Workflow in the Web
Peter J. Denning
George Mason University
3/18/96
© Copyright 1996 by Peter J Denning and Future Strategies, Inc.
This work appeared as a chapter of the book New
Tools for New Times: Electronic Commerce, Layna Fischer, Ed., Future
Strategies, Inc. (1996), 45-57. You may make one hard copy of
this document for your personal
use only. Any other copying, storage, or use for any purpose and in any
form requires permission.
The Coming
In 1985, the Internet was a collection of networks connected by gateways
with a common protocol that allowed about 10,000 host computers to exchange
email, transfer files, and remotely log in. Most of the communications and
many of the host computers were paid for by government; the Internet was
used exclusively for education, research, and government communications.
Scarcely anyone imagined that, ten years later, the networks would be open
for commerce, that Internet would be a household word, that people would
routinely show their email addresses on their business cards, that desktop
operating systems would include World Wide Web browsers, that home computers
would be part of Internet, that advertisements in newspapers or TV would
carry "http" addresses, or that it could be profitable to operate
a business to help other companies set up "web presences".
Yet this is exactly what happened. No one knows how large the Internet is
any more; estimates at the start of 1996 placed it at approximately 10 million
computers and 50 million users -- and growing at 30-50% per year A quarter
of those computers are in commercial firms. O'Reilly & Associates said in
March 1996 that 51% of large companies and 25% of medium companies have
Internet access; they expected that by 1997 these numbers would rise to
65% and 40% respectively. O'Reilly also said that 35% of the large and 20%
of the medium companies had public web sites. Meanwhile, investors drove
Netscape stock from an initial opening of around $15 to over $150 in three
months in 1995, and CyberCash from a similar start to $50 in one week in
1996. The Internet is hot.
Business people are attracted to the promise of the Internet, which can
expand their reaches in many ways. With the Internet, it is said, you can
advertise to the world at lower cost than the local newspaper, you can be
your own publisher without a middleman, you can lower your advertising budget,
you can set up a mall without getting permission from a zoning board, you
can accommodate many visitors to your mall without a large sales force,
you can create a market niche too small for your local neighborhood but
sustainable in the "global village," you can cross time zones
and language barriers at will, and in doing all this you hardly pay more
for a call to the other side of the world than to next door.
"Electronic commerce" has become a popular term for carrying out
these and other business functions in the Internet. A host of Internet technologies
make this all feasible: self-publication of Web pages, attaching order forms
to Web pages, electronic mail, payment systems, digital cash, and powerful
search engines that will find anything advertised in the Web. Worried about
information overload, or about finding anything, or about being found? AltaVista
Search at http://www.altavista.digital.com will find any Web page for you.
"Knowbots" -- a technology of knowledge-seeking robots that scour
the Web locating information to answer a question you posed -- are just
over the horizon. Worried about quality? Look for Magellan 3-start and 4-star
sites and watch for other organizations to issue their own seals of approval.
George Gilder describes as the "law of the telecosm" the phenomenon
that network bandwidth is following computer chips into being so cheap as
to be wasteable, pushing computing power away from centralized locations
into the hands of individuals. The Clinton administration has been pushing
hard to make the Internet hospitable for business, sometimes running afoul
of the cowboys and vigilantes who have come to believe that no laws should
apply in cyberspace. By pushing for the Internet in every classroom, the
Clinton administration is guaranteeing a new generation of networking-literate
young adults. There is no turning back the clock on Internet.
Most of those companies cited by O'Reilly have used the Web only for publications
such as catalogs, brochures, and bug fixes. Those who invite customers to
order electronically find most customers are wary of paying by Internet.
A growing number are experimenting with "intranets" -- private
company networks embedded in the Internet, using full Internet tool sets,
but sealed off from casual access behind firewalls. They still do not dare
to place proprietary information on servers attached to Internet, for they
rightly fear for the theft of their information. Few companies have begun
to use these tools for full-scale business operations within the Internet.
They have good reasons.
