Information and Knowledge Management using ArcGIS ModelBuilder
Information and Knowledge Management using ArcGIS ModelBuilder
Information and Knowledge Management using ArcGIS ModelBuilder
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Proceedings<br />
of the<br />
5th European Conference<br />
on <strong>Information</strong><br />
<strong>Management</strong> <strong>and</strong><br />
Evaluation<br />
Università dell'Insubria<br />
Como<br />
Italy<br />
8-9 September 2011<br />
Walter Castelnovo <strong>and</strong> Elena Ferrari,<br />
Centre for <strong>Knowledge</strong> <strong>and</strong> Services <strong>Management</strong><br />
University of Insubria, Varese/Como, Italy
Copyright The Authors, 2010. All Rights Reserved.<br />
No reproduction, copy or transmission may be made without written permission from the individual authors.<br />
Papers have been double-blind peer reviewed before final submission to the conference. Initially, paper<br />
abstracts were read <strong>and</strong> selected by the conference panel for submission as possible papers for the<br />
conference.<br />
Many thanks to the reviewers who helped ensure the quality of the full papers.<br />
These Conference Proceeding have been submitted to the Thomson ISI for indexing.<br />
Further copies of this book can be purchased from http://academic-conferences.org/2-proceedings.htm<br />
ISBN: 978-1-908272-12-6 Book<br />
Published by Academic Publishing Limited<br />
Reading<br />
UK<br />
44-118-972-4148<br />
www.academic-publishing.org
Contents<br />
Paper Title Author(s) Page<br />
No.<br />
Preface v<br />
Biographies of Conference Chairs, Programme Chair,<br />
Keynote Speaker <strong>and</strong> Mini-track Chairs<br />
Biographies of contributing authors viii<br />
<strong>Information</strong> <strong>and</strong> <strong>Knowledge</strong> <strong>Management</strong> Using<br />
<strong>ArcGIS</strong> <strong>ModelBuilder</strong><br />
System Integration Model Based on Open Source<br />
Software (Oss)<br />
Building Virtual Communities on top of Online Social<br />
Networks<br />
Benchmarking <strong>Information</strong> <strong>Management</strong> Practice <strong>and</strong><br />
Competence in Swedish Organizations<br />
Developing a Model for Assessing IT Competency of<br />
Managers<br />
Investigating the Relationship of Managers’ IT<br />
Competency <strong>and</strong> IT Projects’ Risks<br />
Evaluation of ICT Investment in Healthcare: Insights<br />
<strong>and</strong> Agenda for Future Research<br />
The Uses of Business Outcomes for IT Benefit<br />
Identification at the Ex-Ante Justification Stage<br />
Data Governance in Practice: The SME Qu<strong>and</strong>ary<br />
Reflections on the Reality of Data Governance in the<br />
Small to Medium Enterprise (SME) Sector<br />
Towards a Framework for the Evaluation of Mobile<br />
Payments Integration<br />
Social Computing Tools for Inter-Organizational Risk<br />
<strong>Management</strong><br />
Embedding Human Values Into <strong>Information</strong> System<br />
Engineering Methodologies<br />
Evaluating the Role <strong>and</strong> Potential of Internet Banking:<br />
The Creditis Experience<br />
João Agrela, Leonor Esteves, Jorge<br />
Ferreira <strong>and</strong> Óscar Antunes<br />
Kamsuriah Ahmad 1 , Azwan<br />
Mohamed 1 <strong>and</strong> Reduan Samad<br />
Cuneyt Gurcan Akcora, Barbara<br />
Carminati <strong>and</strong> Elena Ferrari<br />
Karen Anderson, Göran<br />
Samuelsson<strong>and</strong> Marie Morner<br />
Jansson<br />
Mohammad Abooyee Ardakan,<br />
Hamed Majidi Zolbanin <strong>and</strong> Ali<br />
Khaleghi<br />
Mohammad Abooyee Ardakan, Babak<br />
Sohrabi <strong>and</strong> Vahid Saadat<br />
Arviansyah, Egon Berghout <strong>and</strong><br />
Chee-Wee Tan<br />
vi<br />
1<br />
13<br />
19<br />
28<br />
37<br />
43<br />
53<br />
Dawit Asmelash 65<br />
Carolyn Begg <strong>and</strong> Tom Caira 75<br />
Fergal Carton et al 84<br />
Walter Castelnovo 92<br />
Sunil Choenni, Peter van Waart<strong>and</strong><br />
Geert de Haan<br />
101<br />
Renata Paola Dameri 109<br />
ICT <strong>and</strong> PA: A Marriage Made in Heaven? Maria Concetta De Vivo, Alberto<br />
Polzonetti <strong>and</strong> Pietro Tapanelli<br />
SMEs <strong>and</strong> IT: A Market for Lemons? Jan Devos, Hendrik Van L<strong>and</strong>eghem<br />
<strong>and</strong> Dirk Deschoolmeester<br />
Authenticity of Digital Records: An Archival<br />
Diplomatics Framework for Digital Forensics<br />
A Reflective Framework for Successful IS<br />
Implementation in Healthcare: Applying Theories<br />
From IS Innovation <strong>and</strong> Implementation Research<br />
The Effectiveness of EBSE in Modifying Professional<br />
Practice – an Experimental Protocol <strong>and</strong> Study<br />
i<br />
119<br />
126<br />
Luciana Duranti <strong>and</strong> Adam Jansen 134<br />
Kate Dymoke-Bradshaw <strong>and</strong> Ann<br />
Brown<br />
140<br />
Graham Fletcher <strong>and</strong> Marie Cahillane 148
Paper Title Author(s) Page<br />
No.<br />
How Open Source Software Products: Can Support<br />
Teaching in Italian Schools<br />
Chiara Friso, Valentina Lenarduzzi,<br />
Davide Taibi <strong>and</strong> Davide Tosi<br />
Cyber University - a Future for Online Education Yuwanuch Gulatee <strong>and</strong> Barbara<br />
Combes<br />
Managing Costs <strong>and</strong> Performance of <strong>Information</strong><br />
Technology in a Group Context – Current Challenges<br />
for Multinational Enterprises<br />
157<br />
166<br />
Florian Hamel et al 174<br />
Distributed Working Pictures Martin Hill, John Salt <strong>and</strong> Graham<br />
Fletcher<br />
Transforming <strong>Information</strong> to <strong>Knowledge</strong> is the Current<br />
Platform for a Successful Political Campaign<br />
Theoretical Discussion: Green IT <strong>and</strong> its Development<br />
in South Africa<br />
182<br />
Vered Holzmann <strong>and</strong> Ben Holzmann 189<br />
Grant Howard <strong>and</strong> Sam Lubbe 196<br />
Evaluating ICT Based Services for Older Users Minna Isomursu <strong>and</strong> Marja Harjumaa 205<br />
The Geography of Criminality - <strong>Information</strong> <strong>and</strong> GIS<br />
Models for Decision Support<br />
Mobile Virtual Network Operator <strong>Information</strong> Systems<br />
for Increased Sustainability in Utilities<br />
<strong>Management</strong> of <strong>Information</strong> Systems Outsourcing:<br />
Evaluation of Lessons Learned From a Boundary<br />
Spanning Perspective<br />
A Fair Partnership Model by Sharing the Benefit of<br />
<strong>Knowledge</strong> Creation<br />
Measuring the Effectiveness of National <strong>Knowledge</strong><br />
Based Economy<br />
Empirical Study on IT Productivity in eGovernment in<br />
Korea<br />
Impact of Inter Organizational Networks on Adoption<br />
Process of <strong>Information</strong> Technology<br />
Portfolio <strong>Management</strong> in Non-Profit Organizations:<br />
The Case of Groningen’s Municipality<br />
Paulo João, Jorge Ferreira <strong>and</strong> José<br />
Martins<br />
Hallur Leivsgarð Joensen <strong>and</strong> Torben<br />
Tambo<br />
213<br />
225<br />
Björn Johansson <strong>and</strong> Linda Bergkvist 234<br />
Ghassan Kbar 243<br />
Ghassan Kbar <strong>and</strong> Abdul Aziz<br />
AlDusari<br />
250<br />
Dong-Hyun Kim <strong>and</strong> Hyun-Joo Kim 258<br />
Erdem Kirkbesoglu <strong>and</strong> Gizem<br />
Ogutcu<br />
264<br />
Bert Kleersnijder <strong>and</strong> Egon Berghout 271<br />
Why is an IS Project Late? – A Case Study Juha Kontio 279<br />
Research on Performance Review Model for National<br />
Database Project<br />
Multi-Scope Evaluation of Public Administration<br />
Initiatives in Process Automation<br />
eBusiness Model Design <strong>and</strong> Evaluation: The Pieces<br />
Make the Puzzle<br />
Using Goal Modelling to Evaluate Goals for eService<br />
Development in Government<br />
Alignment in Enterprise Architecture: Investigating the<br />
Aspects of Alignment in Architectural Approaches<br />
eCitizen Satisfaction: The Case of eGovernment<br />
Websites<br />
Underst<strong>and</strong>ing the Impact of <strong>Knowledge</strong> Sharing in<br />
Organisations: A Case Study<br />
ii<br />
Misoo Kwon 288<br />
Luigi Lavazza 294<br />
Monika Magnusson 303<br />
Monika Magnusson <strong>and</strong> Marie-<br />
Therese Christiansson<br />
Thanos Magoulas, Aida Hadzic, Ted<br />
Saarikko <strong>and</strong> Kalevi Pessi<br />
312<br />
321<br />
Panagiotis Manolitzas et al 332<br />
Magdeline Mashilo <strong>and</strong> Tiko Iyamu 341
Paper Title Author(s) Page<br />
No.<br />
Contextual Inquiry into Business Requirements<br />
Elicitation of Indigenous Enterprise: A Case of the<br />
Malaysian Batik Microenterprise<br />
HOT-fit Evaluation Framework: Validation Using Case<br />
Studies <strong>and</strong> Qualitative Systematic Review in Health<br />
<strong>Information</strong> Systems Evaluation Adoption<br />
Remembering <strong>and</strong> Recalling: The ERP System as an<br />
Organizational Memory<br />
Environmental Scanning Practice of Enterprise 50:<br />
Small Medium Enterprise (E50 SMEs) in Malaysia<br />
Underst<strong>and</strong>ing Financial <strong>and</strong> non-Financial<br />
<strong>Information</strong> to Assess Listed Johannesburg Stock<br />
Exchange (JSE) Companies’ Performances<br />
Designing a Model for Evaluating the <strong>Information</strong><br />
Technology Level in Organizations by Fuzzy TOPSIS<br />
Nor Laila Md Noor <strong>and</strong> Ariza Nordin 350<br />
Maryati Mohd Yusof 359<br />
Gunilla Myreteg 366<br />
Roslina Othman <strong>and</strong> Siti Rohimi<br />
Hamedon<br />
Elmarie Papageorgiou <strong>and</strong> Herman<br />
de Bruyn<br />
Shabnam Pas<strong>and</strong>ide, Abbas Toloie<br />
Eshlaghi, <strong>and</strong> Reza Radfar<br />
Can eGovernment Systems Bridge the Digital Divide? Elias Pimenidis, Lazaros Iliadis, <strong>and</strong><br />
Christos Georgiadis<br />
Contributions to the Measurement <strong>and</strong> <strong>Management</strong><br />
of Intellectual Capital – an Accounting Perspective<br />
Executive <strong>Information</strong> Systems (EIS) Implementation<br />
for Education <strong>Management</strong> – a Conceptual<br />
Framework<br />
Rui Alex<strong>and</strong>re Pires <strong>and</strong> Maria do Céu<br />
Gaspar Alves<br />
Rozilawati Razali <strong>and</strong> Mahamsiatus<br />
Kamaruddin<br />
The ISD Process as a Live Routine David Sammon, Tadhg Nagle <strong>and</strong><br />
John McAvoy<br />
Using Geographic <strong>Information</strong> to Assess Urban<br />
Environmental Indicators in the City of Lisbon<br />
Reflections on the Role of the Lecturer as Teacher,<br />
Researcher <strong>and</strong> Mentor in a Project-Based Approach<br />
for IS/IT Majors at Three Different Academic<br />
Institutions<br />
Teresa Santos, Ségio Freire <strong>and</strong> José<br />
António Tenedório<br />
Elsje Scott, Peter Weimann <strong>and</strong> Nata<br />
van der Merwe<br />
Enterprise <strong>Information</strong> Systems of new Generation Elena Serova 452<br />
Post-ERP Feral System Taxonomy: A Manifestation<br />
From Multiple Case Studies<br />
Open Source Disease Control Software Development:<br />
The Role of Patients<br />
Value of <strong>Knowledge</strong> <strong>Management</strong> Systems: A Review<br />
Paper<br />
Sharina Tajul Urus, Alemayehu Molla<br />
<strong>and</strong> Say Yen Teoh<br />
Accountability <strong>and</strong> the Reconstruction of the Past Geert-Jan van Bussel<br />
HvA Amsterdam<br />
The Question of Selecting Appropriate Methodics of<br />
an ERP System Implementation in Life&Science<br />
Enterprises as an Important Factor of a Project’s<br />
Success Based on the Example of Polish Experiences<br />
373<br />
383<br />
394<br />
403<br />
411<br />
420<br />
428<br />
436<br />
443<br />
458<br />
Jose Teixeira <strong>and</strong> Reima Suomi 467<br />
Nelly Todorova 475<br />
483<br />
Bartosz Wachnik 491<br />
PhD Research Papers 501<br />
<strong>Information</strong> Systems for Production Planning <strong>and</strong><br />
Scheduling <strong>and</strong> Their Impact on Business<br />
Performance<br />
iii<br />
Denisa Ferenčíková 503
Paper Title Author(s) Page<br />
No.<br />
An Evaluation of web Services Proxies Solutions Antonio Hidalgo L<strong>and</strong>a, Ian Owens<br />
<strong>and</strong> Graham Fletcher<br />
Enhancing the Success of Electronic Schools in the<br />
Kenyan Context<br />
The Specification of Competency Questions: An<br />
Ontological Support to Match Business Processes, IT<br />
<strong>and</strong> Competences of Professionals<br />
The Balanced Scorecard <strong>and</strong> its Practical Applications<br />
in Oracle Balanced Scorecard<br />
Challenges in Business Case Development <strong>and</strong><br />
Requirements for Business Case Frameworks<br />
The Relation Between Dynamic Business Models <strong>and</strong><br />
Business Cases<br />
Evaluation of Error <strong>Management</strong> in Health <strong>Information</strong><br />
Systems: A Review<br />
Hesbon Nyagowa, Dennis Ocholla<br />
<strong>and</strong> Stephen Mutula<br />
510<br />
520<br />
Yadary Ortega-González et al 531<br />
Michal Pivnička 540<br />
Bart-Jan van Putten, Franziska<br />
Brecht, <strong>and</strong> Oliver Günther<br />
Bart-Jan van Putten<strong>and</strong> Markus<br />
Schief<br />
Mohamad Norzamani Sahroni <strong>and</strong><br />
Maryati Mohd Yusof<br />
Non Academics papers 577<br />
<strong>Management</strong> of Waiting List for Surgery <strong>Information</strong><br />
System<br />
553<br />
562<br />
570<br />
Rita Cristóvão <strong>and</strong> Pedro Gomes 579<br />
Work in Progress papers with Posters 593<br />
<strong>Information</strong> <strong>Management</strong> Enabling Collaborative oak<br />
Tree Population Care: How to Define <strong>and</strong> Initiate a<br />
Change <strong>Management</strong> Process in a Local Community<br />
in Sweden<br />
Motivations in Virtual Communities: A Literature<br />
Review<br />
An Enterprise Ontology Approach for Defining<br />
Enterprise <strong>Information</strong> Architecture<br />
Review of Lean Method Application for Improvement<br />
in Health <strong>Information</strong> Systems<br />
National Ict Strategy <strong>and</strong> its Implementation In<br />
Building <strong>Information</strong> Society in Albania<br />
A Bottom-Up Approach for the Representation <strong>and</strong><br />
Continuous Update of Technology Architectures<br />
iv<br />
Maria Bergenstjerna 595<br />
Giovanni Camponovo 598<br />
Bernardo Gomes, André Vasconcelos<br />
<strong>and</strong> Pedro Sousa<br />
Soudabeh Khodambashi <strong>and</strong> Maryati<br />
Mohd Yusof<br />
Ermelinda Kordha <strong>and</strong> As. Kozeta<br />
Sevrani<br />
João Soares, José Tribolet <strong>and</strong> André<br />
Vasconcelos<br />
609<br />
616<br />
619<br />
622
Preface<br />
The 5th European Conference on <strong>Information</strong> <strong>Management</strong> <strong>and</strong> Evaluation (ECIME) is hosted this year by<br />
Dipartimento di Informatica e Comunicazione, Università dell'Insubria, Como, Italy. The Conference Chair is<br />
Professor Walter Castelnovo from the University of Insubria <strong>and</strong> the Programme Chair is Professor Elena<br />
Ferrari also from the University of Insubria.<br />
ECIME aims to bring together individuals researching <strong>and</strong> working in the broad field of information<br />
management, including information technology evaluation. We hope that this year’s conference will provide<br />
you with plenty of opportunities to share your expertise with colleagues from around the world.<br />
This year’s opening keynote address will be delivered by Dr. Linamara Rizzo Battistella, from São Paulo<br />
State Secretary for the Rights of the Person with Disability, Brazil on the topic of “ICT for Social Inclusion <strong>and</strong><br />
Equal Opportunities”, <strong>and</strong> on the second day we have Alberto Sanna, from e-Services for Life & Health<br />
Director, Scientific Institute San Raffaele, Milano, Italy, talking about “Smart ICT’s for Wellbeing:<br />
Personalised e-Services for Life <strong>and</strong> Health”.<br />
ECIME 2011 received an initial submission of 164 abstracts. After the double-blind peer review process 74<br />
papers have been accepted for these Conference Proceedings. These papers represent research from<br />
around the world, including Australia, Albania, Belgium, Canada, Cuba, Czech Republic, Denmark, Finl<strong>and</strong>,<br />
Germany, Greece, Iran, Irel<strong>and</strong>, Israel, Italy, Kenya, Malaysia, New Zeal<strong>and</strong>, Pol<strong>and</strong>, Portugal, Republic of<br />
Korea, Russia, Saudi Arabia, South Africa, South Korea,Sweden, Switzerl<strong>and</strong>, Thail<strong>and</strong>, The Netherl<strong>and</strong>s,<br />
Turkey,<strong>and</strong> the United Kingdom.<br />
We wish you a most interesting conference.<br />
Professor Elena Ferrari,<br />
University of Insubria, Como, Italy<br />
Programme Chair<br />
September 2011<br />
v
Biographies of Conference Chairs, Programme Chairs <strong>and</strong><br />
Keynote Speakers<br />
Conference Chairs<br />
Programme Chairs<br />
Professor Walter Castelnovo is Assistant Professor of <strong>Information</strong> Systems <strong>and</strong><br />
Organisation at the University of Insubria (Italy). His research interests concern<br />
technological <strong>and</strong> organizational innovation in Public Administration <strong>and</strong><br />
Interorganisational <strong>Information</strong> Systems. He is a member of the Department of<br />
Institutional Reforms, E-Government <strong>and</strong> Institutional Federalism of the Association of<br />
the Municipalities of Lombardia (Italy).<br />
Professor Elena Ferrari is professor of Computer Science at the University of<br />
Insubria. Her research activities are related to various aspects of data<br />
management systems, including web security, access control <strong>and</strong> privacy,<br />
multimedia databases, <strong>and</strong> temporal databases. On these topics she has<br />
published more than a hundred scientific publications in international journals <strong>and</strong><br />
conference proceedings. She has served as Programme Chair <strong>and</strong> Programme<br />
Committee member of several international conferences She is in the Editorial<br />
Board of the VLDB Journal <strong>and</strong> the International Journal of <strong>Information</strong><br />
Technology (IJIT), is a member of the ACM <strong>and</strong> a senior member of IEEE.<br />
Keynote Speakers<br />
Dr. Linamara Rizzo Battistella is currently State Secretary for the Rights of the<br />
Person with Disability in the São Paulo State Government, Brazil. She is also (until<br />
2012) the Honorary President of the International Society of the Physical <strong>and</strong><br />
Rehabilitation Medicine (ISPRM) <strong>and</strong> Professor at the Medicine School of the<br />
University of São Paulo. From 2008-2010 she was a member of the Board of<br />
Governors of Brazilian Association of Physical Medicine <strong>and</strong> Rehabilitation (ABMFR).<br />
Linamara has 149 articles published in periodicals, 8 published or organised books<br />
<strong>and</strong> 42 published book chapters to her credit..<br />
Alberto Sanna graduated in Nuclear Engineering at Politecnico di Milano. He has<br />
been involved in healthcare process re-engineering projects in the Scientific Institute<br />
San Raffaele since 1989, being in charge of several automation projects, designing<br />
<strong>and</strong> realizing robotic work cells for Patient- <strong>and</strong> Operator-safety critical processes.<br />
Since 2002 he is director of the e-Services for Life <strong>and</strong> Health Unit .He has presented<br />
his research activities in more than 90 international congresses, <strong>and</strong> conducts<br />
interdisciplinary teaching activities in <strong>Information</strong> Technology <strong>and</strong> Italian Design<br />
Courses <strong>and</strong> Masters. He is an author of edutainment videogames <strong>and</strong> inventor of<br />
patents & trademarks in the field of innovative technologies for health.<br />
Mini Track Chairs<br />
Dr Erik Borglund has a PhD in computer <strong>and</strong> system science <strong>and</strong> is one of four<br />
senior researchers at the archival <strong>and</strong> information managagement school of Mid<br />
Sweden University. Erik is a senior lecturer in archival science <strong>and</strong> information science<br />
at Mid Sweden University, <strong>and</strong> his main research interests are digital recordkeeping,<br />
archival systems, document management, information systems in crisis management,<br />
information systems design <strong>and</strong> Computer Supported Cooperative Work.<br />
vi
Dr Jorge Ricardo da Costa Ferreira is an assistant professor at the Geography <strong>and</strong><br />
Regional Planning Department, Faculty of Social Sciences <strong>and</strong> Humanities (FCSH).<br />
His PhD in Geography <strong>and</strong> Regional Planning - New Technologies in Geography -<br />
deals with "The Geography of <strong>Information</strong> Society in Portugal" <strong>and</strong> presents a new<br />
approach to the diffusion of information <strong>and</strong> creation of knowledge for territorial<br />
management. He develops its research activities in e-Geo, Centro de Estudos de<br />
Geografia e Planeamento Regional, a R&D unit with Government annual funding within<br />
the University. His main research interests focus on "Geography of <strong>Knowledge</strong><br />
Society" <strong>and</strong> “Geographical <strong>Information</strong> Technologies". He is the author of several publications including<br />
chapters in books <strong>and</strong> articles <strong>and</strong> he has published in several national <strong>and</strong> international conference<br />
proceedings. Jorge Ferreira also regularly advises graduate students (Masters <strong>and</strong> PhD) at FCSH.<br />
Dr Luigi Lavazza is associate professor at the Università degli Studi dell'Insubria in<br />
Varese, Italy. His research interests include: empirical software engineering, model<br />
based development of real-time software, <strong>and</strong> requirements engineering. He is<br />
coauthor of over 100 scientific papers. With Dr S<strong>and</strong>ro Morasca, he is leading the<br />
activity concerning trustworthiness of Open Source Software in the EU QualiPSo<br />
project.<br />
Dr S<strong>and</strong>ro Morasca is Professor of Computer Science at the Università degli Studi<br />
dell'Insubria. His research interests include Empirical Software Engineering,<br />
Specification of Concurrent <strong>and</strong> Real-time Software Systems, Software Verification,<br />
<strong>and</strong> Open Source Software. He has published about 90 scientific papers on these<br />
topics. With Dr Luigi Lavazza, he is leading the activity concerning the trustworthiness<br />
of Open Source Software in the EU QualiPSo project.<br />
Danilo Piaggesi is Managing Director of the Fondazione Rosselli Americas (FRA) <strong>and</strong> a<br />
member of Fondazione Rosselli’s Board. FRA focuses on <strong>Knowledge</strong> Society, ICT <strong>and</strong><br />
innovation for development. One of the major programs of FRA is the IKEP<br />
(International <strong>Knowledge</strong> Economy Program) working with multi <strong>and</strong> bi-lateral<br />
cooperation to support development projects where ICT, innovation <strong>and</strong> the principles of<br />
the <strong>Knowledge</strong> Economy can be instrumental for achieving socio-economic growth. Mr.<br />
Piaggesi holds a Master‘s degree in Physics with a diploma in geophysics, cum laude,<br />
from the University of Rome <strong>and</strong> an Executive International Business Certificate from<br />
Georgetown University/John Cabot University, in Washington D.C <strong>and</strong><br />
in Rome<br />
Dr Elena Serova is a senior lecturer <strong>and</strong> Deputy Head of <strong>Information</strong> Technologies at<br />
the Graduate School of <strong>Management</strong> of St Petersburg State University, Russia. Her<br />
research interests include <strong>Information</strong> – the technological resources of Russian<br />
Economy; Managing <strong>and</strong> Using <strong>Information</strong> System. A Strategic Approach; Enterprise<br />
<strong>Information</strong> Systems. Marketing <strong>Information</strong> Systems; CRM; Business Process<br />
<strong>Management</strong>; <strong>Information</strong> <strong>Management</strong> <strong>and</strong> Computer modeling for Business<br />
Solutions. She has co-authored a book <strong>and</strong> contributed chapters to several books <strong>and</strong><br />
collections of essays.<br />
vii
Biographies of contributing authors (in alphabetical order)<br />
Mohammad Abooyee Ardakan is an assistant professor at Faculty of <strong>Management</strong>, University of Tehran.<br />
His major interests are strategic management <strong>and</strong> IT planning. He has instructed different courses on<br />
strategic planning, strategic management, business research methods, IS design <strong>and</strong> evaluation. He is also<br />
a consultant to several high rank Iranian companies in the field of strategic management.<br />
Joao Agrela is enrolled in the Master’s Degree in L<strong>and</strong> <strong>Management</strong> at the Department of Geography <strong>and</strong><br />
Regional Planning, Universidade Nova de Lisboa. He is also a Collaborator at the e-GEO Research Centre<br />
for Geography <strong>and</strong> Regional Planning, researching in the area of Territory, Environment <strong>and</strong> Development,<br />
<strong>and</strong> is a GIS professional at Municipia, Cartography <strong>and</strong> <strong>Information</strong> Systems<br />
Kamsuriah Ahmad is a Senior Lecturer at the Faculty of <strong>Information</strong> Science <strong>and</strong> Technology at the<br />
Universiti Kebangsaan Malaysia (UKM). Her current research interests are database management systems<br />
<strong>and</strong> intelligent systems. Dr. Kamsuriah received her doctorate in Database <strong>Management</strong> System from the<br />
Universiti Putra Malaysia in 2009. Currently, she is the Head Of Strategic <strong>Information</strong> System Research<br />
Group.<br />
Cuneyt Gurcan Akcora is a PhD student at the University of Insubria, Italy. His research is focused on<br />
privacy <strong>and</strong> security issues in social networks with a focus on graph mining <strong>and</strong> machine learning<br />
techniques. In the past he worked on sentiment analysis in micro blog posts.<br />
Abdulaziz Aldusari is the Chief Executive Officer of Riyadhi Techno Valoley, Sudi Arabia. He has a BS in<br />
Architecture from King Saud University, Riyadh, an MS in Urban <strong>and</strong> Regional Planning <strong>and</strong> a PhD in Urban<br />
<strong>and</strong> Regional Planning from the University of Florida. His research interests include affordable <strong>and</strong> social<br />
ho<strong>using</strong>, technology transfer, <strong>and</strong> achieving a knowledge-based economy.<br />
Maria do Céu Alves is an Assistant Professor of Accounting in the Business <strong>and</strong> Economics Department,<br />
University of Beira Interior, Portugal. She holds a PhD in <strong>Management</strong> from University of Beira Interior. Her<br />
research interests include accounting information systems; ERP systems <strong>and</strong> new costing systems;<br />
entrepreneurship <strong>and</strong> performance measurement; management accounting roles <strong>and</strong> decision making.<br />
Karen Anderson is Professor of Archives <strong>and</strong> <strong>Information</strong> Science at Mid Sweden University, Professor II at<br />
Oslo University College <strong>and</strong> Adjunct Professor at Edith Cowan University in Western Australia. Research<br />
interests include digital recordkeeping systems <strong>and</strong> the education <strong>and</strong> professional development needs of<br />
the recordkeeping community. She is an Editor-in-Chief for Archival Science.<br />
Óscar Emanuel Duarte Antunes is a research collaborator of e-Geo, Research Center for Geography <strong>and</strong><br />
regional Planning, Faculty of Social Sciences <strong>and</strong> Humanities (FCSH), Universidade Nova de Lisboa. He<br />
graduated in Geography <strong>and</strong> Regional Planning – Remote Sensing <strong>and</strong> Geographic <strong>Information</strong> Systems<br />
(GIS) <strong>and</strong> is currently studying for a Master’s degree in the same research area.<br />
A Arviansyah is a PhD student at the University of Groningen. He gained his masters degree in Business<br />
<strong>and</strong> ICT from the same university. Before embarking on his PhD, he was a junior researcher <strong>and</strong> lecturer at<br />
the University of Indonesia. He is currenly undertaking research in the area of risk evaluation of ICT<br />
investment.<br />
Dawit Asmelash is doing his PhD in Informatics at University of Pretoria, South Africa <strong>and</strong> he lectures in<br />
information systems at the same university. His research studies have involved IT governance, IS/IT<br />
investments, IS/IT benefits evaluation <strong>and</strong> ICT for development.<br />
Carolyn Begg has taught in the School of Computing at the University of the West of Scotl<strong>and</strong> in the UK for<br />
more than 20 years. She is the co-author of a popular database systems textbook that sells worldwide. Her<br />
research interests are in the areas of data management <strong>and</strong> business intelligence.<br />
Maria Bergenstjerna is a PhD c<strong>and</strong>idate <strong>and</strong> part of the IT management research group, Department of<br />
Applied IT, Gothenburg University, Sweden. Her research interest is in the field of informatics: the<br />
management of coordinated development of business, information systems <strong>and</strong> knowledge. As a lecturer,<br />
she has engaged in the IT management courses for several years.<br />
Ann Brown is a Senior Lecturer in <strong>Information</strong> <strong>Management</strong> in the Faculty of <strong>Management</strong> at Cass Business<br />
School <strong>and</strong> Associate Dean for the Undergraduate programme. She took an MSc (Operational Research) at<br />
viii
LSE while working at the British Steel Corporation as an Operational Researcher. She obtained her<br />
doctorate from City University in 2005, based on her work into the problems <strong>and</strong> potential of <strong>Information</strong><br />
Systems applications to create Business Value for organisations.<br />
Geert-Jan van Bussel is a certified archivist <strong>and</strong> has a PhD in information <strong>and</strong> archival studies. He is a<br />
senior lecturer <strong>and</strong> researcher at the HvA / Amsterdam University of Applied Sciences <strong>and</strong> Assistant<br />
Professor at the University of Amsterdam. He is the director of an international consultancy on strategic<br />
information <strong>and</strong> records management <strong>and</strong> records auditing.<br />
Giovanni Camponovo is lecturer at the Department of Business <strong>and</strong> Social Sciences of the University of<br />
Applied Sciences of Southern Switzerl<strong>and</strong> (SUPSI). He received a PhD in Business <strong>Information</strong> Systems<br />
from the Faculty of Business <strong>and</strong> Economics of the University of Lausanne. His current research focuses on<br />
innovative business models, information systems, adoption <strong>and</strong> usage.<br />
Giacomo Carli is a PhD c<strong>and</strong>idate in <strong>Management</strong> at the University of Bologna where he received a<br />
Master’s degree in engineering management. He had worked for two consulting companies as organizational<br />
consultant. During his PhD, he serves as lecturer in the Organizational Change course. His research<br />
interests include dynamic capabilities, organizational design <strong>and</strong> IT management.<br />
Fergal Carton is a senior researcher in the Financial Services Innovation Centre (FSIC) at University<br />
College Cork in Irel<strong>and</strong>. Fergal’s research domain is the integration of IS into business processes for<br />
resource visibility, performance control <strong>and</strong> decision support. Fergal leads FSIC research in the Payments<br />
Industry, with a particular focus on mobile payments.<br />
Sunil Choenni heads the department of Statistical <strong>Information</strong> <strong>Management</strong> <strong>and</strong> Policy Analysis of the<br />
Research <strong>and</strong> Documentation Centre (WODC) of the Dutch Ministry of Justice <strong>and</strong> is professor of human<br />
centered ICT at the School for Communication, Media <strong>and</strong> <strong>Information</strong> Technology, Rotterdam University of<br />
Applied Sciences. His research interests include data warehouses <strong>and</strong> data mining, databases, egovernment,<br />
<strong>and</strong> human centered design.<br />
Marie-Therese Christiansson, is a senior lecturer in <strong>Information</strong> Systems at Karlstad University in Sweden.<br />
Her research interest covers process oriented driven business <strong>and</strong> system development. The focus of her<br />
research is co-production in an established network of practitioners, in private as well as public<br />
organisations, with interest in e-Service development <strong>and</strong> lightweight business process methodologies.<br />
Maria Concetta De Vivo is assistant professor of Private Law, professor of information law, the Digital<br />
Economy Law <strong>and</strong> Administration, Law <strong>and</strong> New Technologies at the University of Camerino. He is also the<br />
author of essays on law <strong>and</strong> new technologies.<br />
Rita Cristóvão graduated in 2001 from Nova School of Business <strong>and</strong> Economics <strong>and</strong> post-graduated in<br />
2004 from INDEG Business School. In 2001 worked as management consultant at Deloitte in the healthcare<br />
sector. In 2004 started to work in SIGIC <strong>and</strong> is now the assistant coordinator of SIGIC in the Central<br />
Administration of the NHS.<br />
Renata Paola Dameri is professor in Accounting <strong>and</strong> <strong>Information</strong> Systems at Faculty of Economics,<br />
University of Genova, Italy. She is visiting professor in IT governance at the University of Paris-Dauphine.<br />
She is also member of the research Unit “<strong>Information</strong> Systems” at Bocconi School of <strong>Management</strong>.<br />
Jan Devos is a lecturer in IT/IS at Ghent University department Howest. He holds a master’s degree in<br />
Computer Science <strong>and</strong> an MBA. He has his own company <strong>and</strong> conducted more than 50 expert opinions on<br />
IS failures. His current research interests are IT in SME’s <strong>and</strong> IS failures.<br />
Kim Dong-Hyun is a senior researcher of National <strong>Information</strong> Society Agency in Korea. He is an member<br />
of the IT society <strong>and</strong> IT evaluation, <strong>and</strong> is a consultant to ministerial officers in the Korean government with<br />
interests in the information society <strong>and</strong> future plans<br />
Leonora Esteves is a post-graduate in Territorial <strong>Management</strong> (Environment <strong>and</strong> Natural Resources), at the<br />
Universidade Nova de Lisboa, <strong>and</strong> Collaborator at the e-Geo Research Center for Geography <strong>and</strong> Regional<br />
Planning, in the Environmental <strong>and</strong> Socio-economic Dynamics: Managing for Sustainability investigation<br />
group.<br />
ix
Bruno Miguel Gomes Félix in 2006 he started his degree in Computer Engineering on Instituto Superior<br />
Técnico(Lisbon) <strong>and</strong> finished in 2009. In 2009 he started his master’s degree <strong>and</strong> he hopes to finish this<br />
year. In 2010 heI started hisMaster’s thesis with title SimplexIS.<br />
Denisa Ferenčíková is a PhD c<strong>and</strong>idate at Tomas Bata University in Zlin – Faculty of <strong>Management</strong> <strong>and</strong><br />
Economics. In 2009 she received a Master´s degree in Industrial Engineering. Her current research involves<br />
advanced methods for production planning <strong>and</strong> scheduling, <strong>and</strong> their support in enterprise information<br />
systems. She also tutors Business information systems <strong>and</strong> Logistics.<br />
Jorge Ricardo Ferreira is an assistant professor at Universidade Nova de Lisboa. His PhD was on “The<br />
Geography of <strong>Information</strong> Society”. His primary research domains are in the fields of <strong>Knowledge</strong><br />
Dissemination <strong>and</strong> Geographical <strong>Information</strong> Technologies. He is also a member of e-Geo, Research Centre<br />
on Geography <strong>and</strong> Regional Planning.<br />
Dr Graham Fletcher spent 15 years in industry after completing his PhD, running several industrial R&D<br />
departments. In 2008 he joined Cranfield university’s academic staff where his interests include how I.S.<br />
research is affecting professional practice. He also works closely with the Cranfield School of <strong>Management</strong>,<br />
where he runs several projects evaluating the complex feedbacks in social <strong>and</strong> technical systems.<br />
Bernardo Silva Gomes is currently a finalist student of the Master’s degree (MsC) in <strong>Information</strong> Systems<br />
<strong>and</strong> Computer Engineering at the Instituto Superior Técnico (Oeiras, Portugal). He finished his Bachelor’s<br />
Degree (BsC) in <strong>Information</strong> Systems <strong>and</strong> Computer Engineering in 2006, also at the Instituto Superior<br />
Técnico.<br />
Yawanuch Gulatee chose his doctorate subject based on his knowledge <strong>and</strong> interests. In particular, he<br />
really wanted to find a better solution to improve <strong>Information</strong> Technology teaching, whilst taking an interest in<br />
Australian culture.<br />
Aida Hadzic is a PhD student at the Department of Applied IT, IT University in Gothenburg. She has a<br />
systems science background <strong>and</strong> a second level education in the field of IT management. Aida is studying<br />
issues related to management <strong>and</strong> architectural design of both existing <strong>and</strong> future IT investments.<br />
Florian Hamel is a PhD c<strong>and</strong>idate at the Institute of <strong>Information</strong> <strong>Management</strong> of the University St Gallen. He<br />
did his MSc. <strong>and</strong> BSc. in <strong>Information</strong> Systems at the Technische Universität München <strong>and</strong> National<br />
University of Singapore <strong>and</strong> gained work experience in software engineering <strong>and</strong> management consulting<br />
during his studies. His research interests are performance management of IT costs <strong>and</strong> benefits in business<br />
groups.<br />
Antonio Hidalgo L<strong>and</strong>a received the MSc degree in Computational <strong>and</strong> Software techniques for<br />
engineering form Cranfield University, UK <strong>and</strong> the MEng degree in computer science from the University of<br />
Murcia. He is currently working towards a PhD at Cranfield University, UK. His main research fields include<br />
SOA communication over "Disadvantaged Grids".<br />
Martin Hill has twenty years’ experience of building commercial information systems, from Kenyan camel<br />
farmers to satellite operators. Five years developing these for disaster <strong>and</strong> frontline military operations have<br />
evolved into academic research leading to, amongst other things, a PhD. Field experience includes<br />
operations in Iraq, numerous exercises, <strong>and</strong> an Afghanistan deployment is intended.<br />
Ben Holzmann is currently a Ph.D. student at Tel-Aviv University. He graduated from the Technion Institute<br />
in Haifa (Eng.), <strong>and</strong> has been a professional engineer for the last twenty five years. Ben participated in<br />
numerous projects of a large variety of disciplines.<br />
Vered Holzmann, MBA, is an experienced practicing project manager with a distinguished track record in<br />
managing computer software development teams, the implementation of quality assurance programs <strong>and</strong> the<br />
management of fast track construction projects. She is a faculty member in H.I.T. <strong>and</strong> lectures at Tel-Aviv<br />
University.<br />
Grant Howard is studying for a PhD in <strong>Information</strong> Systems at North-West University, South Africa. He holds<br />
an MSc in <strong>Information</strong> Systems from University of South Africa (UNISA) <strong>and</strong> is currently a lecturer at the<br />
School of Computing, UNISA in Florida, South Africa. Previously he was a business analyst for a financial<br />
software development company.<br />
x
Minna Isomursu, PhD, is a research professor of networked services <strong>and</strong> media at VTT Technical research<br />
centre of Finl<strong>and</strong>. Her research explores how social media can be used to enhance <strong>and</strong> enable ICT-based<br />
services. Her current research projects study use of social media <strong>and</strong> new ICT based service concepts for<br />
older adults.<br />
Tiko Iyamu is a Professor of <strong>Information</strong> Systems at the Tshwane University of Technology, Pretoria. His<br />
research interests include mobile computing, enterprise architecture <strong>and</strong> information technology strategy. He<br />
focuses on actor network theory <strong>and</strong> structuration theory,<strong>and</strong> is the author of numerous peer-reviewed<br />
journal <strong>and</strong> conference proceedings articles.<br />
Paulo João is a PhD. student in Statistics <strong>and</strong> Operations Research at the University of Lisbon, with a Msc<br />
<strong>and</strong> Bsc in Statistics <strong>and</strong> <strong>Information</strong> <strong>Management</strong> (ISEGI-UNL), a post-graduate degree in Systems <strong>and</strong> IT<br />
(UNI) <strong>and</strong> Evaluation <strong>and</strong> Organizational Development (ISCTE). He worked for 20 years in the police <strong>and</strong><br />
currently works as a computer specialist responsible for IT security in the central administration of the<br />
Portuguese health system.<br />
Adam Jansen is a Ph.D. student in Archival Studies at the University of British Columbia <strong>and</strong> a research<br />
assistant on InterPARES. He earned an MSc from Eastern Washington University in Business Administration<br />
<strong>and</strong> Computer Science, <strong>and</strong> worked most recently as the Deputy Washington State Archivist. His current<br />
research focuses on preservation <strong>and</strong> the forensic analysis of trustworthy digital records.<br />
Hallur Leivsgarð Joensen is a Business Development Engineer from AU Herning 2009. Hallur is currently<br />
employed as an associate on a research project on the conversion of recreational ships to renewable energy<br />
propulsion. At the same time, Hallur is on an MSc study program in Technology Based Business<br />
Development, with particular emphasis on cleantech.<br />
Björn Johansson holds a PhD in <strong>Information</strong> Systems Development from the Department of <strong>Management</strong> &<br />
Engineering at Linköping University. He currently works as Associate Senior Lecturer in the Department of<br />
Informatics, Lund University. Previously, he worked as a Post Doc. at the Center for Applied ICT at<br />
Copenhagen Business School. He is a member of the IFIP Working Groups IFIP 8.6 <strong>and</strong> IFIP 8.9.<br />
Ghassan Kbar is the Director of the Research <strong>and</strong> Business Development department at Riyadh Techno<br />
Valley RTV, Saudi Arabia. He holds a PhD in Computer Networking from UNSW Australia-1997, <strong>and</strong> a<br />
Master‘s in Engineering Studies from the University of Sydney. He has roughly 22 years of experience in<br />
R&D <strong>and</strong> Academia <strong>and</strong> has published 50 articles in international conferences <strong>and</strong> journals.<br />
Soudabeh Khodambashi holds a Bachelor’s degree in information technology from the Polytechnic<br />
University of Tehran, Iran. He is now studying for a Master‘s in <strong>Management</strong> <strong>Information</strong> System at the<br />
University of Kebangsaan, Malaysia. His research area is the evaluation of Health <strong>Information</strong> Systems <strong>and</strong><br />
clinical process re-engineering.<br />
Erdem Kirkbesoglu graduated from Baskent University in 2004. He is a Ph.D student in the Department of<br />
<strong>Management</strong> <strong>and</strong> Organizations <strong>and</strong> his research interests include Organisation Theory <strong>and</strong> Organisational<br />
Behaviour. He is currently a full-time lecturer at Baskent University.<br />
Bert Kleersnijder holds a Master’s in Business Administration, specialising in Business <strong>and</strong> ICT, <strong>and</strong><br />
studied under the guidance of Professor E. Berghout. His thesis subject was ‘The Assessment of project<br />
portfolio management’, at the municipality of Groningen in the Netherl<strong>and</strong>s. He is currently<br />
‘<strong>Information</strong>manager’ <strong>and</strong> his research interests are in information management, portfolio management, IT<br />
evaluation, <strong>and</strong> business cases.<br />
Juha Kontio is a Director of Education in the Faculty of Telecommunication <strong>and</strong> e-Business at the Turku<br />
University of Applied Sciences. His current research interest connects to higher education related topics. He<br />
has presented <strong>and</strong> published in numerous international conferences, on topics such as quality assurance,<br />
staff development <strong>and</strong> organisational issues in information systems.<br />
Ermelinda Kordha Ph.D. is currently teaching <strong>Management</strong> <strong>Information</strong> systems at Faculty of Economy,<br />
University of Vlora, Albania. Dr. Kordha has been participant in a number of national <strong>and</strong> international<br />
conferences, has published her work in several national <strong>and</strong> international journals <strong>and</strong> has been organizer of<br />
scientific activities in the university.<br />
Sevrani Kozeta Ph.D. is teaching <strong>Management</strong> <strong>Information</strong> Systems <strong>and</strong> is Head of the Department of<br />
Mathematics, Statistics <strong>and</strong> Applied Informatics, at the Faculty of Economy, University of Tirana. She is part<br />
xi
of Editorial Board of several international journals <strong>and</strong> is consulting private companies <strong>and</strong> government<br />
agencies in Albania<br />
Misoo Kwon, Ph D, is Director of the National DB Project Dept., National <strong>Information</strong> Society Agency (NIA),<br />
<strong>and</strong> a Professor at the Graduate school of policy studies, Korea Univ., Seoul, Korea. He is also PM for the<br />
Green IT National Strategy Development Project of Presidential Committee <strong>and</strong> Green Growth Expert<br />
Advisor of Korea‘s Presidential Government Deregulation Committee.<br />
Luigi Lavazza is associate professor at the University of Insubria at Varese, in the Department of Computer<br />
Science <strong>and</strong> Communication. His research interests include empirical software engineering <strong>and</strong><br />
measurement, process evaluation <strong>and</strong> improvement, <strong>and</strong> the requirements engineering. He is the co-author<br />
of over 100 scientific papers, a member of the IEEE computer society, <strong>and</strong> an IARIA fellow.<br />
Valentina Lenarduzzi is a PhD student in Computer Science at Insubria University (Como). She received<br />
her Master‘s in Environmental Engineering at the Milan Politecnico in 2008 <strong>and</strong> then focused her interests on<br />
Marketing, working first for MITA Biorulli as Sales engineer, <strong>and</strong> then to Ecoconsulting as Sales Manager.<br />
Her research interests focus on Software Marketing, Open Source Marketing <strong>and</strong> Open Source Adoption.<br />
Monika Magnusson is a senior lecturer in <strong>Information</strong> Systems at Karlstad University in Sweden. Her<br />
research is mainly in the e-commerce <strong>and</strong> e-services area, foc<strong>using</strong> on adoption <strong>and</strong> evaluation. Other<br />
research interests include e-business/e-service model design <strong>and</strong> the use of social media, such as<br />
Facebook, for customer interaction in businesses <strong>and</strong> public agencies.<br />
Thanos Magoulas is a senior lecturer at the IT-university of Gothenburg. For several years he has been<br />
responsible for the Master‘s programme in IT management. His current research interest relates to<br />
Enterprise Architecture.<br />
Panagiotis Manolitzas holds a Bachelor in Public Administration (specialization in <strong>Management</strong> Science)<br />
from the University of Athens <strong>and</strong> an MSc in Public <strong>Management</strong> (specialization in <strong>Management</strong> Science)<br />
from the University of Athens. Panagiotis. He has written the book ‘Principles of Business Administration’. He<br />
is a Member of Hellenic Operational Research Society.<br />
Nata van der Merwe has 24 years of experience - 10 years as an IS/IT professional <strong>and</strong> 14 years as an<br />
IS/IT lecturer - lecturing at the University of Cape Town, as well as the Cape Peninsula University of<br />
Technology. Her main research interest is the use of project-based teaching as a teaching <strong>and</strong> learning<br />
strategy.<br />
Alemayehu Molla is an Associate Professor at the School of Business IT <strong>and</strong> Logistics, RMIT University.<br />
His research areas are Green IT <strong>and</strong> digital business. He has published more than 90 articles, in the<br />
European Journal of <strong>Information</strong> Systems, <strong>Information</strong> & <strong>Management</strong>, International Journal of E-commerce,<br />
Journal of E-commerce Research, <strong>and</strong> Journal of E-commerce in Organizations, amongst others.<br />
Gunilla Myreteg is an Assistant Professor at Uppsala University, Sweden. Her research interests include<br />
how information technologies, especially ERP systems, are designed <strong>and</strong> used in organizations for a variety<br />
of information purposes.<br />
Hesbon O. Nyagowa is a PhD student at the University of Zulul<strong>and</strong>, South Africa, specialising in <strong>Information</strong><br />
Studies. He a obtained Master‘s of Business <strong>and</strong> Administration, specialising in <strong>Management</strong> <strong>Information</strong><br />
Systems at University of Nairobi, Kenya. He is currently the Academic Registrar of Kenya Polytechnic<br />
University College, a constituent college of the University of Nairobi.<br />
Gizem Ogutcu graduated from Baskent University‘s Department of <strong>Management</strong> <strong>Information</strong> Systems in<br />
2008, <strong>and</strong> completed her post graduate education in <strong>Information</strong> Technologies & System <strong>Management</strong> in<br />
2010. She is a Ph.D student at METU Medical Informatics Department <strong>and</strong> a full-time research assistant at<br />
Baskent University Department of <strong>Management</strong> <strong>Information</strong> Systems. Research interests include IT<br />
Governance, <strong>Information</strong> Security, Hospital <strong>Information</strong> Systems <strong>and</strong> E-transformation.<br />
Roslina Othman obtained a PhD (<strong>Information</strong> Retrieval) from Aberystwyth University, Wales, MLIS from<br />
IIUM, <strong>and</strong> BBA (Finance) from Eastern Washington University. Othman is an Associate Professor at the<br />
Faculty of ICT, IIUM, <strong>and</strong> a consultant to NAM Institute of Empowerment for Women (bridging gender digital<br />
divide) <strong>and</strong> MCMC for customer satisfaction survey on mobile applications.<br />
xii
Elmarie Papageorgiou is a Senior Lecturer in the School of Accountancy at the University of the<br />
Witwatersr<strong>and</strong> in Johannesburg, South Africa. She is the Division Head <strong>and</strong> Course Co-ordinator of<br />
Business <strong>and</strong> Accounting <strong>Information</strong> Systems that form part of the Chartered Accountant curriculum. Her<br />
research interests include Executive, Business <strong>and</strong> Accounting <strong>Information</strong> Systems.<br />
Shabnam Pas<strong>and</strong>ideh graduated with a Master‘s in <strong>Information</strong> Technology <strong>Management</strong> from the Science<br />
<strong>and</strong> Research Branch, IAU, Tehran, Iran. She finished her BS in Applied Mathematics from AmirKabir<br />
University in 2003. Currently she is working as a research expert in Azad University (SRBIAU). Her<br />
research interests include decision-making issues, especially relating to commerce <strong>and</strong> industry.<br />
Kalevi Pessi leads the IT management research group at the IT University of Gothenburg. He has served as<br />
Managing Director <strong>and</strong> <strong>Knowledge</strong> <strong>Management</strong> Director for many years in trade <strong>and</strong> industry. As a<br />
consultant he has been working with large international corporations. His current research interest relates to<br />
IT business value <strong>and</strong> architectural design.<br />
Elias Pimenidis is a senior lecturer at the University of East London in the United Kingdom. The core of his<br />
research work focuses on e-business <strong>and</strong> e-government development projects, their management <strong>and</strong><br />
evaluation. Other research includes web service security issues <strong>and</strong> the use of computer games for<br />
educational purposes.<br />
Michal Pivnička is a PhD c<strong>and</strong>idate <strong>and</strong> works in the Department of Industrial Engineering <strong>and</strong> <strong>Information</strong><br />
Systems at the Faculty of <strong>Management</strong> <strong>and</strong> Economics, University of Tomas Bata in Zlin as an Assistant<br />
Professor. He is interested in information systems (ERP, BI) <strong>and</strong> Balanced Scorecard. And he teaches<br />
Business <strong>Information</strong> Systems.<br />
Alberto Polzonetti received his Master‘s degree in electronic engineering at University of Pisa <strong>and</strong> he is a<br />
member of Italian engineer’s registry. He is a researcher in Computer Networking <strong>and</strong> e-Government <strong>and</strong> a<br />
member of the "UEG - UNICAM E-Gov Research Group".<br />
Bart-Jan van Putten works as a research associate for SAP Research in Dresden, Germany. He is currently<br />
writing his dissertation on IS investment evaluation. Prior to joining SAP he studied Industrial Design (BSc)<br />
<strong>and</strong> <strong>Information</strong> Science (MSc). Bart-Jan did internships at Philips Research, Océ Research in The<br />
Netherl<strong>and</strong>s <strong>and</strong> at the NASA Ames Research Center in California.<br />
Rozilawati Razali received her BSc in Software Engineering from Sheffield HallamUniversity, United<br />
Kingdom. Prior to joining Universiti Kebangsaan Malaysia, she worked in industry for about six years as a<br />
Software Engineer. She obtained her MSc from Universiti Teknologi Mara <strong>and</strong> PhD in Computer Science<br />
from University of Southampton, United Kingdom. Her research interests include requirements engineering<br />
<strong>and</strong> empirical software engineering.<br />
Siti Rohimi Hamedon graduated with a Ph.D (Library & <strong>Information</strong> Science) from IIUM, MSc (<strong>Information</strong><br />
<strong>Management</strong>) from UiTM <strong>and</strong> BSc (Mathematics) from Trent University. Hamedon is a Mathematics Lecturer<br />
at the Centre for Foundation Studies, IIUM. Her personal experiences as a mature student have been<br />
contributory in the development of the academic research methodology.<br />
Vahid Saadat received his Bachelor‘s degree in Computer Engineering in 2001 at Ferdowsi University in<br />
Iran. He started <strong>Management</strong> study at Tehran University (2009) <strong>and</strong> now works on his Thesis. Since 2001 he<br />
has been working at some banks in Iran <strong>and</strong> presents some IT solutions in eBanking. His main research<br />
interests are eCity, eBanking <strong>and</strong> IT <strong>Management</strong>.<br />
Ted Saarikko is a PhD-student at the Department of Applied IT, IT University in Gothenburg. He has a<br />
background in computer science, as well as language studies, prior to earning his Masters degree in<br />
informatics. Ted is currently studying issues relating to Enterprise architecture <strong>and</strong> sustainable development.<br />
Teresa Santos is a doctoral researcher at e-GEO, Centre of Geographical <strong>and</strong> Regional Planning Studies,<br />
New University of Lisbon, Portugal. She has a Master’s in GIS from the Technical University of Lisbon<br />
(Portugal), <strong>and</strong> is presently studying for a PhD in geography, with a scholarship from the Portuguese<br />
Foundation for Science <strong>and</strong> Technology.<br />
Mohamad Norzamani Sahroni is a PhD student at the Universiti Kebangsaan Malaysia under a scholarship<br />
from the Ministry of Higher Education, Malaysia <strong>and</strong> the Universiti Teknologi MARA (UiTM), Malaysia. He<br />
has been working with UiTM as a lecturer since 2003. His PhD research is in the area of medical informatics,<br />
with a specific focus on evaluation <strong>and</strong> error.<br />
xiii
Elena Serova has a PhD in Economics. She is currently a Senior Lecturer for the <strong>Information</strong> Technologies<br />
in <strong>Management</strong> Department, GSOM Saint-Petersburg State University. Her research Interests are<br />
<strong>Information</strong>: the technological resources of Russian Economy, Managing <strong>and</strong> Using <strong>Information</strong> Systems, a<br />
Strategic Approach, Enterprise <strong>Information</strong> Systems, <strong>and</strong> marketing <strong>Information</strong> Systems.<br />
João Soares graduated in 2006 <strong>and</strong> is now pursuing a Master‘s Degree in Computer Science specialising in<br />
Enterprise <strong>Information</strong> Systems. Within Enterprise Architecture, his interests are Models <strong>and</strong> Frameworks,<br />
Business-IT Allignment <strong>and</strong> Methods, <strong>and</strong> Processes <strong>and</strong> Patterns for EA Development.<br />
Sharina Tajul Urus is currently is a full time PhD student at School of Business IT <strong>and</strong> Logistics, RMIT<br />
University, Melbourne. She completed her Master‘s in Accounting from Curtin University of Technology <strong>and</strong><br />
her BA (Hons) Accounting & Finance from De Montfort University, Leicester, UK. Her research interests<br />
include Enterprise Resource Planning <strong>and</strong> Feral system.<br />
Torben Tambo is Associate Professor at AU Herning <strong>and</strong> Director of Studies in Technology Based Business<br />
Development. Torben holds an MSc from the Danish Technical University <strong>and</strong> has published in the Journal<br />
of Enterprise Architecture, the Journal of Economic Dynamics <strong>and</strong> Control, International Association for<br />
<strong>Management</strong> of Technology.<br />
Pietro Tapanelli is a Ph.D. student in e-Government services at the University of Camerino. After graduating<br />
in law, he took a Master‘s in Law, Economy <strong>and</strong> <strong>Information</strong> Technology, <strong>and</strong> graduated from the School of<br />
Specialization in Civil Law at the same university.<br />
Jose Teixeira is currently taking his doctoral studies in Turku University. He has studied at Oporto<br />
University, IAE Aix-en-Provence, Turku School of Economics <strong>and</strong> Tilburg University, covering topics on<br />
computer science, information systems, management <strong>and</strong> economics. He also worked in the Industry for<br />
reputable companies such as Wipro, Tesco <strong>and</strong> Nokia. His research addresses the open-source software<br />
phenomenon.<br />
Nelly Todorova is a senior lecturer at the Department of Accounting <strong>and</strong> <strong>Information</strong> Systems at the<br />
University of Canterbury, New Zeal<strong>and</strong>, where she teaches at undergraduate <strong>and</strong> postgraduate level. Her<br />
current research interests focus on the general areas of knowledge management <strong>and</strong> IS evaluation <strong>and</strong>,<br />
more specifically, value creation in knowledge management.<br />
Bartosz Wachnik specializes in MIS implementation. He is a member of senior management of Alna<br />
Business Solutions in Pol<strong>and</strong>, a branch of the Lithuanian company, which is one of the largest IT companies<br />
in the Baltic area. He has published more than 20 articles in professional <strong>and</strong> academic journals, <strong>and</strong> has cooperated<br />
with University of Technology in Warsaw where he holds a PhD.<br />
Mohd Yusof is a head researcher at the Software Technology <strong>and</strong> <strong>Management</strong> Centre at the Faculty of<br />
<strong>Information</strong> Science <strong>and</strong> Technology, Universiti Kebangsaan, Malaysia. She holds a PhD in <strong>Information</strong><br />
Systems from Brunel University, West London. Her research focus includes HIS evaluation, <strong>Management</strong><br />
<strong>Information</strong> Systems, <strong>Information</strong> Systems development, <strong>and</strong> the Viable System Model.<br />
Hamed Majidi Zolbanin is a Master's student in urban affairs management at university of Tehran. Since<br />
completing his Bachelor's studies in computer engineering (at Sharif University of technology), he has<br />
worked on IT competency development among municipal managers. He is currently working in the IT<br />
department of the Tehran Stock Exchange.<br />
xiv
<strong>Information</strong> <strong>and</strong> <strong>Knowledge</strong> <strong>Management</strong> Using <strong>ArcGIS</strong><br />
<strong>ModelBuilder</strong><br />
João Agrela, Leonor Esteves, Jorge Ferreira <strong>and</strong> Óscar Antunes<br />
Universidade Nova de Lisboa, Portugal<br />
Joao.agrela@gmail.com<br />
l.raquel@clix.pt<br />
jr.ferreira@fcsh.unl.pt<br />
oscarduarteantunes@gmail.com<br />
Abstract: The advent of Geographical <strong>Information</strong> Systems (GIS) brought into play an array of tools to interpret<br />
the ever growing multitude of geographical variables. The fact that these tools exist does not, nonetheless, mean<br />
that it’s easy or clear to make valid interpretations of the available information, which ultimately means that the<br />
validity of the methods of interpretation may not be enough to make clear planning decisions. The present<br />
contribution aims to demonstrate that the geographical nature of available data is in itself an object of<br />
interpretation that must precede the use of the GIS tools, <strong>and</strong> that they must be presented to the user as a flow of<br />
reasoning, a logic-based representation of problem-solving steps. In what concerns this presentation, the authors<br />
will present what is, from their point of view, one of the most useful methods of visualizing these steps <strong>and</strong> also<br />
one of the most practical tools for local planning. The human interpretation of geographical information is vital,<br />
because it is the user that decides the nature of the relations between the data, based on its individual attributes.<br />
Also, the manner in which the information is viewed is also important because the choice of used tools is based<br />
on an ontological view of the geographical science. Some users prefer to act <strong>using</strong> only vector data set claiming<br />
that it’s the best way to represent reality, <strong>and</strong> other users state that raster data set is the best base to solve a<br />
problem providing it has a good enough resolution. The authors argue that the best way to proceed is to identify<br />
the nature of the geographical variable <strong>and</strong> to use vector or raster data considering which is most suitable for<br />
each variable. Ultimately the decision between raster or vector data lays upon the decision making agents <strong>and</strong><br />
what they want as a final output. The article points out that the use of the ArcGis tool Model Builder is the best<br />
way to view the flow of operations <strong>and</strong> that the models built in this way are extremely valuable for local<br />
governments (assuming that the same problem may afflict different regions). As such, it is stated that the first<br />
step for GIS based problem solving is the clear distinction between context, structure, support <strong>and</strong> created<br />
information <strong>and</strong> that the models have to reflect these relations. The models also have to solve the vector/raster<br />
data problem effectively <strong>and</strong> they have to be as simple as possible. To demonstrate the stated the authors<br />
present one model to point out the preferable methodology <strong>and</strong> ontological approach of problem solving (the<br />
model being about the problem of finding the location of a Wastewater Treatment Plant in the municipality of<br />
Amadora, Portugal) <strong>and</strong> afterwards several examples of Models created with the Model Builder tool that aim to<br />
solve specific problems (Risk cartography for Urban Fires in Lisbon, Portugal; Preferable areas for the<br />
implementation of a network for urban cycling in Lisbon, Portugal; Preferable areas for the implementation of a<br />
network of urban agriculture plots).<br />
Keywords: geographical information system, spatial modeling, information dissemination, model builder,<br />
geography<br />
1. The need for modeling<br />
Globalization <strong>and</strong> the intensification of relations between territories, institutions, enterprises <strong>and</strong><br />
population have undeniably increased competitiveness among cities <strong>and</strong> regions, which, in turn,<br />
forced the territory to a constant mutation aiming for an adaptation to the surrounding environment<br />
(LÚCIO, et al, 2010;LOPES, 2001).<br />
Thus, a profound knowledge about geography, enterprise <strong>and</strong> population locations, territorial policies<br />
<strong>and</strong> strategies, is imperative for defining a multivariate evaluation model that contributes to decision<br />
making, allowing also the definition of new planning tools <strong>and</strong> territorial policies, <strong>and</strong> the improvement<br />
of the already existing ones as well (MATOS, 2008).<br />
Trying to achieve an integrated planning of the territory that articulates its local, regional <strong>and</strong> national<br />
scopes, which in turn are inseparable from the institutions who manage them, is crucial to articulate<br />
the goals of the planning process with the indicators of that territory’s dynamics in its various<br />
dimensions (socioeconomic, demographic, environmental, technological, R&D, l<strong>and</strong> use <strong>and</strong><br />
occupation, knowledge society). These reflect the causes of its growing, regression or stagnation,<br />
comparatively to other regions.<br />
1
João Agrela et al.<br />
Faced with the massive amount of information currently at our disposition, a planner finds that it is<br />
crucial to analyze <strong>and</strong> filter it, in a way after which only the significant information remains, i.e., the<br />
one that suits the most to the project goal <strong>and</strong> available technology, applying the adequate treatment<br />
<strong>and</strong> analysis methods, regarding its advantages <strong>and</strong> disadvantages <strong>and</strong> the degree of influence on<br />
the project.<br />
In this process, where the georeferencing distinguishes the spatial data from the statistical data, GIS<br />
tools acquire a crucial part through its capability of managing, producing <strong>and</strong> analyzing spatial data,<br />
providing different solutions according to the different scenarios, existing or foreseen to the future.<br />
After the announcement of this data manipulation capabilities in the 1970’s (MATOS, 2008) with the<br />
surge of quantitative geography (since the 1990’s), GIS (Geographic <strong>Information</strong> Systems) enabled<br />
the evolution of that data manipulation to the current level of geographic modeling.<br />
After collecting, editing <strong>and</strong> validating data, spatial analysis allows the assessment of relations, <strong>and</strong><br />
patterns between them, <strong>and</strong> of those with the surrounding space, giving the information an<br />
operational value in geographic modeling to support decision making. Being in reality a generalization<br />
tool, a model always starts from a hypothesis, which is not unresponsive to the project purpose, or to<br />
the influence of the human factor which defines the inputs <strong>and</strong> the operations that generate the<br />
outputs of each model. Therefore, considering an evaluation one wants multivariate, modeling allies<br />
spatial <strong>and</strong> temporal analysis of the territory, in an effort to assist the creation <strong>and</strong>/or adequacy of<br />
planning policies, supporting the decision making process.<br />
In the Emmanuel Kant perspective (English empirical perspective from the late 18 th century, in<br />
MATOS, 2008, p.14), everything that happens in a certain time <strong>and</strong> space is a phenomenon passable<br />
of experimentation <strong>and</strong> interpretation. Henceforth, the first problem that arises almost immediately is<br />
the multitude of phenomena that a geographer or planner may be confronted to when solving a<br />
certain problem. Also with the ever-growing information society the amount of relations established<br />
between phenomena has also grown accordingly.<br />
Technology has provided Humankind with tools to analyze <strong>and</strong> interpret such relations, namely GIS.<br />
These tools have firstly appeared in part because of the growth in information amount <strong>and</strong> availability<br />
(allied with the advances in hardware of the past century).Soon the responsible agents with the<br />
difficult task of planning the territory saw the possibility of providing for the need of a greater analysis<br />
capability of the phenomena that occurred in the territory.<br />
Modeling these phenomena became possible, allowing the establishment of relations until then<br />
invisible to the planners. This fact provided better interpretations of the territory <strong>and</strong> better solutions<br />
for problems that go from finding simple optimal rotes to nuclear power plants location.<br />
However, the fact that modeling is possible does not mean that models in themselves are not fallible.<br />
Models are just as fallible as their designers assuming that these are unable to identify the variables<br />
in play in the phenomena that occur in the territory, the nature of the information available <strong>and</strong> do not<br />
have a good array of ethical values <strong>and</strong> laws that should be visible throughout the models.<br />
The technology available to solve problems based in geographical information is nowadays so<br />
advanced that the user’s ability to interpret the problems has been put under the microscope. The<br />
method per se for <strong>using</strong> the ArcGis Model Builder (the chosen tool for this paper) is easy <strong>and</strong><br />
repetitive; mostly it is a sequence of operations done on preexisting geographical information that<br />
creates new information <strong>and</strong> so on in sequence. But the choices of operations <strong>and</strong> the sequence of<br />
the operations done by the users reflect human concerns <strong>and</strong> they are usually done in light of a legal<br />
frame. Also the inputs of information that allow the models to run have to be treated accordingly to the<br />
nature of the phenomena being observed, <strong>and</strong> this treatment is exclusively done accordingly with the<br />
sensibility of the user to the complexity of the phenomena. Space may flow, crumble or simply be<br />
static, but it must be treated accordingly <strong>and</strong> if not the model will return incorrect solutions.<br />
Another matter that must be pointed out is the limitations of visualization of the geographical<br />
information, namely vector <strong>and</strong> raster (based upon the nature of the data recollection method). This<br />
limitation implies that the user has to choose which type of data <strong>and</strong> visualization is better for each<br />
variable of the phenomenon.<br />
2
João Agrela et al.<br />
So modeling becomes directly dependent not so much on the existing technology, but much more on<br />
the user responsible for the model. According to Couclelis (cited by MATOS, 2008) the physical<br />
phenomena may be either atomic or plenum, homogenous or heterogeneous, continuous or<br />
discontinuous, adjacent or disperse, solid or fluid, 2D or 3D, past or actual, static or variable, fixed or<br />
mobile <strong>and</strong> conventional or self defined. In this human interpretation of the physical characteristics of<br />
phenomena are enough possibilities for error <strong>and</strong> this classification does not approach ethical or legal<br />
matters. The users have to add <strong>and</strong> associate to the models the data about variables as dubious as<br />
good <strong>and</strong> bad <strong>and</strong> legal <strong>and</strong> illegal.<br />
Having the above notions in mind it was found by the authors that the discussion about ethics <strong>and</strong><br />
methods used in planning per se is, in Portugal, insufficient (LÚCIO et al, 2010). Multiple approaches<br />
for the same problem in different locations allows frequently for different solutions or views (LÚCIO et<br />
al, 2010 in opposition with FONTES et al, 2005). In themselves, both approaches seem sound, but<br />
this ultimately implies that every municipality may have at least one approach for solving the same<br />
problem. There is no measure in Portugal of the funding that is spent financing these solutions, but<br />
one can infer that if there is no degree of centralization in problem solving the waste probably exists<br />
<strong>and</strong> it probably is not small.<br />
2. The method for modeling <strong>using</strong> ArcGis Model Builder<br />
The Model Builder application is, in its essence, a set of tools for different purposes. There are many<br />
tools available in the basic ArcGis software, including analysis tools, network tools, data management<br />
tools, etc. These tools operate on raster or vector data. The difference between these two is that<br />
raster data represents reality translating it into a matrix of pixels, each with specific values, <strong>and</strong> the<br />
vector data simplifies <strong>and</strong> represents reality in its basic geographic forms (lines, polygons <strong>and</strong> points).<br />
Each type of data has its advantages <strong>and</strong> disadvantages, for example raster data allows a full data<br />
coverage of space <strong>and</strong> because of that it requires a lot of hard disk space, whilst vector data is lighter<br />
but it does not cover space completely. They are used with a simple drag <strong>and</strong> drop logic <strong>and</strong> the<br />
chain in which they are arranged is established by the user. If used incorrectly or without some<br />
special notions (for instance, the pixel size must be the same for grid algebra) the outputs will be<br />
wrong. The model design is the vehicle for the human concerns, the order of the operations must be<br />
carefully weighed so that these concerns are encompassed within a logical chain.<br />
Figure 1 displays the basic view of the Model Builder, with all the available tools to the left.<br />
Figure 1: ArcGis Model Builder basic view<br />
The basic layers are displayed in blue, the operations in yellow <strong>and</strong> the outputs in green. Every<br />
operation must be correctly connected, otherwise the model will simple not run.<br />
3
João Agrela et al.<br />
This is a fairly user friendly tool but a user needs to have a few GIS notions <strong>and</strong> data types<br />
management experience, for some operations are only used on certain types of data.<br />
3. The case study: Practice <strong>and</strong> experimentation<br />
Figure 2: Amadora location<br />
This case study is based on a problem that is relatively common in most municipalities, namely where<br />
to place a waste water treatment plant. The municipality used for the case study is Amadora,<br />
immediately to the west of Lisbon, Portugal. The authors found that this is also a good example of a<br />
problem which also brings into play ethical values <strong>and</strong> because of that it is not a matter that should or<br />
can be approached without adding human concerns into the model.<br />
It is also an objective that the model is easily understood by any subsequent user (not directly<br />
involved in its creation), because the model might eventually be used for other municipalities, if the<br />
legal parameters with geographical implications are adjusted. Geographical information usually exist<br />
in thematic layers, so in what concerns this paper every variable is a layer of geographical<br />
information, independent from the others from the start.<br />
The first step was the identification of the geographical variables that are in play in the municipality. It<br />
will not be pointed out every variable, but some may be used as examples, as follows:<br />
Physical/natural variables:<br />
Hydrographical network, Portuguese National Ecological Reserve, Portuguese National<br />
agricultural reserve, terrain.<br />
Human variables:<br />
Sewage network, railways, road network, social services (hospitals, schools, etc.).<br />
It is easy to underst<strong>and</strong> that a sewage treatment plant is a needed structure but it has the mark of the<br />
not in my back yard (NIMBY) logic. We need it but the citizens don’t want it anywhere near them. For<br />
a planner <strong>and</strong>/or political decision maker this is a highly sensitive subject.<br />
The second step was to adjust the formats of the information in a way that it could be easily related<br />
<strong>and</strong> operated on. Most of this information did not have the same coordinate system associated so the<br />
4
João Agrela et al.<br />
ETRS 89 projection was used as the INSPIRE European Directive states. Several changes had to be<br />
made in the thematic layers of information.<br />
Every variable was stored within a geoDataset, <strong>and</strong> every dataset in a geoDatabase. This is needed<br />
for it allows better operational flow within the model. It was necessary to create some layers of<br />
information from other sources, <strong>using</strong>, for instance, PDF imagery from municipal services (for<br />
example, the information on Geology did not exist on shapefile format <strong>and</strong> had to be recreated<br />
through vectorization from a PDF municipal file).<br />
Another important step was to limit all the information to the institutional municipal limits, so as to limit<br />
any error that might occur during the map algebra stage of this process.<br />
All the above steps were needed just to create a viable geographical information database, with<br />
correctly georeferenced information, limiting redundant information <strong>and</strong> allowing quicker processing of<br />
all Model Builder tools. One aspect has to be pointed out by the authors: these steps are vital not only<br />
for a Model Builder based project. It is necessary to take all these steps in any GIS based project to<br />
achieve maximum efficiency. All the data normalization may be, at times, a time consuming <strong>and</strong><br />
troublesome stage but it is essential to create a steady basis for the project. It does not do well to<br />
build a castle on s<strong>and</strong>y foundations.<br />
The theoretical starting point is a simple assumption: some geographical variables have in their<br />
nature a prohibitive aspect that does not allow the installation of the above mentioned public<br />
installation. Geographical variables have between themselves relations of neutrality, repulsion <strong>and</strong><br />
attractiveness. Giving a quick example, the geographical nature of the variable “Hospital” repels the<br />
geographical nature of the variable “Sewage Treatment Plant”. The intensity of repulsion or<br />
attractiveness is directly related to the direct or partial incompatibity of natures of the geographical<br />
variables.<br />
After all the pre-project stages of data formatting <strong>and</strong> preparation it is thus necessary to identify the<br />
nature of all the variables <strong>and</strong> the variables that are absolutely opposite, or only partially opposing (for<br />
instance, there might not be any geologically suitable l<strong>and</strong> parcel in the municipality, which means we<br />
would have to choose the “lesser evil”, which is to say, a less suitable l<strong>and</strong> parcel).This method<br />
implies that there will be intermediate cartography created. This is a useful fact, because the users of<br />
the models can always go back to the intermediate cartography to check why the final choice of<br />
location was made. It is also a very valuable stage of direct validation of the model, since the users<br />
can check which branch of the model is returning more accurate outputs. In this model we may point<br />
out three Intermediate outputs.<br />
These intermediate outputs have meaning <strong>and</strong> an ethical <strong>and</strong> value related approach to it. The first of<br />
the three branches is named Favorable Placing Cartography (FPC) <strong>and</strong> every pixel has a positive<br />
numeric value.<br />
Figure 3: Favorable placing cartography branch<br />
5
João Agrela et al.<br />
The next branch was named Resistance Cartography (RC) which represents the areas that do not<br />
completely prohibit the placing of this equipment, but returns some kind of resistance to it (mostly<br />
because of variables related to public opinion, in line with the NIMBY logic). The Pixel values of the<br />
RC are gradual, allowing for the addition or subtraction on the FPC Pixel values. This operation will<br />
allow that all the pixel values of X become a scale of values of 1, 2, 3 etc, which is to say it will<br />
provide a distinction of good, better <strong>and</strong> best locations (Location Cartography, LC).<br />
Figure 4: Resistance cartography branch<br />
After the map algebra between the FPC <strong>and</strong> RC no pixel values may return with a negative value.<br />
The final branch is the Prohibitive Location Cartography (PLC). This cartography has been classified<br />
so that the pixel values that represent variables of repulsive nature are all negative (having been<br />
multiplied by a constant value input of -1). These are immediately assumed as Non-Aedific<strong>and</strong>i areas.<br />
The rest of the pixels are graduated <strong>and</strong> the higher the value, the better the location for the<br />
equipmen.This cartography is then multiplied with the LC <strong>and</strong> returns the final Optimal Location<br />
Cartography (OLC). The negative values were discarded.<br />
Figure 5: Prohibitive location cartography branch<br />
Resuming, the map algebra operations <strong>and</strong> the combination of all the branches go as follows:<br />
OLC = (FPC-RC)TLC<br />
The OLC will be the representation of choices on physical variables, ponderations on ethical values,<br />
<strong>and</strong> legal aspects with geographical expression, <strong>and</strong> all the pixel values will be graduated accordingly<br />
to the sum of all these aspects.<br />
Afterwards, <strong>and</strong> assuming that the l<strong>and</strong> prices are homogenous, the areas with more than 2000<br />
square meters were chosen, because the model returns very small areas that must be weeded out.<br />
Having clearly determined the optimal location of the sewage treatment plant it was deemed<br />
necessary to perform some network analysis, namely optimal routes in case of an accident or a<br />
severe malfunction in the plant.<br />
These analyses were found necessary because, in planning, one has to see all possible outcomes of<br />
a certain public equipment placement. Some public equipments may originate extreme events<br />
6
João Agrela et al.<br />
(accidents) that may be foreseen <strong>and</strong> thus considered. The network analyses done were of two<br />
distinct types, namely emergency services routes (fire fighters, police, health centers, hospitals) <strong>and</strong><br />
hydrants locations. These variables were chosen because they are the basis of any type of rescue<br />
operation. Electric stations were proposed as a useful variable but there was no georeferenced data<br />
available.<br />
Figure 6: The graphic view of the logical expression<br />
Figure 7: Network analyses branch<br />
7
João Agrela et al.<br />
The network analysis for mobile forces was done by assuming an average velocity for every X<br />
distance. This does not take into account traffic conditions, even though it was discussed the use of<br />
traffic intensity values (these do not exist for the case study area). The formula used was<br />
[Shape_Length] /1000/( [MAX_SPEED]/60) which expresses the relation between the length of the<br />
road <strong>and</strong> the maximum speed achievable in it. This calculates the average time used by any<br />
emergency unit to go through the entire route. Also it was found that going in wider roads means that<br />
it is easier to go faster, so the hierarchy of the road network was also taken into account, again by the<br />
use of graduated values.<br />
It was thought that the routes should encompass every emergency station <strong>and</strong> not only the closest<br />
one because there might be an accident occurring that has already used up the resources of the<br />
closest facility. The hydrant analysis was based only on proximity of the plant location. It was not<br />
deemed necessary to find other hydrants because these public equipments are checked periodically<br />
for malfunctions <strong>and</strong> should be always in perfect working order.<br />
The final model is thus the sum of every branch as is represented in Figure 8, which leads to the final<br />
location indicated in Figure 9, as well as the Network cartography in Figure 10. The model built has<br />
more than 80 operations so it is hard to explain every consideration taken whilst building <strong>and</strong><br />
validating it.<br />
4. Discussion<br />
In this Chapter we list the immediate advantages of the Model Builder approach, while trying to point<br />
out some possible flaws.<br />
The strong points of the Model Builder approach to municipal <strong>and</strong> regional problem solving are as<br />
follows:<br />
St<strong>and</strong>ardization of methods between municipalities <strong>and</strong>/or l<strong>and</strong> management entities (National<br />
Advantage);<br />
Ethical issues contemplated;<br />
Workflow visualization (Local <strong>and</strong> National Advantage);<br />
Storing of models (Local <strong>and</strong> National Advantage);<br />
Cartography updating easily made, since it is only neaded an update of the basic information <strong>and</strong><br />
not of the model itself (Local Advantage);<br />
Easy manipulation of one specific operation at any time, without having to repeat any of the<br />
others (Local <strong>and</strong> National Advantage);<br />
Instant output creation <strong>and</strong>/or update.<br />
As flaws the authors may point out that:<br />
A possible weakness of this approach is that some municipalities have rare carachteristics not<br />
foreseen by the entities responsible with the actual model building. This would lead either to the<br />
use of unfit cartography for the region in question or to the need of changing the model in itself.<br />
Changing the model within the municipality would mean that the purpose of st<strong>and</strong>ardization would<br />
not be met, ultimatly removing the advantages for the National Scale.<br />
Another weakness is that for the model to run <strong>and</strong> be usefull the municipality has to have all the<br />
required information with the appropriate st<strong>and</strong>ardization. With big models, the amount of base<br />
information may be proportionaly big, <strong>and</strong> to get all the information may a time comsuming task<br />
for the municipalities. In the municipality of Tomar, Portugal, for instance, there is a great lack of<br />
base information wich would render the model useless (LÚCIO, et al, 2010).<br />
The Model Builder tool is exclusive of one specific software, which does not allow for the use <strong>and</strong><br />
interlinkage of open source software. This directly implies large implementation costs <strong>and</strong> a<br />
trained work force on this subject.<br />
Finally, in Portugal the dissimination of GIS tools is not widespread, <strong>and</strong> there is some cultural<br />
resistance to the adoption of new technologies.<br />
8
Figure 8: Final model<br />
João Agrela et al.<br />
9
Figure 9: Optimal location cartography<br />
5. Final results <strong>and</strong> conclusion<br />
João Agrela et al.<br />
The above model returned four types of cartography in a single problem solving approach, <strong>and</strong> quite a<br />
few more intermediate cartography of relative interest (mainly outputs of reclassifications of pixel<br />
values). It included human concerns <strong>and</strong> ethical values, as well as legal aspects embedded in the<br />
reclassifications of pixel values.<br />
As such, one fine-tuned model may be produced <strong>and</strong> shared between l<strong>and</strong> management offices to<br />
create outputs that have the same legal framework, reducing the disparities that may arise between<br />
different planning departments of different regions with similar problems.<br />
Ultimately it is possible to create a database of models <strong>and</strong> when a certain problem arises one can<br />
search the files of existing models <strong>and</strong> just run the model as instructed in the MetaData of the model<br />
(a twin file that accompanies the model itself with instructions for its use <strong>and</strong> information about its<br />
creation).<br />
The possibilities are as varied as the phenomena that occur in the territory <strong>and</strong> the nature of the<br />
information available on these phenomena <strong>and</strong> the relevance for L<strong>and</strong> <strong>Management</strong> results from the<br />
simplification of bureaucracy <strong>and</strong> direct time saving.<br />
This methodology is fed with a continuous flow of geographical information. The workflow allows for<br />
the complexification of the model by constant knowledge upgrading, improving the quality of the<br />
10
João Agrela et al.<br />
outputs <strong>and</strong> results. In the end, planning <strong>and</strong> l<strong>and</strong> management benefit from the use of this kind of<br />
models <strong>and</strong> improve the quality of life. <strong>Information</strong> gathered in the right way becomes <strong>Knowledge</strong> <strong>and</strong><br />
this element is crucial to define better territorial strategies.<br />
Figure 10: Network analyses outputs<br />
LOPES stated: “a good deal of the persisting problems are owed to (…) a relative inability in tackling<br />
the problems in its entirety” (translated from LOPES, 2001, p. 348). Also, LOPES quotes Kuklinski<br />
(LOPES, 2001, p. 348) when he identifies the difficulties for municipal <strong>and</strong> regional planning which are<br />
the basis for this Model Builder approach that tries to overcome the following difficulties:<br />
Correct inventory of the available resources;<br />
Identification of development barriers;<br />
Correct selection of strategies;<br />
Correct choice of methods <strong>and</strong> models, including the correct tools.<br />
11
References<br />
João Agrela et al.<br />
Fontes, Ana; Gonçalves, António (2005), Cartografia de Risco de Incêndio no Parque Nacional da Peneda-Gerês<br />
e Gestão Adequada dos Recursos Florestais e Sistemas Naturais, Conference Proceedings, X Colóquio<br />
Ibérico, Évora<br />
Lobo, Manuel da Costa, (1999) Planeamento Regional e Urbano, Universidade Aberta, Lisboa<br />
Lopes, A. Simões, 2001, Desenvolvimento Regional, Fundação Calouste Gulbenkian, Lisboa<br />
Lúcio, José; Esteves, Leonor; Agrela, João; Emanuel, Óscar (2010), Cartografia de Risco e Resposta – Mata<br />
Nacional dos Sete Montes e Riscos de Incêndio, Conference Proceedings, Planeamento Municipal e<br />
Ordenamento do Território, FLUL, Lisboa<br />
Matos, João (2008) Fundamentos de Informação Geográfica, Lidel, Lisboa<br />
Morgado, Paulo; Rocha, Jorge; Costa, Nuno <strong>and</strong> Costa, Eduarda (2007), “Comparação de métodos e técnicas<br />
de análise multivariada linear (ACP) e não linear (SOFM) em SIG. Ensaio de modelação geográfica de<br />
indicadores de apoio a políticas públicas territoriais”, XIV Jornadas de Classificação e Análise de Dados,<br />
ISEP, Porto.<br />
Neto, Paulo Alex<strong>and</strong>re (1999), The Relation Geographic <strong>Information</strong> System (SIGR) A Proposal of a New<br />
Methodology for Regional <strong>and</strong> Local <strong>Management</strong> <strong>and</strong> Planning,39 th ERSA European Congress, Dublin<br />
Soares, Amílcar (2006), Geoestatística para as Ciências da Terra e do Ambiente, 2ª Edição, IST Press, Lisboa<br />
12
System Integration Model Based on Open Source Software<br />
(Oss)<br />
Kamsuriah Ahmad 1 , Azwan Mohamed 1 <strong>and</strong> Reduan Samad 2<br />
1 Strategic <strong>Information</strong> System Research Group, Universiti Kebangsaan<br />
Malaysia, Malaysia<br />
2 Asia E-University, Malaysia<br />
kam@ftsm.ukm.my<br />
azwanmohd@gmail.com<br />
Abstract: Application system is an important component to support business organizations. <strong>Information</strong>,<br />
communication <strong>and</strong> information technology have made developing business becomes very competitive. It is very<br />
crucial for companies to have fast <strong>and</strong> accurate access to mission-critical business information in order to<br />
maintain its competitiveness. The ability to establish network connections between the existing systems becomes<br />
a must in order to optimize the use of critical information. To realize this, the implementation of system integration<br />
looks promising. However, system integration process is not an easy task because it involves variety of systems<br />
with different organizations backgrounds. The main objective of this paper is to propose an integration model that<br />
is generic <strong>and</strong> easily adapted by many organizations. The <strong>Information</strong> <strong>Management</strong> Division, Public Sector<br />
Department in Malaysia is chosen as a case study. The systems used in this department will be analyzed <strong>and</strong><br />
problems faced will be identified. Research methodology conducted includes the Analysis Phase, Design Phase,<br />
Development Phase <strong>and</strong> Testing Phase. In order to support the proposed model, prototype called myIntegration<br />
is implemented based on OpenSyncro. OpenSyncro is an open source software (OSS) meant for Enterprise<br />
Application Integration (EAI). The Testing Phase was carried out by taking into account the actual test scenario<br />
involving the Department A (owner of the Malaysian Personal Record) <strong>and</strong> Department B (Human Resources<br />
Manager of Malaysian Civil Servants). Tests conducted have shown that the exchange of information between<br />
the Department A <strong>and</strong> B have been successfully realized. The finding from this research, where a new integration<br />
model has been created, can be referred by any government or private organizations in developing their systems<br />
integration facilities. The model also besides reducing the requirement of hardware; also reduces the<br />
dependency to proprietary products. In addition, the prototype developed, which based on OpenSyncro is<br />
capable in providing an alternative solution to the IT community to anchor any systems integration project at a<br />
lower cost <strong>and</strong> in a user friendly environment.<br />
Keywords: system integration, middleware solution, integration model, open source software, Enterprise<br />
Application Integration (EAI)<br />
1. Introduction<br />
System integration refers to the construction of linkages among computer systems <strong>and</strong> databases<br />
(Markus 2000). System integration is necessary as organizations often have to add more functionality<br />
into the organization <strong>Information</strong> Systems (IS) portfolio, which frequently entails dealing with<br />
indispensable legacy systems. In order to support the business process during the development of<br />
information systems, most officers <strong>and</strong> IT staff put less emphasis on issues of integration <strong>and</strong> interoperability<br />
between systems. This integration issues have been addressed by Malaysian<br />
Administrative Modernization <strong>and</strong> <strong>Management</strong> Planning Unit (MAMPU) as the most important body<br />
in the development of Malaysian e-Government Applications. This issue is important to ensure the<br />
continuity of successful implementation of various systems integration in the near the future<br />
(Khairuddin, 2010). Several issues need to be addressed seriously before any attempts being made<br />
in integrating various systems. Among the issues are incompatible operating systems, different usage<br />
of data scheme, mapping methods, network stability <strong>and</strong> costing. According to Braue (2002), in<br />
average most organization allocate around 40% of their total IT budget to ease system integration.<br />
This may explain why agencies or even commercialized organizations which put less emphasis on the<br />
system integration aspect will face the risk of failure in their businesses. Our review on several studies<br />
suggests that research on system integration requirements modeling has been scarce; among those<br />
studies conducted, a significant number of them only focus on data integration (Schmitt <strong>and</strong> Saake,<br />
2005). However every organization have unique business process <strong>and</strong> infra structure. Therefore,<br />
before proposing suitable integration model <strong>and</strong> selecting appropriate implementation solutions, a<br />
holistic <strong>and</strong> clear underst<strong>and</strong>ing of the enterprise-wide integration requirements among various<br />
internal <strong>and</strong> external systems is needed. In this study, the <strong>Information</strong> <strong>Management</strong> Division (IMD),<br />
Public Sector Department in Malaysia is chosen as a case study. The systems used in this division<br />
will be analyzed <strong>and</strong> problems faced will be identified. Therefore the main objective of this paper is to<br />
propose an integration model that is generic enough <strong>and</strong> easily adapted by other public organizations<br />
13
Kamsuriah Ahmad, Azwan Mohamed <strong>and</strong> Reduan Samad<br />
in Malaysia. The paper is organized as follow: Section 2 will discuss the three system integration<br />
methods, section 3 reveals the issues related to integration system. In section 4 reports the analysis<br />
of the existing integration tool used at <strong>Information</strong> <strong>Management</strong> Division (IMD). While in section 5<br />
states the various type of integration software. In section 6 discuss the design of proposed system<br />
integration model <strong>and</strong> the testing of this model is reported in section 7. Section 8 concludes the paper<br />
<strong>and</strong> proposal for future works.<br />
2. Integration system method<br />
According to Hohpe & Woolf (2003), integration system method can be implemented in four different<br />
ways: file transfer, shared database, remote procedure invocation, <strong>and</strong> messaging.<br />
File Transfer: This method refers to the process of file or document movement from one system to<br />
another system through network <strong>and</strong> supported by File Transfer Protocol (FTP). This method allows<br />
the sharing of documents or materials among government sector. As an example, one department<br />
able to upload documents at their website <strong>and</strong> interested user can download the documents at the<br />
other side. The concept of uploading <strong>and</strong> downloading documents from government department has<br />
promotes the existence of efficient <strong>and</strong> effective electronic application. This process will increase<br />
accessibility of the documents through uploading <strong>and</strong> downloading without the users have to go to the<br />
department to get particular documents.<br />
Shared Database: This method allows the system to integrate multiple information from various<br />
applications into centralized database. However the database schema needs to be analyzed earlier<br />
since most of the applications are developed separately <strong>and</strong> have different schema. Hohpe & Woolf<br />
(2003) states that integration process will be a lot easier with this method since it is able to adapt the<br />
SQL database features. The access to centralized database by different applications will limit the<br />
semantic dissonance problem. The challenge to this method is to construct a single database that has<br />
the same schema <strong>and</strong> definition, because normally the system is developed by different vendors <strong>and</strong><br />
will have different needs, function <strong>and</strong> technology. Many organizations now have used a st<strong>and</strong>ard<br />
schema <strong>and</strong> data definition to increase the interoperability among application. For instance, Malaysian<br />
Administrative Modernization <strong>and</strong> <strong>Management</strong> Planning Unit (MAMPU) has introduced a st<strong>and</strong>ard<br />
reference called National Data Dictionary (NDD) to be used for system development that involved the<br />
used of schema <strong>and</strong> data dictionary.<br />
Remote Procedure Invocation/Call: This method used encapsulation principal in the integration<br />
process between systems. If an application requires data from other application, it will request the<br />
related data from the particular system. If the data are going to be modified later it will be done on the<br />
data that involve with that application only, whereas the original data remain the same. The data<br />
integrity will be secured. However Hohpe & Wolfe (2003) states that this method has problems with<br />
accessibility <strong>and</strong> stability.<br />
Messaging: Most organizations <strong>and</strong> government agencies have more than one application to support<br />
their business functions. However, these applications are being developed by different vendors, with<br />
different programming languages <strong>and</strong> platforms. Therefore it is very crucial for the organization to<br />
share the information between applications in a very responsive way (Hohpe & Woolf, 2003).<br />
Messaging method seems promising to provide a solution to this problem. Messaging means all<br />
integrated applications are connected through the same messaging system, so that the data can be<br />
sent <strong>and</strong> received among the applications. According to Hohpe & Woolf (2003), this method will make<br />
the integration process easier, faster, <strong>and</strong> reliable.<br />
3. Integration issues<br />
In developing an integrated system there are several issues that need to be considered, such as the<br />
technology, human resource <strong>and</strong> policies (Ellison, 2005). Technology: the existing technology being<br />
used in the organization made the integration process possible. However the challenges that need to<br />
be considered are the unpredictability of network stability, which is one of the most critical factors in<br />
ensuring the success of system integration initiative. In addition, the different used of data schemas<br />
might slow down the integration process where the data need to go through the mapping phase in<br />
order to get a common schema. Human Resource: The attitude of the end user gives a big impact to<br />
the success of any ICT projects. Zaiton et. al (2000) report this phenomena has been one of the<br />
important deciding factors in project successes in Malaysia. Among the identified problem coming<br />
from the end users is computer-phobia phenomenon among some of the senior staffs, who are lack of<br />
14
Kamsuriah Ahmad, Azwan Mohamed <strong>and</strong> Reduan Samad<br />
knowledge on the importance of system integration, change of duty <strong>and</strong> etc. Organization Policies:<br />
System integration project initiative normally requires efficient communication between two or more<br />
systems in the same or different organization. Therefore, the change of policies in any organization<br />
will affect the implementation of system integration. The changes normally tried to improve the quality<br />
of services, the delivery of service <strong>and</strong> the staff. Therefore the proposed system integration needs to<br />
consider these three issues during the development.<br />
4. Analysis on current system<br />
Before a new integration system is proposed, analysis was conducted on the current integration tool<br />
used at the <strong>Information</strong> <strong>Management</strong> Department. This department involved in the development of<br />
Human Resource <strong>Management</strong> <strong>Information</strong> System (HRMIS) Integration Interface. Analysis is done<br />
through reviewing related document such the integration document agreement between the human<br />
resource systems with other legacy systems, interviewing current employees, browsing the<br />
department website, <strong>and</strong> etc. HRMIS is an application system for managing information on human<br />
resource for public sector. To make the system more comprehensive it needs to integrate with 27<br />
legacy systems from various government sectors. Among those are the National Registration<br />
Department, Putrajaya Hospital, Selangor State Development Corporation, <strong>and</strong> others. These 27<br />
systems are connected through a server called iHub. This server is an integration tool that developed<br />
based on MS Biztalk <strong>and</strong> SQL2000. There are six functions of iHub, which are: accessing data from<br />
the source system, sending data to the target system, data mapping or data transfer process, data<br />
compressing or decompressing, data encryption or decryption, <strong>and</strong> saving the log transaction for data<br />
integration. To execute these six processes, one unit of iHub needs to be installed between two<br />
legacy systems. When the process of integration is needed, iHub at the HRMIS side will signal the<br />
other legacy system (target system) by sending a message <strong>and</strong> the request. When the target system<br />
received the message, it will response towards the request <strong>and</strong> replied back to HRMIS application.<br />
The sending <strong>and</strong> receiving process appeared as a batch or real time processing. This process is<br />
described in Figure 1.<br />
HRMIS<br />
INTEGRATION<br />
SERVER<br />
OTHER HRMIS<br />
COMPONENTS<br />
WAN<br />
S<br />
T<br />
A<br />
G<br />
I<br />
N<br />
G<br />
S<br />
T<br />
A<br />
G<br />
I<br />
N<br />
G<br />
S<br />
T<br />
A<br />
G<br />
I<br />
N<br />
G<br />
AGENCY 1<br />
AGENCY 2<br />
AGENCY n<br />
Figure 1: The integration of HRMIS with other legacy systems<br />
Although iHub has been successfully implemented in the integration of HRMIS with other legacy<br />
systems, <strong>Information</strong> System Department believes there are rooms for improvement. Among the<br />
identified issues are high development <strong>and</strong> maintenance cost, <strong>and</strong> lots of equipments <strong>and</strong> hardware<br />
required. A study is done to propose a new solution or mechanism as an alternative solution to this<br />
problem. The study found that there is a possibility to use open source software to replace the<br />
proprietary software being used in order to reduce the cost.<br />
5. Integration tools<br />
To develop a system integration tool: we can choose whether to use proprietary software or open<br />
source software (OSS). OpenAdaptor is an integration tool that based on OSS with Java/XML<br />
technology. This tool is efficient for fast development since less programming is required as it comes<br />
15
Kamsuriah Ahmad, Azwan Mohamed <strong>and</strong> Reduan Samad<br />
with lots of embedded functions. OpenAdaptor is known for its friendliness in implementing the<br />
integration processes. OpenSyncro, another open source based integration tool is developed by<br />
Smilehouse Research <strong>and</strong> Development. It is a very light software application that based on Java<br />
platform <strong>and</strong> uses Apache Tomcat as the application server with MySQL as the database. Both of<br />
these tools are free. At the Public Service Department in Malaysia, an integration tool called iHub<br />
which was development by local company is being used. This tool is able to integrate human resource<br />
application with 27 existing legacy systems. However this tool requires two unit of iHub for every two<br />
integration systems to increase the communication. Therefore to integrate 27 systems, 27 units of<br />
iHub are needed! This will increase the cost <strong>and</strong> the maintenance activity as well. The intention of this<br />
study is to reduce the dependency to proprietary software. This will lead to reducing the cost of<br />
development <strong>and</strong> maintenance. This study intends to investigate the possibility of <strong>using</strong> integration<br />
tools that based on OSS. Simple investigation is done on OpenAdaptor <strong>and</strong> OpenSyncro, <strong>and</strong> as the<br />
result, the latter has been chosen at the end. The main justifications for the selection are based on its<br />
plug <strong>and</strong> play features, <strong>and</strong> the ease of programming burden.<br />
6. The design of the proposed integration system: myIntegration<br />
OpenSyncro which is an open source software was used in the development of the propose model.<br />
This software has generic <strong>and</strong> open feature, therefore the proposed model is design according to<br />
these features. The elements that need to be considered during the design for the integration model<br />
are the transaction type, integration approach, <strong>and</strong> transaction method.<br />
Transaction Type: The design of integration system is highly depending on the type of transaction<br />
chosen. There are two types of transactions, which are request/response <strong>and</strong> notification.<br />
Request/response transaction requires back <strong>and</strong> forth communication between the integrated<br />
systems. Therefore, an accessed to the integrated system is needed (Grants.Gov, 2007).<br />
However, notification transaction only sends data from one system to another system without<br />
requires any answers.<br />
Integration Approach: The choice of integration approach also affects the integration design.<br />
There are two integration approaches. They are either integration based on files or integration<br />
based on real data. Integration based on files refers to the used of text or XML file in the process<br />
of sending <strong>and</strong> receiving data between the integrated system. Integration based on real data<br />
means the real data that exist in the database is used for the integration <strong>and</strong> the table is<br />
predetermined at the earlier stage.<br />
Transaction Processing Method: Two transaction methods which will affect the design of the<br />
integration model are batch processing <strong>and</strong> real-time processing. Batch processing normally<br />
refers to non critical transaction <strong>and</strong> requires a support from scheduler component to execute or<br />
monitor the transaction processing. This transaction is normally done outside the prime hours.<br />
Real-time processing is a critical transaction <strong>and</strong> requires fast <strong>and</strong> urgent accessed to the system.<br />
HRMIS integration with the Putrajaya Hospital requires this type of transaction method. A support<br />
from equipment that can monitor the system <strong>and</strong> the network status is really required.<br />
OpenSyncro offer the features that are able to integrate various systems by transferring data from<br />
source system to target system (<strong>and</strong> vice versa) through the concept of piping. This piping has three<br />
main components: source component (SC), destination component (DC), <strong>and</strong> converter component<br />
(CC). The components are described as below:<br />
Source Component (SC): This component saves the configuration information on the data access<br />
of the source system. There are thirteen embedded source component which are provided by<br />
Smilehouse. The developer can choose any one of these source components <strong>and</strong> make<br />
necessary adjustment according to the scope <strong>and</strong> integration development requirement. Among<br />
the components are: Directory Source (accessing data directly from the file <strong>and</strong> folder), FTP<br />
Source (accessing data source <strong>using</strong> FTP), HTTP Source (accessing data source <strong>using</strong> HTTP),<br />
<strong>and</strong> etc.<br />
Destination Component (DC): This component will identify the destination of data. Smilehouse<br />
has provides ten embedded destination components to be used by the developer. Among those<br />
are JDBC Destination (directly send the data to Java database), HTTP Destination (directly send<br />
the data to destination <strong>using</strong> HTTP, <strong>and</strong> etc.<br />
Converter component (CC): This component allows any changes on data format to be done<br />
during the process of sending <strong>and</strong> receiving. This component is important to overcome the<br />
complexity that may exist between two systems that are going to be integrated, such as the used<br />
16
Kamsuriah Ahmad, Azwan Mohamed <strong>and</strong> Reduan Samad<br />
of different data format. Smilehouse has also provides thirteen converter component templates to<br />
be used <strong>and</strong> adjusted accordingly to suit the development requirements. Among the components<br />
available are ASCII-to-XML converter (to change the ASCII format to XML format) <strong>and</strong> many<br />
others.<br />
Figure 2 shows the proposed integration model called myIntegration. This model shows an integration<br />
process between Department A <strong>and</strong> Department B. As a prototype, myIntegration is able to do these<br />
three functions: sending data to target system, receiving data from target system, <strong>and</strong> saving the<br />
transaction log during data integration process.<br />
DEPARTMENT A myINTEGRATION<br />
(OPENSYNCRO)<br />
DEPARTMENT B<br />
Staging Area Staging Area<br />
SC<br />
DC CC<br />
CC DC<br />
Figure 2: Integration system model: myIntegration<br />
MyIntegration consists of eight modules to support the integration process, which are users,<br />
components, pipe list, pipe editor, pipe setting, component editor, transfer log <strong>and</strong> pipe execution<br />
queue. This tool has eight embedded database table to ease the integration process development<br />
between the systems.<br />
7. Testing<br />
As a prototype myIntegration is tested on its capabilities to send <strong>and</strong> receive data, <strong>and</strong> to modify the<br />
data that being transferred. Therefore, the objectives for myIntegration testing are:<br />
To test whether data from source system can be read <strong>and</strong> transferred to target system <strong>and</strong> vice<br />
versa,<br />
To test whether the integrated data are able to be modified<br />
To check whether myIntegration is capable enough to be an alternative solution to the existing<br />
integration system at <strong>Information</strong> <strong>Management</strong> Department.<br />
The activities that were carried out during the testing of myIntegration are:<br />
Integration Testing – component testing, accessibility testing<br />
Pre-User Acceptance Testing – testing that involve the staff at IMD<br />
User Acceptance Testing – testing that involve with the subject matter expert, system owner <strong>and</strong><br />
the end user.<br />
The Testing Phase was carried out by taking into account the actual test scenario involving the<br />
Department A (owner of the Malaysian Personal Record) <strong>and</strong> Department B (Human Resources<br />
Manager of Malaysian Civil Servants). Various testing is done to myIntegration as reported in Table 1<br />
<strong>and</strong> the results obtained from those testing.<br />
Tests conducted have shown that the exchange of information between the Department A <strong>and</strong> B have<br />
been successfully realized. Even though myIntegration had failed in three testing as shown in Table 1,<br />
Integration System Sector at <strong>Information</strong> <strong>Management</strong> Department (IMD) identifies that these function<br />
are not critical. Therefore, the result obtained at the end of the testing phase indicates that the listed<br />
objectives above are achieved. In future, it is hoped that myIntegration can be seen as a solution to<br />
the system integration problems faced by IMD.<br />
17<br />
SC
Table 1: The testing criteria<br />
Kamsuriah Ahmad, Azwan Mohamed <strong>and</strong> Reduan Samad<br />
Testing Criteria Result Priority<br />
1 Send data electronically Pass Very high<br />
2 Receive data electronically Pass Very high<br />
3 Change the data file format from text to XML or vice versa Pass Very high<br />
4 Data compression <strong>and</strong> decompress Fail Low<br />
5 Data encryption <strong>and</strong> decryption Fail Low<br />
6 Transaction Integration Report Pass Very high<br />
7 Transaction Scheduling Fail Very high<br />
8. Conclusion<br />
The main focus of this study is to propose a new system integration model for BPMJPA. An<br />
integration tool called myIntegration is build to support the proposed model. Compared with the<br />
existing proprietary system integration model, iHub, myIntegration is based on OpenSyncro which is<br />
free software. With the generic features <strong>and</strong> free software application, the developed tool is easily<br />
adaptable by any organization who plans to integrate their system. In addition, the tool developed<br />
which based on OpenSyncro is capable in providing an alternative solution to the IT community to<br />
anchor any systems integration project at a lower cost <strong>and</strong> user friendly environment. However as a<br />
prototype, the developed integration transaction function for myIntegration only deals with temporary<br />
folders. Integration process that directly link to the database is not allowed for security reasons.<br />
Therefore as a future extension, a new model for system integration that is able to link directly to the<br />
database is really needed. The finding from this research, where a new integration model has been<br />
created, can be referred by any government or private organizations in developing their systems<br />
integration facilities.<br />
References<br />
Braue, D. (2002) The Integration Imperative. [online]. CIO Magazine. http://www.cio.com.au<br />
Ellison, R.J. (2005) “Trustworthy Integration: Challenges for the Practitioner”. Final Report. Carnegie-Mellon<br />
University of Pittsburgh.<br />
Grants. Gov. (2007) “System Integration Document Grants.gov System”, [online] http://www.grants.gov<br />
Hohpe, G. <strong>and</strong> Woolf, B. (2003) Enterprise Integration Patterns: Designing, Building, <strong>and</strong> Deploying Messaging<br />
Solutions. Addison Wesley.<br />
Markus, M. Lynne (2000) "Paradigm Shifts - E-Business <strong>and</strong> Business/Systems Integration," Communications of<br />
the Association for <strong>Information</strong> Systems: Vol. 4, Article 10.<br />
Khairuddin, S. (2010) “Single Data Centre for Optimized Service Delivery”, Proceedings of ICT Conference.<br />
Schmitt, I., & Saake, G. (2005) “A comprehensive database schema integration method based on the theory of<br />
formal concepts”, Acta Informatica, 41(7), 475-524.<br />
Zaitun,A.B., Mashkuri,Y <strong>and</strong> . Harpe, A.T. (2000) “System Integration for A Developing Country: Failure or<br />
Success? A Malaysian Case Study”, Electronic Journal of <strong>Information</strong> Systems in Developing Countries.<br />
Volume 3<br />
18
Building Virtual Communities on top of Online Social<br />
Networks<br />
Cuneyt Gurcan Akcora, Barbara Carminati <strong>and</strong> Elena Ferrari<br />
DICOM, Università degli Studi dell’Insubria, Varese, Italy<br />
cuneyt.akcora@uninsubria.it<br />
elena.ferrari@uninsubria.it<br />
barbara.carminati@uninsubria.it<br />
Abstract: Current day social networks have amassed large amounts of information on how people interact,<br />
consume data <strong>and</strong> disseminate ideas. Virtual organizations, on the other h<strong>and</strong>, have crafted frameworks <strong>and</strong><br />
models to use such data in distributed, heterogeneous environments. In this paper, we discuss the benefits of<br />
<strong>using</strong> social network technologies in support of virtual organizations. To emphasize which types of virtual<br />
organizations can benefit most from a social network based approach, we give a classification of social network<br />
relationships. Building on the work of sociologists, we focus on the cases when organization memberships can<br />
increase the benefits for members while also helping the organization to advance its cause. As a proof of concept<br />
application for our proposed solution, we created an application running on the popular social network Facebook.<br />
Keywords: virtual organizations, social networks, homophily<br />
1. Introduction<br />
In the past decades, urbanization <strong>and</strong> improving transportation have created an interconnected web<br />
of social relations that are best portrayed by popular social networks. The same factors have<br />
compelled organizations to create proprietary social networks (Cook 2008, McAfee 2006) to link<br />
people from their branches in different parts of the world together.<br />
For organizations that have well defined job locations <strong>and</strong> positions (e.g., NATO), such proprietary<br />
networks can be provided with user information once for all (e.g., electronics engineers in Budapest).<br />
However, these organizations require strong bonds with users (e.g., the user is a paid employee) so<br />
that the entered profile information does not change or gets quickly updated as long as the bond<br />
exists.<br />
For other types of organizations, bonds are weak; user locations <strong>and</strong> profiles are not well defined, <strong>and</strong><br />
the organization harnesses user contribution whenever it is possible to do so. Political parties <strong>and</strong><br />
humanitarian organizations are examples of such entities. With such weak bonds, user information on<br />
proprietary networks can be obsolete. As a result, timely location of users <strong>and</strong> collaboration among<br />
them can be costly <strong>and</strong> time consuming. A clear example is given when volunteers from all over the<br />
world participate in efforts of international humanitarian organizations to assist <strong>and</strong> recover local<br />
citizens from natural disasters. Design <strong>and</strong> management of proprietary networks to timely h<strong>and</strong>le<br />
collaborations <strong>and</strong> information sharing among volunteers may require too much effort (Costur 2005).<br />
To help overcome this limitation, social computing can be exploited. Social computing is based on<br />
facilitating social interactions <strong>and</strong> promoting any sort of social behavior through software<br />
technologies. Blogs, emails social network services <strong>and</strong> wikis fall in this category <strong>and</strong> are the main<br />
mediums that are used to gain user added value. With social computing, we aim at providing a bridge<br />
between popular social networks of hundreds of millions of users <strong>and</strong> virtual organizations which<br />
actively seek human participation for a social cause.<br />
Our proposal has only been possible after recent changes in the social networking paradigm. Unlike<br />
early social networking sites, such as MySpace, current day social networks allow third party software<br />
developers to reach social network users through a programming interface (API) (Nazir et al. 2008).<br />
However, to the best of our knowledge, no work has been proposed to use this functionality for<br />
creating virtual organizations on top of existing online social networks.<br />
By employing social computing for virtual organizations, we propose engaging with social network<br />
users for a social cause. This way, social computing can be exploited by organizations to facilitate<br />
communications among groups of users who share common values, <strong>and</strong> locate a set of users based<br />
on their profile information. To show the effectiveness of our proposal, we created a Facebook<br />
19
Cuneyt Gurcan Akcora, Barbara Carminati <strong>and</strong> Elena Ferrari<br />
application that serves two functions: it helps organizations to locate their supporters, <strong>and</strong> allows<br />
media sharing among users to increase awareness in certain topics.<br />
The rest of the paper is organized as follows. Section 2 covers the sociological background of our<br />
proposal. In Section 3 we explain the motivation for creating a virtual organization on top of existing<br />
social networks. In Section 4 we give the related work, whereas Section 5 explains characteristics <strong>and</strong><br />
requirements of our proposal. Section 6 gives exemplary application domains for our proposal. In<br />
Section 7, we discuss a proof-of-concept Facebook application. Finally, Section 8 concludes the<br />
paper.<br />
2. Social relationships<br />
In sociology, creation <strong>and</strong> maintenance of relationship ties among similar individuals is explained by<br />
the homophily theory (McPherson 2001). According to homophily, personal attributes <strong>and</strong> connections<br />
affect creation of new ties in social life <strong>and</strong> result in homogeneous groups of individuals. Political party<br />
supporters <strong>and</strong> religious communities are examples of homophilous groups. However, homophily can<br />
be the direct result of how a society is structured. For instance in gender segregated schools, gender<br />
based homophily is a direct result of the school system because males <strong>and</strong> females create relation<br />
ties among themselves as they always interact with same sex individuals. To explain cases when a<br />
degree of homophily is expected by chance, researchers use baseline homophily, <strong>and</strong> when this<br />
degree is beyond mere chance, inbreeding homophily is said to exist. For example, if two Italians live<br />
in Italy, a marriage between them is explained by baseline homophily, whereas, if they live in Japan,<br />
the marriage reflects inbreeding homophily.<br />
Sources of homophily. For relationship ties, geography is the biggest source of homophily: individuals<br />
tend to create friendships with people that are around them. As the distance grows, ties weaken or<br />
get deleted, whereas in families, relation ties have been found to be resilient against distance effects<br />
(McPherson et al. 2001). When ties do not originate from families, some types of organizations, such<br />
as schools, work places, voluntary services are the biggest sources of homophily.<br />
Types of homophily. The attributes that cause homophily can be divided into two sets; sociologists<br />
use status homophily to describe homophily caused by personal attributes that are inherited or<br />
ascertained by factors from an individual’s family or background, such as race, age, ethnicity or<br />
gender. Value homophily, on the other h<strong>and</strong>, is used for homophily caused by attributes that are<br />
largely achieved by an individual, such as education, political view, beliefs <strong>and</strong> societal status.<br />
In status homophily, sex, race, ethnicity <strong>and</strong> age are the basic similarity notions between two<br />
individuals. Those similar points are inherited or gained r<strong>and</strong>omly without individual efforts, <strong>and</strong><br />
people that are similar along these attributes are easy to find in a geographic location. Expatriates are<br />
the only exception, because they might live in countries where same race or same ethnicity<br />
individuals are rare.<br />
Value homophily, on the other h<strong>and</strong>, depends on ideas <strong>and</strong> beliefs that are formed by the individual.<br />
As a result, similar people can be found across different societies <strong>and</strong> geographic locations. Creating<br />
connections with people that are similar in values hence becomes more difficult, <strong>and</strong> ties are prone to<br />
weakening as distance between two individuals grows.<br />
In what follows, we will discuss how homophily can be used as basis for virtual homophily-based<br />
organizations (VHOs) (Martinez et al. 2001) to advance prominence of some ideas while presenting<br />
similar individuals an opportunity to create relationships among them. In particular, we propose <strong>using</strong><br />
value homophily as the common ground among individuals for a virtual organization. At this point, we<br />
make another distinction among values that can be the basis for an organization; we are specifically<br />
interested in values which can most benefit from user interactions <strong>and</strong> exploit collective capabilities of<br />
individuals to accomplish tasks. For example, an organization that uses shared political views among<br />
its members as its basis can provide a venue to exchange ideas for new policies, <strong>and</strong> direct the<br />
members to demonstrations for more publicity. In this case, both the organization <strong>and</strong> its members<br />
can benefit from memberships.<br />
To capture the difference among values, we propose two goals for a successful VHO: providing i)<br />
added value for the organization <strong>and</strong> ii) added value for users. The main goal of the organization is to<br />
benefit from ideas or works of its user base <strong>and</strong> increase prominence of its values <strong>and</strong> cause.<br />
20
Cuneyt Gurcan Akcora, Barbara Carminati <strong>and</strong> Elena Ferrari<br />
Moreover, users themselves expect to benefit from the value homophily organization. Such benefits<br />
may include meeting with similar people (which increases inbreeding homophily) or gaining access to<br />
powerful networks.<br />
Current day virtual organizations use proprietary web solutions. In these solutions, specific web sites<br />
are created for each virtual organization. In the next section, we will outline the benefits of <strong>using</strong> a<br />
social network instead of proprietary solutions.<br />
3. Why use a social network?<br />
Social networks offer some benefits that are difficult to be matched by proprietary web solutions.<br />
These benefits include regularly updated user profiles, updated user contact information, better<br />
penetration rate, security <strong>and</strong> privacy, <strong>and</strong> finally, feedback collection.<br />
Regularly updated user profiles. For targeted messages or deployment of users to certain tasks, an<br />
organization needs to keep track of user attributes such as location, education <strong>and</strong> profession.<br />
However, user data can be missing, <strong>and</strong> furthermore can be outdated when the organization needs it<br />
in future. Keeping normalized <strong>and</strong> updated profiles hence becomes an important part of maintaining<br />
organizational efficiency (Camarinha-Matos <strong>and</strong> Afsarmanesh 2006). Social network users, although<br />
not all of them <strong>and</strong> not all the time, update their profiles; hence user data are more available than<br />
they would be under a proprietary solution.<br />
Updated user contact information. User data are needed to classify users for allocating certain tasks,<br />
yet if the user is not reachable; all this effort goes to waste. In proprietary solutions where the user is<br />
asked for an email or mail address upon registration, user contact information cannot be updated<br />
without user input, hence in future the user might not use the same addresses when the organization<br />
tries to communicate. In social networks, user email addresses are updated upon a change, but more<br />
than that, a profile that is associated with a user can provide a bridge to disseminate news to the user<br />
even in the absence of an email address. For example, on Facebook a message to the user can<br />
provide email functionality.<br />
Better penetration rate. A proprietary web solution is by its nature only accessible to the people who<br />
know it. On the contrary, a social network like Facebook covers more than 750 million user profiles 1 in<br />
a connected network. Moving the proprietary solution to social networks broadens the horizons of the<br />
organization by making it accessible to a wider audience.<br />
Security <strong>and</strong> privacy. However simple, every proprietary web solution requires a certain level of<br />
security <strong>and</strong> privacy to ensure user profile integrity <strong>and</strong> confidentiality. On social networks, a subset of<br />
such procedures is taken care of by the social network providers. Current social networks, like<br />
Facebook, offer user login procedures to third parties for user interaction on these web sites.<br />
However, the organization will still need access control policies to define organizational roles.<br />
Feedback collection. In a proprietary web solution, feedback can only be gathered from members,<br />
excluding a wide range of non-member individuals from feedback collection. To make matters worse,<br />
value homophily organizations consist of members who share the same values with the organization,<br />
thus the organization risks collecting feedbacks only from a homogeneous group of individuals who<br />
already share the organization’s view. An example of this is political parties which ask supporters to<br />
rate party policies. On social networks, evaluation can be done with feedback from a more<br />
heterogeneous group of users, so the organization can learn which policies gain more sympathy, <strong>and</strong><br />
which ones are disliked by the society (not only by its supporters).<br />
Considering the above discussion, we chose Facebook as our target social network, because it is<br />
today the most popular <strong>and</strong> widely used social network. Moreover, unlike some other popular<br />
networks, like Twitter.com, Facebook offers user profiles with personal attributes. Noting these<br />
benefits that a social network can add to organizations, we now turn our attention to characteristics of<br />
a social network based VHO <strong>and</strong> describe the criteria for a successful architecture. Before that, we<br />
review the state of the art.<br />
1 1http://blog.facebook.com/blog.php?post=409753352130<br />
21
4. Existing technologies<br />
Cuneyt Gurcan Akcora, Barbara Carminati <strong>and</strong> Elena Ferrari<br />
In this section, we will first discuss the foundations of virtual organizations, <strong>and</strong> then proceed to review<br />
real life existing solutions.<br />
4.1 Literature review<br />
Much of the early research on virtual enterprises <strong>and</strong> organizations were influenced by Transaction<br />
Cost Economics (Williamson 1975) which proposes that manufacturing firms should use externally<br />
purchased goods to focus only on their core competencies. This idea necessitated outsourcing<br />
(obtaining goods or services from an outside supplier) parts of the manufacturing process to other<br />
business companies <strong>and</strong> required business-to business communications. For this purpose,<br />
frameworks (Inmon et al. 1997), (Schekkerman 2006), (Zwegers et al. 2003) <strong>and</strong> models (Stewart<br />
1997) have been proposed in the following years.<br />
Current research in this field works on bringing together individual entities by information technology<br />
to share resources <strong>and</strong> skill sets in order to improve market competency (Cardoso <strong>and</strong> Oliveira 2005),<br />
