|
|
1 | (6) |
|
1.1 Challenges to Enterprises |
|
|
1 | (2) |
|
1.2 Enterprise Architecture and Architecture Principles |
|
|
3 | (1) |
|
1.3 Motivations and Target Audience |
|
|
4 | (1) |
|
|
5 | (2) |
|
2 The Role of Enterprise Architecture |
|
|
7 | (24) |
|
|
7 | (2) |
|
2.2 Enterprise Transformations and Enterprise Engineering |
|
|
9 | (2) |
|
2.3 Streams of Activities in Enterprise Engineering |
|
|
11 | (3) |
|
2.4 Architecture-Based Governance of Enterprise Transformations |
|
|
14 | (6) |
|
2.4.1 The Need for Architecture |
|
|
14 | (2) |
|
2.4.2 Architecture as a Bridge from Strategy to Design |
|
|
16 | (2) |
|
2.4.3 Steering with Architecture |
|
|
18 | (1) |
|
2.4.4 The Three Roles of Enterprise Architecture |
|
|
19 | (1) |
|
2.5 Defining Enterprise Architecture |
|
|
20 | (4) |
|
2.5.1 The Purpose of an Enterprise Architecture |
|
|
21 | (1) |
|
2.5.2 The Meaning of an Enterprise Architecture |
|
|
22 | (1) |
|
2.5.3 The Elements of an Enterprise Architecture |
|
|
22 | (2) |
|
2.5.4 Definition of Enterprise Architecture |
|
|
24 | (1) |
|
2.6 Other Forms of Architecture |
|
|
24 | (2) |
|
2.7 Standards for Enterprise Architecture |
|
|
26 | (2) |
|
2.8 The Role of Architecture Principles |
|
|
28 | (1) |
|
|
29 | (2) |
|
3 A Conceptual Framework for Principles |
|
|
31 | (28) |
|
|
31 | (1) |
|
3.2 Background of Architecture Principles |
|
|
32 | (2) |
|
3.3 Key Classes of Principles |
|
|
34 | (10) |
|
3.3.1 Scientific Principles |
|
|
34 | (1) |
|
3.3.2 Design Principles as Normative Principles |
|
|
35 | (3) |
|
3.3.3 From Credos to Norms |
|
|
38 | (2) |
|
3.3.4 Conceptual Framework |
|
|
40 | (4) |
|
3.4 Architecture Principles as Pillars from Strategy to Design |
|
|
44 | (5) |
|
3.4.1 Architecture Principles |
|
|
44 | (1) |
|
3.4.2 Business and IT Principles |
|
|
44 | (2) |
|
3.4.3 Bridging from Strategy to Design |
|
|
46 | (2) |
|
3.4.4 Extended Conceptual Framework |
|
|
48 | (1) |
|
3.5 Motivating Architecture Principles |
|
|
49 | (7) |
|
3.5.1 Sources for Finding Motivation |
|
|
50 | (2) |
|
3.5.2 Drivers as Motivation for Architecture Principles |
|
|
52 | (2) |
|
3.5.3 Extended Conceptual Framework |
|
|
54 | (2) |
|
3.6 Formal Specification of Normative Principles |
|
|
56 | (2) |
|
|
58 | (1) |
|
4 Architecture Principle Specifications |
|
|
59 | (26) |
|
|
59 | (3) |
|
4.2 Dimensions in Architecture Principles |
|
|
62 | (8) |
|
4.2.1 Type of Information Dimension |
|
|
63 | (1) |
|
|
63 | (1) |
|
4.2.3 Genericity Dimension |
|
|
64 | (1) |
|
4.2.4 Level of Detail Dimension(s) |
|
|
65 | (1) |
|
4.2.5 Stakeholder Dimension |
|
|
66 | (1) |
|
4.2.6 Transformation Dimension |
|
|
66 | (1) |
|
4.2.7 Quality Attribute Dimension |
|
|
67 | (2) |
|
4.2.8 Meta-level Dimension |
|
|
69 | (1) |
|
4.2.9 Representation Dimension |
|
|
69 | (1) |
|
|
70 | (9) |
|
|
71 | (2) |
|
|
73 | (2) |
|
4.3.3 Attributes for Classification |
|
|
75 | (1) |
|
4.3.4 Potential Attributes |
|
|
75 | (1) |
|
4.3.5 Generic Meta-data Attributes |
|
|
76 | (1) |
|
|
77 | (2) |
|
4.4 Architecture Principle Sets |
|
|
79 | (2) |
|
|
