=Paper=
{{Paper
|id=None
|storemode=property
|title=Generating Value Models using Skeletal Design Techniques
|pdfUrl=https://ceur-ws.org/Vol-599/BUISTAL2010_Paper7.pdf
|volume=Vol-599
}}
==Generating Value Models using Skeletal Design Techniques==
Generating Value Models using Skeletal Design
Techniques
Iván S. Razo-Zapata, Ania Chmielowiec, Jaap Gordijn, Maarten van Steen,
and Pieter De Leenheer
VU University Amsterdam
De Boelelaan 1081
1081 HV, Amsterdam, The Netherlands
izapata,ania,gordijn,steen,pgm.de.leenheer@few.vu.nl
Abstract. This paper presents a novel approach to automatically gen-
erate e3 value instance models, based on skeletal design techniques. The
approach has three phases. While the first two phases are related to the
generation of a value activity network based on a given value skeleton,
the third phase matches the elements of the value network with the ca-
pabilities of service providers. The main objective of our approach is
to re-use a set of value skeletons for covering an industry sector from
which more business cases may be generated. Finally, we validated our
approach in a realistic case study.
1 Introduction
Enterprises increasingly participate in networked value constellations [1]. By do-
ing so, enterprises can jointly satisfy a more complex consumer need than they
could ever do on their own. Consider for instance the music industry, our case
study domain. If a person listens to music on the radio, apart from the radio
station, Intellectual Property Rights (IPR) societies will be needed to collect
money for the artists, song writers, producers and other IPR owners. All these
actors are part of a value constellation that is needed to listen to a music track
on the radio.
In earlier work [2], we proposed the e3 value methodology to design value
constellations. In brief, e3 value is a conceptual modelling approach, which is
used to describe a network of enterprises who exchange objects of value with
each other.
The contribution of this paper is to lift e3 value to the industry level, e.g. to
describe the music industry, rather than just a single business case, as e3 value
normally is used for. To do so we present e3 value skeletons. One of the most
important differences between an e3 value skeleton and a normal e3 value business
case model is that a business case contains named, specific, enterprises who
participate in the business case at hand, whereas a skeleton contains only the
set of activities to be performed for a business case.
One of the purposes of an e3 value skeleton is to easily generate many vari-
ations of business cases, which can be presented to stakeholders for selection.
M. Petit, G. Gal, A. Castiaux, J. Ralyté, and P. Plebani (Eds.):
CAiSE 2010 Workshop BUSITAL’10, Hammamet, Tunisia, pp. 91-105, 2010.
92 I. Salvador Razo-Zapata, A. Chmieloviec and J. Gordijn
Moreover, since mass configuration of products is playing an important role
nowadays [3], our long term ultimate goal is to automatically compose networked
value constellations, including the required business processes and IT support in
the form of web services. Such IT is then aligned with the business, since both
are designed in an integrated way.
Fig. 1: Generation of value models using skeletal design techniques.
We refer to industry models as skeletons and to business case models as
instances. By using skeletal design techniques (Sect. 2.2), we derive e3 value in-
stance models from a skeleton. For the music industry (case study description in
Sect. 3), we have developed various e3 value instance models to study variations
of these models. Abstracted versions of these variations are captured in skele-
ton models (Sect. 4.2). By using user input (Sect. 4.1) and configuration data
(Sect. 4.3), we generate e3 value instance models (Sect. 5). Fig. 1 depicts this
general idea. Finally, Sect. 6 presents conclusions and future work.
2 Value models and skeletal design
2.1 Value models
An e3 value model depicts a network of enterprises creating, distributing, and
consuming objects of economic value [4]. The focus of the model is on what kind
of objects enterprises must exchange to each other in order to cover consumer
needs 1 . Fig. 2 shows (at the bottom) the modelling constructs of e3 value and
(on top) an educational example.