The Darker Side
As soon as a company starts to look into the engineering, social, and legal
problems associated with electronic commerce, it is likely to uncover a
host of vexing problems for which no good solutions yet exist. A list of
the most important appears below. All the items on this list exhibit an
interplay between social and business practice and the technology. The ones
stated first have the strongest technology components.
1) Web an open publication medium. The protocols of the World Wide
Web are designed for people who want to freely publish and distribute information.
The server on your host that interfaces the Internet to your computer can
read any directory not marked private by its owner. All the files you want
to publish on the Web must be marked world readable. Files you don't want
to publish but which must be used by your Web browser -- such as files of
passwords for access to certain Web pages -- must also be world readable!
These design assumptions are incompatible with the private company intranet,
which is part of the reason that implementing secure intranets using Web
technology has been so difficult.
2) Security vulnerabilities. The popular Netscape browser has been
the subject of a stream of official security advisories. In 1995, the encryption
algorithm (used to protect credit card numbers during a financial transaction)
was found to be crackable; Netscape quickly issued a patch. Netscape allows
you to download automatically, from another Web site, programs in the Java
language -- but as of March 1996 does not let you prevent that program either
from reading any of your files and sending their contents to someone on
another web site, or from installing Trojan horse files on your computer.
Netscape aside, many local computer access controls can be subverted if
another machine can pretend to have the Internet address of a machine you
trust (a problem called "IP address spoofing"). Most email systems
can be tricked into showing a return address different from the actual sender.
There are packages of "Internet burglar tools" regularly used
by crackers to cover their tracks and create trap doors to expedite their
future re-entries.
3) Encryption. Modern encryption technology offers a host of protocols
from authentication to privacy. Very few people routinely use these technologies.
Companies that use them to protect proprietary data can quickly find themselves
in deep trouble if they lose the encryption keys; they are turning to key
escrow systems as a means of retrieving copies of the keys in case of emergencies.
Privacy advocates are challenging key escrow systems because they fear that
the government (or the companies) can obtain keys illicitly and listen in
on private conversations. Law enforcement agencies are worried that encryption
will cut off their ability to legally wiretap conversations between suspected
criminals; however, government attempts to regulate encryption create sharp
conflicts with privacy advocates.
4) Signatures and certifications of documents. There are cryptographic
protocols to sign email, documents, and files unforgeably; with digital
signatures, any recipient can quickly tell whether the document has been
tampered with or validate whether you are the author. There is still little
legal precedent and business practice for electronically signed documents.
5) Viruses. It is easy for a virus to enter your computer surreptitiously
on a floppy disk you had briefly inserted into another computer. When activated,
the virus can infect other programs and floppy disks and can set off logic
bombs that damage your files long after the infection. More recently, a
new feature of Microsoft Word 6.0 -- the automatic macro -- can transmit
viruses in ordinary documents that most virus checkers don't scan.
6) Privacy concerns. New practices enabled by the Internet are being
taken as privacy threats by many consumers. There was a furor in 1995 when
it was discovered that Windows 95 electronic registration form sent system
configuration information to Microsoft without telling the user. Many users
are incensed that many Web sites automatically monitor and log the addresses
of those who visited them. As noted above, downloaded Java programs can
send directory listings from your machine back to their authors and can
often install new files without your knowledge.
7) Disregard for copyrights, licenses, and intellectual property.
Because it is so easy and cheap to copy data in the Internet, many people
routinely copy and distribute files, including licensed software, without
permission of the author. Protocols for "transcopyright" -- automatic
transfer of copyright on payment of a penny or two -- are widely discussed
but are not implemented. A recent proposal by the Clinton administration
to extend existing copyright law to the Internet has been fiercely opposed
by groups who think that large corporations will be the primary beneficiaries,
and who want to preserve the lassez-faire copying practices of the Internet.
8) Frauds. It is easy to "spoof" an email return address
-- i.e., make the from field on an email you sent look like it actually
came from someone else. This flaw in the mailer protocols is frequently
used by pranksters to impersonate the boss, the president, or others whom
they are trying to embarrass. It is also used by harrassers to hide their
identities.
