Home > Articles

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

7 The Analysis Process

7.1 Introduction

The process described below is intended to assist enterprises with the analysis of business process and business documents necessary for engaging in electronic commerce with other enterprises. The analysis of business processes is concerned with the elaboration of the higher-level processes that are required to conduct electronic business. The analysis of business information and documents activity identifies the business documents involved in the business transactions of the business processes. The outputs of the analysis activities are business-process-specifications and business document definitions.

The analysis effort is best carried out by a cross-functional analysis team of experts from IT, marketing, software development, business analysis, procurement, etc. When applying the analysis processes described herein, it is RECOMMENDED that the analysis team be staffed with people experienced in business process analysis or process re-engineering. It is also assumed that the analysts understand the challenges associated with business process analysis such as trying to analyze a business process with ill-defined requirements and objects.

Such a team is encouraged to use the ebXML Business Process Analysis Worksheets , UML modeling tools, or business process editors that provide similar functionality (see Section 10). The team will be able to develop an ebXML Business Process Specification that can be reviewed and verified by the entire enterprise, plus all necessary information to populate models based on the Meta Model and The Specification Schema. The analysis process supports analyzing new processes and process re-engineering as well as supporting the analysis and documentation of existing processes.

7.2 Recommended business process and business information analysis methodology and meta model

Analysis teams will use methodologies and meta models to specify the business processes in an electronic business community. An analysis methodology prescribes the overall process and sub-processes by which teams should proceed when defining business processes. The semantics of the meta model define the information that needs to be discovered and documented during the analysis process. Methodologies often include patterns to expedite the "design" of the model and help achieve common expression of similar concepts.

ebXML recommends (but does not require) that analysis teams use the methodology specified by the UN/CEFACT Modeling Methodology. If an alternative methodology is used, it is highly recommended that it be compliant with the UN/CEFACT Modeling Methodology so as to have the best opportunity of creating business process models that are compatible with business process models created using the UN/CEFACT Modeling Methodology.

ebXML requires that the business process and business information artifacts generated as a result of the analysis effort be conformant to the semantics defined by the UN/CEFACT Modeling Methodology eBusiness Process Meta Model and other semantics defined in the UN/CEFACT Modeling Methodology. This is necessary to give the best assurance of compatibility between business process models and model sub-components. This semantic conformance is necessary to meet the requirement that the models to be usable and re-usable, and be capable of being compared and contrasted. With models that are eBusiness Process Meta Model conformant, users and tools can generate ebXML Business Process Specification Schema XML instances of the model. Furthermore, the models can be freely shared among ebXML-compliant modeling tools, including, but not limited, to UML tools.

7.3 Business processes and business documents

At a very basic level, a business process is the means by which one or more activities are accomplished in the conduct of business. Within the business process there could be one or more collaborations, each consisting of one or more transactions. Figure Figure 7.3-1, below is a simple representation of a business process and an illustration of the types of business processes which might be needed between Customer and Supplier to complete an order for materials.

Figure 7.3-1FIGURE 7.3-1 Business Process, Collaborations, and Transactions Conceptual View

Business document definitions are the specifications for the business document schemas and the information components that compose the business document and contained information components. A schematic representation of a business document can be seen in Figure 7.3-2, below.

Figure 7.3-2FIGURE 7.3-2 Document Conceptual View

Documents such as Purchase Orders, Invoices, etc., exist at the business process level and are exchanged in business transactions by means of placing documents into document envelopes. Documents are put into document envelopes. They are addressed with the business identifier (e.g. DUNS number) of the recipient and sender. This is analogous to the "Attention:" line on a standard mailing address. A document envelope is placed into a message envelope and is exchanged between business service interfaces. The message envelope might be addressed with the URN of the destination business service interface. Messages have timeouts and other transaction control mechanisms associated with them. Message envelopes are placed into a transport/routing envelope for low level transmission across an e-business network. The target address on message envelope might be the URL of the destination's message-in-box service. A logical view of the nested envelope structure is shown in Figure 7.3-4.

Figure 7.3-4FIGURE 7.3-4 Messaging and Enveloping Conceptual View

7.4 The analysis process

The high-level activities related to business process and business information analysis is shown in Figure 7.4-1.

Figure 7.4-1FIGURE 7.4-1 Activities Related to Analyzing Business Processes and Business Information

As a first step, it is useful to develop a Statement of Intent, which clearly identifies the scope and purpose of the analysis activity and serves to focus the efforts of the team.

The next step involves the gathering of requirements based on the Statement of Intent. Marketing and product management teams often perform this requirement gathering activity. The output of this activity may be a marketing requirements document or a product requirements document. In any case, the result SHOULD be a set of clearly defined requirements for the analysis.

After the requirements have been defined and agreed, the actual analysis can begin. As illustrated by Figure 7.4-2, there can be many inputs to and aspects of the process required to produce the desired output. Inputs to the analysis process can come from requirements, customers and partners, standards, other existing models, and domain experts. Requirements MAY be in the form of product requirement documents, statements of work, customer change requests, etc. Customers, partners, and domain experts provide their input when they are being consulted during the requirement elaboration process and during documentation reviews. Existing standards (cross industry and industry specific) and other existing models (e.g. EDI message implementation guides) are also consulted.

Figure 7.4-2FIGURE 7.4-2 Analyze Business Processes and Business Information

The controls6 for the analysis activities are the methodology (UMM), Meta Model, patterns, and other analysis techniques. These controls specify the process and information model REQUIRED for the business process and information analysis process to produce correct outputs. Patterns include transaction patterns and collaboration patterns.