(Pang 2001), (Tan 2010). Similar to value homophily, this aspect of current research shares our goal<br />
of combining skills <strong>and</strong> abilities for greater market opportunities. However, such enterprises form a<br />
nebulous group of individual entities in which any entity can be changed. Moreover, cooperation<br />
between entities does not serve a higher purpose; instead each entity is present to increase its own<br />
profit <strong>and</strong> market share. In our proposal, members of the organization are connected by a central<br />
permanent node in the social network. This node provides an anchor for similar people to find <strong>and</strong><br />
interact with each other.<br />
Much of what we have discussed until now involves a form of commerce related symbiotic<br />
cooperation. With the advent of information theory, virtual enterprises have also been used in non<br />
commercial applications. Among them, humanitarian organizations use virtual enterprises to<br />
coordinate responses in an emergency (Charles, Lauras <strong>and</strong> Tomasini 2010), (de Leeuw, Kopczak<br />
<strong>and</strong> Blansjaar 2010). Similar to our proposal, humanitarian organizations have to find members <strong>and</strong><br />
control the cooperation among them. This cooperation serves the higher purpose of responding to an<br />
emergency in a timely manner. However, many of such organizations are created at the beginning of<br />
an emergency <strong>and</strong> memberships end when the emergency is over. Some researchers propose<br />
models to ensure that global capacity is built up <strong>and</strong> maintained before an emergency breaks out<br />
(Truptil et al. 2010). These capacities building humanitarian organizations are very similar to our<br />
proposal with the exception that their members are mainly not individuals but companies.<br />
Virtual organizations have also been used in collaborative networks where members can include<br />
individuals as well as companies (Baldo <strong>and</strong> Rabelo 2010), (Camarinha-Matos <strong>and</strong> Afsarmanesh<br />
2005). More than getting a single task done, collaborative networks can be used for long term<br />
projects. Collaborative networks make use of ontologies for member roles <strong>and</strong> capabilities (Plisson et<br />
al. 2007). Furthermore, data st<strong>and</strong>ards 2 are used to facilitate information exchange among members<br />
(Berners-Lee et al. 2001), <strong>and</strong> some proposals integrate social network data with collaborative<br />
network data (Fiumara et al. 2010).<br />
Our proposal is similar to collaborative networks in information exchange <strong>and</strong> member collaboration,<br />
yet it differs from them in <strong>using</strong> a publicly available, popular social network to recruit members.<br />
Furthermore, the main idea in collaborative networks is to use team effort. In this aspect, it diverges<br />
from our proposal to increase user interaction through membership in a virtual organization.<br />
Having explained the research foundations, in the next section we will discuss how these ideas have<br />
been implemented in real life solutions.<br />
4.2 Real life solutions<br />
Commercial solutions mainly involve outsourcing parts of a manufacturing process to subcontractors.<br />
Aventis (French Pharmaceuticals Company), Dell computers (US computer manufacturer) <strong>and</strong> British<br />
Telecom were the leading figures in transitioning to virtual enterprises for better profits.<br />
2 www.w3.org/TR/rdf-primer/ , www.unece.org/trade/untdid/welcome.htm<br />
22
Cuneyt Gurcan Akcora, Barbara Carminati <strong>and</strong> Elena Ferrari<br />
In commercial solutions, the organization is built around a central entity, mainly because this entity<br />
provides the means for cooperation, <strong>and</strong> the entity benefits from the work of other individual entities.<br />
Those small entities also benefit from cooperation, but they are replaceable. In this approach the<br />
central node does not need to cultivate relationships among members. In commercial solutions that<br />
involve individuals, freelancing leads the way by web sites like Freelancer.com <strong>and</strong><br />
Freelanceswitch.com where one time services are offered for small fees. Similarly, online job<br />
agencies help individuals find employment opportunities.<br />
One of the most relevant fields that can benefit from VHO is the humanitarian organizations. For<br />
instance, in emergency related volunteerism, Crisiscommons.org provides a venue for digital<br />
participation <strong>and</strong> works to increase member interactions by organizing the ”Crisis camps”. On the<br />
other h<strong>and</strong>, web organizations, such as Jffixler.com <strong>and</strong> Rmhc.org, offer general purpose volunteering<br />
services to individuals. All of these services suffer from locality; they cannot reach all potential<br />
members. Although they have Facebook pages, users can only ”Like” them, <strong>and</strong> this Facebook page<br />
cannot read user profiles to reach users of relevant skill sets.<br />
Governments have seen the importance of collaborative networks, <strong>and</strong> funded projects for data<br />
sharing <strong>and</strong> processing. For example, in the Global <strong>Information</strong> Grid Project4, the US government is<br />
establishing an Internet based data processing, sharing <strong>and</strong> storage framework<br />
(www.nsa.gov/ia/programs/). To increase collaboration among companies, European Union has<br />
funded the <strong>Information</strong> <strong>and</strong> Communication Technologies programme in the Seventh Framework<br />
Programme (http://cordis.europa.eu/fp7/ict/). The programme includes studies such as ”Advanced<br />
legal issues in virtual enterprises” <strong>and</strong> ”European collaborative networked organizations leadership<br />
initiative”.<br />
In non-governmental organizations, Internet has seen rise of very successful collaborative networks<br />
like Wikipedia.org, where members share a common goal <strong>and</strong> have hierarchically structured roles in<br />
the collaboration process to create high quality content (Javanmardi <strong>and</strong> Lopes 2010). Indeed, some<br />
collaboration networks have produced products such as the Apache web server <strong>and</strong> the Linux<br />
operating system which paved the way to increase Internet usage by providing cheap/free end<br />
products.<br />
However, none of these existing technologies provide integration with real life social networks.<br />
Instead, they create the infrastructure to build proprietary social networks (Yang <strong>and</strong> Chen 2008). As<br />
a result, these real life solutions have not seen a meaningful increase in user participation (Matheson,<br />
Ruben <strong>and</strong> Ross 2009) despite advances in internet technologies.<br />
5. Characteristics <strong>and</strong> requirements of VHOs<br />
In this section, we will start with creation, <strong>and</strong> then proceed to explain following phases in life cycle of<br />
a VHO (Camarinha-Matos <strong>and</strong> Afsarmanesh 2008).<br />
5.1 Creation<br />
The life cycle of our target VHO starts after the social network begins its service. The organization is<br />
started by creating a central node on the social network. At least one administrator initially creates<br />
<strong>and</strong> manages the central node. On Facebook, this refers to creating an application which asks social<br />
network users to accept sharing their profile information <strong>and</strong> e-mail addresses with the application<br />
<strong>and</strong> allow the application to send them messages. Profile information includes current location,<br />
hometown location, work history, education history, gender <strong>and</strong> age. After getting Facebook<br />
permissions from the user, the application connects to user profile <strong>and</strong> reads profile data.<br />
In subsequent visits by the user, the Facebook application authenticates users through tools<br />
(www.developers.facebook.com/docs/reference/api/) provided by Facebook (API components), hence<br />
it does not need to store user names <strong>and</strong> passwords on its servers.<br />
Figure 1 (a) shows the social network state when the application page is first created. In this figure<br />
two fictional locations, A <strong>and</strong> B, are shaded to indicate users from these geographic locations, <strong>and</strong><br />
users that are similar in values are shown with letter V.<br />
23
Cuneyt Gurcan Akcora, Barbara Carminati <strong>and</strong> Elena Ferrari<br />
(a) Social network at the time of central node<br />
creation<br />
(b) Created membership <strong>and</strong> user to user links<br />
Figure 1: Establishing organizational links on a social network<br />
The organization aims connecting to all users who share values of the organization. Furthermore, the<br />
organization increases inbreeding homophily by helping users connect to each other. Similarly, the<br />
organization works in advancing its values by gaining new users to the cause. Figure 1(b) shows the<br />
newly created membership <strong>and</strong> user to user links. In the ideal case, the organization can connect to<br />
all users who share its values <strong>and</strong> recruit new members for the cause.<br />
5.2 Operations <strong>and</strong> evolution<br />
As members are the main asset of a virtual organization, we will first discuss definitions <strong>and</strong><br />
evolutions of member roles.<br />
Member roles. A value homophily based virtual organization consists of regular members,<br />
administrative members that are chosen from members, <strong>and</strong> organization administrators. Organization<br />
administrators are paid workers or owners of an organization which wants to create a virtual<br />
organization on social networks. In creation of regular member roles, we define two major factors:<br />
location <strong>and</strong> user attributes. Depending on the count of members in locations, the organization can<br />
establish local groups for each geographic location.<br />
Differing from location, user attributes offer more semantic variety for group creation. For example,<br />
education history can be used to group users according to their education levels. Similarly, work<br />
history can be used to create groups of users who share the same profession, such as engineer,<br />
medical doctor or teacher.<br />
Each location <strong>and</strong> attribute group is governed by a selected member who acts as an administrator. In<br />
administrative member selection, a reputation score can be computed for each member <strong>and</strong> the most<br />
reputed member can be selected for administrative tasks. In this paper, we will not discuss this<br />
process. Instead, we refer the reader to a widely used reputation system in social networks (Sabater<br />
<strong>and</strong> Sierra 2002).<br />
In user to group relations, each user can be a member of multiple groups based on profile attributes,<br />
location or a combination of both. For example, members can be divided into groups based on their<br />
home countries, <strong>and</strong> each one of these groups can be further divided into attribute groups. For<br />
example, in this scenario, the organization can select German medical doctors.<br />
Interactions. Member interactions on a virtual organization (Ardichvili 2008) serves the purpose of<br />
increasing the inbreeding homophily. In simpler terms, it involves getting members together to create<br />
friendship links among them. For this purpose, the VHO provides an information pool to automatically<br />
share member generated content. On Facebook, this content includes links to articles, videos <strong>and</strong><br />
such. This content is received by the Facebook application from member profiles. Additionally, this pool<br />
can be used to publicize organization related information. For example, administrators can share a link<br />
to the latest budget proposal of the organization.<br />
Search. For timely deployment of human resources (Xu et al. 2008), filtering is used to locate groups of<br />
members <strong>and</strong> assign tasks to them under supervision of administrators. Through an organization<br />
policy, members can also be allowed to use attribute <strong>and</strong> location based filtering to locate other groups<br />
<strong>and</strong> members. However, in such a scenario user privacy should not be violated.<br />
24
Cuneyt Gurcan Akcora, Barbara Carminati <strong>and</strong> Elena Ferrari<br />
Each member allows the organization to access profile information, yet the member should be able to<br />
restrict data access of specific members to the profile information. The organization should create a<br />
privacy settings interface to learn member decisions in data sharing. For example, a user can choose<br />
to hide hometown from other members.<br />
Metamorphosis or dissolution.The organization continues its life cycle until the social network is<br />
dissolved, <strong>and</strong> during this time period a member may lose interest in taking part to the organization.<br />
Unlike current day virtual organizations where memberships depend on active participation of a user,<br />
memberships to our organization starts with giving data access permissions <strong>and</strong> continues as long as<br />
these permissions are not revoked. As a result, our organization can include members who do not<br />
participate in any organizational activity. In sociology, decay functions have been used to determine<br />
life time of relation edges between individuals (Burt 2000). Adapting this terminology to our proposal,<br />
we explain the decay function with user inactivity as the VHO ages. When the decay value passes a<br />
critical point, the user is said to leave the organization, <strong>and</strong> the membership link is revoked.<br />
Migration services. All social networks are living organism <strong>and</strong> they will die or lose importance in<br />
future. This aging has been observed for once popular networks Usenet.com <strong>and</strong> Myspace.com, <strong>and</strong><br />
this may happens also to Facebook in the future. Therefore, the VHO should allow migration to the<br />
newest <strong>and</strong> most influential social networks while keeping user profiles. On the newly established<br />
social network, the organization should offer a seamless integration of old <strong>and</strong> new profiles. Email<br />
addresses can be used as an authentication anchor to link new profiles to the old ones.<br />
6. VHO application domains<br />
In this section, we will give example domains where an instance of a VHO can be used.<br />
Political parties. Political party supporters gather around a political view <strong>and</strong> share value homophily in<br />
this view. As the influence of a political view extends beyond geographic locations, connecting party<br />
supporters become vital to increase prominence of the political view in a society. This user interaction<br />
provides added value to organization. In another aspect, supporters are present in a political party to<br />
gain more benefits from country resources, which corresponds to added value to the user base. Thus,<br />
political organizations support both the goals of our proposal, <strong>and</strong> present an ideal domain to create<br />
virtual organizations.<br />
Voluntary organizations. In volunteering, the shared value is altruistic ideas. Although members are not<br />
present to maximize their gains like political party supporters, they nonetheless expect to meet others<br />
<strong>and</strong> feel useful in a society. Voluntary organizations, on the other h<strong>and</strong>, aim at reducing the cost of<br />
certain tasks by channelling available human capital to them. Such organizations have to keep profile<br />
data of volunteers, <strong>and</strong> deploy them whenever a need arises.<br />
Real life solutions approach this problem by creating web sites where a volunteer must subscribe to<br />
record profile information. In these solutions, when the user profile changes in future, the organization<br />
has no means to update recorded data without user participation. Our proposal alleviates all these<br />
problems by offering a real life link to members on social networks. For example, in the face of an<br />
earthquake, our proposal can filter members by their professions, <strong>and</strong> ask medical doctors to<br />
participate in relief efforts.<br />
Similarly, our proposal can be used for temporary organizational needs that have well defined time<br />
lines. For example, in an international games event, volunteers can be recruited on social networks,<br />
filtered by their profile attributes <strong>and</strong> directed to tasks that are most suitable to them.<br />
7. The commons application<br />
Having given possible application domains, we will now discuss our proof-of-concept virtual<br />
organization 3 on Facebook. Since it is a work in progress at the current stage it supports only a<br />
subset of the needed functionalities. We created our virtual organization to increase user interaction<br />
among Fulbright 4 scholars. Added value for the organization is to increase prominence of Fulbright<br />
programs. At the current stage, administrative member selection <strong>and</strong> grouping were not implemented,<br />
3 http://sight.dicom.uninsubria.it/home/flex/<br />
4 http://www.iie.org/fulbright<br />
25
Cuneyt Gurcan Akcora, Barbara Carminati <strong>and</strong> Elena Ferrari<br />
as the application has not been running long enough to acquire too many users. From the application,<br />
a view of member generated content is given in Figure 2(a).<br />
(a) Shared content<br />
(b) Filtering members<br />
Figure 2: Views from the application<br />
Filtering has been implemented in fine granularity by considering all Facebook profile items. Figure<br />
2(b) shows a search interface from the application.<br />
Privacy of user profile items can be adjusted by changing settings in the application. Figure 3 shows<br />
the privacy settings in our application. Please note that, the data presented in the figure is received<br />
from Facebook automatically, <strong>and</strong> it is not user entered. However, the user can add more data or<br />
remove some parts of it.<br />
Figure 3: Settings for profile privacy<br />
8. Conclusions<br />
In this paper we proposed a solution that can help virtual organizations to benefit from existing social<br />
networks functionalities. We gave requirements <strong>and</strong> characteristics of our solution, <strong>and</strong> presented a<br />
proof of concept Facebook application. In the future, we plan to observe how such a solution<br />
increases efficiency in management <strong>and</strong> maintenance of VHOs for different application domains.<br />
Moreover, we plan to extend the set of supported functions.<br />
26
References<br />
Cuneyt Gurcan Akcora, Barbara Carminati <strong>and</strong> Elena Ferrari<br />
Ardichvili, A. (2008), ‘Learning <strong>and</strong> knowledge sharing in virtual communities of practice: Motivators, barriers, <strong>and</strong><br />
enablers’, Advances in Developing Human Resources, Sage Publications, 10, 541.<br />
Baldo, F. & Rabelo, R. (2010), 'A Structured Approach for Implementing Virtual Organization Breeding<br />
Environments in the Mold <strong>and</strong> Die Sector–A Brazilian Case Study', Collaborative Networks for a Sustainable<br />
World 336/2010, 197--203.<br />
Berners-Lee, T.; Hendler, J.; Lassila, O. & others (2001), 'The semantic web', Scientific american 284(5), 28--37.<br />
Burt, R. (2000), 'Decay functions', Social Networks 22(1), 1--28.<br />
Camarinha-Matos, L. & Afsarmanesh, H. (2008), Collaborative networks: Reference modeling, Springer-Verlag<br />
New York Inc.<br />
Camarinha-Matos, L. & Afsarmanesh, H. (2006), 'Creation of virtual organizations in a breeding<br />
environment''Proceedings of INCOM', 595--603.<br />
Camarinha-Matos, L. & Afsarmanesh, H. (2005), 'Collaborative networks: A new scientific discipline', Journal of<br />
Intelligent Manufacturing 16(4), 439--452.<br />
Cardoso, H. & Oliveira, E. (2005), 'Virtual enterprise normative framework within electronic institutions',<br />
Engineering societies in the agents world V 4, 14--32.<br />
Charles, A.; Lauras, M. & Tomasini, R. (2010), 'Collaboration Networks Involving Humanitarian Organisations–<br />
Particular Problems for a Particular Sector', Collaborative Networks for a Sustainable World 336/2010, 157--<br />
165.<br />
Cook, N. (2008),’Enterprise 2.0: how social software will change the future of work’, Ashgate Pub Co.<br />
Costur, G. (2005), ‘Sharing <strong>Information</strong> among Various Organizations in Relief Efforts DTIC’ Document.<br />
Fiumara, G.; Maggiorini, D.; Provetti, A. & Ripamonti, L. (2010), '<strong>Knowledge</strong> Representation in Virtual Teams: A<br />
Perspective Approach for Synthetic Worlds', Collaborative Networks for a Sustainable World 336/2010, 619-<br />
-625.<br />
Inmon, W.; Zachman, J. & Geiger, J. (1997), Data Stores, Data Wareho<strong>using</strong> <strong>and</strong> the Zachman Framework:<br />
Managing Enterprise <strong>Knowledge</strong>, McGraw-Hill, Inc..<br />
Javanmardi, S. & Lopes, C. (2010), 'Statistical measure of quality in Wikipedia''Proceedings of the First<br />
Workshop on Social Media Analytics', ACM, 132--138.<br />
de Leeuw, S.; Kopczak, L. R. & Blansjaar, M. (2010), 'What Really Matters in Locating Shared Humanitarian<br />
Stockpiles: Evidence from the WASH Cluster', Collaborative Networks for a Sustainable World 336/2010,<br />
166--172.<br />
Martinez, M.; Fouletier, P.; Park, K. & Favrel, J. (2001), 'Virtual enterprise-organisation, evolution <strong>and</strong> control',<br />
International Journal of Production Economics 74(1-3), 225--238.<br />
Matheson, K.; Ruben, M. & Ross, H. (2009), ‘eNonprofit benchmark study: An analysis of online messaging,<br />
fundraising, <strong>and</strong> advocacy metrics for nonprofit organizations’, [online] Retrieved from http://www. e-bench<br />
marksstudy. com/pubs/2009eNonprofitBenchmarksStudy. Pdf.<br />
McAfee, A. (2006), ‘Enterprise 2.0: The dawn of emergent collaboration’, Engineering <strong>Management</strong> Review,<br />
IEEE, 2006, 34, 38-38 .<br />
McPherson, M.; Smith-Lovin, L. & Cook, J. (2001), 'Birds of a feather: Homophily in social networks', Annual<br />
review of sociology 27, 415--444.<br />
Nazir, A.; Raza, S. & Chuah, C. (2008), ‘Unveiling Facebook: a measurement study of social network based<br />
applications’, Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, 43-56.<br />
Pang, L. (2001), 'Underst<strong>and</strong>ing virtual organizations', <strong>Information</strong> Systems Control Journal 6, 42--47.<br />
Plisson, J.; Ljubic, P.; Mozetic, I. & Lavrac, N. (2007), 'An ontology for virtual organization breeding<br />
environments', Systems, Man, <strong>and</strong> Cybernetics, Part C: Applications <strong>and</strong> Reviews, IEEE Transactions on<br />
37(6), 1327--1341.<br />
Sabater, J. & Sierra, C. (2002), 'Reputation <strong>and</strong> social network analysis in multi-agent systems''Proceedings of<br />
the first international joint conference on Autonomous agents <strong>and</strong> multiagent systems: part 1', ACM, 475--<br />
482.<br />
Schekkerman, J. (2006), How to Survive in the Jungle of Enterprise Architecture Frameworks: Creating or<br />
Choosing an Enterprise Architecture Framework, Trafford.<br />
Stewart, G. (1997), 'Supply-chain operations reference model (SCOR): the first cross-industry framework for<br />
integrated supply-chain management', Logistics <strong>Information</strong> <strong>Management</strong> 10(2), 62--67.<br />
Tan, W.; Xu, Y.; Xu, W.; Xu, L.; Zhao, X.; Wang, L. & Fu, L. (2010), 'A methodology toward manufacturing gridbased<br />
virtual enterprise operation platform', Enterprise <strong>Information</strong> Systems 4(3), 283--309.<br />
Truptil, S.; Benaben, F. & Pingaud, H. (2010), 'A Mediation <strong>Information</strong> System to Help to Coordinate the<br />
Response to a Crisis', Collaborative Networks for a Sustainable World Volume 336/2010, 173--180.<br />
Xu, R.; Yang, F.; Lin, P. & An, S. (2008), ‘Research on <strong>Knowledge</strong> Share in a Virtual Organization’, International<br />
Conference on Internet Computing in Science <strong>and</strong> Engineering, 467-472.<br />
Williamson, O. (1975), Markets <strong>and</strong> hierarchies: analysis <strong>and</strong> antitrust implications: a study in the economics of<br />
internal organization, Vol. 46, Free Press New York.<br />
Yang, S. & Chen, I. (2008), ‘A social network-based system for supporting interactive collaboration in knowledge<br />
sharing over peer-to-peer network’, International Journal of Human-Computer Studies, Elsevier, 66, 36-50.<br />
Zwegers, A.; Tolle, M. & Vesterager, J. (2003), 'VERAM: virtual enterprise reference architecture <strong>and</strong><br />
methodology''VTT symposium', Citeseer, 17--38.<br />
27
Benchmarking <strong>Information</strong> <strong>Management</strong> Practice <strong>and</strong><br />
Competence in Swedish Organizations<br />
Karen Anderson 1 , Göran Samuelsson 1 <strong>and</strong> Marie Morner Jansson 2<br />
1<br />
Mid Sweden University, Härnös<strong>and</strong>, Sweden<br />
2<br />
InfoGain, Stockholm, Sweden<br />
karen.<strong>and</strong>erson@miun.se<br />
göran.samuelsson@miun.se<br />
marie@infogain.se<br />
Abstract: As organizations transform towards e-service provision <strong>and</strong> operations sophisticated, organizationwide<br />
approaches to information management are required. However, there is reason to believe that few<br />
organizations have developed a fully holistic approach to thinking about developing <strong>and</strong> managing their<br />
information assets to ensure their current <strong>and</strong> future accessibility <strong>and</strong> usability. There is an increasing awareness<br />
of the need to design systems that ensure information is accessible <strong>and</strong> re-usable, yet vital information often<br />
becomes increasingly inaccessible over time, to the disadvantage of business intelligence, business needs,<br />
customer service <strong>and</strong> regulatory requirements. An extensive survey of the state of the art of information<br />
management within Swedish organizations was undertaken to gain an underst<strong>and</strong>ing of current approaches,<br />
what competence is currently available within organizations <strong>and</strong> what competencies are perceived to be lacking<br />
or need development to ensure sustainable management of information as a business asset. This paper presents<br />
insights into how well or poorly records managers’ <strong>and</strong> archivists’ expertise is incorporated into whole-oforganization<br />
strategic planning for information management. It was rare to find collaboration between enterprise<br />
information architects <strong>and</strong> IT professionals with the recordkeeping professionals, who have expertise in<br />
structuring information <strong>and</strong> metadata as well as system requirements that contribute to ensuring long-term<br />
preservation, which would potentially minimize the proliferation of legacy systems from which records <strong>and</strong><br />
information are very costly or impossible to migrate or extract. Many archivists considered that it is not their role<br />
to participate in wider information management strategies, preferring to focus on the capture of records into an ’earchive’<br />
without recognizing that information in the archive is a potentially re-usable business asset. This initial<br />
research contributes to an underst<strong>and</strong>ing of information cultures within organizations. It is intended to be used as<br />
a benchmark: follow-up studies are planned at regular intervals in the future to measure change in practice,<br />
attitudes <strong>and</strong> professional alliances to improve information management.<br />
Keywords: information management; recordkeeping competencies; e-service transformation; long term<br />
preservation; sustainable information management<br />
1. Introduction <strong>and</strong> background<br />
As organizations transform towards e-service provision <strong>and</strong> operations sophisticated, organizationwide<br />
approaches to information management (IM) are required. There is, however, reason to believe<br />
that few organizations have developed a fully holistic approach in their thinking about developing <strong>and</strong><br />
managing their information assets to ensure current <strong>and</strong> future accessibility <strong>and</strong> usability. In a 2010<br />
survey conducted by Lundell <strong>and</strong> Lings, 40% of all 290 Swedish municipalities could not produce<br />
council minutes from 1999, often because they were dependent on old proprietary software <strong>and</strong><br />
systems that had been phased out. They conclude that "After only ten years there are problems with<br />
accessing or reading files that are known to exist", (Lundell & Lings, 2010). Of equal concern are the<br />
findings of a survey of national government authorities conducted by the Swedish National Archives in<br />
2010 on the current status of their electronic recordkeeping which achieved a 97% response rate. All<br />
had electronic documents, but 64% revealed they had no strategies for long-term preservation. 22%<br />
were working on a strategy (Riksarkivet, 2010, pp.6,8,17). A 2009 case study of electronic document<br />
management in a large Swedish railway project revealed there were inadequate preservation<br />
strategies for many vital records necessary for future railway maintenance (Borglund & Anderson,<br />
2010a; 2010b). McDonald, McCulloch <strong>and</strong> McDonald (2010) found little evidence of existing work<br />
<strong>using</strong> IM to further the Green ICT agenda in their JISC-commissioned report from the University of<br />
Strathclyde. Their findings were based on a literature survey <strong>and</strong> four case studies in the United<br />
Kingdom. The AC+erm (Accelerating +positive Change in ERM) Project at the University of<br />
Northumbria focused on 3 aspects of electronic records management: people, working practices <strong>and</strong><br />
technology. AC+erm undertook an extensive literature survey, conducted case studies <strong>and</strong> used<br />
electronic Delphi studies <strong>and</strong> face-to-face colloquia. The Delphi studies are particularly noteworthy, in<br />
that they allowed harvesting of expert opinion unlimited by geography <strong>and</strong> inclusive of academics <strong>and</strong><br />
practitioners alike, thus extending the reach <strong>and</strong> reducing the limitations of the research. Their data<br />
provides the largest set of evidence available on ERM systems, particularly on the interrelationships<br />
28
Karen Anderson, Göran Samuelsson <strong>and</strong> Marie Morner Jansson<br />
between people, process <strong>and</strong> technology (McLeod, Childs & Hardiman, 2010). The evaluation<br />
process noted that: ”The AC+erm research project has been valuable in that ... it didn't focus unduly<br />
on one dimension of the infrastructure (e.g. technology) over the other” McLeod et al, 2010, p.16).<br />
IM <strong>and</strong> the technologies that support it are in a state of extremely rapid change. Tools <strong>and</strong> practices<br />
that were useful 3-5 years ago are now obsolete or need updating to keep pace with new<br />
technologies <strong>and</strong> changing service requirements. More importantly, strategies must be in place to<br />
ensure the information in the systems remains accessible <strong>and</strong> usable. Success will involve<br />
collaboration by information professionals who manage both information content <strong>and</strong> information<br />
technologies, as shown by the AC+erm Project. However, there has been no research into the<br />
information management environment in Sweden as wide-ranging <strong>and</strong> comprehensive as the<br />
AC+erm Project, Their work inspired this IM Benchmarking Project, which was however, much more<br />
limited in what could be achieved given time <strong>and</strong> funding constraints.<br />
1.1 Research aims <strong>and</strong> definitions<br />
The research aimed to gain a snapshot of the current state of IM in Swedish organizations:<br />
governmental agencies; municipalities; regions/country councils <strong>and</strong> some companies. We also<br />
wanted insights into the future need for IM skills <strong>and</strong> techniques in organizations. This paper reports<br />
on a survey of current IM practices in Swedish organizations, undertaken as the first in a planned<br />
series to benchmark change in IM practice.<br />
An<strong>and</strong>, Manz & Glick note that ”Scholars traditionally define information management as the process<br />
by which relevant information is provided to decision makers in a timely manner”. They also point out<br />
that IM is increasingly equated with the management of information technology (IT) <strong>and</strong> put forward<br />
an argument that this needs to be complemented by organizational memory processes. Their premise<br />
was that organizational memory is ”a convenient metaphor that can be used to define the information<br />
<strong>and</strong> knowledge known by the organization <strong>and</strong> the processes by which such information is acquired,<br />
stored, <strong>and</strong> retrieved by organizational members” (1998. p.796). Middleton defines IM as<br />
”Procedures, which may be technical, analytical or strategic, for optimising the use of information”<br />
(2002, p.481). In comparing IM <strong>and</strong> knowledge management (KM), Bouthillier <strong>and</strong> Shearer (2002)<br />
state that ”The ultimate goal of IM is to ensure that information is stored <strong>and</strong> retrievable, while the<br />
ultimate purpose of KM is tied more closely to organization outcomes”. They also quote Place <strong>and</strong><br />
Hyslop (1982) who state that IM focuses on the "plans <strong>and</strong> activities that need to be performed to<br />
control an organization’s records". The <strong>Knowledge</strong> Council of the United Kingdom defines IM as: ”the<br />
processes by which we create, capture <strong>and</strong> use information” (2008, p.10). When we use the term<br />
“information management”, we define it equally comprehensively, including organization-wide<br />
strategies <strong>and</strong> processes to ensure creation, capture, management <strong>and</strong> use of information. Thus we<br />
include enterprise content management, business process management <strong>and</strong> records management,<br />
covering the management over time of information regardless of media (records, documents, data,<br />
email, web, video, photos <strong>and</strong> other information carrying media).<br />
In line with An<strong>and</strong> et al’s concern that the IM focus on IT should be complemented by what they call<br />
organizational memory processes, the survey also sought to gain an underst<strong>and</strong>ing of the status <strong>and</strong><br />
use of archivists’ expertise in capturing, managing, describing <strong>and</strong> preserving records, which are<br />
formally defined as “information created, received, <strong>and</strong> maintained as evidence <strong>and</strong> information by an<br />
organization or person, in pursuance of legal obligations or in the transaction of business” (ISO 15489-1,<br />
s.3.15). In Sweden, however, legislation <strong>and</strong> practice focuses on the concept of a public document, defined<br />
as follows:<br />
A document is public if it is held by a public authority <strong>and</strong> is considered in the light of<br />
certain special rules to have been officially received or drawn up by that authority. The<br />
document may be an ordinary document on paper, but it can equally well consist of<br />
information that can be read, listened to or taken in in some other way <strong>using</strong> technical<br />
aids (Regeringskansliet, 2010).<br />
2. Research methods<br />
Key personnel such as business managers, archivists <strong>and</strong> IT managers were surveyed between<br />
November 2010 <strong>and</strong> February 2011 in Sweden about the current use of IM in their organizations <strong>and</strong><br />
plans for development. Methods for gathering data included a web survey sent to approximately 250<br />
governmental agencies, all 290 municipalities, all 20 regional <strong>and</strong> country councils, as well as some<br />
29
Karen Anderson, Göran Samuelsson <strong>and</strong> Marie Morner Jansson<br />
companies. The survey achieved a 47% response rate. The web survey tool used was Netigate,<br />
which provided a summary <strong>and</strong> graphic representation of all responses.<br />
Selected archivists <strong>and</strong> senior managers were interviewed to gain deeper underst<strong>and</strong>ings of issues<br />
<strong>and</strong> challenges identified from the survey responses. Archivists were an important target group for the<br />
interviews partly because the benchmark originated in Archives <strong>and</strong> <strong>Information</strong> Science research<br />
<strong>and</strong> partly because this profession views information conceptually over time. Other professions<br />
working with aspects of IM were: enterprise architects, information architects, a CIO <strong>and</strong> a business<br />
process developer, lawyers, product documentation managers, IT-researchers <strong>and</strong> an environmental<br />
manager. The interviewees then recommended additional participants. An interview guide was used<br />
as a starting point, but the interviews were conducted as a conversation, between 1.5–2 hours <strong>and</strong><br />
sometimes longer.<br />
3. Research findings<br />
3.1 Key findings from the survey<br />
The web-based questionnaire was targeted at the person in the organization who has the best overall<br />
view of IM. The respondents were divided as follows: archivists 38%; IT managers / IT strategists /<br />
information architects 22%; business process managers / developers 8%; registrars (operational<br />
records managers) 2% <strong>and</strong> some other role 31%. Many responding organizations had difficulty in<br />
identifying one person or position who could answer the questionnaire. There were some instances of<br />
people from different professions <strong>and</strong> competence groups collaborating to answer the questionnaire.<br />
An interesting observation is that there appeared to be some confusion around the concept of<br />
“information” <strong>and</strong> who is responsible for its management in contemporary Swedish organizations.<br />
There was no clear ‘ownership’ of IM, which is a matter for concern given the importance of<br />
information governance for effective functioning of an organization. Responding organizations were:<br />
82 municipalities, 79 government departments, 6 county councils <strong>and</strong> 3 companies.<br />
3.1.1 <strong>Information</strong> use <strong>and</strong> users<br />
The Swedish principle of citizens’ access to public documents gives anyone access to the records at<br />
governmental <strong>and</strong> local authorities as soon as records are created or received, without any need to<br />
justify their request. This is a fundamental cornerstone in the Swedish democracy. Nevertheless many<br />
business leaders, foc<strong>using</strong> on cost cutting, are challenging this principle by asking for clarification of<br />
purpose, particularly for long-term digital preservation but also considering secondary use of<br />
information that may benefit other organizations. The PSI-directive (European Commission) which is<br />
the European Union requirement that information created by public service organizations is freely<br />
available for re-use by other organizations <strong>and</strong> businesses, requires making a wider range of<br />
information available for re-use <strong>and</strong> re-purposing than that which is traditionally managed by<br />
archivists under the definition of a public document given above.<br />
We asked about users of the records <strong>and</strong> archives. 47% of use was by internal employees. The rest<br />
was divided between different groups of external users like partners 13%; other organizations 14 %;<br />
researchers 24%; <strong>and</strong> also the media 18%. Respondents reported a slight increase in external<br />
dem<strong>and</strong> recently. However, there is very little movement towards implementing strategies for<br />
increasing the use <strong>and</strong> use benefits of records. 42% answered a clear no, not at all. 12% reported<br />
action being taken to increase interest in information reuse. One respondent from this last group said:<br />
“we welcome it <strong>and</strong> are adapting to the increasing dem<strong>and</strong>”. There were many PR <strong>and</strong><br />
Communication officers with a special interest in communicating externally amongst respondents.<br />
3.1.2 Organization-wide regulatory frameworks for IM<br />
In response to questions about an organization-wide regulatory framework for managing documents<br />
<strong>and</strong> information over time, 41% of respondents stated they have an updated framework considering<br />
information regardless of media over time, 22% have a partial framework <strong>and</strong> 30% are in the process<br />
of developing such a framework. At first glance it appears that many organizations are on track, but<br />
upon closer inspection, there seems to be a lack of an overall vision <strong>and</strong> strategy founded in the new<br />
digital <strong>and</strong> social media environment. Only 22% have comprehensive regulations for the use of social<br />
media. 58% are either in the process of developing a framework for the use of social media or have<br />
partially dealt with this issue. A full 36% have no framework for this increasingly important information<br />
strategy. Barely 1/3 has a clear vision <strong>and</strong> purpose for their IT management with a strategy that<br />
30
Karen Anderson, Göran Samuelsson <strong>and</strong> Marie Morner Jansson<br />
equally values information along with the technology to manage it. Frameworks are consequently<br />
founded in poor visions <strong>and</strong> strategies even if they are based on legal requirements <strong>and</strong> regulations.<br />
New information behaviours among people as a consequence of new information services based on<br />
new technology is putting pressure on organizations’ IM strategies <strong>and</strong> practices. The information<br />
framework in public organizations is based on legal regulations. Governance models based on<br />
business purposes considering requirements for the entire IM area seem to be unusual.<br />
3.1.3 Implementation of international st<strong>and</strong>ards for records management<br />
The international st<strong>and</strong>ards for recordkeeping (ISO 15489, ISO 23081, ISO 26122) are not well<br />
known <strong>and</strong> not well used in Sweden. Of these three, ISO15489 is more widely known <strong>and</strong> used than<br />
the other two. In contrast, the Open Archival <strong>Information</strong> System Reference Model (ISO 14721) is<br />
used more widely. It is interesting to note that those who do use these st<strong>and</strong>ards are pleased with<br />
them. The organizations surveyed claimed to comply with National Archives’ <strong>and</strong> other governmental<br />
regulations. However, when asked whether they presented their electronic documents according to<br />
the National Archives required descriptive st<strong>and</strong>ards in the National Archives’ survey, 33% answered<br />
’no’ <strong>and</strong> 37% ’to some extent’ (Riksarkivet, 2010, p.28).<br />
3.1.4 Implementation of e-archives for long-term preservation<br />
The extent of implementation of e-archives for long-term preservation is increasing rapidly. It must be<br />
noted that an e-archive, where the purpose is to preserve records in context for use by future<br />
generations is not the same as everyday digital storage. Much higher st<strong>and</strong>ards for security,<br />
prevention of loss of data quality <strong>and</strong> ability to re-present the information to quality st<strong>and</strong>ards that<br />
meet evidential requirements are required. 19% of responding organizations have already<br />
implemented an e-archive; 15% have partial implementation <strong>and</strong> as many as 32% are in progress<br />
towards implementation. 31% have not begun. Among those who have not started any pre-study are<br />
many minor municipalities but also some quite large organizations. These figures cover a wider range<br />
of organizations than the 2010 study by the Swedish National Archives study which was confined to<br />
government authorities alone, where 64% admitted they did not have a long-term preservation<br />
strategy <strong>and</strong> 22% said they were working on one. A similar situation has been found in a study of two<br />
Swedish municipalities, one small (25,000 citizens) <strong>and</strong> one medium-sized (100,000 citizens) where<br />
neither have implemented a digital archival repository (Svärd, 2011 forthcoming).<br />
There seems to be two clear trends: one where the e-archive is intended only for long-term<br />
preservation <strong>and</strong> is separated from current business systems. The other trend is to integrate the earchive<br />
into the business systems <strong>and</strong> use it like an information hub, as in the case of Stockholm City.<br />
The reason for choosing one direction or the other depends on the degree of IT-maturity, what role is<br />
intended for the e-archive function <strong>and</strong> the size of the business. Some organizations are already in<br />
the second or third generation of their e-archive. Implementing an e-archive appears to promote IM<br />
maturity, because the long term perspective requires participation <strong>and</strong> planning by information owners<br />
<strong>and</strong> professionals across the entire organization.<br />
Few are considering <strong>using</strong> cloud services for either e-archive or document management. Only 12%<br />
actually use cloud services for document management <strong>and</strong> 7% have considered long-term storage<br />
issues when <strong>using</strong> cloud services. 56% give a clear ‘no’ to use of cloud services for document<br />
management, mainly for legal reasons, but there is also a general insecurity in an unknown <strong>and</strong><br />
uncertain environment <strong>and</strong> fear of losing the control. However many organizations already use cloud<br />
services to some extent without control or advice from the recordkeeping function. Probably 95%-98%<br />
of information <strong>and</strong> records will never pass into an e-archive, since not all information can be defined<br />
as records, <strong>and</strong> not all records are of enduring value <strong>and</strong> thus not destined to be kept forever. It is<br />
failure to manage this very large proportion of non-archival information that constitutes a big loss of<br />
knowledge <strong>and</strong> hence money due to lack of reuse of information.<br />
3.1.5 Sustainable information management<br />
It could be expected that “sustainable information management” should be perceived as natural to the<br />
field given that the broad concept of IM aims for a holistic view of information use over time <strong>and</strong> that<br />
must require sustainability. There is a growing global interest in a broad interpretation of sustainable<br />
development embracing environmental, social <strong>and</strong> economic perspectives in society (Williams &<br />
Millington, 2004). Associated with this is interest in green IT (Chen & Boudreau, 2004), with a view to<br />
decreasing the negative carbon footprint of organizations <strong>and</strong> their business activities. Green IT is not<br />
31
Karen Anderson, Göran Samuelsson <strong>and</strong> Marie Morner Jansson<br />
clearly defined from an environmental point of view yet but a lot of organizations are thinking <strong>and</strong><br />
acting towards greener IT <strong>and</strong> considering how to decrease their negative impact by a more<br />
sustainable business.<br />
Many organizations have someone in charge of sustainable development <strong>and</strong> environmental topics,<br />
often allied with the quality manager or a similar position. This means that they are especially familiar<br />
with both documentation st<strong>and</strong>ards (for example the ISO 9000 Quality <strong>Management</strong> Systems, ISO<br />
14000 Environmental <strong>Management</strong> <strong>and</strong> ISO 26000 Guidance on Social Responsibility series of<br />
st<strong>and</strong>ards) <strong>and</strong> management systems. Nevertheless, the survey found there was little action or<br />
awareness of sustainability issues in the field of IM. In many organizations there are only two groups<br />
of officers with a long-term view of the business from a social perspective: those who work with<br />
Corporate Social Responsibility (CSR) <strong>and</strong> archivists, but the survey found that they do not cooperate<br />
at all. We found that the concept “Sustainable <strong>Information</strong> <strong>Management</strong>” is neither currently<br />
consciously considered nor adopted.<br />
3.1.6 The challenges faced by information managers<br />
Respondents were presented with a list of 10 challenges to sound IM <strong>and</strong> governance <strong>and</strong> asked to<br />
select those they saw as the greatest challenges. They could select more than one. The list included:<br />
legacy systems; improving service levels; compliance with regulations; compliance with international<br />
st<strong>and</strong>ards; development of user-friendly tools; information security when collaborating with other<br />
organizations; personal data protection; silo-organized systems; secure long-term preservation;<br />
economy; technology; competence; <strong>and</strong> resources. 54% chose long-term preservation as the greatest<br />
challenge. 47% selected lack of resources; 44% selected information security <strong>and</strong> 41% saw personal<br />
data protection as being among the greatest challenges.<br />
3.2 Interviews<br />
32 deep interviews were conducted across Sweden in different types of organizations. Those who<br />
consented to be interviewed presented as strongly committed to their professional concern with IM.<br />
They have admirably clear views of purposes <strong>and</strong> methods <strong>and</strong> take pride in their professions. A<br />
significant proportion belong to a community of practice that shares the same values <strong>and</strong> learns from<br />
each other’s experiences of methods <strong>and</strong> models. This kind of dedication seemed to hold true<br />
amongst all information oriented professions. The interviews embraced archivists of different<br />
categories, information <strong>and</strong> IT architects, IT-strategists <strong>and</strong> also environmental <strong>and</strong> quality oriented<br />
positions.<br />
3.2.1 Professional specialization of archivists<br />
Two professional groups of archivists are emerging: those for whom the focus is the archive <strong>and</strong><br />
securing cultural heritage over the long term; <strong>and</strong> archivists who are IT-oriented, foc<strong>using</strong> on systems<br />
for current recordkeeping, sometimes uninterested in cultural heritage. However there are still many<br />
working across both these aspects of the profession. Unfortunately, some find it easier to focus on<br />
known operational tasks since often there is a backlog in physical management of paper records, at<br />
the expense of working in a more IT-oriented manner. Although this signals a lack of resources,<br />
claiming the need to comply with archival law <strong>and</strong> regulations is not sufficient motivation for<br />
management to commit resources if the organization can’t see any value for its own IM benefit.<br />
3.2.2 Collaboration between information architects <strong>and</strong> archivists<br />
There are two main areas in which archivists are involved in IT-oriented issues <strong>and</strong> cooperating with<br />
IT professionals: one is in planning <strong>and</strong> developing an e-archive <strong>and</strong> the other is where business<br />
processes are being closed down. Archivists contribute with professional expertise in appraisal, or<br />
deciding what to keep. They don’t seem to engage in issues such as reconstruction of information<br />
structures, business rules <strong>and</strong> ownership of business processes, or what information architects call<br />
“information archeology”, yet these are fundamental to capturing <strong>and</strong> maintaining the context of the<br />
information, which is the principal focus of records <strong>and</strong> archives management. There is a lack of<br />
competence in planning for migration from legacy systems <strong>and</strong> consequently huge costs for<br />
maintenance of old information systems. Archivists often have a more extensive view of information<br />
use over time than other professions <strong>and</strong> also have the professional competence to significantly<br />
contribute to planning for prevention of future unmanageable legacy systems from which migration or<br />
extraction of essential records <strong>and</strong> information is very costly or impossible. Many archivists<br />
32
Karen Anderson, Göran Samuelsson <strong>and</strong> Marie Morner Jansson<br />
considered that it is not their role to participate in wider IM strategies, preferring to focus on the<br />
capture of records into an ’e-archive’ without recognizing that the information in the archive is a<br />
potentially re-usable business asset.<br />
3.2.3 Competencies<br />
The interviews confirmed that the knowledge <strong>and</strong> competencies needed were in fact extension <strong>and</strong><br />
deepening of that which already existed in the organization: a need for professional development.<br />
Some archivists wanted to improve their IT competence in order to improve their ability to<br />
communicate with IT professionals. Non-archivists commented that archivists need to be more<br />
proactive in facilitating accessibility of information. In one of the focus groups, information architects<br />
from large government departments noted the following competence deficits as being among the<br />
greatest challenges:<br />
Lack of relevant competence to create information <strong>and</strong> concept models in order to secure the<br />
quality in the information structures;<br />
Lack of relevant competence for work with Enterprise Business <strong>Information</strong> modeling;<br />
Lack of alignment among different competencies <strong>and</strong> roles within the IM area leaves both gaps in<br />
needed competencies <strong>and</strong> deficits in competency levels.<br />
4. Discussion<br />
The lack of ‘ownership’ of IM as a function found in this study is a matter of concern. The ISO 15489<br />
st<strong>and</strong>ard requires that “Records management responsibilities <strong>and</strong> authorities should be defined <strong>and</strong><br />
assigned, <strong>and</strong> promulgated throughout the organization so that, where a specific need to create <strong>and</strong><br />
capture records is identified, it should be clear who is responsible for taking the necessary action. …<br />
Specific leadership responsibility <strong>and</strong> accountability for records management should be assigned to a<br />
person with appropriate authority within the organization” (ISO 15489.1-2001 s6,3). Similarly, the<br />
AC+erm Project (Accelerating +positive Change in ERM) found that few organisations in their study<br />
had articulated a vision for electronic records management. (McLeod, Childs & Hardiman, 2010, p.ii).<br />
The survey findings about patterns of users of records are comparable with the findings of Sundqvist<br />
(2009, chapter 8). Her in-depth study of archival use <strong>and</strong> users in a municipality <strong>and</strong> a government<br />
organization also found that internal users were the principal user group, while external users<br />
included individuals seeking personal information in the records, or to support private business such<br />
as information about property; business users such as estate agents <strong>and</strong> the media pursuing matters<br />
of public interest. Professional researchers, including historians, were a very small minority among<br />
users. There seems to have been little change in use patterns of public information in recent years.<br />
There are many reasons why long-term digital preservation is perceived as the greatest challenge. A<br />
significant reason is that many are still attached to the familiar paper-based world. In Svärd’s study<br />
(2011 forthcoming) a respondent in one municipality admitted “a lot of paper preservation [is] still<br />
taking place”. Others believed that the complexity of managing information over time was not fully<br />
understood <strong>and</strong> that their municipality was not fully utilizing the knowledge <strong>and</strong> skills of the archivist. It<br />
is essential to meet this challenge, however daunting, to avoid digital amnesia. There are real<br />
concerns that both evidential business records <strong>and</strong> cultural heritage are being compromised. There is<br />
already a huge loss of information through lack of maintenance or obsolescent proprietary software,<br />
or that is no longer usable because of lack of structure, or it is inaccessible: the key to access has<br />
vanished (Lundell & Lings, 2011; Anderson & Borglund (2010a; 2010b). There is both structured <strong>and</strong><br />
unstructured information stored in personal computers, corporate databases <strong>and</strong> other shared<br />
workspaces that are currently outside the control of recordkeeping systems <strong>and</strong> remain outside the<br />
archive, although databases <strong>and</strong> business systems do contain evidential business records. A new<br />
ISO st<strong>and</strong>ard for managing such systems is ISO 16175.3-2010, Principles <strong>and</strong> Functional<br />
Requirements for Records in Electronic Business Environments. Given the low uptake of international<br />
information <strong>and</strong> records management st<strong>and</strong>ards in Sweden found in this survey it may be some time<br />
before organizations turn to the st<strong>and</strong>ard for assistance.<br />
As a consequence of the Swedish archival focus on public ‘documents’, information in databases <strong>and</strong><br />
specialized business systems such as finance <strong>and</strong> personnel systems is usually considered to be<br />
outside the ambit of the archive, but a recent Preliminary Study on an e-Archive <strong>and</strong> e-Registration<br />
System by the Swedish National Archives (Riksarkivet, 2011a) signals the possibility of change. One<br />
33
Karen Anderson, Göran Samuelsson <strong>and</strong> Marie Morner Jansson<br />
of the Swedish eGovernment Delegation’s aims is to motivate public agencies to reach level four on<br />
Layne <strong>and</strong> Lee’s (2001) e-government maturity model, that is, full integration of interaction between<br />
agencies <strong>and</strong> citizens, although the model does not incorporate any recordkeeping requirements in its<br />
maturity benchmarks (Anderson, Borglund & Samuelsson, 2011 forthcoming). It is clear these kinds of<br />
e-services are so complex that late intervention by archivists will not be adequate for needed<br />
recordkeeping support <strong>and</strong> long-term preservation. Guidance on archival preservation of integrated eservices<br />
is essential. The Preliminary Study proposes that the National Archives’ role in government<br />
IM be reviewed <strong>and</strong> its m<strong>and</strong>ate extended, thus widening its focus beyond preservation of documents<br />
alone. (Riksarkivet, 2011b).<br />
The AC+erm Project found that “people issues are predominant, fundamental <strong>and</strong> challenging as they<br />
concern culture, philosophical attitudes, awareness of RM <strong>and</strong> ERM issues, preferences, knowledge<br />
<strong>and</strong> skills”. They also noted that ”records professionals may be part of the problem as well as part of<br />
the solution, e.g. they take the holistic view <strong>and</strong> have the principles <strong>and</strong> tools to manage records but<br />
their dem<strong>and</strong>s may be unrealistic or too constraining” (McLeod, Childs & Hardiman, 2010, p.ii). There<br />
are similarities in our findings. One interviewee commented that archivists need to be more outgoing<br />
within the organization, yet the small focus group of archivists were of the opinion that it was not their<br />
place to work outside the archive. Others in individual interviews were keen to collaborate better with<br />
their IT colleagues. Alternately, the information architects’ focus group questioned whether it was the<br />
archivists’ place to develop a business process based description of the organization, as now required<br />
for archival description by the Swedish National Archives. St<strong>and</strong>ards, regulations, legal frameworks,<br />
business process development <strong>and</strong> systems development headed the list of needed professional<br />
development,<br />
5. Conclusions <strong>and</strong> recommendations for further research<br />
In this research project we aimed to gain:<br />
A snapshot of the current state of IM in Swedish organizations;<br />
Insights into the future need for IM skills in Swedish organizations;<br />
An underst<strong>and</strong>ing of the use of archivists’ expertise.<br />
These aims were achieved, revealing the following key findings.<br />
5.1 The current state of IM in Swedish organizations<br />
The project found that:<br />
90% of the organizations surveyed had updated or are working with their IM frameworks, so there<br />
is a lot of activity, despite a lack of assigned responsibility or clear ‘ownership’ of IM;<br />
There is a lot of interest in developing organizational e-archive repositories <strong>and</strong> growing activity in<br />
this area, although many organizations lack the IM maturity or resources to take on this urgent<br />
challenge;<br />
A very low number of organizations were <strong>using</strong> available records <strong>and</strong> IM st<strong>and</strong>ards. This failure<br />
means they lack an internationally accepted norm for evaluating their performance.<br />
The following were seen as the greatest challenges:<br />
Long-term preservation (54%)<br />
Lack of resources (47%)<br />
<strong>Information</strong> security (41%)<br />
Personal data protection (41%).<br />
The PSI directive does not so far appear to have changed user groups seeking. Nor do public<br />
organizations <strong>and</strong> municipalities appear to be actively preparing their information for re-use or repurposing,<br />
either for internal business benefit or external users. The regulation-driven focus on<br />
providing access to ‘documents’ rather than information that is gathered <strong>and</strong> presented in other<br />
formats, such as in databases, data sets <strong>and</strong> so on, must be overcome <strong>and</strong> extended if Swedish<br />
organizations are to function <strong>and</strong> progress effectively. The Swedish National Archives’ bid for an<br />
extended m<strong>and</strong>ate (Riksarkivet, 2011b) would provide leadership in IM <strong>and</strong> apply the professional<br />
competence of archivists to the challenges of long-term IM.<br />
34
Karen Anderson, Göran Samuelsson <strong>and</strong> Marie Morner Jansson<br />
5.2 Future needs for IM skills in Swedish organizations<br />
Greater competence in enterprise-wide information modeling <strong>and</strong> development of strategies for<br />
ensuring quality in information structures was identified as needed. IM competencies were also<br />
missing, or existing competencies needed updating or extending. Some archivists expressed a need<br />
for more knowledge <strong>and</strong> skills in the IT arena to enable them to better underst<strong>and</strong> <strong>and</strong> participate in<br />
digital IM. The following were seen as most needed areas for professional development: st<strong>and</strong>ards,<br />
regulations, legal frameworks, business process development <strong>and</strong> systems development.<br />
5.3 Underst<strong>and</strong>ing <strong>and</strong> use of archivists’ expertise<br />
People issues are very complex, <strong>and</strong> among the most important for success of projects <strong>and</strong> change in<br />
organizations. We found that there was a lack of underst<strong>and</strong>ing of the complexity of managing<br />
information over the long-term, often because the focus was on IT solutions <strong>and</strong> under-<strong>using</strong> the<br />
professional knowledge of the archivist. We also found that the archivists themselves could be part of<br />
this problem, as they are perceived not to be sufficiently outgoing in the organization, <strong>and</strong> a small<br />
group of archivists expressed the opinion that it was not their role to do so.<br />
5.4 Possibilities for further research<br />
Most organizations claim compliance with existing national archival regulations <strong>and</strong> there is some<br />
complacency that what must be done is being done. There is, however, evidence that organizations<br />
are not infrequently unable to provide access to digital documents <strong>and</strong> information because there is a<br />
failure to plan for migration <strong>and</strong> continuity of IT systems, dependence on proprietary software <strong>and</strong><br />
systems (Lundell & Lings, 2011). The gap between legislative requirements <strong>and</strong> organizations’ ability<br />
to fulfill their obligations to provide access would repay further research to gain an underst<strong>and</strong>ing of<br />
the nature, the source <strong>and</strong> the extent of the problem. One such study foc<strong>using</strong> on local government<br />
has been carried out in the United Kingdom revealing municipalities’ ability to provide requested<br />
information under Freedom of <strong>Information</strong> legislation varies widely <strong>and</strong> in some cases is quite poor.<br />
(Shepherd, Flinn & Stevenson, 2008; 2009; 2011a forthcoming; 2011b forthcoming). A comparative<br />
study would deepen <strong>and</strong> extend the work done by this study <strong>and</strong> by Lundell <strong>and</strong> Lings (2010).<br />
This study is intended as benchmark: a series of follow-up studies are planned for regular intervals in<br />
the future to measure change in practice, attitudes <strong>and</strong> professional alliances to improve IM. It will be<br />
interesting to follow developments in the regulatory l<strong>and</strong>scape <strong>and</strong> responses to IM challenges as the<br />
government aims to meet the needs of organizations working in the e-government environment.<br />
References<br />
An<strong>and</strong>, V., Manz, C.C. & Glick, W.H. (1998) An organizational memory approach to information management.<br />
Academy of <strong>Management</strong> Review 23(4) (October), pp. 796-809<br />
Anderson, K., Borglund, E.A.M. <strong>and</strong> Samuelsson, G. (2011 accepted for publication). Mature Public e-Services<br />
Without Mature Recordkeeping – An Impossibility? iRMA – <strong>Information</strong> <strong>and</strong> Records <strong>Management</strong><br />
Annual. http://www.rimpa.com.au/publications/irma/<br />
Borglund, E.A.M. & Anderson, K. (2010a). Long-term Strategies for Electronic Recordkeeping in a Large<br />
Infrastructure Project. Databases <strong>and</strong> <strong>Information</strong> Systems, 441-454.<br />
Borglund, E.A.M., Anderson, K. (2010b) L.O.S.T records: the consequence of inadequate recordkeeping<br />
strategies. Baltic DB & IS Conference. July 5-7, Riga, Latvia.<br />
Bouthillier, F. <strong>and</strong> K. Shearer (2002) Underst<strong>and</strong>ing knowledge management <strong>and</strong> information management: the<br />
need for an empirical perspective. <strong>Information</strong> Research, 8 (1). http://informationr.net/ir/8-1/paper141.html<br />
Accessed 05 June 2011.<br />
Chen, A., Boudreau, M et al. (2004) <strong>Information</strong> systems <strong>and</strong> ecological sustainability. Journal of Systems <strong>and</strong><br />
<strong>Information</strong> Technology 10 (3): 186-201.<br />
European Commission. <strong>Information</strong> Society. Public Sector<br />
<strong>Information</strong>. http://ec.europa.eu/information_society/policy/psi/index_en.htm Accessed 21 July,<br />
2011.<br />
Government <strong>Knowledge</strong> <strong>and</strong> <strong>Information</strong> <strong>Management</strong> Professional Skills Framework<br />
(2009). http://gkimn.nationalarchives.gov.uk/kim-function.htm Accessed 03 June, 2011.<br />
International St<strong>and</strong>ards Organization (2001). ISO 15489-1. <strong>Information</strong> <strong>and</strong> Documentation <strong>and</strong> Records<br />
<strong>Management</strong> Part 1: General. Geneva: International St<strong>and</strong>ards Organization.<br />
International St<strong>and</strong>ards Organization (2001). ISO 15489-2. <strong>Information</strong> <strong>and</strong> Documentation <strong>and</strong> Records<br />
<strong>Management</strong> Part 2: Guidelines for Implementation. Geneva: International St<strong>and</strong>ards Organization.<br />
International St<strong>and</strong>ards Organization (2003). ISO14721. Space data <strong>and</strong> <strong>Information</strong> Transfer systems – Open<br />
Archival <strong>Information</strong> System – Reference Model. Geneva: International St<strong>and</strong>ards Organization.<br />
35
Karen Anderson, Göran Samuelsson <strong>and</strong> Marie Morner Jansson<br />
International St<strong>and</strong>ards Organization (2006). ISO 23081-1. <strong>Information</strong> <strong>and</strong> documentation- Records<br />
management processes – Metadata for records. Part 1: Principles. Geneva: International St<strong>and</strong>ards<br />
Organization.<br />
International St<strong>and</strong>ards Organization (2007). ISO 23081-2. <strong>Information</strong> <strong>and</strong> documentation- Records<br />
management processes – Metadata for records. Part 2: Conceptual <strong>and</strong> implementation issues. Geneva:<br />
International St<strong>and</strong>ards Organization.<br />
International St<strong>and</strong>ards Organization (2008). ISO/TR 26122. Work process analysis for records management.<br />
Geneva: International St<strong>and</strong>ards Organization.<br />
International St<strong>and</strong>ards Organization (2011 forthcoming). ISO 16175. Principles <strong>and</strong> Functional Requirements for<br />
Records in Electronic Business Environments. Geneva: International St<strong>and</strong>ards Organization. A draft<br />
version is available at: http://www.adri.gov.au/products.aspx#<br />
Layne, K., & Lee, J. (2001). Developing fully functional E-government: A four stage model. Government<br />
<strong>Information</strong> Quarterly, 18(2), 122-136.<br />
Lundell, B. & Lings, B. (2010) How Open Are Local Government Documents in Sweden? A Case for Open<br />
St<strong>and</strong>ards. IFIP Advances in <strong>Information</strong> <strong>and</strong> Communication Technology, v.319/2010, 177-187. DOI<br />
10.1007/978-3-642-13244-5_14<br />
McDonald, D, McCulloch, E, & MacDonald, A (2010). Greening <strong>Information</strong> <strong>Management</strong>, Final Report,<br />
University of Strathclyde. http://www.greeningim.org.uk/Portals/82/GIMFinalReport.pdf Accessed 05 June,<br />
2011.<br />
McLeod, J., Childs, S., & Hardiman, R. (2010). AC+erm Project: Final Project Report.. University of<br />
Northumbria. http://www.northumbria.ac.uk/static/5007/ceispdf/final.pdf Accessed 05 June, 2011.<br />
Middleton, M. (2002). <strong>Information</strong> <strong>Management</strong>: A Consolidation of Operations, Analysis <strong>and</strong> Strategy. Wagga<br />
Wagga,New South Wales, Centre for <strong>Information</strong> Studies, Charles Sturt University.<br />
Regeringskansliet (2010). The principle of public access. http://www.sweden.gov.se/sb/d/2184/a/15521.<br />
Accessed 21 July 2010.<br />
Riksarkivet (2011a) Förstudie om e-arkiv och e-diarium [Preliminary study on an e-archive <strong>and</strong> e-registration<br />
system.] Rapport<br />
Riksarkivet (2011b) Förstudie om e-arkiv och e-diarium [Preliminary study on an e-archive <strong>and</strong> e-registration<br />
system.] Appendix. Retrieved from: http://www.riksarkivet.se/default.aspx?id=22306<br />
Riksarkivet (2010). Rapport rör<strong>and</strong>e enkätundersökning - myndigheters hantering av elektroniska h<strong>and</strong>lingar.<br />
[Survey Report: Authorities’ h<strong>and</strong>ling of electronic documents]. Stockholm: Riksarkivet<br />
Shepherd, E., Flinn, A & Stevenson, A. (2009) The impact of freedom of information on records management <strong>and</strong><br />
record use in local government: a literature review. Journal of the Society of Archivists 30(2): 227-248.<br />
Shepherd, E., Flinn, A & Stevenson, A. (2010). <strong>Information</strong> governance, records management <strong>and</strong> freedom<br />
of information: a study of local government authorities in Engl<strong>and</strong>. Government <strong>Information</strong> Quarterly 27(4):<br />
337-345.<br />
Shepherd, E., Flinn, A & Stevenson, A. (2011a forthcoming) Freedom of <strong>Information</strong> <strong>and</strong> records management in<br />
local government: help or hindrance?’ <strong>Information</strong> Polity: the International Journal of Governance <strong>and</strong><br />
Democracy in the <strong>Information</strong> Age<br />
Shepherd, E., Flinn, A. & Stevenson, A. (2011b forthcoming). Records <strong>Management</strong> in English local government:<br />
the effect of freedom of information. Records <strong>Management</strong> Journal<br />
Sundqvist, A. (2009). Search processes, user behaviour <strong>and</strong> archival representational systems. Sundsvall:<br />
Department of <strong>Information</strong> Technology <strong>and</strong> Media, Mid Sweden University.<br />
Svärd, P. (2011 forthcoming). <strong>Information</strong> management strategies in two Swedish municipalities: Similarities with<br />
Enterprise Content <strong>Management</strong>. iRMA – <strong>Information</strong> <strong>and</strong> Records <strong>Management</strong><br />
Annual. http://www.rimpa.com.au/publications/irma/<br />
Williams, C.C. <strong>and</strong> Millington, AC (2004) The Diverse <strong>and</strong> contested meanings of sustainable development. The<br />
Geographical Journal, 170 (2): Environment <strong>and</strong> development in the UK. pp. 99-104<br />
36
Developing a Model for Assessing IT Competency of<br />
Managers<br />
Mohammad Abooyee Ardakan 1 , Hamed Majidi Zolbanin 2 <strong>and</strong> Ali Khaleghi 3<br />
1, 2<br />
University of Tehran, Tehran, Iran<br />
3<br />
University of Grenoble, Grenoble, France<br />
Abooyee@ut.ac.ir<br />
hmajidiz@ut.ac.ir<br />
Ali.Khaleghi@upmf-grenoble.fr<br />
Abstract: In today's rapidly changing environment, increased focus on customer <strong>and</strong> quick response to problems<br />
<strong>and</strong> opportunities has made the manager a vital resource in guiding <strong>and</strong> directing employees to success. So,<br />
within an organizational context, it appears crucial to develop competent managers who can be relied on to<br />
transform their organizations accordingly. In this regard, the competency approach marks a new development<br />
<strong>and</strong> the importance given to competencies in the organizational context is continually increasing. ith the<br />
widespread use of information technology (IT) in recent decades, management scholars began to examine its<br />
implications on organizations <strong>and</strong> management. Several of the researchers in this field focused on the<br />
identification of managerial IT competencies. In this paper, we want to explore those skills that managers, in the<br />
new world of information <strong>and</strong> communication technologies, must possess in order to cope with the difficulties of<br />
their roles.<br />
Keywords: competency, IT competency, management competencies, competency assessment<br />
1. Introduction<br />
With the advent of information technology (IT) in 1980s <strong>and</strong> its widespread use in businesses,<br />
especially in 1990s, the concept of business has dramatically changed. The extent of these<br />
transformations has been so huge that no company can overlook including IT in its business strategy.<br />
However, this context is of no exception in that the rate of its developments, like other technologyintensive<br />
areas, is much faster than organizations’ adaptability to such changes. As a result, in many<br />
organizations IT has often failed to meet its full potential (Stuart et al. 2009).<br />
Part of this failure in exploiting the full range of IT capabilities is rooted in the paucity of organizations’<br />
top management support. Researchers <strong>and</strong> institutions have noted lack of executive support as one<br />
of the main difficulties in managing IT projects (Jenster <strong>and</strong> Hussy 2005). Unfamiliarity with IT <strong>and</strong> a<br />
shallow insight into its role in today’s businesses – if not the most important- is one of the important<br />
reasons of top managers’ negligence to this technology. The more knowledgeable managers become<br />
about IT, the more they will champion it within their enterprise (Bassellier et al. 2003).<br />
Moreover, leadership behaviors of senior management play an important role in determining the<br />
success or failure of an IT implementation (Neufeld et al. 2007). Hence, for any organization to benefit<br />
from the various <strong>and</strong> vast capabilities of IT, it is a necessity to enhance IT competency of its business<br />
managers (Bassellier et al. 2003).<br />
The goal of this paper is to develop a model to assess the IT competency of business managers. It<br />
will guide us through whether or not to add new dimensions to the Bassellier’s model (Figure 2) for IT<br />
competency of managers. This dimension(s) mainly addresses the less stressed skill of IT managers<br />
in having a conceptual view on their working environment.<br />
2. The concept of competency<br />
The term competency has no widely accepted single definition (Strebler et al. 1997; Jubb <strong>and</strong><br />
Rowbotham 1997). Researchers <strong>and</strong> scholars have evolved several meanings for the term which are<br />
mainly adapted to their own fields. The term was first introduced to the field of management through<br />
the work of Boyatzis (1982). He defined a competency as:<br />
Characteristics that are causally related to effective <strong>and</strong> / or superior performance in a<br />
job. This means that there is evidence that indicates that possession of the<br />
characteristics precedes <strong>and</strong> leads to effective <strong>and</strong> / or superior performance on the job<br />
(Thompson et al. 1996).<br />
37
Mohammad Abooyee Ardakan et al.<br />
Many authors have explored the concept <strong>and</strong> seemingly, three main positions have been taken<br />
toward a definition of the term. Hoffman (1999) summarizes these positions as:<br />
Observable performance (Boam <strong>and</strong> Sparrow 1992; Bowden <strong>and</strong> Masters 1993);<br />
The st<strong>and</strong>ard or quality of the outcome of the person's performance (Rutherford 1995; Hager et<br />
al. 1994); or<br />
The underlying attributes of a person (Boyatzis 1982; Sternberg <strong>and</strong> Kolligian 1990).<br />
As it can be seen in the above classifications, competency as quality of the person’s performance is<br />
an accepted category among scholars. In this study, we adopt this definition to develop a model to<br />
assess the main IT competencies managers.<br />
3. Conceptual framework<br />
Figure 1 shows the model that is to be tested in this paper. The model is taken from a previous work<br />
to identify IT competence of business managers (Bassellier et al. 2003). In that study, the researchers<br />
have divided IT competency of managers into two dimensions: <strong>Knowledge</strong> <strong>and</strong> Experience (Figure 2).<br />
Figure 1: Model to be tested<br />
In our proposed model, we have determined four areas for IT competency of managers:<br />
Technology;<br />
Engineering <strong>and</strong> management;<br />
Intellectual; <strong>and</strong><br />
Learning<br />
Comparing to Bassellier’s model, we have transformed competencies from two main areas into four.<br />
There are two points in this transformation. Firstly, we think that this categorization better identifies the<br />
different IT competency areas of managers. In fact we have tried to rearrange all seven competency<br />
items of their model into a new organization. Secondly, our new arrangement is in more accordance<br />
to Katz’s managerial skills (1955). With the aid of Katz’s model, we have included an intellectual<br />
(conceptual) area into our model which we believe Bassellier’s model has not taken into account.<br />
In an article published in Harvard Business Review in 1955, Katz argued that what a manager can<br />
accomplish is based on the skills that he or she possesses. People will not embark on a task if they<br />
believe they are not adept enough to perform the task effectively (B<strong>and</strong>ura <strong>and</strong> Schunk 1981). This<br />
means that at least some managers, who have acquired their managerial positions because of<br />
technical knowledge <strong>and</strong> competencies, will tend to avoid the managerial aspects of their job<br />
preferring instead the technical, but not the managerial, aspects of their jobs. Therefore, for a<br />
manager to perform effectively, a combination of technical <strong>and</strong> managerial skills is required.<br />
Katz (1955) proposed a three-category typology of skills: technical, human <strong>and</strong> conceptual. Although<br />
numerous abilities can be identified within each of these categories, he believes the triad to be<br />
essential set of managerial skills (Peterson <strong>and</strong> Van Fleet 2004).<br />
Amongst Bassellier’s competency items, we believe that ‘access to knowledge’ has a different nature<br />
from our previous other three dimensions. Therefore, we have incorporated it into our model with a<br />
new title: learning, or the capacity for finding required knowledge <strong>and</strong> information. This name change<br />
also has the potential to incorporate some new skills that we believe comprise a manager’s IT<br />
competency. Table 1 presents a more detailed definition of each of the competency areas in our<br />
model.<br />
38
Mohammad Abooyee Ardakan et al.<br />
Figure 2: IT competency model (Bassellier et al. 2003)<br />
Table 1: Definition of competencies<br />
Areas of Definition Corresponding items in Competency Underst<strong>and</strong>ing or proficiency in<br />
Bassellier’s model<br />
Technology<br />
Engineering<br />
&<br />
<strong>Management</strong><br />
Intellectual<br />
Current <strong>and</strong> emergent technologies,<br />
specialized tools, methods, processes, <strong>and</strong><br />
applications<br />
Systems development <strong>and</strong> management<br />
methods<br />
General management skills that are<br />
considered a must-have in IT environments;<br />
such as: cooperative working, effective<br />
communication, team-working, <strong>and</strong> conflict<br />
resolution (Human Skills)<br />
Finding his role in the organization as a whole<br />
<strong>and</strong> trying to make it more effective <strong>and</strong><br />
efficient <strong>using</strong> available resources (system<br />
thinking)<br />
Learning Looking for more information about IT <strong>and</strong><br />
keeping himself up-to-date with latest<br />
developments<br />
4. Methodology<br />
Technology<br />
Application<br />
Systems<br />
Development<br />
<strong>Management</strong> of IT<br />
(partially)<br />
Access to<br />
knowledge<br />
To test the model, we have developed some items <strong>and</strong> scales for the four competency areas. Table 2<br />
shows an abridged version of new items in our research. These items will be used to prepare a<br />
questionnaire to assess IT competency of managers.<br />
The questionnaire will be distributed among managers of different business sectors. After collecting<br />
the filled questionnaires, we will investigate the validity of our model through Fuzzy Cognitive Mapping<br />
(FCM). We will also consider comprising items of each of the competency areas.<br />
39<br />
Experience
Mohammad Abooyee Ardakan et al.<br />
The procedure for creating the FCMs for mapping the competency items (variables) for IT projects is<br />
shown in Figure 3.<br />
Figure 3: Procedure for creating a targeted FCM<br />
4.1 The FCM methodology<br />
This methodology uses four matrices to represent the results that the methodology provides in each<br />
one of its stages. These are Initial Matrix of Competencies (IMC), Fuzzified Matrix of Competencies<br />
(FZMC), Strength of Relationships Matrix of Competencies (SRMC) <strong>and</strong> Final Matrix of Competencies<br />
(FMC).<br />
Table 2: IT competency items<br />
Item Corresponding Competency Reference<br />
<strong>Information</strong> storage <strong>and</strong> retrieval<br />
T<br />
Wu et al., 2007<br />
concepts<br />
Special Libraries Association, 2003<br />
<strong>Information</strong> Security<br />
Programming Languages<br />
Job related software<br />
Systems Integration<br />
Systems Analysis & Design<br />
Interconnectedness<br />
Partnership & Leveraging<br />
IT Alignment<br />
Organization Design<br />
Creativity & Innovation<br />
Multi-Lingual<br />
T<br />
T<br />
T<br />
E & M<br />
E & M<br />
I<br />
I<br />
I<br />
I<br />
I<br />
L<br />
ISO 27001<br />
Special Libraries Association, 2003<br />
Gorgone et al., 2002<br />
Wu et al., 2007<br />
State Library of North Carolina<br />
Gorgone & Gray, 2000<br />
Gorgone & Gray, 2000<br />
Special Libraries Association, 2004<br />
Special Libraries Association, 2004<br />
Wu et al., 2004<br />
Wu et al., 2004<br />
Larsen & Wetherbe, 1999<br />
Wu et al., 2004<br />
T: Technology E & M: Engineering & <strong>Management</strong> I: Intellectual L:<br />
Learning<br />
The methodology uses data gathered from questionnaires that will be filled by managers of different<br />
business sectors. The data are then transformed into numerical vectors associated with each one of<br />
the competency Items (CI) identified. Each component in a vector represents the value that the<br />
40
Mohammad Abooyee Ardakan et al.<br />
corresponding CI has for each one of the filled questionnaires. This generates an Initial Matrix of<br />
Competencies (IMC). Thresholds are applied to the IMC in order to adapt the information contained to<br />
the real world <strong>and</strong> maintain the logical integrity of data.<br />
Next, the numerical vectors associated with each CIs are fuzzified <strong>and</strong> treated as a fuzzy set. The<br />
fuzzification of the IMC produces the Fuzzified Matrix of Competencies (FZMC) containing the grades<br />
of membership of each component of a vector to a fuzzy set. The CIs are treated as variables,<br />
sometimes also referred as concepts. The degree of similarity between any two variables is evaluated<br />
to estimate the strength of the relationship between them <strong>and</strong> the polarity of that relationship.<br />
The result of these computations is a new matrix called Strength of Relationships Matrix of<br />
Competencies (SRMC). At this point, an expert determines whether there is a relationship between<br />
each pair of variables analyzed or not. The result is a Final Matrix of Competencies (FMC) which<br />
contains only those numerical fuzzy components which represent relationships between the CIs<br />
(Rodiguez-Repiso et al. 2007). This can guide us to develop our new IT competency model for<br />
managers.<br />
5. Conclusion<br />
Potentials of information technology <strong>and</strong> its increasing applications in today's businesses have<br />
dramatically transformed the environment within which organizations have to function. In such a<br />
rapidly changing environment, increased focus on customer <strong>and</strong> quick response to problems <strong>and</strong><br />
opportunities has made the manager a vital resource in guiding <strong>and</strong> directing employees to success.<br />
In order to improve its processes, enhance its productivity, or outperform its competitors, any<br />
organization needs to hire competent managers in respect to this technology.<br />
The output of our work will provide organizations <strong>and</strong> assessment communities with the required<br />
evaluation criteria to assess IT competency of managers. As a result, this model will help different<br />
business sectors to increase their efficiency <strong>and</strong> profits. This will be achieved with the aid of IT<br />
competent managers who are able to underst<strong>and</strong> the costs <strong>and</strong> complications of IT/IS projects, can<br />
align acquisition or development of information systems with objectives of their organizations, have<br />
reliable experience in conducting IT projects <strong>and</strong> much more.<br />
References<br />
B<strong>and</strong>ura, A. <strong>and</strong> Schunk, D.H. (1981) “Cultivating Competence, Self-efficacy, <strong>and</strong> Intrinsic Interest through<br />
Proximal Self-motivation”, Journal of Personality <strong>and</strong> Social Psychology, Vol. 41 No. 3, pp. 586-98.<br />
Bassellier, G., Benbasat, I. <strong>and</strong> Reich, B.H. (2003) “The Influence of IT Managers’ IT Competence on<br />
Championing IT”, <strong>Information</strong> Systems Research, Vol. 14, No. 4, December 2003, pp. 317-336<br />
Boam, R. <strong>and</strong> Sparrow, P. (1992) “Designing <strong>and</strong> Achieving Competency”, McGraw-Hill, London.<br />
Bowden, J. <strong>and</strong> Masters, G. (1993) “Implications for Higher Education of a Competency-Based Approach to<br />
Education <strong>and</strong> Training”, AGPS, Canberra.<br />
Boyatzis, R. (1982) “The Competent Manager – A model for Effective Performance”, John Wiley & Sons, New<br />
York.<br />
Gorgone, J. T., <strong>and</strong> Gray, P. (2000) “Model Curriculum <strong>and</strong> Guidelines for Graduate Degree Programs in<br />
<strong>Information</strong>, Communications of the AIS, Vol.3, pp.1–52.<br />
Hager, P., Athanasou, J. <strong>and</strong> Gonczi, A. (1994) “Assessment - Technical Manual”, AGPS, Canberra.<br />
Heilmann, P. (2007) “High Level Competence: A Tool for Coping with Organizational Change”, Journal of<br />
European Industrial Training, Vol. 31 No. 9, pp. 727-741.<br />
Hoffmann, T. (1999) “The Meanings of Competency”, Journal of European Industrial Training, Vol. 23 No 6, pp.<br />
275-285.<br />
Jenster, P. <strong>and</strong> Hussey, D. (2005) “Create a Common Culture Between IT <strong>and</strong> Business People to Reduce<br />
Project Failures”, Computer Weekly, March 22<br />
Jubb, R. <strong>and</strong> Rowbotham, D. (1997), “Competences in management Development: Challenging the Myths”,<br />
Journal of European Industrial Training, Vol. 21 No 5, pp. 171-5.<br />
Katz, R.L. (1955) “Skills of an effective administrator”, Harvard Business Review, Vol. 33 No. 1, pp. 33-42.<br />
Larsen, T.J. <strong>and</strong> Wetherbe, J.C. (1999) “An Exploratory Field Study of Differences in <strong>Information</strong> Technology Use<br />
Between more- <strong>and</strong> less-innovative Middle Managers”, <strong>Information</strong> <strong>and</strong> <strong>Management</strong> 36 (2), 1999, pp. 93–<br />
108.<br />
Neufeld, D. J., Dong, L., <strong>and</strong> Higgins, C. (2007) “Charismatic Leadership <strong>and</strong> User Acceptance of <strong>Information</strong><br />
Technology”, European Journal of <strong>Information</strong> Systems, 16(4), 494–510.<br />
Peterson, T.O. <strong>and</strong> Van Fleet, D. D. (2004) “The Ongoing Legacy of R.L. Katz: an Updated Typology of<br />
<strong>Management</strong> Skills”, <strong>Management</strong> Decision, Vol. 42, No 10, pp. 1297-1308<br />
Rodriguez- Repiso, L., Setchi, R. <strong>and</strong> Salmeron, J.L. (2007) "Modeling IT Projects Success with Fuzzy Cognitive<br />
Maps", Expert Systems with Applications 32 (2007) 543–559<br />
41
Mohammad Abooyee Ardakan et al.<br />
Rutherford, P. (1995) “Competency Based Assessment”, Pitman, Melbourne.<br />
Sternberg, R <strong>and</strong> Kolligian, Jr J. (1990) “Competence considered”, Yale University Press, New Haven, CT.<br />
Strebler, M., Robinson, D. <strong>and</strong> Heron, P. (1997), “Getting the Best Out of Your Competencies”, Institute of<br />
Employment Studies, University of Sussex, Brighton.<br />
Stuart, L. H., Mills, A.M. <strong>and</strong> Remus U. (2009) “School Leaders, ICT Competence <strong>and</strong> Championing Innovations”,<br />
Elsevier, Christchurch.<br />
Thompson, J.E, Stuart, R. <strong>and</strong> Lindsay, P.R. (1996) "The Competence of top Team Members: A Framework for<br />
Successful Performance", Journal of Managerial Psychology, Vol. 11 No. 3, pp.48 – 66<br />
Wu, J.H., Chen, Y.C. <strong>and</strong> Chang, J. (2007) “Critical IS Professional Activities <strong>and</strong> Skills / <strong>Knowledge</strong>: A<br />
Perspective of IS Managers”, Computers in Human Behavior 23<br />
Wu, J.H., Chen, Y.C. <strong>and</strong> Lin, H.H. (2004) “Developing a Set of Managerial Needs for IS Managers: A Study of<br />
Necessary Managerial Activities <strong>and</strong> Skills”, <strong>Information</strong> <strong>and</strong> <strong>Management</strong> 41, pp. 413-429<br />
42
Investigating the Relationship of Managers’ IT Competency<br />
<strong>and</strong> IT Projects’ Risks<br />
Mohammad Abooyee Ardakan, Babak Sohrabi <strong>and</strong> Vahid Saadat<br />
Tehran University, Iran<br />
abooyee@ut.ac.ir<br />
bsohrabi@ut.ac.ir<br />
vsaadat@ut.ac.ir<br />
Abstract: These days, applying IT in organizations is inevitable, either for higher performance of current<br />
processes or as a key success factor in competitive advantages. For IT deployment in organizations, developing<br />
information systems as separate projects is needed. IT projects encounter variety of risks <strong>and</strong> it seems that IT<br />
competent Managers will h<strong>and</strong>le better IT project risks. In the present article, we have investigated the<br />
relationship between Managers’ IT competency with IT projects’ risk exposure. The construct of IT competency<br />
has been considered <strong>using</strong> two dimensions of IT <strong>Knowledge</strong> <strong>and</strong> IT Experience; <strong>and</strong> for Risk Exposure, projects<br />
risk has been evaluated along five dimensions: Technological Newness, Application Size, Lack of Expertise,<br />
Application Complexity <strong>and</strong> Organizational Environment. This survey involves 100 managers who have<br />
responsibility in selecting, outsourcing, consulting, leading <strong>and</strong> managing IT projects in their organizations. We<br />
have used Structural Equation Modeling with LISREL to test this relationship.<br />
Keywords: IT projects, managers’ IT competency, IT projects risk<br />
1. Introduction<br />
No wonder that there has been a dramatic increase in the use of IT alongside different businesses<br />
<strong>and</strong> so many IT projects are being started every day. Research tells us that 30- <strong>and</strong> 70-percent of IT<br />
projects fail in some important way, leading to global economic waste totaling perhaps trillions of<br />
dollars (Krigsman, 2010). These statistics highlight that many IT Projects in organizations have been<br />
failed or faced with some major risks. There have been some attempts to quantify the failure of IT<br />
projects. Sessions (2009) proposed a model that quantifies the dollar cost of IT failure worldwide. He<br />
concludes that the global IT failure costs the world economy a staggering amount of $6.2 trillion per<br />
year, or $500 billion each month. Poorly managed IT projects are a significant source of financial<br />
waste, so we must applaud these efforts, even though significant results may take years to achieve.<br />
Failed IT projects cause substantial waste in both the government <strong>and</strong> private sector (Krigsman,<br />
2010). What can change this trend <strong>and</strong> save IT projects? Do IT Competent Managers lead IT projects<br />
better that those who are not skillful in this area? Does identification of risk factors <strong>and</strong> trying to use<br />
risk management improve success rate of IT projects? We will investigate these questions in this<br />
paper.<br />
2. Literature review<br />
Science has a profound effect on the way we live, largely through technology. Technology is the use<br />
of scientific knowledge for practical purposes (Burnie, 2003). <strong>Information</strong> technology (IT) is the<br />
acquisition, processing, storage <strong>and</strong> dissemination of vocal, pictorial, textual <strong>and</strong> numerical<br />
information by a microelectronics-based combination of computing <strong>and</strong> telecommunications (Longley,<br />
1985). The term in its modern sense first appeared in an article published in the Harvard Business<br />
Review (1958), in which authors Leavitt <strong>and</strong> Whisler commented that "the new technology does not<br />
yet have a single established name. We shall call it information technology (IT)". Success/failure of IT<br />
projects have been investigated thru some researches by McFarlan (1981), this issue was examined<br />
by some authors (Alter, 1978 <strong>and</strong> Charette, 1989) but all show that little research has since been<br />
done to advance our knowledge of IT projects risk. Unfortunately, it appears that software<br />
development efforts still suffer from age-old difficulties of cost overruns, project delays, <strong>and</strong> unmet<br />
user needs (Bark et al, 1993). This research has been accomplished to investigate the alignment<br />
between IT projects risks <strong>and</strong> Managers' IT Competency, so we need to briefly define Risk, IT<br />
Competency <strong>and</strong> fit concepts with emphasizing the IT meaning.<br />
2.1 Risk<br />
Since terminology of technology has a heavy tie with the discipline of engineering, it seems<br />
appropriate to start with the definition of risk by the National Institute of St<strong>and</strong>ards <strong>and</strong> Technology<br />
(NIST) in its h<strong>and</strong>book , which describes risk as "the possibility of something adverse happening"<br />
43
Mohammad Abooyee Ardakan, Babak Sohrabi <strong>and</strong> Vahid Saadat<br />
(NIST, 1995). The 2001 publication of NIST h<strong>and</strong>book defines risk as "the net negative impact of the<br />
exercise of vulnerability, considering both the probability <strong>and</strong> the impact of occurrence" (NIST, 2001).<br />
Another appropriate definition of risk, related to the computing environment in particular, as stated by<br />
Kailay <strong>and</strong> Jarratt (1995) is "the potential for damage to a system or associated assets that exists as<br />
the result of a combination of a security threat <strong>and</strong> vulnerability". The risk exists because of the<br />
combination of threats, vulnerability <strong>and</strong> asset value. Vulnerability is being a weakness in the security<br />
system that might be exploited to cause loss of or harm to the asset(s) (Pfleeger, 1989) <strong>and</strong> a threat<br />
being the source or circumstance that has the potential to cause loss or harm (Kailay <strong>and</strong> Jarratt,<br />
1995; Pfleeger, 1989). Denenberg et al (1974) <strong>and</strong> Kaplan <strong>and</strong> Garrick (1981) define project risk as:<br />
project risk = (project uncertainty) * (magnitude of potential loss due to project failure). Boehm (1989)<br />
defines risk impact or risk exposure (RE) as RE= Prob(UO) * Loss(UO) where Prob(UO) is the<br />
probability of an unsatisfactory outcome, <strong>and</strong> Loss(UO) is the loss to the parties affected if the<br />
outcome is unsatisfactory. Another definition for risk in engineering is: "a combination of the<br />
probability of an undesirable event with the magnitude of each <strong>and</strong> every foreseeable consequence<br />
(damage to property, loss of money, injury to people, lives lost, <strong>and</strong> so on)" (Bell, 1989). Risk is often<br />
defined as a measure of probability <strong>and</strong> severity of adverse effects (Haimes, 1991). The most<br />
common definition of risk is in terms of exposure to specific factors that present a threat to achieving<br />
the expected outcomes of a project. On this basis, risk in IT projects is usually defined as the<br />
probability-weighted impact of an event on a project (Boehm, 1989; Charette, 1989, 1996).<br />
Simplistically, R = P * I where R is the risk exposure attributable to a particular risk factor, P is the<br />
probability the undesirable event will be realized <strong>and</strong> I is the impact or magnitude of the loss if the<br />
event occurs. Risk exposure is usually measured in dollars or time in commercial projects. This view<br />
of risk was adapted from management theory in the 1980s (March <strong>and</strong> Shapira, 1987).<br />
Barki et al (2001) have categorized IT projects risks in five dimensions of Technological Newness,<br />
Application Size, Lack of Expertise, Application Complexity <strong>and</strong> Organizational Environment that<br />
shown in figure 1. These dimensions are used in our research to identify Risk dimensions.<br />
Figure 1: Conceptual model of risk exposure<br />
2.2 IT competency<br />
Since the mid-1980s, as the strategic impact of IT became evident, both researchers <strong>and</strong> practitioners<br />
have argued that the management of IT <strong>and</strong> leadership in IT must be a shared endeavor between IT<br />
44
Mohammad Abooyee Ardakan, Babak Sohrabi <strong>and</strong> Vahid Saadat<br />
professionals <strong>and</strong> line managers (Henderson, 1990; Keen, 1991; Rockart 1988; Sambamurthy <strong>and</strong><br />
Zmud 1994; Smith 1996).<br />
Business managers who are competent in IT, possess IT knowledge <strong>and</strong> IT experience, though their<br />
primary area of expertise is likely be in an area other than IT. Bassellier et al (2003) have<br />
conceptualized competence as a duality, including the knowledge <strong>and</strong> experience of business<br />
managers. <strong>Knowledge</strong> is a key part of competence, but as competence is grounded in everyday<br />
practice (Orlikowski, 2002), knowledge on its own is not sufficient to represent competence. In that<br />
sense, competence is more than the knowledge possessed by individuals; it encompasses the use or<br />
exploitation of such knowledge as well—the ability to put knowledge into practice (Brown <strong>and</strong> Duguid<br />
1998). It is the process of search <strong>and</strong> learning—embracing different types of knowledge <strong>and</strong><br />
activities—that will lead to performance (Karnøe, 1995). These two aspects of knowledge <strong>and</strong><br />
experience are found at different levels in the literature. Common knowledge refers to the<br />
commonality of vocabulary, conceptual knowledge, <strong>and</strong> experiences among individual specialists<br />
(Grant, 1996), foc<strong>using</strong> on the importance of both knowledge <strong>and</strong> practice. In the practitioner<br />
literature, according to Forrester Research, the new technology executive is one “who appreciates<br />
technology’s capabilities <strong>and</strong> uses technology as a lever to deliver outst<strong>and</strong>ing business results”<br />
(Smith, 1996). <strong>Knowledge</strong> is specialized—a usable body of facts <strong>and</strong> concepts relevant for a<br />
particular job (Boyatzis, 1982). We can further distinguish between these concepts by noting that<br />
knowledge is static <strong>and</strong> is something we use in action, while knowing is dynamic <strong>and</strong> is part of the<br />
action.<br />
Many organizational studies use the taxonomy of knowledge that distinguishes tacit from explicit<br />
knowledge. Based on this taxonomy, explicit knowledge is knowledge that can be taught, read, <strong>and</strong><br />
explained (Nonaka, 1994; Polanyi, 1967; Ryle, 1949). Polanyi (1967) identified that knowledge<br />
consists of more than the explicit, formal knowledge that can be clearly transmitted <strong>using</strong> systematic<br />
language. Individuals also know how to do things that they may not be able to render in an explicit<br />
fashion (Polanyi 1967). Tacit knowledge is gained through personal experience <strong>and</strong> is not easily<br />
transmittable (Nonaka, 1994). One main challenge with this taxonomy is that while the concept of tacit<br />
knowledge is intuitively easy to underst<strong>and</strong>, it is difficult to model <strong>and</strong> capture. The relationship<br />
between these two taxonomies is complex. Despite the greater recognition of the importance of<br />
knowing as a distinct element from knowledge, how this fits with the explicit-tacit taxonomy is not<br />
clear. Some argue that tacit knowledge is distinct from knowing (Cook <strong>and</strong> Brown, 1999), while others<br />
claim that it is a form of knowing (Orlikowski, 2002). However, both perspectives highlight the role of<br />
action in knowing. What emerges from these studies is the importance of a multidimensional<br />
perspective of competence. Based on this, it becomes essential to look at what people do as well as<br />
at what they possess to underst<strong>and</strong> competence. The nature of competence is therefore defined by<br />
the knowledge <strong>and</strong> experience of business managers. The knowledge dimension captures the<br />
specialized knowledge that is relevant to becoming competent with IT. The experience dimension<br />
captures the activities that business managers engage in to deepen their tacit knowledge <strong>and</strong> their<br />
knowing.<br />
Bassellier et al (2003) have conceptualized IT Competency by IT <strong>Knowledge</strong> <strong>and</strong> IT Experience<br />
dimensions that shown in figure 2.<br />
Figure 2: Conceptual model of IT competency<br />
45
Mohammad Abooyee Ardakan, Babak Sohrabi <strong>and</strong> Vahid Saadat<br />
Technology, Applications, System Development, <strong>Management</strong> <strong>and</strong> Access to <strong>Knowledge</strong> are 5<br />
dimensions of IT <strong>Knowledge</strong> that shown in figure 3.<br />
Figure 3: IT knowledge dimensions<br />
Experience in Projects <strong>and</strong> Experience in IT <strong>Management</strong> are 2 dimensions of IT Experience that<br />
shown in figure 4.<br />
Figure 4: IT experience dimensions<br />
2.3 Fit<br />
There is not any clear definition for fit. Definitional rigor is critical, since different conceptual definitions<br />
of fit imply different meanings of a contingency theory <strong>and</strong> different expected empirical results (Drazin<br />
<strong>and</strong> Van de Ven, 1985). This lack of clear definition <strong>and</strong> methodological rigor has led to inconsistent<br />
results <strong>and</strong> could eventually alter the very meaning of a theory (Miller, 1981; Schoonhoven, 1981; Van<br />
de Ven <strong>and</strong> Drazin, 1985; Venkatraman, 1989b). In an effort toward clarifying of the concept of fit <strong>and</strong><br />
to help researchers draw the appropriate links between the verbalization of fit-based relationships <strong>and</strong><br />
the statistical analyses chosen to test these relationships, Venkatraman (1989) proposed a framework<br />
for the classification of different concepts of fit. This framework identifies six different perspectives<br />
from which fit can be defined <strong>and</strong> studied; these are, fit as (a) moderation, (b) mediation, (c) matching,<br />
(d) co-variation, (e) profile deviation, <strong>and</strong> (f) gestalts. The framework classifies each perspective along<br />
46
Mohammad Abooyee Ardakan, Babak Sohrabi <strong>and</strong> Vahid Saadat<br />
three dimensions: the degree of specificity of the functional form of fit, the number of variables in the<br />
equation, <strong>and</strong> the presence – or absence – of a criterion variable (Bergeron et al, 1999). These six<br />
perspectives can be classified into two broad categories, according to the number of variables being<br />
simultaneously examined: the "reductionist" conceptualization of fit <strong>and</strong> "holistic" conceptualization<br />
(Venkatraman, 1990). The "reductionist" conceptualization" is based on a central assumption that the<br />
co-alignment between two constructs [<strong>and</strong>] ... can be best understood in terms of pair-wise coalignment<br />
among individual dimensions that represent two constructs". Three of six perspectives of fit<br />
defined by Venkatraman belong to this conceptualization. They are the moderation, the mediation <strong>and</strong><br />
the matching perspectives. The "holistic" conceptualization of fit emphasizes the systemic nature of<br />
co-alignment, wherein several variables are examined simultaneously. Fit as co-variation, fit as profile<br />
deviation, <strong>and</strong> fit as gestalt pertain to this perspective. Several researchers have argued that the<br />
holistic conceptualization was richer, because of its ability to retain the complex <strong>and</strong> interrelated<br />
nature of the relationship between variables (Venkatraman, 1990). We decided to use co-variation<br />
perspective from "holistic" conceptualization in our Model.<br />
2.4 Performance<br />
This construct refers to the efficiency <strong>and</strong> effectiveness with which an IT project development was<br />
completed <strong>and</strong> Performance has considered by Time, Budget <strong>and</strong> Quality. Time, Budget <strong>and</strong> Quality<br />
are 3 dimensions of Performance that shown in figure 5.<br />
Figure 5: Performance dimensions<br />
Fitting Risk Exposure in IT projects <strong>and</strong> IT Competency of Manager can influence Performance; this<br />
conceptual model has been shown in figure 5.<br />
Figure 6: Model of fitting IT projects risks <strong>and</strong> mangers' IT competency<br />
3. Method<br />
3.1 Construct<br />
Barki et al (2001) have considered project characteristics that increase the probability of project failure<br />
in five dimensions of Technological Newness, Application Size, Lack of Expertise, Application<br />
Complexity <strong>and</strong> Organizational Environment <strong>and</strong> have defined 23 risk variables along them to assess<br />
project failure. We have used these dimensions <strong>and</strong> customize the risk variables to assess IT projects<br />
failure. Questions are revised for Iranian culture <strong>and</strong> also some of them were neglected according to<br />
preliminary content validity checking. Bassellier et al (2003) have considered two dimensions of IT<br />
knowledge <strong>and</strong> IT experience to assess IT Competency of managers, they developed the initial items<br />
<strong>and</strong> then tested their measurement properties on a small scale, <strong>using</strong> exploratory analysis. Next, they<br />
47
Mohammad Abooyee Ardakan, Babak Sohrabi <strong>and</strong> Vahid Saadat<br />
conducted a full-scale test of the measurement properties <strong>and</strong> of the structural model. All procedures<br />
including item development, instrument pretesting <strong>and</strong> refinement, assessment of measurement<br />
properties <strong>and</strong> model testing were done <strong>and</strong> they have measured IT <strong>Knowledge</strong> dimension by<br />
Technology, Applications, System Development, <strong>Management</strong> <strong>and</strong> Access to <strong>Knowledge</strong> factors <strong>and</strong><br />
also IT Experience dimension by Experience in Projects <strong>and</strong> Experience in IT <strong>Management</strong> factors.<br />
We have used these dimensions <strong>and</strong> sub-dimensions for our questionnaire <strong>and</strong> also customize the<br />
questions. Questions were revised according to preliminary context validity survey, like the previous<br />
part actions done.<br />
Questionnaire with 39 questions prepared for measuring IT Competency of Managers <strong>and</strong> also IT<br />
Projects' Risks Exposure. We designed 3 questions related to performance items: Time, Budget <strong>and</strong><br />
Quality that filled for each project by its end users. We designed questions in 5-point Likert scale by<br />
Google Doc <strong>and</strong> used its online benefits to obliged respondents to fill all questions; because of this we<br />
hadn't any excluded questions. Questionnaires filled for 100 projects by 100 Managers <strong>and</strong> 745 users<br />
that we calculated the average of each questions filled by users for each project (For instance, project<br />
A had 39 questions filled by its Manager <strong>and</strong> 3 questions of its performance that filled by 8 users, we<br />
calculate the average response of these 8 users for each performance questions). Tehran<br />
Municipality supported us in all research processes. We investigated their projects <strong>and</strong> chose 120<br />
projects among them <strong>and</strong> focused on them. We identified their projects <strong>and</strong> negotiate with them,<br />
finally 100 projects remained for us that their managers filled the questionnaires <strong>and</strong> sent.<br />
4. Data<br />
In below, there are two tables; tables 1 shows reliability estimates of questions <strong>and</strong> table 2 shows<br />
demographics of IT Managers who participate in this research.<br />
Table 1: Reliability estimates<br />
Dimension Sub-dimensions Number of Alpha<br />
Questions<br />
IT Competency <strong>Knowledge</strong> of Technology 3 0.89<br />
<strong>Knowledge</strong> of Applications 4 0.87<br />
<strong>Knowledge</strong> of System Development 3 0.83<br />
<strong>Knowledge</strong> of <strong>Management</strong> of IT 4 0.91<br />
Access to IT <strong>Knowledge</strong> 2 0.79<br />
Experience in IT Projects 3 0.89<br />
Experience in <strong>Management</strong> of IT 3 0.86<br />
Risk Exposure Technology Newness 3 0.90<br />
Application Size, 3 0.81<br />
Lack of Expertise 4 0.91<br />
Application Complexity 3 0.83<br />
Table 2: Demographics<br />
Organizational Environment 4 0.88<br />
Division Group Category Count Percent<br />
Gender Male 92 92<br />
Female 8 8<br />
Degree Diploma 7 7<br />
Bachelor 49 49<br />
Master 38 38<br />
Ph.D. 6 6<br />
IT <strong>Management</strong> Experience Less than 3 years 11 11<br />
Between 3 to 5 years 23 23<br />
Between 5 to 10 years 52 52<br />
More than 10 years 14 14<br />
4.1 Model testing<br />
The model was tested <strong>using</strong> LISREL 8.53 (Jِreskog <strong>and</strong> Sِrbom 2002) with maximum-likelihood<br />
estimation procedures <strong>and</strong> the covariance matrix. The model presented in Figure 5 suggests three<br />
levels of factors, or latent variables. For IT Competency, the first-order factors are the five dimensions<br />
of IT knowledge (Technology, Applications, System Development, <strong>Management</strong> of IT, <strong>and</strong> Access to<br />
IT <strong>Knowledge</strong>) <strong>and</strong> the two dimensions of IT Experience (IT Projects, <strong>Management</strong> of IT). These<br />
factors at the first order measure two second order factors: IT <strong>Knowledge</strong> <strong>and</strong> IT Experience. IT<br />
48
Mohammad Abooyee Ardakan, Babak Sohrabi <strong>and</strong> Vahid Saadat<br />
Risk Exposure <strong>and</strong> IT Competency have correlation with Performance, so we should investigate the<br />
fitting these two latent variables <strong>and</strong> their effect on Performance.<br />
Figure 6: Result of IT competency model testing<br />
49
Mohammad Abooyee Ardakan, Babak Sohrabi <strong>and</strong> Vahid Saadat<br />
Figure 7: Result of risk exposure model testing<br />
Figure 8: Result of proposed model testing<br />
50
Table 3: Goodness of fit indices<br />
Mohammad Abooyee Ardakan, Babak Sohrabi <strong>and</strong> Vahid Saadat<br />
Item Value in Model Desired Value<br />
Total number of items 39<br />
X 2 237<br />
df 86<br />
X 2 /df 2.76 0.9<br />
AGFI 0.78 >0.8<br />
St<strong>and</strong>ardized RMR 0.00 0.9<br />
CFI 0.94 >0.9<br />
5. Discussion <strong>and</strong> conclusion<br />
This paper has examined IT projects risks <strong>and</strong> Managers' IT Competency in the literature <strong>and</strong> in a<br />
study of IT projects in Tehran Municipal (Iran). This study has attempted a broad-based theoretically<br />
guided field study of how Project Performance is affected by managers' IT Competency <strong>and</strong> projects<br />
Risk Exposure. IT Competent Managers are introducing with risks <strong>and</strong> can identify them <strong>and</strong> try to<br />
manage them.<br />
These overall conclusions are reached:<br />
First, Results showed that there is a significant relation between Technology literacy of managers <strong>and</strong><br />
the risk of Technology Newness. Also, managers with great Abilities in management can overcome<br />
the risks of Application Complexity <strong>and</strong> Organizational Environment.<br />
Second, Access to <strong>Knowledge</strong> factor was the interesting one, there are some managers that can<br />
provide desired knowledge from others or knowledge resources. Ability to search <strong>and</strong> find the proper<br />
information <strong>and</strong> change them to knowledge is a great factor for managers that help them take better<br />
decisions <strong>and</strong> manage risks.<br />
Third, In general this research showed that in Tehran Municipality, high-risk IT projects with Budget<br />
criterion needs high knowledge of <strong>Management</strong> <strong>and</strong> System Development <strong>and</strong> high Experience of IT<br />
<strong>Management</strong>.<br />
Forth, High-risk IT projects with Quality criterion needs high knowledge of <strong>Management</strong> <strong>and</strong><br />
Technology <strong>and</strong> high Experience in Projects.<br />
This research also measured IT Competency of Tehran Municipality Managers <strong>and</strong> sent some<br />
valuable points to Human Resource Department for recruitment <strong>and</strong> job promotion strategies.<br />
6. Further research<br />
This research was done in Tehran Municipality. Mayor of Tehran, Dr. Mohammad Bagher Ghalibaf is<br />
very supportive to IT projects for urban development in Tehran. Tehran's IT Master Plan has been<br />
prepared by an expert team of managers <strong>and</strong> consultants <strong>and</strong> is followed by subordinates, so its IT<br />
projects will not be the good sample of IT projects in Iran. It is recommended to implement this<br />
research in some other organizations like public organizations or other municipalities of Iranian cities.<br />
Also we used instruments that were constructed before by Barki et al (2001) <strong>and</strong> Bassellier et al<br />
(2003), it seems that these instruments should be developed <strong>using</strong> some new theoretical perspective<br />
toward success/failure of IT projects regarding specific context of Iranian organizations.<br />
Acknowledgement<br />
The authors sincerely wish to acknowledge supports of Tehran Municipality in all steps of the<br />
research.<br />
References<br />
Alter, S. <strong>and</strong> Ginzberg, M. (1978) "Managing uncertainty in MIS implementation", Journal of Sloan <strong>Management</strong><br />
Review, Vol. 20, No. 1, pp. 23-31.<br />
Barki, H., Rivard, S. <strong>and</strong> Talbot, J. (2001) "An integrative contingency model of software project risk<br />
management", Journal of <strong>Management</strong> <strong>Information</strong> Systems, Vol. 17, No. 4, Spring, pp 37-69.<br />
51
Mohammad Abooyee Ardakan, Babak Sohrabi <strong>and</strong> Vahid Saadat<br />
Bassellier, G., Benbasat , I. <strong>and</strong> Horner Reich, B. (2003) "The Influence of Business Managers’ IT Competence<br />
on Championing IT ", Journal of <strong>Information</strong> Systems Research, Vol. 14, No. 4, December, pp 317–336.<br />
Bell, T.E. (1989) "Managing Murphy's Law: engineering a minimum-risk system". IEEE Spectrum, No. 26, June,<br />
pp 24-27.<br />
Bergeron, F., Raymond, L. <strong>and</strong> Rivard, S. (1999) "Conceptualizing <strong>and</strong> analyzing fit in information systems<br />
research: an empirical comparison of perspectives", Cahier du GReSI, September, No. 99-03.<br />
Boehm, B.W. (1989) Software Risk <strong>Management</strong>. IEEE Computer Society Press, Los Alamitos, CA.<br />
Boyatzis, R. E. (1982) The Competent Manager: A Model for Effective Performance, John Wiley <strong>and</strong> Sons, New<br />
York.<br />
Brown, J. S. <strong>and</strong> Duguid, P. (1998) Organizing knowledge, California <strong>Management</strong> Rev. Vol. 40, No.3, pp 90–<br />
111.<br />
Burnie, D. (2003) Science, Retrieved Dec 2, 2003, from Microsoft Encarta Online Encyclopedia 1997/2003,<br />
[online], http://encarta.msn.com/text_761557105_1/Science.html<br />
Charette, N. (1989) Software Engineering Risk Analysis <strong>and</strong> <strong>Management</strong>, New York: McGraw-Hill.<br />
Cook, S. D. N. <strong>and</strong> Brown, J. S. (1999) "Bridging epistemologies: The generative dance between organizational<br />
knowledge <strong>and</strong> organizational knowing", Organ. Sci. Vol. 10, No. 4, pp 381–400.<br />
Drazin, R. <strong>and</strong> Van de Ven, A.H. (1985) "An Examination of the Alternative Forms of Contingency Theory",<br />
Administrative Science Quarterly, Vol. 30, pp 514-539.<br />
Denenberg, H.S., Eilers, R.D., Melone, J.J. <strong>and</strong> Zelten, RA. (1974) Risk <strong>and</strong> Insurance, Prentice-Hall, 2d edition,<br />
Englewood Cliffs, NJ.<br />
Grant, R. (1996) Prospering in dynamically competitive environments: Organizational capability as knowledge<br />
integration. Organ. Sci. Vol. 7, No.4, pp 375–387.<br />
Haimes, Y.Y (1991) Total risk management Risk Analysis, pp 169-171.<br />
Henderson, J. C. (1990) "Plugging into strategic partnerships: The critical IS connection", Sloan <strong>Management</strong><br />
Rev. Vol. 31 No.3, pp 7–18.<br />
Kailay, MP <strong>and</strong> Ramex, P. (1995) "A prototype expert system for computer security analysis <strong>and</strong> management",<br />
Journal of Computers <strong>and</strong> Security, No. 14, pp 49-63.<br />
Kaplan, S. <strong>and</strong> Ganick, J.B. (1981) "On the quantitative definition of risk". Journal of Risk Analysis, No. 1, pp 11-<br />
27.<br />
Karnøe, P. (1995) "Competence as process <strong>and</strong> the social embeddeness of competence building", Academic<br />
<strong>Management</strong>, Annual Meeting, Vancouver, B.C., pp 427–431.<br />
Keen, P. G. W. (1991) Shaping the Future: Business Design Through <strong>Information</strong> Technology. Harvard Business<br />
School Press, Boston, MA.<br />
Krigsman, M. (2010) ZDNet, Retrieved March 29, 2010, from ZDNet.com, [online],<br />
http://www.zdnet.com/blog/projectfailures/early-warnings-the-it-project-failure-dilemma-part-1/9097<br />
Krigsman, M. (2010) ZDNet, Retrieved Aug 2, 2010, from ZDNet.com, [online],<br />
http://www.zdnet.com/blog/projectfailures/federal-govt-gets-serious-about-it-failures/10427<br />
Longley, D. <strong>and</strong> Shain, M. (1985) Dictionary of <strong>Information</strong> Technology (2 ed.), Macmillan Press, p. 164.<br />
March, J.G. <strong>and</strong> Shapira, Z. (1987) Managerial perspectives on risk <strong>and</strong> risk taking, <strong>Management</strong> Science, pp<br />
1404–1418.<br />
McFarlan, W. (1981) "Portfolio approach to information systems", Journal of Harvard Business Review,<br />
September-October Vol. 59, No. 5, pp 142-150.<br />
Miller, D. (1981) "Toward a new contingency approach: the search for organizational gestalts", Journal of<br />
<strong>Management</strong> Studies, Vol. 18, pp 1-26.<br />
NIST (National Institute of St<strong>and</strong>ards <strong>and</strong> Technology). (1995) An introduction to computer security, [Special<br />
publication 800-12], Washington: U.S. Department of Commerce.<br />
NIST (National Institute of St<strong>and</strong>ards <strong>and</strong> Technology). (2001) Risk management guide for information<br />
technology systems, [Special publication 800-30], Washington: U.S. Department of Commerce.<br />
Nonaka, I. (1994) "A dynamic theory of organizational knowledge creation". Organ, Sci, Vol. 5, No. 1, pp 14–37.<br />
Orlikowski, W. J. (2002) "Knowing in practice: Enacting a collective capability in distributed organizing", Organ,<br />
Sci, Vol. 13 No.3, pp 249–273.<br />
Pfleeger, CP. (1989) Security in computing, Prentice Hall, Englewood Cliffs, NJ.<br />
Polanyi, M. (1967) Tacit Dimension, Routledge & Kegan Paul, London, U.K.<br />
Rockart, J. F. (1988) "The line takes the leadership - IS management in a wired society", Sloan <strong>Management</strong><br />
Rev, Vol. 29, No. 4, pp 57–64, M. J. Earl <strong>and</strong> Ross, J. W. (1996) "Eight imperatives for the new IT<br />
organization". Sloan <strong>Management</strong> Rev. Vol. 38, No. 1, pp 43–55.<br />
Ryle, G. (1949) The Concept of Mind, Hutchinson & Co, London, U.K.<br />
Sambamurthy, V. <strong>and</strong> Zmud, R. W. (1994) IT <strong>Management</strong> Competency Assessment: A Tool for Creating<br />
Business Value Through IT, Financial Executives Research Foundation, Morristown, NJ.<br />
Smith, J. B. (1996) "Becoming the new technology executive". CIO Canada, Vol. 41, No. 6, pp 39–46.<br />
Venkatraman, N. <strong>and</strong> Prescott, J.E. (1990) "Environment-Strategy Coalignment: An Empirical Test of its<br />
Performance Implications", Strategic <strong>Management</strong> Journal, No. 11, December, pp 1-23.<br />
52
Evaluation of ICT Investment in Healthcare: Insights <strong>and</strong><br />
Agenda for Future Research<br />
A. Arviansyah, Egon Berghout <strong>and</strong> Chee-Wee Tan<br />
University of Groningen, The Netherl<strong>and</strong>s<br />
a.arviansyah@rug.nl<br />
e.w.berghout@rug.nl<br />
c.w.tan@rug.nl<br />
Abstract: The recent downturn in global economy exerts mounting pressure on the justification of ICT budgets<br />
within organizations. Effective evaluation of ICT investments is therefore deterministic of organizations’ ability to<br />
maximize the business value to be extracted from such investments. The same can be said for healthcare<br />
institutions. Increasingly, healthcare institutions are pressured to optimize ICT investments for improving patient<br />
care. Yet, extant literature is fragmented on the focal concepts to be utilized for ICT evaluations in healthcare. By<br />
conducting a systematic literature review of 99 scholarly articles that have been published between 2003 <strong>and</strong><br />
2008, this study endeavors to shed light on contemporary theoretical <strong>and</strong> methodological trends that are pertinent<br />
to ICT evaluations in healthcare. Based on our literature review, three main findings are noted. First, we detect a<br />
gradual progression of ICT evaluation methods from the conventional st<strong>and</strong>ard of r<strong>and</strong>om controlled trial (RCT)<br />
to mixed-methods <strong>and</strong> triangulation. This, in turn, translates to a greater diversity of constructs being utilized for<br />
ICT evaluation <strong>and</strong> an expansion in operationalization techniques for measurement purposes. Second, we<br />
identified the five most important stakeholders <strong>and</strong> evaluative dimensions to be included in the ICT evaluation<br />
process. Together, these identified stakeholders <strong>and</strong> evaluative dimensions represent core elements to be<br />
incorporated into ICT evaluations in healthcare such that evaluations can be undertaken in an informative <strong>and</strong><br />
purposeful fashion. Third, we identified several distinctive contextual characteristics of the healthcare sector that<br />
deserve further research. These characteristics include the multi-stakeholder environment, the industry’s<br />
emphasis on safety as well as the knowledge intensive nature <strong>and</strong> h<strong>and</strong>crafted type of work being performed.<br />
This study enriches extant literature by synthesizing findings from past studies to glean insights into relevant<br />
concepts for ICT evaluation in healthcare <strong>and</strong> propose an agenda for future research along this direction.<br />
Keywords: information <strong>and</strong> communication technology evaluation, information technology evaluation, information<br />
technology investment, information technology in healthcare, systematic literature review<br />
1. Introduction<br />
Anderson & Aydin (2005) reported a 50% failure rate for healthcare information systems due to userresistance<br />
<strong>and</strong> staff interference problems. They argued that ICT failures in healthcare are caused by<br />
overemphasizing technological <strong>and</strong> economic aspects of ICT investments with little regard for<br />
organisational <strong>and</strong> socio-political issues. Sistrom (2005) argued that despite few tangible benefits <strong>and</strong><br />
significant adverse effects on patients <strong>and</strong> the medical profession, the healthcare sector has invested<br />
heavily in information technology. The healthcare sector is slow in adopting technology (Kaplan, 1997,<br />
Christensen <strong>and</strong> Remler, 2009, Sistrom, 2005). Kaplan (1997), who claimed that the lag of the<br />
healthcare sector in technology adoption, is caused by a lack of knowledge about the cultural <strong>and</strong><br />
socio-political aspects of ICT investments. For this reason, Friedman & Wyatt (2006) predicted that<br />
there will be a dem<strong>and</strong> for evidence-based technology to facilitate adoption decisions by healthcare<br />
organisation given their emphasis on safety. Arguably, two reasons justify the urgency of effective ICT<br />
evaluation in the healthcare sector. One, effective evaluation of ICT investments provides a means of<br />
drawing comparisons among competing project alternatives such that investment decisions can be<br />
undertaken in an informative <strong>and</strong> purposeful manner (Farbey et al., 1993). Two, substantial<br />
challenges exist with regards to the effective evaluation of ICT investments in the healthcare sector<br />
due to its contextual uniqueness <strong>and</strong> complexity (Braaksma et al., 2006) By conducting a systematic<br />
review of extant literature, this study thus provides an overview of contemporary theoretical <strong>and</strong><br />
methodological trends in the evaluation of ICT investments within the healthcare sector.<br />
2. Theoretical foundation<br />
2.1 Evaluation of ICT in healthcare<br />
Ammenwerth (2004) defines evaluation as the act of measuring or exploring properties of a health<br />
information system that serves to inform decision-making about the system. That is, evaluation<br />
represents the process of gauging resources for their merit <strong>and</strong> worth through comparing alternatives<br />
<strong>and</strong> ending with the act of choice (Guba <strong>and</strong> Lincoln, 1981, Berghout, 1997). The basic types of<br />
evaluation methods can be divided into formative-summative type <strong>and</strong> objectivist-subjectivist method<br />
53
A. Arviansyah, Egon Berghout <strong>and</strong> Chee-Wee Tan<br />
(Friedman <strong>and</strong> Wyatt, 2006). The formative type of evaluation is conducted during the life time of a<br />
project <strong>and</strong> intended to provide input for development <strong>and</strong> design. Conversely, summative is<br />
conducted at the end of a project <strong>and</strong> intended to look for system’s achievement (Lærum, 2004,<br />
Stoop, 2005). Whereas objectivist methods deal primarily with quantitative measurements, subjectivist<br />
methods deal with qualitative measurements. Goodman et al., (1999) argued that technologies may<br />
be assessed at different stages of diffusion <strong>and</strong> maturity. Therefore, in order to meet the needs of<br />
various policy makers seeking information throughout technological lifecycles, Goodman et al. (1999)<br />
suggested an iterative process of healthcare technology evaluation by taking into consideration its<br />
rapid change <strong>and</strong> development. For evaluation to be comprehensive, Remenyi et al. (2007) argued<br />
that evaluation should incorporate the opinions of all major stakeholders <strong>and</strong> focus on a full range of<br />
benefits or outcomes, both tangible <strong>and</strong> intangible. They argued that while there is no self-evident<br />
methodology for cost-benefit analysis of ICT, organisations still need to be able to evaluate their<br />
business process changes <strong>and</strong> the accompanying ICT investments. To capture the benefits of new<br />
technologies, the utilization of robust methods, with appropriate evaluative dimensions that take into<br />
account indirect benefits <strong>and</strong> costs, is needed to enhance decision-making within healthcare<br />
organizations (Sorenson et al., 2008). Conceivably, more knowledge on appropriate stakeholders <strong>and</strong><br />
evaluative dimension are required from a value-centric perspective.<br />
3. Method<br />
The literature review is conducted by examining published research from EBSCO Host Research<br />
Database, which includes Business Resource Premier – a database of developments in the field of<br />
international business <strong>and</strong> management <strong>and</strong> MEDLINE – a database of developments in the field of<br />
medical information, nursing <strong>and</strong> healthcare systems. The search strategy <strong>and</strong> flow of systematic<br />
review is shown in details in Figure 1. Several restrictions are applied in the phase of detail reviewed<br />
to establish the scope <strong>and</strong> framework of the research. Table 1 shows the definition of each term <strong>and</strong><br />
the criteria used for article selection to comprise the preceding definitions. All the articles are analysed<br />
<strong>and</strong> synthesised according to their type of study, evaluation method, stakeholders <strong>and</strong> evaluative<br />
dimension.<br />
Table 1: Definition <strong>and</strong> criteria<br />
Term Definition References Criteria<br />
Evaluation Process of describing the realisation of<br />
resources for their merit <strong>and</strong> worth through<br />
judging <strong>and</strong> comparing alternatives to other<br />
comparable entities <strong>and</strong>/or with a set of<br />
st<strong>and</strong>ards suitable for its context, ended with<br />
the act of choice in order to improve the<br />
design or the implementation of resources<br />
ICT Terminology derived from the term of<br />
<strong>Information</strong> Technology with a high<br />
dependency on data communication. Known<br />
also as a set of information processing,<br />
storage <strong>and</strong> transmission technologies<br />
emerging from microprocessor advancement<br />
Investment Use of money to get a profit or to increase the<br />
probability of a successful a business activity<br />
over a period of time. To be considered as<br />
investment, the transformation of capital into<br />
assets should last for at least a period of more<br />
than one year; allowing for an evaluation of its<br />
worthiness <strong>and</strong> its alignment with overall<br />
strategy<br />
Healthcare Prevention, treatment, <strong>and</strong> management of<br />
illness <strong>and</strong> the preservation of mental <strong>and</strong><br />
physical well-being through the services<br />
offered by the medical <strong>and</strong> allied health<br />
professions.<br />
54<br />
(Ammenwerth et<br />
al., 2004,<br />
Berghout, 1997,<br />
Guba <strong>and</strong><br />
Lincoln, 1981,<br />
Remenyi et al.,<br />
2007)<br />
(Cantwell et al.,<br />
2004, Remenyi<br />
et al., 2007)<br />
Longman<br />
Dictionary of<br />
Contemporary<br />
English<br />
(Berghout, 1997,<br />
Hogbin <strong>and</strong><br />
Thomas, 1994)<br />
The American<br />
Heritage<br />
Dictionary of the<br />
English<br />
Language<br />
Articles describe evaluation<br />
process <strong>using</strong> specific evaluative<br />
dimensions.<br />
Articles describe the involvement<br />
of ICT as the chain in delivering<br />
value, i.e. supporting<br />
organisational processes.<br />
Computer-based training or any<br />
kinds of education related matters<br />
are excluded as these systems are<br />
not part of direct patient care<br />
(Ammenwerth <strong>and</strong> de Keizer,<br />
2005)<br />
Articles describe the<br />
consequences of investment<br />
decision <strong>and</strong> state the outcome of<br />
the investment based on the<br />
evaluation process. The<br />
worthiness based on the<br />
evaluative dimensions could be<br />
tangible or intangible or a<br />
combination of them.<br />
Articles describe the evaluation of<br />
ICT in the healthcare context.
