). Mobile Com-
merce: Framework, Application and Networking
Support. Mobile Networks and Applications, 7,
185–198. doi:10.1023/A:1014570512129
This work was previously published in Handbook of Research in Mobile Business, Second Edition: Technical, Meth-
odological and Social Perspectives, edited by Bhuvan Unhelkar, pp. 104-112, copyright 2009 by Information Science
Reference (an imprint of IGI Global).
1171
1172
Chapter 4.19
Application of Software
Metrics in ERP Projects
S. Parthasarathy
Thiagarajar College of Engineering, India
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Application of Software Metrics in ERP Projects
instability, scheduling and software mainte- maintenance are not uncommon. A key issue
nance (Parthasarathy and Anbazhagan, 2006). in ERP implementation is how to find a match
Here, we use software metrics to manage and between the ERP system and an organization’s
improve these software processes during the business processes by appropriately customizing
ERP implementation. It explains specifically both the system and the organization (Arthur
how the software processes can be quantified, 1997). This is badly affected due to the instability
plotted, and analyzed so that the performance in the requirements proposed by the customer and
of ERP software development activities can be the poor capability of the ERP vendor.
predicted, controlled, and guided to achieve both The phase “Gap Analysis” in ERP implementa-
business and technical goals. As mentioned by tion is a step of negotiation between the company’s
Parthasarathy & Anbazhagan (2006), though requirements and the functions an ERP package
there are a handful of software processes for possesses (Carmel et al 1998). Poor requirements
ERP projects, the processes such as requirements specification and its instability badly affects the
stability, schedule slippage and monitoring the gap analysis phase of an ERP project which in
software maintenance tasks are considered more turn leads to schedule slippage and bubbles of
important and account for the performance en- problems during the maintenance phase of the
hancement of ERP projects. Hence, only these software project. The requirements instability
software processes are dealt with using software is probably the most important single software
metrics in the proposed Software Metrics Plan process issue for many organizations. The failure
(SMP) developed in this chapter. of many software projects can be directly linked
Many project managers acknowledge that to the requirements instability (Davenport 1998).
measurement helps them understand and guide Customization, the biggest technology headache
the development of their projects (Fenton et al is considered as the critical success factor for ERP
2003). They want to select particular metrics, implementation (Parthasarathy and Anbazhagan,
perhaps as part of an overall development plan, 2007).
but they do not know how to begin. The answers Even for those companies that have success-
to a manager’s metrics questions should appear fully implemented large-scale information systems
in the project’s metrics plan, so that managers projects in the past, ERP implementation still
and developers know what to collect, when to presents a challenge, because it is not simply a
collect it and how the data relate to manage- large-scale software deployment exercise. Also
ment decisions. The plan enables managers to as ERP implementation is often accompanied by
establish a flexible and comprehensive metrics large-scale organizational changes, agile software
program as part of a larger process or product processes could not create much impact on the
improvement program. The research about the ERP projects (Glass 1998). One of the major rea-
software process has acquired great importance sons found in the literature for the failure of ERP
in the last few years due to the growing interest projects is the poor software process management.
of software companies in the improvement of Hence a Software Metrics Plan (SMP) has been
their quality. ERP projects are very complex developed to deal with the software processes
products, and this fact is directly linked to their discussed in the literature review and found to be
development and maintenance. more important for successful ERP implementa-
The total quality management (TQM) notion tion. The software processes dealt with in the
of prevention rather than correction can be applied SMP for effective software process management
successfully in software engineering. The project during the ERP implementation are:
schedule slippage and tracking problems during
1173
Application of Software Metrics in ERP Projects
i. )>> Requirements Stability Index (RSI) pieces, size and effort. So the plan will explain
ii. )>> Schedule Slippage (SS) how size and effort are defined and then how
iii. )>> Arrival Rate of Problems (ARP) they are combined to compute productivity. At
iv. )>> Closure Rate of Problems (CRP) the same time, the plan must spell out “where”
v. )>> Age of Open Problems (AOP) and “when” during the process the measurements
vi. )>> Age of Closed Problems (ACP) will be made. Some measurements are taken once,
while others are made repeatedly and tracked
The SMP contains a set of software metrics over time. The time and frequency of collection
to manage these software processes during ERP are related to the goals and needs of the project,
implementation. Two hypotheses have been for- and those relationships should be made explicit
mulated and tested using statistical techniques in the plan.
to validate the SMP. The statistical analysis of “How” and “Who” address the identification
the collected data from an ERP project supports of tools, techniques, and staff available for metrics
these two hypotheses, leading to the conclusion collection and analysis. It is important that the plan
that the software metrics are momentous in ERP discusses not only what measures are needed but
projects. The results give fruitful information to also what tools are to be used for data capture and
the ERP team to identify the influence of one storage, and who is responsible for those activities.
process on another. Often, metrics plans ignore these crucial issues,
and project members assume that someone else
is taking care of the metrics business; the result is
SOFTWARE METRICS PLAN (SMP) that everyone agrees that the metrics are important,
but no one is actually assigned to get the data.
A metrics plan is much like a newspaper article: it Likewise, responsibility for analysis often slips
must describe the who, what, where, when, how though the project cracks on and data pile up but
and why of the metrics. With answers to all of are never used in decision making.
these questions, whoever reads the plan knows The plan must state clearly what types of
exactly why metrics are being collected, how analysis will be created with the data, who will
they are used, and how metrics fit into the larger do the analysis, how the results will be conveyed
picture of software development of maintenance. to the decision makers, and how they will support
The plan usually begins with the “why”. It is in decisions. Thus, the metrics plan prints a com-
this introductory section that the plan lays down prehensive picture of the measurement process,
the goals or objectives of the project, describing from the initial definition of need to analysis and
what questions need to be answered by project application of the results. Software processes have
members and software process management. For an important influence on the quality of the final
example, if reliability is a major concern to the software product, and for this reason companies
developers, then the plan discusses how reliability are becoming more and more concerned with
will be defined and what reporting requirements software process improvement.
are imposed on the project; later sections of the Successful management of the software pro-
plan can then discuss how reliability will be cess is necessary in order to satisfy the final qual-
measured and tracked. ity, cost and time of the marketing of the software
Next, the plan addresses “what” will be mea- products (Kitchenham et al 2002). To improve the
sured. In many cases, the measures are grouped software processes (Pressman 2006), a great variety
or related in some way. For instance, productiv- of initiatives have arisen like the Capability Maturity
ity may be measured in terms of two component Model (CMM), etc. All these initiatives focus on
1174
Application of Software Metrics in ERP Projects
software processes for developing, implementing or proving their software processes. The SMP will
improving a quality management system. An ERP have a set of well-defined metrics that will deal
project involves software processes that will exist with measuring the requirements stability, project
even after the implementation of the ERP system. In schedule slippage and tracking the problems arising
fact, the actual processes start only when the going during the maintenance phase. The SMP can also
alive is fixed during implementation. Traditional be further extended involving other aspects like
software projects have requirements collected from effort distribution, productivity, etc if desired. The
the customers for whom the software is developed. SMP will contain the following:
But in ERP projects, the software is made avail-
able to the customers readymade after fine tuning 1. )>> Source of data and how it will be captured
its functionality to match the exact requirements 2. )>> Periodicity of data capture
of the customers. The purpose of the SMP is to 3. )>> Formulae to measure the software process
enhance the performance of ERP projects by im- 4. )>> Team member responsible for data collection
1175
Application of Software Metrics in ERP Projects
1176
Application of Software Metrics in ERP Projects
able is influenced by the independent variables. Hypothesis 2: The metrics AOP, ACP de-
We denote the multiple correlations between x1, termine maintenance efforts (ME) (i.e)
the dependent variable and x2, x3,…xn, independent person-hours.
variables, by R1.234…n. The multiple correlation
coefficient of x1 on x2 and x3 is the simple correla- In the traditional software projects, from the
tion coefficient between the observed value of x1 view point of software engineering, there are five
and its estimated value b12.3 x2 + b13.2x3 denoted by phases in the software development life cycle
€1.23. We denote the multiple correlation of x1 on (SDLC). They are: Requirements Analysis, De-
x2 by R1(23). Equation (2) gives the value of R1(23). sign, Coding, Testing and Implementation. ERP
is a packaged software and its implementation in
R1(23) = Cov(x1, €1.23)/(√[Var(x1)] * √[Var(€1.23)] )>>(2) an enterprise involves six phases called the ERP
implementation lifecycle (Alexis Leon 2005).
The following two hypotheses are formulated They are: Requirements Analysis, Gap Analysis,
to focus our study on the usage of the software Reengineering, Configuration Management, Test-
metrics defined in the SMP for effective software ing and Maintenance. The RSI value and the SS
process management during the ERP implementa- value for these phases for the ERP project A are
tion and to facilitate statistical analysis. shown in the Table 7. The requirements of the
customers are collected and analyzed during the
Hypothesis 1: The metric RSI influences the requirements analysis phase. The gap analysis
metric schedule slippage (SS) phase is the step of negotiation between the cus-
1177
Application of Software Metrics in ERP Projects
tomer’s requirements and the functions the ERP This data analysis gives a great deal of support
package possesses (Alexis Leon 2005). to the two hypotheses formulated in this study.
Reengineering is defined as the fundamental The clearest result observed from the value of R
rethinking and radical redesign of business pro- and R1 (23) is: (i) The strong relationship between
cesses to achieve dramatic improvements in criti- RSI and SS; (ii) The influence of the Age of Open
cal, contemporary measures of performance, such Problems (AOC) and the Age of Closed Problems
as cost, quality, service and speed (Alexis Leon (ACP) over the Maintenance efforts (ME). The
2005). Table 7 provides the RSI and SS values most reasonable inference that can be drawn from
computed based on the data from ERP Project this study is the considerable influence of the
A. This Project A was done by a medium scale software processes in boosting the performance
software company involved in the development of of the ERP projects, because it helps the ERP
the ERP software for a manufacturing industry at team to effectively monitor the important software
a lower cost with standard configurations. It is not processes during the ERP implementation.
a large scale information system project like the
one being done by the leading ERP vendors SAP,
Oracle, etc., But from the research perspective, DISCUSSION
these data sets are found to be useful to validate
the hypotheses. The coefficient of correlation ‘R’ Measurement enables us to gain insight into the
between RSI and SS is calculated as 0.9406. process and the project by providing a mechanism
The value of R, being greater than zero, in- for objective evaluation. Measurement can be
dicates a positive correlation between the two applied to the software process with the intent of
variables RSI and SS. This indicates that the improving it on a continuous basis. Measurement
requirements stability index has an impact over can be used throughout a software project to as-
the schedule slippage of the phases during the sist in estimation, quality control, productivity
ERP implementation. Hence, a Metric-02 (shown assessment and project control. Measurement
in Table 2) has been defined to monitor the RSI. is a management tool. If conducted properly, it
Data obtained from the same project A were used provides a project manager with insight. And as
to compute the simple correlations between the a result, it assists the project manager and the
metrics ME (x1), AOP (x2) and AOC (x3) as r12 = software team in making decisions that will lead
0.863, r13 = 0.648 and r23 = 0.709 respectively. to a successful project. The intent of the SMP is to
The multiple correlation R1 (23) computed using provide a set of process indicators that lead to long-
the Equation (1) gives 0.864. Since R1 (23) is very term software process improvement. The only
large, it follows that the variables x2 and x3 have rational way to improve any process is to measure
considerable influence on the variable x1. In other specific attributes of the process, develop a set of
words, regression equation of x1 on x2 and x3 will meaningful metrics based on these attributes, and
be excellent. then use the metrics to provide indicators that will
1178
Application of Software Metrics in ERP Projects
lead to a strategy for improvement. SMP enables in the right path as and when there is a deviation.
the software engineering team to take a strategic The results obtained here underscore the impor-
view by providing insight into the effectiveness tance of effective software process management
of a software process. during the ERP implementation.
Many organizations jump into the implemen- A number of software processes are involved
tation without defining the project in “bite-sized in the software development and its maintenance.
chunks” that can be accomplished in a reasonable The six processes that require monitoring and ef-
period of time. As schedules drag on and require- fective management are considered in this study
ments are heaped on the initial phase, the customer and a SMP has been developed consisting of a
loses faith in the initiative and organizational set of software metrics to quantitatively measure
inertia can take hold. If requirements are managed the software processes. A software process is the
scrupulously and reflected in the form of clearly collection of processes for the various tasks in-
articulated scope elements, the entire project is volved in executing projects for building software
more likely to succeed, and chances are better for systems. As a result of changes in technology,
its ultimate adoption and survival. knowledge, and people’s skill, the processes for
Two kinds of observation are noted in this performing different tasks change. In other words,
research study on using the software metrics for processes evolve with time. With knowledge and
managing the software processes of the ERP proj- experience, processes can, and should, be “fine
ects. One observation is based on the statistical tuned” to give better performance.
analysis and another observation is related to the Software process management is concerned
usefulness of software metrics in ERP projects. with this tuning of the software process. There are
Statistical analysis shows that the SMP proposed many published reports showing the benefits the
in this study plays a significant role in the suc- software process management can bring to qual-
cessful ERP implementation. There is sufficient ity, productivity, and cycle time of ERP projects.
evidence from the literature review that the ERP Currently, most organizations that embark upon
projects are smashed heavily by poor software a software process management program tend
process management, especially the varying to use a framework like the quality models for
requirements due to organizational changes and their process improvement. From the application
customization. These varying requirements lead of the SMP to an ERP project A, it can be seen
to schedule slippage. that it is a straight forward approach to manage
It is apparent that large maintenance efforts the crucial software processes and help the ERP
are required for ERP projects as the real software implementation team to improve it.
processes get life only after ERP implementation. It A future research study could compare the
is evident that the proposed software metrics in the performance of various ERP projects using this
SMP is a pragmatic, useful method for improving SMP with those not using the SMP and the appli-
the software processes in ERP projects, because cation of other statistical techniques like multiple
it enables the ERP team to resolve the important linear regressions, etc. If the software metrics are
issues such as requirements instability, schedule linked with some software quality factors, then
slippage and efforts required for maintenance. the performance of the project can be further
Furthermore, the SMP determines decisions for improved (Mohammad Aishayeb 2003). Hence
the ERP team and provides against the possibilities generating suitable metrics to consider quality
of various defects that might arise during or after aspects of software processes will strengthen the
the implementation. In simple, the SMP helps the developed software product. It is also proposed
ERP team to keep track of their project and pilot it to develop a software tool to execute SMP. In the
1179
Application of Software Metrics in ERP Projects
future, we plan to generate a project database to Fenton, N. E., & Pfleeger, S. L. (2003). Software
make the results of SMP from each ERP project Metrics-A rigorous and Practical approach. New
publicly available for the ERP team. York: Thomson Publisher.
Glass, R. L. (1998). Enterprise Resource Plan-
ning—Breakthrough and/or term problems. The
REFERENCES
Data Base for Advances in Information Systems,
Aishayeb, M., & Li, W. (2003). An empirical 29(2), 14–16.
validation of object-oriented metrics in two dif- Holland, C. P., & Light, B. (1999). A critical suc-
ferent iterative processes. IEEE Transactions on cess factors model for ERP implementation. IEEE
Software Engineering, 29(11). Software, 16(3), 30–36. doi:10.1109/52.765784
Alexis, L. (2005). Enterprise resource planning. Humphrey, W. (2005). Managing the software
New Delhi, India: Tata McGraw-Hill. process. Reading, MA: Addison-Wesley.
Ambler, S. W. (2002). Agile Modeling: Effective Kitchenham, B. A., Huges, R. T., & Linkman, S.
Practices for Extreme Programming and the Uni- G. (2002). Modeling software measurement data.
fied Process. New York: Wiley. IEEE Transactions on Software Engineering,
Arthur, L. J. (1997). Quantum improvement in 27(9), 788–804. doi:10.1109/32.950316
software system quality. Communications of the Levine, D. M., Berenson, M., & Stephan, D.
ACM, 40(6), 47–52. (1999). Statistics for managers. Upper Saddle
Beck, K. (1999). Embracing changes with River, NJ: Prentice Hall.
extreme programming. Computer,Embracing Lucus, H. C. (n.d.). Implementation: The Key
change with extreme programming, 70–77. to Successful Information Systems. Columbia
doi:10.1109/2.796139 Management, 11(4), 191–198.
Carmel, E., & Sawyer, S. (1998). Packaged soft- Luo, W., & Strong, D. M. (2004, August). A frame-
ware development teams: what makes them dif- work for evaluating ERP implementation choices.
ferent? Information Technology & People, 11(1), IEEE Transactions on Engineering Management,
7–19. doi:10.1108/09593849810204503 51(3). doi:10.1109/TEM.2004.830862
Chidamber, S. R., & Kemerer, C. F. (1994). A Parthasarathy, S., & Anbazhagan, N. (2007).
metrics suite for object-oriented design. IEEE Evaluating ERP Implementation Choices using
Transactions on Software Engineering, 20(6). AHP. International Journal of Enterprise Infor-
doi:10.1109/32.295895 mation Systems, 3(3), 52–65.
Davenport, T. H. (1998). Putting the enterprise into Pressman, S. (2001). Software engineering-A
the enterprise system. Harvard Business Review, practioner’s approach. New Dehli, India: Tata
76(4), 121–131. McGraw-Hill.
Dunsmore, H. E. (1984). Software metrics: an Robey, D., Ross, J. W., & Boudreau, M. C. (2002).
overview of an evolving methodology. Informa- Learning to implement enterprise systems: An
tion Processing & Management, 20, 183–192. exploratory study of the dialectics of change. Jour-
doi:10.1016/0306-4573(84)90048-7 nal of Management Information Systems, 19(1).
1180
Application of Software Metrics in ERP Projects
Sambamurthy, V., & Kirsch, L. J. (2000). An Stensurd, E., & Myrtveit, I. (2003, May). Iden-
integrative framework of the information sys- tifying high performance ERP projects. IEEE
tems development process. Decision Sciences, Transactions on Software Engineering, 29(5).
31(2), 391–411. doi:10.1111/j.1540-5915.2000.
tb01628.x
Sharma & Goyal. (1994). Mathematical statistics.
Meerut, India: Krishna Prakashan Mandir.
This work was previously published in Enterprise Information Systems and Implementing IT Infrastructures: Challenges and
Issues, edited by S. Parthasarathy, pp. 51-60 , copyright 2010 by Information Science Reference (an imprint of IGI Global).
1181
Section V
Organizational and
Social Implications
This section includes a wide range of research pertaining to the social and organizational impact of enterprise
information systems. Chapters included in this section analyze the impact of power relationships in system imple-
mentation, discusses how enterprise systems can be used to support internal marketing efforts, and demonstrate
that perceived shared benefits, system characteristic, and the degree of knowledge of the system are significant
influences on an individual’s willingness to use enterprise resource planning systems. The inquiries and methods
presented in this section offer insight into the implications of enterprise information systems at both a personal
and organizational level, while also emphasizing potential areas of study within the discipline.
1183
Chapter 5.1
Optimization of Enterprise
Information System through a
‘User Involvement Framework
in Learning Organizations’
Sumita Dave
Shri Shankaracharya Institute of Management & Technology, India
Monica Shrivastava
Shri Shankaracharya Institute of Management & Technology, India
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Optimization of Enterprise Information System
tation of quality enhancement techniques to meet Hence, in order to ensure that the IT enabled
the growing demands of competition. Moreover change acts as an enabler of growth, it becomes
the competitive pressures and escalating mainte- necessary to evaluate the firm’s learning capa-
nance costs is pressuring organizations to replace bilities. Organizational learning takes place when
the legacy system of operations. The envisioned successful organization learning is transferred to
benefits of IT enabled change is the enhancement an organization’s shared beliefs. Learning is the
of competitive ability through the networking of key competency required by any organization that
geographically distant work groups and a more wants to survive and thrive in the new knowledge
effective utilization of man, material and machine. economy. As organizations grow old though they
While evaluating the benefits of enterprise accumulate competencies, resources and knowl-
information systems, the explicit outcome is edge, there is a possibility that their structures
change in the organization’s system as a whole to become a hindrance to their ability to respond
implement the new practices and processes and to the challenges posed by the competition. A
ideas. With the introduction of a knowledge base, constructivist-learning environment is a place
the challenge for the organization gets magnified where people can draw upon resources to make
as the perceived flexibility when evaluated in sense out of things and construct meaningful solu-
physical terms may be accurate but may fall short tions to problems. It emphasizes the importance
in meeting the much needed psychological flex- of meaningful, authentic activities that help the
ibility. Hence, ERP and other forms of IT enabled learner to construct understandings and develop
solutions, which are being widely adopted with skills relevant for solving problems.
a view to maximize capabilities, are not able to “Make learning part of every day office
deliver the expected outcomes due to such inac- environment” is the mantra to survive in this
curate calculations. competitive world. The Learning Organization
The implementation of any IT enabled op- is one that learns continuously and transforms
erations systems requires a systematic approach itself. Learning takes place in individuals, teams,
which includes the evaluation of the organization’s the organizations, and even the communities with
learning capabilities. Hammer and Champy (1993) which the organizations interact. Learning results
focused on IT based organizational reengineer- in changes in knowledge, beliefs, and behaviors.
ing. Their vision can be summarized along the Learning also enhances organizational capacity
following points. for innovation and growth. The Learning Organi-
zation has embedded systems or mechanisms to
1. Radical transformation: It is time consuming capture and share learning. Thus organizational
and does not happen overnight. learning is an important part of Organizational
2. Changes come from a clean slate through the Transformation process.
conceptualization of gradual work arrange-
ments unlike total quality management. Enterprise Information system
3. The focus of change should be process based.
4. The change needs to be initiated at the top An Enterprise Information System (EIS) is a type
and then directed downwards throughout of management information system made to fa-
the organization. and cilitate and support the information and decision
5. Seamless access to information to one and making needs of senior executives by providing
all. easy access to both internal and external informa-
tion relevant to meeting the strategic goals, of the
1184
Optimization of Enterprise Information System
1185
Optimization of Enterprise Information System
which are going to be replaced by the ERP system help of the Digital Company, got transformed on
soon. (see Figure 1) introduction of SUN Servers, Oracle database
Studies have revealed that the rate of success and Developer 2000 and finally went on the web
of IT enabled change is rather low. Although, with Oracle 10g, Apache Web Servers and JSP,
IT enabled change has significantly altered the all developed in-house.
managerial paradigms within the organization with The Materials Management System was de-
a view to raise the organization to a higher plane veloped to take care of procurement of Stores and
of performance through a greater involvement of Spares, quality management, logistics manage-
the employees at large, by functionally integrating ment, bill processing, bill payment and inventory
the various departments, it was found in a study management of these procured items. To facilitate
conducted by us that success begets success may the system, masters like material master, vendor
not always hold true. master, etc were extensively developed and sec-
Some of the areas where legacy systems are tions identified to maintain them.
currently working and running successfully in With the introduction of ATM network across
BSP are shown in Table 1. the Plant, the systems were extended beyond the
Over the years substantial data has been col- boundaries of Materials Management, to the end
lected which is helping the decision making with users. Planning sections across the Plants were able
respect to different business processes. One of the to prepare Purchase Requisitions and send them
most extensive System of Bhilai Steel Plant is the online through the approval process to the Purchase
Materials Management System. This system is Department for procurement action. Customized
as old as computerization in BSP. It started with forms were developed in Legacy system to cater
IBM mainframes and tape drives and graduated to this. They were also able place reservations for
to VAX VMS based system, developed with the items lying in the central stores. Various queries
1186
Optimization of Enterprise Information System
Table 1.
were provided to end users thereby improved the way in reducing the Purchasing Lead time thereby
visibility of stock and reduced over indenting of saving a lot of revenue for the company. Other
stores and spares. This had a tremendous impact units of SAIL have outsourced this application
on the inventory turnover ratio which has consid- through a company Metal Junction. The in-house
erably gone down. development and maintenance of the E – procure-
With the introduction of the concept of Door ment solution has saved a lot of outflow of revenue
Delivery through the Store Issue Note Generation of the company. About 65% of the total volume
System (SINGS), a number of material chasers of procurement is being carried out through the
were redeployed for other jobs in the shops as E – procurement route.
the responsibility of delivery of stores and spares Computerization of Store Bills and Store Ac-
was shifted to the stores department which car- counting section and linking it to the Materials
ried out this function centrally. The vehicles used Management System lead to a huge reduction of
by various shops were redeployed. Thus due to manpower who were required before to process
introduction of this system there was substantial bills manually. The payment lead time also got con-
reduction of manpower and vehicle requirement siderably reduced thereby winning the goodwill
in the shops. of the suppliers of the company. The introduction
With the complete Purchasing activity on the of E – Payment has further reduced the lead time
system, the Purchasing lead time got considerably and the manpower required.
reduced. The introduction of in-house E – Pro- With the built-up of database of transactions and
curement system was a major step forward for historical data, a number of analyses are helping the
the Materials Management System as with this company take correct decisions. Inventory analysis,
the legacy system was treading into the challeng- ABC analysis, XYZ analysis, lead time of procure-
ing Internet world where encryption, security & ment of items, analysis of non moving items and slow
transparency were the new challenges. This again moving items has helped in reducing inventory and
was successfully implemented and has gone a long also take informed decisions during procurement.
1187
Optimization of Enterprise Information System
Lately the control of Procurement Budget and will cater to all their requirements and also be
Consumption Budget has been strengthened and completely up-to-date. Realizing the requirement
regular monitoring is being done by the higher of such organizations, software like Enterprise
management. Another area of concern of the Resource Planning solution incorporating best
management – Shop Inventory has been addressed business practices have been designed, which
by a legacy system which monitors the shop floor will offer an integrated software solution to all
inventory of BSP. All these are possible only due the business functions of an organization.
to the strong legacy system in Bhilai Steel Plant. In the ever growing business environment the
With the introduction of various legacy systems following demands often plague an organization:
in the company, executives and non executives
were forced to take up learning computers. This • Cost control initiatives
has improved the skill set of employees and also • Need to analyze costs or revenues on a
of the developers of the legacy systems who have product or customer basis
to continuously upgrade themselves to match the • Flexibility to respond to ever changing
pace with the industry. With the introduction of business requirements
E – procurement, even the small suppliers too • More informed management decision
have taken up computers and are hugely benefit- making by seamless information flow
ting out of this. • Changes in ways of doing business
• Simulate the complexity of variables ef-
Limitations of the Present fecting businesses
system in bsP
Difficulty in getting accurate data, timely in-
The legacy systems being used in the plant are formation and improper interface of the complex
able to help meet the demands of the plant in the natured business functions have been identified as
present scenario, but in days to come with the the hurdles in the growth of any business. Time
advent of newer technologies and new competi- and again depending upon the speed of the grow-
tion the present system will not be that effective. ing business needs, many solutions have come up
Hence, the management has decided to implement and ERP is one of such solution.
Enterprise Resource Planning in order to meet the Some of the features of ERP which are com-
changing demands of the market. pelling organizations to make it part and parcel
The present systems have been made to cater of their business activities are:
to demands of a particular area and hence are
not holistic in nature. Because of this, there is • It facilitates company-wide Integrated
no centralized database and the systems are not Information System covering all func-
integrated, resulting in less user involvement and tional areas like Manufacturing, Selling
interaction with the system. and distribution, Payables, Receivables,
Inventory, Accounts, Human resources,
Need for change Purchases etc.,
• It performs core activities and increases
Most organizations across the world have real- customer service.
ized that in a rapidly changing environment, it • It bridges the information gap across the
is impossible to create and maintain a custom organisation i.e. results in seamless flow of
designed or tailor made software package which information.
1188
Optimization of Enterprise Information System
1189
Optimization of Enterprise Information System
1190
Optimization of Enterprise Information System
making employees feel less motivated and hence Level of Consideration: 5% level of signifi-
the overall learning process has taken a backseat. cance
The major players of learning process, namely
structure, processes and information flow in the
current scenario is becoming a deterrent in making Hypothesis
the company, outsmart its competitors and face
the change in economy. H0: All parameters have the same potential ac-
Hence an LOP survey was done on BSP to cording to the employees
identify the key areas where improvement is pos-
sible to enhance the learning capabilities of the (X1=X2=X3=X4=X5=X6=X7=X8)
organization so as to facilitate a smooth adoption
of technologies.
H1: All the parameters do not have the same po-
research Methodology tential according to the employees.
Sampling: Simple Random sampling was un- (Xi ≠ Xj), (where i, j =1,2,3,4,5,6,7,8)
dertaken on Bhilai Steel Plant and five (5) major
departments namely; materials management,
plant maintenance, purchase, finance and quality Assumption
management were covered.
30 points are assumed to be the standard value of
Sample Size: 50 Executives. parameters (where x >= 30) (see Table 3)
1191
Optimization of Enterprise Information System
Table 4.
1192
Optimization of Enterprise Information System
Table 5.
1. RAT (Role Analysis Transaction) but also enhances commitment thus stimulating
2. Diagnostic Window critical thinking about the organization needs
and priorities.
RAT is a tool for improving the effectiveness RAT and Diagnostic window can be most
of work groups. It helps to clarify the role expec- helpful in conditions of structural change such as
tations; i.e. the expectations the members of the that of BSP as they help to address personal and
work group have for their own performance and behavioral adjustments to the creation of change.
for the performance of other group members. The
role requirements are determined by consensus,
which ultimately results in more effective and cONcLUsION
mutually satisfactory performance. It enhances
participation and collaboration, hence enhanced To be able to maintain the market share there is
holistic framework, shared vision and emotional a definite need for change and the organizations
maturity. with is capable of learning are able to implement
Diagnostic Window – It helps the groups the same in more effective manner. Change is ac-
to identify important issues and problems. The companied by resistance which can be managed
issues are discussed according to the following
quadrants shown in Table 6.
The idea is to reach a consensus on issues Table 6.
and the likelihood of change where it is required
Amenable to change Potential Operational
and help the group to define some action plans
Not Amenable to change Disaster Temporary
to address the needed change. This activity not
only encourages participation and communication
1193
Optimization of Enterprise Information System
by proper user training and communication. Thus, Dayal, I., & Thomas, J. M. (1968). Role
although it is very necessary for organizations to analysis technique, operation KPE: Develop-
adopt IT enabled operations; a proper analysis of ing a new organization. The Journal of Ap-
the existing legacy system needs to be done in the plied Behavioral Science, 4(4), 473–506.
light of the existing system so as to ensure full doi:10.1177/002188636800400405
and timely acceptability of the new technology.
Garwin, D. A. (1993). Building a learning orga-
nization. Harvard Management Review, 88-91.
rEFErENcEs Gupta, V. (2004). Transformative organizations:
A global perspective. Response Books.
Amburgey, T., Kelly, D., & Barnett, W. P. (1993).
Resetting the clock: The dynamics of organiza- Hammer, M., & Champy, J. (1993). Reengineering
tion change and failure. Administrative Science the corporation: A manifesto for business revolu-
Quarterly, 38, 51–73. doi:10.2307/2393254 tion. New York: Harper Collins.
Argyris, C. (1982). Reasoning learning and ac- Hammer, M., & Stanton, S. A. (1995). The reen-
tion: Individual and organizational. Jossey Bass. gineering revolution handbook. London: Harper
Collins.
Argyris, C. (1991). Teaching smart people how
to learn. Harvard Business Review. Leedy, P. D., & Ormrod, J. E. (2004). Practical
research: Planning and design. PHI.
Baron, J. N., Burton, D. M., & Hannan, M. T.
(1996). The road taken: Origins and evolution Linden, R. (1984). Seamless government: A
of employment. practical guide to reengineering in public sector.
Booth, W. C., Williams, J. M., & Colomb, G. Lyons, P. (1999). Assessment techniques to en-
G. (2003). The craft of research. University of hance organization learning. Opinion papers.
Chicago. Pareek, U. (2002). Training instruments in HRD
Bordens, K. S. (2005). Research design methods, & OD, 2nd edition. TMH.
6th edition. Bruch & Abbot, TMH. Ruma, S. (1974). A diagnostic model for organi-
Coulsin-Thomas, C. (1996). Business process zational change, social change (pp. 3-5).
reengineering: Myth and reality. London: Kogna Seinge, P. (1991). An interview with Peter Seinge:
Page. Learning organizations made plain. Training and
Courtney, N. (1996). BPR sources and uses. In Development.
C. Coulsin-Thomas (Ed.), Business process engi- Senge, P. (n.d.). The fifth discipline: The art and
neering: Myth and reality (pp. 226-250). London: practice of learning organizations. Doubleday/
Kogna Page. Currency.
Davenport, T. H. (1996). Process innovation: Re- Shajahan, S. (2005). Research methods for man-
engineering work through information technology. agement, 3rd edition. Jaico Publishing House.
1194
Optimization of Enterprise Information System
This work was previously published in Always-On Enterprise Information Systems for Business Continuance: Technologies
for Reliable and Scalable Operations, edited by Nijaz Bajgoric, pp. 78-90, copyright 2010 by Information Science Reference
(an imprint of IGI Global).
1195
1196
Chapter 5.2
Authority and Its
Implementation in Enterprise
Information Systems
Alexei Sharpanskykh
Vrije Universiteit Amsterdam, The Netherlands
Copyright © 2011, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Authority and Its Implementation in Enterprise Information Systems
1197
Authority and Its Implementation in Enterprise Information Systems
illustrates how the introduced formal language can Although authority and influence often stem
be used to model authority systems of different from different sources, they are often interrelated
types of organizations. The next section discusses in organizations. For example, the probability of
the integration of formal authority relations into the successful satisfaction of organizational goals
an automated EIS. Finally, the article concludes increases, when a strong leader (meaning a leader
with a Discussion section. that has a great value of influence) occupies a supe-
rior position of authority. Furthermore, sometimes
patterns of influence that frequently occur in an
POWEr, AUtHOrIty AND organization may become institutionalized (i.e.,
INFLUENcE may become authority relations).
Modeling methods for authority and influence
As in many contemporary social theories (Pea- are essentially different. While authority relations
body, 1964; Clegg, 1989), we assume that power are often prescriptive and explicitly defined,
can be practiced in an organization either through influence relations are not strictly specified and
(formal) authority or through (informal) influence may vary to a great extent. Therefore, whereas
relations. Authority represents formal, legitimate authority relations can be generally represented in
organizational power by means of which a regu- EISs, the specification of influence relations is de-
lated normative relationship between a superior pendant on particular (cognitive) models of agents
and a subordinate is established. Usually, author- that represent organizational actors. Relations
ity is attached to positions in organizations. For between authority and influence can be studied
example, authority of some managerial positions by performing simulation with different types of
provides power to hire or to fire; to promote or to agents situated in different organizational environ-
demote; to grant incentive rewards or to impose ments. The focus of this article is on modeling of
sanctions. In many approaches, it is assumed formal authority relations. Influence relations and
that authority implies involuntary obedience relations between authority and influence will be
from subordinates. Indeed, as authority has a considered elsewhere.
normative basis that comprises formal, explicitly
documented rules, it is expected that subordinates,
hired by the organization, should be aware of and AUtHOrIty: A FOrMAL
respect these rules, which implies the voluntary APPrOAcH
acceptance of authority.
All manifestations of power that cannot be First, a formal language for specifying authority-
explained from the position of authority fall into related concepts and relations is introduced.
the category of influence. In contrast to author- The next section discusses how the introduced
ity, influence does not have a formal basis. It is language can be used for representing authority
often persuasive and implies voluntary submis- structures of organizations of different types.
sion. Some of the bases of influence are techni-
cal knowledge, skills, competences and other A Formal Language
characteristics of particular individuals. Influence
is often exercised through mechanisms of leader- Simon (1957) describes three contributions of
ship; however, possession of certain knowledge authority for an organization: (1) the enforcement
or access to some resources, as well as different of responsibility, (2) the specialization of decision
types of manipulation may also create influence. making, and (3) the coordination of activity. Based
Influence may be realized in efforts to affect on this and other theoretical findings that describe
organizational decisions indirectly.
