<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Capability Agreements and Risk</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Glenda C.M. Amaral</string-name>
          <email>glendacarla.mouraamaral@stud-inf.unibz.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giancarlo Guizzardi</string-name>
          <email>giancarlo.guizzardi@unibz.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nicola Guarino</string-name>
          <email>nicola.guarino@cnr.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Daniele Porello</string-name>
          <email>daniele.porello@loa.istc.cnr.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tiago Prince Sales</string-name>
          <email>tiago.princesales@unitn.it</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Free University of Bozen-Bolzano</institution>
          ,
          <addr-line>Bolzano</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>ISTC-CNR Laboratory for Applied Ontology</institution>
          ,
          <addr-line>Trento</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Trento</institution>
          ,
          <addr-line>Trento</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In this paper we analyse the ontological nature of capability agreements and discuss the relation between capability delegation, vulnerabilities and risk.</p>
      </abstract>
      <kwd-group>
        <kwd>capability</kwd>
        <kwd>vulnerability</kwd>
        <kwd>risk</kwd>
        <kwd>ontology</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Since the early 1980s, the proliferation and increasing importance of interfirm alliances
have received considerable attention in the strategic management literature [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. As the
study of alliance networks has gained popularity, theoretical analysis of the competitive
advantage of organizations participating in alliances have been developed, focusing on
resource-centric theories [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Nevertheless, research has shown that it is the services
that resources provide, not resources themselves, that generate value for the firm [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
Consequently, ownership or control of resources is not a necessary condition for
competitive advantage. In this sense, capability-based theories, which focus on “adapting,
integrating, and reconfiguring internal and external organizational skills, resources, and
functional competences toward a changing environment” [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], have taken shape.
      </p>
      <p>
        Despite the relevance of capabilities to the success of enterprises, little attention has
been given to the theoretical analysis of this concept in the context of interfirm
alliances. In this paper, we tackle this issue by analyzing the ontological nature of
capability agreements, taking into account the broader implications of incorporating external
capabilities embedded in the firm's alliance network. To accomplish that, we conduct,
in Sections 2 and 3, an ontological analysis of capability agreements, under the
principles of the Unified Foundational Ontology [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. As we shall see, our analysis shows an
important result: capability agreements expose external dependencies and reveal new
vulnerabilities, which may enable the occurrence of risk events. Therefore, we can state
that capability agreements imply a relation of duality between capabilities and
vulnerabilities: at the same time that it creates a chain of dependencies on capabilities
throughout the alliances network, it forms a chain of vulnerabilities, due to the possibility that
one or more participant nodes fail to fulfill their commitments. We conclude and
present final considerations in Section 4.
      </p>
    </sec>
    <sec id="sec-2">
      <title>Capability and Capability Agreement</title>
      <p>
        The term capability is used in a variety of contexts with different meanings and
interpretations. However, most views on capability agree that possessing a capability
means to have competence and ability (and also the right resources in adequate amount)
to do something. Sandkuhl and Stirna [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] define capability as the ability and capacity
that enables an enterprise to achieve a business goal in a certain con-text. In The Open
Group Architecture Framework (TOGAF) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] capability is defined as the ability that
an organization, person, or system possesses. In this paper we adopt the interpretation
of capability proposed by Azevedo [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], which defines ca-pability as the power to bring
about a desired outcome.
      </p>
      <p>
        We use the UFO semantics of modes (more specifically, of dispositions) defined in
Guizzardi [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] to represent capabilities. In UFO, a capability is a specific type of
disposition that endows their bearers with the potential of exhibiting some behavior or
bringing about a certain effect under certain conditions.
      </p>
      <p>
        When an alliance is formed, a capability agreement is established, and the
participants endow a subset of its capabilities to the alliance with the expectation of generating
common benefits. Fig. 1 shows an OntoUML [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] model representing a capability
agreement for a single dyadic alliance in which a FOCAL AGENT is endowed with capabilities
offered by a PARTNER AGENT. AGENT is a rolemixin [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], since it represents roles played
by entities of different kinds, e.g., persons and organizations. In our model, both the
FOCAL AGENT and the PARTNER AGENT represent organizations.
