Designing Controls for Network Organisations: A Value-Based Approach

ion of procedural details of controls. The second purpose of the value viewpoint for procedural controls goes back to the complexity of networks. The design of inter-organizational controls can be very complex, because, for instance, different perspectives of the multiple stakeholders are involved. A way to deal with this multi-perspective problem is to use a multiviewpoint approach and in this thesis we have focussed on two viewpoints: the economic value viewpoint and the process viewpoint. By introducing a value viewpoint, we provide a high-level model of controls, without focusing on procedural details. As can be concluded from the case studies, an economic value analysis of control guides the design of the underlying process or information system solution. The latter can be seen as a solution that ensures the occurrence of all value transfers of the corresponding value model. From Key research outputs 299 this point of view, the preliminary value modelling is important, because different economic value solutions require different operational models to implement it. For instance, in the music case study, a business model for paid radio would require a different information system than the business model for free radio considered in our case. The econtrol methodology allows us to focus on pure value-related aspects of control mechanisms, and provides additional functionality compared to the process perspective on controls. In the health care case, we found the economic value perspective important in the design of a new controls service, the Social Chart, which was the most important result for the health care domain experts of the FRUX project [Droes et al., 2005]. Modelling the Social Chart from the economic value perspective yields such issues as who will fund the Social Chart, what service does it provide and who will operate the Social Chart. A further evalue analysis enables us to answer these questions, which is not provided by procedural modelling. The analysis of procedural controls along with their value aspects is also important because the choices made in value models should not contradict the control principles. The issue of who will operate the Chart is important not only from the value perspective, but also from the control perspective. The operator of the Social Chart should be independent from the care providers or insurance companies, who would like to advertise the service. Similar issues were encountered in the Beer Export case. In the Beer Export case, where the parties who deliver the TREC service should be impartial and not not be prejudiced in favour of a reduction in excise payments. To summarize these arguments, we conclude that the combination of process and value perspectives provides a valuable tool to analyze both control and economic value issues related to the introduction of these controls. The analysis performed by econtrol is more powerful than that provided from a process perspective alone. 14.1.3 The e3control ontology To design opportunistic behaviour, we have suggested the econtrol ontology, which is based on the existing evalue ontology, introduced by [Gordijn and Akkermans, 2003]. The evalue ontology represents concepts to describe a network organization as a set of actors that exchange objects of economic value with each other, however it does not incorporate control-related aspects, such as opportunistic behaviour. Therefore, we have extended the evalue ontology to specifically include the concepts required to model the effects of opportunistic behaviour on value transfers. The concepts we have introduced in the econtrol ontology include, among other things, subideal value object and sub-ideal value transfer to show that the result of sub-ideal behaviour is an incorrect exchange of a value object or an exchange of an inappropriate value object. The transfers of sub-ideal value objects are marked in graphical models with dashed lines. In addition, we have introduced a liability token, a concept that allows us to identify the party who behaves sub-ideally. As was discovered in the case studies, all the control problems, which we have elicited from domain experts or from literature reviews, could be modelled with the concepts of the econtrol 300 Conclusions and future research ontology. In all cases, the economic motivation behind the control problems could be identified and modelled with the concepts of econtrol . However, econtrol concepts were not sufficient when we wished to design more processor information systems-related aspects of controls. For example, econtrol cannot be used to express the sequential order of activities. This means that when procedural or other non-value details become important, an analysis should use the appropriate tools. In our work, some procedural aspects of control are described in the control patterns using UML activity diagrams. 