1198
Authority and Its Implementation in Enterprise Information Systems
power, duties and responsibilities of organizational All types of decisions with respect to a particu-
positions (Mintzberg, 1979), a number of relations lar process can be divided into two broad groups:
for the specification of formal authority can be technological and managerial decisions (inspired
identified. These relations are defined on positions by Bacharach and Aiken [1977]). Technological
(or roles), without considering particular agents decisions concern technical questions related to
(individuals). The relations are formalized using the process content and are usually made by tech-
the order sorted-predicate language (Manzano, nical professionals. Managerial decisions concern
1996) and are presented graphically in Figure 1. general organizational issues related to the process
We represent all activities of an organization (e.g., the allocation of employees, process schedul-
(including decision making and personnel-related ing, the establishment of performance standards,
activities) by processes. Each organizational role provision of resources, presenting incentives and
is associated with one or more process. Roles sanctions). Managers of different levels (i.e., from
may have different rights and responsibilities the lowest level line managers to strategic apex
with respect to different aspects of the process [top] managers) may be authorized for making
execution. Furthermore, often several roles may different types of managerial decisions varying
potentially execute or manage certain processes. from in scope, significance and detail. A particu-
This is represented by the relation lar decision type is specified as an aspect in the
is_authorized_for relation. The same holds for
is_authorized_ for: r: ROLE x aspect: ASPECT technological decisions. Whereas consulting has
x a: PROCESS, a form of recommendation and implies voluntary
acceptance of advices, decisions imposed on a
where aspect has one of the values {execution, role(s) that execute(s) the process are considered
monitoring, consulting, tech_des (making techno- as imperatives with corresponding implications.
logical decisions), manage_des (making manage- Authorization for execution implies that a
rial decisions), user_defined_aspect}. role is allowed to execute the process according
Figure 1. Graphical representation of the concepts and relations of the language used for specifying
formal authority relations
is_ re p o n s ib le _ fo r
is_ a u th o rize d _ fo r a u th o rize s _ fo r/
d isa llo w s b in a ry re la tio n
n -a ry re la tio n
... ...
in te ra cts_ w ith
0 :n c o n c e pt
0 :n
0 :n
subro le _ o f p ro c e ss
aspect 0 :n role
0 :n
1 :n
1 :n 1 :n
1 :n has_contro l_ o v e r
agent is_ a llo c a te d _ to
re source
assigns_ re sp o n s ib ility_ is_ in s ta n c e _ o f 0 :n
0 :n to _ fo r 1 :1
uses
is_ c om m itte d _ to 0 :n
is_ s u b ord in a te _ o f_ fo r ta sk
w ishes 1 :n
1 :n 1 :n
1 :n m e a s u re s
is_exp re ssed_ove r PI
1 :n 1 :n
1199
Authority and Its Implementation in Enterprise Information Systems
to existing standards and guidelines. Whenever authorizes_ for: r1: ROLE x r2: ROLE x aspect:
a problem, a question or a deviation from the ASPECT x a:PROCESS: role r1 gives the
standard procedures occurs, the role must report authority for aspect of process a to role r2
about it to the role(s) authorized for making tech-
nological/managerial (depending on the problem disallows: r1: ROLE x r2:ROLE x aspect: ASPECT
type) decisions and must execute the decision(s) x a: PROCESS: role r1 denies the authority
that will follow. for aspect of process a for role r2.
Monitoring implies passive observation of
(certain aspects of) process execution, without However, to make a role actually responsible
intervention. for a certain aspect of the process, another role
Notice that other aspects of process execu- besides the authority to make managerial decisions
tion described in the managerial literature (e.g., should also be the superior of the role with respect
control, supervision) can be represented as a to the process. Superior-subordinate relations with
combination of already introduced aspects. In respect to organizational processes are specified
particular, control can be seen as the conjunction by: is_subordinate_of_for: r1: ROLE x r2: ROLE
of monitoring and making technological and/or x a: PROCESS. Then, responsibility is assigned/
managerial decisions aspects; supervision can retracted using the following relations:
be defined as the combination of consulting and
control. Furthermore, the designer is given the assigns_responsibility_to_ for: r1: ROLE x r2:
possibility to define his/her own aspects and to ROLE x aspect: ASPECT x a: PROCESS:
provide an interpretation to them. role r1 assigns the responsibility for aspect
Although several roles in an organization of process a to role r2.
may be authorized for a certain aspect related to retracts_responsibility_from_for: r1: ROLE x r2:
some process, only one (or some) of them will be ROLE x aspect: ASPECT x a: PROCESS:
eventually (or are) responsible for this aspect. For role r1 retracts responsibility from role r2
example, the responsibility of a certain role with for aspect of process a.
respect to the process execution means that the
role is actually the one who will be performing Using these relations, superiors may delegate/
the process and who holds accountability of the retract (their) responsibilities for certain aspects
process execution. Furthermore, responsibility for of processes execution to/from their subordinates,
the process execution implies allowance to use and may restrict themselves only to control and
resources required for the process performance. making decisions in exceptional situations.
The responsibility relation is specified as: In Hickson et al. (1971), control over resources
is identified as an important source of power.
is_responsible_ for: r:ROLE x aspect:ASPECT x Therefore, it is useful to identify explicitly which
a: PROCESS: process a is under responsibil- roles control resources by means of the relation
ity of role r with respect to aspect (defined has_control_over: r1: ROLE x res: RESOURCE.
as for authorized_for). In the proposed modeling framework, the notion
of resource includes both tangible (e.g., materi-
Some roles are authorized to make managerial als, tools, products) and abstract (information,
decisions for authorizing/disallowing other roles data) entities.
for certain aspects with respect to process execu- Our treatment of authority is different from
tion. The authorization/disallowance actions are both formal approaches that consider authority as
specified by the following relations: an attribute or a property inherent in an organiza-
1200
Authority and Its Implementation in Enterprise Information Systems
tion (Gulick & Urwick, 1937; Weber, 1958) and may be provided for some time interval). To ex-
from the human-relation view that recognizes press temporal aspects of authority relations, the
authority as an informal, non-rational and sub- temporal trace language (TTL) (Jonker & Treur,
jective relation (e.g., Follett, Mayo, cf. [Clegg, 2003) is used.
1989]). As many representatives of converging TTL allows specifying a temporal development
approaches (e.g., C.I. Barnard, Simon [1957]), of an organization by a trace. A trace is defined
we distinguish between the formal authority as a temporally ordered sequence of states. Each
prescribed by organizational policies and actual state corresponds to a particular time point and is
authority established between a superior and his/ characterized by a set of state properties that hold
her subordinate in the course of social interac- in this state. State properties are formalized in a
tions. In the latter case, a special accent lies on standard predicate logic way (Manzano, 1996)
the acceptance of authority by a subordinate. In using state ontologies. A state ontology defines
Clegg (1989), different cases of the authority ac- a set of sorts or types (e.g., ROLE, RESOURCE),
ceptance are discussed: orders anticipated and sorted constants, functions and predicates.
carried out (anticipation); acceptance of orders States are related to state properties via the
without critical review; conscious questioning but formally defined satisfaction relation |=: state(γ,
compliance (acceptance of authority); discusses t) |= p, which denotes that state property p holds
but works for changes; ignores, evades, modifies in trace γ at time t. For example, state(γ1, t1)
orders (modification and evasion); rejection of |= is_responsible_for(employee_A, execution,
authority (appeals to co-workers or higher rank p1) denotes that in trace γ1 at time point t1 the
for support). Depending on the organizational employee_A is responsible for the execution of
type, varying administrative sanction may be process p1.
applied in case an employee does not accept an Dynamic properties are specified in TTL by
authoritative communication, when he/she: (a) relations between state properties. For example,
correctly understands/interprets this communica- the following property expresses the rule of
tion; (b) realizes that this communication complies a company’s policy that an employee is made
with formal organizational documents and/or is responsible for making technological decisions
in line with organizational goals; (c) is mentally with respect to process p1 after s/he have been
and physically able to perform the required ac- executing this process for two years (730 days):
tions. In many modern organizations, rewards
and sanctions form a part of authority relation, ∀γ: TRACE ∀t1: TIME ∀empl: EMPLOYEE
thus, explicitly defined: state(γ, t1) |= is_responsible_for(empl, ex-
ecution, p1) & ∃t2: TIME state(γ, t2) |= as-
grants_reward_to_ for: r1: ROLE x r: REWARD signs_responsibility_to_for(management,
x r2: ROLE x reason: STRING: role r1 grants empl, execution, p1) & t1-t2 = 730
reward r to role r2 for reason ⇒ state(γ, t1) |= assigns_responsibility_to_
for(management, empl, tech_des, p1).
imposes_saction_on_for: r1: ROLE x s: SANC-
TION x r2: ROLE x reason: STRING: role Other specific conditions (e.g., temporal, situ-
r1 imposes sanction s to role r2 for reason. ational) under which authority relations may be cre-
ated/maintained/dissolved are defined by executable
Sometimes authority relations may be defined rules expressed by logical formulae. The specifica-
with respect to particular time points or intervals tion of these rules will be discussed in the Integration
(e.g., responsibility for some aspect of a process of Autority Relations Into an EIS section.
1201
Authority and Its Implementation in Enterprise Information Systems
1202
Authority and Its Implementation in Enterprise Information Systems
Large industrial enterprises of the 20th century the following superior-subordinate relations can
are characterized by further increase in number of be identified: is_subordinate_of_for(manager2,
managerial positions structured hierarchically by manager1, p) & is_subordinate_of_for(manager3,
superior-subordinate relations. Such organizations manager2, p).
are often defined as mechanistic (Scott, 2001) Initially, such enterprises operated in rela-
and have the following typical characteristics: tively stable (however, sometimes complex)
strong functional specialization, a high level of environmental conditions that reinforced their
processes formalization, a hierarchical structure structure. However, later in the second half of
reinforced by a flow of information to the top of the 20th century, to survive and to achieve goals
the hierarchy and by a flow of decisions/orders in the changed environmental conditions (e.g.,
from the top. Responsibilities were clearly de- a decreased amount of external resources; in-
fined for every position in a hierarchy. In most creased competition; diversification of markets),
organizations of this type, responsibility for enterprises and firms were forced to change their
execution was separated from responsibilities to organizational structure and behavior. In response
make decisions. Managerial positions differed in to the increased diversity of markets, within some
power to make decisions depending on the level enterprises specialized, market-oriented depart-
in the hierarchy. Often, technological decisions ments were formed. Such departments had much
were made by managers of lower levels (or even of autonomy within organizations. It was achieved
by dedicated positions to which also execution by assigning to them the responsibility for most
responsibilities were assigned), whereas manage- aspects related to processes, which created prod-
rial decisions were made by managers at the apex. ucts/services demanded by the market. Although
For example, the following formal expression department heads still were subordinates of (apex)
identifies one of the upper managers responsible manager(s) of the organization, in most cases
for making strategic decisions related to process the latter one(s) were restricted only to general
p, one of the middle level managers responsible performance control over departments. Often
for making tactical decisions related to p and one departments controlled organizational resources
of the first level managers responsible to making necessary for the production and had the structure
technological decisions related to p: of hierarchical mechanistic type.
Although a hierarchical structure proved to be
∃manager1: UPPER_MANAGER ∃manager2: useful for coordination of activities of organiza-
MIDDLE_LEVEL_MANAGER ∃man- tions situated in stable environments, it could
ager3: FIRST_LEVEL_MANAGER ∀γ: cause significant inefficiencies and delays in
TRACE ∀t: TIME state(γ, t) |= [ is_respon- organizations situated in dynamic, unpredictable
sible_for(manager1, making_strategic_de- environmental conditions. Furthermore, the for-
cisions, p) ∧ is_responsible_for(manager2, malization and excessive control over some (e.g.,
making_tactical_decisions, p) ∧ is_respon- creative and innovative) organizational activities
sible_for(manager3, tech_des, p) ]. often can have negative effects on productivity.
Nowadays, large enterprises often create project
In many of such organizations, managers at teams or task forces that are given complex,
the apex shared responsibility for making (some) usually innovative and creative tasks without
decisions with lower-level managers. Therefore, detailed descriptions/prescriptions. As in the case
decisions that were usually proposed by lower with departments, teams are often assigned the
level managers had to be approved by the apex responsibility to make technological and (some)
managers. In connection to the previous example, managerial decisions and are given necessary
1203
Authority and Its Implementation in Enterprise Information Systems
resources to perform their tasks. For example, other allow much flexibility in defining authority
the following formal expression represents the relations between roles. In the former case formal
responsibility assignment to the team_A for authority is replaced by socially created informal
making technological and strategic managerial rules. In the latter case, authority may be tempo-
decisions related to the process of development rally provided to the role that has the most relevant
of a design for a new product: knowledge and experience for current organiza-
tional tasks. In many organic organizations formal
∀γ: TRACE ∃t: TIME state(γ, t) |= control and monitoring are replaced by informal
[ assigns_responsibility_to_for(management, mutual control and audit. For the investigation
team_A, tech_des, develop_design_new_ of dynamics of organic organization, informal
product_A) ∧ assigns_responsibility_to_for aspects such as influence, leaderships, mental
(management, team_A, strategic_manageri- models of employees are highly relevant, which
al_des, develop_design_new_product_A) ]. will be discussed elsewhere. Often interactions
between organic organizations (e.g., of network
Usually teams have highly cohesive plain type) are regulated by contracts. Usually, contracts
structures with participants selected from different specify legal relationships between parties that
organizational departments based on knowledge, explicitly define their rights and responsibilities
skills and experience required for the processes with respect to some processes (e.g., production,
assigned to these teams. Although many teams supply services). Several organizations may be
implement informal communication and par- involved in the process execution (e.g., supply
ticipative decision making principles (Lansley, chains for product delivery); therefore, it is needed
Sadler, & Webb, 1975), also formal authority to identify particular aspects of responsibility
relations can be found in teams. In particular, in in contracts for such processes. The introduced
some project teams superior-subordinate rela- language may be used for specifying such respon-
tions exist between the team manager and team sibilities and their legal consequences through
members. In this case, whereas responsibility for reward/sanctions mechanisms.
making technological decisions is given to team
members, the responsibility for most managerial
decisions is assigned to the team manager. Then, INtEGrAtION OF AUtHOrIty
the members of such teams, being also members rELAtIONs INtO AN EIs
of some functional departments or groups, have
at least two superiors. In other teams the team In our previous work, a general framework for
manager plays the integrator role and does not formal organizational modeling and analysis is
have formal authority over team members. In this introduced (Popova & Sharpanskykh, 2007c).
case, the responsibility for decisions made by a It comprises several perspectives (or views) on
team lies on all members of the team. Sometimes organizations, similar to the ones defined in the
to strengthen the position of a team manager, s/he Generalized Enterprise Reference Architecture
is given control over some resources (e.g., budgets) and Methodology (GERAM) (Bernus, Nemes,
that can be used, for example, to provide material & Schmidt, 2003), which forms a basis for com-
incentives to the team members. parison of the existing architectures and serves
The principles on which teams are built come as a template for the development of new archi-
close to the characteristics of the organic organiza- tectures. In particular, the performance-oriented
tional form (Scott, 2001). Some of such organiza- view (Popova & Sharpanskykh, 2007b) describes
tions do not have any formal authority structure, organizational goal structures, performance indi-
1204
Authority and Its Implementation in Enterprise Information Systems
cators structures, and relations between them. The The first axiom on the authority relations
process-oriented view (Popova & Sharpanskykh, expresses that roles that are responsible for a
2007a) describes task and resource structures, and certain aspect related to some process should be
dynamic flows of control. In the agent-oriented necessarily authorized for this:
view different types of agents with their capabilities
are identified and principles for allocating agents Ax1: ∀r ROLE ∀a: PROCESS ∀aspect: ASPECT
to roles are formulated. Concepts and relations ∀γ: TRACE ∀t: TIME state(γ, t) |= [ respon-
within every view are formally described using sible_for(r, aspect, a) ⇒ authorized_for(r,
dedicated formal predicate-based languages. The aspect, a) ].
views are related to each other by means of sets
of common concepts. The developed framework Another axiom expresses the transitivity of
constitutes a formal basis for an automated EIS. the is_subordinate_of_for relation: r1: ROLE x
To incorporate the authority relations intro- r2: ROLE x a: PROCESS:
duced in this article into this framework, both
syntactic and semantic integration should be Ax2: ∀r1, r2, r3: ROLE ∀a: PROCESS ∀γ, t
performed. The syntactic integration is straight- state(γ, t) |= [ is_subordinate_of_for(r2, r1,
forward as the authority relations are expressed a) ∧ is_subordinate_of_for(r3, r2, a)] ⇒
using the same formal basis (sorted predicate logic) is_subordinate_of_for(r3, r1, a)]
as the framework. Furthermore, the authority
relations are specified on the concepts defined in One more axiom (Ax3) that relates the interac-
the framework (e.g., tasks, processes, resources, tion (communication) structure of an organization
performance indicators). For the semantic inte- with its authority structure based on superior-
gration rules (or axioms) that attach meaning, subordinate relations expresses that there should
define integrity and other types of organization be specified a communication path between each
constraints on the authority relations should be superior role and his/her subordinate(s). Such a
specified. A language for these rules is required path may include intermediate roles from the
to be (1) based on the sorted predicate logic; (2) authority hierarchy and may consist of both in-
expressive enough to represent all aspects of teraction and inter-level links.
the authority relations; (3) executable, to make The following axiom expresses that only roles
constraints (axioms) operational. Furthermore, as that have the responsibility to make managerial
authority relations are closely related to dynamic decision with respect to some process are allowed
flows of control that describe a temporal ordering to authorize other roles for some aspect of this
of processes, a temporal allocation of resources, process:
and so forth, a language should be temporally
expressive. A language that satisfies all these re- Ax4: ∀r1,r2:ROLE ∀a: PROCESS ∀asp: ASPECT
quirements is the temporal trace language (TTL). ∀γ, t state(γ, t) |= [ authorizes_for(r1, r2, asp,
In Sharpanskykh and Treur (2006), it is shown that a) ⇒ is_responsible_for(r1, manage_des,
any TTL formula can be automatically translated a) ].
into executable format that can be implemented
in most commonly used programming languages. In general, rules that describe processes of
In the following, the semantic integration rules authorization, assigning/retracting of responsibili-
and several examples of constraints defined for ties may have many specific conditions. However,
particular organizations are considered. to assign responsibility for some aspect of a pro-
cess a role should necessarily have at least the
1205
Authority and Its Implementation in Enterprise Information Systems
1206
Authority and Its Implementation in Enterprise Information Systems
Furthermore, the identified rules can be used enterprise architectures that comply with the
to determine for each user of an EIS relevant to requirements of the GERAM (e.g., CIMOSA)
him/her information and a set of allowed actions based on which modern EISs are built. However,
that are in line with his/her (current) responsibili- to enable semantic integration of the author-
ties defined in the system. Moreover, (possible) ity concepts, an EIS is required to have formal
outcomes of each action of the user can be evalu- foundations, which are missing in many existing
ated on a set of (interdependent) authority-related enterprise architectures and systems.
and other organizational constraints, and based In the future it will be investigated how the
on this evaluation the action is either allowed or proposed authority modeling framework can be
prohibited. applied for the development of automated sup-
port for a separation task (i.e., maintaining a safe
distance between aircrafts in flight) in the area of
DIscUssION air traffic control. Originally this task was man-
aged by land controllers, who provided separation
This article makes the first step towards defining instructions for pilots. With the increase of air
the formal operational semantics for power-related traffic, the workload of controllers rose also. To
concepts (such as authority, influence, control), facilitate the controllers’ work, it was proposed to
which are usually vaguely described in organiza- (partially) delegate the separation task to pilots.
tion theory. In particular, this article addresses This proposal found supporters and opponents
formal authority, different aspects of which are both among controllers and pilots. The resistance
made operational by defining a dedicated predicate to a large extent was (is) caused by ambiguity and
logic-based language. It is illustrated how the vagueness of issues related to power mechanisms.
introduced relations can be used for representing Such questions as “whom to blame when an in-
authority structures of organizations of different cident/accident occurs?”, “which part of the task
types. may be delegated?”, “under which environmental
Modern enterprises can be described along dif- conditions the task can be delegated?” still remain
ferent dimensions/views, that is, human-oriented, open. By applying the framework proposed in
process-oriented and technology-oriented. How- this article, one can precisely define responsibili-
ever, most of the existing EISs focus particularly ties of both controllers and pilots and conditions
on the process-oriented view. An extension of the under which the responsibility can be assigned/
models on which EISs are built with concepts and retracted. Notice that these conditions may include
relations defined within the human-oriented view relations from different views on organizations
allows conceptualizing more static and dynamic (e.g., “current workload is less than x,” “has abil-
aspects of organizational reality, thus, resulting in ity a”), which allows a great expressive power in
more feasible enterprise models. Among the rela- defining constraints.
tions between human actors, authority deserves
special attention, as it is formally regulated and
may exert a (significant) influence on the execu- rEFErENcEs
tion of enterprise processes. This article illustrates
how the concepts and relations of authority can Bacharach, S., & Aiken, M. (1977). Communica-
be formally related to other organizational views, tion in administrative bureaucracies. Academy of
thus resulting into an expressive and versatile Management Journal, 18, 365-377.
enterprise model. The introduced authority rela-
tions may be also incorporated into other existing
1207
Authority and Its Implementation in Enterprise Information Systems
Bernus, P., Nemes, L., & Schmidt, G. (2003). Peabody, R. (1964). Organizational authority:
Handbook on enterprise architecture. Berlin: Superior-subordinate relationships in three public
Springer-Verlag. service organizations. New York, NY: Atherton
Press.
Blau, P., & Scott, W. (1962). Formal organizations.
Chandler Publishing. Popova, V., & Sharpanskykh, A. (2007a). Process-
oriented organization modeling and analysis. In:
CIMOSA. (1993). CIMOSA—open system archi-
J. Augusto, J. Barjis, U. Ultes-Nitsche (Eds.),
tecture for CIM. ESPRIT consortium AMICE.
Proceedings of the 5th International Workshop on
Berlin: Springer-Verlag.
Modelling, Simulation, Verification and Valida-
Clegg, S. (1989). Frameworks of power. London: tion of Enterprise Information Systems (MSVVEIS
Sage. 2007)(pp. 114-126). INSTICC Press.
Friedrich, C. (Ed.). (1958). Authority. Cambridge, Popova, V., & Sharpanskykh, A. (2007b). Model-
MA: Harvard University Press. ling organizational performance indicators. In: F.
Barros, et al. (Eds.), Proceedings of the Interna-
Gulick, L., & Urwick, L. (Eds.). (1937). Papers
tional Modeling and Simulation Multi-conference
on the science of administration. New York, NY:
IMSM’07 (pp. 165-170). SCS Press.
Institute of Public Administration.
Popova, V., & Sharpanskykh, A. (2007c). A
Hickson, D., Hinings, C., Lee, C., Schneck, R.,
formal framework for modeling and analysis of
& Pennings, J. (1971). A strategic contingency
organizations. In: J. Ralyte, S. Brinkkemper, B.
theory of intra-organizational power. Administra-
Henderson-Sellers (Eds.), Proceedings of the Situ-
tive Science Quarterly, 16, 216-229.
ational Method Engineering Conference, ME’07
Jonker, C., & Treur, J. (2003). A temporal-inter- (pp. 343-359). Berlin: Springer-Verlag.
activist perspective on the dynamics of mental
Scheer, A.-W., & Nuettgens. M. (2000). ARIS
states. Cognitive Systems Research Journal, 4,
architecture and reference models for business
137-155.
process management. In: W. van der Aalst, et al.
Lansley, P., Sadler, P., & Webb, T. (1975). Organi- (Eds.), LNCS 1806, Berlin, 366-389
zation structure, management style and company
Scott, W. (2001). Institutions and organizations.
performance. London: Omega.
Thousand Oaks, CA: Sage Publications.
Manzano, M. (1996). Extensions of first order
Sharpanskykh, A., & Treur, J. (2006) Verifying
logic. Cambridge, UK: Cambridge University
inter-level relations within multi-agent systems.
Press.
Proceedings of the 17th European Conference on
Mintzberg, H. (1979). The structuring of orga- AI, ECAI’06 (pp. 290-294). IOS Press.
nizations. Englewood Cliffs. NJ: Prentice Hall.
Simon, H. (1957). Administrative behavior (2nd
Parsons, T. (1947). The institutionalization of ed.). New York, NY: Macmillan Co.
authority. In: M. Weber, The theory of social and
Weber, M. (1958). From Max Weber: Essays in
economic organization. New York, NY: Oxford
sociology. In: H. Gerth, & C. Mills (Eds.). New
University Press.
York, NY: Oxford University Press.
This work was previously published in Always-On Enterprise Information Systems for Business Continuance: Technologies
for Reliable and Scalable Operations, edited by Nijaz Bajgoric, pp. 252-264, copyright 2010 by Information Science Refer-
ence (an imprint of IGI Global).
1208
1209
Chapter 5.3
Enterprise Systems,
Control and Drift
Ioannis Ignatiadis
University of Bath, UK
Joe Nandhakumar
University of Warwick, UK
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Systems, Control and Drift
2002; Markus & Tanis, 2000; Newell et al., 2003; looked at internal operations, and the use of such
Shang & Seddon, 2000). Much of the research in systems referred only to internal actors, without
Enterprise Systems however, is concerned with examining external linkages, which was beyond
the implementation process and providing insights the purposes of this research.
into success factors of Enterprise Systems imple- The rest of the chapter is structured as follows:
mentation (e.g. Akkermans & van Helden, 2002; in the following section, we review the relevant
Al-Mashari & Al-Mudimigh, 2003; Bingi et al., literature on Information Systems, control and
1999; Holland & Light, 1999; Hong & Kim, 2002; drift, as well as human agency, which are top-
Nah et al., 2001; Shanks et al., 2000; Somers & ics central to our research. We then present our
Nelson, 2001). Only a few studies investigate theoretical foundations, in which we frame our
issues relating to the post implementation of ES analysis and discussion. Our research approach
(e.g. Elmes et al., 2005). Hence we have limited is then outlined, followed by a description of the
understanding of issues affecting the use of Enter- companies that participated in this research. We
prise Systems in organizations and their potential follow this with an analysis of the data gathered
for organizational impact. from the companies, across the dimensions of
This chapter therefore concentrates on the ac- control and drift. We then discuss our findings
tual use of an Enterprise System, post-implemen- and present our conceptualisation of Enterprise
tation. It examines the impact of actions performed System use, and conclude with some theoretical
by humans (users), or a machine (the Enterprise and practical implications of our research.
System), on control and drift within an organiza-
tion. We propose a theoretical conceptualisation
to describe the impact of those actions by drawing LItErAtUrE rEVIEW
on a field study of five companies that have an
Enterprise Resource Planning System installed. Enterprise systems,
The significance of this research is twofold. First, control and Drift
our conceptualisation developed in this chapter
enhances the understanding of the processes that The link of Information Systems with organiza-
result in organizational control (or drift) through tional control has been investigated by a variety
the use of an Enterprise System. Second, our re- of scholars in the field (e.g. Coombs et al., 1992;
sults also pinpoint issues of practical interest to Duane & Finnegan, 2003; Malone, 1997; Tang et
companies that are using (or thinking of installing) al., 2000). Many point to the paradox that while
an Enterprise System. Information Systems can empower employees
Although ERP systems were originally with increased decision-making capabilities, at the
designed to be used within an organization, in same time they can serve to increase control within
the last years they have evolved considerably the organization (e.g. Bloomfield & Coombs,
to include or link with external functionalities 1992; Bloomfield et al., 1994; Orlikowski, 1991).
such as Customer Relationship Management Although control in a general information
(CRM), Supply Chain Management (SCM) and systems setting has been examined to a large
e-business (B2B and B2C). The current trend is extent, the number of studies in an Enterprise
also to repackage ERP systems as a collection Systems setting in particular is still quite limited.
of interoperable modules with standards-based What distinguishes Enterprise Systems from other
interfaces, in accordance with the mandates of Information Systems is their scale, complexity,
Service-Oriented Architectures. The examina- and potential for organizational impact. Because
tion of ERP systems in this chapter however only of this, they deserve special attention with regards
1210
Enterprise Systems, Control and Drift
to the issue of control. From the limited number more visible to others, who can then more easily
of studies in this area, the characteristic ones are exercise control over them.
those by Hanseth et al. (2001), Sia et al. (2002), Regarding the issue of drift, Ciborra (2002)
and Elmes et al. (2005). The main findings of defines drift as the processes of matching between
these three studies are outlined below. situated human interventions of use and open
Hanseth et al. (2001) claim that Enterprise Sys- technology. Technology drifting can be the result
tems (such as ERP systems), with their emphasis of passive resistance, learning-by-doing, sabotage,
on standardization, streamlining, and integrating radical shifts in conditions, or plain serendipity In
business processes, are an ideal control technol- addition, Ciborra (2000) mentions the case when
ogy. However, they point to a surprising result: control has to decrease, when it is associated with
That implementing an ERP system over a global the power to bring to life sophisticated and evolv-
organization in order to enhance control may as ing infrastructures. Although Ciborra concentrates
well have the opposite effect, i.e. reduce control. mainly on technology drift, this chapter is con-
This can be explained with the ubiquitous nature cerned with drift at the organizational level, which
of side effects. In that sense, the more integrated is implied by decrease of organizational control.
the system is, the faster and farther side effects In particular regarding the issue of drift, van
have an impact, and the bigger their consequences. Fenema and van Baalen (2005) have looked
Sia et al. (2002) have examined the issues of into strategies for dealing with drift during the
empowerment and panoptic control of ERP sys- implementation of ERP systems. They distinguish
tems. They summarize the panoptic control aspect between three such strategies, from which they
of ERPs in three dimensions: comprehensive argue the third strategy (drift containment) is the
system tracking capability, enhanced visibility most realistic in ERP implementation projects:
to management, and enhanced visibility to peers
(through workflow dependency and data inter- • Control strategy aims at eliminating drift-
dependency). The findings by Sia et al. (2002) ing and risk.
indicate that although an ERP implementation has • Incremental strategy considers drifting to
the potential for both employee empowerment and be a normal part of technology implemen-
managerial control, managerial power seems to tations. In this case “bricolage” is used to
be perpetuated through an ERP implementation. adapt technology to its context.
Elmes et al. (2005) have identified two seem- • Drift containment recognizes the inevita-
ingly contradictory theoretical concepts in an ble drifting in technology implementations
Enterprise System: reflective conformity and and the fact that drifting may even contrib-
panoptic empowerment. Reflective conformity ute to the stabilisation of technology. The
refers to the way that the integrated nature of question is then how to balance control and
the Enterprise System leads to greater employee drift and use drift as a source of stabilisa-
discipline, while at the same time requiring them tion of technology projects.
to be reflective in order to achieve organizational
benefits from the system. Panoptic empowerment Although the above studies looked (amongst
describes the greater visibility of information, others) at either the issue of control or drift (but
which is provided by the shared database of the not both at the same time), Nandhakumar et al.
Enterprise System. This empowers employees to (2005) have looked into the contextual forces of
do their work more effectively and efficiently, but an ERP implementation, and how those influence
at the same time makes their work in the system control and drift during the implementation pro-
cess. These contextual forces were interrelated,
1211
Enterprise Systems, Control and Drift
and referred to the affordance of the technology, (2004) for example argues that ERP systems help
as well as the social structure, practices and norms, shape human agency and institute patterns of ac-
either within the organization or external. The tion and communication in organizations. They
analysis by Nandhakumar et al. (2005) was based accomplish this by delineating the paths along
on examining managers’ intentions, the power and which human agency should take place. This
cultural context within the organization, as well is afforded by the dissection of organizational
as the affordances of the technology. activities in discreet terms, and the provision of
Control was seen by Nandhakumar et al. to the procedural sequences for the execution of
be an outcome of managerial intentions regard- particular tasks. In this sense, ERP systems are
ing the trajectory of implementation of the ERP mostly concerned with streamlining, control and
system. This depended on both system affordances standardisation of organizational operations. In
and social structure. (Technological) drift was so doing, ERP systems enable the construction of
then seen by Nandhakumar et al. (2005) to occur accountable and governable patterns of behaviour
from the “organizational members’ planned and in organizations.
unplanned actions in response to both previous Similarly, Boudreau & Robey (2005) have
technology and organizational properties they pointed to the fact that when looking at organiza-
have enacted in the past” (p. 239). Unintended tional change arising from the use of IT, an agency
consequences of the implementation would perspective may mean limited possibilities for
then mean that the technology would drift from radical IT-induced change. An agency perspec-
the planned implementation outcomes. Control tive of IT in this case takes the position that IT
and drift during the implementation of the ERP is socially constructed and open to a variety of
system in this case were interrelated, and would social meanings and potential uses. Boudreau &
be operating in continuous cycles, in response to Robey argue that certain technologies allow for
contextual forces shaping the actual implementa- a greater degree of human agency and others to
tion of the ERP system. a lesser degree. Their views agree with those of
Although Nandhakumar et al. directly ac- Orlikowski (2000), who acknowledges that while
knowledge the influence of users in accepting or users can and do use technologies as they were
rejecting the ERP system, their study mainly ex- designed, they also can and do circumvent the
amined managerial as opposed to user intentions, intended uses of technologies, either by ignor-
and in the implementation, as opposed to the use ing certain properties, working around them, or
stage of an ERP system. This chapter therefore inventing new ones.
complements the viewpoint by Nandhakumar et The research by Boudreau & Robey looked
al. by arguing that the way users use the system at ERP systems, which are seen as inflexible
according to the affordances of the technology software packages constraining user-inspired
also has a large part to play on impacting control action (human agency). Their results, however,
and drift within an organization. indicate that although ERP systems are seen as
rigid control mechanisms, there is still scope for
Enterprise system Use human agency to take place within such systems,
and Human Agency contradicting Kallinikos (2004). The research by
Boudreau & Robey indicated that technical system
One important strand of Enterprise System constraints on human agency can be overcome
research which is also relevant to the current through a process of initial inertia (rejection of
chapter is the linkage of Enterprise System (e.g. the system), improvised learning as a result of
ERP) use with the agency of humans. Kallinikos pressure to use the system, and finally reinven-
1212
Enterprise Systems, Control and Drift
tion of usages of the system, to match their own that are inscribed in the Enterprise System. The
previous experiences and background. symbolic token is then the information that is held
and represented within the Enterprise System. The
social relations that are being disembedded and
tHEOrEtIcAL FOUNDAtIONs reembedded derive from the actions of users in
the system. These actions are disembedded from
This section presents our theoretical foundations the local context where they are carried out, to
for the development of our conceptualisation in time-space stretches of the company’s operations.
the chapter. These theoretical foundations are the Those actions are consequently reembedded, by
concepts of embedding-disembedding and agen- impacting on, and being appropriated by, other
cies (human and machine). These concepts were users of the system.
chosen as they were deemed important in explain-
ing the processes that lead to organizational control Human and Machine Agency
and drift. The theoretical foundations presented
below together with the concepts of control and Giddens (1984) defines agency is the “capabil-
drift that were described in the previous section, ity to make a difference, that is to exercise some
will inform our analysis and discussion. sort of power” (p. 139). In other words, agency is
synonymous to the carrying out (or intentionally
Embedding-Disembedding not carrying out) of an action. With regards to
actions in an Information Systems setting, Rose
Giddens (1990) defines disembedding as “the lift- et al. (2003) have questioned the relationship
ing out of social relations from local contexts of between the social and technical aspects of IS,
interaction and their restructuring across indefinite in other words, how do social systems act upon
spans of time-space” (p. 21). Conversely, embed- technology, and vice versa. Rose & Jones (2004)
ding (or reembedding) is according to Giddens, have drawn on both Actor-Network Theory and
“the reappropriation or recasting of disembedded Structuration Theory, as well as Pickering (1995),
social relations so as to pin them down (however to develop a model called the “Double Dance of
partially or transitorily) to local conditions of time Agency”. In this model, the distinction is made
and place” (pp. 79-80). between human agency and machine agency, but
For Giddens (1990) there are two types of dis- the two are interwoven and affect each other.
embedding mechanisms: symbolic tokens and ex- Rose & Truex (2000) have proposed to give
pert systems (not expert systems in an information an understanding of machine agency as perceived
systems sense). Although Giddens concentrates autonomy. Machine agency is then the emergent
mainly on money, symbolic tokens in general are property of the development process and becomes
media of exchange that can be circulated without embedded in the completed machine. However,
regard to specific characteristics of the people Nandhakumar et al. (2005) in their study of an
or groups that handle them. Expert systems are ERP implementation, draw from Gibson (1979)
then organizations of technical accomplishment and Norman (1988) to view machine agency as
or professional expertise that make a significant affordance. They also draw from Giddens (1984),
contribution to the material and social environ- who attributes intentionality to human agency.
ment in which we live. In the context of this chapter, we will similarly
In the current context of an Enterprise System, assume that machine agency is characterised by
it can be argued that the expert system as defined affordance, whereas human agency is character-
by Giddens consists of the rules and procedures
1213
Enterprise Systems, Control and Drift
ised by intentionality. The next section presents pret the segment of text. Thirdly, pattern codes
the research approach employed in our research. are even more inferential and explanatory.
