Extending Enterprise Architecture With Mobility BY Ming-Chien (Mindy), WU A Thesis Submitted for the Degree of Doctor of Philosophy Principle Supervisor: Dr. Bhuvan Unhelkar Co-Supervisor: Prof. Simeon Simoff School of Computing and Mathematics University of Western Sydney Sydney, Australia July 2009 - i - Preface This thesis reflects my research study and its results in the area of extending Enterprise Architecture with Emerging Mobile Technologies presenting a comprehensive structure that aims to extend enterprise architecture with mobility which helps transcend various time, location and technological boundaries. While I was alone in Australia in 1999, I needed to choose which area I want to study by myself. At that time, from my working experience, I believed that computer work will replace all the paper-process work in the future, so I decided to study Diploma in IT in SWIC (Sydney Western International College). After that, I had the opportunity to get into UWS to study my degree, Bachelor of IT. However, IT contains vast knowledge, there were 18 majors waiting for me to choose one of them. After two years basic studies, I found that I was good at business information systems analysis and design. Therefore, I spent the other two years completing my degree, majoring in system analysis and design. I earned my professional UML skills and the contents of basic business information systems after I completed this bachelor degree. From 4 years bachelor degree studying, I had to go to work first to earn my expense for daily life and the tuition fee for my master degree. I have worked in the distribution center service industry as a manager assistant, and used excel to design and to process the working schedule for my team and also had the professional skills on supply chain management processes. I was also getting interested in how to integrate all miscellaneous business systems, to form an effective organization and to manage it while I was working there. Therefore, I went back to university to study my master degree of Information Technology, majoring in Information system - ii - management. I learned my professional IT project management skill and how to integrate and manage various business information systems together when I completed this master degree. From my working and study experience, I started to think how to add such new emerging technologies as mobile technologies into the business information system, for example, supply chain management systems. The company couldn’t just buy mobile devices, giving them to their employees, and then just asking all personnel of the company to run the mobile business or mobile office. After importing the new mobile applications to the enterprise, all the business processes, information systems, and databases are needed to be changed to adapt to the new technology, and even if all the system users need to attend a training workshop for learning how to use this new technology. There are so many questions and issues in my mind; therefore, I discussed about this area with Dr. Vijay Khandelwal, one of my lecturer, who teaches in business process reengineering area. He suggested me going forward to do a doctoral research in this area, and also introduced me to Dr. Bhuvan Unhelkar, who is my principle supervisor during my doctoral research program and also leads the Mobile Internet Research and Applications Group (MIRAG) research groups within Advanced enterprise Information Management Systems (AeIMS) research lab at UWS. Firstly, I got his invitation to join his research group. We had more than 50 meetings per year during my research program period to discuss my research topic and also to exchange our idea of every PhD candidate topics as well. Due to my supervisor’s kindly help, I had more than 300 emails per year with him to deeply communicate my research objective and direction, my idea of M-EA models and structure, - iii - methodology selection, interviewees’ selection, action research companies’ selection, and also finalize my thesis. Now, finally, after 3-years research, this thesis is my ending program report to introduce you, my dear readers, into my research area: extending enterprise architecture with emerging new mobile technology. Because the program time is limited, there are still several research directions not completed or involved in this research project. These research directions are listed in the Chapter 7 could be done in the future. Throughout this research project, I deeply love my research area and would like to become a successful enterprise architect in the future. After completing my PhD degree, I hope I can have more industry experience first, and then go back to university to distribute this interesting area to other students, or to conduct several projects with other academics. - iv - Acknowledgements I would like to take this opportunity to express my gratitude to the following individuals, without whose assistance this work could not be accomplished. Firstly, I thank my parents and my husband, for their support and encouragement and, at the same time their unending endurance and tolerance of all the idiosyncrasies that are all hallmarks of any doctoral research. Without their support and understanding during the past few years, I could never have reached where I am today. Secondly, I appreciate all the help and support provided to me by my supervisor, Dr Bhuvan Unhelkar. Bhuvan has always pointed out to me the best direction to take in my research and also helps me a lot to be an academic. His encouragement, affirmatives as well as pointing out my mistakes for correction are all important to my social life and studies. I take this opportunity to thank him and also, to set the record straight, sincerely apologize to him for bothering him day and night, weekdays and weekend, in order to help and guide me with my studies. THANK YOU. Thirdly, I thank my co-supervisor, Prof. Simeon Simoff, also our head of School of Computing and Mathematics, for always believing in me and supporting me with his kind words. I would like to take this opportunity to thank Dr. Vijay Khandelwal for his continual support, from my post-graduate to accept and direct me into doctoral research studies. I am also thankful to my previous co-supervisor, Dr Robyn Lawson, for her continuous support. Dr Lawson managed different meetings with all the PhD - v - students in our schools that advanced our research in a manner that would not have been possible otherwise. I also take this occasion to demonstrate my gratitude to Professor Athula Ginige and Dr Yogesh Deshpande. Professor Ginige and Dr Deshpande are always available to help the research team for any important high-level issues. A few words from them offer great insights, a much better perspectives and an accurate sense of research. I am also grateful to the research teams (AeIMS and MIRAG) for their support and work revisions. I also thank the University of Western Sydney, especially the School of Computing and Mathematics for providing this opportunity to advance my education. They provided the funds to support me to attend local and oversea conferences to get more understanding and new knowledge, which is a really valuable experience in my life. The Research Training Scheme (RTS) from government and the school has gone a long way in ensuring that this study is completed. Finally, my special regards to all the action research companies which participated and all the interviewees who responded to the questionnaires. THANK YOU VERY MUCH FOR YOUR SUPPORTS. - vi - STATEMENT OF AUTHENTICATION The work presented in this thesis is, to the best of my knowledge and belief, original except as acknowledged in the text. I hereby declare that I have not submitted this material, either full or in part, for a degree at this or any other institution. ____________________________________________________________________ Ming-Chien (Mindy), WU - vii - Table of Contents Preface……………………………………………………………………i Acknowledgements……………………………………………….…….iv Statement of Authentication……………………………….……………vi Table of Contents……………………………………………….……vii List of Tables……………………………………………..………….xii List of Figures……………………………………………….………...xiii List of Abbreviations………………………………………………...…xv Defining Important Terms (Keywords) of M-EA…………………...…xx List of Candidate Publications…………………………………….…xxiii Abstract……………………………………………….…………….xxv Chapter 1: Introduction to the research in Mobile Enterprise Architecture (M-EA) ……………………………………………….…………………1 1.1 Overview of the research project in M-EA…………………………………….1 1.2 Background to this research in M-EA………………………………………….4 1.3 Research aim and objectives…………………………………….……………..9 1.4 Framework of this research project in M-EA…………………………………11 1.5 Scope of this research in M-EA……………………………………………….13 1.6 Justification for this research in M-EA……………………………………….13 1.7 Outline of the thesis…………………………………….……………………..14 1.8 Summary of this chapter……………………………………..……………..…18 Chapter 2: Literature Review on Enterprise Architecture (EA) and Mobile Technologies (MT) ……………………………………………19 2.1 Overview of this chapter………………………………….…………………..19 2.2 Understanding Enterprise Architecture (EA) ………………………………...19 2.2.1 Overview the Enterprise Architecture (EA)……………………………..20 2.2.2 Enterprise Architecture (EA) Elements…………………………………22 2.2.3 Enterprise Architecture (EA) as a Constraint……………………………25 - viii - 2.3 Enterprise Architecture (EA) frameworks…………………………………….29 2.3.1 Relevance of EA frameworks……………………………………….30 2.3.2 Zachman EA framework…………………………………………….31 2.3.3 TOGAF framework………………………………………………….35 2.3.4 Other industrial EA frameworks…………………………………….40 2.3.5 Abstracting EA framework………………………………………….44 2.4 Web Service (WS) and Service-Oriented Architecture (SOA)………………..45 2.4.1 Web Service (WS) Technology……………………………………...46 2.4.2 Service-Oriented Architecture (SOA) ………………………………49 2.4.3 Value of WS and SOA to enterprise…………………………………51 2.5 Mobile Technologies (MT) and services……………………………………...54 2.5.1 Mobile technology basics………………………...…………………54 2.5.2 Mobile networks and communications…………………………...…55 2.5.3 Mobile services……………………………………………………...61 2.5.4 Mobility, ubiquitous and pervasive commerce……………………...63 2.6 Value of MT to EA……………………………………………………………69 2.7 Challenges to EA due to MT………………………………………………….70 2.8 Gaps in the literature on EA and MT………………………………………….70 2.9 Summary of this chapter………………………………………………………72 Chapter 3: Research methodology – arguments and selection…………74 3.1 Overview of this chapter……………………………………………………...74 3.2 Theoretical background……………………………………………………….74 3.3 Research philosophies………………………………………………………...76 3.4 Research approach and methodology…………………………………………80 3.4.1 Inductive and deductive approaches………………………………...81 3.4.2 Qualitative research methodology…………………………………..83 3.5 Research methods and data collection methods………………………………85 3.5.1 Step 1: Literature review in order to create an M-EA outline……….86 3.5.2 Step 2: Case study by interview to update the M-EA model………..88 3.5.3 Step 3: Action research to validate the M-EA model………………..91 3.6 Research evaluation and feedback…………………………………………….95 3.7 Summary of this chapter……………………………………………………...98 - ix - Chapter 4: Envisioning the Mobile Enterprise Architecture (M-EA) model through Knowledge Elicitation……………………………..…100 4.1 Overview of this chapter…………………………………………………….100 4.2 Initial outline of the M-EA model………………………………………….100 4.2.1 M-EA definition……………………………………………………101 4.2.2 Initial version of core M-EA model……………………………..…103 4.3 Advantages and limitations of M-EA………………………………………..106 4.3.1 Advantages of using M-EA………………………………………..107 4.3.2 Limitations of M-EA……………………………………………….107 4.4 Research questions in the case study………………………………………...108 4.5 Design of the case study……………………………………………………..110 4.6 Process of data collection and analysis……………………………………...112 4.7 Results from case study by interview………………………………………..113 4.8 Analysis and discussion of findings to verify the initial M-EA…………..…121 4.8.1 Updated M-EA definition……………………………………….…121 4.8.2 Refined advantages of using M-EA…………………………….….126 4.8.3 Updated practical issues of M-EA…………………………………130 4.8.4 M-EA expected outcome…………………………………………...139 4.9 Summary of this chapter……………………………………………………..144 Chapter 5: Extending and Updating Mobile Enterprise Architecture (M-EA) model ……………………………………………………..…145 5.1 Overview of this chapter…………………………………………………….145 5.2 Mobile Enterprise Architecture (M-EA) extensions…………………………145 5.3 Mapping M-EA to technologies, process, system, data, and people………...147 5.3.1 M-EA and technologies…………………………………………….148 5.3.2 M-EA and process………………………………………………….149 5.3.3 M-EA and system…………………………………………………..151 5.3.4 M-EA and data……………………………………………………..152 5.3.5 M-EA and people…………………………………………………..153 5.4 Extending M-EA for business……………………………………………….154 5.4.1 M-EA framework in business……………………………………...156 - x - 5.4.2 Extending M-EA model……………………………………………162 5.4.3 M-EA migration road map for business……………………………187 5.5 Summary of this chapter……………………………………………………..195 Chapter 6: Validating the extension of Mobile Enterprise Architecture (M-EA) through action research……………………………………...196 6.1 Overview of this chapter……………………………………………………196 6.2 Objectives of the action research studies……………………………………196 6.3 Designing action research project…………………………………………..197 6.4 Validation criteria for against M-EA and its expected outcome…………….199 6.5 Action research company A…………………………………………………202 6.5.1 Background of the mobile communication company……………..202 6.5.2 Modeling of processes in the company……………………………203 6.5.3 Discussion of findings that validate M-EA………………………..204 6.6 Action research company B…………………………………………………218 6.6.1 Background of the IT consulting company………………………..218 6.6.2 Modeling of processes in the company……………………………219 6.6.3 Discussion of findings that validate M-EA………………………..220 6.7 Action research company C…………………………………………………230 6.7.1 Background of the security/ transaction processing company…….230 6.7.2 Modeling of processes in the company……………………………233 6.7.3 Discussion of findings that validate M-EA………………………..234 6.8 Discussion on the overall results that validate M-EA model……………….241 6.9 Summary of this chapter…………………………………………………….243 Chapter 7: Conclusion and future direction…………………………..245 7.1. Overview of this chapter……………………………………………………245 - xi - 7.2. Achievement of the research aim and objectives…………………………245 7.3. Summary of this M-EA research project……………………………………249 7.4. Future direction in M-EA…………………………………………………253 References...………………………………………………………….258 Appendix A: Interview Sample Questions……………...……………276 Appendix B: Ethics Committee Approval……………………………281 Appendix C: Research Timeline and Milestones…………………….282 - xii - List of Tables Table 1.1: M-EA Migration Plan Table……………………………………………..10 Table 2.1 Zachman Framework…………………………………………………….35 Table 2.2: Comparative view of 5 EA Frameworks………………………………...45 Table 2.3: Functions and Applications of Mobile Networks and Communications..61 Table 3.1: Lists of several research philosophies…………………………………...78 Table 3.2: Comparison of deductive and inductive approaches……………………81 Table 3.3: Comparisons of qualitative and quantitative research…………………..84 Table 3.4: Lists of feedback to this research project……………………………97 Table 4.1: Results from the interviewees that outline the 5 aspects of the M-EA..125 Table 4.2: Interviewees’ expected outcome of implemented M-EA model……….143 Table 5.1: Mapping Zachman Table for MEA…………………………………….160 Table 5.2: Different Generations of Cellular Networks…………………………...166 Table 5.3: A comparison between the two major types of mobile middleware…...175 Table 5.4: M-Commerce Applications…………………………………………….178 Table 5.5: Mobile devices list and description…………………………………….181 Table 5.6: M-EA Migration Plan Table…………………...………………………191 Table 6.1: Details of the participating action research enterprises……………….198 Table 6.2: Action research project validation criteria……………………………..200 Table 6.3: CAMEA Validation M-EA Table…………………...………………….204 Table 6.4: CBMERA Validation M-EA Table…………………………………..…220 Table 6.5: Alacrity CLEW Technology Validation M-EA Table…………………..235 - xiii - List of Figures Figure 1.1: Gap from EA to M-EA…………………………………………………..8 Figure 1.2: M-EA Definition…………………………………………………………9 Figure 1.3: M-EA Components……………………………………………………..10 Figure 1.4: Research Framework…………………………………………….……..11 Figure 1.5: Thesis Structure………………………………………………………...15 Figure 2.1: Enterprise Architecture Elements (basic) ……………………………...21 Figure 2.2: EA Integrates Several Generations of EIS……………………………..22 Figure 2.3: Enterprise Architecture (EA) Elements (overall)………………………23 Figure 2.4: Enterprise Architecture as a Constraint ………………………………..26 Figure 2.5: Zachman EA Framework ………………………………………………33 Figure 2.6: TOGAF- Architecture Development Method (ADM)………………….37 Figure 2.7: TOGAF - Enterprise Continuum……………………………………….38 Figure 2.8: DoDAF 3 Views and Linkages…………………………………………41 Figure 2.9: FEAF Structure…………………………………………………………42 Figure 2.10: Web Service Technology…………………………………………...47 Figure 2.11: SOA Integrates the Applications……………………………………...50 Figure 2.12: Detail Gap from EA to M-EA………………………………………...72 Figure 3.1: Research onion with the specific criteria used in this research project...75 Figure 3.2: Research Philosophy…………………………………………………...77 Figure 3.3: Research Approach……………………………………………………..82 Figure 3.4: Research Framework of This Research Project…………….………….96 Figure 4.1: Initial M-EA Definition……………………………………………….102 Figure 4.2: Initial Mobile Enterprise Technology Architecture Model…………105 Figure 4.3: The structure of Case 8 handling security issues of M-EA…………...134 - xiv - Figure 5.1: M-EA Components……………………………………………………155 Figure 5.2: M-EA Framework……………………………………………………..158 Figure 5.3: M-EA 5+1 Layer Model………………………………………………162 Figure 5.4: Updated M-EA 5+1 Layers Model……………………………………186 Figure 5.5: M-EA Implementation Team………………………………………….187 Figure 5.6: M-EA Transition Road Map…………………………………………..193 Figure 6.1: CAMEA 5+1 Layers Model…………………………………………..206 Figure 6.2: CAMEA Model Layer 1- Storage Layer……………………………...207 Figure 6.3: CAMEA Model Layer 2- Communication Layer……………………..208 Figure 6.4: CAMEA Model Layer 3- Binding Layer……………………………..210 Figure 6.5: CAMEA Model Layer 4- Process Layer……………………………...211 Figure 6.6: CAMEA Model Layer 5- Presentation Layer…………………………213 Figure 6.7: CAMEA Security Layer for all Layers………………………………..215 Figure 6.8: M-EA Strategic Alignment……………………………………………228 Figure 6.9: CLEW for Secure Access Control…………………………………….231 Figure 7.1: Research Processes……………………………………………………246 - xv - List of Abbreviations Abbreviation Full Name 1G First-generation 2G Second-generation 3G Third-generation 4G Fourth-generation ADM Architecture Development Method ANZ Australia and New Zealand API Application programming interfaces AR Action Research ATM Asynchronous Transfer Mode ATMs Automated teller machines BPR Business Process Re-engineering CAMEA Company A’s Mobile Enterprise Architecture CASE Computer Aided Software Engineering CBMERA Company B’s Mobile Enterprise Reference Architecture CDMA Code Division Multiple Access CF Compact Flash CIO Chief information officer CIT Computing and Information Technology CLEW Closed Loop Environment for Wireless CORBA Common Object Request Broker Architecture CRM Customer Relationship Management CS Case Study DCOM Distributed Component Object Model DOGAF Department of Defense Architecture Framework E-Commerce Electronic Commerce - xvi - Abbreviation Full Name EA Enterprise Architecture EAI Enterprise application integration EBA Enterprise Business Architecture EIA Enterprise Information Architecture EIS Enterprise Information Systems ERA Enterprise reference architecture ERP Enterprise Resource Planning ESA Enterprise Solution Architecture ETA Enterprise Technology Architecture FEAF Federal Enterprise Architecture Framework FIS Financial Information systems GPRS General packet radio service GPS Global Positioning System GSM Global System for Mobile Communications GUI Graphical user interface HTTP Hypertext Transport protocol ICT Information and Communication Technology IP Intellectual Property IR Infrared ISO International Organization for Standardization IT Information Technology ITU International Telecommunication Union JDBC Java Database Connectivity JIT Just-in-Time KBA Knowledge-Based Authentication LDAP Lightweight Directory Access Protocol - xvii - Abbreviation Full Name LR Literature Review M-Commerce Mobile Commerce M-CRM Mobile Customer Relationship Management M-EA Mobile Enterprise Architecture M-Education Mobile Education M-ERP Mobile Enterprise Resource Planning M-Government Mobile Government M-Library Mobile Library M-procurement Mobile procurement M-SCM Mobile Supply Chain Management M-Service Mobile Services M-Store Mobile Storage or inventories MAC Media Access Control MAN Metropolitan area networks MIT Mobile Information Technology MT Mobile Technologies MUI Mobile user interface MWS Mobile Web Services NGE Next Generation Enterprises OSI Open System Interconnection PAN Personal area network PC Personal computer PCMCIA Personal Computer Memory Card International Association PDA Personal Digital Assistant ORDBMS Object-relational database management system QoS Quality-of-service - xviii - Abbreviation Full Name RDBMS Relational database management system RFID Radio Frequency Identification ROI Return on investment SCM Supply Chain Management SIM Subscriber Identity Module SMS Short Message Service SMTP Simple Mail Transfer Protocol SOA Service-Oriented Architecture SOAP Simple Object Access Protocol SOE Standard Operating Environment SRM) Supplier relationship management SQL Structured Query Language SSL Secured Socket Layer TCP/ IP Transmission Control Protocol/ Internet Protocol TD-SCDMA Time Division – Synchronized Code Division Multiple Access TEAF Treasury Enterprise Architecture Framework TOGAF The Open Group Architectural Framework UDDI Universal Description, Discovery and Integration UMTS Universal Mobile Telecommunications System URL Uniform Resource Locator UTRAN UMTS Terrestrial Radio Access Network VoIP Voice over IP VPN Virtual Private Network Wi-Fi Wireless Fidelity Wi-Max Worldwide Interoperability for Microwave Access WAP Wireless Application Protocol - xix - Abbreviation Full Name WCDMA Wideband Code Division Multiple Access WEP Wired Equivalent Privacy WLAN Wireless Local Area Network WML Wireless Markup Language WS Web Services WSDL Web Services Description Language XML eXtensible Markup Language - xx - Defining Important Terms (Keywords) of M-EA Keywords: Enterprise information systems (EIS), Enterprise Architecture (EA), Mobile Technology (MT), Mobile Enterprise Architecture (M-EA), M-EA Framework, M-EA 5+1 Layers Model, Mobile Transition Paths/“Road Maps” Term Definition Enterprise Architecture (EA) Enterprise Architecture (EA) is a set of business and engineering artifacts, including text and graphical documentation, which represents the enterprise’s key business system, information/data, application, technology strategies and their impact on business processes also the users. (Goikoetxe, 2007) Mobile Technologies (MT) Used to describe modern wireless connections such as those in cellular networks and wireless broadband Internet, also encompass communication that is achieved without land-based or wired mechanisms (Unhelkar, 2009). Mobility - Enterprise Architecture (M-EA) A structure of integrating business processes with Information Technology that are supported and integrated with Mobile Technologies. M-EA integrates business Systems, Processes, People, and Data in an organization in a manner that enables easy incorporation of Mobile Technologies in its business processes. Service-Oriented Architecture (SOA) Service-Oriented Architecture (SOA) as “A form of distributed systems architecture. This architecture consists of a set of components which can be invoked, and whose interface descriptions can be published and discovered”. (W3C, 2004) - xxi - Term Definition Web Service (WS) Web Service (WS) as “loosely coupled, self-describing services that are accessed programmatically across a distributed network, and exchange data using vendor, platform, and language-neutral protocols.” (Marks and Werrel, 2003) Wireless Technology Wireless Technology: technology without wires and phone lines to use a multiplicity of devices. (IBM website) Third Generation (3G) Mobile technology Third Generation (3G) Mobile technology: It is usually used in the context of cell phones. The services associated with 3G provide the ability to transfer both voice data (a telephone call) and non-voice data (such as downloading information, exchanging email, and instant message). (Barnes, 2002) Global Positioning System (GPS) Global Positioning System (GPS): it is the one fully function of satellite navigation system, the exact positioning of useful location-sensitive information used for direction-finding- and map-reading-based services. (Olla, 2005) Personal Digital Assistant (PDA) Personal Digital Assistant (PDA): a digital device which can include the functionality of a computer, a cell phone, a music player and a camera (Shiratuddin et al., 2009) Worldwide Interoperability for Microwave Access (Wi-Max) Worldwide Interoperability for Microwave Access (Wi-Max) as “a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL” (Wi-Max Forum, 2006) - xxii - Term Definition Wireless Local Area Network (WLAN) Wireless Local Area Network (WLAN): The wireless link with the users to give a network connection to all users in the specific local area. (Paavilainen, 2001) Rapid Frequency Identification (RFID) Rapid Frequency Identification (RFID): RFID is a standard technology that uses radio waves to automatically identify people or objects. (Roberts, 2006) Electronic Commerce (E-Commerce) Electronic Commerce (E-Commerce): is any type of business or commercial transaction that involves the transfer of information across the Internet. (Maamar, 2003) Mobile Commerce (M-Commerce) Mobile Commerce (M-Commerce): through any highly mobile device and wireless communication network, activities related to commerce transaction, data access, network service, and so on, processed without any boundaries of time and space. (Kuo and Yu, 2005) - xxiii - List of Candidate Publications Conferences: Wu, M., and Unhelkar, B., (2008) Extending Enterprise Architecture with Mobility, Conference Proceeding of 2008 IEEE 67th Vehicular Technology Conference, Singapore, May 11-14, ISBN: 978-1-4244-1645-5 Wu, M., (2007) Doctoral Consortium Paper ”Extending Enterprise Architecture with Mobility to Create Mobile Enterprise Architecture (M-EA)” Conference Proceeding of Australian Conference on Information Systems (ACIS) 2007, December 4th, Toowoomba, Q.L.D. ISBN: 9780909156970 M. Wu (2007), “Extending Enterprise Architecture with Mobility”, p56 in book: UWS College of Health and Science Research Futures Postgraduate Forum 2007 Innovation Conference abstract handbook, ISBN: 1-74108-083-5 M. Wu (2008), “Extending Enterprise Architecture with Mobility”, p58 in book: UWS College of Health and Science Research Futures Postgraduate Forum 2008 Innovation Conference abstract Chapter Publication: Curtis, D., Wu, M., (2009) Investigation into the Impact of Integration of Mobile Technology Applications into Enterprise Architecture. In the Unhelkar (Ed.), Chapter 49 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition. IGI Global, Hershey, PA, USA, 2009, ISBN 978-1-60566-156-8 Unhelkar, B., Wu, M., and Ghanbary, A., (2008), Integrating Mobile Technologies in Enterprise Architecture with a Focus on Global Supply Chain Management Systems, in Raisinghani M.S. (Ed.), Chapter 23 of book: Handbook of Research on Global Information Technology, IGI Global, Hershey, PA, USA, pp.499-518, ISBN:978-1-59904-876-5. Wu, M., and Unhelkar, B., (2009) Extending Enterprise Architecture with Mobility. In Unhelkar (Ed.), Chapter 42 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009, ISBN 978-1-60566-156-8 Wu, M., and Unhelkar, B., (2009) Mobile Service Oriented Architecture (MSOA) in - xxiv - Web 2.0 and beyond. In the Murugesan (Ed.), Chapter 38 of book: Handbook of Research on Web 2.0, 3.0, and X.0: Technologies, Business, and Social Applications. IGI Global, Hershey, PA, USA, 2009 - xxv - Abstract Enterprise Architecture (EA) provides the basis for technology as well as business processes. Mobility enables real-time response to the ever-increasing demands from customers in a changing and competitive marketplace. Based on this background, this research investigates: how to make the best use of Mobile Technologies (MT) by integrating it into EA and thereby make it more effective and efficient? The core philosophies of extending EA with mobility constructs a fully Mobile Enterprise Architecture (M-EA), which includes M-EA framework, core M-EA 5+1 layers model, and M-EA migration plan. This research follows three steps: Step 1: Literature Review (LR) to construct the based knowledge of EA and MT. LR provides understanding of a gap between EA and M-EA, and also provides an understanding of the possible approaches of incorporating mobile applications into information systems design. At this stage, the researcher defined M-EA as “A structure for integrating business processes with mobile technology and IT, includes relationships among the System, Process, People, and Data in an organization”. Second step is Case Study (CS) of construct initial model; CS by interviewing experienced enterprise architects, business analysts, Chief Information Officer (CIO) and IT executives. The results of these interviews on the benefits of MT on EA based on views and opinions from these experts provided three critical factors for mobility: 1. real-time response, 2. location-independence, and 3. personalization. The excepted M-EA outcomes from interviewees are the validation criteria for following AR projects as well. Last step is Action Research (AR) projects for validating initial M-EA model by - xxvi - undertaking three AR project with participating enterprises. First mobile communication company helped to extend M-EA 5+1 layers model to work on details of each model, second consulting company helped to upgrade the implementation migration plan, and third security / transaction processing company helped to validate M-EA on security specific aspect. The initial M-EA model has been validated through three AR project in order to establish a comprehensive M-EA. M-EA is usable across any origination to reduce the implementation risks and enhance the benefits of mobility to the enterprises, and also creates new opportunities for a flexible and dynamic enterprise in an agile business world. Chapter 1: Introduction PhD Thesis Page 1 Ming-Chien (Mindy), WU Chapter 1: Introduction to the research in Mobile Enterprise Architecture (M-EA) 1.1 Overview of the research project The Mobile Enterprise Architecture (M-EA) provides a ‘ground up’ incorporation of mobility in the structure and dynamics of an enterprise. This incorporation of mobility in an enterprise creates new opportunities for it to be a flexible and dynamic business in an agile business world (Paavilainen, 2001). There are many nuances of mobile technologies which need to be considered by an enterprise in order to make full utilization of their capabilities. These nuances as well as those associated advantages and challenges of mobility revolve around two keywords: location-independence and personalization. Mobility enables the enterprise to interact with the customers independent of their location. Mobility also enables the business to dynamically customize (i.e. personalize) the specific services of the business required by the customers. These personalized services are then offered to the customers on their personal mobile devices. A well crafted architecture, based on experiences of an architectural framework, is the ideal way to derive benefits from location-independence and personalization of mobility. This is so because the resultant M-EA provides opportunities for the business to incorporate mobility as a strategic and integral element in its activities. The time and location independence of mobility opens up tremendous opportunities for organizations to offer integrated and dynamic services to their clients and business partners. M-EA brings about not only internal integration but through Chapter 1: Introduction PhD Thesis Page 2 Ming-Chien (Mindy), WU extension, also much more efficiency to its external suppliers, customers and other trading partners over the Internet. Umar (2005) states that the Next Generation Enterprises (NGE) will rely on automation, mobility, real-time business activity monitoring, agility and self-service over widely distributed operations to conduct business. Many organizations would like to build their entire systems by using today’s emerging technologies of which Mobile Technologies (MT) is a crucial part. Inter-organizational Enterprise Information Systems (EIS) integrate all processes between extended enterprises, such as supply chains and customer relationship systems. Mobile Technologies (MT) helps to upgrade the traditional supply chains to Mobile Supply Chain Management (M-SCM), traditional Customer Relationship Management (CRM) to Mobile Customer Relationship Management (M-CRM) and trading procurement to Mobile procurement (M-procurement). Therefore, this research considers these extensions and integrations in greater details by exploiting the capabilities of Mobile Technologies. Moreover, these kinds of extensions and integrations are considered as an integral part of Mobile Enterprise Architecture (M-EA) – rather than an ‘add on’ to the existing architecture. Undoubtedly, Mobile Technologies can integrate in Enterprise Architecture (EA) to provide the enterprise with capabilities to provide Mobile Services (M-Service) and Mobile Storage or inventories (M-Store). Such M-EA enabled enterprise can provide globalization service, product and technical supports to the customers 24 hours a day, 7 days a week. The definitions and description of what comprises a Mobile Enterprise Architecture have been quite wide ranging. Understanding an M-EA seems to depend on the perspectives of the enterprise, the understanding and experience of the architect and also the value that M-EA adds to an architect’s work. An M-EA utilizes the concepts Chapter 1: Introduction PhD Thesis Page 3 Ming-Chien (Mindy), WU and technologies of EA (Wu, 2007) which in turn, is built on an understanding of what is an enterprise. However, an M-EA is not just an extension of EA. Instead, an M-EA deals specifically with mobile business issues that arise out of location-independence and personalization. M-EA allows people in the business ecosystem to communicate with others as well as with the system using the internet technologies and also mobile technologies such as Global Positioning System (GPS), Personal Digital Assistant (PDA), and Wireless Application Protocol (WAP). An M-EA will transform the organizations into zero latency, real time organizations. Mobility facilitates dynamic collection of mobile data, correlates with data and information, and communicates the resultant knowledge within and outside the organization. The value of M-EA to the enterprise comes from the fact that it enhances the quality and reduces the risks in an enterprise’s attempts to use mobility across its business activities. The risk reduction due to M-EA occurs because the M-EA also prepares the enterprise for the inevitable demands of agility. The ‘agile’ demands on business arise due to the rapid changes faced by the business, both internally and externally. Technology is a crucial cause for these changes or ‘disruptions’. These changes, as correctly envisioned by Alvin Toffler (1970), the guru of futurology, are not only extremely rapid, but even the rate at which they are occurring are high. The rapid rate of changes has resulted in this age of communication. Mobile technologies are at the crux of this communications revolution. “Mobility” in this age of communication, as discussed by Unhelkar (2005), has increasingly eliminated the need for physical proximity in connecting people, processes and things. The resulting location-independence has had a significant impact on the organization of the business and its relationship with the customers. Chapter 1: Introduction PhD Thesis Page 4 Ming-Chien (Mindy), WU 1.2 Background to this research in M-EA Information Technology (IT) growth is substantiated by the large number of infrastructures and products, and it has been showing up in the market with ever-increasing frequency (Ramakrishnan et al., 2006). However, in order to raise the ability of the enterprise to serve its customers and to deal with its business partners in today’s dynamic business environment, there is a need to integrate these products and services through a common EA (Linthicum, 2000). This integration of business processes, systems, databases, human resources, customer service, infrastructures and technologies in various aspects together form an enterprise, which is facilitated by what is known as Enterprise Architecture. EA has been defined as the description of current and future structure and behaviour of an organisation’s processes, information and communication technology, personnel and organisational sub-units, aligned with the organisational core goals and strategic directions (Unhelkar, 2008). Enterprise Architecture, more often, has been associated with the Information and Communication Technology (ICT). Currently, the enterprise expands to rely more on IT, and ensures both business processes and technology systems could be co-coordinated in a strategic manner. In fact, many of the enterprise’s strategic initiatives such as e-business, SCM systems, CRM systems, Enterprise Resource Planning (ERP) systems, and Financial Information systems (FIS) depend upon the enterprise integration into a fully constructed EA (Lam and Shankararaman, 2007). Importantly, EA is not integration only about technology infrastructure, but also includes a consideration of business processes, information systems, human resources, and data repository that cut across various IT applications, and so provides a clear structure over all the enterprise. Chapter 1: Introduction PhD Thesis Page 5 Ming-Chien (Mindy), WU The IT and mobile communication provide improvement to the ultimate business goal which is always a moving target that an enterprise must strive to achieve (but perhaps never truly attains). First-generation (1G) mobile generation evolved in the 1970s to meet 1G (batch-based) business processes. However, second-generation (2G) mobile generation business processes emerged in the 1980s and early 1990s. It is true that a company would find it non-competitive to try to address 2G business processes with 1G mobile technology solutions, to the point that the company could perhaps state that “those enterprise information systems of the 1970s were not important to the strategic needs of the 2G world”. However, the company didn’t state that informatics were not essential, and started to step up to develop 2G enterprise information systems. Since the mid-1990s a third-generation (3G) of business processes has emerged, based on online accessibility. Again, it is true that a company would find it non-competitive to try to address 3G business processes with 2G mobile technology solutions, to the point that the company could perhaps state that “those closed enterprise information systems of the 1980s were not important to the strategic needs of the 3G world”, but what a company needs to do, then, is to develop 3G mobile technology systems. Now, fourth-generation (4G) set of business processes is evolving to the world, it is based on a ubiquitous computing/ location-based service/ always-connected paradigm; 4G mobile technology systems will be needed. Many people guess, around 2015, 5G business processes will evolve to the world, and also 5G mobile technology systems will be needed. Fortunately, MT does move on and great new domains are remained to be defined, appreciated, and conquered, to the financial benefit of the winners. At each stage, MT is the strategic tool to conquer the Chapter 1: Introduction PhD Thesis Page 6 Ming-Chien (Mindy), WU new set of business opportunities; the world is not static and the “end game” is not in sight. Changes happen in business with the customers, with the environment, with the competition and with the regulations. IT and Mobile Communication help the organization in handling these changes. There were certain business expectations in the 1970s from customers, and enterprise information systems developed to support these basic requirements. For example, people could generally do banking only Monday to Friday, 9:00AM to 4:00PM face to face in a bricks-and-mortar building. The customers’ expectation was simply that if he or she could walk into the bank, and the bank could be able to reliably complete a transaction (e.g. a withdrawal) by having access to an up-to-date ledger. Therefore, if there was nothing else ever changed, the bank had just developed an optimized enterprise information system to support that paradigm; and in the early 1980s, the bank could declare that there was no strategic value in spending more money in “tweaking” the 1G mobile system. However, automated teller machines (ATMs) revolutionized the banking prospect in the 1980s. Banks that could quickly and reliably bring this service to customers (by updating their enterprise information systems) were the ones that thrived. Banks needed to make major investments in IT to serve the customers’ new expectations. Thus, the bank had developed an optimized enterprise information system to support that ATM paradigm. At that time, if the world were to stop and nothing else ever changed, the bank could declare that there was no strategic value in spending more money in “tweaking” the 2G mobile system in the early1990s. However, the online approach to do business (shopping, banking, paying, etc.) burst Chapter 1: Introduction PhD Thesis Page 7 Ming-Chien (Mindy), WU into the view in the 1990s, the same observations just made about necessary (new) information technology and mobile communication investments apply. At this stage, or soon hereafter, there evolved an expectation for location-based services. For example, a customer enters a space or a shopping mall, his/ her PDA, iPod, mobile phone etc., starts telling this customer what services, sales, specials, etc., are available at that precise spot; if this customer walks 200 meters farther along, new information is delivered to him/her again. The customer may wish to make an on-the-spot purchase with a wireless financial transaction; he/ she may want to order again via a wireless interaction, so he/she may intend to check how much money he/she has in the account; at that moment this customer may hope to see if money can be transferred on the spot for 7 days to another bank that gives he /she a better interest rate – or transfer credit card balances to another credit card company with better rates. From the customers’ requirement, the enterprises are well advised to start making major investment in information technology and mobile communication now at all levels, to upgrade their 2.5G/3G mobile systems to the 4G mobile environment for near future. Mobility is a complete paradigm of work with an enterprise that is based on location-independence and personalization resulting from the use of mobile technologies (Wu and Unhelkar, 2009). These technologies include wireless communication networks (such as the cellular networks, Mobile satellite networks, Bluetooth, Wireless Local Area Network (WLAN), Wi-Max and Radio Frequency Identification (RFID) and mobile devices (such as mobile phones, PDAs and wireless laptops). RFID is an automatic identification method to provide the organization, particularly SCM systems, to improve the efficiency of inventory tracking and management. The mobile work paradigm, however, is much more than Chapter 1: Introduction PhD Thesis Page 8 Ming-Chien (Mindy), WU the ‘ad-hoc’ utilization of these MT in business. Mobility is a formal, strategic and integral use of MT in the economic, technical, process and social dimensions of a business – from both within and outside the organizational boundaries. The time and location independence of the mobile work paradigm opens up tremendous opportunities for organizations to offer integrated and personalized services to their clients and partners. Mobile network technologies have been providing better services and real-time communication within the organisational ecosystem, which includes suppliers, customers and the Enterprise Architecture. A well-formulated mobile business strategy brings about not only internal integration, but through extension, also offers much more efficiency to its external suppliers, customers and other trading partners over the Internet. Moreover, the web services technology; build on top of eXtensible Markup Language (XML), Web Services Description Language (WSDL), and Universal Description, Discovery and Integration (UDDI) language, provides an excellent basis for integrating the MT into the existing EA, even though the systems have been on different platforms. Figure 1.1: Gap from EA to M-EA An EA extended with above discussed MT can be referred to as Mobile Enterprise Architecture (M-EA) as show in Figure 1. Further details are discussed in Chapter 2. Chapter 1: Introduction PhD Thesis Page 9 Ming-Chien (Mindy), WU 1.3 Research aim and objectives Modern enterprises need to integrate several generations of information systems and infrastructures through a comprehensive Enterprise Architecture. Emerging mobile technologies are eagerly sought by enterprises as they overcome “time and location” boundaries, thereby enabling them to operate dynamically. This research investigates the issues, processes, benefits, and challenges of extending EA with mobility, and identifying and describing the process of integrating MT with EA. The primary purpose of the research is to identify how mobile technology could extend the people, process, data, and system of an EA that would result in a Mobile Enterprise Architecture (M-EA). Therefore, this research study defines M-EA (which is shown in Figure 1.2) as: “A structure for integrating with mobile technology within the Enterprise Architecture of an organization based on the relationship amongst its System, Process, People, and Data” (based on Wu and Unhelkar, 2008). Figure 1.2: M-EA Definition Chapter 1: Introduction PhD Thesis Page 10 Ming-Chien (Mindy), WU A complete M-EA contains 3 parts: M-EA framework, M-EA 5+1 layers model, and M-EA transition road map (as shown in Figure 1.3). M-EA Road Maps (Transitions) ( r iti ) Models (Standards) l ( t r ) Frameworks (Abstraction) r r ( t ti ) Figure 1.3: M-EA Components This framework is an abstraction of how the MT fits within the enterprise requirements to achieve business goals. The M-EA 5+1 layers model reduces its complexity and provides sound basis for successful creation and management of mobile business processes, mobile organization, mobile contents, mobile security and mobile networks. The M-EA transition road map uses "Current" and "Target", "As-is" and "To-be" framework to identify clearly the transition plan (as shown in Table 1.1). The manner in which this IT and mobile technology incorporation takes place successfully is studied here through the framework outlined in the migration plan table (more details are discussed in Chapter 5). Table 1.1: M-EA Migration Plan Current state “as-is” Desired Target state “To-be” Description Key factors Reserve assessment indicator Analysis Assessment indicator result Target M-EA opportunities Design Construct current EA Construct Target M-EA Implementation plan Target M-EA opportunities result Target M-EA implementation plan Chapter 1: Introduction PhD Thesis Page 11 Ming-Chien (Mindy), WU 1.4 Research framework This research is thus an investigation into how MT influences the framework, model, and implementation framework of EA. The result is creation of the Mobile Enterprise Architecture (M-EA) framework, model, and its corresponding transition roadmap. The selected methodology for this research is a qualitative research methodology. The qualitative methodology used in this research includes: constructive method, case studies by interviews, and action research. Figure 1.4: Research Framework As such, the research framework of this research project is shown on above Figure 1.4. The researcher first investigates MT and current frameworks of building EA by using literature review method. This was followed by conducting case studies by interviews to establish the draft M-EA, which includes the definition, advantages, limitations, implementation framework, and the blueprint expectation of M-EA. After that, the researcher has visited three participating companies to do action research, the researcher has studied their EA, implemented M-EA, and understood Chapter 1: Introduction PhD Thesis Page 12 Ming-Chien (Mindy), WU their points of view after applying M-EA, which could help validate the M-EA and also improve the security of M-EA. Thus, firstly, this research starts by constructing initial M-EA structure to investigate and analyse which MT applications could be integrated into EA. The literature review brings ideas of how to extend EA to M-EA, and using construct method to create the initial M-EA model. Secondly, interviewing several experienced enterprise architects by using a structured questionnaire has resulted in advice for the M-EA implementation framework. This initial M-EA model, which takes the form of case studies, provides the implementation details to enterprises that need to change their architecture before they use mobile technology application. Enterprises also get a perspective on what Business Process Re-engineering (BPR) and Mobile-Transformation preparation needs to be done before they integrate M-EA. Case studies by interviews were used to verify the draft M-EA structure, which included the definition of M-EA, the advantages and challenges of M-EA, the implementation team work of M-EA, and what the expectation after the implementation of M-EA (which is the validation criteria). Next, this initial M-EA model was validated by undertaking action research studies in the three participating enterprises. The business processes re-engineering, practical issues, benefits, challenges and limitations of the M-EA model are also being identified, documented and discussed during and after implementation. The model was validated and also updated based on those results. Such comprehensive M-EA reduces the risks and enhances the benefits of using mobile technologies to the Chapter 1: Introduction PhD Thesis Page 13 Ming-Chien (Mindy), WU organizations. Thus, the overall research approach in this thesis follows the “constructionism” philosophies. This research accompanies qualitative research methodologies by using literature review, action research studies and case study by interviews as research methods to achieve the research aim (for detailed information, please see Chapter 3). 1.5 Research scope The scope of this research is to apply mobile technologies to people, data, process, and system of an organization by extending its enterprise architecture. The draft M-EA model is created by the researcher from literature review and qualitative analysis from the result of case study by interview. The proposed M-EA model after implementation and validation in three participating action research companies established the full M-EA structure. Finally, this research project creates a completed Mobile Enterprise Architecture, which includes M-EA framework, M-EA 5+1 layers model, and M-EA transition road map. 1.6 Research justification This research enables the creation of a new M-EA framework, M-EA 5+1 Layers model, and M-EA Transition Roadmap. The justification for this research is the benefits it provides to the enterprise. These benefits are listed as following: • M-EA helps raise efficiency and effectiveness by streamlining location-independence and real-time responses which aid enterprise to provide enhanced customer personalization service. Chapter 1: Introduction PhD Thesis Page 14 Ming-Chien (Mindy), WU • Successful re-engineering of business processes to mobile business processes which could provide the enterprise and with new business strategies. • IT and Mobile communication infrastructures, which are selected for high quality, longer use, and are easy to modify, facilitates cooperation by leverage M-EA to set a successful technology direction in future. Therefore, the longer used infrastructure could reduce costs by reaching out to the extended M-EA which is supported and sustained over time. 1.7 Thesis outline The thesis comprises seven chapters, and lists as following: 1. Introduction; 2. Literature review; 3. Research methodologies; 4. Elicit the draft M-EA model from case studies; 5. M-EA structure; 6. Validating the M-EA by action research; 7. Conclusion and future direction. Figure 1.5 describes the structure and outline of this thesis: Chapter 1: Introduction PhD Thesis Page 15 Ming-Chien (Mindy), WU Figure 1.5: Thesis Structure Chapter 1: Introduction The opening chapter of this thesis, Chapter 1, provides an overview of the background of this research area and describes the used terminology and presents the aims, framework, project scopes, and justification of the research in Mobile Enterprise Architecture (M-EA). This chapter aims to introduce a short description and definition of M-EA. This chapter also describe why a company needs M-EA, what M-EA covers, and how this research project extends EA to M-EA. Chapter 2: Literature Review Chapter 2 incorporates a literature review in Enterprise Architecture (EA) and the emerging Mobile Technologies (MT). Enterprise needs to integrate information systems, databases, infrastructures, and applications to improve business process effectively and service-oriented, which is a common EA. Mobility overcomes “time and location” boundaries, and provides better real-time and personality service to the Chapter 1: Introduction PhD Thesis Page 16 Ming-Chien (Mindy), WU customers. Therefore, the literature review in this chapter provides which and what values of emerging mobile technologies help EA upgraded to M-EA. This chapter concludes by identifying and describing a gap from EA to M-EA for this research project. Chapter 3: Research Methodologies Chapter 3 discusses the methodologies, philosophies and theories used for completing this research. The literature review is used to understand MT and the current frameworks for building EA. Constructing the initial M-EA model is the result of fully understanding the research area. The case studies resulting from the interviews are able to help in creating a complete M-EA structure and implementation framework. The action research studies are conducted by visiting companies to study their M-EA implementations and thereby validating the results. This chapter describes these several methodologies, philosophies, and theories, and additionally justifies the selections in a way that leads to reach the aims of this research project. Chapter 4: Envisioning the M-EA through knowledge elicitation by Interview Result As shown in Figure 1.5, Chapter 4 elicits the initial M-EA model from taking input information from the literature (Chapter 2) and following the research methodology (Chapter 3) to envision this initial model through case studies by interviews. The researcher builds the initial M-EA based on the Literature Review and constructs the updated model through interviews result. The researcher has interviewed several experienced enterprise architects to get advice on improving the comprehensive definition of M-EA and updating the M-EA implementation framework. This chapter Chapter 1: Introduction PhD Thesis Page 17 Ming-Chien (Mindy), WU describes the verification of the draft M-EA, includes the definition of M-EA, the advantages and limitations of M-EA, how M-EA could be implemented, what the expectations are after implementing M-EA (which is the validation criteria for following action research steps). Chapter 5: M-EA Framework, 5+1 Layers Model, and Transition Roadmap Chapter 5 explains the mapping of M-EA to technologies, processes, systems, data, and people. Additionally, this chapter also describes the core philosophies of extending EA with mobility to produce a M-EA framework, core M-EA 5+1 layers model, and M-EA migration plan - transition roadmap. The M-EA framework offers a blueprint of how the people, systems, process, data, and internal and external factors contribute to extending the EA. This M-EA framework is an abstraction of how the emerging technologies or new methodologies fit with an organization’s IT requirements. M-EA model shows how the mobile technology works in each of these layers and connects seamlessly to each other. The M-EA migration transition road map provides the transition process from the current status to target status for the company, which aims to show the company how to plan from the different generation enterprise information system situation to specific M-EA. Chapter 6: Validation M-EA by Action Research Studies As shown in Figure 1.5, Chapter 6 takes input from the validation criteria resulting from the case studies (Chapter 4) and the extension of Mobile Enterprise Architecture (M-EA) (Chapter 5) and uses it to complete action research studies through three participating companies. This chapter presents those three action research studies processes, and the results involved in validating the M-EA (described in Chapter 5). The first mobile communication company helped extending Chapter 1: Introduction PhD Thesis Page 18 Ming-Chien (Mindy), WU and validating the M-EA layer. The second consulting company helped upgrading the implementation migration project plan. The third security/ transaction processing company helped extending M-EA on security specific aspect. This chapter describes the validation of M-EA from the results of action research in three organizations, which is a comprehensive M-EA. Chapter 7: Conclusion and Future Direction Chapter 7 concludes the research. This chapter evaluates and demonstrates that the aim of the research is completed. This chapter also discusses the future directions and recommendations for M-EA research area. 1.8 Summary of this chapter This chapter has introduced the research study, together with its justification that forms the basis of the rest of the thesis. This chapter has also briefly outlined existing literature and studies in the subject area of mobility in order to provide the overall context of this study and set the stage for the specific research questions. Following on from the overall background of the subject area of mobile technologies, this chapter then narrows down the scope of mobility to its application in enterprise architecture. This chapter has also listed the research aim and research objectives, followed by explicit research questions, the justification for such a research study, and the contribution of this research. Technical terms which are used in this thesis have also been defined in the chapter. Finally, the chapter outlines the overall structure of this thesis. Chapter 2: Literature Review PhD Thesis Page 19 Ming-Chien (Mindy), WU Chapter 2: Literature Review on Enterprise Architecture (EA) and Mobile Technologies (MT) 2.1 Overview of this chapter This chapter introduces the literature that has already been published in this research area and studied by the researcher. This literature primarily includes Enterprise Architecture (EA) and Mobile Technologies (MT). Enterprise needs to integrate information systems, databases, infrastructures, and applications to improve business processes effectively. Mobility, by using MT, overcomes “time and location” boundaries, and provides better network and communication, real-time ubiquitous commerce, and personal service to the customer. Therefore, the literature review in this chapter provides basis for specific aspects of MT which add value to EA and help an organization upgrade itself with Mobile Enterprise Architecture (M-EA). Additionally, this chapter also describes the benefits and challenges of MT to EA. This chapter concludes by describing a gap in transitioning from EA to M-EA – which forms basis of this research project. 