<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Knowledge and Business Intelligence Technologies in Cross-Enterprise Environments for Italian Advanced Mechanical Industry - Project Presentation -</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Centro Cultura Innovativa d'Impresa, Universit del Salento</institution>
          ,
          <addr-line>Lecce</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Research &amp; Development Laboratory - Engineering</institution>
          ,
          <addr-line>Ingegneria Informatica</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>SESAR Lab - Dipartimento di Informatica Universita degli Studi di Milano</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <fpage>104</fpage>
      <lpage>110</lpage>
      <abstract>
        <p>The internetworking and the outsourcing of business activities have become essential in the short term to maintain competitiveness in the market, as it allows to signi cantly reduce time and cost of core business processes. However, outsourcing, increasing the level of information sharing, imposes new precautions to maintain, in the medium and long-term, strategic control over the knowledge produced and exchanged, both in terms of \know-how" and \know-that". Especially for SMEs, his implies substantial risk of a technological nature, in that it requires complex and extremely expensive technological framework. KITE.it aims to develop a methodological and technological framework to support the transition of the advanced mechanical supply chains towards Value Network models able to guarantee: { interoperability and cooperation between rms and individuals in the network; { the management and securing of the intellectual capital; { measurement and performance optimization.</p>
      </abstract>
      <kwd-group>
        <kwd>Business Process Management</kwd>
        <kwd>Data Analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        The exit from the great global crisis towards a new cycle of development
requires to move from organizational and inter-organizational models, based on
a strict de nition of roles and organizational boundaries, to structures de ned
as a Value Network (VN): an organizational structure by uid boundaries and
the complex relational dynamics in which individuals, groups and organizations
thrive through complex processes of interchange and integration of value, based
on the network paradigm[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. In this context, the competitiveness of the Made in
Italy must be defended and enhanced rede ning business models and business
processes according to the VM Paradigm. We de ne VN as the integration of
a Business Network (or network of enterprises) and the corresponding Social
Network: the rst characterized by the mediation of the economic value, while
the second by the mediation of knowledge and intellectual capital of knowledge
workers. In an increasingly, uncertain and changeable market, business agility
is the mantra of knowledge driven organization [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. A variety of tools and
technologies were developed to simplify the communication among organizations and
people across the VN. These tools are focused on information sharing and are
characterized by the ability to integrate information systems, to connect the
processes of an organization to those of suppliers and make the process
accessible to the customers. Exhortation to collaboration, sharing, cooperation and
the ability to rapidly set up their business and the value network in which an
organization operates, is hampered by several kinds of issues, such as the
dissemination of know-how, and this could damage the company. KITE.it project,
is aimed at providing the conceptual, methodological and technological tool to
maximize the ability to obtain agile, collaborative and social business in a
secure manner, that is minimizing the risk. Therefore the fundamental ambition
is the safe business agility; which means that both the process and the entire
organization needs to be exible.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2 KITE.it Methodology</title>
      <p>An agile organization is expected to adapt itself to a changing environment
proactively. Such adjustment should be done quickly at the level of modeling and
implementation: a modi ed model is to be transferred seamlessly and quickly to
the computer systems supporting the organization.</p>
      <p>KITE.it \End to End" Methodology manages iteratively the entire business
life cycle both at strategic and operational level. At the strategic level the
exogenous variables and the value network in which the organization operate are
analyzed. At the operational level, the strategy and the corporate policies are
realized by an architecture of core processes supported by support processes.
The big picture of KITE.it methodology is very simple. As described in Fig.1,
it consists of two main iterative phases, which correspond to the two levels of
analysis the methodology is based on: Strategy and Operations, preceded by a
initial bootstrap phase in which teams are set up and the methodology
implementation plan is established. As described in Fig.2, in the Strategy phase we
identify four iterative steps:
{ Strategic Analysis S.
{ Goal Setting S2.
{ KPI and Target S3.
{ Risk and Policies S4.</p>
      <sec id="sec-2-1">
        <title>2.1 Strategical Analysis S1</title>
        <p>After an analysis of the value network environment (socio-economic-political),
it is necessary:
{ to establish the vision,
{ to analyze the value networks in which the company operates by identifying
roles and value ows,
{ and nally to de ne the value proposition.</p>
        <p>
          The E3Value method [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] is indicated by KITE.it methodology as the preferred
notation to model Value Networks. In addition, services to be implemented or
modi ed are identi ed. The last step of this phase is to establish the value chain,
that is the core processes that will be linked with the goals identi ed in step S2.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2 Goal Setting S2</title>
        <p>{ Financial.
{ Value Network.
{ Processes.