In the current research, coding was done
with the aid of the qualitative analysis software
rEsEArcH APPrOAcH NVivo. Within NVivo, descriptive coding was
done through a first pass analysis of the interview
Our research approach is interpretive case study transcripts, where the relevant text was exam-
(Walsham, 1993). In interpretivism, the reality is ined, and portions of it (sentences, paragraphs,
socially constructed by human agents (Walsham, or sections) were assigned a code according
1995). Interpretive studies reject the notion of to the phenomenon that they were describing.
an objective or factual account of events and Some pattern coding also occurred at this stage,
situations, seeking instead a relativistic, albeit as codes were grouped into categories at various
shared, understanding of phenomena (Orlikowski levels that linked those codes together. This cod-
& Baroudi, 1991). ing was more akin to a grounded theory approach
In the current research, five companies (Glaser & Strauss, 1967), where codes evolved
(NGlobe, TechniCom, SecSys, FCom and Trans- directly from the data. Memos were also kept in
Com – all pseudonyms) have been examined with NVivo about issues of interest that emerged, and
regards to the use of their Enterprise System. The reflections from the part of the researcher on the
research took place between October 2004 and data examined. This prompted a second pass of
August 2005, and involved formal semi-structured coding, where the coding was more theory-driven,
(face-to-face mostly with a few telephone) inter- according to identified themes in the first pass,
views with company staff (office employees and and literature that could support the concepts from
managers). It also involved informal conversations the first pass of coding (e.g. relevant literature on
with them, as well as observing user interactions control, drift, human action, machine action, inten-
with the system. Interviews were mostly with one tionality, affordance, embedding, disembedding).
person, although a couple of them involved two The second pass of coding was more interpretive,
persons, and lasted anything between 40 minutes in that segments of text were interpreted accord-
and 2 hours, with an average of 1 hour per inter- ing to the chosen literature. However, data were
view. All of the interviews (with the exception of not forced into predefined categories, as codes
one due to personal sensitivities) were recorded emerged not only from the literature, but also as a
and transcribed verbatim. The table below shows result of the first pass coding, which was grounded
the interviews with members of the 5 companies on the interview data. In addition, pattern coding
researched.(Table 1) also occurred at this stage, as several codes were
Analysis was carried out using a qualitative grouped into higher-order patterns.
data analysis approach proposed by Miles & The analysis below is structured in terms of
Huberman (1994). They distinguish between three the two concepts of control and drift, also taking
types of codes: Descriptive codes entail little into account human and machine actions, and
interpretation, but attribute a class of the phenom- the respective intentionalities and affordances.
ena to a segment of text (such as interview tran- Indicative quotes are also presented. Discussion
script). The same segment could also be coded of the results then incorporates the concepts of
with an interpretive code, where the researcher embedding and disembedding. The next section
uses some of his or her knowledge about the briefly describes the background of the compa-
background of the phenomenon in order to inter- nies participating in the research, followed by the
analysis and discussion of our results.
1214
Enterprise Systems, Control and Drift
1215
Enterprise Systems, Control and Drift
and use different ERP systems, which adds to the niCom is using the PeopleSoft ERP system. For
generalizability of the results. billing they have had a bespoke system built for
them, which harmonizes all the different billing
transcom systems from all the companies that TechniCom
bought.
TransCom operates in the transport sector, and
has 5 billion Euros in annual sales worldwide. Fcom
TransCom is using the SAP R/3 ERP system,
currently on version 4.5 in most places where it FCom is a vertical retail manufacturer, which
is installed, although there are some later versions means that the bulk of the products that they sell
(4.6) or earlier versions (e.g. 3.1, or even R/2) in in the stores, they also manufacture themselves.
some countries. The system was fully installed in It operates more like a family-run business, rather
January 2002 in the UK. In addition to the UK, SAP than a large corporate public company. FCom is
is currently fully installed in Spain, France, Swe- a £55 million turnover company operating in the
den, Romania, Chile, and the USA. The modules UK, currently having 61 stores and employing
of SAP used are Materials Management, Service around 500 people. FCom has the SAP R/3 system
Management, Finance, Sales & Distribution. installed. The modules used are Payroll, Finance,
Manufacturing, and Sales and Distribution.
NGlobe
secsys
NGlobe has a presence in almost 200 countries,
and generates most of its revenue by selling fi- SecSys is owned by an American company, and
nancial information. NGlobe has the Oracle 11i operates in the UK under the service support
ERP system installed, used for the modules of sector. There are around 25 offices of SecSys in
Finance (accounts receivable, payable, general the UK. SecSys has the SAP (R/3, version 3.1h)
ledger, fixed assets, and purchasing) and HR. ERP system, which was installed in November
In addition, the Oracle’s learning module is also 1998 in order to overcome the millennium is-
installed. The design of the ERP system took place sue. The modules of SAP that are currently used
between 2000-2001, and NGlobe first went live are Finance, Logistics, Materials Management,
in 2001, with the whole implementation finishing Inventory Management, Purchasing, Sales and
by the end of 2003. NGlobe was one of the first Distribution. The company’s intention within the
implementations of one global instance of Oracle. next 2 years is to update their ERP system.
This was enabled by the fact that NGlobe is a very
homogenous company.
cAsE EVIDENcE AND ANALysIs
technicom
The field study data from the companies were
TechniCom is a company in the technological analyzed based on the categories of control and
sector. It has recently been restructured, and drift, which are central to our research. The analy-
over a 4-year period TechniCom has bought 32 sis also drew on the notions of the intentionality
companies, all with different bespoke systems. of human agency (users), and the affordances of
TechniCom is using Oracle version 11 for the the machine agency of the Enterprise System.
financials part, mainly for accounts payable and Human agency in the analysis below is implied
accounts receivable. For their HR function Tech- by words such as ”intention” and ”intentionality”.
1216
Enterprise Systems, Control and Drift
Machine agency is implied by words such as ”af- the ITUK team for being unresponsive to their
ford”, ”enable”, ”constrain”. Only data from the needs, slow and inefficient. Some times there were
companies that are relevant to the main theme of tensions between users and the ITUK team, as
this research are presented here. well as between the ITUK team and ERPGlobal.
Before examining the actual use of the En- In addition, the ITUK team claimed that they
terprise System, our research data indicated that were also understaffed, with the result that they
there are also factors which influence its use, and could not respond very quickly to user requests.
which are discussed next. The examination of This impacted training as well, and one common
these factors comes mostly from TransCom, due complaint from most users of the system was that
to the larger number of interviews carried out in they had not received enough training, and that
that company. either they did not understand how the system
worked, or could not use it to its full potential.
Factors Impacting As a result, the ITUK team who was responsible
Enterprise system Use for training was seen as quite irresponsible and
unresponsive with regards to the training needs
Cultural and Organizational Context of the users.
There were also cultural reasons which could
In TransCom there was a global group responsible influence the use of the system. For example, the
for the implementation and maintenance of the implementation of SAP gave TransCom the oppor-
ERP system worldwide, named ERPGlobal. They tunity to record and control time, and how long it
interfaced with the UK via a local country group actually took to do a job on a train. Nevertheless,
named ITUK. Within the sites examined in this the employees at the Manchester depot refused
research, there were some negative views about to do this when SAP was initially implemented
the ITUK team, as well as about ERPGlobal. As at their site. On closer examination however, it
ERPGlobal wanted to keep the configuration and was revealed that they would refuse to do this
use of the ERP system as standard worldwide, it anyway, whether there was the SAP system or
was very hesitant in carrying out updates to it, not. The intention of not recording time was a
unless those would affect the majority of coun- strong cultural aspect, but it was also local to the
tries where the system was installed. Even in specific area. This refusal to record working times
cases where updates were agreed by ERPGlobal at the Manchester depot was in fact mentioned to
however, those took a very long time to imple- be tied to contracts of employment and the influ-
ment according to the users, and this was viewed ence of trade unions.
negatively.
However, as most users in the UK interfaced Resistance
with the ITUK team directly, and not with ER-
PGlobal, most of the negative criticisms were In addition, when the SAP system was installed in
directed towards the ITUK team. This tended to TransCom, there was resistance to the system at
put the ITUK team in an awkward position, as various levels. Part of middle managers and users
they needed sanctioning from ERPGlobal to carry did not use the system fully. In order to overcome
out user requests, but ERPGlobal was reluctant to this, initial training regarding the system was car-
give its consent in many matters in order to avoid ried out, in order for the employees to understand
deviation from standards regarding the configura- what the system could offer. However, there was
tion and use of SAP. As a result, many users who still resistance from middle managers to fully
did not have interaction with ERPGlobal blamed use SAP as a management tool. SAP was seen
1217
Enterprise Systems, Control and Drift
by many managers in TransCom as a financial As a result, the business processes were written
overhead, and consequently there was not a lot around the system, in order to make the system
of enthusiasm in supporting it. work. The system was conceived and implemented
This also had on impact on the users of the by a consultancy company, who looked at what
system. Resistance was evident there, also because the business strategy was, and the processes that
users were used to the old systems installed in TransCom required. They then tailored SAP to
TransCom, some of which were still operational. suit the business needs of the company at the time
In that sense, there was resistance of SAP, also SAP was implemented, in terms of for example
fuelled by the fact that many of the users were the order processes, purchasing, inventory, ware-
considered as technophobes, and were not used house, and logistics.
to computing systems. The main complaints As a parts business did not exist before, people
about the system were then that the system was within TransCom did not know in detail how the
difficult to use, was not user friendly, and users business should be supported by the ERP system.
did not understand what all the fields and text in The consultancy company therefore implemented
SAP were used for. To this lack of knowledge and their own ideas to a large degree, resulting in a
apprehension of the system also contributed the system that was according to the views of many
general lack of proper training. However, this type interviewees very inadequate. The consultancy
of resistance was considered normal, and seen to company was thought to be responsible for this,
be overcome once the users felt more confident having implemented the system:
with the system:
They [the consultancy company] thought they
That’s just the normal resistance to a new system, knew how to implement a spare parts management
because a lot of the people had other systems, system in SAP, we did not have the expertise here
which they knew and they were confident, and in-house, which meant that they were always able
they knew what they could get out of them. And to convince the people they were dealing with what
so it’s just this transition to another system that the right answers were. And it was a very poor
they’ve got to learn and understand. But I’m sure implementation. (Logistics Director, TransCom)
once they can understand it, once they can use it,
they’ll be quite happy with it. (Reliability Group
Leader, TransCom) Power Differentials
1218
Enterprise Systems, Control and Drift
And whilst the consultants were here for 3 months Organizational control from
helping other people load their data, I sat with Enterprise system Use
the consultants, learning the system, saying, right,
if I do this, how does that happen, how do I do The case analyses indicated that amongst the
this, and things like that. And just general ques- managerial intentions for installing an Enterprise
tions, saying, right, there’s more information to System, and the purpose of its configuration,
get. One thing led to another, and I became one was to increase control of the company’s opera-
of the, sort of, SAP experts within the business. tions. Control was implemented with a variety
(Business Improvement Coordinator, TransCom) of mechanisms in the Enterprise System. Those
were the setting of access controls, the monitoring
As a result of gaining SAP technical knowl- capabilities of the Enterprise System, the rules and
edge, the perceived SAP experts at TransCom procedures (process flow) that were embedded in
became the first point of contact when users had the Enterprise System, and various checks carried
problems with the system, as opposed to logging out by the system.
their problems with the ITUK team, and the ITUK
team then trying to identify what the solution Control from Access Profiles
would be. The help of the perceived SAP experts
was asked as they could go to the users’ desk quite With regards to the access profiles that specified
quickly to see what the problem was, and explain which types of users had access to different types
to them what they were doing wrong. However, the of information in the system, it could happen that
business rules indicated that in case of problems those controls were either too strict, or too lax. In
users should be contacting the ITUK team in the this sense, there were two ways by which those
first place. By bypassing those rules and seeking access controls could be changed: The first was to
the help of the perceived SAP experts instead, the redefine what a particular access level allowed a
power of the latter was increased in the company, person to do, and the second was that an individual
as they could influence the way that the ERP sys- could be given a less or more open type of user
tem was used by other users. This meant that the access. In general however, the system controls
perceived SAP experts could direct the agency of implemented through access profiles were seen
other users in terms of the way they were using to be quite strict at NGlobe, making it difficult
the system. If the directions given to the users to bypass them:
were right, then the intended control from using
the system would be re-enacted, if the directions In terms of bypassing controls, the only ways
given to them were flawed, then it would be pos- to bypass a control are either to be given some-
sible that drift would be propagated, by the end body else’s password, or to do it in cahoots with
users using the system incorrectly. somebody else. (Cash Management and Treasury
Having described some factors that could influ- Process Director, NGlobe)
ence the use of the ERP system, the next section
discusses the various ways that organizational At the time of the interviews there were many
control from the use of the Enterprise System complaints from the users with regards to the set-
could be enacted. Results from all the companies ting of those profiles. Most of those complaints had
examined are presented, although TransCom to do with the limited access to screens and trans-
provided the biggest case study of this research. actions in the system, when access was required,
but was not given due to the incorrect setting of
access levels. As one interviewee mentioned:
1219
Enterprise Systems, Control and Drift
That’s quite annoying for me, because I have the In this case the system tagged user actions in the
information that I need to put into SAP, I’ve got system with information about who carried out a
the information of how to do it, but I’m not given transaction. This could be examined if the need
the access to it, because someone has made the arose, and that was deemed beneficial by some
decision that only one person in the company is of the interviewees:
allowed to do it. (Shift Planner, TransCom)
You can see who’s carried out the transaction, and
On the other hand, users also pointed out that you can take corrective action to understand why
although needed access was unnecessarily limited it happened. So, the system allows that visibility,
in many cases, there were also many other cases to see where things have gone wrong, who’s made
where users were allowed to carry out tasks in the what transactions, who’s done what purchasing.
system, which they did not necessarily need to. (Purchasing Manager, SecSys)
This increased access to the system was mainly
due to the inattention that was paid to the correct The monitoring capabilities of the Enterprise
setting of the access profiles. The result was that System also resulted in power differentials, as
the intended controls in the system were seen to people who were allowed to see the actions of other
be very lax in some cases, because people had users in the system, had authority over the latter. In
authorizations to do many things outside their some cases, this could lead to uncertainties about
immediate area. how the information obtained by monitoring user
In some cases users “abused” their increased actions in the system was used. As some users of
access, because it was easier for them to do a the system mentioned:
transaction in the system themselves that they
should not be doing, rather than asking the person I think people can use [monitoring] to their own
that should be carrying out that transaction. As advantage. Sometimes there’s too much informa-
one interviewee mentioned: tion there, if you make a mistake or whatever, it
can be used to the wrong advantage, which I am
For example, if there is something to be posted not too happy about… It’s there; it can be done.
in the material master, because they [users out- That’s the worrying thing (Shift Planning Coor-
side the Materials Management area] have got dinator, TransCom).
authorisation and they’ve got some knowledge of
the material master, they think, right, OK, I’ll do The thing with SAP though, it’s the traceability.
it myself, rather than going to somebody who’s If we were trying to bypass the system, it’s all
got better knowledge, and say, right, OK, can you traceable. You can look into who did that, what
add this so I can carry on with my processing. changes you’ve made, they will come and hit you
(Business Improvement Coordinator, TransCom) if you do try and bypass anything, because that’s
one thing with SAP, it doesn’t lie, does it? It’s got
to put your name against everything, every time.
Control from Monitoring Capabilities (Inventory Planner 1, TransCom)
of the Enterprise System
This apprehension with regards to monitoring
Our interviews indicated that the managerial of user actions in the system led some users to
intention of increased control through the use of believe that anyone with the right access could go
an Enterprise System was also afforded by the and monitor what other users were doing in the
monitoring capabilities of the Enterprise System. system, and this could be used to highlight areas
1220
Enterprise Systems, Control and Drift
of inefficiencies with respect to the work carried with their own work. This mechanism of forcing
out by them. This was seen quite negatively by users to work in a certain way was mentioned by
those users, who considered the system to be the many managers, characteristically:
means of giving people the opportunity to spy on
other people’s work, and then used for blaming ERPs force you to undertake business in a certain
them if something went wrong. way. And when I say force you, I mean the fact that
This apprehension of the system was also you have to put a workflow in, to determine that
confirmed in the case of recording hours for a par- these are the activities that need to be placed...
ticular job done on a train in TransCom. Although Now you have a workflow, you put a control in.
this required the inputting of individual hours for (Supply Chain Manager 2, TechniCom)
each user that worked on a train, the company was
only interested in the total amount of time it took This mechanism [of ERP process flow] enables
to do a job, rather than how much each individual us to ensure that nothing goes on to the lorries
spent in doing that job. However, users seemed to be delivered, unless it’s also been flagged as
hesitant to follow the recommended procedure having been physically finished within the factory.
of inputting hours worked in the system, as they (IT Manager, FCom)
could not see the business benefit of it, and were
worried about how their data would be used:
Control from System Checks
You have to record the individual’s clock number.
And that in itself is problematic, because you SAP in TransCom was configured to carry out
are identifying a particular individual, and they various checks that would ensure the quality and
may think, oh well, you know, that’s a bit too Big integrity of data in the system. For example, us-
Brother, you’re watching my every movement. ers were constrained from inputting an invoice
But at the end of the day, we’re not, as a busi- twice. This could occur for example when users
ness interested that it takes one man 20 minutes, tried to create an invoice as a copy of the original
but it takes another man 30 minutes to do a job. one. In this case the system would check whether
So, as a business we need to know that it took X an invoice for the particular work and customer
man-hours for a particular job altogether. (SAP already existed, and come up with a warning
Facilitator 2, TransCom) about this. This would stop the user from enter-
ing a duplicate invoice, and was seen as a good
control mechanism in SAP, in terms of minimizing
Control from Enterprise duplication of data.
System’s Process Flow Another example of checks carried out by
the system was if VAT on invoices was entered
Our interviews also indicated that another way (manually) incorrectly, which would result in an
control was exercised through an Enterprise Sys- incorrect total balance in the end. This could hap-
tem was by the rules and procedures afforded by pen more at month ends, when users at finance
such a system. This meant that certain workflows would be busy trying to input everything in the
were carried out in a certain order, and the output system. In this case mistakes would be more
of one stage in the workflow was used as the input possible than other periods, and so the relative
in the next stage. Therefore, the Enterprise System financial journals would not balance in SAP. The
forced users in one department to complete their checking of the balance across various ledgers was
work before users in another department could start done automatically by the clicking of a button,
1221
Enterprise Systems, Control and Drift
and if there were any mistakes SAP would come Organizational Drift from
up with a warning saying that the changes could Enterprise system Use
not be posted in the system because the relative
journals would not balance. Other smaller-scale System Configuration
examples of checks carried out by the system also
included the format of the fields entered (e.g. for Based on our analysis, it was evident that the actual
numbers, dates, etc), the range of the values the configuration of the system was quite important in
field could accept, etc. ensuring that the required controls were properly
Although the system provided those checks implemented. If the controls described in the pre-
to ensure a level of quality of the data that was vious section were not correctly configured, this
input into the system, in other cases the system could result in users taking actions in the system
was not capable of carrying out some checks that that they shouldn’t, and this could have a “ripple”
users deemed necessary. For example, when an effect to other departments. For example, as one
item needed to be returned as broken to the sup- interviewee mentioned, lax system controls al-
plier, it needed to be recorded into the system as lowed individuals to carry out transactions in the
such. However, there were no checks that the item system that they were not allowed to, and this had
was not accidentally booked into the good stock, an impact on various departments of the company:
although it was declared as broken in the system.
The users in the workshops in this case deemed it Somebody from the other sites went and built
necessary to have a warning message coming up some transaction on my site the other day, which
that would inform them that they were trying to messed up my stock basically… [The impact of
book broken parts into good stock. However, the this transaction would be] financial, because
system as it was did not carry out those checks, the figures wouldn’t have matched. (Materials
and would let the users carry on. This was actu- Controller 1, TransCom)
ally an example of drift that could occur instead
of control due to required checks not being sup- However, the system could be intentionally
ported by the enterprise system. configured to allow more lax controls, in order to
In general however the four mechanisms de- cater for business necessities, for example:
scribed above (access profiles, monitoring capa-
bilities, process flow, and system checks) aided the There are benefits to being able to do it, like for
managerial intention to enhance control over the example, if say, the person who places the order
company’s operations. The control mechanisms in another site is off sick, and there’s only say,
then applied on the users of the system and the somebody here who can place the order, then
way they carried out their work. However, while that means that he can carry out the transaction.
users worked on the system, it was possible that (Materials Controller 1, TransCom)
some degree of drift could occur. Our analysis
indicated that this might be due to the configuration In other cases, the affordance of the system
of the system, which could allow the omission of could force to choose a configuration of the system
important information, as well as possibly allowing (e.g. setting of access profiles) amongst a range
the bypassing or workaround of controls by users; of limited possibilities, which did not accurately
the use of systems outside the Enterprise System reflect the needs of the company. In this case, drift
was also identified as conducive to drift. Each of could occur if the intention to use the system in
these factors will be examined in turn below, with other than the prescribed ways was there. As one
relevant evidence from the companies quoted. interviewee mentioned:
1222
Enterprise Systems, Control and Drift
Say for instance with the guys out the back who could be imposed with the use of usernames and
change bin locations, that means they’ve got ac- passwords, if those were shared by the employees
cess to the material master. So they can change it then the intended controls lost their meaning:
if they want to. But unfortunately you can’t sepa-
rately set it so that they can only view it. They’ve Everybody has their own login. But if say there
got access to it or not. So if they wanted to, not were 4 or 5 of us on duty today, somebody wouldn’t
that they would, but they have access to change come to it and log on, we’d use whatever was in,
anything. (Materials Controller 2, TransCom) just for speed. I suppose really, if I walk away
from it, I should log off, and the next person who
The way that the system was configured, ac- comes would log in. But it just takes time to keep
cording to the business necessities and what was logging off and logging in when you’re busy.
afforded by it, could result in users using it in (Materials Planner, TransCom)
other than the prescribed ways, by working around
intended controls, or not inputting important in- Using one log-in for everybody in the workshop
formation in the system. Those two reasons for essentially meant that the intended controls in the
drift are now presented below. system were bypassed by the users. If a generic
logon approach was followed, then it would be
Bypassing or Workaround of Controls difficult to tell who was or was not using the
system. It would also be impossible if the need
Our analysis indicated that organizational drift arose to identify in the system which user actually
could arise from users bypassing the system carried out a transaction.
controls, or working around them. The degree In addition, in the implementation of SAP at
to which they could do this was enabled or con- TransCom there existed a “source list”, which
strained by the properties of the Enterprise Sys- contained the suppliers from which the company
tem. It also depended on how the access profiles could buy items required for the maintenance and
in the system were configured. For example, as repairing of trains. The source list existing in the
one interviewee mentioned, although access to system was created and maintained by the system
information on one screen was not allowed, the administrators at ITUK, and a block was put in
same information could be obtained by accessing the system to disallow other users from amend-
an alternative screen: ing it, so that only authorised suppliers identified
in the source list could be used to buy materials
Now, if I go into Oracle inquiry for Accounts from. However, users identified a way to bypass
Receivable for example, I can see invoice informa- this, by creating a new source list in the system,
tion, but I can’t see credits in there... If I go into rather than using the one created for them by the
Business Objects with my inquiry access, it runs ITUK team. This meant that they could effectively
invoices and credits and it does so pretty happily. include any supplier in their own source list,
So I can get them that way. (Cash Management and buy from any of them, without reference to
and Treasury Process Director, NGlobe) the approved suppliers in the ITUK-maintained
source list.
Although there might not have been intention
in doing so, controls could still be bypassed un- Missing Information
consciously, because it was easier to bypass them
than follow the prescribed ways of working with From the interviews carried out we realised that
the system. For example, although access controls users could choose not to enter important infor-
1223
Enterprise Systems, Control and Drift
mation in the system. This might be due to lack information that gets put in is completely rubbish.
of this information, or users resisting the system And that can only be changed by the people using
by not inputting this information. It could also be it, there’s nothing SAP could do to make that any
because users didn’t understand the workings of better, that’s entirely human. (Reliability Group
the system, and the impact that their inaction of Leader, TransCom)
inputting that information had on other depart-
ments and the company as a whole. If important In addition to the issue of the quality of infor-
information was missing in the system, negative mation that was input into the system, the timing
organizational consequences were certain to of inputting that information was also important.
occur. In this case, money might be lost, as one For example, due to the vast number of jobs done
interviewee indicated: on trains in TransCom and the associated number
of service orders, work on a train could start before
There are vehicles coming to our depot, and we the relevant service order was created in SAP. If
don’t know who’s sending them. There’s no contract this mistake was realised later on the same day
set up for them, so the commercial department or the next day, this could be too late, as the train
can’t allocate working hours… We did quite a lot would be repaired by then, and left the depot.
of work for these customers, but we don’t have any This would then mean that it would be difficult
idea who to bill, or how to get the money back, to identify without any records what work was
or how much. (Production Planner, TransCom) done on a train. Even worst, if this mistake was
not found at all and the service order was not cre-
One way to overcome the effects of missing ated, then the train would have been repaired for
information in the system was by introducing free, without charging the customer for it.
mandatory fields, or using the affordances of the
system to carry out checks that this information was Use of External Systems
there. However, although appealing this approach
might seem, there were practical considerations In all of the companies examined, most of their
that would make it unworkable: reporting requirements were carried out by extract-
ing data from the system and inputting them for
If it was for me, I would say, make all the fields manipulation into Excel. In SecSys for example, a
mandatory, and you have to fill them all in. In the key process within the supply chain was customer
real world, you could never do that. There are time order satisfaction, examining where the company
constraints for one, availability of information, was able to satisfy customer orders within the de-
two. So you would have the end user who wouldn’t livery time that the customer wanted. The relevant
use the system. (SAP Facilitator, TransCom) data was extracted from SAP into Excel in this
case, in order to produce a management report
The quality of information that was input into that was presented on a monthly basis to senior
the system was generally recognised as very im- management. Similarly in TransCom, some of the
portant for the correct functioning of the system: reports that were running included for example
the number of open and closed service orders in
I think the big problem we’ve got with SAP at the a given period, the number of purchase invoices
moment is the quality of data being entered. I think processed per site, number of materials issued,
there is a perception that nobody is using SAP, received or transferred in a certain period, etc.
for once the information is entered, it’s forgotten, Although some of the reports taken directly
it’s never used again. And therefore a lot of the out of the system would give all the information
1224
Enterprise Systems, Control and Drift
that was needed, the layout would generally be DIscUssION AND tHEOry
not right for showing those reports to manage- DEVELOPMENt
ment; therefore the need to manipulate these data
in Excel. Excel in this case was considered more In this section we draw on the analysis presented
advanced, in terms of being able to summarize and above on the ways control and drift can occur, as
carry out calculations on the data, produce graphs, well as our theoretical concepts of disembedding /
manage the layout, etc. However, by taking data reembedding and human and machine agencies, in
out of the ERP system and manipulating them order to develop our theoretical conceptualisation
in another piece of software (Excel) that did not that explains the processes that lead to control and
impose access restrictions, data could be (inten- drift within the context of an Enterprise System.
tionally or unintentionally) falsified, producing
erroneous results. If this occurred, then control Human and Machine Agencies
over the accuracy and truthfulness of those data
would be lost, and drift would occur: The actual use of the system in the analysis of
the five companies can be conceptualised by the
You have that functionality, it’s very good, you can interplay between human and machine agencies. A
export it [data from the system]. The problem is, human agency position in the use of the Enterprise
that you can then manipulate the data [in Excel] System in this case assumes that humans (Enter-
into any way you want, you know, anyhow you prise System users in this case) could choose to
want. And for me, that’s potential loss of control, use the system minimally, invoke it according to
because, OK, if you imagine, 2 groups of people needs, or improvise in ways that could produce
are producing the same data in theory, manipu- unanticipated consequences (Boudreau & Robey,
lating it slightly differently, and potentially you 2005; Orlikowski, 2000). On the other hand, ma-
turn up with 2 individuals at the same meeting, chine agency is assumed to embody rules guiding
with 2 different sets of data. (SAP Facilitator 2, human action, limiting choice alternatives and
TransCom) monitoring human action (Boudreau & Robey,
2005; Winner, 1977; Zuboff, 1988). Although ma-
The use of Excel was also not always a panacea chines themselves are products of human agency
for the production of reports. Users had to know (when the development stage is considered), when
Excel quite well, in order to be able to manipulate they are installed and left to operate they then
the data coming out of the Enterprise System. In become constraints or enablers of human agency
the Materials Management area in TransCom for (Boudreau & Robey, 2005; Nandhakumar et al.,
example, the output from more than one areas 2005; Rose et al., 2003).
of SAP had to be extracted at a time, and each In other words, the assumption in the han-
of those outputs had to be entered into an Excel dling of agency in this chapter is that human
spreadsheet and then combined using specialist (user) agency is characterised by intentionality
functions such as vlookup. This was seen to be too to perform certain actions in the system, while
complicated and time-consuming to do, distracting machine (system) agency is characterised by af-
the users from the main job that they should be fording (enabling or constraining) the intended
doing, rather than having to learn complex func- human actions in the system. This position follows
tions in Excel to manipulate the data that were amongst others the works of Jones (1999), Rose
taken out of the system. and Jones (2004) and Rose et al. (2003), who argue
that by defining agency as the “capacity to make
a difference” (Giddens, 1984), both machines
1225
Enterprise Systems, Control and Drift
and humans can be viewed as possessing agency. operate in cycles, i.e. the output of one phase of
However, humans have intentionality and self and the workflow being used as the input in the next
social awareness, which result in capabilities for phase of the workflow. This would also mean that
interpretation of particular situations and actions. an action of a user in the system would impact
Machines however lack those capabilities (at least other users of the system, in a cause and effect,
to a large degree relative to humans and based on or action/consequence manner.
current technologies). However, we argue that the employment of
the disembedding/reembedding concepts goes
Embedding-Disembedding a step further from simply describing cause and
of Human Agency effect. Due to the global and integrative nature of
the Enterprise System, the action of a user in the
In this chapter we argue that human agency can system is not simply the cause for another action
also be further elaborated into the disembedding by another user, but also entails visibility across
and reembedding of user actions in the system. geographical, functional and time dimensions.
This refers to the ways that actions of one user This means that the disembedded action in the
are disembedded to other users, and these actions system is recorded, and could be examined by
then being reembedded by them as input for their authorised users in other locations of the company,
own work in the system. The disembedding of in other functional areas, or in the future if need
actions in this case can be linked to data input arose. This action therefore then ceases to be lo-
by users in the system, and the reembedding of cal, but is “disembedded” across time and space.
actions can be linked to data use by users of the As discussed, the disembedding and reembed-
system. Disembedded actions refer to users in ding of human actions in the system can be seen
one department using the system to carry out a to be facilitated by the machine agency of the
transaction (such as finance giving authorisation Enterprise System. For example, the fact that the
to do the stock count). This action then gets disem- system consists of a single global database enables
bedded for example from the finance area to other the user actions to be disembedded in terms of be-
departments or users concerned (for example the ing visible to other users. The single database also
Materials Management area). This disembedded enables other users to view disembedded actions
action then gets reembedded locally (in this case in the system and reembed them, in terms of using
by the Materials Management users) in terms of them as the input for their own work. The disem-
being able to use it as input for their own work bedding and reembedding of human actions can
(in this case carrying out the stock count). also be seen to be facilitated by the workflow and
The disembedding and reembedding of hu- access controls in the ERP system, which specify
man actions in the system can be seen to be fa- which actions users could take in the system in
cilitated by the workflow that is inscribed in the order for them to be disembedded, and to which
Enterprise System, and the single database that other users those actions would impact upon, in
enables monitoring of user actions. Authorisa- terms of those actions being reembedded by them.
tions for the disembedding and reembedding of When the user actions in the system are
information are then made possible with the use disembedded however, any errors, omissions
of access profiles that specify which users could or inconsistencies by the user are disembedded
disembed and reembed various pieces of infor- as well. This could have a “ripple” effect to the
mation in the system. Because of the workflow company’s operations as a whole, and therefore
inscribed in the ERP system, the disembedding drift might occur. As has been discussed in the
and reembedding of information could be seen to analysis section, this drift might occur because of
1226
Enterprise Systems, Control and Drift
the system configuration, which could allow for Although the factors from Enterprise System
missing information in the system, the bypassing use in Figure 1 are shown to lead to organizational
of controls by users, or the use of external systems control and/or drift, this result is in essence the
such as Excel. interpretation of the researcher according to the
unique context where these factors are identified.
conceptualisation of Enterprise It can be argued for example however, that the
system Use and Organizational same factors could be interpreted in another way
consequences (control and Drift) in a different context.
For example, while missing information was
The figure below presents our conceptualisation interpreted as resulting in organizational drift, it
of the organizational impact (classified as control could be argued that such missing information
or drift) of the use of Enterprise Systems, accord- was the outcome of users not inputting the required
ing to the data we gathered from the case study information in order to signal problems with the
companies and the theoretical frameworks that system or data incompatibilities, and this could
we employed. be viewed as a control factor (e.g. Kavanagh,
2004; Marakas & Hornik, 1996; Markus, 1983).
Figure 1. The impact of enterprise systems on control and drift: A human and machine agency perspec-
tive through the embedding and disembedding of human actions
1227
Enterprise Systems, Control and Drift
Similarly, with the case of the monitoring of user both possess and exhibit agency. We have based
actions afforded by the Enterprise System which our conceptualisation on the assumption that the
was interpreted to lead to organizational control, Enterprise System acts by affording (enabling or
in other contexts it could potentially lead to users constraining) states of control and drift. We have
resisting the system. In this sense, some users in also based our conceptualisation on the assumption
TransCom have expressed their perception of the that human actions are characterised by intention-
visibility offered by the ERP system as a kind of ality, and have shown that those actions can be
“Big Brother”. Although these users were subse- embedded and disembedded, consequently having
quently educated and trained to use the system, an impact on organizational control and drift.
the visibility functionality of the ERP system Our findings draw upon and complement the
could otherwise potentially result in user resistance findings by Hanseth et al. (2001), where side
which would be detrimental to the company effects can lead to loss of control (drift) due to
(Kossek et al., 1994; Martinko et al., 1996), and the integrative nature of an ERP, through which
which would therefore cause organizational drift these side effects are “rippled”. We have enhanced
as far as the use of the system is concerned. As this understanding by arguing that drift can oc-
such, the interpreted nature of the factors from cur through the disembedding and reembedding
ERP use leading to either organizational control of user actions in the system (see Figure 1). Our
or drift must be mentioned, which depends on the results also refine Boudreau & Robey (2005),
context where these factors are encountered. who argue that although ERPs can constrain hu-
The importance of this conceptualisation then man agency, this can still take place within such
does not lies in enumerating the various factors systems. We argue that this exercise of human
affecting ERP use, as well as the factors from agency from the part of users can lead to drift,
ERP use leading to either control or drift. The as shown in Figure 1. Finally, we argue that the
importance of the conceptualisation lies more in concept of panoptic empowerment as identified
sensitizing the reader with regards to the need to by Elmes et al. (2005), occurs through the dis-
examine the context where an Enterprise System embedding and consequent reembedding of user
is used, as well as the actual use of the system actions in the system.
and its outcome in terms of organizational control For practitioners, our findings indicate that
and drift. This means that when examining the attention needs to be paid to the setting of ac-
use of an ERP system, the factors impacting its cess profiles, according to what is afforded by
use must be examined, as well as the affordances the system. Attention should also be paid to the
of the system, the actions of users in the system, actual configuration of the system, to minimize
and the interdependencies between actions of the bypassing of controls and the unwanted or
different users (through the disembedding and unauthorised use of the system, which can lead to
reembedding of those actions). drift. The importance of inputting required infor-
mation in the system should also be emphasized
to employees, although the system may not force
cONcLUsION AND IMPLIcAtIONs users to enter it. This also links to user training in
order to increase the understanding of the system.
