[go: up one dir, main page]

Academia.eduAcademia.edu
A Framework for the Design of Service Systems Yao-Hua Tan Department of Technology, Policy and Management Delft University of Technology, Delft, The Netherlands Wout Hofman TNO Information and Communication Technology, Delft, The Netherlands Jaap Gordijn Department of Computer Sciences, Vrije University Amsterdam, Amsterdam, The Netherlands Joris Hulstijn Thaurus and Delft University of Technology, The Hague and Delft, The Netherlands Abstract We propose a framework for the design and implementation of service systems, especially to design controls for long-term sustainable value co-creation. The framework is based on the software support tool e3-control. To illustrate the framework we use a large-scale case study, the Beer Living Lab, for simplification of customs procedures in international trade. The BeerLL shows how value co-creation can be achieved by reduction of administrative burden in international beer export due to electronic customs. Participants in the BeerLL are Heineken, IBM and Dutch Tax & Customs. Keywords Service science, service systems, value co-creation, service innovation lifecycle, e3-control, e3-value H. Demirkan et al. (eds.), Service Systems Implementation, Service Science: Research and Innovations in the Service Economy, DOI 10.1007/978-1-4419-7904-9_4, © Springer Science+Business Media, LLC 2011 51 52 Y.-H. Tan et al. 1 Introduction Over the past decades, services have become the most important part of economies (Heineke and Davis 2007). Basically, the service economy refers to the service sector. It leads to more sophisticated forms of cooperation, or what is called value co-creation (Spohrer and Kwam 2009). As Spohrer also points out, service systems are dynamic configurations of resources that interact via value-proposition-based interactions with governance mechanisms. Basic questions in this respect relate to Service Science, Management, Engineering and Design (SSMED). We focus, in particular, on the value co-creation in the setting of services that are offered by a service system; i.e. where a composed service is offered by a provider to an individual customer based on outsourcing parts of the composed service. An example of such a service offering is the mobile services that are offered to individual customers on their mobile phones, which is typically offered by a mobile operator, various content providers and a billing organization. Up till now most attention in service systems was focussed on analysing value propositions in a bi-lateral relation between customer and service provider, whereas we will argue that there is also a second important dimension to value propositions, namely in the collaboration between organizations to produce a joint value offering to a customer. Our basic research question in this context is: Which conceptual models and tools can be used for (re)design Business-toBusiness and Business-to-Government services in service systems? To answer this question, we present in this chapter a coherent framework for the design of service systems from a business perspective, which consists of two models for the conceptual part of the design process, and two tools that support the actual service system design, in particular in a network setting. We perform an extensive case study of service redesign in international trade to demonstrate that both the models and the tools of our design framework are useful and adequate for answering our research question. This chapter is structured as follows. First we present both models, namely the Service Innovation Aspects Model and the Service Innovation Life Cycle Model. Subsequently, we present the two conceptual modelling support tools, e3-value and e3-control. The case study elaborates on the application of these models and tools to service redesign in the Beer Living Lab. The chapter ends with a discussion of research implications and conclusions. 2 Service Innovation Aspects Model The Service Innovation Aspects Model addresses the conceptual aspects of the design process such as coordination and governance between the business analysis of services and identifying IT services to improve value exchange in a service system (Fig. 1). We distinguish the following aspects in this model: A Framework for the Design of Service Systems 53 Service Innovation Aspects Business services decompose organizations in service bundles Architecture Governance Business Applications Infrastructure coordination service framework trust, control supporting IT Services Service Oriented Architecture Fig. 1. Service Innovation Aspects model •฀ Services: The actual publication of value propositions with their conditions defined by parameter values. Typically, these services can be composed dynamically to meet customer requirements. •฀ Supporting IT services: Design of IT services for value exchanges, technically realized by for instance Web services according to a Service Oriented Architecture (SOA). •฀ Governance: Coordination and alignment of business and IT services, performance and service level agreements at business and IT level, trust and control mechanisms for fair distribution of value co-creation. •฀ Architecture: A conceptual approach to IT service modelling to support value exchange. Service is the key concept to support value propositions of actors in an organizational network, since this concept only specifies (part of) the behaviour of an actor that is externally visible to other actors. ‘Service’ as such should not only constitute value propositions, but also requires governance mechanisms for uncertainty reduction (Spohrer and Kwam 2009). The service concept abstracts from internal resources of a service provider to meet customer requirements. A service provider can autonomously allocate its internal resources meeting a customer requirement and outsourcing part of the required service. A service should also refer to policies and performance metrics. A policy refers to conditions and assumptions under which value can actually be exchanged. Metrics of a service refer to aspects like availability and performance and the basis for Service Level Agreements (Spohrer and Kwam 2009). To support a value proposition, interaction behaviour for actual value exchanges, interaction semantics, reachability (technical communication protocols, etc.), and non-functional properties need to be specified. We will call actual value exchanges according to a predefined interaction behaviour and semantics business transaction. Thus, we distinguish between a value proposition published as a service and its actual value exchange by a business transaction. 54 Y.