14.1.4 The e3control patterns In addition to the econtrol ontology, the designer also needs to have knowledge about possible control problems and mechanisms that are possible and how they should be implemented in a proper way. This knowledge was structured in econtrol patterns, which are defined as descriptions of generic and re-usable control mechanisms for a recurring control problem. In this thesis, we have described four procedural control patterns and two contractual control patterns. The procedural patterns include: Partner Screening, Proper Contracting, Execution Monitoring and Execution Confirmation. The Partner Screening and Execution Monitoring patterns describe monitoring-based mechanisms to combat a counter actor who executes his contracting obligations sub-ideally. The difference between the two patterns is that Partner Screening suggests an ex-ante monitoring control, and Execution Monitoring suggests an ex-post monitoring control. Further, the Proper Contracting pattern describes how the contracting process should be arranged to avoid misunderstandings about the contracting commitments the actors make with each other. Finally, the Execution Confirmation pattern suggests how the final process of a transaction should be arranged to avoid misunderstandings about the performed activities. The control mechanisms described in the procedural patterns affect only the process viewpoint, unless a control requires some activity to be delegated. Delegation creates a service, modelled at the value level as a value transaction. In such a case, the control changes the initial value model. Delegation is modelled by combining procedural patterns with special delegation patterns. Furthermore, there are two contractual patterns: Penalty and Incentive. Both patterns describe an actor’s choice of behaving ideally or sub-ideally. The Penalty pattern describes a mechanism of punishing sub-ideal behaviour. The Incentive pattern describes a mechanism of rewarding ideal behaviour. In these patterns the control mechanism affects both the value and the process viewpoint. The patterns have been demonstrated in detail in two case studies: the ROC case and the Beer Export case. In the ROC case we describe the Execution Monitoring, the Incentive and the Penalty patterns. The Beer Export case includes the Execution Monitoring and Partner Screening patterns. Other patterns, although not demonstrated, could also be found in the case studies. The patterns can also be observed in the other two case studies. For instance, in the music case, the rights societies monitor the number of listeners and tracks played by the radio station. This ex-post monitoring process can be described by the Execution Monitoring pattern. The witnessing of the number of listeners and tracks is done by the listeners, who report this information to the rights societies. The information is then sent by the listener to the rights societies in a seamless model so that the listener does not interact with the process. Reflection on experience with the econtrol approach 301 In the health care case, several patterns can be found as well. For example, the government agency CVZ monitors the performance of care providers to ensure that patients get good quality care. This corresponds to the controls described in the Execution Monitoring pattern. Another scenario is when a care provider may claim to have no commitment to provide care for a given budget, and hence refuses to continue to provide care. In accordance with the Proper Contracting pattern, the government only commits a specific budget, if a care provider promises to provide the agreed care for that budget. The patterns in the health care case are analyzed in more detail in [Kartseva et al., 2007b]. We have not invented the controls described in the patterns. We have structured existing knowledge of controls by employing the patterns approach. The structuring of the knowledge of patterns is a contribution in itself, since, in our view, the controls in the internal control theory are not structured in an efficient way. Typical descriptions of internal controls are very domain-specific. Firstly, separate risks and controls are described for every specific activity of each transaction cycle. Secondly, they assume the presence of some specific documents or parts of IS (e.g. picking tickets, packing slips, bar codes, and credit card processing systems). As a result, a control designer must be acquainted with a huge number of control descriptions. For example, in the controls described in [Romney and Steinbart, 2006], a control expert, who wants to design controls for the sales and procurement processes inside an organization should have thorough knowledge of about one hundred controls. In the patterns, we describe the controls at a higher level of abstraction, without a specific focus on a business process or an industry. This is possible, since we start by modelling the control problems with domain-independent value models and initially describe a control problem as a sub-ideal value transfer. Thus, the controls