The aim of this chapter has been to present and If users don’t understand how the system works
theorize the impact of actions related to an Enter- and how their actions in the system impact other
prise System on organizational control and drift. users, then errors, omissions or inconsistencies
We have taken an agency perspective, where hu- will keep occurring and the effects of those will
mans (users) and machine (the Enterprise System) be “rippled” across the company, resulting in drift.
1228
Enterprise Systems, Control and Drift
On the other hand, too tight controls in the Bloomfield, B. P., & Coombs, R. (1992). Informa-
system can reduce the resiliency of the company tion Technology, Control and Power: The Central-
to respond to future challenges and adapt to new ization and Decentralization Debate Revisited.
realities (Ignatiadis & Nandhakumar, 2005). In Journal of Management Studies, 29(4), 459–484.
that sense, some degree of calculated drift may be doi:10.1111/j.1467-6486.1992.tb00674.x
beneficial, as long as it is not caused by inadvertent
Bloomfield, B. P., Coombs, R., & Owen, J. (1994).
or uninformed user actions. The thin line between
The social construction of information systems -
control and drift is different for each company,
the implications for management control. In R.
and depends on factors internal and external to
Mansell (Ed.), Management of Information and
it. Our model presents an understanding of the
Communication Technologies - Emerging Patterns
processes that lead to control and drift, so that
of Control (pp. 143-157). London: Aslib.
managers can tailor these processes according to
the idiosyncrasies of their companies. Boudreau, M.-C., & Robey, D. (1999). Organiza-
tional transition to enterprise resource planning
systems: theoretical choices for process research.
rEFErENcEs Paper presented at the 20th International Confer-
ence on Information Systems, Charlotte, North
Akkermans, H., & van Helden, K. (2002). Vicious Carolina, United States.
and virtuous cycles in ERP implementation: a case
study of interrelations between critical success Boudreau, M.-C., & Robey, D. (2005). Enacting
factors. European Journal of Information Systems, Integrated Information Technology: A Human
11(1), 35–46. doi:10.1057/palgrave/ejis/3000418 Agency Perspective. Organization Science, 16(1),
3–18. doi:10.1287/orsc.1040.0103
Al-Mashari, M., & Al-Mudimigh, A. (2003).
Enterprise Resource Planning: A taxonomy of Ciborra, C. U. (2000). A Critical Review of the
critical factors. European Journal of Operational Literature on the Management of Corporate Infor-
Research, 146(2), 352–364. doi:10.1016/S0377- mation Infrastructure. In C. U. Ciborra, K. Braa,
2217(02)00554-4 A. Cordella, B. Dahlbom, A. Failla, O. Hanseth, V.
Hepso, J. Ljungberg, E. Monteiro & K. A. Simon
Bernroider, E., & Koch, S. (1999). Decision mak- (Eds.), From Control to Drift - The Dynamics of
ing for ERP investments from the perspective of Corporate Information Infrastructures (pp. 15-
organizational impact - Preliminary results from 40). Oxford: Oxford University Press.
an empirical study. Paper presented at the 5th
Americas conference on information systems, Ciborra, C. U. (2002). The Labyrinths of Informa-
Milwaukee, WI, USA. tion: Challenging the Wisdom of Systems. Oxford:
Oxford University Press.
Besson, P., & Rowe, F. (2001). ERP project dynam-
ics and enacted dialogue: perceived understanding, Coombs, R., Knights, D., & Willmott, H. C.
perceived leeway, and the nature of task-related (1992). Culture, Control and Competition;
conflicts. The Data Base for Advances in Informa- Towards a Conceptual Framework for the
tion Systems, 32(4), 47–65. Study of Information Technology in Organi-
zations. Organization Studies, 13(1), 51–72.
Bingi, P., Sharma, M. K., & Godla, J. (1999). doi:10.1177/017084069201300106
Critical Issues Affecting an ERP Implementation.
Information Systems Management, 16(3), 7–14.
doi:10.1201/1078/43197.16.3.19990601/31310.2
1229
Enterprise Systems, Control and Drift
Duane, A., & Finnegan, P. (2003). Managing em- Ignatiadis, I., & Nandhakumar, J. (2007). The
powerment and control in an intranet environment. impact of Enterprise Systems on organizational
Information Systems Journal, 13(2), 133–158. resilience. Journal of Information Technology,
doi:10.1046/j.1365-2575.2003.00148.x 22(1), 36–43. doi:10.1057/palgrave.jit.2000087
Elmes, M. B., Strong, D. M., & Volkoff, O. Jones, M. R. (1999). Information Systems and the
(2005). Panoptic empowerment and reflective Double Mangle: Steering a Course between the
conformity in enterprise systems-enabled orga- Scylla of Embedded Structure and the Charybdis
nizations. Information and Organization, 15(1), of Strong Symmetry. In T. J. Larsen, L. Levine, J.
1–37. doi:10.1016/j.infoandorg.2004.12.001 I. DeGross (Eds.), Information Systems: Current
Issues and Future Changes (pp. 287-302). New
Gattiker, T. F., & Goodhue, D. L. (2004). Un-
York: OmniPress.
derstanding the local-level costs and benefits of
ERP through organizational information process- Kallinikos, J. (2004). Deconstructing infor-
ing theory. Information & Management, 41(4), mation packages: Organizational and behav-
431–443. doi:10.1016/S0378-7206(03)00082-X ioural implications of ERP systems. Infor-
mation Technology & People, 17(1), 8–30.
Gibson, J. J. (1979). The ecological approach
doi:10.1108/09593840410522152
to visual perception. Boston: Houghton Mifflin.
Kavanagh, J. F. (2004). Resistance as Motivation
Giddens, A. (1984). The Constitution of Society:
for Innovation: Open Source Software. Com-
Outline of the Theory of Structuration. Cambridge:
munications of the Association for Information
Polity Press.
Systems, 13, 615–628.
Giddens, A. (1990). The Consequences of Mo-
Koch, C. (2001). BPR and ERP: Realising
dernity. Cambridge: Polity Press.
a vision of process with IT. Business Pro-
Glaser, B. G., & Strauss, A. (1967). The discovery cess Management Journal, 7(3), 258–265.
of grounded theory: Strategies for qualitative doi:10.1108/14637150110392755
research. New York: Aldine.
Kossek, E. E., Young, W., Gash, D., & Nichol, V.
Hanseth, O., Ciborra, C. U., & Braa, K. (2001). (1994). Waiting for Innovation in the Human Re-
The Control Devolution: ERP and the Side Effects sources Department: Godot Implements a Human
of Globalization. The Data Base for Advances in Resource Information System. Human Resource
Information Systems, 32(4), 34–46. Management, 33(1), 135–160. doi:10.1002/
hrm.3930330108
Holland, C. P., & Light, B. (1999). A critical suc-
cess factors model for ERP implementation. IEEE Legare, T. L. (2002). The role of organizational
Software, 1999, 30–36. doi:10.1109/52.765784 factors in realizing ERP benefits. Information
Systems Management, 19(4), 21. doi:10.1201/1
Hong, K. K., & Kim, Y. G. (2002). The criti-
078/43202.19.4.20020901/38832.4
cal success factors for ERP implementation: an
organizational fit perspective. Information & Malone, T. W. (1997). Is Empowerment Just a
Management, 40, 25–40. doi:10.1016/S0378- Fad? Control, Decision Making, and IT. Sloan
7206(01)00134-3 Management Review, 38(2), 23–35.
1230
Enterprise Systems, Control and Drift
Marakas, G. M., & Hornik, S. (1996). Passive Newell, S., Huang, J. C., Galliers, R. D., &
Resistance Misuse: Overt Support and Covert Pan, S. L. (2003). Implementing Enterprise
Recalcitrance in IS Implementation. European Resource Planning and knowledge management
Journal of Information Systems, 5(3), 208–220. systems in tandem: fostering efficiency and
doi:10.1057/ejis.1996.26 innovation complementarity. Information and
Organization, 13(1), 25–52. doi:10.1016/S1471-
Markus, M. L. (1983). Power, Politics, and MIS
7727(02)00007-6
Implementation. Communications of the ACM,
26(6), 430–444. doi:10.1145/358141.358148 Norman, D. A. (1988). The Psychology of Every-
day Things. New York: Basic Books.
Markus, M. L., & Tanis, C. (2000). The Enterprise
Systems experience - From adoption to success. Orlikowski, W. J. (1991). Integrated Information
In R. W. Zmud (Ed.), Framing the domains of Environment or Matrix of Control? The Con-
IT management: Projecting the future through tradictory Implications of Information Technol-
the past. Cincinnati, OH: Pinnaflex Educational ogy. Accounting . Management and Information
Resources, Inc. Technologies, 1(1), 9–42. doi:10.1016/0959-
8022(91)90011-3
Martin, I., & Cheung, Y. (2000). SAP and
Business Process Reengineering. Busi- Orlikowski, W. J. (2000). Using Technology
ness Process Management, 6(2), 131–121. and Constituting Structures: A Practice Lens for
doi:10.1108/14637150010321286 Studying Technology in Organizations. Orga-
nization Science, 11(4), 404–428. doi:10.1287/
Martinko, M. J., Henry, J. W., & Zmud, R. W.
orsc.11.4.404.14600
(1996). An attributional explanation of indi-
vidual resistance to the introduction of informa- Orlikowski, W. J., & Baroudi, J. J. (1991). Study-
tion technologies in the workplace. Behaviour ing Information Technology in Organizations:
& Information Technology, 15(5), 313–330. Research Approaches and Assumptions. Informa-
doi:10.1080/014492996120094 tion Systems Research, 2(1), 1–28. doi:10.1287/
isre.2.1.1
Miles, M. B., & Huberman, A. M. (1994). Quali-
tative Data Analysis (2nd ed.). Thousand Oaks, Pickering, A. (1995). The Mangle of Practice:
California: Sage Publications. Time, Agency and Science. Chicago: University
of Chicago Press.
Nah, F. F., Lau, J. L., & Kuang, J. (2001). Critical
factors for successful implementation of enterprise Rose, J., & Jones, M. R. (2004). The Double
systems. Business Process Management Journal, Dance of Agency: a socio-theoretic account of how
7(3), 285–296. doi:10.1108/14637150110392782 machines and humans interact. Paper presented
at the ALOIS Workshop: Action in Language,
Nandhakumar, J., Rossi, M., & Talvinen, J.
Organizations and Information Systems, Linkop-
(2005). The dynamics of contextual forces of ERP
ing, Sweden.
implementation. The Journal of Strategic Infor-
mation Systems, 14(2), 221–242. doi:10.1016/j. Rose, J., Jones, M. R., & Truex, D. (2003).
jsis.2005.04.002 The problem of agency: How humans act, how
machines act. Paper presented at the ALOIS
Workshop: Action in Language, Organizations
and Information Systems, Linkoping University,
Linkoping, Sweden.
1231
Enterprise Systems, Control and Drift
Rose, J., & Truex, D. (2000). Machine agency Somers, T., & Nelson, K. (2001). The Impact
as perceived autonomy; an action perspective. of Critical Success Factors across the Stages of
In R. L. Baskerville, J. Stage & J. I. DeGross Enterprise Resource Planning Implementations.
(Eds.), Organizational and Social Perspectives on Paper presented at the Hawaii International Con-
Information Technology (pp. 371–390). Aalborg, ference on Systems Sciences.
Denmark: Kluwer.
Tang, M., Sia, S. K., Soh, C., & Boh, W. F. (2000).
Schrnederjans, M. J., & Kim, G. C. (2003). Imple- A Contingency Analysis of Post-bureaucratic
menting enterprise resource planning systems with Controls in IT-related Change. Paper presented at
total quality control and business process reengi- the 21st International Conference on Information
neering survey results. International Journal of Systems, Brisbane, Queensland, Australia.
Operations & Production Management, 23(3/4),
van Fenema, P. C., & van Baalen, P. J. (2005).
418–429. doi:10.1108/01443570310467339
Strategies for Dealing with Drift during Imple-
Shang, S. S. C., & Seddon, P. B. (2000). A com- mentation of ERP Systems. Rotterdam: Erasmus
prehensive framework for classifying the benefits Research Institute of Management.
of ERP systems. Paper presented at the Americas
Walsham, G. (1993). Interpreting Information
Conference on Information Systems, Long Beach,
Systems in Organizations. Chichester: John Wiley
California.
& Sons.
Shanks, G., Parr, A., Hu, B., Corbitt, B., Thana-
Walsham, G. (1995). The Emergence of Inter-
sankit, T., & Seddon, P. B. (2000). Differences in
pretivism in IS Research. Information Systems
critical success factors in ERP systems implemen-
Research, 6(4), 376–394. doi:10.1287/isre.6.4.376
tation in Australia and China: a cultural analysis.
Paper presented at the European Conference on Winner, L. (1977). Autonomous Technology.
Information Systems, Vienna, Austria. Technics-out-of-Control as a Theme in Political
Thought. London: MIT Press.
Sia, S. K., Tang, M., Soh, C., & Boh, W. F. (2002).
Enterprise Resource Planning (ERP) Systems as a Zuboff, S. (1988). In the Age of the Smart Ma-
Technology of Power: Empowerment or Panoptic chine: The Future of Work and Power. Oxford,
Control? The Data Base for Advances in Informa- UK: Heinemann Professional Publishing.
tion Systems, 33(1), 23–37.
Siriginidi, S. R. (2000). Enterprise Resource
Planning in Reengineering Business. Business
Process Management Journal, 6(5), 376–391.
doi:10.1108/14637150010352390
This work was previously published in Global Implications of Modern Enterprise Information Systems: Technologies
and Applications, edited by Angappa Gunasekaran, pp. 317-343, copyright 2009 by Information Science Reference (an
imprint of IGI Global).
1232
1233
Chapter 5.4
The Impact of Enterprise
Systems on Business Value
Sanjay Mathrani
Massey University, New Zealand
Mohammad A. Rashid
Massey University, New Zealand
Dennis Viehland
Massey University, New Zealand
AbstrAct INtrODUctION
A significant investment in resources is required for The implementation of enterprise systems has been
implementation of integrated enterprise systems as considered the most important development in cor-
technology solutions while the effectiveness of these porate use of information technology (Davenport,
systems to achieve business value remains unclear 1995, 1998; Davenport & Prusak, 1998; Deloitte,
and empirically largely unexplored. Enterprise 1998). Enterprise systems (ES) broadly include all
systems integrate and automate business processes, enterprise-wide systems. These include enterprise
but unarguably, the real business value can only be resource planning (ERP) systems or any extended
achieved from improvements through the transfor- modules such as supply chain management (SCM) or
mation of enterprise systems data into knowledge by customer relationship management (CRM) systems.
applying analytic and decision making processes. However, despite a few dramatic successes, many
This study explores a model of transforming ES organizations still fail to realize the benefits while
data into knowledge and results by comparing two incurring huge costs and schedule overruns (Dalal,
case studies that examine the impact of enterprise Kamath, Kolarik, & Sivaraman, 2004). It has been
systems information on organizational functions and estimated that half of all ES implementations fail to
processes leading to realization of business value. achieve the desired results (Jarra, Al-Mudimigh, &
Zairi, 2000). In most cases enterprise systems are
DOI: 10.4018/978-1-59904-859-8.ch010
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Impact of Enterprise Systems on Business Value
implemented to improve organizational effective- penetration capability into the competitive market
ness (Davenport, 1998, 2000; Marcus & Tanis, by improving their operations. Both organizations
2000). These software applications connect and had implemented ES for at least three years and
manage information flows across complex orga- so were in their mature phase of implementation.
nizations, allowing managers to make decisions One organization had achieved considerable suc-
based on information that accurately reflects the cess from their ES implementation whereas the
current state of their business (Davenport, Harris, other had achieved little success. The two cases
& Cantrell, 2002). are compared to identify reasons for their levels
These systems are implemented to bring about of success.
definite business benefits that justify the invest-
ment. Truly significant return on investment (ROI)
comes from the process improvements that ES bUsINEss bENEFIts
supports and not just from improved information
access. In most implementations, ES software The justification for adopting ES centres on an-
alone makes marginal improvement in business ticipated business benefits from the ES. To receive
performance. If organizations continue to follow benefit from an ES, there must be no misunder-
the same pre-ES business processes after imple- standing of what it is about, its usability, and,
mentation, they can expect the same or possibly even more importantly, organizational decision
worse performance. ES software can, however, makers must have the background and tempera-
enable and support many new and improved ment for this type of decision making coupled
processes, but not without the organization decid- with the right quality of information (Donovan,
ing what those processes are and committing to 1998). Many researchers have evaluated benefits
them. Positive ROI can come from changing the from ES investments (Cooke & Peterson, 1998;
way business was performed in the past to more Davenport et al., 2002; Deloitte, 1998; Donovan,
streamlined, faster and lower cost processes that 1998, 2001; Hedman & Borell, 2002; Ittner &
better serve the needs of the customer and, if that Larcker, 2003; Shang & Seddon, 2000; Yang &
is done well, the organization will be a winner Seddon, 2004). These studies have found that
(Donovan, 2003). ES’s are designed to help manage organizational
The focus of this chapter is to better understand resources in an integrated manner. Furthermore,
the effectiveness of enterprise systems technology the level of integration that is promoted across
in an organizational setting. A qualitative research functions in an enterprise closely relates to the
methodology is used to explore how firms can primary benefits that are expected as a result of
leverage ES technologies to realize improved their implementation. After adoption, improved
business value. Field studies were conducted in business performance should produce both opera-
two large manufacturing organizations in India tional and strategic benefits (Irving, 1999; Jenson
that have implemented ESs, in order to understand & Johnson, 2002; Nicolaou, 2004).
their experience in achieving growth by leveraging A study of 85 global companies (Deloitte,
data from their ES investment. Semi-structured 1998) found tangible benefits (e.g. cost savings,
interviews were conducted with senior managers faster processing) and intangible benefits (e.g.,
of the two organizations between January 2005 and improved information visibility, new/improved
February 2006. The empirical data were integrated processes, and improved customer responsive-
and analysed to formulate inferences presented ness) from ES implementation. In a survey of 163
in this paper. Both organizations had aggressive large firms (Davenport et al., 2002) key benefits
growth plans with an objective to achieve better realized by organizations adopting ES included
1234
The Impact of Enterprise Systems on Business Value
better management decision making, improved to support a business decision. The third are the
customer service and retention, ease of expansion/ outcomes which are the events that change as a
growth, increased flexibility, faster and more ac- result of the analysis and implementation of the
curate transactions, cost reduction, and increased decisions made. As Davenport’s model shows, the
revenue. There have also been some studies on process of ES data transformation into knowledge
organizational benefits resulting from overlapping leads into organizational changes. The most basic
implementation of knowledge management (KM) potential outcome of this process is the changes
and ES in organizational settings (e.g., Newell, in behaviors of individual managers, employ-
Huang, Galliers, & Pan, 2003; Baskerville, ees, customers, suppliers, and all stakeholders
Pawlowski, & McLean, 2000; Bendoly, 2002). in the value chain. Another outcome from the
However, this paper focuses on the impact of ES decisions or the behavioral changes may be
on realizing business value through the process of new initiatives to bring about improvements in
ES data transformation into knowledge by apply- business or make changes in existing projects.
ing analytic and decision-making processes. This The results of decisions can also include process
study attempts to establish the link between data, changes– determining that an existing process is
decisions, and actions, its impact on functional and not working effectively can lead to changes in the
business processes, and their outcomes. existing process or design and implementation
of an entirely new process. The ultimate results
of all these activities are the business benefits
tUrNING Es DAtA INtO which lead to positive financial impacts for the
Es KNOWLEDGE organization. “Decisions lead to new behaviors,
new initiatives, and processes, which do not
A model conceptualized and used by Davenport matter unless they improve the bottom line and
(2000) and his team of researchers for turning the return to share holders” (Davenport, 2000) p.
ES data into ES knowledge is shown in figure 225). It may be difficult to draw a direct chain of
1. The model comprises three major steps. The influence from prerequisites to transformation to
first is the context. This includes the factors that non-financial outcomes to financial results, but
must be present for transformation of ES data into establishing that linkage should be the objective
knowledge and results. The second is transforma- of an organization that invests effort and resources
tion of ES data into knowledge which takes place in ES data transformation (Davenport, 2000) and
when the data are actually analyzed and then used is the focus of this study.
Figure 1. A model of how ES data are transformed into knowledge and results
1235
The Impact of Enterprise Systems on Business Value
The two case studies are presented next and the context: strategic
discussion follows Davenport’s model- context,
transformation, and outcomes for both cases as Growel’s journey towards becoming an interna-
shown in Figure 1. tional e-business began in the late 1990’s. The
company wanted to grow exports, widen its global
footprint, secure new customers, become the
cAsE stUDy 1 world’s largest manufacturer of axle components,
and be a key global provider of engine components.
company Overview To achieve these goals, Growel planned to double
its manufacturing capacity by implementing a
Growel Limited1 is a U.S. $1 billion forging major capacity expansion program. However,
manufacturing company and is one of the world’s this involved large investments and risks. The
largest manufacturers and exporters of automotive company had to resort to major cost controls,
engine and suspension components. It has the improve operational efficiencies and optimize its
world’s largest single-location forging capacity business processes to counter the adverse financial
and one of the most technologically advanced effects of the major investments. Senior managers
commercial forge shops in the world. Growel has in the company decided to pursue a strategy of
been a publicly traded company whose stock has operational excellence. The company historically
appreciated more than 200 percent since March lacked integration between its order-to-cash, ship-
2004. With manufacturing facilities in India and ping, and accounts receivable processes. There
Germany, the company manufactures a wide were disputes on invoices and purchase orders
range of forgings and machined components for relating to price and terms of business. There was
the automotive, diesel engine, railway, earthmov- a lack of visibility into finished goods inventory
ing, cement, sugar, steel, coal, ship building, and and overall accuracy of inventory was poor. Vis-
oilfield industries. An ISO 9001:2000, ISO/TS ibility of material requirements and inventory
16949:2002 accredited company, Growel is inter- throughout the value chain was inadequate and
nationally reputed for its cutting edge technology, did not provide decision support at all stages of
established quality processes, and capabilities to operations.
meet the exacting standards of the most demanding The company had not integrated the design and
customers in the world. Growel Limited is a global development practices with the operational sys-
corporation with world class engineering capabili- tems; therefore the time lag between development
ties, state-of-the-art manufacturing facilities, and a and marketing of products was large and resulted
global customer base that includes General Motors, in poor customer service and dissatisfaction. The
Toyota, Ford, Daimler Chrysler, Honda, Renault, pre-production approval process was another
Volvo, Caterpillar – Perkins, and several others. aspect which required attention. The company
It is the largest manufacturer of axle components needed the ability to interactively participate
for heavy trucks and has a 35% global market with its customers at the early stages of product
share, with a 10% global market share in engine development and avoid rework at a later stage.
components. The following sections discuss how The product forecasting process also required im-
Growel leveraged knowledge-driven technologies provements. Managers only discovered that they
to improve business dynamics with considerable had a shortage of manufacturing capacity when
success. The discussion follows Davenport’s the line ran out. On the sales side, management
model – context, transformation, outcomes – as had limited visibility of who its most and least
shown in Figure 1. profitable customers and products were. They
1236
The Impact of Enterprise Systems on Business Value
also did not have information on whether they limitations for analysis. They also have a thorough
were buying in the most cost effective manner. working knowledge of several analytic and data
The management team recognized what types of presentation software packages, along with strong
decisions had to be made to support their strate- interpersonal skills to train and support end users.
gic objectives but could not utilize the available
operational data. context: Data
context: Organizational and cultural Issues of data quality were less at Growel, where
transaction data captured in the SAP system were
A company is as good as its people and Growel created internally based on all transactions from
has the advantage of having a highly qualified and sales orders to shipping invoices. Monitoring and
motivated manpower base. Since its inception, updating of data was a regular feature at Growel
Growel has attached great significance to “people and the transaction data was made available in a
power” and considers its employees as important timely fashion to support decision making.
assets. With interactive communications at all
levels, Growel continues to provide a congenial context: technology
and peaceful working atmosphere to its employ-
ees. In the process of ES implementation, the Growel had historically been using a home-
organizational and cultural elements were aligned grown legacy system which provided disparate
to support the use of transaction data at Growel. information which lacked proper integration and
The compensation system was also changed to utilization. However, this lack of operational data
reward sales people for sales volume and profit to support decision making changed with the
to include a fixed and variable component of implementation of SAP’s R/3 in 2000-01. The
pay. The company created a friendly atmosphere modules implemented were finance, sales and
within the organization which fostered orientation distribution, materials management, production
to change. The organization also adopted a data- management, and human resources. The company
oriented culture and encouraged employees to use now had unprecedented visibility into its opera-
data to support any business decision. tions and customer base. SAP business intelligence
tools were extensively used to extract, analyze,
context: skills and Knowledge and develop adhoc reports.
1237
The Impact of Enterprise Systems on Business Value
groups within each functional area translated the and purchase orders relating to price and terms
general framework into team-specific programs of business diminished. The online visibility of
to leverage innovations for achieving strategic demand and supplies with customers and suppliers
goals and plans. through the integrated supply chain management
The model was shared with all the relevant team (SCM) system led to less volatility in sudden spurts
players. Descriptive indicators of the improve- of demand which existed earlier. This resulted in
ment and corrective-action plans were identified more streamlined supplies and a dramatic change
to facilitate decision making. The implementation in customer and supplier behavior since Growel
plans for these decisions to achieve the desired could react better to change orders now and was
results along with the steps to create the results able to be more flexible in the manufacturing
were identified. Forms were designed to describe environment.
these plans and their measures. The indicators
were documented choosing the reference for Outcomes: New Initiatives
benchmarking and external validation along the
time-line. The analytical process was the means by The ability to analyze customer and product
which ES data became knowledge. The SAP data, profitability lead to a new initiative of value
required for each of the indicators were identified, engineering to improve or change the design to
extracted, and interpreted, to create useful infor- make the product more profitable. Unprofitable
mation for monitoring the progress for achieving products and customers were identified and the
the objectives. The signals and messages coming division’s existing unprofitable product lines were
from each indicator were analyzed and evaluated replaced by more profitable new product lines.
to support decision-making. The decision-making New initiatives towards implementing just-in-
process was based on high-quality, well-analyzed time inventory systems were undertaken, which
ES data on a multitude of factors. Some key areas decreased inventory costs substantially.
where ES data were utilized for improvements
were customer and product profitability analysis, Outcomes: Process changes
price/volume analysis, market and customer seg-
ment analysis, sales forecasting and operations Growel recognized that the SAP data created
planning analysis. All actions likely to improve opportunities for redesigning some business pro-
the likelihood that the result will be coherent with cesses which could create entirely new sets of
the strategic intent were identified, evaluated, and decisions. Growel is moving at full speed to
implemented. re-design some business processes and build e-
commerce applications with SAP as a backbone
Outcomes: changing behaviors for their legacy systems and other collaborative
software like SCM (Supply Chain Management)
One of the major outcomes from the initiatives de- and PLM (Product Lifecycle Management). SAP
scribed above was changing behaviors. Improved provides capabilities such as CRP (Capacity
information sharing, transparency, and openness Resource Planning), and BPR (Business Process
with customers, suppliers, employees, and all Re-engineering) which offer powerful links
stakeholders resulted in improved inter-personal within the entire value chain from customers to
and business relations. Having easy access to suppliers. The company has set up an integrated
invoice and purchase order data enabled Growel supply chain management system which enables
to improve price synchronization with customers real-time visibility of material requirements and
and suppliers. The earlier disputes on invoices inventory throughout the value chain and provides
1238
The Impact of Enterprise Systems on Business Value
decision support at all stages of operations. With designs and manufactures diesel engines and
a majority of the company’s suppliers receiving gensets for industry sectors such as power, oil and
supply chain data, the company has a real-time gas, construction, earthmoving, and transporta-
total demand management system in place. A tion and supplies to various countries all over
virtual private marketplace has been created for the world. The unit employs about 1,200 people.
Growel through which the company engages in Originally Primemover only manufactured diesel
e-procurement and reverse auctions. The company engines. In 1993 the company collaborated with
has already started selling scrap online. a German company to include gensets in order to
In a development that will substantially reduce extend its range of products, to develop a more
product development time and bring the company complete supply capability to the engine manu-
closer to its customer, Growel is in the process of facturing industry, and to position the company
implementing a Collaborative Product Commerce for long-term growth. Both product ranges served
(CPC) module. CPC will enable the company as solution providers for their customers, provided
to work online with its customers to design and products with a large-range of kva and hp ratings.
develop products and share information and The synergies created by the integration of the
knowledge with the customers. This will reduce two product ranges enabled better designs and
product development time and costs and, more product offerings. Specifically, customers had
importantly, forge close ties with the customers more effective, one-stop access to a comprehensive
from early stages of product development. range of products as well as simplified commer-
cial relationships. By enabling improved service
to customers, the integration of the two product
cAsE stUDy 2 lines enhanced the market position of the power
generation group of Primemover. However, the
company Overview company realized that it would face challenges
to ensure its profitable growth in the long term.
Primemover2 is a multi-faceted engineering
enterprise. Established in 1859, Primemover context: strategic
is one of India’s leading and well-diversified
engineering companies with a US$500 million Primemover was one of the few companies that
turnover. The company’s core competencies are were full-line supplier of the entire product range
in diesel/petrol engines, power generating sets in industry markets however; the company was fac-
(gensets), agricultural and construction equip- ing growing challenges. Despite increased demand
ment. The business operations of the company are resulting from a healthy growing market, greater
divided into various business groups strategically competition in its core markets and high operating
structured to ensure maximum focus on each costs could inhibit the achievement of financial
business area and yet retain a unique synergy in returns expected from its operations. Primemover
the operations. The business groups are power had to overcome the competition, and leverage the
generation, agricultural equipment, light engines, new opportunities to ensure profitable growth for
and infrastructure equipment. Primemover has the future. To compete effectively, Primemover
six manufacturing plants located at several lo- needed to improve its supply chain performance
cations in India. The company has an extensive and cost; the business processes of the two product
sales and service network manned by a highly lines were not performing at the levels necessary
skilled and dedicated workforce. to grow profitably in the emerging competitive
The power generation group of Primemover environment. The time frames required to commit
1239
The Impact of Enterprise Systems on Business Value
to delivery of finished goods to customers were on-going training and development to upgrade the
not competitive; customer order handling and skills and knowledge of its employees including
service processes were complex; operations were knowledge of the organization’s underlying busi-
not sufficiently flexible to enable rapid response ness processes.
to shifting demand; market share was not growing
rapidly; and inventory-carrying costs and other context: Data
expenses inhibited achievement of adequate finan-
cial returns. These challenges were compounded Quality of data was not an area of focus for
by the fact that 60% of Primemover diesel engine Primemover prior to ES implementation. The
and genset parts were externally sourced and there maintenance of data records was not consistent and
were long lead times for products such as pistons discrepancies were often encountered in the data
from Germany and turbochargers from UK. Fore- records. There was a lack of discipline in updating
cast accuracy was low, inventory data and related transactions in the warehouse which would lead
information were inaccurate. Thus, key goals to stock and other data discrepancies. This lack of
for Primemover included enhancing its ability accuracy and currency of information led to data
to respond to customer requirements, improving integrity issues amongst employees. The tools for
market share, and reducing costs throughout the data extraction were also inadequate. Availability
operation. Primemover determined that it must of transactional data and information was an issue.
improve its supply chain planning and execution Data extracts could not be made easily available
capabilities to improve its operations in order to and in time to support decision making.
achieve better penetration capability into the com-
petitive market, which was their prime objective. context: technology
context: Organizational and cultural Primemover realized a need to couple its execution
systems with a new class of supply chain plan-
Primemover has an overall employee base of ning software to address its requirements in the
about three thousand employees and has a change- future. After considering various software solu-
oriented organizational culture. Primemover tions and determining the business strategy, the
enjoys the enviable reputation of being one of the company selected SAP R/3 to be the foundation
few corporates that has successfully maintained of the planning system for its integrated opera-
harmonious human relations year after year and tions. Primemover had historically been using an
the credit for this goes to all its employees who internally-developed system which provided dis-
have always been open to and welcomed change. parate information that lacked proper integration
The organization structure is collaborative and and utilization. However, the situation changed
the compensation system is aligned to achieving with the implementation of SAP’s R/3 in 2000-
goals. 01. The company implemented financial, sales
and distribution, production management, human
context: skills and Knowledge resources along with Web-enabled supply chain
management systems. Primemover now had better
Out of the three thousand workmen Primemover visibility into its operations and customer base.
employs, over five hundred are qualified engineers Standard reports from SAP and Microsoft’s Excel
having technical and commercial expertise. The were used to analyze and report data.
company has hired mostly skilled workmen in the
last fifteen years. The company has been providing
1240
The Impact of Enterprise Systems on Business Value
1241
The Impact of Enterprise Systems on Business Value
between locations once received. Due to better rEsULts AND FINANcIAL IMPActs
tracking of material and a substantial reduction of
the need to move material multiple times, costs for Growel has surpassed the last full year’s total rev-
damaged and lost material declined from 1.60% enue and exports in the first nine months. Today,
to 0.78% of sales. Also, strategically significant Growel has achieved the distinguished position as
and measurable improvements to inventory, cost, the largest manufacturer of axle components for
and customer service were achieved. heavy trucks world wide and one of the key global
Forecast accuracy improved as the company players for engine components. Primemover has
gained experience with sales forecasting and op- improved over last year’s total revenue and exports
erations planning. The new processes also gave (as shown in table 2). However, Primemover has
visibility into material requirements for sched- not fully achieved the anticipated objectives and
uled orders and further facilitated procurement results. Primemover had an expectation that the
planning. Primemover had earlier been placing inventory levels would reduce by 60-70% and cost
large, irregular orders monthly or bimonthly with efficiency would also improve by 40-50% how-
its suppliers but is now placing regular weekly ever, reduction in inventory levels achieved was
orders, improving its suppliers’ abilities to plan only 40% and improvement in cost efficiency also
and thereby improving Primemover’s negotiat- was only 20%. Another expectation of Primemover
ing position. The store manager at Primemover was that the human resources would become highly
remarked that the suppliers and customers were motivated as an end result but the motivation
now giving “fewer headaches” with the new sys- expected was not seen. Although, improvement
tem. Primemover’s customers are also able to plan in the areas of on-time delivery and time taken
better due to the company’s improved forecasts. for new product development, was achieved as
Resolution of manufacturing constraints has anticipated. On the financial side, improvement
improved production throughput by 20%. Daily expectation in the bottom line, profit after tax,
cycle counting has enabled inventory accuracy to was 20% by both Growel and Primemover. An
advance from 52% to more than 80%, which has improvement of only 9% was finally achieved
facilitated a reduction in the levels of raw materi- by Primemover whereas Growel achieved 26%.
als and finished goods. Finally, many employees
are undertaking what-if analyses with the range
of available data, further improving planning and DIscUssION
execution across the supply chain. Primemover
has chosen to integrate related product lines, These cases illustrated Davenport’s conceptual
establish supply chain channels to match supply- framework (Figure 1) of how business benefits
and-demand streams, and resolve constraints are achieved from ES data transformation into
in its manufacturing network. The company ES knowledge highlighting the effectiveness of
recognizes that its process designs are not static enterprise systems in the two organizations. The
and that its business and enabling systems will overall business benefits including the financial
continue to evolve in line with market demands. results obtained in Growel’s case surpassed those
Ongoing achievements in cost reductions and of Primemover. The reasons attributed to this are
customer service improvements have enabled given in the following section.