9) Spamming. A user can flood a site with thousands of messages,
or can blanket a large mailing list with a single message. In a recent incident,
someone spammed thousands of LISTSERVs -- servers that automatically manage
discussion groups -- by subscribing third parties without their knowledge.
Those victims started receiving hundreds of unwanted messages a day and
had considerable difficulty unsubscribing from all those LISTSERVs.
10) Gullibility. We live in an age when many people are (paradoxically)
cynical and gullible at the same time. They will spread rumors like wildfire
through bulletin boards, newsgroups, email, and Web sites -- without checking
or even questioning validity. Many companies fear being put out of business
by packs of "Internet wolves" who believe an allegation and undertake
their own retalitory action.
11) Internet cowboys and vigilantes. There is a surprisingly large
number of Internet denizens who believe that laws ought not to apply in
cyberspace. They perform acts of fraud (which they call harmless pranks)
and sometimes take further actions against those whom they dislike, such
as spamming, badmouthing in newsgroups, making harrassing phone calls in
the middle of the night, or breaking into their systems. Because of the
ease with which one can hide identities in the Internet, few of these people
ever get caught.
12) Tax policies. Many jurisdictions collect sales taxes and income
taxes on transactions involving their residents or merchants. It is an open
question how this will be carried over to the Internet when parties to the
transaction are anonymous or when the transaction did not happen in a locality.
Some people are saying that in the future of the Internet, taxes will be
voluntary.
13) Law enforcement. Modern law enforcement is based on jurisdictions
-- local authorities who will prosecute local infractions. It is still an
open question how to deal with the Internet, where there is often no well-defined
jurisdiction. In a recent case, a resident of Tennessee successfully prosecuted
a Web site proprietor in California for making pornographic materials available
on a Web site that the Tennessean downloaded, in violation of Tennessee
law.
Complexity of Information Systems
These practical issues of operating a business in the Internet generate
many complexities and uncertainties not apparent to the casual observer
of the "promises of electronic commerce." No wonder people get
discouraged and want to wait until some of the problems are solved before
betting their firm on the Internet.
The problem of implementation complexity bears many similarities to an older
problem that organizations have faced for two decades: how to realize a
return on investment on information technology. Against a history of poor
progess toward improved workplace productivity, technologies such as Internet
and Java show up as possible silver bullets whose glitter attracts public
attention. But the question is still the same: how come we've invested in
all that information technology but only have 0 - 1.5% annual productivity
improvement to show for it over the past two decades? From the engineer's
standpoint, the reason is the complexity of the client-server systems that
have been used to automate existing practice; although it's clear we've
automated inefficient processes, it's not clear either how to make those
processes more efficient and how to coordinate databases, clients, software
applications, and Internet access. This is where many groups sink into a
fog and can't figure out what to do next.
The Internet doesn't solve the problem, it worsens it. There are more kinds
of breakdowns that can occur. The Internet's current focus on information
exchange and publishing, rather than coordination, creates a wider gap between
Internet technologies and business process than exists between office systems
and business processes. DARPA (the Defense Advanced Research Projects Agency)
still considers it a research problem to devise technologies to support
collaborative work and the processes of commerce in the Internet.
Designing for Coordination
The current common sense about the marketplace inclines us to think of commerce
as a game of competition between buyers and sellers. It is an information-exchange
game featuring sellers publishing advertisements for buyers, buyers transmitting
orders and payments to sellers, third parties distributing goods and services
from sellers to buyers, and strong competitors knocking off the weak. The
role of the technology is to transmit the relevant information at the various
stages of the game.
The information view of commerce and Internet has been useful as far as
it goes. It has given us many technologies from email to the Web browser.
But this view does not lead to many technologies that support human coordination.
Human acts of coordination do not appear as information transfers and are
not well served by existing Internet technologies. Put another way, the
complexities of making information systems that support business and commerce
arise from the lack of an overall map of the coordinations that the information
technology is supposed to support. What we need is a way ot interpreting
commerce -- a new common sense -- that makes the coordination explicit and
brings it to the center of the design process.
