Free Essay

Defining and Describing Business Architecture

In:

Submitted By faz07
Words 569
Pages 3
Defining and Describing Business Architecture

The most fundamental concept of Business Architecture (BA) is that it represents business. BA is one of the domains that comprise Enterprise Architecture (EA) that define the business strategy, governance, organization and key business processes (Klein & Gagliardi, 2010). From the literature review, there are various definitions for BA can be found. In defining BA in term of enterprise, BA is consider as governance structure, business process and business information. In term of architecture aspects, BA can be categorized as an activity and a well-structured documentation of a current and future business environment. Referring to the above definition in both term, BA can be describe as “a blueprint of the enterprise that provides a common understanding of the organization and is used to align strategic objectives and tactical demands” (BIZBOK Guide, 2013) .

Another definition of BA is from The Open Group Architecture Framework (TOGAF), which is it defines BA as the business strategy, governance, organization and key business process information, that closely related to the business environment which is based on business principles, business goals, and strategic driven (The Open Group, 2009). Others have also defined BA as the basic relationship between business entity’s environments with its intent, value, capabilities, processes, and resources including human, Information Technology (IT), knowledge, capital, facility, and material (Strosnider, J. et al., 2002).

Considering on the previous definition of BA, it has several important elements that create a common foundation of business architecture, which is can be categorized with a wide variety of views as illustrated in Figure 1. The foundational perspectives such as: what a business does (capabilities); the vocabulary it uses (information); how a business is organized (organization); how a business delivers value to stakeholders (value stream); and what a business should do to compete and thrive (strategy) (William Ulrich & Kuehn, 2015). All of the answers from these questions are derived from business architecture, which then used to develop plans, make and implement business decisions.

BA is the first activity that needs to be taken in organizational process and required as a prior condition for Enterprise Architecture before any other domain that are Information, Application and Technology Application. BA is widely used to design competitive structures and processes, leveraging on existing strengths, and identify potential business opportunities that will accelerate on the business’s objectives and drive organization’s innovation (FEAPO, 2011) . Figure 1: Business Architecture Ecosystem. (Source: (Ulrich & McWhorter, 2010)

In brief, the concept of BA can be consider as a process to define organization from a business perspective and act as a general practice in order to govern and manage change and transformation in three key areas, which are strategy, operations, and technology as shown in Figure 2 (Hendrickx, Mahakena, Daley, & Von Rosing, 2011). Following are details on three key areas as defined by (Tikkanen, Lamberg, Parvinen, & Kallunki, 2005):

(a) Strategy defines the vision and direction of an enterprise, governing its actions and enterprise structures.

(b) Operations refer to the ongoing recurring activities, which consume resources and capabilities in order to produce the output of the enterprise.

(c) Technology refers to information and technology architecture that consist of an application component, tools and infrastructures implemented on a technology platform.
Among the three key areas that driving the business architecture’s growth, the BA would also identify how effective the organization in building financial analytics and where it can improve the capability and competency from a holistic perspective.

Similar Documents

Free Essay

Gilette and P&G

...Arvind Krishnan Ramesh Saahil Khanna Shriram Jayaraman Sneha Bhandarkar Service Oriented Architecture New Models of Enterprise Architecture (Group 2) Service Oriented Architecture New Models of Enterprise Architecture (Group 2) Service Oriented Architecture Building an enterprise-scale software system is a complex undertaking. Despite decades of technological advances, the demands imposed by today’s information systems frequently stretch to breaking point a company’s ability to design, construct, and evolve its mission-critical software solutions. In particular, few new systems are designed from the ground up. Rather, a software architect’s task is commonly that of extending the life of an existing solution by describing new business logic that manipulates an existing repository of data, presenting existing data and transactions through new channels such as an Internet browser or handheld devices, integrating previously disconnected systems supporting overlapping business activities, and so on. Service Oriented Architecture (SOA) SOA is a way of designing a software system to provide services to either end-user applications or other services through published and discoverable interfaces. In many cases, services provide a better way to expose discrete business functions and therefore an excellent way to develop applications that support business processes. SOA architecture adheres to the Four Tenets of Service Orientation. Service Orientation (SO) is an architectural...