Figure 1: Search strategy for systematic review<br />
A. Arviansyah, Egon Berghout <strong>and</strong> Chee-Wee Tan<br />
55
4. Results<br />
A. Arviansyah, Egon Berghout <strong>and</strong> Chee-Wee Tan<br />
In this section we will describe the composition of the remaining articles from the systematic literature<br />
review along with the research’s result of stakeholders <strong>and</strong> evaluative dimensions.<br />
Descriptive statistics from our literature review show that 46% of the articles belong to the category of<br />
case or empirical studies, 30% to that of informational studies <strong>and</strong> 24% to that of review studies<br />
(Figure 2). In the category of case or empirical study, most of the articles use combination methods or<br />
multi approaches in their evaluation process (Figure 3). More researchers use quantitative methods<br />
than qualitative studies during the period of published-articles (Figure 3)<br />
Figure 2: Type of study from the remaining articles<br />
Figure 3: Evaluation method from the category of case <strong>and</strong> empirical study<br />
4.1 Analysis of stakeholders<br />
Many stakeholders were identified throughout the study. 17 categories were identified <strong>and</strong> their<br />
definitions summarised. Sorted by their frequency, number of citation <strong>and</strong> impact factor (Figure 4),<br />
these stakeholders are: Physician, Nurse, Patient, Healthcare organisation, Clinician, (End) User,<br />
IT/IS department/developer related, Staff, Assistant related position, Client, Head of clinic/laboratory<br />
manager, Clinical researcher/hospital scientist, Top management, General Practitioner (GP)/Doctor,<br />
Medical student, Head of division/manager, Community/external.<br />
Figure 4 <strong>and</strong> Figure 5 compare contribution of number of citations, impact factor <strong>and</strong> frequency across<br />
the different categories of stakeholders. For comparison of these figures, Figure 6 illustrates the bar<br />
chart of score difference from these two stacked bars across every category of stakeholders. All bar<br />
charts are sorted in descending order. Figure 4 illustrates the importance of stakeholders on the basis<br />
of impact factor, relative <strong>and</strong> absolute number of citation <strong>and</strong> frequency. From the graph’s rank order,<br />
we can see that Physician, Nurse, Patient, Healthcare organisation <strong>and</strong> Clinician are the top five most<br />
important stakeholders.<br />
Furthermore, Figure 5 illustrates the importance of stakeholders on the basis of impact factor <strong>and</strong><br />
relative <strong>and</strong> absolute number of citation. We can see that Nurse, Physician, Patient, Healthcare<br />
organisation <strong>and</strong> User are the top five most important stakeholders. Since these two graphs are the<br />
result of a weighted average calculation; the importance of these 17 stakeholders can be inferred<br />
from Figure 4 <strong>and</strong> Figure 5.<br />
56
A. Arviansyah, Egon Berghout <strong>and</strong> Chee-Wee Tan<br />
In addition, Figure 6 illustrates the difference between those two analyses of importance. From Figure<br />
6, it is clear that Physician, Patient, Nurse, Clinician <strong>and</strong> IT/IS department or developer are the top<br />
five stakeholders which have large differences between the two analyses of importance. Interestingly,<br />
IT/IS department <strong>and</strong> developer emerge as stakeholders with large difference (Figure 6) despite not<br />
emerging as the top five of important stakeholders in both importance analysis (Figure 4 <strong>and</strong> Figure<br />
5).<br />
Physician<br />
Nurse<br />
Patient<br />
Healthcare organisation<br />
Clinician<br />
User ‐ undefined<br />
IT/IS department/developer related<br />
Staff<br />
Assistant related position<br />
Client<br />
Head of clinic/laboratory manager<br />
Clinical researcher/hospital scientist<br />
Top management<br />
General Practitioner (GP) /Doctor<br />
Medical student<br />
Head of division/manager<br />
Community/external<br />
Figure 4: Stakeholders stacked bar<br />
Nurse<br />
Physician<br />
Patient<br />
Healthcare organisation<br />
User ‐ undefined<br />
Clinician<br />
Staff<br />
Assistant related position<br />
Top management<br />
IT/IS department/developer related<br />
Client<br />
Clinical researcher/hospital scientist<br />
Head of clinic/laboratory manager<br />
General Practitioner (GP) /Doctor<br />
Medical student<br />
Head of division/manager<br />
Community/external<br />
0 5 10 15 20 25 30 35 40<br />
Frequency Absolute no. of cited Relative no. of cited Impact factor<br />
0 2 4 6 8 10 12 14 16<br />
Absolute no. of cited Relative no. of cited Impact factor<br />
Figure 5: Stakeholders stacked bar without frequency<br />
57<br />
18
Physician<br />
Patient<br />
Nurse<br />
Clinician<br />
IT/IS department/developer related<br />
Healthcare organisation<br />
General Practitioner (GP) /Doctor<br />
User ‐ undefined<br />
Head of clinic/laboratory manager<br />
Head of division/manager<br />
Medical student<br />
Assistant related position<br />
Staff<br />
Clinical researcher/hospital scientist<br />
Client<br />
Community/external<br />
Top management<br />
A. Arviansyah, Egon Berghout <strong>and</strong> Chee-Wee Tan<br />
0 2 4 6 8 10 12 14 16 18 20<br />
Difference<br />
Figure 6: Difference between stacked bar with <strong>and</strong> without frequency (stakeholders)<br />
Analysis of the evaluative dimensions<br />
Many evaluative dimensions were revealed throughout the study. 28 categories were identified their<br />
definitions summarised. Sorted by their importance (Figure 7), these evaluative dimensions are:<br />
Usage, Satisfaction, Time related, Usability, Data or information quality, Organisation, Human,<br />
Technology, Medical outcome, Service quality/quality of care, Cost related, Performance, Quality of<br />
life (QOL), Functionality, Efficiency, Technical specification/requirement, Acceptance or attitude,<br />
Accurateness, Guidelines accordance, Effectiveness, Automation, Reliability, <strong>Knowledge</strong> related,<br />
Usefulness, Operational, External, Strategic, <strong>and</strong> Managerial.<br />
Figure 7 <strong>and</strong> Figure 8 compare contribution of number of citation, impact factor <strong>and</strong> frequency across<br />
every category of evaluative dimensions. For comparison of these figures, Figure 9 illustrates the bar<br />
chart of score difference from these two stacked bars across every category of evaluative dimensions.<br />
All bar charts are sorted in descending order. Figure 7 shows the importance of evaluative dimensions<br />
based on impact factor, relative <strong>and</strong> absolute number of citation <strong>and</strong> frequency. From the graph’s rank<br />
order, we can see that Usage, Satisfaction, Time related, Usability <strong>and</strong> Data/information quality are<br />
the top five most important evaluative dimensions.<br />
Furthermore, Figure 8 illustrates the importance of evaluative dimensions on the basis of impact factor<br />
<strong>and</strong> relative <strong>and</strong> absolute number of citation. We can see that Usage, Data/information quality, Time<br />
related, Quality of life (QOL) <strong>and</strong> Human are the top five most important evaluative dimensions. Since<br />
these two graphs are the result of a weighted average calculation, the relative importance of these 28<br />
evaluative dimensions can be inferred from Figure 7<strong>and</strong> Figure 8.<br />
58
Managerial<br />
A. Arviansyah, Egon Berghout <strong>and</strong> Chee-Wee Tan<br />
Usage<br />
Satisfaction<br />
Time related<br />
Usability<br />
Data/information quality<br />
Organisation<br />
Human<br />
Technology<br />
Medical outcome ‐ desired/undesired<br />
Service quality/quality of care<br />
Cost related<br />
Performance<br />
QOL<br />
Functionality<br />
Efficiency<br />
Technical specification/requirement<br />
Acceptance/attitude<br />
Accurateness<br />
Guidelines accordance<br />
Effectiveness<br />
Automation<br />
Reliability<br />
<strong>Knowledge</strong> related<br />
Usefulness<br />
Operational<br />
External<br />
Strategic<br />
Figure 7: Evaluative dimensions stacked bar<br />
Usage<br />
Data/information quality<br />
Time related<br />
QOL<br />
Human<br />
Satisfaction<br />
Performance<br />
Service quality/quality of care<br />
Functionality<br />
Technology<br />
Usability<br />
Organisation<br />
Efficiency<br />
Technical specification/requirement<br />
Medical outcome ‐ desired/undesired<br />
Automation<br />
Guidelines accordance<br />
Acceptance/attitude<br />
Accurateness<br />
Cost related<br />
Usefulness<br />
Reliability<br />
<strong>Knowledge</strong> related<br />
Effectiveness<br />
Operational<br />
Strategic<br />
Managerial<br />
External<br />
0 5 10 15 20 25 30 35 40<br />
Frequency Absolute no. of cited Relative no. of cited Impact factor<br />
0 5 10 15 20 25 30<br />
Absolute no. of cited Relative no. of cited Impact factor<br />
Figure 8: Evaluative dimensions stacked bar without frequency<br />
In addition, Figure 9 illustrates the difference between those two analyses of importance. From Figure<br />
9, we can see that Cost related, Usability, Medical outcome, Organisation <strong>and</strong> Satisfaction are the top<br />
five evaluative dimensions which have large difference between the two analyses of importance.<br />
Interestingly, Cost related <strong>and</strong> Medical outcome emerge as evaluative dimensions with large<br />
59
A. Arviansyah, Egon Berghout <strong>and</strong> Chee-Wee Tan<br />
difference (Figure 9) despite not emerging as the top five of important evaluative dimensions in both<br />
importance analysis (Figure 7 <strong>and</strong> Figure 8).<br />
Cost related<br />
Usability<br />
Medical outcome ‐ desired/undesired<br />
Organisation<br />
Satisfaction<br />
Time related<br />
Acceptance/attitude<br />
Technology<br />
Usage<br />
Effectiveness<br />
Accurateness<br />
Efficiency<br />
Data/information quality<br />
Service quality/quality of care<br />
Technical specification/requirement<br />
Human<br />
Guidelines accordance<br />
Functionality<br />
Reliability<br />
Performance<br />
<strong>Knowledge</strong> related<br />
External<br />
Operational<br />
Usefulness<br />
Strategic<br />
QOL<br />
Managerial<br />
Automation<br />
0 2 4 6 8 10 12 14 16 18<br />
Difference<br />
Figure 9: Difference between stacked bar with <strong>and</strong> without frequency (evaluative dimensions)<br />
5. Discussion<br />
In this section we will discuss findings of the stakeholders <strong>and</strong> evaluative dimensions revealed by our<br />
systematic literature review.<br />
In general, there is insufficient scholarly attention being paid to the derivation of guidelines to assist<br />
stakeholders in evaluating ICT investments. The guidelines that consist of detailed study protocol of<br />
all the decisions <strong>and</strong> steps might provide benchmark for other researcher in conducting further<br />
evaluation. These guidelines are beneficial for allowing others to learn <strong>and</strong> to develop the framework<br />
as well as to test the robustness of its applicability (Ammenwerth et al., 2003).<br />
5.1 Progress of ICT evaluation in healthcare: construct diversity <strong>and</strong> methodological<br />
pluralism<br />
Evaluation method of ICT investment in the healthcare context is influenced by conventional medical<br />
research. The golden st<strong>and</strong>ard for assessing medical interventions is the R<strong>and</strong>omised Controlled Trial<br />
(RCT) which is also used in evaluating ICT investment in healthcare sector (Berg, 2004). Examples<br />
include the studies of Apkon et al. (2005), Fung (2006) <strong>and</strong> May, Mort, Williams, Mair, & Gask (2003).<br />
Quantitative evaluation methods have been dominant for a period of 20 years (Ammenwerth <strong>and</strong> de<br />
Keizer, 2005). Yet, in spite of its prevalence, the RCT design is unsuitable for explaining why <strong>and</strong> how<br />
certain ICT is being used (Stoop, 2005). Isolating information system’s component <strong>and</strong> its social<br />
interaction, likewise introducing new medical intervention or new medicine, is dubious, labour<br />
intensive <strong>and</strong> expensive method (Berg, 2004). The earlier studies of evaluation in medical informatics<br />
tended to lean towards the use of quantitative method <strong>and</strong> measurement.<br />
60
A. Arviansyah, Egon Berghout <strong>and</strong> Chee-Wee Tan<br />
Approaches that analyse qualitative data are needed to measure intangible benefits <strong>and</strong> explain<br />
social phenomena. In later development, there is a greater consideration for the social <strong>and</strong><br />
organisational aspects in evaluation studies <strong>and</strong> to incorporate specific measures such as<br />
technological, human <strong>and</strong> organisational issue in the evaluation process (Yusof et al., 2008,<br />
Oroviogoicoechea et al., 2008, de Keizer <strong>and</strong> Ammenwerth, 2008). In spite of this urgency, the quality<br />
of RCT’s publications was significantly higher than the quality of non-RCT studies which comprise<br />
70% of the overall studies (de Keizer <strong>and</strong> Ammenwerth, 2008). Moreover, review made by Rahimi &<br />
Vimarlund (2007) showed that despite the recent dominance of economic <strong>and</strong> organisational aspects<br />
in the evaluation of health information system, we are still missing a st<strong>and</strong>ard framework for<br />
evaluating effects <strong>and</strong> outputs of implementation <strong>and</strong> use of ICT in the healthcare context.<br />
Furthermore, various notions of value emerge from the research. Benefit is the notion value used<br />
mostly in the articles. Benefit refers to all positive consequences of an IS investment as the antonym<br />
of sacrifices (Renkema <strong>and</strong> Berghout, 1997). These various notions of value imply that there are<br />
many perspectives available to the researcher in evaluating ICT investments within the healthcare<br />
setting. The progression of evaluation method shows a shifting from <strong>using</strong> single quantitative or<br />
qualitative method to a combination approaches or triangulation to encompass more comprehensive<br />
output. Recent studies have begun to employ diversity of constructs <strong>and</strong> measurement techniques to<br />
meet the challenges of RCT method, such as <strong>using</strong> combination of method or multi approaches in<br />
their evaluation process.<br />
5.2 Stakeholders in healthcare settings: Involvement <strong>and</strong> importance<br />
From Figure 4, the analysis shows that Physician, Nurse, Patient, Healthcare organisation <strong>and</strong> User<br />
are the top five most important stakeholders. In addition, Clinician <strong>and</strong> User have somewhat similar<br />
ranking based on Figure 4 <strong>and</strong> Figure 5. Physician <strong>and</strong> Nurse, as part of healthcare team, have an<br />
influential role to play in healthcare spending decisions. It is invaluable to underst<strong>and</strong> their<br />
involvement as subjects conducting medical practice <strong>and</strong> as users utilizing specific ICT for medical<br />
treatment or medical administration.<br />
Inevitably, patients, as one of the important stakeholders is the object of medical treatment as well as<br />
the subject or ‘customer’ of health organisation, also take as the user of technology in certain<br />
healthcare setting. Health organisation as important stakeholder means that the management which<br />
is providing <strong>and</strong> delivering service to ‘customer’ (patient <strong>and</strong> client) should be involved in assessing<br />
the worthiness of ICT investments. The stakeholders that emerged based on these two analyses are<br />
physician, nurse, patient <strong>and</strong> healthcare organisation. These four stakeholders should be highly<br />
involved in evaluating ICT investment in the healthcare setting.<br />
However, these four stakeholders are not necessarily involved in the ICT evaluation process for<br />
specific types of technologies <strong>and</strong> healthcare settings (Cariello, 2003, Fung, 2006, Kaur et al., 2004,<br />
Kilbridge et al., 2006, Lorence <strong>and</strong> Greenberg, 2006, Ramnarayan et al., 2006, Thompson et al.,<br />
2003, Zheng et al., 2005, Beuscart-Zephir et al., 2005, Harison <strong>and</strong> Berghout, 2006). For example,<br />
evaluation of computerised templates in primary care only involved clinician whereas the comparison<br />
of paper-based form with computer-based evaluation only involved the tele-rehabilitation coordinator<br />
<strong>and</strong> the research assistant.<br />
Interestingly, despite a general belief that IT/IS department should be involved in evaluation of ICT<br />
investment, IT/IS department appears to be rarely consulted.<br />
5.3 Evaluative dimensions of ICT Investment in healthcare<br />
From Figure 7, the analysis shows that Usage, Satisfaction, Time related, Usability are four most<br />
important evaluative dimensions. Data or information quality <strong>and</strong> organisation have a similar rank.<br />
Usage, usability <strong>and</strong> user satisfaction are related each other in showing the worthiness of ICT<br />
investments. System with higher usage usually implies its usability <strong>and</strong> satisfaction.<br />
High vigilance coupled with strong pressure in the healthcare sector dem<strong>and</strong>s fast <strong>and</strong> accurate<br />
information. Consequently, time related, data/information quality <strong>and</strong> quality of life emerged as<br />
important evaluative dimensions. Timed related dimension is important since most activity <strong>and</strong><br />
process in the healthcare sector require agility; ICT should help in achieving better time compare to<br />
the old process. Data/information quality dimension is important since problem that relates to life or<br />
death dem<strong>and</strong>s accurateness <strong>and</strong> reliable information as the basis for deciding medical treatment.<br />
61
A. Arviansyah, Egon Berghout <strong>and</strong> Chee-Wee Tan<br />
Through this medical treatment, ICT should have significant role in increasing the patient’s Quality of<br />
life (QOL).<br />
The graphs show that Satisfaction, Usability <strong>and</strong> Organisation have lower importance when frequency<br />
is omitted from the analysis (Figure 8). Conversely, Quality of life (QOL) <strong>and</strong> Human category emerge<br />
as important evaluative dimensions (Figure 8). From the difference analysis (Figure 9), it seems that<br />
many researchers used Medical outcome <strong>and</strong> Cost related category to evaluate ICT investments;<br />
however, these two dimensions get lower ranking of importance when frequency is omitted from the<br />
analysis. Medical outcome is a well-establish evaluative dimension to evaluate medical intervention<br />
such as the new introduction of new drugs or new medical treatment. It is possible that this<br />
phenomenon is caused by the progression of evaluation method. Likewise, the cost related as<br />
evaluative dimension is frequently mentioned in many researches. A possible explanation to this<br />
phenomenon is that the importance of cost is highly recognised; however, specific cost such as<br />
adverse drug event (ADE) is more difficult to measure. Moreover, there is also a possibility that many<br />
healthcare organisations are government funded institutions.<br />
Organisation, human, <strong>and</strong> technology perspective emerged as important dimensions which show the<br />
potential direction of evaluating ICT in healthcare. The complete set of evaluative dimensions for<br />
general type of ICT <strong>and</strong> healthcare setting are Usage, Satisfaction, Time related, Usability, Data or<br />
information quality, Organisation, Quality of life (QOL), Human <strong>and</strong> Technology.<br />
5.4 Distinctive contextual characteristics of the healthcare sector<br />
The healthcare service is highly related to the well being of patients as the customers, which make the<br />
outcome is less predictable. Patient’s safety should then be the foremost concern for healthcare<br />
organizations. Patient’s safety is accomplished by both minimising errors <strong>and</strong> adverse effects <strong>and</strong><br />
enhancing medication processes.<br />
Sistrom (2005) described healthcare as a labour-intensive sector where by the work process is more<br />
cognitive than physical. This process, which involves patients together with patient families, medical<br />
professions <strong>and</strong> administrative personnel, creates a complex, a highly structured <strong>and</strong> quite a<br />
heterogeneous culture. Therefore, Sistrom (2005) argued that ICT tends to disrupt existing social<br />
structure as well as established clinical practice <strong>and</strong> core work process by reengineering the cognitive<br />
process <strong>and</strong> the social structure of the healthcare profession. This problem will lead to dissatisfaction<br />
<strong>and</strong> resistance. An example of resistance occurring in a university medical centre was presented by<br />
Lorenzi et al. (1997). The new technology encountered challenges as it disturbed <strong>and</strong> forced changes<br />
to established processes <strong>and</strong> practice routines. That is, medical staff sees the technology as the<br />
enforcement of will <strong>and</strong> value by the management.<br />
The healthcare sector is considered a complex <strong>and</strong> a multi-stakeholder environment with a split<br />
decision-making organisation. Lorenzi et al. (1997) mentioned several reasons why healthcare is a<br />
complex service organisation. Based on Mintzberg’s type of organisations, they argued that the<br />
healthcare organisation is a combination of a federal structure (i.e. homogenous with regional unit), a<br />
machine bureaucracy (i.e. top formal process controlled), a professional bureaucracy (i.e.<br />
autonomously professional activities with professional value <strong>and</strong> culture controlled), <strong>and</strong> a networked<br />
organisation (i.e. independent individuals <strong>and</strong> sub-organisations that link each other for a certain<br />
objective or task) (see also Southon et al, 1999).<br />
The healthcare sector is also encouraged to share knowledge due to the knowledge intensive<br />
characteristic of the organisation. The knowledge sharing in a knowledge intensive environment will<br />
support better decision making among medical professions in one organisation <strong>and</strong> between<br />
organisations in the healthcare sector. Evaluating healthcare information system through an<br />
enterprise perspective will encounter difficulties in this multi-stakeholder environment (Connell <strong>and</strong><br />
Young, 2007).<br />
6. Conclusions <strong>and</strong> recommendations<br />
A gradual progression from conventional st<strong>and</strong>ard of RCT to mixed-methods <strong>and</strong> triangulation<br />
indicates a trend <strong>and</strong> growing dem<strong>and</strong> for multidisciplinary ICT evaluation frameworks. There is a<br />
challenge to build more robust <strong>and</strong> comprehensive evaluation process. One alternative way is by<br />
62
A. Arviansyah, Egon Berghout <strong>and</strong> Chee-Wee Tan<br />
incorporating a multidisciplinary team of evaluator which might reveal diverse insight as well as enrich<br />
the underst<strong>and</strong>ing of healthcare contextual situation.<br />
Determination of success <strong>and</strong> failure in ICT investment project would depend on how stakeholders<br />
define their needs <strong>and</strong> perceptions of the technology <strong>and</strong> how evaluator elicits them by <strong>using</strong> the<br />
evaluative dimensions. Therefore, evaluator should clearly identify the key stakeholders as well as<br />
utilize proper evaluative dimensions. The identified stakeholders <strong>and</strong> evaluative dimensions in this<br />
study represent the core elements to be incorporated into ICT evaluations in healthcare such that<br />
evaluations can be undertaken in an informative <strong>and</strong> purposeful fashion.<br />
Furthermore, as the distinctive contextual characteristics of the healthcare sector might influence<br />
organizations’ choice of evaluation constructs <strong>and</strong> measurement methods, future investigations are<br />
needed to decipher their impact on ICT evaluations in healthcare.<br />
References<br />
Ammenwerth, E., Brender, J., Nykanen, P., Prokosch, H.-U., Rigby, M. & Talmon, J. 2004. Visions And<br />
Strategies To Improve Evaluation Of Health <strong>Information</strong> Systems. Reflections And Lessons Based On The<br />
His-Eval Workshop In Innsbruck. International Journal Of Medical Informatics, 73, 479-491.<br />
Ammenwerth, E. & De Keizer, N. 2005. An Inventory Of Evaluation Studies Of <strong>Information</strong> Technology In Health<br />
Care Trends In Evaluation Research 1982-2002. Methods Of <strong>Information</strong> In Medicine, 44, 44-56.<br />
Ammenwerth, E., Graber, S., Herrmann, G., Burkle, T. & Konig, J. 2003. Evaluation Of Health <strong>Information</strong><br />
Systems-Problems And Challenges. International Journal Of Medical Informatics, 71, 125-135.<br />
Anderson, J. G. & Aydin, C. E. 2005. Evaluating The Organizational Impact Of Healthcare <strong>Information</strong> Systems,<br />
Springer Verlag.<br />
Apkon, M., Mattera, J. A., Lin, Z., Herrin, J., Bradley, E. H., Carbone, M., Holmboe, E. S., Gross, C. P., Selter, J.<br />
G., Rich, A. S. & Krumholz, H. M. 2005. A R<strong>and</strong>omized Outpatient Trial Of A Decision-Support <strong>Information</strong><br />
Technology Tool. Archives Of Internal Medicine, 165, 2388-2394.<br />
Berg, M. 2004. Health <strong>Information</strong> <strong>Management</strong>: Integrating <strong>Information</strong> Technology In Health Care Work,<br />
Routledge.<br />
Berghout, E. W. 1997. Evaluation Of <strong>Information</strong> System Proposals: Design Of A Decision Support Method.<br />
Doctoral Dissertation Delft University Of Technology, Delft University Of Technology.<br />
Beuscart-Zephir, M.-C., Anceaux, F. O., Menu, H., Guerlinger, S., Watbled, L. & Evrard, F. 2005. User-Centred,<br />
Multidimensional Assessment Method Of Clinical <strong>Information</strong> Systems: A Case-Study In Anaesthesiology.<br />
International Journal Of Medical Informatics, 74, 179-189.<br />
Braaksma, J., Comm<strong>and</strong>eur, A. & Berghout, E. 2006. The Business Case For (Ict) Investment Evaluation In<br />
Nonprofit Organisations. Proceedings Of The 13th European Conference On <strong>Information</strong> Technology<br />
Evaluation.<br />
Cantwell, J., Gambardella, A. & Granstr<strong>and</strong>, O. 2004. The Economics And <strong>Management</strong> Of Technological<br />
Diversification, Routledge.<br />
Cariello, F. P. 2003. Computerized Telephone Nurse Triage. An Evaluation Of Service Quality And Cost. The<br />
Journal Of Ambulatory Care <strong>Management</strong>, 26, 124-137.<br />
Christensen, M. C. & Remler, D. 2009. <strong>Information</strong> And Communications Technology In U.S. Health Care: Why Is<br />
Adoption So Slow And Is Slower Better? Journal Of Health Politics Policy And Law, 34, 1011-1034.<br />
Connell, N. A. D. & Young, T. P. 2007. Evaluating Healthcare <strong>Information</strong> Systems Through An "Enterprise"<br />
Perspective. <strong>Information</strong> & <strong>Management</strong>, 44, 433-440.<br />
De Keizer, N. F. & Ammenwerth, E. 2008. The Quality Of Evidence In Health Informatics: How Did The Quality Of<br />
Healthcare It Evaluation Publications Develop From 1982 To 2005? International Journal Of Medical<br />
Informatics, 77, 41-49.<br />
Farbey, B., L<strong>and</strong>, F. & Targett, D. 1993. How To Assess Your It Investment: A Study Of Methods And Practice,<br />
Butterworth-Heinemann.<br />
Friedman, C. P. & Wyatt, J. C. 2006. Evaluation Methods In Medical Informatics, Springer.<br />
Fung, C. H. 2006. Computerized Condition-Specific Templates For Improving Care Of Geriatric Syndromes In A<br />
Primary Care Setting. Journal Of General Internal Medicine: Official Journal Of The Society For Research<br />
And Education In Primary Care Internal Medicine, 21, 989-994.<br />
Goodman, C. S. & Ahn, R. 1999. Methodological Approaches Of Health Technology Assessment. International<br />
Journal Of Medical Informatics, 56, 97-105.<br />
Guba, E. G. & Lincoln, Y. S. 1981. Effective Evaluation, Jossey-Bass Inc Pub.<br />
Harison, E. & Berghout, E. 2006. Measuring The Effects Of <strong>Information</strong> Systems On The Performance Of<br />
Operating Rooms (Or). Centre Of It Economics Research. Groningen, The Netherl<strong>and</strong>s: University Of<br />
Groningen.<br />
Hogbin, G. & Thomas, D. V. 1994. Investing In <strong>Information</strong> Technology: Managing The Decision-Making Process,<br />
London; New York: Mcgraw-Hill.<br />
Kaplan, B. 1997. Addressing Organizational Issues Into The Evaluation Of Medical Systems. Journal Of The<br />
American Medical Informatics Association, 4, 94.<br />
63
A. Arviansyah, Egon Berghout <strong>and</strong> Chee-Wee Tan<br />
Kaur, K., Forducey, P. G. & Glueckauf, R. L. 2004. Prototype Database For Telerehabilitation. Telemedicine<br />
Journal And E-Health: The Official Journal Of The American Telemedicine Association, 10, 213-222.<br />
Kilbridge, P. M., Welebob, E. M. & Classen, D. C. 2006. Development Of The Leapfrog Methodology For<br />
Evaluating Hospital Implemented Inpatient Computerized Physician Order Entry Systems. Quality & Safety<br />
In Health Care, 15, 81-84.<br />
Lærum, H. 2004. Evaluation Of Electronic Medical Records: A Clinical Task Perspective. Doctoral, University Of<br />
Science And Technology.<br />
Lorence, D. P. & Greenberg, L. 2006. The Zeitgeist Of Online Health Search. Implications For A Consumer-<br />
Centric Health System. Journal Of General Internal Medicine: Official Journal Of The Society For Research<br />
And Education In Primary Care Internal Medicine, 21, 134-139.<br />
Lorenzi, N. M., Riley, R. T., Blyth, A. J. C., Southon, G. & Dixon, B. J. 1997. Antecedents Of The People And<br />
Organizational Aspects Of Medical Informatics. Journal Of The American Medical Informatics Association,<br />
4, 79-93.<br />
May, C., Mort, M., Williams, T., Mair, F. & Gask, L. 2003. Health Technology Assessment In Its Local Contexts:<br />
Studies Of Telehealthcare. Social Science & Medicine (1982), 57, 697-710.<br />
Oroviogoicoechea, C., Elliott, B. & Watson, R. 2008. Review: Evaluating <strong>Information</strong> Systems In Nursing. Journal<br />
Of Clinical Nursing, 17, 567-575.<br />
Rahimi, B. & Vimarlund, V. 2007. Methods To Evaluate Health <strong>Information</strong> Systems In Healthcare Settings: A<br />
Literature Review. Journal Of Medical Systems, 31, 397-432.<br />
Ramnarayan, P., Winrow, A., Coren, M., N<strong>and</strong>uri, V., Buchdahl, R., Jacobs, B., Fisher, H., Taylor, P. M., Wyatt,<br />
J. C. & Britto, J. 2006. Diagnostic Omission Errors In Acute Paediatric Practice: Impact Of A Reminder<br />
System On Decision-Making. Bmc Medical Informatics And Decision Making, 6, 37-37.<br />
Remenyi, D., Money, A. H. & Bannister, F. 2007. The Effective Measurement And <strong>Management</strong> Of Ict Costs And<br />
Benefits, Oxford; Burlington, Ma, Cima.<br />
Renkema, T. J. W. & Berghout, E. W. 1997. Methodologies For <strong>Information</strong> Systems Investment Evaluation At<br />
The Proposal Stage: A Comparative Review. <strong>Information</strong> And Software Technology, 39, 1-13.<br />
Sistrom, C. 2005. The Socioeconomic Aspects Of <strong>Information</strong> Technology For Health Care With Emphasis On<br />
Radiology. Academic Radiology, 12, 431-443.<br />
Sorenson, C., Drummond, M. & Kanavos, P. 2008. Ensuring Value For Money In Health Care: The Role Of<br />
Health Technology Assessment In The European Union. Copenhagen; European Observatory On Health<br />
Systems And Policies, 2008, 179 P. Ilus (Observatory Studies Series, 11).<br />
Southon, G., Sauer, C. & Dampney, K. 1999. Lessons From A Failed <strong>Information</strong> Systems Initiative: Issues For<br />
Complex Organisations. International Journal Of Medical Informatics, 55, 33-46.<br />
Stoop, A. P. 2005. Evaluating Ict Applications In Health Care: Studies From A Sociotechnical Perspective.<br />
Doctoral Dissertation, Erasmus Universiteit Rotterdam.<br />
Thompson, D. S., Oberteuffer, R. & Dorman, T. 2003. Sepsis Alert And Diagnostic System: Integrating Clinical<br />
Systems To Enhance Study Coordinator Efficiency. Computers, Informatics, Nursing: Cin, 21, 22.<br />
Yusof, M. M., Papazafeiropoulou, A., Paul, R. J. & Stergioulas, L. K. 2008. Investigating Evaluation Frameworks<br />
For Health <strong>Information</strong> Systems. International Journal Of Medical Informatics, 77, 377-385.<br />
Zheng, K., Padman, R., Johnson, M. P. & Diamond, H. S. 2005. Underst<strong>and</strong>ing Technology Adoption In Clinical<br />
Care: Clinician Adoption Behavior Of A Point-Of-Care Reminder System. International Journal Of Medical<br />
Informatics, 74, 535-543.<br />
64
The Uses of Business Outcomes for IT Benefit<br />
Identification at the Ex-Ante Justification Stage<br />
Dawit Asmelash<br />
University of Pretoria, South Africa<br />
dawit.asmelash@up.ac.za<br />
Abstract: The benefits of IT are becoming the main determining factors for selecting projects at the ex-ante<br />
justification stage. Despite the high adoption rates of formal IT investment appraisal methods, there is on-going<br />
evidence that shows that the benefits go unrecognized or are poorly identified. This paper highlights the<br />
importance of defining business <strong>and</strong> IT goals, <strong>and</strong> developing indicators that describe how these goals can be<br />
achieved. These indicators are expected to be used in formulating business outcomes that can in turn be utilized<br />
to appropriately identify IT benefits. The aims of this paper are threefold: 1.To explore the uses of business <strong>and</strong><br />
IT goals, <strong>and</strong> their possible outcome measures, paying particular attention to why it is justified to be adopted to<br />
benefit evaluation; 2. To provide a description of, <strong>and</strong> justification for, the benefit identification method that is<br />
developed; 3. To provide an assessment of the effectiveness of this method. Case study research is presented<br />
that illustrates this. The case study was conducted in a large academic institution to explore the benefit<br />
identification process <strong>and</strong> middle business managers that are involved <strong>and</strong> responsible for IT project justification<br />
were approached from various business units as case study participants. This paper shows how the relationship<br />
between business goals, IT goals <strong>and</strong> IT process goals may be utilized to formulate the business outcomes that<br />
may subsequently be used in the IT project benefits identification process. Hence, a method that has adopted<br />
this approach is proposed for identifying potential benefits at ex-ante justification stage. This method has been<br />
found to be helpful in maintaining the benefits agenda during the justification process <strong>and</strong> for enhancing the<br />
business mangers’ underst<strong>and</strong>ing of the benefit concepts. It has also resulted in numerous other possible<br />
benefits that are specific <strong>and</strong> true to the initiatives being identified. The paper provides plausible insights for IT<br />
project evaluation research in the quest for improving benefit evaluation.<br />
Keywords: IT benefits, business outcome, IT benefits identification, ex-ante justification<br />
1. Introduction<br />
Organizations frequently invest considerable amount of resources in IT projects that ultimately fail to<br />
deliver any appreciable benefits. IT project success is increasingly being defined as realizing the<br />
expected benefits rather than completing the projects on time within the allocated budget (Berman,<br />
2007; Thorp, 2004). The process of selecting IT initiatives that will contribute comparatively more<br />
benefit to the organization than those not selected, requires that both business <strong>and</strong> IT management to<br />
identify <strong>and</strong> define these benefits as accurate as possible.<br />
The established business principle suggests that during the initial evaluation of IT initiatives (ex-ante<br />
justification stage), IT initiatives that have high expected business benefits should be given high<br />
ranking <strong>and</strong> selected for development (ITGI, 2008a; Thorp, 2007; Farbey, et al., 1999). However<br />
many organizations struggle to identify <strong>and</strong> measure benefits effectively (ITGI, 2008a; Lin et al.,<br />
2005). For example, an empirical investigation preformed on 102 organizations in the UK <strong>and</strong> Benelux<br />
show that fewer than 35% of respondents claim to be successful in identifying available benefits for a<br />
project <strong>and</strong> only 31% believe they quantify the benefits adequately (Ward et al., 2007).<br />
The main reason that benefits are identified <strong>and</strong> measured seems to be to gain project approval<br />
(Ward et al., 2007; Lin et al., 2005). It is accepted by researchers <strong>and</strong> practitioners that IT benefits<br />
evaluation has become a key business management issue (Ward & Daniel, 2006; Thorp, 2004;<br />
Murphy, 2002). Business management is assumed to underst<strong>and</strong> the impact of IT projects in their<br />
business <strong>and</strong> are, therefore, usually given the responsibility for identifying <strong>and</strong> measuring the benefits<br />
at the ex-ante justification stage (ITGI, 2008b, Dhillon, 2000).<br />
Formal IT investment appraisal methodologies are commonly adopted by organizations (Ward et al.,<br />
2007; Lin et al., 2005). Nevertheless, organizations often fail to identify <strong>and</strong> define benefits<br />
appropriately or to measure their contributions to the organization (Peppard et al., 2007; Cronk <strong>and</strong><br />
Fitzgerald, 2002; Remenyi <strong>and</strong> Sherwood-Smith, 1999); <strong>and</strong> as a result incorrect benefits may be<br />
attributed to the projects or the measurements may represent arbitrary values (Lin et al., 2007).<br />
According to ITGI (2008a), these imprecise benefits statements may lead to an allocation of<br />
resources to projects that may not support the organization strategy.<br />
65
Dawit Asmelash<br />
The benefits of IT can be described <strong>using</strong> the logic <strong>and</strong> concepts of business goal, business change<br />
<strong>and</strong> business outcome (Ward & Elvin, 1999). However, in many organizations benefit identification<br />
<strong>and</strong> measurement is often ignored or carried out inefficiently or ineffectively because it is deemed to<br />
be an elusive <strong>and</strong> complex process (Serafeimidis & Smithison, 2003). According to Berghout <strong>and</strong><br />
Remenyi (2005) increased practical adoption <strong>and</strong> improvement of benefits evaluation methods is<br />
needed to resolve some of the issues raised by research into IT evaluation. This study addresses the<br />
challenges related to identifying benefits at ex-ante justification stage by adapting IT control<br />
framework concepts in order to formulate business outcomes for practical use in the organization.<br />
Benefit identification for evaluation is a good example of a substantial gap that exists between<br />
academic theory, commercial methodology <strong>and</strong> actual management practice. Consequently, a<br />
contribution is needed that presents insights into how benefits-oriented practices might best be<br />
utilized <strong>and</strong> incorporated into organizational contexts (Berghout & Remenyi, 2005). Moreover, work<br />
that presents insights into how potential benefits from IT initiatives are identified at the ex-ante<br />
justification stage will be valuable.<br />
Case study research was done <strong>using</strong> the relationship concept of business goal, IT goal <strong>and</strong> outcomes<br />
to develop new benefit identification method for ex-ante project evaluation, <strong>and</strong> to explore how it can<br />
be best applied in the business context. The paper is organized into three further parts. First, it<br />
reviews the existing research literature related to IT benefits. The research methodology adopted for<br />
the empirical part of the research is then outlined. Finally, the theoretical <strong>and</strong> practical implications of<br />
the proposed method are explored, paying particular attention to insights that might be useful to<br />
improve benefit evaluation in the future.<br />
2. Literature review<br />
This section reviews the concepts related to the business benefits of IT so as to clarify the nature <strong>and</strong><br />
characteristics of IT benefits with respect to the application of a benefit identification method. The<br />
literature study will assist in developing a practical IT benefits identification method by applying<br />
theoretical knowledge.<br />
IT benefit is defined as a business outcome whose nature <strong>and</strong> value expressed in various ways are<br />
considered advantageous to an organization (Thorp, 2007). Ward <strong>and</strong> Elvin (1999) associate<br />
business outcomes with a needed business change <strong>and</strong> consider benefit as the effect of the changes.<br />
A business outcome can result in benefit, if it is aligned <strong>and</strong> supports the organization’s goals (ITGI,<br />
2008a; Ward & Daniel, 2006).<br />
The implementation of IT projects <strong>and</strong> the subsequent process of change resulting in benefits<br />
comprise key concepts of IT benefit <strong>and</strong> they can be used to characterize <strong>and</strong> describe the nature of<br />
specific benefits. These key concepts are briefly described below:<br />
Business objectives: The goals, strategies or tactics that the IT project addresses (Fulton,<br />
2004).<br />
Implementation/Intervention: The technical <strong>and</strong> business design, deployment <strong>and</strong> operation<br />
(Fulton, 2004).<br />
Business Change: the difference between the current <strong>and</strong> desired state that IT is intended to<br />
enable (Ward <strong>and</strong> Elvin, 1999).<br />
Area of impact: The business process or individuals that IT targets in order to affect or enable<br />
change (Dhillon, 2004).<br />
Directness of impact: IT may have direct <strong>and</strong> first order effect or indirect <strong>and</strong> second order effect<br />
(Remenyi <strong>and</strong> Sherwood-Smith, 2001).<br />
Certainty of the impact: The impact of new system may be almost completely predictable or<br />
totally uncertain. This depends on clarification of the area of impact <strong>and</strong> the cause of change<br />
(Farbey et al., 1993).<br />
Indicators of the effect: The effects of change are assessed with process improvement<br />
indicators that relate to efficiency, effectiveness, performance <strong>and</strong> transformation (Berman, 2007;<br />
Thorp, 2007; Murphy, 2002; Andresen et al., 2000).<br />
66
Dawit Asmelash<br />
Measurability of the effects: Benefits arising from IT are often described as either tangible or<br />
intangible (Ward <strong>and</strong> Daniel, 2006).<br />
Business outcome: IT projects have outcomes but not all outcomes result in benefits. Thus,<br />
successfully achieving the business objectives should be distinguished as positive outcome<br />
(Peppard, et al., 2007). The concept of “positive outcome” is one of the main characteristics of IT<br />
benefits.<br />
A better underst<strong>and</strong>ing <strong>and</strong> application of these concepts allows properly recognizing <strong>and</strong> identifying<br />
the business benefits of an IT project. Major factors contributing to the difficulty of evaluating IT<br />
benefits are IT reach <strong>and</strong> unidentifiable improvements (Remenyi, 2000). Benefits reside in the<br />
changes IT has enabled in the organization. Therefore, to identify more benefits an IT initiative<br />
produce, it is important to recognize where the intended changes are taking place <strong>and</strong> their ripple<br />
effects in the organization.<br />
The business benefits of IT can be grouped on the impact IT has on each typical business units of the<br />
organization such as sales, human resources, finance, manufacturing <strong>and</strong> so forth (Andresen et al.,<br />
2000) <strong>and</strong> they can be classified based on the level of business process or affected individuals in the<br />
organization hierarchy <strong>and</strong> structure (Farbey et al., 1993). This enables to easily recognize <strong>and</strong><br />
structure the benefits (Ward <strong>and</strong> Daniel, 2006; Irani <strong>and</strong> Love, 2001). Moreover, Lindfors’ (in Dehlin<br />
<strong>and</strong> Olofsson, 2008) modification of the DeLone <strong>and</strong> McLean’s model of information system success<br />
categories (2002) with adjacent benefit variables, allows a deeper level of underst<strong>and</strong>ing to be<br />
brought to the identification of specific benefits (Dehlin <strong>and</strong> Olofsson, 2008).<br />
Assessing how IT meets business objectives is seen crucial for benefits identification. Thus, an<br />
approach that renders better formulation <strong>and</strong> use of positive outcome is the area in which this<br />
research attempts to explore.<br />
3. The empirical research<br />
The aim of this section is to briefly describe the research context, the study’s objectives, <strong>and</strong> the<br />
research methodology utilized.<br />
3.1 The context<br />
The organization is an academic institution – one of the leading universities in Africa, with more than<br />
40 000 IT users that include staff, customers <strong>and</strong> students. The university’s IT service department (IT<br />
management) has proposed an “IT projects prioritization method” that is intended to be effective when<br />
ranking <strong>and</strong> selecting IT initiatives for development. The IT project prioritization method currently used<br />
is adopted from Gartner’s project portfolio management processes (Apfel, 2007), <strong>and</strong> Tony Murphy’s<br />
(2002) practical guide for achieving business value, <strong>and</strong> is intended to provide an adequate basis for<br />
IT investment decisions.<br />
The benefits of IT are used to evaluate potential discretionary IT initiatives. The IT service department<br />
has designed six assessment criteria perspectives to evaluate IT project benefits <strong>and</strong> to improve<br />
judgment when selecting IT requests for development (Murphy, 2002).<br />
The business management members in each business unit of the organization are expected to<br />
complete the strategic alignment, business process impact, project direct payback, <strong>and</strong> institutional<br />
risk portion of the assessment criteria. The business management, as IT requesters <strong>and</strong> evaluators<br />
are expected to identify <strong>and</strong> define their own functional process that they expect will be improved by<br />
the IT initiative. After identifying the business process they are expected to describe the associated<br />
business process improvement <strong>and</strong> expected change.<br />
However, the actual justifications from business management show that many benefits go<br />
unrecognized or are poorly identified at the time of making a decision on the initiatives. Consequently,<br />
there is a clear requirement for a new practical approach or set of guidelines, <strong>and</strong> this has become<br />
the focus for the research described in the paper. More specifically, the following two research<br />
objectives have been established:<br />
To explore on the formation of business outcomes that can best be applied at the ex-ante<br />
justification stage in the organization.<br />
To provide an assessment of the effectiveness of a business outcome based method.<br />
67
Dawit Asmelash<br />
In addressing these objectives, it was envisaged that this paper could make an important contribution<br />
to the literature by providing an insight into benefits identification practices at the ex-ante stage.<br />
3.2 Methodology<br />
As already explained, the aim of this research is to propose a positive business outcome oriented<br />
operational method that is expected to result in better identification of IT benefits at the justification<br />
stage. Therefore, exploratory <strong>and</strong> qualitative research was conducted in order to develop <strong>and</strong> refine<br />
operational methods (Oats, 2006). Qualitative research is appropriate for research undertaken in a<br />
social setting, <strong>and</strong> designed to underst<strong>and</strong> people’s motivation <strong>and</strong> actions, <strong>and</strong> the broader business<br />
contexts (Oats, 2006).<br />
A single case study approach has been adopted (Yin, 2003) as this research seeks to underst<strong>and</strong> in<br />
depth the organization’s business specific benefits <strong>and</strong> the process of identifying them <strong>and</strong> to obtain<br />
rich <strong>and</strong> detailed insights into the reality of the organization in its context. The chosen case is typical<br />
of many others in that the identification of IT benefit is only performed in order to justify IT initiatives<br />
for approval <strong>and</strong> the problem of ineffective benefit identification is commonplace as is the case in<br />
many other organizations. Therefore the organization st<strong>and</strong>s as a representative case.<br />
Case study research requires multiple sources of empirical evidence (Yin, 2003). When conducting<br />
this case study, the following data collection techniques were employed:<br />
Interviews: Formal interviews <strong>and</strong> informal discussion were conducted with middle managers from 11<br />
business units that were involved <strong>and</strong> responsible in the justification process. The main objectives of<br />
the formal interviews were twofold: 1 to underst<strong>and</strong> <strong>and</strong> identify areas where the current process<br />
needs improvement paying attention to a business outcome oriented approach; 2 to gain feedback on<br />
the applicability of the proposed improvements that has adopted this approach. Several informal<br />
discussions were also conducted with IT service department senior managers to obtain a deeper<br />
underst<strong>and</strong>ing of the organizational context <strong>and</strong> the IT initiative justification process.<br />
Documents reviews: The organization at which this study was carried out, produced documents that<br />
were useful sources of data. The documents contain the formal records of business units’<br />
justifications for every IT initiatives. The IT request form as a document object has been modified for<br />
business outcome oriented approach in order to be used as an instrument for justification. This<br />
instrument was analysed to determine its effectiveness <strong>and</strong> to identify areas where it needs attention<br />
for improvement.<br />
The research used a well-defined protocol; the case study method complies with the basic tenets of a<br />
systematic method (Myers, 2009; Yin, 2003).<br />
4. Research findings<br />
The presentation of the research findings is structured around the two specific research objectives, as<br />
previously highlighted.<br />
4.1 Business outcome derivation<br />
The identification of IT benefits is very challenging at the ex-ante justification stage. The Val IT<br />
framework (ITGI, 2008) stated that, in order to establish a specific IT requirement that supports<br />
business, business management must first define the business goal. The relationship between the<br />
business goal <strong>and</strong> outcome is an important basis to identify <strong>and</strong> define potential benefits at the exante<br />
evaluation stage. This relationship concept is adopted from COBIT Framework 4.1 (ITGI, 2007)<br />
which is probably the best established control framework for IT governance, <strong>and</strong> it is particularly<br />
useful in this study for formulating the business outcomes.<br />
This study first modified <strong>and</strong> applied the business goal, IT goal <strong>and</strong> outcome indicators relationship<br />
concept for benefit evaluation research. The relationship between business goal, IT goal, outcome,<br />
<strong>and</strong> performance indicators is laid down in Figure 1.<br />
The business goal has on or more outcomes that will indicates whether the goal has been met (ITGI,<br />
2007). The outcomes are the effects of changes <strong>and</strong> relate to the expected improvements on the<br />
68
Dawit Asmelash<br />
affected business process. Since the potential benefit emerges as a consequence of achieving the<br />
business goal, the relationship between business goal <strong>and</strong> expected outcomes can be used as a<br />
basis to recognize possible benefits.<br />
Potential<br />
benefit<br />
results<br />
derive<br />
Outcome<br />
Indicator<br />
Business<br />
Goal<br />
drives<br />
enables<br />
IT Solution<br />
Goal<br />
requires<br />
enables<br />
IT process<br />
Goal<br />
in<br />
di<br />
ca<br />
derive<br />
Outcome<br />
Indicator<br />
in<br />
di<br />
ca<br />
derive<br />
Outcome<br />
Indicator<br />
becomes<br />
becomes<br />
Performance Metric Performance Metric<br />
Figure 1: Modified business goal <strong>and</strong> outcome indicators relationship for benefit evaluation (adapted<br />
from ITGI, 2007)<br />
The “business goal” may require <strong>and</strong> initiate an IT solution (Ward <strong>and</strong> Elvin, 1999). The IT solution will<br />
enable changes to occur in the business processes. The IT solution establishes its own goal that aims<br />
to ensure the “business goal” will be achieved. The “IT solution goal” focuses on the impacts of the<br />
business. Therefore, the “IT solution goal” is driven <strong>and</strong> is subject to the “business goal”. The<br />
relationship between the “business goal” <strong>and</strong> proposed IT solution (intervention) should be clearly<br />
understood to define <strong>and</strong> validate the IT solution goal.<br />
The IT solution has processes that operate <strong>and</strong> make it a system. Each IT process also establishes<br />
its own goal. The “IT process goal” is to become effective <strong>and</strong> efficient to enable the “IT solution goal”<br />
is achieved. Therefore, the “IT solution goal” requires the “IT process goal” to succeed.<br />
The outcomes as discussed (in Section 2) are the effects of change. An indicator can be placed to the<br />
outcomes to describe whether the goals have been met (ITGI, 2007). Each goal has its own outcome<br />
indicator <strong>and</strong> performance metrics. Performance metrics indicate whether the business goals or IT<br />
solution goals are likely to be met (ITGI, 2007). Both outcome indicator <strong>and</strong> performance indicators<br />
have the same content <strong>and</strong> metric.<br />
The performance metric of the “IT solution goal” reveals how well the IT solution is performing in<br />
enabling the business goals to be achieved. In turn, the “outcome indicator” of the “business goal”<br />
indicates whether the goal is met <strong>and</strong> may indicate the potential benefit to be gained. There may be<br />
many discrete outcomes for a single business objective. The process of repetitively identifying <strong>and</strong><br />
defining new positive outcome of a particular initiative results in additional benefits that may raise the<br />
value of a particular initiative.<br />
The actual outcome <strong>and</strong> performance indicators (quantified) can be best made during ex-post benefit<br />
evaluation. However, the process of defining the business goal <strong>and</strong> qualitatively describing the<br />
outcome is necessary to identify the potential benefits that may be gained at the ex-ante stage of<br />
evaluation. The subsequent section discusses a new method that adopted this approach.<br />
4.1.1 IT benefits identification method at ex-ante justification stage<br />
A method is defined as “a well-defined sequence of elementary operations which permits the<br />
achievement of certain outcomes if executed correctly” (Iivari, Hirschheim <strong>and</strong> Klein, 1998: 165). The<br />
IT benefit identification method is a product of the concepts collected from a literature review <strong>and</strong> the<br />
empirical findings of this research. The proposed method consists of a sequence of activities that<br />
69
Dawit Asmelash<br />
aims at achieving effective identification of IT benefits for evaluation in the organization. The findings<br />
are presented in the following steps:<br />
Step 1: Define a business objective that aligns with organization strategy (Business goal)<br />
The business unit first defines the business objective. The IT solution is needed to support the<br />
existing business plan or a new business plan should be introduced that will to take advantage of IT<br />
opportunities. The business unit plan is needed to derive intended outcomes.<br />
Step 2: Identify business problems or opportunities in a specific business unit<br />
This step focuses on the business management responsibility to clearly underst<strong>and</strong> <strong>and</strong> identify the<br />
problems (or opportunities) that necessitated the IT solution. Problem identification is essential as part<br />
of the process of identifying benefits (Changchit, 1998). This step allows the business management to<br />
indicate what changes are desired in the specific type of business (Andresen et al., 2000).<br />
Step 3: Identify area of impact <strong>and</strong> type of benefits<br />
Farbey et al.’s organizational hierarchy structure (1993) must be applied to identify the type of work<br />
<strong>and</strong> people that the IT initiatives are enabling or supporting. This step provides, with detail, the area of<br />
impact <strong>and</strong> where the change should take place. It will also indicate the nature of benefits that are to<br />
be expected (Irani <strong>and</strong> Love, 2001).<br />
Step 4: Define the area of impact<br />
The business plan <strong>and</strong> the problems identified point to the business process that needs to be<br />
targeted. The business process is the actual work activity or work flow that is carried out to achieve<br />
the business objective <strong>and</strong> plan. The process of change is expected to be carried out on this business<br />
process.<br />
Step 5: Identify the <strong>Information</strong> <strong>and</strong> Technology contribution (IT process outcomes)<br />
Once the area of impact has been identified the following step is to underst<strong>and</strong> how “information<br />
technology” enables the change in the business process. DeLone <strong>and</strong> McLean’s (2003) <strong>and</strong> Lindfors’<br />
(2003) dimensions of “<strong>Information</strong>”, ”System”, ”Process”, <strong>and</strong> “Support” were linked to specific area of<br />
impact to easily recognize possible benefit variables.<br />
Step 6: Define the expected business process change (IT solution goal)<br />
The desirable change that is expected in the business process or individual will be expressed in this<br />
step. The IT goal is to enable this change.<br />
Step 7: Describe the improvement (IT solution outcome)<br />
This step focuses on the business implication. The improvements in the business process will indicate<br />
the likelihood of achieving the business objectives. The “IT solution” outcomes are qualitatively<br />
described <strong>and</strong> are a list of diverse qualitative measures of the expected improvements. It may take<br />
the form of phrases that contain indicators such as “increase” or “more” related to specific<br />
performance or output. The “IT solution” outcomes can also show the likelihood of the business<br />
objective being met.<br />
Step 8: Ensure it is a positive outcome (Business outcome)<br />
The potential benefit that will emerge should be from the positive outcome of the business objective.<br />
The business outcome is expected to be related <strong>and</strong> be easily associated with the business objective.<br />
Consequently, an accurate (related) <strong>and</strong> specific benefit should arise. Again, it was found out it is<br />
appropriate to use descriptive statement. This descriptive qualitative statement by itself defines a<br />
specific benefit. An array of distinct benefits can be defined in this manner <strong>and</strong> listed.<br />
Step 9: Ensure the positive outcome relate to the business process<br />
The positive outcome that has been defined by following steps from 1 to 8 must be associated with<br />
the affected business process so as to ensure validity <strong>and</strong> accuracy of the benefit. The benefits that<br />
arise should be from the changes enabled by the IT project. If the IT initiatives is seen to have<br />
identifiable ripple effects (or in another business process), there will be another cycle starting back<br />
from step 3. If the positive outcomes are not clearly linked with the business process, it may lead to<br />
define inaccurate benefit.<br />
70
Business<br />
Units<br />
HR<br />
Sales<br />
Step 2<br />
Identify<br />
problems<br />
Step 9<br />
Ensure positive outcome link<br />
Organization<br />
Structure<br />
Strategic<br />
<strong>Management</strong><br />
Operational<br />
Functional<br />
Support<br />
Step 3<br />
Identify area of<br />
impact & type of<br />
benefits<br />
Dawit Asmelash<br />
Step 1<br />
Define objectives<br />
Expected Positive Outcome<br />
Business<br />
Process<br />
Step 4<br />
Define area of<br />
impact<br />
<strong>Information</strong><br />
&<br />
Technology<br />
<strong>Information</strong><br />
System<br />
Service<br />
Process<br />
Organization Strategy<br />
Step 5<br />
Identify IT<br />
contributions<br />
Business objectives<br />
Step 8<br />
Ensure it is a<br />
positive outcome<br />
Business<br />
change<br />
Step 6<br />
Define business<br />
Change<br />
Business<br />
process<br />
Improveme<br />
nts<br />
Step 7<br />
Describe<br />
improvement<br />
Figure 2: Proposed IT benefits identification method (author, 2011)<br />
An example extracted from the empirical data is presented in Table 1 to show the outputs derived<br />
from this method.<br />
Table 1: An initiative justification<br />
Steps Output<br />
-To improve research quality <strong>and</strong> productivity in the department<br />
1 & 2 -Not a conducive research environment; there is no advanced computational system<br />
<strong>and</strong> this affects research output.<br />
-Academic staff, researchers <strong>and</strong> students, Operational focus on efficiency <strong>and</strong><br />
3<br />
performance, more tangible<br />
4 -Econometric researching<br />
To perform z calculation with upmost accuracy. Expectations:<br />
-Increase in number of z st<strong>and</strong>ard output found complete<br />
5<br />
-Increase in number of z proved reliable<br />
-Less time to make z<br />
-More mathematical concepts incorporated<br />
6 In the researching environment, there will be capacity to compute advanced equations<br />
-Increases the chances for innovative mathematical theories to be applied<br />
-More advanced models will be tested <strong>and</strong> generated.<br />
7<br />
-Postgraduates skill will be enhanced.<br />
71
Dawit Asmelash<br />
Steps Output<br />
8<br />
9<br />
Benefits<br />
-Increase number of requests for research-based consultation<br />
-More research projects will proceed<br />
-More papers will be accepted in international accredited journals<br />
All positive outcomes relate to the IT impact on “Research” process.<br />
Monetary or equivalent substitutions gained from the positive outcomes listed in step<br />
8.<br />
4.2 Assessment IT benefits identification method<br />
From a research perspective, the emphasis <strong>and</strong> use of the business outcomes indicators <strong>and</strong> the<br />
adoption of this approach is high among the research participants. This shows signs of success in<br />
identifying <strong>and</strong> describing specific <strong>and</strong> accurate potential benefits. However, this is not a definitive<br />
assessment <strong>and</strong> this method should be exercised <strong>and</strong> tested by the general population that will be<br />
involved in the justification process in the organization. The research will seek to validate the method<br />
in the coming justification season. It has been possible to develop the following provisional list of<br />
findings with respect to this benefit identification approach:<br />
This method requires evaluators (business management) to have an adequate underst<strong>and</strong>ing of<br />
the concepts of IT benefits, but this can be achieved through introducing a learning session.<br />
This method keeps benefits firmly on the agenda, whereas most IT requests in the past used to<br />
focus on expressing the severity of their problem as a justification for discretionary IT<br />
investments.<br />
This method makes it easy for the evaluators to underst<strong>and</strong> the nature of their expectations<br />
(benefits) <strong>and</strong> to identify other possibilities that can be harnessed from IT.<br />
In the successive engagement, almost all participants managed to identify numerous possible<br />
benefits (positive outcome descriptions) that are specific <strong>and</strong> accurate (true) to the initiatives.<br />
4.2.1 Proposed model for benefit identification at ex-ante justification stage<br />
The identification method steps from 1 to 9 in section 4.1.1 covers the relationship between the<br />
business goal <strong>and</strong> outcome descriptions. If this method is applied properly, it can be expected to<br />
provide better benefit identification for evaluation at the ex-ante justification process. Taking into<br />
account the effectiveness of the method among the research participants, this research proposes the<br />
following model for the organization.<br />
The relationship between business goal, IT goal <strong>and</strong> outcome discussed in section 4.1 has been<br />
modified with the support of the empirical findings. At this stage, the “IT solution goal” specifies the<br />
means of achieving the business goal. In turn, the IT solution goal “outcome description” lists<br />
expected IT achievements that indicates how the IT goal is going to be achieved. The IT solution<br />
“outcome description” also indicates whether the business goal is likely to be achieved.<br />
Potential<br />
benefit<br />
Results<br />
Business<br />
Goal<br />
derive<br />
Outcome<br />
Description<br />
drives<br />
enables<br />
IT Solution<br />
Goal<br />
derive<br />
Outcome<br />
Descriptio<br />
Figure 3: Model of benefit identification at ex-ante stage (source: Author, 2011)<br />
72
Dawit Asmelash<br />
In this case, at this stage most evaluators are from business management <strong>and</strong> may not have deep<br />
knowledge <strong>and</strong> are not IT experts. Therefore, the IT process goals <strong>and</strong> outcomes that describe in<br />
detail the technical quality of the system are removed. Moreover, since the IT initiatives are not<br />
operational at this stage, it is difficult to predict the actual output <strong>and</strong> trend of the activities. Therefore<br />
the performance indicators are also removed. The empirical findings also show signs that it is<br />
sufficient to use “Business outcome” <strong>and</strong> “IT solution outcome”.<br />
At the justification stage of the initiatives, <strong>and</strong> most importantly in the case of ex-ante evaluation,<br />
defining the business goal, IT goal <strong>and</strong> deriving the outcomes is crucial in order to appropriately<br />
define the benefits. Once the positive outcomes are described, the quantification or estimation may<br />
proceed.<br />
5. Concluding remarks<br />
We cannot evaluate benefits that we do not define. This research pursued an approach that puts<br />
much emphasis on business goal, IT goal <strong>and</strong> outcome relationships to improve the benefit<br />
identification process at the ex-ante stage. The research proposed a practical IT benefits identification<br />
method based on this approach to be applied as part of the justification process in the organization.<br />
Thus far, it has been found that the logical reasoning <strong>and</strong> the identification method are helpful as way<br />
to maintain focus on benefits in the justification process <strong>and</strong> to enhance the evaluators’ underst<strong>and</strong>ing<br />
of the benefit concepts. This in turn, has resulted in numerous possible benefits being identified that<br />
are specific <strong>and</strong> true to the initiatives. The author believes that the research made an academic<br />
contribution, as it adapted <strong>and</strong> applied control measure concepts in the benefit evaluation process at<br />
the ex-ante stage. Moreover, the research findings may be of interest to other IT practitioners who are<br />
also looking to better their benefit identification during their ex-ante justification process.<br />
References<br />
Andresen, J., Baldwin, A., Betts, M., Carter, C., Hamilton, A., Stokes, E., & Thrope, T. (2000)” A framework for<br />
measuring IT innovation benefits”, ITCon, Vol 5, pp 57-73.<br />
Apfel, P. (2007) Project portfolio management made simple, Gartner Symposium/ITxpo, Gartner Inc.<br />
Berghout, E. <strong>and</strong> Remenyi, D. (2005) “The eleven years of the European Conference on IT Evaluation:<br />
retrospectives <strong>and</strong> perspectives for possible future research”, The Electronic Journal of <strong>Information</strong><br />
Systems Evaluation, Vol 8, No. 2, pp 81-98.<br />
Changchit, C., Joshi, K.D. <strong>and</strong> Lederer, A.L. (1998) “Process <strong>and</strong> reality in information systems benefit analysis”,<br />
<strong>Information</strong> Systems Journal, Vol 8, pp 145-162.<br />
Cronk, F. <strong>and</strong> Fitzgerald, E.P. (2002) “Constructing a theory of IS business value from the literature”, Electronic<br />
Journal of Business Research methods, Vol 1, No.1, pp 11-17.<br />
Dehlin, S. <strong>and</strong> Olofsson, T. (2008) ”An evaluation model for ICT investment in construction projects”, ITCon, Vol<br />
13, pp 343-362.<br />
DeLone, W.H. <strong>and</strong> McLean, E.R. (2002) “<strong>Information</strong> system success revisited”, Proceedings of the 35 th Hawaii<br />
International Conference on System Science. [Online],<br />
http://www.hicss.hawaii.edu/HICSS_35/HICSSpapers/PDFdocuments/OSCVM01.pdf<br />
Dhillon, G. (2000) “Interpreting key issues in IS/IT benefits management”, Proceedings of the 33 rd Hawaii<br />
International Conference on System Sciences. [Online],<br />
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=926926.<br />
Farbey, B., L<strong>and</strong>, F. <strong>and</strong> Targett, D. (1993) How to Assess Your IT Investment. A Study of Methods <strong>and</strong> Practice,<br />
Butterworth Heinemann Ltd, Oxford.<br />
Fulton, R. (2004). Defining the Business Value of IT. Gartner, Inc.<br />
Iivari, J., Hirschheim, R & Klein, H.K. (1998) “A paradigmatic analysis contrasting information systems<br />
development approaches <strong>and</strong> methodologies”, <strong>Information</strong> Systems Research, Vol 9, No 2, pp 164-194.<br />
Irani, Z. & Love, P.E.D. (2001) ”Developing a frame of reference for ex-ante IT/IS investment evaluation”,<br />
European Journal of <strong>Information</strong> Systems, Vol 11, No. 1, pp 74-82.<br />
ITGI. (2007). Control Objectives for <strong>Information</strong> <strong>and</strong> related Technology (COBIT 4.1), IT Governance Institute,<br />
Illinois.<br />
ITGI. (2008a) The ValIT Framework 2.0. Enterprise value: Governance of IT Investments, IT Governance<br />
Institute, Illinois.<br />
ITGI. (2008b) Getting started with value management. Enterprise value: Governance of IT Investments, IT<br />
Governance Institute, Illinois.<br />
Lin, C., Huang, Y. <strong>and</strong> Cheng, M. (2007) “The adoption of IS/IT investment evaluation <strong>and</strong> benefits realization<br />
methodologies in service organizations: IT maturity paths <strong>and</strong> framework”. Contemporary <strong>Management</strong><br />
Research, Vol 3, No.2, pp 173-194.<br />
Lin, C., Pervan, G. <strong>and</strong> McDermid, D. (2005) ”IS/IT investment evaluation <strong>and</strong> benefits realization issues in<br />
Australia”, Journal of Research <strong>and</strong> Practice in <strong>Information</strong> Technology, Vol 37, No. 3, pp 235-251.<br />
Murphy, T. (2002) Achieving Business Value from Technology. A Practical Guide for Today’s Executive,<br />
Gartnerpress: John Wiley & Sons.<br />
73
Dawit Asmelash<br />
Oats, B.J. (2006) Researching <strong>Information</strong> Systems <strong>and</strong> Computing. London: SAGE publication.<br />
Peppard, J., Ward, J. <strong>and</strong> Daniel, E. (2007) “Managing the Realization of Business Benefits from IT Investments”,<br />
MIS Quarterly Executive, Vol 6, No. 1, pp 1-11.<br />
Remenyi, D. (2000) “The elusive nature of delivering benefits from IT investment”, Electronic Journal of<br />
<strong>Information</strong> Systems Evaluation, Vol 3, No 1, pp 16-38.<br />
Remenyi, D. <strong>and</strong> Sherwood-Smith, M. (1999) “Maximise information systems value by continuous participative<br />
evaluation”, Logistics <strong>Information</strong> <strong>Management</strong>, Vol 12, No. ½, pp 14-31.<br />
Remenyi, D. <strong>and</strong> Sherwood-Smith, M. (2001) “Outcomes <strong>and</strong> benefit modelling for information systems<br />
investment”, The International Journal of Flexible Manufacturing Systems, Vol 13, pp 105-129.<br />
Serafeimidis, V., <strong>and</strong> Smithson, S. (2003) “<strong>Information</strong> systems evaluation as an organizational institution –<br />
experience from a case study”, <strong>Information</strong> Systems Journal, Vol 13, pp 251- 274.<br />
Thorp, J. (2007) The <strong>Information</strong> Paradox: Realizing the Business Benefits of <strong>Information</strong> Technology, Revised<br />
edition, Fujitsu Consulting, Toronto.<br />
Ward, J. <strong>and</strong> Daniel, E. (2006) Benefits <strong>Management</strong>: Delivering Value from IS/IT Investments, John Wiley &<br />
Sons, Chichester.<br />
Ward, J. <strong>and</strong> Elvin, R. (1999) “A new framework for managing IT-enabled business change”, <strong>Information</strong> Systems<br />
Journal, Vol 9, pp 197-221.<br />
Ward, J., Hertogh, S. <strong>and</strong> Viaene, (2007) “Managing benefits from IS/IT investments: an empirical investigating<br />
into current practice”. Proceedings of the 40th Hawaii International Conference on System Sciences.<br />
[Online], http://www.computer.org/portal/web/csdl/doi/10.1109/HICSS.2007.330<br />
Yin, R. (2003) Case Study Research, Design <strong>and</strong> Methods, 3 rd Edition, SAGE Publications, London.<br />
74
Data Governance in Practice: The SME Qu<strong>and</strong>ary<br />
Reflections on the Reality of Data Governance in the Small<br />
to Medium Enterprise (SME) Sector<br />
Carolyn Begg <strong>and</strong> Tom Caira<br />
University of the West of Scotl<strong>and</strong>, UK<br />
carolyn.begg@uws.ac.uk<br />
tom.caira@uws.ac.uk<br />
Abstract: This paper explores how small to medium enterprises (SMEs) perceive data governance <strong>and</strong><br />
investigates whether current data governance frameworks are applicable to SMEs. Enterprises of all sizes <strong>and</strong><br />
complexity have had to learn how to operate in an increasingly digital business environment. Data governance<br />
encourages enterprises to recognise the value of their data <strong>and</strong> to treat data with the same level of management<br />
<strong>and</strong> control as given to all other business assets. This paper reviews examples of published data governance<br />
frameworks to establish whether these frameworks are applicable to SMEs. Our research revealed that although<br />
many frameworks claimed to be adaptable <strong>and</strong> scalable, there was little published evidence by industry or<br />
academics on the application of data governance to SMEs. Furthermore, our review revealed that the optimal use<br />
of data governance frameworks requires that those with the authority <strong>and</strong> responsibility over enterprise data must<br />
have knowledge <strong>and</strong> some underst<strong>and</strong>ing of the terminology that describes data, data-related issues, <strong>and</strong> databased<br />
technology <strong>and</strong> this requirement may not be met for many SMEs. Following the review of data governance<br />
frameworks, the Khatri & Brown, (2010) framework was selected for use to support our action research in two<br />
SMEs. The initial reflections on the reality of data governance for those SMEs revealed that they do not<br />
recognise the inherent value of their data nor view their data as having an independent existence from the<br />
systems that support their business processes. The paper concludes, amongst other things, that further research<br />
is required to identify a data governance framework that meets the needs for SMEs to take control over their data<br />
resource <strong>and</strong> gain the significant benefits <strong>and</strong> competitive advantage that up until now has been only available to<br />
large enterprises.<br />
Keywords: data governance, SMEs, data management, data quality, framework<br />
1. Introduction<br />
There is a wealth of evidence that large enterprises are waking up to the inherent value of their data<br />
<strong>and</strong> this realisation brings the need to control <strong>and</strong> manage data as with all other enterprise assets. An<br />
increasingly popular approach is through data governance, which assigns authority, responsibility <strong>and</strong><br />
tasks for all aspects of data management throughout the enterprise. However, as an industry, data<br />
governance solutions are largely directed at solving the needs of large enterprises with little evidence<br />
of an equivalent interest in small to medium enterprises (SMEs). There appears a common<br />
assumption by industry that data governance solutions for large enterprises can be scaled down <strong>and</strong><br />
simply applied to SMEs. This paper seeks to explore the validity of this assumption.<br />
The great interest in data governance by industry is not matched by the academic community. The<br />
academics currently working in this area do appear to agree that there is no single approach to the<br />
implementation of data governance in all enterprises. However, although their research uses a wide<br />
range of organisations to test their theory, all were large enterprises (Weber et al. 2009), (Khatri &<br />
Brown 2010). This paper takes published data governance approaches <strong>and</strong> explores the particular<br />
requirements of introducing data governance to SMEs.<br />
The authors believe that the lack of attention given to SMEs by the data governance community is<br />
unwise given the significant contribution that this sector makes to economies worldwide. Furthermore,<br />
the commonly used criteria that determine the size of an enterprise do not reveal the nature or volume<br />
of data used by the enterprise. The authors believe that the characterisation of enterprises used to<br />
demonstrate the effectiveness of data governance should include some measure of the complexity of<br />
their data environment. In addition, current technological developments such as cloud computing are<br />
likely to encourage SMEs to store <strong>and</strong> process even greater amounts of data.<br />
SMEs will continue to face significant <strong>and</strong> unrelenting pressure to work in an increasing digital<br />
business environment <strong>and</strong> this will place significant dem<strong>and</strong>s to take control <strong>and</strong> effectively manage<br />
their data. Therefore, SMEs will need to adopt data governance practises to help them both survive<br />
<strong>and</strong> find success. However, our initial investigations of how SMEs perceive data <strong>and</strong> its governance<br />
reveal that SMEs do not recognise the inherent value of their data nor view their data as having an<br />
75
Carolyn Begg <strong>and</strong> Tom Caira<br />
independent existence from the systems that support their business processes. As a consequence,<br />
SMEs cannot easily envisage how data governance can be achieved without first achieving control<br />
over their IT systems.<br />
The format of this paper is to first examine in Section 2 the definition of a SME as described by the<br />
European Community (EC) <strong>and</strong> to comment on this categorisation. Section 3 examines definitions of<br />
data governance <strong>and</strong> presents examples of published approaches (frameworks) to data governance<br />
that proposes to be adaptable <strong>and</strong> scalable. Section 4 presents our research <strong>and</strong> initial findings<br />
concerning the application of a data governance framework by Khatri & Brown (2010) in two SMEs.<br />
Section 5 concludes this paper with a discussion on the realities of data governance for SMEs <strong>and</strong> on<br />
the key factors that are likely to stimulate interest in this emerging discipline within the SME sector.<br />
2. SME defined<br />
The term ‘SMEs’ refers to micro, small, or medium-sized enterprises that meet criteria defined by the<br />
European Commission Recommendation (2003/361/EC). An enterprise qualifies as an SME if the<br />
maximum number of staff is less than 250 with a turnover ≤ 50 million or a balance sheet total ≤ 43<br />
million euros. The EC recommendation also specifies criteria that identifies SME subcategories;<br />
namely micro, small or medium-sized enterprises.<br />
The significant contribution that SMEs make to the European Union’s economy is acknowledged <strong>and</strong><br />
well documented in both the Lisbon strategy (EC, 2000) <strong>and</strong> its successor Europe 2020 strategy (EC,<br />
2010a). An annual performance review for 2009 revealed that 99.8% of all European businesses are<br />
SMEs <strong>and</strong> are responsible for providing two out of three jobs in the private sector <strong>and</strong> contribute more<br />
than half of the total gross value added by businesses in the European Union. Furthermore, nine out<br />
of ten SMEs are actually micro enterprises with less than 10 employees. (EC, 2010b)<br />
The characteristics that determine an SME such as number of staff <strong>and</strong> the turnover or balance sheet<br />
does not have any strong correlation to the amount <strong>and</strong> nature of organisational data. In fact, it is<br />
entirely possible that many SMEs use far larger amounts of data to support their business than larger<br />
enterprises. This will become increasingly true as enterprises (including virtual enterprises) of all sizes<br />
move to exploit the capacity <strong>and</strong> services offered by cloud computing to capture, process <strong>and</strong> store<br />
growing amounts of data without necessitating an equivalent increase in accommodation, computing<br />
resources <strong>and</strong> staff to manage these resources.<br />
For the purpose of this paper, we do not distinguish between micro, small <strong>and</strong> medium-sized<br />
enterprises but use ‘SMEs' as a collective term to represent all enterprises that do not exceed the<br />
criteria identified for medium-sized enterprise.<br />
3. Data governance<br />
3.1 Data governance defined<br />
Data governance formed from a convergence of several well-established areas concerned with data<br />
such as data quality management, data management systems, data security, <strong>and</strong> data administration.<br />
The major driver for this convergence was a need to co-ordinate the control <strong>and</strong> management of all<br />
aspects of data throughout an enterprise.<br />
Since the initial emergence of data governance as a critical <strong>and</strong> fundamental enterprise-wide<br />
discipline, the data governance community has published several definitions of the discipline. While<br />
earlier definitions focused on procedures, policies, processes, technologies <strong>and</strong> responsibilities for the<br />
control <strong>and</strong> management of enterprise data, more recent definitions place more emphasis on<br />
identifying roles <strong>and</strong>/or business structures that have authority over data-related matters.<br />
While most definitions present the ‘what’ aspects of data governance, others can also include the<br />
‘who’, ‘how’ <strong>and</strong> sometimes ‘why’ aspects. The range of definitions is partly due to the fact that data<br />
governance is currently an industry-led discipline, which can mean that vendors tend to use<br />
definitions that focus on the ‘what’ <strong>and</strong> ‘why’ aspects that best match the product or services being<br />
promoted. Organisations such as the Data Governance Institute (DGI) <strong>and</strong> Data Warehouse Institute<br />
(TDWI) that aim to inform <strong>and</strong> share good practice, present definitions that place emphasis on ‘how’<br />
data governance is to be achieved.<br />
76
Carolyn Begg <strong>and</strong> Tom Caira<br />
Our research suggests that the definition of data governance is still evolving <strong>and</strong> that the data<br />
governance community does not appear to be converging on a single agreed definition. For the<br />
purposes of this paper, we will not contribute to this evolutionary process but use a data governance<br />
definition by (Weber et al. 2009), which is based on an adaptation of an IT governance definition by<br />
(Weill 2004). This definition states in simple terms what data governance aims to achieve.<br />
“Data governance specifies the framework for decision rights <strong>and</strong> accountabilities to<br />
encourage desirable behavior in the use of data. To promote desirable behavior, data<br />
governance develops <strong>and</strong> implements corporate-wide data policies, guidelines, <strong>and</strong><br />
st<strong>and</strong>ards that are consistent with the organization’s mission, strategy, values, norms,<br />
<strong>and</strong> culture.”, (Weber et al. 2009), (Weill & Ross 2004).<br />
Examples of published frameworks that propose to facilitate the establishment of data governance<br />
within an enterprise are presented in the following section.<br />
3.2 Data governance frameworks<br />
Some authors of data governance believe that enterprises are too diverse, for example in terms of<br />
organisational structure, culture, politics <strong>and</strong> policies to use a common framework or approach,<br />
(Weber et al. 2009), while others believe that published frameworks offer a good platform on which to<br />
establish data governance for any enterprise. Taking these perceptions together there are several<br />
options available for enterprises to consider when planning a data governance programme (Dyché<br />
2007). These options include creating your own unique framework, adopting an industry st<strong>and</strong>ard<br />
framework such as the ISO 9000 series, or <strong>using</strong> an adaptable <strong>and</strong> scalable framework such as the<br />
Data Governance Institute Framework (2011).<br />
As this paper is foc<strong>using</strong> on the needs of SMEs with their limited resources <strong>and</strong> based on the fact that<br />
SMEs taken as a group form a highly diverse sector of industry, the most obvious option to explore is<br />
those frameworks that propose to be adaptable <strong>and</strong> scalable. In this section, we review some of the<br />
most prominent contenders of published data governance frameworks <strong>and</strong> also examples of<br />
frameworks published by the academic community. The purpose of this review is to present examples<br />
of the types of published support available for an SME seeking advice <strong>and</strong> expertise on data<br />
governance.<br />
IBM <strong>and</strong> other enterprises formed the IBM Data Governance Council with the aim of establishing best<br />
practices for data governance. This collaboration resulted in the creation of a framework referred to as<br />
the Data Governance Maturity Model (IBM 2007), which proposes to assess <strong>and</strong> measure the data<br />
governance maturity of an enterprise. This model is available as a free on-line self-assessment tool<br />
(at www.infogovcommunity.com) <strong>and</strong> is organised as a series of questions <strong>and</strong> responses on a range<br />
of data-related areas. The tool also provides simple reporting of the responses gathered so far.<br />
The Data Governance Institute (DGI) (at www.datagovernance.com) describes itself as being “a<br />
mission-based, vendor-neutral authority on essential practices for data strategy <strong>and</strong> governance.” A<br />
major aim of the DGI is to provide a single framework that is capable of dealing with data governance<br />
programmes that focus on one or more data-related areas. The framework proposes to work by<br />
establishing that no matter what the focus area(s) are then any data governance programme shares<br />
the same ‘universal objectives’ from enabling better decision making to ensuring transparency of<br />
process. A partner company of the DGI provides an online workspace tool called Stakeholder Care (at<br />
www.datagovernance.com/software) to support an enterprise following the DGI framework. This tool<br />
is available through monthly subscriptions.<br />
There are many vendors offering data governance solutions to enterprises able to pay for their<br />
services. For example, Kalido (at www.kalido.com) offers consultancy services <strong>and</strong> data management<br />
software referred to as the Kalido <strong>Information</strong> Engine. Kalido encourages clients to first undertake a<br />
self-assessment of their data governance maturity <strong>using</strong> an online tool, which uses criteria that cover<br />
three potential aspects (organisation, process <strong>and</strong> technology) of data governance implementation.<br />
Based on the results of the assessment, an enterprise is then deemed to fall into one of four data<br />
governance maturity stages: Application-Centric, Enterprise Repository- Centric, Policy-Centric, <strong>and</strong><br />
Fully Governed.<br />
Weber et al. (2009) states that there is not one approach to data governance <strong>and</strong> hence proposes a<br />
flexible data governance model made up of roles (executive sponsor, chief steward, business data<br />
77
Carolyn Begg <strong>and</strong> Tom Caira<br />
steward, <strong>and</strong> technical data steward), decision areas (or tasks) <strong>and</strong> assignment of responsibilities.<br />
The components of the model are drawn together into a responsibility assignment matrix. Their<br />
proposed data governance model documents data quality roles <strong>and</strong> their type of interaction with data<br />
quality management (DQM) activities. The paper also proposes that contingency factors taken from IT<br />
governance (such as organisation structure <strong>and</strong> decision-making style) influence the design of the<br />
data governance model in achieving successful data quality management. This influence is thought to<br />
facilitate the creation of company-specific data governance solutions. The paper presents initial<br />
results of a data governance action research project involving six large enterprises from various<br />
industries.<br />
Khatri & Brown (2010) propose a data governance framework that is an adaptation of a previous<br />
published IT governance framework by Weill & Ross (2004). This approach promotes the idea that<br />
the control <strong>and</strong> management of data assets (data governance) should be closely aligned to the<br />
control <strong>and</strong> management of IT assets (IT governance). The data governance framework uses five<br />
interrelated data decision domains including data principles, data quality, metadata, data access <strong>and</strong><br />
data lifecycle. The purpose of each domain in exploring data-related matters is established along with<br />
identifying ‘the locus of accountability for decision-making’ in each domain; in other words the key<br />
decision makers in each domain. The investigation associated with each domain is presented as<br />
series of possible questions. In addition, a matrix is available, to establish the locus of accountability,<br />
ranging from two extremes of centralised to decentralised against each decision domain. The paper<br />
concludes that all data-related decisions that establish the data governance for an organisation must<br />
be achieved in close association with IT-related decisions <strong>and</strong> IT governance. The proposed data<br />
governance framework was tested on a case study for a large insurance company.<br />
3.3 Critique of data governance frameworks<br />
The examples of data governance frameworks are presented in this paper to illustrate the range <strong>and</strong><br />
types of support available for SMEs seeking to establish data governance. As the SME sector are<br />
consider to be a highly diverse sector, it was considered that frameworks that are adaptable <strong>and</strong><br />
scalable are the mostly likely to be useful. This section highlights some of the features of available<br />
frameworks.<br />
Before data governance can be introduced to an enterprise, all published frameworks recommend<br />
that a data governance maturity assessment is undertaken to establish the current state of data<br />
management <strong>and</strong> control. Some frameworks have supporting (online) tools that can facilitate this<br />
process by directing an enterprise to assess all key aspects of data management.<br />
Implementation of data governance involves defining the owners or custodians of the data assets in<br />
the enterprise. All data governance frameworks emphasize the importance of assigning<br />
responsibilities for data areas to individuals of groups that are also given appropriate authority to<br />
make decisions <strong>and</strong> take appropriate actions.<br />
Optimal use of available frameworks <strong>and</strong> assessment tools appears to require that those with<br />
authority <strong>and</strong> responsibility over enterprise data have knowledge <strong>and</strong> some underst<strong>and</strong>ing of the<br />
terminology that describes data, data-related issues, <strong>and</strong> data-based technology. All proponents of<br />
data governance frameworks agree that responsibility for this data governance must be shared<br />
between business <strong>and</strong> IT departments <strong>and</strong> this suggests that alignment of data governance with IT<br />
governance is likely to be a productive approach for the management of both data <strong>and</strong> IT enterprise<br />
assets.<br />
The frameworks examined displayed a wide range of complexity. For example, the Data Governance<br />
Institute (DGI) (at www.datagovernance.com) is formed from several interrelated items (including<br />
programmes, phases, decision domains, universal objects, <strong>and</strong> components) requiring significant<br />
effort to learn <strong>and</strong> use. Whereas, the Khatri & Brown (2010) framework is relatively simple <strong>and</strong><br />
includes few items (including tables <strong>and</strong> matrices) requiring less effort to learn <strong>and</strong> use.<br />
Many published frameworks proposed to be scalable with some providing case studies. However, the<br />
details of each case study including the size of the organisation is not given in detail <strong>and</strong> the authors<br />
could find no examples of data governance applied to SMEs.<br />
78
Carolyn Begg <strong>and</strong> Tom Caira<br />
In the following section, we justify <strong>using</strong> the Khatri & Brown framework <strong>and</strong> present the initial findings<br />
from our action research in two SMEs.<br />
4. Research<br />
4.1 Overview<br />
While most data governance frameworks claim to be adaptable <strong>and</strong> scalable, there are few, if any,<br />
notable cases of frameworks being applied to SMEs. Given the important contribution that SMEs<br />
make to the economies world-wide, <strong>and</strong> their ever increasing reliance on data as an enabler of more<br />
effective performance, there is a need to explore SME awareness <strong>and</strong> underst<strong>and</strong>ing of data<br />
governance.<br />
Caira et al. (2009) highlight the data-related issues that are typically faced by SMEs in their<br />
operational environment <strong>and</strong> comment that, in ICT audits undertaken in over 100 SMEs, every<br />
enterprise had data management issues. Given that data-related issues appear to be endemic in<br />
SMEs <strong>and</strong> that such issues should, in theory, be addressable by data governance, the authors chose<br />
to assess whether the Khatri & Brown data governance framework can be applied, in practice, to<br />
SMEs.<br />
This approach targets an aspect of data governance - scalability - that has had little, if any, coverage<br />
by the data governance community <strong>and</strong> also provides a useful insight into the SME view of data<br />
governance, the opportunities that it can provide <strong>and</strong> the potential barriers to its adoption.<br />
4.2 Methodology<br />
The methodology used takes the form of action research with both authors acting as change agents in<br />
collaborative projects with two SMEs whose organisations form the basis of the research. The<br />
findings of this action research were supported by further research of technology audit reports on<br />
SMEs located in the West of Scotl<strong>and</strong>.<br />
Company A is a long established manufacturing enterprise with a demonstrable record of successfully<br />
supplying industry leaders in the field of electronics <strong>and</strong> electro-mechanics. Over the past few years,<br />
the repair <strong>and</strong> maintenance side of the business has increased significantly <strong>and</strong> has now replaced<br />
manufacturing as the major focus of the company’s operations. The company’s business processes<br />
are supported by both paper-based <strong>and</strong> computer-based systems with electronic data stored <strong>and</strong><br />
processed by way of bespoke software packages that provide production control <strong>and</strong> repair tracking<br />
facilities. In addition, st<strong>and</strong>ard application packages provide office automation <strong>and</strong> accounting<br />
services. There is no sharing of data between any of these software packages. Communication with<br />
external partners is through telephone <strong>and</strong> e-mail with data transferred by paper or e-mail<br />
attachments. The company does not make use of the Internet in the course of its day-to-day<br />
operations, other than sending <strong>and</strong> receiving e-mail. The company considers its computer systems<br />
out-dated <strong>and</strong> no longer able to adequately support the organisational change in focus from<br />
manufacturing to the provision of equipment repair services.<br />
Company B is a family-run enterprise which has been trading for 7 years. The business has grown<br />
rapidly over this period <strong>and</strong> is looking to further exp<strong>and</strong>. The company is a service-oriented<br />
organisation. The key services offered are courier, freight-forwarding <strong>and</strong> fulfilment services, all of<br />
which are fronted by the enterprise but are actually supplied by third-party organisations. The<br />
enterprise’s unique selling proposition is its excellent customer service, its adoption of end-to-end<br />
ownership of the entire process, <strong>and</strong> the discount it can offer on services, which allows it to undercut<br />
the competition. The company has a website that provides facilities for customers to book <strong>and</strong> pay for<br />
collections <strong>and</strong> to track their consignments, although the extent of these services is currently<br />
dependent upon the third-party fulfilment providers. Pricing <strong>and</strong> tracking data is supplied to the<br />
enterprise from these providers in a number of formats: paper-based; static electronic documents;<br />
<strong>and</strong> dynamic data provided through the use of web services. The company struggles to assimilate all<br />
of these diverse data formats into a single queryable dataset that can provide automated pricing<br />
information to its online customers. The company’s business processes are supported by both paperbased<br />
<strong>and</strong> computer-based systems with each member of staff maintaining their own version of<br />
assimilated supplier data in a format that suits their own individual requirements.<br />
79
Carolyn Begg <strong>and</strong> Tom Caira<br />
The SMEs are of similar size but differ in their requirements for access to, <strong>and</strong> use of data. Company<br />
A does not utilise e-business other than e-mail facilities <strong>and</strong>, as such, is very much internally<br />
focussed in relation to its access to, <strong>and</strong> use of, data. Company B has made a significant investment<br />
in e-business facilities <strong>and</strong> provides <strong>and</strong> utilises web services for both customer <strong>and</strong> supplier<br />
interaction. As such, it recognises the need to have both an internal <strong>and</strong> an external focus in relation<br />
to its access to, <strong>and</strong> use of, data.<br />
Neither of these organisations overtly utilise any form of data governance. The aim of this research is<br />
to explore the awareness of, <strong>and</strong> attitude to, data governance within each organisation <strong>and</strong>, given the<br />
differing data focus between the organisations, to explore the potential benefits that could be provided<br />
by the implementation of data governance <strong>and</strong> to highlight any barriers that might restrict these<br />
organisations from capitalising on such. We use the data governance framework proposed by Khatri<br />
& Brown due to its uncomplicated format as this is likely to engender a better level of underst<strong>and</strong>ing of<br />
data governance concepts within the research organisations <strong>and</strong> hence provide for better elicitation of<br />
valuable research data.<br />
4.3 Research<br />
Each organisation was asked to provide an explanation of the term ‘data governance’ <strong>and</strong> of the<br />
decision domain terminology used in the Khatri framework as a means of establishing awareness <strong>and</strong><br />
underst<strong>and</strong>ing of the concepts. The authors then provided an explanation of the terminology <strong>and</strong> used<br />
the questions contained in the framework to effect a discussion that revealed company attitudes to<br />
data governance <strong>and</strong> engendered consideration of potential benefits <strong>and</strong> barriers.<br />
When asked to provide an explanation of ‘data governance’ both companies referred to governance<br />
by external entities such as government <strong>and</strong> regulatory bodies (e.g. Data Protection Act) <strong>and</strong> then,<br />
almost as an afterthought, to the internal governance of company data, the management of client data<br />
<strong>and</strong> the provision of effective data backup <strong>and</strong> security.<br />
Both companies were then asked to provide an explanation of their underst<strong>and</strong>ing of the five ‘decision<br />
domains’ that are contained in the framework. Neither company could offer any form of explanation<br />
for the terms ‘data principles’ <strong>and</strong> ‘metadata’. Both companies identified ‘data quality’ as relating to<br />
the accuracy <strong>and</strong> integrity of their electronic data. Company A’s underst<strong>and</strong>ing of the term ‘data<br />
lifecycle’ matched the definition provided in the framework whereas company B could offer no<br />
explanation for this terminology. The final decision domain, ‘data access’ provided differing<br />
explanations with company A relating it to security <strong>and</strong> company B explaining it as the variety of ways<br />
in which a dataset can be accessed.<br />
After an explanation of the decision domain terminology was given, further comment was provided by<br />
the companies, as follows in Table 1:<br />
Table 1: Company attitude <strong>and</strong> perception of benefits <strong>and</strong> barriers<br />
Decision<br />
Company Attitude <strong>and</strong> Perception of Benefits <strong>and</strong> Barriers<br />
Domain Company A Company B<br />
Data<br />
Principles<br />
Data<br />
Quality<br />
Metadata<br />
Value of data recognised in relation to<br />
monitoring of production <strong>and</strong> repair processes<br />
<strong>and</strong> for invoicing. Data not considered to have<br />
value in relation to analytics. This was not<br />
considered to be feasible in the existing<br />
information system.<br />
Data not 100% correct. Inconsistencies,<br />
duplications <strong>and</strong> missing data corrected in a<br />
reactive matter. Great deal of trust placed in<br />
employees to maintain data accuracy. Small<br />
size of workforce facilitates this. Company<br />
does, on occasion, have to h<strong>and</strong>le data that<br />
does not fit within normal business processes<br />
<strong>and</strong> management of this data can often be<br />
problematic.<br />
Data not perceived as an asset, because it is<br />
not currently viewed as such by the business<br />
world. Hence has no perceived ‘financial’<br />
value to the enterprise, as opposed to<br />
intangibles like goodwill. Value of data<br />
recognised as an essential element of<br />
operational management.<br />
Data managed <strong>and</strong> maintained in a reasonably<br />
accurate manner, in as much as this is<br />
required to provide company services<br />
effectively. Data quality perceived as a<br />
reactive process driven by practical needs <strong>and</strong><br />
effected on an ‘as needs’ basis. Data quality<br />
issues considered easier for SMEs <strong>and</strong><br />
particularly micro enterprises to address.<br />
Both companies made similar comment in that company data is not documented <strong>and</strong> the<br />
meaning of data is passed on to new employees through training <strong>and</strong> personal contact,<br />
80
Carolyn Begg <strong>and</strong> Tom Caira<br />
Decision<br />
establishing a ‘community’ view of metadata. Both companies consider this to be adequate<br />
given the small size of their workforce.<br />
Company Attitude <strong>and</strong> Perception of Benefits <strong>and</strong> Barriers<br />
Domain Company A Company B<br />
Company recognises that its systems are too Company perceives this to be related to<br />
open. This makes company vulnerable to security specifically in relation to UK Data<br />
Data<br />
Access<br />
malicious attack by disgruntled employees.<br />
Company does not underst<strong>and</strong> how to<br />
establish appropriate data security. Places a<br />
great deal of trust in its employees in this<br />
respect.<br />
Protection Act <strong>and</strong> also to web-based<br />
processing of secure credit card payments.<br />
Company does not actively monitor lifecycle Company referred to this as ‘good<br />
aspects of data. Electronic data rarely housekeeping’ which was more dictated by<br />
maintained <strong>and</strong> commonly stored for longer regulation than from any internal desire to<br />
than necessary with any maintenance being effect appropriate data governance.<br />
Data reactive <strong>and</strong> performed in an ad hoc manner. Awareness of how to properly <strong>and</strong><br />
Lifecycle Reason cited for this was lack of appropriately ‘retire’ or ‘archive’ electronic data<br />
underst<strong>and</strong>ing of how to perform data lifecycle is an issue. Lifecycle maintenance of paper-<br />
maintenance. Lifecycle maintenance of paperbased data was actively <strong>and</strong> appropriately<br />
based data was actively <strong>and</strong> appropriately<br />
managed.<br />
managed.<br />
4.4 Research findings<br />
Khatri & Brown (2010) claim to have provided “a data governance framework that can be used by<br />
practitioners to develop a data governance strategy <strong>and</strong> approach for managing data as an<br />
organizational asset.”<br />
Our primary research finds that, whilst company A <strong>and</strong> company B have different data needs <strong>and</strong> a<br />
different data focus, both seem to have similar views on developing a data governance strategy <strong>and</strong><br />
are experiencing similar issues in relation to their ability to successfully address the management <strong>and</strong><br />
control of data as an organisational asset.<br />
Awareness seems to be a key factor in the SME view of, <strong>and</strong> approach to, data governance. Even the<br />
most uncomplicated published approach to data governance uses language that is not easily<br />
understood by SMEs. In addition, awareness, or lack thereof, of the technology that is used to<br />
manage <strong>and</strong> maintain electronic data has a major influence on an SME’s ability to develop a data<br />
governance strategy. Both companies lacked awareness <strong>and</strong> underst<strong>and</strong>ing of how to address data<br />
lifecycle issues (in particular data retirement) <strong>and</strong> were reticent to take action on this for fear of<br />
disrupting live data or the processes that operate thereon.<br />
Another key factor for SMEs is their perception of the value of data both within <strong>and</strong> outwith their<br />
enterprise. Neither of the companies views data as an asset. It is viewed internally as a somewhat<br />
transient ‘means to an end’ in that it provides the ‘fuel’ to drive business processes but is not viewed<br />
in itself as having any intrinsic value. Both companies recognise the value of intangibles such as<br />
goodwill <strong>and</strong> customer loyalty but do not regard data governance as providing intangible value in this<br />
respect. Both companies commented that if data governance received such recognition within the<br />
business community then they would see value in implementing a data governance strategy but, as<br />
this recognition is not currently perceived to exist, the practical needs which tend to drive SMEs force<br />
them to operate in a ‘reactive’ manner. As such, they would struggle to implement <strong>and</strong> maintain the<br />
required ‘regimented practices’ <strong>and</strong> would likely therefore not extend to embracing the concept of data<br />
governance at this time.<br />
SMEs do not tend to explicitly acknowledge or define data principles. St<strong>and</strong>ards, policies <strong>and</strong><br />
guidelines for management <strong>and</strong> use of data tend to evolve over time <strong>and</strong> become established as a<br />
norm which is communicated to, <strong>and</strong> developed between, existing <strong>and</strong> new employees within the<br />
organisation on an ongoing basis. This is particularly true in micro enterprises where data quality<br />
issues are perceived as being easier to address because of the small locus of control. Both<br />
enterprises identified the locus of accountability for decision making to be decentralised for data<br />
quality <strong>and</strong> centralised for all other decisions domains. Non-conformance of data in non-regulatory<br />
situations is not generally viewed by SMEs as an issue.<br />
81
Carolyn Begg <strong>and</strong> Tom Caira<br />
Trust in employees is perceived as a major contributory factor in ensuring data quality <strong>and</strong><br />
conformance to any implicit data principles within SMEs. Again the small locus of control <strong>and</strong><br />
accountability has a positive influence on a SME’s ability to maintain its data at an acceptable<br />
operational level.<br />
It is also interesting to note, in this respect, that both companies commented that they have no issues<br />
with data governance of paper-based data as they have long-established, tailor-made data principles<br />
<strong>and</strong> business processes for effectively managing such.<br />
The authors acknowledge that this research is limited in that it focuses mainly on the practical issues<br />
associated with implementing data governance in SMEs. However, these findings have also been<br />
supported by further analysis of the technology audit reports previously discussed by Caira et al.<br />
(2009) which has shown the two research companies to be both typical <strong>and</strong> representative.<br />
5. Discussion<br />
This paper concludes with a discussion on the qu<strong>and</strong>ary that SMEs now face working in an<br />
increasingly digital business environment.<br />
The first <strong>and</strong> perhaps most obvious qu<strong>and</strong>ary is while SMEs may recognise the benefits that data<br />
governance could deliver, in that poor data is clearly bad for business, the effort required to achieve<br />
data governance often seems far higher than the perceived benefits. Much of the dilemma is due the<br />
relationship that SMEs have with their IT systems. SMEs find the idea of data governance difficult to<br />
accept without first gaining control over their IT systems (IT governance). Furthermore, SMEs can find<br />
that they are treated as ‘sinks’ for data as it flows into their IT systems from external sources such as<br />
suppliers <strong>and</strong> customers. For SMEs with many external partners this can mean that the SME must<br />
adapt internal systems to deal with data of various forms, controlled by the data governance of others<br />
<strong>and</strong> not by the SME. SMEs are often followers in terms of data format <strong>and</strong> use <strong>and</strong> this often leads to<br />
inefficient <strong>and</strong> ineffective data management as they try to govern this resource.<br />
The second qu<strong>and</strong>ary is that SMEs may not seek data governance because they do not recognise the<br />
inherent value of their data nor view their data as having an independent existence from the systems<br />
that support their business. Many SMEs view their data as being ‘owned’ or worse still being ‘trapped’<br />
by application packages that have been purchased to meet a particular business requirement. While<br />
the use of st<strong>and</strong>ard office application packages can often help SMEs achieve some control over their<br />
data such as improved data quality, data access <strong>and</strong> data management, on the negative side, SMEs<br />
can also be constrained by the same packages as the business changes to meet new requirements<br />
but cannot easily align their IT systems to support new or changing business practises due to a lack<br />
of in house IT expertise. This is evidence of IT systems dictating data governance.<br />
The third qu<strong>and</strong>ary for SMEs that do recognise the value of data governance is that there are no<br />
published data governance frameworks that are appropriate for use by SMEs. While, most data<br />
governance frameworks claim to be adaptable <strong>and</strong> scalable, this was not supported with evidence.<br />
The authors could find no published examples of academic or industry-based research showing data<br />
governance adoption in SMEs. In addition, the language <strong>and</strong> terminology used by published data<br />
governance frameworks is not appropriate for SMEs, especially those with minimal technical<br />
expertise.<br />
The fourth qu<strong>and</strong>ary for SMEs is how they are viewed by the data governance community in that<br />
SMEs may be perceived as requiring ‘simpler’ data governance, however this may not be true. The<br />
commonly used criteria (staff count, turnover, balance sheet) used to identify an enterprise as being<br />
an SME is not necessarily indicative of their data environment. In fact, it is entirely possible that an<br />
SME could have a far more complex data environment, in terms of the volume <strong>and</strong> nature of their<br />
data. Furthermore, it is thought likely that SMEs will use far greater amounts of electronic data due to<br />
technological advances such as cloud computing, enabling the provision of utility-type data capture,<br />
storage <strong>and</strong> processing services. Although, cloud computing is thought to be a mechanism to deliver<br />
affordable computing to resource-poor SMEs, the SMEs may again find themselves dictated to by the<br />
data governance practises used by third-party cloud computing providers.<br />
The authors believe that the lack of attention given to SMEs by the data governance community is<br />
unwise given the significant contribution that this sector makes to economies worldwide. In addition,<br />
82
Carolyn Begg <strong>and</strong> Tom Caira<br />
SMEs need to recognise the value of their data <strong>and</strong> the importance of data governance for their own<br />
survival in an increasingly digital business environment. It is likely that SMEs will continue to increase<br />
their use of IT, <strong>and</strong> e-business systems in particular, <strong>and</strong> this will bring growing amounts of data that<br />
requires their governance. It is also thought possible that data governance for SMEs will move from<br />
being a highly desirable achievement to a regulatory requirement. (Trope & Power 2005), (Khatri &<br />
Brown 2010). For SMEs, it would no longer be acceptable to ignore data-related issues or to have<br />
company data inaccessible to the auditors. Such regulation is likely to affect the banking <strong>and</strong> financial<br />
services industries first, <strong>and</strong> will emerge as a growing trend worldwide. However, once established,<br />
this regulatory requirement is likely to ultimately encompass all enterprises of any size in all sectors.<br />
The authors propose that further <strong>and</strong> focused research is required on SMEs <strong>and</strong> data governance<br />
<strong>and</strong> this may include the development of a SME-focused data governance framework <strong>and</strong> on<br />
approaches to achieving greater alignment of data governance with IT governance for SMEs.<br />
References<br />
Caira, T. et al., 2009. <strong>Knowledge</strong> Transfer in Action within the SME Sector. In Proceedings of the 4th European<br />
Conference on Technology <strong>Management</strong>. p. 8.<br />
Data Governance Maturity Model (2011) [online] www.infogovcommunity.com<br />
Data Governance Institute Framework (2011) [online] www.datagovernance.com<br />
Dyché, J., 2007. A Data Governance Manifesto: Designing <strong>and</strong> Deploying Sustainable Data Governance.<br />
Baseline Consulting, Los Angeles, California.<br />
EC (European Commission), 2003, Commission Recommendation 2003/361/EC of May 6, 2003.<br />
http://europa.eu.int.<br />
EC (European Commission), 2010a, Europe 2020. A strategy for smart, sustainable <strong>and</strong> inclusive growth,<br />
Communication COM(2010) 2020, Brussels: European Commission.<br />
EC (European Commission) 2010b. European SMEs Under Pressure: Annual Report on EU Small <strong>and</strong> Medium-<br />
Sized Enterprises 2009, Brussels, Belgium: European Commission.<br />
EC (European Council), 2000, Conclusions of the European Lisbon Council, 23-24th March, SN100/00<br />
[http://www.europarl.europa.eu/summits/lis1_en.htm]<br />
IBM, 2007, IBM Data Governance Council Maturity Model: Building a road map for effective data governance.<br />
[online] www.infogovcommunity.com/blog/maturity-model-white-paper/<br />
Khatri, V. & Brown, C.V., 2010. Designing data governance. Communications of the ACM, 53(1), pp.148–152.<br />
Trope, R.L. & Power, E.M., 2005. Lessons in Data Governance: A Survey of Legal Developments in Data<br />
<strong>Management</strong>, Privacy <strong>and</strong> Security. Business Lawyer (ABA), 61, p.471.<br />
Weber, K., Otto, B. & Oesterle, H., 2009. One Size Does Not Fit All—A Contingency Approach to Data<br />
Governance. Journal of Data <strong>and</strong> <strong>Information</strong> Quality (JDIQ), 1(1), p.4.<br />
Weill, P., 2004. Don't just lead, govern: How top-performing firms govern IT. MIS Quarterly Executive, 3(1), pp.1–<br />
17.<br />
Weill, P. & Ross, J.W., 2004. IT governance: How top performers manage IT decision rights for superior results,<br />
Harvard Business Press.<br />
83
Towards a Framework for the Evaluation of Mobile<br />
Payments Integration<br />
Fergal Carton 1 , Jonas Hedman 2 , Jan Damsgaard 2 , Kay-Ti Tan 1 <strong>and</strong> J. B.<br />
McCarthy 1<br />
1<br />
University College Cork, Irel<strong>and</strong><br />
2<br />
Copenhagen Business School, Denmark<br />
f.carton@ucc.ie<br />
jh.caict@cbs.dk<br />
jd.caict@cbs.dk<br />
k.tan@ucc.ie<br />
jb.mccarthy@ucc.ie<br />
Abstract: This paper derives a theoretical framework for consideration of both the technologically driven<br />
dimensions of mobile payment solutions, <strong>and</strong> the associated value proposition for customers. Banks promote<br />
traditional payment instruments whose value proposition is the management of risk for both consumers <strong>and</strong><br />
merchants. These instruments are centralised, costly <strong>and</strong> lack decision support functionality. The ubiquity of the<br />
mobile phone has provided a decentralised platform for managing payment processes in a new way, but the<br />
value proposition for customers has yet to be elaborated clearly. This inertia has stalled the design of sustainable<br />
revenue models for a mobile payments ecosystem. Merchants <strong>and</strong> consumers in the meantime are being<br />
seduced by the convenience of on-line <strong>and</strong> mobile payment solutions. Adopting the purchase <strong>and</strong> payment<br />
process as the unit of analysis, the current mobile payment l<strong>and</strong>scape is reviewed with respect to the creation<br />
<strong>and</strong> consumption of customer value. From this analysis, a framework is derived juxtaposing customer value,<br />
related to what is being paid for, with payment integration, related to how payments are being made. The<br />
framework provides a theoretical <strong>and</strong> practical basis for considering the contribution of mobile technologies to the<br />
payments industry.<br />
Keywords: payments, framework, mobile, value<br />
1. Introduction<br />
Payments are central to the growth of modern civilisations. Payment systems have evolved<br />
substantially over time, from earliest bartering systems, to systems based on coins of precious metal,<br />
to the virtual payment systems of today. The mobile phone is capable of providing a bridge between<br />
the traditional <strong>and</strong> the new payment systems, supporting on dem<strong>and</strong> purchase <strong>and</strong> payment<br />
processes in a manner heretofore not conceivable. The transition to mobile phone driven payment<br />
processes is not smooth, hoever, not because of a lack of technology innovation, but because the<br />
underlying players in the industry are reluctant to change highly profitable business models are slow<br />
to evolve. Banks <strong>and</strong> their customers are not in agreement as to what constitutes good value in terms<br />
of payment alternatives, a phenomenom also found among stakeholders to technology adoption (Au<br />
<strong>and</strong> Kauffman, 2008). Research has suggested that the high failure rate of mobile payment solutions<br />
is linked to their inability to provide the right value proposition to customers (Ondrus et al., 2005).<br />
Banks promote payment instruments that earn the most revenue. These tend to be centralised <strong>and</strong><br />
inconvenient. Customers have little choice in selecting payment instruments, but are being seduced<br />
by the control <strong>and</strong> convenience of on-line <strong>and</strong> mobile payment solutions. Until a solid value<br />
proposition emerges that combines value for both banks <strong>and</strong> customers, the innovation in terms of<br />
payment solutions will remain sporadic <strong>and</strong> piecemeal. This paper explores the existing research<br />
domains from which such value propositions or business models could be drawn, <strong>and</strong> extrapolates a<br />
theoretical basis for further research in the area of payments.<br />
The challenge of underst<strong>and</strong>ing the driving forces in the market for electronic payments is that there<br />
are an accelerating range of solutions that address shortcomings in legacy payment processes. For<br />
example, many innovative solutions support the connection of existing bank or credit card accounts to<br />
on-line virtual wallet transactions), substituting the phone for the desktop computer but without<br />
changing the underlying value proposition. Other solutions leveraging the processing capability of<br />
Smart phones seek to associate the payment transaction with other customer related processes such<br />
as loyalty points programmes, but are by definition focused on a particular segment of Smart phone<br />
<strong>using</strong> consumers. While such developments espouse key technology adoption factors such as<br />
consumer convenience <strong>and</strong> ease of use, they also tend to obscure visibility of the comparative value<br />
of choosing a particular payment instrument over an alternative.<br />
84
Fergal Carton et al.<br />
The language used for describing payments has relied on traditional banking terminology such as<br />
payment instruments, or on technological concepts such as connectivity. There are many other<br />
possible dimensions for describing payments such as transaction type, payment domains or<br />
geographic scope. Indeed one of the difficulties for the development of an ecosystem for mobile<br />
payments has been the lack of a common vocabularly between the financial services community <strong>and</strong><br />
the technology community. The method used in this study is to categorise the concepts used to<br />
describe mobile payments, <strong>and</strong> map these “technological” categories against factors describing the<br />
business setting of procurement <strong>and</strong> settlement, thereby allowing us to effectively accumulate<br />
knowledge, <strong>and</strong> to interpret previous findings (Dahlberg et al., 2008). This framework is based on the<br />
hypothesis that mobility (Gumpp <strong>and</strong> Pousttchi, 2005) is simply an extension of the same<br />
virtualisation technologies that have been used by organisations since the earliest days of information<br />
technology. Rather than considering laptops, PDA’s, smart phones <strong>and</strong> tablets as disruptive<br />
technologies (Christensen, 1997), we take the view that their pervasiveness as access devices to<br />
processes <strong>and</strong> information does not fundamentally alter the relationship between people, processes<br />
<strong>and</strong> technology. Virtualisation provides users with visibility <strong>and</strong> control of resources, <strong>and</strong> mobile<br />
technology should provide this visibility <strong>and</strong> control on the move.<br />
Researchers have adopted different units of anlaysis in studying the evolution of mobile payments,<br />
including exploring the payments market (Dahlberg et al., 2008; Ondrus et al., 2005) in the macroeconomic<br />
sense, payments technologies (Ondrus <strong>and</strong> Pigneur, 2007), or payments technology<br />
adoption factors (Pousttchi, 2003; Plouffe et al, 2001). In this study, we are interested in<br />
underst<strong>and</strong>ing mobile payments as an element of a purchase <strong>and</strong> settlement process. From this<br />
perspective we are not only interested in the footprint of mobile phones in the payments l<strong>and</strong>scape,<br />
but also the topography of that l<strong>and</strong>scape in terms of the actors involved, the nature of the payment<br />
<strong>and</strong> the value to the customer of different levels of payment automation. It is suggested that adding<br />
this value dimension (Osterwalder, 2005; Ondrus et al., 2005) helps to conceptualise mobile<br />
commerce in the context of micro-economic transactions in public, commercial <strong>and</strong> social interactions.<br />
The structure of this paper is as follows. Firstly, we provide an overview of the payments industry <strong>and</strong><br />
why the potential of mobile technology has not (yet) translated into innovative payment instruments.<br />
The specific issues surrounding the adoption of mobile payments are then discussed. Based on<br />
research in this domain we then describe the dimensions that may be used to delineate the different<br />
payment service offerings <strong>and</strong> scenarios, <strong>and</strong> from this an integration framework is presented that<br />
may be used to investigate the relationship between payment service offerings <strong>and</strong> the associated<br />
value proposition from a customer perspective. The final section discusses the theoretical implications<br />
of this paper <strong>and</strong> it’s relevance to existing research.<br />
2. Inertia in the payments industry<br />
Traditionally, the transfer of value from payer to receiver, along with the associated risk, is managed<br />
by a small number of highly centralised intermediaries (banks). Funds are transferred from the payer’s<br />
bank account to the receiver’s bank account via a number of physical or electronic payment<br />
instruments. The key value of these centralised instruments is managing the risk of account holder<br />
liquidity <strong>and</strong> fraud. The cost of managing this risk is recouped by levying “interchange fees” on users<br />
of these payment instruments, merchants <strong>and</strong> consumers. A successful business model has thus built<br />
up around the use of payment cards, which involves charging merchants <strong>and</strong> ultimately customers for<br />
the facility <strong>and</strong> convenience of <strong>using</strong> particular payment instruments. The perceived value for the<br />
customer is access to a universally accepted payment instrument, <strong>and</strong> instant access to significant<br />
lines of credit.<br />
The revenues generated from the provision of payment services have been estimated at $900bn,<br />
representing 25-30% of total bank revenues. Reluctance to move away from a winning formula no<br />
doubt constitutes the principle barrier to faster integration of mobile technology into the payments<br />
ecosystem. Three other factors contribute to the inertia in the evolution of traditional payments<br />
services, related to technical skills, customer expectations <strong>and</strong> management culture. Firstly, many<br />
retail banks run back office payment processing systems that are so old that Universities are now<br />
being solicited to create programming modules focused on legacy development environments such as<br />
Cobol, PL1 <strong>and</strong> RPG, such is the reliance on these systems <strong>and</strong> the associated scarcity of skilled<br />
resources. The costs of re-writing back-end payment processing modules is therefore prohibitive.<br />
Currently internet banking could be characterised as providing a web-based front end to account<br />
information that is embedded in legacy applications, without addressing any other requirements that<br />
85
Fergal Carton et al.<br />
customers might have with respect to liquidity control, budgeting or access to alternative products.<br />
Legacy banking systems were simply not designed to empower customers in this way.<br />
Secondly, the virtualisation of banking <strong>and</strong> the sense of empowerment among smart phone<br />
application users have whetted the account holder’s appetite for a different relationship with his or her<br />
bank. Providing on-line visibility of customer accounts is the first step in controlling expenditure,<br />
supporting customer requirements for flexible payment instruments is the second. Ultimately the<br />
integration of bank accounts with planning tools will empower customers to manage their finances in a<br />
more pro-active way. Exhibitors at the Finovate Europe 2011 event in London showed a marked<br />
tendency towards personal finance management products (PFM), with payment instruments being<br />
seen as lifestyle commodities influenced by customer perceptions of value as communicated in social<br />
networks.<br />
Thirdly, it is likely that management in both the commercial <strong>and</strong> retail banking sectors do not have<br />
experience of the newer forms of collaborative business models familiar to service providers in the<br />
new payments ecosystem. Particularly with respect to mobility <strong>and</strong> payments, it is clear that financial<br />
institutions, in order to achieve critical mass, will have to collaborate with new intermediaries such as<br />
hardware vendors, payment solution providers <strong>and</strong> trusted service managers. The next section<br />
discusses the adoption of mobile payments <strong>and</strong> the likely shape of such a new ecosystem.<br />
3. Adoption of mobile payments<br />
A mobile payment is any payment where a mobile device is used to initiate, authorize <strong>and</strong> confirm an<br />
exchange of financial value in return for goods <strong>and</strong> services (Pousttchi, 2003; Au <strong>and</strong> Kauffman,<br />
2008). Mobile payments emerged in the 2000’s, with early successes in the sale of mobile content<br />
<strong>and</strong> services such as ring tones <strong>and</strong> logos. Later, mobile payments were suggested as an alternative<br />
for micro-payments at point-of-sales systems, where the use of cash had been declining for many<br />
years. Many mobile <strong>and</strong> electronic payment solutions have been introduced ever since, but most of<br />
them have failed or have had a low penetration rate (Mallat, 2007; Dahlberg et al. 2008). The “chicken<br />
<strong>and</strong> egg” situation for emerging payment models means that enough merchants need to be on-board<br />
with any new solution for it to catch on with consumers, but in order to be appealing to merchants<br />
there must be a critical mass of consumers interested. Lee et al. (2004) refer to mobile payment<br />
liquidity as the extent to which it is accepted by sellers <strong>and</strong> therefore adopted by customers. Au <strong>and</strong><br />
Kauffman (2008) refer to the theory of network externalities to explain value creation in the networked<br />
economy, suggesting that the value of such services to banks <strong>and</strong> their customers will increase as the<br />
network grows. St<strong>and</strong>ardisation <strong>and</strong> technology maturity have equally been highlighted as key<br />
requirements for expansion of mobile payments (Mallat et al., 2004; Lee et al., 2004).<br />
So, while the most popular payment instruments are still cash, cheques, debit <strong>and</strong> credit cards<br />
(Dahlberg et al, 2008) with smart cards being the most serious challenger to traditional cash<br />
(Dahlberg <strong>and</strong> Mallat, 2002), the ways to make contactless payments <strong>and</strong> especially mobile payments<br />
are increasing. When looking into the future, companies <strong>and</strong> experts agree that the mobile phone is<br />
the technical device that they will try to turn into the new wallet, mainly because of the diffusion of<br />
mobile phones, which no other technical device can match, but also due to the fact that most of us<br />
carry our mobile phones with us most of the time. If the mobile phone as e-wallet succeeds it will very<br />
likely be at the expense of traditional payment instruments. But it is also a possibility that the mobile<br />
wallet will simply become a new way of entering the current card <strong>and</strong> account-based payment<br />
services (Dahlberg et al., 2008).<br />
Contini et al. (2011) describe the mobile ecosystem as a complex set of interconnected entities <strong>and</strong><br />
relationships which interact to form a stable functioning payments system, with participants including<br />
financial institutions, money service providers, h<strong>and</strong>set makers, technology service providers, mobile<br />
network operators, mobile virtual network operators, merchants <strong>and</strong> consumers. Internationally,<br />
national governments have individually pledged support to developing electronic payment capabilities<br />
as part of the broader adoption of e-Government capabilities, while in Europe, much of this<br />
development has been driven by the establishment of SEPA (Single Euro Payments Area).<br />
Underst<strong>and</strong>ing the importance of these emerging solutions is the key motivation for developing an<br />
integration framework for mobile payments. Webster <strong>and</strong> Watson (2002) describe how theory in the<br />
IS field evolves from ad-hoc classification systems through taxonomies to conceptual frameworks.<br />
There is a need for a “robust analysis framework” (Kauffman <strong>and</strong> Walden, 2001; Au <strong>and</strong> Kauffman,<br />
86
Fergal Carton et al.<br />
2008) to abstract meaning from the myriad technology offerings, <strong>and</strong> indeed to differentiate between<br />
business value <strong>and</strong> technology capability. Practitioners <strong>and</strong> academics require an abstracted view of<br />
the business requirements <strong>and</strong> their solutions in order to design lasting solutions. The next section<br />
outlines the dimensions that can be used to build this abstracted view.<br />
4. Classifying the dimensions of mobile payments<br />
Mobile payment solutions may be described by a number of attributes that relate either to the process<br />
or the technology of making a payment. The process dimension refers to what type of payment is<br />
being made, <strong>and</strong> crucially should include the notion of customer value. The technology dimensions<br />
describe how a payment process works, <strong>and</strong> typically involves the integration of a number of physical<br />
<strong>and</strong> virtual payment instruments.<br />
4.1 The value dimension<br />
The value dimension, described as a market perspective by Ondrus et al. (2005), or as a value taker<br />
perspective by Kauffman <strong>and</strong> Walden (2001), relates to both customer benefits <strong>and</strong> needs<br />
