Sciencedirect
Sciencedirect
Sciencedirect
com
Available online at www.sciencedirect.com
^ĐŝĞŶĐĞŝƌĞĐƚ
^ĐŝĞŶĐĞŝƌĞĐƚ
Procediaonline
Available Computer
at Science 00 (2023) 000–000
www.sciencedirect.com
Procedia Computer Science 00 (2023) 000–000 www.elsevier.com/locate/procedia
www.elsevier.com/locate/procedia
ScienceDirect
Procedia Computer Science 234 (2024) 718–724
Abstract
Abstract
In implementing EA itself, problems often occur, such as the incoherence and synchronization of business strategy with
In implementing
technology. To beEA ableitself, problems
to find out the often occur,that
possibility such as isthean incoherence
there and synchronization
error and quality in the company'sofbusiness
businessprocesses,
strategy with
it is
technology.
necessary to To be out
carry ableverification
to find outand
thevalidation.
possibilityThe
thatstages
there is
of an errorverification
testing and qualityand
in the company's
validation businessprocesses
of business processes,
useit V-
is
necessary
Model which to carry
has out verification
3 layers. The and validation.
results of this The stageswill
research of testing verification
later become and validation for
an improvement of business processes
the company use V-
to achieve
Model whichand
effectiveness hasefficiency
3 layers.inThe results the
optimizing of company's
this research will processes.
business later become an improvement for the company to achieve
effectiveness and efficiency in optimizing the company's business processes.
© 2023 The Authors. Published by ELSEVIER B.V.
© 2023
© 2023 The
The Authors.
Authors. Published byby Elsevier B.V.B.V.
This is an open accessPublished
article under ELSEVIER
the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0)
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0)
This is an open
Peer-review access
under article under
responsibility CC BY-NC-ND
of the scientific committeelicense
of the(https://creativecommons.org/licenses/by-nc-nd/4.0)
Seventh Information Systems International Conference.
Peer-review under responsibility of the scientific committee of the Seventh Information Systems International Conference
Peer-review under responsibility of the scientific committee of the Seventh Information Systems International Conference.
Keywords: Business process; Verification and validation; V-Model
Keywords: Business process; Verification and validation; V-Model
1. Introduction
1. Introduction
Many companies have now implemented Enterprise Architecture (EA) to align corporate strategies to achieve
Many companies
corporate goals. EA ishave now implemented
a description Enterprise
function which Architecture
consists (EA) to align
of an architectural modelcorporate strategies
of an industry to achieve
to develop and
corporatetheir
manage goals. EA is a description
integrated function
business model withwhich
an ITconsists of anensuring
perspective architectural model
that the roleofofanISindustry to develop
in the industry is and
not
manage theirand
overloaded integrated business
information model with
congestion [1]. anEA
IT generates
perspectivea ensuring
long-termthatperspective
the role ofofIS the
in the industry
current is not
industrial
overloaded systems,
architecture and information congestion
technologies, [1]. EAproviding
and processes, generates a vision
their long-term
of theperspective of the and
future architecture current industrial
implementing
architecture
an adaptationsystems,
strategytechnologies,
that describesand
howprocesses,
to achieveproviding their vision
it [2]. Empirical of the
studies future
show thatarchitecture and implementing
EA brings various benefits to
an adaptation
companies andstrategy that describes
organizations how to
[3]. Some of achieve it [2].
the direct Empirical
benefits are tostudies show
identify that EA brings
architecture, various
IS, and benefits as
technology to
companies and organizations [3]. Some of the direct benefits are to identify architecture, IS, and technology as
* Corresponding author.
* Corresponding
E-mail address:author.
[email protected]
E-mail address: [email protected]
1877-0509 © 2023 The Authors. Published by ELSEVIER B.V.
1877-0509
This is an open
© 2023access
The article
Authors.under
Published
the CCby
BY-NC-ND
ELSEVIERlicense
B.V. (https://creativecommons.org/licenses/by-nc-nd/4.0)
Peer-review
This is an open
under
access
responsibility
article under
of the
thescientific
CC BY-NC-ND
committee
license
of (https://creativecommons.org/licenses/by-nc-nd/4.0)
the Seventh Information Systems International Conference.
Peer-review under responsibility of the scientific committee of the Seventh Information Systems International Conference.
strategy alignment, business-IT alignment, and partner alignment [4]. This EA itself aligns IT implementation that
has been implemented in business processes at the source of the company [5]. The results of the EA planning are
used as the basis and guidelines for the construction and development of information systems that support banking
business strategies to achieve alignment between business strategy and IT strategy.
Alignment between business strategy and IT strategy is what companies really need currently. But the problem
that often occurs in a company that uses information technology and information systems in its business processes is
that many business processes are not integrated and asynchronous and how companies can align business strategy
and technology strategy to achieve company goals [6]. Therefore, in this study, process verification and validation
will be carried out using V-Model to verify and validate process modeling in a company. By performing verification
and validation, companies can ensure that business processes are executed as expected, minimize the risk of errors,
and improve overall operational efficiency.