Words: 1541 - Pages: 7

Premium Essay

Review Questions: Chapter 1

...Review Questions: Chapter 1 1.1. Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. • Data – known facts that can be recorded and that have implicit meaning. • Database – a collection of related data with an implicit meaning. • DBMS – a collection of programs that enables users to create and maintain a database • Database system – not only contains the database itself bit also a complete definition or description of the database structure and constrains. • Database catalog – the information about the database structure is stored in the Database Catalog which contains the structure of each file, the type and storage format of each data item, and various constrains of the data. • Program-Data Independence – DBMS access programs do not require changes in all programs due to the change in the structure of a file because the structure of data files is stored in the DBMS catalog separately from the access programs. • User View – a database typically has many users, and each of whom may require a different perspective or view of the database. A view may be a subset of the database or it may contain virtual data the is derived from the database files but is not explicitly stored. • DBA – a database administrator (short form DBA) is a person...

Words: 2493 - Pages: 10

Premium Essay

Riordan Manufactoring Hr System

...The analysis team will need to speak with users under Yvonne such as the Employee Relations Manager, Compensation & Benefits Manager, Payroll Manager, Employee Relations Specialist, Compensation Analyst, Benefits Manager, Payroll/Tax Clerk, Recruiters, Training and Development team, Safety Manager and Safety Techs. These users are vital to understand how the HR system works for them day to day. Requirements from this list of users can be used to determine how the new integrated system will be used at every Riordan location. Information Gathering and Analysis Tools Information gathering is very important in defining the requirements. Knowing how the HR system currently works and how the system needs to work is the objective of the gathering phase. According to Valacich, George and Hoffe (2007), the analysts need to understand the following components of a business to build...

Words: 3672 - Pages: 15

Premium Essay

A Technical View of System Analysis and Design

...becoming part of virtually every activity in an organization. This paper explores the relationship between the organizations and managers of IS projects and the usefulness and need for IS project managers to become more knowledgeable to be able to effectively anticipate and deal with conflicts that arise as a consequence of information systems creation or modifications in organizations. The development of a system basically involves two major parts: System Analysis and System Design. System Analysis is defined as the study of a business problem domain or area to recommend improvements and specify the business requirements and priorities for the solution (Whitten & Bentley, 2007). System design is defined as the specification or construction of a technical, computer-based solution for the business requirements identified in a System Analysis (Whitten & Bentley, 2007). Information Technology Architecture The term “IT Architecture” is used a lot in the IT industry. There is a need to understand what...

Words: 4173 - Pages: 17

Premium Essay

Fasttrack Module #5

...different purposes. 6. Why is Data considered a vital resource? - Most organizations couldn’t survive or succeed without quality data about their internal operations and external environment. 7. What is a Data Warehouse? - It is an integrated decision support database whose content derives from the various operational and analytical databases. It is historical and centralized source of data that has been standardized and integrated, used by managers and other professional users. 8. What are the 3 Network topologies? -Star, Ring and bus topology 9. What is “The Web”? - It is a system with a universally accepted set of standards for storing, retrieving, formatting, and displaying data using a client/server architecture. The web combines text, audio, video and...

Words: 2284 - Pages: 10

Premium Essay

Toward an Abstract Language on Top of Xacml for Web Services Security

...Engineering, Khalifa University of Science, Technology & Research, Abu Dhabi, UAE CDepartment of Computer Science, Kuwait University, Kuwait b Azzam Mourada, Hadi Otrok , Hamdi YahyaouiC and Lama Baajoura Abstract-We introduce in this paper an abstract language on top of XACML (eXtensible Access Control Markup Language) for web services security. It is based on the automatic generation of XACML security policies from abstract XACML profile(s). Our proposed approach allows first to specify the XACML profiles, which are then translated using our intended compiler into XACML security policies. The main contributions of our approach are: (1) Describing dynamic security policies using an abstract and user friendly profile language on top of XACML, (2) generating automatically the the XACML policies and (3) separating the business and security concerns of composite web services, and hence developing them separately. Our solution address the problems related to the complexity and difficulty of specifying security policies in XACML and other standard languages. We tested the feasibility of our approach by developing the library system (LB) that is composed of several Web services and applying/realizing our approach to enforce security. Keywords. Web Services Security; XACML; Security Policies; RBAC. The Security Assertion Markup Language (SAML) [2], WS­ Security [3] and WS-XACML [4] are the most successful ones. The main problems with such language-based strategies...

