SlideShare a Scribd company logo
1 of 6
Download to read offline
Who Govern my Responsibilities?
SIM: a Methodology to Align Business and IT Policies
in the Industrial Field.
Christophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau
Public Research Centre Henri Tudor, 29, Avenue John F.Kennedy,
L-1855 Luxembourg-Kirchberg, Luxembourg
(e-mail: christophe.feltus@tudor.lu)
Abstract: Governance of IT is becoming more and more necessary in the current financial economic
situation. This trend does not avoid the definition of corporate and IT policies. To improve that matter,
the paper has for objective to propose a methodology for defining policies that are closer to the business
process, and based on the strict definition of the actors’ responsibility. This responsibility model is
mainly defined based on the three concepts of capability, accountability and commitment. The methodo-
logy is illustrated based on a case study that highlights how it is possible to implement access control
mechanism through agent-based infrastructure by extracting requirements from company practices and
process formalizations.
Keywords: Models, Responsibility, Process Model, IT Policies, Agent Framework, ICT Governance.
1. INTRODUCTION
The importance of the Governance of ICT is becoming more
and more important in companies, particularly since the ac-
counting scandals of 2002, and more currently through the
ongoing market crisis. The case of Enron is one famous and
well-known example. Following those scandals, a lot of laws
and standards were published in order firstly to guarantee the
stability of the financial sector and, by extension, all sectors
of the industrial economy, and secondly, to enhance the gov-
ernance of all these public and private companies. Sarbanes-
Oxley is one of these laws that aim at providing guarantees
over the company’s accountability. The new ISO/IEC
38500:2008 Corporate governance of information techno-
logy standard is one standard that provides a framework for
effective governance of IT. One of the main constraints im-
posed by these laws and standards is to have responsibilities
clearly established and accepted internally by the collaborat-
ors and externally by the stakeholders as well. The import-
ance of that statement has oriented our works and we pro-
pose, in the scope of that research, to make a contribution to
one of the most significant pillars of the governance, which is
responsibility. This concept has a major meaning in the ma-
nagerial pyramid of the company in that it composes the
structural artefact of the decisional framework. Con-
sequently, it sounds justified to guarantee accurate decisions
to ensure that responsibilities of enterprise activities are
rightly defined and enforced. It implies that having respons-
ibility appropriately affected involves a prior clear definition
of its components (capability, accountability and commit-
ment), and to develop an efficient methodology to analyse
and fix them through all the decisional layers of the com-
pany, from the top layer down to the technical one. The first
part of that twofold objective has already been basically in-
vestigated in our previous work (Gâteau et al., 2008). Indeed,
by depicting how the responsibility is introduced and inter-
preted in a large number of industrial frameworks, we have
been able firstly to extract main components of it and,
secondly, to validate them through a responsibility ontology.
This ontology has been built by analyzing how responsibility
components are declined in the realm of IT security, from ac-
cess control models such as RBAC (Sandhu et al., 2000) up
to framework for ICT governance like Cobit [4], in the realm
of requirement engineering, as well as through EAM frame-
works like CIMOSA (http://www.cimosa.de/) or PERA
(http://www.pera.net). The issue of that wide review of struc-
turing framework has lead to the conclusion that mainly three
components build the responsibility concept. Those compon-
ents are: capability, accountability and commitment. The
second part of the research aims at elaborating a methodo-
logy for defining, structuring and deploying the responsibil-
ity in industries’ information systems. In the literature, each
area of information activity already has methods for elaborat-
ing its information frameworks. In the field of requirement
engineering: (Yu et al., 2001), (AntĂłn, 1996) and (Fontaine
et al., 2001), in the field of access control: (Fernandez, 1997)
(Roeckle et al., 2000) (Crook et al., 2002) (Qingfeng et al.,
2003) (Neumann et al., 2002), and in the field of EAM: (Ver-
nadat, 1995) (Meir, 1999). However, none of them integrate
the notion of responsibility in their methodology. Our work
aims at filling that gap with an innovative five-step method
focusing on the responsibility ontology. The advantage of
this method will be:
It is focused on the concept of responsibility rather than
on a concept of role, user, or activity,
It is adapted to manage responsibility exceptions.
It could be tailored to a large part or to a small part of
the activity,
It provides a generic responsibility diagram that may be
rapidly used and adapted for a specific framework,
It is based on a responsibility model that has been valid-
ated against different domains like access control or re-
quirement engineering.
2. RESPONSIBILITY MODEL
A plethora of definitions of responsibility exists. We may
however state that the commonly accepted responsibility
definition encompasses the idea of having the obligation to
ensure that something happens.
Previous work (Aubert et al., 2008) shows that responsibility
can be described as a set of three additional elements that are
capability, accountability and commitment. Figure 1 depicts
our responsibility model. The relation between responsibility
and the three other concepts is of the form 0..* to 1. That
means that being responsible involves the possibility to dis-
pose of many capacities, accountabilities and commitment.
Fig. 1. Responsibility model
Capability describes the quality of having the required qualit-
ies or resources to achieve a task. For instance, a strategic
capability for a given responsibility could be: “A resource
must know the strategic objectives of the organisation”. An
operational capability could be: “The coach of the resources
must have write access to the HR software”.
Accountability describes the state of being accountable on the
achievement of a task. For instance, a strategic accountability
for a given responsibility could be: “A project leader must
achieve the financial Key Performance Indicators defined for
the project”. An operational accountability could be: “The
project manager must define the project plan”.
Finally, Commitment is the engagement of a stakeholder to
fulfil a task and the assurance that he will do it. For instance,
a strategic commitment for a responsibility could be:” The
Chief Financial Officer accepts to manage the accounting de-
partment and not commit insider dealing”. An operational
commitment could be: “An employee of the procurement
staff accepts not to use the system for his personal use”.
The consistency between concepts may also be examined
based upon the assumption that the capability needed for as-
suming a responsibility corresponds to the accountability of
another user’s responsibility. Both responsibilities’ compon-
ents, capability and accountability, are strongly linked to
each other in that accountability of a role or a person permits
to deduce capability of another role or person, and con-
versely a capability stems from accountability (e.g.: The cap-
ability “An engineer has access to a specific file” stems from
the accountability “An engineer has to share a specific file
with another engineer”).
3. METHODOLOGY
These complementarities of the responsibility’s concepts are
an important element for the definition of policies according
to our responsibility model. The methodology described in
this section has for objective to explain how to define the en-
terprise IT policies according to the responsibility model.
This methodology is a five-step approach. To facilitate the
understanding, we illustrate each step with a case study.
Fig. 2. SIM Methodology
3.1 STEP 1. Collection of information
The first step has for objective to define the context and to
collect each component that will be formalized in the policy.
STEP 1 input: Inputs of step 1 are elements collected from
business case studies, business processes, business proced-
ures, and effective practices in the enterprise.
STEP 1 output: Output of step 1 is a formalized and struc-
tured synthesis of the process in natural language.
STEP 1 actions: The actions performed at this step encom-