-H. Tan et al. Non-functional properties of IT services supporting value propositions include aspects like availability, reliability and performance. These non functional IT service properties that can be specified by an existing framework influence the metrics of a service. We will focus here on the governance of service systems and architectural aspects of those systems, since much research has already been done on the other two aspects of our Service Innovation Aspects model. We will especially discuss the impact of these changes to government authorities. Governance comprises not only issues like open standards and security, but also services for discovery of value propositions with their related IT services, for example, auditing actors in a service system for applying controls according to agreed governance mechanisms, etc. Open standards and their semantics need to be globally accepted to implement a service system at a global scale. Trade and transport are examples of global service systems that require open standards. Most probably, semantics differs for each actor in such a (global) service system and additional mediation functionality is required. Standards and their semantics have to be available to all actors, either for free or at reduced (administrative) costs. Security is a second aspect of governance. In a setting of a (global) network of organizations, a federated security mechanism must be offered since not all actors will use the same security provider. One must be able to validate the identity of actors in an open environment like the Internet, where each actor can choose its preferred identity provider. A mechanism where these identity providers can be trusted needs to assure that identity of actors can be validated. Service discovery of business and IT services is a third aspect of governance. Although standards have been developed for IT service discovery (e.g. Fensel et al. 2008, Quartel et al. 2007), discovering services is still complicated, because commercial issues are at stake. Careful consideration needs to be given on how to structure service discovery results. There are best practices that show how to offer the results, e.g. the airline booking systems, see (Petzinger 1995). Auditing, a fourth aspect of governance, could be implemented by periodic or behavioural auditing, e.g. behavioural auditing might be supported by monitoring and analysing the actual behaviour of a service system based on, for instance, process monitoring (Aalst et al. 2007). Behavioural auditing adds trust to service systems, since it will immediately detect flaws in the system. Auditing firms could be actors that play an important role in auditing service system. Finally, one of the most important aspects of governance is the fair distribution of co-created value between all actors in a service system. A fair win-win situation must be created, otherwise partners of the service system will drop out, and the service system will not be sustaible. We use e3-control to model processes for sustainability of value co-creation with a fair win-win situation for all actors in a service system. Architectural aspects of service systems are related to concepts such as ‘business process’, ‘business service’, ‘resource allocation’, and ‘transaction protocols’ as the basis for IT services (Lankhorst 2005). With these concepts, we are able to build a model that allows us to distinguish services from a business and IT perspective for value propositions and introduce the concept of business transaction for actual value exchanges. It allows us to align business and IT services. We will elaborate on these concepts in more detail and argue that proper definitions are a A Framework for the Design of Service Systems 55 prerequisite for service systems. As we have stated before, business services are the publication of a value proposition by a service provider. Value propositions can be expressed in different ways that need to be recognized by both customers and a service provider, e.g. a joint goal like the transportation of cargo. Different approaches like Spohrer and Kwam (2009), and Fensel et al. (2008) use different terminology and define these terms loosely, or not at all. For instance, Spohrer and Kwam (2009) mentions business goals, whereas Fensel et al. (2008) introduce the concepts of ‘goal’ and ‘capability’, meaning that a goal denotes a customer requirement and a capability the offering by a service provider. These two concepts, goal and capability, can be applied to both business and IT services. Since a joint business goal is the basis for service discovery or mediation between a goal and a capability (Fensel et al. 2008), these concepts have to be defined unambiguously. Basically, a value proposition not only encompasses a business activity that can be performed by a service provider, but also prices, conditions and IT services with their non-functional requirements for actual value exchange. An example of a business activity is ‘transport’ that is supported by a business process offering a variety of business services like express transport (individual cargo items that have a maximum weight and are transported by air) or container transport. To be able to perform a particular business activity, resources may have to be allocated. A service provider has to allocate resources (Spohrer and Kwam 2009), e.g. a production line for beer production, to produce value for a customer. A customer should only be aware that a service provider is committed to a value exchange for a particular service. Each actor of a service system should implement a coordination mechanism over resources that are under its control. Resource allocation to meet customer requirements is based on negotiation between that customer and a service provider and relates to a value proposition. A negotiation mechanism comprises various aspects of a value proposition, e.g. costs, duration, start and ending time, and places or stages. During negotiation, both actors try to reach an agreement resulting in a contract as a commitment for actual value exchange. Dietz (2006) defines negotiation as a coordination act with an intention and a proposition. Coordination acts are supported by a transaction protocol. A basic protocol consists of ‘request’, ‘promise’, ‘state’ and ‘accept’, needs to be implemented by IT services, and can be decomposed in different phases: information or service discovery phase, negotiation phase which can lead to a contract, delivery phase in which value is actually exchanged based on the result of the negotiation phase, and a cancellation phase required for cancelling a contract and its agreed value exchange. A negotiation may lead to a commitment for value exchange of a service provider based on an existing service, which implies that that provider is actually willing to allocate resources. After a customer has accepted that proposition, resources have to be allocated according to the proposition. Support of a transaction protocol by IT services allows us to transform value propositions directly into IT services. We still have to extend this modelling approach with rules for internal orchestration. McGovern et al. (2006), Hofman (1994) already introduced a set of rules based on the coordination of distributed resources. 56 Y.-H. Tan et al. Fig. 2. Service Innovation Life Cycle 3 Service Innovation Life Cycle Model Service innovation considers reorganizing (parts of) a service system with the objective to obtain business advantages with respect to value exchanges by introducing new services. In fact, service innovation implies a new value proposition (Edvardsson and Olsson 1996). Service innovation can be classified by introducing new services, improving the operation, or increasing growth of services (Curtis and Henderson 2006). Other business improvements like logistics improvement can also be expressed as value co-creation for a service system. Service innovation starts with one particular actor of a service system that wants to introduce a change for improving operations. Existing value exchanges are reconsidered to express business advantages in terms of cost reduction in the service system under consideration (service operation innovation). An innovation life cycle model is required to gradually introduce changes in the total system. The Service Innovation Life Cycle model presented here discusses the introduction of changes in existing service