2.2 Understanding Enterprise Architecture (EA) This section develops an understanding of Enterprise architecture (EA) including its elements, the framework and the roadmaps. The benefits of EA bring to the enterprise is also discussed. Chapter 2: Literature Review PhD Thesis Page 20 Ming-Chien (Mindy), WU 2.2.1 Overview the Enterprise Architecture (EA) An enterprise could be understood as a small to medium business, an entire global corporation, a government agency, a single and substantially independent large department, or a chain of geographically distant organizations linked together by common ownership. Most enterprises all have their own business processes and use several generations of systems to operate their business. However, enterprises today need to improve their ability to operate effectively and dynamically in response to the ever-increasing rates of change in the competitive marketplace and regulatory environments. With these pressures of this competitive business environment, enterprises start to seek an EA, which is the basis for integrating old systems, business processes, data bases, applications, and technology infrastructures with getting new technology applications for assimilating high rates of change. Goikoetxe (2007) states that the Enterprise Architecture (EA) is a set of business and engineering artifacts, including text and graphical documentation, which represents the enterprise’s key business system, information/data, application, technology strategies and their impact on business processes also the users. Moreover, EA will connect existing and new systems to enable collaborative operation within the entire organization in real-time. Thus, EA can provide the access among systems on production, planning and control, inbound and outbound logistics, material flows, monitoring functions, and performance measurements (Rolstadas and Andersen, 2000). Specific contents of these artifacts can include a vision or mission statement, a set of system requirements, a Business Process Architectural View, a Business Systems Architectural view, a Data Architecture View, an Application Architecture View, and a Technology Architecture View (Goikoetxe, 2007). META Group Inc. Chapter 2: Literature Review PhD Thesis Page 21 Ming-Chien (Mindy), WU (2004) and VITA (2010) both demonstrate that EA consists of four key components, which are: Enterprise Business Architecture (EBA), Enterprise Information Architecture (EIA), Enterprise Solution Architecture (ESA), and Enterprise Technology Architecture (ETA). As per the literature review undertaken, EBA focuses on the integration of business information systems and how the business processes run, EIA considers data storage, ESA focuses on supporting people ,to easily understand and use and ETA collects the technology devices, applications, middleware, platforms, and standards to support all the others. “People” is an important aspect of establishing the completed enterprise architecture, because people handle, arrange, manage, interact, and make the decision of how to establish and operate the EA. This research understands EA as a structure based on integrating business processes with Information Communication Technology (ICT) supports by providing a visualization enterprise solution of the relationships among the System, Process, People, and Data in an organization(As shown in following Figure 2.1). Figure 2.1: Enterprise Architecture Elements (basic) Chapter 2: Literature Review PhD Thesis Page 22 Ming-Chien (Mindy), WU User of Internal Enterprise r f I t r l t r ri Enterprise Architecture (EA) User of External Enterprise (Clients, Partners) r f t r l t r ri ( li t , rt r ) ERP Back-end Business Process (Ordering, Purchasing, HR, Accounting) - i r ( r ri , r i , , ti ) CRM Marketing Analysis Channel Management (Customer Based) r ti l i l t ( t r ) SCM Supply Chain Business Process (Demand Planning, SC Planning, Transportation) l i i r ( l i , l i , r rt ti ) Figure 2.2: EA Integrates Several Generations of EIS (based on Kamogawa and Okada, 2004) As shown on Figure 2.2, Kamogawa and Okada (2004) state that EA should integrate various generations of Enterprise Information Systems (EIS) such as Supply Chain Management (SCM) system, Customer Relationship Management (CRM) system, and Enterprise Resource Planning (ERP) system. These software systems may have been created by different programming languages, databases, and may be operating on different technology platforms. These differences in technologies and platforms may cause problems for enterprises that want to run their business processes across various EIS. Cook (1998) advocated that EA should allow integration and coordination of using different generation EIS across whole enterprise, including internal and external enterprises. 2.2.2 Enterprise Architecture (EA) Elements An "Enterprise Architecture" (EA) is the instantiation and application of an Chapter 2: Literature Review PhD Thesis Page 23 Ming-Chien (Mindy), WU architectural framework in order to create an enterprise-level architecture that can be applied to all the systems of a specific enterprise (based on McGovern et al., 2004). Such application of an architectural framework brings together, in a cohesive manner, the specifications and the details of all interfaces, applications, networks, databases and security aspects of the enterprise. Thus an EA cuts across multiple systems and multiple functional groups within an enterprise. Figure 2.3: Enterprise Architecture (EA) Elements (overall) Figure 2.3 shows the comprehensive EA is made up of the frameworks, models and transition road maps. Following is the introduction of the EA elements: (a) Frameworks and abstractions Frameworks are a key part of any EA environment. An Enterprise Architecture (EA) framework is a business and engineering guideline (i.e., a blueprint, a set of instruction, and a specification) for the building of an EA. This EA framework Chapter 2: Literature Review PhD Thesis Page 24 Ming-Chien (Mindy), WU provides the future blueprint and high level abstraction to the enterprise. (The details of EA framework will be discussed in the section 2.3). (b) Models Models provide a pictorial representation of the enterprise-wide view of how the individual technical elements of the systems relate to each other. This pictorial representation can be called the ‘reference architecture’ for work within the organization. The architectural and design patterns that form the ‘standards’ for the organization are also a part of the model. (c) Transitions Transitions provide a migration path for the enterprise from where ‘it is’ to where it ‘should be’. Thus, the transition paths are ‘road maps’ that guide the organization in adopting new technologies, methodologies and business processes. A well constructed EA can drive the modernization effort of a business because this EA can handle the wide variations and changes in both internal and external environment of the organization. While the changes are inevitable, the preparedness for the changes makes the difference between success and failure. The ability of an organization to respond to changes is a highly significant advantage for it, as – it enables the organization to become “Agile”. An organization is agile when it is able to record and analyze external as well as internal events quickly and accurately; and when its systems change rapidly in order to support the changes to its business processes. So EA enables that to happen by incorporating maximum possibilities of changes and expansions of applications and systems for the future. Practical models of an enterprise architecture also involve multiple, heterogeneous systems and Chapter 2: Literature Review PhD Thesis Page 25 Ming-Chien (Mindy), WU multi-vendor software packages. The architectural frameworks are of immense value in helping an organization create truly open systems-based solution architectures. In the absence of an EA, organizations find themselves pushed in inflexible solutions, from time to time also restricted to single-supplier solutions. Such solutions can “close” the organization to multi-vendor solutions and packages – something to be avoided especially in the mobile enterprise market. EA plays an important role in enabling the organizations to remain flexible and responsive in a timely and cost effective manner, and thereby to compete and grow successfully. 2.2.3 Enterprise Architecture (EA) as a Constraint An Enterprise Architecture (EA) provides a common platform for creation of business application. This common platform for application development abstracts and encapsulates significant aspects of application development. However, the EA also applies constraints on this abstraction which are (a) organizational specific and (b) technology specific. The organizational specific constraints are based on what is allowed, available, and acceptable as a standard which forms part of the policies within the organization. For example, an organizational standard mandates a certain common functionality (such as a password or key word) for all wireless PDA access by a user - such as an employee or a customer. This functionality is a constraint on the requirements for all applications that are modeled in the problem space. The technology specific constraints come from what the technology itself has to offer – and that dictates the solution design. For example, if a wireless network technology has a limit in terms of the distance range it can address, the wireless access to the contents or a specific Chapter 2: Literature Review PhD Thesis Page 26 Ming-Chien (Mindy), WU search on the database will be limited to that network restriction which dictates that solution. An enterprise-wide suite of activities can be grouped into three core activities: understanding the problem, providing the solution and applying the constraints. These activities are as shown in Figure 2.4. The architectural elements that come into play in the problem space are called the Business Architecture, the ones in the solution space are the Solution Architecture, and the ones in the background space are the Technology Architecture. These architectural elements and corresponding activities are discussed next. Figure 2.4: Enterprise Architecture as a Constraint (Unhelkar, 2005) (a) Understanding the problem The understanding of the problem includes understanding the challenges of the business, their requirements, their interactions with external and internal parties and Chapter 2: Literature Review PhD Thesis Page 27 Ming-Chien (Mindy), WU their constraints. The understanding of the business problem and its modeling have evolved into the profession of business analysis. The information architects and the business analysts of the organization discuss through workshop and prototype in order to elicit requirements; subsequently they model them after, apply quality techniques to the models, and use those models to communicate the requirements throughout the project. These information architects deal with the five phases of a business architecture as discussed by Orr (2007) – i.e. (1) strategic intention discovery; (2) business context modeling; (3) business value chain modeling; (4) business value stream modeling; and (5) business process modeling. A Business Architecture that defines the enterprise business model, process cycles and timing also shows what functions should be integrated into the system. Furthermore, the business architecture also deals with the data and the corresponding models which need to be integrated into the system. The information architects and the business analysts, together with the users work in the “problem space”. (b) Providing the solution The provision of solution to the problem (described in the problem space) requires detailed understanding of the technologies that are to be used in providing the solution. Therefore, the solutions architects, system designers and the developers use their knowledge of programming languages (e.g. Java), development environment (e.g. dotNet) and databases (e.g. Oracle) in order to craft the solution. The Solution Architecture, which has also been referred to as an application portfolio, is the collection of information systems supporting the business architecture, which helps the user to easily understand and use the interface and components. The solution architects, system designers and developers work in the “solution space”. Chapter 2: Literature Review PhD Thesis Page 28 Ming-Chien (Mindy), WU (c) Applying the constraints The requirements models in the problem space, and the designs in the solution space are either expanded or tempered, based on the constraints in both organizational and technical level. These constraints result in a background or technology architecture, which is also a consistent set of ICT standards, which provide the infrastructures to support the aforementioned two architectures. The business requirements of speed, for example, are tempered by the availability of the bandwidth for the organization; and the business process of ‘broadcasting’ information to a group of users is re-engineered dramatically with the availability of a wireless hotspot. These constraints are provided and used in the “background space” by the enterprise architects. Architecture is, thus, the profession of identifying, understanding and applying constraints at the problem and the solution level of the organization. This application of the constraints is achieved by identifying and refining the requirements of the stakeholders, developing views of the architecture that show how the concerns and the requirements are going to be addressed, and demonstrating the trade-offs amongst potentially conflicting concerns of different stakeholders. Thus, an EA provides a strategic context for the evolution of the IT systems and strategies in response to the constantly changing needs of the business environment. Furthermore, a good EA also achieves the right balance between IT efficiency and business innovation. A comprehensive EA brings the following benefits to the enterprise: • A well-defined architecture providing system modularity and information reusability, which are important attributes of a streamlined architecture as Chapter 2: Literature Review PhD Thesis Page 29 Ming-Chien (Mindy), WU they enable lower costs of system development, support, and maintenance fee. • An efficient ICT operation that is prepared for changes to the requirements, and provides excellent interoperability amongst its systems and networks. • An enterprise-wide holistic view of the requirements of the business from its systems. Similarly, a holistic view of the solutions design. • A common and robust security policy that applies to all systems amongst the enterprise. • Risk reduction by utilization of previous architectural experiences within and outside the organization, and by utilization of an architectural framework. • Flexibility to decide on the “make or buy” aspects of software solutions and packages. Provide for future growth in response to the needs of the business. • Opportunity to handle outsourcing of processes development and maintenance work. • Simplification of the otherwise complex applications development through the use of architectural layers • Reduction in ‘time to users’ for software applications due to the use of components and frameworks. EA supports the rapid deployment of mission-critical business applications, achieving faster time-to-user for new products and services. Thus, EA increases the company growth and profitability. 2.3 Enterprise Architecture (EA) frameworks An Enterprise Architecture (EA) framework is a business and engineering guidelines (i.e., a blueprint, a set of instruction, and a specification) for the building of an EA. Chapter 2: Literature Review PhD Thesis Page 30 Ming-Chien (Mindy), WU In this section, the researcher discusses the importance of EA frameworks, and overview of some industrial famous EA frameworks. 2.3.1 Relevance of EA frameworks The architectural framework encapsulates the knowledge and experiences of accomplished architects in a succinct manner. The knowledge and experiences of numerous contributing experts in the field enable a good architectural framework to incorporate numerous possibilities and options in it. For example, an architectural framework provides guidelines and encourages the architect to think in terms of upcoming changes to the wireless network standards (such as from 2G to 3G) and upcoming security requirements. The framework also offers an excellent mechanism for the architects and planners of the enterprise to organize their activities around it. As a result of utilizing these meta-architectures, there is significant reduction in the risks and potential rework associated with the actual architectural work in the organizations. Architectures based on these frameworks also facilitate creation of rapid designs and successful software implementations. An architectural framework can be enacted for different types of architectures across the enterprise – each of which describes a method for designing an information and communication system based on its building blocks. Instantiation of an architectural framework demonstrates how the components of a system fit together. Therefore, the description of an architectural framework should be precise, with a commonly understood vocabulary; and wherever possible, the framework should be supported by Computer Aided Software Engineering (CASE) tools. There is obviously a need for a list of recommended standards that can be used in instantiating the architecture Chapter 2: Literature Review PhD Thesis Page 31 Ming-Chien (Mindy), WU based on the frameworks and the available components. The critical success factor of structured and implemented EA is having a best practice approach by using an architecture framework. The EA framework provides a method of organizing architecture documents, dividing them into manageable parts and defining cross linkages between them. The results of these architectural abstractions are some well-known architectural frameworks such as The Open Group Architectural Framework (TOGAF) (http://www.theopengroup.org) and the Zachman Framework (http://www.zifa.com/). Apart from the two aforementioned and highly popular architectural frameworks of TOGAF and Zachman, there are several other enterprise architectural frameworks primarily coming out of government agencies. Examples of such frameworks are the Department of Defense Architecture Framework (DOGAF) (US), Federal Enterprise Architecture Framework (FEAF) (US), and Treasury Enterprise Architecture Framework (TEAF). These frameworks influence each other. Each of these frameworks (and many more) provides a robust suite of principles and guidelines that are gleaned from the original knowledge as well as the practical experiences of their creators and contributors. Understandably, the way architecture is interpreted by these architectural frameworks also varies. 2.3.2 Zachman EA framework One popular reference framework of EA can be based on is the Zachman framework. Zachman (1987) created the Zachman Framework which has been described by many authors as basis for their work. (See EA Framework work by Finkelstein (2006), for example). This framework provides a formal and highly structured way to define the concepts of an enterprise. The Zachman Framework describes a holistic Chapter 2: Literature Review PhD Thesis Page 32 Ming-Chien (Mindy), WU model of an enterprise’s information infrastructure from six perspectives: planner, owner, designer, builder, integrator, and the user. This framework contains six rows and six columns referring 36 cells to documentation of building an enterprise (which shows on Figure 2.5). The columns describe the modeling blocks of an enterprise. These modeling blocks are: data (what), process (how), network (where), people (who), time (when) and motivation (why). The columns intersect with the rows representing various models of a functioning enterprise – namely, the scope (contextual), business model (conceptual), system model (logical), technology model (physical) and detailed representations of the models and the description of each row and column are as follows: 6 rows of Zachman EA Framework: The scope/ strategy row corresponds to an executive summary for a planner who wants an estimate of the size, cost, and functionality of the system. The enterprise model shows all the business entities and processes, and how they interact. The system model is used by systems analysts who must determine the data elements and software functions that represent the business model. The technology model considers the constraints of tools, devices, technology, and infrastructure. The Built level represents individual, independent modules that can be allocated to contractors for implementation. The functioning enterprise level describes and validates the operating system from the user’s view. Chapter 2: Literature Review PhD Thesis Page 33 Ming-Chien (Mindy), WU Figure 2.5: Zachman EA Framework (http://www.zifa.com/) Chapter 2: Literature Review PhD Thesis Page 34 Ming-Chien (Mindy), WU 6 columns of Zachman EA Framework: The motivation/why level outlines the motivation of the enterprise. This section shows not only the enterprise goals, aims, and objectives, but also the business plan, knowledge architecture and knowledge design. The function/how level shows the functions within each perspective. Examples include business process, software application function, computer hardware function, and language control loop. The data/what level details the entities involved in each perspective of the enterprise. Examples include business objects, system data, relative tables, or field definitions. The people/who level describes the people structure within the enterprise. The design of the organization has to do with the allocation of work and the relationship of authority and responsibility. The vertical dimension represents delegation of authority and the horizontal represents the assignment of the responsibility. The network/where level represents the locations and interconnections within the enterprise. This section includes major business geographic locations, separate sections within a logistics network, allocation of system nodes, or even memory addresses within the system. The time/when level represents the time or the task relationships that establish performance criteria and quantitative levels for enterprise resource. This is useful for designing the master schedule, the processing architecture, control architecture, and timing devices workflow. Following Table 2.1 is the documentation practice list of Zachman Framework for construction of an EA from above description: Chapter 2: Literature Review PhD Thesis Page 35 Ming-Chien (Mindy), WU Table 2.1: Zachman Framework Layer What (Data) How (Function) Where (Network) Who (People) When (Time) Why (Motivation) Scope Context Boundary List important data to the business List important business processes List business operates locations List important organization List significant event List business goals and strategies Business Model Concepts Entity relationship model Business process model Business logistic system Work flow model Master schedule Business plan System Model Logic Logical data model Application architecture Distributed system architecture Human interface architecture Processing structure Business rule model Technology Model Physics Data information Business system design Technology architecture Presentation architecture Control structure Rule design As Built Component Configuration Data definition Program Network architecture Security architecture Timing definition Rule specification Functioning Enterprise Instances Data Function Network organization Schedule Strategy The strong point on this framework is that it provides everyone in the enterprise and enterprise architect group a clear picture of how the enterprise is operating including its people, processes and technologies. However, there is no guidance on sequence, process, or implementation of the framework; the focus is on ensuring that all aspects of an enterprise are well organized and exhibit clear relationships that will ensure a completed system regardless of the order in which they are established. 2.3.3 TOGAF framework Chapter 2: Literature Review PhD Thesis Page 36 Ming-Chien (Mindy), WU The TOGAF framework is quite popular amongst all these EA frameworks. The Open Group is a vendor-neutral and technology-neutral consortium seeking to enable access to integrated information within and among enterprises, based on open standards and global interoperability. The Open Group already developed an architectural framework known as The Open Group Architectural Framework (TOGAF), Version 9.0 at 2009 (The Open Group website, www.togaf.org, 2009). TOGAF is a meta-architecture, TOGAF V9.0 includes seven parts: (1) Introduction, (2) Architecture Development Method (ADM), (3) ADM Guidelines and Techniques, (4) Architecture Content Framework, (5) Enterprise Continuum and Tools, (6) TOGAF Reference Model, and (7) Architecture Capability Framework. Part 1, introduction, provides a high-level introduction to the key concepts of EA and in particular the approach of TOGAF. It contains the overview of TOGAF, a definition of the terms used in TOGAF, and also releases notes detailing the changes between the current new version and previous version. Part 2, Architecture Development Method (ADM), as shown on Figure 2.6, is the core section of TOGAF, and describes a step-by-step approach of developing an EA. Additionally; part 3, ADM Guidelines and Techniques contain a collection of guidelines and techniques available in applying TOGAF ADM on creating an EA. Chapter 2: Literature Review PhD Thesis Page 37 Ming-Chien (Mindy), WU Figure 2.6: TOGAF- Architecture Development Method (ADM) (www.theopengroup.org ) TOGAF ADM is a “migration plan” to show the clearly process from current different generations of EIS to the Enterprise target dream architecture. An explanation in the documentation on the ADM, the development of architecture views, is an iterative process. The typical progression is from the business to technology, using a technique such as business scenarios to properly identify all Chapter 2: Literature Review PhD Thesis Page 38 Ming-Chien (Mindy), WU pertinent concerns, and from high-level detail, continually referring back to the concerns and requirements of the stakeholders, throughout the processes. Moreover, the ADM specifically declares the technical architecture as a capability, a discipline, and an approach used to define, apply, and maintain the technology environment within the enterprise. Perks and Beveridge (2003) states that technical architecture of ADM embodies the life cycle for defining the organization’s technical strategy, setting and adopting technical standards, and maintaining the technical environment through changes in both business and technology. Part 4, Architecture Content Framework, describes a structured meta-model for architectural artifacts, the use of re-usable architecture building blocks, and an overview of typical architecture deliverables. Architecture is the structure of components, their inter-relationships, and the principles and guidelines governing their designs and evolution over time. This structural description of the components has the task of defining and providing the building blocks that provide basis for putting together the software systems. Figure 2.7: TOGAF - Enterprise Continuum (www.theopengroup.org) Chapter 2: Literature Review PhD Thesis Page 39 Ming-Chien (Mindy), WU Part 5, as shown on Figure 2.7, the Enterprise Continuum and Tools, discusses appropriate classifications and tools to categorize and store the outputs of architectural activities within an enterprise. The Enterprise Continuum describes as a series of “current” (problem analysis- Architecture Continuum) and “target” (possible answer – Solutions Continuum), another set of terms for these are “as-is”, “to-be”. The current architecture is a formal description of a system, or a detailed plan of the system at component level to guide its situation and problem. This formal description has the task of providing supports for creating the architectural solution, which constructs the integrated information systems based on the requirements of the organization. To sum up, TOGAF Enterprise Continuum describes how an organization can move or transit itself from where it is to where it wants to be. Part 6, TOGAF Reference Model, provides a selection of architectural reference model, which includes TOGAF Foundation Architecture, and the Integrated Information Infrastructure Reference Model (III-RM). The last part, Part 7- Architecture Capability Framework, discusses the organization, processes, skills, roles, and responsibilities required to establish and operate an architectural function within an enterprise. Therefore, the strong point of this framework is the technical corresponding of the business strategy (i.e. the future shape of business given in a current environment), and it clearly shows a approach step-by-step constructing an EA. Using TOGAF as the architectural framework will allow architectures that are consistent, to be developed and reflect the needs of stakeholders, employ best practice, and give due consideration both to current requirements and to the likely future needs of the enterprise. Chapter 2: Literature Review PhD Thesis Page 40 Ming-Chien (Mindy), WU 2.3.4 Other industrial EA frameworks As mentioned earlier, there are many EA frameworks and new ones are being added everyday as well. Other known industrial EA frameworks are: Department of Defense Architecture Framework (DoDAF), Federal Enterprise Architecture Framework (FEAF), and Treasury Enterprise Architecture Framework (TEAF). Following is an overview of those above mentioned the other industrial EA frameworks: (a) Department of Defense Architecture Framework (DoDAF) The Department of Defense Architecture Framework (DoDAF) is the guiding document that provides a common language for describing architecture across all segments of the United States Department of Defense. The DoDAF is a reference model to organize the EA and system architecture into complementary and consistent views. DoDAF defines a set of products, a view model that acts as mechanisms for visualizing, understanding, and assimilating the broad scope and complexities of an architecture description through graphic, tabular, or textual means. The three views of the DoDAF are the operational view, the systems view, and the technical standards view (which shows on Figure 2.8). Chapter 2: Literature Review PhD Thesis Page 41 Ming-Chien (Mindy), WU Figure 2.8: DoDAF 3 Views and Linkages (Department of Defense (DoD), 2007) The operational view describes the participants (players), the activities they perform, and the information they need to exchange. The systems view describes the hardware and software that the participants use in order to accomplish their activities. The technical standards list the interface criteria that the systems must satisfy or govern their implementation in other way. (b) Federal Enterprise Architecture Framework (FEAF) The Federal Enterprise Architecture is the EA of the United State Federal Government, which provide a common methodology for IT accruement, achievement, use, and disposal in that Federal government. The FEAF is built with a collection of reference models that define and align the Federal government’s business functions and supporting IT systems. These models are: Performance Reference Model (PRM) which is a standardized framework to measure the performance of major IT Chapter 2: Literature Review PhD Thesis Page 42 Ming-Chien (Mindy), WU investments and their contributions to program performance; Business Reference Model (BRM) which is a function-driven framework for describing business operations of the federal government independent of the agencies that perform them; Service Component Reference Model (SRM) which is a business-driven and performance-driven functional framework that classifies service components according to how they support business or performance objectives; Data Reference Model (DRM) which is a model describing, at an aggregate level, the data and information that support program and business line operations; Technical Reference Model (TRM) which is a component-driven and technical framework used to identify the standards, specifications, and technologies that support and enable the delivery of service components and capabilities. Figure 2.9: FEAF Structure (Federal Chief Information Officer Council, 2001) Chapter 2: Literature Review PhD Thesis Page 43 Ming-Chien (Mindy), WU The major components of the FEAF are (also see Figure 2.9): • Architecture Drivers: represents external motivation that causes the FEA to change. • Strategic Direction: ensures that changes are consistent with the overall federal direction. • Current Architecture: represents the current state of the enterprise. Full characterization may be significantly beyond its worth and maintenance. • Target Architecture: represents the target state for the enterprise within the context of the strategic direction. • Transitional Processes: apply the changes from the current architecture to the target architecture in compliance with the architectural standards. • Architectural Segments: focus on a subset or a smaller enterprise within the total federal enterprise. • Architectural Models: provide the documentation and the basis for managing and implementing changes in the federal enterprise. • Standards: include standards (some of which may be made mandatory), voluntary guidelines and best practices, all of which focus on promoting interoperability. (c) Treasury Enterprise Architecture Framework (TEAF) Among the various Departments in the US Government, the Department of the Treasury is one of several leading organizations in the promotion of a Treasury Enterprise Architecture Framework (TEAF) in response to the FEAF and the Treasury IT Strategic 2000-2003 PLAN. TEAF has three basic parts: (1) a definition of the framework, (2) a set of activities that guide architectural planning and implementation, (3) a set of guidelines that support strategic planning, EA management, EA implementation approach, and building a repository for EA Chapter 2: Literature Review PhD Thesis Page 44 Ming-Chien (Mindy), WU products. Additionally, TEAF prescribes the four architectural views: functional view (how, where and when), information view (what, how much, and how frequently), organizational view (who and why), and infrastructure view (enabler). The key principles in TEAF include: • Compliance with applicable laws, orders, and regulations are required. • Business objectives must be defined before building IT solutions. • Total business value is the primary goal that drives IT decisions. • EA is an integral part of the Investment Management Process. • Architectural decisions shall maximize interoperability and reusability. • EA must be consistent with departmental guidance and strategic goals. • Standardization will be used to fulfill common requirements and provide common functions. • Information and infrastructures are vital assets that must be managed, controlled, and secured. • Collaboration among Treasury IT organizations will facilitate the sharing of information, data, and infrastructures required by the business units. 2.3.5 Abstracting EA framework This section is abstracting above mentioned five EA frameworks, and following comparative table is a community of those five EA frameworks: Chapter 2: Literature Review PhD Thesis Page 45 Ming-Chien (Mindy), WU Table 2.2: Comparative view of 5 EA Frameworks Zachman TOGAF DoDAF FEAF TEAF Publish Date: 1987 V1: 1995~ V9:2009 2003 1999 2000 Publisher: Zachman The Open Group Department of Defense Federal Chief Information Officer Council Department of the Treasury Components 6*6 Tables 7 parts 3 views 5 models and FEAF Structure 3 parts and 4 views Migration Paths Out of scope ADM/ Enterprise Continuum Out of scope Transitional Processes EA implementation approach Views /Models 36 models Reference Model 3 views 5 models 4 views 2.4 Web Service (WS) and Service-Oriented Architecture (SOA) These Web Services (WS) enabled technologies provide collaboration and integration of applications on the Internet. The WS paradigm refers to the Service-Oriented Architecture (SOA), which constitutes a distributed computing environment in which application call functionality from other applications either locally or remotely over an internal network or an IP network in a loosely-coupled way. Therefore, SOA is part of an EA and can be viewed as “sub-architecture” of an EA, and SOA has existed before the advent of WS. This section looks at the technologies of WS and SOA, and also discusses the importance of WS and SOA to EA. Chapter 2: Literature Review PhD Thesis Page 46 Ming-Chien (Mindy), WU 2.4.1 Web Service (WS) Technology A Web Service (WS) is a delivery mechanism that can serve many different consumers on many different platforms at the same time. WS technology acts as an enabler to connect incompatible stand-alone systems to integrate a complex distributed system that was not possible existing in previous technologies (Stacey and Unhelkar, 2004). Marks and Werrel (2003) defined Web Service (WS) as “loosely coupled, self-describing services that are accessed programmatically across a distributed network, and exchange data using vendor, platform, and language-neutral protocols.” WS are self-contained and they describe their offerings in a standardized manner using eXtensible Markup Language (XML) so that they can be published, located and invoked across the Internet. Such ubiquitous XML provides many opportunities for integrating enterprise applications. However, XML/Simple Object Access Protocol (SOAP), together with Web Services Definition Language (WSDL) and Universal Description Discovery and Integration (UDDI), form a comprehensive suite of WS technologies that have the potential of transcending beyond mere application integration within an organization, and providing capabilities for integrating processes across multiple organizations. WS is characterized by the ability of publishing a service on an IP-network in a registry. The network is either public (Internet) or private (enterprise intranet). The registry is standardized, called Universal Description Discovery and Integration (UDDI) and could be public or private as well. UDDI consists of an XML schema that defines 4 data structures: business definition, service definition, binding Chapter 2: Literature Review PhD Thesis Page 47 Ming-Chien (Mindy), WU specification, and programmatic interface as well as the application programming interfaces (APIs) that process on those structures. WS are configured and deployed across corporate intranets or the Internet using Web Services Description Language (WSDL). WSDL contains 3 elements: the white pages, which have basic information about the providing company and its services; the yellow pages, which organize services by industry, service type and geography; and finally the green pages, which contain the technical mechanism, for example, how to accomplish a WS. Figure 2.10: Web Service Technology As shown on Figure 2.10, WS has 3 corresponding roles: the WS Service Provider, the Service Consumers (Requester), and the Service Broker (UDDI Registry) (Harrison and Taylor, 2005). The WS Service Provider, typically the owner of the service, uses WSDL to submit a service description to be published in a Service Chapter 2: Literature Review PhD Thesis Page 48 Ming-Chien (Mindy), WU Registry. The Service Brokers have the relationship between the Requester and Provider, but it is important to understand that services are typically hosted and executed by the Service Provider. The Service Consumer is a software component in search of a service to invoke. The Service Requester finds the service by discovering through the UDDI Registry- the set of available services that meet pre-defined criteria. Once a suitable service has been discovered, it uses the returned UDDI and WSDL specifications from the Service Broker UDDI registry to prepare its client service request. These are then sent as SOAP input messages to the SOAP server nominated by the Service Provider with the WS processing results returned as SOAP output message. The Service Requester then binds to the Service Publisher to invoke the service at runtime and uses the binding information provided in the service description. In this era, WS are about to create a new wave of change. This new engine of change is relatively simple: the catalyst for WS is agreement. At its foundation is agreement on the adoption of three foundational standards for communicating between computer systems: Transmission Control Protocol/ Internet Protocol (TCP/ IP), Hypertext Transport protocol (HTTP), and also XML. All of them are the pervasive standards for computing what is emerged from the Internet revolution. The Internet capped the client-server era of computing by making computer pervasive to all users in organizations and at homes. The Internet extended the reach of computing into virtually all aspects for the users from emailing holiday photos to friends. As much as the Internet broke the communication and information bottleneck for information consumers of the client-server computing model, WS will break the connection and information bottleneck for business enterprises. Chapter 2: Literature Review PhD Thesis Page 49 Ming-Chien (Mindy), WU 2.4.2 Service-Oriented Architecture (SOA) EA represents a technology-business philosophy that provides the basis for cooperation between various systems of the organization that may be inside or outside the organizational boundary. An EA that links together the applications and WS within organization, across enterprise, and across the Internet can be called the Service Oriented Architecture (SOA). The W3C (2004) defines SOA as “A form of distributed systems architecture. This architecture consists of a set of components which can be invoked, and whose interface descriptions can be published and discovered”. Service Oriented Architecture (SOA) is an architecture that makes the services of a system to interact and perform a task supporting a request. Technologies such as Common Object Request Broker Architecture (CORBA) and Distributed Component Object Model (DCOM) afforded the opportunity to create SOA. However, WS is an ideal technology for developing sophisticated architecture (Barry, 2003). SOA is a collection of WS capable of interacting in three ways, commonly referred to as “publish, find and bind” (as discussed in the previous WS section). Service must be able to make its interface available to other services (publish), which must be capable of discovering the interface (find), and finally, services must be able to connect to one another to exchange messages (bind). The loose coupling of an SOA is achieved firstly through the separation of data exchange from the software agents involved in the exchange, and secondly through the discrete nature of the service. SOA is an IT architectural approach that increases business agility by aligning IT technologies and services with business goals. SOA enables organizations to Chapter 2: Literature Review PhD Thesis Page 50 Ming-Chien (Mindy), WU establish an environment that uses loosely coupled services to support the requirements of today's highly competitive businesses. SOA facilitates ability to share data and information with business partners by enabling their applications to ‘service’ with each other. Thus, WS supports enterprise applications, services, related IT service providers as well as deployment of services, applications and processes (Wiehler, 2004). Creating and managing the WS based architecture should result in an infrastructure that would enable enterprises to take their fine-grained services and other information data repositories and compose them into real-time business management information system. The objective of a successful SOA is to provide real-time responses in both internal business processes and external supplier and customer relationships. Thus, with SOA, business processes could be configured to automatically launch communications with relevant players across the enterprise. Application 2 .NET li ti . Service Oriented Architecture (SOA) Applications of Internal Enterprise or Other Businesses (Clients, Partners) li ti f I l i t i li t , t ) Application 1 JavaScript li ti i t Application 3 CORBA /ISAN li ti /I Figure 2.11: SOA Integrates the Applications As shown on Figure 2.11. SOA integrates a set of enterprise application, not only EIS, but also the people, data, processes, applications, platforms, and middleware Chapter 2: Literature Review PhD Thesis Page 51 Ming-Chien (Mindy), WU together. Furthermore, whenever translation from one platform to another is required, the XML makes the task easy. The secured application 1 offers the service which can be located and consumed by application 2. This kind of software systems, built around the concept of ‘services’ being offered and received, which provides basis for most modern-day EA. This SOA integration makes EA provide the best solution as an integrated enterprise. Additionally, applications of other businesses, which are external enterprise users, include the customers, partners, suppliers, or all members in a supply chain are also able to see a unified view of the SOA as well. This internal and external enterprise application integration (EAI) is the blueprint solution for the future application coordination of the different generation EIS (Ghanbary and Unhelkar, 2009). 2.4.3 Value of WS and SOA to enterprise WS technology has now advanced so that functions are within existing application programs and suites – as well as functions within ERP, CRM, SCM, and other packages – can be easily and reliably published to an intranet or the Internet for remote execution using SOAP, WSDL, and UDDI. Specifically, Lawler and Howell-Barvber (2008), Minoli (2008) and Marks and Werrel (2003) have discussed about what benefits WS brings to the enterprise: • WS will take B2B communication to new levels. The Internet enabled personal collaboration via email and instant messaging tools; • WS will enable corporate collaboration via loosely coupled applications across original boundaries. • WS will enable much more than information exchange between organizations based on dedicated interfaces at the system level. Chapter 2: Literature Review PhD Thesis Page 52 Ming-Chien (Mindy), WU • WS will enable businesses to interoperate at the business process level in dynamic and emergent ways as new processes arise in response to changing business conditions and changing corporate priorities. • WS will support application integration internally and externally across the firewall. • WS will provide easier B2B collaboration between business partners • WS will transit software deployment models from high-footprint implementations to just-in-time applications that are appropriate to the business challenges being addressed. This is the beginning of the idea of Just-in-Time (JIT) IT based on WS. Software rental models and grid computing are simply specific subsets of the idea of JIT IT. • WS will reduce costs of software procurement, deployment, and integration. • WS will increase business and technology agility by deploying loosely coupled business applications and monolithic enterprise applications. Additionally, in order to increase the ability of the enterprise to serve its customers as well as deal with its business partners in today’s dynamic business environment, there is a need to integrate these IT products and services through a common SOA. Dr. Hazra (2002, 2009) stated that business leaders must guide their teams to transition and deploy applications as services leveraging a service-oriented architecture (SOA). However, a clear understanding of an SOA before embarking on a Web services initiative is imperative. To arrive at the future of SOA and all its potential, the time to act is now -- build business services today. SOA can make business agile and help adapt to the transformational changes of business environments today and tomorrow. A carefully thought out and implemented SOA provides the enterprise with competitive advantages by opening up opportunities to Chapter 2: Literature Review PhD Thesis Page 53 Ming-Chien (Mindy), WU streamline processes, reduce costs, increase customer satisfaction and enable thorough strategic planning (Lan and Unhelkar, 2005). Popkin (2007) stated that SOA is emerging as the popular commercial industry solution for improving collaboration across time, place and platforms. Additionally, Dowell (2007) stated that the key to manage the SOA solutions is in understanding, defining, and measuring service level achievement to meet strategic outcomes. McGovern et al. (2004) stated that SOA provides an important new avenue for the integration of applications. Creating the new applications under SOA offers a significant increase in the qualities of availability, interoperability, maintainability, and reliability of those applications. Butler Group (2004) listed the SOA benefits in their Technology Evaluation and Comparison Report which include: Faster assembly of solutions; Reduction in cost and complexity with consequent lowering of maintenance overhead; Lowered costs of on-going change; Business interactions distanced from technology constraints; Better enterprise flexibility; The ability to maximize existing IT investments; and a more robust IT environment. However, there is the growing requirements for better integration between systems to support business processes agility, and the needs for real-time and location-independence monitoring of business operations (Harmon and Daim, 2009; Sherringham and Unhelkar, 2009). This need of business agility is leading to the development of a flexible SOA which brings about a synergy between systems, processes, and information that can provide the necessary agility. Services in a flexible SOA can be created, modified, and removed dynamically in almost a real-time manner anywhere by the access provided to the users through any devices. These advantages of SOA, however, need to be considered in collaboration with and Chapter 2: Literature Review PhD Thesis Page 54 Ming-Chien (Mindy), WU as extensions of mobility in order to provide greater advantages to businesses in terms of their agility. 2.5 Mobile Technologies (MT) and services This section discusses the mobile technologies (MT) basic definition, and overview of the MT which could help extend the EA, including the mobile network and communication, mobile service, and mobile commerce. 2.5.1 Mobile technology basics “Mobile Technology” is usually used to describe modern wireless connections such as those in cellular networks and wireless broadband Internet. Wireless technologies encompass communication that is achieved without land-based or wired mechanisms. In modern usage, wireless is a method of communication that uses low-powered radio waves to transmit data between the mobile terminals (Hammer and Champy, 2001). The terminals, such as mobile phones, I-Pods, Personal Digital Assistants (PDA), Global Positioning System (GPS), watches, email-only devices, handheld computers, and "wearable" technology, are carried by individuals and are far more “personal” than mere desktop PCs. The mobile work paradigm, however, is much more than the ‘ad-hoc’ utilization of these mobile technologies in business. Mobility is a formal, strategic and integral use of mobile technologies in the economic, technical, process and social dimensions of a business – from both within and outside the organizational boundary. Chapter 2: Literature Review PhD Thesis Page 55 Ming-Chien (Mindy), WU The time and location independence of the mobile work paradigm opens up tremendous opportunities for organizations to offer integrated and personalized services to their clients and partners. A well-formulated mobile business strategy brings about not only internal integration, but also, through extension, offers much more efficiency to its external suppliers, customers and other trading partners over the Internet. 2.5.2 Mobile networks and communications These mobile technologies include wireless communication networks (such as the “3G” cellular networks, Mobile satellite networks, Infrared, Bluetooth, Wireless Local Area Network (WLAN), Wi-Max and Radio Frequency Identification (RFID). 3G Mobile Network The development of 3G-related technologies has overcome the limitation of the previous generations of mobile technologies by allowing higher transmission rates and more complex e-commerce interactions (Barnes, 2002). Kuo and Yu (2005) as well as Huber (2002) listed three 3G standards including Wideband Code Division Multiple Access (WCDMA), Code Division Multiple Access 2000 (CDMA2000), and Time Division – Synchronized Code Division Multiple Access (TD-SCDMA), approved by the International Telecommunication Union (ITU). W-CDMA is the most popular 3G mobile network which is capable of transferring multimedia between terminals; it is the technology behind the 3G Universal Mobile Telecommunications System (UMTS) standard combined with the 2G Global System for Mobile Communications (GSM) standard, which is mainly dominated by European and Japanese firms. Chapter 2: Literature Review PhD Thesis Page 56 Ming-Chien (Mindy), WU Due to the promotion of the GSM organization and the 60% popularity usage of the 2G system in the global market, CDMA2000 gained the attention of many companies, especially U.S. and Korean firms that mainly support it (Paavilainen, 2001). One of the advantages of CDMA2000 system is the upgradeability of the narrow-band CDMA system, so the user doesn’t need to change her/his mobile device – just upgrade her/his user plan. The TD-SCDMA includes three main key technologies: 1. TDMA/TDD principle; 2. smart transmitter and receiver; 3. joint detection/terminal synchronization. It is mainly supported by China’s Datang Telecom, which advocates its low-cost infrastructure. Mobile Satellite Mobile satellite networks represent the convergence of the latest mobile technologies with space technologies. Satellites are operated at microwave radio frequencies in various bands, which are allocated by the International Telecommunications Union (ITU, 2001). Olla (2005) declared that integrating space technology into mobile communications offers two main advantages. The first one is providing access to voice and data service anywhere in the world – of which the current popular application is Internet phone (Voice over IP – VoIP). The second one is the exact positioning of useful location-sensitive information used for direction-finding- and map-reading-based services – the current popular application of which is a car Global Positioning System (GPS). These applications are becoming commonplace; with Fitch (2004) pointing out that the technique for interfacing satellite links to global networks is well developed, including methods to overcome timing problems. Chapter 2: Literature Review PhD Thesis Page 57 Ming-Chien (Mindy), WU Infrared Infrared (IR) technology provides directional electromagnetic radiation for “point to point” communication within short range. The radiation wavelength of IR communication is approximately between 750 nm and 1 millimeter (mm). IR data transmission is a mobile application for short-range communication between a computer terminal and mobile device, such as a PDA or a mobile phone. Infrared communications are useful for indoor use in areas of high population density. IR doesn’t transmit through physical barriers such as a wall, and so doesn’t interfere with other devices in the vicinity. Infrared transmission is, therefore, the most common way for remote controllers to control physical machines. Furthermore, infrared lasers are used to provide the light for optical fiber communications systems; they are the best choice for standard silica fibers, as using infrared lasers can be a cheaper way to install a communications link in an urban area (Okuhata et al., 1997). Bluetooth Bluetooth is a short-range radio technology developed to connect devices without wires. It is an effective technology for a new generation of internet-capable mobile terminals. It enables numerous innovative services and applications, which function regardless of the mobile operator. The most important solution enabled by Bluetooth technology is synchronization between a PC server and one or more other mobile terminals. Synchronization has been particularly successful in cooperative applications, providing access to SCM systems (Paavilainen, 2001). Buttery and Sago (2004) describe the Bluetooth application as being built into more and more mobile telephones, allowing some very interesting M-Commerce opportunities to be created. As people currently carry mobile phones with Bluetooth technology, which Chapter 2: Literature Review PhD Thesis Page 58 Ming-Chien (Mindy), WU can be used for making payments and related service concepts through simple downloads on their mobile devices (Shiratuddin et al., 2009, Zmijewska and Lawrence, 2006). Retailers might also be able to provide samples of products to download via a Bluetooth link located close to the actual item, potentially resulting in better customer service and an enriched shopping experience. Bluetooth can operate up to 10 meters (eventually up to 100 meters in future versions). Since Bluetooth technology is a radio transmission, it doesn’t need line-of-sight with another Bluetooth-enabled device to communicate (Scheniderman, 2002). Once Bluetooth technology is in place, one can envisage consumers walking around and giving out messages wirelessly via Bluetooth in order to buy items from vending machines, or buying low-value tickets, or even making small-value “cashless” purchases, such as newspapers. Wi-Max Wi-Max is defined as Worldwide Interoperability for Microwave Access by the Wi-Max Forum. The Forum describes Wi-Max as “a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL”. The Forum also state that it “will be incorporated in notebook computers and PDAs by 2007, allowing for urban areas and cities to become ‘metro zones’ for portable outdoor broadband wireless access” (Wi-Max Forum, 2006). Wi-Max delivers 72 Mbps over 30 miles point-to-point and four miles non-line-of-sight (NLOS) (Ohrtman, 2005). Its purpose is to ensure that broadband wireless radios manufactured for customer use interoperate from retailer to retailer. The main advantages of the Wi-Max standard are to enable the implementation of advanced radio features in a standardized approach, and provide people in a city with online access via their mobile devices. Chapter 2: Literature Review PhD Thesis Page 59 Ming-Chien (Mindy), WU Wireless Local Area Network (WLAN) WLAN (Wireless Local Area Network) technology is closer to the fundamental principle of the Internet, wherein anybody can establish an individual network as long as it follows the general intranet guidelines (Patel, 2009). The wireless links would provide a network connection to all users in the surrounding areas, ranging from a single room to an entire campus. The backbone of such a WLAN network may still use cables, with one or more wireless access points connecting the wireless users to the wired network. Currently, laptop computers and some PDA devices can be attached to a WLAN network using a Compact Flash (CF) or a Personal Computer Memory Card International Association (PCMCIA) card. In the future, PDAs and mobile phones might support multiple network technologies. WLAN is expected to continually be an important form of connection in many business areas. The market is expected to grow as the benefits of WLAN are recognized (Paavilainen, 2001; Burness et al., 2004). Radio frequency identification (RFID) Radio frequency identification (RFID) is an emerging technology that has been increasingly used in logistics and supply chain management (SCM) in recent years (Gupta et al., 2009). RFID technology can identify, sort, and control the product and information flow all through a supply chain. Today RFID is a standard technology that uses radio waves to automatically identify people or objects. There are several methods of identification, the most common of which uses RFID tags and readers. Ngai et al. (2005) suggests that RFID is made up of two components: the transponder located on the object to be identified; and the reader depending upon the design and the technology used, which may be a read or read /write/ device. Chapter 2: Literature Review PhD Thesis Page 60 Ming-Chien (Mindy), WU Roberts (2006) stated that an RFID system will typically comprise the following three components: • An RFID device (tag) - unique identifier for an object or person; • A tag reader with an antenna and transceiver; and • A host system or connection to an enterprise system. At first, the supplier incorporates data inside an RFID tag. When the tag goes through a tag reader, the information inside the tag will automatically transfer to the host system, which is stored in a data centre. After the data centre analyzes and organizes the RFID tag information in the host system, specific useful tag information will be sent to a different enterprise SCM system. Moreover, DeVries (2008) also demonstrated that RFID effective baggage tracking in the airline industry. EPC global, a development of the earlier Auto- ID Center, is one of the two primary RFID standards setting groups. It proposed an Internet-based supply chain model that is aimed at improving supply-chain end-to-end efficiency. A key component of the EPC global model is the Electronic Product Code or EPC. The manufacturer adds an RFID tag to every item of its product line. Each tag contains a unique EPC, which is a 96-bit code that uniquely identifies objects (items, cases, pallets, locations) in the supply chain (EPC global website, 2005). From above discussion, following Table 2.3 is the summarized and comparative table of functions and applications from those MT communication standards and networks which could help extend EA. Chapter 2: Literature Review PhD Thesis Page 61 Ming-Chien (Mindy), WU Table 2.3: Functions and Applications of Mobile Networks and Communications Mobile Technology Applications and Characteristics 3G Mobile Network Application: mobile phone device Characteristics: Higher transmission rate, popular use and high market acceptance (Huo and Yu, 2005) Mobile Satellite Application: GPS device and Internet phone (VoIP) Characteristics: Space technology-Direction finding and map reading (Olla, 2005) Infrared Application: remote controller Characteristics: Communication in short distance and low cost (Okuhata et al., 1997) Bluetooth Application: Bluetooth device, Bluetooth earphone Characteristics: Transfer data between a computer, server and one or more other mobile device “synchronously” (Shiratuddin et al., 2009) Wi-Max Characteristics: Wireless online in urban by using mobile devices or computers (Ohrtman, 2005) WLAN (Wireless Local Area Network) Characteristics: Wireless link PC or mobile device network connection in particular surrounding area (Burness et al., 2004) RFID (Radio Frequency Identification) Application: RFID tag, and reader Characteristics: Product tracking and controlling by system (automatically update from the RFID tag location through RFID reader to the system) (Roberts, 2006) 2.5.3 Mobile services The extension of EA with MT will also provide a strong basis for the organization’s desire to reach more customers and corporate foundation. The Mobile Host as WS provider can be established on the smart phone, which has been defined as Mobile Web Services (MWS) (Srirama et al., 2006). MWS creates the opportunities for multiple organizations to interact in one application. The WS initiative effectively Chapter 2: Literature Review PhD Thesis Page 62 Ming-Chien (Mindy), WU adds computational objects to the static information of yesterday’s Web, and therefore offers distributed services capability over a network (Davies et al., 2004). WS have the potential to create new paradigms for both the delivery of software capabilities and the models by which networked enterprises will trade. The collaborating organizations that have m-enabled WS technology make it possible for sale-/service-providers to benefit all people involved in the process (Zhao, 2009). A mobile application that is using the WS to transmit its data is classified as MWS. Mobile users interact with the system by mobile terminal browsers (software components in mobile phones). The GPS-enabled terminals can provide location data and so allow the retrieval of information which is pertinent to their locations (Puustjarvi, 2006). According to the Australian Computer Society’s (ACS, Sept 08, 2005) report on MWS, mobile phones now have the potential to actually consume useful services with MWS. Developing a mobile client requires careful assessment of the SOAP/HTTP. First of all, turning one’s mobile phone into a SOAP, client might have some performance costs related to slow data speeds and processing both HTTP commands and XML. Secondly, most mobile phones don’t have WS support built in. Finally, the user can hide the WS complexity and leverage existing technologies to make use of their widespread availability. The gateway would be required between the mobile phone user and the WS to handle the passing and conversion of messages, but there is no longer any worry about client-side performance issues or even deploying a client (http://www.acs.openlab.net.au/). Chapter 2: Literature Review PhD Thesis Page 63 Ming-Chien (Mindy), WU Location-based services through the use of mobile technologies in business are based on the ability of mobile technologies to be able to provide value at a specific location of the user (Lee et al., 2009). The popularity and utility of Location-based services has lead to phenomenal technological infrastructure including networks, applications, and processes (Gidófalvi et al., 2008). However, at the same time, there are increasing challenges emerging due to the operational models of cellular network operators. These operational models provide competition between the operators, service providers, and enablers. Therefore, even though the customers are increasingly interested in location services, their uptake is stunted due to the competitive operational models of the network operators and service providers (Harmon and Daim, 2009). 