      </p>
      <p>
        The CAPABILITY AGREEMENT mediates the relation between the FOCAL AGENT and
his partner by being a social relator [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] composed of the PARTNER AGENT’s
commitments and the FOCAL AGENT’s claims with respect to the capabilities offered. Intentions
are mental moments [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] that inhere both in the FOCAL AGENT and in the PARTNER
AGENT and are tied to the motivation for establishing the agreement. The propositional
contents of AGENT’s intentions are his goals. By virtue of the capability agreement, the
PARTNER AGENT commits to perform actions to achieve the results determined in the
agreement. Fig. 2 represents the execution of these actions.
As a result of the capability agreement, the capabilities offered by the PARTNER AGENT
are aggregated to the set of capabilities of the FOCAL AGENT, as well as some of the
PARTNER AGENT’s non-offered capabilities, the latter being derived from opportunities
that range beyond the capability agreement immediate scope (for example, an agent
may benefit from the partner’s reputation, which is not part of the agreement).
      </p>
      <p>
        The UFO concept of disposition is also applicable for the external capabilities. When
an agent delegates to another agent the performance of certain processes that realize a
capability, he can still, in a sense, to be considered as having that capability, because
he acquires that capability grounded in a relation of delegation [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. This is related to the
idea of what an agent can “socially perform”: If A has a commitment from B to execute
S, then A (socially) can do S. An object can have dispositions which arise from its parts,
or from the network of its delegation relations [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In our example, if the FOCAL AGENT
has a commitment from the PARTNER AGENT with respect to (w.r.t.) the offered
capabilities, then the FOCAL AGENT (socially) has these capabilities.
      </p>
      <p>
        A further important aspect, related to the motivation behind the establishment of the
capability agreement, is the FOCAL AGENT’s awareness of his dependence on external
agents to satisfy the desire of achieving a certain goal G. With the (social) commitment
of the PARTNER AGENT, this desire becomes an intention to G inhering in the FOCAL
AGENT. Considering that intentions are self-commitments [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], the FOCAL AGENT
becomes more vulnerable and may be exposed to unanticipated risks. We may get until a
much higher level of vulnerability if, believing he has the social capability w.r.t. G, the
FOCAL AGENT makes a commitment to someone else (e.g. a THIRD AGENT) to employ
this social capability to achieve G. In this case his vulnerability is bigger because, if the
PARTNER AGENT doesn’t fulfill his commitment on G, not only the FOCAL AGENT’s
self-commitment to G is frustrated but also his social-commitment to G is frustrated.
Moreover, if it is true that a commitment without a corresponding capability entails
liability then, if the THIRD AGENT decides to exercise his claim towards the FOCAL
AGENT w.r.t. G, not only G but other goals of the FOCAL AGENT may be dented (e.g.,
the FOCAL AGENT might be subject to legal or social sanction from the THIRD AGENT).
      </p>
      <p>
        We analyze the relation between external capabilities and risk, based on the
Common Ontology of Value and Risk (COVER) defined in Sales et al [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. COVER
proposes an ontological analysis of notions such as Risk, Risk Event (Threat Event, Loss
Event) and Vulnerability, among others.
      </p>
      <p>When a capability agreement is not successfully executed, because the PARTNER
AGENT fails to fulfill its commitments, the RESULTING SITUATION (i.e., the one
satisfying the FOCAL AGENT’s corresponding goal) may not be obtained, and consequently,
the FOCAL AGENT may not be able to achieve his goal. In the worst case, the RESULTING
SITUATION is a threatening situation that may trigger a THREAT EVENT, which is the
one with the potential of causing a loss. The LOSS EVENT is a RISK EVENT that impacts
intentions in a negative way, as it hurts the FOCAL AGENT’s intentions of reaching a
specific goal. Fig. 3 represents the relation between external capabilities, vulnerabilities
and risk.