systems with respect to the introduction of new services. The model (Fig. 2) presents a number of phases that have to be taken into consideration for service innovation. The model consists of three phases in which alternative solutions are evaluated before the actual implementation will take place. The phases are: •฀ Service Exploration: Possible scenarios are generated and considered to analyze changes from a business strategy viewpoint. •฀ Service Engineering: One or more options are explored in more detail. Their value is considered in the context of the value exchanges in which an organization operates. Cost/Benefit analyses are made on the basis of the value analysis and changes in processes are explored. Governance A Framework for the Design of Service Systems 57 and control mechanisms are developed to guarantee a fair distribution of benefits in the network, and hence a sustainable network. •฀ Service Management: IT Infrastructure and testing phase. One of the options is developed in more detail and tested in practical situations. Processes and information exchange are defined, tested, and managed (change management, operational management, etc.). Before actually implementing service systems it must be understood – on a high level – what the system will do and how this will impact its individual actors. This is vital since mistakes made in the early phases of service system design can have large (financial) consequences later on (see further Gordijn and Akkermans 2003; Yu 1995). Another consideration is that in the initial phase one wants to abstract as much as possible from implementation details in order to facilitate an open-minded approach and out-of-the box thinking. This latter consideration holds, in particular, for business analysts (and even top-level management) who typically do not have a very technical background. So, the first step is to explore how an actor of a service system will interact with other actors in the same service system from various perspectives (see outer circle alignment model). In particular, the analysis of value exchanges between partners is essential to identify value proposition. Only after the exploration phase is completed, further design (and alignment) should be considered; these additional steps are however outside the scope of this paper. To explore the interaction of a system/organization with its environment four different perspectives are taken into consideration. Considering various perspectives on a system to separate concerns is well-known in traditional requirements engineering (e.g. Nuseibeh et al. 1994). Although each perspective takes a different viewpoint, they all view the same phenomenon, which is in our case the interaction within a service system. We consider the following perspectives to be relevant: •฀ The business perspective that encompasses the business strategy perspective, which considers how other actors influence the strategic position of an actor, and also which collaborations in a network setting might be used to jointly offer a bundled service, and the value creation perspective, which considers how value is created by the service system in which the actors operates •฀ The computational perspective encompassing the process perspective, which considers the cross-organizational coordination processes to support the value creation, and the IT perspective, which considers information systems that interact with their surrounding to exchange information with a variety of technology, e.g. portal technology and web services We must note that stakeholders decide which perspectives are actually explored. Stakeholders can find perspectives irrelevant, simply because they are at that point not (yet) interested in the specific concern explored by a perspective. A consequence of having multiple perspectives on a service system and its interactions is that each perspective should be properly aligned with the others. However, alignment between the perspectives should not only be intra-organizational, which 58 Y.-H. Tan et al. considers alignment decisions between perspectives within a single organization; alignment should also be created between organizations leading to truly co-created value for all partners. This results in two more alignment issues: (1) inter-organizational alignment within a perspective, which considers alignment decisions per single perspective but between multiple organizations (e.g. interoperability between crossorganizational IS), and (2) inter-organizational alignment between perspectives, which considers alignment decisions between perspectives and between multiple organizations (e.g. value co-creation based on alignment of business – and IT services). A naive way to reason about alignment is to use a kind of top-down or “waterfall” approach as known from traditional software engineering methods. Each perspective would then be developed sequentially, and in a top-down way. This is, at least for the exploration phase, not a realistic approach. In the numerous case studies that we conducted (Derzsi and Gordijn 2006), innovative ideas came from the IT service perspective (e.g. new technologies), process perspective (e.g. process optimization) or value co-creation perspective (e.g. joint business opportunities). Also, the service system is continuous and fast moving in terms of enterprises, services, and technologies. So, we consider the alignment process a continuous and iterative “tuning” between the four perspectives within an organization and between organizations. The business strategy and the IT perspective are considered most relevant, since the stakeholders require an IT service design in a service system to improve processes from a business perspective. Value exchange analysis in service systems is a well-known construct for both understanding the business strategy of an actor (see e.g. Porter 1980) and information systems (see e.g. Wieringa 2003). To this end we make both the “business strategy” and “IT” operational in terms of interactions of actors in a service system, resulting in interactions at strategic and IT level. 3.1 Software Support Tools: e3-Value and e3-Control To develop service systems, the tools e3-value and e3-control can model different aspect of those systems. Whereas e3-value can be used to model and analyze value exchanges in service systems, e3-control is used to make the value co-creation in a collaborative environment sustainable by modelling processes in more detail. Process modelling in service systems presents safeguards to sustainable value co-creation for all actors involved. This section discusses both tools, and their applicability is illustrated in the next section by the Beer Living Lab case study. 