Words: 2085 - Pages: 9

Premium Essay

Paper Case Study Nantonia 

...Nantonia  ICT Strategy & Planning Master : ICT in Business Location : University, Leiden Course : ICT Strategy & Planning Assignment : Paper Case study Nantonia Date : 3 June 2011 Name : Suraj Soerdjbali Studentnr : Teacher : ------------------------------------------------- Part 1 The business model: 1. Partners: Natepco is a subsidiary of Natonia Energy Holdings. Which on their turn have a joint venture with Prime Energy Group and Government of Natonia 2. Key activities: The key activities of Natepco are exploration and production 3. Key resources: The key resources of Natepco are sell crude oil to commodity markets and gas (LHG) to power/electricity producers 4. Value Proposition: crude oil and gas (LHG) 5. Relationship: Their Brand, retaining customers 6. Distribution and acquisition channel: Traders, electricity producers 7. Customers: willing market in local industry 8. Cost structure: Manufacturing, exploration, maintenance 9. Revenue streams: The IT systems being used within the business model: * Partners: Prime Energy Group is in consideration of implementing SAP * Key activities: VAX/Compaq systems are used for drilling applications, HP systems are used for running applications for maintenance en procurement. Offshore platforms uses email application and application access * Key resource: IBM systems for finance The business maxims that I found in the case are: * To be government’s...

Words: 3623 - Pages: 15

Free Essay

It Architecture

...Enterprise Architecture Vol. 11, No. 10 10 Key Skills Architects Must Have to Deliver Value by Michael Rosen, Director, Cutter Consortium Enterprise Architecture Practice As the complexity of IT grows, more and more organizations are realizing the need for architecture. But the definition of what architecture is, the titles that architects have, and the role of an architect vary widely from one organization to another. Business, IT, management, and even architects don’t necessarily know what a good architect does to add value in his or her organization. This Executive Report discusses the role of the architect and describes 10 activities that architects should perform to add value to projects. ABOUT CUTTER CONSORTIUM Access to the Experts Cutter Consortium is a unique IT advisory firm, comprising a group of more than 100 internationally recognized experts who have come together to offer content, consulting, and training to our clients. These experts are committed to delivering top-level, critical, and objective advice. They have done, and are doing, groundbreaking work in organizations worldwide, helping companies deal with issues in the core areas of software development and agile project management, enterprise architecture, business technology trends and strategies, innovation, enterprise risk management, metrics, and sourcing. Cutter offers a different value proposition than other IT research firms: We give you Access to the Experts....

Words: 11157 - Pages: 45

Premium Essay

Reflection

...the work environment. Databases play a significant role in an organization, so it is important to know how to capitalize on database functionality. You will also learn how businesses, consumers, and the government use collaboration tools in the work environment, and how these tools have transformed the business processes of today’s organizations. Additionally, you will explore electronic commerce, and discuss the challenges this technology presents to businesses and their consumers. Databases, Network Applications, and E-Business OBJECTIVE: Describe how databases are used in the work environment. Resources: Ch. 4 and Technology Guide 2 of Introduction to Information Systems and Ch. 1 for Access in Microsoft® Office 2010 Content • Ch. 4: Data and Knowledge Management of Introduction to Information Systems o Managing Data • The Difficulties of Managing Data • The Data Life Cycle o The Database Approach • The Data Hierarchy • Designing the Database o Database Management Systems • The Relational Database Model • Databases in Action o Data Warehousing • Describing the Data Warehouse • Data Marts o Data Governance o Knowledge Management • Concepts and Definitions • Knowledge Management Systems • The Knowledge Management System Cycle • Technology Guide 2: Computer Software of Introduction to Information Systems ...

Words: 610 - Pages: 3

Free Essay

With the Development of Technology, More and More Robots Are Used in Various Fields,

...University of Mumbai B.E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access...