respectively. Ondrus et al. (2005) suggest that it is the failure to address the dem<strong>and</strong> issues that<br />
undermine many payment service offerings. It is therefore suggested that the customer dem<strong>and</strong><br />
(value) dimension be used to characterise mobile payments. This dimension will calibrate customer<br />
value across a “consumer to merchant axis” (Ondrus et al., 2005; Dahlberg et al., 2007). Clearly the<br />
time <strong>and</strong> location independence afforded by the mobile phone user is an advantage (Mallat, 2007;<br />
Kim et al., 2010). Indeed the “anytime, anywhere” accessibility of mobile phones increases merchant<br />
access to location specific consumers, thereby potentially instigating dem<strong>and</strong> <strong>and</strong> increasing sales<br />
opportunities, but not necessarily creating customer value. Customer value, for example, might be<br />
providing the payer with visibility of, <strong>and</strong> direct access to, alternative payment execution options, as<br />
well as related decision support information such as account balances, loyalty points, discounts <strong>and</strong><br />
special terms. The customer value here is created through the information value as distinct from the<br />
mobility value (Gumpp <strong>and</strong> Pousttchi, 2005).<br />
For the purposes of this research, the value proposition is considered to include the context or<br />
scenario (Kreyer et al., 2003) of the purchase <strong>and</strong> payment transaction. This covers the nature of the<br />
goods or service being purchased, where the payment is being made, <strong>and</strong> who is involved. The<br />
nature of the purchase covers, for example, the purchase of physical <strong>and</strong> digital goods, the payment<br />
of utility bills or the purchase of on-line services. The procurement of physical goods by individuals or<br />
organisations may be considered to be part of the supply chain. Supermarket shopping for groceries<br />
<strong>and</strong> household goods (B2C) or raw material purchases by manufacturers (B2B) have the<br />
characteristics of being repetitive, subject to scrutiny on price, <strong>and</strong> sensitive in terms of lead time. The<br />
point of sale may be physical, virtual or both.<br />
All businesses have payment processes for overhead expenditure related to personnel (payroll, tax<br />
<strong>and</strong> expenses), rent, maintenance, catering or hygiene services. Utility payments could be considered<br />
to include energy supply, refuse services, tax, banking services, digital network services <strong>and</strong> digital<br />
content. Transportation related services include local transit tickets, parking, automobile taxation, fuel,<br />
holiday <strong>and</strong> airline payments. Consumer goods might include white goods, electronic equipment,<br />
computer equipment, clothing <strong>and</strong> furniture. Leisure <strong>and</strong> entertainment payments include cinema<br />
tickets, concert <strong>and</strong> event ticketing, use of sports facilities, vending machines <strong>and</strong> access to public<br />
amenities. Digital content includes phone credit, digital media (music, video, newspapers, books, …),<br />
gift vouchers <strong>and</strong> virtual gaming products. Person to person (P2P) payments might include payments<br />
to tradespeople, babysitters, home-helpers, local <strong>and</strong> cross border remittances, micro-payments <strong>and</strong><br />
micro-finance. Charity or fundraising donations constitute a section of “person to non-profit”<br />
organisation payments (P2NP). Social <strong>and</strong> Government payments include welfare, pension <strong>and</strong><br />
health payments (G2C).<br />
On the other h<strong>and</strong>, the context of the payment also distinguishes the location of the payment <strong>and</strong> the<br />
actors involved. For example, payments may be made from a mobile phone at a point of sale, from a<br />
mobile phone remotely, in person at a bank branch, in person at an ATM or payment kiosk, in person<br />
at a post office or credit union branch. Payments may be sent by post, or made over the phone, via a<br />
digital TV service, or through a gaming or digital content interface such as iTunes. Bill payment<br />
services may be made on-line or via physical points of sale such as PayZone <strong>and</strong> PayPoint. On-line<br />
payments may be made via electronic wallets such as PayPal or Boku. Economic definitions of<br />
87
Fergal Carton et al.<br />
commercial actors include shareholders, debtors, creditors, managers, employees, community <strong>and</strong><br />
government (Au <strong>and</strong> Kaufmann, 2008). The purpose of this dimension is to underst<strong>and</strong> where value is<br />
being consumed, <strong>and</strong> by whom.<br />
4.2 The integration dimension<br />
The second dimension for mobile payment attributes relates to the products, instruments or<br />
technologies through which the payments are executed. These attributes describe how the payment<br />
is processed, <strong>and</strong> are independent of both the transaction types or the payment channels discussed<br />
above. This virtualisation axis calibrates the extent to which payment execution has been mobilised<br />
(Gummp <strong>and</strong> Pousttchi, 2005) <strong>using</strong> information technology. Technology or product related aspects of<br />
the mobile payments l<strong>and</strong>scape are more “inward” looking (Dahlberg et al., 2008), defining customer<br />
value making (Kauffman <strong>and</strong> Walden, 2001), as distinct from value taking. This corresponds to the<br />
service provision (vertical axis) on the framework described by Dahlberg et al. (2007). The purpose of<br />
this dimension is to underst<strong>and</strong> where value is being created, <strong>and</strong> by whom.<br />
The payment products include traditional physical instruments such as cash, cheques, coupons, prepaid<br />
gift cards, postal orders <strong>and</strong> bank drafts. Credit transfer instruments include credit cards, debit<br />
cards, Electronic Funds Transfer, Direct Debits <strong>and</strong> St<strong>and</strong>ing Orders. Mobile phone related<br />
instruments include bill to carrier account, bill to credit card account <strong>and</strong> bill to current account (ACH).<br />
Pre-loaded virtual instruments include electronic money accounts (eg. PayPal), virtual gift cards <strong>and</strong><br />
virtual loyalty cards. Payment authorisation options include signatures, passwords (on-line, SMS), PIN<br />
number, Chip, card user verification services, voice authorisation or biometric methods. The degree to<br />
which the payment is integrated into an enterprise or domain driven process defines an interface<br />
dimension including Buy-now, Accounts Receivable, Accounts Payable, Payroll, Expense<br />
disbursement, Bank reconciliation or treasury management. Geographic scope for payments may<br />
include proximity, local, national, European or global. Payments across different currencies should<br />
include exchange rate calculations. The account types from which payments are drawn include<br />
unbanked customers, post office accounts, credit union accounts bank accounts (current, credit,<br />
deposit, savings), commercial or merchant accounts, e-Money accounts, Mobile Network Operator<br />
customer accounts, merchant loyalty account <strong>and</strong> digital media accounts. Account funding<br />
mechanisms include cash loading, SMS with top-up, Direct Debit, wire transfer, electronic funds<br />
transfer, credit transfer by SO/DD from third party bank account, remittances <strong>and</strong> on-line e-Money<br />
transfer. Device connectivity options include credit cards (eg. Visa / Mastercard), debit cards (eg.<br />
Maestro, Cirrus, Laser), Internet (TCP/IP, GPS, WiFi), Bluetooth <strong>and</strong> NFC. Clearing <strong>and</strong> settlement<br />
options include paper (eg. IPCC), electronic (eg. IREPCC), Credit Card <strong>and</strong> ATM. Timing of payment<br />
execution may be in advance, at moment of purchase, days or weeks after purchase.<br />
These two dimensions are correlated in the next section to construct a framework for mobile<br />
payments integration.<br />
4.3 A framework for mobile payments integration<br />
Drawing on the discussion regarding the dimensions of payment integration (virtualisation) <strong>and</strong> value<br />
(merchant to consumer axis) in the previous section, a framework is proposed to conceptualise the<br />
position of mobile payments within the greater context of electronic payments. This framework is<br />
presented in Figure 1. In this framework, payment integration is conceptualised as an ongoing<br />
process of reconciling dem<strong>and</strong> with supply. The degree to which payment processes are integrated,<br />
or supported by electronic means, is recognised as an economic lever in the value proposition to<br />
customers. The information that is valuable for consumers (as individuals or enterprise buyers) in<br />
making payments is defined along two dimensions, one related to the level of visibility of purchase<br />
<strong>and</strong> payment information, <strong>and</strong> one related to control of the transfer of value.<br />
The purchase control dimension maps the gradation between a commitment to purchase <strong>and</strong><br />
settlement of the amount due. This axis is temporal, left to right, in there are stages between the<br />
commitment to purchase <strong>and</strong> the actual transfer of value (ultimately there is value in offering a<br />
consumer the ability to intervene at these stages). The payment integration dimension refers to the<br />
degree to which the attributes of payments (both supply <strong>and</strong> dem<strong>and</strong> related) are known <strong>and</strong><br />
communicated, <strong>and</strong> represents a gradation from traditional physical payments instruments to<br />
increasingly virtual payment instruments. It is only with the virtualisation of payment information that it<br />
is possible compare the cost of a planned expenditure with the actual availability of funds (budget).<br />
88
Payment integration<br />
(payment products, instruments, technologies)<br />
Virtual<br />
(emerging)<br />
Physical<br />
(traditional)<br />
Fergal Carton et al.<br />
Budget<br />
visibility<br />
Purchase<br />
Consumer<br />
(dem<strong>and</strong>)<br />
Payment<br />
visibility<br />
Settlement<br />
Merchant<br />
(supply)<br />
Value proposition<br />
(purchase control)<br />
Figure 1: Integration framework for mobile payments<br />
The quadrants represent stages in the value proposition to consumers in electronic payments. The<br />
purchase (bottom left) quadrant represents the buyer’s commitment to purchase. With traditional<br />
physical payments instruments, visibility of budget information is limited. <strong>Information</strong> that would be<br />
valuable to the buyer at this point relate to product supply (for example, price, discount or loyalty<br />
credits), but also related to the available consumer budget. How this information is provided is a<br />
question of integration. The budget visibility quadrant (top left) represents the degree to which visibility<br />
of available funds can be provided. This may also entail electronic decision support tools to inform the<br />
consumer’s decision to purchase.<br />
The settlement quadrant (bottom, right) represents the actual transfer of value from the consumer to<br />
the merchant which may be automated or happen in stages. Payment in cash is instant settlement<br />
whereas payment by card is deferred settlement. The payment visibility quadrant (top right)<br />
represents the degree to which settlement information is available. This visibility provides the<br />
merchant with his confirmed revenue <strong>and</strong> the customer with his real time budget position.<br />
The final section of this paper discusses the practical <strong>and</strong> theoretical implications of this framework.<br />
5. Discussion <strong>and</strong> conclusion<br />
The proposed integrated payment framework highlights the difference <strong>and</strong> relationship between<br />
payment integration <strong>and</strong> value proposition. It also strives to increase theoretical parsimony by<br />
integration of previous literture, such as Ondrues et al. (2005), Mallat (2007), <strong>and</strong> Kim et al., 2010)<br />
into a two by two matrix. The validity of the framework can be assessed by three particular properties:<br />
the integration of the framework (logical coherence), its practical <strong>and</strong> theoretical relevance, <strong>and</strong> its<br />
relative explanatory power (Glaser, 1978). These properties are derived from Glaser’s (1978) work on<br />
theoretical sensitivity <strong>and</strong> have been applied in previous research (Hedman <strong>and</strong> Kalling, 2003). The<br />
logicla coherence is addresssed in the previous section <strong>and</strong> will not be further addressed here.<br />
89
Fergal Carton et al.<br />
There are both practical <strong>and</strong> theoretical aspects to the relevance of the framework. Firstly, it facilitates<br />
discussion of the nature of information required by consumers <strong>and</strong> merchants <strong>and</strong> the associated<br />
value they may place on the automation <strong>and</strong> visibility afforded by payment integration. It can be<br />
understood, for example, that visibility of settlement information requires a level of real-time<br />
interaction with the funding accounts which will have significant technical design implications. By the<br />
same token, budget visibility could be extremely valuable for consumers but may equally imply<br />
sophisticated design scenarios. Where settlement is itself a virtual process (for example, via a PayPal<br />
account), this visibility is provided automatically <strong>and</strong> is of significant value for consumers, so much so<br />
that they are prepared to pay a hefty premium for the service. The visibility provided by traditional<br />
credit card networks for both consumers <strong>and</strong> merchants is significantly less automated, but merchants<br />
will sacrifice margins for the convenience afforded to consumers, who in turn are prepared to pay for<br />
the line of credit. Secondly, the interfaces between the quadrants, represented by the arrows, are<br />
points where integration decisions may be conceptualised. The use of cash versus direct debits<br />
versus online payment can be positioned along the payment integration axis. The question of mobile<br />
payments involving settlement from a bank account, credit card account or carrier account could also<br />
be represented on this axis. Crucially the related visibility of the payment transactions may be<br />
discussed, where the consumer perception of value of a given mobile payment scenario may be<br />
classified in terms of control <strong>and</strong> visibility. Thirdly, the framework provides an overview of the<br />
contribution of payment integration to the value proposition to buyers. On the one h<strong>and</strong>, mobile<br />
payment solution providers offer convenience based services to consumers, <strong>and</strong>, on the other,<br />
consumers have control <strong>and</strong> visibility requirements related to planning for <strong>and</strong> making payments. The<br />
framework allows for the consideration of both these dimensions, <strong>and</strong> in so doing, provides a unique<br />
approach to the evaluation of integration decisions.<br />
The framework is meaningful for the players in the payments ecosystem: financial institutions,<br />
payment solution providers, mobile network operators <strong>and</strong>, ultimately, consumers. Using the<br />
framework, the evaluation of innovative payment technologies can take place in the context of actual<br />
customer value. The framework is developed to conceptualise the driving forces in the mobile<br />
payments industry, in that sense it builds on the existing body of theoretical work (for example, Au<br />
<strong>and</strong> Kauffman, 2008; Ondrus et al., 2005, Mallat, 2007, <strong>and</strong> Kim et al., 2010). Furthermore, it is felt<br />
that the framework brings to center stage the notion of customer value dicussed in such literature.<br />
Further research on this topic should entail validating the framework empirically on a range of different<br />
emergent <strong>and</strong> traditional payment scenarios. Such research should aim to clarify the collaboration<br />
decisions for players in the market for mobile payments. On the basis of these collaboration<br />
decisions, real progress in the provision of consumer oriented payment services that leverage the<br />
“anytime, anywhere” visibility <strong>and</strong> control of the mobile phone might be envisaged.<br />
Acknowledgements<br />
This work was carried with the support of Copenhagen Finance IT Region (www.cfir.dk) <strong>and</strong> was funded by the<br />
Danish Enterprise <strong>and</strong> Construction Authority grant number ERDFH-09-0026. Any opinions, findings,<br />
interpretations, conclusions or recommendations expressed in this paper are those of its authors <strong>and</strong> do not<br />
represent the views of the funding agencies.<br />
References<br />
Au, Y.A. <strong>and</strong> Kauffman, R.J. (2008), The economics of mobile payments: Underst<strong>and</strong>ing stakeholder issues for<br />
an emerging financial technology application, Electronic Commerce Research <strong>and</strong> Applications, (7), pp.<br />
141–164.<br />
Christensen, M. (1997), The Innovator’s Dillemma, Harvard Business School Press, Cambridge, MA.<br />
Contini, D., Crowe, M., Merritt, C., Oliver, R. <strong>and</strong> Mott, S. (2011), Mobile Payments in the United States, Mapping<br />
Out the Road Ahead, in proceedings of the Mobile Payments Industry Workshop, Federal Reserve Banks.<br />
Dahlberg, T., Mallat N., Ondrus, J. <strong>and</strong> Zmijewska, A. (2008), Past, present <strong>and</strong> future of mobile payments<br />
research: A literature review. Electronic Commerce Research <strong>and</strong> Applications, 7(2): pp. 165-181.<br />
Dahlberg, T. <strong>and</strong> Mallat, N. (2002), Mobile payment service development-managerial implications of consumer<br />
value perceptions, Citeseer.<br />
Glaser, B.G. (1978), Theoretical sensitivity. Mill Valle: Sociology Press.<br />
Gumpp, A. <strong>and</strong> Pousttchi, K. (2005), The ‘‘mobility-M’’ framework for the application of mobile technology in<br />
business processes, GI Jahrestagung Informatik, Bonn, Germany, September.<br />
Hedman, J. <strong>and</strong> Kalling, T. (2003), The Business Model Concept: Theoretical Underpinnings <strong>and</strong> Empirical<br />
Illustrations, European Journal of <strong>Information</strong> Systems, 12(1), pp. 49–59.<br />
Kauffman, R.J. <strong>and</strong> Walden, E. (2001), Economics <strong>and</strong> electronic commerce: survey <strong>and</strong> directions for research,<br />
International Journal of Electronic Commerce, 5(4), pp. 5–116.<br />
90
Fergal Carton et al.<br />
Kim,C., Mirsobit, M. <strong>and</strong> Lee, I. (2010), An empirical examination of factors influencing the intention to use mobile<br />
payment, Computers in Human Behavior, 26, pp. 310–322.<br />
Lee, C.P., Warkentin, M. <strong>and</strong> Choi, H. (2004), The Role of Technological <strong>and</strong> Social Factors on the Adoption of<br />
Mobile Payment Technologies, proceedings of the 10th Americas Conference on <strong>Information</strong> Systems<br />
(AMCIS), New York, August, pp. 2781-2786.<br />
Mallat, N. (2007), Exploring consumer adoption of mobile payments - A qualitative study, The Journal of Strategic<br />
<strong>Information</strong> Systems, 16(4), pp. 413-432.<br />
Mallat, N., M. Rossi, <strong>and</strong> V.K. Tuunainen (2004), Mobile banking services, Communications of the ACM, 47(5),<br />
pp. 42-46.<br />
Ondrus, J., Camponovo, G. <strong>and</strong> Pigneur, Y. (2005), A Proposal for a Multi-perspective Analysis of the Mobile<br />
Payment Environment, proceedings of the International Conference on Mobile Business, ICMB’05.<br />
Ondrus, J. <strong>and</strong> Pigneur, Y. (2006),Towards a holistic analysis of mobile payments: a multiple perspectives<br />
approach, Electronic Commerce Research <strong>and</strong> Applications, 5(3), pp. 246-257.<br />
Ondrus, J. <strong>and</strong> Pigneur, Y. (2007), An assessment of NFC for future mobile payment systems, proceedings of the<br />
International Conference on Mobile Business (ICMB’07),Toronto, July, pp. 43-53.<br />
Osterwalder, A., Pigneur, Y. <strong>and</strong> Tucci, C.L. (2005), Clarifying Business Models: Origins, Present, <strong>and</strong> Future of<br />
the Concept, Communications of the Association for <strong>Information</strong> Systems, 16(1), pp. 1-25.<br />
Plouffe, C.R., V<strong>and</strong>enbosch, M., <strong>and</strong> Hull<strong>and</strong>, J. (2001), Intermediating technologies <strong>and</strong> multi-group adoption: A<br />
comparison of consumer <strong>and</strong> merchant adoption intentions toward a new electronic payment system, The<br />
Journal of Product Innovation <strong>Management</strong>, (18), pp. 65-81.<br />
Pousttchi, K. (2003), Conditions for Acceptance <strong>and</strong> Usage of Mobile Payment Procedures, conference<br />
proceedings of the Second International Conference on Mobile Business, Vienna, pp. 201-210.<br />
Webster J. <strong>and</strong> Watson R.T. (2002), Analyzing the Past to Prepare for the Future: Writing a Literature Review,<br />
MIS Quarterly, 26(2), pp. xiii – xxiii.<br />
91
Social Computing Tools for Inter-Organizational Risk<br />
<strong>Management</strong><br />
Walter Castelnovo<br />
University of Insubria, Via Carloni, Italy<br />
walter.castelnovo@uninsubria.it<br />
Abstract: Social computing technologies, tools <strong>and</strong> applications are changing the way in which people <strong>and</strong><br />
organizations communicate <strong>and</strong> interact. Although, the real benefits of an organization’s use of social computing<br />
tools are still unclear, researches found that successful companies not only integrate social computing tools<br />
within their workflows but also use them to create a “networked company”. Both these elements are relevant in<br />
the use of social computing tools for supporting inter-organizational risk management discussed in this paper.<br />
More specifically, with reference to the case of One Stop Shop for production activities in Italy, in the paper I will<br />
show how social computing tools can be used to make more efficient <strong>and</strong> effective inter-organizational risk<br />
management, that can be considered as a form of inter-organizational cooperation for the management of the<br />
risks related to activities involving the joint effort of different organizations. In the first section I will introduce interorganizational<br />
risk management <strong>and</strong> I will describe the Team Risk <strong>Management</strong> (TRM) model, that has been<br />
originally developed to manage risks in software-dependent development programs involving different<br />
organizations. In section 2, I will present a particular cooperation scenario concerning One Stop Shop for<br />
production activities (Sportello Unico per le Attività Produttive – SUAP) in Italy that can be used as a case study<br />
for inter-organizational risk management. In this section I will also show how the TRM model can be modified to<br />
describe the way in which the public agencies involved in the functioning of the SUAP can manage risks at the<br />
inter-organizational level. In section 3 I will show how organizations can integrate social computing tools within<br />
intra-organizational processes to make their risk assessment more efficient <strong>and</strong> effective. Finally, I will show how<br />
social computing tools can also be integrated within the inter-organizational processes that lead different<br />
agencies to share the risk evaluation <strong>and</strong> the risk h<strong>and</strong>ling actions.<br />
Keywords: inter-organizational cooperation, inter-organizational risk management, team risk management,<br />
social computing, eterprise 2.0, government 2.0<br />
1. Introduction<br />
Organizations are continuously faced with the problem of making decisions. Such decisions can<br />
concern many different aspects of an organization’s activity <strong>and</strong> may impact the organization in the<br />
long, medium <strong>and</strong> short term, depending on whether they are strategic, tactical or operational<br />
decisions. Every decision is made within an environment that changes continuously; a possible<br />
uncertainty regarding its eventual outcomes is thus an unavoidable ingredient of any decision, which<br />
could also imply a possible loss for the organization as a consequence of the decision made.<br />
When an organization is required to make a decision in a situation in which there is some uncertainty<br />
with respect to the eventual outcome <strong>and</strong> a possible loss associated with it, the decision making<br />
process involves a risk (Alberts <strong>and</strong> Dorofee 2005). Any organization must deal with risk because it<br />
cannot avoid making decisions. Hence, risk management should be considered as a central part of<br />
any organisation’s strategic management.<br />
Risk management is the process whereby organisations h<strong>and</strong>le the risks attached to their activities on<br />
the basis of st<strong>and</strong>ard tools <strong>and</strong> methodologies. Any risk management system should include<br />
processes for assessing risk (risk identification, analysis <strong>and</strong> evaluation), developing risk-h<strong>and</strong>ling<br />
options, monitoring risks to determine how risks have changed, <strong>and</strong> documenting the overall risk<br />
management programme (see, for instance (ISO 2009) <strong>and</strong> (AIRMIC, ALARM, IRM 2010)).<br />
Communication <strong>and</strong> coordination are of central concern for risk management. Actually, a possible<br />
threat to the organization can be detected anywhere within it; without a well defined communication<br />
<strong>and</strong> reporting policy that allows a prompt assessment <strong>and</strong> evaluation of the potential risk detected, the<br />
effectiveness of risk management can be severely reduced.<br />
Communication is essential also for risk treatment <strong>and</strong> risk monitoring. The implementation of the risk<br />
h<strong>and</strong>ling options can introduce secondary risks that need to be assessed, treated, monitored <strong>and</strong><br />
reviewed. When a risk treatment action is undertaken on a given activity, it cannot be excluded that,<br />
as an indirect consequence of it, a new risk arises with respect to other activities interrelated with that<br />
activity. In order to h<strong>and</strong>le a secondary risk detected as a consequence of a given risk treatment<br />
action, it could happen that some activities, different from the one the risk treatment action has been<br />
92
Walter Castelnovo<br />
devised for, have to be redefined <strong>and</strong>/or re-scheduled. This means that a manager could be required<br />
to revise his priorities as a consequence of a problem affecting an organizational unit different from<br />
the one it is responsible of. This rises a serious coordination problem within organizations.<br />
This coordination problem arises because of the interdependencies among some activities that have<br />
to be performed by different units within the same organization. Such a coordination problem arises,<br />
even with a higher evidence <strong>and</strong> a stronger impact, in the case of inter-organizational cooperation,<br />
where the interdependencies among activities can cross the organizational boundaries. Interorganizational<br />
cooperation entails that the activities performed by one of the partners, as well as the<br />
decisions it makes, can affect the other partners’ actions <strong>and</strong> decisions, thus affecting their capability<br />
of pursuing their strategic mission. This is a form of organizational risk that could affect the partners<br />
both as individual organizations <strong>and</strong> as members of an inter-organizational cooperation. In order to<br />
h<strong>and</strong>le these risks, an inter-organizational risk management system should be implemented by the<br />
partners of the cooperation, namely a system whose goal is to more effectively allow organizations to<br />
share information <strong>and</strong> perform necessary activities with regard to risk management that may affect<br />
their collective behaviour (Meyers 2006).<br />
The Team Risk <strong>Management</strong> (TRM) approach described in (Higuera et al. 1994) defines methods <strong>and</strong><br />
tools that can be used to manage risks at the inter-organizational level. In the TRM approach three<br />
types of risk management processes are considered: (i) an intra-organizational process executed<br />
independently by each partner organization (the Baseline Risk Assessment); (ii) a set of continuous<br />
processes implemented as both intra <strong>and</strong> inter-organizational; (iii) an inter-organizational process<br />
conducted jointly by the partners (the Team Review Process). The TRM model can be summarized as<br />
in figure 1:<br />
Figure 1: The team risk management approach<br />
The risk management process begins with the baseline risk assessment that allows all the partners to<br />
individually identify the risks that are associated with their respective organizations. These risks are<br />
shared <strong>and</strong> jointly evaluated through the team review that combines the most important risks<br />
identified by the partners into a list of the most important risks detected. The continuous processes<br />
comprise a cyclic set of activities, by means of which each partner manages risks at the intraorganizational<br />
level <strong>and</strong>, through a repeated execution of the team review process, at the interorganizational<br />
level, as well.<br />
Such activities involve the partners both individually, since they are required to efficiently <strong>and</strong><br />
effectively manage the risks that could arise in the execution of the activities allocated to them, <strong>and</strong><br />
collectively, since there could be the need of flexibly <strong>and</strong> dynamically reconfiguring the execution of<br />
the inter-organizational workflow to cope with unexpected situations. When the execution of the interorganizational<br />
workflow is constrained by strict temporal requirements, both these types of risk<br />
93
Walter Castelnovo<br />
management activities must be performed promptly in order that the whole process is concluded<br />
within the expected terms.<br />
In the next section I will briefly describe a particular cooperation scenario concerning One Stop Shop<br />
for production activities (Sportello Unico per le Attività Produttive – SUAP) in Italy, that will be used as<br />
a case study for inter-organizational risk management. I will also show how the TRM model can be<br />
used to describe how the public agencies involved in the functioning of the SUAP can manage risks at<br />
the inter-organizational level. The discussion of the case study will lead to the necessity to modify<br />
some aspect of the TRM model in order to make inter-organizational risk management more efficient<br />
<strong>and</strong> effective in a context constrained by strict temporal requirements.<br />
2. A case study in inter-organizational risk management<br />
As part of the policies for reducing the administrative burdens for enterprises, from the late ‘90s Italian<br />
municipalities have been required to implement, either individually or by resorting to some form of<br />
intermunicipal cooperation, the One-Stop Shop for Production Activities (SUAP) as the single point of<br />
access to services <strong>and</strong> information for business offered by different public authorities.<br />
In 2010 the Italian Government took new initiatives to make it easier starting, transforming or closing a<br />
business. Not only were new measures defined in order to favour the complete digitalisation of the<br />
SUAP, but even the procedures for starting, transforming or closing a business have been further<br />
simplified by turning the current legislation from the traditional ex ante authorization regime into an expost<br />
controls regime. Under this regime, a new business can be started up simply through a<br />
communication (Segnalazione Certificata di Inizio Attività – SCIA, Certified Communication of the start<br />
of the activity) submitted online to the SUAP through the national portal www.impresainungiorno.it.<br />
The online procedure is such that it guarantees that the SCIA contains all the required information<br />
<strong>and</strong> that all the required documents have been attached (if the communication is incomplete it is<br />
rejected). A SCIA that has been checked for completeness gets registered to the system that<br />
automatically sends a receipt to the applicant. Upon receiving this receipt, an entrepreneur can start a<br />
new business without necessarily having to wait for the SUAP to complete the required controls. This<br />
is the main reason why the new ex-post controls regime is expected to make it easier to start a<br />
business in Italy.<br />
Upon registering the SCIA the SUAP has to operate all the required controls within an interval of time<br />
defined by the law (60 days). If any of the controls detects some inadequacy, then the business can<br />
be stopped (either temporally until the inadequacy will be removed or definitively, if the inadequacy<br />
can not be removed), otherwise it can operate without requiring any further authorizations.<br />
The new legislation did not reduce the number of public agencies <strong>and</strong> authorities having competences<br />
concerning starting, transforming or closing a business. This means that, depending on the type of<br />
the business, the controls that have to be operated may involve both the municipalities <strong>and</strong> other<br />
public agencies. In such a situation, in order to satisfy the requirements stated by the law, the SUAP<br />
has to implement an effective <strong>and</strong> efficient system for the management of a variety of ex-post controls<br />
involving different public bodies.<br />
Given the lack of resources affecting them, the public agencies involved in the processing of a SCIA<br />
could have difficulties to promptly operate the ex-post controls. In such a situation the only way to<br />
safeguard the public interest is by identifying what controls really need to be operated, based on a<br />
careful analysis of the potential risks the SCIAs that have been submitted to the SUAP could entail.<br />
Since the individual decision of each agency can have consequences on the final result of the<br />
processing of a SCIA, thus affecting the other authorities' activities <strong>and</strong> decisions, it is necessary for<br />
all the actors involved to share both their evaluation of the potential risks it could entail <strong>and</strong> their<br />
decisions whether or not to perform some controls on it. This can be done by integrating the risk<br />
management processes provided by the TRM model within the SUAP’s workflow.<br />
Figure 2 below describes such an integration, based on the SUAP’s workflow as defined by the Italian<br />
legislation in force (Castelnovo 2011). After registering a SCIA submitted to it, the SUAP sends the<br />
relevant documentation to all the agencies having competences on it. Upon receiving the documents,<br />
the agencies individually perform the baseline risk assessment process, with the aim of identifying all<br />
94
Walter Castelnovo<br />
the potential risks that SCIA could entail. By <strong>using</strong> st<strong>and</strong>ard tools for risks analysis <strong>and</strong> evaluation (for<br />
instance those described in (IMA 2007), through this step each partner is thus able to associate to the<br />
SCIA under processing a level of risk, with respect to the matters on which he has competence.<br />
Besides evaluating the potential risks involved, during this phase each partner can also plan the<br />
execution of their control activities on that SCIA. The timing of these activities depends both on the<br />
level of risk detected <strong>and</strong> on the other activities in which that agency is possibly already occupied.<br />
The team review allows the partners to jointly evaluate the SCIA on the basis of the potential risks<br />
each one of them identified individually, thus arriving at a shared risk evaluation. Such an evaluation<br />
forms the basis for determining the more adequate risk treatment strategy to assume among<br />
accepting, rejecting or h<strong>and</strong>ling the risks.<br />
Figure 2: Integration of TRM within the SUAP’s workflow<br />
In the case we are considering, accepting the risk means that the team evaluation is such that the<br />
level of risk of the SCIA is not ranked high; thus, also considering the other constraints that could<br />
possibly limit the partners’ activities, there is no particular problem in delaying, <strong>and</strong> even possibly<br />
avoiding, the ex-post controls. Rejecting the risk amounts to recognizing that the SCIA does not<br />
involve any particular risk <strong>and</strong> could thus be treated in terms of a silent-assent procedure. Finally,<br />
h<strong>and</strong>ling the risk means adopting mitigation plans with the aim of reducing the risks involved in the<br />
SCIA by implementing appropriate risk mitigation actions. Such actions will amount to the competent<br />
authorities planning <strong>and</strong> performing all the required ex-post controls with a timing that will allow the<br />
processing of the SCIA to be completed within the terms provided by law (60 days).<br />
Once defined <strong>and</strong> agreed on by all the participants to the team review, each partner has to implement<br />
its own risk h<strong>and</strong>ling actions, according to the timing defined by the team review. As observed above,<br />
the execution of the risk h<strong>and</strong>ling options can introduce secondary risks that need to be managed.<br />
These risks can be determined by the occurrence of unforeseen situations that could affect the<br />
partners’ capacity to execute the risk h<strong>and</strong>ling actions within the terms agreed on. Such risks should<br />
be promptly identified <strong>and</strong> treated since a delay in one partner’s activity could affect the final result of<br />
the processing of a SCIA. Moreover, because of the potential consequences they could have on the<br />
other partners’ activities, the emergence of these risks should be promptly communicated to the<br />
partners, in order to let them assume all the measures apt to cope with the new situation.<br />
In the TRM model this can be done by a repeated execution of the team review process. However,<br />
due to the strict temporal constraints the processing of a SCIA must satisfy, in the situation we are<br />
considering the team review process cannot be implemented simply as a periodic meeting among the<br />
partners, as it is considered in (Higuera et al. 1994). Since in this case the reiteration cycles of both<br />
the team review process <strong>and</strong> the continuous processes must be much shorter than those described in<br />
the original model, all these processes should rather be implemented as continuous communication<br />
processes through which people belonging to the same organization, as well as people from different<br />
organizations, interact continuously on a daily basis.<br />
95
Walter Castelnovo<br />
This rises two questions: (i) what risk management processes can be made more efficient <strong>and</strong><br />
effective, <strong>and</strong> how this can be done; (ii) what technologies <strong>and</strong> tools can be used to make these<br />
processes more effective <strong>and</strong> efficient, both at the intra-organizational <strong>and</strong> at the inter-organizational<br />
level.<br />
The baseline risk assessment is as a typical intra-organizational process that, in the SUAP example,<br />
must be performed by all the public agencies involved in the processing of a SCIA. Besides the<br />
competences required for <strong>using</strong> the st<strong>and</strong>ard methodologies for risk assessment mentioned above, in<br />
order to properly assess the potential risks involved in a SCIA, the specific competences related to<br />
the particular object of that SCIA are required. Such technical competences are more likely to be<br />
owned by people who belong to different units within the same organization. This rises the problem of<br />
how these people can be efficiently <strong>and</strong> effectively involved in the risk management process.<br />
The team review, that is the core of the TRM model, is intended to achieve multiple results, some of<br />
which strictly related to the execution of the continuous processes: (i) allowing the partners to arrive at<br />
a shared risk evaluation; (ii) allowing them to agree on the risk h<strong>and</strong>ling actions each partner must<br />
implement <strong>and</strong> the timing for their execution; (iii) sharing the information concerning the monitoring of<br />
the implementation of the risk h<strong>and</strong>ling actions; (iv) allowing them to agree on how redefining the risk<br />
h<strong>and</strong>ling actions <strong>and</strong> their timing to treat the possible secondary risks detected during the execution of<br />
the continuous processes.<br />
Based on these observations, figure 3 summarizes the requirements (A1-A4 <strong>and</strong> B1-B4) that should<br />
be satisfied by the tools that can be used in order to make both the Baseline Risk Assessment <strong>and</strong><br />
the Team Review process more efficient. In the next section I will show how all these requirements<br />
can be satisfied by some well known social computing tools.<br />
Figure 3: Functionalities needed to support inter-organizational risk management<br />
3. Social computing tools for supporting inter-organizational risk<br />
management: An overview<br />
As pointed out in (Higuera et al. 1994), communication (both formal <strong>and</strong> informal) represents a<br />
fundamental component for all the risk management processes the TRM model comprises. On the<br />
one h<strong>and</strong>, through communication all the actors involved in the inter-organizational risk management<br />
processes can build <strong>and</strong> reinforce a shared vision, create a sense of collective ownership <strong>and</strong><br />
responsibility, enhance inter-organizational trust, which can make the cooperation more effective <strong>and</strong><br />
easier to manage. On the other h<strong>and</strong>, at the operative level, communication enhances the interactions<br />
among all the actors involved, both at the intra-organizational <strong>and</strong> at the inter-organizational level, <strong>and</strong><br />
96
Walter Castelnovo<br />
allow the information relative to risks <strong>and</strong> their management to be shared among them, which makes<br />
inter-organizational management effective. All these fundamental aspects of the TRM model can<br />
benefit from the use of social computing technologies <strong>and</strong> tools to support the risk management<br />
processes.<br />
Social computing services (SCSs) can be considered as a set of applications that enable people to<br />
efficiently interact with other people, as well as sharing content <strong>and</strong> data, through the Web (Young<br />
2007). Whereas publicly available SCSs are already widely diffused for private use (Pascu 2008),<br />
their adoption <strong>and</strong> use by enterprises <strong>and</strong> Government is still quite limited, although it is widely<br />
expected that the adoption of SCSs would have a high positive impact on both enterprises <strong>and</strong><br />
Government.<br />
Figure 4 below gives a schematic overview of the more common SCSs, grouped with respect to the<br />
four basic functionalities provided by social computing: messaging, collaboration, broadcasting <strong>and</strong><br />
knowledge building. Some of these services (the white area) are already widely used by<br />
organizations, both for internal purposes <strong>and</strong> for customer related purposes. Others are being<br />
increasingly adopted by organizations (the light gray area), others again (the dark gray area) are still<br />
quite rarely used, although the greatest value is expected from their adoption. (Bughin, Chui <strong>and</strong><br />
Miller 2009)<br />
In this section I will consider the opportunity of <strong>using</strong> some of the SCSs included in figure 4 to satisfy<br />
the requirements listed in the figure 3 above in an efficient <strong>and</strong> effective way. In doing so, my aim is<br />
not to discuss in any detail the properties of the different SCSs that I consider; rather, my aim is<br />
simply to show where they could be beneficially used within the risk management processes provided<br />
by the TRM model.<br />
Figure 4: Social computing services (based on (Doculabs 2010))<br />
The requirement A1 of figure 3 above concerns the identification of the people (domain experts) to<br />
involve in the baseline risk assessment (<strong>and</strong> in the routine risk identification <strong>and</strong> analysis, as well),<br />
that can be considered as a case of expertise management. A way to satisfy the requirement A1 is by<br />
requiring all the organizations involved in the SUAP’s activity to associate an expertise profile to each<br />
of their knowledge workers (or some of them), so that they can be available to public search (either<br />
automatically or manually). This can be done by transforming the usual “directory of people” from the<br />
“yellow pages” model to a social network model, analogous to the IBM’s “Blue Pages” described in<br />
(Richter <strong>and</strong> Riemer 2009). Besides making the search of experts easier, representing expertise<br />
97
Walter Castelnovo<br />
through social network profiles also allows the possibility of making the expertise description more<br />
reliable by means of social filtering mechanisms that can be used to further qualify the level of<br />
expertise of registered experts.<br />
By resorting to this solution, upon receiving a SCIA the SUAP can prompt all the agencies involved to<br />
activate the concurrent execution of their baseline risk assessment processes through the following<br />
steps:<br />
Identify all the agencies that need to be involved in the processing of that SCIA<br />
Identify what are the competences required to properly assess the potential risks involved in that<br />
SCIA<br />
Search the network (by means of a social network search engine) for people with the required<br />
competences<br />
Send the relevant documentation directly to the people identified in step 3, irrespective of the<br />
organization they belong to (this step accounts also for the requirement A2 of figure 3)<br />
A different approach to searching the experts (that could also be integrated in the searching of profiles<br />
approach) is by means of microblogging. Microblogs are normally used by people to provide updates<br />
on their activities, observations <strong>and</strong> interesting content, directly or indirectly to others. However,<br />
based on data concerning the IBM’s microblogging application BlueTwit, (Ehrich <strong>and</strong> Shami 2010)<br />
found that workplace employees are mostly <strong>using</strong> the tool to post information, engage in brief directed<br />
conversation <strong>and</strong> asking help from colleagues. This suggests the possibility of <strong>using</strong> a microblog post<br />
to identify the people to involve in the baseline risk assessment; this could be done in the form of a<br />
request for help to which people with the required competences answer. By means of the same post,<br />
these people get also informed of the fact that their advices are needed, thus satisfying the<br />
requirement A2 as well.<br />
A further alternative could be implemented by means of automatically generated RSS feeds instead of<br />
microblogs posted by people allocated to the SUAP.<br />
Microblogs can be used in all the situations in which the people involved need to be promptly<br />
informed of the occurrence of potentially critical events, as in the case of a partner’s detection of a<br />
secondary risk arising during the execution of the risk h<strong>and</strong>ling actions he is in charge of. In this case,<br />
as he detects the secondary risk, a partner can post a microblog with which all the other partners can<br />
be informed of it, almost in real time, <strong>and</strong> thus be prepared to define, <strong>and</strong> share, the most adequate<br />
measures to cope with the new situation. Thus, by resorting to microblogging also the requirements<br />
B2 <strong>and</strong> B3 can be satisfied.<br />
Blogs represent a powerful tool for sharing expertise, improving cooperation <strong>and</strong> enabling business<br />
intelligence creation (see, for instance, (Andrus 2005) <strong>and</strong> (Kolari et al. 2007)). In the case we are<br />
considering, blogs can be used to satisfy also the requirements A4, B1 <strong>and</strong> B4. Actually, upon<br />
receiving a SCIA, the manager responsible for the functioning of the SUAP can initiate a blog devoted<br />
to its risk assessment. The managers responsible for risk assesment (both the baseline risk<br />
assessment <strong>and</strong> the routine risk identification <strong>and</strong> analysis) within the organizations involved in the<br />
processing of the SCIA can post comments on the blog, thus sharing their evaluation (i) of the<br />
potential risks involved (for their organizations); (ii) of the need of performing the ex-post controls; <strong>and</strong><br />
(iii) of the timing for the execution of the controls. This allows:<br />
The definition of a shared risk profile for the SCIA under processing (requirement A4)<br />
A shared decision concerning whether to perform the controls, <strong>and</strong> when (requirement B1),<br />
possibly also by resorting to polling mechanisms, that can be integrated quite easily in a blog<br />
A shared planning of the execution of all the ex-post controls (whatever organization is<br />
responsible for each control activity), compatible with the other activities each partner has to<br />
perform as part of his normal activity (requirement B4)<br />
Blogs can be used to share information <strong>and</strong> decisions both at the inter-organizational <strong>and</strong> at the intraorganizational<br />
level. In this case, the use of blogs would allow the manager responsible for the<br />
internal risk assessment to collect information <strong>and</strong> advices that could be useful for a sound risk<br />
assessment from people within the organization (whatever unit they belong to).<br />
98
Walter Castelnovo<br />
Risk assessment, <strong>and</strong> risk treatment as well, can be made more efficient <strong>and</strong> effective when<br />
information concerning previous experiences can be used to derive useful insights on how to treat the<br />
case at h<strong>and</strong>. One way to do this is by allowing the use of tools that enable groups to jointly create<br />
<strong>and</strong> share content; WIKIs are typical collaborative tools that can be used to this end, even in critical<br />
contexts (as those described in (Wagner 2004) <strong>and</strong> (Andrus 2005)). In the processing of a SCIA,<br />
blogs can be used to make a shared risk assessment <strong>and</strong> a shared risk treatment strategy emerge<br />
from the collaborative effort of people belonging to different organizations (as well as to different units<br />
within the same organization); WIKIs, instead, can be used to document the whole risk assessment<br />
<strong>and</strong> risk treatment processes for that SCIA. The intrinsic collaborative nature of the WIKI enables<br />
documents to be written collectively by all the people involved in the risk management <strong>and</strong> the risk<br />
treatment processes (whatever organization they belong to), thus allowing a more structured,<br />
complete, reliable <strong>and</strong> useful documentation of the way a SCIA has been treated. Moreover, the<br />
possibility of <strong>using</strong> tags (both content tags <strong>and</strong> meta-information tags) <strong>and</strong> links to organize the<br />
content of WIKI pages makes it particularly easier to find the information needed, thus allowing a<br />
more efficient use of past experiences in both the risk assessment <strong>and</strong> the risk treatment processes.<br />
From this point of view, by <strong>using</strong> WIKIs to document the risk management processes also the<br />
requirement A3 in figure 3 above can be satisfied.<br />
4. Conclusions<br />
In the paper I considered the opportunity of <strong>using</strong> SCSs to make inter-organizational risk<br />
management efficient <strong>and</strong> effective, especially in contexts in which there are strict temporal<br />
requirements to satisfy. In the discussion I did not consider neither the technical aspects of SCSs nor<br />
the challenges that the adoption of SCSs poses for organizations, both at the technical <strong>and</strong> at the<br />
managerial level. Despite these challenges, the number of successful examples of enterprises <strong>and</strong><br />
government organizations adopting SCSs is continuously growing <strong>and</strong> the success conditions for<br />
SCSs adoption are becoming more <strong>and</strong> more clear. In particular, the best practices show that the<br />
highest chances of success depend on the integration of the new tools within existing workflows <strong>and</strong><br />
on their application to the core activities of the organization, so that their use is not perceived by the<br />
employees simply as another “to do” on an already crowded list of tasks.<br />
Risk management represents a central component of any organisation’s strategic management; from<br />
this point of view, the one discussed in the paper represents an interesting case for the application of<br />
SCSs. Moreover, in the paper risk management has been considered from the perspective of interorganizational<br />
cooperation; in the present interconnected world organizations will be more <strong>and</strong> more<br />
involved in inter-organizational cooperation. Thus, the problems discussed here, as well as the<br />
solutions suggested, are likely to be more <strong>and</strong> more central for organizations. Finally, the adoption of<br />
the new participatory technologies <strong>and</strong> tools within the TRM model exemplified in section 3 is such<br />
that the SCSs are directly integrated within existing workflows, thus satisfying also this success<br />
condition for the organizations’ adoption of Web 2.0 technologies.<br />
References<br />
AIRMIC, ALARM, IRM (2010), A structured approach to Enterprise Risk <strong>Management</strong> (ERM) <strong>and</strong> the<br />
requirements of ISO 31000, Association of Local Authority Risk Managers (ALARM) <strong>and</strong> The Institute of<br />
Risk <strong>Management</strong> (IRM).<br />
Alberts, C.J. <strong>and</strong> Dorofee, A.J. (2005), Mission Assurance Analysis Protocol (MAAP): Assessing Risk in Complex<br />
Environments,TECHNICAL NOTE, CMU/SEI-2005-TN-032, Carnegie Mellon University.<br />
Andrus, D.C. (2005), The Wiki <strong>and</strong> the Blog: Toward a Complex Adaptive Intelligence, Central Intelligence<br />
Agency, Washington, DC., 2005.<br />
Bughin, J., Chui, M., Miller, A. (2009). How companies are benefiting from Web 2.0, McKinsey Global Survey<br />
Results, The McKinsey Quarterly, 2009.<br />
Castelnovo, W. (2011), “Risk management in a Cooperation Context”, 11 th European Conference on e-<br />
Government (ECEG), Ljubljana, Slovenia, 16-17 June 2011.<br />
Doculabs (2010), Social Computing <strong>and</strong> Collaboration for the Enterprise: Enabling <strong>Knowledge</strong> Workers<br />
Productivity, Doculabs white paper, Chicago, USA.<br />
Ehrlich, K., Shami, N. S. (2010), “Microblogging inside <strong>and</strong> outside the workplace”, 4 th AAAI Conference on<br />
Weblogs <strong>and</strong> Social Media, Washington, DC, May 23-26, 2010.<br />
Higuera, R. P., Gluch, D. P., Dorofee, A. J., Murphy, R.L., Walker, J.A. <strong>and</strong> Williams, R. C. (1994), An<br />
Introduction to Team Risk <strong>Management</strong>. (Version 1.0), Special Report CMU/SEI-94-SR-1, Carnegie Mellon<br />
University.<br />
IMA (2007), Enterprise Risk <strong>Management</strong>: Tools <strong>and</strong> Techniques for Effective Implementation, Institute of<br />
<strong>Management</strong> Accountants.<br />
ISO (2009), ISO 31000:2009, International Organization for St<strong>and</strong>ardization.<br />
99
Walter Castelnovo<br />
Kolari, P., Finin, T., Lyons, K., Yesha, Y., Yesha, Y., Perelgut, S., Hawkins, J. (2007), “On the structure,<br />
properties <strong>and</strong> utility of internal corporate blogs”, Proceedings of the International Conference on Weblogs<br />
<strong>and</strong> Social Media (ICWSM 2007).<br />
Meyers, B.C. (2006), Risk <strong>Management</strong> Considerations for Interoperable Acquisition, TECHNICAL NOTE,<br />
CMU/SEI-2006-TN-032, Carnegie Mellon University.<br />
Richter, A., Riemer, K. (2009), Corporate Social Networking Sites - Modes of Use <strong>and</strong> Appropriation through Co-<br />
Evolution, 20th Australasian Conference on <strong>Information</strong>, 2-4 Dec 2009, Melbourne.<br />
Pascu, C. (2008), An Empirical Analysis of the Creation, Use <strong>and</strong> Adoption of Social Computing Applications,<br />
JRC Scientific <strong>and</strong> Technical Reports, European Communities.<br />
Wagner, C. (2004), “Wiki: A Technology For Conversational <strong>Knowledge</strong> <strong>Management</strong> And Group Collaboration”,<br />
Communications of the Association for <strong>Information</strong> Systems, 14, 2004.<br />
Young, O. (2007), Topic Overview: Web 2.0, Forrester Research, April 10, 2007.<br />
100
Embedding Human Values Into <strong>Information</strong> System<br />
Engineering Methodologies<br />
Sunil Choenni 1, 2 , Peter van Waart 2 <strong>and</strong> Geert de Haan 2<br />
1<br />
Research <strong>and</strong> Documentation Centre, Ministry of Justice, The Hague, The<br />
Netherl<strong>and</strong>s<br />
2<br />
Rotterdam University of Applied Sciences, The Netherl<strong>and</strong>s<br />
r.choenni@minjus.nl<br />
p.van.waart@hr.nl<br />
g.de.haan@hr.nl<br />
Abstract Many people are concerned about how information systems deal with human values such as privacy<br />
<strong>and</strong> trust. In this paper, we discuss the role of human values in the design of information systems. We elaborate<br />
on the nature of human values <strong>and</strong> discuss various approaches on how to address human values to prepare for<br />
system design. We discuss the meaning of values like 'privacy' <strong>and</strong> 'trust' in the area of healthcare <strong>and</strong> public<br />
safety. Subsequently, we illustrate our considerations, exemplifying how privacy <strong>and</strong> trust might be embedded in<br />
a healthcare system to monitor dementia patients <strong>and</strong> how privacy might be embedded in a public safety system.<br />
Finally, we discuss how human values may be addressed in the process of developing <strong>and</strong> implementing<br />
information systems.<br />
Keywords: human values, trust, privacy, healthcare, public safety, system engineering methodologies<br />
1. Introduction<br />
Through the years we have witnessed many failures of information system projects due to several<br />
reasons, ranging from communicational <strong>and</strong> organizational issues to technical ones. One such issue<br />
is a lack of communication <strong>and</strong> cooperation between technical- <strong>and</strong> business-oriented people <strong>and</strong> the<br />
(end) users of the systems. Business-oriented people usually focus on their wishes with regard to<br />
information system applications rather than on the feasibility of the system functionalities. It has<br />
turned out to be difficult to convince them of the unfeasibility of certain functionalities in an information<br />
system application. On the other h<strong>and</strong>, technical-oriented people work on information system<br />
applications from their own point of view <strong>and</strong> underst<strong>and</strong>ing <strong>and</strong> may implement all kinds of novel <strong>and</strong><br />
advanced functionalities without conferring with the (end) users about their needs. Often, these<br />
functionalities are considered as obstacles by the (end) users.<br />
To deal with these issues, the research <strong>and</strong> business communities have proposed many solutions<br />
<strong>and</strong> best practices, such as methodologies <strong>and</strong> techniques for the development cycle of information<br />
systems, project management tools <strong>and</strong> frameworks for the socio-technical approach. While the<br />
methodologies <strong>and</strong> techniques to support the development cycle of information systems <strong>and</strong> project<br />
management tools are mainly focused on the development of information systems in a proper way,<br />
the socio-technical approach focuses on developing a proper information system that should be of<br />
use to its users. The socio-technical approach encourages successive meetings in which developers,<br />
users <strong>and</strong> stakeholders discuss the functionalities/requirements of the information system to be<br />
built. These meetings are required until the proposed functionalities/requirements of all groups fit<br />
seamlessly (Laudon <strong>and</strong> Laudon, 1999). Recently, research questions related to a successful<br />
introduction of information systems in an organization drew the attention in many fields, such as<br />
healthcare, government, education <strong>and</strong> so on. Some issues that have been identified in the<br />
successful introduction of information systems in organizations are modelled in the so-called<br />
Technology Acceptance Model (TAM) (Davies, 1989; Venkatesh et al., 2003). In the basic TAM, the<br />
influence of determinants on technology acceptance is mediated by two individual beliefs: perceived<br />
ease of use <strong>and</strong> perceived usefulness. Perceived ease of use refers to the degree to which a person<br />
believes that <strong>using</strong> a particular system would be free of effort <strong>and</strong> perceived ease of usefulness refers<br />
to the degree to which a person believes that <strong>using</strong> a particular system would enhance her job<br />
performance. Meanwhile more advanced TAMs tailored to specific domains, such as healthcare (Wu<br />
et al., 2008), are reported. Nevertheless, many information systems do not seem to meet important<br />
requirements of the user, yet. As a consequence, these systems are often used inefficiently.<br />
In this paper, we focus on the role of human values in the acceptance of technology, especially<br />
information systems. In general, human values have a subjective <strong>and</strong> philosophical nature on a first<br />
glance. Furthermore, human values are open to different interpretations depending on the context.<br />
101
Sunil Choenni, Peter van Waart <strong>and</strong> Geert de Haan<br />
However, research in the field of human values has made this notion more seizable <strong>and</strong> applicable in<br />
several disciplines, such as industrial product development <strong>and</strong> marketing. Based on the insights that<br />
have been reported about human values we have made a number of them operational <strong>and</strong><br />
demonstrated how they may serve as (soft) requirements in developing information systems. We have<br />
elaborated the value ‘privacy’ in the fields of healthcare <strong>and</strong> public safety <strong>and</strong> the value ‘trust’ in the<br />
field of healthcare. <strong>Information</strong> systems, in which privacy is a major issue, have a better chance of<br />
being accepted if privacy is taken into account as a system requirement from the start of their<br />
development. As expected, privacy appeared to be a complex requirement to fulfil <strong>and</strong> needs to be<br />
enforced at a different level in a system. We have found that trust between caretaker <strong>and</strong> patient in<br />
healthcare is an important value that should not be replaced by information systems. The deployment<br />
of information systems is accepted in this field as long as it is regarded as an extension of the<br />
caretaker or patient. For example, a robot taking patients in a wheelchair to bed may not be accepted<br />
by the patients. However, if the robot is perceived as an extension of a human caretaker, the robot<br />
seems to be fully accepted.<br />
We have learned from our projects that the interpretation of human values is indeed context<br />
dependent <strong>and</strong> requires an effort to make them operational. Since the interpretations of human values<br />
are hard to capture in formal languages, we propose to use the elicited interpretations of human<br />
values as a set of guidelines through the design of an information system rather than as hard<br />
requirements that can be tested once the system is implemented. We propose to embed the<br />
guidelines in each development phase of an information system. Furthermore, after introducing an<br />
information system in practice, we argue for an evaluation phase which has a.o. as goal to determine<br />
to what extent human values are implemented successfully.<br />
The remainder of this paper is organised as follows. In section 2, we elaborate on the nature of<br />
human values. In section 3, we illustrate how privacy <strong>and</strong> trust are embedded in a healthcare system<br />
<strong>and</strong> how privacy is embedded in a public safety system. In section 4, we discuss how to embed<br />
human values in system engineering methodologies. Finally, section 5 concludes the paper.<br />
2. Human values<br />
A widely used definition of human values has been given in (Rokeach,1973). He defined a human<br />
value as “an enduring belief that a specific mode of conduct or end state of existence is personally or<br />
socially preferable to an opposite or converse mode of conduct or end state of its existence”.<br />
(Schwartz,1992) elaborated on the work of (Rokeach, 1973) <strong>and</strong> determined that values refer to<br />
desirable goals, that values are ordered by their importance relative to one another <strong>and</strong> that the<br />
relative importance of multiple values guides the actions of people. In (Bourdieu, 1984) it is revealed<br />
with an extensive empirical study, how human values determine amongst others people’s attitudes<br />
<strong>and</strong> opinions, lifestyle choices <strong>and</strong> consumption preferences. This is how one feels connected to<br />
others with similar value profiles <strong>and</strong> how one can distinguish oneself from others with different value<br />
profiles. That is why human value research proved to be an excellent way to make consumer<br />
segmentations in order to develop products <strong>and</strong> business propositions that suits one’s personal goals<br />
in life at best (Gutman 1982; Ascheberg <strong>and</strong> Uelzhoffer 1991).<br />
In the field of Human Computer Interaction (HCI), (Friedman 1996, 2006) coined the term valuesensitive<br />
design (VSD). Friedman argued that computer systems are biased by the values of their<br />
designers <strong>and</strong> engineers which may not match the value profiles of their users, but do enforce the<br />
worldview of their makers. (Shneiderman, 1999) already made a call to designers before, in 1990, to<br />
be aware of their responsibilities for designing systems that empower human values rather than<br />
endanger them. It could even be observed that computer code was sometimes functioning as<br />
regulation of society <strong>and</strong> laws were derived from this practice afterwards (Van den Hoven, 2007).<br />
When values are ordered by their importance relative to another <strong>and</strong> when this ordering distinguishes<br />
individuals from each other, then the question arises how system design should meet user values of<br />
larger populations. Conflicting value systems may occur when one person finds privacy more<br />
important than safety where for another person it may be the other way around. What implications<br />
would this have for, for example, safety control at airports where rather intrusive technology might be<br />
used for the sake of safety? Would it be possible to design this system in such a way that it respects<br />
the value profile of both persons? As the next step in the shift from the system, via the user, to the<br />
context of use, (Cockton 2004) proposes value-centered design (VCD). Compared to VSD, VCD does<br />
not try to put human values in the centre of the design process, but rather focuses on the value that is<br />
102
Sunil Choenni, Peter van Waart <strong>and</strong> Geert de Haan<br />
delivered as a result of the system, <strong>and</strong> that is perceived as valuable by people. Since value is a<br />
broad term that encompasses human values, value of use as well as economical value, (Cockton,<br />
2006) later renames VCD to worth-centered design (WCD) to distinguish it better from VSD. It is clear<br />
that WCD then is able to avoid the ethical aspects of design but also focuses less on a solution to<br />
resolve the issue of conflicting human value systems.<br />
In (Harper et al. 2008), it is argued that technologies can be designed to support human values but<br />
also to violate them. Given conflicting values, systems should be acknowledged as well as the context<br />
for which the technology is designed: privacy in a family context differs from privacy in a working<br />
environment. Therefore, the research <strong>and</strong> design cycle of study-design-build-evaluate is extended<br />
with an initial <strong>and</strong> new stage of underst<strong>and</strong> in which the human values designed for, are researched<br />
<strong>and</strong> considered. An interesting attempt to overcome conflicting values in design processes has been<br />
conducted by (Iversen et al., 2010). In a Participatory Design project stakeholders were facilitated by<br />
the designers to negotiate their value st<strong>and</strong>points continuously in a dialog. This complies with the idea<br />
of meaningful design (Van Waart, 2011) that discusses the requirements for systems design to<br />
facilitate social interaction between people <strong>and</strong> aid people’s goals in life.<br />
In our approach, we investigate the underlying human values of privacy <strong>and</strong> trust issues. Depending<br />
on the context of use <strong>and</strong> the personality of the users, it can be argued that trust <strong>and</strong> privacy are<br />
reflections of human values (Schwartz, 1992) such as conformity, security <strong>and</strong> self-direction. We have<br />
taken the participatory design approach to make the values privacy <strong>and</strong> trust operational in order to<br />
come up with a number of requirements that healthcare <strong>and</strong> public safety information systems should<br />
meet. In the next section, we discuss these requirements <strong>and</strong> how they are enforced in designing <strong>and</strong><br />
implementing the systems.<br />
3. Embedding human values in healthcare <strong>and</strong> public safety systems<br />
Privacy <strong>and</strong> trust are important human values in healthcare, while privacy plays an important role in<br />
public safety. Trust is an important aspect of relationships between people. When one (who trusts) is<br />
vulnerable to harm from someone else but believes that the other will not harm him although he could<br />
(trustee), then that is a matter of trust; balancing the harm we risk <strong>and</strong> the good we expect from<br />
others, <strong>and</strong> behaving upon that (Friedman et. al., 2006). Trust is always a trade-off between benefits<br />
<strong>and</strong> risks. Betrayal or lack of trust jeopardise the relationship people have with one other. In the health<br />
sector, the relationship between physicians <strong>and</strong> patients is extremely important <strong>and</strong> second only to<br />
family relationships, resulting in high expectations of patients, as the ones who trust, in healthcare<br />
systems (Erdem & Harrison-Walker, 2006). Interestingly, in an extensive literature review of trust in ehealth<br />
systems, it has been determined that trust influences users’ perceptions but does not<br />
necessarily affect their patterns of use (e.g. their behaviour) (Hardiker & Grant, 2011).<br />
Although privacy plays a role in healthcare as well as in public safety, the interpretation given to this<br />
value differs in these domains as will be illustrated in the two following subsections. While in the<br />
context of public safety privacy is primarily focussed toward the disclosure of the identity of<br />
individuals, in healthcare the main focus is on observing <strong>and</strong> keeping track of someone.<br />
3.1 Healthcare: privacy <strong>and</strong> trust as system requirements<br />
Today, small-scale ho<strong>using</strong> for dementia patients is gaining interest. The goal of the small-scale<br />
ho<strong>using</strong> project is to increase the quality of life of dementia patients by offering substitutes to the<br />
traditional nursing home. Approximately six dementia patients live together in such a house. The<br />
small-scale houses are often equipped with infrared sensors. These sensors are often used to alert<br />
staff in case a psycho-geriatric patient might need assistance, for example, because of a high risk of<br />
falling. Falling out of bed may cause fractures, which are costly to recover, especially in the case of<br />
elderly people. The frequency of false positive alarms is an often heard complaint. A false positive<br />
alarm may occur if for example the blanket or eiderdown falls down to the ground during the sleep.<br />
Responding to every alarm will cost valuable time of staff due to the large working area <strong>and</strong> may<br />
cause alarm fatigue. To deal with the problem of false positive alarms, in (Schikhof et al., 2010) the<br />
small-case houses are equipped with camera recorders, microphones <strong>and</strong> a server in addition to the<br />
infrared sensors. The microphones are required to distinguish between the falling of a blanket <strong>and</strong> the<br />
falling of a patient, for example, which make different kinds of sound. The server is used to process<br />
the signals of the sensors <strong>and</strong> the microphones. Whenever a threshold value is reached, the camera<br />
sends the images to the responsible staff, e.g., on their pda, see Figure 1.<br />
103
Sensor 1<br />
Sensor n<br />
Camera<br />
Sunil Choenni, Peter van Waart <strong>and</strong> Geert de Haan<br />
micro<br />
phone<br />
sensor<br />
data<br />
images<br />
sound<br />
Server<br />
images<br />
images<br />
media,<br />
(e.g., pda)<br />
media,<br />
(e.g., pda)<br />
Figure 1: Design of a health care system<br />
In the design of Figure 1, the issues of privacy <strong>and</strong> trust are taken care of in a manner that is<br />
acceptable for the patients <strong>and</strong> their relatives as well as for the staff. Since the server sends pictures<br />
to the staff, the patients <strong>and</strong> their relatives are ensured that the staff cannot watch the movements of<br />
the patients when not necessary, <strong>and</strong> therefore their privacy is not violated. The initial resistance<br />
against placing a camera in the house was taken away when the privacy of the patient is guaranteed.<br />
Furthermore, the system may be regarded as an extension of the staff <strong>and</strong> definitely not as a<br />
replacement of the staff. The staff can make an assessment of the situation in a house on the basis of<br />
the images on distance. When required, the staff can visit the house.<br />
This case illustrates a problem that needed to be solved given the requirements that trust <strong>and</strong> privacy<br />
should be respected. To come up with a solution as in Figure 1, one first needs to make the notions of<br />
trust <strong>and</strong> privacy operational in the context of healthcare. Questions that need to be addressed are:<br />
trust between whom <strong>and</strong> whose privacy? When is it acceptable to violate part of trust <strong>and</strong> privacy?<br />
By answering these questions <strong>and</strong> successive questions which were raised from the answers, the<br />
notions of trust <strong>and</strong> privacy are refined such that they can be embedded in the architecture of a<br />
system.<br />
3.2 Public safety: Privacy as system requirement<br />
Public safety is considered to be one of the cornerstones of an affluent <strong>and</strong> healthy society. After the<br />
9/11 events, we have seen a tremendous increase in the budget for the enforcement of public safety<br />
in many countries. Many organizations directly or indirectly involved in the enforcement of public<br />
safety started to collect <strong>and</strong> to publish safety related data. Policy makers have a practical need for<br />
statistical insights into public safety at different geographical levels of a society, ranging from the<br />
national to the regional level. For this purpose, data from several sources should be integrated <strong>and</strong><br />
stored in a uniform manner. In (Choenni & Leertouwer, 2010), a tool is presented that collects <strong>and</strong><br />
processes safety related data from relevant sources <strong>and</strong> presents it in an integrated <strong>and</strong> uniform way<br />
to users. The following types of issues can be addressed by the tool:<br />
Simple quantification. For example, the user could ask how many people in a region within a time<br />
period responded in a specific way to a specific survey question.<br />
Contextualisation of a quantifier. For example, how does the growth or decline of a specific figure<br />
in a geographical region relate to another figure. For example, increasing bicycle thefts in a<br />
neighbourhood can turn into a relative decline when local population growth exceeds it. This<br />
contextualisation must be considered in order to underst<strong>and</strong> the public safety data.<br />
104
Sunil Choenni, Peter van Waart <strong>and</strong> Geert de Haan<br />
Similarity queries, i.e. looking for regions that are similar in some respect. After querying for a<br />
specific data set in which some numbers st<strong>and</strong> out in some way, the user can query the tool for<br />
other regions that show similar numbers or trends.<br />
Major components of the tool are a data warehouse <strong>and</strong> an interface layer. Aggregated data collected<br />
from different databases at various regional levels are cleaned up <strong>and</strong> stored in the data warehouse.<br />
Furthermore, the data warehouse contains only attributes that meet up with the Dutch Personal Data<br />
Protection (PDPA) act. The PDPA dem<strong>and</strong>s the correct <strong>and</strong> thorough processing <strong>and</strong> collecting of<br />
personal data for clearly defined, explicit <strong>and</strong> justified goals. For example, the PDPA distinguishes a<br />
category of sensitive data that needs special attention, namely data on someone’s religion or life<br />
conviction, ethnic origin, political conviction, health, sexual orientation <strong>and</strong> memberships of employer’s<br />
organizations. Data that pertain to these attributes are not stored in the data warehouse.<br />
The interface layer consists of two modules, an input module, called the mashup module <strong>and</strong> a<br />
presentation module. The mashup module helps a user to define his information need in a userfriendly<br />
manner, like click-<strong>and</strong>-drag facilities. For the user of the tool, no knowledge is needed of<br />
either SQL or the underlying data warehouse structure. The user may also specify how the output<br />
should be presented. Before presenting the output, the presentation module performs some checks to<br />
minimize the violation of the privacy of individuals. For example, if there are just two sexual offenders<br />
in a region, this number will not be presented because there is a reasonable chance to deduce the<br />
persons concerned with some additional information.<br />
This case illustrates a problem that needed to be solved given the requirement that the privacy law<br />
<strong>and</strong> regulations should be respected. In this case, the notion of public safety should be made<br />
operational <strong>and</strong> how the notion of privacy is related to safety in order to come up with an acceptable<br />
solution. To prevent the violation of the privacy of individuals, privacy is taken care of at different<br />
components in the tool, <strong>and</strong> therefore embedded thorough the tool. We stress that only aggregated<br />
data <strong>and</strong> attributes that meet up with the PDPA act are stored in the data warehouse. Furthermore,<br />
whenever it appears that there is a risk of violation of a person’s privacy at the interface layer, the<br />
result will not or will only be partly shown to a user.<br />
4. From human values to system requirements<br />
An obvious goal of software development is that the system meets the stated requirements. However,<br />
complete <strong>and</strong> explicit requirements are rarely available, especially for contemporary complex<br />
systems. The user <strong>and</strong> the developers often have an incomplete underst<strong>and</strong>ing of the problem, <strong>and</strong><br />
therefore the requirements evolve during the development of the system, which is expected to be a<br />
solution for the problem. To support the development <strong>and</strong> implementation of a system, different<br />
variants of system engineering methodologies are available. Most of them distinguish more or less the<br />
same phases:<br />
Specification: the functionality of the system <strong>and</strong> its operating constraints are specified in detail,<br />
often in a formal language.<br />
Design: the overall structure, including the architecture, of the system is defined <strong>and</strong> specific<br />
components of the system are distinguished.<br />
Implementation: the system is implemented by means of a set of application software, such as<br />
programming languages, database management systems <strong>and</strong> other packages <strong>and</strong> libraries.<br />
Testing: the overall system is tested. Often the system is tested by feeding it with a set of input<br />
<strong>and</strong> checking whether the output by the system meets the expected output. In some sensitive<br />
branches, such as military systems, testing is done by tracking the percentage of code that is<br />
walked through for a set of given input, the so-called code coverage method.<br />
Operation: the system is delivered for <strong>using</strong> in practice.<br />
We note that in practice the above-mentioned steps are applied iteratively. In developing <strong>and</strong><br />
implementing an information system, the first phase may be marked as crucial since the successive<br />
phases take the output of the first phase as input for further development of the system. Although it is<br />
possible to go back to the first phase from any other phase in the development process, large scale<br />
changes of the functionality <strong>and</strong> requirements are often not encouraged, for reasons such as:<br />
completion of the system will be delayed, the development of the system will exceed the given<br />
budget, <strong>and</strong> so on. Therefore, it is worth the efforts to define all functionalities <strong>and</strong> requirements<br />
carefully <strong>and</strong> as extensive as possible. In the following we focus on the requirements. Although there<br />
105
Sunil Choenni, Peter van Waart <strong>and</strong> Geert de Haan<br />
are many tools available to elicit the requirements which a system should meet, ranging from defining<br />
several scenarios to protocol analysis, none of them are focussed explicitly toward requirements with<br />
regard to human values in the context of system engineering <strong>and</strong> how to express them in a formal<br />
language or embedding them in the architecture of a system.<br />
Mumford’s Ethics (1983) is among the first design process methods which pays considerable attention<br />
to human values; based on the idea that systems should not be imposed on people but rather<br />
address the needs of all stakeholders in a balanced way. In addition to job design goals like job<br />
satisfaction, efficiency <strong>and</strong> knowledge needs, she proposes to distinguish ethical or social values as<br />
an additional factor that should fit between what employees want <strong>and</strong> what they receive. Ethics<br />
should specifically be able to address the socio-cultural value-dimensions, like e.g. Individualism,<br />
Collectivism <strong>and</strong> Masculinity, Femininity, to distinguish between work- <strong>and</strong> other social cultures across<br />
the globe.<br />
The so-called Sc<strong>and</strong>inavian approach (Kyng, 1994) finds its basis in the worker-emancipation<br />
movement of the 1960’s. A key principle in the Sc<strong>and</strong>inavian approach is that designs should fit the<br />
way of working, thus requiring participatory design practices. Apart from participatory design, the<br />
approach also insists that attention is paid to the context of use, resulting in contextual design (Beyer<br />
<strong>and</strong> Holtzblatt, 1998) <strong>and</strong> situated design (Suchman, 1987), <strong>and</strong> that attention is paid to the working<br />
culture, thus giving raise to ethnographic analysis <strong>and</strong> design (Hughes et al., 1993). The number of<br />
different design approaches associated with the Sc<strong>and</strong>inavian approach indicates that design is<br />
rather situated <strong>and</strong> eclectic <strong>and</strong> that there is no such thing as a structured method (Kyng 1994;<br />
Suchman, 1987).<br />
We have learned from our projects that the interpretation of human values is indeed context<br />
dependent <strong>and</strong> requires an effort to make them operational. As illustrated in section 3, privacy is<br />
interpreted differently in the case of public safety than in the healthcare case. While in the public<br />
safety case privacy pertains to prevent the disclosure of an individual, in the health-care case the<br />
identity of the person is fully known. To find the proper interpretation of human values in a given<br />
context is a first step to make them operational <strong>and</strong> to specify them in a non-ambiguous way.<br />
Although to our best knowledge there are no specific tools or methods in system engineering that are<br />
focussed towards eliciting human values, existing tools <strong>and</strong> methods for eliciting implicit domain<br />
knowledge from experts may be used to elicit human values <strong>and</strong> its interpretations. So far, our<br />
experiences are that the interpretations are hard to capture in a set of formal specifications expressed<br />
in language. Therefore, we propose to use the elicited interpretations of human values as a set of<br />
guidelines through the design of an information system rather than as hard requirements that can be<br />
tested once the system has been implemented.<br />
To learn whether we have captured the proper interpretation of human values <strong>and</strong> have embedded<br />
the human values in a proper way, we propose to engage end users in all of the above-mentioned<br />
phases during an iterative design process.<br />
Specification process: Insights in value profiles can be gained through proven methods such as<br />
means-end-chain analysis (Gutman, 1982). This will result in generic insights rather than specific<br />
user requirements that would form the basis for system specifications by experts.<br />
Design: During the design process, design choices are made that involve trade-offs in privacy <strong>and</strong><br />
trust issues. Several alternatives can be validated by confronting end users with use-scenarios or<br />
prototypes <strong>and</strong> make end users give values to the different trade-off options.<br />
Implementation: Engineers should keep the end users’ human values in mind when developing<br />
the system. Design choices should not be fed by the world view of engineers only; engineers<br />
should adopt a mentality that keeps the values of end users in mind.<br />
Testing: When testing the system, not only functional features should be tested but also the<br />
effects on the end user experience <strong>and</strong> perception of usage, aesthetics <strong>and</strong> symbolic meaning<br />
(Van Waart, 2011).<br />
Operation: When the system is implemented in the daily context of use, specific attention should<br />
be paid to user acceptance <strong>and</strong> usage of the system. Does the system really empower end users<br />
in their activities <strong>and</strong> is the system perceived as a contribution to their well-being?<br />
At the end, we propose to distinguish an additional phase in system engineering methodologies: the<br />
evaluation phase. In this phase, the central question that should be answered is: has the proper<br />
106
Sunil Choenni, Peter van Waart <strong>and</strong> Geert de Haan<br />
information system been implemented? In other words, has an information system been delivered that<br />
meets the requirements of the user <strong>and</strong> which relevant human values are embedded? The measures<br />
perceived ease of use <strong>and</strong> perceived ease of usefulness might be important ingredients of the<br />
evaluation. We note that while in the field of social sciences there is an abundance of literature <strong>and</strong><br />
methods available to perform evaluations studies, knowledge about how to perform evaluations of<br />
information systems is in its childhood. How to set up an evaluation phase in system engineering<br />
requires research. However, good practices from evaluation studies in social sciences may be<br />
transformed to the distinguished evaluation phase.<br />
5. Conclusions<br />
Systems design involves the cooperation between different stakeholders with different interests <strong>and</strong><br />
values. In this paper we investigated human values <strong>and</strong> the role of human values in the area of<br />
systems design, in general. We exemplified the role of <strong>and</strong> difficulties in dealing with human values<br />
with two cases, derived from healthcare <strong>and</strong> public safety, respectively. The cases indicated some of<br />
the difficulties in identifying <strong>and</strong> particularly adhering to human values throughout design processes.<br />
Many different approaches have been suggested to deal with the values <strong>and</strong> interests of diverse<br />
stakeholders; an issue which will only become increasingly important when information systems are<br />
not only used to facilitate processes such as registration <strong>and</strong> administration but also start to have a<br />
direct role in people's lives.<br />
On the basis of our analysis, we conclude that we need to undertake three things. First, identify the<br />
human values in the requirement-gathering <strong>and</strong> the analysis processes in a good way, such that,<br />
early on in the design process, we will able to identify the human values at stake <strong>and</strong> explicitly agree<br />
upon those values that the proposed design should incorporate. In order to identify the human values<br />
that a design might affect, incorporate or neglect, we need to develop or adapt the specific tools <strong>and</strong><br />
techniques that enable us to do so, <strong>and</strong> presumably, to enable us to monitor the state of the humanvalue<br />
requirements periodically, during the entire design process. Secondly, an additional process<br />
step to identify the human values relating to design projects is only useful if the outcomes of such an<br />
evaluation process are used to steer the project. What is required here is that, at least, at the start of<br />
a design project, all stakeholders should be able to decide whether or not to go on with the design. In<br />
addition, an evaluation near the end of the development process, for example, as part of the<br />
acceptance test, could be used to assess whether the design has indeed fulfilled its human-value<br />
requirements <strong>and</strong> is 'safe' for use in the real world. Thirdly <strong>and</strong> finally, especially given that our<br />
software systems are increasingly connected to the outside world <strong>and</strong> are not longer living in the<br />
splendid isolation behind the data-entry office, we should extend the employment of human-focussed<br />
design methods.<br />
References<br />
Ascheberg C, Uelzhoffer J (1991) Transnational Consumer Cultures <strong>and</strong> Social Milieus. International Journal of<br />
Market Research 41(1)<br />
Beyer, H. & Holtzblatt, K. (1998) Contextual Design: Defining Customer-Centered Systems. Morgan Kaufmann.<br />
Bourdieu P (1984) Distinction: A Social Critique of the Judgement of Taste. Routledge, London.<br />
Choenni, S. <strong>and</strong> Leertouwer E. (2010) Public Safety Mashups to Support Policy Makers. Electronic Government<br />
<strong>and</strong> the <strong>Information</strong> Systems Perspective, EGOVIS 2010, Springer-Verlag.<br />
Cockton, G. (2004) Value-Centered HCI (2004) In Proceedings of NordiCHI 2004, ed. A. Hyrskykari, 149-160.<br />
Cockton, G. (2006) Designing Worth is Worth Designing. NordiCHI 2006, 14-18 October 2006<br />
Davis, F., (1989) . Perceived usefulness, perceived ease of use, <strong>and</strong> user acceptance of information technology,<br />
MIS Quarterly 13, 319.<br />
Erdem, S.A. <strong>and</strong> Harrison-Walker, L.J. (2006) The role of the Internet in physician—patient relationships: The<br />
issue of trust. Business Horizons 49.<br />
Friedman, B. (1996) Value-sensitive design. In: Interactions 3(6). ACM: New York.<br />
Friedman, B., Kahn, P. H., & Borning, A. (2006). Value Sensitive Design <strong>and</strong> <strong>Information</strong> Systems. Human<br />
Computer Interaction <strong>and</strong> <strong>Management</strong> <strong>Information</strong> Systems Foundations ME Sharpe New York, 3(6).<br />
Gutman J (1982) A Means-End Chain Model Based on Consumer Categorization Processes. Journal of<br />
Marketing 46.<br />
Hardiker, N.R. <strong>and</strong> Grant, M.J. (2011) Factors that influence public engagement with eHealth: A literature review.<br />
International Journal of Medical Informatics, 80.<br />
Harper, R. Rodden, T. Rogers, Y. Sellen, A. (2008). Being Human: Human-Computer Interaction in the Year<br />
2020. Microsoft Research, Cambridge.<br />
Hoffman, R. R. (1989). A survey of methods for eliciting the knowledge of experts. ACM SIGART Bulletin,. issue<br />
108, ACM, New York, NY, USA.<br />
107
Sunil Choenni, Peter van Waart <strong>and</strong> Geert de Haan<br />
Hughes, J.A., R<strong>and</strong>all, D. <strong>and</strong> Shapiro, D. (1993). From Ethnographic Record to System Design: Some<br />
Experiences from the Field. Computer Supported Cooperative Work.<br />
Iversen,O.S., Halskov,K. <strong>and</strong> Leong,T.W.(2010) Rekindling Values in Participatory Design. PDC10, 29-NOV-<br />
2010, Sydney, Australia.<br />
Kyng, M. (1994). Sc<strong>and</strong>inavian Design: users in product development. Proceedings CHI'94, pp. 3-9. ACM Press<br />
Laudon, K. C., & Laudon, J. P. (1999). Essentials of management information systems (3rd ed.). New Jersey:<br />
Prentice Hall<br />
Mumford E. (1983). Designing human systems for new technology: The ETHICS method. available from:<br />
http://www.enid.u-net.com/C1book1.htm.<br />
Rokeach M (1973) The Nature of Human Values. Free Press, New York<br />
Schikhof, Y., Mulder, I. & Choenni, S. (2010) Who will watch (over) me? Humane monitoring in dementia care.<br />
International Journal of Human-Computer Studies 68.<br />
Schwartz SH (1992) Universals in the content <strong>and</strong> structure of values: Theoretical advances <strong>and</strong> empirical<br />
tests in 20 countries. Advances in Experimental Social Psychology. Academic Press, San Diego.<br />
Shneiderman, B. (1999). Human values <strong>and</strong> the future of technology: a declaration of responsibility. ACM<br />
SIGCAS Computers <strong>and</strong> Society. Volume 29(3).<br />
Suchman, L.A. (1987). Plans <strong>and</strong> Situated Actions. Cambridge University Press.<br />
Van den Hoven, J., (2007). ICT <strong>and</strong> Value Sensitive Design, IFIP International Federation for <strong>Information</strong><br />
Processing 233.<br />
Van Waart, P., Mulder, I., & De Bont, C.J.P.M. (2011). Meaningful Advertising. In: Müller, H.J., Alt, F., & Michellis,<br />
D. Pervasive Advertising (in press). London: Springer<br />
Venkatesh V., Moris M., Davis G., et al., (2003). User acceptance of information technology: toward a unified<br />
view, MIS Quarterly, 27, 425-478<br />
Wu, J.H., Shen, W.S., Lin, M.H., Greenes, R.A., Bates, D.W. (2008). Testing the technology acceptance model<br />
for evaluating healthcare professionals’ intention to use an adverse event reporting system. International<br />
Journal for Quality in Healthcare, Advance Access.<br />
108
Evaluating the Role <strong>and</strong> Potential of Internet Banking: The<br />
Creditis Experience<br />
Renata Paola Dameri<br />
University of Genova, Italy<br />
dameri@economia.unige.it<br />
Abstract: Online banking has become a pervasive phenomenon that has profoundly affected the nature of<br />
banking <strong>and</strong> the financial institution products portfolio. Yet the challenges for banks are more <strong>and</strong> more difficult,<br />
as Internet is a mature <strong>and</strong> widespread instrument, not able for itself to create distinctive <strong>and</strong> competitive<br />
advantage. Banks should therefore use Internet to support their own specific strategic actions well aligning the<br />
technological aspects <strong>and</strong> the business goals. In this work the author presents an analysis of Banca Carige<br />
business case, to show how it sucessfully addressed its specific innovation program based on the Internet, to<br />
overcome some difficulties due to the globalisation <strong>and</strong> the increased competition on financial markets. The key<br />
issue of this success are: the focus on three key aspects: innovation, strategic alignment, evaluation; the<br />
structured methodology used to align market challenges <strong>and</strong> strategic goals with the use of Internet; the clear set<br />
out of the expected benefits, respect to the strategic goals of the initiative.<br />
Keywords: CRM, Internet banking, cost/benefits evaluation, strategic ICT<br />
1. Introduction<br />
During the latest ten years, banking has been changing for several reasons.<br />
Banking globalisation <strong>and</strong> financial markets widening produced lower barriers to entry <strong>and</strong> higher<br />
competitiveness.<br />
Higher competitiveness requires banks to reduce the price of their common products, but gaining<br />
higher margins by more efficiency on one side <strong>and</strong> distinctive products <strong>and</strong> services on the other.<br />
The global market <strong>and</strong> the role of Internet in the financial sector brought about new actors able to<br />
deliver financial services at lower cost, <strong>using</strong> more innovative channels <strong>and</strong> especially the web<br />
site.<br />
Customers are more exigent <strong>and</strong> hard to please; they are open to change bank if they think they<br />
are not well served.<br />
Recent financial sc<strong>and</strong>als caused lack of confidence in financial institutions; customers need to<br />
gain trust in their bank again.<br />
These aspects moved banks <strong>and</strong> financial institutions to face the more difficult environment with<br />
policies <strong>and</strong> strategic choices, aiming to defend their market share <strong>and</strong> preserve their customers’<br />
loyalty. ICT is one instrument, able to support banks strategic efforts in creating more effective<br />
customer relationships. The role of information systems in banking has ever been crucial. However, in<br />
the past, operational aspects have been more important; the Internet moved the attention towards the<br />
relational aspects, especially with customers. Financial institutions could use their web site to develop<br />
new retailing chains, to improve their relationships with their customers or to deliver new products.<br />
Internet could be a strategic weapon to improve quality, specificity, diffuseness <strong>and</strong> timeliness of<br />
financial services. Moreover, the web site, supported by specific instruments such as analytic CRM,<br />
could collect crucial information about bank customers <strong>and</strong> their behaviour <strong>and</strong> preferences in <strong>using</strong><br />
financial services. However, to obtain such results banks should clearly define their aims, align ICT<br />
instruments with their strategic goals <strong>and</strong> evaluate the returns. Not ever these activities are effectively<br />
defined <strong>and</strong> exploited.<br />
In this paper, the author aims to analyse the role of Internet <strong>and</strong> web sites in developing new financial<br />
services <strong>and</strong> more effective relationships with bank customers. The paper is divided into two sections.<br />
The first section focuses on the diffusion of web sites in banking, the adoption rate of Internet in<br />
financial services supply <strong>and</strong> the amount of expenditure in ICT <strong>and</strong> Internet projects by banks. It also<br />
deepens the use of Internet <strong>and</strong> web sites related to specific strategic goals <strong>and</strong> the role of ICT in<br />
reaching them. Literature shows poor surveys <strong>and</strong> studies about the effectiveness of web sites in<br />
realising banking strategies, especially regarding customers loyalty <strong>and</strong> trust. The paper analyses the<br />
type of expected benefits from web sites <strong>and</strong> Internet projects, trying to define a set of evaluation<br />
instruments, able to measure the impact of ICT expenditure on gained benefits.<br />
109
Renata Paola Dameri<br />
In the second section of the paper a business case is studied, to demonstrate that it is possible:<br />
To use Internet <strong>and</strong> the web site to collect information about customers’ behaviour <strong>and</strong><br />
preferences <strong>and</strong> to use this information to pursue specific strategic goals;<br />
To link strategic goals with ICT projects <strong>and</strong> performance, <strong>and</strong> to measure the obtained results;<br />
To evaluate the effectiveness <strong>and</strong> the return on investments of web projects.<br />
2. Diffusion of internet in financial institutions<br />
Banks <strong>and</strong> financial institutions have ever been top ICT spenders; also nowadays banks account for a<br />
large share of total ICT spending all over the world: in 2009 they accounted for the 10% of the total<br />
spending in ICT (Global Insight 2009). Historical trends show that ratios between ICT spending <strong>and</strong><br />
operational cost or gross margin are ever higher than the average in other industries <strong>and</strong> business<br />
sectors (OECD 2010). During the latest 50 years, ICT in banks has been especially used for<br />
supporting operational activities. Thanks to ICT, banks have been able to exp<strong>and</strong> their activities,<br />
gaining higher efficiency <strong>and</strong> offering better services to their customers at adequate prices.<br />
However, ICT in banks has also been used to innovate business models <strong>and</strong> services; from ATM to<br />
web banking, all technologies have been adapted to bank specific products, to realize both ICTsupported<br />
internal processes, <strong>and</strong> ICT-based customer services. During the latest ten years, Internet<br />
<strong>and</strong> the web have been the most important technology for banks. Indeed, Internet is a flexible<br />
technology, able to cover several aspects of data processing: from process automation, to data<br />
storage, from information management to customer communication. For these reasons, Internet is a<br />
common instrument, but able to transform business models in several ways: from simple virtual<br />
replication of traditional business models, to creation of completely new business models (Wielki<br />
2010).<br />
If we analyze bank service portfolios, we can note that almost all financial services are influenced by<br />
the use of the Internet. However, several financial services are indeed based on old business models,<br />
but modernized by product or infrastructure virtualization. For example, the on-line current account is<br />
no more than the old current account, but the business infrastructure is virtualized. Credit cards are a<br />
new product, based on the virtualization of both the product (the electronic money) <strong>and</strong> the business<br />
infrastructure on which payment is based.<br />
As financial business is an intangible product, the use of ICT <strong>and</strong> the Internet is particularly useful in<br />
banking. Indeed, banks <strong>and</strong> financial institutions aim to gain several benefits from the use of ICT <strong>and</strong><br />
the Internet in their activities, both in operational internal processes <strong>and</strong> in offering services to their<br />
customers. We can list a set of expected benefits from Internet in banking from more traditional use to<br />
more innovative one (see the Wielki model):<br />
To improve the efficiency of banking business processes, reducing manual operations <strong>and</strong><br />
execution time;<br />
To customize financial services;<br />
To create innovative channels to sell financial services;<br />
to create innovative relationships with their own customers;<br />
To create a value constellation, including the customer in the service production activity <strong>and</strong><br />
therefore in the value chain (Normann <strong>and</strong> Ramirez 1993).<br />
Therefore, the use of the Internet is a potential success factor for financial institutions, as they could<br />
invest in a low cost technology <strong>and</strong> to gain several benefits, from different value drivers of their<br />
business. However, Internet is also very widespread in banking; financial institutions have been very<br />
fast in adopting web-based applications, web sites <strong>and</strong> so on. Therefore, it is not possible to gain<br />
competitive advantage in banking simply based on Internet adoption. Perhaps Internet has been a<br />
strategic weapon during the first stage of its adoption in business; but opportunities for advantage are<br />
not available indefinitely. Internet is nowadays a commodity <strong>and</strong> no more a success factor nor for<br />
financial institutions, not for other business. Indeed, Internet is a resource essential for competition<br />
<strong>and</strong> banks are not able to compete or survive on financial markets without Internet both in internal<br />
processes <strong>and</strong> in services for the customers (Carr 2003).<br />
110
Renata Paola Dameri<br />
For these reasons, bank ICT strategies should move towards a double-level use of the Internet: at the<br />
basis level, Internet is adopted like a common resource <strong>and</strong> it is used with the aim to support<br />
efficiency in business process, reducing the operational <strong>and</strong> capital expenditures connected with the<br />
aodption of web-based applications; at the high level, Internet is used like a strategic lever to support<br />
specific strategic aims.<br />
This second use of Internet needs a different approach, not based on the relations between ICT<br />
expenditure (to control or reduce) <strong>and</strong> process efficiency (to improve <strong>and</strong> optimize), but on three value<br />
driver linked each others, innovation, alignment, evaluation:<br />
Innovation means to shift ICT expenditure from operational functioning to innovative projects;<br />
Alignment means to coordinate ICT <strong>and</strong> Internet investments with business strategies,<br />
considering also internal control <strong>and</strong> external communications;<br />
Evaluation means not to invest in ICT <strong>and</strong> the Internet without strategic assessment of the project,<br />
return measurement <strong>and</strong> success evaluation of each web-based initiative.<br />
3. Innovating services, aligning business strategy <strong>and</strong> evaluating the obtained<br />
results: The Creditis experience<br />
The Banca Carige Group is one of the six leading banking, insurance <strong>and</strong> pension groups in Italy. It<br />
has more than 1,000 sales outlets (bank branches <strong>and</strong> insurance agencies) based throughout Italy,<br />
<strong>and</strong> over 2 million customers who are either households, professionals, small <strong>and</strong> medium-sized<br />
businesses <strong>and</strong> cottage industries. Besides the Parent Company, Banca Carige, the Group includes<br />
another four banks (Cassa di Risparmio di Savona, Cassa di Risparmio di Carrara, Banca del Monte<br />
di Lucca, Banca Cesare Ponti), the asset management company Carige Asset <strong>Management</strong> Sgr, <strong>and</strong><br />
the insurance companies Carige Assicurazioni (non-life insurance) <strong>and</strong> Carige Vita Nuova (life<br />
insurance).<br />
Carige is also the majority shareholder of Creditis Servizi Finanziari, a company specialized in<br />
consumer credit. This paper introduces the business case of Valea, the Creditis revolving credit card<br />
realising an on-line product based on consumer credit. Valea is very simple to use: the customer<br />
obtains from Banca Carige an overcraft limit; it is credited to Valea. Paying by Valea the overcraft limit<br />
is reduced, <strong>and</strong> the customer replaces it by monthly installments. Valea is not a simple credit card, not<br />
only because it is based on a funding contract, but also because each customer can customize his<br />
own card <strong>using</strong> the online customised service available on the web site of Creditis. Therefore, Valea<br />
incorporates in a credit card a loan self-managed by the customer.<br />
This business case explains how Banca Carige used some evaluating instruments – both before <strong>and</strong><br />
after the introduction of its new product Valea – to align ICT instruments with its strategies, to<br />
innovate its financial services <strong>and</strong> to measure the success of this initiative. Indedd, Internet is very<br />
widespread in banking; therefore, the use of web sites <strong>and</strong> other Internet instruments is no more a<br />
strategic weapon. To obtain satisfying results by financial products based on Internet, three positive<br />
behaviour are needed:<br />
To support strategic choices based on the use of Internet in banking with alignment between<br />
specific strategic aims <strong>and</strong> specific ICT technonolgies <strong>and</strong> applications;<br />
To real innovate the financial product or service <strong>using</strong> the Internet to change one or more of its<br />
characteristics;<br />
To define an integrated instrument to both support the choices <strong>and</strong> the desing of new financial<br />
services in the development phase, <strong>and</strong> to measure the obtained returns in the postimplementation<br />
phase.<br />
Sometimes to designing an evaluation instrument to support both the ex-ante choices <strong>and</strong> the ex-post<br />
assessment is complex; in other cases, it is not so difficult to reshape classic evaluation models just<br />
for a specific business need. In this business case, I suggested to Banca Carige to adopt the<br />
Henderson <strong>and</strong> Venkatraman ICT alignment model to both analize <strong>and</strong> define their strategic path, <strong>and</strong><br />
to assess the results after the first implementation; this also to judge if their investment produced the<br />
expected benefits <strong>and</strong> if they wanted to continue the project or not.<br />
The well known Henderson <strong>and</strong> Venkatraman model (Fig. 1) defines how a company should both<br />
creates a strategic fit between its internal organization structures <strong>and</strong> its external strategies, <strong>and</strong> in<br />
the meantime to create a functional integration between business <strong>and</strong> ICT. This model is a real<br />
111
Renata Paola Dameri<br />
manifesto of IT/business alignment; it introduces a guide for IT <strong>and</strong> business managers, to drive their<br />
ICT choices <strong>and</strong> investments, not only to obtain the best results from them, but also to build the base<br />
of the computerised company, able to exploit all the best of next improvements in information<br />
technology during the following years.<br />
This model could be applied also to Internet banking. Indeed, considering the Wielki model <strong>and</strong><br />
comparing it with the Henderson <strong>and</strong> Venkatraman one, <strong>and</strong> also with the consideration of Carr, we<br />
can argue that:<br />
Internet is a mature technology for banking;<br />
To obtain business benefits from Internet banking, new business models should be defined,<br />
linking ICT, Internet technologies <strong>and</strong> strategies in financial services;<br />
To define new business models, ICT <strong>and</strong> strategic business choices should be aligned,<br />
considering the Internet technology available in the environment like a commodity <strong>and</strong> defining<br />
new products, services <strong>and</strong> financial strategies around it.<br />
Banca Carige developed its own Alignment&Evaluation Instrument, applying the Henderson <strong>and</strong><br />
Venkatraman model in the Coleman <strong>and</strong> Papp version called “IT Infrastructure Fusion” (Fig. 2). It<br />
assumes ICT technologies as given <strong>and</strong> considers two implementation paths: the first paths moves<br />
from business strategy across organization (business process, products <strong>and</strong> services), to the ICT<br />
infrastructure; the second path ever moves from the business strategy, across ICT strategy <strong>and</strong> to<br />
ICT infrastructure too.<br />
Figure 1: ICT <strong>and</strong> business strategic alignment: Henderson <strong>and</strong> Venkatraman model (source:<br />
Henderson <strong>and</strong> Venkatraman, 1992)<br />
Using this implementation model Banca Carige was able to define its own Alignment&Evaluation<br />
Instrument both to support its decision about a new financial service based on Internet technology –<br />
Valea Card – <strong>and</strong> to evaluate the obtained results after the impementation <strong>and</strong> launch on the market<br />
of this new product. The business case is here described following the structure of this instrument,<br />
that is in four steps:<br />
Strategic design <strong>and</strong> implementation: alignment;<br />
Financial service design: innovation;<br />
Strategic use of Internet to realize the financial service <strong>and</strong> the business strategy: IT fusion;<br />
112
Final assessment <strong>and</strong> evaluation.<br />
Renata Paola Dameri<br />
Figure 2: Strategic alignment perspectives: The IT infrastructure fusion perspective (source:<br />
Henderson <strong>and</strong> Venkatraman, 1993)<br />
3.1 Strategic design <strong>and</strong> implementation: alignment<br />
The strategic aim of Banca Carige was to better enter into the consumer credit market; this is a very<br />
interesting secoter for italian banks, because consumer credit in Italy is less developed than in other<br />
european countries, but the growth rate shows that this type of financial service is gaining more <strong>and</strong><br />
more the favour of customers, especially young men <strong>and</strong> women (Fig. 3).<br />
Ratio between consumer credit <strong>and</strong> GDP<br />
Consumer credit growth rate (2003-<br />
2008)<br />
Figure 3: Consumer credit in Italy <strong>and</strong> in Europe (source: BCE <strong>and</strong> Thomson Financial Datastream)<br />
Banca Carige considered consumer credit an interesting market, but it knew that to successfully enter<br />
this market it was necessary to win the competition with non-bank financial institution, more<br />
aggressive in their policies <strong>and</strong> strategies <strong>and</strong> less bound to complain with banking rules. For this<br />
reason, it was necessary to apply the three behaviuors explained above: alignment, innovation,<br />
evaluation.<br />
Banca Carige defined its own strategic aims, considering:<br />
That consumer credit is less developned in Italy, so that it is possibl,e for a large italian bank to<br />
gain market share, <strong>using</strong> its own well widespread retail network all over the country;<br />
That consumer credit could be used not ony to exp<strong>and</strong> the business, but also to catch new young<br />
customers thanks to innovative products, or to retain old customers gaining their trustu <strong>and</strong> fidelity<br />
113
Renata Paola Dameri<br />
through the strategic combination of the strong br<strong>and</strong> of Banca Carige, the large retail network<br />
<strong>and</strong> the use of Internet.<br />
Banca Carige used its Creditis Servizi Finanziari company to support the new business; this company<br />
was considered the right answer to the challenges issued by the more competitive financial market:<br />
Creditis is leaner than a large bank, so it is more able to compete with the new non-bank financial<br />
institution;<br />
People working in Creditis are younger than the average working in Banca Carige; they are better<br />
skilled for the use of Internet in financial products <strong>and</strong> services;<br />
Credits could use the banca Carige br<strong>and</strong> <strong>and</strong> retail network to both create new relationships with<br />
old customers <strong>and</strong> to catch new customers on the market.<br />
At the <strong>and</strong> of this first step, Banca Carige was able to clearly define its<br />
Business scope,<br />
Distinctive competencies <strong>and</strong><br />
Strategic aims (see Business strategy in Fig. 1).<br />
In details:<br />
To launch a new product in consumer credit, a revolving credit card, offered both to old customers<br />
<strong>and</strong> to new customers, especially young people;<br />
To base its strategic initiatives on its distinctive resources: affirmed <strong>and</strong> well known br<strong>and</strong> <strong>and</strong> a<br />
large retail network;<br />
To gain a satisfactory market share in the consumer credit business both catching new customers<br />
<strong>and</strong> retaining old customers.<br />
Linked to the strategic aims, it is possibile to define some indicators to measure the success of this<br />
project, for example:<br />
Number of Valea revolving cards issued;<br />
Number of new customers, respect to old ones, subscribing a revolving card Valea;<br />
Market share respect to competitors;<br />
Cost/revenue ratio of the project (including Internet infrastructure, the web site <strong>and</strong> so on);<br />
Type of channel used to subscribe the revolving card: the traditional retail network or the web site.<br />
Fig. 4 <strong>and</strong> 5 are used to explicitly set out the alignment between business needs <strong>and</strong> strategic goals,<br />
<strong>and</strong> the expected benefits from the new initiative.<br />
BUSINESS NEEDS STRATEGIC GOALS<br />
Banking globalisation <strong>and</strong> higher competitiveness Gain competitive advantage thanks to new, innovative<br />
products, but based on the historical <strong>and</strong> strong br<strong>and</strong><br />
Role of Internet in the financial sector, Internet as a<br />
mature <strong>and</strong> no distinctive technology<br />
Using Internet to supply innovative products<br />
More exigent <strong>and</strong> hard to please customers Retain <strong>and</strong> satisfy customers thanks to easier to use<br />
<strong>and</strong> self tailored services<br />
Lack of confidence Using Internet to grant transparency in financial<br />
contracts <strong>and</strong> on line availability of information about<br />
products, services <strong>and</strong> applied conditions<br />
Price reduction of common products, higher margins<br />
by distinctive services<br />
Figure 4: Explicit alignment bewteen business needs <strong>and</strong> strategic goals<br />
114<br />
To enlarge portfolio products thanks to the Internet,<br />
offering customised services at lower prices, but also<br />
with lower cost for the bank
Renata Paola Dameri<br />
STRATEGIC GOALS EXPECTED BENEFITS<br />
Gain competitive advantage thanks to new,<br />
innovative products, but based on the historical <strong>and</strong><br />
strong br<strong>and</strong><br />
Higher market share respect to competitiors, number<br />
of new customers<br />
Using Internet to supply innovative products Number of new contracts sold, number of web site<br />
visits<br />
Retain <strong>and</strong> satisfy customers thanks to easier to use Number of new contracts with old customers<br />
<strong>and</strong> self tailored services<br />
Using Internet to grant transparency in financial<br />
contracts <strong>and</strong> on line availability of information about<br />
products, services <strong>and</strong> applied conditions<br />
To enlarge portfolio products thanks to the Internet,<br />
offering customised services at lower prices, but also<br />
with lower cost for the bank<br />
Figure 5: Explict set out of expected benefits<br />
3.2 Financial service design: innovation<br />
Customer satisfaction<br />
Cost <strong>and</strong> returns of the project<br />
How to innovate this product, Valea revolving card? Banca Carige choiced a mix of technology <strong>and</strong><br />
customer orientation. Banks are used to await customers into their own branches <strong>and</strong> agencies;<br />
traditionally bank services are “pull-type”: the customers ask to their bank the service they need for (or<br />
an advice to solve their own specific financial need, or which is the more suitable financial product for<br />
them). Creditis defined a new product more customer oriented; a “push-type” one, where the bank<br />
suggests it to the customers without awaiting the request by them.<br />
The marketing mix to promote this product is largely based on the Internet:<br />
A new distribution channel, the Creditis web site, accessible also from the Banca Carige web site:<br />
this enforces the guarantee role of the well known large bank behind the Creditis new company<br />
(less known);<br />
A new type of financial service, customised by the customer himself <strong>using</strong> the potential of the web<br />
site; in this way, Creditis aims to create a value constellation including the customer as active<br />
subject of the value creation process;<br />
A new communication strategy, able to support the br<strong>and</strong> extension <strong>and</strong> awareness of the<br />
affordability of Creditis, based on Banca Carige strong reputation, but also a fresh <strong>and</strong> innovative<br />
look for Creditis.<br />
Using both the web site <strong>and</strong> an Internet advertising campaign, Banca Carige aims at positioning<br />
Creditis <strong>and</strong> its Valea revolving card in a distinctive manner respect to competitors. Indeed, thanks to<br />
a market research on the consumer credit market, Banca Carige argued that its main competitors are:<br />
Traditional banks, <strong>using</strong> their strong br<strong>and</strong> <strong>and</strong> traditional distribution channel to reach their old<br />
customers, but weak in the Internet banking sector respect to the new financial companies;<br />
New financial companies specialised in consumer credit, often Internet pure players, strong on<br />
the electronic market but weak in reputation <strong>and</strong> trust by the customers.<br />
Mixing the strong br<strong>and</strong> of Banca Carige with the new Internet technologies <strong>and</strong> the electronic<br />
channel, supported by an innovative Internet adverstising, Creditis aims to overcome the weaknesses<br />
of its competitors. To implement the strategic aimes into the innovative service, Banca Carige defined<br />
a path to pursue during the implementation of Valea revolving card, <strong>using</strong> this framework also to<br />
share goals, instruments <strong>and</strong> required skills all over the company (Fig. 6). The framework is the basis<br />
to build the mix between the service characteristics, the use of the Internet technology, the<br />
communication strategy <strong>and</strong> the business strategy.<br />
Br<strong>and</strong><br />
Awareness<br />
Br<strong>and</strong><br />
Experience<br />
Prospect<br />
Acquisition<br />
Figure 6: From br<strong>and</strong> awareness to customer loyalty<br />
115<br />
Prospect<br />
to Customer<br />
Conversion<br />
Customer<br />
Loyalty
Renata Paola Dameri<br />
3.3 Strategic use of Internet to realize the financial service <strong>and</strong> the business strategy:<br />
IT fusion<br />
Internet is the technological basis for both the business processes <strong>and</strong> the financial service<br />
incorpored in Valea. IT is in this case rally pervasive of products, processes, strategies. The fusion<br />
between IT <strong>and</strong> business strategy is native <strong>and</strong> not subsequential: this fusion has been conceived till<br />
the beginning of the whole project. As shown in Fig. 6, the company strategies are the starting point to<br />
plan the financial service implementation, defining its life cycle. The web site is the main IT instrument<br />
to support the deliver of the consumer credit through the revolving card Valea.<br />
Fig. 6 introduces five steps in the service implementation; each of them is the concrete realization of<br />
one specific strategic aim through the technology incorporated into the business process.<br />
The first step – Br<strong>and</strong> Awareness exploits the main distinctive <strong>and</strong> strategic resource on with business<br />
project has been conceived: the strongness of the Banca Carige br<strong>and</strong>. For this reason, in this phase<br />
the website serves as a shop window, just to promote the br<strong>and</strong> <strong>and</strong> to publish information about both<br />
the Creditis company <strong>and</strong> its products <strong>and</strong> financial services. The aim is to create the awareness in<br />
customers, regarding the link between the well known holding – Banca Carige, the Creditis company<br />
specialized in consumer credit, <strong>and</strong> the new product – Valea.<br />
During the following steps, the web site is transformed into an e-commerce site, with the possibility for<br />
the customers to subscribe the Valea card <strong>and</strong> therefore the funding contract. The catching of new<br />
customers happens through three phases: Br<strong>and</strong> Experience, Prospect Acquisition <strong>and</strong> Client<br />
Conversion. These three steps aim to get about the new product Valea, well linked with Carige br<strong>and</strong>,<br />
to advertise the Valea both to the old <strong>and</strong> to the new customers in a customised way, <strong>and</strong> finally to<br />
transform the prospect into a customer. What is a prospect? It is a well defined customer type, to<br />
which the advertising Internet campaign is addressed. Banca Carige used a very complex market<br />
research to define the prospect potentially interested in the new product Valea, supplied by the web<br />
channel. Generally, it is a young man or woman (aged 25-44), Internet user, interested in consumer<br />
credit, well defined respect to his/her purchasing style, that is: not very careful in choising the<br />
products or services <strong>and</strong> with a good income. This type is called “financial customer”. Applying this<br />
prospect selection, Banca Carige segmented the potential customers (Fig.7); the set of potential<br />
subscribers of Valea is composed by 357 thous<strong>and</strong>s people (Source: Eurisko).<br />
Aged 22-44 (68%)<br />
Interner user 60%<br />
Purchasing style: Financial Customer (7,74 ml people)<br />
Interested in consumer credit 337.000<br />
Figure 7: The prospect focus target<br />
Depending on the prospect <strong>and</strong> on the goals of these three steps, Banca Carige <strong>and</strong> Creditis defined<br />
the technology scope to be applied to the web site. Well defined objectives have been deployed; they<br />
are:<br />
To sustain the br<strong>and</strong> awareness in people composing the focus target (they are not customers<br />
yet);<br />
To introduce institutional information about the company, enforcing trust in its affordability;<br />
To enter in touch with the higher number of people belonging to the focus target <strong>and</strong> responding<br />
to the prospect profile, <strong>using</strong> the Internet advertising campaign (for example, banners in some<br />
search engines or in well-choiced vertical portals);<br />
116
Renata Paola Dameri<br />
To clearly communicate the characteristics <strong>and</strong> adavantages of the new product Valea revolving<br />
card;<br />
To promote the card subcription, converting prospects into customers.<br />
The definition of these measurable goals permits to evaluate the effectiveness of the web site, respect<br />
to the strategic goals.<br />
It would especially important in the last step, when Banca Carige should evaluate the success of this<br />
Internet based business project, to decide if continue it <strong>and</strong> to develop new marketing policies to<br />
enforce the customer’s loyalty.<br />
3.4 Final assessment <strong>and</strong> evaluation<br />
The use of a formal method such as the revisited Henderson <strong>and</strong> Ventrakaman model to support the<br />
strategic alignment between banks strategies <strong>and</strong> the use of Internet permits also to well define<br />
awaited benefits <strong>and</strong> performance indicators, able to assess the effectiveness <strong>and</strong> the success of the<br />
initiative <strong>and</strong> to support decisions for the future of the project.<br />
Banca Carige have been starting the project at the end of 2009, just before the Chistmas period. In<br />
2010 the project has been carrying on, with some interesting results. The evaluation of the whole<br />
initiative is at the moment only partial, but Banca Carige <strong>and</strong> Creditis have all the instruments to<br />
pursue a strategic assessment of their choices.<br />
We can analyse the reached results <strong>and</strong> the performance indicators distinguishing between:<br />
Strategic goals;<br />
Innovation goals;<br />
Economic goals.<br />
The main strategic goals were to catch new customers <strong>and</strong> to introduce consumer credit to old bank<br />
customers. These strategic goals are really easy to measure; the most interesting aspect regards the<br />
segmentation between the two types of customer, old <strong>and</strong> new ones. The statistics demonstrate that<br />
the new customers are more than the old <strong>and</strong> that they really respond to the prospect defined by<br />
Banca Carige. The number of Valesa card issued is judged satisfying in the launch phase of its life<br />
cycle.<br />
The innovation goals especially regard the possibility of <strong>using</strong> Internet to promote <strong>and</strong> further to sell a<br />
new financial product, <strong>and</strong> also the use of Internet <strong>and</strong> web sites to sustain the company br<strong>and</strong> or its<br />
look. To evaluate these apects, specific key performance indicators have benn used, such as<br />
impressions number or direct response. In this case, the indicators show that it is better to create two<br />
web site: the Creditis institutional web sit, with information about the company <strong>and</strong> its products <strong>and</strong><br />
services; <strong>and</strong> the commercial web site Valea, to support the best customisation of the product <strong>and</strong> a<br />
high involvment of each customer in the value chain.<br />
Economic goals are used to underts<strong>and</strong> if revenue deriving from Valea revolving card related to the<br />
cost of the project are positive or negative. The evaluation confirms that Internet is not a good<br />
instrument to increase revenues or to reduce cost; instead it is very powerful if used like a lever to<br />
gain compatitive advantages exploting some distinctive resources such as the br<strong>and</strong>, the retail<br />
network <strong>and</strong> so on. Creditis has been able to calculate the gross margin of its initiative <strong>and</strong> it is<br />
positive. But Banca Carige thinks that the best result has been the number of people entering in touch<br />
with its br<strong>and</strong>, to consolidate its positiningin the Italian bank sector <strong>and</strong> to enforce the trust<br />
traditionally recognise to him by its customers. Banca Carige is a very traditional financial company in<br />
Italy <strong>and</strong> its customers are aged; the use of the Internet is an important media to spread its positive<br />
reputation also between the new generations.<br />
References<br />
Arnold I., van Ewijk S. (2011), “Can pure play internet banking survive the credit crisis?”, Journal of Banking <strong>and</strong><br />
Finance, Vol. 35 Iss 4<br />
Carr N. (2003), IT doesn’t matter, Harvard Business Review, May<br />
Coleman P. <strong>and</strong> Papp R. (2006): “Strategic Alignment: Analysis of Perspectives”, Proceedings of the 2006<br />
Southern Association for <strong>Information</strong> Systems Conference<br />
117
Renata Paola Dameri<br />
Cyree K., Delcoure N., Dickens R. (2009), “An examination of the performance <strong>and</strong> prospects for the future of<br />
internet-primary banks”, Journal of Economics <strong>and</strong> Finance, Vol.33 Iss.2<br />
Dimitraidis S., Kouremenos A., Kyrezis N. (2011), “Trust-based segmentation; Preliminary evidence from<br />
technology-enabled bank channels”, The International Journal of Banking Marketing, Vo. 29 Iss. 1<br />
Global Insight, World <strong>Information</strong> technology <strong>and</strong> Service Alliance (WITS) Report, at<br />
http://dx.doi.org/10.1787/888938327401<br />
Henderson P., Venkatraman N. (1992), “Strategic Alignment: A model for organisational transformation through<br />
information technology,” in T. Kochan & M. Unseem, eds, Transforming Organisations, Oxford University<br />
Press, NY, 1992.<br />
Marakark<strong>and</strong>y B., Daptardar A. (2011), “Evaluation of Internet Banking Sites from the Dimension of<br />
Functionality”, IUP Journal of Bank <strong>Management</strong>, Vol. 10 Iss 1<br />
Morgan J. (2009), “Customer <strong>Information</strong> <strong>Management</strong> (CIM): The Key to Successful CRM in Financial Services”,<br />
Journal of Performance <strong>Management</strong>, Vol. 22 Iss. 3<br />
OECD, <strong>Information</strong> Technology Outlook 2010, Paris<br />
Safeena R., Abdullah, Hema Date, “Customer Perspectives on E-business Value: Case Study on Internet<br />
Banking”, Journal of Internet Banking <strong>and</strong> Commerce, Vol. 15 Iss. 1<br />
Xue M., Hitt L., Chen P. 2011), „ Determinants <strong>and</strong> Outcomes of Internet Banking Adoption“, <strong>Management</strong><br />
Science, Vol. 57 Iss 2<br />
Wu Dexiang, Wu Desheng (2010), “Performance evaluation <strong>and</strong> risk analysis of online banking service”,<br />
Kybernetes, Vol. 39 Iss. 5<br />
118
ICT <strong>and</strong> PA: A Marriage Made in Heaven?<br />
Maria Concetta De Vivo, Alberto Polzonetti <strong>and</strong> Pietro Tapanelli<br />
University of Camerino, Italy<br />
concetta.devivo@unicam.it<br />
alberto.polzonetti@unicam.it<br />
pietro.tapanelli@unicam.it<br />
Abstract: In the European context, Italian legislation bodies have intervened on several occasions <strong>and</strong> time <strong>and</strong><br />
time again through regulatory interventions aimed at regulating the use of ICT both in the Public Administration<br />
<strong>and</strong> the private sector. The aim of this work is to ascertain why the most advanced regulations <strong>and</strong> most<br />
widespread technologies alone cannot manage to bridge the current <strong>and</strong> verifiable gap between Public<br />
Administration <strong>and</strong> <strong>Information</strong> Communication Technologies. We will firstly address the evolution of the<br />
legislation <strong>and</strong> make particular reference to the Italian situation as well as analyse the European funding<br />
programmes for implementing ICT in the PA <strong>and</strong> we will then study the factors preventing ICT’s real, successful<br />
penetration in the public structure <strong>and</strong> the role of digital culture. For the authors, the lack of an adequate digital<br />
culture for both old <strong>and</strong> new generations of digital citizens is the real reason for the current gap between ICT <strong>and</strong><br />
the PA. Young citizens - Strength: they are included within the definition of digital natives. Using technologies to<br />
communicate-exchange-share comes naturally to them. Weakness: they lack adequate digital education to get<br />
the most out of the tools at their disposal. Result: complete immaturity in the knowledge of their own rights <strong>and</strong><br />
especially their own duties. The old generation of digital citizens - Strength: population of seniors who are<br />
fundamentally curious <strong>and</strong> conscious of ICT news, especially in relation to the PA; confident in a support<br />
essential to simplifying their existence. Weakness: a) distrust often born of false information about new ICT tools<br />
for their benefit; b) incompatibility <strong>and</strong> incommunicability between information systems from various Public<br />
Administrations; c) citizen interoperability procedures/PA sometimes still too conf<strong>using</strong> or unclear <strong>and</strong><br />
