Value-based Modeling of Supply Chains for Disclosure Risk Assessment

Similar documents
International Journal of Computing and Business Research (IJCBR) ISSN (Online) :

Information Systems Architecture and Enterprise Modeling. Prof. Dr. Knut Hinkelmann

Integrated Methodology for linking business and process models

An MDA Method for Service Modeling by Formalizing REA and Open-edi Business Frameworks with SBVR

Innovation - Model-to-execute How we align Business & IT

HARMONIZATION OF STANDARDS FOR ENTERPRISE INTEGRATION AN URGENT NEED. Martin Zelm

An Extension of Business Process Model and Notation for Security Risk Management

Prerequisites It is recommended that the participants have a working knowledge of traditional Business Analysis tasks and techniques.

Metric systems for executive overview

Organizing the Business Process Management Space. Mathias Weske

CHAPTER 1. Business Process Management & Information Technology

A MODEL BASED SYSTEMS ENGINEERING PROCESSES DEPLOYMENT FRAMEWORK

IN COMPLEX PROCESS APPLICATION DEVELOPMENT

Oracle Banking Reference Process Models

<Insert Picture Here> Oracle Business Process Analysis Suite: Overview & Product Strategy

MDA Overview Applied MDA

Introduction and Key Concepts Study Group Session 1

SOA Enabled Workflow Modernization

ATTITUDE TOWARD RISKS IN SUPPLY CHAIN RISK MANAGEMENT

Toolbox for Architecture Framework Discussions at The Open Group. SKF Group, February 2018

Digital Transformation with Enterprise Digital Twins

FROM BUSINESS MODELS TO SERVICE-ORIENTED DESIGN: A REFERENCE CATALOG APPROACH. Amy Yuen Yee Lo

Enterprise Architecture: an ideal discipline for use in Supply Chain Management

This article is a summary of the following publication:

Boost Your Skills with On-Site Courses Tailored to Your Needs

Enterprise Architecture Introduction

Digital Industries Apprenticeship: Occupational Brief. Software Development Technician. September 2016

Digital Industries Apprenticeship: Occupational Brief. Software Development Technician. September 2016

COURSE LISTING. Courses Listed. with SAP S/4HANA. 4 February 2018 (03:51 GMT)

Model based Approaches for Service Oriented Architectures. Mel Greer

Object-Oriented Software Engineering Using UML, Patterns, and Java. Chapter 1: Introduction

Software Engineering & Architecture

Business Process Management with JRULE

Object-Oriented Software Engineering! Using UML, Patterns, and Java! Chapter 1: Introduction!

IMPLEMENTATION OF CONSTRUCTION INDUSTRY BEST PRACTICES INTO WORKFLOW MANAGEMENT SYSTEMS

An Empirical Based Proposal for Mass Customization Business Model in Footwear Industry

DE Services in Ecosystem Oriented Architectures

INFORMATION SYSTEMS ANALYSIS AND DESIGN

The energy reference model catalog energy-rmc CIM Users Group Meeting 17 June, 2010 Milan, Italy

Workflow-Processing and Verification for Safety- Critical Engineering: Conceptual Architecture Deliverable D6.1

EMEA TMC client conference Operationalising transfer pricing. The Crystal, London 9-10 June 2015

Annual reporting in 2016/17: broad perspective, clear focus Aide mémoire

About Business models and Ecosystems

Oracle Banking Reference Process Models

Towards a Shared European Logistics Intelligent Information Space European Green Logistics Strategies White Paper: Overall Perspective

IN the inaugural issue of the IEEE Transactions on Services Computing (TSC), I used SOA, service-oriented consulting

An Overview of Supply Chain Competitiveness in Manufacturing Industries: Strategies and Framework

Decision Modeling for Risk Bearing in Sustainable Supply Chains using ISM Approach

Consolidations with SAP BusinessObjects Planning and Consolidations (BPC) Auric IT Consulting Services LLC February 2013

Agile Services: A Reference Architecture for Creating Dynamic Processes

With a presence in 25 countries and 10 offices in Spain and Latin America, EDISA has established itself as a leading supplier to the medium-and-large