2.5.4 Mobility, ubiquitous and pervasive commerce In the 21st century, we are in the era of wireless and handheld technologies, and the impact of the Internet and wireless telecommunication has taken a new turn (Barnes, 2002; Lawrence et al., 2007). Mobile technologies are at the core of the communication revolution. They have increased commercial efforts from the removal of physical connectivity for people, processes, and businesses, resulting in a significant impact on communication (Unhelkar, 2009a, 2009b). Therefore, mobile devices can also be used to optimize the flow of information and materials. An increased number of mobile workers and time sensitivity driven companies turn towards to advanced mobile solutions (Wagner, and Klaus, 2009). Younessi (2009) also stated that creating business value through mobile technologies is really successful in strategic view. Chapter 2: Literature Review PhD Thesis Page 64 Ming-Chien (Mindy), WU In the recent years, there are several Mobile commerce (M-Commerce) applications works have been done in the market: Mobile Education (M-Education), Mobile Government (M-Government), Mobile Entertainment, Mobile Traffic, Mobile Traveling Services, Mobile Retailing and Marketing, Mobile Enterprise Resource Planning (M-ERP), Mobile Supply Chain Management (M-SCM), and Mobile Health Care. All these M-Commerce applications include following service processes: transactions and payment services in Mobile Banking services, information sharing and updating services, and instant communication services. These M-Commerce applications are part of process layers of M-EA model, so they will be discussed in section “5.4.2 Extending M-EA model” section of chapter 5 as well. Tung et al. (2007) evidenced that Mobile Library (M-Library) could add lots of benefits on education by providing students do research or M-Education at anywhere 7/24. Moreover, Chang (2010) also stated that an agent-based system for collaborative informal learning in a pervasive environment helps the students got supervised and educated more effective and efficient. Kushchu and Kuscu (2003) defined Mobile Government (M-Government) as “a strategy and its implementation involving the utilization of all kinds of wireless and mobile technology, services, applications and devices for improving benefits to the parties involved in e-government including citizens, businesses and all government units". Roggenkamp (2004) and Benlamri et al. (2010) both demonstrated that M-Government could make public information and government services available "anytime, anywhere" and this brings the citizens and the government employment can use the government services and applications ubiquity. Chapter 2: Literature Review PhD Thesis Page 65 Ming-Chien (Mindy), WU Mobile entertainment includes any leisure activity undertaken via a personal mobile device, which is, or has the potential to be, networked and facilitates transfer of data over geographic distance either on the move or at a variety of discrete locations (Moore and Rutter, 2004). A mobile service falls under mobile entertainment category: a form of leisure activity, interaction with service providers, utilization of wireless telecommunication networks, and transaction which incur a cost upon usage (Wong, and Hiew, 2005). While workable, the definition does not cover whether mobile entertainment services must interact with service providers or telecoms (Wiener, 2003). If mobile entertainment were said to be a subset of mobile commerce, hence, it must involves transaction of an economic value. Bhalla and Chaudhary (2009) demonstrated that Wi-Max can be combined with GPS (Global Positioning System) for Traffic Management, solve traffic related offences and help in providing a clear way for Public safety vehicles like fire brigades and ambulances. Mobile Wi-Max has increasingly gained extensive support in the industry. Demand on wireless internet bandwidth is increasing. Mobile Wi-Max, also called Wireless Metropolitan Area Networks, is Wi-Fi (Wireless Fidelity) of the Metro. Mobile Wi-Max offers wireless Internet experience within the city as Wi-Fi offers within your office or home. Both Wagner and Klaus (2009) and Heinonen and Strandvik (2007) indicated that consumer responsiveness to mobile marketing will increase the company quickly direct respond to the customers requirement in order to keep their original customers and bring new customers because their better services. The majority of enterprises use Enterprise Resource Planning (ERP) software to improve their business Chapter 2: Literature Review PhD Thesis Page 66 Ming-Chien (Mindy), WU processes. Simultaneously, mobile technologies which can be used within ERP have gained further importance. This is so because ERP, together with mobile technologies, offers a wide spectrum of synergies and have a significant impact on enterprise efficiency. The improvement possibilities in ERP due to mobility range from sales activities, over logistic processes, up to effects on the human resource management (Werth and Makuch, 2009). Sherringham and Unhelkar (2009) also highlighted that Mobile Technology can add real time decision making value to the manager when they using M-ERP system. Example M-Commerce Applications of M-SCM system: Paavilainen (2001) highlights that the solutions of supply chain management systems are highly time sensitive. The requirement of the time sensitivity is that SCM systems must have the ability to transact product as close to real time as possible – opening up opportunities for the application of mobile technologies. By incorporating mobility in the SCM system processes, monitoring and receiving of immediate messages from the market can be improved. M-supply chain management focuses on the shortened cycling time from an order’s making to the fulfillment – which, in most cases, would be delivery of the product to the customer (Jankowska et al., 2007). With mobility, response and confirmation time are much quicker than with the use of the standard Internet connections. People can use email via the web to an Internet web portal to access the SCM system to get information or conduct E-Commerce (Andersson et al., 2009). In addition, they also can use SMS via mobile device to a mobile portal or SMS gateway to access the SCM system to get information or carry out M-Commerce (May, 2001). Mobile Supply Chain Management (M-SCM) refers to integrating the RFID system, Chapter 2: Literature Review PhD Thesis Page 67 Ming-Chien (Mindy), WU Electronic Commerce (E-Commerce), and Mobile Commerce (M-Commerce) through the Internet portal and ICT communication into Supply Chain Management system in a mobile environment. Therefore, M-SCM architecture is divided into four parts: the RFID system, SCM system, E-Commerce, and M-Commerce, and is proposed as an extension to the original ideas by Ngai et al. (2005). They state that RFID technology can be integrated with wireless networks to send information to a supply chain management system through a portal to staff, customers, and partners. Using an RFID system in the supply chain has been demonstrated by Asif and Mandviwalla (2005). Firstly, the SCM system constructs the item “where and when” during processing. When the items leave the manufactory and arrive at the place where they are to be read by the readers, the same information will be transferred directly to the distributor. The items are quickly sent to the correct trucks. As these items arrive at the retail outlet, they are read by the receiving RFID readers and the retail outlet’s inventories are updated automatically. Since the shelves at this outlet also have their own readers, they can directly increase replacement orders. However, using RFID technology in the SCM system, the items’ quality can be automatically updated by the RFID reader sending into the SCM system. This provides highly location-based tracking, reduces the cost and human-error risks, and also improves the effectiveness and efficiency. Moreover, automatic data-reading and updating can be accessed from any mobile devices without the restriction of time and place. Traffic control systems can be used to deliver products in the supply chain, and also automatically detect the products and report cars’ and trucks’ locations. Eng (2005) declares that three main concerns of M-SCM are: 1. A place for efficient distribution of products and services, Chapter 2: Literature Review PhD Thesis Page 68 Ming-Chien (Mindy), WU 2. Timing for meeting customer demand and managing logistics, and 3. Service quality for responsiveness and customer satisfaction. In this globalization era, many enterprises in a supply chain are located in different countries (Atkins and HajiAli, 2009). Enterprises in some countries can provide low labour costs, and some in different countries may have low material costs, or others in different countries may provide professional skills or ideas about product designs. However, all enterprises want to sell their product globally. The resultant ability of businesses and customers to connect to each other ubiquitously — independent of time and location — is the core driver of this change (Unhelkar, 2005). It leads the supply chain management to global supply chain management. Mobile technologies are thus a key influence in any efforts towards the globalization of business (Unhelkar, 2004, and Unhelkar et al., 2009). The processes of such M-transformation can lead an existing business into the mobile business via the adoption of suitable processes and technologies that enable mobility and pervasiveness (Marmaridis and Unhelkar, 2005). M-SCM can further enhance the global SCM by reducing timing, costing, increasing correct delivery, customer satisfaction, and allow global enterprises to conduct their business at anytime and anywhere. Long (2003) pointed out that international logistics management focuses on international ship delivery schedule management, time, place, and product quality management. An M-SCM system covers from planning, purchase, produce, to delivery to the customers. Mobile technology, as for global enterprises, enhances to a much higher level of efficiency and effectiveness. Global enterprises can conduct their business at anytime and anywhere, and provide high-quality products at low cost, and also support customer service 24 hours a day, Chapter 2: Literature Review PhD Thesis Page 69 Ming-Chien (Mindy), WU seven days a week, by using a M-SCM system. 2.6 Value of MT to EA While EA has successfully managed to integrate these various technologies used by the enterprises (such as Internet-based application, reusable components, security and database components), enterprises are now seeking to capitalize on the MT. This has resulted in a need to further extend and integrate mobility into the EA. MT is a significant emerging technology that has the potential to influence various organizational applications (Unhelkar, 2010), in addition, to impact EA as they are technologies without wires with the ability to communicate through a multiplicity of hand-held devices. The advantage of mobility comes from its ability to overcome “time and location” boundaries that would enable enterprises to operate effectively real-time respond to the ever-increasing changes on this competitive marketplace. The need, therefore, to have a comprehensive EA that would enable delivery of services to the “location independent” market has grown. Along with that need is the need to have a formal process to incorporate and extend the EA with mobility. However, there is the growing requirements for better integration between systems to support business processes agility, and the needs for real-time and location-independence monitoring of business operations. This need of business agility is leading to the development of a flexible EA which brings about a synergy between systems, processes, and information that can provide that necessary agility (McGovern et al., 2004). Therefore, enterprises seek to capitalize on the emerging mobile technologies because mobility can overcome “time and location” boundaries to provide enterprises with the ability to operate effectively, in real-time, and respond Chapter 2: Literature Review PhD Thesis Page 70 Ming-Chien (Mindy), WU quickly to the ever increasing changes in a competitive marketplace. The need for this extension, as argued earlier, is requested because mobile technologies are now popular and effective in business as well as in EA (Unhelkar, 2005). Mobility plays a role in creating mobile collaborative enterprises through mobile web services. 2.7 Challenges to EA due to MT Extended EA with mobility in order to create Mobile Enterprise Architecture (M-EA) might have the following challenges: • Cost of implementing M-EA: the facilities and consultation of implementation fees might be so expensive initially to the enterprise • Different types of organization incorporate mobility in different ways depending on: for example, the bandwidth on Internet, the capability of mobile devices and the number of users/population influenced by Mobility but most of challenges still could be solved or at least be reduced. • Security and privacy issues: including data transaction security. • Companies need to re-engineer their business processes also require employee trainings 2.8 Gap in the literature on EA and MT Umar (2005) stated that the NGE will rely on automation, mobility, real-time business activity monitoring, agility, and self-service over widely distributed operations to conduct business. Many organizations would like to build their entire systems by using the today’s emerging technologies, among which MT is a crucial part. Undoubtedly, MT can integrate in EA to provide the enterprise to have Chapter 2: Literature Review PhD Thesis Page 71 Ming-Chien (Mindy), WU M-service and M-store. The enterprise can provide 24 hours, 7 days, globalization service with any product enquired or technical support to the customers. Inter-organizational EIS integrates all process between extended enterprises, such as supply chain and customer relations systems. MT help to upgrade the traditional supply chain to Mobility Supply Chain Management (M-SCM), traditional CRM to Mobility Customer Relationship Management (M-CRM) (Lee, 2006) and trading procurement to Mobility procurement (M-procurement). This research looks at these extensions and integrations in greater details considering capabilities of MT; moreover, these kinds of extensions and integrations will also bring EA to Mobility - Enterprise Architecture (M-EA). The time and location independence of mobility open up tremendous opportunities for organizations to offer integrated services to their clients and partners. M-EA brings about not only internal integration, but also, through extension, offers much more efficiency to its external suppliers, customers and other trading partners over the Internet. Thus, M-EA will connect existing and new systems to enable collaborative operation within the entire organization in real-time – providing access among systems on production planning and control, inbound and outbound logistics, material flows, monitoring functions, and performance. However, EA with mobility has the challenges of security, privacy, computing power and usability. Our project aims to identify these challenges, to understand and document them, and to work out strategies to handle them, which may result in successful EA with mobility. An integrated EA with mobility will provide immense benefits to organizations in extending their business EIS to go beyond the organization’s boundaries. Chapter 2: Literature Review PhD Thesis Page 72 Ming-Chien (Mindy), WU Figure 2.12: Detail Gap from EA to M-EA (based on Wu and Unhelkar, 2008, 2009) The literature review conducted as part of this study provides a better understanding of the problem, which is the gap between ICT and ICT supported and integrated with MT. This simple Figure 2.12 provides a visualization of the M-EA integrating System, Process, People, and Data in an organization in a manner that enables easy incorporation of MT in its business processes. As MT integrates into EA, business processes and enterprise IS will have to be re-engineered. Because this business transition progress changes among the systems and processes, people also need to be trained about how to use the system to operate the processes. As well as the data need to be changed to adopt into the new system functions. Therefore, the new M-EA model will have to handle these four aspects of an EA as they have a major impact on the way an organization functions. 2.9 Summary of this chapter The chapter has summarized an investigative literature review in the area of EA and mobility with the aim of extending it to Mobile Enterprise Architecture (M-EA). Chapter 2: Literature Review PhD Thesis Page 73 Ming-Chien (Mindy), WU Enterprise Architecture (EA) introduction, component, and their importance have been investigated, as also review of the current and popular industrial EA framework. Furthermore, Web Services (WS) technology and Service-Oriented Architecture (SOA) are taken into consideration for their importance to the EA. The chapter also described Mobile technologies (MT) as a significant area which can extend EA to be a more comprehensive model. This chapter, described the existing literature in many different MT applications, includes literature about what technologies, communication network, commerce and service could be applied with extend EA to M-EA. The next chapter will describe the research methodologies used in this research. Chapter 3: Research Methodology PhD Thesis Page 74 Ming-Chien (Mindy), WU Chapter 3: Research methodology – arguments and selection 3.1 Overview of this chapter The aim of this chapter is to study, understand, identify and justify the use of the most suitable approach or a combination of suitable approaches that would serve the purpose of this research. Understanding the research philosophy and methodology provides the necessary background for setting up a reasonable and valid research framework. The importance of the research framework was particularly understood by this researcher during her earlier course of Graduate Certificate in Research Studies in 2006. Therefore, considerable significance has been attached in this chapter to the various research approaches, methodologies and philosophies that make up a comprehensive research framework. This chapter describes and justifies the selection of the philosophies, approaches and methodologies that make up the research framework for this research project. 3.2 Theoretical background There are many research methodologies and approaches available to modern-day researchers. The immediate increasing question is the appropriateness of the selection of these suitable research methodologies and approaches in designing a fully research framework to achieve the aim of the research project. Chapter 3: Research Methodology PhD Thesis Page 75 Ming-Chien (Mindy), WU Figure 3.1: The research onion with the specific criteria used in this research project (adapted from Saunders et al., 2007) Figure 3.1 provides the background standard for designing a complete research framework, called a “Research Onion” (Saunders et al., 2007). This research onion outlines the different aspects of research that need to be considered in designing the comprehensive research framework. The layers identified in the research onion are Research Philosophy, Research Approach and Methodology, Research Methods, and Data-Collection Methods. Each layer of the onion depicted in Figure 3.1 provides information on the significance to the research effort. These four aspects, make up the research framework, that are used in this particular research project have also been superimposed in the research onion in Figure 3.1. The broader research philosophy gives an identity to research work. The philosophy associated with research study is based on the philosophical view of the researcher, and the detailed discussion is in the section 3.3 of this chapter. The Second layer is research approach and methodologies, which requires justifying two aspects related Chapter 3: Research Methodology PhD Thesis Page 76 Ming-Chien (Mindy), WU to a specific research work. The two aspects of research methodologies are qualitative or quantitative methodologies. Furthermore, the research approach is the deductive approach from any existing theories to justify particular scenarios, or the inductive approach that combines findings to construct the new theoretical concepts. The detailed discussion about research approach and methodologies are discussed in the section 3.4 of this chapter. The third layer of this research onion is research methods layer, which requires the researcher to select the suitability of several techniques to conduct the research project. The core layer of the research onion is data-collection method. There are several data-collection methods deployed in the information system research area, such as questionnaires, survey, observation, interviews, and action research. These two layers are discussed in the section 3.5 of this chapter. 3.3 Research philosophies There are many academic researchers trying to define what the philosophy is. However, there is no one comprehensive and united definition of philosophy. Therefore, this research follows by the definition of “Philosophy” in the p.557 of Oxford Compact Dictionary and Thesaurus (1997); Philosophy is “the use of reason and argument in seeking the truth and knowledge, especially of ultimate reality or of general causes and principles”. The research philosophy is the outermost layer of the onion in Figure 3.1. This research philosophy deals with how the researcher understands the research. The explanation of the research by the researcher is through an acknowledged philosophy or a set of such philosophies. Chapter 3: Research Methodology PhD Thesis Page 77 Ming-Chien (Mindy), WU Figure 3.2: Research Philosophy (Adapted from Saunders et al. (2007), and Bryman (2004)) There are numerous classic models of research philosophies defined in the literature, which includes positivism, realism, interpretivism, objectivism, subjectivism, pragmatism, constructivism, functionalist paradigm, interpretive paradigm, radical humanist paradigm, and radical structuralist paradigm (which shows on the above Figure 3.2, and definition and description are in the following Table 3.1). Chapter 3: Research Methodology PhD Thesis Page 78 Ming-Chien (Mindy), WU Table 3.1: Lists of several research philosophies Research Philosophy Definition and Description Epistemology A branch of philosophy that studies the nature of knowledge and what constitutes acceptable knowledge in a field of study. (Matthias, 1996) Positivism The epistemological position that advocates working with an observable social reality. The emphasis is on highly structured methodology to facilitate replication, and the end product can be law-like generalizations similar to those produced by the physical and nature scientists. (Leslie, 1999) Realism The epistemological position that objects exist independently of our knowledge of their existence. believing that “reality is real and only imperfectly and probabilistically apprehensible” (Healy and Perry, 2000). Interpretivism The epistemology position that advocates the necessity to understand differences between humans in their roles as social actors. (Saunders et al., 2007) Ontology A theory concerning the nature of social phenomena as entities that are to be admitted to a knowledge system. (Gruber, 1993) Objectivism An ontological position that asserts that social entities exist in a reality external to, and independent of, social actors concerned with their existence. (Leonard, 1991) Subjectivism An ontological position that asserts that entities are created from the perceptions and consequent actions of those social actors responsible for their creation. (Ratner, 2007) Pragmatism An ontological position that argues that the most important determinant of the research philosophy adopted is the research question, arguing that it is possible to work within both positivist and interpretivist positions. It applies a practical approach, integrating different perspectives to help collect and interpret data. (De Waal, 2005) Chapter 3: Research Methodology PhD Thesis Page 79 Ming-Chien (Mindy), WU Research Philosophy Definition and Description Constructionism (often also referred to as Constructivism) An ontological position that asserts that social phenomena and their meanings are continually being accomplished by social actors. believing in “multiple local and specific constructed realities” (Cronje and Burger, 2006) Functionalist paradigm A philosophical position which is concerned with a rational explanation of behaviors and institutions such as why a particular organizational problem is occurring in terms of the functions they perform. (Burrell and Morgan, 1979) Interpretive paradigm A philosophical position which is concerned with understanding the way we as humans make sense of the world around us. (Burrell and Morgan, 1979) Radical humanist paradigm A position concerned with changing the status quo, of existing social patterns. (Bryman, 2004) Radical structuralist paradigm A position concerned with achieving fundamental change based upon an analysis of underlying structures that can’t be easily observed, for example, organizational phenomena as power relationships and patterns of conflict. (Bryman, 2004) (Adapted from Bryman (2004), and Saunders et al. (2007)) The selection of an appropriate philosophy for this research from these classical models of research philosophies is considered at this stage. The most important points of these philosophies are considered in order to select the most suitable philosophy, which would help to conceptualize the research aim of this research project, which is described in Chapter 1. A survey of the literature on research philosophies and examination of the available philosophical models have shown that the constructivist philosophy provides the most logical way in which to approach the specific aim of this research (Genus and Maohamed, 2005; Heidegger, 1977). Chapter 3: Research Methodology PhD Thesis Page 80 Ming-Chien (Mindy), WU Constructionism, is a paradigm using models to construct or a method of research with active participation of the researcher and is thought to be the most appropriate philosophy for the research into M-EA. The constructionism research philosophy develops the solution to a problem, and it is used to contribute toward serving an identified problem in need of an innovate construction of a model or theory. It implies that social phenomena and categories are not only produced through social interaction but they are in a constant state of revision. This decision on the use of the constructivist philosophy is based on the fact that the constructivist approach attempts to observe problem-solving through the construction of models, diagrams or plans, which are widely used in technical sciences, mathematics and operational analysis (Kasanen et al., 1993). Furthermore, constructivists focus on the role of ideas, knowledge and culture, stressing on the collectively held ideas and understandings of the social life as a core feature in the research philosophy (Finnemore and Sikkink, 2001). As pointed out by Philips (1995), the good thing about constructivism is the emphasis on the active participation by the learner together with recognition of the social nature of learning. The constructivism also depicts reality as seen by the researcher through a construct or a model (Cronje and Burger, 2006). 3.4 Research approach and methodology The research approach and methodology is the second layer of the research onion. This second layer deals with the manner in which the research is seeking to arrive at solutions. Additionally, this layer describes the selection of methodology and approach through which the findings of the research will be analyzed, discussed, argued and documented. Chapter 3: Research Methodology PhD Thesis Page 81 Ming-Chien (Mindy), WU 3.4.1 Inductive and deductive approaches There are two main research approaches, inductive and deductive research approaches, as considered by Blaikie (1993). The inductive approach helps to build a theory through observations, whereas the deductive approach tests a theory through specific instances of application (Chalmers, 1991). The following Table 3.2 is comparison of deductive and inductive approaches. Table 3.2: Comparison of deductive and inductive approaches Inductive approach Deductive approach Process Observation/Findings -> Theory Theory-> Observation/ Findings Theory Binding theory Testing theory hypothesis (Adapted from Baldwin (2003), Blaikie (1993), Bryman (2004), Chalmers (1991), and Saunders et al. (2007)) The inductive approach is predominantly a theory-building process, which starts with observations of specific instances that evolve when the researcher is seeking to establish generalizations about the phenomenon under investigation (Baldwin, 2003). With an inductive stance, theory is the outcome of the research. In the other words, the process of induction is drawing the conclusion from the observation. The deductive approach, on the other hand, is a theory-testing process, which commences with an established theory or generalization to verify that the theory or the generalization applies to specific instances (Spens and Kovacs, 2006). The social scientist researcher always declares the hypothesis and then translates it into Chapter 3: Research Methodology PhD Thesis Page 82 Ming-Chien (Mindy), WU operational terms. In the other words, the process of deductive approach is collecting data in relation to the concepts that make up the hypothesis. However, this research selects a combination of inductive and deductive approaches, as stated in Blaikie (1993). Figure 3.3: Research Approach This research uses a combination of inductive and deductive approaches, as the preliminary case-study information is later applied as an input to construct a model, and additional data are gathered and used to test the constructed model. This strategy is further illustrated in Figure 3.3. Firstly, this research follows the inductive research approach which combines the findings from Literature Review (LR) and Case Studies (CS) to construct the theory of M-EA model. The literature review method helps the researcher understand MT and current frameworks of building EA. The researcher conducted case studies by interview to establish the draft M-EA including the definition, advantages, limitations, implementation framework, and the blueprint expectation of M-EA. Chapter 3: Research Methodology PhD Thesis Page 83 Ming-Chien (Mindy), WU Secondly, this research uses the deductive approach which takes the theory of M-EA model to test it by action research. The action research is conducted by visiting three participated companies to study their EA, implemented M-EA, and understand their point of view after applying M-EA, which could help validate the M-EA and also improve the security of M-EA. Finally, this research follows constructivism philosophy to establish a full M-EA and to use inductive approach again to bind all the theories together to publish the doctoral research theory. Therefore, this research project uses the combination of the inductive and deductive research approaches to reach the research aim. 3.4.2 Qualitative research methodology Research methodologies are concerned in the second layer of the research onion as well. The most common group of research methodologies are qualitative and quantitative research methodologies (Myers, 1997). Quantitative research methodologies use numerical analysis or mathematical modeling on data collected through surveys, laboratory experiments, and observation metrics. Quantitative research is the systematic scientific investigation of quantitative properties, phenomena and their relationship. Quantitative methodologies manipulate variables and control nature phenomena. They construct hypotheses and “test” them against the hard facts and reality (Leedy, 1993). Quantitative research also involves analyses of numerical data. Chapter 3: Research Methodology PhD Thesis Page 84 Ming-Chien (Mindy), WU Qualitative research is based on the use of a naturalistic approach that seeks to understand phenomena in context-specific settings. Qualitative research is any kind of research that produces findings which cannot be achieved by means of statistical procedures or other means of quantification, but involves analysis of actual data. Qualitative research generally aims to answer research questions which are rather different from those addressed as hypotheses in quantitative research. Qualitative research is essentially “exploratory”, setting out to describe, understand and explain particular phenomenon (Flick, 2006). Qualitative research methods developed originally in the social sciences to enable researchers to study social phenomena, and are widely used in information science disciplines today (Clarke, 2000; Iversen et al., 2004). Table 3.3: Comparisons of qualitative and quantitative research Qualitative Methodology Quantitative Methodology Philosophy Subjective – individuals’ interpretation of events is important Objective – seeks precise measurement and analysis of target concepts Approach Inductive approach Deductive approach Available Research Methods uses observation, case studies, interviews, focus groups, document analyses, ground theories etc. uses surveys, questionnaires, experiments etc. Data Form Data is in the forms of words, pictures or objects. Data is in the forms of numbers and statistics. Analysis Data Method Researcher is the data gathering tool, uses general approach or tables to arrange data. Researcher uses tools, such as questionnaires or equipments to collect numerical data. E.g. use SPSS program or excel to finalize the numerical data. (Analyzed from Collisand Hussey (2009), Mcmurry et al. (2004), Walter ed. (2006), Bakers and Foy (2008), and Miles and Huberman (1994)) Chapter 3: Research Methodology PhD Thesis Page 85 Ming-Chien (Mindy), WU As Bryman and Burgess (1999) established that as a term “qualitative research: is sometimes taken to imply an approach to social research in which quantitative data are not collected or generated.” This research project doesn’t collect any quantitative data, thus, this research follows the qualitative methodologies. Examples of qualitative methods are action research and case study research. The qualitative data are gathered through various data-collection methods, such as observations, interviews, e-mails and meetings that are described further in the following Section 3.5 of this chapter. 3.5 Research methods and data collection methods The third layer describes various research methods that are available in order to select the most appropriate method, or combination of methods, for a specific research project. The core of the onion, or the fourth layer, describes the actual data collection methods, which would be very specific to the individual research project. In this section, the researcher outlines the selection justification of research methods and data collection methods. As per the qualitative strategies, a suite of methods were used in this research study. The well-known methods are ground theory, case study, action research, and observation. In this research project, the researcher use three research methods to complete the research project, which are literature review, case studies, and action research. There is a preliminary literature review to construct the basic knowledge of EA and MT, and case study of initial data for model construction, followed by three action research projects for model verification. Step 1: Literature Review Chapter 3: Research Methodology PhD Thesis Page 86 Ming-Chien (Mindy), WU shows the researcher how the idea extends the EA with mobility by studying the documents of this research area. At this stage, the researcher analyzes the gap between literatures, and constructs the aim and objective of this research project (which has already discussed in the Chapter 2). Step 2: The case study was carried out by interviewing 10 experts, namely enterprise architects, business analysts, solution architects, and chief information officers (CIOs). The data for these case studies were collected through interviews, meetings, and e-mails. The data gathered and the result analysis from the case studies will be discussed in Chapter 4 in detail. Step 3: This research takes the constructed M-EA model to three participation companies doing action research. These research projects are carried out through observations, meetings, interviews, site visits, e-mails, and internal documents. In Chapter 6, action research processes, results analysis and how the results verify the model will be discussed in detail. 3.5.1 Step 1: Literature review in order to create an M-EA outline Research methods: Literature review Data-collection methods: Study of documents Firstly, this research starts by constructing initial M-EA structure to investigate and analyze which mobile technology applications could be integrated. The literature review brings the outline of how to extend EA to M-EA, and apply construct method to create the initial M-EA model. At this stage, by studying the documents, books, literatures, academic articles of EA and MT, which facilitates the method to collect data for constructing the knowledge of M-EA. Chapter 3: Research Methodology PhD Thesis Page 87 Ming-Chien (Mindy), WU The literature is all sources of published data on a particular topic, and this literature refers to the existing body of knowledge. Searching and reviewing literature is a major part of the research project. The intensive phase at the beginning of the project will continue on a narrowed-down scale until finding the gap from literature or until end of the research. Hartman and Hedblom (1979) stated that literature review is “an exhaustive review in which the researcher includes all literature relating to the problem”. Literature review is critical evaluation of the existing body of knowledge on a topic which guides the research and demonstrates that the relevant literature has been located and analyzed. Reviewing the literature involves locating, reading and evaluating reports of research, and as well as reports of casual observation and opinion (Borg and Gall, 1989). Marshall and Rossman (1989) suggested that a literature review involves 4 processes: 1. demonstrates the underlying assumptions behind the research questions and display the research paradigm; 2. demonstrates that the researcher is thoroughly knowledgeable about related research; 3. demonstrates the gaps in previous research; 4. refines and redefines the research questions and the aim of research project. Therefore, a foundation literature review helps develop the subject knowledge and provides a context for the research object. Ryan et al. (2002) have offered a structured approach to analyzing the literature, using a network diagram to illustrate relationship between the primary citations. This approach is based on the assumption that articles in the literature are “a series of nodes in an interlinked network of theoretical and empirical developments.” Strengths of using Literature Review Methods: Chapter 3: Research Methodology PhD Thesis Page 88 Ming-Chien (Mindy), WU Abraham (1994) stated that the major strength of a literature review is the background it provides for the study, setting in the context of previous work. Bailey (1987) suggested that the researcher is able to draw on past studies in formulating hypotheses. However, in exploratory studies, literature review provides evidence of a gap in the literature, and becomes the basis for the research project. Weakness of using Literature Review Methods: Hartman and Hedblom (1979) pointed out that the limitations such as time, language, and library resources may make this an impractical goal, and this may be a weakness of review. Additionally, Dooley (1984) stated that “if some studies are overlooked, the researchers can’t know if the review’s conclusion applies to all studies or only to a biased selection of studies”. 3.5.2 Step 2: Case study by interview to update the M-EA model Research methods: Case study Data-collection methods: Interviews, meeting, and e-mails Secondly, the initial M-EA model takes the form of case studies that includes interviewing several experienced enterprise architects to get advice on the M-EA implementation framework. This initial M-EA model provides the implementation details of enterprises that need to change their architecture before they use mobile technology application. Enterprises can provide a perspective on what Business Process Re-engineering (BPR) and Mobile-Transformation preparation need to be done first before they integrate M-EA. Case studies by interviews to establish the draft M-EA structure, includes the definition of M-EA, the advantages and Chapter 3: Research Methodology PhD Thesis Page 89 Ming-Chien (Mindy), WU challenges of M-EA, the implementation team work of M-EA, and what the expectation is after implemented M-EA (which is the validation criteria). Case Study research method is mostly used in business studies in which the researchers study a small sample of cases in depth. Cases are analyzed to build or validate theories, typically through the collection of qualitative information, through observations and interviews (Yin, 1994). Therefore, the case study method was selected for this initial investigation to study the experiences from experts in terms of understanding how mobile technology helps extend enterprise architecture. The case study method is appropriate when investigators are restricted by the circumstances as indicated in Yin (2003): • To define research topics broadly but not narrowly • To cover complex multiple variable conditions, and not isolated variables • To investigate multiple sources of evidence, and not just one source. A case study is a worthwhile way of exploring existing theory. A well-constructed case study can provide material to challenge existing theory, and provide a source of a new hypothesis (Saunders et al., 2007). Clearly, the case study research method is particularly well-suited to IS research since the object of our discipline is the study of information systems in organizations, and "interest has shifted to organizational rather than technical issues". (Benbasat et al., 1987) Thus, the case study approach fits well into the requirements of this research objective. Strengths of using Case Study Methods: Smith (1988) listed three strengths of case studies: 1. Namely the opportunity to study rare phenomena, sources of ideas and Chapter 3: Research Methodology PhD Thesis Page 90 Ming-Chien (Mindy), WU hypotheses. 2. The stimulation of “theory development and future systematic research”. 3. The exploration of “possible causal links in real-life interventions that are too complex for survey or experimental strategies”. King (1985) added further strengths: • Namely the real world emphasis • The provision of a large range of details • The uncovering of relationships and a heuristic quality. Stake (1981) underlined the importance of “experiential knowledge” delivered from case study, and he also listed four distinguishing features: 1. more concrete knowledge 2. more contextual knowledge 3. more developed by researcher’s interpretation 4. based more on reference populations that are defined by the researcher’s and the participated people’s previous experience Weakness of using Case Study Methods: King (1985) states that the problem of case study methods having the difficulty in generalizing from a single case, and on its limitations for drawing causal inferences. The larger number of variables that are encountered can make analysis difficult. Additionally, Dooley (1984) stated that “if some studies are overlooked, the researchers can’t know if the review’s conclusion applies to all studies or only to a biased selection of studies”. Yin (1994) also noted that the researcher might take too long and result in massive and unreadable documents. However, Yin (1994, 2003), Chapter 3: Research Methodology PhD Thesis Page 91 Ming-Chien (Mindy), WU Billingsley and Poole (1986), Patton (1990), and Smith (1988) believed that, with careful design, many of these problems could be avoided or at least reduced. Interview is one of data-collection methods in which selected participants (the interviewees) are asked with questions to find out what they do, think or feel. Kahn and Cannell (1957) defined an Interview as a purposeful discussion between two or more people. Interviews are concerned with exploring “data on understandings, opinions, what people remember doing, attitudes, feeling and the like, that people have in common” (Arskey and Knight, 1999). McMurray (2004) declared that interviews are suitably used to explore a topic or issue in greater depth than any other research method. The researcher could obtain more detailed information and gain deeper insights into the interview questions of research area. 3.5.3 Step 3: Action research to validate the M-EA model Research methods: Action research Data-collection methods: Observations, meetings, interviews, site visits, e-mails, and internal documents Followed by, this initial M-EA model will be validated by undertaking action research studies in a few chosen organizations. The business processes re-engineering, practical issues, benefits, challenges and limitations of the M-EA model are also being identified, documented and discussed during and after implementation. Following that, the model will be modified based on those results. Such comprehensive M-EA reduces the risks and enhances the benefits to the organization. Chapter 3: Research Methodology PhD Thesis Page 92 Ming-Chien (Mindy), WU Action Research (AR) has its origin in the works of the social psychologist Kurt Lewin (1946). He defined that “Action Research is applying scientific thinking to real life problems (classroom problems for teachers) and represents a great improvement over teacher’s subjective judgments and their limited personal experiences.” The main characteristics of action research are summarized as follows (Argyris et al., 1985; Greenwood and Levin, 1998; Gummeson, 2000; McDonagh and Coghlan, 2001): • Action research takes action • Action research is discuss-oriented • Action research is going to deeply research in the field • Action research is mainly based on an argument theory • The process of action research started on practice problems • The researcher is an agent of change McNiff and Whitehead (2002) identify that action researchers regard learning and experience as processes which enable individuals to make choices about who they are and how they are together. The purpose of Action research is to use practice in the improvement of the lives of common place, people, and to emancipate them through participative learning and new understanding. To put it briefly, action research may be viewed as a commonsense way of learning by doing. (McMurray et al., 2004) In the field of Computing and Information Technology (CIT) research case, there is Chapter 3: Research Methodology PhD Thesis Page 93 Ming-Chien (Mindy), WU much research situated within action research methodology- particularly in the development of information system cases (Myers, 1997). Burstein (2000) describes that a set of research methodologies has been explored for use in the general field of information system research; it also needs to be followed by system development cycle. From designing the model, evaluating and modifying the prototype, and testing it repeatedly, the process is mostly like Oosthuizen’s (2000) definition of the action research, plan -> action -> results -> reflection -> plan (a typical action research circle). Strengths of using Action Research Methods: Auer and Follack (2002) identify from an action research point of view the strengths of using action research on their project: 1. It can handle complex systems. 2. It can support the structuring and sharing of knowledge on changing models concurrently. 3. It can predict the outcomes more accurately through the support of risk free experiments. 4. It can create a learning environment for researcher and participant organization. 5. It can be grounded on theory and be practically applicable. 6. It can require (inter)-action as an integral part of the process itself. Weakness of using Action Research Methods: Muller (2005) lists some problems of action research project: • The practical problem of research is in the forefront • Projects are dominated by action but not by reflection Chapter 3: Research Methodology PhD Thesis Page 94 Ming-Chien (Mindy), WU Bichou and Gray (2004) have an action research project in a logistics and supply chain approach to seaport efficiency. They suggest that action research is a research strategy to be used on subsequent stages of testing and measurement. They outline that the basis of action research is the combination between theory and practice as well as the benefit of generalization. Middel et al. (2005) identify that they use action research methodology in collaborative improvement within the extended manufacturing enterprise. They state that action learning has provided a useful methodology for the development of a capacity for learning as part of collaborative improvement processes. Dick (1999) declared that action research is a family of research methodologies that follow action (or change) and research (or understanding) at the same time. It was recognized when the researcher is required to analyze and identify the development of the mobile technologies application in the real world, the effect of this action research will be during the change of the mobile technology application for integrating it into the EA of the participated company which may operate through different applications. The researcher is expected to have a positive influence on the small sample of enterprises through a participatory approach, using observations and interviews as key data-collection mechanisms. Therefore, for the continuation of this research to test if the construct model works successful or not, this research has selected three organizations for the action research. Also action research is applicable to use in the field of M-EA case. Action research is chosen as part of the methods, since it allows the researcher to become involved in the model implementation process in order to verify the M-EA and participate in this process. Expected benefits from this exercise are two-fold to Chapter 3: Research Methodology PhD Thesis Page 95 Ming-Chien (Mindy), WU the researcher and to the participated companies. The researcher should benefit in terms of new knowledge and verify the model to comprehensive version, and the companies or industry sector under consideration should benefit by carrying out the M-EA successfully to gain a competitive business advantage. Action research focuses on change and reflects with an immediate result to the researchers as well as to the companies used in the research. In action research, the emphasis is more on what practitioners do, rather than on them saying what they do (Myers et al., 1999). Action research aims to contribute both to the practical concerns of people in an immediate problematic situation, and to the goals of social science by joint collaboration within a mutually acceptable ethical framework (Rapoport, 1970). 