characterised by haphazard development, with areas (<strong>and</strong> offices <strong>and</strong>/or local administrations) that are extremely<br />
developed alternated with areas that have remained behind. During this analysis we cannot forget the concept of<br />
broadb<strong>and</strong> internet access as synonymous with fast access to the network. The possibility of use facilitated by a<br />
2.0 internet structure for the citizen. Broadb<strong>and</strong> internet access as a citizen’s right. European <strong>and</strong> national<br />
overview. The difference between the idea of broadb<strong>and</strong> internet access as a citizen’s right in Italy <strong>and</strong> other<br />
European countries will also be explored: in Switzerl<strong>and</strong> (in 2008), in Finl<strong>and</strong> (in 2010, each of the approximately<br />
5 million Finns will have the right to a minimum speed connection of 1Mbps <strong>and</strong> broadb<strong>and</strong>, currently in a<br />
transitional period, that should reach 100 Mbps by 2015); in Spain (in 2011). In Italy: Professor Rodotà recently<br />
spoke of this, in an intentionally defiant tone, so as to unofficially push for a solution to the problem. In fact, our<br />
legal system already guarantees the right to Internet in article 3 of the Italian Constitution. In conclusion, the<br />
characteristics of service providers will be examined as well the reasons for not having an open st<strong>and</strong>ardisation<br />
for internet access as yet another phenomenon to negatively influence the ICT <strong>and</strong> Public Administration<br />
relationship.<br />
Keywords: eGovernment, cloud computing, public administration, open data, open government, interoperability<br />
1. Introduction: How the European Union try to develop ICT<br />
The impact of ICT on various aspects of modern society, including the particularly delicate issue of<br />
data h<strong>and</strong>ling, is undergoing a period of considerable fermentation. One need only consider the now<br />
well-established, although ongoing, internet revolution which has made the wide-scale distribution of<br />
numerous services for both consumers <strong>and</strong> businesses possible; in particular, it is important to<br />
highlight how local government services play an increasingly key part in establishing the role of<br />
citizens in the new information society.<br />
In March 2000 the European Council outlined a “strategic plan for the new decade: the creation of the<br />
information society”, demonstrating the EU’s decisive recognition of the main goals for creating a socalled<br />
economy of knowledge, in order to become a leading power in the age of globalisation in which<br />
knowledge has become an indisputably important economic resource. In fact, as has been frequently<br />
stated, sustainable development depends on knowledge infrastructures which, in the digital age, have<br />
become the real essential requirements for the recovery of the European economy.<br />
The value of information is only rarely limited to the subject by which it is produced, making it<br />
essential to reflect on the rules governing the production of information <strong>and</strong> its subsequent h<strong>and</strong>ling,<br />
in order to make its data contents more reliable <strong>and</strong> easier to use. In particular, ICT is ca<strong>using</strong> an ever<br />
greater gap between the production phase or the original source of information <strong>and</strong> the end user or<br />
access phase: this has resulted in an exceptional expansion of the range of tools available to those<br />
119
Maria Concetta De Vivo, Alberto Polzonetti <strong>and</strong> Pietro Tapanelli<br />
responsible for making choices or taking decisions, but also in a loss of control over the quality of the<br />
information used (Rifkin 2001).<br />
Today the entire administrative apparatus in each EU member state can count on several financing<br />
sources specifically aimed at helping to achieve the goals promoted <strong>and</strong> sponsored by the European<br />
Commission: for example, the “i2010 European initiative on e-inclusion” <strong>and</strong> the subsequent “Digital<br />
Agenda”.<br />
From the point of view of European legislators, the TLS package aiming to make the electronic<br />
communications sector more efficient (<strong>and</strong> competitive) has become fundamental. It is composed of<br />
the framework Directive 2002/21/EC <strong>and</strong> four specific directives (the “Authorisation Directive”<br />
2002/20/EC, the “Access Directive” 2002/19/EC, the “Universal Service Directive” 2002/22/EC <strong>and</strong><br />
the “Privacy <strong>and</strong> Electronic Communications Directive” 2002/58/EC), in addition to subsequent<br />
integrations <strong>and</strong> modifications. Furthermore, although currently under revision by public consultation,<br />
the 1999/93/EC Directive (“Community framework for digital signatures”) is particularly important in<br />
order to establish the legal requirements for the identification of citizens, in this case, accessing<br />
government services. Directives 95/46/EC <strong>and</strong> 2002/58/EC along with EC regulation 45/2001 are also<br />
fundamental regarding data protection. In this context, Directive 2003/98/EC on the re-use of<br />
information in the public sector (so-called data recycling), also becomes essential.<br />
Final reference, although in reality this should be the starting point, must be made to EU treaties. In<br />
particular, articles 15 <strong>and</strong> 16 of the TFEU (Treaty on the Functioning of the European Union) <strong>and</strong><br />
articles 8 <strong>and</strong> 41 of the Charter of Fundamental Rights of the European Union also play a key role in<br />
establishing the core principles of what has now become a Europe-wide legal framework.<br />
2. Scenario: Italian body of laws related to eGovernment<br />
Italian law has several different references to ICT issues, especially in the context of government<br />
services. The regulations are particularly well structured. The danger of fragmentation <strong>and</strong> division by<br />
sector has been overcome by the practice, implemented by Italian legislators, of creating sectorspecific<br />
Regulations or regulatory bodies capable of gathering the legislation regarding the various<br />
categories in an organised manner.<br />
The most well-known texts are the Digital Administration Law (Italian CAD, Codice<br />
dell’Amministrazione Digitale), the Data Protection Law (Codice della Privacy) <strong>and</strong> the Consumer<br />
Protection Law (Codice del Consumo), all of which were created in compliance with EU requirements.<br />
The CAD (Legislative Decree 82/2005) is considered as the cornerstone of the “Modernisation <strong>and</strong><br />
Digitalisation of Government Services Plan”. The decree’s main aims are: the reorganisation of<br />
government services through the creation of a single office responsible for ICT activities; the<br />
simplification of relations with citizens <strong>and</strong> enterprises through the introduction of online payment<br />
services, the exchange of data between enterprises <strong>and</strong> administration authorities, the promotion <strong>and</strong><br />
use of certified electronic post, access to online services, the use of digital signatures, the<br />
dematerialisation of documents <strong>and</strong> the development of institutional websites; to ensure the security<br />
of data exchanges; to reduce the time necessary for administrative procedures; to reduce the cost of<br />
legal procedures; to reduce the use of paper (Carloni 2009).<br />
The Consumer Protection Law (Legislative Decree 206/2005) is intended to provide consumer<br />
protection even when consumers make use of digital technology <strong>and</strong> environments.<br />
The Data Protection Law (Legislative Decree 196/2003) has several references both to data h<strong>and</strong>ling<br />
<strong>and</strong> computer security.<br />
The areas of intervention by Italian legislators can be divided into groups by sectors:<br />
The Data Protection sector, with reference to the abovementioned Legislative Decree 196/2003;<br />
The infrastructures sector: the unified public authorities network (RUPA) <strong>and</strong> the public<br />
connection system (Sistema Pubblico di Connettività);<br />
The accessibility <strong>and</strong> website sector. In this sector, recent regulations include several specific<br />
decision of administrative authority such as CNIPA (Italian Authority for Informatics in Public<br />
120
Maria Concetta De Vivo, Alberto Polzonetti <strong>and</strong> Pietro Tapanelli<br />
Administration, now it’s called DigitPA); but the most important is even more the CAD, <strong>and</strong> its<br />
implementation action; <strong>and</strong> the Law no.4/2004 (known as the Stanca Law);<br />
The sectors of electronic documents, signatures, certificates, Electronic Identity Cards (EIC) <strong>and</strong><br />
the National Services Card (Carta nazionale dei servizi). These sectors have a particularly large<br />
number of regulations, including the following selection of some of the most important.<br />
The computer security sector: the CAD <strong>and</strong> the Data Protection Law (Legislative Decree<br />
196/2003).<br />
The open source sector: the main reference for this subject is the CAD; Ministry of Innovation <strong>and</strong><br />
Technology Decree dated 19 December 2003 on “Development <strong>and</strong> use of computer programs<br />
by public administrations”; Ministry for Innovation <strong>and</strong> Technology Decree dated 31 October 2002<br />
on the “Creation of a Commission for open source software in Public Administration”.<br />
In order to fully implement both national <strong>and</strong> European regulations, the EU itself provides financing in<br />
the framework of the FP7, specific Cooperation program, ICT theme <strong>and</strong> the CIP, specific program IT<br />
PSP (Alberti, 2005).<br />
3. The lack of widespread digital culture<br />
From the above, it would appear that the use of ICT is making excellent progress – however, the<br />
reality is rather different. In fact, although the ideas <strong>and</strong> projects financed by the EU itself are both<br />
numerous <strong>and</strong> interesting, it is also true that the definitive push to switch off the old way of accessing<br />
government services is lacking.<br />
Despite an almost complete panorama on a regulatory level, public authorities continue to show little<br />
awareness of the full benefits of <strong>using</strong> ICT. A fundamental role in examining the situation is played by<br />
the Digital Agenda, which provides an absolutely exhaustive analysis of the factors impeding the full<br />
development of a digital culture (Florini 2007).<br />
The areas identified as hostile to e-inclusion are seriously undermining the efforts made to implement<br />
ICT <strong>and</strong> demonstrate the need for a coordinated response on a European level.<br />
In particular, the following issues are analysed:<br />
Fragmentation of digital markets<br />
The study emphasises the excessive fragmentation of national online markets, which prevent citizens<br />
from benefitting from the advantages of a single digital market. In particular, an alignment of national<br />
regulations <strong>and</strong> the implementation of electronic payment <strong>and</strong> invoicing systems, in addition to<br />
dispute resolution systems, could play a key part in developing consumer confidence.<br />
Lack of interoperability<br />
Due attention has yet to be paid to the concept of interoperability.<br />
Increase in computer crime, leading to the risk of falling confidence in networks<br />
Constant attempts at online fraud, especially phishing, threaten consumer confidence in accessing<br />
any service, either public or private, on the web.<br />
Lack of investment in networks<br />
More needs to be done to ensure the installation <strong>and</strong> adoption of broadb<strong>and</strong> available to all, at ever<br />
higher speeds, through both fixed <strong>and</strong> wireless technology. The importance of electronic<br />
communication methods can be compared to the revolutionary impact of the development of<br />
electricity <strong>and</strong> transport networks in the last century.<br />
Insufficient committment to research <strong>and</strong> innovation<br />
121
Maria Concetta De Vivo, Alberto Polzonetti <strong>and</strong> Pietro Tapanelli<br />
Investment in Europe continues to be insufficient, committment is fragmented, the creativity of SMEs<br />
is underexploited <strong>and</strong> the intellectual advantage of research is not converted into competitive<br />
advantage for the innovations based on the market. More use must be made of research talent.<br />
Lack of digital literacy <strong>and</strong> computer skills<br />
The underlying reason behind the lack of digital culture <strong>and</strong> the slow development of networks.<br />
Although huge progress has been made in the development of ICT, it is not actually accessible,<br />
especially for those who have not yet acquired a certain level of skills relating to the access device.<br />
The complexity of certain procedures can sometimes prevent their practical use.<br />
Missed opportunities in responding to social problems<br />
By fully exploiting the potential of ICT, Europe could resolve some of the most urgent issues facing<br />
the community in a far more efficient manner.<br />
The seven themes mentioned above are, therefore, also relevant to the badly coordinated<br />
development of eGovernment, which suffers in particular from the lack of an adequate network<br />
infrastructure (as the primary problem) <strong>and</strong> the absence of a digital culture, which is often ab<strong>and</strong>oned<br />
to itself without any form of organised <strong>and</strong> structured development.<br />
In fact, access to the internet in Europe is based on first generation structures (copper wiring <strong>and</strong><br />
cable networks), with a growing dem<strong>and</strong> for new generation networks. Unfortunately, however, the<br />
continent is forced simply to follow in the tracks of other countries, in particular Southeast Asian<br />
countries such as Japan <strong>and</strong> Korea which are world leaders in developing fibre optic internet access.<br />
Furthermore, European structures, in Italy for example, are often inefficient <strong>and</strong> with scarce<br />
penetration in the territory: the statistics illustrated in the following chapter demonstrate the clear gap<br />
between northern <strong>and</strong> southern European countries. Let us hope that the Europa 2020 strategy,<br />
which emphasises the importance of the spread of broadb<strong>and</strong> to promote social inclusion <strong>and</strong><br />
competitiveness in the EU, repeating the aim of bringing broadb<strong>and</strong> access to all European citizens<br />
by 2013, does not remain a chimera. This is especially true regarding the aim for all European citizens<br />
to have access to much faster connections of over 30 Mbps, <strong>and</strong> that at least 50% of European<br />
families to have internet connections of over 100 Mbps by 2020.<br />
The additional aspect mentioned above of the absence of a genuine digital culture is closely linked to<br />
the theme of computer literacy. Given that social, economic <strong>and</strong> political activities are ever more<br />
frequently performed online, the use of internet has become an integral part of the daily life of many<br />
Europeans, even though nearly 30% of European citizens have never used the internet. This share of<br />
computer illiterates is composed of people between the age of 65 <strong>and</strong> 74, low income families <strong>and</strong> the<br />
unemployed or people with a low level of education. Although over-simplified, this profile gives a clear<br />
indication of the emarginated social classes of the new millennium (Armbrust 2010).<br />
The importance of a digital culture is also evident in the 2005 UNESCO convention on cultural<br />
diversity, which intends to protect <strong>and</strong> promote global cultural <strong>and</strong> digital diversity, including the<br />
widespread distribution of contents through a previously unimagined range of communication<br />
methods.<br />
4. Broadb<strong>and</strong> accesses: The European Union is going well?<br />
The European Commission has recently drafted the ninth comparative analysis report on the progress<br />
achieved in eGovernment in the EU as a whole. The main conclusions drawn are positive:<br />
More than 80% of fundamental public services are available online. The online availability of 20<br />
fundamental services, such as vehicle registration, tax returns or the registration of a new<br />
company, has reached 82% in Europe as a whole, considerably higher than the 69% recorded in<br />
2009. The best results were achieved in Austria, Irel<strong>and</strong>, Italy, Malta, Portugal <strong>and</strong> Sweden,<br />
where all of these services were entirely available online. The largest improvements over the last<br />
year were made in Bulgaria, Italy <strong>and</strong> Latvia;<br />
The report shows that in Austria, Denmark, Estonia, Irel<strong>and</strong>, Sweden <strong>and</strong> the UK, 55% of the<br />
services necessary to open a company are provided automatically or through a specific portal.<br />
122
Maria Concetta De Vivo, Alberto Polzonetti <strong>and</strong> Pietro Tapanelli<br />
Nonetheless, only 46% of the services necessary for the unemployed are currently provided<br />
through a specific portal;<br />
For electronic tenders, 70% of public authorities have begun working with this solution, but the<br />
low overall percentage of use (around 5% of all tenders) has not yet allowed for the achievement<br />
of any particular benefits;<br />
Small local authorities are becoming the weak links in eGovernment, providing only half the online<br />
services offered by larger authorities.<br />
Although considerable progress has been made by public authorities, including in Italy, low levels of<br />
access by citizens <strong>and</strong> enterprises continues to be a source of concern, even for the European<br />
Commission itself. The statistics in this area show a rather varied <strong>and</strong> not particularly positive<br />
situation, with excessive disparity between EU states.<br />
For example, the figures relating to families with internet access show the most positive results in<br />
northern Europe (Norway, Sweden, the Netherl<strong>and</strong>s, Denmark <strong>and</strong> Icel<strong>and</strong>) at around 90%, while<br />
Italy, as often occurs, is one of the states with most difficulty. Although 59% of families have access to<br />
the internet, for broadb<strong>and</strong> the percentage falls to only 49%: not even half of Italian families have<br />
broadb<strong>and</strong> access. The figures are better for enterprises, with most EU states over the threshold of<br />
80% (2009 broadb<strong>and</strong> access figures). The figure relating to broadb<strong>and</strong> penetration puts Italy among<br />
the top states in the EU, even in relation to population; however, active broadb<strong>and</strong> lines (almost<br />
12,500,000) are mostly operative in large urbanised areas, with a worrying level of ab<strong>and</strong>on in rural<br />
areas <strong>and</strong> even the suburban surroundings of large metropolitan areas.<br />
Moving on to analyse the figures relating to interaction between citizens <strong>and</strong> public authorities, there<br />
is a sharp fall in the optimism of the European Commission’s report on eGovernment. The average<br />
percentage of EU citizens in 2010 who use the internet to interact with public authorities is of 28.1%,<br />
with the usual peaks in Denmark (68.2%), Sweden (56.9%), Finl<strong>and</strong> (48.6%) <strong>and</strong> Norway (61.8%),<br />
even though it is outside the EU. While 2010 data is not available for Icel<strong>and</strong>, the percentage in 2009<br />
was of 63.3%. Italy remains blocked at 15.9%, while France <strong>and</strong> Germany are both over 30%. The<br />
figures fall again when the interaction with public authorities becomes more “official”, referring to<br />
document downloads <strong>and</strong> uploads. The EU average falls to 17.9% <strong>and</strong> 13.4% respectively, with Italy<br />
recording exceptionally low results of 11.3% <strong>and</strong> even 5.5% for uploading, well below France,<br />
Germany <strong>and</strong> Spain, for example.<br />
Weekly internet access per capita results are no better, with Italy coming in at 48%, still dangerously<br />
far off the EU average of 65% <strong>and</strong> the results achieved by European competitors. The same trend<br />
can be seen in mobile access rates.<br />
The recent (2010) international ranking drafted by the Economist Intelligence Unit (which has<br />
changed name from “e-readiness rankings” to “digital economy rankings”), providing a snapshot of the<br />
state of technology regarding connectivity, e-readiness <strong>and</strong> broadb<strong>and</strong> quality in 70 countries<br />
worldwide, saw Italy fall from 26th to 27th place (the last country in Western Europe), with a score of<br />
6.92 against 7.09 in the previous edition due to the delay in developing the new generation network.<br />
North European countries <strong>and</strong> the US remained stable in top positions in the ranking, which is now<br />
orientated mainly towards evaluating the quality of broadb<strong>and</strong> <strong>and</strong> mobile networks; in this sense,<br />
countries such as Taiwan, Japan <strong>and</strong> South Korea have risen in the highly important ranking thanks<br />
to heavy investment in fibre optics.<br />
With specific reference to broadb<strong>and</strong> access, the so-called TLC package offers some fundamentally<br />
important considerations for underst<strong>and</strong>ing <strong>and</strong> evaluating priorities when facing the challenge of the<br />
new information society. Point 8 of the Introduction to Directive 2002/22/EC, relating to universal<br />
service, specifies that “connections to the public telephone network at a fixed location should be<br />
capable of supporting speech <strong>and</strong> data communications at rates sufficient for access to online<br />
services such as those provided via the public internet. The speed of internet access experienced by<br />
a given user may depend on a number of factors including the provider(s) of internet connectivity as<br />
well as the given application for which a connection is being used. The data rate that can be<br />
supported by a single narrowb<strong>and</strong> connection to the public telephone network depends on the<br />
capabilities of the subscriber’s terminal equipment as well as the connection”, immediately followed by<br />
“for this reason it is not appropriate to m<strong>and</strong>ate a specific data or bit rate at Community level”. It is<br />
therefore clear that m<strong>and</strong>atory access to a functional <strong>and</strong> functioning connection is surrounded by a<br />
123
Maria Concetta De Vivo, Alberto Polzonetti <strong>and</strong> Pietro Tapanelli<br />
rather vague aura, given that the same point continues by stating that “in specific cases where the<br />
connection to the public telephony network at a fixed location is clearly insufficient to support<br />
satisfactory internet access, Member States should be able to require the connection to be brought up<br />
to the level enjoyed by the majority of subscribers so that it supports data rates sufficient for access to<br />
the internet”. In fact, in addition to the frequently repeated use of the conditional in the point, the<br />
phrasing “sufficient” for access to the internet is open to a range of anything but clear interpretations.<br />
Even though broadb<strong>and</strong> is not mentioned, the point refers to sufficient access which, given the current<br />
state of affairs, cannot be any less than connections meeting certain quality levels (which are no<br />
longer in line with the speed of data transfer in 2002).<br />
The recent communication from the European Commission to the European Parliament, Council,<br />
Economic <strong>and</strong> Social Committee <strong>and</strong> Committee of the Regions regarding the second periodic review<br />
of the contents of universal service in e-communications networks <strong>and</strong> services in compliance with<br />
article 15 of Directive 2002/22/EC, examines the concept of the obligation of universal service (USO)<br />
in the electronic communications sector, in addition to the scope of universal service itself.<br />
Point 2.1, “Introduction”, specifically states that “universal service in electronic communications (ecommunications),<br />
as currently defined, means ensuring that all who so request are provided with<br />
those services essential for participation in society <strong>and</strong> already available to the great majority of<br />
citizens, either by the market or in the case of market failure by public intervention”. In their analysis of<br />
the status quo of broadb<strong>and</strong>, the Commission itself concludes that “coverage of broadb<strong>and</strong> networks<br />
is now very high in most Member States, being available, on average, to 90% of the EU population.<br />
Use of the internet is now approaching the level of a service used by the majority, with 49% of EU<br />
households <strong>using</strong> the internet, 36% of which are on broadb<strong>and</strong>. Although broadb<strong>and</strong> is not yet used<br />
by the majority of consumers (the first of two considerations identified in Annex 5 of the Directive) <strong>and</strong><br />
is therefore not encompassed by the USO as laid down <strong>and</strong> described by the present wording, takeup<br />
is approaching the threshold of use by a majority of consumers. Furthermore, it is reasonable to<br />
anticipate that, in a relatively short horizon of time, narrowb<strong>and</strong> will no longer answer the requirement<br />
of being “sufficient to permit functional internet access”. Thus the situation does need to be kept under<br />
review”. If the situation already needed to be monitored at the end of 2008, doubts are almost<br />
inevitably raised about the functionality of narrow b<strong>and</strong> connections today.<br />
Access to the internet is in any case held to be of vital importance. For example, we refer to Directive<br />
2009/140/EC, in modification of Directives 2002/21/EC, 2002/19/EC <strong>and</strong> 2002/20/EC, which at<br />
introductory point no.4 confirms the essential nature of internet “for education <strong>and</strong> for the practical<br />
exercise of freedom of expression <strong>and</strong> access to information”, to the point that “any restriction<br />
imposed on the exercise of these fundamental rights should be in accordance with the European<br />
Convention for the Protection of Human Rights <strong>and</strong> Fundamental Freedoms”. Incidentally, the failure<br />
of the free market to operate efficiently is revealed in the fact that the investment to guarantee a<br />
public service is no longer profitable. Hence point no.9 of the 2009 Directive, regarding the principle of<br />
non-discrimination, recognises that “despite the general increase in broadb<strong>and</strong> connectivity, access in<br />
various regions is limited on account of high costs resulting from low population densities <strong>and</strong><br />
remoteness. In order to ensure investment in new technologies in underdeveloped regions, electronic<br />
communications regulation should be consistent with other policies, such as State aid policy,<br />
cohesion policy or the aims of wider industrial policy”.<br />
5. Conclusion<br />
Independently from the quality of broadb<strong>and</strong>, which is not considered here, the essential problems are<br />
revealed in particular when considering three factors. Firstly: the scarce penetration of broadb<strong>and</strong><br />
within the territory, especially rural areas, materially preventing users from accessing online services<br />
provided by public authorities, even where a wide range of services are available. It is no longer<br />
conceivable today to talk about narrow b<strong>and</strong> internet access, relying on the traditional fixed telephone<br />
line. Secondly: the absence of a digital culture. The majority of citizens, whether from the older or<br />
younger generation, do not underst<strong>and</strong> the importance <strong>and</strong> potential offered by the window on the<br />
world provided by internet. The fault lies not so much in a lack of interest from citizens, but rather a<br />
scarce level of sensitisation by the political class which should use specific initiatives to promote <strong>and</strong><br />
facilitate digital access to social life. We will not attempt to make a distinct classification between<br />
those who are or are not open to the digital approach, such as a division between older <strong>and</strong> younger<br />
generations, because the difficulty in access is rooted in certain procedures, regardless of the final<br />
user. This is because, very often, traditional procedures are simply replicated on a computer level<br />
124
Maria Concetta De Vivo, Alberto Polzonetti <strong>and</strong> Pietro Tapanelli<br />
<strong>using</strong> advanced ICT innovations. Hence, real innovation is lacking in the “how” rather than the “what”,<br />
in order to shift the focus onto the procedure rather than the product. This aspect leads onto the third<br />
<strong>and</strong> last negative point which is preventing real growth in eGovernment: interoperability. The lack of<br />
coordinated development of st<strong>and</strong>ards (better if open source to avoid dangerous lock-in phenomena),<br />
effectively limits the scope of innovation, without any actual growth in the surrounding social situation.<br />
Internet has in any case become the main source of digital access – without access, neither the<br />
growth of a digital culture nor a real development of interoperability can take place.<br />
These three aspects show that it’s necessary consider some solutions especially to improve the<br />
broadb<strong>and</strong> penetration with the rural areas. Without an access that is able to use PA services, we<br />
can’t approach the second aspect, about digital culture lack. Each single PA, in particularly we can<br />
talk about municipally that, waiting optical fibre, WiMAX <strong>and</strong> other similar technology, can support<br />
actions oriented to develop, as much as possible, the liberalization of last mile. In this way, also little<br />
internet providers can make business with buying broadb<strong>and</strong>, from national telecommunication<br />
operator (for example Telecom), <strong>and</strong> selling it to consumers. The HIPERLAN (HIgh PErformance<br />
Radio LAN), <strong>and</strong> its development, could be a solution to bring broadb<strong>and</strong> access to rural areas<br />
(Kroes, 2011). When we can materially connect to the web, we must consider the second aspect. The<br />
lack of digital culture can be solved <strong>using</strong> national <strong>and</strong> European financial channel, we talked about<br />
7th framework programme or CIP framework programme for European reality but there many other<br />
solutions, to improve a massive awareness campaign over the real benefit of an advantaged digital<br />
culture. The interoperability, third aspect, instead, can be solved only when the other two aspects are<br />
clear <strong>and</strong> developed. There is already a normative framework, both European <strong>and</strong> national, that is<br />
able to support the raise of st<strong>and</strong>ards of reference interoperability (Pardo 2009).<br />
In conclusion, it is important to note how some EU member states have begun to define access to<br />
broadb<strong>and</strong> as a right. Finl<strong>and</strong>, France, Greece <strong>and</strong> Spain, also thanks to encouragement from the<br />
UN, have already recognised the right to access as a fundamental right; in particular, in Finl<strong>and</strong> it is<br />
obligatory for providers to supply all citizens with a 1Mbps connection which must be increased to<br />
100Mbps by 2014. In France, too, the Constitutional Court has recognised this fundamental right<br />
based on indications in the United Nations Declaration of Human Rights. In Italy, on the other h<strong>and</strong>,<br />
Prof. Stefano Rodotà, a well-known civil law expert <strong>and</strong> ex-president of the Italian Privacy Authority,<br />
has proposed the integration of the Italian Constitution with an article 21-bis, indispensible for<br />
guaranteeing the right to internet access for all citizens.<br />
References<br />
Alberti, C. (2005) E-society e riutilizzo dell'informazione nel settore pubblico. Disciplina comunitaria e riflessi<br />
nazionali, Rivista italiana diritto pubblico comunitario, Vol. 5, pp. 1237-1245.<br />
Armbrust, M., Fox, A., Griffith, R., D. Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A.,<br />
Stoica, I., Zaharia, M. (2010), Clearing the clouds away from the true potential <strong>and</strong> obstacles posed by this<br />
computing capability, http://cacm.acm.org/magazines/2010/4/81493-a-view-of-cloud-computing/fulltext.<br />
Carloni, E. (2009) La qualità delle informazioni pubbliche. L’esperienza italiana nella prospettiva comparata,<br />
Rivista trimestrale diritto pubblico, Vol. 1, pp. 155-168.<br />
Digital economy rankings 2010, Beyond e-readiness, 2010,<br />
http://www.eiu.com/site_info.asp?info_name=digitaleconomy_2010&rf=0<br />
Florini, A. (2007) The right to know: Transparency for an open world. Columbia University Press, New York.<br />
Kroes, N. (2011) Towards a European Cloud Computing Strategy, Speech of Vice-President of the European<br />
Commission responsible for the Digital Agenda, World Economic Forum, Davos, 27 January 2011,<br />
http://ec.europa.eu/information_society/newsroom/cf/itemdetail.cfm?item_id=6649&utm_campaign=isp&utm<br />
_medium=rss&utm_source=newsroom&utm_content=tpa-7.<br />
Pardo, A. T., et al. (2009) From ‘‘Need to Know’’ to ‘‘Need to Share’’: Tangled Problems, <strong>Information</strong> Boundaries,<br />
<strong>and</strong> the Building of Public Sector <strong>Knowledge</strong> Networks, Public Administration Review, V. 69, I. 3, pp. 392 -<br />
402.<br />
Rifkin, J. (2001) L’Era Dell’Accesso. La rivoluzione della new economy, Milano.<br />
The “Ministerial Declaration on eGovernment” approved in Malmö, Sweden, on 18 November 2009, Uunder the<br />
Swedish Presidency, by the Ministers responsible for eGovernment policy of the European Union (EU)<br />
Member States, the C<strong>and</strong>idate Countries <strong>and</strong> the European Free Trade Area (EFTA) Countries.<br />
http://www.epractice.eu/files/Malmo%20Ministerial%20Declaration%202009.pdf.<br />
The European Commission “A Digital Agenda for Europe” COM(2010) 245 final/2. http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2010:0245:FIN:EN:PDF.<br />
The European eGovernment Action Plan 2011-2015. Harnessing ICT to promote smart, sustainable & innovative<br />
Government. COM(2010) 743.<br />
http://ec.europa.eu/information_society/activities/egovernment/action_plan_2011_2015/docs/action_plan_e<br />
n_act_part1_v2.pdf.<br />
125
SMEs <strong>and</strong> IT: A Market for Lemons?<br />
Jan Devos, Hendrik Van L<strong>and</strong>eghem <strong>and</strong> Dirk Deschoolmeester<br />
Ghent University, Belgium<br />
jan.devos@howest.be,<br />
hendrik.vanl<strong>and</strong>eghem@UGent.be<br />
dirk.deschoolmeester@vlerick.be<br />
Abstract: It is well known that Small- <strong>and</strong> Medium-sized Enterprises (SME) suffer from a lack of IT proficiency<br />
<strong>and</strong> therefore depend heavily on external IT expertise. The acquisition of a strategic IT artefact by an SME is<br />
mainly initiated in a market where Independent Software Vendors (ISV) <strong>and</strong> customers meet. This complex<br />
process is dominated by information asymmetry <strong>and</strong> leads to the ‘lemons’ problem, where low-quality vendors<br />
drive out high-quality vendors as predicted by the Lemon Market Theory (LMT). The diversity in quality makes it<br />
difficult for prospective buyers to evaluate a product or service with complete certainty <strong>and</strong> makes the decision to<br />
acquire risky. According to LMT, there is incentive for vendors selling poor quality, where quality of services is<br />
linked to an entire group rather than to an individual vendor. Although many scholars refer to this phenomenon in<br />
their work, empirical evidence is scarce. In this paper, we present the results of an enquiry into the ‘lemon’<br />
problem within a group of 484 Belgium ISVs that target the SME market. A survey of the websites of the selected<br />
ISVs was conducted, in which we examined the way the products <strong>and</strong> services were presented. This was<br />
followed by six case studies, in which Chief <strong>Information</strong> Officers (CIOs) of SMEs were interviewed about the way<br />
they perceive the services of the ISVs. Our findings suggest that there are elements of a ‘lemons’ market present.<br />
However, there are also indications of a self-cleaning mechanism present in the market within the group of ISVs,<br />
leading to a globally higher degree of quality <strong>and</strong> leading to positive filtering from ‘the buy side’. However, the<br />
strongest conclusion is that some SMEs are encouraged by ISVs to withdraw from progressing further with their<br />
software acquisition process due their inferior IT capabilities <strong>and</strong> practices.<br />
Keywords: SMEs, IT/IS, lemon market theory, ISV<br />
1. Introduction<br />
Small- <strong>and</strong> Medium-sized Enterprises (SMEs) tend to focus on their core business <strong>and</strong> do not always<br />
have the necessary resources <strong>and</strong> capabilities to govern an internal, professional information<br />
technology (IT) department or an information systems’ (IS) function. It is said that SMEs suffer from<br />
resource poverty, not only financially but also in the amount of their internal IT/IS expertise (Thong<br />
2001; Thong, Yap & Raman 1996; Verhees & Meulenberg 2004). Therefore, SMEs depend heavily on<br />
external IT/IS expertise delivered by Independent Software Vendors (ISVs) to develop <strong>and</strong> implement<br />
their strategic IT artefact <strong>and</strong> conduct the indispensable IT projects (Dibbern & Heinzl 2009; Thong,<br />
Yap & Raman 1996; Yap, Soh & Raman 1992). Large Enterprise Resource Planning (ERP)<br />
developers have already been shifting their attention toward SMEs by offering simplified <strong>and</strong> cheaper<br />
solutions, such as SAP Business One <strong>and</strong> Microsoft Dynamics (Microsoft 2011; SAP 2011). The SME<br />
market is very attractive for small ISVs as well as for the business partners of the formerly mentioned<br />
ERP <strong>and</strong> Customer Relation <strong>Management</strong> (CRM) developers. This is due to the large number of the<br />
SMEs all over the world <strong>and</strong> especially in Europe (Commission 2010). However, the implementation<br />
of strategic information systems like ERP <strong>and</strong> CRM is a complicated task, particularly in SMEs, where<br />
the evaluation of the potential benefits are more uncertain (Levy & Powell 1999). The capabilitymaturity<br />
level of the ISV’s organisation is often inadequate to match with the dem<strong>and</strong>s <strong>and</strong> complex<br />
challenges of an IS implementation in an SME environment. Since SMEs are not well informed on the<br />
correct IT/IS capabilities of the ISVs <strong>and</strong> on the broad functionalities of the ERP <strong>and</strong> CRM software<br />
packages in concert with the efforts needed to adapt the software to their specific requirements, a<br />
situation of severe information asymmetry occurs, making room for opportunistic market behaviour<br />
<strong>and</strong> moral hazard. SMEs do not have sufficient internal managerial capabilities <strong>and</strong> practices to<br />
recognize the true intentions of ISVs in the market. This is an ideal environment for a ‘lemon’ market,<br />
since there is incentive for adverse selection on behalf of the SME, <strong>and</strong> a potential for opportunistic or<br />
even unethical behaviour on behalf of the ISV. The ‘lemon’ problem was initially posed by Nobel Prize<br />
winner in economics, Akerlof, in his seminal article of 1970 <strong>and</strong> showed how a market with<br />
unbalanced information or information asymmetry, can eventually complete disappear or offers<br />
products with poor quality where bad products (lemons) wipe out the good ones (Akerlof 1970).<br />
It would be ideal to clearly define a SME before going into research where the unit of analysis is the<br />
SME. Unfortunately, this is not easy, since there are many characteristics that can identify a SME. A<br />
widely accepted working definition of a SME emanates from the 1971 Bolton Committee Report <strong>and</strong><br />
has both qualitative <strong>and</strong> quantitative elements (Bolton 1971). The qualitative elements (e.g., the<br />
126
Jan Devos, Hendrik Van L<strong>and</strong>eghem <strong>and</strong> Dirk Deschoolmeester<br />
number of employees <strong>and</strong> the turnover) differ amongst countries. The European Commission took the<br />
initiative to define a SME in terms of microeconomic characteristics, such as turnover (not exceeding<br />
€50 million), annual balance sheet total (not exceeding €43 million) <strong>and</strong> headcount (fewer than 250<br />
persons) (Commission 2003). We used the European definition of a SME in this work.<br />
In this paper, we present the results of an enquiry to the ‘lemon’ problem within a group of 484<br />
Belgium ISVs that target the SME-market. We conducted an examination of the websites of the<br />
selected ISVs, looking at how ISVs present their products <strong>and</strong> services. This was followed by six case<br />
studies where CIOs of SMEs were interviewed about the way they perceive the services of the ISVs<br />
in an outsourced IS project environment.<br />
In the next section we present a literature overview, relating to the theory of the market for Lemons<br />
(LMT). In Section 3, we outline the research methodology used to collect data <strong>and</strong> to illustrate the<br />
proposed framework. We present our results in Section 4, followed by a discussion of the findings. In<br />
Section 5, we present the conclusions <strong>and</strong> a summary of the main points raised by this research.<br />
2. Literature overview<br />
The market for lemons (LMT) is a widespread economic theory developed by Akerlof in his seminal<br />
paper of 1970 (Akerlof 1970). According to this theory, there can be incentive for sellers to market<br />
poor quality, resulting in a reduction of the average quality <strong>and</strong> leading to a death spiral <strong>and</strong><br />
eventually, to complete deterioration of the market. The phenomenon of a lemon market arises in<br />
markets where there is information asymmetry between buyer <strong>and</strong> seller <strong>and</strong> where the overall quality<br />
of the goods <strong>and</strong> services offered is reflected on the entire group of sellers rather than on individual<br />
sellers. Lack of differentiation between the sellers can force high-quality sellers to flee the market<br />
because their quality <strong>and</strong> reputation cannot be rewarded. Akerlof demonstrated his theory with<br />
examples from the used car market. Most of the empirical data for bringing evidence to the theory has<br />
come from the used car market (Bond 1982). The theory has certainly gained attention in the str<strong>and</strong><br />
of research on e-commerce, with research topics such as e-markets <strong>and</strong> auctions (Dewan & Hsu<br />
2004; Lee et al. 2010; Pavlou & Gefen 2004).<br />
Devos et al. developed a nomological network for the LMT, which reveals the constructs <strong>and</strong> the<br />
measures used to validate the theory (Devos, Van L<strong>and</strong>eghem & Deschoolmeester 2010). They<br />
consider two groups of transacting parties: buyers (SMEs) <strong>and</strong> sellers (ISVs). The buyer is the less<br />
informed party <strong>and</strong> the seller is the more informed party. The buyer interacts with the seller <strong>and</strong> a<br />
contract of the transaction is negotiated. Christozov et al. see information asymmetry as a natural<br />
property of any communication process between a sender <strong>and</strong> a receiver, when both actors have<br />
different backgrounds <strong>and</strong> expertise, use different “jargon” or possess different information regarding<br />
the content of the communication session (Christozov, Chukova & Mateev 2009). Due to this<br />
information asymmetry, the distribution of information between the transacting parties is unbalanced,<br />
resulting in an imperfect market. This puts one party (the seller) at an advantage while placing the<br />
other (the buyer) at a disadvantage <strong>and</strong> makes the choice of a product risky for a prospective buyer<br />
(Afzal, Rol<strong>and</strong> & Al-Squri 2009). <strong>Information</strong> asymmetry depends upon the different capabilities <strong>and</strong><br />
intellectual levels of the transacting actors <strong>and</strong> is, therefore, considered as a independent construct<br />
for the LMT. Dependent constructs from information asymmetry are trust, adverse selection, <strong>and</strong><br />
moral hazard.<br />
Devos et al also found that Agency Theory (AT) <strong>and</strong> Prospect Theory (PT) are closely related to the<br />
LMT (Devos, Van L<strong>and</strong>eghem & Deschoolmeester 2010). AT is a well-known theory, largely used in<br />
the str<strong>and</strong> of research on IS <strong>and</strong> outsourcing (Dibbern, Goles & Hirschheim 2004). However,<br />
problems of behavioural differences in risk-taking are also important in addition to asymmetric<br />
information <strong>and</strong> goal differences. The implementation of a strategic IT artefact is highly risky since the<br />
outcomes are only partly verifiable <strong>and</strong> not always expressible in easily measurable outputs. The<br />
likelihood of failure looms large because of the uncertainty of the outcome. This gives rise to<br />
entrepreneurial risk, situated initially with the principal. The transfer of that risk to the agent is not<br />
straightforward, since both parties exhibit differences in risk behaviour. The principal is assumed to be<br />
risk neutral (the entrepreneurial risk) <strong>and</strong> the agent to be risk averse (Eisenhardt 1989). However, it is<br />
also assumed that the principal is risk averse when choosing for a ‘buy’ option. When principals are<br />
faced with adverse possibilities there is an overweighting of certainty, also known as the ‘certainty<br />
effect’ (Kahneman & Tversky 1979). The PT offers some explanation of this situation. PT was<br />
developed by Tversky <strong>and</strong> Kahneman (Kahneman & Tversky 1979) as a falsification for the Expected<br />
127
Jan Devos, Hendrik Van L<strong>and</strong>eghem <strong>and</strong> Dirk Deschoolmeester<br />
Utility Theory (EUT). PT states that decision making is a two-phase process. The first phase is an<br />
editing phase, in which a proposal or tender is framed in either a positive or negative way. The actual<br />
decision making is done in the second phase, which depends largely on the framing of the proposal.<br />
In decision making under risk, where losses loom larger than gains, people tend to search for<br />
certainty. Thus, the positive framing of proposals can greatly influence the decision <strong>and</strong> is assumed to<br />
be noticeable in a lemon market. The implementation of a strategic information system is an<br />
endeavour with a considerable amount of risk involved <strong>and</strong> often leads to a failure (Bartis & Mitev<br />
2008; Goldfinch 2007; Lyytinen & Robey 1999). Since most SMEs depend largely on external agents<br />
for adoption of IT/IS, a process of selection is conducted. SMEs tend to explore the market by RFPs<br />
(Requests for Proposal). Due to information asymmetry, SMEs cannot screen the proposals of ISVs<br />
on their real content <strong>and</strong> quality sufficiently. We argue that the proposals of ISVs are, therefore,<br />
usually framed in an extremely positive way to comply with the certainty effect of the SME-principal.<br />
Devos et al. built a framework to explain the outsourced information system failure (OISF) in a typical<br />
setting of an SME-principal buying a strategic IT artefact from a ISV-vendor (Devos, Van L<strong>and</strong>eghem<br />
& Deschoolmeester 2009). This framework is shown in Figure 1.<br />
Figure 1: The framework of an outsourced IS failure (Devos et al. 2009)<br />
The interrelated constructs of the framework are:<br />
A risk neutral SME-principal with managerial, methodological <strong>and</strong> technological capabilities <strong>and</strong><br />
practices for planning, designing <strong>and</strong> implementing IT artefacts;<br />
A risk adverse ISV-agent with managerial, methodological <strong>and</strong> technological capabilities <strong>and</strong><br />
practices for planning, designing <strong>and</strong> implementing IT artefacts;<br />
A market where SME-principals <strong>and</strong> ISV-agents meet each other;<br />
A meeting of the minds where SME-principals <strong>and</strong> ISV-agents establish a contract;<br />
An IT artefact, which is a human construction, utilitarian <strong>and</strong> not neutral;<br />
The use of the IT artefact, including a development <strong>and</strong> implementation trajectory;<br />
128
Jan Devos, Hendrik Van L<strong>and</strong>eghem <strong>and</strong> Dirk Deschoolmeester<br />
The impact of the IT artefact, be it direct or indirect, intended or unintended on the organisation.<br />
An outsourced information system failure (OISF) is considered to have an impact on the<br />
organisation.<br />
We focussed here on a market where SME-principals <strong>and</strong> ISV-agents meet <strong>and</strong> we argue that this<br />
market is under tension of forces that cause it to become a lemon market. The conditions for a market<br />
to become a lemon market are 1) information asymmetry, 2) sellers that have no credible way of<br />
disclosing the real quality to buyers, 3) sellers’ quality that is assessed by buyers acting as ‘von<br />
Neumann-Morgenstein maximizers’ of expected utility (Devos, Van L<strong>and</strong>eghem & Deschoolmeester<br />
2010).<br />
3. Research methodology<br />
Our research was focussed on the quest for indications of a lemon market in a setting where a SMEbuyer<br />
buys a strategic IT artefact (ERP, CRM) from an ISV-seller.<br />
The research methodology consisted of a mixture of two data sources. The first data collection was<br />
the screening of the websites of a group of 484 Belgium ISVs that are targeting the SME-market. This<br />
was followed by six case studies in which the CIOs of SMEs were interviewed about the way they<br />
perceive the services of the ISVs.<br />
The group of ISVs was derived from the business directory ICT TOP 1000, edited <strong>and</strong> published by<br />
Datanews in 2008 (Coenjaerts 2008). The directory contained the 1000 largest IT/IS suppliers <strong>and</strong><br />
ISVs in Belgium, according to their published revenues in 2007. We extracted a list of 484 ISVs from<br />
the directory who were appropriate for our research purposes. Only ISVs or business partners from<br />
large software developers, such as Microsoft, Oracle <strong>and</strong> IBM were selected. Telecom operators <strong>and</strong><br />
pure equipment vendors were excluded from the list. Our final list contained a total of 484 ISVs.<br />
3.1 Screening of websites<br />
We choose to investigate the nature of the offerings from ISVs in the way they present themselves<br />
<strong>and</strong> their services on their websites. For each screened website, we defined five checkpoints, which<br />
were scored on a four-point Likert scale. The values followed the scale: 0 - not present; 1 - minimally<br />
present; 2 - moderately present <strong>and</strong> 3 - maximally present. Detailed criteria were defined for each<br />
checkpoint.<br />
The screening was done in two phases. The first phase was individual scoring, prepared by three<br />
researchers, each of them scoring independently. In the second phase, the scoring process was<br />
redone in a group where all of the individual scores of the researchers were brought together. Via<br />
group discussion <strong>and</strong> stepwise refinement, a group score was given on every checkpoint for all<br />
investigated websites. The checkpoints <strong>and</strong> scoring system are shown in Table 1.<br />
Table 1: Checkpoints <strong>and</strong> scores used to evaluate the websites<br />
score 0 1 2 3<br />
Nr Checkpoint Not present Minimally<br />
present<br />
CP1 Direct focus to SMEs<br />
CP2 Positive framing<br />
CP3 Negative framing<br />
CP4 References<br />
CP5 Use of formal methodology<br />
Moderately<br />
present<br />
Maximally<br />
present<br />
The first checkpoint (CP1) investigates the level of targeting of a specific SME audience by the ISV.<br />
The criteria for the score were as follows. Score 0 was given if no trace was found indicating that the<br />
ISV is targeting an SME audience. Score 1 was given if traces were found indicating that the ISV is<br />
targeting an SME audience, but these traces are not reflected in the mission statements nor in<br />
specific product or service offerings. Score 2 was given if traces were found that the ISV is targeting<br />
an SME audience in their product or service offerings but not in their mission statements. Finally,<br />
score 3 was given if traces were found indicating that the ISV is targeting an SME audience in its<br />
mission statements.<br />
129
Jan Devos, Hendrik Van L<strong>and</strong>eghem <strong>and</strong> Dirk Deschoolmeester<br />
CP2 en CP3 are derived from the PT <strong>and</strong> indicate whether the website of the ISV is framing product<br />
<strong>and</strong> service offerings in a positive way (CP2) or a negative way (CP3). Examples of signs of positive<br />
framing are the mention of the immediate benefits after the implementation of the IT artefact, without<br />
mentioning how these benefits will be measured <strong>and</strong> the offer of fixed prices for projects without<br />
taking into account knowledge of the scope <strong>and</strong> denying the burden of (organizational) change during<br />
the implementation process. Examples of negative framing are the mention of one or more of the<br />
numerous risks that comes along with the implementation of a strategic information system <strong>and</strong> the<br />
necessary maturity level of management needed to conduct such complex projects (Schmidt et al.<br />
2001). However, there are no simple <strong>and</strong> objective rules to define a positive framing nor a negative<br />
one. Therefore, we screened the websites in two converging phases <strong>and</strong> under the supervision of a<br />
very experienced researcher <strong>and</strong> practitioner. We also assumed that within a regular commercial<br />
activity, <strong>and</strong> certainly within a public context, such as a website, the positive framing of products <strong>and</strong><br />
services is common practice <strong>and</strong> part of the commercial game by which ISVs present their daily<br />
business. However, we noticed that some ISVs tend to slow down on the sales talk in their websites<br />
<strong>and</strong> establish a more serious <strong>and</strong> well-balanced image of how they conduct these complex <strong>and</strong><br />
delicate projects.<br />
We attached different scores to CP3 than to CP2. Score 0 was given if no trace was found indicating<br />
a positive/negative framing <strong>and</strong> was identical for both checkpoints. Score 1 was given for CP2 if one<br />
trace (for example, in a sentence, a quote, a header or a paragraph.) of positive framing was found,<br />
score 2 for two traces <strong>and</strong> score 3 for more than two traces. For CP3, score 1 was given if no trace<br />
(for example, in a sentence, a quote, a header or a paragraph.) of an IS risk was found; score 2 for<br />
one trace <strong>and</strong> score 3 for more than one trace.<br />
CP4 investigated if the website of the ISV uses references of successful projects conducted with<br />
SMEs in the past. Score 0 was given if no trace was found of a sales reference. Score 1 was given if<br />
a reference was given without mentioning the nature of the project <strong>and</strong> a contact person. Score 2 was<br />
given if a reference was given that mentions the nature of the project but does not mention a contact<br />
person. Score 3 was given if the conditions of score 2 are fulfilled with a mention of the name <strong>and</strong><br />
address of one or more contact persons. All references have to be to SME organisations.<br />
Finally CP5 investigated the suggestion from the ISV to use a formal project management<br />
methodology (PMM) for conducting IS projects. A score 0 was given if no trace was found indicating<br />
the use of a PMM; score 1 if the website indicates that an IS project has to be conducted in a<br />
controlled environment; score 2 if there are traces on the website telling the user how to conduct an<br />
IS project without mentioning an explicit formal PMM; <strong>and</strong> finally, score 3 was given if the use of a<br />
formal PMM is mentioned by name.<br />
3.2 Interviews related to the case studies<br />
As a second source of data collection, we conducted six interviews with CIOs of SMEs who recently<br />
finished an outsourced, strategic IT project in their organisation. The questions used in the interviews<br />
covered four areas: 1) strategic importance of IT/IS in their organisation, 2) the use of a formal PMM,<br />
3) the success (or failure) of the IT project <strong>and</strong> 4) the relationship of the organisation with the ISV. In<br />
addition to these four areas, we asked questions that were focussed on general company information<br />
<strong>and</strong> on the job content <strong>and</strong> roles of the interviewees.<br />
The interviews were conducted by two people: the interviewer <strong>and</strong> a secretary, both of whom are<br />
researchers. The interviews were tape recorded for backup reasons, written down <strong>and</strong> then sent to<br />
the interviewees for correction <strong>and</strong> feedback. The average time for the interviews was two hours.<br />
4. Findings <strong>and</strong> discussion<br />
The results of the screening of the websites of the ISVs are summarized in Table 2. From the<br />
observations of CP1, we have learned that less than half of the ISVs (38.9%) have a direct focus on<br />
SMEs. Only 11.0% focus only on SMEs <strong>and</strong> state this in their mission statement. Considering the<br />
large number of SMEs in Europe <strong>and</strong> in Belgium, this indicates that the SME sector is not well<br />
serviced by large ISVs. It appears that most ISVs do not want to profile themselves as a ‘SME-only’<br />
seller. It was also noticed that large ISVs do not target SMEs. Since the list of 484 ISVs contains only<br />
the largest ISVs, one-man companies <strong>and</strong> freelancers are not included in the list. One can assume<br />
130
Jan Devos, Hendrik Van L<strong>and</strong>eghem <strong>and</strong> Dirk Deschoolmeester<br />
that many SMEs are served by micro enterprises <strong>and</strong> probably even by individual, external persons<br />
<strong>and</strong> that some of these do not even have a website.<br />
Table 2: Results of the screening of the websites<br />
Checkpoint Score 0 Score 1 Score 2 Score 3 Median<br />
CP1 Direct focus to SMEs 61.1% 12.7% 15.2% 11.0% 2<br />
CP2 Positive framing 37.8% 40.3% 12.7% 9.2% 1<br />
CP3 Negative framing 96.8% 2.5% 0.7% 0.0% 0<br />
CP4 References 22.6% 28.6% 14.5% 34.3% 1<br />
CP5 Use of formal methodology 41.7% 20.5% 20.1% 17.7% 1<br />
Positive framing of products <strong>and</strong> services is common practice within the ISV community, although<br />
37.9% of the websites of the ISVs show no trace of positive framing. Almost one out of ten (9.2%) use<br />
an intense form of positive framing in which the commercial message on the website tends to mislead<br />
the potential buyer.<br />
Concerning the negative framing, only a very small percentage (3.2%) scored 1 <strong>and</strong> 2 that indicate<br />
that conducting a strategic IS project implies some risks <strong>and</strong> that an effort on behalf of the customer is<br />
needed to succeed. One can expect such a small percentage, keeping in mind that a website is a tool<br />
in the marketing strategy of ISVs.<br />
The use of references is common practice with ISVs. 34.3% of the ISVs use references of former<br />
projects conducted within SME-organisations, giving detailed information about the customer <strong>and</strong> the<br />
project. These references can be checked almost directly since they include the name of a contact<br />
person <strong>and</strong> the necessary contact information (such as, telephone number or e-mail address). The<br />
‘good’ differentiate themselves here substantially from the ‘lemons’ in the market, on the basis of<br />
honest <strong>and</strong> verifiable information.<br />
The use of a formal PMM is not a common practice in SMEs. Almost half of the ISVs (41.7%) do not<br />
even indicate the use of a PMM. The larger the ISV, the more the use of a formal PMM is promoted<br />
on the website. Some of the ISVs even centre their services around the use of a formal PMM. For the<br />
good, the use of a formal PMM is a necessity, but the lemons do not even mention the concept. This<br />
finding corroborates with the expectation that SMEs are mainly served by small companies <strong>and</strong><br />
freelancers that offer services with low quality <strong>and</strong> that are mainly focussed on technology<br />
(programming, installing, configuring, etc.).<br />
From the interviews in the cases studied, we could deduce that the CIOs consider IT/IS for their<br />
organization more important than the CEOs. Thus, the IS function in their organization does not get<br />
as much attention by the CEO as other major business processes, such as marketing, manufacturing<br />
or sales. Although we used the title of CIO for the interviewees, such a function does not really exist in<br />
most SMEs. Our interlocutors were mainly performing some roles or partial roles of CIOs, such as IT<br />
project management, <strong>and</strong> budget <strong>and</strong> expenditure control. The IT management role of the CIO in a<br />
SME can be seen as a temporary role, often combined with the role of operator/programmer. In the<br />
latter role, they keep track of the daily IT issues (e.g., backups). The managerial level of the CIOs in a<br />
SME can also vary from the strategic level, as the assistant of the CEO <strong>and</strong> involved in important<br />
decision making to the operational level. This is not always straightforward since both levels of<br />
competence are needed in SMEs. For strategic IS projects, the managerial skills of the CIO are<br />
challenged. However, such complex systems also give rise to the need for more advanced technical<br />
skills. Some of the CIOs try to fill in these technical needs by themselves, since this is something the<br />
CEO is expecting from his CIO. However, the need for external, specialized IT expertise was<br />
expressed by all of the interviewees.<br />
All outsourced IT projects were managed by the CIOs in collaboration with a project leader from the<br />
ISV. Four of the six interviewees were not familiar with a PMM to conduct an IT project in their<br />
organisation. Only one (of the six) actually used a PMM <strong>and</strong> only the basic concepts were respected,<br />
such as the establishment of a steering committee <strong>and</strong> the organisation of periodic progress<br />
meetings. The CIOS clearly lacked sufficient knowledge to use more of the tools <strong>and</strong> concepts of a<br />
PMM.<br />
131
Jan Devos, Hendrik Van L<strong>and</strong>eghem <strong>and</strong> Dirk Deschoolmeester<br />
All of the interviewees had past experiences with failed IT projects. However, only one of the CIOs<br />
had terminated a project before it was finished. The main reason mentioned by CIOs for failure – <strong>and</strong><br />
then becoming an OISF - was the erroneous proposal the ISV made before the project began.<br />
Promises on budget, time <strong>and</strong> quality were made that could not be kept in reality. During the course of<br />
the project, it became clear that all of the ISVs had underestimated the budget <strong>and</strong> the timing of the<br />
project. Some of them even lacked the necessary skills to complete the project. The majority of the<br />
CIOs had less severely negative experiences, but made complaints that all ISVs offered proposals<br />
that were too optimistic in terms of budget <strong>and</strong> time needed to implement the IT artefact. One of the<br />
CIO’s negotiated a contract with his ISV in which he anticipated problems from a previously failed IT<br />
project <strong>and</strong> included penalties for late deliveries.<br />
Trust between SME <strong>and</strong> ISV is considered to be one of the most important factors for IT success.<br />
Three of the interviewees chose to do business in the future with their ISV on the basis of trust that<br />
was carefully built up during a past project. However, the other three CIO’s chose not to work in the<br />
future with the ISV who conducted their last IT project. A lack of trust <strong>and</strong> a feeling of deception were<br />
given as reasons.<br />
All of the interviewees had their own way of selecting an ISV, but all of them went to colleagues (<strong>and</strong><br />
sometimes even to competitors) to ask for real references for the selected ISVs. The interviewees<br />
were all aware that the market is not transparent <strong>and</strong> that these checks are necessary to reveal the<br />
real capabilities of an ISV.<br />
5. Conclusion<br />
The evidence from this study leads us to the following conclusions. First, we have confirmed the<br />
expectation that ISVs <strong>and</strong> SMEs meet each other in a market that reveals elements of a lemon<br />
market. Although many ISVs focus specifically on SMEs, others, mostly larger ISVs, do not. Thus,<br />
SMEs are mainly serviced by small ISVs. The larger the ISV organization, the more sophisticated the<br />
services offered, implying that a well matured SME organisation is essential to the capture the real<br />
value of these services.<br />
This study has some major limitations. First, data has been collected only in Belgian ISVs. However,<br />
Belgium is a country many SMEs <strong>and</strong> is, in that sense, quite representative of most of the European<br />
countries. Cultural differences could play a role but were not investigated in this research. In addition,<br />
government initiatives taken by many European countries to support SMEs could lead to different<br />
behaviour of ISVs in the different European domestic markets. In the Benelux <strong>and</strong> in France, regional<br />
governments have already started to introduce ethics charter programmes for ISVs that target the<br />
SME market (eTIC 2010).<br />
Another very important issue that should be raised is the size of the organization of the SME. Since<br />
Europe, <strong>and</strong> particularly Belgium, uses a more limited definition of a SME in terms of size of the<br />
organisation than the United States, the phenomenon of the lemon market may appear differently on<br />
the two continents. We hope that our findings stimulate others to investigate these related research<br />
questions.<br />
Second, it is difficult to reveal relevant data that investigates signs of a lemon market. ISVs are not<br />
cooperative in sharing information about their (possibly unethical) behaviour in the SME market. We<br />
are fully aware that websites possibly offer a biased picture of the services <strong>and</strong> quality of the ISVs.<br />
This is the reason why we decided to use multiple sources of data <strong>and</strong> to include data from the<br />
interviews.<br />
Finally, it could observed that there are indications of a self-cleaning mechanism present in the<br />
market within the group of ISVs, leading to a higher degree of quality <strong>and</strong> also leading to positive<br />
filtering from ‘the buy side’. However, the strongest conclusion is that some SMEs are indirectly<br />
encouraged by ISVs to withdraw from the finalisation of the software acquisition process due to their<br />
inadequate inferior IT capabilities <strong>and</strong> practices. This indicates that the lemon market for outsourced<br />
strategic IS projects is steered by a bidirectional mechanism, contributed to by both the buyer <strong>and</strong> the<br />
seller.<br />
132
References<br />
Jan Devos, Hendrik Van L<strong>and</strong>eghem <strong>and</strong> Dirk Deschoolmeester<br />
Afzal, W., Rol<strong>and</strong>, D. <strong>and</strong> Al-Squri, M. (2009) "<strong>Information</strong> asymmetry <strong>and</strong> product valuation: an exploratory<br />
study", Journal of <strong>Information</strong> Science, vol. 35, no. 2, pp. 192-203.<br />
Akerlof, G. (1970) "Market for Lemons - Quality Uncertainty <strong>and</strong> Market Mechanism", Quarterly Journal of<br />
Economics, vol. 84, no. 3, pp. 488-500.<br />
Bartis, E. <strong>and</strong> Mitev, N. (2008) "A multiple narrative approach to information systems failure: a successful system<br />
that failed", European Journal of <strong>Information</strong> Systems, vol. 17, no. 2, pp. 112-24.<br />
Bolton, J. (1971) Small Firms: Report of the Committee of Inquiry on Small Firms, Department of Trade <strong>and</strong><br />
Industry, London.<br />
Bond, E. (1982), "A Direct Test Of The Lemons Model - The Market For Used Pickup Trucks", American<br />
Economic Review, vol. 72, no. 4, pp. 836-40.<br />
Christozov, D., Chukova, S. <strong>and</strong> Mateev, P. (2009), "On Two Types Of Warranties: Warranty Of Malfunctioning<br />
And Warranty Of Misinforming", Asia-Pacific Journal of Operational Research, vol. 26, no. 3, pp. 399-420.<br />
Coenjaerts, T. (2008) "ICT TOP 1000", Data News, no. 41.<br />
Commission, (2003) "Commission Recommendation 2003/361/EC", Official Journal of the European Union, vol.<br />
46, no. L 124, p. 6.<br />
Commission (2010) Fact <strong>and</strong> Figures about the EU's Small <strong>and</strong> Medium Enterprise (SME), viewed 2/11/2010<br />
2010, .<br />
Devos, J., Van L<strong>and</strong>eghem, H. <strong>and</strong> Deschoolmeester, D. (2009) "IT Governance in SMEs: A Theoretical<br />
Framework Based on the Outsourced <strong>Information</strong> System Failure", Proceedings of the 3rd European<br />
Conference on <strong>Information</strong> <strong>Management</strong> <strong>and</strong> Evaluation.<br />
Devos, J., Van L<strong>and</strong>eghem, H. <strong>and</strong> Deschoolmeester, D.(2010), 'The Theory of the Lemon Markets in IS<br />
research', in YK Dwivedi, M Wade & SL Schneberger (eds), <strong>Information</strong> Systems Theory: Explaining <strong>and</strong><br />
Predicting Our Digital Society, Springer.<br />
Dewan, S. <strong>and</strong> Hsu, V. (2004), "Adverse selection in electronic markets: Evidence from online stamp auctions",<br />
Journal of Industrial Economics, vol. 52, no. 4, pp. 497-516.<br />
Dibbern, J., Goles, T. <strong>and</strong> Hirschheim, R. (2004), "<strong>Information</strong> Systems Outsourcing: A Survey <strong>and</strong> Analysis of<br />
the Literature", The DATA BASE for Advances in <strong>Information</strong> Systems, vol. 35, no. 4, pp. 6-102.<br />
Dibbern, J. <strong>and</strong> Heinzl, A. (2009) "Outsourcing of <strong>Information</strong> Systems Functions in Small <strong>and</strong> Medium Sized<br />
Enterprises: A Test of a Multi-Theoretical Model", Business & <strong>Information</strong> Systems Engineering, vol. 1, no.<br />
1, pp. 101-10.<br />
Eisenhardt, K. (1989), "Agency Theory: An Assessment <strong>and</strong> Review", Academie of <strong>Management</strong> Review, vol. 14,<br />
no. 1, pp. 57-74.<br />
eTIC (2010), viewed 12/04/2011 2011 .<br />
Goldfinch, S. (2007) "Pessimism, computer failure, <strong>and</strong> information systems development in the public sector",<br />
Public Administration Review, vol. 67, no. 5, pp. 917-29.<br />
Kahneman, D. <strong>and</strong> Tversky, A. (1979) "Prospect Theory - Analysis Of Decision Under Risk", Econometrica, vol.<br />
47, no. 2, pp. 263-91.<br />
Lee, B., Cho, H., Chae, M. <strong>and</strong> Shim, S. (2010) "Empirical analysis of online auction fraud: Credit card phantom<br />
transactions" Expert Systems with Applications, vol. 37, no. 4, pp. 2991-9.<br />
Levy, M. <strong>and</strong> Powell, P. (1999) "<strong>Information</strong> systems strategy for small <strong>and</strong> medium sized enterprises: an<br />
organisational perspective", Journal of Strategic <strong>Information</strong> Systems, vol. 9, no. 1, pp. 63-84.<br />
Lyytinen, K. <strong>and</strong> Robey, D. (1999) "Learning failure in information systems development", <strong>Information</strong> Systems<br />
Journal, vol. 9, no. 2, pp. 85-101.<br />
Microsoft (2011), viewed 12/04/2011 2011 .<br />
Pavlou, P. <strong>and</strong> Gefen, D. (2004) "Building effective online marketplaces with institution-based trust", <strong>Information</strong><br />
Systems Research, vol. 15, no. 1, pp. 37-59.<br />
SAP (2011), , viewed<br />
1/4/2011 2011.<br />
Schmidt, R., Lyytinen, K., Keil, M. <strong>and</strong> Cule, P. (2001), "Identifying software project risks: An international Delphi<br />
study", Journal of <strong>Management</strong> <strong>Information</strong> Systems, vol. 17, no. 4, pp. 5-36.<br />
Thong, J.Y.L. 2001, 'Resource constraints <strong>and</strong> information systems implementation in Singaporean small<br />
businesses', Omega-International Journal of <strong>Management</strong> Science, vol. 29, no. 2, pp. 143-56.<br />
Thong, J.Y.L., Yap, C.S. & Raman, K.S. 1996, 'Top management support, external expertise <strong>and</strong> information<br />
systems implementation in small businesses', <strong>Information</strong> Systems Research, vol. 7, no. 2, pp. 248-67.<br />
Verhees, F. & Meulenberg, M.T.G. 2004, 'Market orientation, innovativeness, product innovation, <strong>and</strong><br />
performance in small firms', Journal of Small Business <strong>Management</strong>, vol. 42, no. 2, pp. 134-54.<br />
Yap, C., Soh, C.<strong>and</strong> Raman, K. (1992) "<strong>Information</strong> Systems Success Factors in Small Business", Omega-<br />
International Journal of <strong>Management</strong> Science, vol. 20, no. 5-6, pp. 597-609.<br />
133
Authenticity of Digital Records: An Archival Diplomatics<br />
Framework for Digital Forensics<br />
Luciana Duranti <strong>and</strong> Adam Jansen<br />
University of British Columbia, Vancouver, Canada<br />
luciana.duranti@ubc.ca<br />
adam@dkives.com<br />
Abstract: The field of forensic analysis of digital records is undergoing a rapid maturation process in order to<br />
maintain pace with the change of technology. The evolving best practices in digital forensic investigation that<br />
concern collection, h<strong>and</strong>ling, examination <strong>and</strong> presentation of evidence are predominantly practitioner driven,<br />
with little research directed towards the issues surrounding the maintenance <strong>and</strong> long term preservation of the<br />
authenticity of the evidence collected. Yet, the authenticity of such evidence is essential to the judicial process<br />
for, without authentic evidence, determination of guilt or innocence cannot be certain. As evidence is increasingly<br />
in digital form, higher st<strong>and</strong>ards of conduct are dem<strong>and</strong>ed of those examining <strong>and</strong> preserving it. An<br />
interdisciplinary approach to the digital forensic processes involving the use of archival diplomatics can assist<br />
forensic experts in the determination of the authenticity of digital evidence that has the nature of records, as well<br />
as the identification of key attributes that must be preserved over the long term to demonstrate <strong>and</strong> maintain the<br />
records continuing authenticity. The scientific rigor of archival diplomatics would allow forensic experts <strong>and</strong> the<br />
custodians of collected evidence to demonstrate, over the long term <strong>and</strong> through system <strong>and</strong> technical<br />
migrations, the continuing authenticity of both the records they have collected from a crime scene as evidence<br />
<strong>and</strong> the records they have produced during the examination, submission <strong>and</strong> maintenance of such evidence.<br />
Through an overview of a research project carried out at the University of British Columbia, this paper discusses<br />
how the concepts of archival diplomatics, digital forensics <strong>and</strong> the law of evidence can be integrated to form the<br />
theoretical framework of the new discipline of Digital Records Forensics.<br />
Keywords: digital forensics, digital preservation, archival diplomatics, records, authenticity<br />
1. Introduction<br />
“Without the rigorous process that leads to proven scientific discovery, decision-makers<br />
in the courts <strong>and</strong> elsewhere are left to rely on supposition or worse yet intuition in the<br />
pursuit of justice.” (DFRWS, 2001)<br />
The increased use of technology in the creation <strong>and</strong> management of information in institutions of all<br />
sizes, both public <strong>and</strong> private, has resulted in a greater reliance upon computer-generated <strong>and</strong> stored<br />
materials as evidence This exponential growth has resulted in a rapid maturation of the field of digital<br />
forensics to address the immediate needs of forensics investigators. However, the majority of the<br />
published research in the field has focused on the practitioner driven processes of collection,<br />
h<strong>and</strong>ling, analysis <strong>and</strong> presentation of evidence. As a result, little attention has been paid to the<br />
longer-term issues of the maintenance <strong>and</strong> preservation of evidence <strong>and</strong> the theory, principles, <strong>and</strong><br />
methodological concepts on which these forensic processes should be based. This paper provides an<br />
overview of a research project carried out at the University of British Columbia that addresses the<br />
issues of managing <strong>and</strong> maintaining digital materials produced <strong>and</strong>/or collected during forensic<br />
examinations for as long as needed, <strong>and</strong> presents selected concepts from archival diplomatics that<br />
can contribute to the articulation of the theoretical <strong>and</strong> methodological framework required to develop<br />
strategies <strong>and</strong> procedures for the preservation of authentic digital evidence. The need for a deeper<br />
underst<strong>and</strong>ing of what authenticity means in the digital environment <strong>and</strong> in relation to long term<br />
preservation is increasingly important as cases involving digital evidence are becoming larger <strong>and</strong><br />
more complex <strong>and</strong> the time between initial incident <strong>and</strong> final resolution of court cases is taking longer,<br />
often lasting a decade or more (Jansen, 2010).<br />
The lack of a rigorous, scientific approach to the management <strong>and</strong> maintenance over the long term of<br />
forensic evidence for the support of investigations, along with the absence of consistent terminology<br />
has been highlighted by several of the leading judicial <strong>and</strong> forensic experts. In testimony before the<br />
US Senate, Chief Judge Emeritus Harry Edwards provided testimony on the “paucity of<br />
interdisciplinary scientific research to support forensic disciplines” <strong>and</strong> “the absence of solid scientific<br />
<strong>and</strong> applied research focused on new technology <strong>and</strong> innovation” (Edwards, 2009: 2). The first Digital<br />
Forensics Research Workshop (DRFWS) emphasized the need to “establish a research community<br />
that would apply the scientific method in finding focused near-term solutions driven by practitioner<br />
requirements <strong>and</strong> addressing longer term needs” (DRFWS, 2001: iii). Sujeet Shenoi, in his opening<br />
address to the 2011 International Federation for <strong>Information</strong> Processing (IFIP) Working Group 11.9 on<br />
134
Luciana Duranti <strong>and</strong> Adam Jansen<br />
Digital Forensics conference, challenged the participants to conduct <strong>and</strong> publish more peer-reviewed<br />
research in order to advance the field. Already Eoghan Casey had raised concerns about digital<br />
forensics being “a nebulous discipline that lacks st<strong>and</strong>ards or even clear definitions of fundamental<br />
terminology” (Casey, 2004).<br />
In the United States, adding to this need for a consistent theoretical approach to the forensic<br />
processes is the increased application of the ‘Daubert rules’ to determine the admissibility of expert<br />
testimony (Kenneally, 2001). These rules are four general guidelines established in Daubert v. Merrell<br />
Dow Pharmaceuticals, 509 US 579 (1993) to assist judges in determining whether the methodologies<br />
<strong>and</strong> techniques employed to identify scientific evidence were sound <strong>and</strong> widely accepted. They<br />
essentially stated that an inference of a valid process could be made if:<br />
The theory, procedure or process has been tested <strong>and</strong> the test is valid <strong>and</strong> repeatable<br />
It has been subjected to peer review or publication (st<strong>and</strong>ard)<br />
Its known or potential error rate is acceptable<br />
It is generally accepted within the relevant scientific community<br />
These guidelines are of particular concern to the forensics field in the US as Kumho Tire Company v.<br />
Carmichael 526 U.S. 137 (1999) extended them to include expert testimony in other technical <strong>and</strong><br />
specialized fields (Meyers, 2004). Application of the concepts introduced by the Daubert rules is<br />
however spreading well beyond the jurisdiction in which they were first articulated <strong>and</strong> requires the<br />
development of an overarching intellectual framework within which all forensic processes can be<br />
situated <strong>and</strong> articulated as an internally consistent system of ideas <strong>and</strong> practices. This requires<br />
interdisciplinary research in areas of established knowledge capable of supporting the purposes of<br />
forensic activity.<br />
2. The Digital Records Forensics project<br />
The Digital Records Forensics (DRF) project of the University of British Columbia (UBC) was<br />
developed in 2008 to begin addressing the need for an interdisciplinary body of theory <strong>and</strong> methods<br />
supporting the digital forensics processes. The DRF project is a collaboration among the UBC School<br />
of Library, Archival <strong>and</strong> <strong>Information</strong> Studies, the UBC Faculty of Law <strong>and</strong> the Vancouver Police<br />
Department. The project has used multiple methodologies to underst<strong>and</strong> the depth <strong>and</strong> breadth of the<br />
challenges of managing <strong>and</strong> maintaining digital evidence currently faced by the forensics community,<br />
including:<br />
A comparative analysis of existing literature in the fields of computer science, evidence law <strong>and</strong><br />
archival diplomatics,<br />
Analysis of the case law in North American,<br />
Case studies, <strong>and</strong><br />
Semi structured interviews of forensics professionals, lawyers, judges, <strong>and</strong> records managers,<br />
<strong>using</strong> the ethnographic approach.<br />
To address the issues evidenced by its findings, the DRF project is integrating concepts <strong>and</strong> methods<br />
from archival diplomatics, digital forensics <strong>and</strong> the law of evidence to build up the core body of<br />
knowledge of a new scientific discipline called Digital Records Forensics. This discipline will also<br />
leverage on twelve years of research into the long term preservation of the authenticity of digital<br />
records conducted by the International research on Permanent Authentic Records in Electronic<br />
Systems (InterPARES) project, (also based at UBC).<br />
The very first obstacle the DRF project encountered was a need for reconciliation across domains of<br />
the terminology that is at the core of the project itself. For example, while all disciplines involved in the<br />
research deal with “preservation”, they define it quite differently. Most digital forensic models identify<br />
preservation as one of the steps in the forensic process. Carrier’s model refers to preservation as<br />
isolation <strong>and</strong> collection (Carrier, 2003). Reith, Carr, <strong>and</strong> Gunsch define the preservation activity as to<br />
“isolate, secure <strong>and</strong> preserve the state of physical <strong>and</strong> digital evidence,” including “preventing people<br />
from <strong>using</strong> the digital device or allowing other electromagnetic devices to be used within an affected<br />
radius” (Reith et al., 2002: 4). DFRWS recognizes the need for preservation, but does not provide any<br />
significant detail on what preservation means with regards to digital evidence; rather, its model<br />
describes the relevant issues as case management, imaging technologies, chain of custody <strong>and</strong> time<br />
synchronization. The archival view of digital preservation is quite different, as it involves the whole of<br />
135
Luciana Duranti <strong>and</strong> Adam Jansen<br />
the principles, policies, strategies <strong>and</strong> activities designed to ensure the physical <strong>and</strong> technological<br />
stabilization of records for the purpose of extending indefinitely their life <strong>and</strong> protecting the accuracy<br />
<strong>and</strong> authenticity of <strong>and</strong> maintaining the accessibility to their intellectual content. Thus, preservation<br />
includes, among many other activities, description, which provides an account of the context,<br />
attributes, <strong>and</strong> relationships of the documents, <strong>and</strong> the development <strong>and</strong> maintenance of retrieval<br />
systems. The continuing authenticity of records has relied for centuries on the concept of an unbroken<br />
chain of custody. However, as the long term storage <strong>and</strong> retrieval of digital objects require both<br />
“physical <strong>and</strong> representational transformations, the traditional concept of an unbroken chain of<br />
custody needs to be exp<strong>and</strong>ed to encompass the processes that are necessary to ensure that an<br />
electronic record is transmitted over time without inappropriate alteration” (Preservation Task Force,<br />
2001: 8). Integrating the archival underst<strong>and</strong>ing of preservation into the forensic models will bring a<br />
more sophisticated underst<strong>and</strong>ing of what is required to effectively preserve evidence over the long<br />
term, an underst<strong>and</strong>ing that heavily relies on the archival diplomatics concept of authenticity.<br />
3. Traditional diplomatics<br />
The first scientific method for establishing the authenticity of records of questionable origin was<br />
developed by the French Benedictine monk Dom Jean Mabillon, who in 1681 wrote De re Diplomatica<br />
libri VI, which analyzed medieval charters in relation to others of similar type looking for deviations<br />
from the routines used by the entities they claimed to be authored by. Mabillon penned his<br />
masterwork in response to a challenge by the Jesuit Boll<strong>and</strong>ist Daniel van Papenbrock questioning<br />
the authenticity of the charters on which the French Abbey of Saint Denis based its patrimonial rights<br />
(Skemer, 1989). However, the scientific validity of the methodology he developed <strong>and</strong> the theoretical<br />
framework that he built for it were recognized by van Papenbrock <strong>and</strong> were used for centuries in<br />
judicial disputes about the authenticity of documentary evidence, which were called “Bella<br />
Diplomatica” or “wars about records”, from the title of Mabillon’s book. From the second half of the<br />
18 th century, the concepts <strong>and</strong> methods of diplomatics were taught in the faculties of law of all major<br />
European universities <strong>and</strong> became the foundation of the law of evidence as we know it today.<br />
Over the centuries, as the introduction of new technologies (e.g. the printing press, photocopiers)<br />
exp<strong>and</strong>ed the creation <strong>and</strong> use of records, the body of knowledge of diplomatics continued to evolve<br />
to accommodate the development of new record types, records creation processes, etc. while<br />
continuing to maintain the ability of its concepts <strong>and</strong> methods to determine the capacity of a record to<br />
st<strong>and</strong> as evidence of the action in the course which it was created. The postulate on which<br />
diplomatics is based is that “regardless of differences in nature, provenance or date, from a formal<br />
point of view all records are similar enough to make it possible to conceive of one typical, ideal<br />
documentary form containing all possible elements of a record” (Duranti <strong>and</strong> Thibodeau, 2006: 16). In<br />
the course of the InterPARES project, researchers proved that the process of decomposing records<br />
into their constituent components <strong>and</strong> analyzing each component independently of the record’s<br />
content in order to determine the authenticity of the whole is as applicable to today’s digital records as<br />
it was to medieval documents. However, as contemporary records are much more dependent on their<br />
context than their medieval counterparts, the theory of archival science was integrated by InterPARES<br />
researchers into diplomatic theory, <strong>and</strong> this resulted in a new discipline that was called archival<br />
diplomatics.<br />
4. When a digital entity is a record<br />
Archival diplomatics is the integration of traditional diplomatic concepts <strong>and</strong> methods with modern<br />
archival theory “based on jurisprudence, the history <strong>and</strong> theory of administration, <strong>and</strong> an extensive<br />
<strong>and</strong> centuries old body of written reflection <strong>and</strong> experience about the nature of records <strong>and</strong> recordkeeping<br />
practices in bureaucratic organizations” (MacNeil, 2004: 205). It is defined as “the discipline<br />
which studies the genesis, forms, <strong>and</strong> transmission of archival documents [or records], <strong>and</strong> their<br />
relationship with the facts represented in them <strong>and</strong> with their creator, in order to identify, evaluate, <strong>and</strong><br />
communicate their true nature “(Duranti, 1989a:17). Like diplomatics, archival diplomatics emphasizes<br />
the importance of identifying records among other kinds of information, because they are considered,<br />
in civil law countries, the “perfect” form of proof of actions <strong>and</strong> transactions, <strong>and</strong>, in common law<br />
countries, an exception to the hearsay rule, which precludes admissibility of any other kind of<br />
documents as evidence. Archival diplomatics has been refined over the course of the InterPARES<br />
research project (1998-2012) <strong>and</strong> continues to evolve with the DRF project. One of the key outcomes<br />
of this process of refinement was the breaking down of the ‘ideal’ digital record into its constituent<br />
parts, all considered requirements for the existence of a record:<br />
136
Luciana Duranti <strong>and</strong> Adam Jansen<br />
A stable content <strong>and</strong> a fixed form, meaning that the entity’s content must be stored so that it<br />
remains complete <strong>and</strong> unaltered, <strong>and</strong> its message can be rendered with the same documentary<br />
form or presentation it had when first set aside;<br />
Explicit linkages to other records within or outside the digital system, through a classification code<br />
or other unique identifier;<br />
An identifiable legal-administrative, provenancial, <strong>and</strong> procedural context;<br />
An identifiable author (i.e. the person or organization issuing the record), addressee (i.e., the<br />
person or organization for whom the record is intended), <strong>and</strong> writer (i.e. the person responsible for<br />
the articulation of content);<br />
An action, in which the record participates or which the record supports either procedurally or as<br />
part of the decision making process ; <strong>and</strong><br />
A medium, that is a support or carrier to which the record is affixed (Duranti <strong>and</strong> Thibodeau 2006,<br />
MacNeil, 2000).<br />
On the basis of the diplomatics fundamental assumption that the elements of a record form or<br />
documentary presentation (e.g. the elements of a letter, a memo, a report, a GIS) reveal the presence<br />
of its necessary components listed above <strong>and</strong> their meaning, the InterPARES project developed a<br />
Diplomatic Template of Analysis (IP2, 2008) that identifies all the possible elements of a record’s<br />
external <strong>and</strong> internal form <strong>and</strong> allows for a quick <strong>and</strong> accurate identification of written information as a<br />
record<br />
5. Documentary form <strong>and</strong> authenticity<br />
Archival diplomatic theory states that when a record is proven authentic, one can presume that its<br />
integrity has been maintained (MacNeil, 2004). The opposite however is not true. While authenticity<br />
implies integrity, integrity does not imply authenticity – one can preserve the integrity of a forgery, yet<br />
doing so does not make of it an authentic record. Therefore, there exists another characteristic of a<br />
record that, when combined with integrity, allows for the validation of its authenticity: identity. The<br />
identity of a digital record comprises the whole of the distinguishing attributes that together uniquely<br />
characterize it <strong>and</strong> differentiate it from other records. In order to prove the authenticity of a digital<br />
record, it is necessary to establish its continuing identity <strong>and</strong> demonstrate its integrity. Identity allows<br />
the examiner to differentiate one record from another; to determine the who, what, where, when, why,<br />
<strong>and</strong> to establish the degree of perfection of the record, that is, whether it is a draft, an original or a<br />
copy <strong>and</strong>, if the latter, what type of copy <strong>and</strong> what version of it. From a diplomatic perspective, the<br />
identity of a record is revealed by its documentary form or presentation.<br />
The documentary form of a record is the expression of a set of rules of representation that are meant<br />
to convey a message <strong>and</strong> is composed of both extrinsic elements <strong>and</strong> intrinsic elements. The extrinsic<br />
elements define the appearance of the record; while the intrinsic elements articulate its content by<br />
providing its structure. Together, they reveal its legal, administrative, provenancial, procedural <strong>and</strong><br />
documentary context. From a conceptual viewpoint, “intrinsic elements of form are those which make<br />
a document complete, <strong>and</strong> extrinsic elements are those which make it perfect, that is, capable of<br />
accomplishing its purpose,” (Duranti, 1991: 6).<br />
The InterPARES Diplomatic Template for Analysis identified among the extrinsic elements of digital<br />
records presentation features (i.e., general characteristics, like text, graphics, images or sound, <strong>and</strong><br />
specific characteristics, such as fonts, colors, hyperlinks, layouts, <strong>and</strong> resolution/scale/sample rate),<br />
electronic signatures, digital time stamps, <strong>and</strong> special signs (identifiers denoting the persons involved<br />
in the origination or execution of the record, like digital watermarks <strong>and</strong> logos) (IP1, 2000). Intrinsic<br />
elements establishing the identity of digital records include date, superscription (i.e., the mention of<br />
the name of the author in the upper part of the record, as in an e-mail header), inscription (i.e., the<br />
mention of the name of the addressee), subject, salutation, preamble, subscription, etc.<br />
It is not the purpose of this paper to sum up the concepts of archival diplomatics but to give a sense of<br />
the level of detail diplomatic analysis relies upon, which is not limited to the form of the record, but<br />
concerns the persons (or actors, being participant in the action that the record puts into being or<br />
participate in), the action to which the record relates, by putting it into being (i.e. dispositive record,<br />
like a contract), proving it after it occurred (i.e. probative record, like a certificate), supporting it with<br />
information (i.e. supporting record, like a GIS), discussing it (i.e. narrative record, like a report),<br />
137
Luciana Duranti <strong>and</strong> Adam Jansen<br />
guiding it (i.e. instructive record, like a score or a digital form), or enabling it (i.e. enabling record, like<br />
a digital workflow); the procedure or process in which the record takes part, the behaviour of different<br />
types of records (e.g. dynamic, interactive, experiential) <strong>and</strong> the different types of trustworthiness (i.e.<br />
reliability, accuracy <strong>and</strong> authenticity) a record needs to be tested for (Duranti <strong>and</strong> Thibodeau, 2006;<br />
Duranti, 2007; Duranti, 2009, Duranti, 2010).<br />
To assist in the establishment of the identity of a record, InterPARES further developed the concept of<br />
record profiles, which had been previously introduced in the first iteration of the DoD5015.2 st<strong>and</strong>ard<br />
by Duranti <strong>and</strong> Eastwood (Duranti, Eastwood <strong>and</strong> MacNeil, 2002). Record profiles document the<br />
identity of digital records by linking context <strong>and</strong> form in an inextricable way,<br />
6. Authenticity <strong>and</strong> preservation<br />
Custodians can only preserve records as trustworthy (i.e. reliable, accurate <strong>and</strong> authentic) as they are<br />
when first created. It is therefore the custodian’s responsibility to establish the identity of the records<br />
prior to acquiring them <strong>and</strong> to maintain that identity, together with their integrity, afterwards (MacNeil,<br />
2004). In the digital environment, this is a tall order, because it is not possible to preserve digital<br />
records; it is only possible to preserve the ability to reproduce them (Duranti <strong>and</strong> Thibodeau, 2006).<br />
As it will always be necessary to retrieve the binary bits <strong>and</strong> process those bits through the use of<br />
intermediaries (i.e. hardware <strong>and</strong> software) in order to render the evidence into a human readable<br />
format, it falls upon the custodian to ensure that the necessary intermediaries will exist when needed.<br />
To render representations with an accuracy that is able to withst<strong>and</strong> a diplomatic analysis requires the<br />
custodian to store the binary content of the record, including indicators of all the elements of<br />
documentary form necessary to convey the essence of the record, in a manner that ensures the<br />
record will be rendered with the same presentation <strong>and</strong> in the same context that gave it meaning.<br />
Because of technological obsolescence, the conversion <strong>and</strong> migration processes required to preserve<br />
the records will undeniably alter the underlying bits that ‘make’ the record, but here the force of the<br />
archival diplomatics theory comes into play. In fact, such theory allows for the authenticity of the<br />
record to become an inference that one draws from the documentation that is maintained by the<br />
custodian about its components, characteristics, creation, maintenance <strong>and</strong> preservation. This<br />
inference would be supported by the identity <strong>and</strong> integrity metadata included in the record profile that<br />
would be an integral part of any record that is presumed authentic.<br />
7. Conclusion<br />
In the more than three hundred years since its origin, diplomatics has been widely used by European<br />
archivists as a dependable, tested methodology for determining the authenticity of a record. Over the<br />
past ten years, InterPARES has extended diplomatic theory, principles <strong>and</strong> methods to digital records,<br />
integrating them with archival science to form archival diplomatics in order to establish the means of<br />
preserving the authenticity of digital records over the long term. More recently, the DRF project has<br />
tested the concepts of archival diplomatics on the digital forensic process, bringing an<br />
interdisciplinary, academic research-based rigour to the practice of digital forensics, thereby<br />
addressing some of the concerns raised by Edwards, Casey, <strong>and</strong> Shenoi. The research conducted by<br />
InterPARES <strong>and</strong> DRF should support digital forensic work with regard to at least two of the four<br />
Daubert guidelines, by providing a theoretical framework that has been tested <strong>and</strong> has a wide-spread<br />
acceptance within the scientific community, <strong>and</strong> meets international st<strong>and</strong>ards. Further research <strong>and</strong><br />
implementation of archival diplomatic concepts, principles <strong>and</strong> methods within the computer forensics<br />
domain will be necessary not only to meet all the requirements of the Daubert test but also, <strong>and</strong> more<br />
importantly, to ensure that authentic digital evidence is preserved for as long as needed with its<br />
identity <strong>and</strong> integrity intact.<br />
The body of knowledge built by the DRF project through the integration of archival diplomatics, digital<br />
forensics <strong>and</strong> the legal principles underlying the law of evidence is being articulated in a number of<br />
courses at the University of British Columbia School of Library, Archival <strong>and</strong> <strong>Information</strong> Studies<br />
(SLAIS) as part of a newly proposed stream within the Master of Archival Studies program. The<br />
proposed courses will cover the theoretical <strong>and</strong> methodological content of a new discipline called<br />
“digital records forensics” <strong>and</strong> will contribute to the formation of a new kind of archival <strong>and</strong> forensic<br />
professional, able to rely on an established body of concepts, principles <strong>and</strong> methods to continuously<br />
develop new practices capable of dealing with new <strong>and</strong> emerging technologies <strong>and</strong> permanently<br />
preserve the authenticity of the records that they generate.<br />
138
References<br />
Luciana Duranti <strong>and</strong> Adam Jansen<br />
Casey, E. (2004) “The Need for <strong>Knowledge</strong> Sharing <strong>and</strong> St<strong>and</strong>ardization”, Digital Investigation, No. 1, pp.1-2.<br />
Carrier, B. (2003) “Getting Physical with the Digital Investigative Process”, International Journal of Digital<br />
Evidence, Vol. 2, No. 2, pp 1-20.<br />
Daubert v. Merrell Dow Pharmaceuticals, Inc. Daubert (1993) 509 U.S. 579.<br />
Digital Forensics Research Workshop (2001) DTR-T001-01 Final: A Roadmap for Digital Forensic Research –<br />
Report from the First Digital Forensic Workshop (DFRWS), [online] http://www.dfrws.org/2001/dfrws-rmfinal.pdf.<br />
Duranti, L. (1989) “Diplomatics: New Uses for an Old Science, Part I”, Archivaria, Summer, No. 28, pp.7-27.<br />
Duranti, L. (1989) “Diplomatics: New Uses for an Old Science, Part II”, Archivaria, Fall, No. 29, pp.4-17.<br />
Duranti, L. (1999) “Concepts <strong>and</strong> Principals for the <strong>Management</strong> of Electronic Records, or Records <strong>Management</strong><br />
Theory is Archival Diplomatics”, Records <strong>Management</strong> Journal, Vol. 9, No. 3, pp. 148-171.<br />
Duranti, L. (2007) “The InterPARES 2 Project (2002-2007): An Overview”, Archivaria, No. 64, pp. 113-121.<br />
Duranti, L. (2009) “From Digital Diplomatics to Digital Records Forensics”, Archivaria, No. 68, pp. 39- 66.<br />
Duranti, L. (2010) “Concepts <strong>and</strong> Principles for the <strong>Management</strong> of Electronic Records, or Records <strong>Management</strong><br />
Theory is Archival Diplomatics”, Records <strong>Management</strong> Journal, Vol. 20, No. 1, pp. 78-95.<br />
Duranti, L., Eastwood, T. <strong>and</strong> MacNeil, H. (2002) Preservation of the Integrity of Electronic Records, Kluwer<br />
Academic Publishers, Norwell, Massachusetts.<br />
Duranti, L. <strong>and</strong> Thibodeau, K. (2006) "The Concept of Record in Interactive, Experiential <strong>and</strong> Dynamic<br />
Environments: The View of InterPARES", Archival Science, Vol. 6, no. 1, pp 13-68.<br />
Edwards, H. (18 Mar 2009) Strengthening Forensic Science in the United States: A Path Forward. Statement<br />
before the United State Senate Committee on the Judiciary. [online] http://judiciary.senate.gov/pdf/09-03-<br />
18EdwardsTestimony.pdf.<br />
Gerber, M. <strong>and</strong> Leeson, J. (2004) “Formalization of Computer Input <strong>and</strong> Output: The Hadley Model”, Digital<br />
Investigation, No.1, pp. 214-224.<br />
Jansen, A. (2010) “Digital Records Forensics: Ensuring Authenticity <strong>and</strong> Trustworthiness of Evidence over Time”,<br />
Proceedings of the Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering,<br />
pp. 84-88.<br />
InterPARES 1 (IP1) Authenticity Task Force (2000) “Appendix 1: Template of Analysis”, The Long Term<br />
Preservation of Authentic Electronic Records: Findings of the InterPARES Project, University of British<br />
Columbia, [online] http://www.interpares.org/book/interpares_book_j_app01.pdf.<br />
InterPARES 1 (IP1) Preservation Task Force (2001) “Appendix 6: How to Preserve Authentic Electronic<br />
Records”, The Long Term Preservation of Authentic Electronic Records: Findings of the InterPARES<br />
Project, University of British Columbia, [online]<br />
http://www.interpares.org/book/interpares_book_o_app06.pdf.<br />
InterPARES 2 (IP2) (2008) Luciana Duranti <strong>and</strong> R<strong>and</strong>y Preston, eds., International Research on Permanent<br />
Authentic Records in Electronic Systems (InterPARES) 2: Experiential, Interactive <strong>and</strong> Dynamic Records<br />
Appendix 7: Diplomatic Analysis Template, [online], University of British Columbia, [online]<br />
http://www.interpares.org/ip2/display_file.cfm?doc=ip2_book_appendix_07.pdf.<br />
Kenneally, E. (2001) “Gatekeeping Out of the Box: Open Source Software as a Mechanism to Assess Reliability<br />
for Digital Evidence”, Journal of Law <strong>and</strong> Technology, Vol. 6, No. 13, [online]<br />
http://www.vjolt.net/vol6/issue3/v6i3-a13-Kenneally.html.<br />
Kumho Tire Co. v. Carmichael, (97-1709) 526 U.S. 137 (1999) 131 F.3d 1433, reversed.<br />
Lemieux, V. (2001) “Let the Ghosts Speak: An Empirical Exploration of the Nature of the Record”, Archivaria, No.<br />
51, pp. 81-111.<br />
MacNeil, H. (2000) “Providing Grounds for Trust: Developing Conceptual Requirements for the Long-Term<br />
Preservation of Authentic Electronic Records”, Archivaria, No. 50, pp. 52-78.<br />
MacNeil, H. (2004) “Contemporary Archival Diplomatics as a Method of Inquiry: Lessons learned from Two<br />
Research Projects”, Archival Science, No. 4, pp. 199-232.<br />
Meyers, M. <strong>and</strong> Rogers, M. (2004) “Computer Forensics: The Need for St<strong>and</strong>ardization <strong>and</strong> Certification”,<br />
International Journal for Digital Evidence, Vol. 3, No. 2.<br />
Reith, M, Carr, C <strong>and</strong> Gunsch, G. (2002) “An Examination of Digital Forensic Models”, International Journal of<br />
Digital Evidence, Vol. 1, No. 3 [online]<br />
http://www.utica.edu/academic/institutes/ecii/ijde/articles.cfm?action=issue&id=3.<br />
Skemer, D. (1989) “Diplomatics <strong>and</strong> Archives”, American Archivist, Vol. 52, Summer, pp. 376-382.<br />
139
A Reflective Framework for Successful IS Implementation<br />
in Healthcare: Applying Theories From IS Innovation <strong>and</strong><br />
Implementation Research<br />
Kate Dymoke-Bradshaw 1 <strong>and</strong> Ann Brown 2<br />
1<br />
Centre for Health Informatics, City University London, UK<br />
2<br />
Cass Business School, London, UK<br />
A.P.Brown@city.ac.uk<br />
Abstract: Healthcare delivery is a complex, collaborative exercise <strong>and</strong> the introduction of a new information<br />
system into this tightly interrelated network can have an impact that is then felt throughout the environment.<br />
There are many factors to be considered <strong>and</strong> in some cases these may be in conflict requiring trade-offs to be<br />
made. What is successful in one setting may not work in another <strong>and</strong> vice versa, so that organisational specifics<br />
need to be carefully considered. This paper presents a comprehensive framework (A Reflective Framework for<br />
Successful IS Implementation) that can be used to manage this type of IS implementation project. It builds on<br />
Greenhalgh et al.’s (2008) diffusion of innovation (DoI) model for complex innovations in health services. This<br />
model has a number of strengths that make its application to IS innovation projects in healthcare valuable: it<br />
provides a good, comprehensive framework <strong>and</strong> a multi-level approach to the analysis of success factors for IS<br />
innovation projects; it takes into account the complexities of the healthcare environment; <strong>and</strong> it provides a<br />
rationale for why various factors are important to success. It was, however, originally designed to be used in a<br />
different context <strong>and</strong> this paper therefore extends the original model by drawing on a number of supplementary<br />
concepts <strong>and</strong> theories from IS innovation <strong>and</strong> implementation research to develop a tool for prospective use in<br />
the implementation of a complex new large scale IS within a single healthcare organisation such as a hospital. In<br />
developing the reflective framework, a key additional component has been added to the nine original components<br />
of Greenhalgh et al.’s model: the adaptation process by which a good fit is developed between the information<br />
system <strong>and</strong> the organisation that will use it. Critical success factors identified for this process include strong user<br />
participation, minimal customisation, appropriate use of consultants <strong>and</strong> testing, training <strong>and</strong> support covering<br />
both technology <strong>and</strong> associated processes. The framework was developed as part of research conducted in the<br />
early stages of a project to introduce electronic prescribing <strong>and</strong> medicines management into an NHS acute trust<br />
as part of the NHS Connecting for Health National Programme for IT.<br />
Keywords: healthcare, IS implementation, frameworks<br />
1. Introduction<br />
The delivery of healthcare is a complex, collaborative exercise. As Berg (1999) has described, the<br />
roles <strong>and</strong> tasks of doctors <strong>and</strong> nurses are interwoven both with each other <strong>and</strong> with tools, documents<br />
<strong>and</strong> machines; the work is fluid in nature <strong>and</strong>, although much of it follows routine paths, it is also<br />
common for sudden events <strong>and</strong> contingencies that require ad hoc <strong>and</strong> pragmatic responses to arise;<br />
decision making is often distributed with many different individuals involved. Introducing a new<br />
information system (IS) or other new element into this tightly interrelated network, or removing an<br />
existing element, can have an impact that is then felt throughout the healthcare environment. There<br />
are many factors to be considered <strong>and</strong> in some cases these may be in conflict requiring trade-offs to<br />
be made. What is successful in one setting may not work in another <strong>and</strong> vice versa, so that<br />
organisational specifics need to be carefully considered.<br />
Additionally, the consequences of getting it wrong can be significant. A new IS may be expected to<br />
improve patient care <strong>and</strong> safety by making more accurate <strong>and</strong> up-to-date information available to<br />
support clinical decision making or by eliminating errors (e.g. NHS Connecting for Health, 2010a;<br />
2010b). If, however, there are problems with the implementation there may be a risk that patient care<br />
<strong>and</strong> safety are adversely impacted as a consequence.<br />
Since 2003, the UK Department of Health has run a major programme, the Connecting for Health<br />
(CFH) National Programme for IT (NPfIT), to deliver new computer services <strong>and</strong> applications to the<br />
National Health Service (NHS) in Engl<strong>and</strong>. This programme has had an erratic record. It has cost far<br />
more than originally budgeted. It has taken far longer than originally planned, but is now beginning to<br />
deliver some of the promised technology <strong>and</strong> benefits. Obtaining the full benefits of this programme<br />
within the health sector <strong>and</strong> particularly hospitals has become an important objective for the whole<br />
sector.<br />
140
Kate Dymoke-Bradshaw <strong>and</strong> Ann Brown<br />
The problem that this paper addresses is how to implement a complex new large scale IS<br />
successfully within an individual hospital. The approach taken has been to develop a reflective<br />
framework to be used as a tool by the Project Manager of an IS implementation project. The<br />
framework (A Reflective Framework for Successful IS Implementation) can be used to assess the<br />
risks involved in the implementation <strong>and</strong> to identify the issues that look likely to be important for<br />
successful exploitation. This should enable the Project Manager to better manage the risks, plan the<br />
project steps <strong>and</strong> monitor progress. The framework is in the form of a set of questions for the Project<br />
Manager to address. It draws on a number of theories including that of innovation diffusion (Cooper<br />
<strong>and</strong> Zmud, 1990; Fichman, 1992; Rogers, 2003; Swanson <strong>and</strong> Ramiller, 2004), but owes much of its<br />
final form to the pioneering work of Greenhalgh et al. (2008). The framework was developed as part of<br />
research work carried out during the early stages of a project to introduce electronic prescribing <strong>and</strong><br />
medicines management into an NHS acute trust as part of the NHS Connecting for Health National<br />
Programme for IT.<br />
Section 2 of the paper introduces Greenhalgh’s model. Section 3 presents the framework together<br />
with the reasoning on which it is based.<br />
2. The contribution of the diffusion of innovation model by Greenhalgh et al.<br />
This paper is concerned with complex IS innovation projects, new to the adopting organisation<br />
(Rogers, 2003; Swanson <strong>and</strong> Ramiller, 2004) – the type of IS that will typically be implemented into<br />
the core of the healthcare organisation’s operations <strong>and</strong> will have a direct impact on clinical care. Of<br />
Fichman’s (1992) four different adoption contexts within his framework this is clearly a cell 4<br />
application, i.e. adopted at the organisational level, imposing a heavy knowledge burden on adopters<br />
<strong>and</strong> having a significant impact on business processes <strong>and</strong> workflows.<br />
We took as the starting point for our reflective framework Greenhalgh et al.’s diffusion of innovation<br />
(DoI) model for complex innovations in health services (Greenhalgh et al., 2008). This model, shown<br />
in Table 1, is based on an extensive literature review (Greenhalgh et al., 2004) to address how<br />
innovations in health service delivery <strong>and</strong> organisation can be spread <strong>and</strong> sustained <strong>and</strong> it identifies<br />
nine interacting components that affect success in adopting complex innovations.<br />
The model has a number of strengths that make its application valuable to IS innovation projects in<br />
healthcare:<br />
It provides a good, comprehensive framework <strong>and</strong> a multi-level approach to the analysis of<br />
success factors for IS innovation projects, developed through a systematic review of<br />
approximately 600 sources;<br />
It was designed to be applied to a large NHS new technology project involving the implementation<br />
of a complex healthcare information system (Fichman cell 4 type applications);<br />
It takes into account the complexities of the healthcare environment; <strong>and</strong><br />
It provides a rationale for why various factors are important to success.<br />
It was, however, designed for use in a different context to that which we are interested in <strong>and</strong> has<br />
some different underlying assumptions.<br />
It was designed to be applied to a case study which examined the diffusion process by which a fully<br />
developed summary care record service (SCR) was adopted across a number of different<br />
organisations, which included GP practices, out-of-hours clinics, walk-in centres <strong>and</strong> emergency<br />
departments. We are interested in the innovation process within a single organisation.<br />
Also, use of the SCR was optional: participation by GP sites in loading data into the SCR was<br />
optional; patients could choose to opt out if they did not wish to have a record; <strong>and</strong> individual<br />
clinicians working in emergency <strong>and</strong> unscheduled care situations were able to choose whether or not<br />
to access the SCR on a patient by patient basis. We are interested in situations where use of the new<br />
IS will usually be m<strong>and</strong>ated.<br />
Cooper <strong>and</strong> Zmud (1990) propose that IS implementation projects, once the adoption decision has<br />
been taken, typically consist of four stages: adaptation, where the IS is adapted to meet the<br />
organisation’s needs, organisational procedures are revised <strong>and</strong> developed incorporating its use, <strong>and</strong><br />
staff are trained both in the new procedures <strong>and</strong> the use of the system; acceptance, where the IS is<br />
141
Kate Dymoke-Bradshaw <strong>and</strong> Ann Brown<br />
employed in organisational work; routinisation, where use of the IS becomes established as normal<br />
activity <strong>and</strong> it is no longer perceived as something out of the ordinary; <strong>and</strong> infusion, where the IS is<br />
used within the organisation to its highest potential. Greenhalgh et al. focused purely on the<br />
implementation <strong>and</strong> routinisation process in their case study as the way in which the SCR <strong>and</strong> the<br />
processes for <strong>using</strong> it had been designed <strong>and</strong> developed was beyond their scope. We are also<br />
interested in the adaptation process within the adopting organisation.<br />
Table 1: Components of the diffusion of innovation model for complex innovations in health services<br />
(Greenhalgh et al., 2008)<br />
1. Material properties of the technology<br />
To be successfully <strong>and</strong> widely adopted, a technology must include key functionality <strong>and</strong> work smoothly <strong>and</strong><br />
efficiently under real conditions of use<br />
2. Attributes of the technology as an innovation<br />
To be successfully <strong>and</strong> widely adopted, a technology must be seen by potential adopters as having<br />
Relative advantage (that is, clear benefits over existing technologies)<br />
Simplicity<br />
Compatibility with existing values <strong>and</strong> ways of working<br />
Trialability (can be tried out on a limited basis "without obligation")<br />
Observability (benefits can be seen directly)<br />
Potential for reinvention (capacity for users to customise <strong>and</strong> adapt it)<br />
3. Concerns of potential adopters<br />
Adoption is a process, not a one-off event, <strong>and</strong> is influenced by concerns, including<br />
Before adoption—what are its properties <strong>and</strong> potential benefits?; what will it cost me?<br />
During early use—how do I make it work?; when <strong>and</strong> how should I use it?<br />
During established use—how can I alter or improve it?<br />
4. Communication <strong>and</strong> influence<br />
A person’s decision to adopt an innovation is influenced by<br />
Mass media (press, mail shots), which can raise awareness<br />
Interpersonal influence (by champions, opinion leaders, for example), which can change people’s attitudes<br />
towards adoption<br />
5. Organisational antecedents for innovation<br />
Organisations may be more or less innovative. Differences are explained by several factors:<br />
Absorptive capacity for new knowledge<br />
Leadership <strong>and</strong> management<br />
Risk taking climate<br />
Effective data capture systems<br />
Slack resources<br />
6. Organisational readiness for innovation<br />
An organisation must be "ready" for a specific innovation. Readiness includes<br />
Innovation-system fit<br />
Tension for change<br />
Balance between supporters <strong>and</strong> opponents<br />
Specific preparedness<br />
7. The implementation <strong>and</strong> routinisation process<br />
Implementing a complex innovation, <strong>and</strong> making sure it becomes business as usual, is a highly non-linear<br />
process, typically characterised by shocks <strong>and</strong> setbacks. Critical success factors include<br />
Appropriate change model (balance between "make it happen" <strong>and</strong> "let it emerge")<br />
Good project management<br />
Autonomy of frontline teams<br />
Human resource factors, especially the selection, retention, continuity, <strong>and</strong> training of staff<br />
Alignment between new <strong>and</strong> old routines<br />
8. Linkage<br />
Innovation is more likely when there is<br />
Early <strong>and</strong> ongoing dialogue between the developers of the innovation, the change agents charged with<br />
promoting its adoption, <strong>and</strong> the end users<br />
Communication within the organisation <strong>and</strong> between similar organisations<br />
9. The wider environment<br />
Innovation in organisations is more likely when a "following policy wind," a conducive socio-political climate,<br />
<strong>and</strong> specific incentives <strong>and</strong> m<strong>and</strong>ates at national level are present<br />
Finally, Greenhalgh et al. applied their model retrospectively to interpret <strong>and</strong> explain their<br />
observations. We are interested in developing a framework that can be applied prospectively to an IS<br />
implementation project to identify risks <strong>and</strong> issues <strong>and</strong> support successful implementation.<br />
142
Kate Dymoke-Bradshaw <strong>and</strong> Ann Brown<br />
In consequence, some components of the DoI model do not go into the detail needed in addressing<br />
how to implement a complex new IS successfully within an individual health care organisation such as<br />
a hospital, or are based on assumptions that are not fully valid in the situations that we are interested<br />
in.<br />
The IS innovation <strong>and</strong> implementation literature has a number of useful concepts <strong>and</strong> theories that do<br />
apply to these situations, in particular those based on research into the implementation of enterprise<br />
resource planning (ERP) systems. Although commercially available healthcare records systems, such<br />
as the CRS, <strong>and</strong> ERP systems are targeted at very different markets, there are a number of<br />
similarities which make the findings from ERP applicable to healthcare records systems:<br />
Both are complex packaged solutions<br />
Both require the organisation to change <strong>and</strong> integrate its processes to fit the software<br />
Both produce <strong>and</strong> access information in a real-time environment<br />
Both have proved challenging to implement successfully in practice (Berg, 2001; Car et al., 2008;<br />
Coiera, 2003; Nah et al., 2001; Robey et al., 2002)<br />
We have therefore adapted the model <strong>and</strong> supplemented it with a number of additional theories to<br />
form our reflective framework. Specific areas we have drawn on include mindful innovation (Swanson<br />
<strong>and</strong> Ramiller, 2004), commitment to the project (Kim <strong>and</strong> Kankanhalli, 2009; Nah et al., 2001), user<br />
involvement <strong>and</strong> participation (Robey et al., 2002; Vaughan, 2001), managing resistance (Kim <strong>and</strong><br />
Kankanhalli, 2009; Vaughan, 2001) <strong>and</strong> building clinical engagement (Kaplan <strong>and</strong> Harris-Salamone,<br />
2009; NHS Institute for Innovation <strong>and</strong> Improvement, 2008; Siriwardena, 2009), overcoming<br />
knowledge barriers (Robey et al., 2002), managing change (Nah et al., 2001), minimising<br />
customisation (Nah et al., 2001), <strong>and</strong> managing process redesign (Berg, 2001; Heeks, 2006).<br />
3. A reflective framework for successful IS implementation<br />
The framework is organised into ten components, nine of which are exactly the same as those that<br />
Greenhalgh identified. We have added one key additional component (item 3.7 below) – the<br />
adaptation process by which a good fit is developed between the information system <strong>and</strong> the<br />
organisation that will use it. The framework takes the form of a series of questions that the Project<br />
Manager needs to address.<br />
The numbering does not denote an ordering of the components. Although some components need to<br />
be settled early in the project life cycle (for example 3.1 Material properties of the technology <strong>and</strong> 3.9<br />
Linkage), most components need to be addressed in parallel from the beginning of the project. Indeed<br />
many of the components raise issues that need active managing long after the initial successful<br />
installation if the hospital is to reap the full benefit of the new IS <strong>and</strong> reach Cooper <strong>and</strong> Zmud’s (1990)<br />
final stage of infusion.<br />
Mindful innovation (Swanson <strong>and</strong> Ramiller, 2004) can be thought of as an overarching principle for<br />
the successful implementation of IS innovations in healthcare <strong>and</strong> is a fundamental concept<br />
underpinning many of the components of the framework. Successful implementation cannot be<br />
achieved without careful reflection on what is appropriate in a given situation. A mindful approach<br />
takes account of the specifics of the complex healthcare environment with its many relationships <strong>and</strong><br />
interactions <strong>and</strong> with the need to respond to unexpected events. It investigates <strong>and</strong> addresses<br />
problems <strong>and</strong> risks, recognising different perspectives <strong>and</strong> conflicting needs, <strong>and</strong> it is flexible in<br />
situations that may be inherently uncertain <strong>and</strong> subject to crisis.<br />
The key aspects of each component are presented <strong>and</strong> explained below.<br />
3.1 Material properties of the technology<br />
Are the key functional requirements well understood? How have they been / will they be documented?<br />
What are the key use cases? How well are they understood / defined?<br />
Which functional requirements cannot be fully met by the system? Where are the most serious gaps? How can<br />
these be worked around?<br />
Are non-functional requirements (e.g. system capacity, performance, access <strong>and</strong> security, availability, backup<br />
operation in the event of outages) well understood?<br />
What additional hardware/networking will be required to support use of the system?<br />
143
Kate Dymoke-Bradshaw <strong>and</strong> Ann Brown<br />
To be successful, the IS must include key functionality <strong>and</strong> work smoothly <strong>and</strong> efficiently under real<br />
conditions of use (Greenhalgh et al., 2008). These questions probe the extent to which the<br />
organisation’s key requirements are understood <strong>and</strong> how well they are met by the technology,<br />
identifying potential problems <strong>and</strong> issues <strong>and</strong> allowing any significant gaps to be addressed early on.<br />
3.2 Attributes of the technology as an innovation<br />
What are the main benefits of the new system over current practice? Are these benefits clear to the users of<br />
the system?<br />
Are there any groups who will not gain benefits directly? Are the overall benefits clear to them?<br />
Will the project be able to take an incremental approach to implementation, keeping each stage as simple as<br />
possible?<br />
What can be done to make the system easy to learn <strong>and</strong> to use?<br />
What are the changes to existing values <strong>and</strong> ways of working for different stakeholder groups? Where will most<br />
change be required? How can these changes be best managed?<br />
How can the new system <strong>and</strong> ways of working be tried out <strong>and</strong> if necessary modified<br />
(a) before initial implementation<br />
(b) during roll-out<br />
What plans are there to demonstrate the new system <strong>and</strong> ways of working more widely before it is<br />
implemented?<br />
What steps will be taken to demonstrate that benefits are being achieved in practice once the system is in use?<br />
What potential is there to configure the system to the needs of individual users?<br />
It will be easier to adopt a new IS where its benefits are clear <strong>and</strong> can be directly observed.<br />
Emphasising the benefits of implementing the IS to patients <strong>and</strong> to the delivery of healthcare is an<br />
important factor in building clinical engagement (Siriwardena, 2009). Healthcare IS projects are more<br />
likely to be successful if they can be delivered in incremental steps, minimising the amount of change<br />
required at once, keeping processes <strong>and</strong> procedures involving use of the system as simple as<br />
possible <strong>and</strong> allowing for learning from one step to the next (Heeks, 2006). A new IS is also more<br />
likely to be successfully adopted if it can be tried out in a meaningful way before it is implemented,<br />
<strong>and</strong> there is capacity for individual users to configure it to their own needs (Greenhalgh et al., 2008).<br />
3.3 Concerns of potential adopters<br />
How are the concerns of key stakeholders <strong>and</strong> stakeholder groups being identified?<br />
What are the main concerns of the key stakeholder groups at the moment? How will these concerns be verified<br />
<strong>and</strong> how will they be addressed by the project?<br />
How will concerns continue to be identified <strong>and</strong> addressed as the project progresses from initiation through to<br />
initial implementation <strong>and</strong> roll-out?<br />
How will experiences <strong>and</strong> issues encountered (<strong>and</strong> addressed) in other healthcare organisations adopting<br />
similar systems be used by the project <strong>and</strong> shared with stakeholders?<br />
The political nature of IS implementation in healthcare needs to be managed in order to avoid failure<br />
“through ‘resistance’ <strong>and</strong> even ‘sabotage’ by users who are not taken seriously” (Berg, 1999). It is<br />
therefore important underst<strong>and</strong> <strong>and</strong> address the concerns of users <strong>and</strong> other stakeholders, so that<br />
participants can see tangible outcomes as a result of their engagement not only initially but also over<br />
time (CRG Research Limited <strong>and</strong> Cardiff University Centre for Health Sciences Research, 2008).<br />
3.4 Communication <strong>and</strong> influence<br />
What plans are there to raise <strong>and</strong> maintain awareness of the project?<br />
What are current attitudes towards the project? Are expectations realistic? How will the project manage<br />
attitudes <strong>and</strong> expectations?<br />
Who are the champions <strong>and</strong> opinion leaders who could change people’s attitudes to adoption? How can they<br />
be used most effectively?<br />
General communication (presentations, newsletters, system demonstrations, etc.) <strong>and</strong> the<br />
interpersonal influence of project champions, opinion leaders <strong>and</strong> others (Greenhalgh et al., 2008)<br />
can be used to help reduce resistance to the new IS <strong>and</strong> to improve engagement.<br />
3.5 Organisational antecedents for innovation<br />
What is the organisation's previous experience with IS implementation? Has it previously been successful in<br />
implementing projects of similar size <strong>and</strong> complexity?<br />
Is the organisation used to working in ways that this project requires (e.g. in interprofessional teams, across<br />
144
Kate Dymoke-Bradshaw <strong>and</strong> Ann Brown<br />
clinical <strong>and</strong> management boundaries)?<br />
Is there strong leadership, a clear strategic vision <strong>and</strong> good managerial relations? Are visionary staff in pivotal<br />
positions?<br />
Is the climate conducive to experimentation? Is the organisation experienced in risk management?<br />
Are sufficient resources available for the project <strong>and</strong> for implementation <strong>and</strong> roll-out?<br />
There are a number of factors that affect an organisation’s ability to innovate: its previous experience<br />
in innovation, leadership <strong>and</strong> management, a risk-taking climate, <strong>and</strong> availability of resources (time,<br />
money <strong>and</strong>/or expertise) (Greenhalgh et al., 2008). If the organisation does not have sufficient<br />
experience in implementing this type of project, it should consider ways of acquiring relevant<br />
expertise, e.g. by employing an experienced project manager or change manager, or by making use<br />
of external consultancy (Robey et al., 2002). Good risk management is needed, looking carefully at<br />
the possibility of failure <strong>and</strong> learning through improvisation <strong>and</strong> experimentation (Heeks, 2006;<br />
Swanson <strong>and</strong> Ramiller, 2004). The availability of clinical staff resources can be a particular issue for<br />
many projects: finding ways of involving clinical <strong>and</strong> other user representatives, <strong>using</strong> their insights<br />
<strong>and</strong> knowledge to improve the effectiveness of the project team <strong>and</strong> helping to identify <strong>and</strong> avoid<br />
problems is essential (Robey et al., 2002; Vaughan, 2001).<br />
3.6 Organisational readiness for innovation<br />
How well does the new system fit with existing values, strategies <strong>and</strong> goals?<br />
How well does the new system fit with the current skill mix?<br />
How well does the new system fit with the existing IT infrastructure <strong>and</strong> other information systems?<br />
Why does the current situation need to be improved? Do staff underst<strong>and</strong> <strong>and</strong> support this?<br />
Is there good support <strong>and</strong> advocacy for the project? Where are there gaps?<br />
Where is there resistance to the project? How will this be managed?<br />
What mechanisms will there be to monitor <strong>and</strong> evaluate both anticipated <strong>and</strong> unanticipated impacts of the<br />
system once it is in operational use?<br />
A number of factors need to be assessed in considering organisational readiness for innovation.<br />
These include: the extent to which the new IS fits with the organisation’s existing values, goals, skill<br />
mix, supporting technologies <strong>and</strong> ways of working; the strength of perception that the current situation<br />
must be changed; strong support <strong>and</strong> advocacy for the project; <strong>and</strong> the capacity to evaluate the<br />
innovation (Greenhalgh et al., 2004). For any aspect where there is poor organisational readiness<br />
needs to be investigated carefully to determine how best to address it.<br />
3.7 The adaptation process<br />
Will the project have a carefully selected, representative <strong>and</strong> committed core team of users empowered to act<br />
on behalf of their colleagues?<br />
How will the relevant information required for system configuration be gathered? Who will be involved in this<br />
process?<br />
How will the need for process changes be assessed <strong>and</strong> new ways of working designed? Who will be involved<br />
in this?<br />
Will any customisation of the technology be required? If so, how will this be minimised?<br />
What consultancy/external expertise will be available to the project? How will this be used?<br />
What sort of test environment will be available? Will it include realistic test data?<br />
How will the system be tested to ensure it includes all necessary functionality?<br />
How will the system be tested against non-functional requirements?<br />
How will new processes <strong>and</strong> ways of working be tested?<br />
How will training be developed? Will it be audience-specific? Will it cover both processes <strong>and</strong> use of the<br />
software? Will it include opportunities for h<strong>and</strong>s-on practice?<br />
What sort of training environment be available? Will it include realistic test data?<br />
What mechanisms will be in place to support users as they start to use the system in a live environment?<br />
We have added this component to the framework to cover the adaptation process (Cooper <strong>and</strong> Zmud,<br />