[1]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[2]  H. Simon,et al.  Administrative Behavior: A Study of Decision-Making Processes in Administrative Organization. , 1959 .

[3]  A. J. Lehmann Causation in artificial intelligence and law : a modelling approach , 2003 .

[4]  M. Sobrero,et al.  Structuring Inter-firm Relationships: A Metaanalytic Approach , 1998 .

[5]  Boris Shishkov,et al.  Software Specification Based on Re-usable Business Components , 2005 .

[6]  Petra Schubert,et al.  Virtual Communities of Transaction: The Role of Personalization in Electronic Commerce , 2000, Electron. Mark..

[7]  R. V. D. Pol Knowledge-based query formulation in information retrieval , 2000 .

[8]  Ronald M. Lee,et al.  Schematic evaluation of internal accounting control systems , 1992 .

[9]  Juan Roberto Castelo Valdueza,et al.  The Discrete Acyclic Digraph Markov Model in Data Mining , 2002 .

[10]  Jaap Gordijn,et al.  Health Care Control and Governance: Modeling Health Care Control Mechanisms and discovering Business Opportunities for Information Provision and Quality Assurance , 2005 .

[11]  Frank Dignum,et al.  A Formal Analysis of Auditing Principles for Electronic Trade Procedures , 2000, Int. J. Electron. Commer..

[12]  Jaap Gordijn,et al.  Music Rights Clearance Business Analysis and Delivery , 2005, EC-Web.

[13]  James O. Coplien,et al.  Pattern languages of program design , 1995 .

[14]  S. Ross The Economic Theory of Agency: The Principal's Problem , 1973 .

[15]  J. Aken Management Research Based on the Paradigm of the Design Sciences: The Quest for Field-Tested and Grounded Technological Rules , 2004 .

[16]  Kevin Crowston,et al.  Tools for Inventing Organizations: Toward a Handbook of Organizational Processes , 1999 .

[17]  P. Kotler Marketing Management: Analysis, Planning, Implementation and Control , 1972 .

[18]  Philip Wallage,et al.  Principles of Auditing: An Introduction to International Standards on Auditing , 2004 .

[19]  Roelof van Zwol Modelling and searching web-based document collections , 2002 .

[20]  Jaap Gordijn,et al.  Towards a Reference Ontology for Business Models , 2006, ER.

[21]  Anders Bouwer,et al.  Explaining behaviour: using qualitative simulation in interactive learning environments , 2005 .

[22]  Rik Eshuis,et al.  Semantics and Verification of UML Activity Diagrams for Workflow Modelling , 2002 .

[23]  Stefan Manegold,et al.  Understanding, modeling, and improving main-memory database performance , 2002 .

[24]  Thomas W. Malone,et al.  Modeling Coordination in Organizations and Markets , 1987 .

[25]  Kieke G.H Okma,et al.  Health care, health policies and health care reforms in the Netherlands , 2001 .

[26]  H. Varian Intermediate Microeconomics: A Modern Approach , 1987 .

[27]  Eric L. Denna,et al.  Accounting, Information Technology, and Business Solutions , 1995 .

[28]  G. de Haan,et al.  ETAG, A Formal Model of Competence Knowledge for User Interface Design , 2000 .

[29]  Jeffrey H. Dyer,et al.  The Relational View: Cooperative Strategy and Sources of Interorganizational Competitive Advantage , 1998 .

[30]  V. Bessa Machado Supporting the Construction of Qualitative Knowledge models , 2004 .

[31]  Jaap Gordijn,et al.  What is This Science Called Requirements Engineering? , 2006, 14th IEEE International Requirements Engineering Conference (RE'06).

[32]  Niels Nes,et al.  Image database management systems design considerations algorithms and architecture , 2000 .

[33]  Pericles Loucopoulos,et al.  Towards a systematic approach to the capture of patterns within a business domain , 2003, J. Syst. Softw..

[34]  Yves Pigneur,et al.  An eBusiness Model Ontology for Modeling eBusiness , 2002, Bled eConference.

[35]  V. Kartseva,et al.  Designing Controls for a Marketplace of Health Care Services: a Case Study , 2005 .

[36]  Stefan Seuring,et al.  Strategy and organization in supply chains , 2003 .

[37]  Wojciech Janusz Jamroga,et al.  Using multiple models of reality: on agents who know how to play safer , 2004 .

[38]  Jaap Gordijn,et al.  Designing and evaluating e-business models , 2001 .

[39]  Simon Keizer,et al.  Reasoning under Uncertainty in Natural Language Dialogue using Bayesian Networks , 2003 .

[40]  Lai Xu Monitoring multi-party contracts for E-business , 2004 .

[41]  Roel Wieringa,et al.  Applications of deontic logic in computer science: a concise overview , 1994 .

[42]  Jim Todd,et al.  World-Class Manufacturing , 1996 .

[43]  Jaap Gordijn,et al.  Modelling Value-based Inter-Organizational Controls in Healthcare Regulations , 2006, I3E.