The most important e3 value constructs are as follows: Actors, such as a buyer
and seller, are economically independent entities (Fig. 2). Actors transfer value
objects (money, goods) by means of value transfers, which in turn connect value
ports. For value objects, some actor should be willing to pay, which is shown by
1
and not in HOW, this is the focus of a business process
Generating Value Models using Skeletal Design Techniques 93
Fig. 2: e3 value constructs for value modelling.
a value interface. A value interface models the principle of economic reciprocity:
Only if you pay, you can obtain the goods and vice versa. Besides, actors perform
value activities, which create something of economic value. Finally, an e3 value
model contains a dependency path, starting with a consumer need and ending
with a boundary element. Along the path are value transfers, value interfaces
and connection elements. The dependency path shows how many value transfers
are executed as a result of a consumer need. An elaborated formalisation of
e3 value can be found in [4].
2.2 Skeletal design
Since we want to generate value models by means of value skeletons, it is useful
to take into account configuration design theory. According to Motta, a config-
uration design problem does not exhibit complex spatial requirements and all
possible solutions adhere to a common solution template [5]. For this reason we
think the configuration of services, by using value models, adheres to a generic
template. Wielinga and Schreiber describe four main categories of configuration
design: assignment, scheduling, skeletal design and parametric design [6]. The
last two categories are related to our research.
Parametric design is described as the process of assigning values to design
parameters not only satisfying needs and constraints but also following an opti-
94 I. Salvador Razo-Zapata, A. Chmieloviec and J. Gordijn
mization criterion [5] 2 . Skeletal design refers to a model-based mapping between
components and the assembly [6]. Because our solution is not considering assign-
ing values to a fixed template but a model-based generation of new components,
our approach is more related to skeletal design.
To sum up, our approach considers that the target artifact is modeled as a
set of elements and the solution implies generating elements based on a com-
mon solution template matching the given design requirements and constraints
(Sect. 5).
3 Case study: Clearing Intellectual Property Rights
In the music industry, Intellectual Property Rights (IPR) are an important con-
cept. Neighboring rights are a kind of IPR, which have to be paid by users if
they earn money by playing music, or in other words, if they make music pub-
lic. Clearing such neighboring rights involves two steps: collecting fees from IPR
users, i.e. radio stations, bars, discotheques and others, and distributing these
fees to Right Owners, i.e. artists, song writers, producers. This process is usually
performed by IPR societies and is called clearing tracks. One of the IPR societies
designed to perform this activity in The Netherlands is SENA 3 , our case study
partner which is also one of our stakeholders.
Some results for modeling this case study have been already provided [2],
however these results only address one of the multiple scenarios that can emerge
in the music industry, such as new actors performing less or more activities
because of market liberalization and new trends in the way of delivering music [7,
8]. One such a trend is that SENA, instead of clearing tracks based on play lists
of the top 30 radio statios (estimation), clears tracks based on the actual usage
(pay-per-play).
The e3 value model depicted in Fig. 3 presents a pay-per-play solution for
background music. In this e3 value model, IPR users are the starting point, as
they require to broadcast background music which is provided by background
music providers (BMP). A BMP can provide background music in different ways,
one of those is streaming (Value Transfer A). When providing streams, the BMP
must pay to IPR Societies which collect fees related with making a stream avail-
able to the public (Value Transfer D-E). Here, the public refers to IPR users.
IPR users have to also pay IPR Societies, as they make public the music also
to their customers. Although the BMP and IPR users pay to two IPR Societies,
it does not mean they pay twice for the same thing. Paying BUMA/Stemra 4
is because of the right that the composers, publishers and lyricists hold (Value
Transfer C), whereas paying SENA is related to the rights of the performing
2
Motta also mentions preferences, however at this stage they are not essential to find
an optimal solution.
3
(Dutch: Stichting ter Exploitatie van Naburige Rechten, English: Foundation for
Exploitation of Neighboring Rights)
4
BUMA is other IPR society, also working in The Netherlands
Generating Value Models using Skeletal Design Techniques 95
Fig. 3: e3 value model for the stream-based solution.
artists and producers (Value Transfer B). Indeed, Value Transfers A-E are con-
straints imposed by law, since IPR societies are the responsable entitites for
collecting fees on behalf of IPR owners.
