Abstract
The discipline of enterprise architecture advocates the use of models to support decision-making on enterprise-wide information system issues. In order to provide such support, enterprise architecture models should be amenable to analyses of various properties, as e.g. the level of enterprise information security. This paper proposes the use of a formal language to support such analysis. Such a language needs to be able to represent causal relations between, and definitions of, various concepts as well as uncertainty with respect to both concepts and relations. To support decision making properly, the language must also allow the representation of goals and decision alternatives. This paper evaluates a number of languages with respect to these requirements, and selects influence diagrams for further consideration. The influence diagrams are then extended to fully satisfy the requirements. The syntax and semantics of the extended influence diagrams are detailed in the paper, and their use is demonstrated in an example.
Similar content being viewed by others
References
Department of Defense (2004). The Department of Defense architecture framework.
Druzdzel, M. J., & van der Gaag, L. C. (2000). Building probabilistic networks: Where do the numbers come from? Guest editors’ introduction. IEEE Transactions on Knowledge and Data Engineering, 12(4), 481–486.
D. S. Laboratory (2006). Genie On-Line Help.
Fowler, M., & Scott, K. (1997). UML distilled: Applying the standard object modeling language. Reading, MA: Addison-Wesley.
Howard, R. A. (1988). Decision analysis: Practice and promise. Management Science, 34(6), 679–695.
Howard, R. A., & Matheson, J. E. (2005). Influence diagrams. Decision Analysis, 2(3), 127–143.
Hughes, J. (2004). The integrated energy and communication systems architecture. Electric Power Research Institute.
Hugin Expert A/S (2004). HUGIN API Reference Manual, version 6.3.
IFAC-IFIP (1999). Geram: Generalized enterprise reference architecture and methodology, version 1.6.3.
International Organization for Standardization (2000). ISO/IEC International Standard 17799:2000 Information Technology – Security Techniques – Code of Practice for Information Security Management.
Jensen, F. V. (2001). Bayesian networks and decision graphs. Berlin Heidelberg New York: Springer.
Johnson, P., & Ekstedt, M. (2007). Enterprise architecture – models and analyses for information systems decision making. Studentlitteratur. (to appear)
Johnson, P., Ekstedt, M., Silva, E., & Plazaola, L. (2004). Using enterprise architecture for cio decision-making: On the importance of theory. In Proceedings of the Second Annual Conference on Systems Engineering Research.
Kosanke, K. (1995). Cimosa overview and status. Computers in Industry, 27(2), 101–109.
Lagerstrom, R., Johnson, P., & Narman, P. (2007). Extended influence diagram generation for interoperability analysis. In Proceedings of the Third International Conference on Interoperability for Enterprise Software and Applications.
Lindstrom, A., Johnson, P., Johansson, E., Ekstedt, M., & Simonsson, M. (2006). A survey on cio concerns: Do enterprise architecture frameworks support them? Information Systems Frontiers, 8(2), 81–90.
Liu, P., Ammann, P., & Jajodia, S. (2000). Rewriting histories: Recovering from malicious transactions. Distributed and Paralell Databases, 8, 7–40.
Neapolitan, R. (2004). Learning Bayesian Networks. Englewood Cliffs, NJ: Pearson Education (Prentice Hall).
The Open Group (2005). The Open Group Architecture Framework, Version 8.
Poslad, S., & Calisti, M. (2000). Towards improved trust and security in fipa agent platforms. In Autonomous Agents 2000 Workshop on Deception, Fraud and Trust in Agent Societies.
Rubenstein, A. (1998). Modeling bounded rationality. Cambridge, MA: MIT Press.
Scriven, M. (1954). Definitions in analytical philosophy. Philosophical Studies, 5(3), 36–40.
Shachter, R. (1986). Evaluating influence diagrams. Operations Research, 34(6), 871–882.
Shachter, R. (1988). Probabilistic inference and influence diagrams. Operations Research, 36(4), 89–604.
Shafer, G. (1976). A mathematical theory of evidence. Princeton, NJ: Princeton University Press.
Williams, T. J. (1994). The purdue enterprise reference architecture. Computers in Industry, 24(2–3), 141–158.
Yang, J.-B. (2001). Rule and utility based evidential reasoning approach for multiattribute decision analysis under uncertainties. European Journal of Operational Research, 133, 31–61.
Yu, E. S. K., Mylopoulos, J., & Lesp, Y. (1996). Ai models for business process reengineering. IEEE Expert: Intelligent Systems and Their Applications, 11(4), 16–23.
Zachman, J. (1987). A framework for information systems architecture. IBM Systems Journal, 26(3), 276–292.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Johnson, P., Lagerström, R., Närman, P. et al. Enterprise architecture analysis with extended influence diagrams. Inf Syst Front 9, 163–180 (2007). https://doi.org/10.1007/s10796-007-9030-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-007-9030-y