Introduction and Key Concepts Study Group Session 1

Contextual Modelling of Collaboration System

Business Process Modeling Information Systems in Industry ( )

Software Product Management. Published by Christof Ebert (2012)

Enterprise Architecture Dealing with Complexity and Change

LA MODELLAZIONE DEI PROCESSI IN MEDICINA. Corso di Informatica Medica

nel panorama SOA Il ruolo nuovo del system integrator

Enterprise Portal Modeling Methodologies and Processes

11/12/2015. Session #9

Towards a Reference Model of Business Model & Business Process Management Alignment

Requirements Analysis and Design Definition. Chapter Study Group Learning Materials

Decentralized software development Pitfalls and challenges A software engineering viewpoint

CHAPTER 2 LITERATURE SURVEY

Lecture 1. In practice, most large systems are developed using a. A software process model is an abstract representation

Unit 9 Information Systems

Business Process Modelling 28 February 2013

7. Model based software architecture

Advanced Services for Supply Chain Design Processes in Collaborative Networks

CMMI for Acquisition Quick Reference

Landscape Deployment Recommendations for SAP Assurance and Compliance Software for SAP S/4HANA. SAP SE November 2017

Conceptual Process Modeling Language: Regulative Approach

From Good to Great in Sustainability Reporting. NewLeef Conference 2013


Designing Software Ecosystems. How Can Modeling Techniques Help? Mahsa H. Sadi, Eric Yu. 1 Introduction. 2 Modeling Requirements.

Business Process Modeling - More Than Just BPMN. Models: Project Insights

CORE APPLICATIONS ANALYSIS OF BUSINESS-CRITICAL ADABAS & NATURAL

CENTRAL PROCESS REPOSITORY

ICMI PROFESSIONAL CERTIFICATION

From e3-value to REA: Modeling multi-party ebusiness Collaborations

A META-MODEL FOR THE SPATIAL CAPABILITY ARCHITECTURE

1.1.2 A description of the work performed since the beginning of the CORE project and the main results achieved so far

Motivation Issues in the Framework of Information Systems Architecture

MOTIVATION ISSUES IN THE FRAMEWORK OF INFORMATION SYSTEMS ARCHITECTURE

CBA UNDERGRADUATE ASSESSMENT MATRIX CORE KNOWLEDGE LEARNING OUTCOMES

Workflows and Decision Tables for Flexible Early Warning Systems

Developer-Friendly Business Process Management

BPM. Business Process Management

IIBA Global Business Analysis Core Standard. A Companion to A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 3

Modelling Business Transactions from the Value and Collaboration Perspective

A Novel Framework to Model a Secure Information System (IS)

TOGAF 9.1 Phases E-H & Requirements Management

Modeling Support for Simulating Traffic Intensive Web Applications

Lecture 3: Supply Chain Risk Management

DETAILED COURSE AGENDA

Chapter 7 Strategic Relationships

TOGAF Foundation. Part I: Basic Concepts 1 /

The 2014 Guide to SAP Enterprise Performance Management (EPM) Solutions: An excerpt. David Williams SAP

Information Systems Planning

Practical Company Organization Modeling Guide

Transcription:

Value-based Modeling of Supply Chains for Disclosure Risk Assessment P. Ceravolo 1 E. Damiani 1 C. Fugazza 1 S. Marrara 1 K. Reed 2 O. Scotti 1 1 Dipartimento di Tecnologie dell Informazione Università degli Studi di Milano {ceravolo,damiani,fugazza,marrara,oscotti}@dti.unimi.it 2 Department of Computer Science, LaTrobe University Bundoora, Melbourne, Australia k.reed@latrobe.edu.au Value Modeling and Business Ontologies Stockholm, Feb 10th, 2009

Outline Rationale Modeling supply chains Supply chain analysis Outlook Bibliography

Disclosure risk assessment Risk assessment is not a key component of methodologies for supply chain (SC) management. Still, certain characteristics of a SC might increase or decrease the risk of negative outcomes [11, 13]. Further, the available procedures do not focus on risks related to information disclosure. As in any collaborative alliance, SCs need to be founded on trust among parties. The perception of a risk by the actors could lead to their abandoning the SC. In a risky configuration, actors may be reluctant to share information [7].