Once IPR societies got IPR-user fees, they retain a small percentage of these
fees and the next step is to repartition the rest of the fees among Right Owners
(Value Transfer K-L). This set of Right Owners is mainly composed by Artists,
Producers, Music Publishers, Composers and Lyricists. Whereas SENA only
repartitions fees to Artists and Producers (Value Transfer F-G), BUMA/Stemra
does the same for Publishers, Composers and Lyricists (Value Transfer H-J).
Explosion Elements Due to the fact that tracks are usually performed by more
than one artist, SENA must transfer the collected fees to each artist involved,
consequently the value transfer F will occur more than one time per consumer
need. In order to allow that SENA contacts more artists, an explosion element
(EE #1) is added. Since the same holds for all the right owners, there are more
explosion elements for each of them (EE #2 - EE #5). An explosion element
models that the connected value transfers happen multiple times, rather than
just once per dependency path execution.
In this scenario there are only two enterprises clearing tracks (SENA and
BUMA). As we described before, market liberalization will require a more flex-
ible scheme to assign value activities to different enterprises, e.g. the activi-
96 I. Salvador Razo-Zapata, A. Chmieloviec and J. Gordijn
ties “Collect Fees” and “Repartition Fees” can be performed by different actors
rather than one actor. In order to address this problem we have generated and
analyzed variations in which several enterprises can cover different value activ-
ities. We have used these variations to build a few e3 value skeletons, however
because of space restrictions just one of these skeletons is described in the next
section.
4 Input elements for the configuration process
4.1 Consumer needs
For the configuration process, we assume that our consumer need is playing
background music and that we can cover such a need by providing a stream. In
addition, since the pay-per-play scenario must be analyzed, we also assume that
our stream contains only one music track. So, the need boils down to a streamed
track.
4.2 Value skeletons
The purpose of a skeleton is to abstract the set of relationships that are in-
volved in an e3 value model. Later on, the instances of a skeleton will reflect a
specific business case. In our approach, an e3 value skeleton implies three im-
portant features, which are described and explained by presenting our e3 value
skeleton(Fig. 5).
No actors, No market segments e3 value skeletons focus on the definition
of value activities and not on actors or market segments. In fact, assigning per-
forming actors to value activities is an important part of configuring an e3 value
instance model (see Sect. 5.4).
No Selection The main idea behind skeletons is that there should be an au-
tomatic process to instantiate specific business models by filling the elements in
such skeleton. Therefore, this process must skip selection procedures like choos-
ing among different dependency paths or different actors, as is normally the case
in e3 value models. In e3 value words it means that we do not use OR-forks in
dependency paths nor market segments.
On the use of Explosion Elements Consider the value transfers F-J in Fig. 3,
these value transfers involve the repartition of fees among right owners and look
very similar. By using explosion elements, we can abstract these transfers as
shown in Fig. 4.a. While generating an instance model, this abstraction can
be expanded to cover as many value activities as needed. In this example, we
assume that fees must be repartitioned among three right owners, hence three
Generating Value Models using Skeletal Design Techniques 97
Fig. 4: Using an explosion element.
AND-extension ports are needed, which later allow connection with three other
value activities (Fig. 4.b).
In the same way, our e3 value skeleton (Fig. 5) depicts abstracted versions
of the value transfers B-E, K and L (Fig. 3), which are later instantiated into
new transfers. How the instantiation process of the skeleton works is explained
in Sect. 5.2. Finally, to facilitate reading, our skeleton also depicts short names
for some value objects. In this way, RIGHT MP refer to the Right for Making
Public a track, RIGHT CL is the Right to CoLlect fees, and RIGHT CT is the
Right to Clear a Track. The same holds for MONEY MP, MONEY CL and
MONEY CL.
Fig. 5: e3 value skeleton.