{ Learning and growth.</p>
        <p>At this stage strategic goals, that the organization wants to achieve, are
identied. This analysis is done according to four di erent perspectives:</p>
        <p>
          These perspectives are borrowed from the BSC methodology [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] (balanced
scorecards) in which the Customer perspective is extended to the Value Network
and the Internal Process perspective is extended to cover collaborative processes.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3 KPI and Target S3</title>
        <p>All goals previously identi ed are mapped to key performance indicators and
target values, that give the possibility to check the distance from each goal
achievement. Trough the objective identi ed in the scorecard perspectives, at this
stage we establish all the measures with a low level of detail. In the operational
phase methodology such measures will become detailed process metrics.</p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4 Risk and Policies S4</title>
        <p>The nal step in this phase gathers business requirements for the operational
phase, policies that will support the objectives are established and the business
risks associated with the objectives and any policies to mitigate them are
identied. The Strategy phase is iterative by nature and therefore the steps described
are repeated until a stable and shared strategic model is obtained. These
iterations may a ect structural changes: once a risk is identi ed and its probability
and impact is assessed, it may be necessary not only to review the objectives
and the policies, but sometimes even the value proposition with profound e ects
on the organization. In order to carry out this phase in a truly e ective way, it
is needed the active involvement of the top management. As described in Fig.2,
in the Operation phase we identify four iterative steps:
{ Business modeling - O1.
{ De ne Metrics - O2.
{ Enacts - O3.
{ Monitoring - O4.</p>
      </sec>
      <sec id="sec-2-5">
        <title>2.5 Business Modeling - O1</title>
        <p>This is the stage where the requirements of the strategic analysis become business
models or diagrams; di erent models will be de ned to establish the process
architecture, the organizational structure, processes at various levels of detail,
the business decisions and the operational risks associated with the processes.</p>
      </sec>
      <sec id="sec-2-6">
        <title>2.6 De ne Metrics - O2</title>
        <p>Starting from performance indicators, identi ed in the step S3 of the Strategy
phase, the measures to be carried out on individual processes and methods for
the recovery of the necessary information are set out in detail. The KITE.it
methodology provides a model for the metrics speci cally de ned by the project.
2.7 Enacts - O3
At this stage the models are ingrained into the organization's operations. The
necessary components will be developed and put into production with the
processes by integrating all in an environment of social cooperation.</p>
      </sec>
      <sec id="sec-2-7">
        <title>2.8 Monitoring - O4</title>
        <p>The Monitoring stage is critical to ensure the ability:
{ to continuously improve the performance of the organization,
{ to verify the achievement of strategic objectives,
{ and to control risks.</p>
        <p>Using the information about the process, and the security and SNA measures,
we will be able to close the loop and to reiterate the end-to-end methodology
by restarting from the Strategic analysis (S1) or from Business modeling (O1)
to make ever more e ective the action of the business.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3 Data Loss Prevention Scenario</title>
      <p>
        Our rst investigations was related to a Data Loss Prevention Scenario. The loss
of sensitive information are critical for organization, solutions for preventing data
leakage incidents are based on systems designed to detect potential data breach
transmissions and prevent them by blocking data while in-use (endpoint actions),
in-motion (network tra c), and at-rest (data storage)[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. These systems provides
logs describing the interactions among the organization and are typically able
to track the originator and addressee of a data transmission, together with the
action operated on data. Using this information KITE.it tacks the dynamics
on the exchange of intellectual capital within the VN. In fact, the DLP system
allows to extract information about the manufacturing process, the collaboration
process and the social network of the interactions. The objective of KITE.it is
to provide an uni ed view on these dimensions providing integrated metrics to
enhance Business Process Monitoring, as illustrated in Fig.4.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgements</title>
      <p>This work was partly funded by the Italian Ministry of Economic Development
under the Industria 2015 contract -KITE.it project.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Allee</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The future of knowledge: Increasing prosperity through value networks</article-title>
          .
          <source>Routledge</source>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Prahalad</surname>
            ,
            <given-names>C.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramaswamy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The future of competition</article-title>
          . Harvard Business School Press, Boston, MA (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Gordijn</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akkermans</surname>
          </string-name>
          , H.,
          <string-name>
            <surname>Van Vliet</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Designing and evaluating ebusiness models</article-title>
          .
          <source>IEEE intelligent Systems</source>
          <volume>16</volume>
          (
          <issue>4</issue>
          ) (
          <year>2001</year>
          )
          <volume>11</volume>
          {
          <fpage>17</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Kaplan</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaplan</surname>
            ,
            <given-names>R.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norton</surname>
            ,
            <given-names>D.P.:</given-names>
          </string-name>
          <article-title>The balanced scorecard: translating strategy into action</article-title>
          . Harvard Business Press (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Shabtai</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Elovici</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rokach</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>A taxonomy of data leakage prevention solutions</article-title>
          .
          <source>In: A Survey of Data Leakage Detection and Prevention Solutions</source>
          . Springer (
          <year>2012</year>
          )
          <volume>11</volume>
          {
          <fpage>15</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>