In the verification and validation stages using the V-Model, there are 3 layers which will be tested sequentially
for verification and validation. Starting from layer 1 which is tested based on the suitability of the company's
business processes with ISO 37000 components which tests the conformity of regulations, rules, obligations, and
parties responsible for the company's business processes, layer 2 is tested based on the suitability and timeliness of
the company's business process schedule with Reality The company's business processes use Gantt charts and the
critical path method and layer 3 are tested based on the existing company business processes that have been modeled
on BPMN and then transformed to Petri Net with supporting tools, namely WoPeD so that structural and property
checks will be carried out. The results of this research will later become an improvement for the company to achieve
effectiveness and efficiency in optimizing the EA design.
2. Literature review
Enterprise architecture (EA) is a blueprint or conceptual blueprint for defining the structure and operations of an
organization, where EA aims to determine how a company can run effectively in achieving current and future goals
[8].
2.2. V-Model
V-Model is an extension of the waterfall model because the stages are similar to those in the waterfall model. The
process in the V model is branched and describes the relationship between the development stage and the testing
stage [9].
Verification and validation are techniques for prevention purposes such as detecting errors, inconsistencies, and
incompleteness. Thus, verification consists of a series of separate activities just to ensure that the model is correct.
Validation has a function to ensure that the model is meaningful for system users [10].
ISO 37000 clarifies that the regulatory body is responsible for defining and outlining meaningful and relevant
organizational objectives as the organization's reason for existence and provides detailed guidance on relevant
practices. It also explains that the regulatory body must define the values of the organization as a compass to direct
how the goals are achieved [11].
720 Revyolla Ananta Dila et al. / Procedia Computer Science 234 (2024) 718–724
Author name / Procedia Computer Science 00 (2023) 000–000 3
According to Antonio Prensa (2002), the Critical Path Method (CPM) is a procedure that uses network analysis
to identify tasks that are on the critical path: i.e., where any delay in the completion of tasks will extend the project
time scale, unless action is taken [12].
In 1962, Petri Net was first introduced by Carl Adam Petri as a business process analysis and modeling tool. Petri
Net is used as a formal modeling language to analyze workflow models to analyze business processes or workflows
[13].
3. Methodology
In this study, verification and validation modeling was carried out using V-Model. This model has three layers in
conducting verification and validation tests, namely:
• At layer 1, a test will be carried out on the company's strategic plan. To produce a good strategic plan, in
carrying out verification and validation in this phase, a component or criteria is needed. The criteria used to
carry out this test are using the criteria from the Corporate Governance ISO framework. Which criteria will
be used as a tool to analyze gaps in strategic planning. The verification process is carried out by checking
the criteria contained in the ISO framework on existing documents, such as annual reports, websites, and
other related documents. The validation process is carried out by writing the source on the worksheet.
• At layer 2, CPM modeling is required in carrying out the validation process to plan projects by mapping the
completion time of activities. Dependencies are used to evaluate project data and ensure accuracy in
managing schedules using time mapping. While the critical path is used to check the suitability of the time
used against the schedule that has been made with the company's actual project.
• At layer 3, tests are carried out on the existing business processes of companies that have been transformed
to Petri Net with supporting tools, namely WoPeD. At the verification stage it is done by checking the
structural properties, while the validation stage is done by checking the behavioral properties.
Following are the stages of testing regulations, rules, obligations, and parties responsible for business processes
using ISO 37000 working sheets. In this testing phase, company data such as regulations, rules, obligations, and
Revyolla Ananta Dila et al. / Procedia Computer Science 234 (2024) 718–724 721
4 Author name / Procedia Computer Science 00 (2023) 000–000
parties responsible are verified. Then proceed with data validation to ensure data conformity with using ISO 37000
working sheets. The following are company data that are fulfilled in accordance with ISO 37000 working sheets.
Based on the results obtained, it can be concluded that the completeness and suitability of company data using
ISO 37000 working sheets are all fulfilled where the company has paid attention to important aspects of business
ethics management. Thus, the company can demonstrate its commitment to responsible business practices. For the
next stage, it can be continued with layer 2 where a more in-depth examination of the company's business processes
related to the company's schedule will be carried out.
Verification in this second stage is data regarding the schedule of the company's business processes and is
validated using a Gant chart. The following is a schedule for the implementation of due diligence business process
dependencies using a Gantt chart.
Note: Based on the results of the dependencies analysis in Fig. 2, to verify dependencies, the business process
uses the relationship between SF tasks, namely start to finish, which means that work 'A' can be completed if work
'B' has started so that work will proceed accordingly according to the implementation schedule that has been
prepared. Thus the business process has been properly verified.
Revyolla Ananta Dila et al. / Procedia Computer Science 234 (2024) 718–724 723
6 Author name / Procedia Computer Science 00 (2023) 000–000
The final stage is verification of the company's business process data obtained and modified from the BPMN
business process. Then validation is carried out to change the BPMN business process into a petri net workflow. The
reason for using petri nets as validation is that petri nets provide a robust framework for verification and validation
of business processes before they are implemented. By using Petri Net, we can identify potential problems, optimize
process flow, and ensure that business processes run smoothly and efficiently.