98 I. Salvador Razo-Zapata, A. Chmieloviec and J. Gordijn
4.3 Configuration data
The information about the environment in which the configuration process takes
place is the last element to be specified before starting the configuration process.
This environment, called configuration data, is composed of eight elements. The
main relationships among these elements are depicted in Fig. 6.
Fig. 6: Configuration data - class diagram.
Supply Chains The clearing process deals with five types of suppliers:
artists, producers, composers, lyricists and publishers. Most of the time sup-
pliers bring about different dependency paths in which different value activities
and value objects are involved. We refer to these paths as supply chains. As can
be observed in Fig. 6, a supply chain consists of several activities, e.g. in our
case study, activities like Streaming, Collecting Fees, Repartitioning Fees and
Creating are needed to provide a track, i.e. supply a service. Actually, these are
the same activities that appear in the skeleton.
Elementary Actors The elementary actors represent the set of service
providers willing to participate in a business case. In this sense, an elementary
actor has value interfaces to interact with other elementary actors.
Value Activities In the same way, value activities represent the set of activ-
ities that must be performed to cover a consumer need. Therefore value activities
has value interfaces for transfering value objects. As defined in Fig. 6 a value
activity has a special relationship in which supply chains and elementary actors
are involved. In fact, this relationship yields an aggregation class, the same is
explained as follows.
Performed-in By using this class we want to express that elementary ac-
tors can only perform value activities related to specific supply chains. As an
Generating Value Models using Skeletal Design Techniques 99
example, SENA only take care of activities like Collecting and Repartitioning
when they deal with artists and producers. BUMA does the same for the rest or
right owners.
Value Interfaces A value interface is assigned-to either an elementary
actor or a value activity but not both at the same time, which is depicted by using
the XOR constraint. A value interface consists-of one or two value offerings,
what the actor wants and expects.
Value Offerings A value offering represents what an actor offers through
value interfaces. Therefore a value offering is in a value interface and consists-of
values ports.
Value Ports By using value ports an actor either offers or requests value
objects. In addition a value port is only in one value offering.
Value Objects Value objects represent the services or products that actors
exchange to each other. For instance, according to our case study (Fig. 3), actors
exchange value objects like RIGHT MP, RIGHT CL and RIGHT CT.
5 Configuration process
This process involves three phases. While the first two phases are related to the
generation of a value activity network based on a given value skeleton, the third
phase matches the elements of the value network with a set of service providers.
5.1 Selecting an e3 value skeleton
The first step to build an e3 value instance model is related to selecting an e3 value
skeleton from which the generation process can start. In this way, the e3 value
skeletons must be chosen according to a consumer need, playing background
music (see Sect. 4.1). At this point we manually select an e3 value skeleton. For
a guideline how to perform a semi-automatic process see [9].
5.2 Generating an e3 value activity instance network
Once a consumer need is defined and an e3 value skeleton is chosen (in this case
Fig. 5) , the generation process traverses this skeleton and produces an e3 value
activity instance network. Algorithm 1 performs this process generating this
e3 value activity instance network while traversing the skeleton based on a depth-
first traversal method, where the consumer need and the boundary element are
respectively the root and the leaf of the tree.
Algorithm 1 considers each element in the skeleton. If the considered element
is not an explosion element, the element is simply copied into the value activity
instance network. If however the element is an explosion element, Algorithm 2
is executed, which evaluates the explosion elements and determines the number
of new AND-extension ports to be generated.
100 I. Salvador Razo-Zapata, A. Chmieloviec and J. Gordijn
Algorithm 1 Generating an e3 value activity instance network.
Explosion Parameters Each explosion element has a set of parameters. These
parameters are e3 explosion, ce related actor and ce refers to vo. How these pa-
rameters work is explained in the Algorithm 2, and their effect is illustrated in
Fig. 7.
The parameter called e3 explosion controls whether the explosion element
will be evaluated. As can be observed in Fig. 7, there exist two ways to evaluate
the explosion element:
1. the explosion element will result in a number of parallel supply chains (See
Fig. 7a/b, i.e. ce related actor == F ALSE),
2. the explosion element will result in a number of actors (Fig. 7c/d, i.e.
ce related actor == T RU E).
