AMBIDEXTROUS ENTERPRISE ARCHITECTING: BETTING ON THE FUTURE AND HACKING PATH-DEPENDENCIES Complete research

نویسنده

  • Knut H. Rolland
چکیده

Much existing research on IS and enterprise architecture focuses on suggesting different representations describing a ‘target architecture’ for processes, information and information systems at different levels across the organization. Less emphasis has been put on the actual evolution of the current enterprise architecture towards this envisioned ‘target architecture’. In this paper we look at enterprise architecture from a process perspective and explore how actual practices of architecting enfold and how they are mutually shaped by context. In doing so, we offer two contributions. First, we contribute empirically showing how enterprise architecting in practice is an ambidextrous activity focusing on both fixing the limitations of historically entrenched architectures and establishing new architecture by betting on what needs are going to give the most flexibility and value in the future. Secondly, we contribute by conceptualizing how enterprise architecture evolves over time, and propose the concepts of ‘architectural path-dependency’ and ‘enterprise architecting’. Architectural path-dependencies is the effect of existing architectures that become economically, technically and organizationally hard to change – at least in a radical manner. Enterprise architecting, on the other hand, is the intentional acts to circumvent path-dependencies and evolve towards an envisioned architecture. Henceforth, we argue that enterprise architecture transition is shaped by multiple architectural path-dependencies as well as various acts of enterprise architecting to establish new paths. The paper discusses theses concepts in relation to existing literature on software and enterprise architecture.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ambidextrous Enterprise Architecting: Betting on the Future and Hacking Path-dependencies

Much existing research on IS and enterprise architecture focuses on suggesting different representations describing a ‘target architecture’ for processes, information and information systems at different levels across the organization. Less emphasis has been put on the actual evolution of the current enterprise architecture towards this envisioned ‘target architecture’. In this paper we look at...

متن کامل

Domain-specific languages and type systems

My primary research interests include functional programming languages, embedded domain-specific languages, type systems, and combinatorics, and ways that these topics can contribute to other areas of computer science. More broadly, running through all of my research are three major themes which shape and direct my efforts: • I am highly motivated by beauty in its many forms. I learn new things...

متن کامل

Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning

As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gath...

متن کامل

Software Security - The Dangers of Abstraction

Software insecurity can be explained as a potpourri of hacking methods, ranging from the familiar, e.g. buffer overruns, to the exotic, e.g. code insertion with Chinese characters. From such an angle software security would just be a collection of specific countermeasures. We will observe a common principle that can guide a structured presentation of software security and give guidance for futu...

متن کامل

Digital Identity

Recently the National Center for Digital Government held a workshop on “The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015