pass a number of activities to collect information about the
process and the responsibility components. These activities
are interviews of the key members of the personnel, analyses
of existing process descriptions, analysis of enterprise refer-
entials like the ISO 9000 quality book.
By these activities, we can summarize:
Process responsibilities, as well as their composing ele-
ments, like accountabilities, capabilities, and commit-
ments;
The existing relations between responsibilities and re-
sponsibility components.
To illustrate that methodology, we describe this first step
based on the “Enterprise Christmas Gifts Process”. After
having performed interviews and analyses of the enterprise
activity, the following synthesis has been written:
Mr. Johnson is the manager of the IT Company named
“HighTech”. Every year, Mr. Johnson organizes, during the
Christmas period, a large mailing of postcard and gifts in
order to thank (best) customers for their loyalty.
This process permits to develop customer loyalty and update
the yearly customer list.
Due to an overload of work at this period (such as closing
the annual report) and because this task is less business
sensitive as some other production tasks, Mr. Johnson
prefers delegating this task to his employees.
Generally, he assigns work to:
A responsible for updating the customer list, selecting mail
targets, printing envelopes and sending cards and bottles of
champagne to the best customers;
A responsible for receiving customers’ feedback (such as
wishes, complaints or orders), analysing it and providing
him with the results ;
A responsible for giving sufficient access rights to all pro-
cess stakeholders.
However, for some very important customers, Mr. Johnson
prefers sending bottles of champagne himself.
Each year, after receiving the feedback analysis, Mr. John-
son realizes that the process encounters some problems, such
as (best) customers that haven’t received cards or gifts, or
customers having received them twice.
3.2 STEP 2 Graphic diagramme
The second step translates the process from natural language
toward a graphical representation.
STEP 2 input: Input of step 2 is the synthesis achieved in
step 1.
STEP 2 output: Output of step 2 is a graphical representation
of the responsibility framework of the analysed process. It
encompasses a representation of the responsibility and its
components, and the links between components.
STEP 2 actions: The actions performed at that step are com-
posed of three sub-tasks.
Sub-task 1: Definition of each responsibility and transcrip-
tion of it using boxes. Each box stands for a responsibility; it
encompasses its accountabilities and its capabilities.
According to our case study, four responsibilities are extrac-
ted: Postcard Sending, Drive Customers Relationship, Feed-
back Analysis, and Give Access Rights. This is illustrated in
figure 3.
Sub-task 2: For each responsibility, an analysis of the re-
quired capabilities is made, and is translated through a folded
corner in the corresponding responsibility box. The same op-
eration is made for the accountabilities.
Sub-task 3: This last sub-task consists in the definition of
links between responsibilities components. Four kinds of
links exist:
Delegation link constituting the delegation of a respons-
ibility’s accountability toward another responsibility. This
is illustrated by the accountability 5 of responsibility
“Drive Customer Relationship”,that delegates its account-
ability to the responsibility “Feedback Analysis”.
Implication link constituting for a responsibility’s ac-
countability the existence of another responsibility’s cap-
ability. This is illustrated by the capability 2 “Access Cus-
tomer file” of responsibility “Feedback Analysis” that im-
plies the accountability 1 of the responsibility “Give Ac-
cess Rights”.
Contribution link highlighting that one responsibility’s
accountability contributes to another accountability of the
same responsibility. This is illustrated by the accountabil-
ity 2 “Print Envelopes” which contributes to achieving
the accountability 4 “Send postcards” of the responsibil-
ity “Postcard Sending”.
Execution link formalizing that a capability of a respons-
ibility is necessary to execute an accountability of the
same responsibility. This is illustrated by the capability 1
“Customer Feedback” of the “Drive customer relation-
ship” responsibility that is necessary to achieve the ac-
countability 4 “Monitor the satisfaction of the clients”.
3.3 STEP 3 Responsibility’s components links verification
This third step of the methodology is the first refining step. It
aims at analysing the graphical representation of the process
issued from step 2, depicting inconsistencies, and correcting
the diagram to eliminate them.
STEP 3 input: Input of step 3 is the process graphical repres-
entation issued from step 2.
Fig. 3. Responsibility model for “Customer loyalty development process”
STEP 3 output: Output of step 3 is a graphical representation
of the responsibility framework of the analysed process re-
fined according to the components relationships.
STEP 3 actions: The actions performed at that step are com-
posed of three sub-tasks.
Sub-task 1: Deep analysis of the capability components for
each responsibility. The main objectives of this analysis are
to detect and solve the problem of unnecessary capabilities.
Capabilities may be unnecessary in the case of useless capab-
ilities for the achievement of accountabilities of the same re-
sponsibility. This means that they do not have execution
links. It is illustrated by the capability 4 “Have a super ad-
min account” of the responsibility “Give Access Rights” that
is not necessary for the accountabilities of that responsibility.
To face this inconsistency, it is necessary to suppress the cap-
ability.
Sub-task 2: Deep analysis of the accountability components
for each responsibility. The main objective of this analysis is
to make sure of that all accountabilities are provided and
exist in the model, and to assure that all accountabilities are
necessary. Some accountabilities are not fully justified if:
no link exist between the accountability with one or
more capabilities in the process,
no links exist between the accountability and another re-
sponsibility (no delegation),
the accountability is not an outcome of the process.
It is illustrated by accountability 1 of “Give Access Rights”
responsibility that “Providing access rights to Customer loy-
alty development process” is too large because it is not neces-
sary for the “Feedback Analysis” to have that right.
Sub-task 3: Once accountabilities are verified, it is possible to
check that all capabilities necessary for their achievement
exist. This is illustrated by the accountability 2 “Print
envelopes” of the responsibility “Postcard Sending” that may
not be achieved because one capability misses that
accountability: capability 3 “Ability to print”.
3.4 STEP 4 Responsibility exceptions links verification
This fourth step of the methodology is the second refining
step. It aims at analysing the graphical representation of the
relation within the process, depicting inconsistencies, and
correcting the graph to eliminate them if necessary.
STEP 4 input: Input of step 4 is the process graphical repres-
entation issued from step 3.
STEP 4 output: Output of step 4 is a graphical representation
of the responsibility framework of the analysed process re-
fined according the relationship between components.
STEP 4 actions: The activity of that step aims at detecting
and correcting conflicts and incoherencies with regard to re-
sponsibility rules dictated by the enterprises, for example:
Delegation rules. If a responsibility is delegated from one
actor to another, the enterprise should have rules to manage
the delegation. These rules must be satisfied in the responsib-
ility graph. Example of these delegation rules are: if a re-
sponsibility is delegated, all the capabilities necessary for it
are also delegated and the accountability may be kept in the
hand of the person that delegates, or in the hands of the per-
son that is delegated to, but not with both persons at the same
time. Some conflict may exist regarding that rule. E.g.: The
responsibility “Drive Customer relationship” delegates the
“Sending Activities” (sending postcards and bottles of cham-
pagne) but keeps, at the same time, its accountability of send-
ing bottles of champagne. As a consequence, two responsib-
ilities have the same accountability. If both persons achieve
their accountability; it is possible that the action is performed
twice.
Separation of duties. Some corporate rules may impose the
separation of duty for some responsibilities. It is traditionally