5.3 Running example
We illustrate the case when a track, DE WAARHEID, is cleared on behalf of
three artists and two producers, i.e. two supply chains: one for artists and the
other one for producers. For readability we omit the composers, lyricists and pub-
lishers. Therefore, Algorithm 1 travers the skeleton (Fig. 5). Once Algorithm 1
finds an explosion element, Algorithm 2 is applied to determine the number of
new AND-extension ports to be generated.
For instance, assume that our algorithm walks down following the value
transfer related to STREAM/MONEY and finds the explosion element #2 (See
Generating Value Models using Skeletal Design Techniques 101
Algorithm 2 Determine the number of new AND-extension ports
if e3 explosion == T RU E then
if ce related actor == F ALSE then
value object = ce ref ers to vo
N ew AN D E ports = Number of supply chains in which value object is in-
volved
else
value object = current track
GET current supply chain
GET next value activity according to the skeleton
EA = set of actors performing next value activity in supply chain and offering
value object
N ew AN D E ports = Number of actors in EA.
end if
else
N ew AN D E ports = 1
end if
Fig. 7: Explosion parameters. a) Two activities and one explosion element. b) Instan-
tiation of new elements based on supply chains. (Generation of supply chains) c) Two
activities and one explosion element. d) Instantiation of new elements based on the
number of elementary actors offering a specific value object (Splitting a supply chain).
Fig. 5). The evaluation of this explosion element takes place i.e. Fig. 7 .a and 7.b.
This means that we have to count the number of supply chains, and we have
to generate the appropriate number of AND-extension ports for that. Since our
supply chains are artists and producers, and the RIGHT MP is involved in the
artists and producers supply chains, two new AND-extension ports must be
generated, as can be seen in Fig. 8, element #2.
We continue to traverse the skeleton (for the artists supply chain) and find
explosion element #3. This time, the evaluation is performed as in Fig. 7.c
and 7.d. The number of new AND-extension ports depends on the number of
elementary actors performing the Creating value activity in the artists supply
chain and for the specific track, i.e. three artists. The process of copying elements
from the skeleton continues till reaching a boundary element. Fig. 8 depicts
102 I. Salvador Razo-Zapata, A. Chmieloviec and J. Gordijn
the final e3 value activity network, the numbering indicates the order in which
element are instantiated.
Fig. 8: e3 value activity network.
5.4 Assigning value activities to actors
After generating the e3 value activity network the next phase assigns activities to
service providers. In a naive-sequential way, Algorithm 3 describes this process.
Algorithm 3 Assign activities to actors
for each value activity to be assigned do
assigned = FALSE /* Boolean Flag */
for each elementary actor && assigned == FALSE do
if the elementary actor can perform this value activity in the specific supply
chain and provide the needed value object then
assign activity to elementary actor
assigned = TRUE
end if
end for
end for
Generating Value Models using Skeletal Design Techniques 103
As can be observed in Algorithm 3, there is a search to determine whether
an elementary actor can perform a value activity in a specific supply chain (by
evaluating the performed-in association in Fig. 6). For instance, when assigning
the value activity Collecting Fees (Fig. 8, number 8), the algorithm will search
for an elementary actor that can perform this activity in the supply chain related
to producers. As we already know, SENA is able to perform such as activity in
that specific supply chain, therefore the algorithm assigns this activity to SENA,
as shown in Fig. 9.
5.5 Running example
The model in Fig. 9 represents the way in which a set of enterprises work together
to cover a consumer need which is composed of two things: DE WAARHEID and
the needed rights to make this track public.
Fig. 9: Instance value model based on skeleton in Fig. 5.