3.6 Research evaluation and feedback After considering all of the greater details of the research in the above sections, and by referring to Figure 3.1, the overall design framework of the research is illustrated in Figure 3.4. This research follows the constructionism philosophy, this aims to construct a comprehensive M-EA as an outcome of this doctorial research project. This research uses qualitative research methodology and combination of inductive and deductive research approaches. The selection of research methods are literature review, cases studies, and action research. Step 1 method is searching the current literature in the research area and collecting the data by studying the document in literature review stage. Step 2 method: the use of cases studies use interviews, meetings, e-mails to collect data. Additionally, step 3, action research data was collected by Observations, meetings, interviews, site visits, e-mails, and internal documents. Finally, the researcher constructed a comprehensive M-EA to achieve the research aim of this project. Chapter 3: Research Methodology PhD Thesis Page 96 Ming-Chien (Mindy), WU Figure 3.4: Research Framework of This Research Project The model validation does not fully reach the action research evaluation level because certain actions are still pending owing to time and decision-making constraints. The actions already implemented are analyzed and evaluated by the researcher. However, as shown in Figure 3.4, the research strategy for carrying out the implementation of the M-EA is more relevant as an action research, rather than a case study. Therefore, the action research is still used as the strategy to validate initial M-EA model in the empirical studies described in Chapter 6. The following table is feedback to Hartman and Hedblom (1979), King (1985), Dooley (1984), Yin (1994), and Muller (2005) who listed weaknesses when literature review, case study, and action research methods which are used in this research project: Chapter 3: Research Methodology PhD Thesis Page 97 Ming-Chien (Mindy), WU Table 3.4: Lists of feedback to this research project Weaknesses of using LR, CS, and AR methods Feedback to this research project Literature Review Time, language, and library resources may make this an impractical goal. (Hartman and Hedblom, 1979) This research uses not only library books and journals, but also online databases as the resource when using literature review. As UWS library e-resource are fully established, such as ACM Digital library, Emerald Fulltext, IEEE Xplore, ScienceDirect. The researcher found at least 100 papers as references in this research area. Furthermore, the researcher works in the library as casual staff; therefore, the researcher saves a lot of time on searching and collecting data. Additionally, the researcher comes from Chinese background, so she could not only collect English papers but also Chinese books as literature review references. Case Study The difficulty in generalizing from a single case, and on its limitations for drawing causal inferences. (King, 1985) This research project simplifies 10 case studies to analyze data for 4 research sections in order to have the conclusion. The larger number of variables encountered can make analysis difficult. (King, 1985) This research project uses the questionnaire interviews to gather 4 sections research question to organize the conclusion. If some studies are overlooked, the researchers can’t know if the review’s conclusion applies to all studies or only to a biased selection of studies. (Dooley, 1984) The researcher interviewed experienced enterprise architects, business analysts, CIOs, and IT executives. Collected the 10 case studies data by asking their experiences, and then sorted and analysed the collected data for 4 research sections in order to have the conclusion. The researcher might take too long and result in massive and unreadable documents. (Yin, 1994) The data are gathered by asking questions to interviewees, each interview won’t take more than 45 minutes. The interview itself will be recorded by having interviewees’ permission and won’t take too long; and the answers are gathered for specific research area. Chapter 3: Research Methodology PhD Thesis Page 98 Ming-Chien (Mindy), WU Weaknesses of using LR, CS, and AR methods Feedback to this research project Action Research The practical problem of research is in the forefront. (Muller ,2005) Necessity is a combination discussion of theoretical knowledge and practical implementation on M-EA project Projects are dominated by action but not by reflection. (Muller ,2005) Open discussion about the aims and the content of the project between researcher and interviewers Action research process varies significantly across studies. (Muller ,2005) • Researcher keeps an open mind regarding the process, not only the result • Researcher develops and tests new advance • Researcher requires theoretical justifications • This research could be used as a cycling process 3.7 Summary of this chapter This chapter detailed the selection process of the research methodology and its application in this thesis. The selection process was based on the framework of the “research onion” by Saunders et al. (2007). In the above-mentioned selection process, the characteristics of the research are matched against the features of each research philosophy, approach and methodology, methods, and data-collection methods, in order to select the most appropriate research at each level. This research follows the constructionism philosophy and aims to construct a comprehensive M-EA as an outcome of this doctoral research project. This research uses qualitative research methodology and combination of inductive and deductive research approaches. The selection of research methods are literature review, cases studies, and action researches. Methods of collecting the data include studying the document, interviews, meetings, e-mails, observations, site visits, and Chapter 3: Research Methodology PhD Thesis Page 99 Ming-Chien (Mindy), WU internal documents. With this background knowledge of the suitable research framework, this research constructs a comprehensive M-EA, in order to achieve the aim of this research project. The next chapter carries out an in-depth discussion about the case study by interviews, which help the researcher construct the initial M-EA model, and create the verification criteria for action research during this research project. Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 100 Ming-Chien (Mindy), WU Chapter 4: Envisioning the Mobile Enterprise Architecture (M-EA) model through Knowledge Elicitation 4.1 Overview of this chapter The chapter describes the further elicitation of the initial Mobile Enterprise Architecture (M-EA) model that was described earlier in Chapter 2 (based on the literature review). The initial M-EA model is envisioned and modeled through case studies by interviews. The researcher interviewed several experienced enterprise architects in order to reach a comprehensive definition of model of the M-EA. This M-EA definition was refined to produce an updated M-EA implementation framework. In this chapter, the research questions of the case studies, their design and the data-collection methods are outlined and described. The initial M-EA based on the Literature Review is updated model through interviews result. Thus, this chapter discusses and documents those findings from interviews and to undertake initial verification of the draft M-EA. The definition, advantages and limitations of M-EA, how M-EA could be implemented, and what the expectations after having implemented M-EA, are described here as well. Finally, the validation criterion for expected outcome of applying M-EA model that also includes the ensuing action research method is also described here. 4.2 Initial outline of M-EA In this section, the initial M-EA model based on the literature review is documented. Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 101 Ming-Chien (Mindy), WU The definition and model of draft M-EA have been published in ACIS 2007 DC and IEEE VTC 2008 (Wu and Unhelkar, 2007, 2008). Section 4.2.1 initially shows M-EA definition results from the literature review. Further M-EA definition is justified in the section 4.8.1 from the interviewees. Section 4.2.2 shows the researcher creating the draft M-EA model from the literature review and also discusses this model with the interviewee. The model outline is further expanded based on the result from interviewees. The updated version of the M-EA model is described and documented in next chapter (Chapter 5). 4.2.1 M-EA definition An M-EA is best understood as a model of mobile architecture that includes both business and systems. Additionally, architectures are themselves patterns that enable creation of design and successful implementations (Carbone, 2004). A good architecture provides quality and reusability and it also prevents rework. This is so because it incorporates numerous possibilities and options that would otherwise be very costly to incorporate as an ‘add-on’. Enterprise architectures provide a basis for incorporating maximum possibilities of changes and expansions of applications and systems in the future (Britton, 2004). However, as new and disruptive technologies are introduced in the organization, the architecture itself needs an upgrade (Pulkkinen, 2006, and Unhelkar, 2005). For example, from a standard 3-tier architecture (data, business and interface layers), a good architecture now also incorporates people. Such architecture allows us to consider the ‘disruptive’ mobile technology in a more strategic manner. Mobile Enterprise Architecture (M-EA) brings about not only internal integration, Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 102 Ming-Chien (Mindy), WU through extension, but also offers much more efficiency to its external suppliers, customers and other trading partners over the Internet. Thus, M-EA connects existing and new systems to enable collaborative operation within the entire organization in real-time – providing access among systems on production planning and control, inbound and outbound logistics, material flows, monitoring functions, and performance measurements (Rolstadas and Andersen, 2000). An integrated EA with mobility provides immense benefits to organizations in extending their business systems to transcend beyond the organization’s boundaries. The literature review, as discussed in Chapter 2, provided better understanding and revealed the problem to be investigated in order to analyse the gap within mobile technologies and EA. The primary purpose of the research is to identify how mobile technology could extend the people, process, data, system, and the underlying technology that would result in an M-EA. Therefore, this research study defines Mobile Enterprise Architecture (M-EA) (which shows on Figure 4.1) as: Figure 4.1: Initial M-EA Definition (Wu and Unhelkar, 2007, 2008, 2009) Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 103 Ming-Chien (Mindy), WU “A structure for integrating business processes with mobile technology and ICT, includes relationships among the System, Process, People, and Data in an organization” (Wu and Unhelkar, 2008). As MT integrates the EA with business processes and systems that are mobile. Following on from the changes to the systems and processes, people also need to know how to use the system to operate the process as well as the data need to be changed to be adopted for the new system functions. Moreover, M-EA will connect existing and new systems to enable collaborative operation within the entire organization in real-time service – which extends EA to provide better access among systems on production planning and control, inbound and outbound logistics, material flows, monitoring functions, and performance measurements. 4.2.2 Initial version of the M-EA model Figure 4.2 shows the initial version of the M-EA model. This model comprises people, process, data, and system from a mobile perspective. The mobile phone is classified as a necessary gadget in the 21 st century. The uses of mobile devices are very popular specifically with the application of 3G Mobile network technology. Mobile network technology provides better service and real-time response communication between business and consumers of EA. Some of mobile devices have started to provide with Bluetooth device from last two years. Bluetooth technology is synchronization between a personal computer (PC) server and one or more other mobile terminals (Shuaib and Boulmalf, 2006); Synchronization which provides access to EA has been particularly successful in cooperative applications. Wi-Max can help EA integration much more effectively and update unanimity Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 104 Ming-Chien (Mindy), WU between all retailers of enterprise. The general intra-organizational M-EA application integration can use WLAN technology to provide all the employees to access the enterprise system anytime, anywhere. VoIP technology helps EA to extend the globalization business and also overcome the purchase timing problems though different countries. In addition, Hurster et al. (2006) pointed out that GPS devices and RFID tags and readers have already been used on SCM systems to improve delivery service and tracking production location. RFID Technology helps highly location-based tracking, reduces the cost and human-mistake risks, and also improves the effectiveness and efficiency of EA (Schilhavy and Salam, 2006). Consideration of these six MT is important in the exercise to integrate EA – particularly as the technologies as well as their applications are maturing rapidly (Ghanbary, 2006). Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 105 Ming-Chien (Mindy), WU Figure 4.2: Initial Mobile Enterprise Technology Architecture Model (Wu and Unhelkar 2007, 2008, 2009) Figure 4.2 shows these mobile elements as they are into integrated enterprise technology architecture. This initial M-EA result from literature review, and is named here as “Initial Mobile Enterprise Technology Architecture Model”. The base part of the Figure 4.2 demonstrates how the application service and information/data storage go through the enterprise bus or middleware cooperation. This transfer of data is a basis to help business processes orchestration. Moreover, the new processes are the basis of integrating different generation of enterprise information systems. The most Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 106 Ming-Chien (Mindy), WU popular enterprise information systems are Supply Chain Management (SCM) system, Customer Relationship Management (CRM) system, Enterprise Relationship Planning (ERP) system, and Financial Information (FI) system operating within enterprise architecture. RFID technology could specifically support the SCM system to help tracking the location of the materials and products. This underside section includes the M-EA business process, system, and data structure. People can hold various mobile devices through mobility server and access web service to connect to Internet portal, including web and mobile portal to run those business process, system and access through data base. The technologies of Web Services build on top of eXtensible Markup Language (XML), Web Services Description Language (WSDL) and Universal Description, Discovery and Integration (UDDI) provide an excellent basis for integrating the applications of the enterprise – particularly when they are on separate platforms. There is a need, however, to provide wireless glue to EA as outlined here. This would result in strategic incorporation of MT into EA on an enterprise repository. The end-result is a comprehensive system containing all applications and the enterprise model. People can reach the system using the Internet through the native API/ XML, web forms, and web service. They can use their mobile, some with Bluetooth headphone, GPS, PDA, portable computer (laptop) through service provider (WAP), or wireless Hub (HTTP) to connect with enterprise repositories to access the enterprise information systems. 4.3 Advantages and Limitations of M-EA In this section, the initial research output from literature review of M-EA, the advantages and limitations are listed. From several literatures studied earlier, it is found that mobility or mobile technology could help the enterprise build better Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 107 Ming-Chien (Mindy), WU enterprise architecture or improve their productivity and customer service. After review and analysis of the literature, the researcher listed the most important or popular benefits and challenges in this section. After discussion of all the points listed here with interviewees, the refined advantages are documented in the section 4.8.2 and updated practical issues are documented in the section 4.8.3. 4.3.1 Advantages of using M-EA Based on the understanding developed during the literature review, the EA is meant to clearly show the enterprise-wide view of how to integrate MT. Such a view provides the blueprint for future IT direction. Additionally, it also brings the following benefits: · M-EA allows people anywhere anytime access to applications (Alag, 2006; Rolstadas and Andersen, 2000). · M-EA facilitates faster information flow and enhanced reliability (Saha (Ed.), 2007; Yang and Wang, 2006; Milojicic et al. (Ed.), 1999). · Combination service can be provided through M-EA (Qiu (Ed), 2007). · Increase enterprise flexibility in order to raise efficiency and effectiveness of business processes by streamlining real-time decision-making (Sherringham and Unhelkar, 2009). · Reduce costs by reaching out to the extended M-EA supported and sustained over time (McGuire, 2007). 4.3.2 Limitations of M-EA Followings are the list of the limitation and challenges of M-EA: Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 108 Ming-Chien (Mindy), WU · Security and privacy issues, including data transaction security (Nand, 2006). · No single standard for mobile technologies (Ghanbary, 2006). · Mobile device form factor and also device trust (Forman and Zahorjan, 1994). · Expensive Costs of M-EA facilities implementation at initial (Patel, 2009). · Companies having to re-engineer their business processes also employee training being required (Cook, 1996). However, most of challenges above can be handled by refining the M-EA. More details of how to handle these limitations of M-EA will be analyzed in the Section 4.8.3 after discussing all these points with interviewees. 4.4 Research questions in the case study A limitation of only using Literature Review methodology to create the initial M-EA model by the researcher’s own self is not objective. Therefore, this research envisions the updated M-EA model through knowledge elicitation by interview results. As above the description of the outcome from Literature Review of the understanding of M-EA, this case study method aims to update the model through by interviewing several experienced experts and knowledge of this research area. The research questions are divided by 4 parts: 1. Personal understanding and experience of using and implementing EA; 2. The advantage and disadvantage of mobile technology bring to EA; 3. Personal definition of M-EA; 4. The expected outcomes of having applied M-EA. In the first part, personal understanding and experience of using and implementing EA are focused on the interviewees’ story. The questions include: Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 109 Ming-Chien (Mindy), WU l What, according to the interviewees, is Enterprise Architecture? l How is EA used in the organization? l Which documents and teams are used when the company builds and implements EA? l What criteria or aspects are of utmost concerns when the organization builds the EA? l What migration plan does the company have? l What is the current information sharing privacy and security condition applying? In the second part, the researcher asked the interviewees’ personal understanding of the advantage and disadvantage of mobile technology as brought to EA. The answer, for some interviewees, could be their experience or their expectations, and concerns. The questions include: l Does the company bring the mobile technology to EA right now? l Is mobile technology separate or integrated with EA? l What kinds of the current mobile technology application do the employees of the company usually use? l What, according to the interviewees, would be the major advantages in integrated mobile technologies with EA? l What, according to the interviewees, would be the challenges and the risks in integrated mobile technologies with EA? In the third part, this research focuses on gathering the interviewees’ personal definition of M-EA. The questions include: l What, according to the interviewees, is Mobile Enterprise Architecture? Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 110 Ming-Chien (Mindy), WU l What criteria or aspects are the most concerns of constructing the Mobile Enterprise Architecture? l Which applications of mobile technologies, according to the interviewees’ suggestion, may enable to extend the enterprise architecture? Lastly, this research gathers the interviewees’ expected outcomes of applied M-EA which is planned to be used as the criteria for the action research project. The questions are: according to the interviewees’ current position, what expectations do the interviewees’ have of applying M-EA to the organization? From people, process, system, and information perspectives, what do the interviewees expect after implementing M-EA to the enterprise? 4.5 Design of the case study As discussed in the Chapter 3, this research follows a qualitative research methodology. Berg (2004) states that case study methods involves systematic collection of information about a particular person, social setting, event, or group to permit the researcher to effectively understand how the subject operates or functions. Yin (2003) outlined that the case study isn’t actually a data-gathering technique but a methodological approach (which was identified as our research method) that incorporates a number of data-gathering measures. The approach of case studies ranges significantly from general field studies to the interview of the single individual or focus group. This research project aims to use the case study as research method and interview as data-collection method. Interviewees are invited to tell the story of their experiences, with those chosen representing different levels within the same position or different perspectives of the same situation of process to Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 111 Ming-Chien (Mindy), WU permit depth of perspective (Cooper and Schindler, 2008). The interviewees of this research are people who are business analyst, or enterprise architects, or CIO, or IT executives who have experienced the building of an enterprise architecture. The interviewer also tried to understand if and how the interviewees’ company was using mobile technologies. Therefore, the researcher can target on doing action research within the company trying to extend enterprise architecture with mobile applications. However, if they are not using any mobile device in the company, they are asked to explain why they are not interested to use this modern technology. The participants were selected from supervisors, or PhD candidates, or from meetings in the Australian Computer Society – business intelligent group workshops, business systems architecture and design workshops, business analyst group seminars or forums. The number of interview samples depends on the nature of the topic and on the resources available. A key point is that more interviews don’t necessary imply better quality or more detailed understanding. There are two bases to this claim. Firstly, there are a limited number of interpretations or versions of reality. Secondly, there is the issue of the size of the corpus to be analyzed. For these two reasons, there is an upper limit to the sample size of interviews - around 10 interviewees from different industries or companies. This sample size is determined to enable the researcher understand those business analysts’ experiences in building enterprise architecture and the status of mobile applications in their companies. The participants are selected from experienced people in related positions of industries who are interested in this research area and are willing to answer the questions in the interviews. The research doesn’t involve any children and Aboriginal or Torres Strait Islander Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 112 Ming-Chien (Mindy), WU participants. The questionnaire includes personal experiences and expert thoughts in a specific area so that only experienced adults could participate in this research project. 4.6 Process of data collection and analysis A personal interview was considered to be the most suitable method for this research project. Many interviews are conducted face-to-face, with the obvious benefits of being able to observe and record non-verbal as well as verbal behaviors. An interview, however, can be conducted by phone or online. Phone and online interviews offer the opportunity to conduct more interviews within the same time frame and draw participants from a wider geographic area. This approach also saves the travel expenses of moving trained interviewers to participants, as well as the travel fees associated with bringing participants to a neutral site. Firstly, the participants are treated with respect, kindness and in brief asked whether they have experiences of building enterprise architecture and the status of mobile technology in their companies. This is followed by handing out of our information sheet (Please see Appendix A) to introduce our research project. The participants are kindly asked for their interests in this interview. After getting a positive response of their interests, a dialogue statement and sample interview questions are sent to them by email. (Please see the third page of Appendix A as the email attachment). Once the participants’ answers of sample questions are collected by email, an acknowledgement email is automatically sent. After summarizing each respond to this specific research area, more detailed information is occasionally required. Therefore, the researcher calls the participant or sends an email to make a phone-call Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 113 Ming-Chien (Mindy), WU or makes a face-to-face interview appointment with the interviewees. The research purpose and other details, such as the confidentiality and anonymity of this study are explained to the participants during the interview process. The interviews are recorded by digital video and recorded with interviewee’s permission, then the details are typed as a document to be taken in print form and the data will be analyzed and processed by sorting the raw data to answer those 4 specific research questions. Lastly, the researcher discusses the interviews results with supervisor and research team analyses all related useful information in order to elicit the updated M-EA model. 4.7 Results from case study by interview There are 10 interviewees that responded to the interviews. These interviews were conducted both face to face and also with the interviewees responding by email. This section documents the result of the first part of interview questions, which try to understand the background of the interviewees’ personal understanding and experience of using and implementing EA. Case 1: A.G., Post-Doc research fellow at a university The interviewer has conducted a face-to-face interview with this interviewee who has completed his PhD in SOA research area. In his opinion, SOA reuses data, process, and service to reduce the data duplicate in order to provide effective process and service. Back bone system supporting or providing supports for front desk is to offer better and faster service to the customers, which brings better CRM. Moreover, Mobile technology can impact on EA by people accessing systems and processing business anywhere and anytime. Therefore, the interviewee states that extending EA Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 114 Ming-Chien (Mindy), WU with mobility brings really a good opportunity to the company to improve their CRM. Core Input: From the understanding of expert researcher in SOA area, Case 1 confirms that extending EA with mobility provides better CRM to the company in order to bring more customers and remain the original customers by his action research working experience. Case 2: A.H., chief architect at a specialist security company, Canberra, Australia The interviewer has conducted face-to-face interview with this interviewee who is a chief architect in his company. According to his experience, mobility can bring the company a greater level of data mobility and better productivity. Additionally, better mobile processes become standard and accepted by all stakeholders. Mobile phones, Short Message Service (SMS), laptops with WLAN enable the company to conduct business remotely as the offices of some of their senior managers are located in different location. Therefore, he strongly agreed that extending EA with mobility increased effectiveness of business process as well as reduced the traveling costs for the company. Core Input: From Case 2 expert architect’s experience, he states that extending EA with mobility brings location-independence benefits to the company in order to reduce the travel time and costs, and also improve the speed of business processes. Case 3: C.P., senior manger at a large publishing house in Sydney The interviewer has conducted a face-to-face interview with this interviewee who is an IT executive in the large size organization. From his experience, his company has already employed an Enterprise Architecture approach to IT systems. The company has purchased IT servers from the one vendor, and only uses MS-SQL databases Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 115 Ming-Chien (Mindy), WU although some systems are only available with an Oracle database. The company insists on a Standard Operating Environment (SOE) for all desktops, which are purchased from single vendor and are refreshed (i.e. replaced every 4 years). Some of the key documents relevant to build the IT Enterprise Architecture are the general IT Security policy document and the Application Security Policy document. The employees of whole organization are required to have acknowledged the Computer Use policy. Security issues need to be concerned when the company adds new technologies into EA, such as: ensure the staff network passwords are changed regularly (every 90 days). Core Input: From Case 3 IT manager’s experience, he provides the EA structure of his company and also states that security issue is really an important issue when extending mobility with EA. Case 4: D.C., enterprise architect in a global insurance broker with head office in New York The interviewer has conducted face-to-face interviews with this interviewee who is an enterprise architect in a global insurance enterprise. According to interviewee’s experience, his company has focused more on the technical and information architecture rather than the business architecture. The business alignment and governance are not particularly well developed. Additionally, the interviewee is not entirely convinced that the global model being implemented, at least in terms of business imperatives, represents a correct prioritization of opportunity development. The company has two architects groups to develop the EA, which are Business architects team and technology architects team. The company doesn’t use mobile technologies in a processing system sense. However, internal users could carry Blackberry devices primarily for email capabilities and messaging. The company Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 116 Ming-Chien (Mindy), WU couldn’t control their customer use in the kind of mobile device to run the business process. Different mobile devices, even same devices but different brands, have different standards, languages, and platforms. Thus, the company can’t design only one single form to their customers to fill in by using on any mobile devices. Core Input: From Case 4’s expert experience, he declares there are two teams to construct the EA when implementing in his company, and also declares establishing M-EA is very difficult to his company, due to so many different mobile devices, even the same devices but different brands have different standards, languages, and platforms. Case 5: G.M., consultant solutions architect to the banking and finance sector in Sydney, Australia The interviewer conducted a phone interview with this interviewee who is a solution architect in an external consulting company. According to interview’s experience, his company was employed to help in developing the EA. The interviewer declares that a clear understanding of the framework is very important to build the EA to the Company. A framework derived from Zachman and TOGAF along with a proprietary methodology could be used. Additionally, a well defined business strategy with a clear delivery plan is also important. The plan is always about 12-18 months period of time, including analyzing strategy, evaluating current system, finding a gap, and drawing a Visio diagram for the new architecture. A strong and diverse background in IT architecture is also able to translate high level business requirements into useable IT requirements and specifications. Finally, the Enterprise Architect team of the company provided includes four small groups: infrastructure, database, business analysis, and development and support groups. Security of information is considered to be an important aspect of service delivery (from purchase order to fill customer Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 117 Ming-Chien (Mindy), WU request); therefore part of the underlying infrastructure is used to deliver the business value. Every new project initiated whole EA team has a security consideration task associated with it which has to satisfy the organizations security requirements. Core Input: From Case 5’s consultant experience, he demonstrates that a framework, a well defined business strategy, a good plan, and a good structure of EA team are very important to construct a whole EA to the Company. Case 6: J.H., chief architect in a large state government owned transport agency The interviewer has Internet interviewed (several Email replies). This interviewee is a chief architect in a large state government owned transport agency. According to interview’s experience, her company has an ongoing EA program. It is used primarily to guide investment in combined business and technology change. The company typically divides the documentation into layers at a contextual, conceptual, logical and physical level. The EA looks at the contextual and conceptual layers. These are then broken down into business terms information, application and technology architecture. Solution Architecture concentrates on the logical and physical layers. Each Reference Architecture or Domain Architecture includes a roadmap which is then used as an input into program planning and capital forecasts. Core Input: From this Case 6 expert architect’s opinion, he confirms that transition road map is important to implement M-EA, and also suggests that the researcher needs to describe more details of each layer of M-EA model. Case 7: K.S., consultant to a large building and construction company The interviewer has Internet interviewed (several Email replies). This interviewee is a consultant in a building and construction company. He has written several chapters with the researcher’s supervisor about mobile business topic, which includes Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 118 Ming-Chien (Mindy), WU business driven EA for mobile business. According to his knowledge, he states that “business need” is the major concern when the company wants to build EA. Application of market forces and proven design and engineering principles to EA. Making ICT the assembly line supports standardized knowledge worker operations. Additionally, mobile technology can allow us to access knowledge as required, to transact ability as required and to have more effective communication. Some mobile technologies are commonly used in the company, especially in warehousing which has been used effectively. Core Input: From this Case 7 consultant’s experience, he points out that MT makes process as more effective, but always have budget problems. Case 8: P.S., solutions architect at global mobile communications and service provided company The interviewer has conducted a face-to-face interview with this interviewee who is a solution architect in a global mobile communication service provided enterprise. According to interview’s experience, his company has focused more on the technical and information architecture rather than the business architecture. However, he indicates that a good EA should encompass three pivotal points including People, Processes and Technology in its entirety; and the ability of these three entities should be well managed and delivered. EA can also be termed as a Service Oriented Architecture (SOA), where certain functions are grouped together and are controlled independently of each other allowing data transferring among one or more functions using a common bus interface. The interviewee’s company partly uses SOA and partly performs point to point architecture. SOA in his organization is used for provisioning new services via the use of TIBCO EAI. Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 119 Ming-Chien (Mindy), WU Core Input: From this Case 8 expert solution architect’s experience, he confirms that “people” is really an important aspect of constructing full M-EA, and he outlines that SOA brings better CRM. Case 9: R.A., consultant enterprise architect to a large Indian IT outsourcing service provider based in Melbourne, Australia The interviewer has Internet interviewed (several Email replies) with this interviewee who is a consultant enterprise architect to a large Indian IT outsourcing service provider. According to his knowledge, he defines that EA should describe how business operating model for an organization is implemented to use IT at macroscopic level and also to describe the classification of relationships amongst key business, information, IT application and IT infrastructure assets. The interviewee’s company provides services for providing EA capabilities to clients. A number of services provided by the interviewee’s company are implemented to use integrated frameworks, which serve as the EA for delivery of these services and providing tools to support these services. EA services to clients use a number of popular industry frameworks. These are Zachman, RM-ODP, Rational 4+1, TOGAF, FEAF and various Frameworks specifically to industry verticals. New technologies are incorporated into EA as part of the Technology strategy process. Core Input: From this Case 9 consultant architect’s experience, he outlines that building EA can use several popular industry frameworks. Case 10: S.P., CTO of an Indian solutions provider company based in Sydney, Australia The interviewer has Internet interviewed (several Email reply) with this interviewee who is a CTO of an Indian solutions provider company. The interviewee’s company Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 120 Ming-Chien (Mindy), WU sells, implements, and customizes the enterprise application in Australia and New Zealand (ANZ) region for Engineering, Manufacturing and Process companies. According to this interviewee, there are three basic building blocks for a pure Enterprise Architecture, that the application should be Pure Internet, Integral and Interoperable. a) Integral a. Modular solutions sharing a single database / schema b. Single business object and process model c. Consistent and unified Web-based user interface b) Pure Internet a. Written 100% in Java with the broadest and most sophisticated support of J2EE and Internet standards b. Proven seamless intranet / extranet deployments with existing Internet and security infrastructure c. Industry-standard J2EE, Internet and Web services interfaces c) Interoperable a. Seamless interoperability with heterogeneous systems b. Powerful federation for maintaining data with other systems c. Standards-based integration with commercial EAI vendors and turnkey process integration with TIBCO or other technologies ready to be fit into the enterprise layers. d. Whole Web services connectivity with any other technology Microsoft .NET Web service applications Core Input: From this CTO expert’s experience, case 10 indicates that the pure EA includes 3 basic building blocks which are Pure Internet, integral and interoperable. Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 121 Ming-Chien (Mindy), WU 4.8 Analysis and discussion of findings to verify the initial M-EA The analysis and discussion of findings are followed in the last 3 parts of questions to verify the initial M-EA. First part: the discussion of interviewees’ definition of M-EA, are documented in section 4.8.1. Second Part: the analysis of interviewees’ understanding and experiences of advantage of mobile technology bring to EA are discussed in section 4.8.2. Third Part: the discussion of interviewees’ understanding and experiences of the limitations and the challenges mobile technology brings to EA are discussed in section 4.8.3. Final Part: The analysis of interviewees’ expected outcomes of applied M-EA are outlined in section 4.8.4. 4.8.1 Updated M-EA definition Case 1: A.G., Post-Doc research fellow at a university M-EA facilitates information and knowledge sharing in the organization; therefore, it provides an organization with an opportunity to arrange its internal departments, their systems and applications in an efficient way. M-EA also enables cooperation between different departments and their corresponding mobile information systems and processes. Thus, as a result, M-EA becomes a starting point for a collaborative organization, especially when it supports mobile web services. Case 2: A.H., chief architect at a specialist security company, Canberra, Australia M-EA is the collection of organization’s information systems and business processes with mobility being an integral part of them. The most important element of M-EA is to help a company manage all of its mobile data and information and store it in a Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 122 Ming-Chien (Mindy), WU secure place. Case 3: C.P., senior manger at a large publishing house in Sydney M-EA is a design or a model that an organization adopts to provide consistent results, reliable deliverables and secure mobile transactions. Usually, M-EA refers to the IT hardware, software, data, and system of an organization; however, M-EA can be easily applied to other more general business processes of the organization. M-EA can potentially be made up of policies, document suites, workflows, procedures and forms. Case 4: D.C., enterprise architect in a global insurance broker with head office in New York M-EA is a function that ensures a business’s mobile and information technology strategy to correctly align with its business strategy and objectives. Additionally, M-EA is a combination of outputs based on this alignment work and associated with its technology and business objectives. M-EA should include models of the business, information and technical systems and, additionally, the principals and governance needed to deliver the required alignment. Governance (people) is very important, because they interact with the system. Case 5: G.M., consultant solutions architect to the banking and finance sector in Sydney, Australia M-EA is a framework used to build the organization’s mobile information systems that deliver the business outcomes. M-EA defines both the structure and the behavior of the organization’s mobile processes which include their technical components and their location-independent interactions. M-EA can also be defined as the abstraction Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 123 Ming-Chien (Mindy), WU of the design of the mobile business systems. Case 6: J.H., chief architect in a large state government owned transport agency M-EA is a blueprint to integrate business and mobile technology viewpoints of an organization. The purpose of M-EA is to describe the current and target models of an organization in order to guide and document the transitions of the organization to the target model. M-EA in the company is used primarily to guide investment in the combined business and mobile technology change. We typically divide our enterprise-wide models into layers at a contextual, conceptual, logical and physical level. M-EA looks at the contextual and conceptual layers whereas the Solution Architecture concentrates on the logical and physical layers of this enterprise-wide modeling and documentation. While mobility is regarded as a broader concept, mobile technologies should be treated as an integral part of an EA. Case 7: K.S., consultant to a large building and construction company M-EA facilitates the design and application of mobile ICT to enable the business to provide services and contents with ease. A mobile system design includes requirements, specifications, design, implementation and deployment of mobile applications. This mobile system design is carried out with higher quality and lower risks when it is based on an M-EA. At times, an isolated mobile system design may exclude business systems integration; however, M-EA is also able to handle these system integration issues well. Case 8: P.S., solutions architect at global mobile communications and service provided company M-EA encompasses three pivotal points of any architecture: People, Processes and Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 124 Ming-Chien (Mindy), WU Technology. Considering these points in their entirety, managing them well to deliver solutions is the responsibility of an M-EA. M-EA also nudges the organization towards Service Oriented Architecture (SOA) with mobility. A mobile SOA groups like functions together wraps them with a mobile interface and controls them in order to allow service calls, responses, and data transfer among them. The mobile technologies used and provided by in the interviewee’s organization currently are: 3G, Skype on mobile, Mobile TV, mobile Email, Blackberry and Mobile Web, to name but a few. Introduction of a new mobile application implies considerable utilization of the framework of M-EA and its business process. Case 9: R.A., consultant enterprise architect to a large Indian IT outsourcing service provider based in Melbourne, Australia M-EA describes how a business operating model for an organization is implemented by using mobile technologies at both micro and macro level. Moreover, M-EA also describes the classification of and relationships amongst key business, information, IT application and mobile communication infrastructure assets. Case 10: S.P., CTO of an Indian solutions provider company based in Sydney, Australia Three basic building blocks for a pure M-EA are the mobile Internet, Integration amongst applications and interoperability amongst applications. The mobile Internet with supporting software provides all Internet capabilities on the wireless, facilitates deployment of mobile intranet and extranets, and is made up of development environments (such as Java) with the broadest and most sophisticated support of J2ME, J2EE and the Internet standards. Integration amongst mobile applications happens through a common business view, a common and sharing single database Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 125 Ming-Chien (Mindy), WU and its schema and a consistent and unified mobile user interface. Interoperability amongst mobile, non-mobile and heterogeneous systems requires the use of commercial EAI vendors as well as turnkey process integration (e.g. with TIBCO) or other technologies ready to be fit into the various mobile enterprise layers. From above discussion, and an analysis of the results from the interviews, the initial M-EA definition can be arrived at as shown in Table 4.1: Table 4.1: Results from the interviewees that outline the 5 aspects of the M-EA Case No. Business Process People Data/ Information System Mobile Technology Others 1 √ √ √ √ 2 √ √ √ √ Security 3 √ √ √ √ √ Security 4 √ √ √ √ √ 5 √ √ √ √ Security 6 √ √ 7 √ √ √ 8 √ √ √ 9 √ √ √ 10 √ √ √ √ √ In the Table 4.1, it shows most of the interviewees agree that M-EA constructs include the process, people, data, system, and also technology aspects. Three interviewees totally agreed these five aspects to construct the M-EA model, and all of the interviewees agree the business and mobile technology aspects are important. However, there are only 4 interviewees state that “people” is the most important aspect because they all declare that people are the only ones who can control, access, manage, and make decision of constructing the M-EA. Additionally, several Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 126 Ming-Chien (Mindy), WU interviewees also suggest that “security” is also the other important aspect of the M-EA, which also can help modify the initial model to comprehensive one. Furthermore, the researcher considers validating the initial model with “security of M-EA” to the comprehensive M-EA model which documented on Chapter 5. 4.8.2 Refined advantages of using M-EA The advantages of M-EA are good assumptions for enterprise investigation in mobile technology area. These advantages are also justified as a genuine opportunity to support the company objectives within a business strategy manner. After discussing with the interviewees about the lists of M-EA advantages (see section 4.3.1), the results from the interviewees’ personal knowledge and experience are analysed and documented as following: l M-EA allows people anywhere anytime access to applications Case 1 identifies that people accessing systems to get any kind of information of organization and processing business anywhere and anytime by holding mobile devices, which is the major advantages using M-EA. Case 2 states that MT can have a positive impact on EA by enabling people access to conduct business anywhere and anytime. It enables access to information by linking the organization’s systems to portable devices. Mobility could allow people to carry smaller devices and have more effective communication. It provides the enterprise with a far greater level of data mobility and potential productivity. Thus, properly treating any external infrastructure and services is part of an organization’s mobile solution. Additionally, in many instances, global organizations will leverage third party communication infrastructure and associated services as part of their overall mobility solution set as Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 127 Ming-Chien (Mindy), WU well. Additionally, Case 10 declares that the modern mobile phone market caters for a wide variety of customer tastes and lifestyles. Smart phones and PDA are very handy in terms of end user response and ease of use from the application point of view. Most Windows mobiles (PDA) or the smart phones which support browser facility are capable of running our enterprise application anywhere and anytime. The application is pure internet and is very light weight in terms of rendering and transferring data across browsers to the servers. All these users can access the system through their mobile devices to run the business processes whenever they want. l M-EA facilitates faster information flow and enhanced reliability Case 1 identifies that Mobility is very useful on fast flow of knowledge when you enter the co-operation between internal departments to make faster easier and access to external parties- customers or suppliers. Drive action into the enterprise by successful re-engineering business processes to match marketing strategy model also can help identify and reduce process bottlenecks quickly. Furthermore, Case 3 declares that the major advantages in an integrated MT with EA are reliability, consistency, simplicity, and cost-effectiveness. Enhanced reliability- Systems that are designed to operate only when connected with certain other system, such as file servers, may not function well when a file server is unavailable. In contrast, systems that are designed to expect no connectivity may be able to ignore the outage- when a host can’t tell difference between a non-functional network and a non-functional computer connected to it- and recover later when the server returns to active status. Moreover, Case 6 indicates that MT (mainly mobile phones and home wireless networks) has almost become ubiquitous and thus a mode of interaction that cannot be ignored by organizations which currently (or plan to) provide services via the internet. EA with integrated MT allows for the organization to provide services via Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 128 Ming-Chien (Mindy), WU any mode and thus design systems with just the business functionality in mind. MT then becomes part of the infrastructure concerned with delivery of the information. Mobility is very useful on information fast flow when you enter the cooperation between internal departments to make faster easier to access external parties- customers or suppliers. If rules or policies change, the information flow faster to the enterprise which makes EA respond to those changes more easy and quickly. l Combination service provided through M-EA Case 5 states that MT (mainly mobile phones and home wireless networks) have almost become ubiquitous and thus a mode of interaction that cannot be ignored by organizations which currently (or plan to) provide services via the internet. An increased reliance on mobile phones as compared to fixed line phones is noticeable. Mobile technologies provide a newly evolving mode of interaction with corporate and enterprise systems. EA with integrated mobile technologies allows for the organization to provide services via any mode and thus design systems with just the business functionality in mind. Mobile technologies then become part of the infrastructure concerned with delivery of the information. Also, Case 8 lists some advantages of integrated Mobile Technologies into EA: 1. Able to present a single view to the customer; 2. Ability to deliver multiple technologies using a single EA; 3. Ability to deliver multiple applications over the Mobile Technology using EA. The following mobile technologies are currently integrating in the interviewee’s organization’s EA: 1. 3G mobile applications; 2. Skype; 3. Mobile TV; 4. Email; 5. Blackberry; 6. Mobile Web etc. In addition, Case 9 recognizes that using MT facilitates the delivery of additional access channels, which makes sense to have in a mobile context, e.g. service requests, payments and information/reminder channels. Better mobile processes are becoming standard and accepted by all users. A number Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 129 Ming-Chien (Mindy), WU of resource requests for travel, accommodation and for equipment (e.g. laptops, mobile) could be submitted by using a mobile platform as it may be the natural choice of convenience. The interviewee’s company has an internal MT interest group. The modern mobile phone market caters for a wide variety of customer tastes and lifestyles. People can use smart phones and PDA which are very handy in terms of end user response and ease of use from the application point of view to access this combination service. l Increase enterprise flexibility in order to raise efficiency and effectiveness of business processes by streamlining real-time decision-making. Case 2 points out that mobility can bring to have greater level of data mobility and better productivity, also better mobile process becomes standard and accepted by all stakeholders. Company conduct business remotely as senior managers and the Board of Directors and distributors are based in different locations. Similarly, Case 7 states that MT allows the user to access the knowledge as required, ability to transact as required and more effective communication. Some mobile technologies are commonly used in the interviewee’s company, and especially in warehousing as it has been used effectively. The manager can use a RFID system to track the material amount in real-time in order to make the decision directly to reduce the ordering process cycle time. l Reduce cost by reaching out to the extended MEA is supported and sustained over time Case 3 highlights that high quality, longer used, and easy to modify and extend IT infrastructures in future, which facilitates cooperation by leverage M-EA to set a successful technology direction. From longer using IT infrastructures also leads cost Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 130 Ming-Chien (Mindy), WU reduction as well. Likewise, Case 4 outlines that the investigation of MT was justified as a genuine opportunity within the Business Strategy and could support the company objectives. MT are finally realizing some of their potential (lower operating costs for the consumer, better interfaces, and better integration) makes the ability to carry out some functions more ergonomic now than in the past 3-4 years. Typically, the interviewee observes the use of MT as a useful addition for providing consumers with additional access channels for things that make sense to have in a mobile context, e.g. service requests, payments and information/reminder channels. Furthermore, Case 6 thinks the benefits from an M-EA are much different from the overall benefits of EA – i.e. Lower cost base through technology standardization, business enablement through improved integration, faster provisioning of new services, etc. 4.8.3 Updated practical issues of M-EA Enterprise might not have enough knowledge to understand the technologies of mobile hardware and software which is integrated into M-EA. Therefore, enterprise might limit or stop extending their EA with mobile technologies due to it. Thus, in an ever changing world wherein the new technologies being introduced everyday, it may be difficult to just keep pace with and let alone overcome the challenges it brings. However, in keeping with tradition, following the right processes, having the right people and having the right technology may be the keys to overcome any challenges that new technologies may bring with it. From discussion with the interviewee about numbers of limitations and challenges that need to be considered as part of an M-EA implementation, the result has been analysed by the researcher and documented as follows: Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 131 Ming-Chien (Mindy), WU l Security issues All of the interviewees’ responses to this issue are very important in extending EA to M-EA; following are the results from the analyzed interview records by the researcher: Case 1 points out that it is critical to incorporate the security concerns associated with mobility solutions in any related EA activity. Data security and non-repudiation (especially for financial transactions); targeting only those applications which can be deployed with sufficient usability and security, it may not be safe enough to push customers accessing or storing their financial data into their mobile handsets. Additionally, this will vary greatly by type of handset or device. It would need to be treated alongside the core mobile infrastructure for Multi-factor authentication, encryption… etc. Case 2 indicates that data security and Intellectual Property (IP) security is very important as well. The interviewee’s company currently uses industry standard firewall, software and hardware security systems, also regular risk assessment and procedures to get over this issue. Case 3 demonstrates that security issues are important when adding new technologies into EA, such as: ensure that staff network passwords are changed regularly (ever 90 days). All internal systems that allow internet traffic must have the session initiated according to the inside-out rule. I.e. no communication commences with the external party. Data security is overcome by on-going encryption and secures connections. The interviewee’s company ensures up-to-date data with all IT Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 132 Ming-Chien (Mindy), WU security patches from all the vendors. Additionally, having e-mail sweeping software eliminates rogue and bogus e-mails from even entering our corporate e-mail repositories. Also, all employees of the Company adhere to a published Application Security Policy. Case 4 outlines that from an authentication and authorization points of view, the most important aspect relates to individual user/team access to client data. There is a large component of the technical EA focused on Team Rights Management. Finally, a key aspect is having a clear idea of the scope of use and capabilities of mobile technologies available today. One area of risk is the sheer size of the market for mobile devices and capabilities. It makes supporting this a potentially very complex and risky proposition, especially in an EA environment, which largely focuses on internal capabilities under complete control of the organization in security issue. Case 5 summarizes that Security of information is considered as an important aspect of service delivery (from purchase order to fulfill customer’s request) and therefore part of the underlying infrastructure used to deliver the business value. Every new project initiated by whole EA team has a security consideration task associated with to satisfy the organizations security requirements. Case 6 states that the specific variations in an EA with respect to mobility, however, are addressed in the interviewee’s organization by creating a ‘Mobility Reference Architecture’. This architecture, which is developed by us in 2008, will address issues that are mobile-specific – such as identity management, encryption, location services, scalability, security in mobile communication infrastructure and a mobile development environment. This will be a mix of commercial 3G mobile data services Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 133 Ming-Chien (Mindy), WU and focused on deployment of broadband wireless hotspots. This infrastructure will need to be supported by enhanced authentication and encryption technologies. Furthermore, M-EA also has a challenge in proper treatment of an external infrastructure and services that form part of an organization’s mobile solution. Organizations need to leverage third party wireless communications infrastructure and associated services as part of their overall set of mobility solution. Traditional EA modeling techniques don’t tend to address this aspect (third party infrastructure) particularly well. It is also important to incorporate the security concerns associated with mobility solutions into any related EA. Multi-factor authentication, encryption, etc would need to be treated alongside the core mobile infrastructure. Lastly, application delivery mechanisms will still be concerns for many organizations. Thick client application delivery is still a reality for most companies and will continue to present challenges notwithstanding the increasing bandwidth of mobile data technologies. Case 7 declares that security has to be given due consideration when the enterprise wants to implement M-EA into their company. The increased mobile computing power of handheld devices introduces new security threats, which would be in the form of loss of confidentiality, integrity and availability. Password protection is included in most handheld devices as a counter measure. Furthermore, network and application security measures also need to be considered when extending enterprise architecture with mobility. Having risk identification and risk planning measures could help to overcome some risks. A possible solution is to build security measures into mobile platforms and applications themselves. Case 8 indicates that handling security issues of M-EA is required to follow the Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 134 Ming-Chien (Mindy), WU business rule validations (all business processes are constructed based on business reengineering). Additionally, from the intranet of EIS to Internet, there is firewall needed in the company. Following Figure 4.3 is the structure of the interviewee’s company to handle the security issues of their M-EA: Figure 4.3: The structure of Case 8 handling security issues of M-EA Case 9 highlights that targeting of extending EA with mobile applications, which can be deployed with sufficient usability and security issue (as it is not safe for the company to push customers or financial data to mobile handsets as yet). The important security concerns in the interviewee’s company are 1.Authentication and authorization services, and 2. Privacy of information assets. Case 10 observes that the http and https both protocols under SSL (Secured Socket Layer) and also using LDAP (Lightweight Directory Access Protocol) for better Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 135 Ming-Chien (Mindy), WU encryption and deployment of the user access policies is a kind of solution of security issue. The solution also follows by firewall restrictions under http and https layers. l No single standard for mobile technologies Case 2 considers that MTs are still immature but are improving at a great rate. Additionally, there are a lot of competing standards. There are still considerable efforts required to standardize technologies for interoperability. Furthermore, there are a range of protocols in use, including GSM, Edge, 3G as well as the older CDMA. Different types of organization incorporate mobility in different ways depending on, for example, the bandwidth on Internet, the capability of mobile devices and the number of users/population influenced by Mobility. Case 4 recognizes that in the primary business areas, Risk Management and Middle Market Commercial have limited use for mobile technologies to be introduced. This is primarily because of the bespoke processing nature of the business itself which is both consultative and document intensive. However, within the Consumer business (much higher volume and very low touch) there would be a much greater opportunity. Consumers who are typically much more Return on investment (ROI) focused on individual initiatives to any use of this form of technology would be closely scrutinized. From a technology viewpoint, the interviewee’s company is not particularly advanced in its use of automated systems and mobile technology because it couldn’t control the customer to use which kind of mobile device to run our business process. Different devices, even same devices but different brands, have different standards, languages, and platforms. However, the company can’t only design one single form for the customers to fill in by using on any mobile devices. Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 136 Ming-Chien (Mindy), WU This form will be changed on different mobile devices, and the company couldn’t test the form on so many different mobile devices as well. Case 9 also indicates that there are several MT having been standardised around the world and there still exists a difficulty in achieving a ubiquitous standard technology that could be used for people travelling. This also brings many risks when new technologies are introduced and are completely new in the market, and this creates confusion in the marketplace as consumers attempt to understand and choose from what is available. l Mobile Device Form Factor and Device Trust Case 3 outlines that it has taken a great deal of time to convince the public in general of the relative security of the Internet and its use in delivering financial transactions. This trust has yet to be reached in devices applied in the Mobile space, especially with financial transactions. Case 5 declares that MT involves a different presentation mechanism to the currently well established ones such as desktop computing for the Internet and Telephone. As with each presentation channel, the mode of communication along with the limitations of the devices used for the purpose pose the greatest challenges. For example, size of display, communication infrastructure required, authentication and authorization mechanisms, small screen and keyboards limit the overall usability etc. Ease of use for the staff is needed to operate the devices, overcomes through thorough and regular training. One example of reducing this problem is to use the web browsing capabilities of current mobile phones along with a re-designed web interface suited to a significantly smaller screen size as well as limitations of the Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 137 Ming-Chien (Mindy), WU communication infrastructure. This has the need for each application to have custom presentation mechanisms and relies on the user to decide and select the appropriate one. Even if the mobile phones are handy enough to use, hundreds of millions of people are not going to replace the full screen, mouse and keyboard experience with start of the little screen. This is more conventional than adoption of things, but can be catered with time. The other method is to use new mobile interfacing tools that adjust the information transfer based on the parameters of the device used in the communication. For example, a mobile device with a large color screen is able to display more information and use colors to distinguish the type of information. On a smaller monochrome screen, less information is displayed and a small number of grayscales are used to show the different types of information. A mobile phone with no web access would request information via SMS and the response would be optimized to cater to the limitations of the SMS technology. l Cost of M-EA implementation Case 6 shows that some of the challenges relate particularly to user perception of the real value of this area. At present, extent MTs are still seen as unnecessary “toys” as opposed to value channels to be supported/ utilized. In the context of an EA program, the primary way to overcome this is to be very sure that the inclusion of this technology is both cost/value justified and is a key enabler in helping the business reaching its desired strategic objectives; for example, this must be measurable/ quantifiable. Also, the costs of the internet usage on these devices are concerned by customers as well. Case 8 thinks MT finally realized some of their potentials (lower operating costs for the consumer, better interfaces, and better integration) which makes the ability to Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 138 Ming-Chien (Mindy), WU carry out some functions are more ergonomic now than in the past 3-4 years. Case 10 advocates that the most important part of this is the costs of the internet usage on these devices. Other than this even if the mobile phones are handy enough to use, hundreds of millions of people are not going to replace the full screen, mouse and keyboard experience with staring at a little screen. This is more conventional adoption of things, but can be catered with time. As the product is used for discrete engineering/manufacturing companies, the changes to the Web technology and performance are the main criteria for a change. Also, there are aspects of compliance to various federal laws which are required to be followed and implemented in the development of the product/solution. Therefore, the changes and adoption of new technology is a must and based on the market research and need of the time as well. l Companies need to re-engineer their business processes also employee training is required. Case 1 lists some issues that need to be concerned as following: Internal issues-> CIO to set up how to access and share information of organization, integrating issues, and small screen are mobile technology barriers. Also employees need to be training to understand how to use the new EIS of new M-EA. The users need to know how the new mobile business processes works on their new mobile device. Case 7 lists the risks in integrated mobile technologies with EA are business integration issues regarding re-engineering the business processes, and getting the information and work-flow organized. Additionally, when re-engineering the business processes, external attack, loss of data and internal nefarious activities may Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 139 Ming-Chien (Mindy), WU be the risks that take place. Case 8 points out that decision on which system would handle a particular business function is always concerned when re-engineering the business processes of building M-EA. In most cases, deciding which system would handle a particular piece of business requirement is often one of the crucial pieces of the puzzle within the EA. However, the interviewee’s company has a custom document which lists all of the interfaces created among the various systems for all projects carried out is the only source of information that is kept up-to-date. When a new technology needs to be implemented in current EA of the interviewee’s company, a Proof of Concept system will be tested in all forms and be proven before any of the software, hardware and resources are really poured into the project. 4.8.4 M-EA expected outcome From discussion with the interviewees, all of them indicate that M-EA could bring the enterprise location-independence, be accessible at anytime to system, and provide personalized services to customer. From technology points of view, some interviewees (Case 1, 3, 4, 6, 9) state that M-EA helps the enterprise establish the mobile controlling and monitoring, mobile communication, mobile intranet, and also mobile Internet in order to create mobile office environment. From business points of view, some interviewees (Case 2, 5, 6, 7, 8) also declare that M-EA could provide mobile commerce platform and improve the business processes to become service-oriented in order to help the manager receive and respond to the real-time market needs. The detailed discussion with interviewees of these expected outcomes are analyzed and documented to the following 10 points: Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 140 Ming-Chien (Mindy), WU 1. Mobile device usability: Some mobile devices that are popularly used in the interviewer’s work environment and form part of the M-EA outcomes are as follows: * Mobile phones: only the cost phone usage is monitored across the business. * Warehouse RFID: Used across the business to optimize warehouse operations including pack and scan. * RFID in vehicles: used to monitor vehicles movements, positions, schedules. * Laptops: used across the business for mobile workers to enable them to access the ERP, CRM and SCM systems of the enterprise. * PDAs: staffs bring in their own as needed with little ICT support and accessible to corporate applications. 2. Accessing system anytime and anywhere: Personal and business resources can be accessed anywhere using any device via any network, whether fixed-line or wireless. Instant connectivity to the Internet and intranet from a mobile device is becoming a reality. GPS and UMTS services greatly accelerate the development of this capability, which also make new wireless devices as the preferred mode of accessing information anytime and anywhere. 3. Mobile office: Enterprise provides appropriate wearable devices with wireless connection capability to create the mobile office environment. Employees could display and input E-mail, calendar, contact, and notice on their devices anytime in this environment. The most important application is E–mail with the ability to view attachments, such as Word files and Excel spreadsheets. Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 141 Ming-Chien (Mindy), WU 4. Customer personalization service: Personalization is one of the key features provided by mobile enterprise portals. The mobile device becomes an everyday business tool and permits easy access to selected information on the basis of the user’s location and the relevant business scenario. Points of interest, instant couponing, location finding, tracking, and travel services are some examples of location-based services. 5. Service-oriented process orchestration in order to provide real-time response: M-EA enforces reconsideration of all existing business processes from a mobile viewpoint. As a result, a synergy is brought about among loosely associated applications and processes by applying the concept of business re-engineering to them. All business processes are re-engineered in order to get real-time responses to the market information updated. 6. Mobile control and monitoring: Emergency services, motoring, remote control, repair, surveillance, and telemetric applications all make a genuine contribution towards simplifying activities such as process control and also help improve lifestyles. 7. Mobile commerce & payments: M-Commerce includes all transaction-based applications such as ordering, purchasing, selling, auctioning, trading, payment, banking, money transfer, brokering and ticketing. Mobile commerce has huge potential of dramatic changes in consumer’s lifestyles and the way service providers and network operators run their business. Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 142 Ming-Chien (Mindy), WU 8. Mobile information service: The value of the information to the user increases as it becomes more personalized and localized. Data can be pushed from or pulled to the mobile device. The more urgent the information needed for making a decision (e.g. flight delays); the more users are willing to pay. Such as news, stock market, weather, traffic situation are examples of information services. 9. Mobile communication: People could have delivered and received their voice message, SMS, Internet program messaging, multimedia services anytime on their hand devices. The mobile communication brings people additional options for communicating each other, irrespective of their location and desired contact partner. 10. Mobile Internet service and applications: Intranet provides secure access to corporate applications, and other business scenarios even allows partners or customers to access enterprise application, services or resources using mobile devices. The rapid increase in the use of intranets and extranets is creating a mobile workforce that expects access to desktop applications, messaging and information retrieval whether in the office, in the car, waiting at station or airport, working at home or visiting a customer. From above discussion, the researcher arranged the interviewees’ expected outcome of implemented M-EA and its aspects in the following Table 4.2. Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 143 Ming-Chien (Mindy), WU Table 4.2: Interviewees’ expected outcome of implemented M-EA model M-EA 5 aspect Interviewees’ expected M-EA outcome PEOPLE · Working with/on Mobile Device;· Establishing Mobile Office;· Providing Customer Personalization Service; PROCESS · Orchestrating Service-Oriented Process· Real-Time Responding to Market· Mobile Controlling and Monitoring the Materials and Products· Providing Customer the Mobile Commerce & Mobile Payment Methods. DATA · Providing Employee and Customer Mobile Information Service SYSTEM · Employee, Customer, and Supplier Accessing Enterprise Information System (M-SCM/ M-CRM/ Mobile Enterprise Resource Planning (M-ERP) Anytime and Anywhere in order to Provide Mobility Location-Independence Technology · Mobile Communications Networks· Mobile Internet Service and Applications; From the 10 point s of the interviewees’ expected outcomes of implemented M-EA model, the Table 4.2 mapping these 10 points to the M-EA 5 aspects. The first point: mobile device usability, the third point: mobile office, and the fourth point: customer personalization service are mapping into the expected outcome of M-EA” people aspect. The fifth point: service-oriented process orchestration in order to provide real-time response, the sixth point: mobile control and monitoring, and the seventh point: mobile commerce and payments are mapping into the expected outcome of M-EA” process” aspect. The eighth point mobile information service is mapping into “data” aspect. The second point: accessing system anytime and anywhere is mapping into “system” aspect. Finally, the ninth point: Mobile communication and the tenth point: mobile Internet service and applications are mapping into M-EA “technology” aspect. Chapter 4: Eliciting M-EA from Case Studies PhD Thesis Page 144 Ming-Chien (Mindy), WU 4.9 Summary of this chapter This chapter has discussed the result of the ten cases studies from interviewing the experts during this research project. The interviewees contributed to the updating of the EA model based on their experiences. This chapter firstly declared the results from literature review and definition M-EA, advantages and limitations of M-EA, and also the researcher created the initial M-EA model. After interviewing the ten case studies, the researcher summarised the result of verifying the draft M-EA model, including updating the definition of M-EA, the advantages and limitations of M-EA, and what the interviewee’s expectation are after having implemented M-EA (which is the validation criteria for following action research steps, and documented in Chapter 6). The next chapter will introduce the updated M-EA structure from the result of literature review and ten case studies. Chapter 5: M-EA Model PhD Thesis Page 145 Ming-Chien (Mindy), WU Chapter 5: Extending and updating Mobile Enterprise Architecture (M-EA) model 5.1 Overview of this chapter After the discussion in Chapter 2 about the review of literature it was then used to build a model, which is updated in Chapter 4 (based on the interviews), this chapter explains in detail the updated and refined outcome. Firstly, this chapter introduces and explains the mapping of M-EA to technologies, processes, systems, data, and people. Additionally, this chapter also discusses the core philosophies of extending EA with mobility to produce a M-EA framework, core M-EA 5+1 layer model, and M-EA migration transition roadmap in detail. The M-EA framework offers a blueprint of how people, systems, process, data, internal and external factors contribute to EA. This M-EA framework is an abstraction of how emerging technologies or new methodologies fit with an organization’s IT requirements. M-EA 5+1 layered model demonstrates how the mobile technology works in each of these layers and connects seamlessly to each other. The M-EA transition roadmap provides the process for transition from the current status to target one for the company. The roadmap shows the company how to plan for different generation enterprise information system situations and customize them specific to an M-EA. 5.2 Mobile Enterprise Architecture (M-EA) extensions As discussed in Chapter 2 and later updated in Chapter 4, the time and location Chapter 5: M-EA Model PhD Thesis Page 146 Ming-Chien (Mindy), WU independence of mobility open up tremendous opportunities for organizations to offer integrated services to their clients and partners. M-EA not only brings about internal integration but, through its extension, also offers much more efficiency to its external suppliers, customers and other trading partners over the Internet. An integrated EA with mobility provides immense benefits to organizations in extending their business systems beyond the organization’s boundaries. Therefore, to the part of this research identifies and documents all the components of M-EA, and also works out strategies to handle the transition from EA to M-EA. This research study redefines Mobile Enterprise Architecture (M-EA) as: “A structure of integrating business processes with mobile technology and information technology, supported by a visualization of the enterprise that includes relationships amongst its System, Process, People, and Data. A successful M-EA supports internal and external mobile users via enabling them to run to secured transaction processes, access to the systems, and search and monitor functions. Additionally, a comprehensive structure of M-EA includes a high level framework, a model on how to use mobile technology in each layer, and a mobile transition road map.” M-EA connects existing and new systems to enable collaborative operation within the entire organization in location-dependent, personalized and in real-time. Extending EA to M-EA provides better access among systems, production planning and control, inbound and outbound logistics, material flows, monitoring functions, and performance measurements. Chapter 5: M-EA Model PhD Thesis Page 147 Ming-Chien (Mindy), WU 5.3 Mapping M-EA to technologies, process, system, data, and people As discussed in Chapter 2, an Enterprise Architecture (EA) represents the enterprise’s key business processes, information, application systems, user requirements, and technology strategies/trends and their impact on business functions and processes. Enterprise Business Architecture (EBA) focuses on the integration of business information systems and business processes, Enterprise Information Architecture (EIA) considers on data storage, Enterprise Solution Architecture (ESA) and Enterprise Technology Architecture (ETA) collaborates the technology devices, applications, middleware, platforms, and standards. Furthermore, “people” are an important aspect of establishing the completed enterprise architecture, because people handle, arrange, manage, interact, and make the decision of how to establish and to operate the business process. As MT integrates into EA, business processes and enterprise information systems also have to be re-engineered to support the new business strategy. These changes in systems and processes require, people to be trained so that they understand how to access the system and to operate the processes. In most enterprise, business requirements change frequently. The design of data in M-EA must be agile and should allow for easy and rapid reorganization to adopt to the new system functions. Therefore, handling these four aspects of an EA is very important, because they have major impact on the way the organization functions when extending EA with mobile technology. A well-structured M-EA is a logical organization of information pertaining to the following corporate-level, enterprise-wide elements: Mobile technology infrastructure Business processes orchestration Chapter 5: M-EA Model PhD Thesis Page 148 Ming-Chien (Mindy), WU Application systems Data elements User requirements 5.3.1 M-EA and technologies M-EA is about extending the original enterprise architecture (or single/several enterprise information systems) with mobile technologies. Therefore, incorporating the “new mobile technologies” is very important aspect in M-EA. In this section, a consistent set of new mobile technology standards, applications, infrastructures, and models are considered. The technical architecture provides the foundation that supports the applications, data and business processes identified. The technical architecture identifies and plans the computing services form the technical infrastructure for the enterprise. The International Standard Organization (ISO) document guides the engineering of an organization’s developing information systems and technology infrastructure across the various domain architectures. The Open System Interconnection (OSI) model (Zimmermann, 1980) defines a networking framework for implementing protocols in seven layers, which are: Application, Presentation, Session, Transport, Network, Data Link, and Physical layers. Application layer defines interface to user processes for communication and data transfer in network, and provides standardized services such as virtual terminal, file and job transfer as well as operations. Presentation layer specifies architecture-independent data transfer format and provides independence from data representation (e.g. encryption) by translating Chapter 5: M-EA Model PhD Thesis Page 149 Ming-Chien (Mindy), WU from application to network format, and vice versa. Session layer controls establishment and termination of logic links between users, and reports upper layer errors. Transport layer manages end-to-end message delivery in network also provides reliable and sequential packet delivery through error recovery and flow control mechanisms. Network layer determines how data are transferred between network devices, and provides flow and congestion control to prevent network resource depletion. Data link-layer defines procedures for operating the communication links, and controls how a computer on the network gains access to the data and permission to transmit it, also controls frame synchronization, flow, and error checking. Physical layer defines sending data over network devices and optical, electrical and mechanical characteristics (Zimmermann, 1980). Besides OSI 7 layers, middleware layer is also an important technical layer which glues all layers that communicate with each other, or various devices in each layer are able to communicate with each other. Furthermore, from the result of case study, most interviewees advocate that security layer for all technical layers is really needed to be concerned for implementing and applying new MT into EA. 5.3.2 M-EA and process An Enterprise Business Architecture (EBA) defines the business of the organization and contains a business model (the Enterprise Business Model-EBM) that defines the business functions of the independent organizations that perform those functions. The Business Architecture is the result of defining the business strategies, processes, and functional requirements. It’s the base for identifying the requirements for IS, Chapter 5: M-EA Model PhD Thesis Page 150 Ming-Chien (Mindy), WU which support the business activities. The process view or process architecture describes the view of the architecture that includes running processes and instantiated objects that exist in the system. The business processes are made up for the creation, operation, funding, maintenance, and growth of an EA. The enterprise process architecture describes important concurrency and synchronization issues, and contains the current and future state models of business processes in order to reach the enterprise business goals and objectives. Maximize process could carry out efficiency through leverage of mobile technologies. Therefore, enterprise needs re-engineering their original business processes in order to be running the processes on the users’ mobile device. As the use of wireless communication isn’t restricted to line of sight, the use of personal area networks (PANs) is an important step towards ubiquitous mobile commerce. Customers start to seek on-line shopping by using a mobile phone, perhaps along with a PDAs or pocket PC. This technology will require the enterprise to re-engineer their business processes for providing their customers the ability to purchase products or to check information on their mobile devices. Mobile commerce transaction processes and digital content delivery processes are necessary when applying MT into EA. Mobile commerce transaction processes include: marketing, order, payment, wireless wallet, digital money, delivery goods setting by using mobile devices. Digital content delivery can be seen in applications such as browsing status information like weather report, transit schedules, sports scores, special menu, goods price, shop location, product availability, market services and directory services. Chapter 5: M-EA Model PhD Thesis Page 151 Ming-Chien (Mindy), WU 5.3.3 M-EA and system A business system is a logical representation of functionality to be executed by the enterprise in the course of carrying out the business processes. Enterprise systems offer a range of opportunities to the organizations that deploy them. At their most basic level, enterprise systems allow organizations to integrate and disparate systems, and also provide real-time information to employees, customers and suppliers. An information system is a unique configuration of IT resources and organizational processes whereby the IT recourses (and the information they provide) are applied to support specific organizational processes. M-EA provides a framework focused on developing and/or implementing application systems to fulfill the business requirements and to achieve the quality necessary to meet the needs of the business. There are many different generation information systems (applications and components, purchased or custom-developed) needed to be collected and integrated when applying MT into EA. Therefore, M-EA provides user-oriented services and database-oriented services which have been produced from the development and deployment of information systems. An organization gains enhanced visibility into its internal processes by integrating the enterprise information systems. This visibility allows managers and executives to make more informed and often better decisions. The systems of M-EA across the entire supply chain, which are extended toward customers, suppliers, and other stakeholders, the horizon of managers and executives. Therefore, M-EA systems’ integration helps the enterprise mangers across all levels of management to obtain real-time information on the status of external as well as internal operations in order to greatly increase the positive decision-making potential. Chapter 5: M-EA Model PhD Thesis Page 152 Ming-Chien (Mindy), WU . 5.3.4 M-EA and data For all but a few privileged organizations, it is exceptional to have complete enterprise data architectures. Data to an EA is like blood to the human body: it is everywhere, it feeds all body parts, it requires storage, maintenance facilities, and it makes use of a network of production centers, pipelines, and processing centers. Data architecture is made up of the structure of all corporate data and its relationships to itself and external systems. Additionally, data must be organized into various data types, stored in database tables; and these tables need to have relationships with each other so that specific data elements can be retrieved in fast and economic ways. Data in the M-EA are identified, defined, represented, organized, and managed through the use of entities, attributes, and relationships. Transactional data of M-EA that are high in volume are shared across locations that are current, centralized, and mandatory (Goh and Taniar, 2006). Data architecture of M-EA describes the data’s physical and logical aspects, as well as the enterprise’s information flows/value chains, and is based on the business functions in business model. Data architecture of M-EA aims to identify the key artefact of the defined business functions, to extend beyond organizational boundaries to external sources, and to target information managed as enterprise data resources. It’s the result of modelling the information required to support the business processes and functions of the enterprise. The organizational context provides input into data architecture and is the primary Chapter 5: M-EA Model PhD Thesis Page 153 Ming-Chien (Mindy), WU tool for the management and sharing of enterprise data. It enables architects, data modelers, and stakeholders to identify, classify, and analyze information requirements across the enterprise, as well as allows the right priorities for data sharing initiatives. Data architecture states how data are persisted, managed, and utilized within an enterprise. Additionally, data architecture describes: How data are stored in both a transient and permanent manner. How components, services, and other business processes utilize and manipulate the data. How legacy systems and external business partners access the data. How common data operations (create, read, update, delete) should occur in a consistent manner. 5.3.5 M-EA and people “People” is the other very critical aspect of implementing and using M-EA. One of the first steps in applying M-EA is to define the roles and responsibility of the team members. The scope of the project determines who will be involved in the project to a large extent. M-EA considers the people either internally, by employees of the company itself, or externally, the customers and the suppliers. According to the M-EA vision, access to information systems deeply embedded into the environment is mediated by objects or simply through the observation of users and the reflective interpretation of their intentions by the system. Therefore, mobile devices become invisible, and interaction is directly with the human sensory and entire enterprise information systems. Chapter 5: M-EA Model PhD Thesis Page 154 Ming-Chien (Mindy), WU Interest in mobile access is strong among a wide range of people and enterprises involved in mobile access technology, such as hardware manufacturers, software providers, communication service providers, content providers, and end-user organizations. W3C is working toward making information on the World Wide Web accessible to mobile devices. The key challenge of mobility with people is in the device that is characterized by small screens, limited keyboard, low bandwidth connection, small memory, and so on. However, these devices are highly portable and connect to the server using a wireless network. As the devices continue to grow in their telephony and computational power, their adoption is increasing manifold. Therefore, people have been incorporated in the M-EA design to hold mobile devices such as phones, PDA and smart devices to run several processes. For example, they could be reading news, doing transaction processing, banking and also chatting. 5.4 Extending M-EA for business M-EA establishes guidelines, standards, and operational services that define the enterprise business information systems development environment. When M-EA is documented as below, it can be used to accomplish the following: Facilitate change management by linking strategic requirements to systems that support them and by linking the business model to application designs Enable strategic information to be consistently and accurately derived from operational data Promote data sharing, thus reducing data redundancy and maintenance costs Improve productivity through component development, management and reuse Reduce software development cycle time Chapter 5: M-EA Model PhD Thesis Page 155 Ming-Chien (Mindy), WU The core outcome of this doctoral research is a comprehensive structure of “Mobile - Enterprise Architecture” (M-EA) for business. This M-EA includes following three basic components as outlined by Unhelkar (2008) and discussed earlier in the literature review in Chapter 2: • Framework – Providing a High level blueprint of M-EA • Model – 5+1 layers of M-EA diagram to encapsulate and represent an approach to using mobility • Mobile Transition Paths/“Road Maps” of the implementation M-EA Road Maps (Transitions) ( r iti ) Models (Standards) l ( t r ) Frameworks (Abstraction) r r ( tr ti ) Figure 5.1: M-EA Components (adopted on Figure 2.3) (a) Frameworks and abstractions: Frameworks are a key part of any EA environment. The framework for M-EA offers a blueprint picture of how the people, systems, process, data, and internal and external factors that contribute EA. This M-EA framework is an abstraction of how the emerging technologies or new methodologies fit with an organization’s IT requirement. The framework provides the company not only the clear idea of IT or MT investment direction but also contents on how to link together in an EA environment. (b) Models: Models provide a pictorial representation of the enterprise-wide view of how the individual technical elements of the systems relate to each other. This Chapter 5: M-EA Model PhD Thesis Page 156 Ming-Chien (Mindy), WU pictorial representation can be called the ‘reference architecture’ for work within the organization. The architectural and design patterns that form the ‘standards’ for the organization are also a part of the model. M-EA model is 5+1 layers architecture model, it shows how the mobile technology works in 5+1 layers and connects seamlessly to each other. The model provides to the company not only the details of mobile technology application of each layer but also about all layers how to glue together in an EA environment. (c) Transitions: Transitions Road Map provide a migration path for the enterprise from where ‘it is’ to where it ‘should be’. Thus, the transition paths are ‘road maps’ to guide the organization in adopting new technologies, methodologies and business processes. The transition road maps for the company aim to show the company how to plan from the different generation enterprise information system situation to mobile specific EA. The migration table for M-EA provides the transition process from the current status to target status. 5.4.1 M-EA framework in business The M-EA Framework shows a high-level picture, which extends the EA with people, process, system, and data integrated with mobile technology. This framework is an abstraction of how the mobile technologies fit with the enterprise requirement to achieve business goals. This M-EA framework (as in Figure 5.2) gives an understanding of how well it is aligned enterprise system, process, data, and people who are the high-level business goals by providing a consistent and predictable flow of information that users can trace from the business objectives to the technical Chapter 5: M-EA Model PhD Thesis Page 157 Ming-Chien (Mindy), WU details. Executives then have a complete view of technology issues from a strategic perspective. As discussed in previous chapter, MT helps enterprise to offer better service and real-time response communication between business and consumer. Today, most people have more than one wearable mobile device, such as cellular phones with Bluetooth technology. Thus, people currently use their mobile devices for making payments, texting, talking and, of course, simple downloads. Wi-Max ensures broadband wireless radios manufactured for customer using interoperate from retailer to retailer, which in order to help EA integration much more effectively and update unanimity between all retailers and customers. The intra-organizational M-EA with WLAN technology provides all the employees to access the enterprise system anytime, anywhere. In addition, Hurster et al. (2006) pointed out that GPS devices and RFID technologies have already been popularly used on SCM systems to improve delivery service, tracking location of goods, and reduce the cost of human-mistake risks. This results in improved effectiveness and efficiency of the enterprise (Schilhavy, and Salam, 2006, and Gupta et al., 2009). In our M-EA framework, the researcher considers how MT is integrated with EA to derive the aforementioned advantages to the enterprise. Chapter 5: M-EA Model PhD Thesis Page 158 Ming-Chien (Mindy), WU Figure 5.2: M-EA Framework (Wu and Unhelkar, 2008, IEEE VTC) The M-EA Framework, as shown in Figure 5.2, points out the information/data of the application services and in the data storage goes through the enterprise bus or middleware to do the EA cooperation. This cooperative action is a basis to re-engineering processes to service-oriented business processes orchestration. These orchestrated processes are the basis of integrating different generation of enterprise information systems to construct the system layer of M-EA. The most popular four Chapter 5: M-EA Model PhD Thesis Page 159 Ming-Chien (Mindy), WU enterprise information systems are SCM system, CRM system, ERP system, and financial information (FI) system. Ng E. H. and Kwahk K. Y., (2010) stated that Mobile Internet service provide better the customer relationship development perspective. Moreover, RFID technology could specifically support the SCM system to help tracking the location of the materials and products. Composite mobile environment consists of various segments of wireless technologies such as 3G, also beyond 3G (Skianis et al, 2005), digital video broadcasting (Mastorakis et al, 2007), WLAN, and WiMax etc. People could hold various mobile devices through mobility server and web service to connect to Internet portal, including web and mobile portal to access the M-EA business process, system, and data structure. The technologies of Web Services build on top of XML, Web Services Description Language (WSDL) and Universal Description, Discovery and Integration (UDDI), provide an excellent basis for integrating the applications of the enterprise – particularly when they are on separate platforms. There is a need; however, to provide wireless glue to EA as outlined here. The solution for this requirement would result in strategic incorporation of applying MT into EA. People can reach the system by Internet through the native API/ XML, web forms, and web service. They can use their mobile, some with Bluetooth headphone, GPS, PDA, portable computer (laptop) through service provider (WAP)/ wireless Hub (HTTP) to connect with enterprise repositories – facilitated by EA (Finkelstein, 2006). Chapter 5: M-EA Model PhD Thesis Page 160 Ming-Chien (Mindy), WU Table 5.1: Mapping Zachman Table for the M-EA Framework Layer What (Data) How (Function) Where (Network) Who (People) When (Time) Why (Motivation) Scope Context Boundary Extended M- data M-Business processes Business operation locations Important organizational roles List of significant event Business goals and strategies Business Model Concepts Entity relationship model M-Business process model Business logistic system Work flow model Master schedule Business plan System Model Logic Logical data model Application architecture (SOA) Distributed WS system architecture Human interface on Mobile device Processing structure M-Business rule model/ Contracts Technology Model Physical Mobile data/ contents M-Business system design Mobile technology architecture (MWS) Presentation architecture Control structure Rule contract design As Built Component Configuration Mobile multimedia contents Program Mobile network architecture Security architecture Timing definition Rule specification Functioning Enterprise Instances Data Function Network organization Schedule Strategy Chapter 5: M-EA Model PhD Thesis Page 161 Ming-Chien (Mindy), WU From the worked out M-EA framework, which was produced from this research, on Zachman 6*6 cells table, and the output is listed in Table 5.1. When applying M-EA into business, there are several cells of Zachman framework required to be updated. The scope of motivation lists business goals and strategy of M-EA, which identifies that the aim of M-EA is to integrate different systems and extend with mobile technologies, in order to run the business processes in real-time and provide customer personal service at anytime and anywhere. The scope of business functions lists the important target m-business process, which identifies that reengineering the old business process to new m-business real-time processes. The scope of data lists the important extended M-data, which identifies the data extended from the new m-business processes. Additionally, the business model of functions is the M-Business process model which organizes the lists of use case to perform in use case diagram. Furthermore, the logic system model of people is looking at the human interface on mobile device which constructs the people and interface structure in human interface architecture diagram. The logic system model of motivation is the M-Business model which represents how each M-business process works in start chart diagram. Moreover, the physical technology data describes in detail the organization of the data extended from M-processes. The physical technology of business process is application architecture which represents all the M-process in class diagram. The physical technology of network is the all 7 layer design of mobile technology architecture which could help connect different location server in the enterprise to run the business processes more effectively. In addition, the component configuration of the network is the communication layer of mobile technology architecture which designs all physical wireless network connection in business area of the enterprise. The component configuration of people is the security layer which designs and sets up the access level of different users. Chapter 5: M-EA Model PhD Thesis Page 162 Ming-Chien (Mindy), WU 5.4.2 Extending M-EA model ! " # " ""$% ! "# $ ! % & ' Mobile Device User MSCM MCRM Mobile Strategy EIS ! "! &' " ( ) * ( + ,-$. / . 0 Figure 5.3: M-EA 5+1 Layers Model (adapted and extended from Unhelkar, 2008) The layered approach to M-EA reduces its complexity and provides sound basis for successful creation and management of mobile business processes, mobile organization, mobile contents, mobile security and mobile networks. An M-EA-based approach also implies that mobility is not treated by the business as an ‘add-on’ to the existing business and its processes. Instead, M-EA, mobility is considered as an integral part of the enterprise and reflected in all dimensions of the enterprise. This M-EA 5+1 layers model is created from the adaptation of the OSI 7 layers model and also from the result of literature review and case study by interviews. Chapter 5: M-EA Model PhD Thesis Page 163 Ming-Chien (Mindy), WU Layer 1 -Communication Layer Mobile Networks / Communications Architecture (Layer 1) Figure 5.3 shows the communications or network layer of mobile enterprise architecture. This is the first layer, or one could say the base layer of the architecture. This Layer 1 of M-EA model is instantiated from correspondence with the physical, network and transport layers of the OSI model. There are numerous mobile network technologies that form part of this layer. The network stacks in this network layer of the architecture start with the Transmission Control Protocol/ Internet Protocol Suite (TCP/IP) at the base, followed by the Wireless Application Protocol (WAP), personal area network (PAN) and, depending on the needs of the applications, metropolitan area networks (MAN). TCP/IP protocol (Stevens, 1994) stacks exist for all operating systems currently in use, and also used for Internet communication, web services, and messaging protocols. WAP is an open international standard for application layer network communications in a wireless communication environment, it is mostly used to enable access to the Mobile Web from a mobile phone or PDA ,which are wearable devices. PAN (Jelena, 2008) is a computer network used for communicating among computer devices, including mobile phones and PDAs, close to one person. MANs are large computer networks usually spanning a city. They typically use wireless infrastructure or optical fiber connections to link their sites. The network communications technologies further include the IEEE 802.1x group of standards, the generations (G) of cellular standards (i.e. 2G, 2.5G, 3G, 4G), Infrared, Bluetooth, RFID, Wi-Max and Wireless VoIP, the UMTS, GSM, GPS, CDMA standards (most of them have been introduced in section 2.5.2 of Chapter 2). The Chapter 5: M-EA Model PhD Thesis Page 164 Ming-Chien (Mindy), WU network architecture not only includes the stock of networks, but it also provides links or programmable interfaces for Infrared, Bluetooth and the cellular networks. These various mobile communications networks standards and protocols in this layer of M-EA can be roughly divided into two: the short range and long range networks standards. Short Range Mobile Networks The short range communication protocol standards are the IEEE 802.1 group of network protocols that support wireless communications on relatively shorter distances-usually few hundred meters. Examples of these short range uses are offices, homes and local ‘hotspots’ (such as a coffee shop). The IEEE 802.11b, also known as wireless Ethernet and Wi-Fi (wireless fidelity) is a widely used short-range standard for wireless communication that also combines well with a LAN environment. This Wi-Fi (Praphul, 2007) defines the physical layer and Media Access Control (MAC) layer of the short-range wireless networks. The other important protocols of this family are the 802.11a, and the 802.11g protocols. These protocols also employ the same MAC layer protocol for communication but they have a different range and bandwidth to the 802.11b. 802.11a operates at 5GHz, and 23 mbps, whereas 802.11g has 2.4 GHz frequency with a much higher 54 mbps transfer rate (Matthew, 2005). Wi-Max (worldwide interoperability for microwave access) is yet another standard for point-to-point communication that is based on radio-frequency standardized technology that commercializes the IEEE 802.16. Wi-Max (Wi-Max Forum, 2006) now evolved to a standard point-to-multipoint wireless networking, which also provides wireless Internet communication by using transceivers to base antennas. WiMax forum is supported by vendors and companies like: AT&T, Fujitsu, Intel, and Chapter 5: M-EA Model PhD Thesis Page 165 Ming-Chien (Mindy), WU Siemens mobile, British Telecommunications, France Telecom, and Quest Communications. Wi-Max can serve as cheap backbone technology compared to Wi-Fi, DSL, and cable technologies for IEEE 802.11 Wireless LAN hot spots to provide Wi-Fi services to mobile users (Vaughan-Nichols, 2003). IEEE 802.20 is another standard for mobile broadband communications technology provides high-speed wireless, IP based connectivity to mobile devices like cell phones, PDAs, and laptops (Ron, 2005). Bluetooth technology (Buttery and Sago, 2004) which operates at 2.4 GHz provides a very short-range radio frequency wireless connectivity between portable gadgets like mobile phones and PDAs etc. through communication. Bluetooth can also provide support to multipoint communication (in addition to point-to-point communication) due to its use of RFID. The M-EA needs to consider the most appropriate forms of these short range networks when it is initiated. Long Range Mobile Networks The long range mobile networks are primarily the cellular networks. The various standards in these cellular networks are identified through their generations, and following Table 5.2 summarizes these generations of cellular networks. Chapter 5: M-EA Model PhD Thesis Page 166 Ming-Chien (Mindy), WU Table 5.2: Different Generations of Cellular Networks 1G (1980s) Analog Cellular communication, used in early mobile phones. Not very clear and not secured either. However, this generation of networks introduced the mobile phone to daily use. 2G (1990s) Digital cellular networks used Global System for Mobile Communications (GSM). Popularized the mobile phone; relatively cheaper to use than the 1G network. Challenges of interoperability emerged immediately. 2.5G – 3G (2000s) Merging standards between the GSM and CDMA networks as well as convergence of device functionalities. Therefore, more opportunities for mobile business applications. Moving towards mobile Internet. 