=Paper=
{{Paper
|id=Vol-3397/maw2
|storemode=property
|title=Enterprise Architecture at Frankfurt University of Applied Sciences
|pdfUrl=https://ceur-ws.org/Vol-3397/maw2.pdf
|volume=Vol-3397
|authors=Carla Hofmann,Sarah Ragowski,Lorenzo Petricone,Wolfgang Kubisch,Jürgen Jung
|dblpUrl=https://dblp.org/rec/conf/emisa/HofmannRPKJ23
}}
==Enterprise Architecture at Frankfurt University of Applied Sciences==
Models at Work - Enterprise Architecture at Frankfurt University of Applied Sciences Carla Hofmann1 , Sarah Ragowski1 , Lorenzo Petricone1 , Wolfgang Kubisch1 and Jürgen Jung1 1 Frankfurt University of Applied Sciences, Nibelungenplatz 1, 60318 Frankfurt am Main Abstract Similar to many other companies, the IT department at Frankfurt University of Applied Sciences is responsible for providing and supporting a set of applications that are used by different organisational units. There are still some insecurities, for example undefined responsibilities, or no clear understanding about the business fit of the whole application landscape. The current architecture is a result of uncon- trolled growth, which also leads to missing documentation, as well as a missing Enterprise Architecture model. The following case study has the objective to analyse and document the Enterprise Architecture of the university. The purpose of this model is to make the university’s landscape more transparent, enabling conscious and fact-based decisions for future software applications against the as-is landscape and relevant needs of the organisation. To achieve this, a Business Capability Map, a Business Object Model, an Application landscape and a Business Support Matrix were created as artefacts. Keywords enterprise architecture, university, BCM, BOM, Application Landscape, BSM 1. Purpose and Requirements The models were created during a class on Enterprise Architecture Management (EAM) at the Frankfurt University of Applied Sciences (UAS). Students learned methods and tools for managing Enterprise Architecture (EA) and had to apply them in a case study assignment. The case study was conducted together with the IT department of the Frankfurt UAS, known as Campus IT, as the IT team aims at applying a structured approach for business-driven IT in the future. Consequently, the head of the IT department participated at the lectures and was providing input for the case study. The current situation of the Frankfurt UAS looks quite similar to the one in other companies. The IT department is responsible for providing and supporting a set of applications that are used by different organisational units (e.g. central administration and faculties). However, there are still undefined responsibilities and there is no clear understanding about the business fit of the whole application landscape. In many cases, the responsibility is seen with Campus IT, as they provide the applications. But the question arises whether the responsibilities should not rather lie with the organisational unit or even with the professors who use the applications in 13th International Workshop on Enterprise Modeling and Information Systems Architectures (EMISA) 2023 Envelope-Open carla.hofmann@stud.fra-uas.de (C. Hofmann); sarah.ragowski@stud.fra-uas.de (S. Ragowski); petricone@stud.fra-uas.de (L. Petricone); wolfgang.kubisch@cit.fra-uas.de (W. Kubisch); jung.juergen@fb2.fra-uas.de (J. Jung) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org) order to ensure clear responsibilities. Furthermore, there is no clear governance for introducing new software systems so that the current architecture is a result of uncontrolled growth. Of course, there are various reasons for explaining the current situation, such as legal constraints or lack of alternatives in the past. Due to the dynamic evolution not everything was documented properly and an EA model is missing. For that reason, we had the task to analyse and document the EA of the university. The main purpose of the model was to make the university’s landscape more transparent, enabling conscious and fact-based decisions for future software applications against the as-is landscape and relevant needs of the organisation. It starts with the question of which capabilities the university actually has. The next question which was addressed is the distribution of the responsibilities among the organisation. At this point, it is important to find out which applications are supporting respective business capabilities. This opens the doors for needed analysis of the application landscape, like investigating for monolithic systems or redundancies. In addition, it was also a requirement to find the flow between the applications. The following artefacts were expected as part of the case study: • Business Capability Map (BCM) as a standard framework for documenting functions at a university and required applications’ functionality • Business Object Model (BOM) for classifying data processed in applications • Application landscape to gain an overview of the applications at the university and their interactions • Business Support Matrix (BSM) for documenting applications’ support of business capa- bilities During the creation of the model, the analysis was expected to result in an improvement plan. The improvement plan then could be analysed by the Campus IT, the unit responsible for the digital infrastructure, to determine the feasibility of certain points. For this work, the primary audience was the Campus IT and the university management. Beside the Campus IT, other organisational units, like the digitization department, of the university have an interest in the final results. 