3.2 Value Co-creation Modelling: e3-Value A first step in service system (re)design is the development of a value model, focusing on value creation (Porter 1980), distribution and consumption. The e3-value methodology and its supporting tools can be used to support design of a value model A Framework for the Design of Service Systems 59 of a service system. The e3-value methodology differs from other business modelling languages, because it focuses not on the modelling of business processes or very highlevel strategic issues, but rather on the modelling of value exchanges between actors in the economic sense (Anderson et al. 2006).1 This modelling of value exchanges is, in particular, useful for analysing value co-creation among business partners of a service system in a network setting. The e3-value methodology (Gordijn and Akkermans 2003) can be used to construct a value model, representing it graphically in a structured way, and performing an economic sensitivity analysis of this model. The e3-value methodology provides modelling concepts for showing which parties exchange resources of economic value with whom, and expect what in return. The methodology has been applied in a series of case studies including media, news, banking and insurance, electricity power, and telecommunication companies to design value models of network organisations (Gordijn and Akkermans 2003). Most of the currently available design methodologies lack a value-based view representing what the value proposition is; rather they focus on business processes representing how a value proposition is implemented. There are a few value chain design methodologies, which provide concepts for describing value constellations in service systems settings, for example the AIAI Enterprise conceptual framework (Uschold et al. 1998) or the Resource Event Agent (REA) (Geerts and McCarthy 1999) conceptual framework. However, these frameworks only focus on the description of the final result, and do not support the value chain design process itself. Other business modelling methodologies (see Pateli and Giaglis 2004 for an overview) offer only generic conceptual frameworks, and do not provide software tools to support the actual modelling in a proper analysis. Tapscott et al. (2000) offer a graphical diagramming approach to represent economic exchanges between enterprises, however, compared to e3-value, it has several drawbacks; e.g. it has no notion of economic reciprocity, economic activity, it does not allow the profitability assessment of individual organisations, and lacks the proper level of formality. Figure 3 shows in the upper part the legend of e3-value constructs used in the example in the lower part. For instance, ‘actor’ is represented by a square and has a name like ‘buyer’. We explain the concepts of the e3-value methodology the simple example, e.g. a buyer obtains goods from a seller, offers money in return, and according to the law, a seller is obliged to pay the value-added tax (VAT). This is conceptualised by the following e3-value constructs: •฀ Actor. An actor is perceived by its environment as an independent economic (and often legal) entity. In a sound, sustainable, business model each actor should be capable of making profit. The example shows a number of actors: a buyer, a seller, and a tax administration. 1 For further info on the tool see www.e3value.com, where also free demo versions of the tool can be downloaded. 60 Y.-H. Tan et al. Fig. 3. e3-Value model of a purchase with tax payment •฀ Value Object. Actors exchange value objects, which are services, products, money, or even consumer experiences. The important point here is that a value object is of value for one or more actors. Good and payment are examples of value objects, but legal compliance to pay tax is also a value object. •฀ Value Port. An actor uses a value port to show a value proposition to its environment. The concept of port enables to abstract away from the internal business processes. •฀ Value Interface. Actors have one or more value interfaces, grouping reciprocal, opposite-directed value ports. A value interface shows the value object an actor is willing to exchange, in return for another value object via its ports. The exchange of value objects is atomic at the level of the value interface. •฀ Value Exchange. A value exchange is used to connect two value ports with each other. It represents one or more potential trades of value objects between value ports. These concepts show bilateral links between customers and service providers, but cannot yet show value chains in which more than two actors are involved. For this purpose dependency paths (based on Buhr 1998) between value interfaces are introduced: a dependency path connects the value interfaces in an actor and represents triggering relations between these interfaces. A dependency path consists of dependency nodes and segments: •฀ Dependency Node. A dependency node is a stimulus (represented by a bullet), a value interface, an AND-fork or AND-join (short line), an OR-fork or OR-join (triangle), or an end node (bull’s eye). A stimulus represents a consumer need; an end node represents a model boundary. A Framework for the Design of Service Systems 61 Fig. 4. Example of a profitability sheet •฀ Dependency Segment. A dependency segment connects dependency nodes and value interfaces. It is represented by a link. •฀ Dependency Path. A dependency path is a set of dependency nodes and segments that leads from a start stimulus (consumer need) to an end stimulus. The meaning of the path is that if values are exchanged via a value interface, then other value interfaces connected by the path also exchange values. Additionally, profitability sheets are used to support cost-benefit analysis for each individual actor (Fig. 4). The advantage of e3-value is that it contains a minimal number of basic constructs, which makes it easy to understand and apply, even for non-technical marketers or business analysts. It is important to understand that an e3-value model only models an ideal situation with a given structure. The Principle of Reciprocity as defined in e3-value is the requirement that if an actor offers something of value to someone else, this actor always gets in return something what s/he wants. Hence, it assumes that all actors behave correctly. The violation of the principle of reciprocity (e.g. an actor receiving something without returning another service for it) can be seen as a violation of an obligation, which would lead to incorrect e3-value models with a value interface with only one incoming or outgoing value object; e.g. delivering goods and not receiving a payment in return. 3.3 Sustainability: e3-Control Even the most profitable business models will not be adopted by a company, if their interests in the business model are not properly safeguarded, and if there are no control mechanisms in place that will guarantee that they will obtain a fair share of the profits or benefits. e3-control provides sustainability of value co-creation by focussing on the design of inter-organizational controls. It is a methodology for control procedure analysis and redesign (Kartseva et al. 2004, 2005, 2006, 2010; Tan and Gordijn 2005; Liu et al. 2006, 2007, 2010) based on the key ideas of (1) structured modelling approach, (2) process-based analysis, and (3) value-based analysis. It has been shown that structured modelling approaches can be used as a means to solve complex inter-organizational problems (e.g., Baida 2006; Franken 62 Y.