Primemover to make continual improvements in Growel and Primemover both had a business
market position, premium pricing opportunities, strategy and had identified their business objec-
and financial return. tives however; the business strategy in Growel’s
case was clearly articulated and aligned. Growel
1242
The Impact of Enterprise Systems on Business Value
Growel Primemover
1.Product development time - Decreased to around three weeks 1.Product development time - Decreased to around two months compared
as compared to six months earlier; this closely matches industry to three months earlier; this closely matches industry benchmarks
benchmarks
2.On-time delivery - Increased to 98% on-time 2.On-time delivery - Increased to 85% on-time
3. Inventory - Reduced by 80% 3. Inventory - Reduced by 40%
4. Cost efficiency - Increased by 60% 4. Cost efficiency - Increased by 20%
5. Relationship management - Much improved relations with 5. Relationship management - Some improved relations with customers
customers and suppliers and suppliers
6. Human resources - Highly motivated 6. Human resources – Motivated
Growel Primemover
1.Total revenues - Increased by 47% 1.Total revenues - Increased by 24%
2.Exports - Increased by 76%; contributes 48% of total revenue 2.Exports - Increased by 15%; contributes 8% of total revenue
3. Profit before tax - Increased by 37% 3. Profit before tax - Increased by 15%
4. Profit after tax - Increased by 26% 4. Profit after tax - Increased by 9%
worked out their value creation process and identi- Growel. The quality of management reviews also
fied the critical areas that required attention and improved at Growel because executives became
improvement. They understood the key drivers much more reliant on numbers in explaining their
and had the means to influence those drivers and performance. Issues of data quality did not exist
measure them. Growel was able to translate their at Growel. Monitoring and updating of data was a
business strategy into departmental or divisional regular feature and the transaction data were made
strategies. They knew what was to be achieved, available in a timely fashion to support decision
which data needed analysis, its area of applica- making. In the case of Primemover, the lack of
tion, and expected outcomes. Primemover had discipline in updating transactions in the ware-
identified their key business objectives however, house led to data discrepancies and data integrity
the definition of information critical to the suc- issues amongst employees. Data extracts could
cess of the organization was lacking. Primemover not be made in time to support decision making.
could not create the link between departmental The analytical and decision-making process was
performance indicators and top-level metrics for based on ES data which were unclean and inac-
gauging the effectiveness of the company strategy. curate and the link between data, decisions, and
Managers had data from their ES investment but actions was lacking.
could not leverage it to maximize realization of Growel had streamlined their supply chain
benefits and achieve their business strategies. and achieved a major change in customer and
Growel understood the complexity of problems supplier behavior since Growel could react better
requiring analytic support. More complex issues, to change orders and was able to be more flexible
requiring sophisticated modeling and data analy- in the manufacturing environment. However, in
sis, are better served when analysts and decision the case of Primemover the online visibility of
makers are closely linked which was the case in demand and supplies with customers and suppliers
1243
The Impact of Enterprise Systems on Business Value
reduced the number of out-of-inventory events, but factor in this process. Success or failure is often
did not achieve the reduction and streamlining of attributed to enterprise systems or their implemen-
inventories anticipated. The lead times could not tation process. However, it is evident from this
be reduced substantially and delivery performance study that enterprise systems provide a platform
improved marginally. Their data management was of functionalities and information to an organiza-
inconsistent coupled with a lack of clarity on the tion. The ability of an organization to extract value
information required to drive their strategy which from data, distribute results from analysis, apply
were the reasons they could not achieve their full knowledge, and establish decisions for strategic
potential and anticipated objectives. organizational benefits will lead the path towards
business success which would eventually emerge
from the process of ongoing transformations over
cONcLUsION a period of time.
1244
The Impact of Enterprise Systems on Business Value
Davenport, T. H. (2000). Transforming the Prac- Markus, M., & Tanis, C. (2000). The Enterprise
tice of Management with Enterprise Systems. In Systems Experience - From Adoption to Success.
Mission Critical (p. 203-235). Boston: Harvard In R. W. Zmud (Ed.), In Framing the Domains of IT
Business School Press. Research Glimpsing the Future Through the Past
(pp. 173-207). Cincinnati: Pinnaflex Educational
Davenport, T. H., Harris, J. G., & Cantrell, S.
Resources, Cincinnati, USA.
(2002). The Return of Enterprise Systems: The
Director’s Cut: Accenture Institute for Strategic Newell, S., Huang, J. C., Galliers, R. D., & Pan,
Change. S. L. (2003). Implementing enterprise resource
planning and knowledge management systems
Davenport, T. H., & Prusak, L. (1998). Working
in tandem: fostering efficiency and innovation
Knowledge. Boston, Harvard Business School
complementarity. Information and Organization,
Press.
13, 25–52. doi:10.1016/S1471-7727(02)00007-6
Deloitte, C. (1998). ERP’s Second Wave-Maxi-
Shang, S., & Seddon, P. (2000, August 10-13).
mizing the Value of ERP-Enabled Processes. New
A Comprehensive Framework for Classifying
York: Deloitte Consulting, ISBN 1-892383-42-X.
the Benefits of ERP Systems. Paper presented
Donovan, M. (1998). There is no magic in ERP at the 6th America’s Conference on Information
software: It’s in preparation of the process and Systems, Long Beach, California.
people. Retrieved September 8, 2/7/2002, from
Yang, S., & Seddon, P. B. (2004). Benefits and
http://wwwrmdonovan.com/pdf/perfor_98_9.pdf
Key Success Factors from Enterprise Systems
Donovan, M. (2001). Successful ERP Implementa- Implementations: Lessons from Sapphire 2003.
tion the first time. Retrieved July 25, 2001, from Paper presented at the 35th Australasian Confer-
www.mdonovan.com/pdf/perfor8.pdf ence in Information Systems, Hobart, Australia.
Donovan, M. (2003). Why the Controversy over
ROI from ERP? from www.refresher.com/ar-
chives19.html KEy tErMs AND DEFINItIONs
Hedman, J., & Borell, A. (2002). The impact of Business Process Re-Engineering (BPR):
Enterprise Resource Planning Systems on Organi- Rethinking and redesign of business processes to
zational Effectiveness: An Artifact Evaluation. In achieve performance improvements in terms of
F. F.-H. Nah (Ed.), Enterprise Resource Planning overall cost, quality and service of the business
Solutions & Management (p. 125-142). Hershey, Conceptual Framework: A basic conceptual
London: IRM Press. structure built from a set of concepts to outline
Ittner, C. D., & Larcker, D. F. (2003). Coming Up possible courses of action or to present a preferred
Short on Nonfinancial Performance Measurement. approach to solve a complex research problem.
Harvard Business Review, 81(11), 88–95. Customer Relationship Management
(CRM): Software systems that help companies
Jarra, Y. F., Al-Mudimigh, A., & Zairi, M. (2000). to acquire knowledge about customers and deploy
ERP Implementation Critical Success Factors - strategic information systems to optimize revenue,
The Role and Impact of Business Process Manage- profitability and customer satisfaction
ment. IEEE & ICMIT, 02/2000, 122–127. Enterprise Resource Planning (ERP):
Software systems for business management that
integrates functional areas such as planning,
1245
The Impact of Enterprise Systems on Business Value
This work was previously published in Handbook of Research on Enterprise Systems, edited by Jatinder N. D. Gupta, Sushil
Sharma and Mohammad A. Rashid, pp. 119-133, copyright 2009 by Information Science Reference (an imprint of IGI Global).
1246
1247
Chapter 5.5
People-Oriented Enterprise
Information Systems
Giorgio Bruno
Politecnico di Torino, Italy
AbstrAct INtrODUctION
Current notations and languages do not emphasize Enterprise Information Systems (EISs) were first
the participation of users in business processes conceived as systems providing a repository for
and consider them essentially as service provid- business entities and enabling users (subdivided
ers. Moreover, they follow a centralized approach into appropriate roles) to handle such entities.
as all the interactions originate from or end in a Then the process-oriented approach (Dumas,
business process; direct interactions between us- van der Aalst, & ter Hofstede, 2005) has pointed
ers cannot be represented. What is missing from out that business purposes are achieved through
this approach is that human work is cooperative coordinated work to be carried out by means of
and cooperation takes place through structured two kinds of activities: user tasks and automatic
interactions called conversations; the notion of procedures. User tasks are units of work that users
conversation is at the center of the language/action carry out with the help of a graphical interface
perspective. However, the problem of effectively in order to achieve a particular purpose. Placing
integrating conversations and business processes a purchase requisition or filling in the review
is still open and this chapter proposes a notation form for a conference paper are examples of
called POBPN (People-Oriented Business Pro- user tasks. Automatic procedures, instead, ac-
cess Notation) and a perspective, referred to as complish their function without requiring any
conversation-oriented perspective, for its solution. human intervention.
Copyright © 2011, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
People-Oriented Enterprise Information Systems
However, as the activities are developed sepa- and the requester may withdraw the PR or submit
rately from the processes, current notations and a revised version. In the latter case, the approver
languages, such as BPMN (Object Management is expected to re-evaluate the revised version
Group, 2008), XPDL (Workflow Management Co- and to provide the final outcome (“accepted” or
alition, 2007), and BPEL (OASIS, 2007), consider “rejected”).
business processes essentially as orchestrators of If user tasks are abstracted away, a conversation
work, which accomplish this function by means of consists of a number of interactions organized in
interactions with external services; it makes little a control flow specifying their sequence. Interac-
difference if the interaction is directed to a user tions are defined in terms of three major attributes:
task or an automatic procedure. This approach, name (embodying the interaction meaning, for
referred to as orchestration-oriented perspective, example “request,” “acceptance,” or “rejection”),
makes the representation more homogeneous but direction (i.e., initiator-follower or follower-
at the expense of handling human activities as a initiator) and the business entity conveyed by the
special case of automatic procedures. If people interaction (such as a PR). If the business entities
are involved, they are considered as service pro- are left unspecified, what remains is the flow that
viders. Moreover, each interaction that logically characterizes a particular kind of conversation.
takes place between two users, say, A and B, This flow, referred to as conversation protocol, is a
such as A asking B for the approval of a certain template that can be specialized by providing the
request, is mediated by the process and therefore actual types of the business entities exchanged.
it results in two sequential actual interactions, the Several modeling approaches based on LAP
first between A and the process and the second have been proposed (a short survey is given in the
between the process and B. next section); however, they mainly focus on the
What is missing from the orchestration- nature of the underlying interactions and do not
oriented perspective is that, in most cases, hu- provide an adequate solution to the integration
man work is cooperative and therefore human of conversations and business processes. This
activities are not performed in isolation but in integration is a major purpose of this chapter,
structured frameworks referred to as conversa- which proposes a notation called POBPN (Peo-
tions (Winograd & Flores, 1986). Conversations ple-Oriented Business Process Notation) and a
are the basis of the language/action perspective perspective referred to as conversation-oriented
(Weigand, 2006), or LAP, which was proposed for perspective.
the design of information systems and business In POBPN, the top-level representation of a
processes. According to LAP, EISs are mainly business process clearly separates the contribution
tools for coordination. of the users involved (in terms of their roles) from
An example of conversation is the one govern- that of the automatic activities. The roles partici-
ing the approval of a purchase requisition (PR). pating in the process appear as building blocks and
It takes place between two users, denoted as their refinement (in second-level models) is given
requester and approver: the former is the initiator as a combination of the conversations they are
and the latter is the follower of the conversation. involved in. Such conversations are actualizations
The requester starts the conversation by sending of standard conversation protocols obtained by
a PR to the approver, who evaluates the PR and providing the actual types of the business entities
sends it back to the requester with three alternative exchanged during the interactions. These types
outcomes, that is, “accepted,” “rejected,” or “to be come from an information model that comple-
revised.” In the first two cases, the conversation ments the process model: this way the behavioral
ends, in the third one the conversation continues aspects embodied in a business process are inte-
1248
People-Oriented Enterprise Information Systems
grated with the informational aspects provided by In particular, BPMN provides building blocks
the companion information model. The automatic to represent the actual user tasks. Such building
activities are meant to support the conversations blocks can be placed in swim lanes associated
for which the process itself plays the initiator role with the roles needed; from an operational point
or the follower one; in the top-level representation of view, they enable the process to activate a user
of a business process, they are represented by a task, by sending it input information along with
specific building block, called System. the indication of the actual performer(s) required,
The RAD approach (Ould, 2005) is based on and then to wait for output information, which
interacting roles as well, but these roles encompass notifies the completion of the user task.
tasks and control flow activities, while, in POBPN, This approach, being an attempt at incorporat-
roles are based on conversations. An extension of ing user tasks in the process structure, does not
RAD towards LAP has been proposed (Beeson & cope with all the situations taking place in prac-
Green, 2003): the basic suggestion is to introduce tical applications. It only covers one interaction
a middle-level construct in roles, with the purpose pattern between a process and a user task, that
of grouping the tasks that are logically involved is, the one in which the user task receives one
in a conversation. input message (on its activation) and delivers one
This chapter is organized as follows. Section output message (on its completion); this pattern
2 discusses the major limitations of the orchestra- is referred to as (1, 1). There are three more task
tion-oriented perspective and reports on current interaction patterns, as follows.
research on conversations. Section 3 introduces Pattern (1, *) indicates that the task sends a
conversation protocols, whereas sections 4 and number of intermediate output messages before the
5 illustrate the proposed notation, POBPN, with completion one. These additional output messages
the help of an example. Section 6 focuses on the signify that the task has produced information
differences between the conversation-oriented items requiring immediate attention. For example,
perspective and the orchestration-oriented one. task “reviewPapers” is started on the arrival of
Section 7 presents the conclusion and the future a folder of papers to be reviewed and allows the
work. reviewer to release the reviews one by one.
Pattern (*, 1) indicates that the task may receive
additional input messages, after its activation. For
bAcKGrOUND example, task “assignPapers” is activated with an
initial group of papers and then it may receive
Business processes can be addressed with dif- additional papers, before its completion.
ferent orchestration-oriented notations, such as The fourth pattern (*, *) denotes both a flow
BPMN (Object Management Group, 2008) and of input messages and a flow of output ones. For
UML activity diagrams (Object Management example, task “evaluatePapers” receives a flow of
Group, 2007); however, they all have a number of reviews and provides a flow of papers evaluated,
features in common, as follows. They place great each of which will trigger an immediate notifica-
emphasis on the control flow of business processes, tion to its author.
under the pressure of research on workflow pat- To overcome the above-mentioned limitations,
terns (van der Aalst, ter Hofstede, Kiepuszewski, the process, instead of incorporating the user
& Barros, 2003); in contrast, they overlook the tasks in its control flow, should emphasize the
information flow (although information items can underlying interactions taking place with them.
be included for documentation purposes) and tend The notion of interaction is important because
to incorporate user tasks as execution steps in the it leads to a clear separation between processes and
process structures.
1249
People-Oriented Enterprise Information Systems
user tasks; however, interactions are part of larger control-flow logic handling their ordering. In the
structures encompassing all those exchanged be- hierarchical structure provided by DEMO, tasks
tween two parties for a common purpose. At this are compared to atoms, transactions to molecules,
point, the notion of conversation comes into play. and business processes to fibers (Dietz, 2003).
Winograd and Flores (1986) introduced the Transactional roles might not have a one-to-one
term “conversation for action” to indicate the mapping to organizational roles, because the
kind of conversation aimed at producing an ef- tasks included in a transactional role might be
fect on the real world through the cooperation of assigned to different organizational roles: this is
two parties. Taking advantage of the theory of needed to support delegation (i.e., the situation in
speech acts (Austin, 1976), which studies how which the actor who receives the order is not the
people act through language, they proposed a one who delivers the result) but could make the
novel perspective, referred to as language/action model more difficult to understand.
perspective (LAP), for the design of information BAT (Goldkuhl & Lind, 2004) draws upon
systems and business processes. According to the ideas of Action Workflow and DEMO and
LAP (Weigand, 2006), information systems are addresses business interactions in an inter-organi-
mainly tools for coordination. Conversations may zational framework. In particular, it analyzes the
be carried out for different purposes: Winograd relationships between a supplier and a customer
(1987) mentions conversations for clarification, in a number of situations including single busi-
for possibilities and for orientation in addition to ness transactions and frame contracting (with
conversations for action. embedded transactions).
Several modeling approaches based on LAP Although the above-mentioned LAP approach-
have been proposed, among which stand out Ac- es yield a deeper understanding of the nature of
tion Workflow, DEMO, and BAT. interactions, they do not provide an operational
In the Action Workflow approach (Medina- solution to the integration between business
Mora, Winograd, Flores, & Flores, 1992), a typical processes and user tasks through conversations.
conversation takes place between a requester and This integration is pursued by the conversation-
a performer and is made up of four major phases, oriented perspective illustrated in the next sections
that is, request, commitment, performance, and along with the related notation, POBPN.
evaluation, forming the so-called workflow loop.
The first two phases establish a commitment be-
tween the parties and the last two phases bring cONVErsAtION PrOtOcOLs
the parties to an agreement on the result. The
actual workflow might be complicated because This section illustrates the notion of conversa-
negotiations can be made in each phase. tion protocol and shows the notation adopted in
In the DEMO approach (Dietz, 2006), work- POBPN, with the help of a number of examples
flow loops are subdivided in three phases, that to be reused in the next sections.
is, order, execution, and result, and are encap- A conversation implies a flow of interactions
sulated in transactions. Business processes are between the parties, an interaction being the com-
compositions of roles and transactions, where munication of one party’s intention to the other
transactions connect two transactional roles. party. Intentions can be categorized and identi-
Transactional roles are compound entities includ- fied by specific symbols, as illustrated later on in
ing transactional tasks (i.e., the tasks being part this section. Examples of intentions are making
of the transactions the role is involved in) and the a request, accepting a request, and providing a
1250
People-Oriented Enterprise Information Systems
alt r+, T r, T1
n, T
r-, T alt
r-, T1
r~, T NotificationCP
rep, T2
alt -r, T
opt
opt ~r, T
~r, T ~rep, T2
alt r+, T r~, T
rep~, T2 alt
r-, T n, T
reply. An interaction conveys the business entity interactions, while providing a simple hierarchi-
that is the object of the intention. This business cal structuring mechanism based on fragments.
entity is referred to as the business content of the Four examples of protocols are shown in Figure 1.
interaction. As a general rule, the lifelines of the two ac-
Conversations can be categorized on the basis tors involved in the conversation are not shown;
of their purpose: for example, there are conversa- however, the initiator is meant to be located on
tions for approval and conversations for action. If the left side of the diagram and the follower on the
the details of the business content are ignored, all right side. The first interaction of a conversation
the conversations with the same purpose turn out is called initial interaction and the business entity
to have the same interaction flow, and the structure that it conveys is referred to as initial business
of this flow, called conversation protocol, is the entity. Timing constraints are not considered so
major concern of this section. as to keep the examples reasonably simple.
A conversation protocol is an abstraction as it is The first protocol in Figure 1 addresses con-
defined independently of the types of the business versations for approval and is called “Approval
entities exchanged by the parties; it is a template conversation protocol” (ApprovalCP in short).
in which such types are given generic names. These conversations start with a request, indicated
When a protocol is actualized, generic types will by symbol “r”; the business content, that is, the
be replaced with actual types: as will be shown in entity for which the approval is asked, is denoted
the next section, an actualized protocol relies on by a generic type, such as “T.” The follower can
an information model providing the definition of accept the request (r+), reject it (r-), or ask for
the types of the business entities involved. some improvement (r~). The three alternatives are
State models are often used (Winograd, 1987) enclosed in a fragment marked with keyword “alt.”
to define conversation protocols graphically; PO- In the first two cases, the conversation is ended; in
BPN, instead, adopts UML sequence diagrams the third one, the initiator can then withdraw the
(Object Management Group, 2007), because request (-r) thus ending the conversation or he or
they focus on the essential elements, that is, the she can submit a revised version (~r), which will be
followed by an acceptance (r+) or a rejection (r-).
1251
People-Oriented Enterprise Information Systems
There is only one generic type involved, that worked on in this section and in the following
is T, because the business entities exchanged ones. The process is referred to as PRBP and its
during this kind of conversation are meant to be requirements are as follows.
all of the same type. PRs are submitted by users entitled to do so;
Protocol BasicCfACP defines simple conver- such users play the Requester role with respect
sations for action. As in the first example, the to process PRBP. When a PR is submitted, it
conversation is started with a request (r) coming may be automatically approved or it may be sent
from the initiator. The follower may reject the for evaluation to the appropriate supervisor. The
request (r-) or may provide a reply. The interaction first case occurs when the amount of the PR is
conveying the reply is indicated with a specific less than the personal expenditure threshold as-
keyword, “rep.” It is accompanied by a different sociated with the requester; in this case, the PR
business entity, denoted by generic type T2, be- is considered to be an “inexpensive” one. When
cause the purpose of a conversation for action is the second case occurs, the (expensive) PR is di-
to make the follower deliver a new entity as the rected to the requester’s boss (who becomes the
result of the action caused by the initiator’s request. supervisor involved). The requester is informed of
Upon receiving the reply, the initiator may then the result (acceptance or rejection). The supervi-
ask for a clarification (~rep) to be followed by a sor may also ask for some improvement and the
clarification (rep~) after which the conversation requester may provide a revised version of the PR
is ended. The sequence of interactions ~rep and or may withdraw it.
rep~ is optional and, therefore, it is enclosed in a The PRs approved are sent to the purchasing
fragment marked with keyword “opt”. department where they are handled by a number
The protocol of conversations for action can of equivalent buyers. Buyers are assumed to pick
become more complicated (Winograd, 1987), if pending PRs from a common queue and to include
counter-offers are included. them in purchase orders. In case a buyer has
Protocol NotificationCP consists of one in- some doubts, he or she can ask the PR requester
teraction (n), interpreted as a notification (i.e., a to make the necessary clarification; when a buyer
simple communication requiring no reply). has included the PR in a purchase order, he or she
Protocol NotificationCP1 ends with a notifi- sends a confirmation to the PR requester.
cation, which may be preceded by an optional Sometimes supervisors may ask one or more
sequence consisting of a request for clarification reviewers to provide third-party reviews of PRs
(~r) followed by a clarification (r~). considered to be critical. How this is done can be
subjected to different rules: in this case study, the
conversation related to a single review is expected
PEOPLE-OrIENtED bUsINEss to conform to conversation protocol BasicCfACP
PrOcEssEs shown in Figure 1. In addition, if a supervisor
has started a review conversation for a certain
As mentioned in the introduction, the conversa- PR, he or she must wait for its conclusion before
tion-oriented perspective places great emphasis starting a new review conversation or taking the
on the participation of users in business processes, final decision, for the same PR.
and the notation proposed, POBPN, aims at provid- The analysis of the requirements above leads
ing an effective integration between conversations to the discovery that five roles are involved. Four
and business processes. To clarify the features of them are user roles: Requester, Supervisor,
of POBPN, an example concerning a business Reviewer, and Buyer. The fifth role involved,
process handling purchase requisitions (PRs) is the System role, is responsible for all the activi-
1252
People-Oriented Enterprise Information Systems
ties to be performed automatically (such as the be illustrated later on in this section), and they can
approval of inexpensive PRs). These roles take be adequately expressed only if an information
part in several conversations, as follows. For the model is provided.
approval of a PR, its requester interacts with either The companion information model for pro-
his/her supervisor or the System; to get support cess PRBP is shown in Figure 2 as a UML class
for a critical PR, a supervisor may interact with model (Object Management Group, 2007). Only
a number of reviewers; when processing a PR, the major items are considered, for the sake of
a buyer interacts with the PR requester (at least simplicity.
to notify him/her that the PR has been included Users are represented by classes marked with
in a purchase order). In addition, since approved stereotype <<role>>. Such classes are not meant
PRs need to be processed by the purchasing to be the actual ones, because the decision on
department, notifications are sent by the System how to represent users in the information system
to the buyers. is postponed to the software development phase;
The above-mentioned four conversations fit they can be considered as interfaces to the actual
the patterns presented in the previous section; classes.
however, it is necessary to indicate which busi- The relationship between role Requester and
ness entities are involved. An information model role Supervisor is a consequence of the require-
is then needed, which defines the business entity ment that an expensive PR has to be approved by
types along with their most relevant attributes the requester’s boss who acts as the supervisor
and relationships. This information model is the for the PR. Associative attribute “boss” enables
companion of the process model for two major the navigation from a requester entity to the cor-
reasons: firstly, the actualization of conversation responding supervisor entity.
protocols into actual conversation types is car- A PR is related to one requester entity (which
ried out by replacing the generic types used in can be reached through associative attribute
the protocols with the actual types provided in requester) and possibly to one buyer entity (only
the information model. Secondly, in the process in case the PR has been approved). A PR may
model there are a number of data-driven aspects, also be linked to one purchase order (in case it
such as the selection of a conversation follower (to has been approved), to a number of reviewers, as
*
0..1 + 1 *
POrder PR Review
pr
* * *
1
<<role>> * <<role>>
Buyer 0..1 Reviewer
reviewers
Attributes
PR: float amount. Requester: float threshold.
1253
People-Oriented Enterprise Information Systems
well as to a number of reviews. Purchase Orders The approach adopted in POBPN is to repre-
are represented by class POrder. sent participating roles as the top-level building
A review is linked to the reviewer entity blocks (referred to as role participations or simply
representing the reviewer who has provided it. participations) of the process diagram and to show
Associative attribute “pr” provides the PR as- the conversations involved as ports, depicted as
sociated with a given review. small squares on the participation icons. Each
Relationships PR-Review and PR-Reviewer conversation gives rise to two ports, one in the
are both needed in that a reviewer could refuse to initiator role (referred to as initiator port) and the
provide the review he or she has been asked for. other in the follower role (follower port). Such ports
Associative attribute “reviewers” provides the list are given identical names but different colors;
of Reviewer entities associated with a given PR. initiator ports are white, while follower ones are
Two relevant attributes are also shown in Figure grey. Ports are connected through labeled links,
2, because they are mentioned in the requirements whose details are shown in the Links section.
of PRPB: they are the amount attribute in PR enti- The port names are names of conversation types.
ties and the threshold (for expenditure) attribute Section “Conversation types” declares con-
in Requester entities. versation type “a” to be based on conversation
On the basis of the analysis made so far, the protocol ApprovalCP with generic type T replaced
model of process PRBP can be worked out. Its top- with entity type PR, while conversation types
level portion is presented in Figure 3 and consists “b,” “c,” and “v” are actualizations of protocols
of three parts: the process diagram, the section NotificationCP, Notification1CP and BasicCfACP,
defining conversation types and the one (Links) respectively.
showing how the followers of the conversations Section “Links” contains a number of link
will be determined. definitions, whose purpose is to show how the
l1 l3
a a Supervisor v v Reviewer
l2
Requester a System b
l4
l5
c c Buyer b
Links:
l1 (PR pr): [pr.amount > pr.requester.threshold] pr.requester.boss.
l2 (PR pr): [pr.amount <= pr.requester.threshold].
l3 (PR pr): pr.reviewers.last(). l5: (PR pr): pr.requester.
1254
People-Oriented Enterprise Information Systems
followers of the corresponding conversations are needed. In general, when the follower clause is
determined. missing and the follower role is a user role, such
A link definition consists of four elements: as Buyer in link l4, the assignment of a particular
name, formal parameter, guard (included between follower will take place at run-time; it is up to
square brackets), and follower clause. The formal the members of the role to decide which of them
parameter refers to the initial business entity, that will follow a new conversation, as it happens with
is, the entity conveyed by the initial interaction. buyers who autonomously pick pending PRs from
In all the definitions shown, the initial business a common pool. In general, the selection of the
entity is a purchase requisition (whose type is PR) performer is a critical issue and several patterns
and the formal parameter introduces the name, have been proposed (Russell, van der Aalst, ter
that is, pr, used (in the guard and in the follower Hofstede, & Edmond, 2005).
clause of the link definitions) to refer to this entity. The follower clause in link l3 specifies that
A conversation of type “a” is initiated by a the reviewer to be involved is the last added to
requester and may be followed by a supervisor the collection of reviewers associated with the PR
or by the System. There are two links in compe- that started the conversation. Link l5 indicates that
tition, l1 and l2, because they have the initiator the follower is the requester of the current PR.
port in common: the choice is made on the basis Process diagrams are mainly architectural
of their guards. models, as they show the roles participating
The guard of l1, “pr.amount > pr.requester. in the process and the conversations that may
threshold,” consist of two terms, “pr.amount” take place between them. Participation building
and “pr.requester.threshold.” The evaluation of blocks can be refined into second-level models,
the first term returns the amount of the current called participation models, and the next section
PR, and the evaluation of the second one gives is dedicated to their illustration.
the personal expenditure threshold of the PR
requester: if the guard is true, the follower will
be the requester’s boss. PArtIcIPAtION MODELs
In most cases, the follower of a conversation is
represented by a business entity related, through a Participation models define the involvement of the
certain path of associations, to the initial business users (identified by their roles) or the contribu-
entity: then, the follower clause is needed and it tion of the System, in the business process being
consists of a navigational expression indicating considered. Those related to users are called user
how to reach the follower business entity from the participation models and fulfill two major aims:
initial one. Two associative attributes are involved firstly, by looking at them, users get an insight
in the follower clause of l1, that is, requester and into the overall sequence of interactions they will
boss: in the information model shown in Figure be involved in; secondly, they are the basis of the
2, they determine a path from a PR to a Supervi- implementation of the actual user tasks.
sor entity. The System participation model (there is at
In the definition of link l2, the follower clause most one in a business process) is mainly meant
is missing, because the follower role is System: to handle the automatic activities.
when the guard of l2 is true, the conversation is Both types of models are described in this
followed by automatic activities and no supervi- section and the examples given refer to process
sor is involved. PRBP: its user participation models are shown
The definition of link l4 is missing because in Figure 4.
both the guard and the follower clause are not
1255
People-Oriented Enterprise Information Systems
Basically, user participation models are com- participation model. According to the PRBP
binations of conversations. For this reason, their requirements presented in the previous section, a
structure is like the one of conversation protocols supervisor, during conversation “a,” and precisely
with interactions replaced by references to con- after receiving a new PR or a revised one, may
versation types. Such references are placed in carry out a number of sequential conversations
constructs similar to the “InteractionUse” items “v.” What is needed is the possibility of including
available in UML sequence diagrams (Object a number of conversations “v” into a conversation
Management Group, 2007); however, in POBPN “a.” The original conversations are not modified,
they are called “ConversationUse” items, since but they are combined so as to define the overall
their meaning is different. In these items, the con- behavior of the role. POBPN supports the nesting
versation type name appears in a small rectangle of ConversationUse items, as follows. Conversa-
at the upper left corner: the rectangle is white or tionUse items are not black boxes, but they can
grey depending on whether the current role is the include one or more extensions. An extension is
initiator or the follower, respectively. a partition made up of two parts: the first part
The Reviewer participation model is based only shows the interaction(s) preceding the extension
on conversation “v,” and reviewers are followers (referred to as extension points), and the second
of such conversations. part contains the conversations (represented by
The Buyer participation model is a simple their ConversationUse items) to be carried out
sequence of conversations “b” and “c”; buyers before resuming the enclosing conversation. If
are followers of conversations “b” and initiators the enclosed conversations are subjected to con-
of conversations “c.” straints, they are placed in appropriate fragments.
The Requester participation model is based on The Supervisor participation model extends con-
conversation “a,” which, if it ends successfully versation “a”: the extension points are interactions
(i.e., if it ends with r+), is followed by conversa- “r” or “~r” (referring to the receipt of a new PR or
tion “c.” In the optional fragment, operator opt of a revised one, respectively), which are followed
is followed by an informal expression describing by a loop fragment including conversation “v.”
when conversation “c” is carried out. The loop operator introduces a sequence (possibly
An important feature of user participation empty) of conversations “v.”
models is the ability of structuring conversa- The System participation model addresses
tions hierarchically, as shown in the Supervisor those conversations for which the process itself
v b a a
r, ~r
c opt:
a ended with r+ loop
v
c
1256
People-Oriented Enterprise Information Systems
PR PR
a.r Supervisor.a.r+
p1 p2
t1 t2
a.r+ b.n b.n
plays the initiator role or the follower one. In PRBP defined in the companion information model of
there are two such conversations: the process is the process being considered; the one related to
the follower of conversations “a” for inexpensive process PRBP is shown in Figure 2. This solution
PRs and the initiator of conversations “b.” The eliminates the need for complex data patterns
related interactions must be dealt with by means (Russell, ter Hofstede, Edmond, & van der Aalst,
of automatic activities and, moreover, control-flow 2005) as all the data needed are associated with
logic is needed to enforce ordering constraints the tokens: the information flow is integrated with
between the activities. the control flow.
The notation used in System participation Places may have input arcs and output ones:
models is different from the one adopted in user the input arcs of a place come from its input
participation models and follows an orchestration- transitions and the output ones are directed to its
oriented perspective. output transitions. Transitions have input arcs and
The orchestration-oriented notation used in output ones, as well: the input arcs of a transition
POBPN is an extension of colored Petri nets come from its input places and the output ones
(Kristensen, Christensen, & Jensen, 1998) and are directed to its output places.
is called “interaction nets” to emphasize that its Tokens are added to places by their input transi-
major purpose is to handle interactions, on which tions and are removed by their output transitions;
orchestrations are based. they can also be added by followed interactions
This article does not provide a formal defini- as described later on in this section.
tion of interaction nets; instead, it provides two Transitions are the automatic activities per-
examples, the first of which, shown in Figure 5, formed by the process; they are token-driven as
defines the System participation model in process they are activated when the proper tokens are
PRBP. The second example is given in the next available in their input places. The basic rule is that
section. a transition fires as soon as there is one token in
Interaction nets are made up of places, transi- each of its input places. When it fires, a transition
tions, arcs and interaction symbols. takes the input tokens (i.e., it removes the activat-
Places are containers of tokens, which refer to ing tokens from the corresponding input places),
business entities, such as PRs or reviews. They performs an action (which can operate on the
have a name and a label (or place type): the former business entities referred to by the input tokens),
is written in the circle representing the place and and delivers the appropriate (output) tokens to its
the latter outside the circle and close to it. The output places. When there is a correspondence
label is the name of the type of the business enti- between the types of the input places and those of
ties that are referred to by the tokens contained the output places, tokens are simply moved from
in the place. The business entity types are those the input places to the output ones: this behavior
1257
People-Oriented Enterprise Information Systems
is referred to as automatic propagation rule. In the place p1 whose type, PR, coincides with the type
other cases, the output tokens must be generated of the incoming business entity. Transition t1 is
in the action. then triggered and its action consists in performing
The behavior of transitions can be comple- two interactions, “a.r+” and “b.n.” On the basis
mented by a textual description that is made up of of the automatic propagation rule, the business
two sections, that is, the selection rule (introduced entity taken from place p1 is sent through output
by keyword “s”) and the action (introduced by interactions “a.r+” and “b.n,” without the need of
keyword “a”). These sections may include opera- writing any code in the action of t1. The recipient
tional code, but the examples shown only include of interaction “a.r+” is the one that started con-
informal descriptions, for the sake of simplicity. versation “a,” whereas the recipient of interaction
If a transition is provided with a suitable selec- “b.n” is determined by link l4 shown in Figure
tion rule, it can take a variable number of tokens 3, because this interaction is the initial one of a
from its input places and the selection can be based conversation “b.”
on the contents of the business entities linked to Monitored interactions are those interactions
the tokens. If the selection rule is omitted, the the process has to be aware of so as to take ap-
basic rule is applied. propriate actions, although it is not their follower.
