1 crossing the chasm business process to information system reading assignment supplementary module...

19
1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

Upload: alannah-johnston

Post on 17-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

1

CROSSING THE CHASMBusiness Process to Information System

Reading Assignment

Supplementary module 5

Page 2: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

2

Tangible Objects, Processes & Mechanisms

Tangible Information Information Logistics,

Interface & Technology Layers

Abstract Meanings & Patterns that

unify

INFORMATION SPACE(A CONNECTING HUB)REAL

WORLD

INFORMATION SYSTEM

THE BRIDGES FROM INFORMATION SPACE

• Information is the essence of an object– Its meaning

• An abstract pattern of information in an abstract place– We have named this place Information Space– Contains patterns of possibilities, the meaning of impossible and of meaninglessness itself– Carved from inchoate information by constraints; contains the meaning of constraint itself

• Physical space and time are only one aspect, a facet of information space• Information is expressed in physical space with symbols• A physical object may be considered a format of the information it conveys

– A manifestation of the information it conveys• Information space is also a hub that can sweep information from reality to information systems

Page 3: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

3

© Amit Mitra & Amar Gupta

PERCEPTION AND COMMUNICATION OF MEANING•Five fundamental formatting domains based on five senses–Visible (Visual) Formats: normalizes behavior common to visual perception

–Eg: 3d, movement and rotation in space, viewpoints from different locations, color, size, contrast, brightness, etc.

•Script: Written symbols such as alphabets, numerals and words•Graphics: diagrams, pictures etc.

–Audible (Audio) Formats: normalizes behavior common to audible perception

–Eg: loudness (volume), pitch

–Tactile (Haptics) formats: normalize behavior about touch

–Eg: feeling of pressure, roughness or smoothness, heat or cold, hardness and softness, sharpness or bluntness, friction etc.

–Olfactory Formats: normalizes behaviors natural to sense of smell–Taste Formats: normalizes behaviors natural to sense of taste

• Bridge between Business and Interface Layers

TECHNOLOGY RULES

INTERFACE RULES(HUMAN & AUTOMATION)

INFORMATIONLOGISTICS

BUSINESSRULES

Vision

Proce

ssEve

nts

Value

Policy

/Stra

tegy

Excep

tions

BUSINESSPATTERNS

DATA MOVEM

ENT

GUIs & F

ORMATTIN

G

COMPONENTS

PERFO

RMAN

CE OPTI

MIZ

ATION

COM

PONEN

TS

Meaning to algorithm or formula

Page 4: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

4

Unload cookie

Bake dough

Cookie batch

Cookie Sheet (in use)

Cookie (information)

Cookie Sheet (used)(information)

Changestate ofcookie sheet

Create cookie

Begin(not

necessarily together)

End(not necessarily together)

(effect)

(effect)

(PROCESS)

precede

(Process)

Cookie

Cookie Sheet(used)

(Mutually Inclusive Effects)(PRODUCTS)

(RESOURCES)

BUSINESS PROCESS TO COMPUTER PROCESS

Page 5: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

5

Unload cookie

Bake dough

Cookie batch

Cookie Sheet (in use)

Cookie (information)

Cookie Sheet (used)(information)

Changestate ofcookie sheet

Create cookie

Begin(not

necessarily together)

End(not necessarily together)

(effect)

(effect)

(PROCESS)

precede

(Process)

Cookie

Cookie Sheet(used)

(Mutually Inclusive Effects)(PRODUCTS)

(RESOURCES)

BUSINESS PROCESS TO COMPUTER PROCESS

• Must begin and end together in real life• Only mutually inclusive in an automated system

– Defines a transaction, roll back-recovery– Differrent from a business rule that requires the process be restarted with fresh dough if it has been suspended for more than an hour

Page 6: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

6

I/S controlProcess

(A)

THE INFORMATION SYSTEMS ASSEMBLY LINE

Interface (“P” for Presentation of information) navigates the information system by triggering control processes

Objectresponse

toBusiness

Event(“E” for Effect)

Effect

Object

The same I/S control process (“C”) reused within another control Process

Controls use of, & sequences

Accesses&

Updates

Effect

Object

(recording of events & data,navigation through screens, dialogs, menus etc)

