skip to main content
10.1145/2307729.2307738acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

Architectural patterns of U.S. public safety networks: a fuzzy set qualitative comparison analysis

Published:04 June 2012Publication History

ABSTRACT

This paper contains analysis and some initial insights into the patterns of information technology (IT) architecture found in United States' public safety networks (PSNs). A PSN is understood to be an inter-organizational collaboration enabled by IT in support of the information sharing and interoperability needs of police and associated public safety organizations. We know the information systems designed and used by PSNs are often complex, expensive, and must support multiple public safety agencies. Improving our understanding of PSN IT architecture patterns could lead to improved designs and possibly improved performance of PSNs themselves. Data collected on 61 PSNs are analyzed using fuzzy set Qualitative Comparative Analysis (fsQCA). The fsQCA method is explained in detail for those unfamiliar with this technique. Results illuminate (1) functionally similar configuration patterns of IT architecture among PSNs and (2) multiple architectural patterns associated with PSN performance.

References

  1. Anderson, P. & Backhouse G. (2008). Enterprise Architecture An introduction. Retrieved from www.jisc.ac.uk/publicationsGoogle ScholarGoogle Scholar
  2. Akella, J., H. Buckow and S. Rey (2009). IT architecture: Cutting costs and complexity. McKinsey Quarterly. McKinsey & Company. Retrieved from http://www.mckinseyquarterly.com/IT_architecture_Cutting_costs_and_complexity_2391Google ScholarGoogle Scholar
  3. Chen, D., G. Doumeingts and F. Vernadat (2008). "Architectures for enterprise integration and interoperability: Past, present and future." Computers in Industry 59(7): 647--659. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Gregor, S., Hart, D. and Martin, N. (2007) Enterprise Architectures: Enabler of Business Strategy and IS/IT Alignment in Organizations. Information Technology & People, 20(2), 96--120.Google ScholarGoogle ScholarCross RefCross Ref
  5. Henderson, J. C. and Venkatraman, N. (1989). Strategic alignment: a process model For integrating information technology and business strategies. {Sloan working paper}. Massachusetts Institute of Technology, Cambridge, MA.Google ScholarGoogle Scholar
  6. Henderson, J. C. and Venkatraman, N. (1993). Strategic alignment: Leveraging information technology for transforming organizations. IBM Systems Journal, 32(1), 472--484. Google ScholarGoogle ScholarCross RefCross Ref
  7. Hjort-Madsen, K. (2007) "Institutional patterns of enterprise architecture adoption in government", Transforming Government: People, Process and Policy, 1(4), 333--349.Google ScholarGoogle ScholarCross RefCross Ref
  8. Hoffer, J., Prescott, M., Heikki, T. (9th Ed.) (2009). Modern Database Management. Saddle River, NJ: Pearson Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Homeland Security (2007). Criteria for Statewide Interoperability Strategic Plans. Retrieved from http://www.safecomprogram.gov/library/lists/library/DispForm.aspx?ID=87Google ScholarGoogle Scholar
  10. Iyer, B. and R. M. Gottlieb (2004). The four-domain architecture: An approach to support enterprise architecture design. IBM Systems Journal, 43(3): 587--597. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fiss, C. (2011). Building Better Causal Theories: A Fuzzy Set Approach to Typologies in Organization Research.Google ScholarGoogle Scholar
  12. Janssen, M., Chun, S., Gil-Garcia, J. (2009). Building the Next-Generation Digital Government Infrastructures. Government Information Quarterly, 26(2), 233--237. Kruchten, P., Obbink, H., & Stafford, J. (2006). The Past, Present, and Future for Software Architecture. IEEE Software, 23(2), 22--30. doi:10.1109/MS.2006.59 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Lam, W. (2005) "Barriers to e-government integration", Journal of Enterprise Information Management. 18(5), 511--530.Google ScholarGoogle ScholarCross RefCross Ref