[44]  E. Witte Field Research on Complex Decision-Making Processes – The Phase Theorem , 1972 .

[45]  Bart Willem Schermer,et al.  Software Agents, Surveillance and the right to privacy , 2007 .

[46]  Jaap Gordijn,et al.  Towards Control Patterns for Business Networks , 2006 .

[47]  Paul W. P. J. Grefen,et al.  Aligning Application Architecture to the Business Context , 2003, CAiSE.

[48]  Christopher Alexander,et al.  The Timeless Way of Building , 1979 .

[49]  Dov M. Gabbay,et al.  Inconsistency Handling in Multi-Perspective Specifications , 1993, ESEC.

[50]  Martin Bichler,et al.  Design science in information systems research , 2006, Wirtschaftsinf..

[51]  H. Demsetz,et al.  The Property Right Paradigm , 1973, The Journal of Economic History.

[52]  E. G. Boltjes,et al.  Voorbeeldig onderwijs : voorbeeldgestuurd onderwijs, een opstap naar abstract denken, vooral voor meisjes , 2004 .

[53]  Don Tapscott,et al.  Digital capital: harnessing the power of business Webs , 2000, UBIQ.

[54]  G. Susman,et al.  An Assessment of the Scientific Merits of Action Research. , 1978 .

[55]  Kevin Crowston,et al.  Tools for inventing organizations: toward a handbook of organizational processes , 1993, [1993] Proceedings Second Workshop on Enabling Technologies@m_Infrastructure for Collaborative Enterprises.

[56]  H.H.L.M. Donkers,et al.  NOSCE HOSTEM: Searching with Opponent Models , 1997 .

[57]  L. Porter,et al.  Management Education and Development: Drift or Thrust into the 21st Century? , 1988 .

[58]  Martin Fowler,et al.  Analysis patterns - reusable object models , 1996, Addison-Wesley series in object-oriented software engineering.

[59]  Jaap Gordijn,et al.  Analysing preventative and detective control mechanisms in international trade using value modelling , 2004, ICEC '04.

[60]  Michael H. Morris,et al.  The entrepreneur's business model: toward a unified perspective , 2005 .

[61]  Eddy H. J. Vaassen Accounting Information Systems: A Managerial Approach , 2002 .

[62]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[63]  T. Das,et al.  Between Trust and Control: Developing Confidence in Partner Cooperation in Alliances , 1998 .

[64]  van Boris Wessel Schooten,et al.  Development and Specification of Virtual Environments , 2003 .

[65]  Johan van den Akker,et al.  DEGAS: an active, temporal database of autonomous objects , 1998 .

[66]  N. F. Noy,et al.  Ontology Development 101: A Guide to Creating Your First Ontology , 2001 .

[67]  Koen V. Hindriks,et al.  Agent programming languages: programming with mental models , 2001 .

[68]  Hans Weigand,et al.  Workflow analysis with communication norms , 2003, Data Knowl. Eng..

[69]  O. Williamson Transaction-Cost Economics: The Governance of Contractual Relations , 1979, The Journal of Law and Economics.

[70]  C.M.T. Metselaar,et al.  Sociaal-organisatorische gevolgen van kennistechnologie : een procesbenadering en actorperspectief , 2000 .

[71]  Ronald M. Lee,et al.  Designing Trustworthy Interorganizational Trade Procedures for Open Electronic Commerce , 1998, Int. J. Electron. Commer..

[72]  Bashar Nuseibeh,et al.  Viewpoints: A Framework for Integrating Multiple Perspectives in System Development , 1992, Int. J. Softw. Eng. Knowl. Eng..

[73]  S. Bocconi,et al.  Vox Populi : generating video documentaries from semantically annotated media repositories , 2006 .

[74]  Roel Wieringa,et al.  Requirements engineering paper classification and evaluation criteria: a proposal and a discussion , 2005, Requirements Engineering.

[75]  Jaap Gordijn,et al.  European Conference on Information Systems ( ECIS ) 2004 Value Based Business Modelling for Network Organizations : Lessons Learned from the Electricity Sector , 2017 .

