scholarly journals Goal-oriented dependency analysis for service identification

2019 ◽  
Vol 16 (2) ◽  
pp. 381-407
Author(s):  
Jiawei Li ◽  
Wenge Rong ◽  
Chuantao Yin ◽  
Zhang Xiong

Highly mature service-oriented architecture systems have great flexibility and reusability, and can align business processes and information technologies with high quality. Service identification plays a key role in this respect. Further, of the different methods employed, the most popular and preferred is process-oriented service identification. However, the absence of dependency analysis in the business process management domain remains a challenge for the quality of future systems. In this paper, we propose a goal-oriented dependency analysis for service identification via business process modeling. In our analysis solution, we apply a dependency tree featuring the relationships among requirements. The dependency relations are analyzed to create business processes via scenarios comprising requirements and process fragments.

Author(s):  
Mohamed El Amine Chergui ◽  
Sidi Mohamed Benslimane

Several approaches for services development in SOA (Service Oriented Architecture) suggest business processes as a starting point. However, there is a lack of systematic methods for services identification during business analysis. It is recognized that in service engineering, service identification plays a critical role as it lays the foundation for the later phases. Existing Service identification approaches are often prescriptive and mostly ignore automation principles, most are based on the architect's knowledge thus could result in non-optimal designs which results in complicated dependencies between services. In this paper the authors propose a top down approach to identify automatically services from business process by using several design metrics. This approach produces services from business processes as input and using an improved combinatorial particle swarm optimization algorithm with crossover of genetic algorithm. The experimentation denotes that the authors' approach achieves better results in terms of performance and convergence speed.


Author(s):  
Ivan Vasilevich Artamonov

In the course of development and implementation of information technologies it is necessary to measure performance of the designed and improved business processes. A developed system of performance metrics for such analysis is determined by the specific nature of a business process, while its quality depends on the analyst’s experience. Current technologies do not provide a method for objective measuring of future business processes throughput efficiency being either too primitive or too complex for real-world enterprise models. Some experience on performance measuring is collected in the theory of manufacturing systems, computer hardware and software, queuing theory and quality of service of business processes. Summing up the achievements it is possible to create a general-purpose and abstract set of performance parameters that can be applied to any business process and used for depth analysis of processes in the systems of simulation modelling and of business process management. The set consists of four groups evaluating efficiency by the time of operation, quantitative parameters, workload of employees and compliance to standards and conventions. For these parameters there have been developed a number of boundary values, reaching them leads to undesirable effects. Besides, the definition of dangerous events has been proposed to determine abnormal, out-of-bound process behavior or state causing business process failure.


2011 ◽  
pp. 1060-1080
Author(s):  
Minhong Wang ◽  
Kuldeep Kumar

A business process displays complexity as a result of multiple interactions of its internal components and interaction between the process and its environment. To manage complexity and foster flexibility of business process management (BPM), we present the DCAR architecture for developing complex BPM systems, which includes decomposition of complex processes (D); coordination of interactive activities (C); awareness of dynamic environments (A); and resource selection and coordination (R). On the other hand, computing technologies, such as object-oriented programming, component-based development, agent-oriented computing, and service-oriented architecture have been applied in modeling and developing complex systems. However, there is considerable ambiguity involved in differentiating between these overlapping technologies and their use in developing BPM systems. No explicit linkage has been established between the requirement of complex BPM and the supporting technologies. In this study, we use the DCAR architecture as the foundation to identify the BPM requirements for employing technologies in developing BPM systems. Based on an examination of the both sides (BPM requirements and supporting technologies), we present a clear picture of business process complexity with a systemic approach for developing complex BPM systems by using appropriate computing technologies.