The mechanisms for the analysis activities are the analysts, tools, and reviewers. Analysts are the people who are defining the processes and documents based on the Meta Model.

One of the key tools to assist with the analysis is the ebXML Business Process Analysis Worksheets, discussed in Section 9, Analysis Aids: Worksheets and Tools.

The Analyze Business Processes and Business Information Activity can be logically partitioned into two separate but interrelated activities: analyze business processes and analyze business information, shown here in Figure 7.4-3:

Figure 7.4-3FIGURE 7.4-3 Analyze Business Process and Business Information Activities

The overall analysis process will generally be more effective if the analysis of the business processes and associated business information happens at the same time. Business information analysts will need to be familiar with the business process and will want to be co-participants during the business process analysis. Otherwise, the business information analysts MAY need to re-interview domain experts, customers, and partners, to get clarification on matters that could have been more effectively addressed during the analysis of the business process. Furthermore, business information analysts will likely have the background that will help identify the key business information elements that effect the business processes.

The analyze business processes activity can proceed along different paths depending on the focus of the modeling effort. For example, if the goal is to establish a business reference model for an industry, the process will likely proceed as discussed in the UMM, from the beginning to the end of the UMM documentation. However, if the effort is to model existing X12 or EDIFACT documents and their associated business processes, the process will more naturally start with the elaboration of business transaction and roles. In this case, there is usually a strong implicit understanding of the associated business process by domain experts. Business process analysis can be partitioned into four high-level activities7 as shown in Figure 7.4-4:

Figure 7.4-4FIGURE 7.4-4 Analyze Business Process Activities

Once the business process and business information analysis is complete, the next activities are the Develop Schemas activity and the Implement Services activity. Development of schemas involves the creation of the document and information component schemas (XML schema/DTD or EDI message and data element definitions) and sample documents. Implementing the service/application involves coding or configuring business service interfaces and services/applications (such as back-end systems) in accordance to the business process definitions and the document schemas.

Once the analysis is complete and the business processes and documents have been full defined and developed, the specifications SHOULD be registered in a Business Library, e.g., an ebXML Registry. A Business Library can be either generic or business domain specific. A business library is a repository of business process specifications and business information objects within an industry or shared by multiple industries. There will be many business libraries, pubic and private, moderated and non-moderated. A public library is one that is available for public access. Typically the content of these will be owned by standard's efforts, such as ebXML or UN/EDIFACT, and large electronic communities (such as automotive marketplaces). A private library is one that does not have public access. These are for private exchanges where the participating parties do not wish to disclose the nature of their business processes. Obviously, the public access business libraries will be the most useful in promoting interoperability between trading partners in different electronic communities. For example, it MAY be necessary for the e-business systems of a trading partner in the automotive community to access business processes registered in a chemical community.

A moderated business library is one whose content is administered by some organization, such as standards body or electronic community. Business process and business information specifications WILL be submitted to a working group or other supervising activity for the controlled business library. The working group WILL review the submissions for quality and accuracy. The specifications MAY be put to public or community voting for approval. Approved specifications are then registered in the business library. At such time, key model ele-ments - such as Business Process, Business Collaboration, and Business Transaction - are officially assigned their identifiers according to the Business Identifier Naming Scheme. These identifiers facilitate re-use and interoperability by providing unique identifiers that can be referenced by business process specifications, Core Component's contextual categories, CPPs and CPAs. Moderated business libraries will typically have more credibility than ones that are not moderated. A business library that is not moderated will allow anyone in the community to register specifications. The quality and accuracy of the specifications will be suspect. However, these types of libraries could result in significant business process specifications. Business process specifications that get significant usage will become more widely adopted over time.

The format in which these specifications are stored is an important consideration, as the key to an enterprise's ability to utilize these specifications in their analysis process is that they are stored in a format that is interoperable with business modeling tools. It would appear RDF offers the opportunity to encapsulate business process models during the analysis, design and 'record for posterity' stage in business process life cycles. In addition, the use of RDF will also help achieve one of the original goals of UN/CEFACT for ebXML, which was assuring that model specifications could be interchanged between standards organizations using a controlled vocabulary for metadata classification and categorization, so as to further promote business process modeling globally and to promote reuse of common solutions. The advantage of RDF over other formats such as XMI is that RDF can be restricted by use of namespaces to a specific problem domain, whereas others typically conform to the more general UML domain. The ability to express a metastructure in RDF and validate it means better control on the applicability of model content. When using models in a constricted domain like B2B, it is attractive to be able to validate model content according to a metastructure. From a business information standpoint, It is particularly useful that RDF allows association to BusinessAction elements, i.e., placing a message in the context of a business process.

A summary of the entire analysis effort and its results is shown in Figure 7.4-5 below:

Figure 7.4-5FIGURE 7.4-5 Modeling, Conversion to XML, and Registration Activity Flow

The overall effort starts with the analysis and modeling of business processes and business information. The UMM Methodology can be employed directly or indirectly through the use of the Business Process Analysis Worksheets or business process editors. Re-usable business process and information components from Business Libraries are applied, as well as collaboration and transaction patterns. The analysis effort results in business process models and business information models that are based on the Meta Model. The models are then converted into XML based Business Process Specifications and Information/Document schemas according to a set of production rules. The specifications and schemas are then registered and stored in Business Libraries for re-use and reference by CPAs.

  • + Share This
  • 🔖 Save To Your Account

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020