-H. Tan et al. and Janssen 1998; Gordijn and Akkermans 2003; Janssen et al. 2006). Process-level analysis of control issues follows ideas of other researchers (e.g., Chen and Lee 1992; Weigand and De Moor 2003), building on previous research (e.g., Arens and Loebbecke 1999; Bons et al. 1999; Geerts and McCarthy 1999) and best practices that consider control as a process element (COSO 1992). The main reason for using a process-level analysis is that the large knowledge base on designing controls, which is the basis of e3-control, focuses on analyzing operational tasks, or business processes (Bons et al. 1999; Chen and Lee 1992), and describes control with checking procedures based on the (electronic) exchange of business documents as a process. A broad consensus exists in the literature that the design and analysis of control is about identifying actors, activities and exchanges of business documents, and in particular the interdependencies between these concepts. Control principles are rules prescribing these interdependencies. A well-known control principle is Segregation of Duties, which states that when an activity is checked in an organization, the actor checking the activity should be different from, and socially detached from, the actor that is executing the activity. If this principle is not complied with, then likelihood of fraud in the checking is high. By applying control principles from auditing and accounting literature to process models (e.g. Romney and Steinbart 2003; Starreveld et al. 1994), we are able to identify control flaws, and to propose control mechanisms to handle these flaws. For a detailed description of e3-control’s process level analysis, we refer to Liu et al. (2006, 2007). Finally, e3control uses also a value model analysis to reason about controls (Kartseva et al. 2005), to model the value that can be lost by some actor in a network, if no controls are implemented. The e3-value methodology is used in e3-control to model this value analysis. We refer to the value model as ideal model, meaning that it reflects the situation when all actors fulfil their obligations. The ideal situation can be violated in the sub-ideal situation, which is the case that a value exchange does not hold reciprocally; e.g. in the purchase example the seller commits fraud and does not pay VAT accordingly. The e3-control methodology is visualized in Fig. 5. Value Perspective step 1: preliminary analysis Process Perspective step2:2: step controlproblem problem control identification identification Value Perspective step 3: 3: step control mechanism mechanism control redesign redesign step 4: evaluation Fig. 5. e3-Control: value and process perspectives combined into a redesign method A Framework for the Design of Service Systems 63 The key ideas of e3-control are applied as follows: 1. A value analysis using e3-value is performed to understand the existing business model and to identify which value exchanges between actors in a service system are at risk. 2. Once the weak points in a value model have been identified, a processlevel analysis of these points follows. It facilitates an understanding of how – in the business processes – value can be lost by actors. 3. The next step in process analysis is the development of corrective measures, i.e. new governance and control mechanisms, resulting in revised business processes. 4. Finally, the new business processes and control mechanisms may alter the business model; in particular require new control services and actors that provide these services. Therefore in the final step the value analysis is redone and it is investigated how the suggested changes influence the business model, and it is evaluated whether the new business model is feasible for the actors involved. As Fig. 5 shows, evaluation can be followed by redesign of control mechanisms or even restarting at the preliminary analysis in accordance with the Service Innovation Life Cycle Model discussed earlier. After evaluating one possible solution, alternative solutions may be investigated. Thus, e3-control is a support tool for a specific step in the Service Innovation Life Cycle Model, in particular in service engineering. To perform the analysis in steps 2 and 3 the Unified Modelling Method (UMM) is applied. 3.4 Beer Living Lab The Beer Living Lab, abbreviated to BeerLL, is a living lab case study that was conducted in 2006–2007 as part of the research project ITAIDE.2 Participants in the BeerLL were Heineken NL, a large Dutch beer producer, Heineken UK, an independent company that buys beer from Heineken NL, a UK retailer, the Dutch Tax Administration, IBM as a service provider and the VUAUniversityAmsterdam for project management, analysis, and redesign. In the BeerLL innovative IT was piloted to replace paper-based control procedures by electronic customs procedures to improve security and efficiency of international supply chains in the beer industry. This pilot was conducted with real container shipments of beer to England and the United States.3 2 The ITAIDE project is funded by the 6th Framework IST Programme of the European Commission, for further information see www.itaide.org. 3 Heineken ships on average 40,000 (!) containers to the US, so the potential benefits of simplification of customs procedures are very significant for Heineken. 64 Y.-H. Tan et al. This section explains the current As-Is situation of doing business with paperbased customs procedures, with its potential risks. Subsequently, the proposed To-Be situation is presented based on IT innovations. Finally, we illustrate how our framework was used in the BeerLL to design the new electronic customs procedures. 3.5 Current As-Is Situation The current As-Is situation is as follows. Within the European Union (EU), goods (and people) can move freely from one EU Member State to another. In case these goods are imported from a country outside the EU, import taxes have to be paid in the Member State where these goods are becoming EU goods and can move freely. Similar procedures and excise payments are applicable to exporting goods to countries outside the EU. When goods are produced and sold in the EU, a producer needs to pay excise in the EU Member State where the goods are actually consumed. Hence, if a Dutch beer producer exports beer to a retailer in the UK, that sells the beer to English consumers, the excise has to be paid by the English retailer to the UK Tax office and the producer has to offer proof of excise payment. These goods can already be physically located in that country, without paying excise in a so-called excise warehouse. Excise has to be paid when these goods leave the excise warehouse and are to be consumed. The so-called Administrative Accompanying Document (AAD) is the core document for excise-free export within the EU. The document provides shipment data for customs personnel and is proof that, after the document is signed by a tax office in the country of consumption, excise has been paid. This paper-based control procedure with the AAD is known to be vulnerable for fraud since it requires a paper-based administration by all parties involved. It could operate correctly if one AAD always relates to one container for which excise is paid at once. However, a container may contain a variety of consumer products, potentially with different excise percentages. Furthermore, as the transport between EU Member States increases, the number of AAD’s received increases and Dutch Tax will not have sufficient personnel to validate all AAD’s. 3.6 Proposed To-Be Situation The To-Be situation of the BeerLL describes how the paper-based procedure could be replaced by a completely paperless procedure by introducing two IT innovations, namely smart container seals for real-time monitoring of beer containers and services for sharing information. First of all, we present both IT innovations and, secondly, show how risk reduction is achieved applying these innovations. The smart container seal is a tamper proof seal developed by IBM (TREC device) for container tracking and tracing with GPS, detection of unauthorized opening of a container, and monitoring the physical condition of the container content A Framework for the Design of Service Systems 65 (e.g. temperature and humidity). It can be programmed with business rules; e.g. it can give periodic alerts with respect to its position. The seal’s unique reference