the case of the responsibility to order products, and the re-
sponsibility to validate the invoice of the product order.
Cardinality constraints. The responsibility graph also needs
to be checked at this step for alignment with cardinality
requirements. E.g.: the number of accountabilities handled by
an equal responsibility is sometimes limited in order to avoid
an unjustified increasing overload of work for a single
person. This constraint must be balanced according to the
work effort necessary for achieving each accountability.
3.5 STEP 5 Policy eliciting
This last step of our methodology aims at deriving policies
from the responsibility model.
STEP 5 input: Input of step 5 is the process graphical repres-
entation issued from step 4.
STEP 5 output: Output of step 5 is a set of context dependant
policies.
STEP 5 actions: The activity of that step aims at translating
the responsibility graph into a given policy format.
Several derivations are possible. We can transform the re-
sponsibility model into an Process Framework like the one
specified by the standard ISO/IEC 15504, Information Tech-
nology – Process assessment, (parts 1-5), 2003-2006 or an
organisational model for multi-agent systems. In the follow-
ing, we give a rapid overview of the possible transformation
from an organisation model point of view.
MOISE
Inst
, an Institution Specification Model for multi-agent
systems, is defined in (Gâteau, 2007). This model is used to
define normative organisations that are composed of:
A structural specification (SS) defining the roles that
agents will play, the links between these roles and the
groups which agents playing roles should participate in
and where interactions take place;
A functional specification (FS) defining goals that have
to be reached in the system;
A normative specification (NS) clearly defining rights
and duties of roles and groups on a mission (set of
goals).
These specifications constitie the Organisational Specifica-
tion (OS), i.e. the representation of the organisation inde-
pendent of agents evolving in the system and becoming or-
ganised with regard to this OS. An Organisational Entity
(OE) is an instance of the OS and is built from the set of
agents that have adopted roles according to the SS of the OS,
interacting within groups, and activating missions according
to the current FS and norms (NS).
From the Responsibility Model point of view, we can con-
sider Capabilities and Accountabilities of a Responsibility as
right and duties that the person who will have the Responsib-
ility will have to respect. A Capability is permission for the
person to do something and an Accountability is an obliga-
tion to do something (in order to execute the whole process
in which the Responsibility is defined).
In MOISE
Inst
, missions (from the functional specification)
define the achievement responsibility of collective goals
gathered in a functional scheme. The NS defines permission
and obligation (rights and duties) by specifying norms: a role
is obliged to achieve a mission (a set of coherent goals). In
this model, we define a role responsibility on a specific task
(several goals indeed) by defining norms.
Fig. 4. Transformation of responsibility model into
organisational model
A responsibility model resulting of the methodology depicted
in this paper can be transformed into an organisational model
and then be instantiated by a set of agents. As we can see on
Fig. 4, each responsibility is represented by a functional
scheme. Capabilities are leaf goals and belong to the mcap
mission. Accountabilities are root goals (the last accountabil-
ity to achieve becomes the root goal in fact) and belong to
macc mission. Links between capabilities and accountabili-
ties become plan and structure the functional scheme: the
goals #CAP_2 and #CAP_1 must be reached in order to
reach the goal #ACC_1 which permit to reach the root goal
#ACC_2 and then finish the scheme. At last, rights and du-
ties are distinguished by associating missions with a deontic
operator (permission or obligation) and a role in the organisa-
tional model. For instance, the role which will be responsible
of the feedback analysis is obliged to achieve mission macc
and permitted to achieve the mission mcap. We obtain two
norms composing the NS and represented as follows:
N01: Obl(Rolefeedback, macc)
N02: Perm(Rolefeedback, mcap)
In the responsibility model, roles will be introduced in future
work in order to instantiate the model by making a person
play a role. In the organisational model, agents play roles and
commit to missions (the commitment concept is also a part of
the responsibility).
Once the OS is obtained, it could be instantiated by a set of
agents playing roles and reaching goals regarding to the
norms defined in the NS in order to make them execute the
functional scheme, and to respect their responsibilities.
5. CONCLUSION AND FUTURE WORKS
Improving ICT governance is an important matter, especially
in the current ongoing economic context. We propose in this
paper to improve that field firstly by introducing our formal-
ization of the responsibility of stakeholders involved in in-
dustrial activities and by elaborating an innovative responsib-
ility model and, secondly, having the paper describe our
methodology to define, structure and deploy the responsibil-
ity all around the company. This methodology, based on the
concepts of our responsibility model (accountability, capabil-
ity and commitment) is illustrated in this paper by the trans-
formation of the responsibility model into an organisational
model for multi-agent system.
In the proposed methodology, the definition of the responsib-
ility component is performed in a sequential way. Future
works will consist of improving the methodology with an it-
erative approach for refining the responsibility engineering
(step 3 and step 4).
To illustrate that paper, the methodology has used an aca-
demic case study. The methodology is also under validation
and improvement in a large international Financial Services
Provider company using a real process case study.
This research was funded by the National Research Fund of
Luxemburg in the context of SIM (Secure Identity Manage-
ment - FNR/04/01/03) and TITAN (Trust-Assurance for Crit-
ical Infrastructures in Multi-Agents Environments, FNR
CO/08/IS/21) projects.
REFERENCES
AntĂłn, A., (1996), Goal-Based Requirements Analysi,.
Second ICRE 96, Colorado Springs, USA.
Aubert, J., Gâteau, B., Incoul, C., Feltus, C., (2008) SIM: An
Innovative Business-Oriented Approach for a Distrib-
uted Access Management, ICTTA2008, Damascus, Syr-
ia.
Crook, R., Ince, D., Nuseibeh, B., (2002) Towards an Ana-
lytical Role Modelling Framework for Security Re-
quirements, Proc. of REFSQ'02, Essen, Germany.
Fernandez, E. B., Hawkins, J. C., (1997) Determining Role
Rights from Use Cases, ACM Workshop on RBAC.
Fontaine, P. J., (2001) Goal-Oriented Elaboration of Security
Requirements. M.S. Thesis, Dept. Computing Science,
University of Louvain.
Gâteau, B., F eltus, C., Aubert, J., Incoul, C. (2008), An
Agent based Framework for Identity Management: The
Unsuspected Relation with ISO/IEC 15504, IEEE Inter-
national Conference on Research Challenges in In-
formation Science (RCIS), Marrakech, Morocco.
Gâteau, B., (2008,) Modélisation et Supervision d'Institutions
Multi-Agents. PhD Thesis held in cooperation with
Ecole Nationale Superieure des Mines de Saint Etienne
and CRP Henri Tudor, defended in Luxembourg the
26th of June 2008.
Meir, H. L., Marios P. K. (1999), FirstSTEP process modeler
a CIMOSA-compliant modeling tool, computers in
Industry, Volume 40, Issues 2-3, Pages 267-277.
Neumann, G., Strembeck, M., (2002) A Scenario-driven Role
Engineering Process for Functional RBAC Roles,
SACMAT 02, Monterey, California, USA.
Qingfeng, H., AntĂłn, A. I., (2003), A Framework for Pri-
vacy-Enhanced Access Control Analysis in Require-
ments Engineering, REFSQ'03, Austria.
Sandhu, R., Ferraiolo, D.,Kuhn, R., (2000) The NIST Mod-
el for Role Based Access, Control: Towards A Unified
Standard , Proceedings RBAC-00, Berlin Germany,
July 26-27 2000, pages 47-64.
Roeckle, H., Schimpf, G., Weidinger, R. (2000). Process-ori-
ented approach for role-finding to implement role-based
security administration in a large industrial organiza-
tion. RBAC '00. ACM, New York, NY, 103-110.
Vernadat F. B., Enterprise Modelling and Integration, Chap-
man & Hall, London (1995), ISBN 0-412-60550-3
Yu, E. S., Liu, L. (2001). Modelling Trust for System Design
Using the i* Strategic Actors Framework. Workshop on
Deception, Fraud, and Trust in Agent Societies Held
During the Autonomous, Eds. Lecture Notes In Com-
puter Science, vol. 2246. Springer-Verlag, London,
175-194.