1990) in more detail. Strong, representative user participation is needed both in the configuration of<br />
the technology <strong>and</strong> in the design of associated processes (Berg, 2001; Heeks, 2006; Nah et al., 2001;<br />
Robey et al., 2002; Vaughan, 2001). An iterative approach, learning through improvisation <strong>and</strong><br />
experimentation, will make it easier for "design-reality gaps" to be identified <strong>and</strong> closed at an early<br />
stage (Heeks, 2006). Where a software package is being implemented, minimising system<br />
customisation (Nah et al., 2001) will enable the organisation to take advantage of newer versions <strong>and</strong><br />
releases more easily, <strong>and</strong> appropriate use of consultants <strong>and</strong> experts can help determine how best to<br />
configure the technology for the organisation's particular environment (Robey et al., 2002). Both<br />
145
Kate Dymoke-Bradshaw <strong>and</strong> Ann Brown<br />
testing <strong>and</strong> training should cover changes in ways of working as well as the technical use of the<br />
system, <strong>using</strong> as realistic an environment as possible (Nah et al., 2001; Robey et al., 2002) <strong>and</strong><br />
training should be audience-specific, allowing sufficient time <strong>and</strong> practice for users to become familiar<br />
with new ways of working (Kim <strong>and</strong> Kankanhalli, 2009; Vaughan, 2001). A support organisation to<br />
meet users’ needs after installation also needs to be put in place (Nah et al., 2001).<br />
3.8 The implementation <strong>and</strong> routinisation process<br />
How will top management support for <strong>and</strong> commitment to the implementation process be built <strong>and</strong> maintained?<br />
What implementation approach will the project take, e.g. “big bang”, phased roll-out, incremental delivery of<br />
functionality, pilot <strong>and</strong> scale-up?<br />
How will the implementation of process <strong>and</strong> other business changes be monitored <strong>and</strong> managed?<br />
How will system problems <strong>and</strong> issues arising during implementation be identified <strong>and</strong> resolved?<br />
How will training be managed <strong>and</strong> delivered over time as the system is rolled out <strong>and</strong> from initial<br />
implementation through to routine use?<br />
How will support for users be managed over time as the system is rolled out <strong>and</strong> from initial implementation<br />
through to routine use?<br />
Will there be difficulties in aligning new <strong>and</strong> old routines? How will these be managed?<br />
Top management support <strong>and</strong> commitment is needed throughout the project life cycle (Kim <strong>and</strong><br />
Kankanhalli, 2009) <strong>and</strong> it is important to maintain this through the implementation <strong>and</strong> routinisation<br />
process. Incremental implementation is more likely to be successful than a “big bang” approach; this<br />
could be achieved by introducing the system to one healthcare function at a time, through delivery of<br />
functionality in a series of steps or by <strong>using</strong> a pilot-<strong>and</strong>-scale-up approach (Heeks, 2006). However<br />
carefully implementation is planned <strong>and</strong> prepared for, unexpected problems <strong>and</strong> issues are likely to<br />
arise (Berg, 2001). It is important that these are identified <strong>and</strong> addressed quickly to minimise any<br />
adverse impact. High levels of support are likely to be needed initially, with a strong support presence<br />
as users start to use the system for real (Nah et al., 2001). Other factors affecting the success of the<br />
implementation <strong>and</strong> routinisation process include human resource factors including the selection,<br />
retention, continuity <strong>and</strong> training of staff, <strong>and</strong> alignment between new <strong>and</strong> old routines (Greenhalgh et<br />
al., 2008).<br />
3.9 Linkage<br />
How will relationships with suppliers be built <strong>and</strong> managed?<br />
How will champions <strong>and</strong> opinion leaders be used to promote the adoption of the technology?<br />
How will ongoing communication about the project, based on a shared language for describing the innovation<br />
<strong>and</strong> its impact, be developed?<br />
How will links with other healthcare organisations adopting similar systems be developed <strong>and</strong> experiences<br />
shared?<br />
Greenhalgh et al. (2008) consider early <strong>and</strong> ongoing dialogue between developers, change agents<br />
<strong>and</strong> end users to be an important factor in successful innovation, along with communication both<br />
within the organisation <strong>and</strong> between similar organisations. Building close communications with<br />
suppliers will enable the project to make use of their expertise. The influence of champions <strong>and</strong><br />
opinion leaders can change people's attitudes to adoption. Clear communication with consistent<br />
messages will help build <strong>and</strong> maintain clinical engagement. Using <strong>and</strong> sharing knowledge of other<br />
organisations' experiences can be extremely valuable <strong>and</strong> a good way of addressing concerns.<br />
3.10 The wider environment<br />
How extensive is the use of this type of system in other healthcare organisations?<br />
What is the national policy towards adopting the technology? Are there any specific incentives or m<strong>and</strong>ates for<br />
its use?<br />
What are the media <strong>and</strong> public perspectives on the technology?<br />
There are a number of factors in the wider environment that affect how attractive the new IS is to the<br />
organisation. These include the direction of official policy (e.g., in the UK, from the Department of<br />
Health), the general socio-political climate <strong>and</strong> specific m<strong>and</strong>ates <strong>and</strong> incentives (Greenhalgh et al.,<br />
2008).<br />
4. Conclusion<br />
This is a framework intended for use in the early, planning stages of a project, helping to shape<br />
project plans <strong>and</strong> identify potential risks <strong>and</strong> issues. However it identifies issues that should be<br />
146
Kate Dymoke-Bradshaw <strong>and</strong> Ann Brown<br />
addressed throughout the project life cycle. It has been designed primarily for use in the following<br />
circumstances:<br />
In a complex IS innovation project where technology with a high knowledge burden or high user<br />
interdependencies is to be adopted within an organisation<br />
Where the innovation is to be implemented within the technical core of the organisation. In the<br />
case of healthcare, this means to support core clinical processes, not just administrative<br />
processes.<br />
Where use of the innovation is likely to be m<strong>and</strong>ated within the organisation.<br />
Where an externally provided service or packaged solution is to be implemented <strong>and</strong> control over<br />
design is therefore significantly constrained, i.e. it is applicable to a service or product<br />
implementation project rather than to a “traditional” IS development project.<br />
This approach is particularly appropriate in a healthcare environment where patient safety is critical<br />
<strong>and</strong> the consequences of getting it wrong could cause significant harm. It should also be applicable to<br />
IS innovation projects in other sectors where the general context is similar, although the relative<br />
importance of different success factors may vary. Further research is needed to test the model in the<br />
healthcare sector.<br />
References<br />
Berg, M. 1999. Patient care information systems <strong>and</strong> health care work: a sociotechnical approach. International<br />
Journal of Medical Informatics, 55, 87-101.<br />
Berg, M. 2001. Implementing information systems in health care organizations: myths <strong>and</strong> challenges. Int J Med<br />
Inform, 64, 143-56.<br />
Car, J., Black, A., An<strong>and</strong>an, C., Cresswell, K., Pagliari, C., McKinstry, B., Procter, R., Majeed, A. & Sheikh, A.<br />
2008. The Impact of eHealth on the Quality <strong>and</strong> Safety of Healthcare.<br />
Coiera, E. 2003. Guide to Health Informatics, London, Hodder Arnold.<br />
Cooper, R. B. & Zmud, R. W. 1990. <strong>Information</strong> Technology Implementation Research: A Technological Diffusion<br />
Approach. <strong>Management</strong> Science, 36, 123-139.<br />
CRG Research Limited & Cardiff University Centre for Health Sciences Research 2008. Clinical Engagement:<br />
primary care leading by design. National Leadership <strong>and</strong> Innovation Agency for Healthcare.<br />
Fichman, R. Year. <strong>Information</strong> technology diffusion: a review of empirical research. In: 13th International<br />
Conference on <strong>Information</strong> Systems, 1992 Dallas TX. Citeseer, 195-195.<br />
Greenhalgh, T., Robert, G., MacFarlane, F., Bate, P. & Kyriakidou, O. 2004. Diffusion of innovations in service<br />
organizations: systematic review <strong>and</strong> recommendations. The Milbank Quarterly, 82, 581-629.<br />
Greenhalgh, T., Stramer, K., Bratan, T., Byrne, E., Mohammad, Y. & Russell, J. 2008. Introduction of shared<br />
electronic records: multi-site case study <strong>using</strong> diffusion of innovation theory. British Medical Journal, 337,<br />
a1786.<br />
Heeks, R. 2006. Health information systems: Failure, success <strong>and</strong> improvisation. International Journal of Medical<br />
Informatics, 75, 125-137.<br />
Kaplan, B. & Harris-Salamone, K. D. 2009. Health IT success <strong>and</strong> failure: recommendations from literature <strong>and</strong><br />
an AMIA workshop. J Am Med Inform Assoc, 16, 291-9.<br />
Kim, H.-W. & Kankanhalli, A. 2009. Investigating user resistance to information systems implementation: a status<br />
quo bias perspective. MIS Quarterly, 33, 567-582.<br />
Nah, F., Lau, J. & Kuang, J. 2001. Critical factors for successful implementation of enterprise systems. Journal,<br />
Vol, 7, 285-296.<br />
NHS Connecting for Health. 2010a. Detailed Care Records [Online]. Available:<br />
http://www.nhscarerecords.nhs.uk/detailed/ [Accessed 11Apr2011].<br />
NHS Connecting for Health. 2010b. ePrescribing - overview <strong>and</strong> benefits [Online]. Available:<br />
http://www.connectingforhealth.nhs.uk/systems<strong>and</strong>services/eprescribing/benefits [Accessed 11Apr2011].<br />
NHS Institute for Innovation <strong>and</strong> Improvement. 2008. Clinical Engagement [Online]. Available:<br />
http://www.institute.nhs.uk/quality_<strong>and</strong>_service_improvement_tools/quality_<strong>and</strong>_service_improvement_tool<br />
s/clinical_engagement.html [Accessed 11Apr2011].<br />
Robey, D., Ross, J. W. & Boudreau, M.-C. 2002. Learning to Implement Enterprise Systems: An Exploratory<br />
Study of the Dialectics of Change. Journal of <strong>Management</strong> <strong>Information</strong> Systems, 19, 17-46.<br />
Rogers, E. M. 2003. Diffusion of Innovations, 5th edition, New York, Free Press.<br />
Siriwardena, A. N. 2009. Engaging clinicians in quality improvement initiatives: art or science? Quality in Primary<br />
Care, 17, 303-5.<br />
Swanson, E. & Ramiller, N. 2004. Innovating mindfully with information technology. MIS Quarterly, 28, 553-583.<br />
Vaughan, P. J. 2001. System Implementation Success Factors: It Is Not Just the Technology. CUMREC – A<br />
Higher Education Administrative Technology Conference. Phoenix, Arizona.<br />
147
The Effectiveness of EBSE in Modifying Professional<br />
Practice – an Experimental Protocol <strong>and</strong> Study<br />
Graham Fletcher <strong>and</strong> Marie Cahillane<br />
Cranfield University, Shrivenham, UK<br />
g.p.fletcher@cranfield.ac.uk<br />
m.cahillane@cranfield.ac.uk<br />
Abstract: This paper reports on an experiment to investigate if evidence based systematic reviews have the<br />
power to modify people’s opinion. A blind, primary study, was conducted indicating that there are statistically<br />
significant differences between people’s opinions when compared with coving the same material in an<br />
unstructured manner.<br />
Keywords: evidence based research, evaluation, education<br />
1. Introduction<br />
Evidence based software engineering (EBSE) is the extension of evidence based scientific principles<br />
into the field of software engineering. Evidence based science comes primarily from medical research<br />
where it was discovered that following the recommendations of systematic reviews provides better<br />
results than those achieved by following expert advice alone (Antman 1992). The process of<br />
systematic review is central to EBSE. In one of the first published papers to propose the concept<br />
Kitchenham et. al. state<br />
“...some aspects of EBSE are essentially low risk <strong>and</strong> should be adopted as soon as<br />
possible, such as the development <strong>and</strong> adoption of guidelines for systematic<br />
reviews.”(Kitchenham 2004)<br />
Since 2004 a significant amount of research effort has gone into the development of systematic<br />
reviews in a wide range of software engineering topics (Kitchenham 2009). However, the point of a<br />
systematic review is to affect practice. There is little point in completing work that has little or no effect<br />
on the software engineering practitioners that use <strong>and</strong> implement research output. In their paper on<br />
the teaching of EBSE Jrgensen et. al. state<br />
“We cannot claim that we have demonstrated that teaching EBSE has a significant<br />
positive effect on real world software development work.... ....There are no scientific<br />
studies on the effects of EBSE. The empirical evidence regarding its effectiveness is<br />
constituted only by our own practice....” (Jorgensen 2005)<br />
They argue that by analogy to medical sciences, teaching of EBSE techniques should have a small<br />
but positive impact on the quality of software engineering practice. This may or may not be true;<br />
however, it is not an argument for producing EBSE reviews as inputs into professional decision<br />
making. There is a significant difference between a professional engineer underst<strong>and</strong>ing the concepts<br />
of EBSE <strong>and</strong> performing systematic reviews when faced with a complex decision <strong>and</strong> the same<br />
engineer accepting the findings of externally produced reviews. We argue that medical science faces<br />
the same issues. In the UK this has been addressed by the formation of the National Institute for<br />
Clinical Excellence. This statutory body is embarking on a process of m<strong>and</strong>ating practice according to<br />
fixed guidelines <strong>and</strong> is forcing the adoption of systematic review findings.<br />
Without a statutory body to enforce the adoption of findings it is necessary to underst<strong>and</strong> the power of<br />
EBSE to affect practice. In particular we wish to know if systematic reviews have the ability to affect<br />
practice. If not, should we concentrate our efforts in teaching the general techniques to engineers <strong>and</strong><br />
allow them to perform their own analysis.<br />
There are many complex issues to address in this area. This paper describes a protocol we have<br />
adopted to measure the effectiveness of a systematic literature review in affecting the opinion,<br />
confidence level <strong>and</strong> plans of decision makers within the UK Ministry of Defence (UK MoD).<br />
The hypotheses for our research questions are as follows:<br />
Exposure to a systematic review has the power to change the opinion of knowledgeable<br />
participants.<br />
148
Graham Fletcher <strong>and</strong> Marie Cahillane<br />
Systematic reviews produce a narrower range of opinion than those formed by participants only<br />
exposed to primary material.<br />
Exposure to a professionally completed systematic review increases the perceived confidence<br />
participants have in their opinions.<br />
2. Experimental protocol<br />
We use a modern <strong>and</strong> much discussed proposal in software engineering as our research tool, pair<br />
programming. The concept of pair programming is that two people will share one terminal <strong>and</strong> work<br />
together to increase quality, reduce faults <strong>and</strong> depending on the research project even reduce<br />
elapsed time <strong>and</strong> total cost. We selected this topic as it is controversial, the subject of many primary<br />
studies <strong>and</strong> has been used as a topic for systematic literature review (Hannay 2009).<br />
Our experiment is a primary study that investigates the affect of the independent variable of exposure<br />
/ non-exposure to a systematic review” on the following dependant variables <strong>using</strong> a within-subjects,<br />
before <strong>and</strong> after group design:<br />
Efficacy: The participant’s opinion of the utility of pair programming.<br />
Confidence: The confidence level that the participants have in their underst<strong>and</strong>ing of pair<br />
programming.<br />
This design allows the comparison of the data from the pre-exposure measure of the dependent<br />
variables with the post-exposure measure of the dependent variables. Within group differences were<br />
controlled, allowing any change in the dependent variables to be identified.<br />
2.1 Procedure<br />
Independently <strong>and</strong> with no knowledge of this study by either the participants or the trainer, the<br />
participants were introduced to pair programming. All the background material on pair programming<br />
used by Hannay et. al. (Hannay 2009) was presented <strong>and</strong> formed the basis of a discussion on the<br />
utility of pair programming. This training is a normal part of the staff development provided by the UK<br />
MoD <strong>and</strong> was presented by a leading exponent of pair programming.<br />
Fourteen days after the initial training the participants were asked to complete a questionnaire which<br />
provided a measure of their opinions on pair programming. The participants were also asked to rate<br />
how confident they were in the responses they had given in the questionnaire.<br />
The participants were then introduced to the concepts of EBSE <strong>and</strong> systematic review. As part of this<br />
introduction several concepts were revisited, including pair programming. The participants were asked<br />
to review the way they had formed their initial opinions by rating their level of confidence in their<br />
responses to items in the questionnaire used earlier.<br />
During the last stage, the participants were exposed to a professionally completed systematic<br />
literature review (Hannay 2009) <strong>and</strong> it’s findings were analysed <strong>and</strong> discussed. The questionnaire<br />
completed during the initial participant training phase was re-completed, <strong>and</strong> again, as at stages two<br />
<strong>and</strong> three, the participants were asked to rate their level of confidence in their responses to the<br />
questions. Participants were asked to voluntarily submit their results to the study after the completion<br />
of the third stage of the study.<br />
The following questions form the questionnaire completed by participants:<br />
1. Is pair programming a worthwhile methodology?<br />
2. Does pair programming effect software quality?<br />
3. Does pair programming effect speed?<br />
4. Does pair programming effect costs?<br />
5. In what situation is pair programming particularly effective?<br />
6. In what situation is pair programming particularly in-effective?<br />
149
Graham Fletcher <strong>and</strong> Marie Cahillane<br />
Data was initially collected as h<strong>and</strong> written questionnaires <strong>and</strong> collected so that the participants were<br />
not aware of the study during its operation, but they become fully informed before agreeing to submit<br />
their results. Answers submitted by participants were coded so that it was not possible to identify<br />
individuals or to identify which subjects declined to include their results. A nine point likert scale was<br />
used for answers to all questions except 5 <strong>and</strong> 6 which have free form answers. An Independent<br />
analysis committee, blind to the hypotheses, performed a thematic analysis of the free form answers.<br />
The categories were then mapped to nine point likert scale answers by subject experts who were<br />
asked to score each category as indicative of an answer to the question “Is pair programming a<br />
worthwhile methodology?. Most of the themes were scored remarkably consistently by the expert<br />
panel as indicated by very low st<strong>and</strong>ard deviations. Where there was no consistent opinion of the<br />
meaning of a category, indicated by a st<strong>and</strong>ard deviation of above 1.5, the answers falling into this<br />
category were removed from the study.<br />
The following dependant variables were derived from the data gathered.<br />
Efficacy: The expressed opinion on the efficacy of pair programming as a technology. Calculated<br />
as the average likert score from questions 1 to 6. In the open questions (5 <strong>and</strong> 6) the Likert<br />
scores were derived by the thematic analysis <strong>and</strong> independent analysis.<br />
Confidence: The expressed confidence, on the same 9 point likert scale, of the validity of the<br />
subjects answers.<br />
Intent: The expressed intent to deploy pair programming on the projects or programme for which<br />
the subject is responsible. Responses are on the 9 point likert scale. Where no response was<br />
given then the subject was omitted from the study for the elements that require this variable.<br />
2.2 Data analysis procedures<br />
In this section we detail our approach to analysing our data in preparation for <strong>and</strong> demonstrate how<br />
this data is used to answer our research hypotheses. The overall analysis procedure was to use<br />
statistical bootstrapping techniques to calculate the probability that the data sets gathered before <strong>and</strong><br />
after exposure to systematic reviews were from different populations. This class of statistical resampling<br />
techniques provides a robust method of evaluating the statistical significance of any<br />
changes to the variables in the before <strong>and</strong> after populations.<br />
2.2.1 Hypothesis 1: Exposure to a systematic review will change the opinion of knowledgeable<br />
participants<br />
In this question we are looking at the population of subjects. We wish to know if exposure to a<br />
systematic review has the power to change the opinion of the group by a measurable, significant<br />
amount. In this question we are dealing with perceived efficacy <strong>and</strong> confidence. I.e. we see a change<br />
of efficacy <strong>and</strong> confidence as equally important.<br />
Expressed <strong>and</strong> true efficacy values are assumed to differ according to a st<strong>and</strong>ard distribution, with the<br />
expressed value at the centre of the distribution <strong>and</strong> the confidence related to the deviation. The<br />
distributions are calculated <strong>using</strong> the probability density function for a st<strong>and</strong>ard distribution,<br />
normalised such that the probability falling in the likert range (1-9) is 1. Table 1 <strong>and</strong> Figure 1 set out<br />
the st<strong>and</strong>ard deviations used for each expressed certainty.<br />
The probability distributions of a population of participants can be summed to produce a graph<br />
representative of the whole population. Each of the individual graphs has an area under the curve of<br />
1, summing n graphs gives a “probability distribution curve” representative of n answers with an area<br />
under the graph of n. Given 2 ”population curves” <strong>and</strong> integrating the absolute distances between<br />
them over the valid likert responses gives a distance between the populations as required by the<br />
statistical resampling.<br />
This technique has several major advantages. Two participants giving expressed efficacies of 5 <strong>and</strong> 6<br />
will be much closer than responses of 1 <strong>and</strong> 9. A straight histogram would show them as equally<br />
distant. It also quantifies the difference between efficacies of 5 expressed at different confidences.<br />
150
Graham Fletcher <strong>and</strong> Marie Cahillane<br />
2.2.2 Hypothesis 2: Systematic reviews produce a narrower range of opinion than those formed by<br />
participants only exposed to primary material<br />
If exposure to a systematic review had an effect on opinion <strong>and</strong> more specifically that the opinions of<br />
participants become more consistent is tested. This prediction is based on the premise that if the<br />
participants find the evidential basis of a formalised review compelling then their opinions should<br />
migrate toward the findings of that review <strong>and</strong> thus become more consistent.<br />
Again the boot strapping approach is used in the analysis of this data. However in answering this<br />
question instead of looking at the absolute differences between the graphs we compare several<br />
measures of statistical deviation ( St<strong>and</strong>ard deviation, Average deviation <strong>and</strong> Median average<br />
deviation). The distance measure being the sum of these deviation measures.<br />
2.2.3 Hypothesis 3: Exposure to a professionally completed systematic review increases the<br />
perceived confidence participants have in their opinions<br />
This hypothesis relates to the effect of a systematic review on the strength of opinion <strong>and</strong> tests<br />
whether participants are more confident in their opinions after viewing a systematic review. I.e. Is the<br />
population of confidences after exposure to a systematic review different to the population of<br />
confidences before exposure? The data collated to test this hypothesis is prepared <strong>and</strong> analysed<br />
<strong>using</strong> the same boot strapping techniques, but applied solely to the expressed confidences. In this<br />
case the distance measure is the same three measures of statistical deviation but applied only to the<br />
expressed confidence.<br />
Table 1: The st<strong>and</strong>ard deviations implied by expressed certainties<br />
Expressed<br />
certainty<br />
1<br />
2<br />
3<br />
4<br />
5<br />
6<br />
7<br />
8<br />
9<br />
Implied normalised<br />
st<strong>and</strong>ard deviation<br />
2.997<br />
1.347<br />
0.605<br />
0.272<br />
0.122<br />
0.055<br />
0.025<br />
0.011<br />
0.005<br />
Implied st<strong>and</strong>ard deviation<br />
over 9 point<br />
likert scale<br />
26.97<br />
12.12<br />
Figure 1: The probability density functions for an estimate of 5 based on expressed certainties of 4 for<br />
the flattest curve up to 8 for the steepest curve, certainties of 1 to 3 are not shown as they<br />
are indistinguishable from 4, 9 is also omitted as it is functionally equivalent to 8<br />
151<br />
5.45<br />
2.45<br />
1.10<br />
0.49<br />
0.22<br />
0.10<br />
0.04
3. Results<br />
Graham Fletcher <strong>and</strong> Marie Cahillane<br />
The results section follows the methodology as detailed above. 51 subjects followed the protocol in 3<br />
groups. 4 Subjects declined to be included in the study, leaving 47 data sets to be analysed. In some<br />
instances questions were not answered or marked as “not applicable” by the subjects. Where this has<br />
reduced the sample size for a calculation this has been noted in the results below.<br />
3.1 Thematic analysis of open questions<br />
Two of the questions on the surveys were open:<br />
5) In what situation is pair programming particularly effective?<br />
6) In what situation is pair programming particularly in-effective?<br />
Independent experts were used, firstly to define classes of answers <strong>and</strong> then to assign the quantative<br />
answers to these classes. The classes were derived independently of the question for which the<br />
answer was given. A further <strong>and</strong> mutually exclusive set of experts assigned scores on the 9 point<br />
likert scale for each of these classes for both of the open questions. The classes <strong>and</strong> the number of<br />
answers in each class, mean <strong>and</strong> st<strong>and</strong>ard deviation for the likert score assigned to each score are<br />
shown in table 2. We applied a st<strong>and</strong>ard deviation threshold of 1.5 amongst the opinion of the<br />
experts, answers falling into these categories were substituted by the likert score from table 2. Other<br />
answers were not included in the analysis as there was no consensus as to their meaning amongst<br />
the expert panel.<br />
Table 2: The results of the thematic analysis of the open questions<br />
Question 5 Question 6<br />
Mean Std. Dev. Mean Std. Dev.<br />
Middle Sized projects 6.46 2.67 2.02 3.92<br />
No Cost Overhead 5.18 3.22 4.14 2.02<br />
High end 8.01 1.02 3.09 0.80<br />
Outline requirements 7.34 0.82 5.40 1.99<br />
Rapid development 8.82 0.92 4.51 1.60<br />
Small groups of experienced programmers 3.71 1.34 5.34 2.90<br />
Inexperienced programmers 2.66 0.93 4.71 2.04<br />
Low complexity systems 6.00 3.39 6.02 1.88<br />
High complexity systems 7.10 1.62 7.83 2.89<br />
Large systems 8.91 0.81 1.80 0.62<br />
High requirement of success 6.02 2.02 3.90 1.04<br />
Complex unknown team 2.00 2.99 2.07 3.99<br />
Simple problem 1.04 .040 5.17 1.80<br />
Most situations 9.00 0.00 1.00 0.00<br />
3.2 Questionnaire data<br />
Table 3 shows the average <strong>and</strong> st<strong>and</strong>ard deviation for the answers to questions 1 to 4 <strong>and</strong> for the<br />
scores derived from the open questions. Figure 1 shows the same data, but here it had been<br />
converted into probability distribution curves <strong>using</strong> the methodology discussed in section 2.2.1.<br />
Table 3: Mean <strong>and</strong> st<strong>and</strong>ard deviation for the answers to the questionnaire<br />
After Study Before Study<br />
Mean Std. Dev. Mean Std. Dev.<br />
1 7.10 1.59 7.15 1.32<br />
2 7.20 1.54 7.54 1.29<br />
3 6.72 1.90 6.00 2.19<br />
4 5.4.3218 1.56 5.18 2.82<br />
5 & 6 6.63 2.11 5.12 2.19<br />
Confidence 6.18 1.40 3.90 1.64<br />
152
Graham Fletcher <strong>and</strong> Marie Cahillane<br />
Figure 2: The sum of the probability distributions for the before <strong>and</strong> after data sets, the grey area<br />
highlights the difference or “distance” measure used in the statistical bootstrapping<br />
analysis, the x axis is each of the possible questionnaire answers in likert form, the y axis<br />
is the sum of the probability distribution curves for each participant<br />
Figure 3: Probability distributions for one example of data sets created by r<strong>and</strong>om mixing as required<br />
by the statistical boot strapping analysis, the grey area highlights the difference or<br />
“distance”, the x axis is each of the possible questionnaire answers in likert form, the y axis<br />
is the sum of the probability distribution curves for each participant<br />
3.2.1 Hypothesis 1: Exposure to a systematic review will change the opinion of knowledgeable<br />
participants.<br />
The data gathered when investigating this hypothesis falls into two populations, before <strong>and</strong> after. The<br />
null hypothesis is that these populations are subsets of the same population. I.e. that exposure to the<br />
study has not changed opinion.<br />
The efficacy <strong>and</strong> confidence were calculated for each subject, both before <strong>and</strong> after the study. These<br />
values were used to produce a probability distribution curve representative of the 2 populations.<br />
153
Graham Fletcher <strong>and</strong> Marie Cahillane<br />
Figure 2 shows the curves <strong>and</strong> highlights the difference or distance between them which is used in<br />
the bootstrapping analysis.<br />
100,000 r<strong>and</strong>om mixings of the two populations were tested. In each case probability distribution<br />
curves representative of the two r<strong>and</strong>om populations were calculated <strong>and</strong> their distance measured.<br />
Figure 3 shows once such measure between two r<strong>and</strong>om mixings of the before <strong>and</strong> after populations.<br />
3804 of these r<strong>and</strong>om mixings gave distance in excess of the one measured. Therefore, if the null<br />
hypothesis were true we would have expected to see an answer as extreme as the one we derived<br />
3.804% of the time.<br />
The null hypothesis associated with hypothesis 1 is shown to be false with a P value of 0.038,<br />
providing good evidence for accepting hypothesis 1 as true.<br />
3.2.2 Hypothesis 2: Systematic reviews produce a narrower range of opinion than those formed by<br />
participants only exposed to primary material.<br />
The calculated efficacies of the before <strong>and</strong> after populations were used to test the null hypothesis,<br />
that “Exposure to the study does not cause a narrowing of opinion”. The fall in st<strong>and</strong>ard deviation,<br />
average deviation <strong>and</strong> median average deviation was measured between the two populations.<br />
100,000 r<strong>and</strong>om mixings of the two populations where then measured <strong>and</strong> any fall in st<strong>and</strong>ard<br />
deviation, average deviation <strong>and</strong> median average deviation recorded. Of the 300,000 measurements<br />
82952 recoded a fall greater than the ones between the original populations. Therefore, if the null<br />
hypothesis were true we would have expected to see an answer as extreme at the one we derived<br />
27.65% of the time.<br />
The experiment provides little evidence for the null hypothesis <strong>and</strong> no indication for the validity of<br />
hypothesis 2.<br />
3.2.3 Hypothesis 3: Exposure to a professionally completed systematic review increases the<br />
perceived confidence<br />
The confidence of the participants in the before <strong>and</strong> after populations were used to evaluate the null<br />
hypothesis, that “Exposure to the study does not cause confidence to rise”. The rise in mean, median<br />
<strong>and</strong> mode of the expressed confidence was measured between the two populations. 100,000 r<strong>and</strong>om<br />
mixings of the two populations where then measured <strong>and</strong> any raise in mean, median <strong>and</strong> mode<br />
recorded. Of the 300,000 measurements 2907 recoded a rise greater than the ones between the<br />
original populations. Therefore, if the null hypothesis were true we would have expected to see an<br />
answer as extreme as the one we derived 0.96% of the time.<br />
The null hypothesis associated with hypothesis 3 is shown to be false with a P value of 0.01,<br />
providing excellent evidence for the assumption that hypothesis 3 is true.<br />
4. Discussion<br />
This paper reports an experiment that investigated the effects of exposing practicing engineers to<br />
evidence based literature reviews. We want to underst<strong>and</strong> if these reviews have the power to effect<br />
practice without their findings being m<strong>and</strong>ated. Work in the medical sciences has shown that there is<br />
a small, but positive effect (Antman 1992) <strong>and</strong> researchers in EBSE have argued that there should be<br />
a similar change for practising software engineers. It could even be argued that the effects should be<br />
stronger in this field. EBSE is a method for constructing an argument based on evidence derived from<br />
primary studies. Computer scientists <strong>and</strong> software engineers have training that is highly logical <strong>and</strong><br />
the discipline attracts people with a logical thought process. Shouldn’t the logic of EBSE be more<br />
attractive <strong>and</strong> therefore have more effect on the discipline’s practitioners?<br />
Our goal is to underst<strong>and</strong> if practice is changed. To address this question directly would take a<br />
longitudinal study where we investigate the outcomes of projects <strong>and</strong> the long term adoption or<br />
rejection of the findings of studies. Here we meet probably the most complex issue faced by EBSE,<br />
the lack of repeatable projects to trial our ideas. Unlike medicine, the software industry has a relatively<br />
small number of large projects, which makes the statistical analysis <strong>and</strong> double blind trial<br />
methodology impossible. Without the ability to directly test our objective, we approach the next best<br />
question; does EBSE effect opinion? The assumption that we are making is that if opinion is effected<br />
then practice will be effected when these engineers return to their projects. One future line of enquiry<br />
154
Graham Fletcher <strong>and</strong> Marie Cahillane<br />
will be to look for differences in adoption of technologies between groups that received the EBSE<br />
training <strong>and</strong> those that did not. However, we hold a low expectation that sufficient subjects will be<br />
available to produce a statistical significant result.<br />
The discussion is split into two sections, a discussion of the result <strong>and</strong> one on the methodology. We<br />
believe that both are novel <strong>and</strong> warrant a detailed analysis.<br />
4.1 Discussion on results<br />
Our experiments provide excellent evidence that systematic reviews have the power to change<br />
opinion, even amongst mid career engineers who have already been fully briefed on the technologies<br />
being discussed in the review. Anecdotally, the subjects referred to the systematic review as neutral<br />
rather than as partisan. It was this neutrality <strong>and</strong> the logical laying out of the evidence in both<br />
directions that was appealing, rather than the statistical analysis performed by the EBSE authors.<br />
While a positive result, the feedback brings into question the value of the EBSE study. It appears to<br />
have been received more as a laying out of the evidence than as an objective analysis. However,<br />
there is little doubt that the opinions were effected by the EBSE study, which validates the efforts of<br />
the software engineering community to produce these studies.<br />
The experiment also showed that exposure to the EBSE study made a large impact on the confidence<br />
of the participants in their own underst<strong>and</strong>ing. We believe that this is a major outcome of both the<br />
EBSE studies <strong>and</strong> this experiment. While very few peoples opinion moved hugely, many people<br />
become confident in their underst<strong>and</strong>ing to the point where their ability <strong>and</strong> willingness to adopt the<br />
technologies reached a threshold level. Again, in feedback after the last phase of the project, several<br />
participants commented that they understood the opinion of the research community before the study,<br />
that their initial training had delivered the facts. But, that the EBSE work had reinforced their<br />
conclusions <strong>and</strong> bolstered their confidence to the point where they now planned to attempt to use it<br />
rather than consider the technology as another ”academic idea with little real life relevance”<br />
We also expected the study to show that opinion narrowed as a result of the study. I.e. that everybody<br />
would move closer to the conclusions of the study. However, we were surprised that this did not<br />
appear to be the case. The graphs showed that prior to the study there was a uni-modal distribution to<br />
the opinion, largely driven by the low levels of confidence. After the study opinion had hardened <strong>and</strong><br />
became bi-modal in distribution. On reflection there are several reasons that could explain this. Firstly,<br />
pair programming is a hotly debated technique <strong>and</strong> all opinion is divided. Even the systematic review<br />
does not give a definitive answer. Secondly, we believe that, the subjects fell into two categories,<br />
people who see pair programming as a useful tool but not relevant to their projects <strong>and</strong> those that see<br />
it as directly relevant to their projects. Either or both of these reasons could account for the lack of a<br />
narrowing of opinion.<br />
4.2 Discussion on method<br />
The methods we have adopted in analysing our findings bears some discussion. The use of Likert<br />
scales in questionnaires is a common technique when measuring opinion <strong>and</strong> attitudes (Dawes<br />
2008). Neuman argues that its popularity may be due to the ease in which these scales are<br />
developed (Neuman 1994) <strong>and</strong> a body of research which has demonstrated that these scales tend to<br />
be more reliable than some other scales with the same number of items. However, in the present<br />
study we were interested in the confidence that participants had when expressing their answers in<br />
terms of how certain they were of the answers expressed. To our knowledge there is no work<br />
available within the field of psychology that provides a model of how confidence in people’s answers<br />
to questions can be represented. That is, we could find no model that integrated a representation of<br />
certainty into a test that could be applied to a hypothesis. As a result we have developed our own<br />
model of confidence <strong>and</strong> built the analysis of our findings around it.<br />
The finding of most interest here is that on a nine point scale the participants were really working on<br />
at most five points. Responses given in the range of one to four were functionally equivalent, in that<br />
there was little discrimination between the possible values <strong>and</strong> this was also the case for responses of<br />
eight <strong>and</strong> nine on a nine-point scale. Therefore, it is not clear what the difference is between a<br />
participant giving 8/9 or 9/9 as an expressed level of confidence. Though this was only when<br />
expressing confidence, this could call into question research whose experimental basis is the analysis<br />
155
Graham Fletcher <strong>and</strong> Marie Cahillane<br />
of data captured <strong>using</strong> Likert scales. These numerical scales represent one type of response scale.<br />
Also common are scales that use only verbal anchors. The findings suggest that the adoption of a<br />
Likert scale with a smaller range of numerical responses i.e. a five-point or seven-point scale may be<br />
more reliable in measuring efficacy, where each value along the scale is mapped onto a single verbal<br />
response. For example, a scale of one to five may reflect Strongly agree (1), agree (2), neither agree<br />
nor disagree (3), disagree (4) <strong>and</strong> strongly disagree (5).<br />
5. Conclusions<br />
Kitchenham et. al. stated in a very early paper introducing EBSE that systematic review should be<br />
quickly adopted within software engineering (Kitchenham 2004) . Jrgensen et. al. agreed (Jorgensen<br />
2005), but admit that while evidence based science has been shown to improve outcomes in<br />
medicine, there is no direct evidence for its effects in software engineering. This paper has shown that<br />
EBSE does have a real <strong>and</strong> measurable effect on practicing engineers.<br />
Our conclusions can be summarised as follows:<br />
Showing a systematic review to an experienced engineer can change their opinion, even if they<br />
have direct experience <strong>and</strong> training on the subject of the review.<br />
Reviews mostly change opinion by improving confidence in the subjects rather by making large<br />
changes to their base opinion. This then supports the engineer in adopting or rejecting the<br />
technology in an active manner.<br />
References<br />
Antman, E.M., Lau,J., Kupelnick,B., Mosteller,F. <strong>and</strong> Chalmers,T.C. (1992) A comparison of results of metaanalysis<br />
of r<strong>and</strong>omized controlled trials <strong>and</strong> recommendations of clinical experts. JAMA-Journal of the<br />
American Medical Association, 268:240–248.<br />
Dawes,J. (2008) Do data characteristics change according to the number of scale points used? an experiment<br />
<strong>using</strong> 5-point, 7-point <strong>and</strong> 10-point scales. International journal of Marke Research, 50(1).<br />
Hannay,J.E., Dyb,T., Arisholm,E., <strong>and</strong> Sjberg,D.I.K.(2009). The effectiveness of pair programming: A metaanalysis.<br />
<strong>Information</strong> <strong>and</strong> Software Technology, 51(7):1110 – 1122. Special Section: Software Engineering<br />
for Secure Systems.<br />
Jorgensen,M., Dybo,T., <strong>and</strong> Kitchenham,B. (2005) Teaching evidence-based software engineering to university<br />
students. Software Metrics, IEEE International Symposium on, 0:24.<br />
Kitchenham, B., Brereton,O.P., Budgen, D., Turner, M., Bailey,J., <strong>and</strong> Linkman,S. (2009) Systematic literature<br />
reviews in software engineering - a systematic literature review. <strong>Information</strong> <strong>and</strong> Software Technology,<br />
51(1):7 – 15<br />
Kitchenham, B., Dyba, T. <strong>and</strong> Jorgensen,M (2004) Evidence-based software engineering. In ICSE ’04:<br />
Proceedings of the 26th International Conference on Software Engineering, pages 273–281,Washington,<br />
DC, USA. IEEE Computer Society.<br />
Neuman, W.L. (1994) Social Research Methods: Qualitive <strong>and</strong> Quantitative Approaches. USA:Allyn & Bacon.<br />
156
How Open Source Software Products: Can Support<br />
Teaching in Italian Schools<br />
Chiara Friso, Valentina Lenarduzzi, Davide Taibi <strong>and</strong> Davide Tosi<br />
University of Insubria, Como, Italy<br />
chiarafriso@unicatt.it<br />
valentina.lenarduzzi<br />
davide.tabi<br />
davide.tosi]@uninsubria.it<br />
Abstract: In Italy, the adoption of modern software technologies is strongly limited by the current critical<br />
economic situation. The adoption of Open Source Software (OSS) solutions can mitigate this problem because of<br />
the nature of OSS products that helps to cut down on costs by providing modern <strong>and</strong> flexible products. However,<br />
very often school managers <strong>and</strong> teachers are unaware about the availability of powerful OSS tools that can<br />
support teachers <strong>and</strong> school managers in their daily work. In this paper we provide a literature survey about the<br />
available experiences <strong>and</strong> projects on the adoption of OSS solutions started in Italian schools <strong>and</strong> we list a set of<br />
available OSS digital class rolls already experimented in Italian schools. The two surveys aim at suggesting how<br />
to start new projects avoiding common risks <strong>and</strong> how to exploit the potentialities of OSS solutions for didactical<br />
purposes. In this paper, we also qualitatively assess the listed OSS class rolls with our OP2A methodology in<br />
order to suggest which tool is the best choice for the adoption.<br />
Keywords: open source software, primary schools, high level schools, systematic survey, OP2A, OSS quality,<br />
OSS trustworthiness, digital class rolls<br />
1. Introduction<br />
The current critical economic situation in Italy is impacting on how primary <strong>and</strong> high-level schools can<br />
exploit the usage of software <strong>and</strong> modern technologies to support both teaching <strong>and</strong> internal<br />
administration <strong>and</strong> management. This can stimulate schools to evaluate the potentialities provided by<br />
Open Source Software (OSS) solutions because of the nature of OSS products that helps to cut down<br />
on costs by providing modern <strong>and</strong> flexible products. However, the vast majority of school managers<br />
<strong>and</strong> teachers can face with three types of problems: the first one is related to the school managers<br />
<strong>and</strong> teachers’ unawareness about OSS solutions; the second one is related to the reluctancy normal<br />
people have about OSS products, due to the wrong idea that they may have on the quality of OSS<br />
products; the last one refers to the difficulties in choosing the best solution that fits specific<br />
requirements.<br />
The usage <strong>and</strong> adoption of ICT technologies in Italian schools is very poor. In a survey conducted by<br />
the Italian Osservatorio TEcnologico (OTE) in 2005, the number of schools that adopted a Linux<br />
distribution for their personal computers was limited to 1000 (Battistoni, 2008). If compared to the total<br />
number of Italian schools (at the time of writing, 60000), the ratio is worrying. Moreover, projects<br />
about the adoption of new software technologies are not systematic <strong>and</strong> come from the rare initiative<br />
of teachers that are privately interested in technologies (Battistoni, 2008). The Regione Autonoma<br />
Valle d’Aosta <strong>and</strong> the Provincia di Bolzano are two exceptions in Italy (Rossi et al., 2006). These<br />
realities started two pioneer projects to completely migrate their schools from proprietary software to<br />
OSS solutions (FUSS, 2005).<br />
Unfortunately, the vast majority of Italian schools do not have the economical possibility to invest in<br />
the adoption of new software solutions. However, a plethora of OSS solutions, which can support<br />
managers, teachers <strong>and</strong> students in the educational work, are currently available online for free. For<br />
example, a quick look at the web portal www.sourceforge.net can confirm this statement: the portal<br />
lists more than 450 OSS projects related to education.<br />
This paper tries to help school managers <strong>and</strong> teachers to underst<strong>and</strong> how OSS solutions can actually<br />
improve their management <strong>and</strong> teaching activities <strong>and</strong> suggests a set of OSS products for their daily<br />
work. The paper provides a survey on how OSS is used in some Italian schools to report on success<br />
stories <strong>and</strong> to suggest how to adopt successfully OSS avoiding critical risks. The paper gives a review<br />
about past <strong>and</strong> still active Italian projects on the adoption of OSS products. The survey has been<br />
conducted by investigating <strong>and</strong> analyzing both projects with the purpose of developing OSS products<br />
specifically designed for schools, <strong>and</strong> also experiences in adopting OSS products.<br />
157
Chiara Friso, Valentina Lenarduzzi, Davide Taibi <strong>and</strong> Davide Tosi<br />
Moreover, the paper provides an investigation on a set of available OSS products for digital class<br />
rolls. The paper reports on the Italian laws that regulate the usage of digital class rolls <strong>and</strong> describes<br />
the most interesting <strong>and</strong> wide adopted solutions <strong>and</strong> their characteristics. The identified OSS<br />
solutions are also analyzed to highlight points in favor <strong>and</strong> points against in their adoption.<br />
These OSS products have been quantitatively evaluated by following the requirements <strong>and</strong><br />
indications provided by the Open source Product Portal Assessment (OP2A) model (Basilico et al.,<br />
2011). OP2A is a model for assessing the quality of web portals that publish OSS products. OP2A<br />
can be used as the starting point for certifying objectively the quality of OSS products. The model is<br />
built upon the results of a survey that the authors of this paper conducted in the context of the<br />
European project QualiPSo carried out to (1) identify the factors most commonly used to assess the<br />
trustworthiness <strong>and</strong> the quality of an OSS product, <strong>and</strong> (2) underst<strong>and</strong> the reasons <strong>and</strong> motivations<br />
that lead software users to adopt or reject OSS products. In this way, we are able to assess<br />
objectively the quality level of the analyzed OSS products, thus suggesting popular <strong>and</strong> also trusted<br />
OSS solutions for schools.<br />
2. Experiences <strong>and</strong> projects in adopting OSS in Italian schools<br />
In this section, we report on some experiences <strong>and</strong> projects about the adoption of OSS solutions in<br />
Italian schools with the aim of stimulating teachers <strong>and</strong> school managers in starting new projects<br />
related to OSS.<br />
2.1 Planning the survey<br />
We followed a systematic literature review (Biolchini et al., 2007) to survey the projects <strong>and</strong> the<br />
experiences about the adoption of OSS solutions in Italian schools. In this paper for space reason, we<br />
do not formally describe the steps we followed during the systematic review, but we describe only the<br />
objective of the survey, the research questions we wished to answer, the search strings <strong>and</strong> criteria<br />
we used, the electronic sources we surveyed, <strong>and</strong> the dimensions used to classify the primary<br />
studies.<br />
The survey was planned with the aim of identifying meaningful projects <strong>and</strong> experiences about the<br />
adoption of OSS solutions in Italian schools. This objective led us to define a set of questions that we<br />
hope answer throughout the survey:<br />
Q1: are projects <strong>and</strong> experiences available in Italian schools?<br />
Q2: are the identified projects <strong>and</strong> experiences collaborative or limited to single schools?<br />
Q3: are the identified projects <strong>and</strong> experiences a good starting point for other projects?<br />
The survey has been conducted <strong>using</strong> the following search strings <strong>and</strong> criteria:<br />
Open source <strong>and</strong> Italian schools<br />
Didactics <strong>and</strong> open source software<br />
Experiences open source for Italian schools<br />
Projects open source for Italian schools<br />
Open source Italian schools<br />
OSS <strong>and</strong> floss for Italian schools<br />
We used both keywords in English <strong>and</strong> also in Italian, <strong>and</strong> we manipulated the strings with logical<br />
operators (<strong>and</strong>, or).<br />
We used the following electronic resources:<br />
Search engines (such as google <strong>and</strong> yahoo)<br />
sourceforge (www.sourceforge.net) <strong>and</strong> schoolforge (www.schoolforge.net)<br />
OW2 (www.ow2.org)<br />
osor (www.osor.eu)<br />
158
Chiara Friso, Valentina Lenarduzzi, Davide Taibi <strong>and</strong> Davide Tosi<br />
ote (www.osservatoriotecnologico.eu)<br />
indire (www.indire.it)<br />
dienneti (www.dienneti.it)<br />
lpi (http://scuola.lpi-italia.org)<br />
dschola (www.dschola.it)<br />
In order to answer the previous questions, we identified a set of inclusion <strong>and</strong> exclusion criteria <strong>and</strong> a<br />
set of dimensions for the classification. The inclusion <strong>and</strong> exclusion criteria were defined in order to<br />
filter properly the whole set of projects <strong>and</strong> experiences identified during the first round of search. With<br />
relation to the projects, we decided to include in our primary set of results only:<br />
Projects with a specific didactic-pedagogical merit started with the precise aim to use OSS<br />
solutions for teaching <strong>and</strong> learning purposes;<br />
Projects designed not only from the technological but also from the didactic point of view,<br />
Projects still active, with a well-defined methodology that makes the experience reproducible;<br />
We excluded from our set, all the projects that, even though largely spread <strong>and</strong> supported by<br />
outst<strong>and</strong>ing partners, lack a specific didactic finality, but aim only at projects encouraging the<br />
spreading of OSS in schools.<br />
We considered five dimensions for the analysis of each project: 1) description; 2) objectives; 3)<br />
solutions provided; 4) methodology followed; 5) schools involved.<br />
As for experiences we decided to include in our primary set of results only: experiences of schools<br />
that have decided to introduce OSS in class not only for economical or practical purposes, but for<br />
educational reasons; traceable online experiences. We considered four dimensions for the analysis of<br />
each experience: 1) description; 2) solutions; 3) methodology; 4) evaluation.<br />
2.2 Survey results<br />
The survey has been conducted with the search criteria <strong>and</strong> by querying the electronic resources<br />
identified in Section 2.1. After these steps, we retrieved 13 OSS projects <strong>and</strong> 14 experiences. We<br />
then reduced the number of the identified OSS projects from 13 to 3 primary projects <strong>and</strong> the number<br />
of OSS experiences from 14 to 3 primary experiences, by applying the inclusion <strong>and</strong> exclusion criteria<br />
of Section 2.1. Table 1 summarizes the primary set of projects <strong>and</strong> experiences identified during our<br />
survey <strong>and</strong> the dimensions of the analysis.<br />
The results of the survey suggest that a limited number of projects <strong>and</strong> experiences is available for<br />
Italian schools. The reported projects <strong>and</strong> experiences involve several schools in a collaborative<br />
manner <strong>and</strong>, due to the popularity <strong>and</strong> the positive results they achieved, can be used as starting<br />
point for other initiatives.<br />
3. A survey of OSS digital class rolls for schools<br />
In this section, we survey some specific OSS tools that replace traditional paper class rolls <strong>and</strong> school<br />
registers.<br />
The first tedious task a teacher must accomplish every morning in his/her class is to fill-in the class<br />
roll. In the last few years, some Italian schools are experimenting the use of digital class rolls instead<br />
of traditional paper class rolls in order to speed-up <strong>and</strong> simplify the fill-in task, to reduce the amount of<br />
paper waste, <strong>and</strong> to minimize the waste of space taken by archives.<br />
The Italian law regulates the usage <strong>and</strong> adoption of digital supports. Specifically, the D. Lgs. n. 59<br />
Article 15 Paragraph 2 (March 15, 1997) defines the official validity of digital documents for private<br />
users <strong>and</strong> for public administrations. The DPR n. 381 (July 28, 1999) regulates what was introduced<br />
in the D. Lgs. n. 59 by defining how to manipulate private <strong>and</strong> sensible data. Following these law <strong>and</strong><br />
decree, other decrees have been released during the last years, such as the DPR n. 428 (October 20,<br />
1998), the DPCM (October 31, 2000), the DL n.196 (June 30, 2003), <strong>and</strong> the CNIPA resolution<br />
(February 19, 2004).<br />
159
Chiara Friso, Valentina Lenarduzzi, Davide Taibi <strong>and</strong> Davide Tosi<br />
The digital class roll provides a lot of advantages such as the possibility of:<br />
Cataloging data year by year or month by month following specific criteria defined by the teacher;<br />
Filling-in the class roll outside the school schedule;<br />
Updating or modifying data in case of typos or compilation errors immediately;<br />
Saving data quickly <strong>and</strong> searching information by keywords or by specific filtering criteria;<br />
Customizing the area of the class roll, for example differentiating the area for marks from the one<br />
for didactical activities.<br />
Currently, the reference closed-source tool for digital class rolls in Italy is the Silente Registro<br />
Elettronico (URL: http://silente.trendcom.it/) developed by TrendCom <strong>and</strong> sponsored by MIUR. Silente<br />
is a SaaS (Software as a Service) tool that provides abilities for managing class rolls <strong>and</strong> registers in<br />
a digital way, for monitoring school activities, <strong>and</strong> informing students, parents <strong>and</strong> teachers about<br />
students’ absences, marks, advices, <strong>and</strong> meetings. Unfortunately, Silente costs 900,00 euros for the<br />
version limited to 5 classes (with a renewal subscription of 250,00 euros per year) or 2800,00 euros<br />
for the version without restrictions (with a renewal subscription of 600,00 euros per year). These<br />
prices can have a real impact on the financial budget of the Italian public schools, thus pushing OSS<br />
developers into developing equivalent OSS solutions.<br />
Table 1: Description of the primary set of projects <strong>and</strong> experiences on OSS adoptions<br />
1) Project Name: Cinema at School (URL: www.g-raffa.eu/Cinema_a_Scuola)<br />
Description: the project started in 2006 to make one-reelers <strong>and</strong> short films in the primary school starting from<br />
the storyline, production, <strong>and</strong> also post-production. All the phases have been implemented <strong>using</strong> open source<br />
software solutions <strong>and</strong> the films are released under the Creative Commons BY-NC-SA 2.5 Italia license.<br />
Objectives: in addition to didactical <strong>and</strong> educational objectives, the project aims at make aware students <strong>and</strong><br />
parents about the potentialities offered by free <strong>and</strong> open source software solutions.<br />
Solutions: the project does not implement <strong>and</strong> develop new solutions or software but exploits the Operating<br />
System GNU/Linux Ubuntu, Luciole (http://festival.inattendu.org/Luciole-Linux) <strong>and</strong> Stopmotion<br />
(http://stopmotion.bjoernen.com/) to create animation movies, CinelerraCV (http://cinelerra.org/) for video<br />
editing, <strong>and</strong> ZYnAddSubFX (http://zynaddsubfx.sourceforge.net/), Rosegarden (www.rosegardenmusic.com/)<br />
<strong>and</strong> Audacity (http://audacity.sourceforge.net/) for audio editing.<br />
Methodology: the project is based on a well-defined methodology that describes all the activities <strong>and</strong> phases<br />
of the project, thus simplifying the reproducibility of the experience. The main phases are: identification of<br />
Open Source Software solutions able to support video/audio pre- <strong>and</strong> post-production; hardware <strong>and</strong><br />
computers adaptation to support complex <strong>and</strong> resource-consuming operations; teachers training about these<br />
software solutions.<br />
Schools Involved: Scuola Primaria "Marconi" di Roncaglia (prof. Raffaella Traniello)<br />
2) Project Name: Zoomlinux (URL: http://sodilinux.itd.cnr.it/zoomlinux)<br />
Description: the project started in 2008 for the development of a suite of didactical tools for partially sighted<br />
school-boys <strong>and</strong> girls. The suite has been developed by the CNR Technological Institute for Didactic.<br />
Objectives: develop an accessible suite of tools that can simplify the school integration of partially sighted<br />
school-boys/girls<br />
Solutions: the Zoomlinux suite, the documentation that supports teachers in installing <strong>and</strong> <strong>using</strong> the suite, <strong>and</strong><br />
a collection of didactical flyers to introduce teachers to the problem of partially sighted <strong>and</strong> blind school-boy<br />
<strong>and</strong> girl<br />
Methodology: the project is a research <strong>and</strong> development project supported by CNR <strong>and</strong> AICA. The two<br />
partners followed a rigorous methodology to achieve the goals of the project: definition of the project<br />
requirements in cooperation with teachers, students <strong>and</strong> parents; development of the suite; extensive<br />
experimentation of the suite with the ONLUS “D. Chiossone”.<br />
Schools Involved : AICA <strong>and</strong> the ONLUS “Istituto per ciechi D. Chiossone"<br />
3) Project Name: Wii4dida (URL: www.wiild.it)<br />
Description: the project started in 2010 for integrating the Linux-based Wiimote Digital Blackboard with<br />
traditional didactical methodologies. The project is supported by the Innovation, Research <strong>and</strong> ICT Department<br />
of the Provincia Autonoma di Trento.<br />
Objectives: exploit the potentialities of digital blackboards, with open source technologies <strong>and</strong> software, in<br />
primary <strong>and</strong> high-level schools<br />
Solutions: the WiiLD digital blackboard is a hardware platform that integrates a Wiimote with a PC to provide<br />
digital blackboard features. During the project, a lot of OSS tools, which support teachers <strong>and</strong> school<br />
managers, have been experimented <strong>and</strong> developed with WiiLD (e.g., python-whiteboard, Ardesia, Jarnal, Vue,<br />
Geogebra, Wxmaxima, Solfege).<br />
Methodology: the project is a research <strong>and</strong> development project supported by several schools, the Research<br />
<strong>and</strong> ICT Department of the Provincia Autonoma di Trento <strong>and</strong> the University of Trento. The partners followed a<br />
rigorous methodology to achieve the goals of the project: identify the didactical role of WiiLD; experiment<br />
160
Chiara Friso, Valentina Lenarduzzi, Davide Taibi <strong>and</strong> Davide Tosi<br />
WiiLD with a subset of teachers with skilled abilities in adopting technology; compare the expensive LIM<br />
(Lavagna Interattiva Multimediale) with the open source based WiiLD; identify a set of OSS tools to provide a<br />
suite that completely support teachers <strong>and</strong> school managers in their daily work; engineer <strong>and</strong> develop new<br />
OSS solutions; create a community around WiiLD.<br />
Schools Involved : 40 schools are experimenting the WiiLD<br />
1) Experience Name: Istituto Statale di Istruzione Superiore “P. Paschini” (Udine)<br />
(URL: www.paschinimarchi.it/dokuwiki/doku.php/aula_di_informatica)<br />
Description: the experience started in 2002 <strong>and</strong> it is based on the adoption of Linux OS for all the PCs of the<br />
school, not only for economical reasons but also for ethical <strong>and</strong> technological motivations (e.g., manage in a<br />
simpler way remote students’ accesses <strong>and</strong> permissions)<br />
Solutions: the adoption of the Linux Terminal Server Project (LTSP) to centralize data, accesses <strong>and</strong> software<br />
tools. A set of diskless clients are remotely connected to the server to virtually boot the Operating System.<br />
Methodology: the experience is based on the individual work of a teacher of the school. He identified the<br />
LTSP, studied the Linux OS, collaborated with an external company for the installation <strong>and</strong> configuration of the<br />
client-server network<br />
Evaluation: the promoter of the experience reports a lot of advantages <strong>and</strong> none disadvantages in the<br />
adoption of Linux.<br />
2) Experience Name: Istituto Tecnico Commerciale Statale “Odorico Mattiussi” (Pordenone)<br />
(URL: www.itcmattiussi.it, www.mattiussilab.net/content)<br />
Description: the experience started in 2001 <strong>and</strong> it is based on the adoption of several OSS solutions to<br />
support high-level students in their business course of studies, not only for economical reasons but also for the<br />
large set of OSS tools available for business people.<br />
Solutions: the adoption of a Linux distribution, the use of OpenOffice, GIMP, FireFox, gcc, netfilter, samba,<br />
squid <strong>and</strong> the apache web server; the experimentation of the Moodle e-learning platform; the development of<br />
OSS solutions to support school-managers <strong>and</strong> administrative tasks.<br />
Methodology: the experience started in an unstructured manner with the collaboration of two teachers,<br />
technical staff <strong>and</strong> some motivated students.<br />
Evaluation: the promoters of the experience reported the difficulties encountered to motivate some students in<br />
the adoption of OSS solutions.<br />
3) Experience Name: Istituto Comprensivo “G. Toniolo” (Pisa)<br />
(URL: http://ictoniolopisa.it)<br />
Description: the experience started in 2009 <strong>and</strong> it is based on the migration from the Microsoft OS to the<br />
Linux OS, not only for economical reasons but also for ethical <strong>and</strong> didactical motivations (e.g., provide a large<br />
set of tools <strong>and</strong> solutions to improve the students’ critical ability).<br />
Solutions: migration from proprietary software to OSS solutions with the adoption of a Linux distribution <strong>and</strong> a<br />
set of tools to innovate the didactic (Innovascuola).<br />
Methodology: the experience is based on a first partial migration where each PC was able to boot in dual<br />
mode (both Microsoft <strong>and</strong> Linux), followed by a total migration to Ubuntu. An external company has supported<br />
the installation <strong>and</strong> configuration of 6 new laboratories <strong>and</strong> also the training of teachers <strong>and</strong> school managers.<br />
Evaluation: the promoter of this experience reports a lot of advantages in adopting Linux <strong>and</strong> few<br />
disadvantages such as the opposition of some teachers <strong>and</strong> the huge number of hours spent after working<br />
time for conducting the experience.<br />
3.1 Planning the survey<br />
Also in this case, we followed a systematic literature review (Biolchini et al., 2007) to survey the<br />
available OSS tools for digital class rolls. The survey was planned with the aim of identifying the OSS<br />
tools developed by communities or private developers related to digital class rolls. This objective led<br />
us to define a set of questions that we hope answer throughout the survey:<br />
Q1: are OSS tools for digital rolls available?<br />
Q2: are the available OSS tools for digital rolls experimented in real domains?<br />
Q3: what kind of support can actually provide the adoption of these OSS tools?<br />
The survey has been conducted <strong>using</strong> the following search strings <strong>and</strong> criteria:<br />
Open source tools for schools<br />
Digital class rolls<br />
Digital class registers<br />
OSS <strong>and</strong> floss solutions for didactic<br />
OSS <strong>and</strong> floss solutions for schools<br />
161
Chiara Friso, Valentina Lenarduzzi, Davide Taibi <strong>and</strong> Davide Tosi<br />
OSS <strong>and</strong> floss products for teaching<br />
We used both keywords in English <strong>and</strong> also in Italian, <strong>and</strong> we manipulated the strings with logical<br />
operators (<strong>and</strong>, or) <strong>and</strong> we searched the electronic resources listed in Section 2.1.<br />
In order to answer the three previous questions, we identified a set of inclusion <strong>and</strong> exclusion criteria<br />
<strong>and</strong> a set of dimensions for the classification. The inclusion <strong>and</strong> exclusion criteria were defined in<br />
order to filter properly the whole set of tools identified during the first round of search. We decided to<br />
include in our primary set of tools only the tools with the availability of the translation in Italian. We<br />
included not only OSS tools but also free tools because the availability of a lot of tools that do not<br />
need the installation of the application but they are provided online as web applications, thus they are<br />
not released with their source code. We also selected the tools characterized by an active community<br />
around the project <strong>and</strong> we discarded tools <strong>and</strong> projects that are not still alive or supported. We<br />
considered four dimensions for the analysis of each tool: 1) version <strong>and</strong> license type; 2) features<br />
provided; 3) expertise needed for its use/installation; 4) advantages/disadvantages in its adoption.<br />
3.2 Survey results<br />
The survey has been conducted with the search criteria defined in Section 3.1 <strong>and</strong> by querying the<br />
electronic resources identified in Section 2.1. After these steps, we retrieved 56 OSS tools. We then<br />
reduced the number of the identified tools from 56 to 7 primary OSS tools by applying the inclusion<br />
<strong>and</strong> exclusion criteria of Section 3.1. Table 2 lists the primary set of tools identified during our survey<br />
<strong>and</strong> summarizes for each tool the four dimensions of the analysis. Engrade is a tool that we discarded<br />
from the primary set of tools because it does not respect an inclusion criterion (i.e., it is currently<br />
available in English <strong>and</strong> does not have an Italian translation yet). In any case, we decided to also<br />
report Engrade in the primary list because of its popularity (at the time of writing, 2560751 people are<br />
members of Engrade), its maturity (available from 2003) <strong>and</strong> its provided features (gradebook,<br />
messaggining support, homework calendar, quizzes, discussions).<br />
Summarizing, we can state that, from a quantitative point of view, a good set of OSS tools for digital<br />
class rolls is available. These tools have been experimented extensively in some Italian schools <strong>and</strong><br />
they are currently under evaluation. The adoption of these tools can actually simplify <strong>and</strong> speed-up<br />
the fill-in task of the register, can support teachers <strong>and</strong> school managers in filing <strong>and</strong> searching into<br />
old registers, <strong>and</strong> can improve the communication among teachers, students <strong>and</strong> parents. In the next<br />
section, we will report on the results obtained by applying our OP2A model to assess the quality <strong>and</strong><br />
maturity of the portal that store these tools. The assessment provides the way to underst<strong>and</strong> whether<br />
each portal supports final users (i.e., teachers, managers, parents) during the choice of the digital<br />
class roll that best fits their requirements <strong>and</strong> during the adoption of the selected product.<br />
Table 2: Description of the primary set of OSS tools for digital class rolls<br />
Tool Name Version<br />
,<br />
Il registro del prof.<br />
G. Piotti<br />
(Piotti, 2011)<br />
Il registro del prof.<br />
M. Sechi<br />
(Sechi, 2011)<br />
License<br />
n.a.<br />
free<br />
V2011<br />
n.a.<br />
Features Expertise<br />
Requireme<br />
- classes <strong>and</strong> disciplines<br />
management<br />
- students info <strong>and</strong> statistics<br />
- absences <strong>and</strong> students’<br />
marks<br />
- archive of past years<br />
- classes <strong>and</strong> disciplines<br />
management<br />
- students info <strong>and</strong> statistics<br />
- absences <strong>and</strong> students’<br />
marks<br />
- archive of past years<br />
- reports for assessments,<br />
evaluations, course work,<br />
boarding school, meetings<br />
- notification messages via<br />
email/sms to teachers,<br />
students <strong>and</strong> parents<br />
162<br />
nt<br />
- Windows<br />
XP<br />
Advantages (A)<br />
Disadvantages (D)<br />
A: simple to install <strong>and</strong> use<br />
A: register export in .pdf file<br />
D: only for Windows O.S.<br />
D: no data about its<br />
adoption<br />
D: access limited to teacher<br />
n.a. A: simple to install <strong>and</strong> use<br />
A: register export in .pdf file<br />
A: notification messages<br />
A: web <strong>and</strong> mobile phone<br />
access<br />
D: no data about its<br />
adoption
Il giornale elettronico<br />
(Trivella, 2011)<br />
Chiara Friso, Valentina Lenarduzzi, Davide Taibi <strong>and</strong> Davide Tosi<br />
V2010<br />
free<br />
Tool Name Version<br />
,<br />
Teach2000<br />
St<strong>and</strong>ard Ed.<br />
(Montebovi, 2011)<br />
i-Class<br />
(Pian, 2011)<br />
Hermes<br />
(Forlano, 2011)<br />
ClaSS<br />
(Class, 2011)<br />
Engrade Online<br />
Gradebook<br />
(Engrade, 2011)<br />
License<br />
V1.0<br />
free<br />
V3.2<br />
free<br />
V4.2<br />
GPL<br />
V0.9.4<br />
GPL<br />
n.a.<br />
free<br />
- simple .doc file to trace<br />
students ratings, home works,<br />
final assessments, parents<br />
talks<br />
Features Expertise<br />
Requireme<br />
- advanced software for<br />
programming <strong>and</strong> monitoring<br />
teaching activities<br />
- calendar management<br />
- work planning via Gantt<br />
diagrams<br />
- automatic generation of<br />
statistical data<br />
- reports <strong>and</strong> exports in .pdf<br />
files<br />
- archive of past years<br />
- vocal notes<br />
- classes <strong>and</strong> disciplines<br />
management<br />
- students info <strong>and</strong> statistics<br />
- absences <strong>and</strong> students’<br />
marks<br />
- archive of past years<br />
- reports for assessments,<br />
evaluations, course work,<br />
boarding school, meetings<br />
- classes <strong>and</strong> disciplines<br />
management<br />
- students info <strong>and</strong> statistics<br />
- absences <strong>and</strong> students’<br />
marks<br />
- notification messages via<br />
sms to teachers, students <strong>and</strong><br />
parents<br />
- info <strong>and</strong> marks book<br />
- reports book<br />
- automatic generation of<br />
curricula<br />
- reports, imports <strong>and</strong> exports<br />
from/to several data format<br />
- gradebook for students<br />
management<br />
- messaging <strong>and</strong> notifications<br />
- homework calendar<br />
- quizzes<br />
- discussions<br />
- wikis<br />
- flashcards<br />
- attendance<br />
- students <strong>and</strong> parents online<br />
access<br />
163<br />
- MS Office D: limited features<br />
D: only for MS Word<br />
nt<br />
- expert<br />
users<br />
- no<br />
expertise<br />
required<br />
- no strong<br />
requiremen<br />
ts<br />
- Expert<br />
user<br />
- it requires<br />
PHP,<br />
MySQL<br />
<strong>and</strong> Web<br />
space<br />
- Expert<br />
user<br />
- It requires<br />
a Web<br />
Server<br />
- no<br />
expertise /<br />
requiremen<br />
ts required<br />
Advantages (A)<br />
Disadvantages (D)<br />
A: several advanced<br />
features<br />
A: well designed <strong>and</strong><br />
developed<br />
A: access for parents <strong>and</strong><br />
students<br />
A: data export in .pdf file<br />
A: quality label by INDIRE<br />
<strong>and</strong> the Italian Ministry<br />
A: active community of<br />
users<br />
A: up-to-date with the<br />
Italian law<br />
D: based on Access DB<br />
D: not designed for primary<br />
schools<br />
A: simple to install <strong>and</strong> use<br />
A: available for Mac, Win<br />
<strong>and</strong> Linux<br />
A: nice GUI<br />
A: data import from html, txt<br />
<strong>and</strong> rtf<br />
A: access for parents <strong>and</strong><br />
students<br />
D: limited features<br />
A: designed for parents,<br />
students, managers <strong>and</strong><br />
teachers<br />
A: notification messages<br />
D: the download is<br />
available after registration<br />
D: the tool does not have its<br />
own web page but a simple<br />
forum<br />
A: international product with<br />
multi lingual support<br />
A: OSI certified<br />
A: several Operating<br />
Systems supported<br />
A: access for parents,<br />
students, managers<br />
A: web application<br />
D: documentation in<br />
English<br />
D: not compliant with Italian<br />
law <strong>and</strong> regulations<br />
A: internationally<br />
recognized<br />
A: strong community of<br />
developers <strong>and</strong> users<br />
A: a lot of advanced<br />
features<br />
A: online access<br />
D: Italian language not yet<br />
supported<br />
D: not compliant with Italian<br />
law <strong>and</strong> regulations
Chiara Friso, Valentina Lenarduzzi, Davide Taibi <strong>and</strong> Davide Tosi<br />
4. OP2A evaluation of the OSS digital class rolls<br />
The adoption of a new OSS tool is not a trivial task. Usually, when users face with the adoption of a<br />
new product, they surf on search engines <strong>and</strong> look for the product that best fits their requirements.<br />
In (Basilico et al., 2011), Basilico et al. defined OP2A (Open source Product Portal Assessment), a<br />
method for evaluating the quality of the information provided by the websites that host OSS products.<br />
Unlike other evaluation methods, OP2A evaluates the website instead of the product quality <strong>and</strong> aims<br />
at ensuring both the availability of information <strong>and</strong> also its accessibility. OP2A evaluation is based on<br />
the simulation of the assessment of a new OSS product. During the simulation, an assessor will fill in<br />
a checklist by looking for a list of information provided. The OP2A method is based on the percentage<br />
of information provided <strong>and</strong> it scores the availability of the information by means of a weighted sum.<br />
On January 2011, OP2A website scores 20 evaluated projects while at the time of writing there are<br />
more than 60 evaluated projects. This highlights the activity of the community in evaluating products<br />
<strong>and</strong> sharing opinions on the evaluations itself.<br />
We applied the OP2A checklist to the tools identified in Section 3.2. Table 3 summarizes the results of<br />
the assessment providing, for each OP2A section, the percentage of information available on the<br />
website. Each information category is divided in sub category. For example, the “requirement”<br />
category, is composed by disk usage, Memory usage, Min CPU required, Other HW requirements,<br />
Supported operative systems, <strong>and</strong> Required 3rd parties components.<br />
Table 3: Assessments of the OSS digital class rolls with the OP2A methodology<br />
<strong>Information</strong> Il Registro Registro del ClaSS Teach2000 i-Class<br />
Professore<br />
Overview 56.4% 56.4% 85.2% 77.8% 77.8%<br />
Requirements 83.3% 16.6% 66.6% 0% 0%<br />
License 0% 0% 48.3% 51.6% 0%<br />
Documentation 11.5 11.5% 23% 8.63% 2.87%<br />
Downloads 75 25% 100% 75% 74%<br />
Quality Reports 36.3 27.2% 0% 0% 27.2%<br />
Community <strong>and</strong> support 0% 9.59% 58.6% 52.9% 49.4%<br />
We didn’t analyzed “Silente registro elettronico”, Hermes <strong>and</strong> Engrade because OP2A can analyze<br />
only OSS products. In this case, “Silente is a closed source product, Engrade is a SaaS <strong>and</strong> does not<br />
provide the tool itself, while Engrade website is very trivial <strong>and</strong> does not provide enough information<br />
even to start the OP2A evaluation. The experimentation shows that the quality of the analyzed portals<br />
is not adequate in general, thus needing a strong refactor of the portal itself to achieve an acceptable<br />
level of quality so as to allow users to easily adopt the products. The vast majority of the tools do not<br />
allow to evaluate requirements, do not specify the type of license <strong>and</strong> any information about the<br />
usage in other schools. These data suggest that, very often, these tools are developed by private<br />
users without specific skills instead of by a structured community of developers.<br />
Detailed results on all evaluations can be found on the OP2A website (www.op2a.org)<br />
5. Conclusions<br />
In this paper we report on two literature surveys we conducted about the availability of experiences<br />
<strong>and</strong> projects focused on OSS solutions for the Italian schools, <strong>and</strong> the availability of OSS digital class<br />
rolls. The literature surveys can provide a lot of interesting suggestions to simplify the start of new<br />
projects <strong>and</strong> new experiences in adopting OSS solutions in Italian schools.<br />
References<br />
Basilico, G., Lavazza, L., Morasca, S., Taibi, D., Tosi D. (2011) OP2A: Assessing the Quality of the Portal of<br />
Open Source Software Products, In Proceedings of the 7 th International Conference on Web <strong>Information</strong><br />
Systems <strong>and</strong> Technologies, Netherl<strong>and</strong>s, May.<br />
Battistoni, M., (2008) Open Source Software Survey in Italian Schools. Web published. www.osor.eu.<br />
Accessed: March 2011.<br />
Biolchini J., Mian P.G., Natali A.C., Conte T.U., Travassos G.H., (2007) Scientific research ontology to support<br />
systematic review in software engineering. Advanced Engineering Informatics 21(2): 133-151<br />
164
Chiara Friso, Valentina Lenarduzzi, Davide Taibi <strong>and</strong> Davide Tosi<br />
Class (2011) ClaSS Student System. Web published. http://laex.org/ class/ Accessed: March 2011.<br />
Engrade (2011) Engrade Online Gradebook. Web published. www.engrade.com/ Accessed: March 2011.<br />
Forlano, L. (2011) Hermes. Developed by L. Forlano, Web published: http://ln x.sinapsi.org/forum/ Accessed:<br />
March 2011.<br />
FUSS (2005) Free Upgrade in South Tyrol’s Schools. Web published. www.fuss.bz.it Accessed: March 2011.<br />
Montebovi, D. (2011) Teach2000. Developed by D. Montebovi, Web published: www.oversoft.it/ Accessed:<br />
March 2011.<br />
Pian, A. (2011) i-Class. Developed by A. Pian, Web<br />
published: http://web.mac.com/arakhne//Download/Applicazioni/Voci/2010/9/17_iClass_3.2a.html<br />
Accessed: March 2011.<br />
Piotti, G. (2011) Il registro della scuola secondaria di primo grado. Developed by prof. G. Piotti, Web<br />
published: www.webalice.it/gpiotti/Registro_secondaria/ Accessed: March<br />
2011<br />
Rossi, B., Scotto, M., Sillitti, A., Succi G., (2006) An Empirical Study on the Migration to OpenOffice.org in a<br />
Public Administration, International Journal of <strong>Information</strong> Technology <strong>and</strong> Web Engineering.<br />
Sechi, M. (2011) Il registro del professore. Developed by prof. M. Sechi, Web<br />
published: www.brescianet.com/registroprofe/brochurenew.htm Accessed: March<br />
2011.<br />
Trivella, T. (2011) Il giornale elettronico dell’insegnante elementare. Developed by prof. T. Trivella, Web<br />
published: www.nonsoloscuola.org/nuoverisorse.htm Accessed: March 2011<br />
165
Cyber University - a Future for Online Education<br />
Yuwanuch Gulatee 1 <strong>and</strong> Barbara Combes 2<br />
1 Nakhon Phanom University, Thail<strong>and</strong><br />
2 Edith Cowan University, Perth, Australia<br />
y_gulatee@hotmail.com<br />
b.combes@ecu.edu.au<br />
Abstract: This paper will discuss the benefits that can be achieved by <strong>using</strong> visuals <strong>and</strong> animation in virtual<br />
environments for online study. It reviews the potential of <strong>using</strong> virtual worlds as tools in online learning to create<br />
social networks <strong>and</strong> communities, aspects of the learning environment that have been associated with the<br />
motivation <strong>and</strong> retention of students in higher education. Barriers <strong>and</strong> enablers for effective online learning<br />
environments will also be discussed. The technology used for virtual worlds <strong>and</strong> animated simulation provide<br />
another dimension to online courses of study. This paper will propose that this extension of the online learning<br />
environment is one way to engage students <strong>and</strong> create a sense of belonging <strong>and</strong> being an active participant in a<br />
learning community. Using the Cyber Classroom model to create community <strong>and</strong> a sense of belonging is one<br />
possible future for online education.<br />
Keywords: eLearning, distance learning, online learning, cyber classroom, virtual environment, simulation,<br />
animation, social barriers, enablers<br />
1. Introduction<br />
The provision of learning materials online or eLearning has become increasingly popular as an<br />
alternative delivery mode in higher education (Allen & Seaman, 2007; Wagner, 2006; Salimi, 2007;<br />
Kazmer & Haythornthwaite, 2005; Kim, Bonk, & Zeng, 2005). Since the mid to late 1990s, the World<br />
Wide Web has been used as a distributed learning mechanism, enhancing the digital learning<br />
environment to support distance <strong>and</strong> on campus students. Web technology has been adopted to<br />
assist learners with real-time studying at a distance. Learning online is a new way of receiving the<br />
knowledge <strong>and</strong> skills traditionally taught face-to-face. To be really effective, online learning<br />
environments need to be more than just websites that contain educational content or linear drill <strong>and</strong><br />
practice with computer software (Gulatee & Combes, 2008). Good online curriculum should include<br />
<strong>and</strong> make use of the full potential of the electronic delivery mode <strong>and</strong> the range of technologies<br />
currently available. So watching an educational video; <strong>using</strong> a digital camera or a computer to edit<br />
pictures, text or sounds for a presentation or project; or <strong>using</strong> an interactive online whiteboard in a<br />
lesson; utilising chat <strong>and</strong> real time communications alongside asynchronous communication such as<br />
email <strong>and</strong> discussion forums; can all be considered implementations of eLearning (2010b). In the<br />
research literature eLearning has been variously described as learning <strong>using</strong> a range of different<br />
delivery technologies <strong>and</strong> methods such as Computer Based Training (CBT), Web Based Training<br />
(WBT), electronic performance support systems, webcasts, listservs <strong>and</strong> learning management<br />
systems (LMS) (Brown, 2006). According to these definitions, eLearning is much more than just the<br />
delivery of content online. It attempts to emulate the learning environment found in the traditional<br />
classroom. While online education has been available for some time at most universities, research is<br />
only now producing evidence that this is a new <strong>and</strong> totally different teaching <strong>and</strong> learning paradigm<br />
that has experienced mixed success (Werry, 2002; Zemsky & Massey, 2004, Gulatee, 2010). While<br />
some researchers believe advances in technology can overcome the separation between students<br />
<strong>and</strong> staff (Wagner & Rachael K. F., 2009), other research indicates that this physical separation leads<br />
to a disconnect between learners, their peers <strong>and</strong> the instructor (Mark, Sibley, & Arbaugh, 2005;<br />
Peltier, Schibrowsky, & Drago, 2007; Deek & Espinosa, 2005; Alex<strong>and</strong>er, 2001).<br />
Research by Gulatee (Gulatee, Brown & Combes, 2009) makes it clear that the online delivery mode<br />
is challenging for both staff <strong>and</strong> students. There are considerable barriers posed by the technical<br />
environment <strong>and</strong> the physical separation of staff from their students. How staff <strong>and</strong> students perceive<br />
the online teaching <strong>and</strong> learning environment, <strong>and</strong> the perceived differences between the on campus<br />
<strong>and</strong> online learning experience also creates a barrier to effective learning. Indeed, these social<br />
barriers to learning can have a significant impact on the online learner who is studying in isolation,<br />
removed from their peers <strong>and</strong> have no sense of belonging to a learning community. Online students<br />
experience feelings of anxiety, frustration <strong>and</strong> often lack motivation as a result (Combes & Anderson,<br />
2006). Even when universities put into place a range of measures to facilitate the development of<br />
good online courses, attrition rates amongst online students is still twice as high as on campus<br />
students (Gulatee, Brown, & Combes, 2008).These barriers to learning in the online environment are<br />
166
Yuwanuch Gulatee <strong>and</strong> Barbara Combes<br />
psychological rather than a set of physical challenges to be overcome. The Cyber Classroom tool<br />
which enables students to interact synchronously with their classmates <strong>and</strong> the lecturer as well as the<br />
online environment <strong>and</strong> their course materials, is one way educators can create that sense of<br />
community that is a major part of the traditional classroom experience.<br />
2. Social barriers <strong>and</strong> enablers<br />
ELearning should be considered as a new paradigm for teaching <strong>and</strong> learning, rather than a<br />
substitute for the traditional, face-to-face classroom experience (Gulatee et al., 2008). Certainly online<br />
learners are faced with challenges when operating in the virtual environment that requires a range of<br />
different skills to engage with <strong>and</strong> interrogate eLearning materials. Clearly, students <strong>and</strong> instructors<br />
also need to approach this learning experience differently. Interacting <strong>and</strong> engaging with learning<br />
presented in this medium is very different from face-to-face instruction <strong>and</strong> curriculum should be<br />
designed so that learning materials are rich, varied <strong>and</strong> provide students with support structures to<br />
ensure that successful <strong>and</strong> deep learning takes place (Duderstadt, Wulf, & Zemsky, 2005).<br />
A major aspect of eLearning environments is collaboration. “Education practitioners <strong>and</strong> theorists<br />
have long recognized that education is a social activity where people make sense of information<br />
through interactions that support internalization <strong>and</strong> externalization” (Amelung, (2007, p. 501).<br />
According to research by Kreijnsa, Kirschnerb et al. (2003, p.3) “collaborative learning leads to deeper<br />
level learning, critical thinking, shared underst<strong>and</strong>ing <strong>and</strong> long term retention of the learned material.”<br />
Using collaborative learning techniques is currently recognized in both education <strong>and</strong> the workplace<br />
as a method to assist students to share information <strong>and</strong> be more successful in their overall learning<br />
(Eom, 2006).<br />
Many eLearning courses use collaborative learning experiences to also build a sense of community<br />
for their online students. According to Salmon:<br />
… many students are concerned about working online. They see reduced social contact<br />
in learning contexts as a real threat. They are anxious about the lack of stimulus <strong>and</strong> fun<br />
from their ‘buddies’ <strong>and</strong> on the potential loss of a special relationship with their lecturers,<br />
trainers <strong>and</strong> professors (Salmon, 2002. p. 5).<br />
Students often work online with materials that are restricted to text with the occasional inclusion of<br />
asynchronous communication via email, even in institutions where an effort has been made to provide<br />
eLearning materials that make the most of a range of technologies (Gulatee & Combes, 2007).<br />
Establishing a sense of identity <strong>and</strong> community is a difficult task that requires time. Tu <strong>and</strong> Corry<br />
(2001) suggest that there is a threshold of familiarity when studying with computers. Students need<br />
time to establish an online self <strong>and</strong> an online social presence. Salmon also tells us that “experienced<br />
participants introduced to an unfamiliar online learning platform will still go through a familiarisation,<br />
access <strong>and</strong> motivation stage” (Salmon, 2002, p. 12). For students studying entirely online,<br />
establishing a personal identity <strong>and</strong> feeling part of the university community is an ongoing issue that is<br />
revisited every time they begin a new unit with a different set of individuals.<br />
Self-motivation has also been identified as an important prerequisite for success when studying online<br />
(Allen & Seaman, 2007; Yukselturk, 2009). Other enablers for success in the online environment are<br />
the amount of time students commit to their study, the acquisition of study skills, access to <strong>and</strong> prior<br />
experience with technology (Waschull, 2005). The isolation experienced when studying alone also<br />
affects students’ motivation to engage with the online learning environment (Combes & Anderson,<br />
2006). Other studies have found that improvements in motivation increase levels of enjoyment<br />
experienced by students. Providing an environment in higher education that students perceive as ‘fun<br />
to learn’ by <strong>using</strong> games, simulation <strong>and</strong> animation (Aldrich, 2009; Whitton, 2009) increases student<br />
motivation <strong>and</strong> makes studying online more enjoyable. Such environments engage, enrich <strong>and</strong><br />
provide that sense of community students need to create their identity as part of the learning<br />
community.<br />
3. Student perceptions<br />
In a study completed in a School of Computer Science with a total commitment to the provision of<br />
online courseware for all students, <strong>and</strong> a long history of engagement with enablers for eLearning as<br />
reported in the research literature, Gulatee (2010) found a range of reactions from the student<br />
participants, particularly in the area of self-motivation. These students were studying in a School<br />
which has a high level of integration <strong>and</strong> dual delivery modes (on campus <strong>and</strong> online) across all<br />
167
Yuwanuch Gulatee <strong>and</strong> Barbara Combes<br />
courses (<strong>Information</strong> Technology, Computer Science, <strong>and</strong> Library <strong>and</strong> <strong>Information</strong> Science). Student<br />
participants in this research were studying a range of courses <strong>and</strong> units from the highly technical to<br />
the theoretical.<br />
An initial data collection of historical course data revealed that even in a school with a long history <strong>and</strong><br />
developed eLearning culture (Anderson et al, 2005) there was still an unusually high level of attrition<br />
amongst students studying wholly online. A Web questionnaire was developed to ascertain how<br />
students felt about online study, with an emphasis on students studying technical subjects. All modes<br />
of delivery were considered: wholly online, mixed mode <strong>and</strong> on campus. Both open <strong>and</strong> closed<br />
questions were used in the questionnaire to gain a rich dataset <strong>and</strong> which allowed participants to<br />
further exp<strong>and</strong> on their experiences.<br />
In-depth interviews were also conducted with a small number of participants studying different<br />
courses <strong>and</strong> via different delivery modes. Interviews were used because they are valuable tools which<br />
can provide rapid, immediate responses <strong>and</strong> on the spot clarification from the perspective of the<br />
interviewee. They also provide opportunities for more in-depth examination of identified issues <strong>and</strong><br />
can lead to further context specific follow-up questions (Brenner, Brown, & Canter, 1985; Guion,<br />
2006). Interviews can also help to explore information from the sample that cannot be directly<br />
observed, such as feelings, thoughts <strong>and</strong> intentions (Campbell, 1998). The interview questions were<br />
guided by the preliminary findings of the Web questionnaire to add a measure of data triangulation<br />
between the three direct data collection instruments: historical analysis, Web questionnaire <strong>and</strong><br />
interviews (Jicks, 1979).<br />
While the primary focus of the original study (Gulatee, 2010) was to investigate online teaching <strong>and</strong><br />
the delivery of Computer Science topics, an interesting finding from the research was the importance<br />
of motivation as a predictor for success <strong>and</strong> completion when studying wholly online. Students<br />
identified social barriers to eLearning such as physical separation, poor communication, lack of<br />
immediate access to the instructor <strong>and</strong> consistent feedback. Interestingly, in this study, staff reported<br />
similar issues, but from the lecturer’s perspective. Both groups felt that a major problem when<br />
studying via the Web, is the lack of direct interaction in teaching <strong>and</strong> learning activities, both peer-topeer<br />
<strong>and</strong> staff to student. Questionnaire responses from student participants indicated that frequent<br />
communication with peers, group work, prompt email feedback from instructors <strong>and</strong> access to quality<br />
online materials helped to motivate <strong>and</strong> encourage them to continue with their online study. They<br />
wanted to feel part of the interaction experienced in a traditional classroom. When these issues are<br />
addressed <strong>and</strong> addressed well, poor student self-motivation <strong>and</strong> self-discipline can be lessened <strong>and</strong><br />
student satisfaction increased.<br />
However in table 1 <strong>and</strong> 2, students still expressed significant levels of frustration <strong>and</strong> missed the<br />
classroom interaction. In the student interviews, respondents agreed that isolation is a major issue<br />
when studying online. Isolation leads to frustration <strong>and</strong> feelings of anxiety <strong>and</strong> disconnectedness from<br />
the instructor <strong>and</strong> peers. As the following students report:<br />
I just would like to say that online units are only good if you can not get access to the<br />
campus. Otherwise it is really not fair to study online. The courses are so much more<br />
difficult if we do not attend the class because we always have questions about issues<br />
<strong>and</strong> the lecturer is just not there. Sending email is not the best thing to do because of the<br />
time it takes to get an answer back. I am doing an online unit for the second time <strong>and</strong><br />
unfortunately they are the hardest ones. Thus it is very hard to get through them.<br />
(Student Participant ID: 61)<br />
It can sometimes be very difficult to be motivated to study <strong>and</strong> feel that I am always trying<br />
to catch up with the weekly readings. I haven't really been participating in the discussion<br />
boards like I should so I haven't been able to bounce ideas off other students. I hoping to<br />
rectify this next term by learning from the experience gained from this term (my first time<br />
wholly studying only). (Student Participant ID: 87)<br />
These comments indicate that mixed mode students also preferred to study on campus <strong>and</strong> went<br />
online only when they had no other choice. The research literature also supports these results,<br />
particularly in technical subjects. Students find it more difficult to apply technical theories to practical<br />
problems <strong>and</strong> applications when working wholly online (Deek & Espinosa, 2005; Hagan & Lowder,<br />
1996, p. 39; McSporran & King, 2005; Muilenburg & Berge, 2005).<br />
168
Table 1: Wholly online participants’ attitudes to<br />
Yuwanuch Gulatee <strong>and</strong> Barbara Combes<br />
Students online (N=41) SD D NA A SA<br />
Missing classroom interaction 0 3 1 18 19<br />
Percent 0 7 2 44 47<br />
Study online for convenience 0 1 2 11 27<br />
Percent 0 2 5 27 66<br />
Table 2: Wholly online students, levels of frustration<br />
Students online SD D NA A SA<br />
Total (N=41) 3 9 3 8 18<br />
Percent 7 22 7 20 44<br />
While this <strong>and</strong> other studies present a consistent view of online learning experiences from the student<br />
perspective, this research also examined the staff point of view. While not unique in its recognition of<br />
the importance of staff in the provision of eLearning, this study certainly focused far more heavily on<br />
the staff perspective <strong>and</strong> possible connections between their views <strong>and</strong> those of their students. This<br />
study shows, just as with the student cohort, that staff members experience issues of isolation,<br />
frustration <strong>and</strong> disconnectedness when teaching via the online environment. Like the students, this<br />
response is largely due to the issue of physical separation, which in turn can lead to a lack of<br />
motivation <strong>and</strong> commitment to online teaching <strong>and</strong> curriculum development. These issues are in<br />
addition to the more generic issues commonly raised in the research literature such as time, workload,<br />
a lack of professional development, <strong>and</strong> in some cases, poor technical literacy. The commentary<br />
below clearly illustrates the staff perspective of how the physical separation imposed by the online<br />
environment affects staff interactions with their students.<br />
When I want to solve a problem with a student, miscommunication really makes me feel<br />
frustrated. For online I need to do a lot of preparation. I spend more contact time with<br />
online students. I do feel isolated from the students. The team bonding experience, not<br />
just within the students, but also the lecturer <strong>and</strong> student relationship, makes the student<br />
experience more enjoyable. (Staff participant ID: 4)<br />
Recognition that the online environment is very different from the f-t-f environment is a<br />
first step in developing materials that will cater for both <strong>and</strong> realistic time allocations for<br />
the workload involved. (Staff participant ID: 15)<br />
The findings of this study clearly show that in any research involving effective eLearning the<br />
perspectives <strong>and</strong> expertise of the staff must be considered as being equally pre-eminent as those of<br />
the students. In the past there has been a tendency for research to focus on the student as consumer<br />
of eLearning programs. A conclusion of this research is that such a singular focus can lead to a very<br />
one sided assessment of eLearning <strong>and</strong> its attendant issues. Providing learning programs that are<br />
interactive <strong>and</strong> socially dynamic, inherently involves both the instructor <strong>and</strong> the learner <strong>and</strong> therefore<br />
meaningful conclusions about eLearning must include input from both parties. This research <strong>and</strong><br />
others like it indicate that both students <strong>and</strong> staff want to feel connected <strong>and</strong> part of a learning<br />
community that is a feature of the traditional classroom. The personal touch that is an essential part of<br />
the teaching-learning experience is not readily available online, as reflected in both the student <strong>and</strong><br />
staff interviews. Thus, the instructor-learner dynamic that is a feature of the traditional classroom<br />
experience, but essentially missing from the online environment due to physical separation, makes it<br />
difficult to support <strong>and</strong> motivate students <strong>and</strong> staff when teaching <strong>and</strong> learning online.<br />
4. Higher education <strong>and</strong> virtual worlds<br />
Developments in technology create new possibilities for online classrooms. New methods of<br />
communication such as interactive social networking tools, online whiteboards, both synchronous <strong>and</strong><br />
asynchronous tutorials, <strong>and</strong> chat room avatars provide students with opportunities to engage in a<br />
social community which also provides a venue for collaborative learning, interactivity, <strong>and</strong> teambased,<br />
problem–solving activities. Using animated virtual world communications provides students<br />
with a virtual space that is familiar as it resembles the physical classroom, <strong>and</strong> is a space where<br />
students can experience the social learning aspects that occur face-to-face (Wankel & Kingsley,<br />
2009). In research by John, Lesley, & Leonard (2009) students reported a favourable reaction to the<br />
169
Yuwanuch Gulatee <strong>and</strong> Barbara Combes<br />
use of virtual world communications, which provided them with the facility to share ideas <strong>and</strong> work as<br />
a group such as occurs in a traditional classroom. Using virtual worlds to study provides an<br />
immersive, persuasive <strong>and</strong> very flexible learning environment. These environments reflect gaming<br />
software that is often familiar, helps to capture students’ imagination <strong>and</strong> are perceived as selfmotivating<br />
by students (Wankel & Kingsley, 2009).<br />
Research by Aldrich (2009) found that the provision of an interactive virtual environment can help<br />
students <strong>and</strong> reduce the social separation experienced during distance learning. The inclusion of<br />
virtual environments in an online classroom, provide a semblance of the reality experienced in the<br />
traditional classroom. “These environments can capture <strong>and</strong> convey enough social cues, such as<br />
body language, interactive props, <strong>and</strong> the look <strong>and</strong> feel of ‘real’ surroundings to convince some part of<br />
the participants’ brains that they are physically in this other world” (Aldrich, 2009, p. 8).<br />
Emerging findings from Aldrich, Gulatee <strong>and</strong> others (Whitton, 2009; Allen & Seaman, 2007;<br />
Yukselturk, 2009; Combes & Anderson, 2006) in the research literature, clearly demonstrate that the<br />
eLearning environment does indeed have a significant impact <strong>and</strong> is a major contributor to the social<br />
<strong>and</strong> physical separation experienced by staff <strong>and</strong> students. Using virtual worlds technologies in<br />
eLearning environments provide possibilities to overcome these social barriers to create cyberspaces<br />
where staff <strong>and</strong> students can engage <strong>and</strong> recreate the teacher-learner dynamic online.<br />
5. Cyber university<br />
Using virtual worlds to create a cyber university interface is one way of providing a bridge between the<br />
virtual <strong>and</strong> the traditional classroom. It can be uploaded into a traditional LMS such as BlackBoard<br />
where it provides a familiar social interface rather than the differentiated, folder structure common to<br />
most students. Using 2D rather than 3D applications <strong>and</strong> animated avatars similar to those in most<br />
primary games, means that upload <strong>and</strong> b<strong>and</strong>width issues are kept to a minimum. At the same time<br />
students can become personally involved in the learning environment by choosing their avatar <strong>and</strong><br />
participating directly with others via a chat function, which can be for either social (fun) or learning<br />
activities. By emulating the real world classroom students can interact <strong>and</strong> engage in a simulated<br />
classroom that is quite different from the segmented, text based environment that is often a feature of<br />
LMS <strong>and</strong> eLearning. The use of 2D avatars simplifies the environment <strong>and</strong> makes it much easier to<br />
use than current virtual worlds such as Second Life, which require high b<strong>and</strong>width <strong>and</strong> are often<br />
‘clunky’ to use (Mennecke, Hassall & Triplett, 2008).<br />
A mock-up of a possible cyber university interface is presented below. Students choose their avatar<br />
<strong>and</strong> can ‘talk’ to <strong>and</strong> interact with their peers <strong>and</strong> their lecturer both in real time <strong>and</strong> asynchronously.<br />
They can access course materials by clicking on relevant titles in the bookcase <strong>and</strong> receive static<br />
messages on the screen.<br />
Such an interface also helps to personalize the eLearning space from the staff perspective. Students<br />
can have a visual of their lecturer <strong>and</strong> peers as avatars. The avatars mean that individual privacy is<br />
ensured, while still providing an image <strong>and</strong> visual point of recognition <strong>and</strong> contact. Students can come<br />
to the online class just like a real class. They can hear the lecturer talking, interact with the learning<br />
via an electronic whiteboard <strong>and</strong> thus experience real time interaction with their lecturers <strong>and</strong> peers.<br />
Signing into the interface via an avatar means that attendance checking is made easier for the<br />
lecturer <strong>and</strong> students are encouraged to ‘attend’ the virtual classroom. Non-attendance at lectures<br />
when online materials are provided to on campus students is an issue that leads to poor student time<br />
management, a lack of motivation <strong>and</strong> engagement, <strong>and</strong> poor completion rates (Gulatee, 2010).<br />
Other technology can also be embedded into the cyber university interface. A reward system tied to<br />
assessment where students can earn points by attendance, contributions, interactivity <strong>and</strong> helping<br />
other students can be implemented to make the interface more engaging (Baatard, 2008). Online<br />
students can partner up with on campus students during group assignments so all students have the<br />
same assessments. Lecturers can even video stream so the online class is conducted at the same<br />
time as on campus lectures to foster a collaborative sense of community. All aspects of the online<br />
class including student <strong>and</strong> staff interactions can be fully recorded so students who really cannot<br />
make it to the class (either on campus or online) can complete it later, thus ensuring that the flexibility<br />
of eLearning is not compromised.<br />
170
Yuwanuch Gulatee <strong>and</strong> Barbara Combes<br />
Figure 1: Cyber university interface<br />
Our virtual interface could be multi-layered <strong>and</strong> include a number of ‘rooms’. A virtual office could be<br />
created where a lecturer <strong>and</strong> student could conduct a one-to-one, private meeting by appointment.<br />
They could use real time text, audio, video chat <strong>and</strong> an online whiteboard. Such interaction between<br />
staff <strong>and</strong> students can provide that real time interaction currently missing from the eLearning<br />
experienced by most students. Students could also do private study sessions <strong>and</strong> group work or<br />
participate in social events online with their avatars. A virtual classroom where the lecturer has control<br />
of the learning environment could be used to conduct classes, while a conference room where<br />
students can form discussion groups <strong>and</strong> conduct group work places the control of the learning,<br />
motivation <strong>and</strong> activity back into the h<strong>and</strong>s of the learners. The Time Machine is a room for students<br />
who miss the class <strong>and</strong> would like to replay the whole class which has been recorded.<br />
Taking the positive aspects of virtual worlds technologies <strong>and</strong> embedding these into traditional LMS<br />
eLearning environments to create a bridge between the virtual <strong>and</strong> real classroom may help us to<br />
create more engaging online learning. Motivation, isolation <strong>and</strong> a lack of feeling part of a learning<br />
community have been identified as major impediments to success at university <strong>and</strong> as issues for<br />
student retention <strong>and</strong> completion of eLearning programs. Combining the two to create a simple, yet<br />
effective interactive interface that will engage students <strong>and</strong> create a real, identifiable learning ‘space’,<br />
is one way to make eLearning more attractive to students who value the teacher-learner dynamic that<br />
is a feature of the traditional classroom. Such an environment is only restricted by the imagination of<br />
the participants. Welcome to Cyber University!<br />
References<br />
Aldrich, C. 2009. Learning Online with Games, Simulations, <strong>and</strong> Virtual Worlds: Strategies for Online Instruction.<br />
John Wiley & Sons, Hoboken.<br />
Alex<strong>and</strong>er, S. 2001. E-learning developments <strong>and</strong> experiences. Education Training, 43, 240-248.<br />
Allen, E. <strong>and</strong> Seaman, J. 2007. Online Nation: Five Years Growth in Online Learning. Sloan Consortium, USA.<br />
Amelung, C. 2007. Using social context <strong>and</strong> e-learner identity as a framework for an e-Learning notification<br />
system. International Journal on ELearning, 6, 4, 501-517.<br />
Anderson, K., Clayden, J., Combes, B., Ring, J. <strong>and</strong> Williams, T. 2005. Out of the frying pan <strong>and</strong> into the spa:<br />
Developing an online learning community <strong>and</strong> culture. Pacific Asian Education: A Journal about Education<br />
in Pacific Circle Countries, 17, 1, 44-53.<br />
Baatard, G. 2008. GroupShare - Designing an awareness rich online groupware system. Paper presented at the<br />
2008 International Conference on e-Learning, e-Business, Enterprise <strong>Information</strong> Systems, <strong>and</strong> e-<br />
Government (EEE'08), Las Vegas, Nevada.<br />
Beder, S. 1998. Addressing the Issues of Social <strong>and</strong> Academic Integration for First Year Students: A Discussion<br />
Paper. RMIT University, Melbourne.<br />
Brenner, M., Brown, J., <strong>and</strong> Canter, D. 1985. The Research Interview Uses <strong>and</strong> Approaches. Academic Press,<br />
Orl<strong>and</strong>o, Florida<br />
Brown, J. 2006. An Exploration of Student Performance, Utilisation <strong>and</strong> Attitude to the Use of a Controlled<br />
Sequencing Web Based Learning Environment. Edith Cowan University, Western Australia.<br />
Combes, B. 2007. The search for information <strong>and</strong> the Net Generation. Cyberspace, D-world, E-learning: Giving<br />
libraries <strong>and</strong> schools the cutting edge. The 2007 IASL Conference, National Taiwan Normal University,<br />
Taipei, Taiwan, 16-20 July 2007.<br />
Combes, B., <strong>and</strong> Anderson, K. 2006. Supporting first year e-learners in courses for the <strong>Information</strong> professions.<br />
Journal of Education for Library <strong>and</strong> <strong>Information</strong> Science (JELIS), 47,4, 259-276.<br />
171
Yuwanuch Gulatee <strong>and</strong> Barbara Combes<br />
Curtin University of Technology. 2003. Underst<strong>and</strong>ing Teaching <strong>and</strong> Learning at University, Teaching<br />
Development Unit.<br />
Deek, F. P., <strong>and</strong> Espinosa, I. 2005. An evolving approach to learning problem solving <strong>and</strong> program development:<br />
The distributed learning model. International Journal on e-learning, 4, 4, 409-426.<br />
Duderstadt, J. J., Wulf, W. M., <strong>and</strong> Zemsky, R. 2005. Envisioning a transformed university: Change is coming,<br />
<strong>and</strong> the biggest mistake could be underestimating how extensive it will be. Issues in Science <strong>and</strong><br />
Technology, 22, 1, 35-43.<br />
Eom, S. 2006. The role of the instructors as a determinant of students: Satisfaction in university online education.<br />
Paper presented at the Advanced Learning Technologies, 2006. Sixth International Conference.<br />
Finlay, J. 2009. Special issue on Web-based technologies for social learning in computer science education.<br />
Computer Science Education, 19,4, 205-207.<br />
Guion, L. A. 2006. Conducting an In-depth Interview. Retrieved August 5, 2007 from<br />
http://edis.ifas.ufl.edu/FY393.<br />
Gulatee, Y. 2010. An investigation into online teaching <strong>and</strong> delivery of computer science topics: Practice, content<br />
<strong>and</strong> environment factors. Edith Cowan University, Perth, Australia.<br />
Gulatee, Y., Brown, J., <strong>and</strong> Combes, B. 2008. Identifying social barriers in teaching Computer Science topics in a<br />
wholly online environment. Paper presented at the Fifth International Conference on Science, Mathematics<br />
<strong>and</strong> Technology Education, Udon Thani Thail<strong>and</strong>.<br />
Gulatee, Y., <strong>and</strong> Combes, B. 2008. Identifying social barriers in teaching Computer Science topics in a wholly<br />
online environment. Paper presented at the Fifth International Conference on Science, Mathematics <strong>and</strong><br />
Technology Education, Udon Thani Thail<strong>and</strong>.<br />
Hagan, D. L., <strong>and</strong> Lowder, J. 1996. Designing <strong>and</strong> developing a new learning environment for teaching.<br />
Hentea, M., Shea, M. J., <strong>and</strong> Pennington, L. 2003. A perspective on fulfilling the expectation of distance<br />
education. Paper presented at the Proceedings of the 4th Conference on <strong>Information</strong> Technology<br />
Curriculum, New York, USA.<br />
Jicks, T. 1979. Mixing qualitative <strong>and</strong> quantitative methods: Triangulation in action. Administrative Science<br />
Quarterly, 24, 12, 602-611.<br />
John, C. S., Lesley, A. W., <strong>and</strong> Leonard, L. G. 2009. Communication challenges <strong>and</strong> opportunities for educators<br />
<strong>using</strong> second life. In Higher Education in Virtual Worlds. Emerald Group Publishing UK, Bradford.<br />
Kazmer, M. M., <strong>and</strong> Haythornthwaite, C. 2005. Multiple perspectives on online learning. ACM Press, 25, 1, 7-11.<br />
Kim, K.-J., Bonk, C. J., <strong>and</strong> Zeng, T. 2005. Research paper: Surveying the future of workplace eLearning: The<br />
rise of blending, interactivity, <strong>and</strong> authentic learning. ACM, 6.<br />
Kreijnsa, K., Kirschnerb, P. A., <strong>and</strong> Jochemsb, W. 2003. Identifying the pitfalls for social interaction in computersupported<br />
collaborative learning environments: a review of the research. Computers in Human Behavior,<br />
19, 335-353.<br />
Kazmer, M. M., <strong>and</strong> Haythornthwaite, C. 2005. Multiple perspectives on online learning. ACM Press, 25, 1, 7-11.<br />
Kim, K.-J., Bonk, C. J., <strong>and</strong> Zeng, T. 2005. Research paper: Surveying the future of workplace eLearning: The<br />
rise of blending, interactivity, <strong>and</strong> authentic learning. ACM, 6.<br />
Latham, P. <strong>and</strong> Green, G. (1997). The Journey to University: A study of 'the First Year Experience', RMIT,<br />
Melbourne.<br />
Mark, B. R., Sibley, D. S., <strong>and</strong> Arbaugh, B. J. 2005. A Structural Equation Model of Predictors for Effective Online<br />
Learning. Journal of <strong>Management</strong> Education, 29, 531-563.<br />
McInnes, C.James, R. <strong>and</strong> Hartley, R. 2000. Trends in the First Year Experience in Australian Universities.<br />
Centre for the Study of Higher Education, University of Melbourne.<br />
McSporran, M., <strong>and</strong> King, C. 2005. Blended is better: Choosing educational deliverly methods. Proceedings of<br />
World Conference on Educational Multimedia, Hypermedia <strong>and</strong> Telecommunications, Montreal, Canada.<br />
Mennecke, B., Hassall, L.M <strong>and</strong> Triplett, J. 2008. The mean business of Second Life: Teaching entrepreneurship,<br />
technology <strong>and</strong> e-commerce in immersive environments. Journal of Online Learning <strong>and</strong> Teaching, 4, 3.<br />
Muilenburg, L. Y., <strong>and</strong> Berge, Z. L. 2005. Student barriers to online learning: A factor analytic study. Distance<br />
Education, 26, 1, 29-48.<br />
Oliver, R. <strong>and</strong> Omari. A. 2001. Exploring student responses to collaborating <strong>and</strong> learning in a Web-based<br />
environment. Journal of Computer Assisted Learning, 17, 1, 34-47.<br />
Peltier, W. J., Schibrowsky, A. J., <strong>and</strong> Drago, W. 2007. The Interdependence of the Factors Influencing the<br />
Perceived Quality of the Online Learning Experience: A Causal Model. Journal of Marketing Education, 29,<br />
140-153.<br />
Salimi, A. Y. 2007. The promise <strong>and</strong> challenges for distance education in accounting. Strategic Finance, 88, 7,<br />
19.<br />
Salmon, G. 2002. Etivities: The Key to Active Online Learning, Kogan Page, London.<br />
S<strong>and</strong>er, P., Stevenson, K., King, M. <strong>and</strong> Coats, D. 2000. University students’ expectations of teaching. Studies in<br />
Higher Education, 25, 3.<br />
Tu, H. <strong>and</strong> Corry, M. 2001. A paradigm shift for online community research, Distance Education, 22, 2.<br />
Wagner, E. D. 2006. Delivering on the promise of eLearning. Macromedia White Paper.<br />
Wagner, C., <strong>and</strong> Rachael K. F. 2009. Action learning with second life - A pilot study. Journal of <strong>Information</strong><br />
Systems Education, 20, 2, 249.<br />
Wallacea, S. A., McCartneyb, R., <strong>and</strong> Russell, I. 2010. Games <strong>and</strong> machine learning: a powerful combination in<br />
an artificial intelligence course. Computer Science Education, 20, 1, 21.<br />
Wankel, C., <strong>and</strong> Kingsley, J. 2009. Higher Education in Virtual Worlds, Emerald Group Publishing.<br />
172
Yuwanuch Gulatee <strong>and</strong> Barbara Combes<br />
Waschull, S. B. 2005. Predicting success in online psychology courses: Self-discipline <strong>and</strong> motivation. Teaching<br />
of Psychology, 32, 3, 190-192.<br />
Werry, C. 2002. The rhetoric of commercial online education. Radical Teacher, 63, 7-13.<br />
Whitton, N. 2009. Learning with Digital Games : A Practical Guide to Engaging Students in Higher Education,<br />
Routledge.<br />
Yukselturk, E. 2009. Do entry characteristics of online learners affect their satisfaction? International Journal on<br />
E-Learning, 8, 2, 269-281.<br />
Zemsky, R., <strong>and</strong> Massy, W. 2004. Thwarted Innovation: What Happened to E-learning <strong>and</strong> Why. The Learning<br />
Alliance for Higher Education, University of Pennsylvania.<br />
173
Managing Costs <strong>and</strong> Performance of <strong>Information</strong><br />
Technology in a Group Context – Current Challenges for<br />
Multinational Enterprises<br />
Florian Hamel, Thomas Ph. Herz, Falk Uebernickel <strong>and</strong> Walter Brenner<br />
University of St. Gallen, Switzerl<strong>and</strong><br />
florian.hamel@unisg.ch<br />
thomas.herz@unisg.ch<br />
falk.uebernickel@unisg.ch<br />
walter.brenner@unisg.ch<br />
Abstract: Over the past few decades, the importance of IT has increased year after year for the majority of<br />
businesses. Popular inorganic growth <strong>and</strong> consolidation strategies have led to the formation of business group<br />
organizations. The resulting organizational structure is characterized by a systematic delegation of duties<br />
between the core entity <strong>and</strong> the business entities. Such organizational structures represent a challenging<br />
environment for the group-wide management of IT costs <strong>and</strong> performance. The management of costs <strong>and</strong><br />
performance of IT, also known as IT evaluation, describes the discipline of ensuring the effective <strong>and</strong> efficient use<br />
of IT resources. The aim of this paper is to analyze the current situation regarding IT evaluation in business<br />
groups as well as to identify current challenges within this specific area. Seven multinational business groups will<br />
provide the basis for the following multiple case study.<br />
Keywords: IT performance management, IT cost management, IT evaluation, IT controlling, case study<br />
1. Introduction<br />
The rapid development of IT, along with the globalization trend, have significantly influenced the way<br />
organizations operate. These trends affect corporate strategies <strong>and</strong> operational decisions of<br />
organizations. Hence, depending on the business sector, IT budgets can account for up to 15% of<br />
corporations’ revenues (Minton <strong>and</strong> Shirer, 2010). This fact stresses the importance of carefully<br />
weighing the benefits of IT investments against costs (Brynjolfsson <strong>and</strong> Yang, 1996; Remenyi et al.,<br />
2007; McAfee <strong>and</strong> Brynjolfsson, 2008).<br />
Over the past few decades, the importance of IT has increased year after year for most businesses<br />
(McAfee <strong>and</strong> Brynjolfsson, 2008). Furthermore, a trend toward inorganic growth <strong>and</strong> consolidation<br />
strategies among corporations has been observed over the last 10 years (Gell et al., 2010). Through<br />
mergers <strong>and</strong> acquisitions, corporations aim to sustain <strong>and</strong> gain competitive advantages (Walter <strong>and</strong><br />
Barney, 1990). Such organizational group structures create a challenging environment for efficient<br />
<strong>and</strong> effective group-wide management of IT costs <strong>and</strong> performance; especially in terms of<br />
governance <strong>and</strong> alignment (Ives <strong>and</strong> Jarvenpaa, 1991).<br />
<strong>Management</strong> of IT costs <strong>and</strong> performance is also referred to by several other terms among<br />
information systems (IS) scholars worldwide. This paper uses the term “IT evaluation” which is widely<br />
used within the Anglo-Saxon area. The terms “IT performance management” or “IT performance<br />
measurement” are also used within this research area. Furthermore, the term “IT controlling” is worth<br />
mentioning as a term used by IS scholars from German-speaking areas (Schauer, 2006).<br />
According to existing literature reviews (Brynjolfsson <strong>and</strong> Yang, 1996; Gunasekaran et al., 2006;<br />
Schauer, 2006; Frisk, 2007; Rom <strong>and</strong> Rohde, 2007; Kohli <strong>and</strong> Grover, 2008; Schwertsik et al., 2009;<br />
Hamel et al., 2010), there are several IT evaluation frameworks, as well as performance management<br />
methodologies, established within the IS community. However, current literature lacks coverage of IT<br />
evaluation in a business group context (Hamel et al., 2010). This is also supported by the expert<br />
interviews that we have conducted to prove the practical relevance of this research topic. One of the<br />
experts proposed that current theoretical IT evaluation frameworks do not entirely cover the business<br />
group context. Therefore, this research study aims to investigate the specific status quo of business<br />
groups in terms of IT evaluation as well as current challenges. Consequently, we conducted a multiple<br />
case study with the purpose of addressing the following research questions (RQ):<br />
[RQ.1] What is the status quo for IT evaluation in business groups?<br />
[RQ.2] What are the challenges for group IT evaluation in business groups?<br />
174
Florian Hamel, Thomas Ph. Herz, Falk Uebernickel <strong>and</strong> Walter Brenner<br />
To address these questions, we used case studies of large multinational business groups which have<br />
a solid <strong>and</strong> diversified corporate structure consisting of several legally independent business entities<br />
operating in a global context.<br />
The paper is structured as follows: First, we will discuss related work, specifically the terms “IT<br />
evaluation” as well as “business groups”, <strong>and</strong> outline the research approach. Second, we will provide<br />
a brief description of the case study participants <strong>and</strong> their current engagement in terms of IT<br />
evaluation on the business group level. Next, the paper will provide the data analysis <strong>and</strong> key findings<br />
of the multiple case study. Finally, we will summarize their results <strong>and</strong> outline future research<br />
requirements.<br />
2. Foundation<br />
2.1 Business groups<br />
In times of growing market insecurity, structures which encourage flexibility <strong>and</strong> innovation are<br />
needed to facilitate prompt responses to new market developments. Furthermore, the globalization of<br />
markets, increasing complexity of management tasks <strong>and</strong> constantly changing economic <strong>and</strong> social<br />
structures, require permanent change in organizations (Albach et al., 2000). Corporations with group<br />
structure characteristics are capable of meeting these requirements (Granovetter, 2005). Hence, such<br />
companies are defined as business groups (Granovetter, 1995; Granovetter, 2005; Smangs, 2006).<br />
Business groups consist of a collective of legally independent companies. These companies are<br />
linked by various ties, including ownership or economic means, through which they achieve mutual<br />
objectives (Goold <strong>and</strong> Campbell, 1989; Granovetter, 1995; Penrose, 2009). On top of this collective,<br />
consisting of individual companies, is typically a core entity which at minimum provides common<br />
administrative or financial control, or managerial coordination among member companies. The level of<br />
governance of this core entity within the business group varies depending on ownership <strong>and</strong><br />
leadership principles within the group (Granovetter, 2005).<br />
The core entity, also known as the corporate center acts only as a leadership entity among<br />
autonomous business units within the group. This implies that the corporate center coordinates the<br />
corporate strategies on the business sector level <strong>and</strong> rarely beyond (Goold <strong>and</strong> Campbell, 1989;<br />
Granovetter, 2005; Smangs, 2006). Statistical <strong>and</strong> financial data, such as cash flows, revenues,<br />
return on investment, costs, quality, <strong>and</strong> market share, are instruments to manage, monitor, steer,<br />
<strong>and</strong> control business entities in management holding business groups (Albach et al., 2000; Wheelen<br />
<strong>and</strong> Hunger, 2009). Experts are discordant about this organizational structure (Diekmann, 2004). The<br />
motivation to choose such a decentralized corporate structure is to give the individual business<br />
entities the opportunity to react to market changes more flexibly <strong>and</strong> quickly as well as tailor their<br />
offering to local customer needs more than a large hierarchical corporation ever could. On the other<br />
h<strong>and</strong>, the realization of synergies between individual business entities within the group is a very<br />
challenging task <strong>and</strong> requires stringent <strong>and</strong> group-wide accepted leadership principles (Diekmann,<br />
2004; Granovetter, 2005).<br />
2.2 Managing costs <strong>and</strong> performance of IT<br />
Managing costs <strong>and</strong> performance of IT, or IT evaluation, is derived from general managerial<br />
accounting. IT evaluation is the approach for a “specific managerial accounting problem set” (Horváth,<br />
2009) in the context of IT. Clarification of the term managerial accounting is essential prior to the<br />
explanation of the term IT evaluation. Managerial accounting is defined as a collection of qualitative<br />
<strong>and</strong> quantitative management instruments which are utilized to coordinate corporate information flows<br />
to support management decision processes, but do not include internal or external auditing tasks<br />
(Garrison et al., 2009; Horváth, 2009). There are several specific managerial accounting approaches<br />
established with varying emphases depending on the application area (Horváth <strong>and</strong> Reichmann,<br />
2003; Garrison et al., 2009).<br />
IT evaluation includes the managerial accounting aspect of information technology, operational<br />
information systems <strong>and</strong> data processing within organizations as well as the corresponding leadership<br />
processes of the resource information itself. In doing so, the classical aspects of managerial<br />
accounting such as data processing, planning, governance <strong>and</strong> coordination are addressed (Van<br />
Grembergen, 2001; Garrison et al., 2009; Horváth, 2009; Krcmar, 2009).<br />
175
Florian Hamel, Thomas Ph. Herz, Falk Uebernickel <strong>and</strong> Walter Brenner<br />
The formal objectives of IT evaluation are to ensure effective <strong>and</strong> efficient use of IT resources (Van<br />
Grembergen, 2001; Irani <strong>and</strong> Love, 2008; Krcmar, 2009). In addition to formal objectives, aims with<br />
regard to content are also pursued, where business value, costs, quality, functionality <strong>and</strong> on-time<br />
delivery are the focus (Van Grembergen, 2001; Remenyi et al., 2007; Irani <strong>and</strong> Love, 2008; Kohli <strong>and</strong><br />
Grover, 2008; Krcmar, 2009). A review of established literature shows that IT evaluation can be<br />
segmented into three generic tasks: monitoring, planning, <strong>and</strong> steering. Monitoring means to monitor<br />
<strong>and</strong> report the status quo whereas planning is defined as setting performance targets in alignment<br />
with the business <strong>and</strong> IT strategy. Steering is associated with a continuous target-performance<br />
comparison <strong>and</strong> in the event that a deflection is identified, initiating appropriate steering measures<br />
(Horváth <strong>and</strong> Rieg, 2001; Garrison et al., 2009; Krcmar, 2009).<br />
IT evaluation has a significant influence on corporate IT strategy (Buchta et al., 2007). The success of<br />
a business group IT strategy is heavily dependent on the long-term alignment of IT with decentralized<br />
processes (Tanriverdi, 2006; Buchta et al., 2007; Sahaym et al., 2007). The monitoring, steering <strong>and</strong><br />
planning of IT resources <strong>and</strong> assets, (e.g. IT services, IT projects <strong>and</strong> IT infrastructure), from a group<br />
perspective, is essential to achieve synergies (Tanriverdi, 2006) because IT management decisions<br />
are not only made on the business entity level within a business group.<br />
2.3 Research methodology<br />
A multiple case study (Yin, 2009) was designed to elaborate on the current status quo of IT evaluation<br />
in business groups [RQ.1] <strong>and</strong> identify the challenges for IT evaluation on the group level [RQ.2].<br />
According to current literature reviews (Brynjolfsson <strong>and</strong> Yang, 1996; Gunasekaran et al., 2006;<br />
Schauer, 2006; Frisk, 2007; Rom <strong>and</strong> Rohde, 2007; Kohli <strong>and</strong> Grover, 2008; Schwertsik et al., 2009;<br />
Hamel et al., 2010), limited information about IT evaluation in a group context is available. The<br />
exploratory <strong>and</strong> qualitative case study research method is appropriate for the theory-building stage,<br />
<strong>and</strong> aims to formulate more precise questions that further research can answer (Eisenhardt, 1989;<br />
Eisenhardt <strong>and</strong> Graebner, 2007).<br />
The unit of analysis used is the organizational part of multinational enterprises responsible for the<br />
management of costs <strong>and</strong> performance of IT on the group level. This can be a single department<br />
within the core entity of the business group or a diversified group of entities within the organization.<br />
We decided to take 7 cases into consideration for this paper which is in line with Eisenhardt (1989),<br />
who suggests 4 to 7 cases. For multiple case studies, each case must be selected so that it either<br />
predicts similar results or predicts contrasting results but for predictable reasons (Yin, 2009).<br />