number is linked to a Movement Reference Number identifying shipment data from customs perspective. The seals need to be managed by a service provider; they need to have a unique identification number and reverse logistics has to be in place. This service provider needs to be trusted to cater for the security issues of the seals. Introduction of services for sharing information between business partners and customs authorities is the second IT innovation piloted in the BeerLL. Services provide customs authorities access to shipment data stored in a companies’ ERP system, and whenever any governmental agency – whether dealing with export, excise, VAT or any other regulation – wishes to obtain data concerning a shipment, it can retrieve – or “pull” – this data from that system. Services were implemented using (1) standards for product descriptions, such that information from Heineken’s system was interpretable for Dutch Tax, and (2) standards for the implementation of services. Each organization in the BeerLL had its own database which contains a replication of (part of) the data of its internal IT system. Discovery services are required to interactively retrieve data from various databases and present the results to an end-user. Whilst a harmonised data structure is used, the data retrieved from different databases is always presented in the same way. Figure 6 shows Heineken, which replicates its purchase order data to a database (EPCIS), Dutch customs that replicates reports and alert data to their database, which is accessible to UK Customs, and Safmarine, a subsidiary of the Maersk container shipping line. Safmarine replicates the Bill of Lading into their EPCIS. The Bill of Lading contains all relevant shipment data for transport purposes, like container size and type, container number, weights, temperature, and parties Fig. 6. Service-oriented architecture applied in the BeerLL 66 Y.-H. Tan et al. involved in the shipment. Furthermore, data in the EPCIS database of Safmarine is enriched with container tracking and tracing and physical status data gathered and generated by TREC alerts. A device independent portal with integration functionality (the Shipment Information Sharing Services (SISS) developed by IBM) provides an actor specific discovery service for secure data access based on a unique seal number. In this way, customs can for instance access the data stored by Heineken and Safmarine in the EPCIS databases of these two companies. EPCGlobal (see www.epcglobal.org), a subsidiary of GS1 (see www.gs1.org), provided the IT service specifications for communication between the portal and the EPCIS databases and the harmonised data structure of the EPCIS databases. With these two innovations, Dutch and UK Customs have access to all container movements and their excise status, which makes the AAD obsolete. Shipment declarations are no longer required, since all transport movements are transparent to customs authorities. Control procedures are improved, because tracking and status information of containers is always accessible to customs authorities. Customs authorities have to take the initiative for monitoring transportation and assurance of excise payment. This differs from the current procedure, in which Heineken NL has to present, upon request from Dutch Customs, an AAD as evidence of excise payment. 3.7 Analysis of the BeerLL with e3-Control The applicability of our framework and tools is illustrated by a value – and process level analysis of BeerLL (see Beer Living Lab 2007; Baida et al. 2007, 2008) as discussed hereafter. A value-level analysis, yielded the following insights: •฀ Understanding of the BeerLL by analysing value exchanges between actors in the service system. •฀ Exploration of weak points in the business model. •฀ Understanding changes of the existing business model by introduction of the two IT innovations. This chapter only provides a few insights and examples of value models. First of all, we present the value models of the As-Is and To-Be situation and, secondly, we present the process analysis. Figure 7 is one of the value models that we developed in Step 1 of modelling the Beer Living Lab with e3-control. It shows the network of actors that participate in the value chain where Heineken NL sells beer to Heineken UK and consumption of the beer by end consumers. Actors (visualized as rectangles) exchange (visualized as blue lines) objects of economic value (text labels). The value chain starts at the start stimulus of the actor “Consumer UK” and follows the scenario along the value exchanges (blue lines) and dependency paths (dashed lines). The figure shows two sub paths: A Framework for the Design of Service Systems 67 Fig. 7. e3-Control As-Is model of the BeerLL •฀ A value exchange between Heineken UK and a carrier, where Heineken pays a fee in return for transport services. •฀ A value exchange between Heineken UK and Heineken NL: Heineken NL sells beer to Heineken UK. Following this dependency path, we can see that in order to be exempted from excise payment in the Netherlands, Heineken NL has to provide Dutch Customs export (data) evidence about the excise free shipments. In case the beer is transported from an excise warehouse to the supermarket, two sub paths represented by an OR gate are feasible: •฀ The UK-based retailer in its role of Excise Warehouse pays excise to the UK authorities. •฀ The UK-based retailer defaults and does not pay excise duties for the beer that it sold to the UK-based supermarkets. This sub path represents a fraud case. Whilst these sub paths are modeled by an OR gate, only one of the sub paths will be executed. A sub-ideal situation exists, which cannot be modeled by e3-value. The e3-control modelling tool allows modelling sub-ideal situations to identify possible problems with respect to control. This is indicated by the value exchange with dotted lines; i.e. “No Legal Compliance” and “No Payment Excise”. Modelling of 68 Y.-H. Tan et al. sub-ideal value exchanges is an extension in e3-control to e3-value to enable modelling of control flows. The second part of e3-control is modelling the To-Be situation (step 4 of e3control, Fig. 8). The major difference between this and the previous value model is the introduction of a new actor – TREC service provider – to cope with the control problems we have mentioned. As we have described before, a TREC service provider supports the logistics of the seals and, in the BeerLL, hosts the portal and the EPCIS databases. This will give the following opportunities: 1. Since TREC can monitor the state of a container and the TREC service provider provides sufficient monitoring and control to Dutch Customs, Dutch Customs has proof of excise payment in the UK. 2. TREC service provider offers and extra control by submitting information (automatically generated by TREC) to both Dutch Customs and UK Customs that can be used to match excise payment. 3. Heineken NL is able to provide all relevant accountability data to qualify as an AEO (Authorised Economic Operator), which leads to considerable benefits and cost reductions to Heineken. 