More Related Content

What's hot

Learning Environment for IT Management
Learning Environment for IT ManagementLearning Environment for IT Management
Learning Environment for IT Managementolvegam
 
State of the art of agile governance a systematic review
State of the art of agile governance a systematic reviewState of the art of agile governance a systematic review
State of the art of agile governance a systematic reviewijcsit
 
Influence of Human Factors on the Relationship between AMT Adoption and Organ...
Influence of Human Factors on the Relationship between AMT Adoption and Organ...Influence of Human Factors on the Relationship between AMT Adoption and Organ...
Influence of Human Factors on the Relationship between AMT Adoption and Organ...paperpublications3
 
Research evolution on implementation and adoption behaviour of information sy...
Research evolution on implementation and adoption behaviour of information sy...Research evolution on implementation and adoption behaviour of information sy...
Research evolution on implementation and adoption behaviour of information sy...LenaFrau
 
Architecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an EnterpriseArchitecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an EnterpriseIOSR Journals
 
Establishment and Application of Competitive Systems in mobile Devices
Establishment and Application of Competitive Systems in  mobile DevicesEstablishment and Application of Competitive Systems in  mobile Devices
Establishment and Application of Competitive Systems in mobile DevicesErrol A. Adams, J.D., M.L.S.
 
Balanced scorecard weaknesses, strengths, and its ability as performance
Balanced scorecard weaknesses, strengths, and its ability as performanceBalanced scorecard weaknesses, strengths, and its ability as performance
Balanced scorecard weaknesses, strengths, and its ability as performanceAlexander Decker
 
Value of information integration to supply chain management role of internal...
Value of information integration to supply chain management  role of internal...Value of information integration to supply chain management  role of internal...
Value of information integration to supply chain management role of internal...Steve Ng
 
Research Paper on "Project Management and IT Governance"
Research Paper on "Project Management and IT Governance"Research Paper on "Project Management and IT Governance"
Research Paper on "Project Management and IT Governance"guest1c7740
 
9. Factors Affecting Erp System Adoption
9. Factors Affecting Erp System Adoption9. Factors Affecting Erp System Adoption
9. Factors Affecting Erp System AdoptionDonovan Mulder
 
The Role of Organizational and Individual Factors in Knowledge Management Sys...
The Role of Organizational and Individual Factors in Knowledge Management Sys...The Role of Organizational and Individual Factors in Knowledge Management Sys...
The Role of Organizational and Individual Factors in Knowledge Management Sys...journalBEEI
 
Policy overlap analysis to avoid
Policy overlap analysis to avoidPolicy overlap analysis to avoid
Policy overlap analysis to avoidcsandit
 

What's hot (17)

Learning Environment for IT Management
Learning Environment for IT ManagementLearning Environment for IT Management
Learning Environment for IT Management
 
State of the art of agile governance a systematic review
State of the art of agile governance a systematic reviewState of the art of agile governance a systematic review
State of the art of agile governance a systematic review
 
Influence of Human Factors on the Relationship between AMT Adoption and Organ...
Influence of Human Factors on the Relationship between AMT Adoption and Organ...Influence of Human Factors on the Relationship between AMT Adoption and Organ...
Influence of Human Factors on the Relationship between AMT Adoption and Organ...
 
HICSS50
HICSS50HICSS50
HICSS50
 
BPM BA
BPM BA BPM BA
BPM BA
 
Research evolution on implementation and adoption behaviour of information sy...
Research evolution on implementation and adoption behaviour of information sy...Research evolution on implementation and adoption behaviour of information sy...
Research evolution on implementation and adoption behaviour of information sy...
 
Architecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an EnterpriseArchitecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an Enterprise
 
MIS (1)
MIS (1)MIS (1)
MIS (1)
 
Establishment and Application of Competitive Systems in mobile Devices
Establishment and Application of Competitive Systems in  mobile DevicesEstablishment and Application of Competitive Systems in  mobile Devices
Establishment and Application of Competitive Systems in mobile Devices
 
E0331043049
E0331043049E0331043049
E0331043049
 
A0330107
A0330107A0330107
A0330107
 
Balanced scorecard weaknesses, strengths, and its ability as performance
Balanced scorecard weaknesses, strengths, and its ability as performanceBalanced scorecard weaknesses, strengths, and its ability as performance
Balanced scorecard weaknesses, strengths, and its ability as performance
 
Value of information integration to supply chain management role of internal...
Value of information integration to supply chain management  role of internal...Value of information integration to supply chain management  role of internal...
Value of information integration to supply chain management role of internal...
 
Research Paper on "Project Management and IT Governance"
Research Paper on "Project Management and IT Governance"Research Paper on "Project Management and IT Governance"
Research Paper on "Project Management and IT Governance"
 
9. Factors Affecting Erp System Adoption
9. Factors Affecting Erp System Adoption9. Factors Affecting Erp System Adoption
9. Factors Affecting Erp System Adoption
 
The Role of Organizational and Individual Factors in Knowledge Management Sys...
The Role of Organizational and Individual Factors in Knowledge Management Sys...The Role of Organizational and Individual Factors in Knowledge Management Sys...
The Role of Organizational and Individual Factors in Knowledge Management Sys...
 
Policy overlap analysis to avoid
Policy overlap analysis to avoidPolicy overlap analysis to avoid
Policy overlap analysis to avoid
 

Viewers also liked

C:\Fakepath\My History
C:\Fakepath\My HistoryC:\Fakepath\My History
C:\Fakepath\My Historyellysawicky
 
TRG Motorsports Watkins Glen Racing Program
TRG Motorsports Watkins Glen Racing ProgramTRG Motorsports Watkins Glen Racing Program
TRG Motorsports Watkins Glen Racing Programdbonacquisto
 
Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...Luxembourg Institute of Science and Technology
 
The Bold & The Beautiful: Sylvia Harris
The Bold & The Beautiful: Sylvia HarrisThe Bold & The Beautiful: Sylvia Harris
The Bold & The Beautiful: Sylvia HarrisClaire McIntosh
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Glassbeam Drives Analytics Innovation
Glassbeam Drives Analytics InnovationGlassbeam Drives Analytics Innovation
Glassbeam Drives Analytics InnovationHarbor Research
 
Enhancement of business it alignment by including responsibility components i...
Enhancement of business it alignment by including responsibility components i...Enhancement of business it alignment by including responsibility components i...
Enhancement of business it alignment by including responsibility components i...Luxembourg Institute of Science and Technology
 
Harbor Research - Strategies for Smart Services
Harbor Research - Strategies for Smart ServicesHarbor Research - Strategies for Smart Services
Harbor Research - Strategies for Smart ServicesHarbor Research
 
Mein computer russisch
Mein computer russischMein computer russisch
Mein computer russischdeutschonline
 
Kindle presentation by Yuliya Hadzhieva
Kindle presentation by Yuliya HadzhievaKindle presentation by Yuliya Hadzhieva
Kindle presentation by Yuliya Hadzhievaflorencye
 
The Story Of AIDS In Black America
The Story Of AIDS In Black AmericaThe Story Of AIDS In Black America
The Story Of AIDS In Black AmericaClaire McIntosh
 
Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...Luxembourg Institute of Science and Technology
 
Yellowfin Location Intelligence Best Practices Webinar
Yellowfin Location Intelligence Best Practices WebinarYellowfin Location Intelligence Best Practices Webinar
Yellowfin Location Intelligence Best Practices WebinarYellowfin
 
Who what and by whom
Who what and by whomWho what and by whom
Who what and by whomOpen.Embedded
 
Combinadas solicitudes
Combinadas solicitudesCombinadas solicitudes
Combinadas solicitudesJavier Blanquer
 
Pentesting con metasploit framework
Pentesting con metasploit frameworkPentesting con metasploit framework
Pentesting con metasploit frameworkEventos Creativos
 
Social governance is smart governance
Social governance is smart governanceSocial governance is smart governance
Social governance is smart governanceSanjay Abraham
 

Viewers also liked (20)

C:\Fakepath\My History
C:\Fakepath\My HistoryC:\Fakepath\My History
C:\Fakepath\My History
 
TRG Motorsports Watkins Glen Racing Program
TRG Motorsports Watkins Glen Racing ProgramTRG Motorsports Watkins Glen Racing Program
TRG Motorsports Watkins Glen Racing Program
 
Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...
 