Interaction symbols are depicted as labeled They are shown dashed and their labels include the
arcs, which may be either input arcs of places or initiator role before the conversation type name
output arcs of transitions. They represent ordinary and the interaction name. One such interaction
interactions or monitored ones. appears in the right part of Figure 5: its purpose
Ordinary interactions are those in which the is to enable the activation of conversation “b”
process is directly involved and may be divided when conversation “a” for an expensive PR ends
into followed interactions and initiated ones. Their successfully. Conversations “a” for expensive
labels, such as “a.r,” consist of the name of a con- PRs are handled by supervisors, but they are not
versation type and an interaction name separated supposed to decide what has to be done after the
by a dot. The conversation types correspond to successful approvals of PRs. It is up to the process
the names of the ports that appear in the System to trigger the subsequent processing of approved
block in the process diagram. PRs; therefore, it must be informed of the suc-
Followed interactions are depicted as input cessful conclusion of a conversation “a” so as to
arcs of places, because the effect of a followed start a conversation “b” with the buyers—these
interaction is to add a new token (referring to two conversations operate on the same PR.
the business entity conveyed by the interaction) Monitored interactions can only provide to-
to its output place. Initiated interactions are de- kens to the process in that they are used to trigger
picted as output arcs of transitions: when a token complementary behavior.
flows along such an arc (this occurs by virtue of
the automatic propagation rule or by an explicit
command issued in the input transition) the cor- cOMPArIsON OF NOtAtIONs
responding interaction is started and the follower
is determined on the basis of the links defined in The aim of this section is to provide a comparison
the top-level process model. between the notations used in the conversation-
Ordinary interactions appear in the left part of oriented perspective and in the orchestration-
Figure 5. When an inexpensive PR is submitted oriented one.
by a requester, interaction “a.r” is performed and In the former approach, the emphasis is placed
its effect is to add a token (referring to the PR) to on the conversations between users and on how
1258
People-Oriented Enterprise Information Systems
v.rep
a.r+
b.n
c.n
they are organized in participations: the explicit cess starts a conversation between R and S in
contribution of the process is restricted to the conformity to link l1, and the initial interaction
definition of the automatic activities, as shown takes place. Its label, “a.r,” is the name of a con-
in Figure 5 for process PRBP. versational interaction, as the interaction name is
In the orchestration-oriented perspective, preceded by the name of the conversation type
processes are thought of as explicit orchestrators the interaction belongs to.
of all the activities, both the automatic ones and In the participation model of the supervisor
the user tasks. Conversations are not a first-class shown in Figure 4, interaction “a.r” is an exten-
notion of the approach; therefore, the process has sion point that can be followed by a number of
to make up for the lack of conversation-oriented conversations “v” with reviewers. In the scenario
constructs by directly handling the corresponding above, supervisor S asks reviewer V to provide
flow of interactions. a review of the PR and this leads to the pairs
Conversation-oriented notations provide a of interactions “v.r” and “v.rep” shown in the
higher-level representation than orchestration- sequence diagram. Then the PR is approved by
oriented ones and the difference between them supervisor S resulting in interaction “a.r+.” This
can be easily recognized on the basis of a simple interaction is a monitored one as indicated in the
scenario, as follows. The scenario refers to a par- System participation model shown in Figure 5,
ticular occurrence of process PRBP involving four and therefore it triggers interaction “b.n” between
users: requester R, his/her supervisor S, reviewer the System and buyer B. The dashed arc con-
V and buyer B. Requester R submits an expensive necting interaction “a.r+” and interaction “b.n”
PR, which is sent to S for evaluation. S asks the emphasizes that “a.r+” is a monitored interaction
support of V and then approves the PR. Buyer B and “b.n” is a consequence. Buyer B is supposed
receives the PR from the process and then notifies not to need any additional clarification from the
R of its inclusion in a purchase order. requester and therefore the scenario ends in no-
On the basis of the scenario proposed, process tification “c.n” sent by B to requester R.
PRBP shown in Figure 3 gives rise to a number With an interaction-oriented notation, the
of interactions that are graphically represented sequence diagram for the same scenario becomes
in the sequence diagram presented in Figure 6. more complicated, because interactions between
The interaction flow develops as follows. When users (from an initiator to a follower) are mapped
requester R submits an expensive PR, the pro- to pairs of sequential interactions involving the
1259
People-Oriented Enterprise Information Systems
(S)v_r a_r(S)
v_r(V)
(V)v_rep
v_rep(S)
(S)a_r+
a_r+(R)
b_n(B)
(B)c_n
c_n(R)
process: the first interaction takes place between an example, the orchestration-oriented version
the initiator and the process, the second one be- of process PRBP is shown in Figure 8. It is the
tween the process and the follower. second example based on the interaction nets
The orchestration-oriented sequence diagram introduced in the previous section, and includes
related to the scenario proposed is shown in the description of a number of transitions.
Figure 7. To reduce the complexity of the model, a
For example, interaction “a.r” from requester number of notational simplifications have been
R to supervisor S is mapped to interaction “(R) introduced, as follows.
a_r” from R to the process, and to interaction If there are two transitions in series (Murata,
“a_r (S)” from the process to S. The name of the 1989), the intermediate place (together with its
interaction is obtained from that of the correspond- input arc and its output one) can be replaced with
ing conversational interaction by replacing the a link that directly connects the two transitions
dot operator with character “_”. In addition, in a and is labeled with the name and type of the place
user-process interaction, the initiator is indicated eliminated. Examples of such links are the one
between parentheses before the interaction name, connecting transitions tb1 and tb2 and the one
whereas, in a process-user interaction, the fol- connecting tv1 and tv2.
lower is indicated between parentheses after the If a place receives tokens only from a followed
interaction name. The labels of the process-user interaction and it is connected only to one transi-
interactions are shown on the right of the System tion, then it can be eliminated and the followed
lifeline, while those of the user-process interac- interaction can be directly connected to the transi-
tions are shown above the corresponding lines. tion: this simplification is carried out with several
The notion of monitored interaction is not transitions, for example, tb1 and tb2.
needed, as the process is an explicit orchestrator The third kind of simplification makes use of
of all the interactions. ε-arcs: an ε-arc links two places of the same type
A business process defined with an interaction- and its effect is that the tokens included in the
oriented notation corresponds to a POBPN process source place also belong to the destination place
that only includes the System participation model, and can trigger its output transitions (the vice
as all the interactions between users are mapped versa does not hold); if two places, say p1 and p2,
to pairs of interactions involving the process. As are the source and the destination, respectively,
of an ε-arc, p1 is said to be joined to p2.
1260
People-Oriented Enterprise Information Systems
The interaction labels shown in Figure 8 follow Place ps1 has two outgoing flows. The one
the same convention adopted in Figure 7. on the left handles the case in which the super-
The meaning of the model shown in Figure 8 visor requests some modifications to the PR:
is as follows. Submitted PRs enter place p1 and then ts2 fires and puts the PR in place ps4 until
then trigger either transition ts1 or transition t1 the requester makes his/her move, which can be
depending on which selection rule is satisfied. The the withdrawal of the PR or the submission of a
incoming PR is associated with the input token revised version: these moves cause ts3 or ts4 to
taken from place p1 and the selection rules and fire, respectively. The firing of ts4 puts the PR in
the actions of transitions ts1 and t1 use the place place ps2, where the left path ends. The left path
name (i.e., p1) to refer to this PR. is optional, because ps1 is joined to ps2 and ps2 is
Transition ts1 fires in case of an expensive PR, joined to both ps3 and pv1. Therefore the super-
as shown in its selection rule: its action consists visor may immediately approve or reject the PR
in initiating interaction “a_r (S)” with the proper (from place ps3) or ask for external support (from
supervisor. The follower-selection rules, which in place pv1). If the supervisor accepts or rejects the
POBPN are presented in section “Links” of the PR, ts6 or ts5 will fire, respectively; the firing of
top-level process model, with this notation, must ts6 puts the PR in place p2 where the interaction
be embedded in transitions. Primitive “set” is used flow involving the buyer starts.
to establish the follower of an initiated interaction. The path starting at place pv1 handles the in-
In the action of ts1, the boss of the requester of teractions with the reviewers. Transition tv1 fires
the input PR is set as “S”, because S denotes the if the supervisor requests a reviewer’s support and
follower of interaction “a_r”. initiates interaction “v_r” with the reviewer; the
Transition ts1 puts the PR into place ps1 indi- reviewer is the one represented by the last reviewer
cating that the PR is waiting for the supervisor’s entity added to the PR, as shown in the action of
move. tv1. The PR is then put in the intermediate place
1261
People-Oriented Enterprise Information Systems
included in the link between transition tv1 and oriented one. The former is a centralized approach
transition tv2 (connected in series) and waits for in which all the interactions are explicitly medi-
the arrival of the corresponding review. When ated by the process. If a user looks at a process
this happens, tv2 fires: it relays the review to the description, he or she cannot immediately identify
supervisor (i.e., the boss of the PR requester, as the interactions he or she will be involved in, as
indicated in the action) and puts the PR in place all user activities are intermingled. In the ap-
pv3. Place pv3 is joined to place ps3 and place proach proposed, instead, conversation models
pv1, as the supervisor, at this point, may issue come first (from the actualization of standard
the final decision or ask for another review. In conversation protocols) and the process model is
addition, the supervisor may ask the reviewer built upon them. The explicit contribution of the
for some clarification: for this reason, place pv3 process is restricted to those conversations for
is also followed by transition tv3, which relays which the process itself plays the initiator role
the clarification request to the reviewer. The path or the follower one.
goes on with transition tv4, which is triggered by Current work is going on in two directions.
the reply from the reviewer and relays it to the One line of research is concerned with the inclu-
supervisor; the PR is then put in place pv5 joined sion of inter-organizational conversations. For
to places ps3 and pv1. this reason, the similarities between conversation
Place p2 starts the interaction flow with a protocols and B2B collaborations or choreogra-
buyer. Transition t2 is meant to assign the PR to phies need to be thoroughly analyzed.
a buyer. The PR is then put in place pb1, which The other line of research is more pragmatic
has two outgoing paths. The path on the left is and addresses the automatic mapping of POBPN
optional: it enables the buyer to ask some clari- models to orchestration-oriented ones; the pur-
fication of the requester and ends in place pb3 to pose is to take advantage of current technology
which place pb1 is joined. Transition tb3 waits while preserving the conceptual strength of the
for the confirmation from the buyer and relays it conversation-oriented perspective.
to the requester.
rEFErENcEs
cONcLUsION
Austin, J. L. (1976). How to do things with words.
This article has proposed a notation, POBPN, and Oxford, UK: Oxford University Press.
a conversation-oriented perspective to effectively
Beeson, I., & Green, S. (2003, April 9-11). Using
integrate conversations and business processes in
a language action framework to extend organiza-
an intra-organizational context. The involvement
tional process modelling. Paper presented at the
of users in business processes is clearly shown
UK Academy for Information Systems Confer-
by means of participation building blocks appear-
ence, University of Warwick.
ing in the top-level representation of a business
process. Such participation items can be refined Dietz, J. L. G. (2003). The atoms, molecules
into second-level models which are basically and fibers of organizations. Data & Knowledge
combinations of conversation models. Engineering, 47(3), 301–325. doi:10.1016/S0169-
An example has been presented in order to 023X(03)00062-4
stress the differences between the orchestration-
oriented perspective (followed by most of current
notations and languages) and the conversation-
1262
People-Oriented Enterprise Information Systems
Dietz, J. L. G. (2006). The deep structure of busi- Object Management Group. (2007). Unified mod-
ness processes. Communications of the ACM, eling language: Superstructure, V.2.1.1. Retrieved
49(5), 59–64. doi:10.1145/1125944.1125976 September 29, 2008, from http://www.omg.org/
docs/formal/07-02-03.pdf
Dumas, M., van der Aalst, W. M. P., & ter Hofst-
ede, A. H. M. (2005). Process-aware information Object Management Group. (2008). Business
systems: Bridging people and software through process modeling notation, V.1.1. Retrieved
process technology. New York: John Wiley & September 29, 2008, from http://www.bpmn.org
Sons.
Ould, M. (2005). Business process management:
Goldkuhl, G., & Lind, M. (2004). The generics A rigorous approach. Swindon, UK: The British
of business interaction - emphasizing dynamic Computer Society.
features through the BAT model. In M. Aakhus
Russell, N., ter Hofstede, A. H. M., Edmond, D.,
& M. Lind (Eds.), Proceedings of the 9th Con-
& van der Aalst, W. M. P. (2005). Workflow data
ference on the Language-Action Perspective on
patterns: Identification, representation and tool
Communication Modelling (LAP 2004) (pp. 1-26).
support. In L. Delcambre (Ed.), Lecture Notes
New Brunswick, NJ: Rutgers University.
in Computer Science, 3716 (pp. 353-368). Berlin,
Kristensen, L. M., Christensen, S., & Jensen, K. Germany: Springer.
(1998). The practitioner’s guide to coloured Petri
Russell, N., van der Aalst, W. M. P., ter Hofstede, A.
nets. International Journal on Software Tools
H. M., & Edmond, D. (2005). Workflow resource
for Technology Transfer, 2, 98–132. doi:10.1007/
patterns: Identification, representation and tool
s100090050021
support. In O. Pastor & J. Falcão e Cunha (Eds.),
Medina-Mora, R., Winograd, T., Flores, R., & Lecture Notes in Computer Science, 3520 (pp.
Flores, F. (1992, November 1-4). The action work- 216-232). Berlin, Germany: Springer.
flow approach to workflow management technol-
van der Aalst, W. M. P., ter Hofstede, A. H. M.,
ogy. In J. Turner & R. Kraut (Eds.), Proceedings
Kiepuszewski, B., & Barros, A. P. (2003). Work-
of the 1992 ACM Conference on Computer Sup-
flow patterns. Distributed and Parallel Databases,
ported Cooperative Work (pp. 281-288). Toronto,
14, 5–51. doi:10.1023/A:1022883727209
Canada: ACM Publishing.
Weigand, H. (2006). Two decades of the
Murata, T. (1989). Petri nets: Properties, analysis
language-action perspective: Introduction.
and applications. Proceedings of the IEEE, 77(4),
Communications of the ACM, 49(5), 44–46.
514–580. doi:10.1109/5.24143
doi:10.1145/1125944.1125973
OASIS. (2007). Web services business process
Winograd, T. (1987). A language/action perspec-
execution language, V.2.0. Retrieved September
tive on the design of cooperative work. Human-
29, 2008, from http://docs.oasis-open.org/wsb-
Computer Interaction, 3, 3–30. doi:10.1207/
pel/2.0/OS/wsbpel-v2.0-OS.html
s15327051hci0301_2
1263
People-Oriented Enterprise Information Systems
Winograd, T., & Flores, F. (1986). Understanding Workflow Management Coalition. (2007). XML
computers and cognition. Norwood, NJ: Ablex process definition language, V.2.1. Retrieved
Publishing Corporation. September 29, 2008, from http://www.wfmc.org
This work was previously published in Social, Managerial, and Organizational Dimensions of Enterprise Information Systems,
edited by Maria Manuela Cruz-Cunha, pp. 63-80, copyright 2010 by Information Science Reference (an imprint of IGI Global).
1264
1265
Chapter 5.6
A SOA-Based Approach to
Integrate Enterprise Systems
Anne Lämmer
University of Potsdam, Germany
Sandy Eggert
University of Potsdam, Germany
Norbert Gronau
University of Potsdam, Germany
AbstrAct INtrODUctION
This chapter presents a procedure for the integration Enterprise resource planning systems (ERP systems)
of enterprise systems. Therefore enterprise systems are enterprise information systems designed to
are being transferred into a service oriented architec- support business processes. They partially or com-
ture. The procedure model starts with decomposition pletely include functions such as order processing,
into Web services. This is followed by mapping purchasing, production scheduling, dispatching,
redundant functions and assigning of the original financial accounting and controlling (Monk et. al.,
source code to the Web services, which are orches- 2005). ERP systems are the backbone of information
trated in the final step. Finally, an example is given management in many industrial and commercial
how to integrate an Enterprise Resource Planning enterprises and focus on the management of master
System with an Enterprise Content Management and transaction data (Sumner 2005). Besides ERP
System using the proposed procedure model. systems, Enterprise Content Management Systems
(ECM systems) have also developed into compa-
DOI: 10.4018/978-1-60566-968-7.ch008 nywide application systems over the last few years.
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A SOA-Based Approach to Integrate Enterprise Systems
ECM solutions focus on indexing all information and SOA are similar: different enterprise systems
within an enterprise (Rockley, 2003). They cover are connected through one interface, and a cross-
the processes of enterprise-wide content collec- system data transfer and the re-usage of objects
tion, creation, editing, managing, dispensing and or components is enabled. Thereby a service
use, in order to improve enterprise and cooperation represents a well defined function which is gener-
processes (CMSWatch, 2009). In order to man- ated in reaction to an electronic request (Burbeck,
age information independently, ECM combines 2000). The SOA approach offers a relatively easy
technologies such as document management, way to connect, add and exchange single services,
digital archiving, content management, workflow which highly simplifies the integration of similar
management, etc. The use of ECM systems is systems (e.g. enterprise take-over). Moreover,
constantly on the rise (Lämmer et. al 2008). This SOA offers a high degree of interoperability and
leads to an increasing motivation for enterprises modularity, which increases the adaptability of
to integrate the ECM systems within the exist- enterprise systems (Andresen et. al., 2008), (Läm-
ing ERP systems, especially when considering mer et.al. 2008).
growing international competition. The need for The SOA approach is based on the concept
integration is also eminently based on economical of service. The sender wants to use a service and
aspects, such as the expense factor in system run in doing so he wants to achieve a specific result.
time (Aier & Schönherr, 2006). For a cross-system Thereby the sender is not interested in how the
improvement of business processes, enterprise request is processed or which further requests
systems have to be integrated. are necessary. This is the idea of SOA, where
services are defined in a specific language and
referenced in a service index. Service request
rELAtED WOrK and data exchange occur via use of pre-defined
protocols (Erl, 2008), (Papazoglou, 2007).
service Oriented Architecture This service orientation can be used on different
as an Integration Approach levels of architecture. The grid architecture is a
common example of infrastructure level (Bermann
A number of integration approaches and concepts et. al., 2003), (Bry et. al., 2004). On the applica-
already exist. They can be differentiated by in- tion level an implementation usually takes place
tegration level (for example data, functions or in terms of web services.
process integration) and integration architecture The use of web services offers the possibility
(for example point-to-point, hub & spoke, SOA) of re-using raw source code, which is merely
(Aier & Schönherr, 2006). This paper presents an transferred to another environment (Sneed, 2000).
approach to integrating enterprise systems by way The benefit of this transfer is the re-usage of per-
of building up service oriented architectures. This fected (old) algorithms. The main disadvantage
integration approach is of special interest and will is the necessity of revising the raw source code
be described in more detail. in order to find possible dependencies (Sneed,
The concept of service orientation is currently 2000). This is also true for enterprise systems. It
being intensively discussed. It can be differenti- isn’t efficient to re-use the entire old system, but
ated from component orientation by its composi- rather only significant parts of it. To accomplish
tion and index service (repository). Additionally, this it is necessary to deconstruct the old enter-
SOA is suitable for a process oriented, distributed prise system and to locate the source code parts
integration (Aier & Schönherr, 2006). However, which can effectively be re-used. Our approach
the addressed goals of component orientation uses self-diagnosis for finding these source code
1266
A SOA-Based Approach to Integrate Enterprise Systems
locations. This analysis will be considered in the the system has to possess abilities of self-detection
third integration step. or self-diagnosis. Sensors to detect contextual and
the environmental changes as well as a monitor
self-Diagnosis for continuous analysis should be a central part of
a self-organizing information system and create
As just described, our approach uses self-diagnosis the basis for the following:
for location of useful source code. For this, the
method of self-diagnosis will be presented and • For self-configuration the possibilities and
the differences to other approaches will be shown. needs of configuration must be recognized.
Some approaches for transformation of legacy- • For self-healing the symptoms of an infec-
systems into a SOA exist already. However, these tion must be identified.
approaches see the whole system as one service. • For a self-optimization it is necessary to
The system gets a service description for using search for new calculations, algorithms
this service in a SOA. Our approach differs in that and solution space or process chains.
it deconstructs the system for a tailored need. For • The self-protection needs detectors for
this, the method of self-diagnosis is used. identification of attacks.
Self-diagnosis can be defined as a system’s
capacity to assign a specific diagnosis to a de- Figure 1 shows a systematization of selfware.
tected symptom. The detection of symptoms and Beyond this, self-diagnosis can be seen as
assignment are performed by the system itself an integral part of all self-organising systems.
without any outside influence (Latif-Shabgahi Because of the necessity to achieve all aims of
et. al., 1999). The mechanism of self-diagnosis self-organising systems, self-diagnosis has to be
has been detected surveying natural systems; it subordinated to self-management.
can partly be applied to artificial systems as well. Today some approaches for self-diagnosis in
Self-diagnosis can be seen as an integral part of computer systems already exist i.e. fault detec-
all self-organising systems. Self-organisation is a tion in networking communication, or in storage
generic term for self-x-capabilities also called self- and processor (Sun, 2004). Self-diagnosis also
ware. Self-organisation should lead information works in infrastructure and load sharing for per-
systems to become self-healing, self-protecting, formance (Mos, Murphy, 2001). In this article a
self-optimizing and self-configuring (Hinchey et. proposal for the implementation of self-diagnosis
al., 2006), (Garnek, 2007). For reaching these aims, of enterprise application systems and particularly
1267
A SOA-Based Approach to Integrate Enterprise Systems
in the application layer of information systems is factor for a division between active and passive
presented without using case based reasoning or self-diagnosis. A fundamental basis for either
multi agent systems. alternative is an observer or monitor.
The first step of self-diagnosis is the detection Using passive self-diagnosis, the monitor
of symptoms. Usually the detection of one existing detects and collects symptoms and information.
symptom is not sufficient to make an indisputable It can either be activated automatically or manu-
diagnosis. In this case, more information and data ally (Satzger et. al., 2007). If you know which
have to be gathered. This can be described as items need to be observed and the point where
symptom collection. In a second step the symptoms this information can be gathered, you only have
are assigned to a specific diagnosis. Depending to monitor this point. This is what passive self-
on the diagnosis, corresponding measures can be diagnosis does. For example: if you want to know
taken (Horling et. al., 2001). how often a button is pressed, you have to find
Symptoms are a very abstract part of self- where the button-event is implemented in the code
diagnosis. These symptoms can be a high network and observe this button-event.
load in distributed systems, missing signals, or In active self-diagnosis, the program’s func-
buffer overload of the hardware layer. For en- tion or modules are the active elements. They
terprise systems the symptoms can be e.g. the send defined information to the monitor and act
frequency of usage of user interface elements by independently if necessary. The monitor is used
the user, dependencies of code parts or compo- as receiver and interprets the gathered informa-
nents. Other types of symptoms are possible. In tion and symptoms. The main advantage of ac-
general, the answer to questions concerning the tive self-diagnosis is the possibility of detecting
measure of interesting items provides hints for new symptoms, even if no clear diagnosis can
possible symptoms. be made before the problems become acute and
are forwarded to other systems. In contrast, us-
Differentiation of Collection ing passive self-diagnosis, the monitor can only
inquire about specific data. In this case, a response
Self-diagnosis can be categorized by symptom or further examination is only possible if the
acquisition method. Active and passive self- problem is already known. For example: if you
diagnosis must also be distinguished. In this don’t know the location of all the buttons and or
context, the program or source code is the crucial the code component for the button-event, you will
1268
A SOA-Based Approach to Integrate Enterprise Systems
have to recognise all events with their initial point system. The amount of markers is getting smaller
and filter them with the monitor. The monitor accordingly. This implementation is important for
doesn’t have to know how many buttons exist or the usage of dependencies (detection of causality)
where their code is located, but the buttons have about the different components of the system.
to “know” to register with the monitor. These are The third layer is the application layer. Thereby
the requirements of active self-diagnosis. one marker is used for one application. Usage for
The assembly of diagnosis points depends this implementation is mainly the surveying of
on application context and software system. The enterprise application landscapes.
required time and effort cannot be specified; it
depends on the design and implementation of the Differentiation of Patterns
software system.
Self-diagnosis can also be employed for the For self-diagnosis, data are transmitted to a moni-
examination of source-code usage and interdepen- tor either from the code or the application. De-
dences. Depending on the desired information, pending on the purpose, patterns can be identified
different points of diagnosis have to be integrated which refer to the frequency (frequency pattern)
into the source-code. or markers reporting the dependencies of code
Different points of diagnosis have to be deter- fragments (causality pattern).
mined in order to allow for the allocation of code The frequency pattern provides information
parts to various fields and functions. Therefore about the usage of parts of an application and al-
context, programming language, and software lows drawing conclusions on user as well as the
system architecture must be considered. temporal details. The monitor does not view the
content of the message. It counts the frequency
Differentiation of Layers of a message and saves the corresponding meta-
data, e.g. invoking user or instant of the request
Self-diagnosis can be employed for the examina- for information. The application context of the
tion of source code usage and interdependences. frequency pattern is particularly interesting. In
According to the desired information different order to supervise the use of code, frequency pat-
markers have to be integrated into the source-code. terns could be used. By using frequency pattern
Depending on the desired outcome, source it is easily possible to analyze the exact usage of
code usage and interdependences could be objects certain functions on the code layer. This analysis
of an analysis. could be used for maintenance. The maintenance
Three layers can be distinguished: (1) source overhead increases at the increasing complexity
code layer, (2) component layer and (3) applica- of operational standard software at any function
tion layer. which was taken over in the standard. In run time
For self-diagnosis of the source code layer the it is usually unknown which functions are really
markers have to be integrated into the functions used. By detecting the use of frequencies in the
or methods. This offers a very specific analysis runtime a slim down of the software system can
of the system’s bottom, but this is connected with be carried out to make sure that the maintenance
heavy efforts and a deep knowledge about the overhead is done only for the functions which
programming of the system. also are needed.
Self-diagnosis of the component layer inte- The causality pattern shows the dependencies
grates the markers into functional combined code of certain code fragments between each other.
fragments of the components of the information Again, the focus is on the metadata, like for
1269
A SOA-Based Approach to Integrate Enterprise Systems
1270
A SOA-Based Approach to Integrate Enterprise Systems
1271
A SOA-Based Approach to Integrate Enterprise Systems
function can be determined on the abstract level them or the original source code. The data level
by posing questions about the general “assigned is not touched by this process.
task” of the system. The differences between the
three hierarchical levels can be discovered by Preparation and Mapping
answering the following questions:
The main advantage of web service architecture
1. Question: What are the tasks of the par- is the high degree of possible reuse. By divi-
ticular system? The answers resulting from sion into three hierarchical levels, a detection of
this step correspond to services on the first similar functions is made possible, especially on
level, which constitute the general task. For the level of functionality and business objects.
example Sales, purchase, inventory manage- In some cases an adjustment of the functions is
ment or workflow management, archiving necessary in order to serve different contexts of
and content management. These tasks are use. Therefore, the next step consists of integration
abstract and describe main functionalities. on different levels and the mapping of identical
They consist of many other functions which functions (figure 3, part 2). This step poses the
are the objects of the next level. following questions:
2. Question: Which functionality derives from
every single task? The answers to this ques- 1. Question: Which tasks, functions and busi-
tion correspond to the services on the second ness objects appear more than once? For
level that are contributed by the various example: most applications contain search
functions. These functions are more detailed functions, some applications have functions
than the general tasks. They describe what for check in and check out, ERP systems
the tasks consist of and what they do, for calculate the time for many things with the
example: calculate the delivery time, identify same algorithm under different names.
a major customer, or constitute check-in and 2. Question: Are these multiple functions and
E-Mail functionalities. For these functions objects redundant, i.e. superfluous, or do they
the application needs data, which can found provide different services? Some functions
in the third level. may have the same name, but perform dif-
3. Question: Which business objects are ferent tasks.
utilised by both systems? This answer con- 3. Question: Can these multiple functions and
stitutes the number of business objects that objects be combined by way of appropriate
will be used as basic objects in both systems, programming? For the functions ascertained
e.g. article data, customer data or index data. in question 2 to be similar functions with
different names, the possibility of integrating
In this procedure model, all possible levels them into one has to be analysed.
of service deconstruction are addressed; yet the
realisation on all hierarchical levels constitutes The advantage of this mapping is the detection
an individual task. of identical functions, which may by only named
The result of this step is a 3-stage model differently while completing the same task. In
displaying the services of an application. The doing so, the benefit of reuse can be exploited to
data-level, i.e. the integration of databases, is not a high degree. Additionally, this part of the sur-
further examined at this point since it is not an vey allows for a minimisation of programming,
integral part of our model, the aim of which is to due to encapsulation of multiple functions. Only
wrap functions as web services without altering those functions which share a high number of
1272
A SOA-Based Approach to Integrate Enterprise Systems
similarities, but nevertheless complete different can be started. This step necessitates the usage
tasks, have to be programmed differently; they of the existing source code and the description
can be merged by reprogramming. of relevant parts with a web service description
It is important to note that this part the decon- language, making possible the reuse of source
struction consists of an abstract level and in the code in service oriented architecture.
functional view. In the following step, this will If redundant services have been detected in
change: from a functional view to a code view. part two which need to be reengineered, then the
reengineering happens now.
Detection and Assignment of
services to code Fragments Orchestration of Web services
The next step brings the biggest challenge, namely The results of stage three are the described web
the transformation of existing applications into services. These have to be connected with each
service oriented architecture. Until now, services other depending on the business process. This
have been identified by their tasks, but the cor- orchestration takes place in several steps (figure
relation to existing source code still needs to be 3, part 4).
done. This is going to be accomplished in the next First, the context must be defined; second, the
step (figure 3, part 3). service description language has to be selected;
Self-diagnosis is used at this point to integrate and third, the web services need to be combined.
earlier defined points of diagnosis into the source A four-stage procedure model for a service
code. These points of diagnosis actively collect oriented integration of application systems has just
usage data and facilitate conclusions concerning been described. This process holds the advantages
the fields and functions via their structure. The of a step-by-step transformation. The amount
structure of the points of diagnosis depends on the of time needed for this realisation is consider-
context of their application and on the software ably higher than in a “big bang” transformation,
system. It is not possible to describe the complexity however, a “big bang” transformation holds a
of the process, which also depends on the structure higher risk and therefore requires high-quality
and programming of the software systems. preparation measures. For this reason, a “big
As we discussed earlier in section 2.2, the bang” transformation is dismissed, in favour of
points of diagnosis depend on what needs to be a step-by-step transformation.
observed. Here we want to know which code There is yet another important advantage in
fragments share correspondences and execute the integration or deconstruction of application
the identified functions in the functional view. systems into services, when carried out in several
From this follows the necessity of a monitor. For steps. First, a basic structure is built (construction
example, the points can be every method call in of a repository, etc.). Next, a granular decom-
the source code of an ERP system. If the user calls position into web services occurs on the first
a function, the points of diagnosis have to inform level, thereby realising a basic transformation of
the monitor that they were called. The monitor has a service oriented concept. Following this, web
to recognise and to analyse which method calls services of the second and third hierarchical level
belong together. can be integrated step-by-step. This reduction into
Now the code fragments are analysed and as- services provides high quality integration.
signed to the functions identified in part 1, and The procedure model we just presented is
the wrapping of code fragments into web services very abstract. Therefore, a practical example for
1273
A SOA-Based Approach to Integrate Enterprise Systems
two enterprise systems, ERP and ECM, will be modules such as purchase, sales and article man-
given in part 4. agement. The ECM system consists of modules
such as document management, archiving and
workflow management. In the current situation
EXAMPLE OF APPLIcAtION a bi-directional interface between both systems
exists. One example for a business process in
It is necessary to develop a general usage approach which both systems are used is the processing of
and to test it on ERP and ECM systems, since no incoming mails and documents. In order to scan
concrete scenario of these technologies in regard and save the incoming invoices of suppliers, the
to praxis as of yet exists (Gronau, 2003). The aim module of the ECM System “document manage-
of this example of use is to describe the integration ment” is used. The access to the invoice is made
of both company-wide systems, ERP and ECM, possible through the ERP system.
using our presented approach. In the future, a SOA-based integration of both
In what follows, we present a case study of a enterprise systems can be reasonably expected
situation of integration of two systems: an ERP under the aspect of business process improvement.
and an ECM system. A German manufacturer of Referring to the example mentioned above, the
engines and devices administrate a complex IT “portal management” component could be used
landscape. This IT landscape includes, among to access, search, and check-in all incoming docu-
others, two big enterprise systems. One of them ments. What now follows is a description, in four
is the ERP system “Microsoft Dynamics NAV” parts, of the integration based on the procedure
and the other is the ECM system “OS.5|ECM” model we presented in part 3.
of Optimal Systems. The ERP System includes
1274
A SOA-Based Approach to Integrate Enterprise Systems
vices are checked and compared with each other. Sales archiving
If functions or tasks are similar, they will have to article manage- document manage-
ment ment
be checked for possibility of combination and to
repository man- workflow manage-
be slotted for later reprogramming. One example agement ment
of such similarity between functions is “create Areas of Functions check in email connection
index terms”. Most enterprise systems include identify delivery save document
the function “create index terms” for documents time
such as invoices or new articles. The estimation check out create index terms
1275
A SOA-Based Approach to Integrate Enterprise Systems
in the source code constitutes one of the biggest pose (Leymann & Roller 2000) new web services
challenges in a transfer to service-oriented archi- from existing web services with help of workflow
tecture. As part of this approach, the method of technologies (Leymann, 2003). In BPEL, a process
self diagnosis is suggested. Appropriate points is defined which is started by a workflow system
of diagnosis will be linked to the source code in in order to start a business process.
order to draw conclusions from used functions to Web services are addressed via a graphical
associated class, method or function in the original representation with a modelling imagery of WS-
source code. Through the use of aspect oriented BPEL. The business process is modelled inde-
programming, aspects can be programmed and pendently from the original enterprise systems.
linked to the classes and methods of the application Since in the first integration step, the systems
system. Necessary data, such as the name of the were separated by their tasks and functions, now
accessed method, can be collected by accessing all of the functions are available for the business
the respective classes and methods (Vanderperren process as well.
et. al., 2005).
Based on a defined service, “order transac-
tion”, all names of methods which are necessary cONcLUsION
for the execution of “order transaction”, must be
identified. To wrap the service “order transaction”, critical consideration
i.e. to combine it with a web service description
language, the original methods need be searched The procedure model for the integration of ap-
for and encapsulated. Additionally, the reprogram- plication systems as it has been presented in this
ming of redundant functions is part of the phase paper is an approach that has been successfully
of identification and isolation of services. This, deployed in one case. Currently the assignment
as well, is only possible if the original methods ability and the universality are being tested. The
are identified. self-diagnosis, i.e. the assignment of source code
to services via aspect oriented programming,
Part 4: Orchestration constitutes a bigger challenge.
of Web services A verification of costs and benefit cannot be
given sufficiently; however, several examples
The last integration phase is used to compile web show convincing results and suggest a general
services. The previous steps had to be completed transferability. The complexity in such a realisa-
in preparation for the procedure model. The web tion cannot be specified. Particularly for bigger
services now are completely described and have and complex systems, the cost to benefit ratio has
an URI to be accessed. Now, only the composition to be verified. Despite this, it must be recognised
and the chronology of requests of the specific web that the assignment of code fragments to functions
services are missing. For the orchestration the is not an easy task. If one observes every method
web service business process execution language call, a high number of calls must be analysed.