4G (2010s) True interoperability between all carrier networks resulting in seamless global mobility. Convergence of devices and applications. Security challenges due to feature-rich applications and wide-ranging networks. (Until this thesis written, the 4G hasn’t yet commercially realized and defined it.) 5G (2020s?) This generation is still in the realms of imagination and early experimentation. Potential business is in the areas of bio-technologies, bio-informatics, nano-technologies, and mobile green and so on. (The 5G should have matured in 2020s.) Currently, most cellular wireless networks are using the 2.5G standards. These network standards are evolving to 3G. However, 3G systems to be commercially viable, their quality-of-service (QoS) need to be improved considerably. The standards for 3G communication are the Wideband CDMA (WCDMA), Qualcomm and CDMA2000 Ericsson (Kuo and Yu, 2005). These transmission standards use direct sequence spread spectrum in a 5-MHz bandwidth. These standards have different chip rate, frame time, spectrum used, and time synchronization mechanisms. The WCDMA standard is able to communicate with the GSM networks. This interactive capability is strongly supported by the European Union, which calls it the Universal Mobile Telecommunications System (UMTS). The other standard, Chapter 5: M-EA Model PhD Thesis Page 167 Ming-Chien (Mindy), WU CDMA2000 is widely deployed in the United States, and is not able to work on the Internet with the GSM standard. The M-EA for a specific organization needs to specify the standard they want to use for communication. Global organizations and global roaming users across multiple geographic regions have a need to consider interoperability amongst the standards. Mobile application developers and content managers need to keep these communications standards in their background as they develop the applications. Ideally, the mobile applications which are executed on the handset should be independent of the communications networks. Mobile Internet The mobile Internet based on wireless communications results from a significant integration of the Internet and the wireless communications technologies. However, the researchers believe that the current network architectures used in either the wired Internet or the cellular networks would not be appropriate and efficient for future wireless mobile Internet. This is because the future demands from the mobile Internet are likely to be dramatically different, such as those mentioned in the 4G and 5G description in Table 5.2. For example, faster wireless connections with higher quality service will be required in, say, the healthcare domain, where secured mobile video conferencing and secured transfer of medical data (particularly image files) is an important part of the business process. Thus, even if we assume that the current cellular network infrastructure may provide the physical backbone of future networks, the architecture of the mobile Internet network is likely to be different from the current architectures. Chapter 5: M-EA Model PhD Thesis Page 168 Ming-Chien (Mindy), WU Integrated Architectures The short- and long-range cellular networks, as well as the Wi-Max networks, need to be considered in an integrated M-EA to enable interoperability of applications and devices. Wi-Max can help EA with integrating much more effectively the devices and applications as Wi-Max could provide a common communication network that interfaces easily with the other networks. M-EA integration can use WLAN (Burness et al., 2004) technology to enable all employees to access the enterprise systems anytime, anywhere. VoIP technology (Olla, 2005) together with M-EA can extend to reach the organization globally. The interactive capabilities of UMTS and UMTS Terrestrial Radio Access Network (UTRAN) make them part of many network architectures (Vriendt et al., 2002, and UMTSWorld, 2003). The UMTS network architecture consists of UTRAN which uses the network subsystem of GSM/ General packet radio service (GPRS) in order to support circuit switching (CS) and packet switching (PS). The circuit switched network is evolving from GPRS. The packet-switched network uses GPRS to provide a bridge between the core network and UTRAN. UTRAN consists of radio network subsystems, each of which contains one radio network controller and at least one base station. The network controller controls the logical resources for the base station which in turn manages the radio transmission and reception for one or more cells. The opportunities for network integration improve with the UMTS standard, provided it is available in a particular region. Example of network architecture Examples of mobile network architectures can be an Internet connectivity supported by a Wide Area Network through ATM and Frame Relay connections. The Chapter 5: M-EA Model PhD Thesis Page 169 Ming-Chien (Mindy), WU Asynchronous Transfer Mode (ATM) is a dedicated packet switched mechanism which divides and sends information into smaller packets across the lines of communications. The ATM enables transmission of complex multimedia (voice, text, data, image and video) simultaneously and with relative high speeds. The wireless Local Area Network (WLAN) provides a way of communication within localized areas within an enterprise. This WLAN based network topology includes installation of one or more wireless access points that provide Internet access to the specified areas within the enterprise. Furthermore, a Virtual Private Network (VPN) (Meeta, 2003) can also be used on top of the existing Internet. Such VPN provides a secured connection between the business and the external parties. VPN uses a narrow and dedicated network path which is not shared with other parties. As a result the VPN is far more secure than an open Internet connection and it provides a secured link to the WLAN within the office environment. The availability of network (usually 24 hours, 7 days a week) and its redundancy (ability of one part of the network to take over another ‘broken’ path) is another vital requirement from the network architecture. Therefore, the Frame Relay suggested in the above network architecture provides redundancy as a secondary line in case of failure. However, the packet-switching in Frame Relay, that divides data into ‘frames’ achieves transfer rates of about 2 Mbps and hence is used only as a redundancy mechanism. The advantage of combining the WLAN with existing Internet is that it provides users with ease of mobility, but within a specified area. The issues associated with the cost and security of full roaming need to be balanced with the advantage. Most Chapter 5: M-EA Model PhD Thesis Page 170 Ming-Chien (Mindy), WU office and factory environments where in users are equipped with wireless devices may not need full roaming capabilities as yet. In most cases, users with their mobile, some with Bluetooth headphone, GPS, PDA, portable computer (laptop) through service provider (WAP), or wireless Hub (HTTP) connect with enterprise repositories to access the enterprise information systems. Layer 2- Storage Layer Mobile Content / Database Architecture (Layer 2) Figure 5.3 shows the mobile contents and database architectural layer as the second layer of the M-EA model. This second layer of the M-EA model deals with the data aspects of the mobile systems including the sourcing of data, its storage, its provision and its maintenance. This Layer 2 corresponds roughly instantiated from the data link layer of the OSI model. The data related to mobile applications are made up of multitude types such as voice, video, images, charts and text. This varied nature of mobile data can be better referred to as ‘content’. Mobile contents have three separate challenges: sourcing of contents, their secured storage and provision or “mining” (Goh and Taniar, 2006) of content to applications and services. Each of these three challenges is affected by location-independence and personalization of mobility. The speed of access and the quality of content is vital for mobile applications. The modeling of the contents and mechanisms for their storage and retrieval play a part in the speed and access of the contents. However, speed and quality sometimes have opposing priority. For example, data mirroring enables redundancy and improved Chapter 5: M-EA Model PhD Thesis Page 171 Ming-Chien (Mindy), WU reliability, but it may have negative effect on the speed of access. The Real time data updates occurring from mobile devices are a challenge for data integrity. Further challenge of mobile database architectures is that it has to handle the ‘randomness’ of mobile user connections. Mobile users are mobile, therefore their needs for specific data or information also changes, depending on where they are. The provision and usage of data by such mobile user is thus non-continuous. This non-continuity of need for specific data, and corresponding connections, is a big challenge in mobile database architectures. A good architectural approach to mobile database architecture requires the data to be stored progressively as the application executes. This progressive storage ensures when the consumer of the data gets disconnected, and then reconnected either immediately afterwards or after a while, the application is able to recommence from where it got disconnected. There is a further need for the mobile database architecture to provide facility to reconcile and collate data resulting from mobile usage. This is because the challenges of multiple updates from multiple users of the same data item – already a challenge in the existing databases which are further exacerbated by mobile users. The moment the user moves her location, the location-specific information (e.g. the location itself) of the source changes. Mobile applications that are going to use this location-specific information need to handle not only the conflicts resulting from multiple updates, but also identify in the first place that there is a conflict even if the source of data is at two different places. Mobile database architectures need to reconcile the movement of the client especially when there are multiple entrees in a database by a single client. Chapter 5: M-EA Model PhD Thesis Page 172 Ming-Chien (Mindy), WU A data model is a mathematical formalism with a notation for describing data structures and a set of operations used to manipulate and validate that data. The aim of database architecture design is to provide faithful representation of such objects as columns in relational tables. There are two popular database design methods, Entity-Relationship modeling and normalization, both used for relational database management systems (RDBMSs) (O’Neil and O’Neil, 2000).In contrast, typical content management systems are the SQL Server (in the dotNet environments) and Oracle9i Database Enterprise Edition. Oracle9i is an object-relational database management system (ORDBMSs) that puts an object-oriented front end on a relational database. In addition to managing data, it is also able to handle transactions, provides correlations for business intelligence, integration and reliability. The other popular mobile service applications which need to be included into extending mobile database of M-EA are: • Instant messages: which require service providers to transmit the messages and store the messages into the mobile devices database. • Mobile web content: consists of web data that can be viewed via handheld devices and can be implemented using markup languages such as HTML, Compact HTML (Chtml), WML, XML, and Device Independent Authoring Language (DIAL). For example, i-mode devices use cHTML (Kamada, 1998) and WAP devices use WML (Wireless Application Protocol Forum, 2001). • On-line games: video games playable on the Internet that allow remote players to play the games together by using their mobile handheld devices. • Telephony: the most common operation performed by Smartphone users and Chapter 5: M-EA Model PhD Thesis Page 173 Ming-Chien (Mindy), WU requires the telecommunication company to provide the service. Structured Query Language (SQL) (Soren, 1991) is used to access most databases. Since SQL is an interactive query language, it should be embedded in a host language to effectively access databases. Several host languages with embedded SQL, such as SQLJ and OraPerl, are available. Java Database Connectivity (JDBC) (Linthicum, 2000) is the other most popular host language at present, which is JavaSpft’s Database connectivity specification. JDBC enables JAVA programs to execute SQL statements and allows JAVA programs to interact with any SQL-compliant database. JDBC is really helpful for nearly all RDBMSs support SQL and Java itself runs on most platforms. Furthermore, JDBC makes it possible to write a single database application that can run different platforms and interact with different DBMSs. Layer 3 - Binding Layer Mobile Middleware / Binding Architecture (Layer 3) Figure 5.3 shows the binding layer of a mobile system, based on the overall M-EA. This third layer (Layer 3) of the M-EA model deals with two aspects of binding: firstly, between the applications or services being offered, and secondly, between the contents and the applications. These mobile middleware technologies bring together, or ‘gel’ the various services or parts of a mobile software application. The need for mobile middleware is felt due to the dispersed services mobile environment, varying types of devices and their operating environment. Middleware technologies enable interaction amongst these Chapter 5: M-EA Model PhD Thesis Page 174 Ming-Chien (Mindy), WU various devices, applications and databases, systems by creating and use a common standard for the applications. Wireless Application Protocol (WAP) and i-Mode are the two well-known mobile middleware protocols used in mobile application development. WAP and i-Mode middleware platforms are built on top of existing network protocols of Transmission Control Protocol (TCP) and Internet Protocol (IP). WAP is the popular middleware global standard that allows applications to access and interact with many types of service providers. WAP is also a secure specification that allows users to access information instantly using mobile handheld devices such as smart phones and PDAs. WAP (Open Mobile Alliance, 2003) is a flexible standard that is supported by most operating systems such as PalmOS, EPOC, Windows CE, FLEXOS, OS/9 and JavaOS. Additionally, WAP supports most wireless networks, including CDPD, CDMA, GSM, PDC, PHS, TDMA, FLEX, ReFLEX, iDEN, TETRA, DECT, DataTAC, and Mobitex. Although WAP supports HTML and XML, the WML language is specifically designed for small screens and one-handed navigation without a keyboard. Furthermore, beyond the link-layer communication mechanisms provided by WLANs and cellular networks, the Wireless Application Protocol (WAP) is designed to work with all wireless networks. The WAP Gateway translates requests from the WAP protocol and submits them to the Web servers (Olla, 2005). For example, requests from mobile stations are sent as a URL through the network to the WAP Gateway. After processing, the responses are sent to the WAP Gateway in HTML, which are then further translated to WML and sent to the mobile stations or devices. WML (Wireless Markup Language) is a markup language based on XML, Chapter 5: M-EA Model PhD Thesis Page 175 Ming-Chien (Mindy), WU which is used in specifying WAP interfaces for mobile stations. WAP also supports WMLScript, which is similar to JavaScript but it has minimal memory and processing power requirements as it strips many of the unnecessary functions found in JavaScript. Another middleware technology, popular in Japan, is the i-Mode (2005) a packet-switched middleware Internet service. The use of packet transmissions offers continuous access, while the use of a subset of HTML makes content creation easy and makes it simple to convert existing website. This service for cellular phones is offered by NTT DoCoMo, enables continuous access to Internet sites, e-mails, and various mobile business applications like on-line shopping, banking and ticketing. Table 5.3: A comparison between the two major types of mobile middleware WAP i-mode Developer Open mobile alliance NTT DoCoMo Implementation A protocol A complete mobile Internet service Web Language WML cHTML Major Technology WAP Gateway TCP/IP development Key Features Widely adopted and flexible Highest number of users and easy to use Layer 4 - Process Layer Mobile Process / Applications Architecture (Layer 4) The mobile processes, applications and services of a mobile architecture are represented in the fourth layer in Figure 5.3. This Layer 4 includes the business processes, the models for collaborative web services and the business analysis required by the business. The enablers, the solutions providers and the application Chapter 5: M-EA Model PhD Thesis Page 176 Ming-Chien (Mindy), WU developers work in this layer of the M-EA model. The types of applications in this layer at the mobile user level are, for example, the billing applications and the mobile retailing applications. This Layer 4 corresponds to the 7th layer, the application layer, of the OSI model. Re-engineering An M-EA enforces reconsideration of all existing business processes from a mobile viewpoint. As a result, a synergy is brought about between loosely associated applications and processes by applying the concept of business re-engineering to Hammer and Champy (2001). Existing processes and new processes that can benefit by mobility need to be modeled and created ‘ground up’. Mobility has to be an integral part of these processes for them to derive full benefit from mobile technologies and be highly productive and efficient. Thus, one of the important contributions that this applications and services layer does in the M-EA model is that it dissuades the business from ‘attaching’ mobile devices at the end of existing business processes. Mobile devices used in the existing paper-based and even Internet-based processes only end up as ‘ad-hoc’ use of mobility. That ad-hoc use of mobile technology does not provide any strategic advantage and exploitation of the mobile technology. Interfaces Mobile application architecture needs to interface with the networks and middleware that will be used in its deployment. For example, billing applications need to be deployed on the cellular networks whereas micropayments or mobile retailing will need a combination of a Wi-Fi based WLAN together with the mobile Internet. The Chapter 5: M-EA Model PhD Thesis Page 177 Ming-Chien (Mindy), WU location of the execution of the application, the involvement of third-party deployments and security also need to be considered in mobile applications architecture. The transactive, operative and collaborative uses of mobility in business (as discussed in detail further) require the mobile applications and services to connect at every step of the application execution – either to get some information or authenticate parts of the transactions. Mobile application architectures can force connectivity at key points in the process. For example, rather than synchronizing the list of events to the local database, a mobile Web service can be used to retrieve a list of authorized events that the mobile user can synchronize with. Mobile application architecture suggests that the mobile database architecture to pool the data in one common database, as far as possible. This pooling of data in a common source enables streamlined process-flows and process architectures which are able to handle the information in a consistent manner. Mobile architectures also facilitate reuse through use of design patterns, such as the Observer pattern. Furthermore, this mobile application architecture needs to handle the replication of events on each client device. Creation or modification of events needs to be synchronized on each mobile device. Major Mobile Commerce Applications: Chapter 5: M-EA Model PhD Thesis Page 178 Ming-Chien (Mindy), WU Table 5.4: M-Commerce Applications Mobile category Major applications Types of enterprise Types of customers Education Mobile classrooms and labs School, university, and training centers Lectures and students ERP Recourse management and managing a mobile workplace for employees business employees Entertainment Games, pictures, music, video downloads and on-line gaming Entertainment industry All Health care Accessing and updating patient records, also includes financial payment system Hospitals and medical centers Patients Retailing Paying at vending machines, and checking products information, stock, and prices Retailers All SCM Material and products tracking and dispatching Delivery service center and transportation All Traffic Global positioning , routing services, toll/parking paying, and traffic advisories Transportation and auto industry Drivers Traveling service Reservation and paying services Airline companies, hotels, and travel agencies Travelers As list on the above Table 5.4, there are major 8 mobile commerce applications. All applications include following service processes: transactions and payment services, information sharing and updating services, and instant communication services. The mobile accounting software applications deal with customer billing, financial Chapter 5: M-EA Model PhD Thesis Page 179 Ming-Chien (Mindy), WU transactions and taxation processes. Advanced features can be different styles of invoicing (service, distribution and recurrent), multi-currency capabilities, multiple bank account capabilities, multi-warehouse inventory control and other advanced feature (Laukkanen, 2007, and Laukkanen et al., 2008). The security payments in mobile service are really important (Subramanian, 2009), which will be discussed more in the security layer. Example Applications of mobile hospital management system: The hospital management system scenario needs to have robust application architecture. This application architecture needs to handle the fact that the mobile users (for example, Patients) are only occasionally going to be connected to the system. The application behaviour and corresponding contents related to the patient can be easily divided into two parts – the relatively static part related to the registration and personal details of the patient, and the dynamic parts of the application such as the documentation of the consultation session and corresponding prescription (Susilo and Win, 2007). Furthermore, the mobile devices carried by the patients need to be synchronized with the content management system of the enterprise (Tounsi and Qureshi, 2008). Regardless of how the information is interchanged, the device needs to be connected before the event to obtain this information (D’Andrea et al., 2009). Mobile applications need to be designed in such a way as to enable their access and coordination between network operators and service providers. A hospital management system, for example, allows mobile access for patients, as well as for various staff such as physicians, administrators and nurses (Andersson et al., 2007). The system needs to support physicians whether they are in clinic, at the hospital, Chapter 5: M-EA Model PhD Thesis Page 180 Ming-Chien (Mindy), WU making house calls or at home themselves. Mobile applications need to be designed to keep the physician's actual “workflow” in mind. The mapping between the content management systems and the actual application for hospital management will include availability and processing of data related to all clinical activities such as patient history, reviews, details of physical exams, prescriptions and notes, results of diagnostic tests and so on (Malladi and Varshney, 2008). These details need to be made available in real time to the doctor and the patient, keeping the security of transactions and the privacy of users in mind. Layer 5- Presentation Layer Mobile Presentation / Usability Architecture (Layer 5) The top most, 5th layer of the M-EA model, as shown in Figure 5.3, is the presentation layer. This Layer 5 includes all aspects of presentation to mobile users including their devices, user interfaces and navigations. This Layer 5 corresponds with the 6th layer, the presentation layer of the OSI model. The devices, in this layer, are made up of mobile phones, I-Pods, Personal Digital Assistants (PDAs), Blackberries as well as “wearable” mobile devices such as GPS-enabled watches, email-only devices and handheld computers. Such wireless connected mobile devices are far more “personal” than mere desktop PCs. Therefore, the presentation layer needs to deal with the images associated with the use of these mobile devices (particularly by adolescents), their usability and their privacy. Thus, the mobile device manufacturers as well as the user interface designers are active in this layer of the M-EA. Following Table 5.5 are the lists of mobile devices available on the market and description of each mobile devices. Chapter 5: M-EA Model PhD Thesis Page 181 Ming-Chien (Mindy), WU Table 5.5: Mobile devices list and description Mobile device Description Mobile phones Also called cell phone, hand phone, cellular phone, wireless phone, which is a long-range, electronic device used for mobile telecommunications (such mobile telephony, text messaging, or data transmission) over a cellular network of specialized base stations known as cell sites. Current mobile phone has added many functions on standard voice function, such as Bluetooth, infrared, e-mail, voice recorder, radio, GPS, MMS, camera, MP3, and also could access to the Internet, which called multi-functions phone. Not all phones got all of the functions, but got several functions on one phone. PDAs A personal digital assistant (PDA) is a handheld computer also known as palmtop computer. Newer PDAs commonly have color screens and audio capabilities with employing touch-screen technology, enabling them to be used as Smartphone, web browser, or portable media players. Currently, many PDAs can access the Internet, intranets or extranets via Wi-Fi, Wireless Wide Area Networks (WWANs). Screen-phones A telephone equipped with a color screen, possibly a key board, e-mail and Internet capabilities. They are used mainly for e-mail or sending SMS. Blackberry To enhance wireless e-mail capabilities, includes a keypad on this e-mail handheld device to make it easy to type the message. It is an integrated package, so there is no need to dial into an Internet provider for access. A variety of services for data communication are available, so users can receive and send messages from anywhere. Laptop Portable PCs, which has been installed the completed operating system and needed program, can access the Internet by wireless modem, access the Intranet by WLAN or Wi-MAX. Smartphone Mobile phone offering advanced capabilities, often with PC-like functionality (PC-mobile handset convergence), could run complete operating system software to provide a standardized interface and platform for application developer. A smart phone is simply a phone with advanced features like wireless email, Web surfing, PDA, and MP3 functionality. Chapter 5: M-EA Model PhD Thesis Page 182 Ming-Chien (Mindy), WU A good mobile device should include following features: • Should be easy to carry with mobile user. • Input methods should be easy to understand and use. • Screen should be large enough for reading the contents and using the stylus without difficulty. • Memory and storage should be large enough for most mobile commerce applications. • Battery life should be sufficient for operations lasting several hours before the batteries need to be recharged. • Device- to-PC/ peripherals synchronization should be convenient and easy. However, the mobile nuances of location-independence and personalization play a significant part in this layer. The mobile user interface (MUI) challenges are more than the Graphical user interface (GUI) design challenges as the mobile devices have a much smaller screen space, lower battery life and higher demand for ruggedness (such as being able to read information in varying light conditions). Furthermore, mobile devices, particularly smart cellular phones, need to be able to handle multimedia contents. Smart phones with video facilities need the ability to record and play videos and audios with high resolution graphics. And finally, the users of these devices are on the move. The principles of usability, discussed by Constantine and Lockwood (1997), apply to mobile user Interface as much as they apply to other applications. Technical design in this presentation layer utilizes the application programming interfaces (API) to display as well as to receive information from the mobile user interfaces and connect Chapter 5: M-EA Model PhD Thesis Page 183 Ming-Chien (Mindy), WU that information to the mobile applications and underlying content management systems. Layer Plus- Security Layer Mobile Security Architecture (All Layers) The mobile security architecture applies to all layers of the M-EA model as shown in Figure 5.3. This is because each layer (from 1 to 5) in the M-EA model shown in Figure 5.3 has its own unique security requirement. Thus, the security deals with networks, data, middleware, applications and presentation layers. The pervasive need of security across all layers is seen in the OSI model and it is not a specific layer in the architectural framework as well. The increased mobile computing power of handheld devices introduces new security threats, which would be in the form of loss of confidentiality, loss of integrity and loss of availability. Password protection is a basic mobile security mechanism to be included in most handheld devices as a countermeasure (Guizani and Raju, 2005). Furthermore, network and application security measures also need to be considered when using mobile technologies. Security in mobile enterprises includes a wide variety of technologies, including authentication, cryptography, secure communications, and secure mobile payment methods. This mobile security is especially crucial, as communication through wireless and mobile networks is more vulnerable to be attacked than in the wired networks. Chapter 5: M-EA Model PhD Thesis Page 184 Ming-Chien (Mindy), WU Short-Range Security Security in short-range networks, based on the IEEE 802.11 standards, is the Wired Equivalent Privacy (WEP) (Bruce, 2005). This WEP corresponds to the data link level of the architectural frameworks. The architecture of WEP-based mobile security starts with a key on the mobile device that is also shared with the base. The encryption algorithm used in WEP is a stream cipher, which allows the mobile devices to be identified wherever they are, and whenever they connect to the base station. The newer version of the short-range protocol, called 802.11i, is expected to provide more enhanced security. Other short-range networks, such as Bluetooth, have a different security mechanism to the WEP. Bluetooth provides security by using frequency hopping in the physical layer, sharing passkeys between the master and the slave device and encrypting communication channels. Long-Range Security The security architecture for the long-range GSM networks makes use of the Subscriber Identity Module (SIM) that contains the subscriber’s authentication information, such as cryptographic keys. The cellular networks also have a unique identifier, called the international mobile subscriber identity (IMSI). The SIM is provided as a smart card in the mobile user device. The SIM key is stored on GSM’s network side in the authentication center (AuC). The IMSI is stored in the home location register (HLR). The GSM networks short messages allow being stored in the SIM and calls are directed to the SIM rather than the mobile terminal. As a result, the same SIM can be used across different terminals. The security features provided between GSM network and mobile station include IMSI confidentiality and authentication, user data confidentiality, and signaling information element confidentiality. Chapter 5: M-EA Model PhD Thesis Page 185 Ming-Chien (Mindy), WU UMTS is designed to reuse and evolve from existing core network components of the GSM/GPRS and fix known GSM security weaknesses such as the one-way authentication scheme and optional encryption. Authentication in UMTS is mutual while encryption is mandatory (unless specified otherwise) to prevent message replay and modification. In addition, UMTS employs longer cryptographic keys and newer cipher algorithms, which make it more secure than GSM/GPRS. WAP security is provided through the Wireless Transport Layer Security (WTLS) protocol (in WAP 1.0) and IETF standard Transport Layer Security (TLS) protocol (in WAP 2.0). These security protocols provide data integrity, privacy, and authentication. Security Platform (CLEW) An ideal mobile security approach is to build security features in the mobile application development platforms. An example of such an in built security is CLEW (Closed Loop Environment for Wireless) (Tatham, 2006). CLEW is an Intelligent Mobile Internet Interaction which is more secure than SMS message. Messages sent out by CLEW to recipients are authenticated by the recipients by signing off with a password. Therefore, it is much more secure than SMS, and also if the recipient does not sign off, the backend systems of CLEW can send out messages to other pre-agreed people in a list agreed upon with the organization until it schedules the required number of personnel (will discuss more details in Chapter 6). Updated M-EA model after validating it through 3 action research studies The above description is created from the researcher based on the literature review and case study result. After completing the 3 action research studies, the M-EA model has been updated as following Figure 5.4. Chapter 5: M-EA Model PhD Thesis Page 186 Ming-Chien (Mindy), WU ! " # %1 1 2% & 3,24 " ""$% ! $ ! % & ' $ 1 ! "! "# &' " ( ) * ( + ,-$. / . 0 2 Figure 5.4: Further Updated M-EA 5+1 Layers Model As shown on above Figure 5.4, the updated M-EA 5+1 layers model displays much clear of how each layer corresponding to the OSI 7 layer model. Additionally, after applying action research to M-EA model within the participating companies, the layer 1 – communication layer and the layer 2- storage layer are swapped with the layer 1 – storage layer and the layer 2- communication layer. This is so because the storage layer considers the enterprise database repository, which is the main based content in the M-EA model. Therefore, the communication layer changes from layer 1 to layer 2, and storage layer changes from layer 2 to layer 1 as shown in Figure 5.4. The more details about this validation will describe in Chapter 6, section 6.5.3. Chapter 5: M-EA Model PhD Thesis Page 187 Ming-Chien (Mindy), WU 5.4.3 M-EA migration road map for business At the case study by interview stage of this research project, the researcher has interviewed with experienced Enterprise Architects, Business Analysts, CIOs and IT executives. One objective of these interviews is to help us construct this M-EA implementation framework. These experts’ experiences indicate that enterprises need to understand the human, system, process, and technology aspects of the M-EA in order to reach a clear vision of M-EA and to build up the many services that support M-EA, Thus, creating the centre of excellence for similar cross-functional group, to provide resources and guidance, to serve as a repository for best-practice information, and to operate tools that support the M-EA implementation is the critical factor for success. M-EA implementation team Figure 5.5: M-EA Implementation Team (Curtis and Wu, 2009) Chapter 5: M-EA Model PhD Thesis Page 188 Ming-Chien (Mindy), WU This M-EA implementation team (see Figure 5.5) is designed and based on output from numerous interviewees. There are two cross-service architect teams: the first team is the Business Architects team, whose responsibility is to analyse the business systems, processes, information, and people structure of the M-EA; the second team is the Mobile Technology Architects team, whose responsibility is to support the creation of mobile technology solutions that meet the requirements from the Business Architects Team. The primary goal for these two teams is to understand how people work, who owns what responsibilities, and which interdependencies link business processes and technology resources. Based on expert advice and discussions with another EA, the team of Business architects in the framework is further divided into 6 groups and it covers internal and hybrid organizations. The teams within the internal organization have 4 groups which are Distribution and Marketing groups, Financial groups, Operations groups and Product and Placement groups. Team of hybrid organization has 2 groups, SCM and CRM groups. The goal for the business team is to discuss and agree on the business elements of an application. The architects of all groups in a business team have to determine their department direction, to describe the core business processes, to define the department services, to declare the application requests, to prioritize features and most importantly to meet the users and services requirements within the business strategy and to support the department’s objectives. Chapter 5: M-EA Model PhD Thesis Page 189 Ming-Chien (Mindy), WU The CIO interviewee pointed out that Mobile Technology architects team should be divided into 3 groups, which are the Analysis and Planning group, Implementation and Training group and the Support and Maintain group. After the Business Architects team has documented the requirements for business processing, the Mobile Technology team formulates how to implement this technology to maximize the effectiveness of the business process implementation and to provide a better services. The goal for mobile technology team is to discuss and agree on how to manage the technological underpinnings and support to the business. The architects of the Analysis and Planning group initially analyse the emerging mobile technology and the adapted infrastructure. The architects should investigate the technical complexity of implementing the new mobile technology. The IT Executive manager interviewee provided some questions that need to be addressed in this stage including: • Could the chosen mobile technology integration of M-EA support hardware, software and database software within the current structure support or not? • Does the organisation have the right skills and expertise to implement or whether outsourcing is required? • How will this knowledge be transferred to support and maintain group internally if outsourcing is required? After investigating and answering all the aforementioned questions from the architects and the analysis team helps to understand how the M-EA utilizes the original enterprise information systems, servers, database and infrastructure. This can Chapter 5: M-EA Model PhD Thesis Page 190 Ming-Chien (Mindy), WU then be followed by making plans for implementation and getting corresponding funding to do so. Needless to say, the architects have to make available to the organization options for their transition plans. Once the final implementation plan is completed, the documents and the work are passed to the Implementation and Training team. The implementation team follows the plan and also provides service and mobility solution to business architect team. The training of M-EA needs to be organized, so that is decided who should attend the training class, how to hold the class, and also the real-life practice training period support. Therefore the help desk, desktop support, production support, systems team, computer operators, also the support and maintenance architect group should be trained during the implementation period. The support team and maintenance team should have the mobile technology support outline or handbook from training group if the implementation project is outsourcing. Finally once the M-EA is successfully implemented, the support and maintenance team should be able to fix and respond all the problems for M-EA Business architect team. The implementation of M-EA should use "Current" and "Target", "As-is" and "To-be" framework to identify the clearly process migration plan from current different generation EIS to the Enterprise target dream architecture, which is M-EA. The manner in which this IT and mobile technology incorporation takes place successfully is studied here through the framework outlined in the migration plan table. The migration table plan lists information system lifecycles including description, analysis, design, and implementation plan of current state of enterprise, and desired target state M-EA of enterprise. Following Table 5.6 is the designed Chapter 5: M-EA Model PhD Thesis Page 191 Ming-Chien (Mindy), WU migration plan table of M-EA implementation for this research. Table 5.6: M-EA Migration Plan Table (extended from Wu and Unhelkar, 2009) Firstly, M-EA implementation team understands the key factors of people, process, technology, data, and system of current EIS; analysis and document them into the current state description section. From those documentations, it should find the gap and draw the diagrams to show the reserve assessment indicator for the target state. After that, M-EA implement team discusses with the company of those diagrams and those assessment indicator results. Moreover, it is critical to discuss in the meeting to analyse and decide which IT and MT infrastructures could be extended with current EA as target M-EA opportunities into their company. After meeting, the M-EA implement team will construct the current EA diagrams and also target M-EA diagram to show how the MT could be adapted to new M-EA, and make the new M-EA to be Current state “as-is” Desired Target state “To-be” Details of Documentation Description Key factors Reserve assessment indicator Platform and interoperability diagrams from existing enterprise information systems Analysis Assessment indicator result Target M-EA opportunities Which IT and MT infrastructures want to be existed and extended with current EA Design Construct current EA Construct Target M-EA M-EA diagrams show how new M-EA can be matched with target M-EA Implementation plan Target M-EA opportunities result Target M-EA implementation plan M-EA migration progresses of data, process, system, people implementation Chapter 5: M-EA Model PhD Thesis Page 192 Ming-Chien (Mindy), WU matched with the enterprise expected extension. Furthermore these diagrams will have to be modified through meeting with the company to conclude with final decision which MT application opportunities they would like to integrate into their M-EA and have a plan schedule to show how the implementation processes and timeline should be achieved. After finalizing the implementation plan schedule, the implementation plan tables of people, processes, technology, data and systems have been completed as well. At the last stage, the M-EA implement team has constructed the comprehensive M-EA implementation table to prevent duplication of implementation process between different factors’, implementation tables, also take effective life cycle of the implementation processes and reduce the implementation schedule time. M-EA Transition Road Map A good M-EA enables the organization to respond to its goals. These goals of an organization can be driven by technology changes (disruptions) or business changes. The transitions of an organization from where it is to where it wants to be (goals) are outlined in a transition path, or ‘road map’. An overall M-EA can be made up of numerous road maps, which apply to different situations within the organization. A mobile enterprise transition roadmap is discussed in the Mobile Enterprise Transition and Management book by Unhelkar (2009b). Chapter 5: M-EA Model PhD Thesis Page 193 Ming-Chien (Mindy), WU Figure 5.6: M-EA Transition Road Map (adapted from Unhelkar, 2009) Figure 5.6 depicts this mobile enterprise transition roadmap, which is made up of the four dimensions of economics, technology, process and sociology. These dimensions of a mobile transition maps with four out of the six columns discussed earlier in the Zachman framework. The economic dimension of the transition provides the motivation (why), the technical dimension is the ‘what’, the process dimension is the ‘how’ and the social dimension deals with the people ‘who’. The recommendation in terms of application of the transition roadmap is that it should also evolve – gradually incorporate increasing levels of complexities of mobile technologies from all five layers of the M-EA framework shown earlier in Figure 5.3. These increasingly complex transition of business with mobility is also Chapter 5: M-EA Model PhD Thesis Page 194 Ming-Chien (Mindy), WU outlined in Figure 5.6 through the mobile-informative, mobile-transactive, mobile-operative and mobile-collaborative usage. The mobile-informative use of mobile technologies is by business deal with the one-way communication to its users on their mobile devices. The mobile-informative use incorporates transmission of informative messages such as weather reports, train and plane schedules and advertisements. The mobile-transactive use of mobile technologies by business is a two-way communication between the business, its customers and other external parties. This mobile-transactive use is what is understood as mobile commerce, wherein purchase of goods and services is involved, and the corresponding payment through a visa. Therefore, the mobile-transactive usage is more complex than the mobile-informative use. The mobile-operative use of mobile technologies by business includes not only the above two informative and transactive uses, but also the use of mobility in all internal operations of the business. Internal processes like inventory management, timesheets and payroll management start using mobility in this use. Mobile-collaborative includes all three above uses but, in addition, there is collaboration amongst numerous businesses with the help of mobile web services. The MEA for a collaborative use of mobility requires proper understanding, modeling and application of services-orientation as discussed further. Chapter 5: M-EA Model PhD Thesis Page 195 Ming-Chien (Mindy), WU 5.5 Summary of this chapter This chapter has discussed the comprehensive M-EA structure, which includes a framework, a model, and transition roadmaps, in detail description. This research offers a blueprint picture of how the people, systems, process, data, and internal and external factors that contribute EA in M-EA framework. This M-EA framework is an abstraction of how the emerging technologies or new methodologies fit with an organization’s mobile information communication technology requirements. This research project provides the transition process from the current status to target status for the company in transition road map, which aims to show the enterprise how to schedule from the different generation EIS situation to particular M-EA. M-EA 5+1 layers model demonstrates how MT helps in each 6 layers and connects seamlessly to each other. The researcher also updated the comprehensive version after validating the model through 3 action research studies, the detailed discussion of the action research studies result will be documented in next chapter (Chapter 6). Chapter 6: Validating M-EA Model by AR PhD Thesis Page 196 Ming-Chien (Mindy), WU Chapter 6: Validating the extension of Mobile Enterprise Architecture (M-EA) through action research 6.1 Overview of this chapter This chapter describes further validation and extension of the Mobile Enterprise Architecture (M-EA).The outcome of the case studies (described in section 4.8.4 of Chapter 4) forms the basis for refinement of the validation criteria and input. Extension of Mobile Enterprise Architecture (M-EA) structure is based on the work carried out in the previous Chapter 5. The action research studies of three companies that agreed to participate are described in this chapter. The selection of three organization within Australia was done keeping in view their diversity in terms of their size, nature of industry, the level of technical sophistication, their organizational background, processes involved, their willingness and readiness to participate in this research. Further validation of the M-EA structure is summarized at the end of the chapter. 6.2 Objectives of the action research studies Action research, as explained in the research methodology discussion in Chapter 3, is a collaborative approach to research that provides people with the means to take systematic action in an effort to resolve specific problems. This approach endorses consensual, democratic and participatory strategies to encourage people to examine reflectively their problems or particular issues affecting them or their community. Furthermore, it encourages people to formulate accounts and explanations of their Chapter 6: Validating M-EA Model by AR PhD Thesis Page 197 Ming-Chien (Mindy), WU situation and to develop plans that may resolve these problems. The empirical research was carried out as action research studies, including a study of the existing EISs, EA, and MT usage in organizations in order to understand the impact of M-EA structure in their enterprise. Technically, the three participating companies were asked to help validate different parts of the M-EA structure. Firstly, the mobile communication company aim was used to validate and also extend each of the 5+1 layers of the M-EA model. Secondly, the consulting company was used in the action research study to help upgrading the implementation of migration project plan; and thirdly, the security / transaction processing company helped with extending M-EA on a security specific aspect. 6.3 Designing action research project This action research aims to validate the M-EA structure by introducing the model developed to the participating companies and getting feedback from their vast experience and knowledge The ‘Action Research’ approach could be explained as a participatory form of research method wherein the researcher introduces changes into processes and then observes and documents the corresponding effects of these changes. Therefore action research offers a very scientific and subtle way of observing changes in an organization and introducing new changes without drastically changing the ongoing operations of the organization. The “action” research means doing some actions in the company and getting feedback, followed by changing the plan from feedback, and repeating to see the validation results. It finally aims to get the best of M-EA model to achieve the research project objectives. The proposers of this research believe that this will be the most appropriate form of research to be carried out in the practical settings of this research project. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 198 Ming-Chien (Mindy), WU This research chooses three companies with different sizes and industries; each of the company has its expertise in IT, business, and mobile communication industry. The purpose of gathering their experts’ experiences and company technology is to help validate our M-EA structure in a more comprehensive and functional manner. Table 6.1: Details of the participated action research enterprises Company Size Industry Aim A Large Mobile Communication Validate 5+1 layers model part B Medium IT Consulting Upgrade the implementation migration project plan C Small Security/ transaction processing Technology Validate security part The first action research wass carried out in a mobile communication enterprise which provides mobile communication products and services to other business, companies, or organizations. This enterprise provides technological services to other organizations in order to increase its performance and quality. This enterprise was selected because it is a large-sized company having its own EA consultant team which has broad knowledge and experience in delivering and implementing EA to other companies. The enterprise participated in order to see how mobile communication technology could be introduced to its customers’ existing EA structure. The second action research was carried out in an IT business consulting company which provides integrated IT into business processes services to other business, companies, or organizations. This company helps other organizations to set up the Chapter 6: Validating M-EA Model by AR PhD Thesis Page 199 Ming-Chien (Mindy), WU integrated IT plan and get other organizations to outsource the business process transaction project. Company B has its own business analyst team and project development team. This enterprise was selected because it is a medium-sized company and has its own business analyst consultant who has vast experience in handling the project of integrating IT into business processes as well as having its own project development methodology to handle these projects. The enterprise would like to know how mobile technology can be integrated into business processes so that it could be introduced to its customers to enhance its market competition. The third action research was carried out in the security technology company which provides a security platform to a mobile transaction payment system service to other businesses, companies, or organizations. This company provides security technology to be integrated into other companies’ mobile payment transaction process. The company then uses this service to provide more secure mobile business payment transactions to its consumers. This enterprise is selected because it is a small-sized company and has its own security technology. The enterprise participated to find out how its security technology could help extend EA with mobility in order to enhance its security technology market competition. 6.4 Validation criteria for against M-EA and its expected outcome Table 4.8.2 in chapter 4 has listed the expected outcome from the interviews, and Section 4.8.4 has already discussed these interviews expected outcome after implementing M-EA into the company. After analysing the expected outcome and referring not only as the M-EA 5 aspect but also the M-EA 5+1 layers model, the researcher adds two more points and designs to the following Table 6.2 as the action Chapter 6: Validating M-EA Model by AR PhD Thesis Page 200 Ming-Chien (Mindy), WU research project validation criteria. The first column of Table 6.2 shows the criteria of mapping to the 5 aspects – people, process, data, system, and technology aspects. The second column shows it mapping to the 5+1 layers M-EA model – presentation layer, process layer, storage layer, binding layer, and communication layer. This table brings M-EA framework and M-EA model together; moreover, it also shows how enterprise could investigate and what to expect of the IT and MT direction in the near future. Table 6.2: Action research project validation criteria M-EA 5 Aspects M-EA 5+1 layers model M-EA Validation Criteria (for Action Research project in real organizations) PEOPLE Presentation Layer • Mobile Device Usability • Mobile Office • Customer Personalization Service PROCESS Processes Layer • Service-Oriented Process Orchestration • Real-time response • Mobile control and monitoring • Mobile commerce and Mobile payment DATA Storage Layer • Mobile Data (Extended Data Repository) • Mobile Information Service SYSTEM Processes Layer • Accessing any system (M-SCM/ M-CRM/ M-ERP) anytime and anywhere due to Mobility Location-Independence Technology Binding Layer Communication Layer • Mobile Communications • Mobile Internet Service and Applications • Middleware Platform helps integrate different languages within each layer The “people” aspect, which verifies as the “presentation” layer of M-EA model, contains three validation criteria points: Mobile Device Usability; Mobile Office; and Customer Personalization Service. It focuses on investigating if the enterprise could Chapter 6: Validating M-EA Model by AR PhD Thesis Page 201 Ming-Chien (Mindy), WU provide the employee with a mobile device in the work environment, and provide the personalization service to its customer after extending the EA with mobility. The “process” aspect, which verifies as the “process” layer of the M-EA model, includes four validation criteria points: Service-Oriented Process Orchestration; Real-time response; Mobile control and monitoring; Mobile commerce and Mobile payment. It focuses on finding, whether the enterprise could provide better real-time M-business service, including mobile payment and control products processes, after extending its EA to M-EA. The “data” aspect, which verifies as the “storage” layer of the M-EA model, comprises of two validation criteria: Mobile Data (Extended Data Repository); and Mobile Information Service. It focuses on investigating what the company provides to its customer in order to get information and to process its own mobile devices after extending its EA to M-EA. The “System” aspect, which verifies as the “process” layer of M-EA model, includes only one validation criteria: Accessing any system (M-SCM/ M-CRM/ M-ERP) anytime and anywhere due to Mobility Location-Independence. It focuses on observing how the enterprise provides its system users, access to the system anytime and anywhere after extending its EA with mobility. The “technology” aspect, which verifies as the “communication” layer and “binding” layer of M-EA model, contains three validation criteria points: Mobile Communications; Mobile Internet Service and Applications; and Middleware Platform which helps integrate different languages within each layer. It focuses on Chapter 6: Validating M-EA Model by AR PhD Thesis Page 202 Ming-Chien (Mindy), WU researching how the enterprise could provide better communication and Internet service by secure platform after implementing M-EA. 6.5 Action research company A The first action research project was carried out at Company A. This action research applied Mobile Enterprise Architecture (M-EA) 5+1 layers model together with the existing mobile transition roadmaps within the company, in order to create Company A’s Mobile Enterprise Architecture (CAMEA). This CAMEA would not only specifically fill the request from Company A, but also help the researcher validate the original M-EA structure to comprehensive M-EA. 6.5.1 Background of the mobile communication company Company A as an enterprise provides professional expertise, world-class methodologies, consultation, and application service with adaptive platforms, intelligent solutions and advanced projects to deliver the business expected by its customers. It has over 10 million customers and 160,000 professional staff in 60 countries around the world. There are 3,000 employees in Australia and New Zealand. Company A is a full service provider of information technology and communications solutions. The company partners with the customers to consult, design, build, operate and support business solutions. From strategic consulting to application and infrastructure solutions and services, Company A has earned a reputation as the single supplier of choice for leading corporate and government organisations. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 203 Ming-Chien (Mindy), WU Company A’s consulting services provide proven methodologies that deliver results. The skilled professional team draws on a rich pool of in-depth experience and intellectual property., by linking organisations’ business strategies and change agendas to enable technologies that are already delivering value for a prestigious portfolio of clients spanning government departments, manufacturing, banking and finance, retail and service industries. 6.5.2 Modeling of processes in the company Firstly, the researcher introduced the M-EA structure to Company A’s EA consultant team and discussed validation criteria with them. After the short presentation and discussion with the consultant team, about the process within the Company, the researcher decided to conduct a detailed discussion about each layer in each meeting during the action research project, which would be followed by validating each layer with criteria that is updated from the original M-EA model to fully comprehensive M-EA structure. Finally, Company A gave suggestions and comments about the M-EA structure, and also received a formal report and 30 minutes presentation of CAMEA to the EA consultant team. The EA consultant team has lots of experience in implementing EA to other company’s, and this gives this action research project more of a standing. Their experience and knowledge helps us to validate M-EA model in more detail and comprehensive way. They suggested that the researcher goes into details about each layer in order to provide more information and technology in a major figure for each layer. These figures could make the reader easier to understand as to what should be Chapter 6: Validating M-EA Model by AR PhD Thesis Page 204 Ming-Chien (Mindy), WU integrated in each layer of the M-EA model, and as well as provide more suggestions to the company to understand which technology can be chosen to be integrated into M-EA model. 6.5.3 Discussion of findings that validate M-EA The following (Table 6.3) shows how CAMEA validates the company’s status before and after applying M-EA into its EA structure by using the action research validation table. The company enterprise architecture consultant team’s suggestions and comments are also documented into this table. Table 6.3: CAMEA Validation M-EA Table M-EA Validation Criteria Before M-EA was applied in the Organizations CAMEA Observation/ Comments/ Modification from Company • Mobile Device Usability Ad-hoc Customised to the user • Handling requirements of different levels of users (e.g. Manager had less need to shield the mobile screens; Workers had to be provided with larger font sizes etc. • Mobile Office Informal Formal • Teleworking was improved due to mobile usage. Meetings were scheduled using mobile conferencing facilities. • Customer Personalization Service Not personalization Personalization • As enabled by integrated mobile architecture. • Real-time response Asynchronies Synchronize • As seen in company’s mobile processes. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 205 Ming-Chien (Mindy), WU M-EA Validation Criteria Before M-EA was applied in the Organizations CAMEA Observation/ Comments/ Modification from Company • Service-Oriented Process Orchestration Unstructured Structured • Enabling mobile collaboration. • Mobile control and monitoring Not specific Specific • Updated the data in real-time. • Mobile commerce and Mobile payment Not provide Provided • Updated Mobile payment processes and allow the customer do M-commerce. • Mobile Data (Extended Data Repository) Disconnected Connected • Extended Mobile data adapt to run new mobile processes. • Mobile Information Service Website only SMS info customers • Company can provide more personalized information and advertisement to its customers. • Accessing any system anytime and anywhere due to Mobility Location- Independence Closed; dedicated open • Earlier, when systems have to “Interface”, they issue dedicated calls. After M-EA, they have opportunities to use mobile web services. • Mobile Communications Only for private use Business contact • Company provides mobile communication network/ service for the employee. • Mobile Internet Service and Applications single multiple • Multiple services and applications collaborating. • Middleware Platform helps integrate different languages within each layer No Consider • Consider to add enterprise bus or middleware platform into EA. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 206 Ming-Chien (Mindy), WU The validation from Company A is not only for completing the table, but also going into detail to discuss and validate each layer of the M-EA 5+1 layers model. The result is shown in 6 single diagrams from each layer, as well as the suggestion to present the confirmation of the OSI 7 model to our M-EA 5+1 layer model. The following section shows the model after validation from Company A. ! " # $% % &$ ' ()&* " ""+$ ! " % ! "! # $$% &' ', " - . / - 0 )1+2 3 2 4 & Figure 6.1: CAMEA 5+1 Layers Model Figure 6.1 after discussion with consultant team, creates the CAMEA 5+1 layers model for the Company A. This model is modified from the original M-EA 5+1 layers model, which is shown in Figure 5.3. This modification is because the consultant team suggests the “data” is the basic concept of the computer system. Networks link the data together, and therefore should be changed to layer 2. This figure also notices the communication from the OSI 7 layers model to the M-EA 5+1 Layers model. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 207 Ming-Chien (Mindy), WU Layer 1- Storage Layer Mobile Content / Database Architecture Figure 6.2: CAMEA Model Layer 1- Storage Layer Figure 6.2 shows CAMEA Model Layer 1- storage layer, which presents the mobile databases that need to be extended from the original enterprise repository. In this layer, the EA consultant team suggested 7 steps to build this data layer: Step 1: creates the data organizational model, which defines the data principles, data constraints, data assumptions, and data access standards. Step 2: creates the data diagnostic model, which defines all the data assets, both legally and planned. Step 3: creates the subject area data model, which identifies for the first time the main subject areas in the data model design effort. Step 4: creates the conceptual data model, which analyses to look into the overall data requirement of the proposed information system. A detailed specification of the data entities, a list of attributes that characterizes each entity and a complete set of Chapter 6: Validating M-EA Model by AR PhD Thesis Page 208 Ming-Chien (Mindy), WU entity relationships that are technology independent are documented in this step. Step 5: creates the logical data model, which extends the model effort represented in the logical data model to accomplish relations and normalization. Step 6: creates the physical data model, which defines and quantifies fields that populate the various tables in the database, and also identifies the primary and foreign keys by agreeing on naming conventions for tables and fields, and by deciding on the database environment itself. Step 7: communicates the data architecture view to teams and projects, which documents and communicates to other IT engineering teams and projects through reports, presentations, solicited within comments, and invitations to engineering and customer (EA owner) personnel to attend the working session of the M-EA implementation project and the M-EA data model team. Layer 2 -Communication Layer Mobile Networks / Communications Architecture (Layer 2) Figure 6.3: CAMEA Model Layer 2- Communication Layer Chapter 6: Validating M-EA Model by AR PhD Thesis Page 209 Ming-Chien (Mindy), WU Figure 6.3 shows CAMEA Model Layer 2- communication layer, which presents the various communication networks in a composite radio environment. Mobile devices connect to networks by using Uniform Resource Locator (URL) Binary language from requesting entry of networking and WML Binary language to response from networking. The networking includes not only the Internet, but also pervasive networking and use HTTP or Simple Mail Transfer Protocol (SMTP) request and responds in the composite radio environment. Virtual Private Networks allows mobile users to access the corporate network using the Internet as the transmission medium. VPN makes possible the secure exchange of information across a public network which is indispensable when deploying mobile devices in radio network. In this layer, the EA consultant team suggests 3 parts to build this communication network layer: Part 1: choose from the most suitable short range mobile network, such as Wi-Fi, Wi-Max, LAN, WLAN, RFID technology. Part 2: choose long range mobile network, such as mobile satellite, 2G, 2.5G, 3G, or 4G communication network and available mobile device. Part 3: consider whether to implement Mobile Internet into M-EA or not. Layer 3 - Binding Layer Mobile Middleware / Binding Architecture (Layer 3) Chapter 6: Validating M-EA Model by AR PhD Thesis Page 210 Ming-Chien (Mindy), WU Figure 6.4: CAMEA Model Layer 3- Binding Layer Figure 6.4 shows CAMEA Model Layer 3- binding layer, which presents different computer languages that could communicate to each other by using middleware platform or enterprise bus. In this layer, the EA consultant team mentions that middleware is not only the glue for communicating between different layers, but also for communicating between different languages in the same layer. TCP/IP could be used in network communication layer, .NET, JAVA platform could be used in presentation layer, SAP platform could be used in process layer, and Oracle could be used in storage layer. There are several middleware platforms and languages available in the market, such as CORBA, WAP, and i-mode. Moreover, there are also some hardware infrastructures, such as hub, and adopter that could be selected when building this layer. Layer 4 - Process Layer Mobile Process / Applications Architecture (Layer 4) Chapter 6: Validating M-EA Model by AR PhD Thesis Page 211 Ming-Chien (Mindy), WU Figure 6.5: CAMEA Model Layer 4- Process Layer Figure 6.5 shows CAMEA Model Layer 4- process layer, presents the various business processes; from re-engineering to service-oriented real time processes. The EA consultant team lists eight more popular business processes in a common enterprise, which include: ordering process, scheduling process, operation process, dispatch process, resourcing process, supporting process, reporting process, and financial process. The system of MCRM (includes: customer based marketing analysis channel management business processes), MSCM (includes: demand planning, supply chain planning, and transportation these supply chain business processes), and MERP (includes: ordering, purchasing, human resource, accounting these back-end business processes) all need to be integrated and orchestrated into M-EA. In this layer, the EA consultant team suggested 7 steps to build this business process application layer: Step 1: gathers list of business functions and requirements, which includes review of Chapter 6: Validating M-EA Model by AR PhD Thesis Page 212 Ming-Chien (Mindy), WU system requirements, business processes, and business systems hierarchy. Step 2: application principles, assumptions, and constraints, which includes approved security mechanisms and computer languages, and object-oriented approach. Step 3: general applications model, which includes client server for human-computer interaction, web server with applications and controlled means for data access. Step 4: defines application design rules, which explains how application components work across web servers, client servers, and data stores, that support technology architecture. Step 5: application templates and languages tools, which link development products to technology components, and automated development tools. Step 6: allocates applications to architecture components, which distribute applications across business systems, servers, and data stores. Step 7: communicates applications architectural view, which presents applications architecture above to all business and IT engineering teams, validation and feedback, and review the revise applications architecture. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 213 Ming-Chien (Mindy), WU Layer 5- Presentation Layer Mobile Presentation / Usability Architecture (Layer 5) Figure 6.6: CAMEA Model Layer 5- Presentation Layer Figure 6.6 shows CAMEA Model Layer 5- presentation layer, which presents the various important consideration point of choosing mobile devices. There are four mobile devices: mobile phone, laptop, smartcards, and PDA, which are used widely in the market today. In this layer, EA consultant team suggests 7 points to be considered for building this presentation layer: 1) Screen size: Mobile devices have limited screen size. Therefore, it is vital that screen size be fully utilized. The various functions available in a mobile application need to be organized in a logical and organized manner, depending on the requests of the users. The screen size must be large enough for mobile users to read the content effortlessly and use the stylus without difficulty. 2) Battery life: Mobile devices are powered by batteries that have relatively short life – both in their daily usage (changing and recharging) as well as the overall Chapter 6: Validating M-EA Model by AR PhD Thesis Page 214 Ming-Chien (Mindy), WU operational life of the batteries. The processors on the devices should be powerful enough to use as little power as possible to extend battery life. Most mobile gadgets have batteries that last from 2 to 7 days and beyond depending on the usage. Advances in battery technology means recharging of phones have become convenient and easy. Many public places such as airports and hotels have recharging booths provided with compliments of the manufacturers. 3) Ruggedness: The mobile device should have the durability and ruggedness capability to function in any kind of physical environment. The mobile device must be in a working condition despite high temperatures, freezing temperatures, moisture and impact and yet provide clear voice clarity in these conditions. 4) Usability: Usability of mobile applications and corresponding mobile devices plays an important role in making mobility acceptable to customers. The device should also be simple enough for developers to write applications. Also the device should be compatible with various accessories to be used with it. The memory and storage must be large enough for most mobile commerce applications. 5) Navigation: The navigation becomes all the more important in a short-screen-space mobile application, in which the logical grouping, dependency, and performance of each mobile page is vital for the usability of the application. 6) Language: Conversion from one language or culture to another is a feature that the device can support. However, this conversion and language support is still at a physical level. The users would want this conversion to be automatic and sufficient across different language, time zones, and regions of the world. 7) Privacy: Mobile business need to ensure the privacy of information in especially sensitive area such as patient records, child tracking, shopping habits and credit ratings. Mobile business need to realize that personal data is even more important than searching for more customers and selling more services to them as it helps Chapter 6: Validating M-EA Model by AR PhD Thesis Page 215 Ming-Chien (Mindy), WU build trust before enforcement of legislation. The provision of location-specific services can no longer be based on trust alone between the parties involved. There is a need for regulations to monitor and manage the privacy of the information. Layer Plus- Security Layer Mobile Security Architecture (All Layers) Figure 6.7: CAMEA Security Layer for all Layers Figure 6.7 shows CAMEA Model Layer plus- security layer, which presents the various security focus on all 5 layers. In this plus layer, the EA consultant team suggests 6 security methods that could be implemented when building M-EA: 1) ID authentication: provides a means for identifying a user. After being authenticated, the user can be granted access to the services one requires, and the activities can be monitored. Authentication mechanisms range from the familiar username and password to authentication certificates to sophisticated biometrics Chapter 6: Validating M-EA Model by AR PhD Thesis Page 216 Ming-Chien (Mindy), WU systems which authenticate users through physical characteristics such as fingerprints. ID authentication is a foundation of any security implementation, and is usually a key part of other security solutions (Wiehler, 2004). 2) Cryptography: Cryptography is a technology about hiding information. Applications of cryptography include ATM cards, computer passwords, and E-commerce. Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information into unintelligible gibberish. The encryption technology can be divided into two parts: transport encryption technology and data encryption technology (Davison et al., 2008). Transport encryption is implemented in standard transport protocols such as the Transport Layer Security (TLS) and the Secure Socket Layer (SSL),protocols used for communication via Internet as well as the Wireless Transport Layer Security (WTLS), protocol designed for WAP applications in wireless network. These protocols allow the transmission of messages that are secured from eavesdropping, tampering or message forgery. Data encryption is applied to protect any content (text, data, photo, voice, video) stored on any movie devices, server, or other storage repository and to assure that only authorized user who process the secret (key) needed for decryption can access and manipulate the content. 3) Secure mobile payment method: Secure mobile payment service is a secure, universal e-payment or m-payment transaction method, which allows real time payment transactions independently of the type and value of the purchase. The transaction processes could be as follows: After, having selected the required goods, customer receives certain payment transaction related data from the commercial, such as an electronic invoice. Having received the necessary transaction details, the customer prepares and signs a payment request and Chapter 6: Validating M-EA Model by AR PhD Thesis Page 217 Ming-Chien (Mindy), WU forwards it to its own payment processor. Necessary funds if available the commercial receives a payment confirmation, a kind of guarantee from its own payment processor. The customer is also notified about the fulfillment of its payment request. Total response time is about 25-30 seconds. 4) Secure platform: Built-in security features in the mobile application development platforms is an idea to a mobile security architectural approach. An example of such a built-in secure platform is the Closed Loop Environment for Wireless (CLEW), which is a technology belonging to the third participated action research company. A more detailed introduction and discussion will be documented in the section 6.7, later of this chapter. 5) WEP/ SIM: Wired Equivalent Privacy (WEP) is a deprecated algorithm to secure IEEE802.11 wireless networks (Goransson and Greenlaw, 2007). Wireless networks broadcast messages using radio are at more risks to listen to than the normal wired networks. A subscriber identity module (SIM) on a removable SIM card securely stores the service-subscriber key (IMSI) which used to identify a subscriber on mobile telephony devices (such as laptops and mobile phones). The SIM card allows users to change phones by simply removing the SIM card from one mobile phone and inserting it into another mobile phone or broadband telephony device. 6) Copyright registration: Copyright is a form of intellectual property that gives the author of an original work exclusive right for a certain time period in relation to that work, including its publication, distribution and adaptation, after which time the work is said to enter the public domain. Copyright is described under the umbrella term intellectual property along with patents and trademarks. Copyright applies to any expressible form of an idea or information that is substantive and discrete and fixed in a medium. Some jurisdictions also recognize "moral rights" Chapter 6: Validating M-EA Model by AR PhD Thesis Page 218 Ming-Chien (Mindy), WU of the creator of a work, such as the right to be credited for the work. When the employees publish or update their ideas of the development products in the mobile meeting, the idea of the new products or new services are really needed to register the copyright. This is so because copyright registration could prevent other company or third party to copy or thieve the idea of the products, service, or any information which you have already registered. Therefore, register the copyright of new mobile business services or transaction processes are really important when applying M-EA into the company. 6.6 Action research company B The second action research project was carried out at Company B. Company B has already got its basic enterprise reference architecture (ERA). This action research will be applying Mobile Enterprise Architecture (M-EA) 5+1 layers model together with the M-EA implementation plan within company, in order to create a Company B’s Mobile Enterprise Reference Architecture (CBMERA). This CBMERA would not only be specific to understanding the existing situation and fit the request from Company B, but also help the researcher validate the original M-EA structure to comprehensive M-EA. 6.6.1 Background of the IT consulting company This research project is undertaken in a software development company- Company B. Company B is a leading Australian company of 600+ IT professionals supplying services to a wide range of corporate and local, state and federal government organisations for over 25 years. Company B provides professional services in area of Chapter 6: Validating M-EA Model by AR PhD Thesis Page 219 Ming-Chien (Mindy), WU application development, web services, product deployment, project management and consultancy. There is an enterprise data repository which provides employees consulting and support by its template of documentation in Company B. This enterprise repository, which is the basic enterprise reference architecture (ERA) of Company B, considers the technology architecture, application architecture, information architecture, and presents the foundation to record the process and data structure. This basic ERA also could offer the business intelligence solutions for the system integration that focuses on business objectives, business entities, technology, organization issues, team, and project management. 6.6.2 Modeling of processes in the company There is a project management methodology database as well as the basic enterprise reference architecture (ERA) in Company B, which provides the employees and consulting staffs with support for carrying out their projects. This basic ERA considers the technology architecture, application architecture, information architecture, and also provides the foundation to record the process and data structure. However, it does not comprise a full range of EA and it is also discovers that the layers of an EA do not map with the work at Company B. Furthermore, there is no specific mobile element in this basic ERA. Mobility can improve Company B’s competitiveness and can enable its clients to implement real-time business processes. Moreover, mobility can grow the customer’s business through location-independent access and customer personalization services. Therefore, this action research aims to apply M-EA model (created through interviews by the researcher) to Company B’s enterprise repository in order to create a “Company B Mobile Enterprise Reference Architecture” (CBMERA). Chapter 6: Validating M-EA Model by AR PhD Thesis Page 220 Ming-Chien (Mindy), WU This application of M-EA aims to “validate” the original model of M-EA and its underlying concepts that were elicited from the interviews. The end result of this action research is validation of M-EA and creation of CBMERA. CBMERA includes a 5+1 layers CBMEA model, and a mobile transition road map to encapsulate and represent Company B’s approach to use mobility. CBMERA also validated the approach to change management including changes to people, process, data, and systems. The suitable “fine tuning” of the M-EA model at the end of the action research would be required to make it practically applicable. 6.6.3 Discussion of findings that validate M-EA The Following Table 6.4 shows the validation from Company B when applying M-EA to CBMERA. The business analysts, business consultants, project managers, and branch manager of Company B joined the meeting and gave their suggestion and comments on modification, which are documented in the following Table 6.4. Table 6.4: CBMERA Validation M-EA Table M-EA Validation Criteria Before M-EA was applied in the Organizations CBMERA Observation/ Comments/ Modification from Company • Mobile Device Usability Ad-hoc Customised to the user • Handling requirements of different levels of users (e.g. Manager had less need to shield the mobile screens; Workers had to be provided with larger font sizes etc.). • Mobile control and monitoring Not specific Specific • Updated the data in real-time. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 221 Ming-Chien (Mindy), WU M-EA Validation Criteria Before M-EA was applied in the Organizations CBMERA Observation/ Comments/ Modification from Company • Mobile Office Informal Formal • Teleworking was improved due to mobile usage. Meetings were scheduled using mobile conferencing facilities. • Customer Personalizati on Service Not personalization Personalizati on • The mobile device becomes an everyday business tool and permits easy access to selected information on the basis of the user’s location and the relevant business scenario. • Service-Orie nted Process Orchestration Unstructured Structured • Business processes re-engineering to service-oriented. • Real-time response Asynchronize Synchronize • Business processes re-engineering in order to get real-time responded to the market information updated. • Mobile control and monitoring Not specific Specific • Updated the data in real-time. • Mobile commerce and Mobile payment Not provide Provided • Updated Mobile payment processes and allow the customer do M-commerce. • Mobile Data (Extended Data Repository) Disconnected Connected • Data can be pushed from or pulled to the mobile device. • Mobile Information Service Website only SMS info customers • The more urgently information is needed for making a decision (e.g. flight delays) the more users are willing to pay. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 222 Ming-Chien (Mindy), WU M-EA Validation Criteria Before M-EA was applied in the Organizations CBMERA Observation/ Comments/ Modification from Company • Accessing any system anytime and anywhere due to Mobility Location- Independenc e Closed; dedicated Open • Personal and business resources can be accessed anywhere using any device via any network, whether fix-line or wireless. Instant connectivity to the Internet and intranet from a mobile device is becoming a reality. • Mobile Communicati on Only for private use Business contact • People have additional options for communicating each other, irrespective of their location and desired contact partner. • Mobile Internet Service and Applications Single Multiple • Creating a mobile workforce that expects access to desktop applications, messaging and information retrieval whether in the office, in the car, waiting at station or airport, working at home or visiting a customer. • Middleware Platform helps integrate different languages within each layer No Consider • Applying enterprise bus or middleware platform if it is required. The validation from Company B not only helped in completing the table, but went into detailed discussions and validations of the relevance of the M-EA 5+1 layers Chapter 6: Validating M-EA Model by AR PhD Thesis Page 223 Ming-Chien (Mindy), WU model to the company. The result is documented in the following section. Furthermore the Company B also creates the implementation strategic alignment to update the transaction road map, and it is also documented after M-EA 5+1 layer validation. The validation from CBMERA implementation organization revealed that after applying mobility into its ERA, the process interaction between the users and the business upgrades to mobility service-oriented and real-time response process orchestration; the processes become more pervasive, simple, and platform-neutral. The CBMERA model is thus successfully applied and it has resulted in opening greater opportunities for various mobile devices and applications to be incorporated in the business processes of the organization within mobile office environment. This new CBMERA brings about not only internal integration but, through its extendibility, also offers greater efficiency to its external suppliers, customers and other trading partners over the mobile network and Internet. All customers, suppliers, also employees can access any system (M-SCM/ M-CRM/ M-ERP) anytime and anywhere, the mobile device becomes an everyday business tool and permits easy access to selected information on the basis of the user’s location and the relevant business scenario. Company B also states that a comprehensive CBMERA provides the company with an excellent opportunity for creation of an ‘agile’ technical platform that would enable delivery of business services to a “location independent” market. Layer 1- Storage Layer Mobile Content / Database Architecture Chapter 6: Validating M-EA Model by AR PhD Thesis Page 224 Ming-Chien (Mindy), WU The mobile contents and database architectural layer is the base layer of the CBMERA. This Layer 1 of the CBMERA deals with the data aspects of the mobile systems including the sourcing of data, its storage, its provision and its maintenance. The data related to mobile applications is made up of a multitude of voice, video, images and text. This varied nature of mobile data can be better referred to as ‘content’. Typical content management systems are the SQL Server and Oracle9i Database Enterprise Edition. In addition to managing data, are also able to handle transactions, provide correlations for business intelligence, integration and reliability. Currently, Company B has a good enterprise data repository, and has updated this basic ERA which will provide more contents and make more references reusing. However, Company B could apply mobile information service and central mobile data repository into this layer in the future. Layer 2 -Communication Layer Mobile Networks / Communications Architecture (Layer 2) The communications or network layer of M-EA is the second layer, and is also known as Layer 2 of CBMERA. There are numerous mobile network technologies that form part of this layer. The network stacks in this network layer of the architecture with TCP/IP at the base, followed by WAP, personal area networking (PAN) and, depending on the needs of the applications, metropolitan area networks (MAN). The network communications technologies further include the IEEE 802.1x group of standards, the generations (G) of cellular standards (i.e. 2G, 2.5G, 3G, 4G), Infrared, Bluetooth, RFID, Wi-Max and Wireless VoIP, the UMTS, GSM, GPRS, CDMA standards. The network architecture not only includes the stock of networks, but also provides links or programmable interfaces for Infrared, Bluetooth and the Chapter 6: Validating M-EA Model by AR PhD Thesis Page 225 Ming-Chien (Mindy), WU cellular networks. Currently, Company B uses laptops with Internet, mobile Internet, mobile phone, and some wearable PDA. However, Company B could apply Mobile office, mobile internet, mobile intranet application and service into this layer in the future. Layer 3 - Binding Layer Mobile Middleware / Binding Architecture (Layer 3) The binding layer of a mobile system is based on the overall CBMERA. This third layer (Layer 3) of the CBMERA deals with two aspects of binding: firstly, between the applications or services being offered, and secondly, between the contents and the applications. These mobile middleware technologies bring together, or ‘gel’ the various services or parts of a mobile software application. The need for mobile middleware is felt due to the dispersed services mobile environment, varying types of devices and its operating environment. Middleware technologies enable interaction amongst these various devices, applications and databases, systems by creating and using common standards for the applications. Wireless Application Protocol (WAP) and i-Mode are the two well-known mobile middleware protocols used in mobile application development. WAP and i-Mode middleware platforms are built on top of existing network protocols of TCP/IP. Currently, there is no middleware used in Company B, however, Company B could apply enterprise bus and middleware to link all layers of communication between each other if it is needed in the future. Layer 4 - Process Layer Mobile Process / Applications Architecture (Layer 4) Chapter 6: Validating M-EA Model by AR PhD Thesis Page 226 Ming-Chien (Mindy), WU The mobile processes, applications and services of a mobile architecture are represented in the fourth layer of CBMERA. This Layer 4 includes the business processes, the models for collaborative web services and the business analysis required by the business. The enablers, the solutions providers and the application developers work in this layer of the CBMERA. The types of applications in this layer at the mobile user level are, for example, the billing applications and the mobile retailing applications. Currently, Company B business process follows process life cycle approach, and target re-engineering to provide real-time service by applying M-EA. In addition, Company B could apply mobile control and monitoring, Mobile commerce and Mobile payment into this layer in the future. Layer 5- Presentation Layer Mobile Presentation / Usability Architecture (Layer 5) The top most, 5th layer of the CBMERA is the presentation layer. This Layer 5 includes all aspects of presentation to mobile users including their devices, user interfaces and navigations. The devices, in this layer, are made up of mobile phones, I-Pods, PDAs, Blackberries as well as “wearable” mobile devices such as GPRS-enabled watches, email-only devices and handheld computers. Such wirelessly connected mobile devices are far more “personal” than mere desktop PCs. Therefore, the presentation layer needs to deal with the images associated with the use of these mobile devices (particularly by adolescents), their usability and their privacy. Thus, the mobile device manufacturers as well as the user interface designers are active in this layer of the CBMERA. Currently, Company B employees use mobile phone, PDA, and laptop to communicate with each other and customers. Company B could try to provide its customers and employees using mobile devices Chapter 6: Validating M-EA Model by AR PhD Thesis Page 227 Ming-Chien (Mindy), WU to reach and access the system anytime and anywhere, in order to provide mobile customer personalization service. Layer Plus- Security Layer Mobile Security Architecture (All Layers) The mobile security architecture applies to all layers of the CBMERA because each layer (from 1 to 5) has its own unique security requirement. Thus, the security deals with networks, data, middleware, applications and presentation layers. Just as all other companies, Company B faces the increased mobile computing power of handheld devices introducing new security threats. The security threats would be in the form of loss of confidentiality, loss of integrity and loss of availability. Password protection is a basic mobile security mechanism that is included in most handheld devices as a countermeasure (Guizani and Raju, 2005). Furthermore, network and application security measures also need to be considered when using MT. Company B could apply mobile security which includes a wide variety of technologies, including authentication, cryptography, secure communications, and secure mobile payment methods. This mobile security is especially crucial, as communication through wireless and mobile networks is more vulnerable to attack than in the wired networks. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 228 Ming-Chien (Mindy), WU CBMERA Implementation Transition Road Map Business Strategy Organisational infrastructure and processes MIT infrastructure and processes MIT Strategy Business Scope Business Governance Distinctive Competencies Mobile Technology Scope MIT Governance Systemic Competencies M-EA SkillsM-Processes Architecture Infrastructures SkillsProcesses Automation Linkage External Strategic Fit Internal Strategic Fit Figure 6.8: M-EA Strategic Alignment (Modified from Henderson and Venkatraman, 1993) Company B helps to validate the implementation strategic alignment as in the above Figure 6.8. This strategic alignment should be articulated in terms of an external domain and an internal domain. Within the business domain, the business strategy for external market includes business scope, distinctive competencies, and business governance. Mobile Information Technology (MIT) strategy involves: 1) Mobile technology scope: the specific MIT that support current business strategy initiatives or could shape new business strategy initiatives for the firm. This is corresponding to business scope, which deals with choices pertaining to product-market offerings in the output market. 2) Systemic competencies: the specific MIT strategy that could contribute positively to the creation of new business strategies or better support existing business strategy. This is analogous to the concept of business distinctive competencies, which deal with those attributes of strategy (costing, quality, Chapter 6: Validating M-EA Model by AR PhD Thesis Page 229 Ming-Chien (Mindy), WU value-added service, superior distribution channels) that contribute to a distinctive, comparative advantage to a firm over its competitors. 3) MIT governance: selection and use of mechanisms for obtaining the required MIT competencies. This is referring to business governance, which involves make-versus-buy choices in business strategy. Such choices cover a complex array of inter-firm relationships such as strategic association, joint business enterprise, marketing exchange, and technology licensing. In a business domain, the business strategy for internal enterprise includes architecture infrastructure, business processes and skills. MIT infrastructure and processes involve: 1) M-EA: choices that define the portfolio of applications, the configuration of hardware, software, communication network, and data architecture that are integrated as technical architecture of M-EA. This is analogous to the choices within the internal business strategy arena to articulate the administrative structure of the firm dealing with the roles, responsibilities, and authority structures. 2) M-processes: choices that define work processes central to the operations of the mobile business processes of M-EA. This is referring to the need for designing the business processes that support and shape the ability of the firm to execute business strategy. 3) Skills: choices pertaining to the acquisition, training, and development of knowledge and capabilities of the individuals required to effectively manage and operate the MIT infrastructure within the organization. This is corresponding to the skills required within the business domain to execute a given strategy. Company B suggested that when building M-EA, business strategy is the driver and MIT strategy is the enabler. The enterprise need not only align external and internal domains of MIT, but also needs to integrate business and MIT domain. The 4 Chapter 6: Validating M-EA Model by AR PhD Thesis Page 230 Ming-Chien (Mindy), WU dominant alignment perspectives that use the 2 strategies as the driver are equally useful and powerful in considering about the position of MIT in organizational transformation. Company B believes that this M-EA strategic alignment could be updated to CBMERA Implementation Transition Road Map. 6.7 Action research company C The third action research project was carried out at Company C, Alacrity Technology Australia. This action research validated the researcher’s Mobile Enterprise Architecture (M-EA) 5+1 layers model with the help from Alacrity’s Closed Loop Environment for Wireless (CLEW) technology – particularly from the viewpoint of security and multi-channel authentication. This action research demonstrates how CLEW fits in to M-EA and also validates the security layer in 5+1 M-EA model. The suitable “fine tuning” of the M-EA model will be the result at the end of the action research. 6.7.1 Background of the security/ transaction processing company Company C, Alacrity Technology Australia (http://www.alacritytech.com.au/), is an Australian company and based in Canberra, which delivers on the promise of mobile internet. CLEW, an acronym for Closed Loop Environment for Wireless, is a new mobile-based technology to provide the secure intelligent Mobile Internet interaction. This technology is a patented combination of technologies enabling organizations to send information to important stakeholders such as customers and staff and automatically track, trace, secure, audit and react to their responses, according to preset business rules. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 231 Ming-Chien (Mindy), WU CLEW combines Internet, mobile phones and wireless devices to enable time-critical information to be sent simultaneously to multiple recipients and to enable recipients to respond to the originator’s message. CLEW not only provides an additional communication channel tailored to mobile device users, but also allows all real time interaction in a secure environment. CLEW technology is simple to use and to implement because it is a flexible system that supports a wide range of M-business transactions. Moreover, CLEW will prevent unauthorised access to networks in an efficient and cost-effective manner. Network access can be initiated and authorised securely by the organisation along with the authorised user. Access can now be promptly and securely authorised or rejected by the user, eliminating the need for costly alternatives. CLEW provides greater control to network access, risk minimisation and stronger overall confidence in the organisations security systems and processes. Figure 6.9: CLEW for Secure Access Control Chapter 6: Validating M-EA Model by AR PhD Thesis Page 232 Ming-Chien (Mindy), WU The above Figure 6.9 presents the CLEW technology for secure access control. The CLEW system sends a secure alert to authorized users before they can access the network. The users will then receive the alert on their internet connectable mobile device, after securely entering a session via a login and password issued by the organization. Additional methods of security can be incorporated, if requested by the organization. The user then responds to the information and if they are trying to access the network they will approve the alert. If the user is not trying to access the network they will decline the request which will restrict access to the hacker. Unlike alternative systems CLEW uses out of band authentication which means CLEW uses a different authentication path to the transaction. The response is held in an irrefutable audit log and can be used for confirmation and reporting requirements. Additionally, CLEW technology improves the security of using mobile technology; it is more secure than SMS message, and also records the replies from the receiver. Messages sent out by CLEW to recipients are authenticated by the recipients by signing off with a password. Therefore, it is much more secure than SMS, and also if the recipient does not sign off, the backend systems of CLEW can send out messages to other pre-agreed people in a list agreed upon with the organization until it schedules the required number of personnel. Based on the client technology, CLEW ensures all interactivity takes place on enterprise’s server, to maintain unparalleled levels of data security. Once the interaction is complete, CLEW leaves no transactional information on the recipient’s mobile handset. Therefore, customers now could use CLEW to automate time-intensive manual processes to get real-time information to make M-commerce decision in a cost-effective manner. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 233 Ming-Chien (Mindy), WU 6.7.2 Modeling of processes in the company Beside the trend toward increased mobility, enterprises are now operating the global marketing and growing mobile offices in multiple locations with increasing numbers of remote workers who all need to communicate and share information in real time. Communication and sharing information between different offices of the internal enterprise or between supply chain members of external enterprise are now imperatives, no matter where they are located or what time it is It is essential for communication and information sharing to be guaranteed by secure business process, regardless of whether or not the different business partners have access to protected intranet data and application. Security has always been a top priority, especially where M-commerce and sensitive M-business processes are concerned. The new challenges of wireless Internet access and the greater integration of mobile employees, partners and customers make potential shortfalls significantly more probable. Moreover, web service and M-EA will add a new dimension to the challenge posed by security, particularly in cases involving dynamic interaction of partners who have never done business together before. Therefore, security has to be given due consideration when the enterprise considers implementing M-EA. The increased mobile computing power of handheld devices introduces new security threats. The security threats would be in the form of loss of confidentiality, loss of integrity and loss of availability. Password protection is included in most handheld devices as a countermeasure (Guizani and Raju, 2005). Furthermore, network and application security measures also need to be considered Chapter 6: Validating M-EA Model by AR PhD Thesis Page 234 Ming-Chien (Mindy), WU when using mobile technologies. Having risk identification and risk planning measures could help to overcome some risks (Ghosh, 2001). A possible solution is to build security measures into mobile platforms and applications themselves. Security modules in use (e.g. GSM/UMTS SIM cards) must be configurable and manageable by the enterprise itself. Key management, authentication mechanisms, and cryptographic algorithms, unifies and integrates management processes and policies for information flow security across the enterprise. Security infrastructures in place on the client and server must be accessible for third-party application development. Additionally, deployment, management, and maintenance of secure mobile business application must be as far as possible expressible in corporate policies, thereby, controlling all security issues in security layers among people, process, system, data, and technology while doing mobile transaction in others 5 layers of M-EA model. Therefore, this action research validated the researcher’s Mobile Enterprise Architecture (M-EA) 5+1 layers model with the help from Alacrity’s Closed Loop Environment for Wireless (CLEW) technology – particularly from the point of view of security and multi-channel authentication. This action research studies demonstrates how CLEW fits in to M-EA and also validates the security layer in 5+1 M-EA model. 6.7.3 Discussion of findings that validate M-EA Chapter 6: Validating M-EA Model by AR PhD Thesis Page 235 Ming-Chien (Mindy), WU The following table (Table 6.5) shows the mapping the 5 aspects – people, process, data, system, and also technology aspect within the M-EA model and also the validation from Alacrity CLEW technology which works on security aspect. Table 6.5: Alacrity CLEW Technology Validation M-EA Table M-EA Validation Criteria Before applying CLEW with M-EA After applying CLEW with M-EA Observation/ Comments/ Modification from Company • Mobile Device Usability Many choices Many choices • CLEW has minimal or no requirements for handsets: no GPRS, no 3G and no Java support, no imaging or multimedia capabilities are required. • Mobile Office CLEW doesn't specify this part. CLEW doesn't specify this part. • CLEW doesn't specify this part. • Customer Personalization Service Not focus on any security part ID Authentication • CLEW could increase customer’s OATH (Initiative for Open Authentication) compliance. • Service-Oriented Process Orchestration SOA Could feature SOA as well • CLEW features SOA-Oriented Application Architecture. • Real-time response Not focus on any security part one-stop authentication service • Reduces the need for Secondary Authentication. This is because CLEW can act as a one-stop authentication service. • Mobile control and monitoring Not focus on any security part authentication security policies • Reduces the need for any post-authentication security policies of rules engines, specifically real-time monitoring and fraud detection. • Mobile Data (Extended Data Repository) Not focus on any security part increases security • CLEW increases security through innovative integration of available data. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 236 Ming-Chien (Mindy), WU M-EA Validation Criteria Before applying CLEW with M-EA After applying CLEW with M-EA Observation/ Comments/ Modification from Company • Mobile commerce and Mobile payment Payment transaction ID management User-centric Identity Management • CLEW compliance with User-centric Identity Management technology which enhances mobile commerce transaction more secure. • Mobile Information Service Not focus on any security part Authentication • Support for Risk-Based, Multi-Level Authentication Service. • Accessing any system anytime and anywhere due to Mobility Location- Independence CLEW doesn't specify this part. CLEW doesn't specify this part. • CLEW doesn't specify this part. • Mobile Communications CLEW doesn't specify this part. CLEW doesn't specify this part. • CLEW doesn't specify this part. • Mobile Internet Service and Applications CLEW doesn't specify this part. CLEW doesn't specify this part. • CLEW doesn't specify this part. • Middleware Platform helps integrate different languages within each layer Not integrated Flexible • CLEW is classified as vendor-independent technology supporting all commonly known SQL vendors, as well as LDAPv2 and LDAPv3 Directory Server platform. • The 3-tier CLEW model can be flexibly deployed and run in a distributed manner in today’s n-tier networks within access, application and data layers. The validation from Company C – Alacrity, not only completes the table, but also Chapter 6: Validating M-EA Model by AR PhD Thesis Page 237 Ming-Chien (Mindy), WU goes into detail to discuss how CLEW helps in validating each layer of the M-EA 5+1 layers model. The validation of focusing on how CLEW could help the security part in the other 5 layers is documented in the flowing paragraphs. Layer 1: Storage Layer- Mobile Content Architecture Alacrity Technology has “LDAP” to expand the concept of data storage. CLEW is classified as vendor-independent technology supporting all commonly known SQL vendors, as well as LDAPv2 and LDAPv3 Directory Server platform. Furthermore, LDAP is superior technology over SQL in authentication, because it enables universal support for any type of schemas. The other argument for LDAP is that all the leading access management vendors (such as: IBM, HP, Novell, Oracle, and Sun…etc.) heavily rely on their integrated identity management on authentication against LDAP repository. Layer 2: Communication Layer- Mobile Network Architecture The CLEW promotes secure session management also by not transferring any sensitive information in session variables. This makes the CLEW session a useless target for attack. Layer 3: Binding Layer- Mobile Middleware Architecture CLEW in this layer helps~ • Features SOA-Oriented Application Architecture: CLEW focuses on Service-Oriented architecture, particularly in transaction authorization. It relies on WSDL interfaces and components. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 238 Ming-Chien (Mindy), WU • Support for N-Tier Networks: The 3-tier CLEW model can be flexibly deployed and run in a distributed manner in today’s n-tier networks within access, application and data layers. Layer 4: Processes Layer- Mobile Applications Architecture CLEW in this layer helps~ • Increases customer’s OATH (Initiative for Open Authentication) compliance: The CLEW authentication can be classified as a strong authentication method as defined in the OATH Technology Roadmap 2.0, because it utilizes recommended standards in authentication and authorization. • Process Improvement as a general-purpose token transporter. The CLEW technology could be used as a transport channel to turn mobile phones into non-persistent token devices and pass customer’s existing tokens between end-users and server software. • Increases security through innovative integration of available data. This is due to the ability of CLEW to combine data from the back-end systems with its messaging capabilities to throw new types of intelligent, dynamic authentication challenges onto the end user strengthens capabilities in Knowledge-Based Authentication (KBA). • Support for organization’s data redundancy: As no credentials and no transaction details are stored in the handset side, the CLEW technology supports and accelerates the healthy data management principles by relying only on existing data on the corporate backend side. • Support for Policy or business logic redundancy: The same redundancy as with critical data such as credentials can be applied for business logic and policy. This Chapter 6: Validating M-EA Model by AR PhD Thesis Page 239 Ming-Chien (Mindy), WU is enabled by dynamic service discovery by allowing the CLEW M-EA application to dynamically execute an existing, a service-oriented routine • Supports the concept of Externalizing Identity: CLEW supports the concept of “externalized identity” by relying on the customer’s existing authentication data through its LDAP strategy and by supporting existing authentication and authorization APIs and interfaces. The concept of “Externalized Identity” is closely related with data redundancy. • Compliance with User-centric Identity Management: Of all the available technologies CLEW is the best match with one of the newest trends in identity management: “User-Centric Identity, a concept that attempts to put the user in the middle of identity related transactions, and provide greater control over the transaction and its own privacy. It relies on a combination of technology and business process to make sure that the user is involved in the exchange of identity data between interested parties.” • 2-way Interoperability with 3rd party security software. Interplays well in a SOA-oriented way with 3rd party fraud engines or other interfaces through its intruder detection interface. The CLEW system 1) Provides strong, out-of-band, multi-factor authentication mechanism and completely eliminates some of the attack patterns and 2) Provides valuable security data to a 3rd party Security software, such as IP addresses and failed login attempts. • Zero Provisioning: As CLEW out-of-band authentication re-uses customer’s existing data and policies, it does not need any provisioning steps for example adding new users. After initial installation, new users can be authenticated “seamlessly” without any preparation. • Support for Risk-Based, Multi-Level Authentication Service: Multi-factor CLEW authentication is an excellent addition into today’s identity frameworks where the Chapter 6: Validating M-EA Model by AR PhD Thesis Page 240 Ming-Chien (Mindy), WU authentication level and associated authentication method can be set individually for each operation depending on the level of security needed. • CLEW has a healthy impact for the security policy management of modern access management frameworks. • Reduces the need for any post-authentication security policies of rules engines, specifically real-time monitoring and fraud detection. This is because CLEW can act as a one-stop authentication service. • Reduces the need for Secondary Authentication. This because in those risk-based frameworks which score the risk level of each login attempt real-time, CLEW system with its out-of-band multi-factor capabilities has low risk scoring thus no need for Secondary Authentication. • Enables introduction of potentially simpler and lighter security policies less monitoring and real-time fraud detection needed simplified policies. • Improves and simplifies the data produced by historical and behavioral analysis tools less incidents and threats better quality of analysis data. • Interplays well with third party fingerprinting and device identification technologies, e.g. IP Intelligence. Layer 5: Presentation Layer – Mobile Usability Architecture CLEW in this layer helps~ • Achieve wider and easier market availability due to low technical requirements: Enabled by the thin client architecture, CLEW has minimal or no requirements for handsets: no GPRS, no 3G and no Java support, no imaging or multimedia capabilities are required. This means that well over billion mobile phones are straight compatible with the CLEW technology leading to a superior market availability compared to any other MEA technology. As of 2008, Nokia alone Chapter 6: Validating M-EA Model by AR PhD Thesis Page 241 Ming-Chien (Mindy), WU has more than 1 billion cellular phones in the market. This is the biggest consumer group ever. • Increased usability through invisibility. Clew divides authentication into pre-login and primary authentication. This enhanced pre-login security protects vulnerable passwords from mass-hacking and denial-of-service attacks. The idea is to hide the login process from hackers and only allow the login screen to be viewed by the real end users who have to pass through the CLEW pre-login factors. Exchange of pre-login factors is automatic and embedded. Only primary authentication requires input from the user. 6.8 Discussion on the overall results that validate M-EA model From the above analysis of the results of three actions research studies; this section has summarized the overall validation, and documented the result of the final discussion with each action research projects’ manager. The first action research company supports how mobile technology can extend into different layers of M-EA model. The result from Company A is 6 diagrams for each layer of the M-EA model. The result also modifies the original figure more clearly to show the model. From the first action research study, the researcher has more clear knowledge of all the mobile technologies which can be selected and integrated them into M-EA. The leader of EA consultant team of Company A suggested that SOA, BPR, and cross enterprise processes must be taken into consideration when designing EA with mobility. After applying M-EA to enterprise, the enterprise implies the seamless Chapter 6: Validating M-EA Model by AR PhD Thesis Page 242 Ming-Chien (Mindy), WU integration of all business process in order to be a real-time enterprise. The real-time enterprise will support not just individual business processes, optimized via MIT systems and applications, but will also achieve flexible, consistent integration of business processes with suppliers, partners and customers across enterprise boundaries. M-EA provides enterprise be able to respond flexibly to customer needs and market changes while focusing on its core competencies, leaving extensively integrated strategic partners to concentrate on other selected activities. Company A confirmed that M-EA could be a blueprint for its MIT investigation plan. Secondly, the second action research company confirmed that the M-EA model is functional and workable. The result from Company B has been applied into each layer of its ERA, as well as updating the implementation strategic alignment to the migration road map. From the second action research study, the researcher has learned the “business strategy for implementing M-EA into the enterprise”. The branch manager of Company B states that extending EA with mobile solutions should be based on proven, standards-oriented infrastructures, and easily integrated different system, modular building blocks and multitier architectures which enable step-by-step implementations that cater to the requirements of users while also responding to the needs and capabilities of both business units and IT organizations. Furthermore, M-EA will be based on the 5+1 layers model, which also could be a solution for today’s E-business and M-business. The integration of M-EA into existing e-business architecture or several information systems will be needed for all enterprise which constitutes the mainstream in the predictable future. Lastly, the third action research company has its own specific security technology. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 243 Ming-Chien (Mindy), WU The result from Company C declares that CLEW technology could help the M-EA structure become more secure and comprehensive. This action research studies helped the researcher understand its CLEW technology and security issues in applying mobile technology to enterprise architecture. The CIO of Company C points out that, in particular, mobile applications and solutions for extending EA must be framed within a comprehensive enterprise security and web services infrastructure strategy. Security has always been a top priority, especially, where M-commerce and sensitive M-business processes are concerned. The new challenges of wireless Internet access and the greater integration of mobile employees, suppliers, partners, and customers make potential shortfalls significantly more probable. Moreover, Security in M-EA has many different methods, but the main objective is protecting the confidentiality and privacy, integrity, and availability of the information an enterprise owns or has protection over. Finally, Company C believes that CLEW is a secure, real time communication platform with unlimited interaction capacity for building M-EA. 6.9 Summary of this chapter This chapter presents three action research studies processes, and results involved in validating the M-EA from Chapter 5. Firstly a mobile communication company helped in extending M-EA 5+1 layers model by working into details of each model, secondly a consulting company helped in upgrading the implementation migration project plan, and lastly a security / transaction processing company helped with extending M-EA on security specific aspect. All of three action research studies completed the validation table, and validated our M-EA 5+1 layers model in detail. Chapter 6: Validating M-EA Model by AR PhD Thesis Page 244 Ming-Chien (Mindy), WU The overall result from these studies, the M-EA structure is workable and worth applying into their enterprises. The three action research studies are successfully validated the M-EA model to a comprehensive M-EA structure, in order to reach the aim of this doctoral research project. The next chapter is a conclusion chapter, which will outline how this research project achieved the research objective and also discuss the future direction of this research area. Chapter 7: Conclusion and Future Direction PhD Thesis 245 Ming-Chien (Mindy), WU Chapter 7: Conclusion and future direction 7.1 Overview of this chapter This chapter summarizes the entire doctoral research project reported in this thesis. This summary includes the aim of this research, its approach, the case studies undertaken, the action research studies used for validation and the overall findings. This chapter also demonstrates that the aim of the research has been fulfilled. Additionally, the future directions of this research and the relevant recommendations for potential future studies based on M-EA research area are also described at the end of this chapter. 7.2 Achievement of the research aim and objectives The research objectives are re-emphasised here in order to demonstrate how this study handled them. The achievement of the objectives has resulted in fulfilling the research aim of this research: establishing a comprehensive M-EA structure. The objectives of this thesis are divided into three steps as indicated in the last section of Chapter 3. They are briefly discussed here from the point of view of their fulfilment, and also shown as following Figure 7.1. Chapter 7: Conclusion and Future Direction PhD Thesis 246 Ming-Chien (Mindy), WU Literature Review Case Studies •Updated M-EA Definition •Updated M-EA model by constructing M-EA implementation roadmap •Updated M-EA Advantages and Disadvantages •Gather Interviewer’s expected M-EA outcome •Initial M-EA Definition, •Initial M-EA Model, •Initial M-EA Advantages and Disadvantages Comprehensive M-EA Achieve Research Aim Action Research 3 Organizations M-EA StructureM-EA Model •Use Interviewer’s expected M-EA outcome for validation criteria •Validate M-EA 5+1 layers model in details •Validate M-EA transition roadmap from a strategic alignment •Validate M-EA specific security layer by CLEW technology Figure 7.1: Research Processes As shown on Figure 7.1, the main objective of this research project was to construct a comprehensive M-EA. The Literature Review leads the researcher to formulate the initial M-EA definition and to create the initial M-EA model. This also resulted in the initial M-EA model’s advantages and disadvantages. After the researcher had formulated the initial M-EA model, she interviewed 10 cases in order to envision the M-EA model through knowledge elicitation. The output of the 10 case studies lead the researcher to update the M-EA definition, refine the advantages and disadvantages of M-EA, update the M-EA model to a well organized M-EA structure, and also gather the expected results or outcomes from the M-EA. This expected M-EA outcome has been analyzed and organized, which has updated to be a validation criteria for following Action Research projects. After that, the researcher constructed the M-EA structure and applied it in 3 participating Action Research companies in order to validating the 5+1 layers M-EA model and reach a comprehensive M-EA structure. The result from three action research studies further updated the M-EA 5+1 layers model in details, and also validated the security aspect and strategic implementation plan for M-EA structure. After all of the above steps, as Chapter 7: Conclusion and Future Direction PhD Thesis 247 Ming-Chien (Mindy), WU shown in Figure 7.1, the researcher finally created a comprehensive M-EA structure to achieve the research aim of this doctoral project. 1. Updated Mobile Enterprise Architecture (M-EA) definition: The result from the first Literature Review which the researcher conducted, the initial M-EA outline was identified and the definition created. This definition cut across the 5 aspects: people, systems, process, data, and technology (which have been shown in section 4.2.1). After discussion of this definition with the interviewees, their feedback and suggestion and the verification table have been shown on section 4.8.1. From the analysis of the results of the case studies, a refined M-EA definition that also considers the “security” aspect is created and shown in section 5.2. 2. Updated Mobile Enterprise Architecture (M-EA) advantages and disadvantages: Mobile technology could help enterprises build more robust enterprise architecture that can also improve their productivity and customer service. After analyzing and reviewing other researchers’ literature, this researcher listed the main advantages and disadvantages of applying mobility into enterprise architecture (which have been shown on section 4.3.1 and 4.3.2). Once again, after discussing all the listed points above with interviewees, the researcher documented the results of refined advantages and updated practical issues in section 4.8.2 and 4.8.3. 3. Validated Mobile Enterprise Architecture (M-EA) model: Table 4.2 in Chapter 4 listed the expected outcomes from the interviews, and section 4.8.4 discussed the details of these interviewees' expected outcomes after implementing M-EA into the company. After analysing these expected outcomes, the Chapter 7: Conclusion and Future Direction PhD Thesis 248 Ming-Chien (Mindy), WU researcher referred them to not only the M-EA 5 aspect but also the M-EA 5+1 layers model, and also added two more points into them. Data in Table 4.2 has been updated and optimized to result in the data presented in Table 6.2 in the section 6.4. This updated table has been used as the validation criteria for the action research project, and it also helped to validate M-EA in the 3 action research companies. The responses from each company by completing this table are shown in section 6.5.3, 6.6.3, and 6.7.3. 