The Bold & The Beautiful: Sylvia Harris
The Bold & The Beautiful: Sylvia HarrisThe Bold & The Beautiful: Sylvia Harris
The Bold & The Beautiful: Sylvia Harris
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Collaborative development of open source e learning platforms
Collaborative development of open source e learning platformsCollaborative development of open source e learning platforms
Collaborative development of open source e learning platforms
 
Glassbeam Drives Analytics Innovation
Glassbeam Drives Analytics InnovationGlassbeam Drives Analytics Innovation
Glassbeam Drives Analytics Innovation
 
Enhancement of business it alignment by including responsibility components i...
Enhancement of business it alignment by including responsibility components i...Enhancement of business it alignment by including responsibility components i...
Enhancement of business it alignment by including responsibility components i...
 
Computer vk6
Computer vk6Computer vk6
Computer vk6
 
Harbor Research - Strategies for Smart Services
Harbor Research - Strategies for Smart ServicesHarbor Research - Strategies for Smart Services
Harbor Research - Strategies for Smart Services
 
Mein computer russisch
Mein computer russischMein computer russisch
Mein computer russisch
 
Kindle presentation by Yuliya Hadzhieva
Kindle presentation by Yuliya HadzhievaKindle presentation by Yuliya Hadzhieva
Kindle presentation by Yuliya Hadzhieva
 
The Story Of AIDS In Black America
The Story Of AIDS In Black AmericaThe Story Of AIDS In Black America
The Story Of AIDS In Black America
 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecture
 
Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...
 
Yellowfin Location Intelligence Best Practices Webinar
Yellowfin Location Intelligence Best Practices WebinarYellowfin Location Intelligence Best Practices Webinar
Yellowfin Location Intelligence Best Practices Webinar
 
Who what and by whom
Who what and by whomWho what and by whom
Who what and by whom
 
Combinadas solicitudes
Combinadas solicitudesCombinadas solicitudes
Combinadas solicitudes
 
Pentesting con metasploit framework
Pentesting con metasploit frameworkPentesting con metasploit framework
Pentesting con metasploit framework
 
Social governance is smart governance
Social governance is smart governanceSocial governance is smart governance
Social governance is smart governance
 

Similar to Who govern my responsibilities sim a methodology to align business and it policies in the industrial field.

Methodology to align business and it policies use case from an it company
Methodology to align business and it policies   use case from an it companyMethodology to align business and it policies   use case from an it company
Methodology to align business and it policies use case from an it companychristophefeltus
 
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...christophefeltus
 
An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...christophefeltus
 
An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...Luxembourg Institute of Science and Technology
 
Definition and validation of a business it alignment method for enterprise go...
Definition and validation of a business it alignment method for enterprise go...Definition and validation of a business it alignment method for enterprise go...
Definition and validation of a business it alignment method for enterprise go...Luxembourg Institute of Science and Technology
 
Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...christophefeltus
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementchristophefeltus
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementLuxembourg Institute of Science and Technology
 
Re mola responsibility model language to align access rights with business pr...
Re mola responsibility model language to align access rights with business pr...Re mola responsibility model language to align access rights with business pr...
Re mola responsibility model language to align access rights with business pr...christophefeltus
 
Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Luxembourg Institute of Science and Technology
 
Building a responsibility model using modal logic
Building a responsibility model using modal logicBuilding a responsibility model using modal logic
Building a responsibility model using modal logicchristophefeltus
 
Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Luxembourg Institute of Science and Technology
 
Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...christophefeltus
 
An ontology for requirements analysis of managers’ policies in financial inst...
An ontology for requirements analysis of managers’ policies in financial inst...An ontology for requirements analysis of managers’ policies in financial inst...
An ontology for requirements analysis of managers’ policies in financial inst...Luxembourg Institute of Science and Technology
 
An ontology for requirements analysis of managers’ policies in financial inst...
An ontology for requirements analysis of managers’ policies in financial inst...An ontology for requirements analysis of managers’ policies in financial inst...
An ontology for requirements analysis of managers’ policies in financial inst...christophefeltus
 
Enhancement of business it alignment by including responsibility components i...
Enhancement of business it alignment by including responsibility components i...Enhancement of business it alignment by including responsibility components i...
Enhancement of business it alignment by including responsibility components i...christophefeltus
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Luxembourg Institute of Science and Technology
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...christophefeltus
 
Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...christophefeltus
 

Similar to Who govern my responsibilities sim a methodology to align business and it policies in the industrial field. (20)

Methodology to align business and it policies use case from an it company
Methodology to align business and it policies   use case from an it companyMethodology to align business and it policies   use case from an it company
Methodology to align business and it policies use case from an it company
 
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...
 
An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...
 
An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...
 
Definition and validation of a business it alignment method for enterprise go...
Definition and validation of a business it alignment method for enterprise go...Definition and validation of a business it alignment method for enterprise go...
Definition and validation of a business it alignment method for enterprise go...
 
Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Re mola responsibility model language to align access rights with business pr...
Re mola responsibility model language to align access rights with business pr...Re mola responsibility model language to align access rights with business pr...
Re mola responsibility model language to align access rights with business pr...
 
Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...
 
Building a responsibility model using modal logic
Building a responsibility model using modal logicBuilding a responsibility model using modal logic
Building a responsibility model using modal logic
 
Building a responsibility model using modal logic
Building a responsibility model using modal logicBuilding a responsibility model using modal logic
Building a responsibility model using modal logic
 
Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...
 
Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...
 
An ontology for requirements analysis of managers’ policies in financial inst...
An ontology for requirements analysis of managers’ policies in financial inst...An ontology for requirements analysis of managers’ policies in financial inst...
An ontology for requirements analysis of managers’ policies in financial inst...
 
An ontology for requirements analysis of managers’ policies in financial inst...
An ontology for requirements analysis of managers’ policies in financial inst...An ontology for requirements analysis of managers’ policies in financial inst...
An ontology for requirements analysis of managers’ policies in financial inst...
 
Enhancement of business it alignment by including responsibility components i...
Enhancement of business it alignment by including responsibility components i...Enhancement of business it alignment by including responsibility components i...
Enhancement of business it alignment by including responsibility components i...
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
 
Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...
 

More from Luxembourg Institute of Science and Technology

Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...Luxembourg Institute of Science and Technology
 
Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Luxembourg Institute of Science and Technology
 
Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...Luxembourg Institute of Science and Technology
 
Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...Luxembourg Institute of Science and Technology
 
Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Luxembourg Institute of Science and Technology
 
On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...Luxembourg Institute of Science and Technology
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Luxembourg Institute of Science and Technology
 
Metamodel for reputation based agents system – case study for electrical dist...
Metamodel for reputation based agents system – case study for electrical dist...Metamodel for reputation based agents system – case study for electrical dist...
Metamodel for reputation based agents system – case study for electrical dist...Luxembourg Institute of Science and Technology
 
Improving operational risk management systems by formalizing the basel ii reg...
Improving operational risk management systems by formalizing the basel ii reg...Improving operational risk management systems by formalizing the basel ii reg...
Improving operational risk management systems by formalizing the basel ii reg...Luxembourg Institute of Science and Technology
 

More from Luxembourg Institute of Science and Technology (20)

Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-TopicsSmart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
 
Joint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forumJoint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forum
 
Modeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate languageModeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate language
 
Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...
 
Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...
 
Service specification and service compliance how to consider the responsibil...
Service specification and service compliance  how to consider the responsibil...Service specification and service compliance  how to consider the responsibil...
Service specification and service compliance how to consider the responsibil...
 
Responsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e governmentResponsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e government
 
Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...
 
Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...
 
Preliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methodsPreliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methods
 
Organizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructureOrganizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructure
 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e business
 
On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Metamodel for reputation based agents system – case study for electrical dist...
Metamodel for reputation based agents system – case study for electrical dist...Metamodel for reputation based agents system – case study for electrical dist...
Metamodel for reputation based agents system – case study for electrical dist...
 
Industry program panel
Industry program panelIndustry program panel
Industry program panel
 
Improving operational risk management systems by formalizing the basel ii reg...
Improving operational risk management systems by formalizing the basel ii reg...Improving operational risk management systems by formalizing the basel ii reg...
Improving operational risk management systems by formalizing the basel ii reg...
 

Recently uploaded

Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxAleenaTreesaSaji
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSĂ©rgio Sacani
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Lucknow đź’‹ Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow đź’‹ Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow đź’‹ Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow đź’‹ Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 

Recently uploaded (20)

Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptx
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Lucknow đź’‹ Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow đź’‹ Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow đź’‹ Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow đź’‹ Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 

Who govern my responsibilities sim a methodology to align business and it policies in the industrial field.

  • 1. Who Govern my Responsibilities? SIM: a Methodology to Align Business and IT Policies in the Industrial Field. Christophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau Public Research Centre Henri Tudor, 29, Avenue John F.Kennedy, L-1855 Luxembourg-Kirchberg, Luxembourg (e-mail: christophe.feltus@tudor.lu) Abstract: Governance of IT is becoming more and more necessary in the current financial economic situation. This trend does not avoid the definition of corporate and IT policies. To improve that matter, the paper has for objective to propose a methodology for defining policies that are closer to the business process, and based on the strict definition of the actors’ responsibility. This responsibility model is mainly defined based on the three concepts of capability, accountability and commitment. The methodo- logy is illustrated based on a case study that highlights how it is possible to implement access control mechanism through agent-based infrastructure by extracting requirements from company practices and process formalizations. Keywords: Models, Responsibility, Process Model, IT Policies, Agent Framework, ICT Governance. 1. INTRODUCTION The importance of the Governance of ICT is becoming more and more important in companies, particularly since the ac- counting scandals of 2002, and more currently through the ongoing market crisis. The case of Enron is one famous and well-known example. Following those scandals, a lot of laws and standards were published in order firstly to guarantee the stability of the financial sector and, by extension, all sectors of the industrial economy, and secondly, to enhance the gov- ernance of all these public and private companies. Sarbanes- Oxley is one of these laws that aim at providing guarantees over the company’s accountability. The new ISO/IEC 38500:2008 Corporate governance of information techno- logy standard is one standard that provides a framework for effective governance of IT. One of the main constraints im- posed by these laws and standards is to have responsibilities clearly established and accepted internally by the collaborat- ors and externally by the stakeholders as well. The import- ance of that statement has oriented our works and we pro- pose, in the scope of that research, to make a contribution to one of the most significant pillars of the governance, which is responsibility. This concept has a major meaning in the ma- nagerial pyramid of the company in that it composes the structural artefact of the decisional framework. Con- sequently, it sounds justified to guarantee accurate decisions to ensure that responsibilities of enterprise activities are rightly defined and enforced. It implies that having respons- ibility appropriately affected involves a prior clear definition of its components (capability, accountability and commit- ment), and to develop an efficient methodology to analyse and fix them through all the decisional layers of the com- pany, from the top layer down to the technical one. The first part of that twofold objective has already been basically in- vestigated in our previous work (Gâteau et al., 2008). Indeed, by depicting how the responsibility is introduced and inter- preted in a large number of industrial frameworks, we have been able firstly to extract main components of it and, secondly, to validate them through a responsibility ontology. This ontology has been built by analyzing how responsibility components are declined in the realm of IT security, from ac- cess control models such as RBAC (Sandhu et al., 2000) up to framework for ICT governance like Cobit [4], in the realm of requirement engineering, as well as through EAM frame- works like CIMOSA (http://www.cimosa.de/) or PERA (http://www.pera.net). The issue of that wide review of struc- turing framework has lead to the conclusion that mainly three components build the responsibility concept. Those compon- ents are: capability, accountability and commitment. The second part of the research aims at elaborating a methodo- logy for defining, structuring and deploying the responsibil- ity in industries’ information systems. In the literature, each area of information activity already has methods for elaborat- ing its information frameworks. In the field of requirement engineering: (Yu et al., 2001), (AntĂłn, 1996) and (Fontaine et al., 2001), in the field of access control: (Fernandez, 1997) (Roeckle et al., 2000) (Crook et al., 2002) (Qingfeng et al., 2003) (Neumann et al., 2002), and in the field of EAM: (Ver- nadat, 1995) (Meir, 1999). However, none of them integrate the notion of responsibility in their methodology. Our work aims at filling that gap with an innovative five-step method focusing on the responsibility ontology. The advantage of this method will be: It is focused on the concept of responsibility rather than on a concept of role, user, or activity, It is adapted to manage responsibility exceptions.
  • 2. It could be tailored to a large part or to a small part of the activity, It provides a generic responsibility diagram that may be rapidly used and adapted for a specific framework, It is based on a responsibility model that has been valid- ated against different domains like access control or re- quirement engineering. 2. RESPONSIBILITY MODEL A plethora of definitions of responsibility exists. We may however state that the commonly accepted responsibility definition encompasses the idea of having the obligation to ensure that something happens. Previous work (Aubert et al., 2008) shows that responsibility can be described as a set of three additional elements that are capability, accountability and commitment. Figure 1 depicts our responsibility model. The relation between responsibility and the three other concepts is of the form 0..* to 1. That means that being responsible involves the possibility to dis- pose of many capacities, accountabilities and commitment. Fig. 1. Responsibility model Capability describes the quality of having the required qualit- ies or resources to achieve a task. For instance, a strategic capability for a given responsibility could be: “A resource must know the strategic objectives of the organisation”. An operational capability could be: “The coach of the resources must have write access to the HR software”. Accountability describes the state of being accountable on the achievement of a task. For instance, a strategic accountability for a given responsibility could be: “A project leader must achieve the financial Key Performance Indicators defined for the project”. An operational accountability could be: “The project manager must define the project plan”. Finally, Commitment is the engagement of a stakeholder to fulfil a task and the assurance that he will do it. For instance, a strategic commitment for a responsibility could be:” The Chief Financial Officer accepts to manage the accounting de- partment and not commit insider dealing”. An operational commitment could be: “An employee of the procurement staff accepts not to use the system for his personal use”. The consistency between concepts may also be examined based upon the assumption that the capability needed for as- suming a responsibility corresponds to the accountability of another user’s responsibility. Both responsibilities’ compon- ents, capability and accountability, are strongly linked to each other in that accountability of a role or a person permits to deduce capability of another role or person, and con- versely a capability stems from accountability (e.g.: The cap- ability “An engineer has access to a specific file” stems from the accountability “An engineer has to share a specific file with another engineer”). 3. METHODOLOGY These complementarities of the responsibility’s concepts are an important element for the definition of policies according to our responsibility model. The methodology described in this section has for objective to explain how to define the en- terprise IT policies according to the responsibility model. This methodology is a five-step approach. To facilitate the understanding, we illustrate each step with a case study. Fig. 2. SIM Methodology 3.1 STEP 1. Collection of information The first step has for objective to define the context and to collect each component that will be formalized in the policy. STEP 1 input: Inputs of step 1 are elements collected from business case studies, business processes, business proced- ures, and effective practices in the enterprise. STEP 1 output: Output of step 1 is a formalized and struc- tured synthesis of the process in natural language. STEP 1 actions: The actions performed at this step encom- pass a number of activities to collect information about the process and the responsibility components. These activities are interviews of the key members of the personnel, analyses
  • 3. of existing process descriptions, analysis of enterprise refer- entials like the ISO 9000 quality book. By these activities, we can summarize: Process responsibilities, as well as their composing ele- ments, like accountabilities, capabilities, and commit- ments; The existing relations between responsibilities and re- sponsibility components. To illustrate that methodology, we describe this first step based on the “Enterprise Christmas Gifts Process”. After having performed interviews and analyses of the enterprise activity, the following synthesis has been written: Mr. Johnson is the manager of the IT Company named “HighTech”. Every year, Mr. Johnson organizes, during the Christmas period, a large mailing of postcard and gifts in order to thank (best) customers for their loyalty. This process permits to develop customer loyalty and update the yearly customer list. Due to an overload of work at this period (such as closing the annual report) and because this task is less business sensitive as some other production tasks, Mr. Johnson prefers delegating this task to his employees. Generally, he assigns work to: A responsible for updating the customer list, selecting mail targets, printing envelopes and sending cards and bottles of champagne to the best customers; A responsible for receiving customers’ feedback (such as wishes, complaints or orders), analysing it and providing him with the results ; A responsible for giving sufficient access rights to all pro- cess stakeholders. However, for some very important customers, Mr. Johnson prefers sending bottles of champagne himself. Each year, after receiving the feedback analysis, Mr. John- son realizes that the process encounters some problems, such as (best) customers that haven’t received cards or gifts, or customers having received them twice. 3.2 STEP 2 Graphic diagramme The second step translates the process from natural language toward a graphical representation. STEP 2 input: Input of step 2 is the synthesis achieved in step 1. STEP 2 output: Output of step 2 is a graphical representation of the responsibility framework of the analysed process. It encompasses a representation of the responsibility and its components, and the links between components. STEP 2 actions: The actions performed at that step are com- posed of three sub-tasks. Sub-task 1: Definition of each responsibility and transcrip- tion of it using boxes. Each box stands for a responsibility; it encompasses its accountabilities and its capabilities. According to our case study, four responsibilities are extrac- ted: Postcard Sending, Drive Customers Relationship, Feed- back Analysis, and Give Access Rights. This is illustrated in figure 3. Sub-task 2: For each responsibility, an analysis of the re- quired capabilities is made, and is translated through a folded corner in the corresponding responsibility box. The same op- eration is made for the accountabilities. Sub-task 3: This last sub-task consists in the definition of links between responsibilities components. Four kinds of links exist: Delegation link constituting the delegation of a respons- ibility’s accountability toward another responsibility. This is illustrated by the accountability 5 of responsibility “Drive Customer Relationship”,that delegates its account- ability to the responsibility “Feedback Analysis”. Implication link constituting for a responsibility’s ac- countability the existence of another responsibility’s cap- ability. This is illustrated by the capability 2 “Access Cus- tomer file” of responsibility “Feedback Analysis” that im- plies the accountability 1 of the responsibility “Give Ac- cess Rights”. Contribution link highlighting that one responsibility’s accountability contributes to another accountability of the same responsibility. This is illustrated by the accountabil- ity 2 “Print Envelopes” which contributes to achieving the accountability 4 “Send postcards” of the responsibil- ity “Postcard Sending”. Execution link formalizing that a capability of a respons- ibility is necessary to execute an accountability of the same responsibility. This is illustrated by the capability 1 “Customer Feedback” of the “Drive customer relation- ship” responsibility that is necessary to achieve the ac- countability 4 “Monitor the satisfaction of the clients”. 3.3 STEP 3 Responsibility’s components links verification This third step of the methodology is the first refining step. It aims at analysing the graphical representation of the process issued from step 2, depicting inconsistencies, and correcting the diagram to eliminate them. STEP 3 input: Input of step 3 is the process graphical repres- entation issued from step 2.