4. TREC service provider is able to improve the supply chain management of the beer transport for the carrier, which has immediate benefits and cost reductions also for Heineken NL and Heineken UK. By comparing the To-Be model with the As-Is of step 1, the value of performing step 4 becomes visible. First, we identify changes in actors and in linkages between actors. Secondly, the To-Be model also supports a profitability (cash flow) and business analysis: (1) reduction of administrative burden of all private parties and (2) fraud reduction for customs authorities. The total profitability depends on the business model of the new services required by the introduction of both IT innovations and their adoption by all stakeholders. The seal service provisioning is a typical example of a networked service offering. Various services have to be bundled, which refers to the governance aspects of our Service Innovation Aspects Model. First, there should be a seal provision service offered by an actor, including seals logistics. Secondly, there should be a mechanism to process and store seal data linked to a container number and a Movement Reference Number. Third, the services have to be implemented and published by companies and a service discovery portal is required according to agreed standards and semantics. This requires services of a standardization body, like GS1 and EPCglobal. Finally, there should be federated security service providers, because the distribution and use of digital certificates has to be at a global scale and there exists no globally acting Certification Authority (CA). Most governments issue their own digital certificates and act as a CA. Hence, federation is needed to provide global coverage. An additional complexity of this network formation is that for each of these services the investment profile is quite different. For example, consider millions of container movements with relative less investment for TREC devices compared with investments for developing a CA 69 Fig. 8. e3-Value To-Be model of BeerLL A Framework for the Design of Service Systems 70 Y.-H. Tan et al. Fig. 9. Step 2 of e3-control: process model of the BeerLL As-Is situation federation to provide global security coverage and operating the complete service system. The value modelling and underlying profitability analysis was used extensively to make a detailed scenario-based analysis of the profitability for each of these services, and to determine which actor was most likely to provide these services. One of the solutions is that container owners provide the seal services as built-in functionality of their containers. The value analysis for a seal service showed that these services are primarily profitable for the transport of high-value goods (mobile phones, electronic components etc.). For commercial reasons we are unable to provide more details about these more detailed value models for seal services. Steps 2 and 3 of e3-control consist of a process-level analysis focussing on the business processes that realize the As-Is and To-Be business models. A process analysis is required for value co-creation sustainability by all actors involved. Figure 9 shows the highest level As-Is process model that was constructed in Step 2 of the BeerLL. It illustrates the basic principles of the paper-based AAD approach and is refined in various steps to, for example, use case diagrams and activity models that include swim lanes for each actor, using the Unified Modelling Language (UML). Process analysis specifies how processes are affected by the introduction of the a container seal and the TREC service provider. Detailed models can be found in (Beer Living Lab 2007). Process analysis yielded the following insights (Fig. 10): •฀ Based on a combination of IT innovations such as the TREC smart container seal and services, paper-based administrations become obsolete. A Framework for the Design of Service Systems 71 Fig. 10. Step 3 of e3-control: process model of the To-Be situation •฀ Current EU procedure for export and intra-community supplies of excise goods based on a paper document does not comply with control principles and is therefore vulnerable to fraud and misuse. •฀ The BeerLL concept complies with audit and control principles and solves the control risks that we identified for the paper-based customs procedure. Figure 10 shows the To-Be process of Step 3 of the BeerLL redesign, where all the evidence of movements of beer containers is stored in EPCIS databases that are accessible to Dutch and UK customs authorities. The database contains all relevant data for customs purposes, which is also present at the AAD document. In particular, a TREC can be programmed to send a signal when it crosses the Dutch border, which is an automated export evidence for Dutch Customs. The data stored in the EPCIS database of Heineken NL replaces the role of the To-Be-verified paper export declaration. 4 Conclusions In this paper we have discussed two models, the Service Aspects model and the Service Innovation Life Cycle Model, and two conceptual modelling tools, e3-value and e3-control to support the re-design of Business-to-Business and Business-toGovernment services. To validate the adequacy and usefulness of the models and tools, we have conducted an extensive case study, the BeerLL, of the redesign of 72 Y.-H. Tan et al. value chains in international trade with the introduction of two IT innovations (smart seals and services). The BeerLL case study provides a clear example of what we called the second dimension of value propositions in service systems, namely that services are typically offered by collaborative service system of service providers. First of all, it is clear that no single actor is able to provide seal services, so it is a truly networked service offering. Secondly, to design the seal service, it appears to be essential to find a service system setting that is not only profitable as a whole, but profitable for every partner participating in the service system. The most complicated part of a seal service is to determine the value co-creation among the actors in the service system. In particular, to determine for each actor (1) the profitability of the value model of his own service contribution, and (2) to design controls that guarantee for each actor the fair distribution of profitability of the total service system to each of the actors in that system. In both steps the tools e3-value and e3-control are proving to be useful for analysis and design. Regarding the research question, we can now say that applying these tools in practice enabled us to model weaknesses in control procedures and to redesign these procedures by introduction of extra controls based on new technology that is provided as a networked service offering provided by a service system. In other words, the tools have been adequate for the redesign task and have provided useful insights. We expect the research to have the following implications. Regarding theory, the combination of value-based modelling (e3-value and e3-control) and service oriented models (Service Aspects model and the Service Innovation Life Cycle Model) has proved beneficial. It provides another step towards reconciling these mutually beneficial modelling perspectives for service design. Regarding practice, we expect that these insights will help practitioners to better understand the impact of regulation change on service redesign. In future research, we will further investigate the separation of the design phase and operational phase in the life-cycle of service systems, and further define the underlying concepts of this contribution. Acknowledgments This research was partially supported by the integrated project ITAIDE (Nr.027829), which is funded by the 6th Framework IST Programme of the European Commission (see www.itaide.org). References Anderson, J.C., Narus, J., Narus, A., and van Rossum, W. (2006). Customer value propositions in business markets. Harvard