  14. Lankhorst et al. (2005). Enterprise Architecture at Work: Modeling, Communication and Analysis. Berlin: Springer-Verlag and Heidelerg GmbH& Co. ISBN:9783540243717 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Los Alamos National Laboratory (2009). Interoperable Communications Technical Assistance Program. Retrieved from https://www.rkb.us/contentdetail.cfm?content_id=157265Google ScholarGoogle Scholar
  16. Open Group (2001). The Open Group Architecture Framework (TOGAF),Version 7.0, The Open Group. Retrieved from: http://www.opengroup.org/architecture/togaf7/presents/togaf_ovu.pdfGoogle ScholarGoogle Scholar
  17. Lyman, T (1977).Performance Evaluation of a Criminal Justice System: A Transferable Methodology. Urban Systems. 2(2-3), 63--73.Google ScholarGoogle ScholarCross RefCross Ref
  18. Ragin, C. (2005). From Fuzzy Sets to Crisp Truth Tables. Working Paper. Retrieved from http://www.compasss.org/files/WPfiles/Raginfztt_April05.pdf.Google ScholarGoogle Scholar
  19. Ragin, C. (2006). Set Relations in Social Research: Evaluating their consistency and coverage. Political Analysis. {Advance Access Publication}. Retrieved from: http://www.u.arizona.edu/~cragin/fsQCA/download/Con_cov.pdfGoogle ScholarGoogle Scholar
  20. Ragin, C. (2008). Redesigning Social Inquiry: Fuzzy Sets and Beyond. Chicago: University of Chicago Press.Google ScholarGoogle Scholar
  21. Ragin, C. & Rihoux, B. (2009). Configurational Comparative Methods: Qualitative Comparative Analysis and related techniques. California: Sage Publications.Google ScholarGoogle Scholar
  22. Sawyer, S. (2009). PSN Architecture {PowerPoint Slides}. Presentation given at PSN PI-meeting, 17 Mar, 2009.Google ScholarGoogle Scholar
  23. Sawyer, S., Schrier, R. (2011). Typologies in Public Safety Networks, Syracuse University, School of Information Studies Working Paper, Syracuse, NY.Google ScholarGoogle Scholar
  24. Sowa, J. and Zachman, J. (1992). Extending and Formalizing the Framework for Information Systems Architecture". IBM Systems Journal, 31(3), 590--616. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Tiwana, A. and B. Konsynski (2010). Complementarities between organizational it architecture and governance structure. Information Systems Research 21(2): 288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Tighe, D. (2004). U. S. Department of Homeland Security Launches Office of Interoperability and Compatibility; Offers States and Locales Tools for Improving Public Safety Communications Interoperability. Retrieved from http://www.dhs.gov/xnews/releases/press_release_0530.shtmGoogle ScholarGoogle Scholar
  27. Westbrock T. (1999). Managing change through enterprise architecture, enterprise Architecture strategies. Meta Group Practice Paper.Google ScholarGoogle Scholar
  28. Williams, C., Dias, M., Fedorowicz, J., Jacobson, D., Vilvovsky, S., Sawyer, S., Tyworth. M. (2009). The formation of inter-organizational information sharing networks in public safety: Cartographic insights on rational choice and institutional explanations. Information Polity, 14, 13--29. (DOI: 10.3233/IP-2009-0170). Google ScholarGoogle ScholarCross RefCross Ref
  29. Williams, C. B., J. Fedorowicz and A. P. Tomasino (2010). Governmental factors associated with state-wide interagency collaboration initiatives. Proceedings of the 11th Annual International Digital Government Research Conference on Public Administration Online: Challenges and Opportunities. Puebla, Mexico, Digital Government Society of North America: 14--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Zachman, J. A. (1987). A framework for information systems architecture.IBM Systems Journal 26(3): 276. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Architectural patterns of U.S. public safety networks: a fuzzy set qualitative comparison analysis

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          dg.o '12: Proceedings of the 13th Annual International Conference on Digital Government Research
          June 2012
          324 pages
          ISBN:9781450314039
          DOI:10.1145/2307729

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 June 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate150of271submissions,55%
        • Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader