Information Systems Frontiers

, Volume 9, Issue 2–3, pp 163–180 | Cite as

Enterprise architecture analysis with extended influence diagrams

  • Pontus Johnson
  • Robert Lagerström
  • Per Närman
  • Mårten Simonsson
Article

Abstract

The discipline of enterprise architecture advocates the use of models to support decision-making on enterprise-wide information system issues. In order to provide such support, enterprise architecture models should be amenable to analyses of various properties, as e.g. the level of enterprise information security. This paper proposes the use of a formal language to support such analysis. Such a language needs to be able to represent causal relations between, and definitions of, various concepts as well as uncertainty with respect to both concepts and relations. To support decision making properly, the language must also allow the representation of goals and decision alternatives. This paper evaluates a number of languages with respect to these requirements, and selects influence diagrams for further consideration. The influence diagrams are then extended to fully satisfy the requirements. The syntax and semantics of the extended influence diagrams are detailed in the paper, and their use is demonstrated in an example.

Keywords

Enterprise architecture models Formal language Influence diagrams 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Department of Defense (2004). The Department of Defense architecture framework.Google Scholar
  2. Druzdzel, M. J., & van der Gaag, L. C. (2000). Building probabilistic networks: Where do the numbers come from? Guest editors’ introduction. IEEE Transactions on Knowledge and Data Engineering, 12(4), 481–486.CrossRefGoogle Scholar
  3. D. S. Laboratory (2006). Genie On-Line Help.Google Scholar
  4. Fowler, M., & Scott, K. (1997). UML distilled: Applying the standard object modeling language. Reading, MA: Addison-Wesley.Google Scholar
  5. Howard, R. A. (1988). Decision analysis: Practice and promise. Management Science, 34(6), 679–695.Google Scholar
  6. Howard, R. A., & Matheson, J. E. (2005). Influence diagrams. Decision Analysis, 2(3), 127–143.CrossRefGoogle Scholar
  7. Hughes, J. (2004). The integrated energy and communication systems architecture. Electric Power Research Institute.Google Scholar
  8. Hugin Expert A/S (2004). HUGIN API Reference Manual, version 6.3.Google Scholar
  9. IFAC-IFIP (1999). Geram: Generalized enterprise reference architecture and methodology, version 1.6.3.Google Scholar
  10. International Organization for Standardization (2000). ISO/IEC International Standard 17799:2000 Information Technology – Security Techniques – Code of Practice for Information Security Management.Google Scholar
  11. Jensen, F. V. (2001). Bayesian networks and decision graphs. Berlin Heidelberg New York: Springer.Google Scholar
  12. Johnson, P.,  & Ekstedt, M. (2007). Enterprise architecture – models and analyses for information systems decision making. Studentlitteratur. (to appear)Google Scholar
  13. Johnson, P., Ekstedt, M., Silva, E., & Plazaola, L. (2004). Using enterprise architecture for cio decision-making: On the importance of theory. In Proceedings of the Second Annual Conference on Systems Engineering Research.Google Scholar
  14. Kosanke, K. (1995). Cimosa overview and status. Computers in Industry, 27(2), 101–109.CrossRefGoogle Scholar
  15. Lagerstrom, R., Johnson, P., & Narman, P. (2007). Extended influence diagram generation for interoperability analysis. In Proceedings of the Third International Conference on Interoperability for Enterprise Software and Applications.Google Scholar
  16. Lindstrom, A., Johnson, P., Johansson, E., Ekstedt, M., & Simonsson, M. (2006). A survey on cio concerns: Do enterprise architecture frameworks support them? Information Systems Frontiers, 8(2), 81–90.CrossRefGoogle Scholar
  17. Liu, P., Ammann, P., & Jajodia, S. (2000). Rewriting histories: Recovering from malicious transactions. Distributed and Paralell Databases, 8, 7–40.CrossRefGoogle Scholar
  18. Neapolitan, R. (2004). Learning Bayesian Networks. Englewood Cliffs, NJ: Pearson Education (Prentice Hall).Google Scholar
  19. The Open Group (2005). The Open Group Architecture Framework, Version 8.Google Scholar
  20. Poslad, S., & Calisti, M. (2000). Towards improved trust and security in fipa agent platforms. In Autonomous Agents 2000 Workshop on Deception, Fraud and Trust in Agent Societies.Google Scholar
  21. Rubenstein, A. (1998). Modeling bounded rationality. Cambridge, MA: MIT Press.Google Scholar
  22. Scriven, M. (1954). Definitions in analytical philosophy. Philosophical Studies, 5(3), 36–40.CrossRefGoogle Scholar
  23. Shachter, R. (1986). Evaluating influence diagrams. Operations Research, 34(6), 871–882.CrossRefGoogle Scholar
  24. Shachter, R. (1988). Probabilistic inference and influence diagrams. Operations Research, 36(4), 89–604.Google Scholar
  25. Shafer, G. (1976). A mathematical theory of evidence. Princeton, NJ: Princeton University Press.Google Scholar
  26. Williams, T. J. (1994). The purdue enterprise reference architecture. Computers in Industry, 24(2–3), 141–158.CrossRefGoogle Scholar
  27. Yang, J.-B. (2001). Rule and utility based evidential reasoning approach for multiattribute decision analysis under uncertainties. European Journal of Operational Research, 133, 31–61.CrossRefGoogle Scholar
  28. Yu, E. S. K., Mylopoulos, J., & Lesp, Y. (1996). Ai models for business process reengineering. IEEE Expert: Intelligent Systems and Their Applications, 11(4), 16–23.Google Scholar
  29. Zachman, J. (1987). A framework for information systems architecture. IBM Systems Journal, 26(3), 276–292.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Pontus Johnson
    • 1
  • Robert Lagerström
    • 1
  • Per Närman
    • 1
  • Mårten Simonsson
    • 1
  1. 1.Royal Institute of TechnologyStockholmSweden

Personalised recommendations