The same components may be invoked by different control processesObjects (Reusable Components)

(Effects of Events on Objects)

Re-usableProcess (C)

(A subassembly of effects and controls)

PARALLELPROCESSES

I/S controlProcess

(B)

HOW OBJECTS RESPOND TO EVENTS

(Effects of Events on Objects)

Actor

Accesses&

Updates

Triggers, Interrupts and controls

(Event)

(Event)

Process (Another Reusable Component)

INFORMATION INPUT ANDOUTPUT PROCESSES

(Flow of Time)

Information systems Control Processes derived

from business process maps

(C)

Orchestration determined

by the process map

• Business processes are triggered by business events• Business Events act on business objects

– These actions are effects of business events.– Effects...

• Create or delete object instances and effects

• Update attributes, or states of objects

• Create, destroy or switch relationships between particular instances of objects

•The sequence of effects must match the sequences of processes they were derived from

•Otherwise the integrity of information may be compromised

Page 7: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

7

CFO SIGNATURE EVENT

EFFECT OF CFO SIGNATURE ON CHECK

OPERATIONS1. Store CFO Signature

2. If CEO signature is not nullset check Payability

indicator to “Payable”Guard condition

Operations in Effect

CHECK(OBJECT)

Subtype of

Set (store) occurrence of CFO signature (state indicator)

Set (store) CFO signature

One operation may be a subtype of another depending on its information content

Store is a polymorphism of Set in the information logistics layer

•An effect may –create an (information) object.–delete an (information) object.–Update the state an (information) object.

•The object may also be a relationship, attribute or an effect.–If the object is a relationship, the effect might switch the relationship from one instance of an object to another –Eg: A Person, tied to a product via a purchasing relationship, becomes a customer

EFFECT OF AN EVENT ON AN OBJECT

•An operation may:–Replace the value of a feature–Delete or create an object–Replace, create or delete an effect

•Eg: Sealing an agreement deletes an effect•May be implemented by a guard condition

•Reopening an agreement adds an effect

Page 8: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

9

InformationConveyance

Process

InformationInput

Process

InformationInput

Process

InformationOutputProcess

InformationOutputProcess

INPUT/OUTPUT PARTITION

(sourcing process) (delivery process)

Informationlogistics

Informationlogistics

InformationInterface

InformationInterface

BUSINESS PROCESS AUTOMATION PARTITION

subtype of subtype of

Page 9: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

10

NORMAL

EXCEPTION PROCESS

INPUTPROCESS

OUTPUTPROCESS

BUSINESSPROCESS

Business InformationBusinessInformation

Page 10: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

11

NORMAL

EXCEPTION PROCESS

INPUTPROCESS

OUTPUTPROCESS

TRANSFORMATIONPROCESS

Business InformationBusinessInformation

(information exception)

(information exception)

(Information output exception for normal business process)

(Information output exception for business exception process)

(Information input for normal business process)

(Information input for business exception process)

BUSINESS PROCESS

INFORMATION PROCESS FOR

NORMAL BUSINESS

BUSINESS EXCEPTION PROCESS

INFORMATION PROCESS FOR BUSINESS EXCEPTIONS

• Each Information input and output process will also have information logistics and interface layers

Page 11: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

12

• May raise alarms– Business (eg: oven failure, constraint violation, missing resource, broken conveyance mechanism)– BPA (eg: missing file, data in unexpected format, corrupted data, data from questionable source etc)– Technical exceptions (Eg: network failure, defective program)

• Information Exception Layers– Interface layer of information exception output process may be output device sensitive (Eg: sounding alarm, showing in a different color etc.)– Information logistics layer of information exception output process will manage storage & transportation of information exceptions– Interface layer of information exception input process will accept corrections that could change the state of information exceptions– Information logistics layer of information exception input process will manage storage, staging and transportation of input data that might change the

state of information exceptions– Information Exception Transformation process will set and change the states of information exceptions

• Information exception output process will interpret these states in a format appropriate for different actors

• Unknown exception process– Accept exception procedures at execution time if process is “unknown”

• Unstructured process• Users may be alerted, inputs accepted by automated agent• Agent may store the solution and use the Principle of Parsimony to reuse the solution as appropriate

– Confirm application with an actor• Actor may add information, confirm or deny

– Apply without confirmation– Use a governing process to determine the right option

• Referential Integrity Exceptions– Rules of interdependency: When the lawful state space of one (or more) object or composition refers to (is constrained by) another (others)

• Applies to mandatory relationships such as subtypes and existence dependency• Eg: Occurrence of orders is contingent on the existence of a customer• Eg: Should a customer be deleted if open orders are pending?