[76]  Laura Hollink,et al.  Semantic annotation for retrieval of visual resources , 2006 .

[77]  L. H. Christoph The role of metacognitive skills in learning to solve problems , 2006 .

[78]  Ard-Pieter de Man,et al.  The Network Economy: Strategy, Structure and Management , 2004 .

[79]  Jaap Gordijn,et al.  Inter-organisational Controls as Value Objects in Network Organisations , 2006, CAiSE.

[80]  P.A.T. van Eck,et al.  A Compositional Semantic Structure for Multi-Agent Systems Dynamics , 2001 .

[81]  K. Eisenhardt Agency Theory: An Assessment and Review , 1989 .

[82]  Jaap Gordijn,et al.  Value-based requirements engineering: exploring innovative e-commerce ideas , 2003, Requirements Engineering.

[83]  Marshall W. van Alstyne,et al.  The State of Network Organization: A Survey in Three Frameworks , 1997, J. Organ. Comput. Electron. Commer..

[84]  George M. Giaglis,et al.  A research framework for analysing eBusiness models , 2004, Eur. J. Inf. Syst..

[85]  Maarten Sierhuis,et al.  Modeling and simulating work practice : BRAHMS: a multiagent modeling and simulation language for work system analysis and design , 2001 .

[86]  Henri C. Dekker,et al.  Control of inter-organizational relationships: evidence on appropriation concerns and coordination requirements , 2004 .

[87]  M. Spence Job Market Signaling , 1973 .

[88]  M. Holbrook Consumer Value: A Framework for Analysis and Research , 1999 .

[89]  Marina Velikova,et al.  Monotone models for prediction in data mining , 2006 .

[90]  Dirk Riehle,et al.  Pattern Languages of Program Design 3 , 1997 .

[91]  A. de Moor,et al.  Empowering communities: A method for the legitimate user-driven specification of network information systems , 1999 .

[92]  Andreas Martin Thomas Lincke,et al.  Electronic business negotiation: some experimental studies on the interaction between medium, innovation context, and culture , 2003 .

[93]  Tom Groot,et al.  Control of international joint ventures , 2000 .

[94]  Pericles Loucopoulos,et al.  System Requirements Engineering , 1995, System Requirements Engineering.

[95]  Jan L. Top,et al.  Engineering ontologies , 1997, Int. J. Hum. Comput. Stud..

[96]  Peter Mika,et al.  Social Networks and the Semantic Web , 2007, IEEE/WIC/ACM International Conference on Web Intelligence (WI'04).

[97]  H. Akkermans,et al.  e 3-value : Design and Evaluation of e-Business Models , 2001 .

[98]  Ans A. G. Steuten A contribution to the linguistic analysis of business conversations within the language/action perspective , 1998 .

[99]  John Mylopoulos,et al.  Why Goal-Oriented Requirements Engineering , 1998, Requirements Engineering: Foundation for Software Quality.

[100]  Stacey Fusae Nagat User Assistance for Multitasking with Interruptions on a Mobile Device , 2006 .

[101]  A. Hardiyanto,et al.  Time Series Studies on Indonesian Rupiah/USD Rate 1995-2005 , 2000 .

[102]  Rainer Malik CONAN : Text Mining in the Biomedical Domain , 2006 .

[103]  M. B. van Riemsdijk,et al.  Cognitive agent programming : A semantic approach , 2006 .

[104]  Martin Wigbertus Antonius Caminada For the sake of the Argument : explorations into argument-based reasoning , 1997 .

[105]  F T Schut Health care systems in transition: The Netherlands. Part I: Health care reforms in The Netherlands: miracle or mirage? , 1996, Journal of public health medicine.

[106]  R. Anthony,et al.  Management Control Systems , 2020, Management Control Systems and Tools for Internationalization Success.

[107]  J. Austin How to do things with words , 1962 .

[108]  E. Roche Place to Space: Migrating to eBusiness Models , 2001 .

[109]  W.C.A. Wijngaards,et al.  Agent-Based Modelling of Dynamics: Biological and Organisational Applications , 2002 .