81 | (2) |
|
|
83 | (2) |
|
|
85 | (26) |
|
|
85 | (3) |
|
|
88 | (21) |
|
|
88 | (3) |
|
5.2.2 Determine Principles |
|
|
91 | (7) |
|
|
98 | (2) |
|
5.2.4 Classify Principles |
|
|
100 | (1) |
|
5.2.5 Validate and Accept Principles |
|
|
100 | (1) |
|
|
101 | (4) |
|
|
105 | (3) |
|
|
108 | (1) |
|
|
109 | (2) |
|
|
111 | (22) |
|
|
111 | (1) |
|
|
112 | (3) |
|
|
112 | (1) |
|
6.2.2 Architecture Principles |
|
|
113 | (2) |
|
|
115 | (1) |
|
|
115 | (5) |
|
|
115 | (2) |
|
6.3.2 Architecture Principles |
|
|
117 | (1) |
|
|
118 | (2) |
|
|
120 | (4) |
|
|
120 | (1) |
|
6.4.2 Architecture Principles |
|
|
121 | (1) |
|
|
121 | (3) |
|
|
124 | (3) |
|
|
124 | (1) |
|
6.5.2 Architecture Principles |
|
|
125 | (2) |
|
|
127 | (1) |
|
|
127 | (5) |
|
|
128 | (1) |
|
6.6.2 Architecture Principles |
|
|
129 | (1) |
|
|
130 | (2) |
|
|
132 | (1) |
|
7 Architecture Principles in Context |
|
|
133 | (14) |
|
|
133 | (1) |
|
7.2 Types of Architectures |
|
|
134 | (3) |
|
7.2.1 Enterprise Architecture Development |
|
|
134 | (1) |
|
7.2.2 Reference Architecture Development |
|
|
135 | (1) |
|
7.2.3 Solution Architecture Development |
|
|
136 | (1) |
|
7.3 Architecture Maturity |
|
|
137 | (5) |
|
7.3.1 Department of Commerce Maturity Model |
|
|
137 | (2) |
|
7.3.2 Architecture Maturity and Architecture Principles |
|
|
139 | (3) |
|
|
142 | (3) |
|
|
145 | (2) |
|
8 Summary, Conclusions and Future Work |
|
|
147 | (6) |
|
8.1 Summary and Conclusions |
|
|
147 | (2) |
|
|
149 | (4) |
|
Appendix A Principles Catalogue |
|
|
153 | (28) |
|
A.1 Business Units Are Autonomous |
|
|
153 | (1) |
|
A.2 Customers Have a Single Point of Contact |
|
|
154 | (1) |
|
A.3 Stock Is Kept to a Minimum |
|
|
154 | (1) |
|
A.4 Processes Are Straight Through |
|
|
155 | (1) |
|
A.5 Processes Are Standardized |
|
|
155 | (1) |
|
A.6 Management Layers Are Minimized |
|
|
156 | (1) |
|
A.7 Tasks Are Designed Around Outcome |
|
|
156 | (1) |
|
A.8 Routine Tasks Are Automated |
|
|
156 | (1) |
|
A.9 Primary Business Processes Are not Disturbed by Implementation of Changes |
|
|
157 | (1) |
|
A.10 Components Are Centralized |
|
|
157 | (1) |
|
A.11 Front-Office Processes Are Separated from Back-Office Processes |
|
|
158 | (1) |
|
A.12 Channel-Specific Is Separated from Channel-Independent |
|
|
158 | (1) |
|
A.13 The Status of Customer Requests Is Readily Available Inside and Outside the Organization |
|
|
159 | (1) |
|
A.14 Data Are Provided by the Source |
|
|
159 | (1) |
|
A.15 Data Are Maintained in The Source Application |
|
|
159 | (1) |
|
A.16 Data Are Captured Once |
|
|
160 | (1) |
|
A.17 Data Are Consistent Through All Channels |
|
|
160 | (1) |
|
A.18 Content and Presentation Are Separated |
|
|
161 | (1) |
|
A.19 Data Are Stored and Exchanged Electronically |
|
|
161 | (1) |
|
A.20 Data That Are Exchanged Adhere to a Canonical Data Model |
|
|
162 | (1) |
|
A.21 Data Are Exchanged in Real-Time |
|
|
162 | (1) |
|
A.22 Bulk Data Exchanges Rely on ETL Tools |
|
|
163 | (1) |
|
A.23 Documents Are Stored in the Document Management System |
|
|
163 | (1) |
|