The following is the result of the transformation of the business process BPMN into a petri net workflow.
Based on these tests, there are no errors both in terms of structure analysis and soundness. So that the business
process in terms of notation has been properly verified and in terms of the suitability of business processes with real
processes it has been well validated.
4. Conclusion
Based on the results of this study, the following conclusions can be drawn:
• The use of the V-Model as a process of verification and validation of business processes is carried out by
checking the necessary data in accordance with the requirements of each layer's criteria so that it can make it
easier to find errors and inaccuracies in business process modeling and to find out the correctness of
business processes. The stages of the business process verification and validation process using the V-Model
consist of 3 layers. In the layer 1 test by adjusting the ISO 37000 criteria, the results were verified and
validated at a good level. In layer 2 testing by carrying out the accuracy of business process scheduling with
the reality of the company's business processes, the results are verified and validated with the suitability of
business process scheduling with the reality of the company's business processes.
• After testing at the 3 layers stage, the results of the test can be stated that the approach is quite good at
verifying and validating business processes.
In this study, it is necessary to carry out further research to produce verification and validation which can prove
that errors found in the company's business processes can affect the failure of EA implementation in companies and
also require in-depth and ongoing documentation to make it easier to carry out verification and validation tests of
business processes by more accurate in order to produce the effectiveness and efficiency of the company's business
processes. The contribution of this research is that it can be used as an initial research to verify and validate business
processes in business architecture and develop verification and validation processes for future research.
References
[1] Jayakrishnan, M. A. L., Bin Mohamad, A. K., & Yusof, M. B. M. (2018). The holistic view of business intelligence (BI) and big data
analytics (BDA) towards designing strategic performance management framework: A case study. Journal of Theoretical and Applied
Information Technology, 96(7), 2025–2045.
[2] Jayakrishnan, M., Mohamad, A. K., & Abdullah, A. (2019). Enterprise architecture embrace digital technology in Malaysian transportation
industry. International Journal of Engineering and Advanced Technology, 8(4), 852–859.
[3] Guo, H., Li, J., Gao, S., & Smite, D. (2021). Understanding How Enterprise Architecture Contributes to Organizational Alignment. (Eds)
Responsible AI and Analytics for an Ethical and Inclusive Digitized Society. I3E 2021, vol 12896, 383–396.
[4] Guo, H., Li, J., & Gao, S. (2019). Understanding challenges of applying enterprise architecture in public sectors: A technology acceptance
perspective. Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOCW, 2019-October, 38–43.
[5] Anderson, R., & Andry, J. F. (2021). Perancangan Enterprise Arsitektur Menggunakan Framework Togaf (Studi Kasus PT. Ikido Jorr Sepatu
Indo). Ultima InfoSys : Jurnal Ilmu Sistem Informasi, 12(1), 58–66.
[6] Soraya, V., & Sari, W. S. (2019). Perancangan Enterprise Architecture Sistem Informasi dengan Menggunakan Framework TOGAF ADM
pada CV. Garam Cemerlang. JOINS (Journal of Information System), 4(2), 148–156.
[7] Kistianti, F. M., Lubis, M., Amalia, A., Fajrillah, N., Industri, F. R., Telkom, U., & Architecture, B. (2022). Arsitektur Bisnis Dengan Metode
Petri Net Menggunakan Model V.
[8] Jannah, A. M., Saedudin, R. R., & Lubis, M. (2019). Analisis Dan Perancangan Enterprise Architecture Menggunakan Togaf Adm Pada
Fungsi Kesehatan Dalam Sistem Manajemen Puskesmas Berbasis Smart City. E-Proceeding of Engineering, 6(2), 7706–7720.
[9] Chandra, Y. I., Kosdiana, & Riastuti, M. (2022). Penerapan Model V Dalam Merancang Aplikasi Reservasi Dan Rekam Medis Hewan Di
Pusat Kesehatan Hewan Berbasis Web. Jurnal IKRAITH-INFORMATIKA, 6(17), 100–108.
[10] Nurwahyu, A., Putra, A., Lubis, M., Amalia, A., Fajrillah, N., Prodi, S., Informasi, S., Industri, F. R., & Telkom, U. (2021). Formal Dalam
Upaya Efisiensi Perencanaan Strategis Organisasi ( Studi Kasus : BUMN dan BUMD ).
[11] National, T. H. E. I., & Ganizations, O. F. O. R. (2022). ISO 37000:2021 Governance Of Organizations-Guidance ISO Technical Committee
309 The International Standard On Governance Of Organizations Governance of Organizations. February, 1–19.
[12] Hermawan, S. R. (2017). Penerapan Critical Path Method (Cpm) Pada Proyek Freeze Dryer Di Pt. Pharos Indonesia. 64.
[13] Octavia, M., Fitriani, F., & Faisol, A. (2021). Petri Net Model in the Process of Submission for Customer Credit of Bpr Lambang Ganda
Serang. BAREKENG: Jurnal Ilmu Matematika Dan Terapan, 15(3), 565–574.