4. Updated Mobile Enterprise Architecture (M-EA) model to structure: The researcher created the initial version of M-EA model from the literature review in section 4.2.2, and also discussed this draft model with the interviewee. The model outline has been further expanded, which was based on the result from interviewees. The updated version of the M-EA model has been described and documented in Chapter 5. This research has also mapped the people, systems, process, and data to M-EA, which has been discussed in section 5.3. The M-EA framework, introduced in section 5.4.1, is an abstraction of how the emerging technologies or new methodologies fit with an organization’s mobile information communication technology requirements. M-EA 5+1 layers model, which has been introduced in section 5.4.2, demonstrates how MT helps in each 6 layers and seamlessly connects to each other. The researcher also updated the comprehensive version at the end of section 5.4.2 after validating the model through 3 action research studies. In section 6.5.3, the researcher discussed the more detailed of the 5+1 layers model which is the result from validating the original model within the first action research company. Additionally, the validation result of M-EA structure in the specific security layer by CLEW technology within the third action research company has been discussed in the section 6.7.3. Moreover, this research project Chapter 7: Conclusion and Future Direction PhD Thesis 249 Ming-Chien (Mindy), WU provided the transition process from the current status to target status for the company in transition roadmap, introduced in section 5.4.3, aiming to show the enterprise how to schedule from the different generation EIS situation to particular M-EA. The validation result of this transition roadmap from the second action research company by a strategic alignment has been discussed in section 6.6.3. The main contribution from this research is a comprehensive model for building Enterprise Architecture within mobility, which has achieved the objective of this research project. This comprehensive M-EA enables the enterprise integrating their several generation systems and infrastructure with getting new emerge mobile technology in order to provide more effective business process. The researcher has also published research outcomes through several international conferences and book chapters to address the lack of literature in the area of M-EA. 7.3 Summary of this M-EA research project As was specified in the introductory chapter (Chapter 1), the research aim of this study is: To investigates the issues, processes, benefits, and challenges of extending EA with mobility, and identifying and describing the process of integrating MT with EA. Moreover, to identify how mobile technology could extend the people, process, data, and system of an EA that would result in a Mobile Enterprise Architecture (M-EA). This aforementioned research aim has been achieved by following a robust research methodology that has been discussed and modeled in Chapter 3. This research Chapter 7: Conclusion and Future Direction PhD Thesis 250 Ming-Chien (Mindy), WU followed the constructionism philosophy and aims to construct a comprehensive M-EA as an outcome of this doctoral research project. This research used qualitative research methodology and combination of inductive and deductive research approaches. The selection of research methods are literature review, cases studies, and action researches. Methods of collecting the data include studying the document, interviews, meetings, e-mails, observations, site visits, and internal documents. Therefore, this research project designs to follow by three steps: 1. Literature Review (LR) to construct the based knowledge of EA and MT, discussed in detail in Chapter 2. 2. Case Study (CS) of envisioning the M-EA model through knowledge elicitation, analyzed the result in Chapter 4. 3. Action Research (AR) projects in three different business organizations for model validation, discussed the validation result in Chapter 6. Literature Review (LR) provides understanding of a gap between EA and M-EA, and also provides an understanding of the possible approaches of incorporating mobile applications into information systems design. The literature review conducted as part of this study provides a better understanding of the problem, which is the gap between IT and IT supported and integrated with MT. As MT integrates into EA, business processes and enterprise IS will have to be re-engineered. Because this business transition progress changes among the systems and processes, people also need to be trained about how to use the system to operate the processes. As well as the data need to be changed to adopt into the new system functions. Therefore, the new M-EA model will have to handle these four aspects of an EA as they have a major impact on the way an organization functions. At this stage, the researcher has the result as making the definition of “M-EA”. Chapter 7: Conclusion and Future Direction PhD Thesis 251 Ming-Chien (Mindy), WU Next step is Case Study (CS) by interviewing experienced enterprise architects, business analysts, Chief Information Officer (CIO) and IT executives. The researcher interviewed several experienced enterprise architects in order to reach a comprehensive definition of model of the M-EA. This M-EA definition was refined to produce an updated M-EA implementation framework. The initial M-EA based on the Literature Review is updated model through interviews result. The definition, advantages and limitations of M-EA, how M-EA could be implemented, and what the expectations after having implemented M-EA, are updated and refined from the interviewees’ suggestion and comments as well. The results of these interviews on the benefits of MT on EA based on views and opinions from these experts provided three critical factors for mobility: 1. real-time response, 2. location-independence, and 3. personalization. Finally, the excepted M-EA outcomes from interviewees are the validation criteria for following AR projects as well. Step 3 is validating initial M-EA model by undertaking three Action Research (AR) project with participating enterprises. First mobile communication company helped extending M-EA 5+1 layers model to work on details of each model, second consulting company helped upgrading the implementation migration plan by strategic alignment, and third security / transaction processing company helped validating M-EA on security specific aspect. The initial M-EA model has been validated through three AR project in order to establish a comprehensive M-EA. Moreover, all of three action research studies completed the validation table, and validated our M-EA 5+1 layers model in details. The overall result from these studies, all of three companies confirm that M-EA structure is workable and worth applying it into their enterprises. Chapter 7: Conclusion and Future Direction PhD Thesis 252 Ming-Chien (Mindy), WU The main contribution to the research, as well as the business community through this research, is the proposed M-EA structure (which has been discussed in detail in chapter 5). The core philosophies of extending EA with mobility constructs a fully Mobile Enterprise Architecture (M-EA), which includes M-EA framework, core M-EA 5+1 layers model, and M-EA migration plan. Frameworks are a key part of any EA environment. The framework for M-EA offers a blueprint picture of how the people, systems, process, data, and internal and external factors that contribute EA. This M-EA framework is an abstraction of how the emerging technologies or new methodologies fit with an organization’s IT requirement. The framework provides the company not only the clear idea of IT or MT investment direction but also contents on how to link together in an EA environment. Models provide a pictorial representation of the enterprise-wide view of how the individual technical elements of the systems relate to each other. This pictorial representation can be called the ‘reference architecture’ for work within the organization. The architectural and design patterns that form the ‘standards’ for the organization are also a part of the model. M-EA model is 5+1 layers architecture model, it shows how the mobile technology works in 5+1 layers and connects seamlessly to each other. The model provides to the company not only the details of mobile technology application of each layer but also about all layers how to glue together in an EA environment. Chapter 7: Conclusion and Future Direction PhD Thesis 253 Ming-Chien (Mindy), WU Transitions Road Map provide a migration path for the enterprise from where ‘it is’ to where it ‘should be’. Thus, the transition paths are ‘road maps’ to guide the organization in adopting new technologies, methodologies and business processes. The transition road maps for the company aim to show the company how to plan from the different generation enterprise information system situation to mobile specific EA. The migration table for M-EA provides the transition process from the current status to target status. This M-EA structure allows people of the internal or external company anywhere anytime accessing the applications. M-EA facilitates faster information flow and enhanced reliability. Combination service-oriented business process can be provided through M-EA which increases enterprise flexibility in order to raise efficiency and effectiveness of business processes by streamlining real-time decision-making. Furthermore, reduce costs by reaching out to the extended M-EA supported and sustained over time. Therefore, M-EA structure is usable across any origination to reduce the implementation risks and enhance the benefits of mobility to the enterprises, and also creates new opportunities for a flexible and dynamic enterprise in an agile business world. 7.4 Future direction in M-EA Development of the M-EA model has lead to many interesting areas for further exploration. The future direction in M-EA could include: Chapter 7: Conclusion and Future Direction PhD Thesis 254 Ming-Chien (Mindy), WU • Application of M-EA in the Collaborative process modeling space. Applying M-EA in the collaborative web services is a workable idea for reengineering business processes in order to bring the enterprise to a new market. However, it was identified that the engineered process still has many drawbacks. • Incompatible technology: when different organisations are using very old information system or the old information communication technology infrastructure and couldn’t run the single business transaction process. • Competition: when different organisations prefer not to share, in order to force the competition out of the market. As an example, why would an organisation allow a competitor to use its staff without allowing the competitor to lose the contract for lack of staff? This will provide an opportunity to submit a new tender. • Legal issues: such as licensing agreements. The roles and regulations set by the government • Mistrust: how could an organisation trust its competitor(s)? The aforementioned issues need to be resolved to enable collaborative process engineering to be used as a tool for organisations to extend the service of web services in M-EA. • Incorporating the environmentally specific Green IT elements in M-EA. Green computing or green IT, refers to environmentally sustainable computing or IT. Designing, manufacturing, using, and disposing of computers, servers, and associated subsystems, such as monitors, printers, storage devices, and networking and communications systems, efficiently and effectively with minimal or no impact on the environment. Green IT also strives to achieve economic viability and improved system performance and use, while abiding by our social and ethical Chapter 7: Conclusion and Future Direction PhD Thesis 255 Ming-Chien (Mindy), WU responsibilities. Thus, green IT includes the dimensions of environmental sustainability, the economics of energy efficiency, and the total cost of ownership, which includes the cost of disposal and recycling. Green ICT could be a solution by replacing energy inefficient activities with environmentally friendlier lifestyle choices, reengineering businesses, industries and products to reduce greenhouse impact, and managing ICT infrastructure wisely to limit its direct impact on the environment (Eckermann, 2008). Researching how the mobile application could incorporate the Green ICT environmentally in M-EA is an other interesting research area for the future studies. • Exploring further into the security aspects of M-EA Mobile connection can be used for work styles leading to the reduction of travel and material consumption, such as using mobile terminals to check company emails while out of the office, connecting the mobile applications to the company LAN…etc. In addition, the service provides secure and reliable remote access using component technology enabling the use of multiple devices. The security aspect of applying M-EA was studied earlier in this research by validating the M-EA with CLEW technology in section 6.6.3, and more other way which has been introduced in section 6.5.3. CLEW technology improves the security of using mobile technology. However, security has to be given due consideration when it is used as a main technology for business processes. The increased computing power of handheld devices introduces new security threats. The security threats would be in the form of loss of confidentiality, loss of integrity and loss of availability. Therefore, how to prevent the mobile information thief and add secure business transaction platform by integrating ICT hardware, software, or business process could be do more detail research in future. Chapter 7: Conclusion and Future Direction PhD Thesis 256 Ming-Chien (Mindy), WU • Quality assurance and testing of mobile applications based on M-EA M-EA provides a framework that can control and guide the development of mobile applications. However, quality assurance and testing of these mobile applications go beyond the framework itself. Therefore, there is a need to further investigate how quality assurance and testing can be incorporated based on M-EA. For example, testing of the security aspect of mobile applications can be separately undertaken – as compared with testing, say, the usability of the small screen devices. Quality control is a way to check which mobile applications best suitable to apply in the M-EA framework, this is a really interesting area for future research to update and modify to comprehensive M-EA structure. • Metrics and measurements related to the use of M-EA in practice. After applying M-EA model into the company, the company may want to use the quality and productivity metrics to measure the quality of service provided by mobile applications. While there are number of such QoS metrics in ISO standards, there is a need to relate them to the M-EA model. Such as: ISO 9000:2005, ISO 9001:2008 can be used on Quality management systems; ISO 10014:1006 can be used into Quality management -- Guidelines for realizing financial and economic benefits; ISO/IEC TR 15543 :2005 can measure Information technology -- Security techniques -- A framework for IT security assurance…etc (ISO, 2009). Researching for which of these standards and how the selected standard could help measure the performance of service-oriented M-EA is a really interesting future research area as well. • Using Agile methodologies with M-EA in development and maintenance of mobile applications. Chapter 7: Conclusion and Future Direction PhD Thesis 257 Ming-Chien (Mindy), WU Agile methods are highly popular in most modern-day software development approaches. Agile methods generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability, a set of engineering best practices that allow for rapid delivery of high-quality software, and a business approach that aligns development with customer needs and company goals. M-EA needs to be extended to facilitate the use of such methods in development. For example, the applications and the database layers of the M-EA model will be directly affected by the agile methods – which iterate rapidly to produce workable code from the outset. References PhD Thesis 258 Ming-Chien (Mindy), WU References Abraham, S., (1994) Exploratory Action Research for Manager Development. Brisbane: AEbis Publishing. Alag, H. S., (2006) Business Process Mobility. In Unhelkar B. (Ed.), Chapter 41 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives. IGI Global, Hershey, PA, USA. 2006. Andersson P., Rosenqvist C., and Ashrafi O., (2007) Mobile innovations in healthcare: customer involvement and the co-creation of value. International Journal of Mobile Communications (IJMC) Vol. 5, No. 4, pp.371-388 Andersson P., Rosenqvist C., and Valiente P., (2009) User involvement in the development of wireless applications in supply chains of the forestry industry. International Journal of Mobile Communications (IJMC) Vol. 7, No. 1, pp.1-20 Argyris C., Putnam R., Smith D., (1985) Action Science: Concepts, methods and skills for research and intervention. Jossey-Bass: San Francisco. Arksey, H., and Knight, P., (1999) Interviewing for Social Scientists: an Introductory Resource with Examples. London: Sage. Auer C. and Follack M., (2002) Using Action Research for Gaining Competitive Advantage out of the Internet’s Impact on Existing Business Models. 15th Bled Electronic Commerce Conference: Bled, Slovenia, June 17 - 19, 2002. Australian Computer Society, (2005) Business Process Basics, ACS Learn, [Online]. Available: www.acs.openlab.net.au/content.php?article.35. Australian Computer Society. Asif Z. and Mandviwalla M., (2005) Integrating the Supply Chain with RFID: An In- Depth Technical and Business Analysis. Communications of the Association for Information Systems (Vol. 15, 2005) 393–427. Atkins A.S., and HajiAl AK H.N.P., (2009) Mobile Strategy for E-Business Solution. In Unhelkar (Ed.), Chapter 10 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Bailey K. D., (1987) Methods of Social Research, New York: The Free Press (Macmillan Publishing Co. Inc.). References PhD Thesis 259 Ming-Chien (Mindy), WU Bakers M.J. and Foy A., (2008) Business and Management Research: How to complete your research project successfully (2nd edition), Westburn Publishers Ltd. Baldwin T., (2003) Cambridge History of Philosophy 1870-1945, Cambridge: Cambridge University Press. Barnes, S.J., (2002) The mobile commerce value chain: analysis and future development. International Journal of Information Management 22 (2), 91–108. Barry, D.K., (2003) Web Services and Service-Oriented Architecture- The savvy Manager’s Guide. USA. Morgan Kaufmann Publishers. ISBN: 1-55860-906-7. Benbasat, I., Goldstein, D.K. and Mead, M., (1987) The Case Research Strategy in Studies of Information Systems. MIS Quarterly (11:3) 1987, pp. 369-386. Benlamri R. , Adi W., Al-Qayedi A., Dawood A. M., (2010) Secure human face authentication for mobile e-government transactions. International Journal of Mobile Communications (IJMC) Vol. 8, No. 1, pp.71-87 Berg, B. L., (2004) Qualitative research methods for the social sciences. 5th edition. Boston: Allyn and Bacon. Pearson Education, Inc. Bhalla I. and Chaudhary K., (2009) Traffic Management System (TMS) using WiMAX. In Unhelkar B. (Ed.), Chapter 57 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Bichou K. and Gray R., (2004) A logistics and supply chain approach to seaport efficiency – an inquiry based on action research methodology. In Kotzab et al. (Ed.), Part 4 fifth chapter of book: Research methodologies in supply chain management. Physica-Verlag: a Springer company, p 413-429. Billingsley J. M. and Poole M.S., (1986) Organizational Groups in Conflict: a Case Study of Conflict Interaction from a Rule Perspective. The organizational Communication Division of the International Communication Association, Chicago, Illinois. Blaikie, N., (1993) Approaches to Social Enquiry. Cambridge: Polity Press/Blackwell publishers. Borg, W.R. and Gall, M.D, (1989) Educational research. New York: Longman. Bortton, C., (2004) IT architectures and middleware: strategies for building large, integrated systems. 2nd edition. Boston: Addison-Wesley Bryman A. and Burgess R.G., (Ed.) (1999) The Quality of qualitative research, London: Sage Publications. References PhD Thesis 260 Ming-Chien (Mindy), WU Bryman A., (2004) Social Research Methods 2nd edition, New York: Oxford University Press. Bruce A.E., (2005) 802.11 wireless network site surveying and installation. Indianapolis, IN: Cisco. Burness, L., Higgins, D., Sago, A. and Thorpe, P., (2004) Wireless LANs – present and future. In Smyth (Ed.), Chapter 3 of book: Mobile and wireless communications: key technologies and future application. British Telecommunications Plc.: the IEE. Burrell G. and Morgan G., (1979) Sociological Paradigms and Organizational Analysis, Heinemann Burstein F., (2000) System development in information system research. In Williamson (Ed.), Chapter 7 of book: Research methods for students and professionals: information management and systems. Centre for information systems: Charles Sturt University. P.129-140. Butler Group, (2004) Technology Evaluation and Comparison Report- Enterprise Architecture: An End-to-end Approach for Re-aligning IT with Business Aims. Butler Group, February, 2004. Buttery, S. and Sago A., (2004) Future application of Bluetooth. Chapter 4 of book: Mobile and wireless communications: key technologies and future application. British Telecommunications Plc: the IEE. 2004. Carbone, J. A., (2004) IT architecture toolkit, Upper Saddle River, N.J.: Prentice Hall PTR; London: Pearson Education Chalmers, A. F., (1991) What is this called Science? Queensland, Australia: University of Queensland, Press. Chang W.L., (2010) An agent-based system for collaborative informal learning in a pervasive environment. International Journal of Mobile Communications (IJMC) Vol. 8, No. 2, pp.187-209 Clarke, R., (2000) Appropriate Research Methods for Electronic Commerce. Canberra: Xamax Consultancy Pty. Ltd. Collis J. and Hussey R., (2009) Business Research: a Practical Guide for Undergraduate and Postgraduate Students, New York: Palgrave Macmillan Limited. Constantine, L and Lockwood, L, (1997) Software for Use: A Practical Guide to the Models and Methods of Usage-Centered Design, Addison-Wesley Longman, Reading Massachusetts; also see www.foruse.com References PhD Thesis 261 Ming-Chien (Mindy), WU Cook M.A., (1996) Building Enterprise Information Architectures- Reengineering Information Systems. Prentice-Hall, Inc. Cooper, D. R. and Schindler, P. S., (2008) Business research methods, 10th edition. McGraw Hill International edition Cronje, J. C., and Burger, D., (2006) Learning from a free access digital-information kiosk in Africa - An Objectivist-Constructivist Investigation. Aslib Proceedings: New Information Perspectives, 58(3), 218-236. Curtis, D., Wu, M., (2009) Investigation into the Impact of Integration of Mobile Technology Applications into Enterprise Architecture. In the Unhelkar (Ed.), Chapter 49 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition. IGI Global, Hershey, PA, USA, 2009. D’Andrea A., Ferri F., and Grifoni P., (2009) Social Impacts of Mobile Virtual Communities on Healthcare. In Unhelkar B. (Ed.), Chapter 29 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Davies, N. J., Fensel, D. and Richardson, M., (2004) The Future of Web Services. BT Technology, 22(1), pp. 118–127. Davison, A. Burgess, S. and Tatnall, A. (2008) Internet Technologies and Business. 3rd Edition. Data publishing, in conjunction with Arramlu publications. De Waal C., (2005) Pragmatism. Belmont CA: Wadsworth. Department of Defense (DoD), (2007) DoD Architecture Framework, Version 1.5, Vol. I: Definitions and Guidelines, Department of Defense 23 April 2007. DeVries P. D. (2008) The state of RFID for effective baggage tracking in the airline industry. International Journal of Mobile Communications (IJMC) Vol. 6, No. 2, pp.151-164 Dick B., (1999) What is action research? [Online]. Available: http://www.scu.edu.au/schools/gcm/ar/whatisar.html Dooley D., (1984) Social Research Methods, Englewood Cliffs, New Jersey; Prentice Hall. Dowell, S.J., (2007) Enterprise Architecture within the Service-Oriented Enterprise. In Saha (Ed.), Chapter 23 of book: Handbook of Enterprise Systems Architecture in Practice. IGI Global, Hershey, London, Melbourne, Singapore. References PhD Thesis 262 Ming-Chien (Mindy), WU Eckermann, R., (2008) Green ICT, [Online]. Available: http://www.acs.org.au/nsw/meetings/0802_ACS_PDF.pdf, Australian Computer Society (ACS), Education across the Nation Lecture Series Q1’08 Eng, T.Y., (2005). Mobile Supply Chain Management: Challenges for Implementation. Elsevier Ltd.: Technovation. EPCglobal Inc., (2005) EPCglobal Inc., [Online]. Available: http://www.epcglobalinc.org/. EPCglobal Inc. Federal Chief Information Officer Council, (2001) A Practical Guide to Federal Enterprise Architecture Version 1.0, Chief Information Officer Council, February 2001. Finnemore, M., and Sikkink, K., (2001) The Constructivist Research Program in International Relations and Comparative Politics. [online]. Available: http://arjournals.annualreviews.org. Annual Reviews, 2010. Finkelstein C., (2006) Enterprise Architecture for Integration: rapid delivery methods and technologies. Artech House: U.S.A. Fitch M., (2004) The use of satellite for multimedia communications. In Smyth (Ed.), Chapter 10 of book: Mobile and wireless communications: key technologies and future application. British Telecommunications Plc: the IEE. Flick, U., (2006) An Introduction to Qualitative Research, 3rd edition, London: Sage Publications Ltd. Forman, G. H, and Zahorjan, J., (1994) The challenges of mobile computing. Computer, 27(4), pp.38-47, April, 1994. Genus, A., and Maohamed, M., A., (2005) Socialising the digital divide: Implications for ITs and E-business Development. Journal of electronic commerce in organizations, 3(2), 82-94. Ghanbary, A., (2006) Evaluation of mobile technologies in the context of their applications, limitations and transformation. In Unhelkar B. (Ed.), Chapter 42 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives. IGI Global, Hershey, PA, USA. Ghanbary A., and Unhelkar B., (2009) Extending Enterprise Application Integration (EAI) with Mobile and Web Services Technologies. In Unhelkar (Ed.), Chapter 67 of References PhD Thesis 263 Ming-Chien (Mindy), WU book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Ghosh, A. K. (2001). Security and Privacy for E-Business. New York: John Wiley and Sons Gidófalvi G., Larsen H. R., and Pedersen T. B., (2008) Estimating the capacity of the Location-Based Advertising channel. International Journal of Mobile Communications (IJMC) Vol. 6, No. 3, pp. 357-375 Goh and Taniar (2006) Mobile USER Data Mining and Its Applications In Unhelkar B. (Ed.), Chapter 16 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives. IGI Global, Hershey, PA, USA, 2006. Goikoetxea, A., (2007) Enterprise Architectures and Digital Administration: Planning, Design and Assessment. World Scientific Publishing Co. Pte. Ltd. Goransson, P. and Greenlaw, R. (2007) Secure roaming in 802.11 networks. Boston, MA: Newnes. Gruber. T. R., (1993) A translation approach to portable ontologies. Knowledge Acquisition, 5(2), pp.199-220,. Guizani, M. and Raju, A. (2005) Wireless Networks and Communications Security In Y. Xiao, J. Li and Y. Pan (Eds.), Security and Routing in Wireless Networks (Vol. 3, pp. 320). New York: Nova Science Publishers, Inc. Gummeson E., (2000) Qualitative methods in management research 2nd edition. Sage: Tausand Oaks, CA. Gupta S., Garg M., Xu H., Goh M., (2009) RFID and Supply Chain Visibility. In Unhelkar (Ed.), Chapter 34 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Hammer M. and Champy J., (2001) Reengineering the Corporation: a manifesto for business revolution, London: Nicholas Brealey. Greenwood D. and Levin M., (2007) Introduction to Action Research: Social Research for Social Change2nd edition. Sage Publication Inc.: Thousand Oaks., California, U.K. Harmon R., and Daim T., (2009) Assessing the Future of Location-Based Services: Technologies, Applications, and Strategies. In Unhelkar (Ed.), Chapter 5 of book: References PhD Thesis 264 Ming-Chien (Mindy), WU Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Harrison, A. and Taylor, J.I., (2005) WSPeer – An Interface to Web Service Hosting and Invocation. Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS’05) 1530-2075/05. Hazra T. K., (2002) Transitioning Business Application Components to Web Services Cutter Enterprise Architecture Executive Report, Vol. 5, No. 12 Hazra T. K., (2009) SOA: Understanding the Practice 2010 -- Creating Business- Driven Services, Cutter Enterprise Architecture Executive Report Heidegger, M., (1977) The question concerning technology and other essays: Harper Colophon Books. Heinonen K. and Strandvik T., (2007) Consumer responsiveness to mobile marketing. International Journal of Mobile Communications (IJMC) Vol. 5, No. 6, pp.603-617 Henderson, J.C.and Venkatraman, N. (1993) Strategic alignment: leveraging IT for transforming organizations. IBM System Journal. Vol 32, No.1, pp.472-484. Hurster, W., Fuychtuller, H. and Fischer, T., (2006) Mobile Batch Tracking- a breakthrough in supply chain management. In Unhelkar B. (Ed.), Chapter 63 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives. IGI Global, Hershey, PA, USA. i-Mode (2005) i-mode Technology. [online]. Available: http://www.nttdocomo.com/technologies/present/imodetechnology/index.html NTT DOCOMO, INC. International Organization for Standardization (ISO), (2009) ISO- ISO Standards: International Standards for Business, Government and Society, [Online]. Available: http://www.iso.org/iso/iso_catalogue.htm, International Organization for Standardization ITU Radio Regulation, (2001). Frequency allocation. Vol. 1 articles, article 5. Hartman J. J. and Hedblom J. H. (1979) Methods for the Social Sciences: a Handbook for Students and Non-specialists, Westport, Connecticut: Quorum Books. Iversen, J., Mathiassen, L., and Nielsen, P. A., (2004) Managing Risk in Software Process Improvement: An Action Research Approach 1. MIS Quarterly, 28(3), pp.395-434. References PhD Thesis 265 Ming-Chien (Mindy), WU Jankowska A. M., Kurbel K., and Schreber D., (2007) An architecture for agent- based mobile Supply Chain Event Management. International Journal of Mobile Communications (IJMC) Vol. 5, No. 3, pp. 243-258 Jelena M., (2008) Wireless personal area networks : performance, interconnections and security with IEEE 802.15.4. Chichester, England ; Hoboken, NJ : Wiley. Kahn R.L. and Cannell C.F. (1957) The Dynamics of Interviewing: Theory, Technique, and Cases. New York : Wiley. Kamada, T., (1998) CompactHTML for small information appliances. [online]. Available: http://www.w3.org/TR/1998/NOTE-compactHTML-19980209/ W3C (World Wide Web Consortium). Kamogawa T. and Okada H., (2004) Issues of e-business implementation from Enterprise Architecture viewpoint. Proceedings of the 2004 International Symposium on Applications and the Internet Workshops (SAINTW’04), 2004 IEEE. Kasanen, E., Lukka, K., and Siitonen. (1993) The Constructive Approach in Management Accounting Research. Journal of Management Accounting Research, 5, pp.243-264. King J. W., (1985) Using Case Study Methodology to Describe Development Communication Programs. Niftal Project - MIRCEN, University of Hawaii, Department of Agronomy and Social Science, College of Tropical Agriculture Human Resources. Kuo Y.F. and Yu C.W., (2005) 3G telecommunication operators’ challenges and roles: A perspective of mobile commerce value chain. Elsevier Ltd: Technovation. Kushchu I. and Kuscu M. H., (2003) From e-Government to m-Government: Facing the Inevitable. The 3rd European Conference on e-Government. pp. 253–260. Lam, W.H. and Shankararaman, V., (2007) Dissolving Organization and Technological Silos: An overview of enterprise integration. In Lam and Shankararaman (Ed.), Chapter 1 of book: Enterprise Architecture and Integration: Methods, Implementation, and Technologies. Information Science Reference, IGI Global, USA. Lan Y. and Unhelkar. B., (2005) Global Enterprise Transitions: managing the process. Hershey, PA: IGI publication. References PhD Thesis 266 Ming-Chien (Mindy), WU Lawler J.P. and Howell-Barvber H., (2008) Service-Oriented Architecture: SOA Strategy, Methodology, and Technology, Auerbach Publication, Taylor and Francis Group. Laukkanen T., (2007) Measuring mobile banking customers' channel attribute preferences in service consumption. International Journal of Mobile Communications (IJMC) Vol. 5, No. 2, pp.123-138 Laukkanen T., Sinkkonen S., Laukkanen P., and Kivijarvi M., (2008) Segmenting bank customers by resistance to mobile banking. International Journal of Mobile Communications (IJMC) Vol. 6, No. 3, pp.309-320 Lawrence, E., Bina, M., Culjak, G. and El-Kiki, T., (2007) Wireless Community Networks: Public Assets for 21st Century Society, Proceeding of International Conference on Information Technology: Next Generation (ITNG 2007) April 2-4, Las Vegas, 2007. Lee T.R., Chen S.Y., Wang S.T., and Chang S.E., (2009) Adoption of mobile Location-Based Services with Zaltman Metaphor Elicitation Techniques. International Journal of Mobile Communications (IJMC) Vol. 7, No. 1, pp.117-132 Leedy D. P., (1993) Practical Research. USA. New Jersey: Prentice Hall. Leonard P., (1991). Objectivism: The Philosophy of Ayn Rnd. New York: Dutton. Leslie G., (1999) Positivism and Conventionalism. Canadian Journal of Law and Jurisprudence pp. 35-52. Lewin, K., (1946) Action research and minority problems. J Soc. Issues 2(4): 34-46 Linthicum. D.S., (2000) Enterprise application integration. Addison-Wesley information technology series. Long D., (2003) International Logistics– Global Supply Chain Management. Library of Congress Cataloging-in-Publication Data: Kluwer Academic Publishers. Malladi S. and Varshney U., (2008) Design and application of a Health Insurance Portability and Accountability Act-compliant privacy framework for pervasive healthcare. International Journal of Mobile Communications (IJMC) Vol. 6, No. 4 Marks E.A. and Werrel M.J., (2003) Executive’s guide to Web Services. John Wiley and Sons, Inc., Hoboken, New Jersey. Marmaridis, I., and Unhelkar, B., (2005) Challenges in Mobile Transformations: A Requirements modeling perspective for Small and Medium Enterprises (SMEs). Proceedings of mBusiness International Conference, Sydney, Australia. References PhD Thesis 267 Ming-Chien (Mindy), WU Marshall C. and Rossman G.V., (1989) Designing Qualitative Research. CA: Sage Publications. Mastorakis, G. Pallis E. and Kormentzas G. (2007) A Fusion IP/DVB Networking Environment for Providing Always-On Connectivity and Triple-Play Services to Urban and Rural Areas. IEEE Networks, March-April, Vol. 21, Issue: 2, pp.21-27. Matthew G., (2005) 802.11 wireless networks : the definitive guide, 2nd edition. Beijing ; Farnham : O’Reilly Matthias. S., (1996) An Introduction to Contemporary Epistemology. Upper Saddle River: Prentice Hall. May P., (2001) Mobile Commerce: Opportunities, Applications, and Technologies of Wireless Business. Foreword by T. Jell, Cambridge University Press. McDonagh J. and Coghlan D., (2001) The art of clinical inquiry in information technology-related organizational research, in Reason and Bradbury (Ed.), Chapter 37 of book: Handbook of action research, London, P.372-378. McGovern J., Ambler S. W., Stevens M.E., Linn J., Sharan V., Jo, E.K., (2004) A Practical Guide to Enterprise Architecture. Pearson Education, Inc. McGuire, R., (2007) The power of mobility: How your business can compete and win in the next technology revolution. John Wiley & Sons, Inc., Hoboken, New Jersey. McMurray A. J., Pace R. W., Scott D., (2004) Research: a commonsense approach. Southbank: Thomson. McNiff J. and Whitehead J., (2002) Action research: principles and practice 2nd edition. RoutledgeFalmer: London. Meeta, G. (2003) Building a virtual private network. Cincinnati, Ohio: Premier Press META Group, Inc., (2006) Adaptive Enterprise Architecture. META Group, Inc., CT-USA, 2004. – Bittler. R. S. private presentation to UWS Advanced enterprise Information Management Systems (AeIMS) Research Group on 13/11/2006. Middel R., Brennan L., Coghlan D., Coughlan P., (2005) The application of action learning and action research in collaborative improvement within the extended manufacturing enterprise. In Kotzab et al. (Ed.), Part 4 second chapter of book: Research methodologies in supply chain management. Physica-Verlag: a Springer company, pp. 365-380. Miles, M. B. and Huberman, A. M., (1994) Qualitative Data Analysis 2nd edition. Thousand Oaks, CA: Sage. References PhD Thesis 268 Ming-Chien (Mindy), WU Milojicic, D., Douglis, F., and Wheeler, R., (Ed.) (1999) Mobility: processes, computers, and agents. Addison- Wesley Longman, Inc., Association for Computing Machinery, Inc. Minoli D., (2008) Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology, CRC Press, Taylor and Francis Group Moore K. and Rutter J., (2004) Understanding Consumers’ Understanding of Mobile Entertainment. Proceedings of Mobile Entertainment: User-centred Perspectives, Manchester, England: MGAIN. Muller M., (2005) Action research in supply chain management – an introduction. In Kotzab et al. (Ed.), Part 4 first chapter of book: Research methodologies in supply chain management. Physica-Verlag: a Springer company, pp. 349-364. Myers M. D., (1997). Qualitative Research in Information Systems. MIS Quarterly (21:2), June 1997, pp. 241-242. [online]. Available: http://www.qual.auckland.ac.nz/#Qualitative%20Research%20Methods, MISQ Discovery. Myers, M., Avison, D., Lau, F., Nielsen, P. A., (1999) Action Research. Communications of the ACM. Vol 42, No. 1, pp.94 - 97. Nand, S., (2006) Developing a Theory of Portable Public Key Infrastructure (PORTABLEPKI) for Mobile Business Security. In Unhelkar B. (Ed.), Chapter 27 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives. IGI Global, Hershey, PA, USA, 2006. Ng E. H. and Kwahk K. Y., (2010) Examining the determinants of Mobile Internet service continuance: a customer relationship development perspective. International Journal of Mobile Communications (IJMC) Vol. 8, No. 2, pp.210-229 Ngai, E.W.T., Cheng, T.C.E., Au, S., and Lai K.H., (2005) Mobile commerce integrated with RFID technology in a container depot. Elsevier Ltd.: Decision Support Systems. Ohrtman, F., (2005) WiMax Handbook: Building 802.16 wireless networks. McGraw-Hill Communications. Okuhata H., Uno H., Kumatani K., Shirakawa I. and Chiba T., (1997) 4MBPS Infrared Wireless Link Dedicated to Mobile Computing. IEEE, pp.463–467. References PhD Thesis 269 Ming-Chien (Mindy), WU Olla P., (2005) Incorporating commercial space technology into mobile services: developing innovative business models. Idea Group Inc. O’Neil, P. and O’Neil, E. (2000). Datbase-Principles, programming, performance. 2ND edition. Morgam Kaufmann. Oosthuizen M., (2000) Action research. In Williamson (Ed.) Chapter 8 of book: Research methods for students and professionals: information management and systems. Centre for information systems: Charles Sturt University. P. 141-158. Open Mobile Alliance, (2003). WAP ゴ Wireless Application Protocol サ Specification Information Note. [online]. Available: http://www.openmobilealliance.org/tech/affiliates/wap/wap-211_104-wapcert- 20010928-a.pdf. Wireless Application Protocol Forum, Ltd. Orr, K., (2007) Business Architecture: Linking Business, Data, and Technology. Cutter Enterprise Architecture Executive Report, Vol.10, No.2, Feb, 2007. Oxford Compact Dictionary and Thesaurus, (1997) Oxford: Oxford University Press, pp.557. Paavilainen J., (2001) Mobile business strategies: understanding the technologies and opportunities. Wireless Press; Addison-Wesley in partnership with IT Press. Patel K.J., (2009) Successful Implementation of Emerging Communication Technologies in a Mobile-Intense Organization: A Case Study of Sydney Airport. In Unhelkar (Ed.), Chapter 32 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Patton M.Q., (1990) Qualitative Evaluation and Research Methods, 2nd edition, California: Sage Publications Inc. Perks C. and Beveridge T., (2003) Guide to Enterprise IT Architecture, Springer, New York. Philips, D. C., (1995) The Good, the Bad and the Ugly: The many faces of Constructivism. Educational Researcher, 24(7), pp.5-12. Praphul C., (2007) Wi-Fi telephony: challenges and solutions for voice over WLANs. Burlington, MA: Elsevier/Newnes. Popkin. J., (2007) Leveraging the Value Proposition of SOA: How Enterprise Architecture Helps Organizations Analyze and Develop Their Service Strategy. Telelogic. References PhD Thesis 270 Ming-Chien (Mindy), WU Pulkkinen, M., (2006) Systemic Management of Architectural Decisions in Enterprise Architecture Planning. Four Dimensions and Three Abstraction Levels. Proceedings of the 39th Hawaii International Conference on System Sciences – 2006 IEEE. Puustjarvi, J., (2006) Using Mobile Web Services in Electronic Auctions. Proceedings of the 2nd IASTED international conference on Advances in computer science and technology ACST'06. January 2006. Qiu R. G. (Ed), (2007) Enterprise Service Computing: From Concept to Deployment, Idea Group Inc. Ramakrisham, K.R., Bhattar, R.K., Dasgupta, K.S., and Palsule, V.S., (2006) Review of Wireless Technologies and Generations. In Unhelkar B. (Ed.), Chapter 11 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives. IGI Global, Hershey, PA, USA. Ratner C., (2007). Cultural psychology and qualitative methodology: Scientific and political considerations. Culture and Psychology, 13 Rapoport, R., (1970) Three Dilemmas in Action Research. Human Relations, 123(4), pp.499-513. Roberts, C.M., (2006) Radio Frequency Identification. Computers Security 25, 18–26. Roggenkamp K., (2004) Development modules for Mobile Government. The 4th European Conference on e-Government. Rolstadas A. and Andersen. B., (2000) Enterprise Modeling- improving global industrial competitiveness. Kluwer Academic publishers. Ron, O. (2005) Implementing 802.11, 802.16 and 802.20 wireless networks: planning, troubleshooting, and operations. Amsterdam; Boston: Newnes. Ryan, B., Scapens, R.W., Theobald, M., (2002) Research Method and Methodology in Finance and Accounting 2nd edition, Thomson, London. Saha, P. (Ed.), (2007) Handbook of Enterprise Systems Architecture in Practice IGI Global, Hershey, London, Melbourne, Singapore. Saunders, M. N. K., Lewis, P., and Thornhill, A., (2007) Research Methods for Business Students 4th Edition. Harlow, England: Pearson Education Limited. References PhD Thesis 271 Ming-Chien (Mindy), WU Scheniderman R., (2002) The Mobile Technology Question and Answer Book. Amacom: American Management Association. Schilhavy, R., and Salam, A.F., (2006) Emerging mobile technology and supply chain integration: using RFID to streamline the integrated supply chain. In Unhelkar B. (Ed.) Chapter 62 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives. IGI Global, Hershey, PA, USA, 2006. Senior IS researcher site advisors of University of York., (2007) Theories Used in Information Systems Research. [Online]. Available: http://www.istheory.yorku.ca/. University of York (U.Y.). Sherringham K., and Unhelkar B., (2009) Real Time Decision Making and Mobile Technologies. In Unhelkar (Ed.), Chapter 16 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Shiratuddin N., Hassan S., Zaibon S.B., Salam S.N.A., (2009) eBook Mobile Payment Process Model. In Unhelkar (Ed.), Chapter 12 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Shuaib, K. and Boulmalf, M., (2006) Co-Existence of WLAN and WPAN Communication Systems. In Unhelkar B. (Ed.) Chapter 23 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives. IGI Global, Hershey, PA, USA, 2006. Skianis H., Kormentzas G. and Kontovasillis K. (2005) Interactions between Intelligent Multimodal Terminals and a Network Management System in a B3G Environment. Wireless Communications and Mobile Computing; Vol 5, pp.679-695. Smith, R.E., (1988) The Logic and Design of Case Study Research. The Sport Psychologist, 2, pp.1 -12. Soren, V. (1991) SQL and relational databases. San Marcos, Calif: Microtrend Books. Spens, K. M., and Kovacs, G., (2006) A content analysis of research approaches in logistics research. International Journal of Physical Distribution and Logistics Management, 36(5), pp.374-390. Srirama S., Jarke M., and Prinz W., (2006) Mobile Host: A feasibility analysis of mobile Web Service provisioning, Ubiquitous Mobile Information and Collaboration Systems, UMICS 06 Conference Proceeding. References PhD Thesis 272 Ming-Chien (Mindy), WU Stacey, M. and Unhelkar, B., (2004) Web Services in Implementation. Paper presented at the 15th ACIS Conference, Hobart, Australia. Stake, R.E., (1981) Case Study Methodology: an Epistemological Advocacy. Proceedings of the Minnesota Evaluation Conference, Minneapolis, Minnesota: Minnesota Research and Evaluation Center. Stevens, W. R. (1994) TCP/IP Illustrated, Vol. 1: The Protocols. Addison-Wesley Subramanian C., (2009) Secure Payment in Mobile Business: A Case Study. In Unhelkar B. (Ed.), Chapter 53 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Susilo W. and Win K. T., (2007) Securing personal health information access in mobile healthcare environment through short signature schemes. International Journal of Mobile Communications (IJMC) Vol. 5, No. 2, pp.215-224 Tatham, A. (2006) How CLEW could authenticate credit cards to avoid credit card fraud. AEIMS research Group (ppt. Technical Presentation). Sydney: Alacrity. ( www.alacritytech.com.au ). TOGAF Architecture., (2009) The Open Group Architectural Framework [Online]. Available: http://www.theopengroup.org , The Open Group Architectural Framework Tounsi M. and Qureshi B., (2008) A Bluetooth intelligent e-healthcare system: analysis and design issues. International Journal of Mobile Communications (IJMC) Vol. 6, No. 6, pp.683-695 Tung W. F., Yuan S.T., and Lin B. (2007) M-Library: a mobile service in online WebPAC. International Journal of Mobile Communications (IJMC) Vol. 5, No. 5, pp. 487-507 Umar. A., (2005) IT Infrastructure to Enable Next Generation Enterprises. Information Systems Frontiers. Vol. 7, Issue 3, July, 2005. UMTSWorld, (2003) HSDPA in W-CDMA, [online]. Available: http://www.umtsworld.com/technology/hsdpa.htm UMTSWorld.com. Unhelkar B., (2004) Globalization with Mobility. ADCOM 2004, 12th International Conference on Advanced Computing and Communications, Ahmedabad, India, Invited Keynote Address. References PhD Thesis 273 Ming-Chien (Mindy), WU Unhelkar, B., (2005) Transitioning to a Mobile Enterprise: A Three-Dimensional Framework, Cutter IT Journal, Vol 18, No. 8, August, 2005, pp. 5 – 11; Lead Article. Unhelkar. B., (2008) Mobile Enterprise Architecture: Model and Application. The Enterprise Architecture Advisory Service Executive Report Vol. 11, No. 3, Cutter Consortium, USA. Unhelkar B. (2009a) Mobile Business: Upcoming Opportunities, Challenges, and Transition Approaches. Cutter Benchmark Review, 9, pp.13- 31. Unhelkar B., (2009b) Mobile Enterprise Transition and Management, CRC Press, Taylor and Francis Group Unhelkar B. (2010) Managing Mobile Business. In Simon, P. (Ed.) The Next Wave of Technologies: Opportunity From Chaos. John Wiley and Sons. Unhelkar B., Ghanbary A. and Younessi, H., (2009) Collaborative Business Process Engineering and Global Organizations: Frameworks for Service Integration, IGI Global, Hershey, PA, USA. Vaughan-Nichols, S.J., (2003) Mobile Ipv6 and the future of Wireless Internet access. Computer, 36 (2), pp.18-20. Virginia Information Technologies Agency (2010) Enterprise Definitions and Models. [Online]. Available: http://www.vita.virginia.gov/oversight/default.aspx?id=351 . Commonwealth of Virginia. Vriendt, J. D., Lainé, P., Lerouge, C., and Xu, X. (2002). Mobile network evolution: A revolution on the move. IEEE Communications Magazine, 40(4), pp.104-111. Wagner R., and Klaus M., (2009) Cultural Impacts on the Spread of Mobile Commerce. In Unhelkar (Ed.), Chapter 13 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Wagner R. and Klaus M., (2009) Mobile Direct Marketing. In Unhelkar B. (Ed.), Chapter 25 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Walter M. (Ed.), (2006) Social Research Methods: an Australian Perspective, New York: Oxford University Press. References PhD Thesis 274 Ming-Chien (Mindy), WU Werth D. and Makuch P., (2009) Mobile Technologies Extending ERP Systems In Unhelkar B. (Ed.), Chapter 41 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Wiehler G., (2004) Mobility, security and web services: technologies and service- oriented architectures for a new era of IT solutions. Publics Kommunikations Agentur GmbH, GWA, Erlangen. Wiener S. N., (2003) Terminology of Mobile Entertainment: An Introduction. Mobile Entertainment Forum WiMax Forum, (2006) WiMax Forum – Frequently Asked Questions, [Online]. Available: http://www.wimaxforum.org/technology/faq, WiMax Forum. Wireless Application Protocol Forum, Ltd. (2001). Wireless Markup Language (Version 2.0). [online]. Available: http://www.openmobilealliance.org/tech/affiliates/LicenseAgreement.asp?DocName =/wap/wap-238-wml-20010911-a.pdf Wireless Application Protocol Forum, Ltd. Wong, C.C., and Hiew, P.L., (2005) Mobile Entertainment: Review and Redefine. IEEE 4th International Conference on Mobile Business, July 11-13, Sydney, Australia Wu, M., (2007) Doctoral Consortium Paper: Extending Enterprise Architecture with Mobility to Create Mobile Enterprise Architecture (M-EA). Conference Proceeding of Australian Conference on Information Systems (ACIS) 2007, December 4th, Toowoomba, Q.L.D. Wu, M., and Unhelkar, B., (2008) Extending Enterprise Architecture with Mobility, Proceeding of IEEE 67th Vehicular Technology Conference, Singapore, May 11-14. Wu, M., and Unhelkar, B., (2009) Extending Enterprise Architecture with Mobility. In Unhelkar (Ed.), Chapter 42 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Yin, R. K., (1994) Case Study Research: Design and Methods (2nd ed.): Applied Social Research Methods Series (Vol. 5). Thousand Oaks, London and New Delhi: SAGE Publications. Yin, R. K., (2003) Applications of Case Study Research (Second Edition ed. Vol. 34). Thousand Oaks: SAGE Publications. References PhD Thesis 275 Ming-Chien (Mindy), WU Younessi H., (2009) Strategic View on Creating Business Value through Mobile Technologies. In Unhelkar B. (Ed.), Chapter 1 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Zachman. J.A., (1987) Zachman Framework. [Online]. Available: http://www.zifa.com/. The Zachman institute for framework advancement. Zhao W., (2009) Increasing the Performability of Wireless Web Services. In Unhelkar (Ed.), Chapter 68 of book: Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives 2nd edition, IGI Global, Hershey, PA, USA, 2009. Zimmermann H., (1980) OSI Reference Model. IEEE Transactions on Communications, Vol. COMM-28(4), pp.425, April 1980. Zmijewska, A. and Lawrence, E. (2006) Implementation Models in Mobile Payments. Proceedings of the IASTED International Conference on Advances in Computer Science and Technology (ACST), January 23-25, Puerto Vallarta, Mexico. Appendix PhD Thesis 276 Ming-Chien (Mindy), WU Appendix A: Interview Sample Questions HREC Number 07/200 Mobile Enterprise Architecture Information Sheets MOBILE ENTERPRISE ARCHITECTURE (M-EA): RESEARCH PROJECT Dear Participant: Thank you very much for your interest in this research area of Mobile Enterprise Architecture (M-EA). This is a sincere invitation to you to be one of the interviewees for this research project. The aim of this interview is to satisfy the requirements of doctoral-level research in “Extending Enterprise Architecture with Mobility”. The benefit of this project is the construction of a comprehensive M-EA model that will also benefit your enterprise by improving its effectiveness and efficiency. This study is being conducted by a PhD candidate, Ming-Chien (Mindy), Wu, who is under the supervision of Dr. Bhuvan Unhelkar, at the University of Western Sydney, School of Computing and Mathematics. This interview is aimed at experienced enterprise architects from the industry; but also includes IT executives, CIO, or CTO in the organisations. Your response is entirely confidential. Additionally, your integrity and honesty in answering the questions is gratefully appreciated and respected, and your name and that of your organisation are not identified in the final report. The sample questions will be sent to you beforehand in order to give you an idea about the M-EA study. These questions focus on your experience of building and implementing enterprise architecture (EA), and the investigation of the mobile application usage in your industry or company. The sample questions cover the areas of definition of EA, utilisation of mobile technology devices, practical issues of M-EA, and also the challenges and the risks that you had to overcome when you implemented EA in your company. Please reply to this enquiry with a permission letter if you are able to participate and also your draft answers to these questions if you are able to become one of the interviewees. On the other hand, if you couldn’t answer these questions Appendix PhD Thesis 277 Ming-Chien (Mindy), WU or feel that it is not appropriate for you to do this interview, please do let us know. Your decision will be respected. The phone call or face-to-face interview schedule and location will be organized by phone or email after receiving your permission letter and answers to the sample questions. The process of completing this interview will take about 30 minutes. The questions during interview are similar to and in addition to the sample ones sent to you before hand; the idea is to delve deeper into your earlier answers to the sample questions. Deepening the understanding and discussing your knowledge and experience of M-EA is the aim of the interview meeting. There is no risk involved in the collection of the data. However, with your permission, an audio record of your answers will be made. If you don’t have time to participate in the interview or not willing to audio record the interview process, your decision will be respected as well. Your responses, answers of the sample questions, and the meeting voice record of the interview will be processed and analysed by the researcher under supervision to construct the M-EA implementation framework. The collected records will be securely stored within UWS for five years. The results of M-EA model are going to be collectively discussed in my PhD thesis. Parts of this study may be presented in seminars and conferences. The final thesis is going to be submitted to the School for assessment and, if successful, will be available to you and the public through the UWS libraries. Queries, comments or complaints regarding this interview can be sent directly to me or to my supervisors. Our details are as follows: Researcher: Ming-Chien (Mindy), Wu; mobile 0422-439-059; email: mindy11110224@yahoo.com.tw Supervisor: Dr. Bhuvan Unhelkar; mobile 0413-821-454; email: Bhuvan.unhelkar@gmail.com NOTE: This study has been approved by the University of Western Sydney Human Research Ethics Committee (HREC 07/200). If you have any complaints or reservations about the ethical conduct of this research, you Appendix PhD Thesis 278 Ming-Chien (Mindy), WU may contact the Ethics Committee through the Research Ethics Officers (phone: 02 47360883). Any issues you raise will be kept in confidential and investigated fully, and you will be informed of the outcome. Thank you for your assistance. Best Regards, Mindy Wu Ming-Chien (Mindy), Wu MIT (IS Management), PhD Candidate Research area: Extending Enterprise Architecture with Mobility School of Computing and Mathematics University of Western Sydney Appendix PhD Thesis 279 Ming-Chien (Mindy), WU MOBILE ENTERPRISE ARCHITECTURE (M-EA): RESEARCH PROJECT (The following personal information will only be used in a generalized manner, and it is optional to fill) About You: Your Name: ________________ Company Name(optional):_______________ Contact: __________________ Your Role: [ ] Senior Management [ ] Consultant [ ] Project Management [ ] Technical [ ] Sales & Support [ ] Other _____________ Company Size [ ] Small (< 20 workers) [ ] Medium (20-200 workers) [ ] Large (> 200 workers); Business Type [ ] Selling Products [ ] Selling Services [ ] Other______________ Industry Category [ ] Education & Training [ ] Manufacturing [ ] Health & Community [ ] Building & Construction [ ] Banking & Finance [ ] Government; [ ] Professional Services [ ] Information Technology [ ] Other ______________ Primary Region: [ ] Australia/NZ [ ] Sub-continent (India, SriLanka) [ ] Europe/UK [ ] Japan, Singapore, China [ ] North America/Canada; [ ] Other______________ Question 1: What, according to you, is an Enterprise Architecture? Question 2: Does your company have an Enterprise Architecture? If yes, how is it used in your organization? Question 3: Which documents and/or technologies have you used to build your EA? And what are the most important criteria that you handle/would handle in building your EA? Question 4: Has your organization created and followed a migration plan when you build your EA? Question 5: What are the most important security concerns that you have addressed in your EA? How does your organization overcome those concerns? Question 6: In your organization, what is the process of incorporating new technologies in your current EA? Question 7: What are the current mobile technologies and mobile applications used in your organization? How do you think these mobile technologies and applications impact to your business processes and EA? Appendix PhD Thesis 280 Ming-Chien (Mindy), WU Question 8: Are mobile technologies an integral part of your EA? Please comment even if they are not integrated yet in your EA. Question 9: What, according to you, would be the major advantages in integrated Mobile technologies with EA? Question 10: What, according to you, would be the challenges and the risks in integrated mobile technologies with EA? How would you overcome these challenges? Comment: Any other descriptive comment that will help Mobile Enterprise Architecture THANK YOU VERY MUCH FOR YOUR PARTICIPATE!! Appendix PhD Thesis 281 Ming-Chien (Mindy), WU Appendix B: Ethics Committee Approval Dear Mindy and Bhuvan HREC Number 07/200 Mobile Enterprise Architecture The Committee reviewed your application and has agreed to approve the project. It is essential that the Committee is notified of any future change to the research methodology as well as any adverse events which may occur. The project Protocol Number is HREC 07/200 and should be quoted in all correspondence about the project as well as on all information sheets, consent forms and other project documentation. A report on the ethical aspects of the project must be provided at its completion. The report form is located at http://www.uws.edu.au/about/adminorg/devint/ors/ethics/humanethics/endpro ject The approval will expire 31 March 2009 Please contact the Human Ethics Officer, Kay Buckley on tel: 02 4736 0883 or E-mail k.buckley@uws.edu.au you require any further information. The Committee wishes you well with your research. Yours sincerely Professor Christine Halse Chair, Human Research Ethics Committee Kay Buckley Human Ethics Officer University of Western Sydney Locked Bag 1797, Penrith Sth DC NSW 1797 Tel: 02 47 360 883 http://www.uws.edu.au/about/adminorg/devint/ors/ethics/humanethics Appendix PhD Thesis 282 Ming-Chien (Mindy), WU Appendix C: Research Timeline and Milestones Main Activity Milestone Timelines 1st year (2006-2007) Literature Review Consolidation and Documentation of the literature of “Extending Enterprise Architecture with Mobility” July 2006- May 2007 Publication Joint chapter publication Jun 2007 Case studies Analysis of the current business processes and systems to construct the enterprise architecture, try to mobilize EA July – Dec 2007 Publication International Conference DC Papers, joint chapter with one of interviewers Dec 2007 Draft M-EA model Construct draft M-EA model through case studies July 2006 – Dec 2007 2nd year (2008) Two Action Research Projects Test and validation the draft model to comprehend model by action research in organization Jan-Aug 2008 Publication International Conference DC Papers May 2008 Third Action Research Projects Validation M-EA model with Security aspect. Sep-Dec 2008 Publication Joint chapters Dec 2008 3rd year (2009) Establish Comprehensive M-EA Verify the draft model and construct comprehensive M- EA from the results of action researches Jan 2008-Jan 2009 Thesis Writing Documents the thesis from the result of this doctoral research project Feb-Sep 2009 Final Submission of Thesis Time line extended based on supervisors’ comments and correction; Complete and submit thesis for examination Sep-Nov 2009