2009 ◽  
pp. 1843-1852
Author(s):  
Pallab Saha

E-business process management (e-BPM) entails management of e-business processes with the customer initiating the process and involves non-linear processes with strong focus on value networks leveraging collaboration and alliances, rather than just business processes within the confines of the organization (Kim & Ramkaran, 2004). E-BPM requires organizations to take a process approach to managing their e-business processes (Smith & Fingar, 2003). The advent of business process reengineering (BPR) (Davenport, 1993; Hammer & Champy, 1993) resulted in numerous organizations initiating BPR programs. While BPR aims to enhance an organization’s process capability by adopting engineering discipline, e-BPM goes a step further and targets to improve the organizational process management capability (Smith & Fingar, 2004). Organizations target end-to-end business processes that deliver maximum customer value through e-BPM (Smith & Fingar, 2003). However, by their very nature, end-to-end business processes more often than not span multiple enterprises incorporating their individual value chains (Porter, 1985; Smith & Fingar, 2003; Smith, Neal, Ferrara, & Hayden, 2002) and involve e-business processes (Kim & Ramkaran, 2004). Integrating fragments of processes across multiple functions and organizations not only involves shared activities and tasks among business and trading partners, but also the capability to integrate disparate IT systems (Kalakota & Robinson, 2003). Effective management of e-business processes depends to a great extent on the enabling information technologies. In fact, Smith and Fingar in 2003 have stated that BPM is about technology. Porter’s value chain is about end-to-end business processes needed to get from a customer order to the delivery of the final product or service (Porter, 1985). The pervasive use of technology has created a critical dependency on IT that demands for a specific focus on governance of IT (Grembergen, 2004). Explicitly or implicitly, organizations specify business activities as business processes, and without realizing these tend to be e-business processes. However, given the current business conditions and a clear understanding by organizations about the complexities of their e-business processes, management of e-business processes is taking center stage (Smith et al., 2002). In the current business scenario where e-business processes, along with information are considered key organizational assets and management of business processes a strategic capability (Kalakota & Robinson, 2003), it is imperative that organizations clearly delineate the need for relevant and pertinent information as it provides visibility and transparency. Additionally, IT being the single most important predictor of the business value of IT (Weill & Ross, 2004) drives the need to analyze and understand the implications of e-BPM on IT governance. The key objective of this article is to investigate the implications of e-BPM on IT governance through the analysis of available literature. In particular, the article argues that a direct influence of e-BPM on IT governance performance is inevitable. While the importance of both effective e-BPM and IT governance is intuitively clear, there is currently little research on elements of IT governance that get enabled by e-BPM. More importantly, there is the lack of a theoretical framework that could be used to analyze. To address this shortcoming, the article also presents an analysis framework. The analysis framework is particularly useful as it incorporates elements from prevalent IT governance frameworks. Using the analysis framework, the article then examines the implications of e-BPM on IT governance and develops research propositions. The aim of developing the propositions is to enable further investigation and research thereby contributing to IT management theory.


Author(s):  
Quyen L. Nguyen ◽  
Betty Harvey

In order to continue to fulfill its mission in the information technology age, the National Archives and Records Administration (NARA) has made the decision to develop the Electronic Records Archives (ERA) system. One of the goals is to provide to the archivists a modernized system with automatic workflow that can streamline the digital archive business process. For an archival system, Ingest is one of the core components. As part of the ingest process, this component would allow the record Producer to negotiate submission agreement before transferring digital materials into the system. Within the framework of a service-oriented architecture with business process management, the ERA system uses XML to represent business objects and metadata. In this paper, we will show how the synergetic combination of XForms and Genericode makes the system agile and responsive to business user requirements. Furthermore, the approach fits well with ERA's design principle to use international and industry standards, and facilitates the integration of XML business objects and the electronic records metadata. We believe that the standard-based approach of XForms+Genericode exposed in this paper can be generalized to develop any e-Forms system with a set of control values and vocabularies.


2019 ◽  
Vol 4 (9) ◽  
pp. 62-75 ◽  
Author(s):  
Елена Петрова ◽  
Elena Petrova ◽  
А. Родюков ◽  
A. Rodyukov

The problems of automation of business processes of enterprises, peculiarities of Workflow systems, review of modern solutions presented in the market in this field are considered.


2010 ◽  
Vol 7 (3) ◽  
pp. 52-72 ◽  
Author(s):  
Masoom Alam ◽  
Mohammad Nauman ◽  
Xinwen Zhang ◽  
Tamleek Ali ◽  
Patrick C. K. Hung ◽  
...  

Service Oriented Architecture (SOA) is an architectural paradigm that enables dynamic composition of heterogeneous, independent, multi-vendor business services. A prerequisite for such inter-organizational workflows is the establishment of trustworthiness, which is mostly achieved through non-technical measures, such as legislation, and/or social consent that businesses or organizations pledge themselves to adhere. A business process can only be trustworthy if the behavior of all services in it is trustworthy. Trusted Computing Group (TCG) has defined an open set of specifications for the establishment of trustworthiness through a hardware root-of-trust. This paper has three objectives: firstly, the behavior of individual services in a business process is formally specified. Secondly, to overcome the inherent weaknesses of trust management through software alone, a hardware root of-trust devised by the TCG, is used for the measurement of the behavior of individual services in a business process. Finally, a verification mechanism is detailed through which the trustworthiness of a business process can be verified.