2. Context and Challenge The resulting models were created in the context of an EAM class at the Frankfurt UAS. Students worked as a team of enterprise architects, aiming to create an architecture model of the university. Work started with a case study description referring to the current situation at the university. The technical context was the case study assignment given by the IT department of the Frankfurt UAS to provide transparency on the IT department’s application landscape. The main contact (e.g. the customer) was the head of the Campus IT. A couple of challenging tasks and uncertainties needed to be handled as the team acted like enterprise architects but were still in their role as students. One main challenge was to get all information needed to receive a detailed view of the application landscape. The lack of information was basically caused by our role as external enterprise architects with no insight into internal processes and without access to relevant sources. Necessary information had to be obtained through employees of the university, which required additional time. The insufficiency of information was also caused by missing documen- tation in general. In this case, it was not possible to get the required insight from the existing documentation. Therefore, the only way to obtain the knowledge was through interviews with employees who know more details about respective applications. Furthermore, in the application landscape, the business responsibilities and owners are often unknown or not properly defined, leading to scattered gaps and ambiguities in the models. Based on the social context of an EAM course at the university, the model was created in a given period of time (3 months). This limited available time has also made it more complex to fulfil the task. 3. Activities and Effort To create the resulting model, it was first necessary to develop a theoretical understanding of the fundamentals of EAM. For this purpose, research and review of existing EA documents for higher education were conducted. Furthermore, interviews were performed with the professor, the client, and employees to obtain information on specific topics which could not be detected by research. Discussions and brainstorming were also used to develop a common understanding regarding the model. Different tools were used for creating the models, such as Mindomo (an online mind mapping tool), which allows the joint creation of mind maps and is thus a helpful tool for the brainstorming process. Furthermore, draw.io was used to visualise the different models. The visualization of the models focused on their contents, which is why they were kept as simple as possible. Excel was also one of the tools used, especially for the creation of the BSM. Work started with a Business Motivation model in order to shape a common understanding of the university and its objectives. It was created using Mindomo so that the team could collect their ideas remotely. Various sources, including the university’s target definition and strategy, have been consulted. As a next step, a BCM and a BOM were created by the team. First versions have been done with Mindomo, but the team later on switched to other tools. The BCM was influenced by existing maps and by knowledge about activities at the university. We incorporated the students’ perspective (e.g. teaching, examination management) but also general-purpose capabilities (e.g. human resources, facility management). Besides the knowledge about this particular university, other capability maps in the university context have been used as a reference, like the map of UCISA UK HE model [1]. After having a stable version, the capabilities have been transferred to an Excel template. This can be handed over to the customer and used as a common repository. Furthermore, information on software applications including description and responsibilities (e.g. contact information) have been added to the Excel template. After completing data gathering, a BSM (showing applications supporting respective busi- ness capabilities) has been created by inserting a pivot table. It was used for visualising and analysing application support at the Frankfurt UAS. Since Excel has only limited capabilities for graphical formatting, a business capability tree has been created with draw.io. This resulted in redundancies, but was necessary for an adequate presentation in PowerPoint. Each model’s validity was evaluated and validated by the professor and the client through student submissions and presentations. These submissions happened multiple times during the semester, in order to present the progress and get feedback. In addition, the final results were presented to the chief administrative officer of the university, one of the key stakeholders. For this purpose, after setting a date, a presentation was created which was adapted according to the target group, the stakeholder, in order to present the developed contents to him. Through his feedback, the results could be validated one more time and the relevance of the topic became clear once again. 