– “Snap-on” change parts (options)• Automatic cascading delete• Optional cascading delete• Prohibited deletion

Exceptions

Page 12: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

13

InterfaceEvents & Effects

Control &Navigation

InformationLogistics Events

& EffectsControl

TechnologyEvents & Effects

Control

Unaugmented Control Process (Business Effects

Control)

part of 0 or more[Composed of 1]

Augmented part of 0 or more[Composed of 1]

part of 0 or more[Composed of 1]

part of 0 or more[Composed of 1]

INFORMATIONINPUT & OUTPUT PROCESS

IMPLEMENTING THE CONTROL PROCESS IN AUTOMATION

Control Process•Orchestration•Interruption•Rollback-recovery

The sequence of effects must not

violate the sequences of

business processes they were derived

from

•Reusable asset•May be combined with different orchestrations of interface events, effects, navigation and control processes

•Eg: 3270 vs. GUI•May be combined with different orchestrations of technology events, effects, navigation and control processes

• Str

icte

r th

an “

cons

ists

of”

• Mus

t ass

ert w

hen,

and

und

er w

hat

cond

itio

ns e

mbe

dded

non

-bus

ines

s ef

fect

s w

ill b

e in

voke

d

• Str

icte

r th

an “

cons

ists

of”

• Mus

t ass

ert w

hen,

and

und

er w

hat

cond

itio

ns e

mbe

dded

non

-bus

ines

s ef

fect

s w

ill b

e in

voke

d

• Str

icte

r th

an “

cons

ists

of”

• Mus

t ass

ert w

hen,

and

und

er w

hat

cond

itio

ns e

mbe

dded

non

-bus

ines

s ef

fect

s w

ill b

e in

voke

d

• Str

icte

r th

an “

cons

ists

of”

• Mus

t ass

ert w

hen,

and

und

er n

on-

busi

ness

eff

ects

wil

l be

invo

ked

•Some control

processes may not

be implemented•Some control

processes may not

be implemented

•Som

e control

processes m

ay n

ot be

imp

lemen

ted

•Som

e control

processes m

ay n

ot be

imp

lemen

ted

See supplementary Materials Box

64

Page 13: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

14

IMPLEMENTING NON TEMPORAL RELATIONSHIPS IN AUTOMATION

Formatting Rules

SequencingRules

SequencingRulesDisplayDisplay

OBJECTCLASS

OBJECTCLASS

INFORMATIONSOURCING

CONNECTION(OPTIONAL)

INCLUSION/EXCLUSION SET(S)

(OPTIONAL) INCLUSION/EXCLUSION

SET(S)

Components of View

VIEW

ACTOR

Intersection of 0 or more[Intersection of 0 or more ]

Union of 0 or more[Union of 0 or more ]

• Injective (one to many)– May be implemented by drop down lists, tables, pull-down windows, graphics etc.

• Surjective (one-to-many)– Similar (a relationship may be traversed in either direction)

• Many-to-many– Similar

• High order or high degree relationships– Tabular

• With optional visibility into states of constituents of the relationship• Navigation processes: The cycle time is not business information any more; it is computer mechanics

– Apply to “Observation/Inquiry processes• Substitute some non-temporal relationships and algorithms with processes

– Eg: Setting a payability indicator for the check after both signatures are updated– Eg: payment = Rent + Utility charges

• A third order relationship and mutual constraint– The cycle time is not business information any more; it is computer mechanics– The cycle time of the augmented orchestration of effects that maps to a business process must not exceed the cycle time requirements (if

any) for the business process

Page 14: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

15© 1996 AMIT MITRA (973)734-1703

Located relative to 0 or more[Located relative to 0 or more]

PATTERN PATTERN

Contained (located) in 0 or more[ container of 0 or more]

Part of 0 or more[Consists of 0 or more]