  • 4. Fig. 3. Responsibility model for “Customer loyalty development process” STEP 3 output: Output of step 3 is a graphical representation of the responsibility framework of the analysed process re- fined according to the components relationships. STEP 3 actions: The actions performed at that step are com- posed of three sub-tasks. Sub-task 1: Deep analysis of the capability components for each responsibility. The main objectives of this analysis are to detect and solve the problem of unnecessary capabilities. Capabilities may be unnecessary in the case of useless capab- ilities for the achievement of accountabilities of the same re- sponsibility. This means that they do not have execution links. It is illustrated by the capability 4 “Have a super ad- min account” of the responsibility “Give Access Rights” that is not necessary for the accountabilities of that responsibility. To face this inconsistency, it is necessary to suppress the cap- ability. Sub-task 2: Deep analysis of the accountability components for each responsibility. The main objective of this analysis is to make sure of that all accountabilities are provided and exist in the model, and to assure that all accountabilities are necessary. Some accountabilities are not fully justified if: no link exist between the accountability with one or more capabilities in the process, no links exist between the accountability and another re- sponsibility (no delegation), the accountability is not an outcome of the process. It is illustrated by accountability 1 of “Give Access Rights” responsibility that “Providing access rights to Customer loy- alty development process” is too large because it is not neces- sary for the “Feedback Analysis” to have that right. Sub-task 3: Once accountabilities are verified, it is possible to check that all capabilities necessary for their achievement exist. This is illustrated by the accountability 2 “Print envelopes” of the responsibility “Postcard Sending” that may not be achieved because one capability misses that accountability: capability 3 “Ability to print”. 3.4 STEP 4 Responsibility exceptions links verification This fourth step of the methodology is the second refining step. It aims at analysing the graphical representation of the relation within the process, depicting inconsistencies, and correcting the graph to eliminate them if necessary.
  • 5. STEP 4 input: Input of step 4 is the process graphical repres- entation issued from step 3. STEP 4 output: Output of step 4 is a graphical representation of the responsibility framework of the analysed process re- fined according the relationship between components. STEP 4 actions: The activity of that step aims at detecting and correcting conflicts and incoherencies with regard to re- sponsibility rules dictated by the enterprises, for example: Delegation rules. If a responsibility is delegated from one actor to another, the enterprise should have rules to manage the delegation. These rules must be satisfied in the responsib- ility graph. Example of these delegation rules are: if a re- sponsibility is delegated, all the capabilities necessary for it are also delegated and the accountability may be kept in the hand of the person that delegates, or in the hands of the per- son that is delegated to, but not with both persons at the same time. Some conflict may exist regarding that rule. E.g.: The responsibility “Drive Customer relationship” delegates the “Sending Activities” (sending postcards and bottles of cham- pagne) but keeps, at the same time, its accountability of send- ing bottles of champagne. As a consequence, two responsib- ilities have the same accountability. If both persons achieve their accountability; it is possible that the action is performed twice. Separation of duties. Some corporate rules may impose the separation of duty for some responsibilities. It is traditionally the case of the responsibility to order products, and the re- sponsibility to validate the invoice of the product order. Cardinality constraints. The responsibility graph also needs to be checked at this step for alignment with cardinality requirements. E.g.: the number of accountabilities handled by an equal responsibility is sometimes limited in order to avoid an unjustified increasing overload of work for a single person. This constraint must be balanced according to the work effort necessary for achieving each accountability. 3.5 STEP 5 Policy eliciting This last step of our methodology aims at deriving policies from the responsibility model. STEP 5 input: Input of step 5 is the process graphical repres- entation issued from step 4. STEP 5 output: Output of step 5 is a set of context dependant policies. STEP 5 actions: The activity of that step aims at translating the responsibility graph into a given policy format. Several derivations are possible. We can transform the re- sponsibility model into an Process Framework like the one specified by the standard ISO/IEC 15504, Information Tech- nology – Process assessment, (parts 1-5), 2003-2006 or an organisational model for multi-agent systems. In the follow- ing, we give a rapid overview of the possible transformation from an organisation model point of view. MOISE Inst , an Institution Specification Model for multi-agent systems, is defined in (Gâteau, 2007). This model is used to define normative organisations that are composed of: A structural specification (SS) defining the roles that agents will play, the links between these roles and the groups which agents playing roles should participate in and where interactions take place; A functional specification (FS) defining goals that have to be reached in the system; A normative specification (NS) clearly defining rights and duties of roles and groups on a mission (set of goals). These specifications constitie the Organisational Specifica- tion (OS), i.e. the representation of the organisation inde- pendent of agents evolving in the system and becoming or- ganised with regard to this OS. An Organisational Entity (OE) is an instance of the OS and is built from the set of agents that have adopted roles according to the SS of the OS, interacting within groups, and activating missions according to the current FS and norms (NS). From the Responsibility Model point of view, we can con- sider Capabilities and Accountabilities of a Responsibility as right and duties that the person who will have the Responsib- ility will have to respect. A Capability is permission for the person to do something and an Accountability is an obliga- tion to do something (in order to execute the whole process in which the Responsibility is defined). In MOISE Inst , missions (from the functional specification) define the achievement responsibility of collective goals gathered in a functional scheme. The NS defines permission and obligation (rights and duties) by specifying norms: a role is obliged to achieve a mission (a set of coherent goals). In this model, we define a role responsibility on a specific task (several goals indeed) by defining norms. Fig. 4. Transformation of responsibility model into organisational model A responsibility model resulting of the methodology depicted in this paper can be transformed into an organisational model and then be instantiated by a set of agents. As we can see on Fig. 4, each responsibility is represented by a functional scheme. Capabilities are leaf goals and belong to the mcap mission. Accountabilities are root goals (the last accountabil-
  • 6. ity to achieve becomes the root goal in fact) and belong to macc mission. Links between capabilities and accountabili- ties become plan and structure the functional scheme: the goals #CAP_2 and #CAP_1 must be reached in order to reach the goal #ACC_1 which permit to reach the root goal #ACC_2 and then finish the scheme. At last, rights and du- ties are distinguished by associating missions with a deontic operator (permission or obligation) and a role in the organisa- tional model. For instance, the role which will be responsible of the feedback analysis is obliged to achieve mission macc and permitted to achieve the mission mcap. We obtain two norms composing the NS and represented as follows: N01: Obl(Rolefeedback, macc) N02: Perm(Rolefeedback, mcap) In the responsibility model, roles will be introduced in future work in order to instantiate the model by making a person play a role. In the organisational model, agents play roles and commit to missions (the commitment concept is also a part of the responsibility). Once the OS is obtained, it could be instantiated by a set of agents playing roles and reaching goals regarding to the norms defined in the NS in order to make them execute the functional scheme, and to respect their responsibilities. 5. CONCLUSION AND FUTURE WORKS Improving ICT governance is an important matter, especially in the current ongoing economic context. We propose in this paper to improve that field firstly by introducing our formal- ization of the responsibility of stakeholders involved in in- dustrial activities and by elaborating an innovative responsib- ility model and, secondly, having the paper describe our methodology to define, structure and deploy the responsibil- ity all around the company. This methodology, based on the concepts of our responsibility model (accountability, capabil- ity and commitment) is illustrated in this paper by the trans- formation of the responsibility model into an organisational model for multi-agent system. In the proposed methodology, the definition of the responsib- ility component is performed in a sequential way. Future works will consist of improving the methodology with an it- erative approach for refining the responsibility engineering (step 3 and step 4). To illustrate that paper, the methodology has used an aca- demic case study. The methodology is also under validation and improvement in a large international Financial Services Provider company using a real process case study. This research was funded by the National Research Fund of Luxemburg in the context of SIM (Secure Identity Manage- ment - FNR/04/01/03) and TITAN (Trust-Assurance for Crit- ical Infrastructures in Multi-Agents Environments, FNR CO/08/IS/21) projects. REFERENCES AntĂłn, A., (1996), Goal-Based Requirements Analysi,. Second ICRE 96, Colorado Springs, USA. Aubert, J., Gâteau, B., Incoul, C., Feltus, C., (2008) SIM: An Innovative Business-Oriented Approach for a Distrib- uted Access Management, ICTTA2008, Damascus, Syr- ia. Crook, R., Ince, D., Nuseibeh, B., (2002) Towards an Ana- lytical Role Modelling Framework for Security Re- quirements, Proc. of REFSQ'02, Essen, Germany. Fernandez, E. B., Hawkins, J. C., (1997) Determining Role Rights from Use Cases, ACM Workshop on RBAC. Fontaine, P. J., (2001) Goal-Oriented Elaboration of Security Requirements. M.S. Thesis, Dept. Computing Science, University of Louvain. Gâteau, B., F eltus, C., Aubert, J., Incoul, C. (2008), An Agent based Framework for Identity Management: The Unsuspected Relation with ISO/IEC 15504, IEEE Inter- national Conference on Research Challenges in In- formation Science (RCIS), Marrakech, Morocco. Gâteau, B., (2008,) ModĂ©lisation et Supervision d'Institutions Multi-Agents. PhD Thesis held in cooperation with Ecole Nationale Superieure des Mines de Saint Etienne and CRP Henri Tudor, defended in Luxembourg the 26th of June 2008. Meir, H. L., Marios P. K. (1999), FirstSTEP process modeler a CIMOSA-compliant modeling tool, computers in Industry, Volume 40, Issues 2-3, Pages 267-277. Neumann, G., Strembeck, M., (2002) A Scenario-driven Role Engineering Process for Functional RBAC Roles, SACMAT 02, Monterey, California, USA. Qingfeng, H., AntĂłn, A. I., (2003), A Framework for Pri- vacy-Enhanced Access Control Analysis in Require- ments Engineering, REFSQ'03, Austria. Sandhu, R., Ferraiolo, D.,Kuhn, R., (2000) The NIST Mod- el for Role Based Access, Control: Towards A Unified Standard , Proceedings RBAC-00, Berlin Germany, July 26-27 2000, pages 47-64. Roeckle, H., Schimpf, G., Weidinger, R. (2000). Process-ori- ented approach for role-finding to implement role-based security administration in a large industrial organiza- tion. RBAC '00. ACM, New York, NY, 103-110. Vernadat F. B., Enterprise Modelling and Integration, Chap- man & Hall, London (1995), ISBN 0-412-60550-3 Yu, E. S., Liu, L. (2001). Modelling Trust for System Design Using the i* Strategic Actors Framework. Workshop on Deception, Fraud, and Trust in Agent Societies Held During the Autonomous, Eds. Lecture Notes In Com- puter Science, vol. 2246. Springer-Verlag, London, 175-194.