4. Resulting Model In this chapter, the resulting model will be presented. The models are the BCM, the BOM, the application landscape and at least the BSM. However, they will not be shown in their entirety, but excerpts will be. The models originated from a project at the Frankfurt UAS and their original language is German. For this work, parts were translated into English. Throughout the images, the colours were used to indicate to which category some elements belong. Blue is for guiding, green for core and yellow is for enabling. Guiding means that the capabilities define somehow how the business has to develop. It contains the leading functions of the university. The capabilities generating added value are categorised as core, whereas non-added value creating categories are called enabling. Enabling is also known as supporting, meaning that they are needed for the business, but are not central. These concepts, how they were used in this work, were inspired by Roger Burlton [2]. 4.1. Business Capability Map The BCM documents the business functions of the university (e.g. what is done at the university). It is organisation agnostic, this means that no individual departments or organisational units are reflected. However, there might be cases where the capabilities overlap with departments. The capabilities were categorised as guiding, core or enabling. The excerpt seen in Figure 1 from our findings shows the core capabilities (level 1) like research and the underlying capabilities (level 2) like publish. As research is a vital part of a university’s portfolio, it was assigned to the core capabilities. The same holds true for teaching. Also, student administration and student counselling have an important role and are directly adding value. A maybe controversial decision we made is to put IT Management into core. The operation, maintenance, and other administrative tasks of applications are a direct-added value for all employees, students and other parties alike. This shows how essential these capabilities are for a modern university, making it a perfect candidate for core. In the following few lines, some level 2 capabilities whose meanings are ambiguous are described in more detail. First one being research program development. Before the research can be conducted, the feasibility and the way the research will be conducted, the framework and the details are determined which happens during the development of the research program. Second, the research administration manages all research that is planned or done at the university. Third, in student administration, application management refers to the management of potential students who have applied to study. In the next steps, new or already existing students are Figure 1: Capability Map – Core Capabilities divided into their respective courses and exercises. Finally, grades are assigned to individual students at the end of the semester, which is done with performance management. At the end of a student’s studies, the degree is distributed, depicted above by degree distribution. Here we also want to emphasise that there is not only one possibility to categorise these items. Above it was mentioned that IT Management fits well into the core capabilities. The reason for that was the direct-added value to the university. There might be other capabilities that some would put into other categories. One could possibly see course administration as core capability. However, these capabilities are setting the direction or the strategy of the course. This was for us a clear indicator for a guiding capability. To break it down, we basically asked ourselves three questions for categorising the capabilities into the three categories. Guiding: Does it define how the business develops?, Core: Does it add direct-added value?, Enabling: Is it needed, but is not central? 4.2. Business Object Model This type of model depicts the so-called business objects of the Frankfurt UAS. Furthermore, the relationships between the single objects are drawn to make clear how they interact among each other. In the example shown in Figure 2, one can see a small section of the BOM. Here, some core business objects of the Frankfurt UAS are shown. To make this graph easier to understand, especially in later analysis, the objects were coloured in the colours of the three capability categories in which they occur most frequently. This may not be confused with the capabilities themselves, but should show that these business objects correlate with the business capabilities. For example, the business object teacher is connected to the capability event execution, which is a core business capability. Like a teacher, a student is also an entity interacting with other business objects. This can be the application for a study course or the usage of the consultation offer. Each business object can be specified by attributes, for example, the business object student can be described by the attributes name, date of birth and matriculation number. Figure 2: Business Object Model – Excerpt 4.3. Application Landscape The next step was to list the applications at the university and depicted them in a chart. In addition to that, data flows were drawn with the business objects as data. This makes sure to gain an overview of the applications and their interactions. For brevity reasons, this shwos also only an extract of the complete model. The first diagram, as seen in