Therefore, based on accessible public corporate data such as investor relation <strong>and</strong> balance sheet<br />
reports, only corporations with a business group structure were selected.<br />
Table 1: Overview of conducted interviews <strong>and</strong> cases<br />
Company /<br />
Case<br />
Number of interview partners Total duration in hours Position<br />
Executive IT manager<br />
ALPHA 3 5.0<br />
Senior IT manager<br />
IT project manager<br />
BETA 1 2.0 Executive IT manager<br />
CHI 2 2.0<br />
Executive IT manager<br />
IT project manager<br />
Executive IT manager<br />
DELTA 3 3.0<br />
Senior IT manager<br />
IT project manager<br />
EPSILON 2 3.0<br />
Senior IT manager<br />
Senior IT manager<br />
Executive IT manager<br />
PHI 3 4.0<br />
Senior IT manager<br />
Senior IT manager<br />
GAMMA 2 3.0<br />
Executive IT manager<br />
Senior IT manager<br />
The data collection is based on a questionnaire which later served as a guideline for semi-structured<br />
interviews with the case study participants. The general questionnaire design was inspired by the<br />
176
Florian Hamel, Thomas Ph. Herz, Falk Uebernickel <strong>and</strong> Walter Brenner<br />
business engineering approach (Österle, 2010) <strong>and</strong> the internal factor analysis of the SWOT<br />
framework (Wheelen <strong>and</strong> Hunger, 2009). The questionnaire was evaluated <strong>and</strong> refined by a senior IS<br />
researcher <strong>and</strong> two senior IT managers who are specialists in the field of IT evaluation. Between<br />
December 2009 <strong>and</strong> March 2010, expert interviews were conducted with IT managers of these seven<br />
business groups. The interviews took an average of 2.75 hours <strong>and</strong> were conducted by two<br />
researchers. The number of experts per interview varied from one to three (refer to Table 1). Answers<br />
to the questions in the questionnaire as well as additionally provided information, statements <strong>and</strong><br />
documents from the interview partners, were journalized during the interview. This documentation<br />
provides the basis for our detailed analysis. We therefore used the qualitative content analysis<br />
methodology of Mayring (2008). Additionally, the findings were qualitatively evaluated during two<br />
workshops with practitioners.<br />
3. Case study findings<br />
3.1 Status quo<br />
In order to identify the status quo of IT evaluation in business groups, we conducted a multiple case<br />
study described in the research methodology section above. The term “status quo” st<strong>and</strong>s for the<br />
current situation <strong>and</strong> approach to group IT evaluation within business groups. We present the status<br />
quo structured into three segments: strategy layer, process layer, <strong>and</strong> system layer (Österle, 2010).<br />
Table 2 categorizes the case study participants according to revenue <strong>and</strong> number of employees.<br />
Additionally, it provides an overview of where the IT evaluation responsibility on the group level is<br />
anchored within the organization.<br />
Strategy layer: We identified that neither a common underst<strong>and</strong>ing of IT evaluation in business groups<br />
nor a clear definition of responsibilities exists across all case study participants. As already explained,<br />
IT evaluation from a scientific perspective can be structured in three abstract tasks: monitoring,<br />
planning, <strong>and</strong> steering. All case study participants indicated that their group IT evaluation department<br />
carries out the monitoring task. However, utilization of controlling tasks varies from only monitoring,<br />
(via planning) to a holistic approach encompassing all three tasks.<br />
Table 2: Profile of corporations, corporate data is based on fiscal year 2009 ( achieved; − not<br />
achieved, CIO: Chief <strong>Information</strong> Officer, COO: Chief Operations Officer, CFO: Chief<br />
Financial Officer, bn = 10 9 )<br />
Company /<br />
Case<br />
Industry segment<br />
Revenue > EUR<br />
50bn<br />
Employees ><br />
100k<br />
Anchoring of group<br />
IT evaluation<br />
ALPHA Financial Group CIO<br />
BETA Financial n/a − Group CFO & Group COO<br />
CHI Communications Group CFO<br />
DELTA Communications − − Group CFO<br />
EPSILON Consumer cyclical Group CIO<br />
PHI Consumer cyclical − Group CFO<br />
GAMMA Utilities − Group CFO<br />
Process layer: We were confronted with several different organizational setups. The most<br />
straightforward setup is the anchoring of the group IT evaluation function within the group financial<br />
accounting department, specifically the group CFO area; however, variations are possible. Another<br />
frequently mentioned option is anchoring within the group IT department. This, however, has the bias<br />
that the department is controlling itself. A clear tendency towards an organizational anchoring of<br />
group IT evaluation departments or specifically the associated tasks <strong>and</strong> responsibilities below the<br />
group CFO is observable (refer to Table 2).<br />
The reporting of analyzed <strong>and</strong> aggregated IT facts <strong>and</strong> figures is one of the most common processes<br />
within the area of responsibility of group IT evaluation. It is used to support the monitoring task of IT<br />
evaluation, as mentioned above. The majority of case study participants report facts <strong>and</strong> figures on a<br />
quarterly <strong>and</strong> yearly basis. The quarterly reports tend to be less broad than the yearly reports. Only<br />
two corporations generate reports on a monthly basis. Additionally, the majority of case study<br />
participants focus mainly on IT costs in their reports. Furthermore, the measurement contributed<br />
177
Florian Hamel, Thomas Ph. Herz, Falk Uebernickel <strong>and</strong> Walter Brenner<br />
business value by IT is a secondary focus that is scarcely used among the participating business<br />
groups. In addition to costs <strong>and</strong> IT business value as evaluation objects IT projects for some case<br />
study participants are in scope. Evaluation of IT projects on the group level differs slightly from the IT<br />
project evaluation within the individual business entities. The business entity IT evaluation has all<br />
local IT projects in scope whereas on the group level, only group relevant IT projects are in scope. It<br />
is very possible for local IT projects to be relevant for the whole group. Common criteria of<br />
participants for group relevance are e.g. volume in terms of resources, regulatory or strategic<br />
relevance for the entire business group, or impact on more than one business entity.<br />
System layer: A wide spectrum of system approaches is observable in the field among case study<br />
participants. The system spectrum ranges from Microsoft Excel, to loose coupling of proprietary<br />
systems, to fully integrated enterprise systems. The pragmatic approach of <strong>using</strong> Microsoft Excel<br />
templates to aggregate the data from all group business entities is still observable. An integrated<br />
information systems solution, i.e. together with financial accounting, is utilized by the majority of case<br />
study participants, but in almost all cases only large business entities of the individual business<br />
groups are integrated. Therefore, it is obvious that these approaches bear a high risk of poor data<br />
reliability. We were often confronted with different data gathering processes within the same business<br />
group depending on the IT evaluation object.<br />
3.2 Case study findings: Challenges<br />
Another aim of this study is to identify challenges within the field of group IT evaluation. As described<br />
above, we discussed our interview findings in two evaluation workshops. The identified challenges<br />
were then ranked according to their importance consequently limiting the ranking list to five elements.<br />
In the following paragraphs we highlight <strong>and</strong> explain the five most important challenges for IT<br />
evaluation in a business group context:<br />
1. Ensuring availability of IT cost <strong>and</strong> performance figures<br />
2. Improving IT project portfolio management<br />
3. Enriching IT performance measurement<br />
4. Implementing IT evaluation st<strong>and</strong>ards <strong>and</strong> methodologies<br />
5. Bridging the gap between IT cost management <strong>and</strong> operational process cost management<br />
1. Ensuring availability of IT cost <strong>and</strong> performance figures: The group-wide availability of IT cost <strong>and</strong><br />
performance figures in business groups is one of the most substantial challenges. Most participants<br />
explained that IT departments in business entities report only a minimum amount of facts <strong>and</strong> show a<br />
low willingness to cooperate with the responsible core entity. This circumstance is mainly facilitated by<br />
the business group structure <strong>and</strong> inherited heterogeneous IT environments of each legal business<br />
entity. Yet, this is not only focused on IT costs to some extent it also encompasses other IT evaluation<br />
objects, i.e. the IT project portfolio, IT infrastructure <strong>and</strong> IT sourcing activities. For instance, drawing a<br />
holistic IT cost picture across the entire group was, for most case study participants, an almost<br />
insolvable challenge or only achievable by accepting many abstractions <strong>and</strong> compromises.<br />
2. Improving IT project portfolio management: Most case study participants are confronted with<br />
challenges regarding their group-wide IT project portfolio management. There are several<br />
methodologies for IT project portfolio management at h<strong>and</strong> (Morris <strong>and</strong> Pinto, 2007; Kerzner, 2010),<br />
but they are tailored to single business unit corporations <strong>and</strong> do not apply to business groups. The<br />
majority of case study participants indicated that it is challenging to establish group-wide transparency<br />
across all projects <strong>and</strong> to prioritize those projects that are of group relevance. Thereby, the need for<br />
transparency encompasses information about all ongoing IT projects including their characteristics<br />
like business case, strategic importance <strong>and</strong> current status. Furthermore, it is essential to differentiate<br />
between business entity projects <strong>and</strong> group projects. The latter kinds of projects have to be bundled if<br />
possible <strong>and</strong> prioritized on the group level. However, this approach implies strong central governance<br />
<strong>and</strong> inherits extensive administrative efforts. Furthermore, local business dem<strong>and</strong>s may not be<br />
recognized properly within the centralized project portfolio management. This raises the challenge of<br />
how the prioritization methodology should be structured.<br />
178
Florian Hamel, Thomas Ph. Herz, Falk Uebernickel <strong>and</strong> Walter Brenner<br />
3. Enriching IT performance measurement: Performance measurement is one of the essential parts of<br />
group IT evaluation. Most of the case study participants indicated that they generally only measure IT<br />
costs on the group level. Measurement of costs however, covers only the IT efficiency perspective. In<br />
general terms they measure: “Are we doing the things in the right way?” Going a step further, they do<br />
not measure their IT effectiveness on the group level, which would provide information about the<br />
impact on business process costs, specifically, value creation. In general terms this means: “Are we<br />
doing the right things?” All case study participants confirm that their performance measurement<br />
methodology, which is in place on the group level, is not sufficient. Furthermore, a significant part of<br />
the case study participants indicated that reporting is only conducted on a yearly basis. This leads to<br />
the fact that the IT cost report across the entire group is frequently issued at least four to eight months<br />
after the last IT investments of the previous fiscal year were carried out. Due to this late reporting in<br />
some participants’ organizations, IT executives have to make IT investment <strong>and</strong> budget decisions for<br />
the next fiscal year before they have read the last year’s IT cost report.<br />
4. Implementing IT evaluation st<strong>and</strong>ards <strong>and</strong> methodologies: Establishing <strong>and</strong> maintaining group-wide<br />
IT evaluation st<strong>and</strong>ards <strong>and</strong> methodologies is a key success factor (Barton, 2003). It enables<br />
comparability between the business entities with regards to their IT evaluation objects. Case study<br />
participants indicated multiple times that a group-wide st<strong>and</strong>ardized business case approach,<br />
including st<strong>and</strong>ardized metrics, is neither in-place nor does a process to follow up on business case<br />
results after a particular implementation exist. Furthermore, case study participants seek stable<br />
definitions of IT evaluation terms, e.g. IT cost definitions or an underlying chart of accounts. This is<br />
important in order to enable cross-year <strong>and</strong> cross-entity analysis of IT costs. In addition, case study<br />
participants criticize the lack of compatibility of management accounting systems <strong>and</strong> dem<strong>and</strong><br />
st<strong>and</strong>ardized interfaces to consolidate the IT cost <strong>and</strong> performance figures group-wide. Ideally,<br />
information is provided by a group-wide <strong>Management</strong> <strong>Information</strong> System (MIS).<br />
5. Bridging the gap between IT cost management <strong>and</strong> operational process cost management: All case<br />
study participants agreed on the need to establish a link between IT costs <strong>and</strong> operational process<br />
costs. However, only a few indicated that they are currently able to do so. One example would be the<br />
mapping of IT costs on applications or individual business process steps. Therefore, a holistic (IT)<br />
cost management approach is required. This means not only foc<strong>using</strong> on IT costs but also<br />
considering the total costs of a business process, since even a company with an IT cost disadvantage<br />
could at the same time have a total cost advantage. This approach, if consistently established across<br />
a federal organization based on group-wide generic business processes, would allow for internal<br />
cross-entity <strong>and</strong> external benchmark initiatives.<br />
3.3 Discussion<br />
The multiple case studies delivered promising findings <strong>and</strong> allowed us to derive our preliminary<br />
results. The organizational anchoring of group IT evaluation in business groups differs. The task<br />
definition itself differs from case to case slightly, but primary undertakings all overlap. Moreover, the<br />
group IT evaluation aims are similar to the aims of established IT evaluation approaches.<br />
Furthermore, the generic management accounting processes (planning, monitoring, <strong>and</strong> steering) are<br />
covered in both domains as well as the evaluation objects to some extent.<br />
The group IT evaluation embodiment is heavily influenced by the group IT governance. Therefore we<br />
came to the conclusion, the weaker the governance, the weaker the operative focus of group IT<br />
evaluation. Therefore, group IT evaluation generally has a strong strategic orientation. The findings<br />
showed that IT evaluation focuses much more on financial aspects (e.g. costs) than on technological<br />
facts (e.g. service levels). Therefore, similarities with legal-entity controlling are observable.<br />
Evaluation of the identified challenges from a holistic perspective shows that established instruments<br />
(e.g. IT project portfolio evaluation) are not able to be used within the group environment until<br />
fundamental adjustments are applied. Furthermore, the complex group environment impedes<br />
transparency <strong>and</strong> comparability of business entity IT cost <strong>and</strong> performance figures. The identified<br />
challenges lead us to the conclusion that either established IT management frameworks are not<br />
capable of meeting the requirements of group IT evaluation or a stringent group IT governance is not<br />
in place.<br />
We propose that the ideal implementation of a group IT evaluation methodology in business groups<br />
should be an arrangement of central <strong>and</strong> decentralized IT evaluation entities. Therefore, decentralized<br />
IT evaluation departments are responsible for local planning, steering <strong>and</strong> monitoring of IT resources<br />
179
Florian Hamel, Thomas Ph. Herz, Falk Uebernickel <strong>and</strong> Walter Brenner<br />
<strong>and</strong> for providing st<strong>and</strong>ardized IT figures to the central or respective group IT evaluation. The group IT<br />
evaluation entity is responsible for supporting the alignment process between group business strategy<br />
<strong>and</strong> IT strategy. Furthermore, it is in charge of ensuring a group-wide efficient <strong>and</strong> effective usage of<br />
IT.<br />
4. Conclusion <strong>and</strong> outlook for further research<br />
<strong>Management</strong> of IT costs <strong>and</strong> performance is a central mean for strategic IT management, especially<br />
in business group environments. Our study specifically tries to address the important issue of the<br />
existing status quo of group IT evaluation [RQ.1] <strong>and</strong> expose some of the relevant challenges for this<br />
discipline [RQ.2].<br />
An explorative, multiple case study analysis based on interviews with seven multinational business<br />
groups, contributed new findings to the research topic. We discovered various task definitions <strong>and</strong><br />
approaches as well as organizational setups. It was revealed that that all participants face similar<br />
challenges in the area of group IT evaluation the most important of which include: ensuring groupwide<br />
availability of IT cost <strong>and</strong> performance figures; improving group-wide IT project portfolio<br />
management; enriching group-wide performance measurement; implementing group-wide IT<br />
evaluation st<strong>and</strong>ards <strong>and</strong> methodologies; <strong>and</strong> bridging the gap between IT cost management <strong>and</strong><br />
operational process cost management.<br />
Based on our findings, future research should focus on answering two key questions: “Are the<br />
identified challenges in a business group context addressed by established IT evaluation<br />
frameworks?” <strong>and</strong> “Is an essential group IT evaluation framework required?”<br />
One possible limitation of our study might be the case selection. Generalizability of the results could<br />
be improved by examining more cases <strong>and</strong> evaluation iterations. Among all case study participants,<br />
Company ALPHA plays a special role because we had access to significantly more documents <strong>and</strong><br />
information. This fact may have influenced our findings. However, we were aware of this circumstance<br />
<strong>and</strong> tried to judge each case study participant equally.<br />
References<br />
Albach, H., Brockhoff, K., Eymann, E., Jungen, P., Steven, M. <strong>and</strong> Luhmer, A. (2000) Theory of the firm: Erich<br />
Gutenberg's foundations <strong>and</strong> further developments, Springer, Berlin.<br />
Barton, R. (2003) Global IT <strong>Management</strong>: A Practical Approach, John Wiley & Sons, Boston.<br />
Brynjolfsson, E. <strong>and</strong> Yang, S. (1996) "<strong>Information</strong> Technology <strong>and</strong> Productivity: A Review of the Literature",<br />
Advances in Computers, Vol. 43, No. 1, pp. 179-214.<br />
Buchta, D., Eul, M. <strong>and</strong> Schulte-Croonenberg, H. (2007) Strategic IT <strong>Management</strong> - Increase Value, Control<br />
Performance, Reduce Costs, Gabler, Wiesbaden.<br />
Diekmann, M. (2004) "Dezentrale Führung als überlegenes Prinzip", Harvard Business manager, Vol. 26, No. 1,<br />
pp. 112-117.<br />
Eisenhardt, K. M. (1989) "Building Theories from Case-Study Research", Academy of <strong>Management</strong> Review, Vol.<br />
14, No. 4, pp. 532-550.<br />
Eisenhardt, K. M. <strong>and</strong> Graebner, M. E. (2007) "Theory building from cases: Opportunities <strong>and</strong> challenges",<br />
Academy of <strong>Management</strong> Journal, Vol. 50, No. 1, pp. 25-32.<br />
Frisk, E. (2007) Categorization <strong>and</strong> Overview of IT Evaluation Perspectives: A Literature Review, European<br />
Conference on <strong>Information</strong> <strong>Management</strong> <strong>and</strong> Evaluation 2007, Montpellier, France.<br />
Garrison, R. H., Noreen, E. W. <strong>and</strong> Brewer, P. C. (2009) Managerial Accounting, McGraw-Hill, Irwin.<br />
Gell, J., Jostarndt, P., Kengelbach, J. <strong>and</strong> Ross, A. (2010) Accelerating Out of the Great Recession: Seize the<br />
Opportunities in M&A, The Boston Consulting Group, Boston.<br />
Goold, M. <strong>and</strong> Campbell, A. (1989) Strategies <strong>and</strong> styles: the role of the centre in managing diversified<br />
corporations, Blackwell, Oxford.<br />
Granovetter, M. (1995) "Coase Revisited: Business Groups in the Modern Economy", Industrial <strong>and</strong> Corporate<br />
Change, Vol. 4, No. 1, pp. 93-130.<br />
Granovetter, M. (2005) Business Groups <strong>and</strong> Social Organizations, In The H<strong>and</strong>book of Economic Sociology<br />
(Eds, Smelser, N. J. <strong>and</strong> Swedberg, R.) Princeton University Press, New York.<br />
Gunasekaran, A., Ngai, E. <strong>and</strong> McGaughey, R. (2006) "<strong>Information</strong> technology <strong>and</strong> systems justification: A<br />
review for research <strong>and</strong> applications", European Journal of Operational Research, Vol. 173, No. 3, pp. 957-<br />
983.<br />
Hamel, F., Herz, T. P., Uebernickel, F. <strong>and</strong> Brenner, W. (2010) State of the Art: Managing Costs <strong>and</strong><br />
Performance of <strong>Information</strong> Technology, Americas Conference on Infomation Systems 2010, Lima, Peru.<br />
Horváth, P. (2009) Controlling, Vahlen, München.<br />
Horváth, P. <strong>and</strong> Reichmann, T. (2003) Vahlens Grosses Controlling Lexikon, Vahlen, München.<br />
180
Florian Hamel, Thomas Ph. Herz, Falk Uebernickel <strong>and</strong> Walter Brenner<br />
Horváth, P. <strong>and</strong> Rieg, R. (2001) "Grundlagen des strategischen IT-Controllings", HMD - Praxis der<br />
Wirtschaftsinformatik, Vol. 38, No. 217, pp. 9-17.<br />
Irani, Z. <strong>and</strong> Love, P. (2008) Evaluating information systems: public <strong>and</strong> private sector, Butterworth-Heinemann,<br />
Oxford.<br />
Ives, B. <strong>and</strong> Jarvenpaa, S. L. (1991) "Applications of Global <strong>Information</strong> Technology - Key Issues for<br />
<strong>Management</strong>", MIS Quarterly, Vol. 15, No. 1, pp. 33-49.<br />
Kerzner, H. (2010) Project <strong>Management</strong>: Best Practices: Achieving Global Excellence, John Wiley & Sons,<br />
Hoboken.<br />
Kohli, R. <strong>and</strong> Grover, V. (2008) "Business value of IT: An essay on exp<strong>and</strong>ing research directions to keep up with<br />
the times", Journal of the Association for <strong>Information</strong> Systems, Vol. 9, No. 1, pp. 23-39.<br />
Krcmar, H. (2009) <strong>Information</strong>smanagement, Springer, Berlin.<br />
Mayring, P. (2008) Qualitative Inhaltsanalyse: Grundlagen und Techniken, Beltz, Weinheim.<br />
McAfee, A. <strong>and</strong> Brynjolfsson, E. (2008) "Investing in the IT that makes a competitive difference", Harvard<br />
Business Review, Vol. 86, No. 7/8, pp. 98-107.<br />
Minton, S. <strong>and</strong> Shirer, M. (2010) "Worldwide IT Spending to Grow 3% in 2010, According to IDC's Worldwide<br />
Black Book", [online], International Data Cooperation (IDC),<br />
http://www.idc.com/about/viewpressrelease.jsp?containerId=prUS22192510§ionId=null&elementId=null<br />
&pageType=SYNOPSIS.<br />
Morris, P. <strong>and</strong> Pinto, J. K. (2007) The Wiley guide to project, program & portfolio management, John Wiley &<br />
Sons, Hoboken.<br />
Österle, H. (2010) Business in the <strong>Information</strong> Age: Heading for New Processes, Springer, Wiesbaden.<br />
Penrose, E. T. (2009) The Theory of the Growth of the Firm, Oxford University Press, Oxford.<br />
Remenyi, D., Bannister, F. <strong>and</strong> Money, A. (2007) The Effective Measurement <strong>and</strong> <strong>Management</strong> of ICT Costs <strong>and</strong><br />
Benefits, Elsevier, Oxford.<br />
Rom, A. <strong>and</strong> Rohde, C. (2007) "<strong>Management</strong> accounting <strong>and</strong> integrated information systems: A literature review",<br />
International Journal of Accounting <strong>Information</strong> Systems, Vol. 8, No. 1, pp. 40-68.<br />
Sahaym, A., Steensma, H. K. <strong>and</strong> Schilling, M. A. (2007) "The influence of information technology on the use of<br />
loosely coupled organizational forms: An industry-level analysis", Organization Science, Vol. 18, No. 5, pp.<br />
865-880.<br />
Schauer, H. (2006) "Vergleichende Buchbesprechung IT-Controlling", Wirtschaftsinformatik, Vol. 48, No. 3, pp.<br />
212-218.<br />
Schwertsik, A., Wolf, P. <strong>and</strong> Krcmar, H. (2009) IT-Controlling in Federal Organizations, European Conference on<br />
<strong>Information</strong> Systems 2009, Verona, Italy.<br />
Smangs, M. (2006) "The nature of the business group: A social network perspective", Organization, Vol. 13, No.<br />
6, pp. 889-909.<br />
Tanriverdi, H. (2006) "Performance effects of information technology synergies in multibusiness firms", MIS<br />
Quarterly, Vol. 30, No. 1, pp. 57-77.<br />
Van Grembergen, W. (2001) <strong>Information</strong> technology evaluation methods <strong>and</strong> management, Idea Group<br />
Publishing, Hershey.<br />
Walter, G. A. <strong>and</strong> Barney, J. B. (1990) "Research Notes <strong>and</strong> Communications <strong>Management</strong>-Objectives in<br />
Mergers <strong>and</strong> Acquisitions", Strategic <strong>Management</strong> Journal, Vol. 11, No. 1, pp. 79-86.<br />
Wheelen, T. L. <strong>and</strong> Hunger, H. (2009) Strategic <strong>Management</strong> <strong>and</strong> Business Policy: Achieving Sustainability,<br />
Prentice Hall, Upper Saddle River.<br />
Yin, R. K. (2009) Case Study Research: Design <strong>and</strong> Methods, Sage Publications, Thous<strong>and</strong> Oaks.<br />
181
Distributed Working Pictures<br />
Martin Hill, John Salt <strong>and</strong> Graham Fletcher<br />
Cranfield University, Shrivenham, UK<br />
m.hill@cranfield.ac.uk<br />
jdsalt@gotadsl.co.uk<br />
g.fletcher@cranfield.ac.uk<br />
Abstract: Small co-located teams can share ‘Common Operating Pictures’ to enable high levels of cooperation<br />
<strong>and</strong> backup amongst the team members. However, when teams are large or distributed across poor<br />
communications networks, sharing operating pictures with all members of the team can consume so much<br />
communication resource <strong>and</strong> individual attention that it reduces the team’s effectiveness in accomplishing its<br />
task. This paper introduces the costs <strong>and</strong> benefits of distributing picture components, <strong>and</strong> ways of encouraging<br />
the communications to be appropriate <strong>and</strong> useful: to build sufficiently good common pictures amongst suitable<br />
team members for them to function. It follows that a ‘single picture of the truth’ is rarely desirable even when<br />
technically possible, <strong>and</strong> this paper shows why that is so. Building suitably distributed, shared <strong>and</strong> incomplete<br />
pictures requires sophisticated evaluation <strong>and</strong> management of information - information that may be real world<br />
observations or assessments of them. Underst<strong>and</strong>ing how such information needs are expressed <strong>and</strong> fulfilled in<br />
distributed teams should transfer across several information management <strong>and</strong> information exploitation<br />
disciplines.<br />
Keywords: distributed cognition, situation awareness, tactical pictures, single picture of the truth, common<br />
pictures, local operations pictures<br />
1. Introduction<br />
Coordinating large teams to carry out complicated tasks requires sharing underst<strong>and</strong>ing of the<br />
situation, but trying to tell everyone involved everything about the task is not always desirable, even<br />
when it is possible. Indeed, trying to tell everyone everything everywhere is obviously impossible,<br />
whether desirable or not.<br />
So to improve the performance of extended collaborating teams, we need to underst<strong>and</strong> where the<br />
edges of interested groups, physical constraints <strong>and</strong> suitable subjects interact to find out what needs<br />
to be shared with whom (‘just enough’) <strong>and</strong> what structures <strong>and</strong> languages can reduce cognitive <strong>and</strong><br />
communication loads while maintaining good coordination. The trade-offs between <strong>and</strong> alignments of<br />
good coordination, cognitive loads, distraction, informed decision making, resilience, framing, comfort,<br />
short-term success, long-term persistence, <strong>and</strong> so on are not straightforward. There are likely to be<br />
many local Goldilocks states (‘not too cold, not too hot; just right’) across multi-dimension trade-off<br />
surfaces. Acceptable trade-offs depend highly on the working environment, team <strong>and</strong> task.<br />
This paper argues that this evaluation is necessary (that attempting, for example, to share a ‘single<br />
picture of the truth’ is usually undesirable) <strong>and</strong> suggests a framework for that evaluation. It starts in<br />
section 2 by describing some working environments in order to give the reader some examples of<br />
what drives the information systems. In section 3 it introduces fairly well established models of shared<br />
team awareness of those environments. Section 4 goes on to list costs <strong>and</strong> benefits of sharing<br />
information, section 5 uses these to show that there are ‘natural’ extents of any particular working<br />
picture, <strong>and</strong> section 6 suggests ways of pushing these extents further out.<br />
2. Example working environments<br />
The work that produced this paper uses three case studies to represent a broad range of distributed<br />
collaboration environments: expert engineering collaborations, academic ‘scrum’ research, <strong>and</strong><br />
military ground operations.<br />
Military operations are a usefully ‘extreme’ working environment to study: communications are poor,<br />
intermittent <strong>and</strong> fragile, time constraints are hard <strong>and</strong> tight, outcome stakes are high, stress <strong>and</strong><br />
emotions are strong, consequences are ethically fraught, evidence is sparse, unreliable [Hill 2010]<br />
<strong>and</strong> drowned in clutter, knowledge sets are complex, <strong>and</strong> supporting systems are stripped-down yet<br />
mission- <strong>and</strong> safety-critical. This extreme environment helps to expose issues that can be significant<br />
in office environments but are masked by other effects.<br />
182
Martin Hill, John Salt <strong>and</strong> Graham Fletcher<br />
Unlike some other operations that are somewhat similar – such as fire-fighting – military operations<br />
have opponent teams. Teams that compete <strong>and</strong> conflict with other teams not only collaborate <strong>and</strong><br />
cooperate within <strong>and</strong> between themselves, but attempt to do so better (in some way) than their<br />
opponents: they will attempt to ‘get inside the opponent’s decision cycles’, to disrupt the opponent’s<br />
awareness of the situation, <strong>and</strong> to protect against opponent attempts to disrupt their own. There may<br />
also be some merit in attempting to persuade opponents to compete instead of conflict, <strong>and</strong> to<br />
collaborate rather than compete.<br />
To reduce space, we focus in this paper on military examples that are readily differentiated from each<br />
other, can be represented by reasonably simple information models, <strong>and</strong> importantly are widely<br />
recognised due to the long-st<strong>and</strong>ing popularity of war films, newspaper articles <strong>and</strong> books.<br />
2.1 In the field (or building...)<br />
Soldiers in the field must spend their time observing the environment around them, looking for cues<br />
<strong>and</strong> clues for an enemy that is deliberately attempting to reduce them. The environment is often<br />
unfamiliar, the area not previously seen, <strong>and</strong> the detail heavily cluttered <strong>and</strong> three dimensional.<br />
To underst<strong>and</strong> this, consider for a moment your office or your house. Where are your immediate<br />
colleagues, or your neighbours? How would you describe the way to the bathroom, or where to find<br />
an item in the kitchen? Extend that to a small group of eight or so people strung out through adjacent<br />
rooms <strong>and</strong> consider where they are, how to get them, how to communicate with them, how to point<br />
out something specific outside the building. Directions <strong>and</strong> reference points depend heavily on<br />
obstacles, obvious common features, lines of sight, <strong>and</strong> the relative positions of the team members in<br />
the reference frames we mentally build to navigate, rather than a flat map.<br />
2.2 Tactical comm<strong>and</strong><br />
Mid-level comm<strong>and</strong>ers (who comm<strong>and</strong> from thirty to several hundred men) coordinate arrangements<br />
of people (actual <strong>and</strong> desired) <strong>and</strong> tend to model the situation as a ‘birds eye’ top-down view, like a<br />
map, analysed <strong>and</strong> interpreted as routes <strong>and</strong> barriers <strong>and</strong> fields of fire <strong>and</strong> areas of influence <strong>and</strong> so<br />
on. A civilian equivalent might be to use a satellite navigator in the car, or on foot.<br />
2.3 Logistics support<br />
Enabling the immediate task of destroying the enemy’s will to fight are the support services that<br />
provide the fighting comm<strong>and</strong> with the food, water, ammunition <strong>and</strong> other equipment required to carry<br />
out that task, <strong>and</strong> services such as casualty evacuation <strong>and</strong> medical care.<br />
This working environment is concerned with stuff: where it is, how much of it there is, what it is, how<br />
quickly it is consumed, what’s available to move it, <strong>and</strong> so on.<br />
2.4 Specialist<br />
Overlaid on the above ‘fighting’ comm<strong>and</strong> are various special interests. Signallers for example are<br />
responsible for maintaining the communication networks, <strong>and</strong> so have to share with each other their<br />
awareness of radio frequency overlaps, ranges, available equipment, encryptions, callsigns <strong>and</strong> so<br />
on.<br />
3. Underst<strong>and</strong>ing the environment<br />
The above section describes some of the different people who are attempting to collaborate with each<br />
other, both inside their groups <strong>and</strong> across them, <strong>and</strong> the environments they operate it. This section<br />
briefly describes models to represent how they underst<strong>and</strong> their environments <strong>and</strong> communicate them<br />
to each other.<br />
Considerable work is going into how we underst<strong>and</strong> the world around us [eg Endsley 1995] in order to<br />
inform our decision making [eg Klein 1999]. Our interest here is in the distribution of that<br />
underst<strong>and</strong>ing, recognised as currently insufficiently studied [eg Salmon 2010].<br />
For the purpose of this paper, we simplify this down into three components:<br />
An individual’s situation awareness. This is our underst<strong>and</strong>ing – a mental model - of what is going<br />
on in the real world. In practice this cannot be an objective model; it is necessarily a conceptual<br />
183
Martin Hill, John Salt <strong>and</strong> Graham Fletcher<br />
approximation <strong>and</strong> includes our limited underst<strong>and</strong>ing of how the world works, what we would like<br />
it to be, <strong>and</strong> actions that might bring that about [Endsley 1995]. It is built out of experience of the<br />
world (including training exercises), information conveyed directly from others (such as brief<br />
descriptions), <strong>and</strong> ‘pictures’ often aggregated from several sources.<br />
Communicated information. <strong>Information</strong> informs: it modifies in some way the worldview of the<br />
informed. It contributes to the individual’s situation awareness.<br />
A shared picture. This is an assembly of information that acts as a reference model of particular<br />
aspects of the world, such as a map overlaid with symbols showing the location of friendly <strong>and</strong><br />
enemy units, or a link diagram showing the relationships between personalities in the local area<br />
[eg Checkl<strong>and</strong> 1981, Stanton 2010]. It might be used to hold a reference for the operator alone –<br />
an externalised piece of situation awareness – but is commonly used to communicate situation<br />
awareness from one operator to another.<br />
The interpretation of the picture therefore is vital to common team awareness; it has to be assimilated<br />
quickly (to avoid losing tempo), easily (to avoid consuming attention or encourage mistakes) <strong>and</strong><br />
unambiguously (to avoid translating into the wrong SA). The interpretation need not persist in the<br />
mind if the external picture (such as a map) can be referred to easily <strong>and</strong> reliably.<br />
Similarly, <strong>and</strong> for similar reasons, it should be quick <strong>and</strong> easy to create <strong>and</strong> communicate, with<br />
suitable support (training, procedures <strong>and</strong> equipment) to make it easy <strong>and</strong> unambiguous. Ambiguity,<br />
where each party can interpret a different picture from the same communication, can have<br />
devastating effects on the military when for example applying lethal force against the wrong targets.<br />
4. Language, dialect <strong>and</strong> scripts<br />
The above section outlined very briefly some ways of modelling collaborative underst<strong>and</strong>ing, <strong>and</strong> here<br />
we consider the mechanisms by which we share that underst<strong>and</strong>ing.<br />
Conveying a particular picture, or part of one, can be by several mechanisms. For example a voiced<br />
phrase (“Enemy: right of road, third telegraph pole, at base”) might also be represented as a symbol<br />
on a map. The semantics of this voice description <strong>and</strong> symbol are the same <strong>and</strong> possibly use the<br />
same language construction (grammatical relationships of location, time, motion, capability, intent,<br />
interaction <strong>and</strong> so on), but represented by different scripts.<br />
The different forms of picture <strong>and</strong> information exchange depend on the type of working environment,<br />
<strong>and</strong> there are different instances of them depending on the task. For example, field troops typically<br />
use the form of specific voiced phrases to exchange enemy locations, while mid-level comm<strong>and</strong>ers<br />
use map symbols <strong>and</strong> coordinates.<br />
A particular enemy location – an instance – might be shared by both those field troops in contact with<br />
them, <strong>and</strong> their mid-level comm<strong>and</strong>ers. That is, an instance of a particular picture may be represented<br />
<strong>and</strong> passed by several forms of pictures.<br />
However the different forms necessarily constrain <strong>and</strong> enable the passing of information in different<br />
ways: for example maps with symbols can provide a fast visual snapshot, from which we can rapidly<br />
extract patterns. It is a suitable medium on which to collect <strong>and</strong> aggregate individual reports to show<br />
an overall picture.<br />
Similarly therefore, a form of a picture may represent <strong>and</strong> pass several instances of pictures.<br />
The picture may also be conveyed by dialogue, for example to confirm intelligent receipt<br />
(paraphrasing rather than a simple acknowledgement), or perhaps to develop underst<strong>and</strong>ing about<br />
what information is required <strong>and</strong> what is available. Typically information in counter insurgency<br />
operations is less straightforward than the ‘enemy location <strong>and</strong> capability’ information in fighting<br />
operations. The details themselves include more complex interactions (“Mr Ahmed is trading poppies<br />
for guns”) <strong>and</strong> have to carry labels about where it came from <strong>and</strong> how this affects the detail (“so says<br />
Mr Mohammad, who’s brother is Mr Ahmed’s rival in coffee farming”).<br />
The information or dialogue must be in a commonly understood specific language (so meaning is<br />
established accurately <strong>and</strong> unambiguously), concise (to reduce the load on the mechanism of<br />
184
Martin Hill, John Salt <strong>and</strong> Graham Fletcher<br />
conveying), related to the environment (so conveyed information relates to the right situation) <strong>and</strong><br />
timely (so that it’s not too late to use).<br />
Typically the languages <strong>and</strong> dialects are developed through training, realistic exercises <strong>and</strong><br />
experience, <strong>and</strong> so evolve appropriately. Rearranging organisations or re-tasking may require<br />
redeveloping the languages used to share awareness during task execution.<br />
The relationship between meaning, shared language, grammars, symbologies, intent <strong>and</strong> information<br />
in this environment could benefit from further exploration. There may be scope for a universal (or at<br />
least widespread) battle language, expressed in different forms depending on the task, environment<br />
<strong>and</strong> available communications technology.<br />
5. Sharing is not free<br />
While we might argue that shared knowledge across a team can – personality conflicts, goal<br />
incompatibility, judgement failure <strong>and</strong> so on aside – improve team effectiveness, ensuring that<br />
knowledge is in place <strong>and</strong> up to date is not free.<br />
5.1 Informing costs b<strong>and</strong>width<br />
When communication has used up all the available b<strong>and</strong>width, it stops or delays other<br />
communication. Anyone familiar with press-to-talk radios, or trying to send a mobile-phone text at new<br />
year, will be familiar with the problems of such overloads.<br />
Available b<strong>and</strong>width in military, police, emergency <strong>and</strong> similar working environments varies<br />
considerably. Radio communications are typically contended, low b<strong>and</strong>width, <strong>and</strong> intermittent, but<br />
when patrols come in to base they have access to rich information sets such as maps <strong>and</strong> direct<br />
dialogue with comm<strong>and</strong>ers <strong>and</strong> other patrollers. The detailed information exchanges <strong>and</strong> picture<br />
assembly are therefore done at base, with only relevant updates passed on by radio.<br />
5.2 Informing costs weight (or mobility)<br />
Remote communications requires communications equipment, <strong>and</strong> the longer, richer <strong>and</strong> farther the<br />
communication the more equipment is required. Batteries are a significant load on the foot soldier,<br />
<strong>and</strong> carrying more batteries means carrying less other equipment, or suffering performance<br />
degradation with consequent effects on mission capability. Ultimately, running out of power results in<br />
lost communications altogether.<br />
It is tempting therefore for comm<strong>and</strong> nodes to become static; deploy generators, fix antennas to make<br />
communications more reliable, set up offices to manage information more easily <strong>and</strong> comfortably, <strong>and</strong><br />
so on. Given the intent of forward armed forces might be summarised as “find, fix <strong>and</strong> finish”,<br />
succumbing to this temptation essentially self-finds <strong>and</strong> self-fixes the headquarters.<br />
5.3 Informing costs security<br />
Communication can be overheard. Voice <strong>and</strong> poorly encrypted tactical radio nets are noticeably<br />
vulnerable. Even if the content is not understood, the transmission itself can identify position <strong>and</strong><br />
sometimes unit <strong>and</strong> capability. Signals may be recorded <strong>and</strong> decoded ‘offline’ to reveal working<br />
practices <strong>and</strong> st<strong>and</strong>ard procedures. Radio silence is commonly applied to avoid such, thus blocking<br />
communication.<br />
In counter insurgency operations, where the threat from Improvised Explosive Devices (IEDs) is<br />
common, jammers are sometimes used to interfere with some device trigger mechanisms, <strong>and</strong> these<br />
in turn interfere with radios. Turning jammers off or moving out of range of them in order to<br />
communicate removes a layer of security.<br />
5.4 Informing, <strong>and</strong> being informed, costs attention<br />
It takes time to transmit any data, <strong>and</strong> this is time not spent doing. If that data informs – that is, it<br />
changes the informed’s world view – then it also takes time to assimilate. The more of it there is, the<br />
longer it takes to transmit, underst<strong>and</strong>, <strong>and</strong> adjust the world view.<br />
185
Martin Hill, John Salt <strong>and</strong> Graham Fletcher<br />
This can become a significant impact on the cognitive load of both the informer <strong>and</strong> the informed.<br />
While informing, neither are doing or planning [Kramer].<br />
5.5 Informing obscures: Clutter<br />
While informing can distract (see below) it also obscures. Verbal communications can prevent other<br />
verbal communications from being heard, radio messages block other radio operators from <strong>using</strong> the<br />
channel, <strong>and</strong> it is common for symbols on maps to become so cluttered that it becomes difficult to<br />
distinguish them from each other, <strong>and</strong> in particular to distinguish the important ones from the less<br />
important ones.<br />
5.6 Distraction by detail<br />
More information is not necessarily better information; when detail is made easily available it can<br />
become a distraction from harder to process but still vital information [Yes Minister 1980]. Similarly,<br />
easily measurable <strong>and</strong> available detail may not be useful detail [Adler 2008]. As UAVs became<br />
common in theatre so did the video that they were streaming back, <strong>and</strong> anecdotally this rich <strong>and</strong><br />
immediate ‘Kill TV’ tended to distract staff supporting comm<strong>and</strong> posts.<br />
5.7 Distraction from detail<br />
More information is still not necessarily better information; when too many information feeds are being<br />
h<strong>and</strong>led, it becomes necessary to ‘skim’ them in order to keep the situation awareness up to date,<br />
<strong>and</strong> so to be able to plan <strong>and</strong> respond more quickly <strong>and</strong> usefully than the enemy. Timeliness can<br />
therefore be at the expense of missing important details.<br />
5.8 Distributing cognition<br />
Adding suitable experts to the picture constructions can be a benefit by reducing the load on the<br />
comm<strong>and</strong>er, by interpreting <strong>and</strong> combining several picture feeds into fewer, larger-grained feeds.<br />
However this also adds an extra layer of separation between the comm<strong>and</strong>er <strong>and</strong> the source, <strong>and</strong> can<br />
lead to several extra ‘hops’ between distributed peers that disconnect pictures.<br />
6. Natural picture extents<br />
The trade-offs between the above costs <strong>and</strong> benefits of sharing information lead to some ‘obvious’<br />
markers that suggest the extent to which either form or instance of pictures apply across an<br />
organisation.<br />
For example, the different environments described in section 2 above suggest different forms due to<br />
the constraints: voice <strong>and</strong> relative position descriptions for frontline soldiers, <strong>and</strong> map symbols for<br />
mid-level comm<strong>and</strong>ers. Overlapping areas <strong>and</strong> boundaries between them become translation points,<br />
so junior comm<strong>and</strong>ers have to translate the situation around them into global reference frames for<br />
their comm<strong>and</strong>ers, <strong>and</strong> vice versa for their subordinates.<br />
Similarly, specialist tasks tend to evolve specific concise phrases <strong>and</strong> terms for activities within those<br />
tasks that are useless or misunderstood elsewhere. For example, the word ‘repeat’ is used in British<br />
Army radio communications with the very specific meaning of repeating the last artillery fire mission,<br />
<strong>and</strong> so should not be used to request the repetition of, say, a voice message.<br />
The aggregation <strong>and</strong> reduced detail of picture instance as it is conveyed is largely limited by the<br />
communications mechanisms at the lower operations levels. Training <strong>and</strong> experience provide<br />
expertise for small teams to trade distraction against the need to keep peers <strong>and</strong> comm<strong>and</strong>ers<br />
informed.<br />
Shared culture provides common bonding <strong>and</strong> frequently common references for communicating, <strong>and</strong><br />
vice versa [eg Kirke 2009, Kirke 2004]. This culture might come from the soldiers’ backgrounds, <strong>and</strong><br />
recruiting regiments from common geographic areas provides a somewhat similar starting point. As<br />
teams work together they tend to evolve their own culture which, along with the bonding that is vital to<br />
this line of work, promotes tight concise underst<strong>and</strong>ing within the team but makes more difficult to<br />
collaborate with unfamiliar teams. The British Army therefore imposes some of its own common<br />
culture by drill, <strong>and</strong> enforces cross-team culture by combined training, but on the other h<strong>and</strong><br />
186
Martin Hill, John Salt <strong>and</strong> Graham Fletcher<br />
encourages strong hierarchical competitive tribalism to support team cohesion under stressful<br />
circumstances.<br />
Some parts of pictures are deliberately not universally shared to maintain secrecy, such as the<br />
locations of special forces. However to ensure that they do not get fired upon when other troops are<br />
operating in their area, this location information must still be connect up with fire missions (or vice<br />
versa). Limiting the view of friendly locations however can be one contribution amongst many<br />
[Reason 2000] to fratricide, or ‘friendly fire’, as occurred in 1982 in the Falkl<strong>and</strong>s conflict when one<br />
special forces patrol attacked another.<br />
By contrast, some parts of pictures are deliberately shared further than immediately necessary, in<br />
case circumstances change <strong>and</strong> they must quickly contribute. All-informed nets allow comm<strong>and</strong>ers to<br />
eavesdrop on their peers, so that they can keep up with what is going on around them without having<br />
to have that information relayed via the headquarters (<strong>and</strong> so consume extra communication<br />
resources).<br />
Similarly, pictures are aggregated through chains of comm<strong>and</strong> so that comm<strong>and</strong>ers can underst<strong>and</strong><br />
the context <strong>and</strong> activities of particular events to inform their wider interactions <strong>and</strong> collaborations.<br />
7. Extending pictures<br />
The above 'natural' extents of forms <strong>and</strong> instances can sometimes be bridged or extended to reduce<br />
the translations between them.<br />
For example, technology can bypass the load on attention by automatically ‘reporting’ <strong>and</strong> translating<br />
certain information, such as the locations of friendly units <strong>using</strong> GPS. Automatic encryption, frequency<br />
hopping <strong>and</strong> queuing reduces the effort in communicating <strong>and</strong> improves reliability.<br />
This means that more detailed pictures can be built, <strong>and</strong> in turn we can expect increased load on<br />
attention. Technology can help here too, by providing displays that can be customised <strong>and</strong> filtered so<br />
that the viewer can focus (by removing clutter) on particular aspects of the picture.<br />
Automatic universal broadcast of some picture information however reduces the resilience of the<br />
information systems to attack. For example, if locations of all friendly units are ubiquitous across the<br />
organisation’s information systems, then a penetration anywhere in that system can expose the<br />
locations of all units.<br />
This must be balanced against the benefits of improved coordination at the ‘edges’ of the organisation<br />
where the hierarchical comm<strong>and</strong> structures can leave significant communication gaps between units<br />
close to each other on the ground. Neighbouring front-line units can be close to each other<br />
geographically but remote in both comm<strong>and</strong> <strong>and</strong> communication hops.<br />
Most pictures however only need to be partially ‘extended’, by aggregating <strong>and</strong> combining them into<br />
different pictures appropriate to the extended part of the organisation, or indeed beyond the<br />
organisation to collaborators. Some of these can be automatic, such as bundling up locations of<br />
individual units into one approximate location. Some are reasonably straightforward, such as <strong>using</strong><br />
liaison officers to act as ‘gateways’ between collaborating organisations with different cultural <strong>and</strong><br />
working practices. Some are more complex, such as planning <strong>and</strong> assembling intelligence, which<br />
tends to force staff to resort to slow <strong>and</strong> ambiguous natural language to convey these pictures.<br />
Research into supporting these complex picture distributions could improve their timeliness <strong>and</strong><br />
reduce their ambiguity.<br />
Defining the extent of a picture instance or form is not an exercise in isolation. It impacts on, <strong>and</strong> is<br />
impacted by, the tasks required, the structures of the organisation, the skills of the individuals,<br />
equipment available, <strong>and</strong> the operating environment. Changing the structure of parts of the<br />
organisation, for example by delegating mission responsibility to remote comm<strong>and</strong>ers, can radically<br />
affect the extents to which pictures need to be communicated.<br />
8. Conclusion<br />
In summary, pictures are used to support the shared situation awareness that is vital to good team<br />
coordination. Conveying a picture is not free however, <strong>and</strong> the consequences of blindly or<br />
187
Martin Hill, John Salt <strong>and</strong> Graham Fletcher<br />
automatically conveying detailed pictures are not always beneficial. In particular, attempting to build<br />
single universal pictures across large organisations can heavily distract individuals from their tasks,<br />
create vulnerabilities to exposure, increase the logistics load, reduce the agility of the organisation to<br />
locally adapt to changing picture needs, <strong>and</strong> offers little practical benefit.<br />
It can be tempting to assume that improving information technology will solve problems with<br />
information sharing; we hope we have shown that in some circumstances more communications<br />
technology does not only not improve situation awareness but can detract from it. By describing<br />
characteristics about information sharing, information managers <strong>and</strong> exploiters can make a more<br />
informed decision about the suitable extent <strong>and</strong> form to which that information should be shared <strong>and</strong><br />
aggregated.<br />
References<br />
Adler R, Ewing J, Taylor P (2008), Citation Statistics, Joint Committee on Quantitative Assessment of Research,<br />
http://www.mathunion.org/fileadmin/IMU/Report/CitationStatistics.pdf<br />
Endsley, M.R. (1995) Toward a theory of situation awareness, Human Factors 37<br />
Checkl<strong>and</strong> P (1981) Rich Pictures, Soft Systems Methodology<br />
Hill, M <strong>and</strong> Salt, J (2010) Life & Death Decisions <strong>using</strong> Sparse, Unreliable Evidence, ECIME 2010 proceedings,<br />
http://www.martinhill.me.uk/pubs/LifeAndDeathWithSparseUnreliable.pdf<br />
Kirke, Charles (2009) Group Cohesion, Culture <strong>and</strong> Practice Armed Forces & Society,<br />
http://afs.sagepub.com/content/35/4/745.abstract<br />
Kirke, Charles (2004) Organisational Culture - The Unexpected Force Journal of Battlefield Technology<br />
Kramer, J Cohesion <strong>and</strong> Disintegration: American Forces in Vietnam, Strategy & Tactics #25<br />
Klein, G (1999) Sources of Power: How people make decisions, MIT Press<br />
Reason J (2000) Human error: models <strong>and</strong> management BMJ<br />
Paul M. Salmon; Neville A. Stanton; Guy H. Walker; Daniel P. Jenkins; Laura Rafferty (2010) Is it really better to<br />
share? Distributed situation awareness <strong>and</strong> its implications for collaborative system design. Theoretical<br />
Issues in Ergonomics Science.<br />
Stanton, McIlroy (2010) Designing mission communication planning: the role of Rich Pictures <strong>and</strong> Cognitive Work<br />
Analysis. Theoretical Issues in Ergonomics Science<br />
Jay A, Lynn J et al (1980) Yes Minister, Series 1 Episode 6 “The Right to Know”. BBC Television.<br />
188
Transforming <strong>Information</strong> to <strong>Knowledge</strong> is the Current<br />
Platform for a Successful Political Campaign<br />
Vered Holzmann <strong>and</strong> Ben Holzmann<br />
Tel Aviv University, Tel-Aviv, Israel<br />
veredhz@post.tau.ac.il<br />
benami1@post.tau.ac.il<br />
Abstract: This paper utilizes the data management systems of a political campaign to present a process that<br />
transforms structured <strong>and</strong> unstructured information into knowledge <strong>and</strong> discusses the various aspects of such a<br />
process in the world of political campaigns. A political campaign is a unique type of project that runs normally for<br />
a period of several months. It peeks on Election Day, <strong>and</strong> at the end of the day the project is abruptly terminated<br />
<strong>and</strong> its success, or its failure, is officially published. The project is considered a success if the c<strong>and</strong>idate who is its<br />
sole customer has obtained the majority of the votes casted. An official database that contains basic information<br />
about the eligible voting electorate is issued to every contestant at the beginning of the campaign. This original<br />
database is enriched during the project with information related to the voters, volunteers, budgets, events <strong>and</strong><br />
analyses results thus providing the corner stone for the knowledge structure supporting most of the project’s<br />
managerial decisions. In the quest to underst<strong>and</strong> the nature of knowledge management <strong>and</strong> its roots we limited<br />
our research to the specific arena of political campaigns, where we investigated the impact of the quality of the<br />
original data on the desired knowledge management tools derived from the various data analyses. Another issue<br />
we confronted dealt with the procedures of learning associated with the production of political campaign related<br />
knowledge, where we adopted the concept that knowledge management is a continuous <strong>and</strong> dynamic process<br />
which analyzes archived data from debriefings of past events in order to better underst<strong>and</strong> current trends <strong>and</strong><br />
incidents for the purpose of supporting a constant improvement of managerial decision making habits (Neef,<br />
2005). We further maintain that the efficiency of the knowledge management contribution to the decision making<br />
procedures depends heavily on the accuracy of the original debriefing process of every single incident (Roth <strong>and</strong><br />
Kleiner, 1998). The paper focuses on the analysis of a specific type of project, <strong>using</strong> a detailed description of a<br />
case study to present the nature of its unique characteristics <strong>and</strong> associated various problems. We hope that our<br />
research may contribute a minute addition to the body of knowledge of the two disciplines: information<br />
management <strong>and</strong> project management, <strong>and</strong> might encourage managers of political campaigns to instigate event<br />
debriefings <strong>and</strong> develop effective learning procedures in order to create a knowledge structure that could be<br />
utilized in future campaigns.<br />
Keywords: knowledge management; political campaigns; clustering; learning;<br />
1. Introduction<br />
The notion that an election is the modern democratic method, by which the majority of the members of<br />
any community exercise their power to choose their governing representatives <strong>and</strong> secure their<br />
preferences, is a fairy tale. In reality an election is decided by those who actually bothered to go to<br />
their assigned polling locations <strong>and</strong> actually casted their vote. Normally only a part of the eligible<br />
voting body plays the game. Thus, the outcome of the election represents the preferences of the<br />
majority of merely one segment of the total population, the segment that actually voted. Hence, every<br />
political campaign is in essence a fast track project designed to achieve two objectives. The first<br />
objective is to convince as many eligible voters as possible, that the particular c<strong>and</strong>idate shares most<br />
of their views, <strong>and</strong> will best represent their preferences while in office. The second objective is to<br />
collect <strong>and</strong> maintain a dynamic database containing all the necessary information to mobilize the<br />
entire body of team members, during Election Day, to persuade every supporter to go to his pre<br />
assigned polling station <strong>and</strong> actually cast his vote for the c<strong>and</strong>idate.<br />
A political campaign is extremely complicated to manage due to its rigid schedule, unstable budget<br />
frame, but mostly because of the nature of its employees that are traditionally volunteers. Only a few<br />
professionals can be hired to participate in the project, due to widespread constrains imposed on the<br />
project’s financing system which depends mostly on donations that are controlled by particularly rigid<br />
laws. While these chosen ones are assigned to perform unique political <strong>and</strong> managerial tasks, the<br />
bulk of the legwork is carried out by the volunteers who depend on accurate detailed information<br />
identifying the individuals they must convince to perform their voting duty.<br />
Political campaigns are driven by three engines, the density of the related media, the determination of<br />
the project’s foot soldiers <strong>and</strong> the quality of the project’s information management system. Alas, this<br />
paper investigates only the issue of the information management aspects <strong>and</strong> their part in the<br />
knowledge structure that provides the managerial tools for the campaign management.<br />
189
Vered Holzmann <strong>and</strong> Ben Holzmann<br />
We start with an introduction to the arena of political campaigns followed by a description of a typical<br />
project of this type. Then, we present the nature of the raw data that is available at the beginning of a<br />
political campaign, the additional data <strong>and</strong> information that could <strong>and</strong> should be collected throughout<br />
the campaign. We discuss the importance of the knowledge base accumulated during past<br />
campaigns <strong>and</strong> suggest an array of procedures to enrich the knowledge structure. We conclude with<br />
a presentation of a case study of an actual political campaign for the post of mayor of a large Israeli<br />
city, <strong>and</strong> offer a few comments regarding the contribution of the current research to the academic <strong>and</strong><br />
professional communities.<br />
2. <strong>Management</strong> of a political campaign<br />
Democracy, as we all know, is a form of government that is based on an equal power given to all<br />
citizens. This ancient system was originally initiated in the middle of the 5th century BC in ancient<br />
Greece <strong>and</strong> as of the first decade of the 21st century it is the most common system of government. In<br />
a Democracy, a free electoral system is required to enable the people to exercise their power by<br />
voting for the c<strong>and</strong>idate that will best represent them. In current electoral systems the winner at the<br />
end of the Election Day is not necessarily the one that has the support of the majority of the total<br />
population but rather the one that has the majority of the voters who actually exercised their privilege<br />
to vote. The results of these elections do not represent either the majority or their preferences<br />
(Przeworski et al., 2003).<br />
Political elections involve several major players who undertake different roles. First, <strong>and</strong> most<br />
important, are the voters. They include the total population of individuals who are eligible to exercise<br />
their right to elect a c<strong>and</strong>idate by voting for him on Election Day. In second place we find the<br />
institutional election committees <strong>and</strong> boards representing the authorities responsible for defining <strong>and</strong><br />
enforcing the relevant rules <strong>and</strong> procedures. In third place are the c<strong>and</strong>idates, who may be two or<br />
more individuals who run for office, with or without a party affiliation. Then, there are the campaign<br />
teams. These groups of people include political dignitaries, campaign committee members, campaign<br />
managers, advertising experts, strategy consultants, treasurers, personal aides, <strong>and</strong> an array of other<br />
volunteers forming a conglomerate of professions <strong>and</strong> experiences, who are all driven by a common<br />
motivation to win the election (Riker, 1986; Schofield et al., 1998; Shaw, 2000).<br />
Every political campaign is a different project. A project is defined as “a temporary endeavor<br />
undertaken to create a unique product, service, or result” (PMI, 2008, p.5). Although it is well<br />
established that “one size does not fit all” (Shenhar, 2001), we believe that the type of projects<br />
common in the political arena carry distinctive attributes <strong>and</strong> require a special effort in order to<br />
achieve their single objective of winning the election. A campaign has the most rigid schedule<br />
possible, with no option for delays or deviations, it ends on Election Day, hence defining the start <strong>and</strong><br />
finish of the project by an official governing board announcement, forcing the campaign team to plan<br />
<strong>and</strong> execute all the required activities within that predefined timeframe. Yet, a political campaign is an<br />
extremely dynamic project that is subject to numerous changes due to the high level of uncertainty<br />
that characterizes any political environment. Budget management in a political campaign is based on<br />
the quality of the donation management, which means that the budget is accumulated step by step<br />
<strong>and</strong> the project managers must adjust the project’s activities to fit the availability of funds at any stage.<br />
The pressure compelled by the budget constrains is actually only an introduction to constrains<br />
imposed on the management by the nature of the working teams that are mostly composed of a mix<br />
of volunteers, a few professionals <strong>and</strong> temporary hired help. The volunteers are normally difficult to<br />
manage, but do not strain the budget, while the professional <strong>and</strong> temporary employees are more<br />
restrained but are very hard to come by <strong>and</strong> might be extremely expensive (Newman, 1994; Trent <strong>and</strong><br />
Friedenberg, 2008).<br />
During the campaign project, the volunteers <strong>and</strong> professionals are working together to identify<br />
supporters. Figure 1 represents the major groups that play in the political campaign arena. Among the<br />
total eligible voters there are two major groups: those who are not interested in the election <strong>and</strong> will<br />
not be actually involved in the campaign <strong>and</strong> those who support or tend to support one of the<br />
c<strong>and</strong>idates. The first order of business is to identify those voters who are interested in the election<br />
<strong>and</strong> plan to cast their vote. Then, they are contacted in order to confirm the identify them as<br />
supporters, opponents, or undecided. The voters who are not yet sure about their vote, i.e., the<br />
undecided, should be approached personally in order to influence their decision. On Election Day the<br />
actual voters participate in the democratic process.<br />
190
Vered Holzmann <strong>and</strong> Ben Holzmann<br />
Total Eligible Voters<br />
C<strong>and</strong>idate X<br />
Supporters<br />
Undecided<br />
Actual Voters<br />
Not Interested<br />
C<strong>and</strong>idate Y<br />
Supporters<br />
Figure 1: The political campaign arena<br />
3. Data <strong>and</strong> information management in a political campaign<br />
Davenport <strong>and</strong> Prusak (1998) defined knowledge as “a fluid mix of framed experience, values,<br />
contextual information, <strong>and</strong> expert insight that provides a framework for evaluating <strong>and</strong> incorporating<br />
new experiences <strong>and</strong> information” (p.5). The framework of a political campaign follows the<br />
development of the accumulated data, which normally include discrete objective facts, transferred into<br />
information that provides quantitative <strong>and</strong> qualitative measurements, further transformed into<br />
knowledge, which can be utilized in the process of making strategic <strong>and</strong> operational decisions<br />
(Spiegler, 2003). Throughout the campaign lifecycle, knowledge is generated in order to provide the<br />
required background for making managerial educated decisions. The process starts with a file<br />
containing basic data that is distributed to all the contenders. On this common ground every campaign<br />
builds its unique information system that contains archived documentation of past events, relevant<br />
accumulated knowledge <strong>and</strong> current information procedures that can be developed into management<br />
tools.<br />
This original database includes normally only the following items: voter ID, first <strong>and</strong> last name, current<br />
address, <strong>and</strong> phone number. Although some philosophers raise potential ethical issues regarding<br />
citizen privacy (e.g., Onselen <strong>and</strong> Errington, 2004) the database is distributed to all the contenders<br />
<strong>and</strong> is used by the parties to effectively identify <strong>and</strong> reach supporters. It provides the basis to enrich<br />
the official information with additional data such as mobile phone numbers <strong>and</strong> an e-mail address,<br />
used to create the preliminary connection with the voters <strong>and</strong> to initiate a relationship with them. The<br />
data relating to the volunteers who are probably one of the major assets of every campaign <strong>and</strong><br />
represent the core resource used to promote the agenda established by the c<strong>and</strong>idate (Shaw, 2000),<br />
is more detailed <strong>and</strong> usually contains the following items: (1) personal information including<br />
demographic status; (2) list of communication means such as phones, e-mails, <strong>and</strong> Internet social<br />
networks; (3) areas of interests, which might range from a hobby such as basketball team fans to<br />
social activity membership such as PTA (parent-teacher association), or an association to a<br />
professional network such as a specific law firm. This extensive volunteer related data joined by an<br />
intensive operational network are used to generate knowledge in the form of profiles defining<br />
homogeneous groups of friends or groups with common interests that can be approached utilizing<br />
related unique issues.<br />
The database of voters merged into the database of volunteers is used to further identify clusters of<br />
voters that share common attributes or concerns that can be motivated to support the c<strong>and</strong>idate<br />
based on issues that are not necessarily the major concerns advertized by the c<strong>and</strong>idate but are<br />
rather subjects important to the particular group leader, hence, the members vote for the c<strong>and</strong>idate as<br />
a curtsey to their leader. The target is to create small groups of voters that can be approached <strong>and</strong><br />
191
Vered Holzmann <strong>and</strong> Ben Holzmann<br />
solicited through various channels of communication stressing subjects of common interests, thus,<br />
encouraging the members of these homogeneous groups to effectively contribute to the campaign.<br />
A single volunteer is normally nominated to represent all the group members <strong>and</strong> function as their<br />
speaker, <strong>and</strong> taking the responsibility to moderate the group’s performance while providing the<br />
campaign management with reliable classifications pertaining to the member’s positions <strong>and</strong> opinions<br />
regarding the c<strong>and</strong>idate’s behavior.<br />
Every methodology used to identify these different groups of prospective supporters hinges on the<br />
ability of the campaign’s analysts to utilize the continuously accumulated knowledge in order to<br />
update the specifications defining the criteria for the clustering processes. Cluster analysis was<br />
defined by Jain et al. (1999) as “the organization of a collection of patterns (usually represented as a<br />
vector of measurements, or a point in a multidimensional space) into clusters based on similarity”.<br />
Clustering is an advanced statistical method used to represent relationships, based on measures of<br />
proximity between elements, expressed by maximum distances between groups <strong>and</strong> minimal<br />
distances within each group. It suggests an unsupervised classification <strong>and</strong> grouping of similar<br />
objects into subsets that are determined by the clustering process itself. Implementation of clustering<br />
in management sciences is common in numerous applications including studies related to computer<br />
science <strong>and</strong> web information management (e.g., Choi <strong>and</strong> Peng, 2004; Adami et al., 2005; Chen &<br />
Hsu, 2006), supplier clusters related to collaborative learning <strong>and</strong> risk management (Hallikas et al.,<br />
2005), marketing issues (e.g., Malhotra <strong>and</strong> Peterson, 2001; Tsai <strong>and</strong> Chiu, 2004), <strong>and</strong> others. Each<br />
of these cluster analyses requires a distinct determination of the clustering technique (i.e, choosing<br />
the most suitable algorithm such as single linkage (nearest neighbor), complete linkage (furthest<br />
neighbor), average (between groups) linkage, Ward’s method, or binary-positive approach) (Lorr,<br />
1983; Aldenderfer <strong>and</strong> Blashfield, 1984).<br />
We chose for the current study a clustering method characterized by the binary-positive approach,<br />
where the distance is defined by a positive attribute index based on the presence (1) or absence (0)<br />
of an attribute value for each case. The cluster dataset is a two dimensional matrix composed of<br />
cases on one axis <strong>and</strong> features on the other. The entries of the matrix are either ‘1’, if the case has<br />
the specific feature, or ‘0’, if the case lacks that feature. Based solely on the positive vector, two<br />
indexes are calculated: the Pair Similarity Index (PSI) that measures similarity between cases, <strong>and</strong><br />
the Group Similarity Index (GSI) that measures similarity within a group of cases (Gelbard <strong>and</strong><br />
Spiegler, 2000; Gelbard et al., 2007).<br />
In the research analysis of the political campaign, the entities for clustering were the individual eligible<br />
voters <strong>and</strong> the attributes were their various traits <strong>and</strong> characteristics including age, gender,<br />
neighborhood, profession, habits, etc, that qualified the clustering procedures. For each attribute we<br />
defined a set of possible values <strong>and</strong> every voter was either assigned to this sub-attribute or not. We<br />
started with the identification of clusters of voters based on geographic locations in order to create<br />
homogeneous groups of citizens that have similar local oriented interests. Other groups were<br />
clustered base on common demographics such as place of employment, similar professions, common<br />
religious preferences or an interest in sports. Another powerful method to identify homogenous<br />
groups of supporters is derived from analyzing historical voter behavioral trends which is part of the<br />
knowledge base that the information management professional bring to every campaign. The<br />
efficiency of the clustering that produces the profiles of the various groups depends heavily on the<br />
quality of the learning process that is responsible for building <strong>and</strong> updating the knowledge structure.<br />
There is a positive linear relationship between the effort assigned to the debriefing <strong>and</strong> archiving<br />
process of past occurrences <strong>and</strong> the value of their contribution to the development of a good<br />
mitigation plan to head off future similar events. Continuous learning is m<strong>and</strong>atory for constructing a<br />
solid process responsible for the transformation of information into knowledge, which in turn is further<br />
transformed into effective managerial tools. Voter segmentation is the basis of every successful<br />
political marketing campaign because the c<strong>and</strong>idate is not perceived equally by all voters (Newman,<br />
1994). Clustering <strong>and</strong> profiling voters into homogeneous groups enables the marketing professionals<br />
of the campaign to present a different aspect of the c<strong>and</strong>idate for the different groups of voters,<br />
hence, gaining a wider collection of supporters.<br />
The impact of poor quality data <strong>and</strong> a lack of a good structure of knowledge in any organization are<br />
manifested in increased cost, lower customer <strong>and</strong> employee satisfaction, <strong>and</strong> difficulties to set <strong>and</strong><br />
execute strategy (Redman, 1998). The impact of poor quality of data <strong>and</strong> a lack of a good structure of<br />
192
Vered Holzmann <strong>and</strong> Ben Holzmann<br />
knowledge in a political campaign that runs for only a few months is devastating since the campaign<br />
is a relatively short-term endeavor, where any sensitive wrong decision, made based on inaccurate<br />
information, can cause not only inefficient effort allocation, but may be directly responsible for a fatal<br />
error that might lead to a total failure.<br />
4. Case study: The campaign for mayor<br />
The following case study demonstrates the process of managing data, information <strong>and</strong> knowledge in<br />
a political campaign. The city is located ten miles south of Tel Aviv, which is the largest metropolis in<br />
Israel. It has 270,000 inhabitants eligible to vote in the mayoral race. An initial survey revealed that<br />
the city is extremely segregated <strong>and</strong> most of the old parts of the city that house people of middle to<br />
low income, do not support our c<strong>and</strong>idate. Based on a series of surveys, extensive archived data<br />
mining, <strong>and</strong> a thorough investigation of the available knowledge structure, we further understood that<br />
socio-demographic characteristics will dominate the preferences of the citizens’ decision making<br />
process. Thus, we planned a campaign that focused on a solid commitment to perform a drastic<br />
change in the taxation methodology introduced by the previous mayor. We had the advantage of<br />
attacking the performance of a mayor in office <strong>and</strong> could offer a management revolution, so we<br />
developed a strategy that initiated a desire for a revolution <strong>and</strong> fuelled the people’s expectations until<br />
Election Day. Our campaign management team consisted of an operations manager, an information<br />
manager, a manager in charge of the volunteers, a manager in charge of advertising <strong>and</strong> a political<br />
expert. We had a total of 60 working days, but we assumed a ten day loss, so we set all efficiency<br />
<strong>and</strong> effectiveness performance tests on a production of an average gain of new supports per day for<br />
the duration of the campaign. The number of supporters required was estimated based on the<br />
assumption that the percentage of voters that will actually come to vote will be similar to participation<br />
in previous elections, thus we estimated a turnaround of 150,000 voters, out of which we need 75,000<br />
on our side in order to win. But we further estimated that we cannot expect more than 70% of our<br />
supporters to actually show up <strong>and</strong> vote. Hence, we decided to set the goal of collection for at least<br />
110,000 supporters, or 2,200 new supporters per working day. We never gained 2,200 new voters<br />
during one single day, but the accumulative value did not deviate from the target by more than 3%<br />
throughout the campaign. Our methodology was based on creating social networks that contained<br />
groups of homogenous members with a common interest in an issue that received a direct publicized<br />
attention from our c<strong>and</strong>idate. Municipal social networks were based on preferences for an education<br />
system in elementary schools, resistance to road interchange construction, etc. The system promoted<br />
within the various groups expectations regarding their preferences <strong>and</strong> encouraged them to support<br />
the c<strong>and</strong>idate. Every network was initiated either by a volunteer or by a hired professional who<br />
enticed friends or colleagues to join the group on the basis of their mutual interest rather than a<br />
common believe in the c<strong>and</strong>idate. These friends <strong>and</strong> colleagues continued the process, through the<br />
initiation <strong>and</strong> assembly of sub-groups, until the group reached 150 members. The information team<br />
recorded <strong>and</strong> updated the data for each one of the members into a database <strong>and</strong> produced daily<br />
reports indicating the status of the various allocated measurements. When a group reached saturation<br />
it was assigned to a manager who was responsible to persuade <strong>and</strong> assist each one of the members<br />
to come <strong>and</strong> vote on Election Day. During that day we monitored the actual voting in each ballot-box<br />
<strong>and</strong> identified groups that did not meet the target numbers. In such cases we increased pressure on<br />
the group manager to bring sufficient number of supporters to vote. In cases where this was not<br />
applicable, we diverted the pressure towards group leaders that had already proved themselves as<br />
efficient agents <strong>and</strong> we asked them to take an extra effort to bring supporters to actually vote. The<br />
system worked <strong>and</strong> we won the election.<br />
5. Discussion <strong>and</strong> conclusions<br />
The political arena is new to the information management body of knowledge <strong>and</strong> suffers from a gap<br />
in related literature (Rohrschneider, 2002). Hence, it offers a substantial variety of research <strong>and</strong><br />
implementation opportunities for information management professionals. The political campaign is a<br />
project of a very unique nature: it is short <strong>and</strong> aggressive, mainly based on volunteers, <strong>and</strong> it requires<br />
intensive professional work in order to succeed. Thus, it represents an array of interesting job<br />
opportunities in the various fields of management in general <strong>and</strong> in the field of information<br />
management in particular <strong>and</strong> provides adequate data for academic research.<br />
Throughout our research we found very little academic literature <strong>and</strong> encountered a rather serious<br />
lack of empirical procedures or investigating tools to guide managers participating in most aspects of<br />
communication within the political arena. We found literature discussing the issues of data mining <strong>and</strong><br />
classifications as a catalysis agent in advancement of customer relationship analyses methods (e.g.,<br />
193
Vered Holzmann <strong>and</strong> Ben Holzmann<br />
Shaw et al., 2001), normally related to marketing campaigns. We claim that these concepts <strong>and</strong><br />
procedures hold true, in many aspects, in political campaigns. The attributes <strong>and</strong> preferences of<br />
eligible voters regarding a c<strong>and</strong>idate can be analyzed in a similar way to customer behavior regarding<br />
a specific product. Although the current study might not be very well supported by literature in the field<br />
of knowledge management in political projects, it enjoys the aroma of success, as described in the<br />
paper.<br />
Another important issue that we encountered during our research, but remained outside the scope of<br />
this research, is the impact of the new media on the planning <strong>and</strong> executing of a political campaign.<br />
We incorporated the usage of a dedicated website <strong>and</strong> a sophisticated employment of the major<br />
social networks, but lacked the methodology required to effectively communicate with potential voters<br />
(customers) <strong>and</strong> motivate or even entice them to respond ardently to our massages. Related literature<br />
points out that the introduction of the Internet into the political campaign communication systems<br />
(Trent <strong>and</strong> Friedenberg, 2008) set new affecting variables that campaign managers should take into<br />
account. These studies advise that the impact of various Internet tools including websites <strong>and</strong> social<br />
networks on the quality of the campaign databases might change the current common avenues of<br />
communicating massages (Williams <strong>and</strong> Gulati, 2006). We cannot confirm these allegations, but we<br />
can testify that we allocated about a third of our resources, of the described campaign funds <strong>and</strong><br />
manpower, to communication with the younger prospective voters via the new media. Although we<br />
gained their support, we have no tools to measure the effectiveness or the efficiency of the process<br />
<strong>and</strong> we lack the means to analyze our choice of ingredients or their allocation throughout the<br />
campaign. There is no doubt that a significant change is in the works, <strong>and</strong> the Internet is becoming<br />
the best <strong>and</strong> least expensive platform to communicate with the prospective voters, thus altering the<br />
current procedures of building the campaign database <strong>and</strong> its related knowledge structure, but most<br />
of the details are yet to be investigated. Nevertheless we believe that further research might be<br />
extremely advantages to the information management professional community.<br />
References<br />
Adami, G., Avesani, P., <strong>and</strong> Sona, D., (2005) “Clustering Documents into a Web Directory for Bootstrapping<br />
Supervised Classification”, Data & <strong>Knowledge</strong> Engineering, Vol.54, Iss.1, pp.301-325.<br />
Aldenderfer, M.S., <strong>and</strong> Blashfield, R.K., (1984) Cluster analysis (Series: Quantitative Applications in the Social<br />
Sciences), Sage, Beverly Hills, CA.<br />
Bannon, D.P., (2004) “Marketing Segmentation <strong>and</strong> Political Marketing”, PSA (Political Science Association)<br />
Annual Conference, 5-8 April 2004, UK.<br />
Chen, T.S., <strong>and</strong> Hsu, S.C., (2006) “Mining Frequent Tree-like Patterns in large Datasets”, Data & <strong>Knowledge</strong><br />
Engineering, Vol.62, Iss.1, pp.65-83.<br />
Choi, B., <strong>and</strong> Peng, X., (2004) “Dynamic <strong>and</strong> Hierarchical Classification of Web Pages”, Online <strong>Information</strong><br />
Review, Vol.28, No.2, pp.139-147.<br />
Davenport, T.H., <strong>and</strong> Prusak, L. (1998) Working <strong>Knowledge</strong>. How Organizations Manage What They Know,<br />
Harvard Business School Press Boston, Mass.<br />
Gelbard, R., <strong>and</strong> Spiegler, I., (2000) “Hempel’s Raven Paradox: A Positive Approach to Cluster Analysis”,<br />
Computer <strong>and</strong> Operations Research, Vol.27, Iss.4, pp.305-320.<br />
Gelbard, R., Goldman, O., <strong>and</strong> Spiegler, I., (2007) “Investigating Diversity of Clustering Methods: An Empirical<br />
Comparison”, Data & <strong>Knowledge</strong> Engineering, Vol.63, Iss.1, pp.155-166<br />
Hallikas, J., Puumalainen, K., Vaeserinen, T., <strong>and</strong> Virolainen, V.M., (2005) “Risk Based Classification of Supplier<br />
Relationships”, Journal of Purchasing & Supply <strong>Management</strong>, Vol.11, No.2-3, pp.72-82<br />
Jain, A.K., Murty, M.N., <strong>and</strong> Flynn, P.J., (1999) “Data Clustering: A Review”, ACM Computing Surveys, Vol.31,<br />
No.3, pp.264-323.<br />
Kerzner, H., (2006) Project <strong>Management</strong>: A System Approach to Planning, Scheduling, <strong>and</strong> Controlling, 9th ed.,<br />
John Wiley & Sons, Hoboken, New Jersey.<br />
Lorr, M., (1983) Cluster Analysis for Social Scientists, Jossey-Bass Publishers, San Francisco, CA.<br />
Malhotra, N.K., <strong>and</strong> Peterson, M., (2001) “Marketing Research in the New Millennium: Emerging Issues <strong>and</strong><br />
Trends”, Marketing Intelligence & Planning, Vol.19, No.4, pp.216-235<br />
Mcclurg, S.D., (2011) “Social Networks <strong>and</strong> Political Participation: The Role of Social Interaction in Explaining<br />
Political Participation”, Political Research Quarterly, Vol.56, No.4, pp.449-464.<br />
Neef, D., (2005) “Managing Corporate Risk through Better <strong>Knowledge</strong> <strong>Management</strong>”, The Learning Organization,<br />
12(2): 112-124.<br />
Newman, B.I., (1994) The Marketing of the President. Political Marketing as a Campaign Strategy, Sage<br />
Publication, London, UK.<br />
Onselen, P., <strong>and</strong> Errington, W., (2004) “Electoral Databases: Big Brother or Democracy Unbound?”, Australian<br />
Journal of Political Science, Vol.39, No.2, pp. 349-366.<br />
PMI St<strong>and</strong>ards Committee (2008) A Guide to the Project <strong>Management</strong> Body of <strong>Knowledge</strong> 4 th ed. (PMBOK®<br />
Guide), Project <strong>Management</strong> Institute, Newtown Square, Pennsylvania.<br />
194
Vered Holzmann <strong>and</strong> Ben Holzmann<br />
Przeworski, A., Stokes, C.S., <strong>and</strong> Manin, B., (2003) Democracy, Accountability, <strong>and</strong> Representation, Cambridge<br />
University Press, Cambridge, UK.<br />
Redman, T.C., (1998) “The Impact of Poor Data Quality on the typical Enterprise”, Communications of the ACM,<br />
Vol.41, No.2, pp.79-82.<br />
Riker, W.L., (1986) The Art of Political Manipulation, Yale University Press, New Haven, Connecticut.<br />
Rohrschneider, R., (2002) “Mobilizing versus Chasing: How do Parties target Voters in Election Campaigns?”,<br />
Electoral Studies, Vol.21, No.3, pp. 367-382.<br />
Roth, G., <strong>and</strong> Kleiner, A., (1998) “Developing Organizational Memory through Learning Histories”, Organizational<br />
Dynamics, 27(2): 43-59<br />
Shaw, C.M., (2000) The Campaign Manager, 2 nd ed., Westview Press, Boulder, Colorado.<br />
Shaw, M.J.., Subramaniam, C., Tan, G.W., <strong>and</strong> Welge, M.E., (2001) “<strong>Knowledge</strong> management <strong>and</strong> Data Mining<br />
for Marketing” Decision Support Systems, Vol.31, No.1, pp. 127-137.<br />
Schofield, N., Sened, I., <strong>and</strong> Nixon, D., (1998) “Nash Equilibrium in Multiparty Competition with Stochastic<br />
Voters”, Annals of Operations Research, Vol. 84, No. 0, pp. 3-27.<br />
Shenhar, A.J., (2001) “One Size Does Not Fit All Projects: Exploring Classical Contingency Domains”,<br />
<strong>Management</strong> Science, Vol. 47, No.3, pp. 394-414.<br />
Spiegler, I., (2003) “Technology <strong>and</strong> knowledge: bridging a ‘‘generating’’ gap”, <strong>Information</strong> & <strong>Management</strong>, Vol.<br />
40, No.6, pp.533-539.<br />
Trent, J.S., <strong>and</strong> Friedenberg, R.V., (2008) Political Campaign Communication: Principles <strong>and</strong> Practice 6 th ed.,<br />
Rowman & littlefield Publishers Inc, Playmouth, UK.<br />
Tsai, C.Y, <strong>and</strong> Chiu, C.C., (2004) “A Purchase-Based Market Segmentation Methodology”, Expert Systems <strong>and</strong><br />
Applications, Vol.27, Iss.2, pp.265-276.<br />
Williams, C., <strong>and</strong> Gulati, G., (2006) “Social Networks in Political Campaigns: Facebook <strong>and</strong> the 2006 Midterm<br />
Elections”, Annual Meeting of the American Political Science Association, Chicago, IL, Aug 30, 2007.<br />
195
Theoretical Discussion: Green IT <strong>and</strong> its Development in<br />
South Africa<br />
Grant Howard 1 <strong>and</strong> Sam Lubbe 2<br />
1 School of Computing, UNISA, Florida, South Africa<br />
2 North-West University, Mafikeng, South Africa<br />
Grant.Howard@vodamail.co.za<br />
Sam.Lubbe@nwu.ac.za<br />
Abstract: The Human Race depends on Earth’s finite natural resources for its survival. Green literature claims<br />
that Green principles <strong>and</strong> practices are a necessity to sustain Earth’s finite natural resources. In contrast, anti-<br />
Green literature refutes these claims. Green IT or Green <strong>Information</strong> Technology is a view on <strong>Information</strong><br />
Technology (IT) as it relates to Green principles <strong>and</strong> practices. IT is seen as a contravener <strong>and</strong> promoter of<br />
Green principles <strong>and</strong> practices. Green IT proposes radical IT changes to minimise contraventions <strong>and</strong> maximise<br />
promotions of Green principles <strong>and</strong> practices. Importantly, these changes have significant environmental,<br />
economic, <strong>and</strong> social consequences, both negative <strong>and</strong> positive. Specifically, IT is seen as a contravener of<br />
Green principles <strong>and</strong> practices primarily by the production of electronic waste (e-waste) <strong>and</strong> the consumption of<br />
paper <strong>and</strong> energy resources. In contrast, IT is seen as a promoter of Green principles <strong>and</strong> practices by its ability<br />
to reduce environmental impacts in all facets of society through information production <strong>and</strong> alternative processes<br />
creation. Worldwide <strong>and</strong> especially in the South African context, Green IT research is scant. This paper aims to<br />
reduce this gap by providing a theoretical discussion about Green IT <strong>and</strong> its development in South Africa. The<br />
objective of this paper is to present <strong>and</strong> explore the salient theoretical constructs relating to Green IT in order to<br />
provide a coherent view on Green IT <strong>and</strong> Green IT in South Africa. The conclusion will be in the form of a<br />
conceptualisation of Green IT <strong>and</strong> Green IT in South Africa. The point of departure for this paper is green<br />
literature, both supporting literature <strong>and</strong> opposing literature. This is critical because Green principles <strong>and</strong><br />
practices are the theoretical foundation for Green IT. Thereafter Green IT <strong>and</strong> Green IT in South Africa are<br />
explored. This paper will give the reader a considered inspection of Green IT, its development in South Africa,<br />
<strong>and</strong> its relationship to Green principles <strong>and</strong> practices.<br />
Keywords: environment; green IT; green principles <strong>and</strong> practices; IT sustainability; South Africa<br />
1. Introduction<br />
The theoretical discussion about Green IT <strong>and</strong> its development in South Africa is based on current,<br />
relevant research. Green IT research is gaining impetus, however there is still much to address. The<br />
following theoretical discussion is a synthesis of relevant, contemporary themes <strong>and</strong> provides a<br />
coherent perspective on Green IT <strong>and</strong> its development in South Africa.<br />
Following the introduction is a description of the methodology employed. Thereafter the theoretical<br />
discussion is presented. The theoretical discussion follows the high-level logic presented in Table 1.<br />
The high-level logic is formed from the relevant themes presented in Table 2.<br />
Table 1: High-level logic of the paper<br />
# Relevant themes<br />
High-level logic<br />
Green Principles <strong>and</strong><br />
Practices<br />
Anti-Green<br />
Green IT Introduction<br />
IT as a Green Contravener<br />
<strong>and</strong> Green Promoter<br />
Environmental sustainability X<br />
Global warming X<br />
Natural climate change X<br />
Green for profit only X<br />
Green IT/IS X<br />
IT as a Green contravener X<br />
IT as a Green promoter X<br />
Product life-cycle changes X<br />
Consumption changes X<br />
196<br />
Radical IT Changes<br />
Environmental, Economic,<br />
<strong>and</strong> Social Consequences<br />
Development of Green IT in<br />
South Africa
Grant Howard <strong>and</strong> Sam Lubbe<br />
High-level logic<br />
Green Principles <strong>and</strong><br />
Practices<br />
# Relevant themes<br />
Environmental, economic, <strong>and</strong> social<br />
sustainability<br />
X<br />
Economic <strong>and</strong> social consequences X<br />
Africa X<br />
South Africa X<br />
2. Methodology<br />
The theoretical discussion is based on current, relevant literature obtained from the following search<br />
engines: Google <strong>and</strong> Google Scholar, the Association for Computing Machinery (ACM) digital library,<br />
the Association for <strong>Information</strong> Systems elibrary. In addition, related links <strong>and</strong> references were<br />
assessed. Keywords relating to Green IT <strong>and</strong> Green IT in South Africa were used, including: anti-<br />
/Green/sustainable/environment IT/ICT/computing /South Africa; <strong>and</strong> environmental sustainability. A<br />
qualitative approach was adopted where the literature was selected based on relevance <strong>and</strong> search<br />
engine ranking. The selected literature was then analysed for themes relating to the topic of the<br />
paper. Table 2 is the analysis of relevant themes per reference. Further, Table 1 shows how the<br />
relevant themes presented in Table 2 are grouped to form the high-level logic of the theoretical<br />
discussion. The theoretical discussion is based entirely on the references shown in Table 2. Table 2<br />
acknowledges <strong>and</strong> directly credits all authors for their work where it is used in the theoretical<br />
discussion.<br />
Table 2: Analysis of relevant themes per reference<br />
Relevant themes<br />
Environmental sustainability<br />
Global warming<br />
Natural climate change<br />
Green for profit only<br />
Anti-Green<br />
Green IT/IS<br />
IT as a Green contravener<br />
Green IT Introduction<br />
IT as a Green promoter<br />
IT as a Green Contravener<br />
<strong>and</strong> Green Promoter<br />
Product life-cycle changes<br />
Consumption changes<br />
Radical IT Changes<br />
Environmental, Economic,<br />
<strong>and</strong> Social Consequences<br />
Environmental, economic, <strong>and</strong><br />
social sustainability<br />
Economic <strong>and</strong> social<br />
consequences<br />
Africa<br />
# References<br />
Amsel & Tomlinson, 2010 X X<br />
Baek & Chilimbi, 2010 X<br />
Belliethathan, Weldesemaet & Asfaw,<br />
2008<br />
X X X<br />
X<br />
Beloglazov & Buyya, 2010) X X<br />
Bianzino, Raju & Rossi, 2011 X<br />
Blevis, 2008 X X X X X<br />
Bondolfi, 2007 X X<br />
Cai, 2010 X X X<br />
Corbett, 2010 X X X X<br />
Davis, 2010 X<br />
DiSalvo, Sengers & Brynjarsdóttir,<br />
2010<br />
X<br />
Dourish, 2010 X X X X<br />
Easterbrook, 2010 X X X<br />
Easterbrook, Glenn, Ar<strong>and</strong>a &<br />
Pipitone, 2009<br />
X X<br />
Easterbrook, Mens & Zschaler, 2010 X X<br />
Eder, 2009 X<br />
Elliot, 2007 X X X X X<br />
Foster, Lawson, Blythe & Cairns, 2010 X X<br />
197<br />
Development of Green IT in<br />
South Africa<br />
South Africa
Grant Howard <strong>and</strong> Sam Lubbe<br />
Relevant themes<br />
Environmental sustainability<br />
Global warming<br />
Natural climate change<br />
Green for profit only<br />
Green IT/IS<br />
IT as a Green contravener<br />
IT as a Green promoter<br />
Product life-cycle changes<br />
Consumption changes<br />
Environmental, economic, <strong>and</strong><br />
social sustainability<br />
Economic <strong>and</strong> social<br />
consequences<br />
Africa<br />
# References<br />
Froehlich, Dillahunt, Klasnja, Mankoff,<br />
Consolvo, Harrison & L<strong>and</strong>ay, 2009<br />
X X<br />
Goodman, 2009 X X X<br />
Green Computing, 2008 X X X X<br />
Green Computing <strong>and</strong> D-Link, 2007 X X X<br />
Green Goal Progress Report, 2010 X<br />
Hamilton, 2010 X X X X<br />
Herrick & Ritschard, 2009 X X X X<br />
Hirsch & Anderson, 2010 X<br />
Hirsch, Sengers, Blevis, Beckwith &<br />
Parikh, 2010<br />
X X X<br />
Horner, 2008 X X<br />
Kargupta, Gama & Fan, 2010 X X<br />
Keshav & Rosenberg, 2010 X<br />
Kuo & Dick, 2009 X X X X<br />
Leong & Brynskov. 2009 X<br />
Mahadevan Banerjee & Sharma, 2010<br />
Mankoff, Blevis, Borning, Friedman,<br />
X X<br />
Fussell, Hasbrouck, Woodruff &<br />
Sengers, 2007<br />
X<br />
Mann, Muller, Davis, Roda & Young,<br />
2010<br />
X X X<br />
Mann & Smith, 2008 X<br />
Mattern, Staake & Weiss, 2010 X X X X X<br />
Melville, 2010 X X X X X<br />
Milloy, 2009 X X<br />
Molla, 2008 X X X X<br />
Molla & Cooper, 2009 X X X X X X<br />
Molla Pittayachawan & Corbitt, 2009 X X X X<br />
Murugesan, 2008 X X X X X X X<br />
Nathan, 2010 X X X X X X<br />
Nathan, Friedman & Hendry, 2009 X X X X X<br />
National Climate Change Response<br />
Green Paper, 2010<br />
X X<br />
Padayachee, 2008 X X X X<br />
Philipson, 2010 X X X X<br />
Pierce, 2009 X<br />
Qureshi, Weber, Balakrishnan, Guttag<br />
& Maggs. 2009<br />
X X<br />
Schmidt, Schmidtchen, Erek, Kolbe &<br />
Zarnekow, 2010<br />
X X<br />
Schwartz, Betz, Ramirez & Stevens,<br />
2010<br />
X X X X<br />
Smith & Perks, 2010 X X X X X<br />
A strategy for a developmental green<br />
economy for Gauteng, 2010<br />
X X X<br />
Tebbutt, Atherton & Lock, 2009 X<br />
Tomlinson, 2010 X X X<br />
The United Nations Conference<br />
Climate Change Conference, 2010<br />
X X<br />
Vykoukal, 2010 X X X X<br />
Watson, Boudreau & Chen, 2010 X X X X X X X X X X<br />
Weiss, 2007 X X X X X<br />
Williams & Curtis, 2008 X X X<br />
Woodruff, Hasbrouck & Augustin,<br />
2008<br />
X X<br />
198<br />
South Africa
3. Theoretical discussion<br />
3.1 Green principles <strong>and</strong> practices<br />
3.1.1 Environmental sustainability<br />
Grant Howard <strong>and</strong> Sam Lubbe<br />
Green principles <strong>and</strong> practices aim for environmental sustainability. The rationale for environmental<br />
sustainability is the future survival of Humans on planet Earth. Our survival is completely dependant<br />
on the environment <strong>and</strong> so the environment must be used in a manner that is sustainable. A<br />
sustainable environment will occur when the environment can regenerate at the same rate that we<br />
consume it. Green principles <strong>and</strong> practices embody principles <strong>and</strong> practices for every aspect of life to<br />
achieve environmental sustainability. The word Green represents environmental sustainability.<br />
3.1.2 Global warming<br />
A serious environmental sustainability concern is dangerous anthropogenic climate change,<br />
specifically global warming, caused by atmospheric Greenhouse Gasses (GHGs); such climate<br />
change has dire projections for our survival. GHGs include water vapour, carbon dioxide (CO2),<br />
methane, nitrous oxide, ozone, <strong>and</strong> chlorofluorocarbons. Electricity generation is a leading cause of<br />
CO2 emissions. Other notable environmental sustainability concerns are pollution <strong>and</strong> the<br />
consumption of natural resources. In addition, the exponential growth rate of the Human population<br />
makes environmental sustainability more complex.<br />
3.2 Anti-Green<br />
3.2.1 Natural climate change<br />
Climate change is a natural phenomenon with low impacts, <strong>and</strong> Human activities do not have a<br />
significant effect on climate change. Measuring cause <strong>and</strong> effect of anthropogenic climate change is<br />
complex <strong>and</strong> debatable. Green principles <strong>and</strong> practices are nothing more than a new, powerful,<br />
political movement designed to control society <strong>and</strong> profit the elite Green.<br />
3.2.2 Green for profit only<br />
Indeed, there is more advertising than actual scientific evidence behind Green technology products.<br />
An estimate on the Green technology service market is that it will be in the billions of United States<br />
Dollars (USD). Organisations are <strong>using</strong> the term Green to increase sales revenue as they are seen to<br />
be environmentally responsible although it is just Green washing. An increased production <strong>and</strong><br />
consumption of more Green products to replace less Green products will increase profits through the<br />
Green markets but make the problem worse.<br />
These anti-Green claims exist, but the majority of literature that was returned by the search supports<br />
the concept that Green principles <strong>and</strong> practices are necessary for the survival of the Human race. The<br />
paper presents the anti-Green claims not as a central debate, but as a point of departure. The paper<br />
acknowledges the anti-Green arguments <strong>and</strong> does not seek to verify the arguments. The paper relies<br />
on the volume <strong>and</strong> quality of literature that was returned by the search as confirmation that Green<br />
principles <strong>and</strong> practices are necessary for the survival of the Human race. The subsequent sections of<br />
the paper continue from this confirmation.<br />
3.3 Green IT introduction<br />
3.3.1 Green IT/IS<br />
Green IT is IT in relation to environmental sustainability. Green IT is Green principles <strong>and</strong> practices<br />
applied to IT to achieve environmental sustainability. IT is utilized by individuals <strong>and</strong> organisations<br />
throughout the world. Indeed IT plays an essential role in society <strong>and</strong> is a critical factor for economic<br />
growth. The proliferation <strong>and</strong> pervasiveness of IT means that IT has significant effects on the<br />
environment, both positive effects <strong>and</strong> negative effects. The negative environmental effects of IT will<br />
increase in future <strong>and</strong> this makes Green IT an urgent matter. The positive environmental effects of IT<br />
have the potential to enable environmental sustainability in all spheres of Human activity.<br />
199
Grant Howard <strong>and</strong> Sam Lubbe<br />
Green IT can also be viewed from an <strong>Information</strong> Systems (IS) perspective termed Green IS. Green<br />
IS involves more than just IT, it involves people <strong>and</strong> their use of IT as the core component of<br />
environmental problems <strong>and</strong> solutions, <strong>and</strong> this perspective of Green IT is suited for IS research. The<br />
paper uses the terminology Green IT while discussing Green IS, to be consistent with current<br />
practice.<br />
3.4 IT as a Green contravener <strong>and</strong> Green promoter<br />
3.4.1 IT as a Green contravener<br />
IT is a Green contravener through the creation of e-waste, the consumption of finite, natural resources<br />
such as trees for paper <strong>and</strong> water for cooling, <strong>and</strong> the exacerbation of dangerous anthropogenic<br />
climate change through GHG producing energy consumption. Pollution in the form of e-waste results<br />
in environmental degradation <strong>and</strong> destruction, <strong>and</strong> is driven by the huge consumer dem<strong>and</strong> for<br />
electronic products <strong>and</strong> the rapid electronic product obsolescence rates.<br />
3.4.2 IT as a Green promoter<br />
IT is a Green promoter through the use of IT in all Human activities to minimise pollution, minimise<br />
natural resource consumption, <strong>and</strong> minimise energy consumption. IT has the potential to enable the<br />
achievement of environmental sustainability in all Human activities primarily through the provision of<br />
information. <strong>Information</strong> provided by an IS enables Human activity efficiency which reduces the<br />
negative environmental sustainability aspects; <strong>and</strong> enables Human activity effectiveness which<br />
changes previous Human activities to new environmentally sustainable activities. Human activity<br />
efficiency without effectiveness presents the risk that the efficiency savings are used to justify<br />
increased consumption <strong>and</strong> further, any efficient or effective changes must not be offset by the IS<br />
environmental costs to affect those changes. <strong>Information</strong> enables informed <strong>and</strong> effective choices<br />
about environmental sustainability.<br />
3.5 Radical IT changes<br />
3.5.1 Product life-cycle changes<br />
In order for IT to minimise the negative aspects <strong>and</strong> maximise the positive aspects, radical changes<br />
are necessary. Currently, e-waste management is the primary Green IT focus among organisations.<br />
E-waste changes include the elimination of e-waste throughout the IT product life cycle from product<br />
design to product disposal. IT product design changes accommodate second h<strong>and</strong> use <strong>and</strong><br />
upgradeability so that obsolescence periods are extended; non-disposable is Green. Software<br />
changes, especially operating system software changes creates software that uses fewer resources,<br />
prevents device obsolescence, <strong>and</strong> reduces subsequent disposals. Throughout the IT product<br />
lifecycle stakeholders will be encouraged to reduce, re-use, <strong>and</strong> recycle or re-use, refurbish, <strong>and</strong><br />
recycle.<br />
3.5.2 Consumption changes<br />
Changes to lifestyles <strong>and</strong> cultural behaviours involve reducing the dem<strong>and</strong> <strong>and</strong> subsequent<br />
consumption of IT products. The culture of satisfying immediate consumption needs requires a<br />
change to a culture promoting long term environmental sustainability practices <strong>and</strong> projects. The<br />
culture of consumerism <strong>and</strong> consumption requires a change to one of environmental sustainability.<br />
The single pursuit of economic profits negates environmental sustainability.<br />
Radical energy saving changes that enable the effective <strong>and</strong> the efficient use of energy are critical to<br />
reduce GHG producing electricity consumption. IT innovation is essential in order to control, manage,<br />
<strong>and</strong> re-engineer all Human energy consumption activities for reduced energy consumption. It is<br />
necessary to use electricity generation methods other than GHG producing methods, such as<br />
hydroelectric power.<br />
200
Grant Howard <strong>and</strong> Sam Lubbe<br />
3.6 Environmental, economic, <strong>and</strong> social consequences<br />
3.6.1 Environmental, economic, <strong>and</strong> social sustainability<br />
The radical changes proposed by Green IT have economic <strong>and</strong> social benefits, costs, <strong>and</strong><br />
consequences. The environmental, economic, <strong>and</strong> social views on sustainability are essential<br />
contexts of sustainability. Green IT can be regarded as a complex set of trade-offs between these<br />
views.<br />
The environmental consequences of Green IT are expected to be positive. This is deemed to be good<br />
for the environment <strong>and</strong> critical for people. Green IT at the very least highlights the negative<br />
environmental effects of not practicing Green IT. However there is strong debate about the<br />
measurements <strong>and</strong> quantified effects.<br />
3.6.2 Economic <strong>and</strong> social consequences<br />
Economically, environmental sustainability prescribes reduced energy usage which means lower<br />
energy bills for organisations <strong>and</strong> households. These realisable cost savings are a great motivator for<br />
Green IT, although reduced energy costs do not always mean reduced energy usage. However,<br />
reducing energy usage may be an expensive <strong>and</strong> long-term exercise for organisations <strong>and</strong> its<br />
consumers.<br />
Apart from the realisable cost savings from reduced energy bills, it is difficult to quantify the costs <strong>and</strong><br />
benefits of Green IT solutions. Some organisations are concerned that Green IT will negatively impact<br />
their competitiveness <strong>and</strong> economic viability. However, other organisations that have implemented<br />
Green IT show increased profits <strong>and</strong> market share. Another cost that organisations may have to bear<br />
is the cost of cleaning up e-waste pollution; currently society bears these costs.<br />
Socially, Green IT provides organisations with an answer to employee, investor, customer,<br />
competitor, ethical, corporate social responsibility (CSR), <strong>and</strong> regulatory pressures. In organisations<br />
<strong>and</strong> in households Green IT prescribes new ways of procuring, <strong>using</strong>, <strong>and</strong> discarding IT products;<br />
encouraging Green values, ideologies, attitudes, behaviours <strong>and</strong> lifestyles, <strong>and</strong> requiring people to<br />
become agents of change. Further, Green IT legislation may hamper desired IT usage.<br />
Green IT <strong>and</strong> especially Green IS can transform an entire organisation’s business model <strong>and</strong><br />
business processes. Paperless business processes are promoted to replace the need for printing <strong>and</strong><br />
signatures. Measurements for organisations are altered to provide motivation for environmental<br />
sustainability; the triple bottom line approach is one such measurement approach <strong>and</strong> consists of<br />
economic, environmental, <strong>and</strong> social aspects. In addition, the work environment may change so that<br />
workers do not commute to work <strong>and</strong> instead use IT enabled telecommuting <strong>and</strong> teleconferencing.<br />
3.7 Development of Green IT in South Africa<br />
3.7.1 Africa<br />
The dilemma for African countries is the economically debilitating cost to respond to climate change<br />
<strong>and</strong> the life threatening cost of not responding. However, one advantage for developing countries to<br />
respond to climate change is that they have a diminished reliance on GHG ca<strong>using</strong> fuels. In African<br />
countries, IT can decrease transport related GHG emissions through m-commerce, e-commerce, <strong>and</strong><br />
telecommuting, although Internet access <strong>and</strong> speed is a severe hindrance. Other countries in Africa,<br />
for example Ethiopia, are beginning to realise that Green IS can provide key environmental<br />
sustainability information for agricultural <strong>and</strong> economic development.<br />
3.7.2 South Africa<br />
There is little literature on Green IT in South Africa. This suggests that Green IT is still emerging in<br />
South Africa. The government environmental agency is beginning to publish the importance of Green<br />
IT, as the negative <strong>and</strong> positive aspects become noticeable. The South African Government<br />
acknowledges the fatal threats of climate change, is committed to reducing GHG emissions, <strong>and</strong><br />
recognises the potential of IS to alleviate climate change, but significant practical implementations are<br />
not evident. So, the development of Green IT in South Africa is nascent. This is both a threat for the<br />
present <strong>and</strong> an opportunity for the future. Although there is little literature on Green IT in South Africa<br />
201
Grant Howard <strong>and</strong> Sam Lubbe<br />
this does not detract value from the paper. Part of the paper’s value is to highlight this important<br />
theme for South African researchers, government, <strong>and</strong> industry.<br />
4. Conclusion<br />
Although there is plenty of support for Green principles <strong>and</strong> practices as a necessity for the survival of<br />
the Human race, there is opposition. Green principles <strong>and</strong> practices aim for environmental<br />
sustainability to ensure the survival of the Human race. IT that incorporates Green principles <strong>and</strong><br />
practices can contribute significantly to environmental sustainability; this is termed Green IT. Green IT<br />
aims to reduce the negative effects that IT has on the environment such as e-waste, natural<br />
resources consumption, <strong>and</strong> energy consumption. Green IT also aims to reduce the negative<br />
environmental effects produced in all other aspects of society through information production <strong>and</strong><br />
alternative processes creation, especially through Green IS.<br />
The implementation of Green IT involves fundamental changes to the design, production, use, <strong>and</strong><br />
disposal of IT products. These changes have considerable environmental, economic, <strong>and</strong> social<br />
effects, with each of these aspects being balanced against one another at each Green IT<br />
implementation. Developed countries are implementing Green IT solutions at a growing rate while<br />
developing countries, such as South Africa are at a growing awareness stage only. There is<br />
considerable scope for Green IT to aid the cause of environmental sustainability.<br />
The paper has discussed <strong>and</strong> explored the salient theoretical constructs relating to the topic, such as<br />
environmental sustainability <strong>and</strong> Green IT. The result is a coherent view of Green IT <strong>and</strong> Green IT in<br />
South Africa. Even so, this is an evolving topic which may result in new coherent views in the future.<br />
In particular, the paper has highlighted the necessity <strong>and</strong> opportunities for research on Green IT in<br />
South Africa.<br />
References<br />
Amsel, N. & Tomlinson, B. (2010) Green tracker: a tool for estimating the energy consumption of software,<br />
Proceedings of the 28th of the international conference extended abstracts on Human factors in computing<br />
systems (CHI EA '10), ACM, New York, NY, USA, 3337-3342.<br />
Baek, W. & Chilimbi, T.M. (2010) Green: a framework for supporting energy-conscious programming <strong>using</strong><br />
controlled approximation, SIGPLAN Not., 45 (6), 198-209.<br />
Belliethathan, S., Weldesemaet, Y. & Asfaw, A. (2008) Electronic environmental governance in Ethiopia: key<br />
thrust areas, Proceedings of the 2nd international conference on Theory <strong>and</strong> practice of electronic<br />
governance (ICEGOV '08). ACM, New York, NY, USA, 166-171.<br />
Beloglazov, A. & Buyya, R. (2010) Adaptive threshold-based approach for energy-efficient consolidation of virtual<br />
machines in cloud data centers, Proceedings of the 8th International Workshop on Middleware for Grids,<br />
Clouds <strong>and</strong> e-Science (MGC '10), Article 4, ACM, New York, NY, USA.<br />
Bianzino, A.P., Raju, A.K. & Rossi, D. (2011) Apples-to-apples: a framework analysis for energy-efficiency in<br />
networks, SIGMETRICS Perform. Eval. Rev., 38 (3), 81-85.<br />
Blevis, E.(2008) Sustainably Ours: Two digital divides <strong>and</strong> four perspectives, interactions, 15 (1), 61-66.<br />
Bondolfi, A. (2007) The Green e-Waste Channel: model for a reuse <strong>and</strong> recycling system of electronic waste in<br />
South Africa, [online], Master Thesis, Master of Science in Environment, University of Lausanne,<br />
Switzerl<strong>and</strong>. http://ewasteguide.info/files/Bondolfi_2007_UNIL-Empa.pdf, last Access 03 March 2011.<br />
Cai, Y. (2010). Integrating sustainability into undergraduate computing education, Proceedings of the 41st ACM<br />
technical symposium on Computer science education (SIGCSE '10), ACM, New York, NY, USA, 524-528.<br />
Corbett, J. (2010) Unearthing the value of Green IT, Thirty First International Conference on <strong>Information</strong><br />
Systems, St. Louis 2010, Proceedings Paper 198, 1-21.<br />
Davis, J. (2010) Participatory design for sustainable campus living, Proceedings of the 28th of the international<br />
conference extended abstracts on Human factors in computing systems (CHI EA '10), ACM, New York, NY,<br />
USA, 3877-3882.<br />
DiSalvo, C., Sengers, P. & Brynjarsdóttir, H. (2010) Mapping the l<strong>and</strong>scape of sustainable HCI, Proceedings of<br />
the 28th international conference on Human factors in computing systems (CHI '10), ACM, New York, NY,<br />
USA, 1975-1984.<br />
Dourish, P. (2010) HCI <strong>and</strong> environmental sustainability: the politics of design <strong>and</strong> the design of politics,<br />
Proceedings of the 8th ACM Conference on Designing Interactive Systems (DIS '10), ACM, New York, NY,<br />
USA, 1-10.<br />
Easterbrook, S. (2010) Climate change: a gr<strong>and</strong> software challenge, Proceedings of the FSE/SDP workshop on<br />
Future of software engineering research (FoSER '10), ACM, New York, NY, USA, 99-104.<br />
Easterbrook, S., Glenn, M., Ar<strong>and</strong>a, J. & Pipitone, J. (2009) Software research <strong>and</strong> climate change, Proceedings<br />
of the 2009 Conference of the Center for Advanced Studies on Collaborative Research (CASCON '09),<br />
Patrick Martin, Anatol W. Kark, <strong>and</strong> Darlene Stewart (Eds.), ACM, New York, NY, USA, 362-363.<br />
202
Grant Howard <strong>and</strong> Sam Lubbe<br />
Easterbrook, S., Mens, K. & Zschaler, S. (2010) Second International Workshop on Software Research <strong>and</strong><br />
Climate Change, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering<br />
(ICSE '10), 2, ACM, New York, NY, USA, 449-450.<br />
Eder, S.W. (2009) Green Computers, Journal of Business & <strong>Information</strong> Systems Engineering, 1 (1), 123-125.<br />
Elliot, S. (2007) Environmentally Sustainable ICT: A critical topic for IS research? Proceedings of the Pacific Asia<br />
Conference on <strong>Information</strong> Systems (PACIS), 100-112. Association for <strong>Information</strong> Systems.<br />
Foster, D., Lawson, S., Blythe, M. & Cairns, P. (2010) Wattsup?: motivating reductions in domestic energy<br />
consumption <strong>using</strong> social networks, Proceedings of the 6th Nordic Conference on Human-Computer<br />
Interaction: Extending Boundaries (NordiCHI '10), ACM, New York, NY, USA, 178-187.<br />
Froehlich, J., Dillahunt, T., Klasnja, P., Mankoff, J., Consolvo, S., Harrison, B. & L<strong>and</strong>ay, J.A. (2009) UbiGreen:<br />
investigating a mobile tool for tracking <strong>and</strong> supporting green transportation habits, Proceedings of the 27th<br />
international conference on Human factors in computing systems (CHI '09), ACM, New York, NY, USA,<br />
1043-1052.<br />
Goodman, E. (2009) Three environmental discourses in human-computer interaction, Proceedings of the 27th<br />
international conference extended abstracts on Human factors in computing systems (CHI EA '09), ACM,<br />
New York, NY, USA, 2535-2544.<br />
Green Computing. (2008) Government <strong>Information</strong> <strong>and</strong> Technology Officers Council (GITOC) Free State<br />
Province, [online],<br />
http://www.gitoc.fs.gov.za/knowledgebank/infrastructure/Green%20Computing%20aka%20Green%20IT.pdf<br />
, last Access 01 March 2011.<br />
Green Computing <strong>and</strong> D-Link. (2007) White paper, [online], http://www.d-link.co.za/pdf/D-<br />
Link_Green_whitepaper.pdf, last Access 01 March 2011.<br />
Green Goal Progress Report. (2010) 2010 FIFA World Cup. Host City Cape Town, [online],<br />
http://www.capetown.gov.za/en/GreenGoal/Documents/GREEN%20GOAL%20PROGRESS%20REPORT_<br />
EMAIL.pdf, last Access 01 March 2011.<br />
Hamilton, S. (2010) Pharmacy in the New Green South Africa, SA Pharmaceutical Journal, 52-53.<br />
Herrick, D.R. & Ritschard, M.R. (2009) Greening your computing technology, the near <strong>and</strong> far perspectives,<br />
Proceedings of the 37th annual ACM SIGUCCS fall conference (SIGUCCS '09), ACM, New York, NY, USA,<br />
297-304.<br />
Hirsch, T. & Anderson, K. (2010) Cross currents: water scarcity <strong>and</strong> sustainable CHI, Proceedings of the 28th of<br />
the international conference extended abstracts on Human factors in computing systems (CHI EA '10),<br />
ACM, New York, NY, USA, 2843-2852.<br />
Hirsch, T., Sengers, P., Blevis, E., Beckwith, R. & Parikh, T. (2010) Making food, producing sustainability,<br />
Proceedings of the 28th of the international conference extended abstracts on Human factors in computing<br />
systems (CHI EA '10), ACM, New York, NY, USA, 3147-3150.<br />
Horner, C.C. (2008) Red Hot Lies, United States: Regnery Publishing, Inc.<br />
Kargupta, H., Gama, J. & Fan, W. (2010) The next generation of transportation systems,greenhouse emissions,<br />
<strong>and</strong> data mining, Proceedings of the 16th ACM SIGKDD international conference on <strong>Knowledge</strong> discovery<br />
<strong>and</strong> data mining (KDD '10), ACM, New York, NY, USA, 1209-1212.<br />
Keshav, S. & Rosenberg, C. (2010) How internet concepts <strong>and</strong> technologies can help green <strong>and</strong> smarten the<br />
electrical grid, Proceedings of the first ACM SIGCOMM workshop on Green networking (Green Networking<br />
'10), ACM, New York, NY, USA, 35-40.<br />
Kuo, B. & Dick, G.N. (2009) The greening of organisational IT: what makes a difference? Australasian Journal of<br />
<strong>Information</strong> Systems, 16 (2), 81-92.<br />
Leong, T.W. & Brynskov. M. (2009) CO2nfession: engaging with values through urban conversations,<br />
Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest<br />
Group: Design: Open 24/7 (OZCHI '09), ACM, New York, NY, USA, 209-216.<br />
Mahadevan, P., Banerjee, S. & Sharma, P. (2010) Energy proportionality of an enterprise network, Proceedings<br />
of the first ACM SIGCOMM workshop on Green networking (Green Networking '10), ACM, New York, NY,<br />
USA, 53-60.<br />
Mankoff, J.C., Blevis, E., Borning, A., Friedman, B., Fussell, S.R., Hasbrouck, J., Woodruff, A. & Sengers, P.<br />
(2007) Environmental sustainability <strong>and</strong> interaction, CHI '07 extended abstracts on Human factors in<br />
computing systems (CHI EA '07), ACM, New York, NY, USA, 2121-2124.<br />
Mann, S., Muller, L., Davis, J., Roda, C. & Young, A. (2010) Computing <strong>and</strong> sustainability: evaluating resources<br />
for educators, SIGCSE Bull, 41 (4), 144-155.<br />
Mann, S. & Smith, L.G. (2008) Biomimicry as a super systems metaphor for software engineering? Supplmentary<br />
Proceedings of the 21st Annual Conference of the National Advisory Committee on Computing<br />
Qualifications (NACCQ), 287-296.<br />
Mattern, F., Staake, T. & Weiss, M. (2010) ICT for green: how computers can help us to conserve energy,<br />
Proceedings of the 1st International Conference on Energy-Efficient Computing <strong>and</strong> Networking (e-Energy<br />
'10), ACM, New York, NY, USA, 1-10.<br />
Melville, N.P. (2010) <strong>Information</strong> Systems innovation for environmental sustainability, MIS Quarterly, 34 (1), 1-21.<br />
Milloy, S. (2009) Green Hell, United States: Regnery Publishing, Inc.<br />
Molla, A. (2008) GITAM: A model for the adoption of Green IT, 19th Australasian Conference on <strong>Information</strong><br />
Systems 3-5 Dec 2008, Christchurch, 658–668.<br />
Molla, A. & Cooper, V. (2009) Green IT Readiness: A Framework <strong>and</strong> Preliminary Proof of Concept, Australasian<br />
Journal of <strong>Information</strong> Systems, 16 (2), 5-23.<br />
203
Grant Howard <strong>and</strong> Sam Lubbe<br />
Molla, A., Pittayachawan, S. & Corbitt, B. (2009) Green IT diffusion: an international comparison, Green IT<br />
Working Paper No.1/2009, School of Business <strong>Information</strong> Technology, RMIT University, Melbourne,<br />
Australia.<br />
Murugesan, S. (2008) Harnessing Green IT: Principles <strong>and</strong> Practices, IT Professional, 10 (1), 24-33.<br />
Nathan, L.P. (2010) Broadening horizons through information technology, interactions, 17 (6), 24-26.<br />
Nathan, L., Friedman, B. & Hendry. D. (2009) Sustainably Ours: <strong>Information</strong> system design as catalyst: human<br />
action <strong>and</strong> environmental sustainability, interactions, 16 (4), 6-11.<br />
National Climate Change Response Green Paper. (2010) The Government of the Republic of South Africa, Water<br />
<strong>and</strong> Environmental Affairs, [online],<br />
http://www.environment.gov.za//Documents/Documents/2010Nov17/climate_change_greenpaper.pdf, last<br />
Access 02 March 2011.<br />
Padayachee, K. (2008) Utilizing E-Commerce <strong>and</strong> M-Commerce Applications to Address the Effect of Global<br />
Warming, [online], E-leader Conference, Krakow. http://www.gcasa.com/PDF/Krakow%202008/krakow%20papers%20pdf/paper%20database%20krakow/Padayachee.pd<br />
f, last Access 03 March 2011.<br />
Philipson, G. (2010) Carbon <strong>and</strong> Computers in Australia, [online], A report for the Australian Computer Society<br />
(ACS) by Connection Research, http://www.acs.org.au/attachments/ICFACSV4100412.pdf, last accessed<br />
03 March 2011.<br />
Pierce, J. (2009) Material awareness: promoting reflection on everyday materiality, Proceedings of the 27th<br />
international conference extended abstracts on Human factors in computing systems (CHI EA '09), ACM,<br />
New York, NY, USA, 4459-4464.<br />
Qureshi, A., Weber, R., Balakrishnan, H., Guttag, J. & Maggs. B. (2009) Cutting the electric bill for internet-scale<br />
systems, Proceedings of the ACM SIGCOMM 2009 conference on Data communication (SIGCOMM '09),<br />
ACM, New York, NY, USA, 123-134.<br />
Schmidt, N., Schmidtchen, T., Erek, K., Kolbe, L.M. & Zarnekow, R. (2010) Influence of Green IT on Consumers’<br />
Buying Behaviour of Personal Computers: Implications from a Conjoint Analysis, 18th European<br />
Conference on <strong>Information</strong> Systems (ECIS), 1-10.<br />
Schwartz, T., Betz, M., Ramirez, L. & Stevens, G. (2010) Sustainable energy practices at work: underst<strong>and</strong>ing<br />
the role of workers in energy conservation, Proceedings of the 6th Nordic Conference on Human-Computer<br />
Interaction: Extending Boundaries (NordiCHI '10), ACM, New York, NY, USA, 452-462.<br />
Smith, E.E. & Perks, S. (2010) A perceptual study of the impact of green practice implementation on the business<br />
functions, Southern African Business Review, 14 (3), 1-29.<br />
A strategy for a developmental green economy for Gauteng. (2010) Draft report prepared for the Gauteng<br />
Province Department of Economic Development, [online],<br />
http://www.google.co.za/url?sa=t&source=web&cd=1&ved=0CCIQFjAA&url=http%3A%2F%2Fwww.sustain<br />
abilityinstitute.net%2Fcomponent%2Fdocman%2Fdoc_download%2F404-a-strategy-for-a-developmentalgreen-economy-for-gauteng&ei=LkCLTeagDcTs4wabkp2QDg&usg=AFQjCNECLAiojArbmhftSBOTZYhQuwwxw,<br />
last Access 01 March 2011.<br />
Tebbutt, D., Atherton, M. & Lock, T. (2009) Green IT for Dummies Hewlett Packard Limited Edition, John Wiley &<br />
Sons Ltd, Chichester, West Sussex, Engl<strong>and</strong>.<br />
Tomlinson, B. (2010) Future workplaces to support environmental sustainability, interactions, 17 (6), 27-28.<br />
The United Nations Conference Climate Change Conference. (2010) 29 November to 10 December 2010,<br />
Cancun, Mexico, [online],<br />
http://www.environment.gov.za//Documents/Documents/2010Nov30/Summary%20of%20%20COP%2016%<br />
20amended.pdf, last Access 02 March 2011.<br />
Vykoukal, J. (2010) Grid Technology as Green IT Strategy? Empirical Results from the Financial Services<br />
Industry, 18th European Conference on <strong>Information</strong> Systems (ECIS), 1-13.<br />
Watson, R.T., Boudreau, M. & Chen, A.J. (2010) <strong>Information</strong> systems <strong>and</strong> environmentally sustainable<br />
development: Energy informatics <strong>and</strong> new directions for the IS community, MIS Quarterly, 34 (1), 23-38.<br />
Weiss, A. (2007) Can the PC go green? netWorker, 11 (2), 18-25.<br />
Williams, J. & Curtis, L. (2008) Green: The New Computing Coat of Arms? [online], IEEE Computer Society. 12-<br />
16, http://www.computer.org/comp/mags/it/2008/01/mit2008010012.pdf, last Access 03 March 2011.<br />
Woodruff, A., Hasbrouck, J. & Augustin, S. (2008) A bright green perspective on sustainable choices, Proceeding<br />
of the twenty-sixth annual SIGCHI conference on Human factors in computing systems (CHI '08), ACM,<br />
New York, NY, USA, 313-322.<br />
204
Evaluating ICT Based Services for Older Users<br />
Minna Isomursu <strong>and</strong> Marja Harjumaa<br />
VTT, Kaitoväylä 1, Finl<strong>and</strong><br />
minna.isomursu@vtt.fi<br />
marja.harjumaa@vtt.fi<br />
Abstract: This paper summarizes experiences of empirical research done for evaluating information <strong>and</strong><br />
communication technology (ICT) based services that aim at supporting older users in independent living. Over<br />
the course of four years, we have explored several different ICT based service concepts in field trials. The goal of<br />
the field trials has been to expose novel ICT based service concepts to everyday life of ageing users through<br />
adoption of services in real life use. As a result, rich data about user experience <strong>and</strong> value of the service for<br />
different stakeholders has been collected <strong>and</strong> analyzed. Conducting the field trials has exposed practical issues<br />
about how to conduct research with older users. In this paper the experiences are summarized. The findings<br />
show that older participants differ from other user groups in several ways. Researchers faced challenges with<br />
research procedures during the field trials. These challenges were sometimes caused by exploratory nature <strong>and</strong><br />
limited duration of the field trial; the participants of field trials always did not want to invest on adopting the<br />
services as their everyday routines, but instead restricted the use into testing technology <strong>and</strong> related service as<br />
isolated objects from their everyday lives. Often, this also led into situations where participants judged the value<br />
of the service to “someone else”, <strong>and</strong> were not willing to adopt it themselves.<br />
Keywords: ambient assisted living, field trials, ageing technology users<br />
1. Introduction<br />
The ongoing change in demographics in Europe has triggered interest towards exploring the potential<br />
of information <strong>and</strong> communication technology (ICT) based services in supporting ageing population in<br />
independent living. ICT based services have been emerging into support everyday life, such as<br />
banking, shopping or information services. However, their adoption has been limited with older users.<br />
For example, only 28% of European older users aged from 55 to 74 uses Internet frequently (Eurostat<br />
2010). Older users are not <strong>using</strong> online banking services (Pew research, 2010) as frequently as the<br />
younger users. Sayago <strong>and</strong> Blat (2009) found out that the technology itself, users’ computer<br />
experience <strong>and</strong> educational level do not have influence on the accessibility of the web services for<br />
older users. Instead, the users had difficulties to remember task-related steps, underst<strong>and</strong>ing<br />
technical words <strong>and</strong> <strong>using</strong> the mouse. Vastenburg et al. (2008) identified in their work barriers that<br />
hinder the technology adoption by older users, including complexity <strong>and</strong> learnability, lack of perceived<br />
benefit, <strong>and</strong> compatibility issues. Usability <strong>and</strong> accessibility are issues that have been extensively<br />
studied during last couple of decades, <strong>and</strong> user interface solutions that are usable <strong>and</strong> accessible<br />
also for older users can be designed <strong>using</strong> human-centred design practises (Newell et al. 2006).<br />
Perhaps more often, the obstacles for adopting ICT based services are in older users’ attitudes <strong>and</strong><br />
feelings. According to Eisma et al. (2004) negative attitudes of older users are caused by the popular<br />
perception of age <strong>and</strong> technology, lack of awareness of technology, the feeling that technology is not<br />
useful for older people <strong>and</strong> the feeling that it is too difficult to use. Thus, it is important to involve older<br />
users in design <strong>and</strong> evaluation phases of technology concepts. Field trials can be used to expose<br />
novel ICT based service concepts to everyday life of aging users through adoption of services in real<br />