Subtype of

Subtype of

Express 1[expressed by

0 or more]

AGGREGATEOBJECT

Subtype ofRELATIONSHIP

precede[succeed]

Process

EVENT

Subtypeof

Resource Product

Produce1 or more

Subtypeof Subtype of

Subtypeof

Information Process

Conveyance Process

Input Process Output ProcessSubtype of

Structured Process

Semistructured Process

Unstructured ProcessSubtype of

Subtype of

Transformation Process

Subtypeof

Supply ChainSubtype

of

COMPOSITION

COMPOSITION

Subtype ofSubtype

of

Subtype of

Symmetrical Relationship

Asymmetrical Relationship

Subtype of (included in)

Subtype of

Subtype of

Convey to

Subtypeof

Conveyfrom

Subtype of

(Source) (Deliver)

(Make)

Interface ProcessInformation Logistics Process

Information Conveyance Process

Su

btyp

e of

Subtype of

EffectSubtype of Subtypeof

RecursiveRelationship

Subtype of

Subtype of

IdempotentRelationship

Subsetof

AntisymmetricalRelationship

SymmetricalComposition

IrreflexiveRelationship

•Order•Cardinality

Composed of 2 or more[component in 0 or more]

x

Subset of

Quantitative (arithmetic)Rule Expression

NominalRule Expression

OrdinalRule Expression

Subtypeof

Subtypeof

•Rankingoperations

•Quantitative operations(includes arithmetic operations)

•Booleanoperations

Subtypeof

•Start time•State(scheduled, started,In progress,SuspendedCancelled)

TransitiveComposition

Consist of (include, aggregate of)[part of]

Composed of[component of]

Subtypeof

Su

btyp

e of

Represent[Represented by]

Subtype of[Supertype of]

Contain[contained by]

Subtypeof

Subtype of

Subtype of

Subtype of

IntransitiveComposition

Subsetof

Su

btyp

e of

Subtypeof

Subtype of

High order orhigh degreerelationship

Pick(process)

List of[listed in]

Subtype of

Subtype of

IterationSubtype

of(PossiblyconcurrentPolymorphismsbased on temporaldistinctions)

Consist of (include, aggregate of)

[part of (included in, aggregated in)]

Bar (ban, exclude)

[barred (banned, excluded) by]x

Su

btyp

e of

Consist of 0 or more[part of 0 or more]

(polymorphisminherited from Pattern)

•DegreeLIST

CONSTRAINTS•Order = 1 or more•Degree = 2 or more

Inclusion Polymorphism

Subtypeof

Subtypeof

Reflexive Relationship

Non-recursiveRelationship

Polymorphismof

Pol

ymor

phis

mofSymmetrical

Subset of

Subs

et o

f

Exhaustivepartition

SubtypeofSubtype of

Express[Expressed by]

Subtypeof

subtype ofInverse

( inherited)

Subtype ofinverse

Instance of[Class of]

SubtypeofSubtype

of

use 1 or more

[used by 0 or more] [produced

by 0 or more]

Saga(Event with no known end)

Event of finite duration

Subtype of

Subtype of

Moment(Event of negligible duration)

Subtype of

(Add Duration)

Add:•End time•State (Ended)

(Symmetrical, transitiveRelationship,irreflexiveon Pattern)

(Asymmetrical Polymorphism,Irreflexivity and transitivityinherited)

THE METAMODEL OF RELATIONSHIP

Page 15: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

16

CONSTRAINT

Page 16: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

17

•OBJECT•CLASSINCHOATE

OBJECT

ACTOR/OBSERVER

CONSTRAINT

Instance

Class

OBJECT

Instance

Class

OBJECTClass

Instance

OBJECT

INFORMATION

• Relationships between instance identifiers are nominal pattern of occurrence• Relationships between attributes or domains may be magnitude constraints• State space is a pattern• Value constraints can carve out lawful regions of conceivable state space• Instance identifier is a token for a pattern• Governance flows from patterns of patterns• Patterns are defined by the Law of Location• The Law of Location is a constraint• A constraint conveys information

– All information flows from some form of the concept of constraint– Constraints shape objects and patterns in information space