Words: 3868 - Pages: 16

Premium Essay

Database

...data - known facts that can be recorded and that have implicit meaning. Database - represents some aspect of the real world (miniworld or universe of discource – UoD). Collection of related data (a random assortment of data is not a database). A DB is designed, built, and populated with data for a specific purpose. It has an intended group of users and a some preconceived applications in which the users are interested. DBMS - is a collection of programs that enables users to create and maintain a database. database system – it is a combination of database and DBMS software. program – data independence – The structure of data files is stored in the DBMS catalog separately from the access programs. user view - – includes a number of external schemas that describes the part of the database that a particular user group is interested in and hides the rest of the database from that user group. DBA – is an IT professional that is responsible for Installation, Configuration, Upgrade, Administration, Monitoring, Maintenance and Securing of databases in an organization. The chief administrator of the database. end user - are the people whose jobs require access to the database for querying, updating, and generating reports; the database primarily exists for their use. data model - a collection of concepts that can be used to describe the structure of a database-provides the necessary means to achieve this abstraction. database schema - of a database system is its structure described...

Words: 959 - Pages: 4

Premium Essay

Library Mgt System

...SPECIFICATION 17 CHAPTER FOUR 18 SYSTEM DESIGN 18 4.1 INPUT AND OUTPUT FORMS 18 4.1.1 DATA TABLES 18 4.1.2 DISPLAY FORMS 19 4.2 CONCLUSION 21 REFERENCES 22 ABSTRACT The adoption of integrated library systems (ILS) became prevalent in the 1980s and 1990s as libraries began or continued to automate their processes. These systems enabled library staff to work, in many cases, more efficiently than they had in the past. However, these systems were also restrictive—especially as the nature of the work began to change—largely in response to the growth of electronic and digital resources that they were not designed to manage. New library systems—the second (or next) generation—are needed to effectively manage the processes of acquiring, describing, and making available all library resources. This article examines the state of library systems today and describes the features needed in a...

Words: 4154 - Pages: 17

Free Essay

Model Driven Development-Future or Failure

...Model Driven Development – Future or Failure of Software Development? Ruben Picek, Vjeran Strahonja University of Zagreb, Faculty of Organization and Informatics, Varaždin ruben.picek@foi.hr, vjeran.strahonja@foi.hr Abstract. This article discusses some issues of the software development paradigm called Model Driven Development (MDD). Its basic idea is to move software development to a higher level of abstraction by using models as primary artifacts, and to transform models into the source code, with the aid of tools. Currently, there are several approaches to the realization of MDD paradigm which should bring a lot of benefits. However there are still problems to be solved, which will be discussed here. The authors are also going to analyze developers pros and cons, and give their own opinion about today's open question: Will MDD become a failure in trying to deal with software crisis, like the idea of CASE tools in 80's or will it become the future of software development? Keywords. MDD, MDD approaches, Software Factories, Software Development 1. Model Driven Development Paradigm In the last few years, software development has been faced with many challenges. Requirements of new and/or existing systems are growing, systems are complex and it is hard to build them on time and on budget. As an answer to these challenges, a wide spectrum of new approaches occurred, varying from buzzwords to comprehensive methodologies. One of the most prominent paradigms is Model Driven Development...

Words: 5437 - Pages: 22

Free Essay

Applied Soa

...Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA: Service-Oriented Architecture and Design Strategies Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright  2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-22365-9 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and...

Words: 218699 - Pages: 875

Premium Essay

Db Hw1

...server Catalog task to create a database catalog. Meta-data: The database definition of descriptive information is also stored by the DBMS in the form of a database catalog or dictionary. Program-data independence: The structure of data files is stored in the DBMS catalog separately from the access program. User view: database primarily exists for use like accessed to the database for querying, updating, and generating reports. DBA: people who administer the database, DBMS and related software. End user: people whose job requires access to the database for querying, updating, and generating reports. Canned transaction: using standard types of queries and updates. Deductive database system: database system which provides capabilities for defining deduction rules for inferencing new information from the stored database facts. Persistent object: stored in the database and persist after program termination. Transaction-processing application: application that the information processing that is divided into individual. 1.3 Main characteristics: Self-contained nature of a db system. Insulation between programs and data. Data abstraction. Support of multiple views of the data. Sharing of data and multiuser transaction processing. For traditional file systems, it cannot allow users to concurrent access to the data. 1.5 Casual end users: occasionally access the database, but they may need different information each time. Naive or...

Words: 3269 - Pages: 14