Let us begin by reframing commerce as a game of exchange transactions. Buyers
and sellers engage in transactions to produce mutual value. Their transactions
involve much more than transfers of information -- they involve acts of
coordination such as requests, promises, agreements, satisfaction, and dissatisfaction;
and consequences of past history of transactions on assessments of quality,
trust, and credibility. I suggest that a coordination-centered view of commerce
will allow us to design technologies that pierce the fog of complexity.
The first question is, what is the (universal) nature of the coordination
in commerce? The answer to this question is found in the linguistic structure
of the exchange transction and their interconnections as business processes.
The second question is, what kinds of technologies do we need to support
that coordination and avoid the breakdowns?
The Exchange Transaction
The molecular building block of commerce is the exchange transaction. In
this transaction two parties, C and P, agree to and fulfill mutual conditions
of satisfaction. The first party, C, is usually called the customer or buyer;
the second party, P, is usually called the performer or seller. P accepts
C's request to provide something for C, in exchange for which C will provide
a payment to P. The transction can be visualized as a cycle of four parts:
1) Request: C makes a request of P to provide the service. (Often
this amounts to taking P up on an offer P has made.)
2) Negotiation: C and P come to an agreement on exactly what will
be provided (C's condition of satisfaction) and what payment will be made
(P's condition of satisfaction).
3) Performance: P carries out the actions needed to fulfill his part
of the bargain and notifies C when he is done.
4) Settlement: C accepts P's work, declares it satisfactory, and
pays.
These four segments of transaction are observable by the speech acts that
mark them: C says "I request" in part 1; P says "I agree"
in part 2; P says "I am done" in part 3; and C says "I am
satisfied" in part 4. The speech acts permit an observer (who may be
a machine) to notice when a transaction is changing state. They give a rigorous
basis to track a transaction toward completion.
This is the model devised by Fernando Flores and Terry Winograd to describe
transactions. It has been called ActionWorkflow in the business-process
management systems of Action Technologies, Inc. The same model they invented
for business processes describes commerce. Workflow can be used to map recurrent
commercial processes and support them through technology.
When two people do business "face to face", it is easy for them
to track the transaction and tell that it is moving toward completion. But
when they are separated by a distance and connected by (say) an Internet
connection, there are many opportunities for a breakdown in the loop:
1) Communication breakdowns. Loss or corruption of an email, file,
document, or form anywhere in the transaction; these objects convey speech
acts or record declarations to be fulfilled in the future.
2) Request breakdowns. The format used by C to convey the request
is not recognized by P. C does not make a clear request, e.g., C's hint
or suggestion was not perceived by P as a request.
3) Negotiation breakdowns. P ignores C's request. P says he agrees
to C's conditions when he does not mean to. C and P have different understandings
of what was agreed to. Either C or P lets a negotiation drop without acknowledgement.
4) Performance breakdowns. P does not complete on time. P does not
fufill the agreed conditions. P performs shabby work. P stops work without
informing C. C decides he does not want the job done after all but does
not inform P.
5) Settlement breakdowns. C does not declare satisfaction. P does
not follow up with C. C does not pay. C is dissatisfied and must file a
complaint.
6) Missing-performer breakdowns. C puts the request in an in-basket
over which no one has taken responsibility. C assumes that the firm will
assign a P to work on the task. No one notifies C who P is, even when P
starts work. P is an impostor.
7) Missing-customer breakdowns. B starts doing something for C without
C's having requested it. C is an impostor.
Business Processes
During any segment of a transaction, C or P can make secondary requests
of other people to obtain information or services. For example, suppose
that C needs price information in order to fill out an order form; C's request
to a clerk X initiates a new transction by which X gives C the requested
information. Another example is when P asks for help from another person
Y during the performance segment; in this case, the secondary transaction
has P as customer and Y as performer.
In this way a nonlinear network of transactions can be called into play
in fulfillment of A's original request. That network, called a business
process, accounts for all the people involved in fulfilling a customer request
and the exact conditions of satisfaction each one works toward. The Internet
allows all the participants in a business process to be at different locations,
possibly separated by large distances. It is important for the firm to have
technology that supports them in carrying out the entire process without
breakdown. That means they must have safeguards against each of the coordination
breakdowns listed above.