• Constraints are the root of all meaning• Constraints create properties

A CONSTRAINT MAKES THE INCHOATE CHOATE

Page 17: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

MEANING(CONSTRAINT)

Expressionexpression of 1[expressed by 1 or more]

Normal Form of expression

Subtype of

Equivalent to 0 or 1[equivalent to of 0 or more different]

equivalent to 0 or more different(symmetrical relationship)

Subtype of

(INHERITED)

Composed of 1 or more[composition of 1 or more]

Composed of 1 or more[composition of 1 or more]

(antisymmetrical polymorphism)

(a polymorphism of the subtyping relationship)

(polymorphism of the subtyping relationship)

(inherited)

OBJECT PROPERTY

THE METAMODEL OF OBJECT PROPERTY

See supplementary

Materials Module 6

Page 18: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

Gro

up o

f 1 o

r mor

e

[gro

uped

by

1 or

mor

e]Object

Feature value

Feature

ObjectInstance

State Moment

ObjectClass

Partition

Subtype

Domain value

Take 1[value of 0 or more]

Partitionedby 0 or more[partition 1]

Classifies 2 or moremutually exclusive[classified by 1]

Unit of Measure

DifferenceScaledDomain

RatioScaledDomain

unit of m

easu

re o

f 1

[meas

ured

by 1

or more

]

Format(Symbol)

FormattingConstraint

Constrain 1 or more[constrained by 1]

Condit ional Formats- exclusiv ity/inc lusiv ity- pattern- length-Accuracy- Range/l ist

MeasureConversion

rule

Convert from 1[converted by 0

or more]

- from unit of measure- to unit of measure- conversion factor- (rule expression)

BeginningMoment

Instance of 1[instantiated in 0 or more]

Instance of 1 or more

[Class of 0 or more]

at every distinct (1)[of 1 or more]

Featurevalue

Constraint

Co

nsi

st

of 1

or

mo

re[p

art

of

1]

Attribute

Subtype of

instance o

f 1

[class

of 1 or m

ore]

format of 1 or more

[formatted in 1 or more]Subset of

Mutually Inclusive

Subtypeof

Su

bty

pe

of

Convert to 1[target of 0or more]

AggregateObject

Subtypeof

Domainvalue

Constraint

Domain

Measured in 0 or more

[measure of 1 or more]

[existence dependency]

Constrain 0 or more

[constrained by 1]

Mutually Inclusive

Condition of 0 or 1[conditioned by 1]

Set of 1 or more[subset of 1 or more]

MutuallyInclusive

RelationshipEffect

Event

Process

Subtypeof

Subtypeof

Subtype of

Composed of 1 or more[component of 1]

EndingMoment

-subtyping criterion

Su

bty

pe

of

Subtype of

Delimits 1 or more[delimited by 0 or 1]Delimits 1 or more

[delimited by 1]

(Temporally) precedes 0 or more[(Temporally) succeeds 1 or more]

BeginningMoment

EndingMoment

Event

Subtypeof

Subtype of

Change 1 or more[changed by 1 or more]

Monitor 1 or more[Monitored by 1 or more]

ObjectInstanceFeature

value

InstanceIdentifierSubtype

of

UpdateEffect

Effect

InquiryEffect

Subtype of

Instance of 1[instantiated in 0 or more]

State ofObject

Instance

Instance of 1[instantiated in 0 or more]

Set of 1 or more[subset of 1 or more]

(inherited)

Condition of 0 or more[conditioned by 1]

(inherited)

Constraintduration = nil

(anti-symmetrical)

tr igger 0 or more[Triggered by 0 or 1]

interrupt 0 or more[interrupted by 0 or more]

Instance ofof

Same Objects

(anti-symmetrical)

convert from 1 or more[converted by 0 or more]

convert to 1[mapped from 0 or more]

FormatConversion

Rule

Constrain 1 or more[constrained by 1]

Located by 0 or more(subtypes)•Contained in 0 or more•Part of 0 or more•(structured part of 0 or more)•subtype of 0 or more

OVERVIEW OF THE INTEGRATED METAMODEL OF KNOWLEDGE

See supplementary

Materials Module 7

Page 19: 1 CROSSING THE CHASM Business Process to Information System Reading Assignment Supplementary module 5

21

See Box 30 in your textbook