Enterprise architecture analysis with extended influence diagrams
- 874 Downloads
- 63 Citations
Abstract
The discipline of enterprise architecture advocates the use of models to support decision-making on enterprise-wide information system issues. In order to provide such support, enterprise architecture models should be amenable to analyses of various properties, as e.g. the level of enterprise information security. This paper proposes the use of a formal language to support such analysis. Such a language needs to be able to represent causal relations between, and definitions of, various concepts as well as uncertainty with respect to both concepts and relations. To support decision making properly, the language must also allow the representation of goals and decision alternatives. This paper evaluates a number of languages with respect to these requirements, and selects influence diagrams for further consideration. The influence diagrams are then extended to fully satisfy the requirements. The syntax and semantics of the extended influence diagrams are detailed in the paper, and their use is demonstrated in an example.
Keywords
Enterprise architecture models Formal language Influence diagramsPreview
Unable to display preview. Download preview PDF.
References
- Department of Defense (2004). The Department of Defense architecture framework.Google Scholar
- Druzdzel, M. J., & van der Gaag, L. C. (2000). Building probabilistic networks: Where do the numbers come from? Guest editors’ introduction. IEEE Transactions on Knowledge and Data Engineering, 12(4), 481–486.CrossRefGoogle Scholar
- D. S. Laboratory (2006). Genie On-Line Help.Google Scholar
- Fowler, M., & Scott, K. (1997). UML distilled: Applying the standard object modeling language. Reading, MA: Addison-Wesley.Google Scholar
- Howard, R. A. (1988). Decision analysis: Practice and promise. Management Science, 34(6), 679–695.Google Scholar
- Howard, R. A., & Matheson, J. E. (2005). Influence diagrams. Decision Analysis, 2(3), 127–143.CrossRefGoogle Scholar
- Hughes, J. (2004). The integrated energy and communication systems architecture. Electric Power Research Institute.Google Scholar
- Hugin Expert A/S (2004). HUGIN API Reference Manual, version 6.3.Google Scholar
- IFAC-IFIP (1999). Geram: Generalized enterprise reference architecture and methodology, version 1.6.3.Google Scholar
- International Organization for Standardization (2000). ISO/IEC International Standard 17799:2000 Information Technology – Security Techniques – Code of Practice for Information Security Management.Google Scholar
- Jensen, F. V. (2001). Bayesian networks and decision graphs. Berlin Heidelberg New York: Springer.Google Scholar
- Johnson, P., & Ekstedt, M. (2007). Enterprise architecture – models and analyses for information systems decision making. Studentlitteratur. (to appear)Google Scholar
- Johnson, P., Ekstedt, M., Silva, E., & Plazaola, L. (2004). Using enterprise architecture for cio decision-making: On the importance of theory. In Proceedings of the Second Annual Conference on Systems Engineering Research.Google Scholar
- Kosanke, K. (1995). Cimosa overview and status. Computers in Industry, 27(2), 101–109.CrossRefGoogle Scholar
- Lagerstrom, R., Johnson, P., & Narman, P. (2007). Extended influence diagram generation for interoperability analysis. In Proceedings of the Third International Conference on Interoperability for Enterprise Software and Applications.Google Scholar
- Lindstrom, A., Johnson, P., Johansson, E., Ekstedt, M., & Simonsson, M. (2006). A survey on cio concerns: Do enterprise architecture frameworks support them? Information Systems Frontiers, 8(2), 81–90.CrossRefGoogle Scholar
- Liu, P., Ammann, P., & Jajodia, S. (2000). Rewriting histories: Recovering from malicious transactions. Distributed and Paralell Databases, 8, 7–40.CrossRefGoogle Scholar
- Neapolitan, R. (2004). Learning Bayesian Networks. Englewood Cliffs, NJ: Pearson Education (Prentice Hall).Google Scholar
- The Open Group (2005). The Open Group Architecture Framework, Version 8.Google Scholar
- Poslad, S., & Calisti, M. (2000). Towards improved trust and security in fipa agent platforms. In Autonomous Agents 2000 Workshop on Deception, Fraud and Trust in Agent Societies.Google Scholar
- Rubenstein, A. (1998). Modeling bounded rationality. Cambridge, MA: MIT Press.Google Scholar
- Scriven, M. (1954). Definitions in analytical philosophy. Philosophical Studies, 5(3), 36–40.CrossRefGoogle Scholar
- Shachter, R. (1986). Evaluating influence diagrams. Operations Research, 34(6), 871–882.CrossRefGoogle Scholar
- Shachter, R. (1988). Probabilistic inference and influence diagrams. Operations Research, 36(4), 89–604.Google Scholar
- Shafer, G. (1976). A mathematical theory of evidence. Princeton, NJ: Princeton University Press.Google Scholar
- Williams, T. J. (1994). The purdue enterprise reference architecture. Computers in Industry, 24(2–3), 141–158.CrossRefGoogle Scholar
- Yang, J.-B. (2001). Rule and utility based evidential reasoning approach for multiattribute decision analysis under uncertainties. European Journal of Operational Research, 133, 31–61.CrossRefGoogle Scholar
- Yu, E. S. K., Mylopoulos, J., & Lesp, Y. (1996). Ai models for business process reengineering. IEEE Expert: Intelligent Systems and Their Applications, 11(4), 16–23.Google Scholar
- Zachman, J. (1987). A framework for information systems architecture. IBM Systems Journal, 26(3), 276–292.CrossRefGoogle Scholar