In this paper we presented an ontological analysis of capability agreements in the
context of interconnected organizations. We propose that capability agreements imply a
relation of duality between capabilities and vulnerabilities: at the same time that it
creates a chain of dependencies on capabilities throughout the alliances network, it forms
a chain of vulnerabilities between the participant nodes, that may enable the occurrence
of risk events. As a next direction, we plan to expand the presented analysis to broader
agreements, in which two or more participants endows a subset of its capabilities to the
alliance.</p>
    </sec>
    <sec id="sec-3">
      <title>Acknowledgement</title>
      <p>Our thanks to CAPES PhD scholarship (process 88881.173022/2018-01).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Azevedo</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          et al.:
          <article-title>Modeling Resources and Capabilities in Enterprise Architecture: A Well-Founded Ontology-Based Proposal for ArchiMate</article-title>
          ,
          <source>Information Systems</source>
          , Oxford University Press (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Barney</surname>
          </string-name>
          , J.:
          <article-title>Firm resources and sustained competitive advantage</article-title>
          .
          <source>Journal of Management</source>
          ,
          <volume>17</volume>
          :
          <fpage>99</fpage>
          -
          <lpage>120</lpage>
          (
          <year>1991</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Castelfranchi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Commitments: From Individual Intentions to Groups and Organizations</article-title>
          .
          <source>In Proceedings of the First International Conference on Multi-Agent Systems</source>
          . AAAI-Press and MIT Press,
          <fpage>41</fpage>
          -
          <lpage>48</lpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Guizzardi</surname>
          </string-name>
          , G.:
          <article-title>Ontological foundations for structural conceptual models (</article-title>
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Guizzardi</surname>
            , R.; Guizzardi,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Ontology-Based Transformation Framework from TROPOS to AORML. Social Modeling for Requirements Engineering</article-title>
          , Cooperative Information Systems Series:
          <fpage>547</fpage>
          -
          <lpage>570</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Guizzardi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wagner</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Falbo</surname>
            ,
            <given-names>R.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guizzardi</surname>
            ,
            <given-names>R.S.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Almeida</surname>
            ,
            <given-names>J.P.A.</given-names>
          </string-name>
          :
          <article-title>Towards Ontological Foundations for the Conceptual Modeling of Events, 32nd</article-title>
          <source>International Conference on Conceptual Modeling (ER)</source>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Lavie</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>The competitive advantage of interconnected firms: An extension of the resourcebased view</article-title>
          .
          <source>Academy of Management Review</source>
          ,
          <volume>31</volume>
          (
          <issue>3</issue>
          ),
          <fpage>638</fpage>
          -
          <lpage>658</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Penrose</surname>
          </string-name>
          , E.T.:
          <article-title>The Theory of the Growth of the Firm</article-title>
          . New York: Willey (
          <year>1959</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Teece</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ; Pisano,
          <string-name>
            <surname>G.</surname>
          </string-name>
          :
          <article-title>The Dynamic Capabilities of Firms: An Introduction</article-title>
          .
          <source>Industrial and Corporate Change</source>
          <volume>3</volume>
          :
          <fpage>537</fpage>
          -
          <lpage>556</lpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Sales</surname>
            ,
            <given-names>T.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baião</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guizzardi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guarino</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylopoulos</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>The common ontology of value and risk</article-title>
          .
          <source>In: 37th Int. Conf. on Conceptual Modeling (ER)</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Sandkuhl</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stirna</surname>
          </string-name>
          , J.:
          <source>Capability Management in Digital Enterprises</source>
          , Springer, Cham (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. TheOpenGroup: TOGAF “
          <article-title>EnterpriseEdition” Version9</article-title>
          .http://www.togaf.org (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>