Abstract
Networked organizations, consisting of enterprises who exchange things of economic value with each other, often have participants who commit a fraud or perform other actions, not agreed in a contract. To explore such opportunistic behavior, and to design solutions to mitigate it, we propose the e 3 controlapproach. This approach takes the valuable objects, which are exchanged between enterprises, as a point of departure, and proposes a control patterns library to find solutions for various types of opportunistic behavior in network organizations. The practical use of the patterns is illustrated by a case study in the field of renewable electricity supply in UK.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Weill, P., Vitale, M.R.: Place to Space: Migrating to eBusiness ModelsEconomy and Society. Harvard Business School Press, Boston (2001)
Gordijn, J., Akkermans, J.M.: e3-value: Design and evaluation of e-business models. IEEE Intelligent Systems, Special Issue on e-Business 16(4), 11–17 (2001)
Gordijn, J., Akkermans, J.M.: Value-based requirements engineering: Exploring innovative e-commerce ideas. Requirements Engineering 8(2), 114–134 (2003)
Gordijn, J., Yu, E., van der Raadt, B.: E-service design using i* and e3value modeling. IEEE Software 23(3), 26–33 (2006)
Gordijn, J., Akkermans, J.M.: Business models for distributed energy resources in a liberalized market environment. The Electric Power Systems Research Journal 77(9), 1178–1188 (2007), doi:10.1016/j.epsr.2006.08.008
Castro, J., Kolp, M., Mylopoulos, J.: Towards requirements-driven information systems engineering: the tropos project. Information Systems 27, 365–389 (2002)
Kartseva, V., Gordijn, J., Tan, Y.-H.: Developing a modelling tool for designing control mechanisms in network organisations. International Journal of Electronic Commerce (2005)
Ronmey, M.B., Steinbart, P.J.: Accounting Information Systems, 10th edn. Prentice Hall, New Jersey (2006)
ISACF: Control objectives for information and related technology (cobit). Technical report, Information Systems Audit and Control Foundation (ISACF) (2005)
Eisenhardt, K.M.: Agency theory: An assessment and review. Academy of Management Review 14(1), 57 (1989)
Anthony, R.N., Govindarajan, V.: Management Control Systems, 11th edn. McGraw Hill Higher Education, New York (2003)
Kartseva, V., Hulstijn, J., Baida, Z., Gordijn, J., Tan, Y.-H.: Towards control patterns for smart business networks. In: Vervest, P., van Heck, E. (eds.) Proceedings of the Smart Business Networks Initiative Discovery Session. Springer, Heidelberg (2006)
Kartseva, V., Hulstijn, J., Tan, Y.-H., Gordijn, J.: Towards value-based design patterns for inter-organizational control. In: Waldena, P., Gricar, J. (eds.) Proceedings of the 19th Bled Electronic Commerce Conference on eValues, Bled, Slovenia. University of Maribor (June 2006)
Kartseva, V., Gordijn, J., Tan, Y.-H.: Designing control mechanisms for value webs: The internet radio case study. In: Vogel, D.R., Walden, P., Gricar, J., Lenart, G. (eds.) Proceedings of the 18th BLED conference (e-Integration in Action), pages cdrom, Maribor, SL (2005)
Kartseva, V., Hulstijn, J., Gordijn, J., Tan, Y.-H.: Modelling value-based inter-organizational controls in healthcare regulations. In: Proceedings of the 6th IFIP conference on e-Commerce, e-Business, and e-Government, Turku, Finland (2006)
Alexander, C.: The Oregon Experiment. Oxford University Press, New York (1975)
Fowler, M.: Analysis Patterns: Reusable Object Models. Addison-Wesley, Reading (1997)
Seruca, I., Loucopoulos, P.: Towards a systematic approach to the capture of patterns within a business domain. The Journal of Systems and Software (67), 1–18 (2003)
Hollander, A.S., Denna, E., Cherrington, J.O.: Accounting, Information Technology, and Business Solutions, 2nd edn. McGraw-Hill, Irwin (1999)
Bons, R.W.H.: Designing Trustworthy Trade Procedures for open Electronic Commerce. PhD thesis, University of Rotterdam (1997)
Bons, R.W.H., Dignum, F., Lee, R.M., Tan, Y.-H.: A formal analysis of auditing principles for electronic trade procedures. International Journal of Electronic Commerce 5(1), 57–82 (2000)
Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison Wesley, Boston (1995)
Fowler, M., Scott, K.: UML Distilled, 2nd edn. Addison Wesley, Reading (2000)
Nuseibeh, B., Kramer, J., Finkelstein, A.: A framework for expressing relationships between multiple views in requirements specification. IEEE Transactions on Software Engineering 20(10), 760–773 (1994)
Bons, R.W.H., Lee, R.M., Wagenaar, R.W.: Designing trustworthy interorganizational trade procedures for open electronic commerce. International Journal of Electronic Commerce 2(3), 61–83 (1998)
Chen, K.T., Lee, R.M.: Schematic evaluation of internal accounting control systems. EURIDIS Research Monograph, RM-1992-08-1, Erasmus University Rotterdam (August 1992)
Kartseva, V.: Designing Controls for Network Organization: A Value-Based Approach. PhD thesis, Vrije Universiteit Amsterdam (2008), http://docs.e3value.com/bibtex/pdf/Kartseva2008.pdf
OFGEM. The renewables obligation: Annual report 2003-2004. Technical report, Office of Gas and Electricity Markets, United Kingdom (2004)
OFGEM. Renewables Obligation - Atlantic Electric and Gas Limited and Maverick Energy Limited. Technical Report R/65, Office of Gas and Electricity Markets, United Kingdom (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kartseva, V., Gordijn, J., Tan, YH. (2009). Designing Value-Based Inter-organizational Controls Using Patterns. In: Lyytinen, K., Loucopoulos, P., Mylopoulos, J., Robinson, B. (eds) Design Requirements Engineering: A Ten-Year Perspective. Lecture Notes in Business Information Processing, vol 14. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92966-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-92966-6_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-92965-9
Online ISBN: 978-3-540-92966-6
eBook Packages: Computer ScienceComputer Science (R0)