(WS-BPEL) is recommended. The WS-BPEL was Visualisation can be helpful for analysing, since
developed by the OASIS-Group and is currently method calls belonging together will build a clus-
in the process of standardisation (Cover, 2005). ter in the emerging network. The observation of
If the web services present a function with a busi- method calls is possibly not the most optimal way
ness process, the WS-BPEL is particularly suitable for very complex systems. If the functional view
for orchestration of web services (Lübke et. al., of services in part 1 is not part of the business
2006). Essentially, BPEL is a language to com- object layer, but only of the general task layer,
1276
A SOA-Based Approach to Integrate Enterprise Systems
one can reduce the numbers of diagnosis points. Andresen, K., Levina, O., & Gronau, N. (2008).
The possibilities depend on the programming Design of the evolutionary process model for
language and their constructs. adaptable software development processes. Paper
presented at the European and Mediterranean
resume Conference on Information Systems 2008 (EM-
CIS2008)
The approach presented above describes a pro-
Berman, F., Fox, G., & Hey, T. (2003). Grid
cedure model for service oriented integration of
computing. Making the Global infrastrucure a
different application systems. The integration pro-
Reality. Wiley.
ceeds using web services which thereby improve
the integration ability, interoperability, flexibility, Bry, F., Nagel, W., & Schroeder, M. (2004). Grid
and sustainability. The reusable web services computing. Informatik Spektrum, 27(6), 542–545.
facilitate the extraction of several functions and
Burbeck, S. (2000). The Tao of e-business services.
combination of these into a new service. This
IBM Corporation. Retrieved October 7, 2006,
allows for reuse of several software components.
from http://www.ibm.com/software/developer/
Altogether, Web services improve the adapt-
library/ws-tao/index.html
ability of software systems to the business pro-
cesses and increase efficiency (Gronau, 2003). To CMSWatch. (2009). The ECM Suites Report 2009,
give an example of the realisation of the procedure Version 3.1. CMS Works, CMS Watch Olney.
model, an integration of an ERP- and ECM-system
Cover, R. (2004). Web standards for business
was chosen. The reasons for this choice consist
process modeling, collaboration, and choreog-
in targeted improvement of business aspects and
raphy. Retrieved October 7, 2001, from http://
increasing complexity of both application systems.
xml.coverpages.org/bpm.html.
Dealing with this complexity makes integration
necessary. Through mapping, redundant functions Erl, T. (2008). Web service contract design and
can be detected and as a consequence, a reduction versioning for SOA. Prentice Hall International.
of the complexity is made possible. Regarding the
Ganek, A. (2007). Overview of autonomic comput-
adaptability and flexibility of affected application
ing: Origins, evolution, direction. In M. Parashar,
systems, web services are a suitable approach for
& S. Harir (Eds.), Autonomic computing (pp. 3-18).
integration. In particular, it is the reuse of services
New York: Taylor & Francis Group.
and an adaptable infrastructure which facilitate
the integration. Gronau, N. (2003). Web services as a part of
In addition to all of this, we expect to discover an adaptive information system framework for
additional advantages concerning maintenance concurrent engineering. In R. Jardim-Goncalves,
and administration of affected application systems. J. Cha, & A. Steiger-Garcao (Eds.), Concurrent
engineering: Enhanced interoperable systems.
Hinchey, M. G., & Sterritt, R. (2006). Self-
rEFErENcEs managing software. Computer, 40(2), 107–111.
doi:10.1109/MC.2006.69
Aier, S., & Schönherr, M. (2006). Evaluating
integration architectures – A scenario-based evalu- Horling, B., Benyo, B., & Lesser, V. (2001).
ation of integration technologies. In D. Draheim, Using self-diagnosis to adapt organizational
& G. Weber (Eds.), Trends in enterprise applica- structures (Tech. Rep. TR-99-64). University of
tion architecture, revised selected papers (LNCS Massachusetts.
3888, pp. 2-14).
1277
A SOA-Based Approach to Integrate Enterprise Systems
Kuropka, D., Bog, A., & Weske, M. (2006) Se- Mos, A., & Murphy, J. (2001). Performance moni-
mantic enterprise services platform: Motivation, toring Of Java component-oriented distributed
potential, functionality and application scenarios. applications. Paper presented at the IEEE 9th
In Proceedings of the tenth IEEE international International Conference on Software, Telecom-
EDOC Enterprise Computing Conference, Hong munications and Computer Networks - SoftCOM
Kong (pp. 253-261). 2001.
Lämmer, A., Eggert, S., & Gronau, N. (2008). A Papazoglou, M. P. (2007). Web services: Principles
procedure model for a SOA-Based integration and technology. Prentice Hall.
of enterprise systems. International Journal of
Rockley, A. (2003). Managing enterprise content.
Enterprise Information Systems, 4(2), 1–12.
Pearson Education.
Latif-Shabgahi, G., Bass, J. M., & Bennett, S.
Satzger, B., Pietzowski, A., Trumler, W., &
(1999). Integrating selected fault masking and
Ungerer, T. (2007). Variations and evaluations
self-diagnosis mechanisms. In Proceedings of
of an adaptive accrual failure detector to enale
the Seventh Euromicro Workshop on Parallel
self-healing properties in distributed systems.
and Distributed Processing (pp. 97-104). IEEE
In P. Lukowicz, L. Thiele, & G. Tröster (Eds.),
Computer Society.
Architecture of computing systems - ARCS 2007
Leymann, F., & Roller, D. (2000). Production (LNCS 4415, pp. 171-184).
workflow - Concepts and techniques. Prentice
Sneed, H. M. (2000). Encapsulation of legacy
Hall International.
software: A technique for reusing legacy software
Leymann, F., & Roller, D. (2006). Modeling components. Annals of Software Engineering, 9,
business processes with BPEL4WS. Informa- 293–313. doi:10.1023/A:1018989111417
tion Systems and E-Business Management, 4(3),
Sumner, M. (2005). Enterprise resource planning.
265–284. doi:10.1007/s10257-005-0025-2
NJ: Pearson Education.
Lübke, D., Lüecke, T., Schneider, K., & Gómez,
Sun (2004). Predictive self-healing in the Solaris
J. M. (2006). Using event-driven process chains
10 operation system. A technical introduction.
fo model-driven development of business appli-
Retrieved from http://www.sun.com/bigadmin/
cations. In F. Lehner, H. Nösekabel, & P. Klein-
content/selfheal/selfheal_overview.pdf
schmidt (2006), Multikonferenz Wirtschaftsinfor-
matik 2006 (pp. 265-279). GITO-Verlag. Vanderperren, W., Suvée, D., Verheecke, B.,
Monk, E., & Wagner, B. (2005), Concepts in Cibrán, M. A., & Jonckers, V. (2005). Adaptive
enterprise resource planning (2nd ed.). Boston: programming in JAsCo. In Proceedings of the
Thomson Course Technology. 4th international conference on Aspect-oriented
software development. ACM Press.
This work was previously published in Organizational Advancements through Enterprise Information Systems: Emerging Ap-
plications and Developments, edited by Angappa Gunasekaran and Timothy Shea, pp. 120-133, copyright 2010 by Business
Science Reference (an imprint of IGI Global).
1278
1279
Chapter 5.7
Achieving Business Benefits
from ERP Systems
Alok Mishra
Atilim University, Turkey
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Achieving Business Benefits from ERP Systems
(Davenport, 1998). ERP has also been credited and respond to market changes, and implement
with creating value through integrating activities new business strategies to develop and maintain
across a firm, implementing best practices for each a competitive edge. ERP is designed to help
business process, standardizing processes within businesses succeed in the global marketplace by
organizations, creating one-source data that results supporting international legal and financial com-
in less confusion and error, and providing online pliance issues, and enabling organizations to adapt
access to information (O’Leary, 2000). All of these internal operations and business processes to meet
features facilitate better organizational planning, country-specific needs. As a result, organizations
communication, and collaboration (Olson, 2004). can focus on improving productivity and serving
Applied Robotics increased on-time deliveries their customers instead of struggling to ensure they
40% after implementing ERP, and Delta Electron- are in compliance with business and legal require-
ics reduced production control labor requirements ments around the world. Companies that automate
by 65% (Weil, 1999). Therefore, in the last decade, and streamline workflows across multiple sites
organizations around the world have made huge (including suppliers, partners, and manufacturing
investments in enterprise systems. According to sites) produced 66% more improvement in reduc-
a report by Advanced Manufacturing Research, ing total time from order to delivery, according
the ERP software market was expected to grow to Aberdeen’s 2007 study of the role of ERP in
from $21 billion in 2002 to $31 billion in 2006, globalization. Those companies that coordinate
and the entire enterprise applications market which and collaborate between multiple sites, operat-
includes customer relationships management and ing as a vertically integrated organization, have
supply chain management software will top $70 achieved more than a 10% gain in global market
billion (AMR Research, 2002). It was estimated share. The majority of companies studied (79%)
that in the 1990s about $300 billion was invested view global markets as a growth opportunity, but
in ERP systems worldwide and that this was ex- of those companies, half are also feeling pressures
pected to grow to $79 billion annually by 2004 to reduce costs (Jutras, 2007). Those companies
(Carlino, Nelson, & Smith, 2000). that coordinate and collaborate between multiple
Enterprise systems include enterprise resource sites, operating as vertically integrated organiza-
planning, customer relationship management tions, have achieved more than a 10% gain in
(CRM), supply chain management (SCM), product global market share (Marketwire, 2007).
lifecycle management (PLM), and e-procurement
software (Shang & Seddon, 2002). ERP software
integrates management information and processes, bUsINEss bENEFIts
such as financial, manufacturing, distribution, FrOM ErP systEMs
and human resources, for the purpose of enabling
enterprise-wide management of resources (Dav- With the growing proliferation of ERP systems,
enport, 1998; Deloitte Consulting, 1998; Klaus, including midsize companies, it becomes critical
Rosemann, & Gable, 2000). to address why and under what circumstances one
ERP helps organizations to meet the challenges can realize the benefits of an ERP system (Gefen
of globalization with a comprehensive, integrated & Ragowsky, 2005). ERP systems can provide the
application suite that includes next-generation organization with competitive advantage through
analytics, human capital management, finan- improved business performance (Hitt, Wu, &
cials, operations, and corporate services. With Zhou, 2002; Kalling, 2003) by, among other things,
support for industry-specific best practices, ERP integrating supply chain management, receiving,
helps organizations improve productivity, sense inventory management, customer orders manage-
1280
Achieving Business Benefits from ERP Systems
ment, production planning and managing, ship- 2003), on average there is a $10 gain in company
ping, accounting, human resource management, valuation for each dollar invested in IT (Brynjolfs-
and all other activities that take place in a modern son et al., 2002). Showing such a positive relation-
business (Gefen & Ridings, 2002; Hong & Kim, ship is important because it affects MIS funding.
2002; Kalling, 2003). Thus, business benefits from According to Parker and Benson (1988), in
ERP systems use are multidimensional, ranging order for enterprise to gain competitive advantage,
from operational improvements through decision- the way in which IT is justified financially must
making enhancement to support for strategic goals change. Classical quantitative techniques (e.g.,
(Davenport, 2000; Deloitte Consulting, 1998; cost-benefit analysis) are not adequate for the
Markus & Tanis, 2000; Ross & Vitale, 2000; evaluation of IT applications, except when dealing
Irani & Love, 2001; Wilderman, 1999; Cooke & with cost-avoidance issues, which generally occur
Peterson, 1998; Campbell, 1998). Gartner Group at the operational level. If these methodologies are
(1998) also mentions enterprise systems benefits in to be enhanced, additional measures—such as per-
these areas, including both tangible and intangible ceived value to the business, increased customer
benefits. While some companies claim to have satisfaction, and the utility of IT in supporting
reduced their cycle time, improved their financial decision making—must be considered (Katz,
management, and obtained information faster 1993). Investment in ERP systems payoff remains
through ERP systems, in general they still have a controversial question (Hitt et al., 2002; Sarkis &
a high initial implementation failure rate (Hong Sundarraj, 2003; Kalling, 2003). ERP systems are
& Kim, 2002; Songini, 2004). Many prior studies very complicated software packages that support
examining the relationship between investing in the entire set of organizational activities. Hence,
IT and the performance level of the organization it is possible that there are many unknown factors
(Weil, 1999) dealt with the ratio of total IT invest- that impact the relationship between investment in
ment (i.e., software, hardware, personnel) to the ERP and organizational productivity. This chapter
entire organization’s performance (the total profit observes the manager’s perception of the benefits
of the organization). their organization gains from using ERP systems
Many early studies found no positive rela- and what impacts this benefits.
tionship between the two variables. Strassmann ERP system investments are strategic in nature,
(1985) examined service-sector firms but found with the key goal often being to help a company
no significant relationship between investment in grow in sales, reduce production lead time, and
IT and high-performing firms. Berndt and Mor- improve customer service (Steadman, 1999). In
rison (1992) even found a negative relationship IT, evaluation costs are hard to quantify in post-
between the growth in productivity and investment implementation audits and benefits are harder to
in high-tech, although, as they point out, this may identify and quantify (Hochstrasser & Griffiths,
have been the result of measurement problems. As 1991; Willcocks & Lester, 1999; Irani, Sharif, &
Brynjolfsson (1993) summarizes, positive returns Love, 2001; Seddon, Graeser, & Willcocks, 2002).
from investing in IT may not have shown up in Management of organizations that adopt ERP
previous research because of the inadequate way expects many benefits from the systems. These
it was measured. When measuring IT investment expectations are often difficult to meet. ERP can
on a per-user basis, there is a positive correlation be seen to provide more responsive information
between IT investment and overall productivity to management. There also is more interaction
(Brynjolfsson, 2003). Although there is a large across the organization and more efficient finan-
variance among companies in the benefit they cial operation (Olson, 2004). There is weaker
achieve from their IT investment (Brynjolfsson, perceived benefit from operational performance,
1281
Achieving Business Benefits from ERP Systems
such as improved operating efficiency, inventory turing, and replicated in Sweden by Olhager and
management, and cash management. While more Selldin (2003). Both studies used a 1 to 5 scale,
information is available at higher quality, this with 1 representing “not at all” and 5 representing
does not directly translate to cost efficiencies “to a great extent.” Average ratings are given in
across the board. Tables 1 and 2.
SAP-ERP delivers business benefits where they Here, the results are very similar. ERP systems
matter most—to the bottom line—and addresses were credited with making information more
the internal and external business requirements available, at higher quality, and with integrating
of global enterprise. Organizations can invest in operations (Olson, 2004). There was neutral sup-
mySAP ERP with confidence that expansion or port for crediting ERP with providing benefits in
change in any country or division will be sup-
ported. The solution provides global businesses
Table 1. Expected benefits of ERP systems (Mabert
with concrete benefits that enable success, includ-
et al., 2000; Olhager & Selldin, 2003)
ing the following (My SAP ERP, 2007):
ERP Performance Outcomes United Sweden
• Improved productivity for greater efficien- States
cy and responsiveness Quicker information response time 3.51 3.81
• Increased insight for more assured deci- Increased interaction across the 3.49 3.55
sion making enterprise
of global market opportunities and drivers (My Supplier management/procurement 2.99 2.94
1282
Achieving Business Benefits from ERP Systems
1283
Achieving Business Benefits from ERP Systems
Table 3. ERP benefits framework and extent of tangibility and quantifiability (adapted from Shang &
Seddon, 2000)
1284
Achieving Business Benefits from ERP Systems
intangible benefits derived from information & Simon, 2002). According to Hares and Royle
systems implementation has been an elusive goal (1994), there are four main intangible benefits in
of academics and practitioners alike (Davern & IT investment:
Kauffman, 2000). Remenyi and Sherwood-Smith
(1999) pointed out that there are seven key ways 1. Internal improvement: This includes pro-
in which information systems may deliver direct cesses, workflow, and information access.
benefits to organizations. They also indicated that 2. Customer service: This ensures quality,
information systems deliver intangible benefits delivery, and support.
that are not easily assessed. Nandish and Irani 3. Foresight: This is vision regarding markets,
(1999) discussed the difficulty of evaluating IT products, and acquisitions in the future.
projects in the dynamic environment, especially 4. Adaptability: This is the ability to adapt
when intangibles are involved in the evaluation. change in rapidly changing industry.
Tallon, Kraemer, and Gurbaxni (2000) cited a
number of studies indicating that economic and The third and fourth sets of intangibles are
financial measures fail to assess accurately the future oriented and include spotting market trends
payoff of IT projects and suggested that one means and the ability to adapt to change.
of determining value is through the perception of Hares and Royle (1994) stated that the first set
executives. They focused on the strategic fit and of ongoing intangible benefits are those concerned
the contributions of IT projects, but indicated that with internal improvement of company operations
researchers need somehow to capture or represent or performance. These include changes in produc-
better the intangible benefits of IT. In the technol- tion processes, methods of operations manage-
ogy arena, as in the business areas, many projects ment, and changes to production value and process
deliver benefits that cannot be easily quantified chains with resulting benefits in increased output
(Murphy & Simon, 2002). Many benefits related or lower production costs. The second group of
to the information technology projects cannot be ongoing benefits, customer-oriented intangibles, is
easily quantified, for example better information more difficult to measure because their effective-
access, improved workflow, interdepartmental ness is determined by external forces. The benefits
coordination, and increased customer satisfac- of improving customer service are greater retention
tion (Emigh, 1999). These are also the features of customers and customer satisfaction. The third
that are listed as key attributes of ERP systems group of intangibles embodies the spotting of new
(Mullin, 1999; Davenport, 2000). ERP systems market trends. If new trends can be anticipated,
are implemented to integrate transactions along then technology may be able to transform or create
and between business processes. Common busi- products, processes, or services to gain new sales
ness processes include order fulfillment, materials and market position. The final group of intangible
management, production planning and execution, benefits is the ability to adapt to change. As with
procurement, and human resources (Murphy & the identification of market trends, the benefits
Simon, 2002). ERP systems enable efficient and derived include adapting products and services to
error-free workflow management and account- market trends and the modification of production
ing processes including in-depth auditing. These processes—a critical ability for firms in rapidly
systems feature a single database to eliminate changing industries.
redundancy and multiple entry errors, and they ERP system investments are strategic in nature,
provide in-depth reporting functionality. ERP with the key goal often being to help a company
systems provide information for effective deci- grow in sales, reduce production lead time, and
sion making on all organizational levels (Murphy improve customer service (Steadman, 1999). Or-
1285
Achieving Business Benefits from ERP Systems
ganizations turned up an average value of -$1.5 all relevant organizational goals. The most ap-
million when quantifiable cost savings and revenue propriate management level is business managers
gains were calculated against system implementa- (middle-level management control), as they have a
tion and maintenance costs. Improved customer comprehensive understanding of both the capabili-
service and related intangible benefits such as ties of ES and the business plans for system use. It
updated and streamlined technical infrastructure is not expected that all organizations will achieve
are important intangible benefits that organizations benefits in all 25 sub-dimensions, or even in all
are often seeking when making these investments. five main dimensions, but it provides an excellent
The development and implementation of ERP checklist of benefits that have been accomplished
systems is longer in duration and cost intensive. It in organizations using enterprise systems.
is difficult to quantify in monetary terms because
of the intangible nature of many of the derived 1. Operational Benefits:
benefits, for example, improved customer service 1.1 Cost reduction:
(Murphy & Simon, 2002). ▪ Labor cost reduction in cus-
The literature suggests that intangibles can be tomer service, finance, human
converted into monetary terms through the ability resources, purchasing, IT ser-
to take care of the following observations: vices, and training.
▪ Inventory cost in inventory
1. Maintain and increase sales turns, dislocation costs, and
2. Increase prices warehousing costs.
3. Reduce costs ▪ Administrative expenses reduc-
4. Create new business tion in printing and other busi-
ness supplies.
Hares and Royle (1994) give a procedure to 1.2 Cycle time reduction:
quantify intangible benefits. The major steps are: ▪ Customer support activities in
order fulfillment, billing, deliv-
1. Identify benefits to be quantified ery, and customer enquiries.
2. Make intangible benefits measurable ▪ Employee support activities in
3. Predict the benefits in physical terms month-end closing, requisition,
4. Evaluate cash flow terms HR and payroll, and learning.
▪ Supplier support activities in or-
der processing, information ex-
ENtErPrIsE systEM change, and payment.
bENEFIt FrAMEWOrK 1.3 Productivity improvement:
▪ Production per employee, pro-
According to Shang and Seddon (2002), the follow- duction by labor hours, produc-
ing five-dimensional framework, which is built on tion by labor costs, increased
a large body of previous research into IT benefits, work volume with same work-
has been organized around operational efficiency force, and reduced overtime.
and managerial and strategic effectiveness, as the 1.4 Quality improvement:
outlook of strategic managers are too broad to ▪ Error rate, data reliability to data
identify casual links between enterprise system accuracy.
investment and benefit realization, and those of 1.5 Customer service improvement:
operational managers are too narrow to consider ▪ Ease of data access and inquiries.
1286
Achieving Business Benefits from ERP Systems
1287
Achieving Business Benefits from ERP Systems
1288
Achieving Business Benefits from ERP Systems
1289
Achieving Business Benefits from ERP Systems
1290
Achieving Business Benefits from ERP Systems
Campbell, S. (1998). Mining for profit in ERP Gefen, D., & Ragowsky, A. (2005). A multi-level
software. Computer Reseller News, (October), 19. approach to measuring the benefits of an ERP sys-
tem in manufacturing firms. Information Systems
Carlino, J., Nelson, S., & Smith, N. (2000). AMR
Management, (Winter): 18–25. doi:10.1201/107
Research predicts enterprise applications market
8/44912.22.1.20051201/85735.3
will reach $78 billion by 2004. Retrieved from
http://www.amrresearch.com/press/files/99518. Gefen, D., & Ridings, C. (2002). Implementa-
asp tion team responsiveness and user evaluation
of CRM: A quasi-experimental design study of
Clemons, E. K. (1991). Evaluation of stra-
social exchange theory. Journal of Management
tegic investments in information technol-
Information Systems, 19(1), 47–63.
ogy. Communications of the ACM, 34, 22–36.
doi:10.1145/99977.99985 Gorry, A., & Scott Morton, M. S. (1971). A frame-
work for management information systems. Sloan
Cooke, D. P., & Peterson, W. J. (1998, July). SAP
Management Review, 13, 49–61.
implementation: Strategies and results. R-1217-
98-RR, The Conference Board, New York, USA. Graeser, V., Willcocks, L., & Pisanias, N. (1996).
Developing the IT scorecard. London: Business
Davenport, T. H. (1998). Putting the enterprise into
Intelligence.
the enterprise system. Harvard Business Review,
(July/August): 121–131. Hares, J., & Royle, D. (1994). Measuring the value
of information technology, 7, 109-122.
Davenport, T. H. (2000). Mission critical—Real-
izing the promise of enterprise systems. Boston: Hicks, J. O. (1997). Management information
Harvard Business School. systems: A user perspective. Minneapolis/St.
Paul: West.
Davern, M. J., & Kauffman, R. J. (2000). Discover-
ing potential and realizing value from information Hitt, L. M., Wu, D. J., & Zhou, X. (2002). ERP
technology investments. Journal of Information investment: Business impact and productivity
Management Information Systems, 16, 121–143. measures. Journal of Management Information
Systems, 19(1), 71–98. doi:10.1201/1078/43199
Deloitte Consulting. (1998). ERP’s second wave—
.19.1.20020101/31479.10
Maximizing the value of ERP-enabled processes.
New York. Hochstrasser, B., & Griffiths, C. (1991). Control-
ling IT investment: Strategy and management.
Demmel, J., & Askin, R. (1992). A multiple-
London: Chapman & Hall.
objective decision model for the evaluation of
advanced manufacturing systems technology. Hong, K., & Kim, Y. (2002). The critical success
Journal of Manufacturing Systems, 11, 179–194. factors for ERP implementation: An organizational
doi:10.1016/0278-6125(92)90004-Y fit perspective. Information & Management, 40(1),
25–40. doi:10.1016/S0378-7206(01)00134-3
Emigh, J. (1999). Net present value. Computer-
world, 33, 52–53. Irani, Z., & Love, P. E. D. (2001). The propaga-
tion of technology management taxonomies for
Gartner Group. (1998). 1998 ERP and FMIS
evaluating investments in information systems.
study—Executive summary. Stamford, CT.
Journal of Management Information Systems,
17, 161–178.
1291
Achieving Business Benefits from ERP Systems
Irani, Z., Sharif, A. M., & Love, P. E. D. (2001). McFarlan, F. W. (1984). Information technology
Transforming failure into success through organi- changes the way you compete. Harvard Business
sational learning: An analysis of a manufacturing Review, (May/June): 98–103.
information system. European Journal of Infor-
Mirani, R., & Lederer, A. L. (1998). An instru-
mation Systems, 10, 55–66. doi:10.1057/palgrave.
ment for assessing the organizational benefits
ejis.3000384
of IS project. Decision Sciences, 29, 803–838.
Jutras, C. (2007). The role of ERP in globaliza- doi:10.1111/j.1540-5915.1998.tb00878.x
tion. Retrieved from http://www.aberdeen.com/
MIT. (n.d.). Economic performance in U.S. manu-
summary/report/benchmark/RA_ERPRoleinGlo-
facturing: An exploratory analysis. Economics,
balization_CJ_3906.asp
Finance and Accounting Working Paper #3419,
Kalling, T. (2003). ERP systems and the strategic Sloan School of Management, Massachusetts
management processes that lead to competitive Institute of Technology, USA.
advantage. Information Resources Management
Mullin, R. (1999). ERP users say payback is passé.
Journal, 16(4), 46–67.
Chemical Week, 161, 25–26.
Kaplan, R., & Norton, D. P. (1996). Using the
Murphy, K. E., & Simon, S. J. (2002). Intangible
balance scorecard as a strategic management
benefits valuation in ERP projects. Information
system. Harvard Business Review, (January/
Systems Journal, 12, 301–320. doi:10.1046/
February): 75–85.
j.1365-2575.2002.00131.x
Katz, A. I. (1993). Measuring technology’s busi-
MySAP ERP. (2007). Globalization with localiza-
ness value: Organizations seek to prove IT benefits.
tion. Retrieved from www.sap.com/usa/solutions/
Information Systems Management, 10, 33–39.
grc/pdf/BWP_mySAP_ERP_Global_Local.pdf
doi:10.1080/10580539308906910
Nandish, V. P., & Irani, Z. (1999). Evaluating
Klaus, H., Rosemann, M., & Gable, G. G. (2000).
information technology in dynamic environ-
What is ERP? Information Systems Frontiers, 2,
ments: A focus on tailorable information.
141–162. doi:10.1023/A:1026543906354
Logistics Information Management, 12, 32.
Mabert, V. M., Soni, A., & Venkataraman, N. doi:10.1108/09576059910256231
(2000). Enterprise resource planning survey of
O’Leary, D. E. (2000). Enterprise resource
U.S. manufacturing firms. Production and Inven-
planning systems: Systems, life cycle, electronic
tory Management Journal, 41(2), 52–58.
commerce, and risk. Cambridge: Cambridge
Marketwire. (2007). Thinking global? Don’t University Press.
lose sight of profitable growth. Retrieved from
Olhager, J., & Selldin, E. (2003). Enterprise
http://www.marketwire.com/mw/release_html_
resource planning survey of Swedish manufac-
b1?release_id=224493
turing firms. European Journal of Operational
Markus, L. M., & Tanis, C. (2000). The enterprise Research, 146, 365–373. doi:10.1016/S0377-
systems experience—From adoption to success. 2217(02)00555-6
In R.W. Zmud (Ed.), Framing the domains of IT
Olson, D. L. (2004). Managerial issues of enter-
research: Glimpsing the future through the past.
prise resource planning systems. McGraw-Hill
Cincinnati, OH: Pinnaflex Educational Resources.
International.
1292
Achieving Business Benefits from ERP Systems
Parker, M., & Benson, R. (1988). Information Seddon, P. B., Graeser, V., & Willcocks, L. (2002).
economics: Linking business performance to Measuring organizational IS effectiveness: An
information technology. London: Prentice Hall. overview and update of senior management
perspectives. The Data Base for Advances in
Porter, M. E., & Miller, V. E. (1985). How infor-
Information Systems, 33, 11–28.
mation gives you competitive advantage. Harvard
Business Review, 63, 149–160. Shang, S., & Seddon, P. B. (2002). Assessing and
managing the benefits of enterprise systems: The
Rackoff, N., Wiseman, C., & Ullrich, W. A. (1985).
business manager’s perspective. Information Sys-
Information systems for competitive advantage:
tems Journal, 12, 271–299. doi:10.1046/j.1365-
Implementation of a planning process. MIS Quar-
2575.2002.00132.x
terly, 9, 285–294. doi:10.2307/249229
Shang, S., & Seddon, S. (2000). A comprehensive
Remenyi, D., & Sherwood-Smith, M. (1999).
framework for classifying the benefits of ERP
Maximize information systems value by
systems. Proceedings of Americas Conference
continuous participative evaluation. Logis-
on Information Systems.
tics Information Management, 12, 14–25.
doi:10.1108/09576059910256222 Silver, M. (1990). Decision support systems:
Direct and non-directed changes. Information Sys-
Research, A. M. R. (2002). AMR Research pre-
tems Research, 1, 47–88. doi:10.1287/isre.1.1.47
dicts enterprise applications market will reach
$70 billion in 2006. Retrieved from http:www. Songini, M. C. (2004, August 23). Ford aban-
amrresearch.com dons Oracle procurement systems, switches
back to mainframe apps. Retrieved from http://
Reynolds, G. W. (1992). Information systems for
www.computerworld.com/softwaretopics/erp/
managers. Minneapolis/St. Paul, MN: West.
story/0.10801,95404,00.html
Ross, J. W., & Vitale, M. (2000). The ERP
Steadman, C. (1999). Calculating ROI. Comput-
revolution. Surviving versus thriving. Infor-
erworld, 33, 6.
mation Systems Frontiers, 2(2), 233–241.
doi:10.1023/A:1026500224101 Stewart, G., Milford, M., Jewels, T., Hunter, T.,
& Hunter, B. (2000). Organizational readiness
Sarkis, J., & Sundarraj, R. P. (2003). Managing
for ERP implementation. In Proceedings of the
large scale global enterprise resource planning sys-
Americas Conference on Information Systems
tems: A case study at Texas Instruments. Interna-
(pp. 966-971).
tional Journal of Information Management, 23(5),
431–442. doi:10.1016/S0268-4012(03)00070-7 Strassmann, P. (1985). Information payoff: The
transformation of work in the electronic age.
Schlack, M. (1992). IS has a new job in manufac-
London: Collier Macmillan.
turing. Datamation, (January 15), 38-40.
Tallon, P., Kraemer, K., & Gurbaxni, V. (2000).
Schultheis, R., & Sumner, M. (1989). Manage-
Executives’ perception of business value of infor-
ment information systems: The manager’s view.
mation technology: A process-oriented approach.
Boston: Irwin.
Journal of Management Information Systems,
16(4), 145–173.
1293
Achieving Business Benefits from ERP Systems
This work was previously published in Enterprise Resource Planning for Global Economies: Managerial Issues and
Challenges, edited by Carlos Ferran and Ricardo Salim, pp. 77-92, copyright 2008 by Information Science Reference
(an imprint of IGI Global).
1294
1295
Chapter 5.8
Experiences of Cultures in
Global ERP Implementation
Esther Brainin
Ruppin Academic Center, Israel
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Experiences of Cultures in Global ERP Implementation
system into an enterprise becomes the means power of integrative examination is in produc-
for achieving organizational standardization and ing helpful insights to poor global technology
integration. Hence, it can be viewed as an orga- implementation antecedents. Technology does not
nizational “boundary crossing” channel, and as constitute an entity per se, and despite its standard
such, ERP integration processes are more than engineering components, its preferred pattern
likely to face resistance to change. It is not surpris- of use can differ as a result of what Orlikowski
ing, then, that while companies worldwide have (2000) described as the diverse attributions of
made substantial investments in the installation meanings and power relation conceptions within
of ERP systems, difficulties in implementation and between organizations. The social construc-
and uncertain bottom-line benefits (Davenport, tion of technological systems (Bijker, Hughes, &
1998; Kumar & Hillegersberg, 2000; Robey, Pinche, 1987) as an interpretive theory maintains
Ross, & Boudreau, 2000) may be attributed to a that different types of user groups differ in how
failure in the implementation process (Brainin, they conceptualize, interpret, and exploit tech-
Gilon, Meidan, & Mushkat, 2005; Klein, Conn, nologies and their potential. Accordingly, the
& Speer-Sorra, 2001) rather than a deficiency in effective utilization of a technology is the result
the technology itself. of explicit and implicit “negotiations” between
The complexity of ERP implementation is groups of users regarding the desired use of the
exacerbated when ERP systems are globally technology and its organizational contribution and
implemented since the integrative nature of this significance. “Technology should be treated as
technology calls for the crossing of national or simultaneously social and physical and examine
regional, in addition to organizational boundaries. the interplay between the material characteristics
Since countries, regions, and organizations differ of technology and the social context within which
in their absorptive capacity (Lane, Koka, & Pathak, it is designed and deployed” (Grant, Hall, Wailes,
2006) and their societal and organizational culture & Wright, 2006, p. 4).
(Hall & Hall, 1990; Hofstede, 1980; Javidan, In the literature on culture, technology is
House, & Dorfman, 2004a; Trompenaars, 1996), viewed as a “cultural artifact” (Schein, 1992),
implementation of ERP systems in global enter- thus constituting an integral and inseparable part
prises requires a detailed examination of potential of organizational culture, which is reproduced in
gaps or inconsistencies in the interaction between everyday working routines. Consequently, global
new technologies, end users, and organizations in ERP systems must not be viewed only as large off-
different countries and/or regions (e.g., Boerma & the-shelf software solutions that provide integrated
Kingma, 2005; Dube & Robey, 1999; Krumbholz business and software systems to a customer,
& Maiden, 2001; Leidner & Kayworth, 2006). but also as cultural tools, mostly designed and
The approach taken here blends interpretive invented by the Western world but implemented
and positivist theories (Lee, 1991). The use of in diverse local/regional settings, all having dif-
interpretive theories enables portrayal of tech- ferent cultural characteristics (Davison, 2002).
nological systems as “cultural tools,” ascribed In fact, cultural differences may impede ERP
with different interpretations. Utilizing positivist implementation even when its diffusion occurs
theories opens the way for mapping cultural differ- within Western countries. Boerma and Kingma
ences between countries, scoring countries in ac- (2005) described Nestlé’s ERP implementation as
cordance with their societal culture characteristics, an example of a misfit between the decentralized
and examining the relationship between societal organizational culture of Nestlé and the central-
culture and various outcomes such as leadership ized culture imposed on the conglomerate by the
style, and economic and social indicators. The adoption of the ERP system. Their example high-
1296
Experiences of Cultures in Global ERP Implementation
lights differences in cultural attributes between sure. Consequently, the findings of the GLOBE
a preexisting organizational culture and the new project, an impressive research effort conducted
technological culture after ERP implementation. by 170 investigators from 62 countries, will be
The Nestlé study is an example of how ERP presented. This project measured culture at dif-
software packages, implemented in different ferent levels through both practices and values,
organizational contexts, force local cultures to and explored the relationship between culture
surrender to ERP mechanisms and logic that dis- and societal, organizational, and leadership ef-
regard local cultures and leadership styles. Such fectiveness (House, Hanges, Javidan, Dorfman,
an implementation process may result in poor & Gupta, 2004).
and delayed exploitation due to a misfit between The basic assumption here is that global
the cultural characteristics that are embedded in ERP systems are not universally acceptable
and represented through the new technology, and or effective, and that testing the cross-cultural
the target organization’s culture and its end user generalizability of ERP systems in organizations
practices and perceptions. will produce a managerial agenda that facilitates
Accordingly, transfer of technology from one the implementation process. Topics of explicit
region/country to another necessitates the addition concern to ERP implementation in global orga-
of the cultural dimension to Bijker et al.’s (1987) nizational economies related to organizational
theory of the social construction of technology and societal culture, and proposal for managerial
among end users. Leidner and Kayworth (2006), mechanisms for overcoming major obstacles in
who reviewed 86 studies on the cultural dimen- this process will be addressed. The first section
sions of ERP implementation, suggested the term of this discussion provides a brief overview of the
“technology cultural conflict” to “…lend insights dimensions of organizational and societal culture.
into the understanding of the linkages between IT This is followed by a description of the stages
and culture” (p. 357). of ERP implementation and the actors involved
Cultural dimensions are entwined in technol- in the process at every stage. Building upon this
ogy implementation on different levels of analysis review, recommendations are proposed for the
and operation (e.g., societal, organizational). relationships between ERP implementation and
This chapter outlines the various stages of ERP cultural dimensions. The conclusion summarizes
implementation, indicating the potential for cul- the key points drawn from the analysis.
tural discordance or concordance at every stage.