The ability to refine a transaction by explaining segments as webs of secondary
transactions makes the model hierarchical. We can home in on as fine a level
of detail as necessary by locating anyone else a person must coordinate
with during each stage of a transaction.
Trust
An essential ingredient of the exchange transaction is that the two parties
operate from assessments about each other's trust -- i.e., their competence
to fulfill their part of the bargain and their sincerity in any promises
they make. If either party does not trust the other, the transaction may
fail or won't take place at all. Trust is assumed or is based on statements
of others. It may be built up over a series of transactions, in which case
it leads to repeat business and to word-of-mouth recommendations for more
business.
How does trust work linguistically? We represent the other person by some
kind of symbol and associate our assessments of trust with that symbol.
The symbol may be the person's face or body shape in a face-to-face transaction;
or the person's voice in a telephone transaction; or the person's handwriting
in a fax transaction. As soon as we recognize the face, the voice, or the
signature, we immediately recall the trust we have in the person. In these
everyday cases, we take for granted the reliability of the association between
the symbol and the person on the other side of a transaction. It is conceivable,
but usually unlikely, that a stranger will disguise himself as a trusted
customer in appearance, voice, or handwriting. In the Internet, the only
symbol of the other person is the notoriously unreliable return address
in an email.
Engineers use the term authentication to refer to the problem of associating
a person with a symbol. The symbol is then used to mark roles in transactions.
If this cannot be done reliably, trust in Internet transactions will be
low and commerce will falter.
Encryption is the principal technology that can be used to authenticate
a person or a document authored by a person across a long distance Internet
link. Even if privacy and secrecy were of no concern to anyone, the need
for reliable authentication would drive the development of encryption technology.
It is astonishing that this simple truth about human coordination is missing
from the basic architecture of Internet protocols. If human coordination,
rather than information exchange, had been at the center of attention of
protocol designers, it would be exceedingly difficult today to spoof an
email or Internet address or to forge a signature on a document. Authentication,
rather than secrecy, would be the primary reason for encryption technology.
Technologies in Support of Commerce
The single most important technology for Internet commerce is authentication.
It should be virtually impossible for a person to pretend to be someone
else when logging in to a system. It should be virtually impossible for
a third party to alter email addresses, digital signatures, or the content
of any document without detection. It should be virtually impossible for
someone to fake the Internet address of a computer when connecting to another
computer in the Internet. These technologies are known, they just are not
used much in practice. I think this is because designers have tended to
see the role of the Internet as a conveyor of information rather than a
facilitator of coordination; consequently they paid more attention to encryption
as a source of secrecy.
As the next most important group of technologies for commerce, I put those
that facilitate coordination. These usually are grouped under the heading
of workflow systems, cooperative work systems, conversation-tracking email
systems, or coordination systems. Their purpose is always to enable the
participants in transactions or business processes to know exactly the state
of the transaction at any given moment and how far from completion it is.
The same technologies can enable data collection that can be used to guide
future process improvements. These technologies are inttimately related
to the firm's ability to deliver customer satisfaction and guarantee quality
at every stage of a process.
Third, I put techologies for payments. Without them half of most exchange
transactions could not be successfully implemented. I place them third because
without authentication and coordination payments would not be possible.
Fourth, I put technologies that ensure the integrity of the Internet itself,
the medium for all transactions. These include technologies for detecting
criminal acts, resisting viruses, and recovering from computer and connection
failures.
Fifth, I put technologies that support particular kinds of transactions
such as financial, order-entry, sales, and other applications. These technologies
are built on top of the others mentioned above and directly support the
practices of people operating in various domains.
Conclusions
The model of coordination systems provides the night vision needed to pierce
the fog. Workflow mapping helps the information system engineers, and the
workers themselves, to see how to select software application packages needed
to match their practices, how to see the overall process, how to see where
information systems couple with people, and how to measure the coordination
taking place throughout the organization. Workflow management systems, which
can coordinate all the system elements and people they need in their processes,
will be especially important to maintain customer satisfaction and service
quality at every step of the way.