Author(s):  
Pallab Saha

E-business process management (e-BPM) entails management of e-business processes with the customer initiating the process and involves non-linear processes with strong focus on value networks leveraging collaboration and alliances, rather than just business processes within the confines of the organization (Kim & Ramkaran, 2004). E-BPM requires organizations to take a process approach to managing their e-business processes (Smith & Fingar, 2003). The advent of business process reengineering (BPR) (Davenport, 1993; Hammer & Champy, 1993) resulted in numerous organizations initiating BPR programs. While BPR aims to enhance an organization’s process capability by adopting engineering discipline, e-BPM goes a step further and targets to improve the organizational process management capability (Smith & Fingar, 2004). Organizations target end-to-end business processes that deliver maximum customer value through e-BPM (Smith & Fingar, 2003). However, by their very nature, end-to-end business processes more often than not span multiple enterprises incorporating their individual value chains (Porter, 1985; Smith & Fingar, 2003; Smith, Neal, Ferrara, & Hayden, 2002) and involve e-business processes (Kim & Ramkaran, 2004). Integrating fragments of processes across multiple functions and organizations not only involves shared activities and tasks among business and trading partners, but also the capability to integrate disparate IT systems (Kalakota & Robinson, 2003). Effective management of e-business processes depends to a great extent on the enabling information technologies. In fact, Smith and Fingar in 2003 have stated that BPM is about technology. Porter’s value chain is about end-to-end business processes needed to get from a customer order to the delivery of the final product or service (Porter, 1985). The pervasive use of technology has created a critical dependency on IT that demands for a specific focus on governance of IT (Grembergen, 2004). Explicitly or implicitly, organizations specify business activities as business processes, and without realizing these tend to be e-business processes. However, given the current business conditions and a clear understanding by organizations about the complexities of their e-business processes, management of e-business processes is taking center stage (Smith et al., 2002). In the current business scenario where e-business processes, along with information are considered key organizational assets and management of business processes a strategic capability (Kalakota & Robinson, 2003), it is imperative that organizations clearly delineate the need for relevant and pertinent information as it provides visibility and transparency. Additionally, IT being the single most important predictor of the business value of IT (Weill & Ross, 2004) drives the need to analyze and understand the implications of e-BPM on IT governance. The key objective of this article is to investigate the implications of e-BPM on IT governance through the analysis of available literature. In particular, the article argues that a direct influence of e-BPM on IT governance performance is inevitable. While the importance of both effective e-BPM and IT governance is intuitively clear, there is currently little research on elements of IT governance that get enabled by e-BPM. More importantly, there is the lack of a theoretical framework that could be used to analyze. To address this shortcoming, the article also presents an analysis framework. The analysis framework is particularly useful as it incorporates elements from prevalent IT governance frameworks. Using the analysis framework, the article then examines the implications of e-BPM on IT governance and develops research propositions. The aim of developing the propositions is to enable further investigation and research thereby contributing to IT management theory.


Author(s):  
Youcef Baghdadi ◽  
Naoufel Kraiem

Reverse engineering techniques have become very important within the maintenance process providing several benefits. They retrieve abstract representations that not only facilitate the comprehension of legacy systems but also refactor these representations. Business process archaeology has emerged as a set of techniques and tools to recover business processes from source code and to preserve the existing business functions and rules buried in legacy source code. This chapter presents a reverse engineering process and a tool to retrieve services from running databases. These services are further reused in composing business processes with respect to Service-Oriented Architecture, a new architectural style that promotes agility.


2012 ◽  
pp. 102-125 ◽  
Author(s):  
Michael Gebhart

This chapter focuses on the identification and specification of services based on prior modeled business processes and legacy systems. The resulting service interfaces and service components formalized by using the Service oriented architecture Modeling Language (SoaML) describe the integration of legacy systems into a service-oriented application landscape. The legacy systems provide services for integration purposes and represent the implementations of service components. Additionally, the resulting architecture allows functionality of legacy systems to be replaced with functionality provided by external cloud services. According to model-driven development concepts, the formalized service interfaces and service components as part of the service designs can be used to automatically derive service interface descriptions using the Web Services Description Language (WSDL). These descriptions enable the technical integration of legacy systems. If necessary, service implementations based on the Service Component Architecture (SCA) and the Business Process Execution Language (BPEL) can be generated.


Sign in / Sign up

Export Citation Format

Share Document