Current approaches to business modeling still focus on how a company produces value, rather than on how a network of companies produces value. But with today’s technology, no value proposition is produced in isolation. To successfully develop new value propositions, you need to think in terms of value networks.
This workshop introduces value engineering as the discipline that places value network design at the center of new business development. We show how the choice of technology, the design of operational processes, and the potential for risk are inter-linked and dependent on the structure of your value network. We take an engineering approach, which means that we quantify and simulate possible value networks before selecting and implementing one.
- On day 1, we discuss value engineering, value modeling and fraud modeling of value networks.
- On day 2, we discuss technology choice and process design.
For whom: IT managers, analysts, business developers, entrepreneurs, decision-makers.
What is included: Slides, a book on e3value, and catering. The price is excluding BTW.
Prerequisite knowledge: None.
More information: Call us at 0852 018 609 or e-mail us at firstname.lastname@example.org.
We take you beyond the hypes about new technology to get to their real business possibilities. Our course is based on 20 years of practice-based research in business modeling for new technologies.
Day 1: Value engineering, value models and fraud models
- Value engineering. In value engineering you operationalize a business idea by mapping it to the value network needed to realize the idea, and aligning this value network to the technology and business processes needed to implement it. Successful examples of value engineering may well lead to the early recognition that a business idea is not feasible after all, or to the identification of the technology and processes needed to realize it. Assessment of risks and compliance is an integral part of value engineering.
- Value Value models show who exchange which value with whom and what they receive in return for it. By making market assumptions, net revenue streams can be estimated, and financial risks can be assessed. We present the constructs of value modelling with the e3value notation and show how to use software tools to analyse the models.
- Cases and discussion. In this first practitioner slot, participants design an e3value model for their own case, or for a case provided by the instructors. Afterwards, the models will be plenary presented and discussed.
- Fraud Value models suppose an ideal world in which all actors behave honestly. However, we live in a sub ideal world; some actors commit fraud or behave dishonestly otherwise. Fraud modelling relaxes the ideal-world assumption of value models. Fraud possibilities can be partly generated automatically given a value model, analysed and properly mitigated. We present the fraud modelling notations of e3value and show how to generate and assess frauds with our software tools.
- Cases and discussion. Participants will perform a fraud analysis and present the results.
- Feedback and discussion of the days’s results
Day 2: Value modelling, technology choice and business processes
- Technology choice and value modelling. Different choices of technology allow different business models and value networks. We show by a number of examples what effect techynology cjhoices has on value models.
- Cases and discussion. We discuss the technology choices in the cases done by the participants.
- Business process modelling. Value models show what of economically value is exchanged between actors; process models show how this is done. To model and analyse business processes, we use the Business Process Model Notation (BPMN), which is today’s industry standard. We discuss process orchestration (a business process of a single enterprise) and process choreography (processes between enterprises).
- Cases and discussion. Participants design a business process model, and present the results
- Deriving process models from value models. Although process models and value models clearly model and design different things, they are also very much related. We will show how the value model can be used to design a corresponding process model.
- Cases and discussion. Participants apply the guidelines on how to design a process model using a value model, and present the results.
- Feedback and discussion of the days’s results
The center of development of the e3value method has been at the Vrije Universiteit Amsterdam (Computer Science department) and the University of Twente (Electrical Engineering, Mathematics and Computer Science department). Other research groups work on the method too, or are teaching it, including the University of Tilburg, University of Stockholm, and the University of Malaysia. The e3value core developers published about 120 scientific papers and 8 PhD theses. The software for it has been developed by the VU and the UT. A reference bookavailable, used for undergraduate teaching. The method is taught at several international universities (University of Twente, NTNU Trondheim, University of Toronto).
The e3value methodology has been applied by a number of practitioners (KPMG, The Netherlands, ECN, The Netherlands, SENA, The Netherlands, SINTEF Energy Research, Norway, Fundacion Labein, Spain, IBERDROLA, Spain). The e3value methodology is positioned by Forrester Research as one of the two promising efforts on business modelling. The method is used in many research projects to develop networked business models; including EU funded projects (EC-DG RESEARCH FENIX, EC-IST EU-DEEP, EC-IST project Hydra, EC-IST project IT-AIDE, EC-DGTREN project, EC-IST Obelix, UE 2020 TREsPASS), and national funded projects (NWO VALUE-IT, NWO-COOP, NWO-VITAL).
Dr. Jaap Gordijn is an associate professor at the Department of Computer Science, Vrije Universiteit, Amsterdam and has extensive experience in consultancy and business development. He is the Chief Executive Officer of TVE, leading sales and consultancy management. Email him at email@example.com
Dan Ionita is a postdoc at the University of Twente, specializing in the analysis of online fraud. He is the Chief Technical officer of TVE, leading software development and technology management. Email him at firstname.lastname@example.org
Prof. Dr. Roel Wieringa is Chair of Information Systems at the University of Twente. He has extensive experience working with companies to do solve practical problems using design research. He is Chief Operations Officer at TVE, leading research & development, and managing courses. E-mail him at email@example.com