Figure 3, shows the data flow from the e-learning platforms, campUAS and Moodle, to embedded applications. campUAS is a second Moodle instance, hosted by a different provider and will replace the old Moodle instance. Panopto is a video streaming system and Speexx Campus is an interactive platform for learning languages. The data is exchanged, in order for the users to watch and upload videos or save progress in their language learning activities. The second graph, as seen in 4, is a depiction of how data is passed between various library systems. The library management system is used to manage the locally available books and media. DBIS and hebis-Portal are online databases for books, which can be accessed by students. In order to access the databases, the Library Management Tool therefore exchanges data with DBIS and hebis-Portal. Furthermore, the Library Management Tool can show a list of the other two systems’ inventory. Figure 3: Data Flow E-Learning Platforms Figure 4: Data Flow Library Systems 4.4. Business Support Matrix At this point, it is important to bring the gathered information together in order to get a better picture of the university. This is done by creating a BSM, where the capabilities and the applications are joined. With this tool, it is possible to recognise redundancies and monolithic systems in the structure. The following excerpt from the BSM in Table 1 summarises the applications used in the core capabilities, indicated by an x. The analysis, for example, shows that there are redundancies in the course division. This capability describes the administration of the students on who will be assigned to which course or practice lessons. As Moodle and campUAS are both used as e-learning platforms, one could be removed from the stack. From previous knowledge gathering, it is known that Moodle is replaced by campUAS, meaning this redundancy can be ignored at that place. However, what could be improved is the usage of HISQIS, a university information system used university-wide for all students and all examination offices, as it is a monolith. For example, whether HISQIS should necessarily be used for students’ applications has to be evaluated in the next steps. Table 1 Business Support Matrix - Core Capabilities Excerpt Application Business Business campUAS Confluence GitLab HISQIS Moodle Zoom Capability (Level 1) Capability (Level 2) IT Security IT Management Management Operation and x Maintenance Tool Supply x Research Publish Research Administration Research Conduct x Research Program Development Student Application x Administration Management Course Division x x x Matriculation / x Exmatriculation Performance x x Management Student Career Counseling x Counseling Counseling for Stays Abroad x x and for Students Abroad Course x Counseling Psychosocial Counseling Writing x x Counseling Degree Teaching x Distribution Event Execution x x x x Event Planning Exam Execution x x Exam Planning x 5. Return on Modelling Effort Even though the students worked on the project as part of the examination of an EAM class, the case study addressed the EA of the university and the head of Campus IT was involved as a customer. In this role, the task was to provide information on the current situation, to clarify open questions and to explain connections and decisions from the past. It should be emphasised that due to decentralised structures, many decisions in the past were not made from an economic point of view and are, therefore, difficult for outsiders to understand. The aim was to bring these points into a comparable form of presentation and to document them. The task of the consultants (i.e. students) was to create a basis using existing material, to complete the documents through cyclically recurring coordination rounds with the head of the IT department and to bring them into comparable and easily understandable form of presentation. The level of detail can be increased almost indefinitely by the frequency of the recurring votes. The benefits are difficult to express in measurable terms, but gaps or unexplainable duplica- tions were already revealed in the first appointments. The neutral view from the outside has awakened the internal focus. In the course of the project, a clear presentation of requirements and solutions in the form of applications gradually emerged. Missing relationships or duplicates can be presented in a simple form so that third parties can identify gaps or discrepancies without much explanation. With a completion and final sharpening, these documents can be the basis for financial decisions at management level as well as the strategic orientation of the IT department. As the last act, there was a joint meeting between the advisory group, the previous customer representative and the chancellor of the university, whose field of activity includes IT. During this meeting, the basic idea as well as specific areas of investigation and recommendations for action were presented. In just 30 minutes, the chancellor could be shown that this is an easy-to- use tool with great power in terms of controlling the IT application landscape. Ultimately, this meeting can be the decisive point for the establishment of IT architects at the university. 