104 I. Salvador Razo-Zapata, A. Chmieloviec and J. Gordijn
As can be observed, the set of needed rights contains the rights from artists
and producers. Consequently, the consumer must contact to enterprise(s) taking
care of those rights, i.e. SENA. In the same way, since the stream provider is
making public DE WAARHEID, it also needs to get the same rights. In order
to get the rights from the set of right owners, SENA should also perform an
activity related to repartitioning fees.
Furthermore, the activities related to repartitioning the fees contact the right
owners associated to DE WAARHEID. The supply chain related to artists ends
with three artists, whereas the supply chain of producers involves two right
owners.
Finally, by applying the previous configuration approach, Sections 4 and 5,
we have generated different e3 value instance models for other tracks. In this
way, we test that by just changing our configuration data i.e. actors, their value
objects and the activities they perform, we can generate instance models re-using
the same skeleton and applying our configuration process. Nevertheless, due to
lack of space these instance models are not presented 5 .
6 Conclusions and future work
This paper has presented an approach to automatically generate e3 value models,
based on skeletal design techniques. One of the objectives of our approach is to
re-use a set of value skeletons for covering an industry sector from which more
business cases may be generated. Consequently, in order to explain the intended
use of this approach we have also presented a case study.
By following the idea of skeletal design we have exemplified how re-use of
knowledge can help to solve the problem of massive service configuration. Our
e3 value skeletons are useful to span (part of) an industry sector, helping to either
automate current tasks or forecast/explore new scenarios.
Future work
Our next steps will address the problems related to elicitation of consumer needs,
selection of skeletons and assignment of value activities to service providers, i.e.
to add more flexibility to Algorithm 3. Consequently, while the work of Sybren
de Kinderen [9] represents a good base-line to deal with the first issue, more
research must be done to evaluate whether hierarchical configuration or skeletal
planning could be implemented to cover our second issue.
Finally, even though our approach solve our configuration problem, we are
aware of the limitations of this tool, mainly because some reasoning steps seems
to be case specific. Therefore, more validation must be done and another case
study will be explored, related to the energy industry where more dynamic be-
havior can be found.
Acknowledgements. This paper has been partially funded by the NWO/-
Jacquard project VALUE-IT no 630.001.205
5
The reader can consult some instances at: http://www.few.vu.nl/∼izapata/Generating-
VM-SDT.php
Generating Value Models using Skeletal Design Techniques 105
References
1. J. Gordijn, S. de Kinderen, V. Pijpers, and H. Akkermans, “e-services in a net-
worked world: From semantics to pragmatics,” Lecture Notes in Computer Science,
vol. 5468/2009, pp. 44–57, 2009.
2. J. Gordijn, E. Yu, and B. var der Raadt, “e-service design using i * and e3value
modeling,” IEEE Software, vol. 0740-7459/06, pp. 26–33, 2006.
3. D. Yang, M. Dong, and R. Miao, “Development of a product configuration system
with an ontology-based approach,” Computer-Aided Design, vol. 40, pp. 863–878,
2008.
4. J. Gordijn and J. Akkermans, “e3-value: Design and evaluation of e-business mod-
els,” IEEE Intelligent Systems, p. 1117, 2001.
5. E. Motta, Reusable Components for Knowledge Modelling: Case Studies in Para-
metric Design Problem Solving. IOS Press, 1999.
6. B. Wielinga and G. Schreiber, “Configuration design problem solving,” IEEE Ex-
pert. Special issue on AI in Design., vol. 12, pp. 49–56, 1997.
7. G. Premkumar, “Alternate distribution strategies for digital music,” Communica-
tions of the ACM, vol. 46, pp. 89–95, 2003.
8. P. Swatman, C. Krueger, and K. van der Beek, “The changing digital content land-
scape: An evaluation of e-business model development in european online news and
music,” Internet Research, vol. 16, pp. 53–80, 2006.
9. S. de Kinderen, J. Gordijn, and H. Akkermans, “Eliciting multi-supplier customer
needs-driven it-services bundles using compensatory and non-compensatory decision
models,” 1th International Conference on Enterprise Information Systems, pp. 131–
136, 2009.