A.24 Reporting and Analytical Applications Do Not Use the Operational Environment |
|
|
164 | (1) |
|
A.25 Applications Have a Common Look-and-Feel |
|
|
164 | (1) |
|
A.26 Applications Do Not Cross Business Function Boundaries |
|
|
164 | (1) |
|
A.27 Applications Respect Logical Units of Work |
|
|
165 | (1) |
|
A.28 Applications Are Modular |
|
|
165 | (1) |
|
A.29 Application Functionality is Available Through an Enterprise Portal |
|
|
166 | (1) |
|
A.30 Applications Rely on One Technology Stack |
|
|
166 | (1) |
|
A.31 Application Interfaces Are Explicitly Defined |
|
|
167 | (1) |
|
A.32 Proven Solutions Are Preferred |
|
|
167 | (1) |
|
A.33 IT Systems Are Scaleable |
|
|
168 | (1) |
|
A.34 Only in Response to Business Needs Are Changes to IT Systems Made |
|
|
168 | (1) |
|
A.35 Components Have a Clear Owner |
|
|
169 | (1) |
|
A.36 IT Systems Are Standardized and Reused Throughout the Organization |
|
|
169 | (1) |
|
A.37 IT Systems Adhere to Open Standards |
|
|
170 | (1) |
|
A.38 IT Systems Are Preferably Open Source |
|
|
170 | (1) |
|
A.39 IT Systems Are Available at Any Time on Any Location |
|
|
171 | (1) |
|
A.40 IT Systems Are Sustainable |
|
|
171 | (1) |
|
A.41 Processes Are Supported by a Business Process Management System |
|
|
171 | (1) |
|
A.42 Presentation Logic, Process Logic and Business Logic Are Separated |
|
|
172 | (1) |
|
A.43 IT Systems Communicate Through Services |
|
|
172 | (1) |
|
A.44 Reuse Is Preferable to Buy, Which is Preferable to Make |
|
|
173 | (1) |
|
A.45 IT Systems Support 24*7 Availability |
|
|
173 | (1) |
|
A.46 IT Systems Are Selected Based on a Best-of-Suite Approach |
|
|
174 | (1) |
|
A.47 Sensitive Data Are Exchanged Securely |
|
|
174 | (1) |
|
A.48 IT Systems May Under no Circumstances Revert to Insecure Mode |
|
|
175 | (1) |
|
A.49 Management of IT Systems is Automated as Much as Possible |
|
|
175 | (1) |
|
A.50 End-to-End Security Must Be Provided Using Multiple Defensive Strategies |
|
|
176 | (1) |
|
A.51 Access Rights Must Be Granted at the Lowest Level Necessary for Performing the Required Operation |
|
|
176 | (1) |
|
A.52 Authorizations Are Role-Based |
|
|
177 | (1) |
|
A.53 The Identity Management Environment Is Leading for All Authentications and Authorizations |
|
|
177 | (1) |
|
A.54 Security Is Defined Declaratively |
|
|
177 | (1) |
|
A.55 Access to IT Systems Is Authenticated and Authorized |
|
|
178 | (1) |
|
A.56 Integration with External IT Systems Is Localized in Dedicated IT Components |
|
|
178 | (1) |
|
A.57 Application Development Is Standardized |
|
|
179 | (1) |
|
A.58 All Messages Are Exchanged Through the Enterprise Service Bus |
|
|
179 | (1) |
|
A.59 Rules That Are Complex or Apt to Change Are Managed in a Business Rules Engine |
|
|
180 | (1) |
|
Appendix B Architecture Principles in TOGAF |
|
|
181 | (6) |
|
B.1 Architecture Principles in TOGAF |
|
|
181 | (1) |
|
B.2 Architecture Principles in TOGAF ADM |
|
|
182 | (2) |
|
B.3 Mapping the Generic Process to TOGAF's ADM |
|
|
184 | (3) |
Glossary |
|
187 | (2) |
References |
|
189 | (8) |
About the Authors |
|
197 | |