Disclosure risk assessment Collaborative SC management is the combined optimization of supply and delivery. SC optimization is necessary to sustain competition with SCs in the same business area. Optimization is based on data provided by each partner in the SC. The risks to be identified are internal to the SC. Misuse of shared information may damage the other partners. Example: The introduction of fake information may direct the distribution of orders in favor of the disrupter.

Disclosure risk assessment Each actor participates to the coalition with its own objectives. These need to be reconciled with the achievement of the common good. If achieving such common good requires completely missing their objectives, actors may be tempted to adopt a non-cooperative behavior. This conflict of interest and the resulting risk can be described as an information sharing problem. A third party may not be equally trusted by all the actors for the SC master planning.

Disclosure risk assessment Our framework for disclosure risk assessment in the enactment of SCs is comprising: The SCM model describing the relationships among actors and the information exchanged by them; the corresponding value model enriched with the parameters that are not already featured by the e 3 value ontology; the key performance indicators (KPI) ontology describing the entities and functions for risk assessment. Indicators allows to point out how far an actor is from the optimum and prone to behave opportunistically.

Outline Rationale Modeling supply chains Supply chain analysis Outlook Bibliography

Modeling supply chains Traditional SC modeling techniques may be awkward for the average business analyst to fully grasp.

Modeling supply chains Topological features of the supply chain important for determining the probability and consequences of deviant behavior. Consequently, a prerequisite to an effective monitoring is a sound model for representing the coalition s value interchanges. As opposed to BPM, value models [14, 6] describe business coalitions at a higher level of abstraction. Value models depict always which entities of value are exchanged between stakeholders. Business decisions can thus be based on estimates of the economic behavior of the different parties.

Modeling supply chains We selected a modeling technique which also allows for a graphical representation, the e 3 value model [8]. The primary motivation for adopting this formalism is the one-to-one correspondence of the model with logic-based data structures. The e 3 value ontology allows for the extension of its constructs with the data items characterizing the supply chain.

Modeling supply chains In the ontology-based representation of the SC we integrate: The SC description (here shown expanded); the value model expressing it; the performance indicators to be applied in the analysis. For the time being, we are using the Shapley Value: u i = C 1 n( (n 1) i)] (1) (k 1))[v(C) v(c

Outline Rationale Modeling supply chains Supply chain analysis Outlook Bibliography

Supply chain analysis example We want to evaluate which actor is prone to adopt an opportunistic behavior by knowing a certain information. In a whiteboard scenario all actors share the data that are necessary for the SC optimization. In this scenario, it is possible for R to calculate its Shapley value and decide that the supply chain configuration is unfair to it.

Supply chain analysis example By knowing the manufacturer s allocation strategy (favoring resellers with the highest declared price), R may decide to adopt an opportunistic behavior. One possible attack by actor R could be lying on the sale price that is applied to the product. By declaring a price equal to 13, the actor would increase the overall profit toward its Shapley value. Then, the parameter declared price cannot be shared among actors without increasing the risk of actor R to misbehave.

Supply chain analysis example In real-world SC the analysis we carry out is more complex. The delta between profit and Shapley value is weighted according to the impact of individual actors (e.g., upstream Vs. downstream actors). The normalized result leads to a ranking of actors according to the criticality of deviant behavior by them. The costs associated with the application of secure computation in SC optimization are evaluated. Alternative incentive strategies are also evaluated.

Outline Rationale Modeling supply chains Supply chain analysis Outlook Bibliography

Conclusions and outlook Our approach may serve more general purposes in the modeling of business coalitions and social behavior. The architecture aims at integrating with existing tools to enrich the range of results that may be presented to the business analyst. Example: The profitability sheet generated by value modeling tools could be enriched by adding the calculation of the Shapley value. We are currently deploying our Java routine for calculating the Shapley value as an easily accessible web service. We also want to develop interfaces customizing the input to our web service according to specific data formats (e.g., the e 3 value ontology).

