Skip to main content
Log in

Enterprise architecture analysis with extended influence diagrams

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

The discipline of enterprise architecture advocates the use of models to support decision-making on enterprise-wide information system issues. In order to provide such support, enterprise architecture models should be amenable to analyses of various properties, as e.g. the level of enterprise information security. This paper proposes the use of a formal language to support such analysis. Such a language needs to be able to represent causal relations between, and definitions of, various concepts as well as uncertainty with respect to both concepts and relations. To support decision making properly, the language must also allow the representation of goals and decision alternatives. This paper evaluates a number of languages with respect to these requirements, and selects influence diagrams for further consideration. The influence diagrams are then extended to fully satisfy the requirements. The syntax and semantics of the extended influence diagrams are detailed in the paper, and their use is demonstrated in an example.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Department of Defense (2004). The Department of Defense architecture framework.

  • Druzdzel, M. J., & van der Gaag, L. C. (2000). Building probabilistic networks: Where do the numbers come from? Guest editors’ introduction. IEEE Transactions on Knowledge and Data Engineering, 12(4), 481–486.

    Article  Google Scholar 

  • D. S. Laboratory (2006). Genie On-Line Help.

  • Fowler, M., & Scott, K. (1997). UML distilled: Applying the standard object modeling language. Reading, MA: Addison-Wesley.

    Google Scholar 

  • Howard, R. A. (1988). Decision analysis: Practice and promise. Management Science, 34(6), 679–695.

    Google Scholar 

  • Howard, R. A., & Matheson, J. E. (2005). Influence diagrams. Decision Analysis, 2(3), 127–143.

    Article  Google Scholar 

  • Hughes, J. (2004). The integrated energy and communication systems architecture. Electric Power Research Institute.

  • Hugin Expert A/S (2004). HUGIN API Reference Manual, version 6.3.

  • IFAC-IFIP (1999). Geram: Generalized enterprise reference architecture and methodology, version 1.6.3.

  • International Organization for Standardization (2000). ISO/IEC International Standard 17799:2000 Information Technology – Security Techniques – Code of Practice for Information Security Management.

  • Jensen, F. V. (2001). Bayesian networks and decision graphs. Berlin Heidelberg New York: Springer.

    Google Scholar 

  • Johnson, P.,  & Ekstedt, M. (2007). Enterprise architecture – models and analyses for information systems decision making. Studentlitteratur. (to appear)

  • Johnson, P., Ekstedt, M., Silva, E., & Plazaola, L. (2004). Using enterprise architecture for cio decision-making: On the importance of theory. In Proceedings of the Second Annual Conference on Systems Engineering Research.

  • Kosanke, K. (1995). Cimosa overview and status. Computers in Industry, 27(2), 101–109.

    Article  Google Scholar 

  • Lagerstrom, R., Johnson, P., & Narman, P. (2007). Extended influence diagram generation for interoperability analysis. In Proceedings of the Third International Conference on Interoperability for Enterprise Software and Applications.

  • Lindstrom, A., Johnson, P., Johansson, E., Ekstedt, M., & Simonsson, M. (2006). A survey on cio concerns: Do enterprise architecture frameworks support them? Information Systems Frontiers, 8(2), 81–90.

    Article  Google Scholar 

  • Liu, P., Ammann, P., & Jajodia, S. (2000). Rewriting histories: Recovering from malicious transactions. Distributed and Paralell Databases, 8, 7–40.

    Article  Google Scholar 

  • Neapolitan, R. (2004). Learning Bayesian Networks. Englewood Cliffs, NJ: Pearson Education (Prentice Hall).

    Google Scholar 

  • The Open Group (2005). The Open Group Architecture Framework, Version 8.

  • Poslad, S., & Calisti, M. (2000). Towards improved trust and security in fipa agent platforms. In Autonomous Agents 2000 Workshop on Deception, Fraud and Trust in Agent Societies.

  • Rubenstein, A. (1998). Modeling bounded rationality. Cambridge, MA: MIT Press.

    Google Scholar 

  • Scriven, M. (1954). Definitions in analytical philosophy. Philosophical Studies, 5(3), 36–40.

    Article  Google Scholar 

  • Shachter, R. (1986). Evaluating influence diagrams. Operations Research, 34(6), 871–882.

    Article  Google Scholar 

  • Shachter, R. (1988). Probabilistic inference and influence diagrams. Operations Research, 36(4), 89–604.

    Google Scholar 

  • Shafer, G. (1976). A mathematical theory of evidence. Princeton, NJ: Princeton University Press.

    Google Scholar 

  • Williams, T. J. (1994). The purdue enterprise reference architecture. Computers in Industry, 24(2–3), 141–158.

    Article  Google Scholar 

  • Yang, J.-B. (2001). Rule and utility based evidential reasoning approach for multiattribute decision analysis under uncertainties. European Journal of Operational Research, 133, 31–61.

    Article  Google Scholar 

  • Yu, E. S. K., Mylopoulos, J., & Lesp, Y. (1996). Ai models for business process reengineering. IEEE Expert: Intelligent Systems and Their Applications, 11(4), 16–23.

    Google Scholar 

  • Zachman, J. (1987). A framework for information systems architecture. IBM Systems Journal, 26(3), 276–292.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pontus Johnson.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Johnson, P., Lagerström, R., Närman, P. et al. Enterprise architecture analysis with extended influence diagrams. Inf Syst Front 9, 163–180 (2007). https://doi.org/10.1007/s10796-007-9030-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-007-9030-y

Keywords

Navigation