6. Reflection The task of creating an EA model of the university gave us insights on why to make the effort to create such documentation. It made it clearer why it is so important that the business side and the IT side work together, as otherwise the two might diverge. That divergence could cause problems in the future and make it costly to align both sides again. Listening to other fellow students in the course faced with similar issues, one could see that there is more than one possible approach to solve them. The understanding that there is not only one right solution is important. This is also what the professor and the client indicated at the beginning of the course. Although both had a vague vision of what the result might look like, they were open-minded to unexpected solutions too. However, this uncertainty of what the model should look like was a challenge that we were confronted with and had to learn that there is not only one solution. One of the biggest challenges was the search for the responsibilities for applications, business objects and capabilities. Once the responsibility was found, questions about the used systems could be asked. This also touches another obstacle we faced, which was finding systems and applications used at the university. We had to find out all this information by asking our professor and the customer (e.g. head of the Campus IT) or by researching on the internet. Not all details or information could be found on the website, so we were also given some documentation, which could not be accessed by students. This highlights an aspect which has to be fulfilled in order to create a more valuable model, which is the unrestricted access to resources and documentation about the used systems. Without it, important information might be missing in the final model, which could lead to wrong assumptions in the later analysis. At last, we saw that all these challenges do not exist only at our university, but are universal to most institutions and companies. We came to this conclusion, not only from the experience our professor shared with us, but also by abstracting single concepts and recognising them in the context of businesses in general. Finally, we hope to spark a discussion on how to analyse other institutions of higher education. Maybe, our work could even act as a template, especially for the capability map, as other universities’ maps seemed to be too individual to have common ground. We also found too little literature on the creation of capability map in the context of universities, making this work a well suited starting point. Furthermore, we showed a detailed and creative approach and how to decide on some specific capabilities’ categories. One could even spot parallels to companies’ maps. 7. Evidence While creating the resulting models, information of different sources was used. The main sources were existing documentation from the Frankfurt UAS, for instance the official university website and internal documentation intended for all members of the university. For example, the application landscape with the applications at the university and the data flows between them were mostly filled through the information from these two sources. As already mentioned, we did not have access to all internal documents or in some cases the documentation was missing in general. In these cases, the information source was through interviews with employees who know more details about it. Therefore, during the creation of the models, we had interviews with the head of the IT department, the lecturer of the class and the secretary of the computer science teaching unit. In order to validate the results, there were a number of meetings regarding the progress of the created models with the lecturer and the head of the IT department during the creation period. In these meetings, the current status of the models was presented, feedback was given, and changes and further ideas were discussed. At the end of the course and when all models were completed, the models were presented to the chief administrative officer of Frankfurt UAS as one of the key stakeholders of the results. The chief administrative officer agreed with the results and thus also validated their accuracy. He also mentioned the relevance of the resulting models for the university, and moreover he thought of how and where to use them to improve the application landscape of the university. References [1] UCISA, Uk he capability model - for the he sector, 2022. URL: https://www.ucisa.ac.uk/ Groups/Enterprise-Architecture-Group/UK-HE-Capability-Model. [2] R. Burlton, Developing your capability architecture: It’s all about being able to get things done, 2017. URL: http://www.brcommunity.com/a2017/b927.html. A. Business Object Model with the business objects of the Frankfurt UAS as well as whose relationships. B. Business Capability Map with the business functions of the Frankfurt UAS. C. Application Landscape with the used applications at Frankfurt UAS and the data flow between them. C.1. Data flow between different applications for administration. C.2. Data flow between different applications for authentication and contact exchange, as well as for source management. C.3. Data flow between different applications for digital teaching and for the library. C.4. Data flow between different applications for invoice and evaluation, and the applications with no data flow. D. Business Support Matrix, where the capabilities and the applications are joined, to recognise redundancies and monolithic systems.