Two possible integration scenarios: Conclusions and outlook The e 3 value editor introduces as built-ins the parameters for KPI evaluation. By doing this, SecureSCM-enabled supply chains can be created without relying on the underlying data model. The web service is invoked during calculation of profitability sheets, introducing a new, objective indicator for evaluating risk. Alternatively, the other way around: SecureSCM data are translated into an e 3 value ontology instance, embedding KPIs as custom properties. The generated profitability sheets will include the evaluation of KPIs. A custom application (or the human agent) derives the ranking of actors according to information disclosure risk.

Outline Rationale Modeling supply chains Supply chain analysis Outlook Bibliography

Bibliography [1] Secure Supply Chain Management. FP7 Project. http://securescm.org/. [2] Business Process Modeling Notation (BPMN). Misc, OMG, 2006. http://www.bpmn.org/documents/bpmn%20v1-0%20may%203%202004.pdf. [3] A. Brun, R. Cagliano, F. Caniato, K. Fahmy Salama, A. Sianesi, and G. L. Spina. Supply chain performance measurement systems: how to evaluate their performance? In Second European Forum on Market-Driven Supply Chains. EIASM, Politecnico di Milano, 2005. [4] Martin Christopher and Hau Lee. Mitigating supply chain risk through improved confidence. International Journal of Physical Distribution & Logistics Management, 34:388 396, 2004. [5] Ernesto Damiani, Paolo Ceravolo, Stelvio Cimato, and Gabriele Gianini. Obfuscation for the common good. Submitted to SAR-SSI, 2008.

Bibliography [6] McCarthy W. E. The REA accounting model: A generalized framework for accounting systems in a shared data environment. The Accounting Review, 1982. [7] S.E. Fawcett and G.M. Magnan. Achieving world-class supply chain alignment: Benefits, barriers and bridges. Technical report, CAPS Research/ Institute for Supply Management, 2001. [8] J. Gordijn and J. Akkermans. Value-based requirements engineering: Exploring innovative e-commerce ideas. Requirements Engineering, 8(2):114 134, 2003. [9] A. Gunasekaran, C. Patel, and Ronald E. McGaughey. A framework for supply chain performance measurement. International Journal of Production Economics, 87(3):333 347, February 2004. [10] J. Hallikas, I. Karvonen, U. Pulkkinen, V. Virolainen, and M. Tuominen. Risk management processes in supplier networks. International Journal of Production Economics, 90:47 58, 2004.

Bibliography [11] O. K. Helferich and R. L. Cook. Securing the supply chain. Technical report, Council of Logistics Management, 2002. [12] U. Jüttner, H. Peck, and M. Christopher. Supply chain risk management: Outlining an agenda for future research. International Journal of Logistics: Research and Applications, 6:197 210, 2003. [13] A. Norrman and R. Lindroth. Supply Chain Risk, chapter Categorization of supply chain risk and risk management, pages 14 27. Hampshire, 2004. [14] A. Osterwalder. The Business Model Ontology. A Proposition in a Design Science Approach. PhD thesis, University of Lausanne, 2004. [15] S.H. Park and G.R. Ungson. Inter-firm rivalry and managerial complexity: a conceptual framework of alliance failure. Organization Science, 12:37 53, 2001.

Bibliography [16] Helen Peck. Drivers of supply chain vulnerability: an integrated framework. International Journal of Physical Distribution & Logistics Management, 35:210 232, 2005. [17] C.S. Tang. Robust strategies for mitigating supply chain disruptions. International Journal of Logistics: Research and Applications, 9:33 45, 2006. [18] Unified Modeling Language (UML), version 2.1.1. Technical report, OMG, 2003. [19] K.A. Wade-Benzoni, A.E. Tenbrunsel, and M.H. Bazerman. Egocentric interpretations of fairness in asymmetric, environmental social dilemmas: explaining harvesting behavior and the role of communication. Organizational Behavior & Human Decision Processes, 67 (2):111 126, 1996. [20] World Wide Web Consourtium. RDF Vocabulary Description Language 1.0: RDF Schema, December 2003.