Managers and end users are defined as actors
during this long process. They are likely to be “sOcIEtAL cULtUrE”
involved in ERP implementation from the initial AND Its IMPAct ON
stage of strategic planning and decision making, OrGANIZAtIONAL cULtUrE
and continue their involvement by leading and
championing the implementation using goal set- Cultural factors take center stage in the discussion
ting, feedback, and reward techniques. Clearly, of global ERP implementation. Implementation
global ERP implementation positions manage- of the same technology in different countries
rial and leadership practices in a multicultural produces various cultural encounters that may
context. Past research relating societal culture facilitate or inhibit its exploitation (Ford et al.,
to IT implementation was based on Hofstede’s 2003). Thus, the concept of organizational and
pioneering work (e.g., Ford, Connelly, & Meister, societal culture should be addressed. Work orga-
2003). However, it would be unwise to assume any nizations are distinguished by social experiences
aspect of reality is quantifiable by a single mea- that can be called “cultures.” Such experiences,
1297
Experiences of Cultures in Global ERP Implementation
however, do not necessarily represent the orga- that develops its own unique dimensions because
nization as a whole. In this sense, organizational of differences between tasks, expertise/occupa-
culture is itself organized into various work set- tions, and activities (Huang, Newell, Galliers, &
tings (Frost, Moore, Louis, Lundberg, & Martin, Pan, 2003; Rousseau & Cooke, 1988; Sackmann,
1985) and produces a form of locally recognized 1992; Trice, 1993). It is suggested that these dif-
and common social knowledge, similar to the com- ferent views be addressed as two perspectives that
mon knowledge that develops within a clan. The complement each other.
organizational culture is the glue holding a group
of people together. It is produced over a period Methodological Issues related to
of time, and helps solve the group’s problems of the Examination of Organizational
internal integration and survival in an external and societal culture
environment (Schein, 1992). At the same time, on
a different level of analysis, employees working Organizational culture has different layers of
in the same local societal culture share the same depth, ranging from the most visible layers of
societal meaning system (Hofstede, 2001), which artifacts, practices, and behavior, to the less visible
supports their adaptation to their local organiza- layers of values and basic assumptions (Schein,
tion. A shared meaning system can be formed at 1992). The multiplicity of organizational cultural
different levels, from the micro level of the group layers and the range of areas that they cover make
or team, the meso level of the organization, up to them difficult to study. Societal culture differences
the macro level of nations and beyond (Shokef in various organizations are visible only if the
& Erez, 2006). same research methodology is used; but a study
The question arises whether organizational that examined how societal culture is reflected in
culture is a reflection of societal culture, or orga- an organization’s culture encountered immense
nizations are culture-producers. The open system problems when researchers from many different
theory builds on the principle that organizations countries were required to cooperate and use the
are ‘open’ to their environment, and devote a great same metrics, as was the case at the GLOBE
deal of attention to understanding their immedi- research project (House et al., 2004).
ate tasks or business environment, through direct Other researchers have argued that the descrip-
interactions with their customers, competitors, tion of organizational culture as a set of shared
suppliers, labor unions, and government agencies. assumptions is rather oversimplified and mislead-
All these stress the importance of being able to ing. Myers and Tan (2002) asserted that even the
bridge and manage critical boundaries and areas concept of a “national culture” is problematic since
of interdependence, and develop appropriate the nation-state is a relatively recent phenomenon,
operational and strategic responses. Thus, the has continued to change in its form and makeup,
surrounding societal culture is an external source and is composed of more than one cultural group.
of influence on organizational culture through Martin (2002) proposed that the attribution of
the behavior of organizational members who meaning (which is a central part of the cultural
introduce their beliefs, norms, and values into process) is complicated because of cognitive and
the organization. Thus, consistent with the open normative diversity within an organization, and
systems theory, we expect to find systematic so- leads to integration as well as fragmentation, to
cietal variations over and above within-societal unity as well as diversity. It is the actor’s reality
differences. Yet individual organizations may also that forms the basis for further action—people
have their own unique culture: organizational produce and reproduce organizations by means of
culture can be examined as an independent entity actions and interactions on a daily basis (routine).
1298
Experiences of Cultures in Global ERP Implementation
Furthermore, culture research has been difficult understanding of how attributes of societal and
to conduct (Straub, Loch, Evariso, Karahanna, & organizational cultures affect selected organiza-
Srite, 2002) due to the lack of clear concepts or tional practices. This assumption is the key issue
measures of culture. Another issue is what particu- in global ERP implementation.
lar level of culture one should study (Pettigrew, Researchers who have explored the link be-
1990). Some researchers argue that culture cannot tween information technology and organizational
be objectively analyzed at a single level. Straub culture claim that a firm-level study of culture’s
et al. (2002), for example, suggested a more real- influence on the use of information systems
istic view of culture. In these researchers’ views, should not only examine organizational culture,
individuals are simultaneously influenced by an but also its possible interaction with national or
array of cultural values on the national, ethnic, organizational sub-culture values and how these
organizational, or even sub-cultural levels. interactions potentially influence behaviors (Dube
A final difficulty in studying organizational & Robey, 1999; Kaarst-Brown, 2004; Leidner &
culture relates to the content under investiga- Kayworth, 2006). At the same time, they assert
tion, which is exceptionally large, since culture that in studying cross-cultural differences, research
refers to the process of meaning construction and should address three types of methodological
sense-making. Thus, any attempt to measure and biases that have not been sufficiently taken into
describe culture in general, and organizational account (e.g., Hofstede, 1980): construct bias,
culture in particular, must focus on certain parts method bias, and item bias. However, the GLOBE
of the specific culture and disregard other ele- project’s very adequate dataset was able to repli-
ments. Nonetheless, the necessity to improve cate and extend Hofstede’s landmark study. It was
research methodologies regarding cross-cultural able to test hypotheses relevant to relationships
differences does not reduce the impact that among societal-level variables, organizational
culture has on differences in work behaviors in practices of three different industries’ sectors
general (Erez & Earley, 1993) and in information (financial, food, and telecommunications) in ev-
systems implementation in particular (Leidner & ery country, and leader attributes and behavior.
Kayworth, 2006). Furthermore, the data was sufficient to replicate
middle-management perceptions and unobtrusive
societal culture and Globalization measures.
The project consisted of three phases related
Many firms struggle with the interpretation, to three empirical studies: Phase One was devoted
implementation, and impact of globalization on to the development of scales that assess organiza-
their everyday operations. Adopting a global tional and societal culture, and culturally shared
mindset challenges managers and companies to implicit theories of leadership. Evidence for con-
look beyond their own operations so that they struct validity of the culture scales was provided
may improve their practice of global management from several sources such as Hofstede (1980)
beyond the experience provided by their local busi- and Schwartz (1992) (for a detailed description,
nesses. The importance of international thinking see Hanges & Dickson, 2004). Phase Two was
lies in its “ability to serve as a bridge between devoted to the assessment of nine core attributes
the home country (i.e., the head office’s country) of societal and organizational cultures. The nine
and the local sites’ environments, playing the role cultural dimensions that served as independent
of cultural interpreter for both sides” (Jeannet, variables in the GLOBE program are: uncertainty
2000, p. 37). The road map to strategic global avoidance (Hofstede, 1980), power distance (Hof-
competitiveness assumes that managers have an stede), institutional collectivism (Triandis, 1995),
1299
Experiences of Cultures in Global ERP Implementation
in-group collectivism (Triandis, 1995), gender knowledging and appreciating cultural values,
egalitarianism (based on Hofstede’s Masculinity practices, and subtleties in different parts of the
index), assertiveness (based on Hofstede’s Mas- world. McDonald’s is an illuminating example
culinity Index), future orientation (Kluckhohn of cultural sensitivity. In France, McDonald’s
& Strodtbeck, 1961), performance orientation serves wine and salads with its burgers. In India,
(McClelland, 1961), and human orientation where beef products are taboo, it created a mut-
(Kluckhohn & Strodtbeck, 1961; Putnam, 1993). ton burger named Maharaja Mac. To succeed in
When quantified, these attributes were referred global business, managers need the flexibility to
to as cultural dimensions, and 62 societal cultures respond positively and effectively to practices and
were ranked accordingly, testing hypotheses about values that may be dramatically different to what
the relationship between these cultural dimen- they are accustomed. However, it is not easy for
sions and several important dependent variables one to understand and accept practices and values
such as economic prosperity, success in basic that are different from one’s personal experiences.
science, societal health, life expectancy, and so The GLOBE research project has shown that the
forth. Phase Two also investigated the interactive status and influence of leaders vary considerably
effect of societal-cultural dimensions and industry as a result of the cultural force in the countries or
(finance, food processing, and telecommunica- regions in which the leaders function.
tion) on organizational practices and culturally
endorsed implicit theories of leadership (House et
al., 2004). By measuring these cultural dimensions stAGEs AND ActOrs IN
across 62 countries, the GLOBE project liber- tEcHNOLOGIcAL cHANGE
ated organizational behavior research from U.S.
hegemony in theory and practice. It is a valuable Technological change entails a long process in-
database that can serve as an important tool for volving different types of actors in each of several
designing global project interventions. stages. Beyond having significant implications for
In Phase Three, the impact and effectiveness of the organization’s form and function, the decision
specific leadership behaviors and styles of CEOs to purchase an ERP system for global implementa-
on subordinates’ attitudes and performance over tion necessitates a heavy investment of resources.
three to five years were investigated. This phase The uncertainty surrounding the decision and its
also included testing of the moderating effects of implications, as well as the implementation itself,
culture on relationships between organizational lengthens and complicates the process. In the
practices and organizational effectiveness. developing body of academic literature related
It seems clear that an ERP system that is to ERP project implementation, researchers un-
developed in one specific region or state and derline that it is important to divide ERP project
implemented in another region (the regions may implementation into several phases or levels,
differ only in the language spoken) constitutes suggesting ‘key activities’ to be included in every
an inter-cultural encounter that generally ends in phase (Al-Mudimigh, Zairi, & Al-Mashari, 2001;
conflict on one level or another. These encounters Markus & Tanis, 2000; Parr & Shanks, 2000) and
must be managed and implementation processes using critical success factors (CSFs) for planning
must be planned to cope with the diverse gaps and and monitoring ERP implementation. Dividing
expectations. The latter can create antagonism the process into stages and checking to see that
among end users at different levels, leading to the target is met at each stage may alleviate some
partial or deficient implementation. Therefore, degree of uncertainty and allow proper oversight,
one of the most important challenges is ac- including clear definition of starting and ending
1300
Experiences of Cultures in Global ERP Implementation
points for every stage. Parr and Shanks (2000) Initiative stage
related to the latter as “realistic milestones and
end date…” (p. 293). The need for a new global ERP system in an or-
Although the purchase of the system can be ganization can emerge as a result of institutional
viewed as the first stage in the implementation isomorphism, a technology crisis or inadequacy,
process, there is a consensus among researchers new technology boost, or global business de-
that organizational events and actions that precede velopment. In listing the reasons for adopting
the purchasing stage impact system selection enterprise systems, Markus and Tanis (2000)
and its eventual implementation. These stages differentiate between small companies’ and large
are referred to by Al-Mudimigh et al. (2001) companies’ reasons, and identify them as techni-
as “strategic levels,” including current system cal vs. business reasons (p. 180). In most cases,
evaluation, having a clear sense of vision and actors, within or from outside of the organization,
objectives, and implementation strategy. While identify a need or decide to promote technological
Parr and Shanks (2000) relate to the first stage as change by initiating the implementation process.
the “Planning” stage, including clarification of the As a result of such actions, a careful review of
system rationale and determination of high-level the technological change should be conducted
project scope, Markus and Tanis (2000) call this through strategic planning before any decision
stage the “Chartering Phase” and it includes the is made. ERP implementation calls for a major
use of a sound business case for a sound assess- organizational transformation, which must be
ment of business conditions and needs. The fol- planned strategically and implemented thoroughly.
lowing proposed implementation stages can serve The process of strategic planning starts with
as a common denominator to the above models. identifying the impetus for changes in the com-
They are proposed to address the implementation pany’s business and IT systems, and their expected
process as composed of five stages (most models strategic and operational benefits. This process
pertain to four stages only)—three of them occur helps people understand the need for change;
before the new technology is introduced into the it sparks their interest in it and promotes their
organization, and the final two stages occur fol- commitment to the process (Adams, Sarkis, &
lowing the introduction of the system. Although Liles, 1995; Al-Mashari, 2003). Strategic planning
several stages may overlap, it is correct to address associated with ERP implementation relates to
each as a separate stage and manage the progress process design, process performance measure-
from one stage to the next based on achieving the ment, and continuous process improvement,
targets in each stage. also known as business process reengineering
Many organizational actors in the organization (Hammer & Champy, 1993). Additionally, it deals
and its environment are involved in the implemen- with critical success factors in early phases of
tation process, yet their level of involvement may ERP implementation (Nah, Zuckweiler, & Lau,
vary from stage to stage. While the organization’s 2003). In classical strategic planning, employees
senior managers are the dominant and central or representatives from all organizational ranks
actors in the initial stages of the process, respon- are commonly co-opted into the process. The case
sibility passes to project supervisors appointed by of ERP implementation at Texas Instruments (TI)
management, and to end users, as the implementa- described by Sarkis and Sundarraj (2003) illus-
tion process proceeds. Stages that occur before trates how market forces compelled TI to make a
the system is delivered to the organization include radical shift in its business. TI’s strategic response
the following. to these changes identified flexibility and time
(speed) as the key strategic performance metrics
1301
Experiences of Cultures in Global ERP Implementation
that had to be stressed for them to be competitive at this stage, ensuring the involvement of users in
in their business. As a result, this is what they system development is an important mechanism
focused on when designing and implementing a for improving system quality and utilization
new ERP system for the company. Al-Mudimigh (Baroudi, Olson, & Ives, 1986). Sounder and
et al. (2001) suggested that a company’s decision Nashar (1995) referred to the matching process
whether to engage in business process reengineer- between new technology and end user needs as
ing before, during, or after ERP implementation the “transfer of technology between a developer
depends on the company’s specific situation. and a user” (p.225), and suggested that “failures
(of transfer) often occur as a consequence of
Decision stage many natural barriers within the transfer process
(e.g., a developer’s choice of an inappropriate
This stage leads to a decision to invest resources technology or a user’s risk aversion).” Leonard-
in acquiring and assimilating a new system. When Barton and Sinha (1993) stressed that effective
deciding to allocate resources for the purchase internal technology transfer—the implementation
of a global ERP system, a cost assessment that of technical systems developed and disseminated
includes cost estimations made by representatives to operational sub-units within a single organiza-
of all operational departments (e.g., logistics, tion—depends not only upon the cost, quality, and
training) must be performed. In addition to the compatibilities of the technology, but also upon
cost of the system, this must also include the two processes of interaction between developers
costs of implementation processes. It is standard and users: user involvement in development, and
practice today to assume that 18% of an ERP adaptation by the developers and users of both the
implementation budget should be reserved for technical system itself and the workplace. A link
implementation and consulting (Gartner Group, between producers and users is needed to ensure
2006). The assured availability of resources for a good fit of any global new ERP system to the
the entire implementation process is an important organizations that must implement it.
variable in predicting implementation quality Global ERP technology is based on “best
(Klein et al., 2001). practices” solutions, an ideal recipe for the most
Between the second and third stages, it is effective performance of business functions.
important to examine which system best answers Still, the organization must ask whether standard
the organizational needs defined in the strategic solutions fit its organizational requirements. Off-
planning process. Organizational suitability is the-shelf ERP software packages are implemented
a compulsory condition, but it is not enough to in different organizational contexts, which often
ensure successful implementation. Transforming deviate considerably from the context in which
an off-the-shelf product into one that is appropriate these packages were originally designed and
for a specific organization requires customization. developed. Boersma and Kingma (2005) noted
In this process it is essential that developers meet that the structure of ERPs typically requires the
users, therefore potential end users of the new redefinition of work from the actor’s point of view.
system should be involved in the selection process. At this point it is important to nominate the
project leader who will manage the fourth and
selection and Leader fifth stages of the implementation process and
Nomination stage achieve the organizational improvements that the
new system was designed to accomplish. Hammer
A development or selection process leads to an and Champy (1993) suggested that the implemen-
order to produce a new technological system. Thus, tation project leader establish a number of teams
1302
Experiences of Cultures in Global ERP Implementation
composed of potential end users, representing all of integration and the selective incorporation of
the operational units where the new system will be existing socio-technical practices with new ones”
implemented. The number of teams depends on the (p. 225). Thus it is important to acknowledge that
quantity and quality of operational processes that organizational actors can respond and influence
will be forced to undergo massive changes during ERP implementation.
system implementation. The teams should analyze
the future changes and find solutions to problems routine Operations stage
that are likely to occur during the implementation
stage. The leader operates as an advisor, assisted In this final stage of ERP implementation, the new
by a steering committee comprising the senior system becomes established and the employees
managers who are in charge of decision making who operate it adopt stable work patterns. At this
during the process. Two of their most important stage, the organizational improvements resulting
tasks are to define priorities among the various from system operation should be tested, and project
change processes and to arbitrate the conflict of leaders should conduct a post-project review of the
interest disputes that are almost certain to arise. entire process in order to achieve what Markus and
The final two stages occur after the new system Tanis (2000) called “technological and business
is delivered to the organization. However, several flexibility for future developments.”
activities must be performed between the third and Cultural dimensions impact the entire change
fourth stages, in order to ensure a smooth transfer process yet play varying roles in the different
of responsibility for the implementation and the stages of the ERP implementation process. Since
new system operation to the end users. implementation methods are culturally dependent,
they should be planned in advance after careful
basic Operational stage scrutiny of organizational and societal cultures.
1303
Experiences of Cultures in Global ERP Implementation
incompatibility between technology and organi- that the analysis of the link between the imple-
zational structure results in lowered performance. mentation phases and cultural influences relates
Donaldson believed that in such cases the organiza- to specific cultural manifestations, since any at-
tion will eventually make an adjustment to restore tempt to measure and describe culture in general,
compatibility between the new technology and and organizational culture in particular, must be
the organizational structure (SARFIT—structural concerned with certain parts of the culture only.
adjustment to regain fit). Applying Donaldson’s In the context of information technology, an
argument to global implementation, cultural important point to be made is that information
adjustment must also be addressed to achieve ad- technologies are not culturally neutral and may
equate compatibility (Krumbholz & Maiden, 2001; come to symbolize a host of different values driven
Sheu et al., 2004). Implementation of global ERP by underlying assumptions and their meaning,
systems implies that management must have an use, and consequences (Coombs, Knights, &
international perspective, or what Jeannet (2000) Willmott, 1992; Robey & Markus, 1984; Scholz,
referred to as a “global mindset.” 1990). Using a value-based approach reveals the
In the various stages of global ERP implemen- types of ‘cultural conflicts’ that might arise from
tation, different encounters with cultural mani- the development, adoption, use, and management
festations are to be expected. Thus, a cross-level of IT (Leidner & Kayworth, 2006). Thus, some
analysis of cultural issues is indispensable. To un- implementation phases are influenced by the
derstand the interface between culture and global international, national, regional, and/or business-
ERP implementation, the difference between level culture, while other phases are influenced by
treating organizations as “culture producers” the culture an organization produces. It should be
(Rousseau & Cooke, 1988) or as the reflections of emphasized that implementation of a global ERP
the national-societal culture surrounding the orga- system constitutes a force for cultural change,
nization must be examined. These two approaches and new cultural dimensions may be expected to
can be seen as complementary. Although organi- emerge in the assimilating organization at the end
zational culture is an internal attribute of an orga- of the process. In this sense, organizational culture
nization, Erez and Earley (1993) pointed out that is conceptualized as both a dependent and inde-
studies that focus only on the internal dimensions pendent variable. The purpose of portraying the
of organizational culture, without considering the cultural interface in global ERP implementation is
broad cultural context in which the organization to disclose the discrepancies and inconsistencies
operates, are deficient. The question of the impact that must be addressed to restore fit or reduce cul-
of the broader culture when examining the culture ture conflict, with the end result being heightened
of a specific organization has been considered in global ERP implementation effectiveness.
numerous studies (e.g., Hofstede, 1980; Schwartz, Mapping the link between the societal and or-
1992; Trompenaar, 1996). These studies ranked ganizational culture and the global implementation
approximately 60 countries according to cultural of ERP systems requires us to relate separately to
characteristics such as individualism/collectivism, the three initial stages, as described before, which
power distance, uncertainty avoidance, universal- take place prior to the installation of the system,
ism/particularism, affective/neutral culture, and and to the last two stages, which occur after the
specific/diffuse culture. organization has received the system. When a
In line with this, the following analysis of the global organization decides to introduce an ERP
interface between culture and ERP implementation system into its various worldwide branches, senior
relates both to organizational and societal-national management is responsible for executing the first
culture manifestations. It is important to stress three phases, as outlined above. The decision to
1304
Experiences of Cultures in Global ERP Implementation
acquire a new system is one that is forced upon the sequence of countries in which the system is
the organization’s distant branches, which do implemented.
not have the authority to make decisions of this
type. In contrast, the fourth and fifth stages are The Initiating Stage
within the range of authority and responsibility of
the individual sites, and consequently, the latter At this stage it is important to discover the de-
must plan and implement these stages effectively. gree of receptivity of companies in a particular
Only the local office (in which the organizational culture (represented by a nation) to certain types
management resides) carries out all five of the of innovations, compared to companies in other
stages. Assuming that the implementation is to cultures. This knowledge reflects the overall
be executed in a number of countries, the cultural ‘technological leap’ that could be expected to
implications of the global change involved in occur as a result of global ERP implementation.
the first three phases need to be discussed by the This course of action is supported by empirical
central senior management. Stages four and five findings from several studies. Van Everdingen and
are assumed to be executed by the organization’s Waarts (2003) compared ERP implementation in
local subsidiaries. 10 European countries and found that “national
culture has a significant influence on the country
the Importance of societal adoption rate” (p. 217). The extent of cultural open-
culture in the First three stages ness (accommodation of another’s culture) has a
of ErP Implementation strong positive influence on the degree to which
the technology transfer is successful (Hussain,
The product or end result of the first three stages 1998). IT is less readily adopted in risk-averse
is: (1) the decision to invest resources in acquiring and high power distance cultures since technol-
a global information system, and (2) the selection ogy is perceived as inherently risky (Hasan &
of a suitable system. The central axis around Ditsa, 1999; Png, Tan, & Wee, 2001; Srite, 2000;
which these decisions are made is the process of Thatcher, Srite, Stephina, & Liu, 2003). Thus, the
strategic thinking. impetus for acquiring a global ERP system will
There are long-term implications of the strate- most likely come from countries that have the
gic planning by firms’ intent on becoming global cultural characteristics that allow them to cope
enterprises. Such strategic planning requires a with change and uncertainty. Findings from the
balanced choice between strategic decisions in- project GLOBE related to future orientation can
volving numerous variables such as values and be used to assess a country’s openness to change
problem-solving methods of owners, managers, and flexibility. Societies that score higher on
and end users; formal recruitment procedures; future orientation tend to achieve economic suc-
reward systems; and regulation and control pro- cess, have organizations with a longer strategic
cesses. As a company expands internationally, it orientation, have flexible and adaptive organiza-
needs to fit its corporate culture to the various tions and managers, and so forth. The two most
societal cultures of its overseas operations to future-oriented countries are Singapore and Swit-
obtain the maximum benefits of the new imple- zerland, and the lowest are Argentina and Russia
mented system. (Ashkanasy, Gupta, Mayfield, & Trevor-Roberts,
Given that we are discussing a complex pro- 2004, p. 304). Studies on India and Southeast and
cess of change, the cultural issues in this process East Asia showed a process of strategic planning
take on critical significance since they may affect quite distinct from the rational approach dominant
in the West. Haley and Tan (1999) observed that
1305
Experiences of Cultures in Global ERP Implementation
“strategic planning in South and Southeast Asia appropriate action to sell the system to end users
has developed into a process which is ad-hoc and convince them of its benefits.
and reactive, highly personalized, idiosyncratic
to the leader and which uses relatively limited The System Selection and
environmental scanning” (p. 96). Leader Nomination Stage
The Decision Stage In the third global ERP implementation stage, two
pivotal events must take place: system selection
The decision to invest resources in a new system and nomination of a leader to oversee the project.
must be made only after a strategic process is
undertaken by the parent company. This process system selection
will also help the parent company decide how
and in what order the system is to be distributed At this stage, managers are shown a demonstration
to different countries. Such decisions are cultur- of the system under consideration. Differences
ally endorsed. Moreover, target country selection in perceptions between developers of the system
has two important implications. The first relates and managers of the purchasing organization
to the examples given in our description of the constitute an important consideration in the stra-
first phase. The parent company must anticipate tegic process of choosing a system. Leidner and
differences among the implementing countries in Kayworth (2006) claimed that variations across
terms of their abilities to cope with change. The cultural values may lead to differing perceptions
higher the implementing country is in uncertainty and approaches in the manner in which information
avoidance and power distance, the more resources systems are developed. Thus managers should be
should be allocated to them for the implementa- aware that the system reflects the developers’ view
tion process. Support by the parent company may of the cultural organization, which might deviate
greatly alleviate problems that such countries considerably from that of their own organization
encounter in the implementation process. or its strategic needs. These differences were
Second, different countries may have differ- conceptualized by Hazzan and Dubinsky (2005)
ent perspectives on the strategic goals of the new in their discussion of the connections between
system based on differences in societal values. For a national culture and the culture inspired by
instance: Service quality dimensions function dif- software development methods. According to
ferently across national cultures (Kettingen, Lee, their proposed model of the tightness of Software
& Lee, 1995). Information privacy concerns were Development Methods (SDM) and the tightness
found to vary across countries: countries high in of a national culture, the fitness of a given SDM
uncertainty avoidance and power distance ex- and a national culture can predict the degree to
hibited higher levels of government involvement which a given SDM will be accepted by a specific
in privacy regulation (Milberg, Burk, Smith, & national culture. Thus, the system developers and
Kallman, 1995). the organization’s IT people must be involved in
Since agreement on strategic goals is an impor- the ERP selection process.
tant condition for implementing and exploiting the Since IT developers are in charge of technical
new IT system, early mapping of the differences in assistance during the implementation processes,
the perception of these goals is imperative. Gaps it is important to understand that this assistance is
will appear as a result of differences in national also culturally dependent: Hassan and Ditsa (1999)
cultures, but knowing about them beforehand found that IT staff are able to give advice to IT
will allow the system’s implementers to take managers in countries with low power distance.
1306
Experiences of Cultures in Global ERP Implementation
This finding has implications for the fourth stage of the organization worldwide. The products of
of implementation as well, in which end users these stages should include: the exploitation of
operating the system require technical assistance the new system, final customization of the system
in coping with problems that emerge. However, to the needs of end users and to the special needs
when cultural differences between the developer’s of specific organizations, a post-project review
support personnel and end users are significant, process, and a cultural change in the organization
they may impede the implementation process. (if required).
The central axis around which these stages
Project Leaders for Global revolve relates to employee management, and it
ErP Implementation involves classic areas in organizational behavior
and human resource management such as training,
Global ERP implementation implies confront- learning, and performance goal setting and reward.
ing work situations charged with dynamic In these stages of the process, the relevant
cultural issues. Elaborating effective solutions cultural dimensions concern the differences within
for global implementation activities, influenced the organizational culture. An organizational
by nuances of culture, pose difficult challenges culture is not uniform; it comprises horizontal as
that may confound even the most skilled leader. well as vertical sub-cultures. A horizontal sub-
Brake, Walker, and Walker (1995) portrayed the culture may be created on the basis of professional
ideal global implementation leader as a strategic practices—a sub-culture of physicians, nurses,
architect-coordinator who is able to recognize op- and managers (Trice, 1993). Similarly, a vertical
portunities and risks across national and functional sub-culture may emerge, based on the organiza-
boundaries, and is sensitive and responsive to tional structure—a sub-culture of the production
cultural differences. The implementation project department, the R&D department, or the HR
leader should have a “global mindset” since global department (Schein, 1996), or a sub-culture of
ERP system implementation requires fundamental technology-intensive departments as opposed to
changes in managerial practices in domestic as low-technology departments (Brainin et al., 2005).
well as international organizations. The GLOBE These sub-cultures imply that there will be differ-
project offers detailed examples of the cultural ences in the implementation of the new IT system
manifestation of countries and leadership attribu- because each sub-culture perceives the role and
tion. The GLOBE’s major empirical contribution function of the IT system in its work differently.
to this stage in the implementation process was its This process of ascribing meaning to technology
identification of universally desirable and cultur- is labeled the “social construction of technology.”
ally contingent attributes of leadership. GLOBE’s Furthermore, different occupational sub-cultures
findings showed the relationships among cultural have entirely different cultural interpretations of
dimensions, organizational practices, and cultur- proposed technologies, and experience conflict
ally endorsed leadership dimensions. and resistance to adopting certain technologies
(Von Meier, 1999). Researchers found that clash-
the Importance of Organizational ing values among organizational sub-cultures
culture in the Fourth and Fifth hinder the information sharing and collaboration
stages of ErP Implementation needed to effectively integrate technology.
In this stage it is important to appoint champi-
Transfer of technology from the manufacturer to ons of technological change from within the orga-
the end-user begins when the decision is made nization (Howell & Higgins, 1990) to effectively
to implement the system in different branches lead the implementation process. Management
1307
Experiences of Cultures in Global ERP Implementation
style also influences the implementation approach will likely amplify. As a means to integrate work
and project duration. Management style relates to processes, ERP implementation becomes a method
the attitude toward setting priorities for implement- for organizational boundary crossing and requires
ing an ERP system (Sheu et al., 2004). It must be special handling to overcome the resistance this
stressed that societal culture also has an influence change induces. The above discussion provides a
on the organization’s activities, and therefore the detailed examination of the cultural discrepancies
techniques used in human resource management, that arise at various stages of the implementation
as explained above, must be adapted to the local process. Cultural boundaries to be crossed as a
culture, for example, societal culture was found result of global ERP implementation within the
to influence instruction processes (Earley, 1994), organization include: organizational sub-cultures
goal setting (Erez, Earley, & Hullin, 1985), and as a result of organizational structure, and orga-
many other areas. nizational sub-cultures as a result of different
There are organizational culture characteristics professions and roles. Further, between organiza-
that facilitate technology implementation. Organi- tions this includes societal culture as a result of
zations with a high learning orientation are better cultural differences between countries.
able to adjust to changes on the whole (Lipshitz, To overcome the problems arising from global
Popper, & Oz, 1996), and to technological changes ERP implementation, it was suggested that cross-
in particular (Brainin & Erez, 2002; DeLong & ing the cultural boundary be treated as a process of
Fahey, 2003), because they have learning chan- cultural exchange, instead of as a cultural conflict.
nels and can learn from experience. This is a In order to restore fit and to prevent poor global
very important condition for implementing new ERP implementation and resistance to change,
technology. Global ERP implementation can result managers must harness the ERP systems to their
in culture transformation over time. needs by adapting it to their set of beliefs, thereby
breaking the link between technology and Western
logic. It requires them: to simultaneously examine
cONcLUsION their positions and behaviors and those of end users
regarding ERP use, and analyze their reciprocal
A Managerial Agenda for a Positive impact; to help formulate policy regarding utiliza-
cultural Experience during tion of ERP systems in different organizational
Global ErP Implementation settings across countries or regions; to coordinate
expectations between themselves and end users
The preceding discussion set forth to explain how in order to narrow the cultural gap; and to raise
variations in cultural aspects, which surface as the consciousness of ERP engineers and designers
a result of global ERP implementation, may be regarding the impact of differences in the socio-
handled, based on the assumption that global ERP cultural attributes of potential managers and end
systems are not universally acceptable and effec- users, and hence increase their effective fit into
tive. The increasing interrelations among countries different societies.
and the globalization of corporations do not imply The following recommendations are proposed:
that cultural differences are disappearing or dimin- Organizational leaders must be made aware of
ishing. On the contrary, as economic boundaries cultural differences and be prepared to cope with
are eliminated, cultural barriers may present new them. Financial resources must be available to
challenges and opportunities in business. When allow investment in a complete mapping of the
different cultures come into contact, they may cultural gaps that may manifest themselves in
converge in some aspects, but their idiosyncrasies the second implementation stage. Multicultural
1308
Experiences of Cultures in Global ERP Implementation
groups of project managers—glocal teams—and of cultural dimensions for each society, it does
team leaders (see Appendix) can overcome the not present a behavioral profile. Future research
lack of communication between the host and related to differences in societal culture is required
subsidiaries that often results in mistrust, proj- to build up in-depth understanding of how people
ect delay, and budget overruns. Moreover, such actually function and manifest different cultural
groups will foster informal communication among attributes, to investigate how different cultural
representatives of different nationalities, which dimensions interact, and what the relative impor-
is critical for the success of global ERP projects, tance of each dimension in understanding each
and will limit formal documentation channels that culture is (Javidan et al., 2004b). The suggested
people tend to use in the absence of such groups. managerial mechanisms proposed for formulating
Solutions may include: policy regarding utilization of ERP systems in
different organizational settings across countries
1. Multi-national teams for developing and or regions was the establishment of multicultural
implementing as a key to success groups of project managers—glocal teams—and
2. Local examination of the technological leap appointing team leaders. However, multicultural
3. Flexibility in implementation stages—even teams can face high levels of conflict and mis-
if the strategic stages were carried out in understandings. Such teams need to develop a
a deterministic fashion (were imposed on shared meaning system through socialization to
the organization), the later stages may al- the team, and through contacts and interactions
low participative actions and be culturally among team members. Their ability to serve as
appropriate. ‘mediators’ and represent their countries is con-
4. Involving users in the design of global ERP tingent upon collaboration dynamics that must
systems—although determining the key ac- overcome cultural differences. Research related
tors in user groups is especially challenging to multicultural teams is scarce (Earley & Gib-
in international settings, their involvement son, 2002; Earley & Mosakowski, 2000; Erez &
may partially assuage subsequent perception Gati, 2004). Shokef and Erez (2006) suggested
conflicts since the greater the extent to which that a ‘glocal’ identity represents both the global
a user’s group values are embedded in a identity and a strong local identity, and it seems to
system, the less vision conflict is expected. enable individuals to shift from one social context
to another. Future research is needed to explore
The chapter addressed aspects of organiza- the coexistence of multiple identities and its con-
tional and societal culture that are of explicit tribution to glocal team work. Another research
concern to ERP implementation in global organi- challenge relates to the issue of team leaders for
zational economies, and recommended managerial multicultural teams—what are adequate selection
mechanisms for overcoming major obstacles in and training processes? Current theories in man-
this process. agement and psychology do not provide sufficient
frameworks to explain the successes or failures of
people working and managing in foreign cultures.
FUtUrE rEsEArcH DIrEctIONs It is suggested that the measure of one’s ‘cultural
intelligence’ (CQ) be used as a predictor of an
Cultural differences may impede global ERP outsider’s natural ability to interpret and respond
implementation. Although the GLOBE project, to unfamiliar signals in an appropriate manner
used in this chapter to recognize and discuss dif- (Earley, Ang, & Joo-Seng, 2006). Accordingly,
ferences in societal cultures, provides a profile a manager with high CQ can enter new cultural
1309
Experiences of Cultures in Global ERP Implementation