Business Review, 84(3), pp. 90–99. Arens, A. and Loebbecke, J. (1999). Auditing, an Integrated Approach, 8th edition, Prentice Hall, Englewood Cliffs. Baida, Z. (2006). Software-aided Service Bundling – Intelligent Methods and Tools for Graphical Service Modeling, Ph.D. thesis, Vrije Universiteit Amsterdam, The Netherlands. Baida, Z., Rukanova, B.D., Wigand, R.T., and Tan, Y.H. (2007). Partnership: The story of how Heineken’s supply chain benefits from tight collaboration with government. Supply Chain Management Review, 11(7), pp. 11–12. A Framework for the Design of Service Systems 73 Baida, Z., Rukanova, B., Liu, J., and Tan, Y.H. (2008). Preserving control in trade procedure redesign – The Beer living lab, electronic markets. The International Journal, 18(1), 53–64. Beer Living Lab (2007). Beer Living Lab, Final Report, D5.1:5, ITAIDE. Bons, R.W.H., Lee, R.M., and Wagenaar, R.W. (1999). Computer-aided auditing and interorganizational trade procedures. International Journal of Intelligent Systems in Accounting, Finance and Management, 8(1), pp. 25–44. Buhr, R.J.A. (1998). Use case maps as architectural entities for complex systems. IEEE Transactions on Software Engineering, 24(12), pp. 1131–1155. Chen, K.-T. and Lee, R. M. (1992). Schematic evaluation of internal accounting control systems EURIDIS Research Monograph, Erasmus University Rotterdam. COSO (1992). Internal Control-Integrated Framework. The Committee of Sponsoring Organizations of the Treadway Commission, New York. Curtis, K. and Henderson, A. (2006). Hiding in plain sight: service innovation – a new priority for chief executives. IBM Institute for business value. Somers, New York. Derzsi, Z. and Gordijn, J. (2006). A framework for business/it alignment in networked value constellations. In T. Latour and M. Petit, editors, Proceedings of the Workshops of the 18th International Conference on Advanced Information Systems Engineering (CAiSE 2006) Namur University Press, Namur, B, pp. 219–226. Dietz, J.L.G. (2006). Enterprise Ontology – Theory and Methodology, Springer, Berlin. Edvardsson, B. and Olsson, J. (1996). Key concepts for new service development. The Service Industries Journal, 16(2), pp. 140–164. Fensel, D., Kerrigan, M., and Zaremba, M. (eds.) (2008). Implementing Semantic Web Services – The SESA framework, Springer, Heidelberg. Franken, H. and Janssen, W. (1998). Get a grip on changing business processes: Results from the Testbed project. Knowledge and Process Management, 5(4), pp. 208–215. Geerts, G. and McCarthy, W.E. (1999). An Accounting Object Infrastructure for KnowledgeBased Enterprise Models. IEEE Intelligent Systems and Their Applications, 14(4), pp. 89–94. Gordijn, J. and Akkermans, H. (2003). Value based requirements engineering: Exploring innovative e-commerce idea. Requirements Engineering Journal, 8(2), pp. 114–134. Heineke, J. and Davis, M. (2007). The emergence of service operations management as an academic discipline. Journal of Operations Management, 25, pp. 364–374. Hofman, W.J. (1994). A conceptual model of a Business Transaction Management System, Ph.D. thesis, Uitgeverij Tutein Nolthenius, The Netherlands. Janssen, M., Gortmaker, J., and Wagenaar, R.W. (2006). Web service orchestration in public administration: Challenges, roles and growth stages. Information Systems Management, 23(2), pp. 44–55. Kartseva, V., Gordijn, J., and Tan, Y.-H. (2004). Value-based business modelling for network organizations: Lessons learned from the electricity sector. Proceedings of the 12th European Conference on Information Systems (ECIS’04), Turku. Kartseva, V., Gordijn, J., and Tan, Y.-H. (2005). Towards a modelling tool for designing control mechanisms for network organisations. International Journal of Electronic Commerce, 10(2), pp. 57–84. Kartseva, V., Gordijn, J., and Tan, Y.-H. (2006). Inter-organisational controls as value objects in network organisations. Proceedings of the 18th Conference of Advanced Information Systems Engineering (CAiSE06), Springer Verlag, Berlin pp. 336–350. Kartseva, V., Hulstijn, J., Gordijn, J., and Tan, Y.-H. (2010). Control patterns in a healthcare network. European Journal of Information Systems, 19, 320–343. Lankhorst, M. (2005). Enterprise Architecture at work, Springer, Heidelberg. Liu, J., Baida, Z., Tan, Y.-H., and Rukanova, B. (2006). Designing controls for e-government in network organizations. Proceedings of the 13th Research Symposium on Emerging Electronic Markets, September 23–25, Stuttgart, Germany, pp. 22–36. 74 Y.-H. Tan et al. Liu, J., Baida, Z., and Tan, Y.-H. (2007). e-Customs Control Procedures Redesign Methodology: Model-Based Application. Proceedings of the 15th European Conference of Information Systems (ECIS 2007), St. Gallen, Switzerland. Liu, J., Higgins, A., and Tan, Y.-H. (2010). IT enabled redesign of export procedure for high value pharmaceutical product under temperature control: the case of drug living lab. Proceedings of the 11th Annual International Conference on Digital Government Research (DG.O 2010), ACM International Conference Proceeding Series. McGovern, J., Sims, O., Jain, A., and Little, M. (2006). Enterprise Service Oriented Architectures – Concepts, Challenges, Recommendations, Springer, Dordrecht. Nuseibeh, B., Kramer, J., and Finkelstein, A. (1994). A framework for expressing relationships between multiple views in requirements specification. IEEE Transactions on Software Engineering, 20(10), pp. 760–773. Pateli, A.G. and Giaglis, G.M. (2004). A research framework for analysing business models. European Journal of Information Systems, 13(4), pp. 302–304. Petzinger, T. Jr. (1995). Hard Landing: The Epic Contest for Power and Profits That Plunged the Airlines into Chaos, Times Books, New York. Porter, M.E. (1980). Competitive Advantage. Creating and Sustaining Superior Performance, The Free Press, New York. Quartel, D.A.C., Steen, M.W.A., Pokraev S., and Sinderen M.J. van (2007). COSMO: A conceptual framework for service modelling and refinement. Information Systems Frontiers, 9(2–3), pp. 225–244. Romney, M.B. and Steinbart, P.J. (2003). Accounting Information Systems, 9th edition, Prentice Hall, New Jersey. Spohrer, J. and Kwam, S.K. (2009). Service Science, Management, Engineering and Design (SSMED) – An emerging discipline – Outline and references. International Journal on Information Systems in the Service Sector, 1(3). Starreveld, R.W., de Mare, B., and Joels, E. (1994). Bestuurlijke Informatieverzorging, Deel 1, 4th edition, Samsom, Alphen aan den Rijn (in Dutch). Tan, Y.H. and Gordijn, J. (2005). A design methodology for modeling trustworthy value webs. International Journal of Electronic Commerce, 9(3), pp. 31–48. Tapscott, D., Ticoll, D., and Lowy, A. (2000). Digital Capital – Harnessing the Power of Business Webs, Nicholas Brealy Publishing, London. Uschold, M., King, M., Moralee, S., and Zorgios, Y. (1998). The enterprise ontology. The Knowledge Engineering Review, 13(1), pp. 31–89. van der Aalst, W.M.P., Reijers, H.A., Weijters, A.J.M.M., van Dongen, B.F., Alves de Medeiros, A.K., Song, M., and Verbeek, H.M.W. (2007). Business process mining: An industrial application. Information Systems, 32(5), pp. 713–732. Weigand, H. and De Moor, A. (2003). Workflow analysis with communication norms. Data & Knowledge Engineering, 47, pp. 349–369. Wieringa, R.J. (2003). Design Methods for Reactive Systems, Morgan Kaufman, San Fransisco. Yu, E. (1995). Models for supporting the redesign of organizational work. In COCS ’95: Proceedings of Conference on Organizational Computing Systems, ACM Press.