[110]  Peter Boncz,et al.  UvA-DARE ( Digital Academic Repository ) Monet ; a next-Generation DBMS Kernel For Query-Intensive Applications , 2007 .

[111]  Kenmore S. Brathwaite Applications development using CASE tools , 1990 .

[112]  R. Yin Case Study Research: Design and Methods , 1984 .

[113]  W. Ouchi A Conceptual Framework for the Design of Organizational Control Mechanisms , 1979 .

[114]  Henk Ernst Blok Database Optimization Aspects for Information Retrieval , 2002 .

[115]  M. C. Jensen,et al.  THEORY OF THE FIRM: MANAGERIAL BEHAVIOR, AGENCY COSTS AND OWNERSHIP STRUCTURE , 1976 .

[116]  Raymond J. A. Buhr,et al.  Use Case Maps as Architectural Entities for Complex Systems , 1998, IEEE Trans. Software Eng..

[117]  Janis Stirna,et al.  Evaluating a Pattern Approach as an Aid for the Development of Organisational Knowledge: An Empirical Study , 2000, CAiSE.

[118]  P. Groot,et al.  A Theoretical and Empirical Analysis of Approximation in Symbolic Problem Solving , 2004 .

[119]  Stephen Tallman,et al.  Control and Performance in International Joint Ventures , 1997 .

[120]  W. Robert Knechel,et al.  Auditing: Assurance and Risk , 2000 .

[121]  Andrew J. I. Jones,et al.  Ideality, sub-ideality and deontic logic , 2004, Synthese.

[122]  H. Stuckenschmidt,et al.  Ontology-Based Information Sharing in Weakly Structured Environments , 2003 .

[123]  D. Kynaston,et al.  Financial times , 2024, Nursery World.

[124]  Thijs Westerveld,et al.  Using generative probabilistic models for multimedia retrieval , 2005, SIGF.

[125]  Patrick Keil,et al.  Principal agent theory and its application to analyze outsourcing of software development , 2005, ACM SIGSOFT Softw. Eng. Notes.

[126]  Jacob Lenting Informed gambling : conception and analysis of a multi-agent mechanism for discrete reallocation , 1999 .

[127]  Salvatore T. March,et al.  Design and natural science research on information technology , 1995, Decis. Support Syst..

[128]  Peter Coad,et al.  Object-oriented patterns , 1992, CACM.

[129]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[130]  Yao-Hua Tan,et al.  Toward a Generic Model of Trust for Electronic Commerce , 2000, Int. J. Electron. Commer..

[131]  Jan Broersen Modal Action Logics for Reasoning about Reactive Systems , 2003 .

[132]  Ulrike Lechner,et al.  Success factors of communites of patients , 2006, ECIS.

[133]  Rudi Bekkers,et al.  Intellectual Property Rights, Strategic Technology Agreements and Market Structure, The Case of GSM , 2002 .

[134]  Marko Smiljanic,et al.  XML schema matching : balancing efficiency and effectiveness by means of clustering , 2006 .

[135]  Dov M. Gabbay,et al.  Inconsistency Handling in Multperspective Specifications , 1994, IEEE Trans. Software Eng..

[136]  Ivar Jacobson,et al.  The unified modeling language reference manual , 2010 .

[137]  Hans Weigand,et al.  On the Notion of Value Object , 2006, CAiSE.

[138]  van Joeri Ruth Flattening queries over nested data types , 2006 .

[139]  Jaap Gordijn,et al.  Control Patterns in a Healthcare Network: Applying Control Patterns to Redesign Governance and Control Mechanisms in a Healthcare Network , 2006 .

[140]  Jaap Gordijn,et al.  Toward a Modeling Tool for Designing Control Mechanisms for Network Organizations , 2005, Int. J. Electron. Commer..

[141]  Michael Uschold,et al.  The Enterprise Ontology , 1998, The Knowledge Engineering Review.

[142]  Neerincx,et al.  Human-computer interaction and presence in virtual reality exposure therapy , 2003 .

[143]  S. J. Karlsson Scalable distributed data structures for database management , 2000 .

[144]  Yannis Bakos,et al.  The emerging role of electronic marketplaces on the Internet , 1998, CACM.