life use. Faber <strong>and</strong> de Vos (2008) state that it is a suitable method for gathering underst<strong>and</strong>ing how<br />
people use the service or application in real-life situations, what are the practical impacts of the<br />
service in the lives of the users, how it should be improved <strong>and</strong> what is its market value (Faber <strong>and</strong> de<br />
Vos, 2008). Field trial is a method of qualitative case research strategy (Benbasat et al. 1987), which<br />
is often used in studying ICT products or services.<br />
In this paper, experiences from empirical research done for evaluating ICT based services for older<br />
users are summarized. The experiences have arisen over the course of four years from the research<br />
work of observing <strong>and</strong> interviewing older people, <strong>and</strong> planning <strong>and</strong> supervising the research work<br />
itself. For the purpose of this paper, we analyzed the experiences of six researchers who had been<br />
involved in six different case studies.<br />
2. Related work<br />
Human-centred design is an approach to systems design <strong>and</strong> development that aims to make<br />
interactive system more usable by foc<strong>using</strong> on the use of the system <strong>and</strong> applying human<br />
factors/ergonomics <strong>and</strong> usability knowledge <strong>and</strong> techniques (SFS 2010). Human-centred design may<br />
205
Minna Isomursu <strong>and</strong> Marja Harjumaa<br />
involve doing co-design together with the end-users before the service implementation, <strong>and</strong><br />
evaluating the implemented complete service in real life settings afterwards. Even though more <strong>and</strong><br />
more products <strong>and</strong> services are developed for older people, there are only few studies describing<br />
experiences of doing co-design <strong>and</strong> service evaluation together with the older users.<br />
Eisma et al. (2004) have described their experiences on user involvement with older users in ICT<br />
development. They state that the details of interactions with older people should be carefully<br />
considered. In particular, the purpose of events <strong>and</strong> the role of the participants should be clearly<br />
explained in terms they fully underst<strong>and</strong>, terminology should be underst<strong>and</strong>able, interactive<br />
prototypes or devices should be used when possible, <strong>and</strong> it is encouraged to have group meetings<br />
with social nature. They also mention that the expected usefulness of the device should be clearly<br />
communicated for the users.<br />
Newel et al. (2006) have reported experiences of collaboration between academic <strong>and</strong> industrial<br />
partners. Their findings are based on the same project with Eisma (2004). They had faced challenges<br />
in persuading the industrial partners to work together with the older people when designing a portal<br />
for older users. In their results Newel et al. (2006) emphasize that time <strong>and</strong> patience is needed when<br />
designing for older users. They state that in the beginning of the project, both developers <strong>and</strong> clients<br />
have felt that the researchers exaggerate the difficulties that the older people have in <strong>using</strong><br />
computers, but their views changed significantly when they got an opportunity to work together with<br />
the older people.<br />
Depending on the research problem, researchers have not found it always necessary to conduct the<br />
field work at the homes of the users, but they have used other use contexts instead. As an example,<br />
Sayago <strong>and</strong> Blat (2009) have studied how older users use the web in their everyday lives by <strong>using</strong> insitu<br />
observations <strong>and</strong> interviews during computer courses, workshops <strong>and</strong> meetings. In their research<br />
they have focused merely on human-computer interaction, not underst<strong>and</strong>ing the processes of how<br />
the technology facilitated services are used within the context of everyday life.<br />
Vastenburg et al. (2008) have identified five design goals on how to design acceptable assisted living<br />
services for the older users. They state that 1) if the product requires effort from the user, it should<br />
give immediate benefit in return, 2) product should fit into existing living patterns of the users <strong>and</strong> use<br />
metaphors they already know, 3) product should offer several interfaces to different situation <strong>and</strong> to<br />
different purposes, but still offer a coherent interaction experience, 4) social network of the older<br />
people could be used as a resource of more complex operations with the technology are needed <strong>and</strong><br />
5) the service platform should adapt to changing user needs.<br />
3. Research methods<br />
3.1 The case studies<br />
Researchers’ experiences that are summarized in this paper are based on six case studies of<br />
different domain areas, namely meal delivery service, grocery ordering service, medicine<br />
management, wellness management, wayfinding, <strong>and</strong> video-assisted communication. In each of<br />
these case studies a new ICT based service concept was developed <strong>and</strong> evaluated with older users.<br />
In addition, four researchers have earlier experience from user research with younger users.<br />
In the first case study, Meal delivery service, a group of nine customers of the meal delivery service<br />
adopted a mobile service that provided them a possibility to choose the meal they would receive the<br />
following day. The trial lasted from three to eight weeks depending on the starting time <strong>and</strong><br />
rehabilitation or hospital periods of the user. The trial setup <strong>and</strong> outcome has been explained in more<br />
detail in Häikiö et al. (2007).<br />
In the second case study, Grocery ordering service, 16 older people were provided a possibility to<br />
order groceries to their homes by touching NFC tag-equipped product cards <strong>using</strong> their mobile<br />
phones. The results have been described in detail in Häikiö et al. (2010).<br />
The third case study, Wellness management, introduced a daily life management service with a touch<br />
screen computer offering a calendar, exercise support, phone, games, diary, <strong>and</strong> a web browser. The<br />
user group consisted of seven older users <strong>and</strong> they used the service for several months depending on<br />
206
Minna Isomursu <strong>and</strong> Marja Harjumaa<br />
the user. Exercise application of this service has described in more detail in Muuraiskangas et al.<br />
(2010).<br />
The fourth case study, Wayfinding, evaluated a prototype for wayfinding support for older people both<br />
inside <strong>and</strong> outside within a near proximity of a nursing home. The participants were given navigation<br />
aids <strong>using</strong> three modalities; visual, audio, <strong>and</strong> tactile signals. Nine participants participated in the<br />
study. The results are described in more detail in Sorri et al. (2011).<br />
The fifth case study, Medicine management, introduced three different kinds of services for older<br />
users. First, a NFC-enabled PDA for medicine information retrieval was studied with eight older<br />
participants (more details in Isomursu et al. (2009)). Second, a PC-based application with a touch-tospeech<br />
user interface for vision impaired older users for identifying medication, <strong>and</strong> consuming<br />
medication related information was studied. The field trial was iterative, <strong>and</strong> involved the total of eight<br />
users at different phases of iterative trials. Third, an application for attaching audio information to<br />
everyday items, such as food containers <strong>and</strong> medicine packages, <strong>using</strong> a mobile phone <strong>and</strong> NFCtags<br />
was studied with ten visually impaired users, including both older <strong>and</strong> younger users.<br />
The sixth case study, Video-assisted communication, explores an ongoing field trial which started in<br />
December 2010 <strong>and</strong> is planned to end in August 2011. In this context, a video-communication service<br />
is introduced for older users <strong>and</strong> their carers who are <strong>using</strong> respital care service of private service<br />
provider for enhancing social interaction.<br />
The common nominator for all case studies was that they aimed at providing information about user<br />
experience, adoption <strong>and</strong> impacts of new ICT-supported service concepts in real-world conditions.<br />
3.2 Data collection<br />
The lead author of this paper has been the scientific supervisor of five of the six case studies. The<br />
second author has been the researcher responsible for data collection <strong>and</strong> analysis of fourth <strong>and</strong> fifth<br />
case study. To complement their personal experiences, four researchers that participated data<br />
collection <strong>and</strong> analysis of the explored case studies were interviewed. The interviews were semistructured<br />
theme interviews, where the following themes were discussed:<br />
Experiences of evaluating services with older users<br />
Practical issues that were considered before <strong>and</strong> during the study<br />
Description on how the user experience, adoption <strong>and</strong> impact were studied<br />
Challenges with (1) the user, (2) usage context, <strong>and</strong> (3) technology<br />
What the interviewees think they learned while conducting research with older users<br />
The researchers interviewed were aged from 26 to 37. Table 1 summarizes the background<br />
researchers whose experience contributes to findings of this paper.<br />
Table 1: Summary of contributors<br />
Interview no Gender Age Participation in analysed case studies<br />
1 Male 27 Medicine management<br />
2 Female 26 Wellness management, medicine management<br />
3 Female 27 Medicine management, wayfinding, video-assisted<br />
communication<br />
4 Male 37 Meal delivery service, grocery ordering service, medicine<br />
management<br />
Second author Female 30 Medicine management, video-assisted communication<br />
Supervisor Female 41 Medicine management, wayfinding, video-assisted<br />
communication, meal delivery service, grocery ordering service<br />
4. Findings<br />
In the following subchapters, we will discuss <strong>and</strong> summarize the experiences from conducting field<br />
trials with older users. Two main issues arise through the analysis process. The first issue deals with<br />
the characteristics of older users as a user group. The second issue arises from the challenges that<br />
the researchers have faced in the field work with older users.<br />
207
4.1 Older participants as a user group<br />
Minna Isomursu <strong>and</strong> Marja Harjumaa<br />
Researchers, who had earlier experience of doing user research with younger users, stated that the<br />
older people differ from other user groups. They are a heterogeneous user group with varying<br />
computer experience, <strong>and</strong> functional <strong>and</strong> cognitive capacity. Below, we discuss the observations the<br />
researchers had made in working with older users.<br />
4.1.1 Attitudes toward participating in research<br />
In many research projects, researchers had experienced difficulties in recruiting older participants for<br />
the trials. Sometimes, the older users refused immediately when they heard that participating would<br />
require them to use a mobile phone or computer without yet knowing what would they actually do with<br />
them. Also, we noted that the physical <strong>and</strong> health condition of the user had a big influence on their<br />
willingness to participate: if they felt their physical or health condition was problematic, they often said<br />
they do not want anything extra in their lives, <strong>and</strong> did not want to participate.<br />
Because of issues described above, we assume that the voluntary participants often have more<br />
positive attitudes toward technology than average older people.<br />
Older users who participated were cooperative <strong>and</strong> they have positive attitudes in general. Some<br />
users greeted the research as a welcome disruption <strong>and</strong> stimulation in their lives. This sometimes<br />
meant that the researcher visiting a home of the user needed to be prepared for social interaction,<br />
having coffee <strong>and</strong> discussing about news or personal issues. For these reasons, the interviews or<br />
other data collection events requiring visiting older users home required generally more time than the<br />
researchers were used to with younger users.<br />
4.1.2 Learning to use the technology<br />
In all the case studies, the older users have learned to use new technology surprisingly well, even if<br />
they might have first doubted their own skills. We observed that many users were really happy when<br />
they were able to learn to use new devices, <strong>and</strong> could provide useful information for the researchers.<br />
Users were often interested about the future of the research project; e.g. how many people have<br />
participated in the study <strong>and</strong> when the technology is going to be on the market.<br />
The researchers felt that the research setting should be a bit different with the older users compared<br />
with younger ones. Introducing the new technology <strong>and</strong> teaching how to use it has a more important<br />
role than with younger users, who have used to use new ICT devices <strong>and</strong> might take the technology<br />
”for granted”.<br />
4.1.3 Expectations towards services <strong>and</strong> technology<br />
In many cases, the researchers stated that it was difficult to predict <strong>and</strong> design what would bring true<br />
value to the lives of older users. The initial expectations what value the technology <strong>and</strong> services could<br />
provide were not always correct. As an example, effectiveness <strong>and</strong> high performance were not often<br />
on top of the list, because many users wanted to use time for things that matter to them. Many older<br />
users emphasized usefulness <strong>and</strong> cost-effectiveness instead.<br />
Researchers felt that the attitudes of the older users are really deep-seated <strong>and</strong> difficult to change. It<br />
was very common that older users considered ICT supported services something “suitable for<br />
younger users”. They often stated that even though they do not need the service personally, it might<br />
be useful for someone else.<br />
4.1.4 Difficulties with terminology<br />
The researchers had found out that ICT terminology is not familiar for all older users, <strong>and</strong> effort should<br />
be directed into introducing the technology with clear, natural language familiar for older people.<br />
People might also have differing conceptions <strong>and</strong> misunderst<strong>and</strong>ings about common technologyrelated<br />
concepts, such as the Internet, which has to be taken into account. The participants always<br />
evaluate the whole research setup, including all hardware <strong>and</strong> software components as well as the<br />
benefits they got from <strong>using</strong> the technology <strong>and</strong> difficulties they had with it. It is challenging to study a<br />
simple service concept or user interface paradigm in a field trial.<br />
208
4.2 Challenges with research methods<br />
Minna Isomursu <strong>and</strong> Marja Harjumaa<br />
The research projects discussed here mainly involved long-term (several weeks to some months) field<br />
trials. In all trials, the methods used for data collection were designed to fit the special conditions of<br />
each trial <strong>and</strong> the specific user group. Here, we discuss the experiences <strong>and</strong> findings observed with<br />
the selected methods <strong>and</strong> research procedures.<br />
4.2.1 Recruiting users<br />
It was usually difficult to recruit users who met certain criteria. The user organizations did not always<br />
have enough information about their members, e.g. their living situation or amount of medicines they<br />
use. Contact person at the user organisation has to know the criteria defined by the researchers <strong>and</strong><br />
then to contact each member <strong>and</strong> ask their willingness to participate <strong>and</strong> the other required<br />
information. It is a common problem that the health condition of the user changed during the field trial,<br />
which resulted in drop-outs or periods when the user was unable to use the service, for example,<br />
because of hospitalization.<br />
4.2.2 Collecting data about subjective experiences<br />
It was common procedure in the examined research projects that data about subjective user<br />
experiences was collected (1) in the beginning of the study <strong>using</strong> interview <strong>and</strong> observation of first<br />
impressions <strong>and</strong> the process of learning to use the technology <strong>and</strong> service, <strong>and</strong> (2) interviews <strong>and</strong><br />
discussions supported by storytelling after the research period. However, as the field trials typically<br />
lasted for a rather long period of time, usually some months, the researchers felt that data about user<br />
experiences evoked during the trial would be valuable. Storytelling at the end of the trial was found to<br />
be an excellent method for collecting information about subjective experiences, but the researchers<br />
had a feeling that it was rather selective, too.<br />
Collecting information about the during use user experience was experienced to be difficult. First,<br />
integrating data collection instruments into the everyday lives of older users was problematic. The<br />
user groups involved in the trials did not often have computers for reporting their experiences through<br />
web-questionnaires, or they were not familiar enough with computers to do that. We also had practical<br />
difficulties in paper-based methods, as some users had problems with h<strong>and</strong>-eye coordination, <strong>and</strong><br />
writing with a pen was not easy for them. Second, we did not succeed in designing research<br />
instruments that would capture <strong>and</strong> present the essence of expressing subjective experiences for our<br />
users. For example, in one of the service field trials, the method chosen for collecting user<br />
experiences that arise during the field trial was a paper diary. The diary was very simple, it asked the<br />
user to choose one of the smiley faces to describe if the experience was pleasant or not, <strong>and</strong><br />
provided an opportunity for written feedback or explanation. Severe challenges with paper based<br />
diary were observed. Most users did not use it at all during the trial period. Our findings indicate that<br />
many had trouble underst<strong>and</strong>ing what experiences or events they should report in a paper diary. This<br />
is also supported by analysing the diaries of those users who used it. The content analysis shows that<br />
the users had difficulties in expressing their feelings or experiences towards the technology or the<br />
service. This became visible, for example, in diaries where users used the diary to describe if they<br />
were happy with the food they received.<br />
The best methods for collecting data about subjective user experience during the field trial were<br />
based on observations or discussions where researchers visited the user <strong>and</strong> discussed with them<br />
about their experiences. In some cases, these discussions were evoked by technical problems that<br />
triggered the user to call the researcher, who then visited the user, helped to solve the problem <strong>and</strong> at<br />
the same time, discussed with the user about their subjective experiences. Also, observations done<br />
by people that were closely interacting with the older users were valuable. For example, nurses or<br />
other formal care personnel, or family members of the older user often had discussions about<br />
subjective experiences <strong>and</strong> observed the use <strong>and</strong> were able to provide their interpretation of the<br />
experiences of the older user.<br />
4.2.3 Quantitative data<br />
Researchers stated that they have had difficulties in asking quantitative questions from the older<br />
users (noted also in earlier studies, e.g. Eisma et al. 2004). It was observed that sometimes the older<br />
interviewees answered by choosing r<strong>and</strong>omly some of the alternatives given by the researcher, even<br />
if it seemed clear for the researcher that the users had not understood the questions. This was<br />
209
Minna Isomursu <strong>and</strong> Marja Harjumaa<br />
especially difficult problem in research projects that involved repeating field trials in several countries,<br />
<strong>and</strong> for the sake of comparability across trials quantitative questions were preferred.<br />
4.2.4 Challenges of methods based on group activity<br />
As many ageing have decreased hearing ability, group situations (e.g. focus groups) were sometimes<br />
challenging, as the participants had difficulty in following each others. Also, some researchers had<br />
observed that group situations did not encourage participants to express <strong>and</strong> discuss their personal<br />
age-related deficiencies.<br />
However, group-based methods were also found to be suitable, for example, in observing <strong>and</strong><br />
collecting data about experiences of the primary user of the service, i.e. the older user, <strong>and</strong> his or her<br />
close ones. For example, group interviews or discussions where the spouse <strong>and</strong> grown-up children of<br />
the older user were present often turned out to be very rich in detail. The presence of familiar persons<br />
stimulated discussions <strong>and</strong> insight that would have been difficult to evoke by a researcher who was a<br />
stranger for the user.<br />
4.2.5 Informed consent process<br />
Almost without exceptions, the researchers have found out that describing the research details<br />
necessary for signing an informed consent has required explaining the research details verbally <strong>and</strong><br />
discussion with the user. This was clearly necessary in cases where blind or vision impaired users<br />
were involved. However, also with other older users verbal discussion was usually a preferred method<br />
over written descriptions of research conditions. In some cases, a written description of the details of<br />
the research was presented to the users, but the researchers <strong>and</strong> nursing professionals involved in<br />
user recruitment noticed that the long, detailed written informed consent scared some users away,<br />
<strong>and</strong> made them to refuse to take part in the research.<br />
4.2.6 Sensitivity towards the changing conditions<br />
It was not unusual that researchers had to change plans if the situation was not opportune for a<br />
meeting scheduled for an interview or other data collection meeting. As an example, if the participants<br />
were tired, their family members were not present, or participants seemed unsecure or unwilling to<br />
participate, the meeting had to be rescheduled or cancelled. Sometimes, the participants became too<br />
tired to continue, <strong>and</strong> the interview was stopped <strong>and</strong> continued later. This requires sensitivity <strong>and</strong><br />
constant evaluation of the situation by the researcher.<br />
4.2.7 Integrating the service into everyday life of the ageing user<br />
The successful field trial requires that the users genuinely adopt the service into their everyday lives.<br />
In many field trials, we observed that the users did not really adopt the service <strong>and</strong> use it in their<br />
normal lives, but rather “tested” the technology as a separate object that had no role in their own lives.<br />
One field trial, the one dealing with the meal ordering service, was a clear exception. All users<br />
adopted it <strong>and</strong> used it in their daily lives. Also, none of the users dropped out during the trial. One<br />
explaining factor might be that the service interface was clearly integrated into a more comprehensive<br />
service chain with other actors, i.e. the meal delivery kitchen <strong>and</strong> logistical process of delivering<br />
meals. Therefore, the users might have been better aware of the impact on their action on other<br />
people, <strong>and</strong> therefore complied with expected usage pattern. The compliance was much lower in field<br />
trials where the service use was solitary, i.e. it did not trigger any actions on other people or other<br />
actors in the service chain.<br />
5. Discussion<br />
The researchers had concerns considering the sampling of users. They thought that older people who<br />
voluntarily participate in user studies generally have more positive attitudes toward technology than<br />
most old users. In some cases, the participants may participate because of the social interaction it<br />
provides them, which might have an effect on the results. The latter has also been recognised in<br />
Kayser-Jones <strong>and</strong> Koenig (1994) referenced by Eisma et al. (2004).<br />
Creating true value with ICT based services for older users was experienced difficult. The researchers<br />
expressed difficulties in fully underst<strong>and</strong>ing what was valued by older users, <strong>and</strong> what was important<br />
in their everyday lives. Earlier research has pointed out that many new technologies are often also<br />
210
Minna Isomursu <strong>and</strong> Marja Harjumaa<br />
based on quite simple assumptions, <strong>and</strong> a more complex reality is faced only in deployment of<br />
technology (Lindley et al. 2008).<br />
In earlier studies it has been found that personal visits of the researchers keep users interested <strong>and</strong><br />
help them to develop loyalty to the project (e.g. Eisma et al. 2004). One practice that was found to<br />
increase the motivation to adopt <strong>and</strong> integrate the service fully to everyday life was that the<br />
researchers were in touch with the users during the trial, even when the communication concerned<br />
about the technical problems that the users had faced.<br />
Eisma et al. (2004) suggest that organising a focus group is useful when it is marketed as a social<br />
event <strong>and</strong> a possibility to learn about new products <strong>and</strong> technologies. This has further impact on<br />
user’s motivation as well as offering a possibility to participate in the future. In this study, the<br />
researchers stated that sometimes the participants get positive experiences when they learn to use<br />
new technology, because they have thought that they could not do that any more, <strong>and</strong> the<br />
participation rewards them as such.<br />
6. Conclusion<br />
Today, lots of efforts are directed to developing ICT services for increasing the well-being of older<br />
people. To properly evaluate their impact, one needs to evaluate how the technology can change<br />
people’s lives. In the early phases of service development, it is crucial to get rich information that<br />
helps in design. This paper summarizes experiences from six case studies. The findings show field<br />
trials provide an opportunity to observe the technology use in the real environment <strong>and</strong> to collect rich<br />
data by interacting with the users.<br />
Our analysis indicates that researchers had found challenges in working with older users. User<br />
research always requires sensitivity to recognize <strong>and</strong> respond to personal characteristics <strong>and</strong> needs<br />
of the users. As ICT has been traditionally developed for adult working users, the methods <strong>and</strong><br />
practices for working with more versatile user groups are still emerging. We hope that these findings<br />
are valuable both for researchers <strong>and</strong> companies developing new services for this emerging <strong>and</strong><br />
challenging market.<br />
Acknowledgements<br />
The research presented in this paper has been funded by VTT Technical Research Centre of Finl<strong>and</strong>,<br />
TEKES <strong>and</strong> Ambient Assisted Living (AAL) Joint Programme (projects HearMeFeelMe <strong>and</strong> WeCare).<br />
Also, we want to acknowledge the valuable contribution of the ageing users who took part in the field<br />
trials, the formal <strong>and</strong> informal caretakers who supported us in this research, <strong>and</strong> the researchers who<br />
conducted the field trials.<br />
References<br />
Benbasat, I., Goldstein, D.K. <strong>and</strong> Mead, M. (1987) “The Case Research Strategy in Studies of <strong>Information</strong><br />
Systems”. MIS Quarterly, Vol 11, No. 3, pp 369 – 386.<br />
Eisma, R., Dickinson, A. Goodman, J., Syme, A., Tiwari, L. <strong>and</strong> Fewell, A.F. (2004) “Early user involvement in the<br />
development of information technology-related products for older people”. Universal Access in the<br />
<strong>Information</strong> Society, Vol 3, No. 2, pp 131 – 140.<br />
Eurostat. (2010) “Individuals frequently <strong>using</strong> the Internet, percentage of individuals, 55 to 74 years old” [online],<br />
http://epp.eurostat.ec.europa.eu/portal/page/portal/eurostat/home<br />
Faber E., de Vos, H. (Eds.) (2008) Creating Successful ICT-Services: Practical Guidelines Based on the STOF<br />
Method, Telematica Instituut. Enschede, The Netherl<strong>and</strong>s.<br />
Häikiö, J., Isomursu, M., Matinmikko, T., Wallin, A., Ailisto, H., <strong>and</strong> Huomo, T. (2007) “Touch-based user<br />
interface for elderly users”. Proceedings of the 9th international conference on Human computer interaction<br />
with mobile devices <strong>and</strong> services (MobileHCI’07), pp 9-12.<br />
Häikiö, J., Wallin, A. <strong>and</strong> Isomursu, M. (2010) “Digitally-enhanced services for the elderly”. International Journal<br />
of Services Sciences, Vol 3, No. 2/3, pp 232 – 249.<br />
SFS. (2010) Ergonomics of Human-System Interaction. Part 210: Human-Centred Design for Interactive<br />
Systems. St<strong>and</strong>ard ISO 9241-210:2010.<br />
Isomursu, M., Ervasti, M. <strong>and</strong> Törmänen, V. (2009) ”Medication <strong>Management</strong> Support for Vision Impaired Elderly<br />
- Scenarios <strong>and</strong> Technological Possibilities”. Proceedings of the Second International Symposium on<br />
Applied Sciences in Biomedical <strong>and</strong> Communication Technologies (ISABEL 2009), pp 1 – 6.<br />
Lindley, S.E., Harper, R. & Sellen, A. (2008). Designing for elders: Exploring the complexity of relationships in<br />
later life. In Proceedings of the 22nd annual conference of the British HCI Group (HCI 2008), Volume 1, 77-<br />
86.<br />
211
Minna Isomursu <strong>and</strong> Marja Harjumaa<br />
Pew research (2010) “Generations Online in 2010”, [online], http://pewinternet.org/Reports/2010/Generations-<br />
2010/Overview.aspx<br />
Muuraiskangas, S. Tiri, J. <strong>and</strong> Kaartinen, J. (2010) “Easy physical exercise application for the elderly. Available in<br />
AALIANCE conference program”, [online], http://www.aaliance.eu/public/aaliance-conference-1/conferenceprogramme.<br />
Newell, A.F, Dickinson, A., Smith, M.J. <strong>and</strong> Gregor, P. (2006) “Designing a Portal for Older Users: A Case Study<br />
of an Industrial/Academic Collaboration”. ACM Transactions on Computer-Human Interaction, Vol 13, No. 3,<br />
pp 347 – 375.<br />
Sayago, S. <strong>and</strong> Blat, J. (2009) “About the relevance of accessibility barriers in the everyday interactions of older<br />
people with the web”. Proceedings of the 2009 International Cross-Disciplinary Conference on Web<br />
Accessibililty (W4A ´09), pp 104 – 113.<br />
Sorri, L., Leinonen, E. <strong>and</strong> Ervasti M. (2011) “Wayfinding aid for the elderly with memory disturbances”. Accepted<br />
to be published in the proceedings of the 19th European Conference on <strong>Information</strong> Systems – ICT <strong>and</strong><br />
Sustainable Service Development (ECIS 2011).<br />
Vastenburg, M.H., Visser, T., Vermaas, M. <strong>and</strong> Keyson, D.V. (2008) “Designing Acceptable Assisted Living<br />
Services for Elderly Users”. In Aarts, E. et al (Eds.) Lecture Notes in Computer Science Ambient<br />
Intelligence, Vol 5355, pp 1 – 12, Springer Berlin / Heidelberg.<br />
212
The Geography of Criminality - <strong>Information</strong> <strong>and</strong> GIS Models<br />
for Decision Support<br />
Paulo João 1 , Jorge Ferreira 2 <strong>and</strong> José Martins 2<br />
1<br />
DEIO –FCUL, University of Lisbon<br />
2<br />
e-GEO, FCSH – UNL, Lisbon, Portugal<br />
jolriao@gmail.com<br />
jr.ferreira@fcsh.unl.pt<br />
josemartins.geo@gmail.com<br />
Abstract: Over the last few years a new worldwide socio-economical order lead to an increasing number on<br />
crime rates <strong>and</strong> raised the need to find new ways to h<strong>and</strong>le information about criminality. To better underst<strong>and</strong> its<br />
causes, local, regional <strong>and</strong> national security authorities turned to new decision support tools such as Geographic<br />
<strong>Information</strong> Systems (GIS) <strong>and</strong> other information technologies to find better solutions. To underst<strong>and</strong> the<br />
magnitude of all the variables involved it is necessary to spatially capture <strong>and</strong> correlate them. Only by doing that<br />
it´s possible to quantify <strong>and</strong> qualify some hidden aspects of the phenomena. The city of Lisbon with is new<br />
proposed administrative division, reducing from 53 to 24 “freguesias” (minimum administrative division <strong>and</strong><br />
similar to parish’s) implies an enormous degree of uncertainty in the observation <strong>and</strong> location of criminal data. As<br />
the crime is not treated with an exact point, but at the level of parish, it implies that larger parishes are treated by<br />
the average crime regardless of place of occurrence. This research combines statistical methods (cluster<br />
analysis) <strong>and</strong> spatial models created with GIS, based on police crime reports. It also details a framework for<br />
short-term tactical deployment of police resources in which the objective is the identification of areas where the<br />
crime levels are high (enough) to enable accurate predictive models as well as to produce rigorous thematic<br />
maps. In recent years police services have engaged on proactive <strong>and</strong> Intelligence-Led Policing (ILP) methods.<br />
This advance was coincident with the recognition of law-enforcement solutions at local level. This paper also<br />
engages an approach to ILP as a methodology to provide the necessary tools for Decision Support System<br />
(DSS) of police departments.<br />
Keywords: crime analysis, GIS, geostatistics, intelligence-led policing, information dissemination, data mining<br />
1. Introduction<br />
Over the last few years a new worldwide socio-economical order lead to an increasing number on<br />
crime rates <strong>and</strong> raised the need to find new ways to h<strong>and</strong>le information about criminality. To better<br />
underst<strong>and</strong> its causes, local, regional <strong>and</strong> national security authorities turned to new decision support<br />
tools such as Geographic <strong>Information</strong> Systems (GIS) <strong>and</strong> other information technologies to help them<br />
in finding better solutions. The spatial attributes of this phenomena implies quantitative <strong>and</strong> qualitative<br />
variables <strong>and</strong> to underst<strong>and</strong> its magnitude, it is necessary to capture, analyze <strong>and</strong> correlate them.<br />
The city of Lisbon with is new proposed administrative division; reducing from 53 to 24 parishs<br />
(minimum administrative division) implies an enormous degree of uncertainty in the observation <strong>and</strong><br />
location of criminal data. As the crime is not treated with an exact point, but at the level of parish, it<br />
implies that larger parishes are treated by the average crime regardless of place of occurrence.<br />
In recent years police services have engaged on proactive <strong>and</strong> Intelligence-Led Policing (ILP)<br />
methods. This advance was coincident with the recognition of law-enforcement solutions at local<br />
level.<br />
This research combines statistical methods (cluster analysis) <strong>and</strong> spatial models with GIS based on<br />
police crime reports. It also details a framework for short-term tactical deployment of police resources<br />
in which the objective is the identification of areas where the crime levels are high (enough) to enable<br />
accurate predictive models as well as to produce rigorous thematic maps.<br />
It is also an approach to “Intelligence-led policing” as a strategic methodology to provide tools for<br />
decision support by police departments.<br />
Recent advances on geostatistics, information, data mining <strong>and</strong> GIS, the study <strong>and</strong> modeling of crime<br />
data to identify patterns has emerged as a new research field. Within the scope of this paper, some<br />
key questions will be addressed:<br />
213
Paulo João, Jorge Ferreira <strong>and</strong> José Martins<br />
Can crime patterns be extrapolated in small areas such as precincts accurately enough for use in<br />
deployment, scheduling <strong>and</strong> evaluation of police effectiveness?<br />
Can multivariate forecast models predict turning points <strong>and</strong> other new patterns?<br />
Is it possible, by <strong>using</strong> geostatistics tools such as kriging methods, to foresee <strong>and</strong> predict the<br />
occurrence of incidents, beyond the mere descriptive models?<br />
2. Geographical information systems <strong>and</strong> crime analyses<br />
Since the 1960’s Geographical <strong>Information</strong> Systems (GIS) have been applied to a vast number of<br />
studies <strong>and</strong> criminality is not an exception. From its first applications in Canada, GIS has become a<br />
major instrument for an effective territorial planning.<br />
From in-car navigation, retail <strong>and</strong> commerce location, costumer geo-marketing studies to risk<br />
management, construction, weather forecasting, military planning <strong>and</strong> other application fields, GIS<br />
has consistently emerged as a killer application.<br />
However, it was only in the beginning of the 1980’s with the reducing prices of technologies (operating<br />
systems, processors, storage capacity, memory <strong>and</strong> hardware), that GIS saw a significant<br />
development on new research fields, such as crime analysis, relocation of police precincts <strong>and</strong> crime<br />
reduction strategies.<br />
Much of the work in crime mapping <strong>and</strong> analyses was carried out in the United States by the Mapping<br />
<strong>and</strong> Analysis for Public Safety (MAPS), formerly known as the National Institute of Justice’s Crime<br />
Mapping Research Center (CMRC).<br />
This work served as a launching platform to the development of crime mapping in other countries like<br />
South Africa, Australia <strong>and</strong> United Kingdom<br />
The computerization of police records has come with a realization that this material can be used for<br />
crime <strong>and</strong> intelligence analyses (Ratcliffe, 2004). This work permits the recognition of patterns<br />
sometimes hidden <strong>and</strong> often not perceived by the police <strong>and</strong> authorities.<br />
Geography is also necessary for advances on spatial underst<strong>and</strong>ing <strong>and</strong> consequently “…has<br />
contributed to many disciplines where underst<strong>and</strong>ing space <strong>and</strong> place is important, such as with<br />
crime” (Ratcliffe, 2004).<br />
With the new administrative divisions of Lisbon, crime analyses will be more difficult due to area<br />
aggregation. For example, on certain types of crime, aggregation will probably mask important pattern<br />
details. The comparison between the new <strong>and</strong> the old administrative divisions in Lisbon is important<br />
<strong>and</strong> the use of predictive models can help authorities <strong>and</strong> provide the necessary results to an effective<br />
decision.<br />
To proceed or not with these new administrative divisions is the major question that has to be<br />
answered shortly. And the most correct answer will depend upon a rigorous <strong>and</strong> pertinent research<br />
based on data, information, but also knowledge.<br />
The comparison between new <strong>and</strong> old administrative limits is an important exercise to perceive<br />
pattern differentiation <strong>and</strong> has obvious implications on territorial planning <strong>and</strong> public domain.<br />
The use of geostatistics tools such as predictive models <strong>and</strong> kriging methods allows, beyond the mere<br />
description of phenomena, to foresee <strong>and</strong> predict the occurrence of incidents.<br />
3. Intelligence-Led Policing (ILP)<br />
Police forces are always struggling with lack of human resources to reduce crime on their jurisdiction.<br />
By analyzing <strong>and</strong> correlate information from primary sources on criminal environment, it’s possible to<br />
achieve higher efficiency levels.<br />
Criminal historical data are analyzed to develop new strategies <strong>and</strong> actions to reduce crime. It is a<br />
very dem<strong>and</strong>ing task in terms of technological means <strong>and</strong> human resources but it is the best strategy<br />
to reduce crime because it has an approach, both preventive <strong>and</strong> repressive.<br />
214
Intelligence<br />
Paulo João, Jorge Ferreira <strong>and</strong> José Martins<br />
Criminal environment<br />
Figure 1: ILP <strong>and</strong> crime reduction process (Ratcliffe, 2005)<br />
Decision-maker<br />
An ILP model (at its first stage) enables the interpretation of the criminal environment. This is usually<br />
performed by an intelligence department <strong>and</strong> relies on information’s sources both internal <strong>and</strong><br />
external to the police service.<br />
The obtained information should, in an intelligence-led environment, be passed to people who can<br />
actually impact in a positive manner on the criminal environment (decision maker). This requires an<br />
intelligence structure to identify <strong>and</strong> influence the decision-makers. It should be noted that this<br />
requires both an ability to identify the decision-makers, as well as to influence their thinking, regarding<br />
the types of strategies to achieve better criminal numbers.<br />
ILP strives for greater efficiency in policing, but it has also been accompanied by other efficiency<br />
methods, some of which conflict with ILP.<br />
There is a performance culture in many police services which strives to measure every bit of data <strong>and</strong><br />
it is a concern that the benefits of ILP will be lost in a flood of statistical operations.<br />
One of the major issues is response time. Many police services have now records of the response<br />
time to routine calls, <strong>and</strong> they build response improvement’ protocols that maximize performance.<br />
Unfortunately the research evidence is fairly conclusive: improving response times to calls does not<br />
reduce the number of crimes.<br />
The intelligence led policing model, is more difficult to implement but is also the most versatile in<br />
performance <strong>and</strong> results.<br />
The following table compares the various models of policing in terms of implementation, resources<br />
<strong>and</strong> results:<br />
Table 1: Strategic aspects of police activity<br />
Neiborhoud<br />
<strong>and</strong><br />
community<br />
policing<br />
Problem<br />
oriented<br />
policing<br />
Intelligenceled<br />
policing<br />
Implementation<br />
dificulty<br />
low<br />
medium<br />
high<br />
Human resources<br />
high<br />
high<br />
low<br />
Technology<br />
resources<br />
low<br />
medium<br />
high<br />
Costs<br />
estimate<br />
high<br />
high<br />
medium<br />
215<br />
Geography<br />
application<br />
Low<br />
medium<br />
High<br />
Expected<br />
results<br />
low<br />
medium<br />
high<br />
Type of<br />
information<br />
retrospective<br />
retrospective<br />
prospective<br />
Type of<br />
actuation<br />
preventive<br />
repressive<br />
preventive<br />
<strong>and</strong><br />
repressive
Paulo João, Jorge Ferreira <strong>and</strong> José Martins<br />
In recent years there has been a move within police services towards a proactive <strong>and</strong> ILP. That was<br />
coincident with the recognition of local policing solutions <strong>and</strong> the importance of intelligence function at<br />
local areas. This paper is also an approach to ILP as a strategic methodology to provide a tool for<br />
decisions makers in police departments.<br />
Knowing where the policeman becomes a crucial intervenient provides a better underst<strong>and</strong>ing of the<br />
intervention protocols anticipating the outcome <strong>and</strong> effect. Without such a baseline, evaluations are<br />
limited as to the purposes <strong>and</strong> sometimes anticipate consequences to police efforts. Intelligence-led<br />
policing is also about being a smart police.<br />
That means increasing the effectiveness <strong>and</strong> efficiency of police interventions through the use of the<br />
right information. Such efforts are data driven (quantitative <strong>and</strong> qualitative) <strong>and</strong> analytically rigorous,<br />
assuring than appropriate care has been taken to collect, organize <strong>and</strong> analyze information, prior to<br />
action.<br />
This ameliorates the deficiencies of rigid boundaries <strong>and</strong> moves towards a more dynamic<br />
methodology. With this new Lisbon “scenario”, from 53 to 24 parishes <strong>and</strong> assuming these<br />
administrative limits, crime analysis will become more difficult (to evaluate) due to spatial aggregation.<br />
4. Crime mapping today<br />
With the emergence of geographic information technology <strong>and</strong> its successful use as a tool for crime<br />
analysis <strong>and</strong> forecasting, the study <strong>and</strong> modeling of historical or current crime data to identify spatial<br />
crime patterns has emerged as a new research area. However in Europe, this reality is still recent<br />
(Chainey, S. et. al. 2008 & Wilson, R. et. al. 2008). Three key questions can be pointed out:<br />
Can univariate methods be used as a mean to extrapolate accurate crime patterns in the shortrun<br />
small areas such as precincts?<br />
Are they robust enough for use in deployment, scheduling <strong>and</strong> as counterfactuals for evaluating<br />
police effectiveness?;<br />
Can st<strong>and</strong>ard crime indicators (used in multivariate forecast models) predict turning points <strong>and</strong><br />
other new patterns like, for example, a new crime?<br />
For some crime types, aggregation may mask important seasonal variations in smaller areas. For<br />
example, university areas may have seasonal patterns in property crimes influenced by the comings<br />
<strong>and</strong> goings of the students <strong>and</strong> teachers. Also, shopping areas may have peaks on holiday times.<br />
Law enforcement officers have been mapping crime virtually since the time that police agencies were<br />
established through the use of push pins <strong>and</strong> a paper map at the beginning of the 20 Century<br />
(Harries, 1999).<br />
By the late 70’s <strong>and</strong> early 80’s, there was a resurgence of interest in underst<strong>and</strong>ing <strong>and</strong> analyzing the<br />
spatial dimension of crime through the characteristics of incident, its location <strong>and</strong> geographical<br />
analysis on incident (Boba, 2009). With the development of GIS in the 90’s, law enforcement officers<br />
begun to consider the principles of geography <strong>and</strong> spatial information <strong>using</strong> new technologies in order<br />
to realize <strong>and</strong> develop mechanisms to crime prevention <strong>and</strong> the public safety.<br />
The cartographic representation has some advantages such as: help visual analysis <strong>and</strong><br />
statistics of crime, aggregate information in spatial matrix, produce thematic maps that help to<br />
communicate the results of the analysis (Eck, J. et al. 2005 & Boba, 2009).<br />
Harris (1990:3), states that “the purpose of maps is to communicate information”. The cartographic<br />
representation is a tool to communicate information across time <strong>and</strong> space.<br />
The diffusion of GIS into crime analysis has been a slow process, first due to costs, both hardware<br />
<strong>and</strong> software <strong>and</strong> then because of its complexity. When discussing the current use of GIS for crime<br />
analysis, activities can be divided into current <strong>and</strong> cutting edge applications (currently used in law<br />
enforcement agencies to support crime analysis activities).<br />
The use of GIS to support crime analysis activities in police day-to-day operations is a powerful tool<br />
for strategic planning (Johnson, 2000).<br />
216
4.1 Crime hot-spots<br />
Paulo João, Jorge Ferreira <strong>and</strong> José Martins<br />
This is the most common method used in criminal representation. It assumes that past crime locations<br />
will persist into the future, however the actual results of this method depends on the time period under<br />
review, usually this robust method only produces good results when applied to short time series.<br />
An interesting feature in the detection of hot-spots is its persistence <strong>and</strong> coincidence over time as<br />
shown by Anselin (2000), the hot-spots reflect high levels of crime initially moderate, but over time,<br />
usually, this crime will change to more violent types of crimes (e.g. acts of v<strong>and</strong>alism to crimes of<br />
theft).<br />
Therefore, should be contained <strong>and</strong> controlled in time to prevent more serious incidents to people <strong>and</strong><br />
property in the geographic area covered by the hot-spot.<br />
According to Eck, J. et al. (2005), this method assumes that they must map the locations <strong>and</strong> not<br />
criminal occurrences thus underst<strong>and</strong> why certain settings are more easily criminal occurrences while<br />
others appear to inhibit these same events. Ainsworth (2001:88) refers that "A crime hot-spot is<br />
usually understood as a location or small area with boundaries clearly identified where there is a<br />
concentration of criminal incidents, which exceed the normal for this area, the term can also be used<br />
to describe locations that showed an increase in crime a given period of time".<br />
4.2 Descriptive statistics for crime analyses<br />
One of the most important tasks associated with crime analysis is to know data <strong>and</strong> its particularities.<br />
This data is the baseline for an intelligent analysis, however, very little of this data are accurately<br />
collected or has the necessary detail.<br />
Underst<strong>and</strong>ing the different types of data <strong>and</strong> their definitions is important because some types of<br />
analysis have been designed for particular types of data <strong>and</strong> may be inappropriate.<br />
After preprocessing <strong>and</strong> geocoding all the information, data was analyzed <strong>and</strong> the dataset consisted<br />
in 35549 police records, distributed by 8 variables, according with the fallowing coding:<br />
Table 2: Data coding process<br />
Variable Min Max<br />
Day 1 31<br />
Month 1 12<br />
Hour 0 23<br />
Minute 0 59<br />
Type of crime 1 6<br />
Subtype of crime 1 34<br />
Classification 1 112<br />
Parish 1 53<br />
According to the Persons’ coefficient correlation matrix, there was no significant correlation between<br />
the variables which let us to identify the variables as independent observations.<br />
Table 3: Person correlation matrix<br />
Day Month Hour Minute Type Subtype Classification Parish<br />
Day 1<br />
Month -0,011 1<br />
Hour 0,008 0,003 1<br />
Minute 0,007 0,000 -0,019 1<br />
Type 0,050 0,016 0,013 -0,020 1<br />
Subtype 0,004 0,002 0,003 -0,004 0,020 1<br />
Classification -0,014 0,009 0,010 -0,009 -0,008 0,000 1<br />
Parish -0,002 0,005 0,007 -0,013 0,012 0,020 0,032 1<br />
217
Paulo João, Jorge Ferreira <strong>and</strong> José Martins<br />
In terms of overall information, this data represent a small part of the criminal phenomena, since there<br />
were only considered crimes reported <strong>and</strong> recorded by the Public Safety Police (Polícia de Segurança<br />
Pública – PSP).<br />
The primary dataset consist of one year of criminal offences for all individual events for 2009 in Lisbon<br />
County obtained with authorization from the PSP.<br />
The dataset include all personal <strong>and</strong> patrimonial offences. The most often studied crime is robbery<br />
occurred in public transportation. All the records have a geographic reference to a parish, which<br />
permits the classification of the offences <strong>and</strong> their mapping in a GIS.<br />
Unfortunately the accuracy is not the ideal because we don´t have the points of the occurrences<br />
which prevents us from <strong>using</strong> the georeference point but only the “parish area”.<br />
The histograms below show that the majority of crimes are robbery mainly during the evening.<br />
Figure 2: Data histograms<br />
4.3 Methodology<br />
Regarding the GIS methodology adopted, it was necessary to prepare the work with a set of layers<br />
<strong>and</strong> create a theme to match the expected distribution of parishes. Thematic maps showing the<br />
number of crimes or other metrics were aggregated <strong>using</strong> color palettes (darker for more crimes <strong>and</strong><br />
brighter for less).<br />
This method is widely used because it permits the analysis by county, to observe where the crime has<br />
been committed. However, although this is also a popular method, it is unlikely that crime is fair by<br />
Municipality (e.g. Lisbon) <strong>and</strong> it can lead to interpretations that do not correspond to reality.<br />
The main reason is because the population density is different in each place. In this case, the use of<br />
ratios in the representation of colors would be the wisest choice.<br />
This type of maps creates a jurisdictional conflict between the geographical areas <strong>and</strong> administrative<br />
delimitations (or jurisdictions), when they are different (as is the case of Lisbon).<br />
On crime analysis, maps were initially created to show absolute values (recorded in 2009) by the<br />
Public Security Police (PSP) in Lisbon, according to the current structure of 53 parishes <strong>and</strong> the new<br />
structure of 24 parishes. This representation was the result of the geo-referenced crimes recorded in<br />
2009 by 53 existing parishes. To represent the crimes according the new administrative structure it<br />
was necessary to aggregate data. The parish of Santa Maria dos Olivais, under the new structure will<br />
be divided into two parishes, giving rise to a new one, the Oriente.<br />
In order to estimate crime values in these two parishes, it was necessary to divide the total between<br />
the old <strong>and</strong> the new area, multiplying the current area. The result was then subtracted from the old<br />
parish with a view to obtaining an estimated average value for this new delimitation.<br />
218
Paulo João, Jorge Ferreira <strong>and</strong> José Martins<br />
It should be noted that these data could not be exact because a smaller area may have more or less<br />
recorded crimes. However, for research purposes, the method can be used, as long as properly<br />
referred.<br />
Figure 3: Parish’s administrative division (actual <strong>and</strong> planning)<br />
Figure 4: Total crimes in Lisbon<br />
219
Paulo João, Jorge Ferreira <strong>and</strong> José Martins<br />
Analyzing crime data by the actual divisions <strong>and</strong> by the new ones, it seems obvious an increase in<br />
numbers (in part due to the aggregation of values recorded in several parishes that lead to new<br />
administrative area). Significantly, the low number of crimes in the small villages of the current<br />
division changed from the first to the last value class (when aggregated the new administrative<br />
division). The data shows a very large criminal density on Oriente, but the empirical knowledge of this<br />
area can tell us that most criminal incidents occur in its (old) aggregated neighborhood.<br />
Next, the calculation of criminal density for the parish was made, dividing the total crimes per square<br />
Km in area.<br />
Figure 5: Ratio of total crimes per square Km in Lisbon<br />
Regarding criminal density, the new administrative division gives the perception of a decrease in<br />
crime numbers. However, this fact is in part related to the significant increase in the area of some<br />
parishes, thus reducing the density of crimes. In order to underst<strong>and</strong> how it would be the spatial<br />
representation of crime according to the city's population, it was created a criminal incidence rate,<br />
dividing the number of crimes by the population; the results were expressed in ‰.<br />
The data used for the calculation was from 2001, the Population Census conducted by the National<br />
Statistics Institute (INE). It would be appropriate to use more recent values (for example the<br />
population in 2009) but it was not possible due to the fact that the census is made every 10 years.<br />
When it comes to an evaluation of numbers, for example criminal incidence rates, the new<br />
administrative division gives the perception of a decline. The reduction is in part due to the significant<br />
increase in the area of some parishes <strong>and</strong> their residents, thus reducing the incidence rate of crime in<br />
certain districts of the new administrative division.<br />
It is a well know fact that the southern part of the city, corresponding to the downtown district,<br />
correspond to an area that has the highest number of crimes, mainly because it is the center of major<br />
economic, financial <strong>and</strong> commercial activities. But also because it’s the main tourism “spot” in the city,<br />
which triggers criminal activity.<br />
In order to achieve different perspectives when analyzing the crime results across the city, it was<br />
decided to make the sum of the resident population with the mobility of population (population that<br />
enter <strong>and</strong> circulate in the city like daily workers <strong>and</strong> tourists), in the sense that only by analyzing the<br />
220
Paulo João, Jorge Ferreira <strong>and</strong> José Martins<br />
criminal statistics according to the resident population of Lisbon, may be to overemphasize the<br />
intensity of occurrence. Assuming that a large number of resident population plus the other group may<br />
lead to higher crime rates. (Machado, et. al. 2007:138).<br />
Figure 6: Ratio of criminal incidence per 1000 inhabitants in Lisbon<br />
Figure 7: Ratio of criminal incidence per 1000 inhabitants <strong>and</strong> presents in Lisbon<br />
221
Paulo João, Jorge Ferreira <strong>and</strong> José Martins<br />
Looking at the crime rate with the local population, it is possible to observe the emergence of new<br />
parishes with a higher crime rates however, the maximum crime rate is much lower when compared<br />
to the representation only by the resident population.<br />
Finally, it was created a spatial index based on crime incidence <strong>using</strong> spatial statistical tools. This<br />
type of operation should be performed at a micro scale of analysis, statistically equal to subsection<br />
(Martins, 2010), constituting the highest level of disaggregation corresponding to the block in urban<br />
terms (Geirinhas, 2001).<br />
This index was calculated <strong>using</strong> a Geographic Weighted Regression (GWR) <strong>using</strong> spatial context of<br />
dynamic Gaussian Kernel. This operation uses the square root or log of the variables that are<br />
selected for analysis by smoothing the absolute values <strong>and</strong> approximating the curve of normal<br />
distribution in parabolic form, reducing disparities in the distribution (Longley et. al., 2005).<br />
The result is expressed in st<strong>and</strong>ard deviation units, which is repeatedly used as an index of risk<br />
(Harries, 1999). GWR provides a local model of the variable or process you are trying to underst<strong>and</strong><br />
by fitting a regression equation to every feature in the dataset. GWR constructs a separate equation<br />
for every feature in the dataset incorporating the dependent <strong>and</strong> explanatory variables of features<br />
falling within the b<strong>and</strong>width of each target feature.<br />
The shape <strong>and</strong> extent of the b<strong>and</strong>width is dependent on user input for the Kernel type, B<strong>and</strong>width<br />
method, Distance <strong>and</strong> Number of neighbors parameters The dependent variable for the GWR index<br />
consisted on the criminal occurrences <strong>and</strong> as an independent variable it was used as the sum of the<br />
resident population with the mobility of population. It should be noted that this type of analysis can be<br />
a part of numerous independent variables of socio-economic development in order to identify a more<br />
realistic index. For studies with similar scales to parishes it would be appropriate but for larger areas it<br />
would be a difficult task for socio-economic values. It is also important to mention that this type of<br />
procedure (if used alone without performing a normalization of the variables) may generate incorrect<br />
analysis results (Harries, 1999) due to the fact that there are high levels of occurrence in areas with<br />
low population <strong>and</strong> this happens also with a cartographic representation of crime rates.<br />
Figure 8: Spatial index of criminal incidence per 1000 inhabitants (actual <strong>and</strong> planning)<br />
222
Paulo João, Jorge Ferreira <strong>and</strong> José Martins<br />
Looking at the previous representation <strong>and</strong> <strong>using</strong> the GWR operation, it seems obvious a reduction of<br />
higher values of distribution according to population, mainly in certain areas of the new administrative<br />
division.<br />
5. Conclusions <strong>and</strong> future works<br />
The final results of this research can be vital to decide an effective police strategy. The decision to<br />
proceed with this new administrative scenario is so difficult as to decide about new ways to deal with<br />
this new territorial sketch. To decide what bases to consider <strong>and</strong> what technologies to adopt are also<br />
difficult choices.<br />
In recent years, researchers <strong>and</strong> technicians have made huge progresses in harnessing the analytic<br />
capabilities of GIS to track crime patterns over time <strong>and</strong> then use this information to create predictive<br />
models. These advances turned GIS in a valuable tool to assist <strong>and</strong> support decision-making<br />
strategies for the police forces <strong>and</strong> security services.<br />
Now that many law enforcement agencies have adopted crime mapping <strong>and</strong> have begun to produce<br />
the types of tools mentioned, they want more.<br />
The dem<strong>and</strong>s for more sophisticated spatial analytic techniques lead to the research on predictive<br />
models to help the prevention of the “next crime”.<br />
The crime must be examined in the context of threats <strong>and</strong> taking into account assessment of the<br />
demographic, economic, social <strong>and</strong> environmental variables that could affect the criminal act. Just<br />
seeing the real threats <strong>and</strong> developing solutions <strong>using</strong> Geography, GIS <strong>and</strong> multivariate statistics<br />
analysis, we can analyze the current map of criminality.<br />
The advanced spatial analysis came to identify crime patterns <strong>and</strong> vulnerable areas (in terms of<br />
insecurity). This type of research facilitates knowledge in order to take strategic decisions to combat<br />
the criminal phenomena. However, only at micro scale, the criminal data can be considered as useful<br />
to a strategic planning against crime.<br />
Complementing spatial analysis of crime with the empirical knowledge of the historical <strong>and</strong> cultural<br />
components of a given territory, one may identify the reason for the occurrence of a particular type of<br />
crime in a given geographical area <strong>and</strong> therefore planning <strong>and</strong> resources in order to prevent <strong>and</strong><br />
reducing it.<br />
Nowadays, the level of spatial analysis <strong>and</strong> modeling techniques already permit the development of<br />
tactical planning strategies to fight crime. Data gathered in a form of information <strong>and</strong> properly worked<br />
can end up in an effective decision-support tool. And that can only be achieved by a combination of<br />
technology <strong>and</strong> human knowledge.<br />
Univariate methods are limited when we try to underst<strong>and</strong> the criminal occurrences; multivariate<br />
options are more reliable, with the inclusion of other variables.<br />
For police daily work this kind of study is necessary to prepare <strong>and</strong> organize all the resources as well<br />
as to implement decisions.<br />
Criminality is very complex <strong>and</strong> its remarkable dynamic nature is not easy to model with a simple<br />
multivariate statistic method. The help of sociologists <strong>and</strong> other specialized workgroups is also<br />
essential to choose the most correct <strong>and</strong> rigorous statistical models but also crucial to obtain reliable<br />
results. Geography gives the spatial coherence <strong>and</strong> GIS advances explore the true possibilities of<br />
spatial analyses.<br />
References<br />
Ainsworth, P. (2001), Offender Profiling <strong>and</strong> Crime Analysis, UK, Devon, William Publishing.<br />
Anselin, L. et al. (2000), Spatial Analyses of Crime, Criminal Justice: Vol. 4, USA, Washington.<br />
Boba, R. (2009), Crime Analysis with Crime Mapping, SAGE Publications, Inc, California, 2 nd Ed.<br />
Chainey, S. & Tompson, L. (editors) (2008), Crime Mapping Case Studies: Practice <strong>and</strong> Research, John Wiley e<br />
Sons, Engl<strong>and</strong>.<br />
223
Paulo João, Jorge Ferreira <strong>and</strong> José Martins<br />
Eck, J.; Chainey, S.; Cameron, J.; Leitner, M. & Wilson, R. (2005), Mapping Crime: Underst<strong>and</strong>ing Hot Spots,<br />
USA, National Institute of Justice.<br />
Geirinhas, J. (2001) Conceitos e Metodologias - BGRI - Base Geográfica de Referenciação de Informação,<br />
Direcção Regional de Lisboa e Vale do Tejo/INE - 2º Semestre de 2001.<br />
Harries, K. (1999), Mapping Crime: Principle <strong>and</strong> Practice, Washington, DC, NIJ.<br />
Johnson, C. (2000), Crime Mapping <strong>and</strong> Analysis Using GIS. Geomatics 2000: Conference on<br />
Longley, P.; Goodchild, M.; Maguire, D. & hind, D. (2005), Geographic <strong>Information</strong> Systems <strong>and</strong> Science, John<br />
Wiley e Sons, Engl<strong>and</strong>, 2 nd Ed.<br />
Machado, P.; Pereira, A.; Rebelo, M.; Menezes, M.; Craveiro, J. & Santos, A. (2007), Metrópoles Seguras: Bases<br />
para uma Intervenção Multisectorial nas Áreas Metropolitanas de Lisboa e Porto, 2 Volume, Lisboa, LNEC<br />
– MAI.<br />
Martins, J. (2010), Os Sistemas de Informação Geográfica na Gestão da Criminalidade em Portugal, Msc.<br />
dissertation FCSH-UNL, Lisboa.<br />
Ratcliffe, J.H. (2004),Strategic Thinking in Criminal Intelligence. Sydney: Federation Press.<br />
Ratcliffe, J.H. (2005), The effectiveness of police intelligence management: A New Zel<strong>and</strong> case study.<br />
Wilson, R. & Smith, K. (2008), What is Applied Geography for the Study of Crime <strong>and</strong> Public Safety?, in<br />
Geography & Public Safety, Vol. 1, Issue 1, February 2008, Washington, DC, COPS, NIJ, U.S. Department<br />
of Justice, pp.1–3.<br />
224
Mobile Virtual Network Operator <strong>Information</strong> Systems for<br />
Increased Sustainability in Utilities<br />
Hallur Leivsgarð Joensen <strong>and</strong> Torben Tambo<br />
Aarhus University, Herning, Denmark<br />
U06HallurJo@hih.au.dk<br />
torbento@hih.au.dk<br />
Abstract: In today’s research on creating a more sustainable energy utilisation in society, much effort is directed<br />
towards producing or consuming energy. This focus tends to overlook the fact that energy needs to be sold <strong>and</strong><br />
distributed to the consumers in increasingly open marketplaces where the marketing, sales <strong>and</strong> buying processes<br />
are separated from physical networks <strong>and</strong> energy production. This study aims to characterise <strong>and</strong> evaluate<br />
information systems supporting the transformation of the free market-orientation of energy <strong>and</strong> provision of<br />
utilities in a cross-sectorial proposition known as Mobile Virtual Network Operator (MVNO). Emphasis is<br />
particularly on st<strong>and</strong>ardised information systems for automatically linking consumers, sellers <strong>and</strong> integration of<br />
network infrastructure actors. The method used is a feasibility study assessing business <strong>and</strong> information<br />
processes of a forthcoming utilities market player. The method additionally includes interviews, ontological<br />
mapping <strong>and</strong> quantitative business process readiness assessment. The information systems approach adds an<br />
intermediary layer to ‘traditional’ green IS emphasising the collaborative market participation approach. The<br />
required simplification of customer relations contained in the evaluated IS highlights a sharpened ontology of the<br />
business context beneficial to further the ‘greening’ of the power grid. Intra- <strong>and</strong> inter-organisational<br />
communication must be included in the IS research framework. The findings are centralised on underst<strong>and</strong>ing<br />
energy sales from efficiency of business processes, underlying information systems, <strong>and</strong> the ability to make the<br />
link from consumption to cost visual <strong>and</strong> transparent to consumers. The conclusion is that the energy sector<br />
should look into other sectors <strong>and</strong> learn from information systems which ease up business processes along with<br />
attractive consumer interfaces much more than today. However, further research is required to underst<strong>and</strong><br />
deeper feasibility among broader demographics <strong>and</strong> closer linking to smart grids.<br />
Keywords: information systems, business-to-consumer, sustainability, business process, utility sales, energy<br />
distribution<br />
1. Introduction<br />
Increased pressure to reduce the CO2 footprint of the modern life calls for new <strong>and</strong> highly innovative<br />
solutions (Edinger & Kaul 2010), including intelligent use of information systems (Melville 2010). Much<br />
effort to reduce CO2 revolves around renewable energy production, storage technologies (electric<br />
cars, heat pumps) <strong>and</strong> more efficient consumption of energy (LED lamps, low energy freezer, etc.).<br />
Less effort to reduce CO2 is spent on the sales <strong>and</strong> distribution of cleaner energy, particularly when it<br />
comes to household consumers (Kranz 2010). However, large-scale information system initiatives<br />
exist within overall distribution <strong>and</strong> balancing of power, generally known as smart grids (Bhanhoo<br />
2010, Joosting 2010). Governmental influence, funding <strong>and</strong> behavioural initiatives, among others,<br />
<strong>using</strong> taxation <strong>and</strong> subsidies strongly influence all parts of the energy system (Luiten et al. 2006,<br />
Bishop et al 2010, Foxon <strong>and</strong> Pearson 2008, Harbone & Hendry 2009, King et al 1996). The open<br />
market discussion further on in this paper should be regarded with the reservation that governmental<br />
influence <strong>and</strong> direct <strong>and</strong> indirect regulation are prevalent in all utility sectors (Windfield et al. 2010).<br />
Transformation in the energy sector could use inspiration from other government-regulated areas with<br />
more agility of the market dynamics to obtain change <strong>and</strong> restructuring (Harmon et al. 2010, King et<br />
al. 1996, Tsoutsos & Stamboulis 2005).<br />
Exchange of energy is concurrently with the quest for increased sustainability to be left to open<br />
markets where the difference between old <strong>and</strong> new in this segment is that earlier, a consumer was<br />
bound to a certain supplier. Today, most utilities markets are deregulated <strong>and</strong> liberalised giving the<br />
consumer a host of possibilities for choosing suppliers (Switzer & Trout 2007). During the sales<br />
process of energy, utilities typically have to use complex front <strong>and</strong> back office systems for servicing<br />
<strong>and</strong> transferring customers among them. Between periods of supplier shifts <strong>and</strong> 4-12 yearly invoices,<br />
consumers pay very little attention to energy consumption, <strong>and</strong> information retrieval from utility<br />
companies is difficult <strong>and</strong> time-consuming. Customer services can tie up many resources. Also, back<br />
office functions may involve manual interacting among several parties: Cable owners, enablers,<br />
partnerships, past seller, new seller, various core, backbone <strong>and</strong> financial institutions.<br />
225
Hallur Leivsgarð Joensen <strong>and</strong> Torben Tambo<br />
The burning platform can be described as a missing link between consumers, old style sellers, new<br />
market actors <strong>and</strong> top-level system responsible organisations. This paper is to analyse novel<br />
information system-based approaches in reshaping the utilities market believing that new actors <strong>and</strong><br />
more efficient <strong>and</strong> engaging information systems can influence the consumer’s attitude toward<br />
greener energy in a better way. The scene is highly different among countries depending on criticality,<br />
loyalty to monopoly, pricing policies <strong>and</strong> e.g. use of electric heating (Olsen et al. 2006). <strong>Information</strong><br />
systems for supporting consumers, front office <strong>and</strong> back office function in the energy selling<br />
organisations should ideally be very efficient, very transparent <strong>and</strong> very adaptive <strong>and</strong> even make it a<br />
little fun to be customer. <strong>Information</strong> systems are generally viewed out of their usefulness in<br />
application <strong>and</strong> business contexts (Alter 2008). Cross-industry learning follows the seminal<br />
contribution of Pollit (2010) suggesting successful concepts of the mobile telecom industry<br />
transplanted into the utility. Looking at information systems <strong>and</strong> information technology components to<br />
promote sustainability is proposed by several authors (Chilamkurti et al. 2009, Dominguez 2010).<br />
In this paper, utilities <strong>and</strong> energy are used mostly associated with electricity, but should generally be<br />
abstracted into gas, district heating, water, sewage, cooling <strong>and</strong> similar network-carried resources<br />
typically provided through Public Service Obligation (PSO) regimes.<br />
2. Theory<br />
About 2008, Green IT was a major theme in IT investment <strong>and</strong> formulation of strategies (Harmon &<br />
Auseklis 2007, Jenkin 2010, Murugesan 2008). The importance of focus lies much more in green<br />
information systems where applicability, relevance <strong>and</strong> results come to dominance. This is seen with<br />
the worldwide governmentally-induced investments in smart grid technologies <strong>and</strong> broad-ranging<br />
sustainability management information systems (Misund 2010). Smart grids are – beyond the<br />
aforementioned huge investments – a cornerstone in the dyadic relationship between information<br />
systems <strong>and</strong> energy systems (Ilic 2010, Borzachiello et al. 2009). Green IT <strong>and</strong> development of<br />
information systems for increased sustainability must also be viewed in the context of innovation of<br />
the society (Herring & Roy 2007). Governmental interests might additionally include the sustainability<br />
under the umbrella of security (Department of Homel<strong>and</strong> Security 2010). Chetty et al. (2008) stress<br />
the necessity to engage households in resource management with social consciousness. The<br />
technological family of green IT is by several authors presented both in a narrower IT infrastructure<br />
context, a broader context of society, <strong>and</strong> a continuum among them with several shared technologies,<br />
such as the IP network, is seen (Hilty et al. 2005). Green IT must still be expected to remain on the<br />
agenda (Su & Al-Hakim 2010).<br />
When looking into the gap between consumers <strong>and</strong> producers of energy, few authors address<br />
realistic <strong>and</strong> straightforward information systems approaches linking actors, <strong>and</strong> supporting sale of<br />
energy is market-driven. Pollit (2010) is an important exception is his suggestion to transfer<br />
successful concepts of the mobile phone industry to utilities, with this also supported in (Kranz et al.<br />
2010, Switzer <strong>and</strong> Trout 2007). Pollit uses the analogy the original monopoly companies owning the<br />
Metallic Path Facility (MPF) as a typology to Mobile Network Operator (MNO), being forced by<br />
legislators to a higher degree of Local Loop Unbundling (LLU) (Kunneke <strong>and</strong> Fens 2007), <strong>and</strong> more<br />
diverse entities with a narrower <strong>and</strong> specialised area of working have emerged:<br />
Figure 1: Ownership unbundling in the electricity industry (Kunneke <strong>and</strong> Fens 2007)<br />
226
Hallur Leivsgarð Joensen <strong>and</strong> Torben Tambo<br />
Throughout this paper, the <strong>Information</strong> Systems as Work Systems of Alter (2008) is predominant, as<br />
uses Alter’s definition is simplicity, clarity, scope, systematic power, explanatory power, reliability &<br />
validity <strong>and</strong> fruitfulness. Bengtsson & Ågerfalk (2011) highlight the necessity of information system<br />
thinking in transformation of society’s resource utilisation. Borzachiello et al. (2009) construct an<br />
information systems architecture in underst<strong>and</strong>ing transformation towards sustainability. Clemons<br />
(1986) describes information system in a role of creating strategic differentiation in a context of<br />
strategic planning. Haigh & Griffith (2008) take this discussion further on in looking at environmental<br />
sustainability of information systems with the management of technology lens. Halfawy et al. (2008)<br />
take the helicopter perspective in looking at information systems for the observation of cities <strong>and</strong><br />
similar social structures as resource transformers with environmental impact. Interest in IS<br />
perspectives on remodelling society’s energy sector <strong>and</strong> environmental impact has still a broad<br />
orientation with information <strong>and</strong> communication technology as platform (Scheiber 2010). Other<br />
frameworks for development of information systems to support greener energy systems are presented<br />
in (Huang 2009, Jenkin et al. 2010, Nolin 2010).<br />
Alter’s (2008) suggestions include usefulness <strong>and</strong> business process support. Consumers’ behaviour<br />
still seems to be a major barrier in the transformation of the energy system, <strong>and</strong> acceptance <strong>and</strong><br />
inclusion of technologies such as smart meters in daily life move on at slow rate (Kranz et al. 2010).<br />
Strong development effort still aims at transforming citizens into relevant actors in increased<br />
sustainability of the utility sector (Hilty et al. 2005). Acceptance is strongly linked to social <strong>and</strong> cultural<br />
backgrounds, <strong>and</strong> design <strong>and</strong> orientation of IS must lean towards this issue (Sage 1999, Sharma &<br />
Ruud 2003, Schmidt et al. 2009). Barrier studies are further purported in Foxon & Pearson (2008).<br />
Formerly, there was a direct relationship between manufacturing, transportation <strong>and</strong> sale of energy. In<br />
the industrialised world, this has been dissolved largely in these three components due to<br />
deregulation <strong>and</strong> liberation of the utilities market (Hämäläinen et al. 2000). Free actors <strong>and</strong><br />
independent traders are allowed to sell energy <strong>using</strong> any network, making this the actual point-of-sale<br />
in deciding for more or less green energy; eco-labelling of energy is imposing challenges of credibility<br />
as brought forward by Banerjee & Solomon (2003).<br />
The telecom industry might serve as inspiration for the energy supplying utilities. Particularly the<br />
mobile telecom industry has undergone tremendous growth worldwide, <strong>and</strong> a plethora of business<br />
models, customer offerings <strong>and</strong> market player behaviours exist despite the recent divesture from<br />
traditional governmentally run monopolies. The appearance of mobile virtual network operators<br />
(MVNO) has harvested new customer groups among young <strong>and</strong> web-savvy consumers. Shin (2010)<br />
describes the worldwide diffusion of the concept from the Nordic countries. PRWEB (2010) describes<br />
a growth towards 188 mill subscribers; here it is important to notice that by nature, none of these<br />
operators own their own networks, <strong>and</strong> as such act unbundled from older, hardwired market actors<br />
(Peppard & Ryl<strong>and</strong>er 2006, Posttchi & Hufenbach 2009, Cadre & Bouhtou 2010, Duan et al. 2010).<br />
A contributing factor to the success of MVNO is the heavily reduced supplier switching cost. Maicas et<br />
al. (2009) describe the cost reduction in terms of competitive edge gained by IS-supported<br />
effectiveness of identity portability.<br />
3. Method<br />
The overall approach used is a mixed-method where quantitative data are viewed from a postpositivistic<br />
approach while qualitative data is viewed with an interpretivistic approach. System<br />
theoretic approaches are applied to the underst<strong>and</strong>ing of flows in business processes inspired by<br />
Business Process Network Modelling (BPMN) (Wu 2002, Smart et al. 2008, Ko 2009, Hill et al. 2008).<br />
The research area throughout this project is the employees of PowerCo <strong>and</strong> their working processes,<br />
as they are representative for the same in the future PowerCoSales. Essential factors in regards to<br />
methodology is the project awareness <strong>and</strong> recognition among PowerCo employees, as these in<br />
principle can result in lay-offs due to the system’s expected efficiency.<br />
Primary data will be acquired in shape of a questionnaire, interviews <strong>and</strong> observation. The approach<br />
towards the questionnaire is deductive, since known secondary data, in shape of Abdolvan’s (2008)<br />
theory, is used quantitatively as benchmarking. All interviews are unstructured or semi-structured as<br />
they are conducted with the purpose to obtain knowledge. These interviews are conducted with<br />
experts <strong>and</strong> consist of following an order process from request to invoice to fully comprehend the<br />
227
Hallur Leivsgarð Joensen <strong>and</strong> Torben Tambo<br />
existing processes. The observation itself is conducted with an inductive approach as best practice<br />
needs to be specified <strong>and</strong> recognised. This is complemented by <strong>using</strong> role-playing, asking each<br />
employee observed to explain every task on the go, as if the author is a new employee that needs<br />
training. The feasibility study of the software products fit with the business processes can be<br />
illustrated like this:<br />
Figure 2: Feasibility framework<br />
Secondary data is primarily acquired from the industry association (Dansk Energi) <strong>and</strong> the overall<br />
system responsible operator (Energinet.dk). As the energy legislators enforcing entity, they are<br />
regarded as a highly trusted source.<br />
Due to the size <strong>and</strong> limited duration of the project, only selected aspects will be taken into account.<br />
Despite the customer-oriented view, customer research is not directly included in this report, since<br />
focus is on the core internal work processes. However, PowerCoSales’ strategy is deeply focused on<br />
needs of free moving customers. This is an evaluation study <strong>and</strong> actual implementation is beyond the<br />
scope although mock-ups <strong>and</strong> proof-of-concept installations have been used for the evaluation.<br />
Delimitation: Conclusions are applicable for most sizes of free-market electricity dealers with a fairly<br />
regulated national backbone/infrastructure <strong>and</strong> a deregulated consumer market. Given the nature of<br />
the concrete organisational assessment presented here, a company specific element exists on the<br />
further applicability.<br />
4. Case study<br />
PowerCo is a Danish electricity trader <strong>and</strong> solutions provider founded in 2005 mainly for selling<br />
electricity in the B2B segment for larger, deregulated customers. PowerCo is owned by 10 local,<br />
smaller electricity distributors still operating under Public Service Obligations (PSO) regimes with<br />
approximately 175.000 subscribers. Legislation prohibits these smaller distributors from more direct<br />
market-driven competition. PowerCo is increasingly meant to be the competitive arm of the owner<br />
organisations. As PowerCo was settled around B2B sales, only large volumes were sold to relatively<br />
few customers with complex requirements. Thus, PowerCo’s business processes are not streamlined<br />
to manage large amounts of household customers (B2C) in an increasingly competitive market.<br />
PowerCo went to establish PowerCoSales as a business-to-consumer unit. Looking at available<br />
software solutions for PowerCoSales, most were found system-oriented <strong>and</strong> not customer-oriented.<br />
To make an efficient operating framework of PowerCoSales, the process was directed to look outside<br />
of the traditional utilities industry. Here, PowerCo was offered a software system from a company<br />
originally developed out of an innovative mobile phone company in line with the experience <strong>and</strong><br />
recommendations of Pollit (2010). The mobile phone concept was known as Mobile Virtual Network<br />
228
Hallur Leivsgarð Joensen <strong>and</strong> Torben Tambo<br />
Operator (MVNO). The software was named MVNOSoft <strong>and</strong> the company name was MVNOCo<br />
(MVNO 2010). The engagement was unique in the sense that MVNOCo hadn’t work with electricity<br />
before <strong>and</strong> PowerCo hadn’t worked with B2C <strong>and</strong> the MVNO concept before; furthermore were the<br />
most B2C utilities software industry-dedicated, legacy <strong>and</strong> in no way inciting consumers to costconsciousness<br />
<strong>and</strong> green consumption.<br />
With MVNO, a market actor in the telecom industry can establish itself without having or operating a<br />
network. MVNOCo markets this as “start your own telecom company” (MVNO 2010, Utilibil 2010). The<br />
threshold to enter <strong>and</strong> penetrate the market is significantly lowered for new actors including small<br />
companies, <strong>and</strong> traditional actors of complete different businesses, such as retailers of coffee,<br />
clothes, home electronics, or industry-dedicated actors of e.g. construction, agriculture.<br />
MVNOCo offered PowerCo implementation on fixed time <strong>and</strong> price based on a feasibility study, a<br />
requirement specification process <strong>and</strong> an integration requirement analysis. The feasibility study was<br />
based on the lenses of Total Quality <strong>Management</strong> (TQM), Business Process Re-Design &<br />
Reengineering (BPR) <strong>and</strong> Business Process <strong>Management</strong> (BPM) (Hanafizadeh et. al, 2009; Hammer<br />
et. al, 1993; Kettinger et. al, 1997; Valiris et. al, 1999).<br />
TQM is claimed to be less relevant for this project, as it emphasises an incremental <strong>and</strong> continuous<br />
level of change. These TQM terms are difficult to claim valid in a project of replicating core aspects in<br />
one industry to another, which furthermore are expected to gain substantial competitive advantage.<br />
However, TQM forms a bearing point in the discussion of Joensen (2010).<br />
The BPR initiatives face two challenges; technical <strong>and</strong> socio-cultural challenges where technical is the<br />
development <strong>and</strong> design of the business process, while socio-cultural is the organisational effects on<br />
involved individuals (Reijers <strong>and</strong> Goverde 2005). Socio-cultural challenges, such as management of<br />
change, project management <strong>and</strong> strategic management (Cummings <strong>and</strong> Worley 2008) are limited in<br />
this project, as focus will be more on techno-structural changes in terms of activities conducted in key<br />
business processes.<br />
The MVNO project can be additionally specified on Re-Design <strong>and</strong> Re-engineering by <strong>using</strong> the<br />
process type definitions on selected implication degrees (Macdonald, 1995):<br />
Figure 3: Positioning of MVNO within MacDonald’s (1995) process type definitions<br />
The MVNO-project is expected to have a medium degree of executive involvement <strong>and</strong> a medium<br />
time <strong>and</strong> cost to improvement while all the other factors are fairly high. The project can both be<br />
defined as a Re-Design <strong>and</strong> Re-Engineering project as PowerCoSales currently is a company without<br />
229
Hallur Leivsgarð Joensen <strong>and</strong> Torben Tambo<br />
employees, <strong>and</strong> this ultimately reduces the risk <strong>and</strong> degree of change. Re-engineering has a broader<br />
domain than Re-design <strong>and</strong> involves all reconstruction dimensions of the organisation from change<br />
management to project management (Hanafizadeh et. al, 2009), <strong>and</strong> can be claimed to be more valid<br />
to PowerCo <strong>using</strong> Mansar <strong>and</strong> Reijers (2007).<br />
The starting point for the BPR-project is with Davenport (1994) the claim for emphasises on certain<br />
use of existing processes <strong>and</strong> clear differentiation from the BPR founders original exhortation “Don’t<br />
automate, obliterate” (Hammer, 1993), <strong>and</strong> moves towards a degree of current practice recognition. In<br />
terms of application, it is now claimed that best practices which align with organisation strategies <strong>and</strong><br />
technical challenges should be applied (Hanafizadeh, 2009).<br />
Essential actions <strong>and</strong> results of the research process:<br />
Making workshops with MVNOSoft to operative personnel with business process insight. (26<br />
persons)<br />
Conducting a number of workshops with selected groups on mock-ups of MVNOSoft with follow<br />
on in-depth interviews. (3 x 3 persons)<br />
Identifying a number of current business processes; documenting these<br />
Comparing with business processes already supported by MVNOSoft<br />
Assessment of problem areas in move from B2B to B2C<br />
Selecting the process of shifting customers as a sample<br />
Indepth analysis of this process with users above<br />
Through mock-ups time consumption was identified to be possible to reduce from 56 minutes to<br />
12 minutes. Given forthcoming features in national infrastructure even lower figures could be<br />
reached.<br />
Consumers were not approached since MVNOSoft had a proven track record, although consumer<br />
behaviour was mapped from the experiences of the owner companies of PowerCo<br />
The MVNO feasibility study within PowerCo <strong>and</strong> PowerCoSales proved a strong alignment between<br />
business processes in most fields. Unique identity of customers, technological artefacts, customer<br />
relations, master data <strong>and</strong> shifting customers were proven to impose minor challenges in adapting<br />
<strong>and</strong> implementing the technology. Momentarily the project is postponed, as the back office integration<br />
given in the mobile phone system (GSM) seemed absent in the utilities sector. A major project to<br />
establish such an infrastructure was launched from the political/regulatory system during the feasibility<br />
study <strong>and</strong> is further described in Energinet.dk (2010). When the complete national <strong>and</strong> Nordic (or EU)<br />
information infrastructure is in place expectedly around 2012, the project is presumed to proceed.<br />
5. Discussion<br />
Greener energy implies a large range of aspects where research <strong>and</strong> media interest have mostly<br />
been on production <strong>and</strong> consumption. The B2C marketplace in many economies is still not<br />
contributing significantly to the process of greening. The feasibility of MVNO software <strong>and</strong> business<br />
processes has been the object of this study. MVNO provides a straightforward connection between<br />
traders, consumers, infrastructure operators <strong>and</strong> wholesalers. MVNO disconnects the strong link<br />
between physical infrastructure <strong>and</strong> the consumer.<br />
Green IT inspired by IT infrastructure (Harmon & Auseklis 2007) evolves into information systems for<br />
broader initiatives of sustainability in society (Borzachiello et al. 2009, Halfawy et al. 2004, Huang<br />
2009). Efficient information systems for the utility sector must be regarded with a view of<br />
transformation, innovation <strong>and</strong> change. Efficient information systems are expected to lower h<strong>and</strong>ling<br />
costs <strong>and</strong> ease penetration of new market players. Eco-labelling can easier be introduced (Banerjee<br />
<strong>and</strong> Solomon 2003). The Strompreise.de (2010) shows labelling in the electricity market generally<br />
distributed over the labels of<br />
Renewable energy (hydro, wind)<br />
Nuclear labelled with micrograms of high <strong>and</strong> low radioactive nuclear waste<br />
Thermal energy based on gas, coal <strong>and</strong> oil labelled with CO2 emission.<br />
230
Hallur Leivsgarð Joensen <strong>and</strong> Torben Tambo<br />
The Modstrøm.dk (2010) case has introduced several eco-oriented utility packages on the market,<br />
e.g. zero cost during the night, <strong>and</strong> CO2 donations to the developing countries in the billing scheme.<br />
Several authors discuss potentials <strong>and</strong> difficulties of technology acceptance of ICT in increasing<br />
households’ awareness on utility consumption (Kranz et al 2010, Olsen et al 2006, Hämäläinen et al<br />
2000). With the experiences from the cell phone industry, the MVNO concept has proved to be a fast<br />
vehicle for embedding of smart metering <strong>and</strong> smart grid in regular consumer behaviour.<br />
The feasibility study of MVNO has concluded:<br />
Adequate similarity between business processes <strong>and</strong> systems architecture in electricity <strong>and</strong><br />
mobile phone business (Pollit 2010, Posttchi <strong>and</strong> Hufenbach 2009)<br />
Good alignment with business processes of the B2C utility company (PowerCoSales) <strong>using</strong> the<br />
business process readiness approach (Abdolvan et al. 2008, Hanafizade et al 2009, Kettinger<br />
1997, Mansar & Reijers 2007)<br />
Fine level of technology acceptance within demographic group normally with less interest in<br />
metered utilities – proven in the mobile telecom market<br />
Swiss-army knife of free actors of deregulated markets<br />
Potential <strong>and</strong> suited vehicle for environmental transparency with learnings from micro billing in<br />
telecoms (Utilibill 2010, Shin 2010)<br />
The case is not directed towards green energy in first instance. The MVNO initiative should be<br />
observed more general, as it has established itself with the telecom business providing “micro billing”<br />
to the consumer <strong>and</strong> henceforth offers full transparency in the billing scheme – <strong>and</strong> subsequently<br />
environmental impact. Implementation of concepts like the German Strompreise (2010) <strong>and</strong> the<br />
Danish Modstrøm (2010) would issue no particular barriers.<br />
The case resolved that the information system MVNOSoft provided a fine support of the business –<br />
consumer relationship introducing web-based consumer self-service / full-service, EDI-services, actor<br />
linking <strong>and</strong> back-office integration. Initiatives towards smart grid <strong>and</strong> smart metering (Kranz, 2010)<br />
would be much better helped <strong>using</strong> MVNO style technologies creating strong, visual links between<br />
consumer’s cost <strong>and</strong> benefits. An information system perspective is driving in the underst<strong>and</strong>ing of<br />
the technological <strong>and</strong> organisational implications of the case with a research process indicated in<br />
figure 2. Inter- <strong>and</strong> intra-organisational user definitions must be considered: Existing-consumers-asweb-users,<br />
potential-consumers-as-web-users, front office customers service agents <strong>and</strong> back office<br />
systems along with potential technical staff in data integration <strong>and</strong> operation. This study has mostly<br />
highlighted service agents from their versatility of knowing both consumers <strong>and</strong> back office<br />
considerations. <strong>Information</strong> systems fundamentals have been proven with factors as e.g. simplicity,<br />
clarity, systematic power <strong>and</strong> explanatory power.<br />
6. Conclusion<br />
Utilities are the centre in the promotion of a greener society. Utilities are reshaping – figure 1 - from a<br />
monopoly-thinking with isolated information systems often vintage <strong>and</strong> bespoke, or information<br />
systems not adapted for linking customer <strong>and</strong> market smoothly. The utilities are in a key position to<br />
promote, change <strong>and</strong> sustain the environmental impact of every day’s energy consumption. Smarter<br />
information systems are the way forward. The MVNO concept has been reviewed in the current study.<br />
The MVNO has gained tremendous popularity in the telecom industry. The study provides reasonable<br />
evidence that MVNO is a very feasible solution to energy sales <strong>and</strong> administration with regards to<br />
business concepts <strong>and</strong> business processes. Suggestions for further research lie in fields of long-term<br />
use <strong>and</strong> acceptance of various administrative <strong>and</strong> customer-oriented systems in the energy sector.<br />
With the overwhelming investments in smart grid technologies, a new mind-set <strong>and</strong> new technologies<br />
are required to include household consumers in reducing the environmental footprint; relevant<br />
information systems as described here could be a strong part of this. Comparative studies of energy<br />
consciousness <strong>and</strong> CO2 footprint of energy systems, markets <strong>and</strong> consumers <strong>using</strong> different<br />
information systems would be highly interesting. Currently, information systems addressing<br />
demographics with other technology acceptance profiles need to be studied.<br />
Finally, the described similarity between mobile phone <strong>and</strong> energy markets forms the platform of<br />
discussion in this paper. One information system supporting identity management, supplier switching,<br />
subscriber services, multi-facetted billing schemes, self-service, a strong use of electronic messaging<br />
231
Hallur Leivsgarð Joensen <strong>and</strong> Torben Tambo<br />
for back office automation add up the key concepts that could help household in underst<strong>and</strong>ing <strong>and</strong><br />
planning for a more sustainable use of energy. With relevant reservations to the research process,<br />
this study has evaluated the MVNO type of information systems <strong>and</strong> proposes this as feasible to solve<br />
the consumer gap for selected demographics in green <strong>and</strong> smart energy.<br />
References<br />
Abdolvan, N. et al. (2008) “Assessing readiness for Business Process Reengineering”, BPM Journal, Vol.14,<br />
No.4<br />
Alter, S. (2008) “Defining information systems as work systems”, Eur.Journal of <strong>Information</strong> Systems, Vol.17,<br />
pp.448–469.<br />
Banerjee, A. <strong>and</strong> Solomon, B.D. (2003) “Eco-labeling for energy efficiency <strong>and</strong> sustainability”, Energy Policy,<br />
Vol.31, pp.109–123.<br />
Bengtsson, F. <strong>and</strong> Ågerfalk, P. J. (2011) “<strong>Information</strong> technology as a change actant in sustainability innovation”,<br />
Journal of Strategic InfSys Vol.20, pp. 96–112.<br />
Bhanhoo, S.N. (2010) “China’s Smart Grid Investments Growing”, New York Times, February 1, 2010.<br />
Bishop, J. et al. (2010) “Linking energy policy, electricity generation <strong>and</strong> transmission <strong>using</strong> strong sustainability<br />
<strong>and</strong> co-optimization”, Electric Power Systems Research, Vol.80, pp 633–641.<br />
Borzacchiello, M.T., Torrieri, V. <strong>and</strong> Nijkamp, P. (2009) “An operational information systems architecture for<br />
assessing sustainable transportation planning”, Evaluation <strong>and</strong> Program Planning,Vol.32, pp.381–389.<br />
Cadre, H. <strong>and</strong> Bouhtou, M. (2010) “An interconnection game between mobile network operators”, Computer<br />
Networks, Vol.54, pp.2913–2942<br />
Chetty, M., Tran, D. <strong>and</strong> Grinter, R. (2008) “Getting to Green: Underst<strong>and</strong>ing Resource Consumption in the<br />
Home”. Proc. UbiComp '08.<br />
Chilamkurti, N. et al. (2009) “Green Networking for Major Components of <strong>Information</strong> Communication Technology<br />
Systems”. Journal on Wireless Communications <strong>and</strong> Networking.<br />
Clemons, E. (1986) “<strong>Information</strong> Systems for Sustainable Competitive Advantage”. <strong>Information</strong> & <strong>Management</strong>,<br />
Vol.11, pp.131-136.<br />
Cummings <strong>and</strong> Worley (2008). Organizational Development <strong>and</strong> change, 9th edition, South-Western Cengage<br />
Learning.<br />
Davenport, T.H. (1994) "Reengineering: Business Change of Mythic Proportions?" MIS Quarterly,<br />
Department of Homel<strong>and</strong> Security (2010) “Environmental Sustainability <strong>Information</strong> System”<br />
Dominguez, F. (2010) “Water scarcity: Can virtual water help?” Utilities Policy, Vol.18 , pp.129-134<br />
Duan, L., Huang, J. <strong>and</strong> Shou, B. (2010) “Cognitive Mobile Virtual Network Operator: Investment <strong>and</strong> Pricing with<br />
Supply Uncertainty”. Proc. IEEE INFOCOM.<br />
Edinger, R. <strong>and</strong> Kaul, S. (2000) “Humankind's detour toward sustainability: past, present, <strong>and</strong> future of renewable<br />
energies”, Renewable <strong>and</strong> Sustainable Energy Reviews. Vol.4, pp 295-313.<br />
Energinet.dk (2010) DataHub. [online] http://www.energinet.dk/DA/El/ Datahub/Sider/ DataHub.aspx<br />
Foxon, T. <strong>and</strong> Pearson, P. (2008) “Overcoming barriers to innovation <strong>and</strong> diffusion of cleaner technologies”,<br />
Journal of Cleaner Production, Vol.16, pp.148-161.<br />
Haigh, N.L. <strong>and</strong> Griffiths, A. (2008) “The Environmental Sustainability of <strong>Information</strong> Systems”, International<br />
Journal of Technology <strong>Management</strong>,. Vol.43, No.1-3, pp.48-63.<br />
Halfawy, M.R., Vanier, D.J. <strong>and</strong> Hubble, D. (2004) “Integration of municipal information systems for sustainable<br />
management of infrastructure assets”. EnvInfArch, Vol.2, pp.375-386<br />
Hämäläinen, R. et al. (2000) “Cooperative consumers in a deregulated electricity market” Energy - The<br />
International Journal, Vol.25, pp.857-875.<br />
Hammer, M. <strong>and</strong> Champy, J. (1993), Reengineering the corporate: A manifesto for Business Revolution, Harper<br />
Business Edition, New York, NY.<br />
Hanafizade, P., Moosakhani, M. <strong>and</strong> Bakhshi, J. (2009). “Selecting the best strategic practices for business<br />
process re-design”. Business Process <strong>Management</strong> Journal, Vol.15, pp 609-627.<br />
Harborne, P. <strong>and</strong> Hendry, C. (2009) “Pathways to commercial wind power in the US, Europe <strong>and</strong> Japan” Energy<br />
Policy 37, pp.3580–3595<br />
Harmon, R., Daim, T. <strong>and</strong> Raffo, D., (2010) “Roadmapping the Future of Sustainable IT”. PICMET<br />
Harmon, R. <strong>and</strong> Auseklis, N., (2009) “Sustainable IT Services: Assessing the Impact of Green Computing<br />
Practices. PICMET”, Portl<strong>and</strong>.<br />
Herring, H. <strong>and</strong> Roy, R. (2007) “Technological innovation, energy efficient design <strong>and</strong> the rebound effect”.<br />
Technovation Vol.27, pp.194–203<br />
Hill, J.B. et al. (2008) Findings: Confusion remains regarding BPM terminologies. Gartner Research.<br />
Hilty, Seifert <strong>and</strong> Treibert (eds) (2005) “<strong>Information</strong> Systems for Sustainable Development”. IGI<br />
Huang, A.H. (2009) “A model for environmentally sustainable information systems development”. Journal of<br />
Computer <strong>Information</strong> Systems, Summer 2009<br />
Ilic, M. (2010) “Transforming SCADA into Dynamic Monitoring <strong>and</strong> Decision Systems (DYMONDS)”. Power <strong>and</strong><br />
Energy Society General Meeting, 2010 IEEE<br />
Jenkin, T., Webster, J. <strong>and</strong> MacShane, L. (2011) An agenda for ‘Green’ information technology <strong>and</strong> systems<br />
research. <strong>Information</strong> <strong>and</strong> Organization Vol 21, pp.21-40.<br />
Joosting, J.-P. (2010) “Smart grid spending expected to top $45 billion by 2015”. EE Times. July 8<br />
232
Hallur Leivsgarð Joensen <strong>and</strong> Torben Tambo<br />
Kettinger, W.J., et al. (1997) “Business process change: a study of practiceology, techniques <strong>and</strong> tools”, MIS<br />
Quarterly, Vol.21 No.1, pp.44-80.<br />
King, Heffner, Johansen <strong>and</strong> Kick (1996) Public Purpose Energy Efficiency Programs <strong>and</strong> Utilities in Restructured<br />
Markets. July 96. The Electricity Journal<br />
Kranz, Gallenkamp <strong>and</strong> Picot (2010) “Power control to the people? Private consumers’ Acceptance of smart<br />
meters”. 18th EurConf on <strong>Information</strong> Systems<br />
Ko, R.K.L (2009) “A computer scientist's introductory guide to business process management (BPM)”,<br />
Crossroads, Vol.15 , No.4<br />
Kunneke, R. <strong>and</strong> Fens, T. (2007). “Ownership unbundling in electricity distribution: The case of the Netherl<strong>and</strong>s”,<br />
Energy policy Vol.35<br />
Luiten, Lente <strong>and</strong> Klok (2006) “Slow technologies <strong>and</strong> government intervention”, Technovation, Vol.26, pp.1029–<br />
1044.<br />
Joensen, H.L. (2010) Replicating parts of the telecom industry in the B2C utilities market, Project Report, Aarhus<br />
University<br />
Macdonald, J. (1995), “Together TQM & BPR are winners”, TQM Magazine, Vol.7 No.3, pp.21-25.<br />
Maicas, Polo <strong>and</strong> Sese (2009) “Reducing the level of switching costs in mobile communications”,<br />
Telecommunications Policy, Vol.33, pp.544–554.<br />
Mansar, L.S. <strong>and</strong> Reijers, H.A. (2007), “Best practices in business process redesign: use <strong>and</strong> impact”, Business<br />
Process <strong>Management</strong> Journal, Vol.13, No.3, pp.193-213.<br />
Melville (2010) <strong>Information</strong> Systems Innovation For Environmental Sustainability. MIS Quarterly Vol.34 No.1,<br />
pp.1-21/March 2010<br />
Misund, G. <strong>and</strong> Høiberg, J. (2010) Sustainable <strong>Information</strong> Technology for Global Sustainability.<br />
http://www.ia.hiof.no/~gunnarmi/omd/dig_earth_03/<br />
Modstrøm (2010) Modstrøm – det klimavenlige energiselskab. Retrieved from https://www.modstroem.dk/privat<br />
Murugesan, S. (2008) Harnessing Green IT: Principles <strong>and</strong> Practices. IT Pro January/February.<br />
MVNO (2010) Start your own telecommunications company. http://www.mvno.dk/49/engforside<br />
Nolin, J. (2010) Sustainable information <strong>and</strong> information science. <strong>Information</strong> Research, Vol.15 No.2.<br />
Olsen, Johnsen <strong>and</strong> Lewis (2006) A Mixed Nordic Experience: Implementing Competitive Retail Electricity<br />
Markets for Household Customers. The Electricity Journal, 19, 9, pp 37 - 44<br />
Peppard, J. <strong>and</strong> Ryl<strong>and</strong>er, A. (2006) From Value Chain to Value Network: Insights for Mobile Operators.<br />
EurMgmtJournal Vol.24, pp.128–141.<br />
Pollit, M.G. (2010) “Does electricity (<strong>and</strong> heat) network regulation have anything to learn from fixed line telecoms<br />
regulation?” Energy policy´, Vol.38, pp.1360-1371<br />
Posttchi, K. <strong>and</strong> Hufenbach, T. (2009) Analyzing <strong>and</strong> Categorization of the Business Model of Virtual Operators.<br />
2009 Eighth IntlConf on Mobile Business<br />
PRWEB (2010) Global Subscribers for MVNO Services to Reach 188.83 Million by 2015.<br />
http://www.prweb.com/releases/mobile_network_operators/MVNO/prweb4273004.htm<br />
Reijers, H.A. <strong>and</strong> Goverde, R.H.J.J.M. (2005). “Best practices in business processes redesign”, The International<br />
Journal of <strong>Management</strong> Science, Vol.33, pp.283-306.<br />
Sage, A.P. (1999) “Sustainable Development: Issues in <strong>Information</strong>, <strong>Knowledge</strong>, <strong>and</strong> Systems <strong>Management</strong>”.<br />
<strong>Information</strong> – <strong>Knowledge</strong> – Systems <strong>Management</strong>, Vol.1, pp.182-223.<br />
Schmidt, Erek, Kolbe <strong>and</strong> Zarnekow (2009) Towards a Procedural Model for Sustainable <strong>Information</strong> Systems<br />
<strong>Management</strong>. Proc. 42nd Hawaii IntlConf on System Sciences – 2009<br />
Scheiber, M. (2010) <strong>Information</strong> System on Literature in the Field of ICT for Environmental Sustainability. 2010<br />
IntlCongress. on Environmental Modelling <strong>and</strong> Software<br />
Sharma, S. <strong>and</strong> Ruud, A. (2003) “On The Path To Sustainability” Business Strategy <strong>and</strong> the Environment, Vol.12,<br />
pp.205–214.<br />
Shin, D.-H. (2010) “MVNO services: Policy implications for promoting MVNO diffusion”. Telecommunications<br />
Policy, Vol.34, pp.616–632<br />
Smart, P.A, Maddern, H. <strong>and</strong> Maull, R. (2008) Underst<strong>and</strong>ing Business Process <strong>Management</strong>: implications for<br />
theory <strong>and</strong> practice, British Journal of <strong>Management</strong><br />
Strompreise (2010) Stromtarife. http://www.strompreise.de/<br />
Su, Y. <strong>and</strong> Al-Hakim, L. (2010) “System Dynamics Modeling for Green IT Strategies.” 2010 IntlConf on<br />
Challenges in Environmental Science <strong>and</strong> Computer Engineering<br />
Switzer <strong>and</strong> Trout (2007) “The ‘‘Optimal’’ Structure of the Deregulated Electric Utility Industry”. The Electricity<br />
Journal. Vol.20, No.6<br />
Tsoutsos, T. <strong>and</strong> Stamboulis, Y. (2005) “The sustainable diffusion of renewable energy technologies as an<br />
example of an innovation-focused policy”. Technovation, Vol.25, pp.753–761.<br />
Utilibill (2010) Utilibill’s MVNO product. http://www.utilibill.com.au/index.htm<br />
Valiris, G. <strong>and</strong> Glykas, M. (1999), “Critical review of existing BPR methodologies”, Business Process<br />
<strong>Management</strong> Journal, Vol.5 No.1, pp.65-86.<br />
Windfield, Gibson, Markvart, Gaudreau <strong>and</strong> Taylor (2010) “Implications of sustainability assessment for electricity<br />
system design”. Energy Policy, Vol.38, pp.4115–4126.<br />
Wu, I-L. (2002) “A model for implementing BPR based on strategic perspectives”, <strong>Information</strong> & <strong>Management</strong>,<br />
Vol.39, pp.313-24.<br />
233
<strong>Management</strong> of <strong>Information</strong> Systems Outsourcing: Evaluation<br />
of Lessons Learned From a Boundary Spanning Perspective<br />
Björn Johansson 1 <strong>and</strong> Linda Bergkvist 2<br />
1 Lund University, Sweden<br />
2 Karlstad University, Sweden<br />
bjorn.johansson@ics.lu.se<br />
Linda.Bergkvist@kau.se<br />
Abstract: Even if outsourcing is a well-researched phenomenon, it can be stated that evaluation studies on IS<br />
outsourcing relationships are scarce. From a description of two IS outsourcing relationship cases, a set of lessons<br />
learned are presented. A boundary spanning perspective is then used when evaluating these lessons<br />
learned in the client-supplier outsourcing relationships <strong>and</strong> thereby adding a “new” theoretical perspective on outsourcing<br />
relationships. The evaluation is concluded in a set of propositions that present the boundary spanning<br />
perspective of the lessons learned. The aim of these propositions is to act as both a guiding tool for how to further<br />
develop boundary spanning roles in outsourcing relationships <strong>and</strong> to act as a base for future research on<br />
outsourcing relationships.<br />
Keywords: boundary spanning, IS outsourcing, relationships management<br />
1. Introduction<br />
Outsourcing of various firm processes has been increasing <strong>and</strong> still increases (Beasley et al., 2009).<br />
Lacity <strong>and</strong> Willcocks (2001) claim that organisations have realised the benefits of outsourcing such as<br />
the ability to focus on core competencies, achieving reductions in human resource costs <strong>and</strong> flexibility<br />
in tapping into technical expertise when needed. At the same time, access to global markets <strong>and</strong><br />
commercial exploitation are mentioned as strategic drivers for outsourcing (Beverakis et al., 2009)<br />
<strong>and</strong> maturity in the outsourcing market resulting in outsourcing to a high extent becoming part of firms’<br />
strategic initiatives (Ravi, 2008). It can be stated that outsourcing has been especially evident in the<br />
area of <strong>Information</strong> Systems <strong>and</strong> <strong>Information</strong> Technologies (IS/IT). A survey published by KPMG<br />
(2007) showed that 89% of the firms surveyed planned to maintain or increase their current IS/IT outsourcing<br />
level. Gonzales, Gasco <strong>and</strong> Llopis (2010) reported a global market growth with an average<br />
of 6.3% in the year 2008. In this research, IS outsourcing refers to a relationship where a firm contracts<br />
out or sells IS assets, people <strong>and</strong>/or activities to a supplier. The supplier provides <strong>and</strong> manages<br />
these assets <strong>and</strong> services for monetary returns over an agreed time period (Kern, 1997). Although IS<br />
outsourcing has experienced a dramatic growth, it can be stated that reports on lack of success make<br />
it interesting to study conditions determining successful outsourcing. To reach successful outcomes,<br />
the necessity of having better management practices has been pointed out (Gonzales et al., 2010;<br />
King & Torkzadeh, 2008). However, it is unclear what these “better management practices” in a client–supplier<br />
relationship should deal with. As stated by Lacity, Khan, Yan <strong>and</strong> Willcocks (2010), there<br />
is a need for more research with a relationship perspective in IS outsourcing research. IS outsourcing<br />
relationships face numerous challenges in developing <strong>and</strong> delivering software services across firm<br />
boundaries. Given the critical role that IS outsourcing relationships play in integrating business <strong>and</strong><br />
technical knowledge at the client-supplier boundary, it is important to underst<strong>and</strong> the challenges that<br />
they face <strong>and</strong> to identify mechanisms that enable firms to overcome these barriers to effectiveness.<br />
In this paper, lessons learned from an investigation of two IS outsourcing relationships are shortly<br />
presented. It can be claimed there exists a need of having better management practices to have success<br />
in IS outsourcing. However, as stated above, it is unclear what this better management should<br />
consist of. To be able to say something about this, we evaluate lessons learned from a boundary<br />
spanning perspective. The evaluation of lessons learned assist us when suggesting propositions on<br />
how to deal with challenges that the identified lessons learned suggested. This research aims at contributing<br />
to the knowledge base on management of IS outsourcing by addressing management of IS<br />
outsourcing in a client–supplier relationship from a boundary spanning perspective. The research describes<br />
two IS outsourcing cases that differ in activity outsourced, IS development versus IS maintenance<br />
<strong>and</strong> operation, <strong>and</strong> IS relationship composition. From evaluating the lessons learned, we go<br />
beyond just telling the story <strong>and</strong> give a richer description of how identified challenges could be dealt<br />
with in search of a better management practice in IS outsourcing relationships.<br />
234
Björn Johansson <strong>and</strong> Linda Bergkvist<br />
The remainder is structured as follows. The next section first presents the research design <strong>and</strong> thereafter<br />
the two cases of IS outsourcing relationships. The presentation focuses on features of each<br />
case, such as the activity outsourced <strong>and</strong> the relationship. Section 2 then ends with presenting challenges<br />
<strong>and</strong> lessons learned from the two cases. In section 3, the boundary spanning perspective is<br />
presented <strong>and</strong> this perspective is used to analyse lessons learned. The section ends with a set of<br />
propositions for the management of IS outsourcing relationships. The propositions are discussed <strong>and</strong><br />
presented as conclusions. The final section also suggests further research in the area of IS outsourcing<br />
relationships.<br />
2. The IS outsourcing relationships <strong>and</strong> the lessons learned<br />
In this paper, we describe two IS outsourcing relationships: case DevMen <strong>and</strong> case MainOp, see Figure<br />
1. Case DevMen focuses outsourcing of IS development (ISD), whereas case MainOp focuses<br />
outsourcing of IS maintenance <strong>and</strong> operation. Empirical data for these cases has been collected<br />
through semi-structured interviews with representatives from the client firm, the supplier firm <strong>and</strong> the<br />
supplier’s offshore site. In total, 35 interviews were conducted from June 2010 until early 2011 – 20<br />
interviews for case DevMen <strong>and</strong> 15 interviews for case MainOp. The interviewees represented the<br />
business level, process level <strong>and</strong> systems level of included firms. Among those interviewed were<br />
business unit managers, heads of customer management, line managers, one ICT manager, one system<br />
manager, system designers, one service desk manager <strong>and</strong> IT/IS specialists. Each interview<br />
lasted between 1½ to 2½ hours. In addition to the interviews, documents describing the outsourcing<br />
relationships have been included. These documents have primarily been used for verifying statements<br />
from the interviewees but also as complementary sources to the interviews, which is in line with<br />
what Yin (2009) describes as data triangulation.<br />
The lessons learned, presented below, come from a qualitative data analysis inspired by the technique<br />
of open coding (Strauss & Corbin, 1990). The data generated by interviews <strong>and</strong> documents<br />
were examined <strong>and</strong> coded by foc<strong>using</strong> on the interviewees’ experienced challenges associated with<br />
their respective outsourcing relationship. Data quotes were coded, ordered in units, rearranged <strong>and</strong><br />
then categorised in themes. The results are thus grounded in data rather than imposed by theory.<br />
Both the client firm <strong>and</strong> the supplier firm are firms within telecommunication equipment <strong>and</strong> services.<br />
They have experience with outsourcing <strong>and</strong> have both national <strong>and</strong> international outsourcing relationships.<br />
The supplier firm, the focal firm in the research, has a well-developed outsourcing process,<br />
which contributes a common way of working with outsourcing. The following descriptions focus on activities<br />
outsourced <strong>and</strong> features of the outsourcing relationships. Due to confidentiality, the firms included<br />
are not mentioned by their real names.<br />
IS outsourcing<br />
Figure 1: The DevMen <strong>and</strong> MainOp case – organisations <strong>and</strong> roles<br />
235<br />
Offshore insourcing
Björn Johansson <strong>and</strong> Linda Bergkvist<br />
The IS outsourcing relationship, the DevMen case, is built upon three parties, i.e. the client firm, the<br />
supplier firm <strong>and</strong> the supplier’s offshore site. The client firm <strong>and</strong> the supplier firm are located in Sweden,<br />
whereas the supplier’s offshore site is located in the Czech Republic. The DevMen case involves<br />
two phases: first the IS outsourcing <strong>and</strong> then the “offshore insourcing”. The MainOp case involves the<br />
“offshore insourcing”. This means that there is an overlap of the cases when it comes to involved parties<br />
as shown in Figure 1, however, the two cases deals with two different systems/activities outsourced.<br />
In the DevMen case, the client decided in 2002 to outsource management, maintenance, development<br />
<strong>and</strong> support of one of its IS. This specific IS is a correction <strong>and</strong> maintenance system, which is<br />
employed by the client’s end-users <strong>and</strong> the client’s clients for trouble reporting on the client’s products<br />
<strong>and</strong> equipment. It is stated to be a business critical IS <strong>and</strong> it has to be available 24 hours a day, 7<br />
days a week.<br />
Until early 2009, the outsourcing relationship was represented by two parties: the client firm <strong>and</strong> the<br />
supplier firm’s onshore site in Sweden (the IS outsourcing in Figure 1 – the DevMen case). In 2009,<br />
the supplier received requirements on cost reductions, which resulted in maintenance, development<br />
<strong>and</strong> support being outsourced to the supplier’s offshore site in the Czech Republic, also involving the<br />
“offshore insourcing” in Figure 1.<br />
Offshore insourcing is defined by Bergkvist <strong>and</strong> Fredriksson (2008) as a special case of outsourcing<br />
when the supplier/client outsources work to an affiliated firm. However, the IS management was kept<br />
at the supplier’s onshore site. As a result, the relationship increased to include three parties, the client,<br />
the supplier’s onshore site <strong>and</strong> the supplier’s offshore site. This specific IS outsourcing arrangement<br />
is referred to as two-stage offshoring (Holmström Olsson et al., 2008), i.e. offshoring through<br />
domestic suppliers with offshore employees. The DevMen case focuses on issues related to outsourcing<br />
the development of the IS. To manage development related issues, interfaces were established<br />
between the client <strong>and</strong> the supplier’s onshore site <strong>and</strong> between the supplier’s onshore site <strong>and</strong><br />
the supplier’s offshore site, used as communication channel(s), creating a single point of contact for<br />
specific competence areas.<br />
These interfaces are used on a daily basis, as development activities are conducted in an agile way of<br />
working, where the management team <strong>and</strong> the development team meet virtually each morning during<br />
the daily st<strong>and</strong>-up meeting (see e.g., Kniberg, 2007). Almost every team member at the supplier’s onshore<br />
site communicates now <strong>and</strong> then with the IS owner. The communication relates to, for example,<br />
end-users’ <strong>and</strong> client’s requirements <strong>and</strong> requirement analysis.<br />
The relationship case, MainOp, involves the “offshore insourcing” as shown in Figure 1. The supplier<br />
is located in Sweden <strong>and</strong> the supplier’s offshore site is located in the Czech Republic.<br />
The MainOp case includes the maintenance <strong>and</strong> operation of a part of the supplier’s technical infrastructure.<br />
The technical infrastructure can be described as a business specific support process, which<br />
is divided into three parts: first line support, second line support <strong>and</strong> third line support. First line support<br />
solves more simple <strong>and</strong> routine based err<strong>and</strong>s such as password problems. Second line support<br />
manages infrastructural problems related to servers <strong>and</strong> workstations for example. Complex problems<br />
<strong>and</strong> changes, such as further development of the technical infrastructure, are managed by the third<br />
line. The third line also helps end-users with the set up of IT environments for specific projects. Thus,<br />
the first <strong>and</strong> second lines manage more routine based IS operations <strong>and</strong> the third line manages more<br />
specialised maintenance work. In the autumn of 2009, it was decided that the first <strong>and</strong> second lines<br />
should be outsourced to the supplier’s offshore site in the Czech Republic. Among the reasons mentioned<br />
were: a harmonised way of delivering services, reduction of costs, better utilisation of capacity<br />
<strong>and</strong> better service follow up. The main reason for going offshore was that the affiliated firm already<br />
had processes established for the kind of business required. Consequently, necessary competence<br />
was available immediately.<br />
To manage the support process, interfaces between the onshore <strong>and</strong> offshore site were created. In<br />
addition, interfaces at the offshore site were also created between different competence areas at the<br />
second line, as well as between the helpdesk (first line) <strong>and</strong> different competence areas at the second<br />
line.<br />
236
Björn Johansson <strong>and</strong> Linda Bergkvist<br />
2.1 IS Outsourcing relationships: Challenges <strong>and</strong> lessons learned<br />
Outsourcing, particularly offshore, brings geographical limitations, cultural differences, time differences<br />
<strong>and</strong> difficulties in verbal communication. This is described by Edwards <strong>and</strong> Sridhar (2005) as<br />
reasons for why unstructured <strong>and</strong> business specific activities, such as requirement analysis, are recommended<br />
not to be offshored. In the DevMen case, these were stated as reasons for keeping IS<br />
management at the onshore site. This resulted in activities such as requirement analysis <strong>and</strong> systems<br />
management still being managed at the onshore site. Relating this to what the literature recommends,<br />
this was an appropriate decision. Reasons for keeping IS management onshore could be explained<br />
by for example the complexity of the IS <strong>and</strong> the members’ deep knowledge on the client’s business<br />
processes <strong>and</strong> way of working (Vlaar et al 2008). A system manager at the supplier’s onshore site<br />
described the complexity by saying:<br />
“It is not only about knowing the product <strong>and</strong> its code but also about processes <strong>and</strong> the<br />
client’s way of working. […] The product is complex <strong>and</strong> it is difficult to underst<strong>and</strong> what it<br />
is really used for.”<br />
This is confirmed by a system designer at the supplier’s offshore site who stated “it was<br />
difficult to underst<strong>and</strong> the IS from the beginning.” The designer continued<br />
“It is hard to learn the system <strong>and</strong> to find code quickly. Some parts are difficult <strong>and</strong> you<br />
have to read much documentation to learn how the system works”.<br />
The result from this was that the onshore members had to write detailed requirement specifications<br />
<strong>and</strong> requirement analyses before they were h<strong>and</strong>ed over to the offshore site. The explanation for<br />
keeping IS management onshore can also be related to the close <strong>and</strong> informal business relationship<br />
between the client <strong>and</strong> the supplier’s onshore members. The IS owner at the client firm described the<br />
relationship:<br />
“It is completely perfect, I do not think you can have a better relationship. We trust each<br />
other <strong>and</strong> we always try to fulfill each other’s requirements <strong>and</strong> wishes.”<br />
An unreserved client–supplier relationship, the onshore members’ deep IS knowledge, <strong>and</strong> the difficulty<br />
of outsourcing business knowledge are thus reasons for keeping IS management onshore, i.e. in<br />
the same country as the client. This story illustrates the difficulty of outsourcing business specific activities<br />
<strong>and</strong> business knowledge. A lesson learned from the DevMen case is that when outsourcing<br />
business specific activities that require deep business knowledge, these activities should be kept inhouse<br />
or onshore.<br />
The decision in the DevMen case of moving maintenance, development <strong>and</strong> support to the supplier’s<br />
offshore site resulted in two teams geographically dispersed from each other, one team in Sweden<br />
<strong>and</strong> one in the Czech Republic. The onshore site team members spoke of the importance of having a<br />
leader at the offshore site that felt great responsibility towards the client <strong>and</strong> the outsourced product.<br />
The system manager at the onshore site explained:<br />
“You must have a strong person [at the offshore site]. If the team does not have a leading<br />
figure it will be extremely difficult.”<br />
Even though team members at the offshore site rarely spoke with the client, they mentioned a feeling<br />
of responsibility for the product. The team members relied on their leader <strong>and</strong> they had confidence in<br />
their leader. This was not just a result of the style of leadership but also a result of technical knowledge;<br />
their leader could answer most of their questions. A system designer at the supplier’s offshore<br />
site described the importance of a leading figure as:<br />
“It is important to have someone who is really skilled in the offshore site; somebody with<br />
technical skills, developing skills <strong>and</strong> also communication skills.”<br />
A strong leader was mainly mentioned as an advantage, however the onshore team experienced<br />
some challenges connected to having a strong leader at the offshore site. One challenge was experienced<br />
during the daily morning meetings. Each team member at the onshore <strong>and</strong> offshore site should<br />
say something in relation to: what has been done since yesterday, plans for today <strong>and</strong> problems that<br />
prevent future work (Kniberg, 2007). In reality the leader of the offshore site became the offshore<br />
team members’ spokesman. The line manager at the supplier’s onshore stated:<br />
“During Scrum meetings the idea is that everyone should say something. This was very<br />
difficult. It felt as if we had to point. It became better <strong>and</strong> better but it was difficult. They<br />
wanted to speak through their leader.”<br />
237
Björn Johansson <strong>and</strong> Linda Bergkvist<br />
This was experienced as a problem since the onshore team had difficulties in assessing the continuous<br />
work at the offshore site. The team members kept a low profile <strong>and</strong> the system manager at the<br />
onshore site pointed out: “Often we had to pull out information about status <strong>and</strong> their feeling, if everything<br />
was ok or not.” The offshore team members’ silence could be a result of having a strong leader<br />
but it could also be explained as a cultural matter. Czech management culture is recognised by a hierarchical<br />
approach. The line manager at the supplier’s onshore site experienced “that it was extremely<br />
hierarchical, the leader was guru <strong>and</strong> the other did not dare to say anything.” A system designer<br />
at the offshore site explained their silence <strong>and</strong> the Swedes desire to talk as a cultural<br />
difference by saying:<br />
“One cultural difference is that Swedish work climate is more open <strong>and</strong> friendly <strong>and</strong> people<br />
are more involved in discussions <strong>and</strong> meetings. We do not ask so many questions<br />
which is also visible during Scrum meetings. Here we discuss problems before the<br />
Scrum meeting <strong>and</strong> then take a note or mention it during the Scrum meeting.”<br />
From this, two things could be learned. First, the importance of having a leader at the offshore site, a<br />
person that has the ability to guide the receiving team in the right direction. This research shows that<br />
problems may follow with having a strong leadership. However, it is assumed that the advantages<br />
outweigh the disadvantages. Second it is important to be aware of each other’s cultural differences in<br />
order to better underst<strong>and</strong> different ways of working <strong>and</strong> behaviours.<br />
The “offshore insourcing” in the DevMen case resulted in the outsourcing relationship consisting of<br />
three parties. The supplier’s onshore site <strong>and</strong> offshore site should however act as one towards the<br />
client. The line manager at the supplier’s onshore site mentioned the importance of creating a team<br />
<strong>and</strong> a feeling of ‘we’ instead of ‘we <strong>and</strong> them’:<br />
“Our main focus was on how we should perform work: we should work with scrum, we<br />
should meet. We should be a team with good communication. We should work together<br />
<strong>and</strong> meet face-to-face as often as possible.”<br />
Besides the possibility to meet face-to-face during the knowledge transfer, the agile way of working<br />
was mentioned as contributing to a team feeling. Agile methods promote daily meetings <strong>and</strong> short development<br />
cycles (Lindstrom & Jeffries, 2004), which have facilitated the activity of getting to know<br />
each other. One system designer at the offshore site mentioned strengths with the relationship: “We<br />
respect each other, the relationship is friendly <strong>and</strong> we try to respond to each other as soon as possible.”<br />
A lesson learned from the DevMen case then is that agile methodologies, such as Scrum, are<br />
preferable when development is conducted by geographically dispersed teams.<br />
In the MainOp case, members at the third line support mentioned the problem with work tasks (tickets)<br />
going ping-pong between the second <strong>and</strong> third lines. The ICT manager at the supplier’s onshore<br />
site described this by giving the following example:<br />
Say that a ticket passes the first <strong>and</strong> second line <strong>and</strong> arrives to us at the third line. We<br />
look at it <strong>and</strong> assess it as a ticket that should have been managed at the first or second<br />
line. As a result, we send it back with a note saying something like: this you ought to<br />
have managed. And then the ticket comes back to us with the message: but we have not<br />
received any instructions.<br />
The underlying cause for this problem with sending work tasks back <strong>and</strong> forth is believed to be related<br />
to the non-existence of clear <strong>and</strong> written specifications for what should be solved at the second <strong>and</strong><br />
third line respectively. The Unix specialist at the supplier’s onshore site requested “an explicit definition<br />
of which services should be transferred <strong>and</strong> which should be kept onshore.” When support concerns<br />
a business specific infrastructure, as in this case, the importance of instructions becomes even<br />
clearer, as pointed out by both the second <strong>and</strong> third line. The Unix specialist at the offshore site described<br />
the technical infrastructure as being one of the biggest <strong>and</strong> strangest he had ever worked<br />
with. The specialist’s words were: “Because it is not st<strong>and</strong>ardized, because it was built during many<br />
years by only a few persons. They have done it by themselves <strong>and</strong> everybody had everything in their<br />
minds.” This makes instructions necessary for knowing what should be solved at the second <strong>and</strong> third<br />
line. From this, two things could be learned. First, it is essential that actors at both the sending firm (in<br />
case MainOp the sending firm is the same as the supplier’s onshore site) <strong>and</strong> the offshore site have a<br />
common underst<strong>and</strong>ing of what each party is intended to manage. Second, the business processes<br />
<strong>and</strong> the set up of technical infrastructures need to be documented so that the offshore site can manage<br />
their part of the agreement. This is particularly important when the outsourced activity is tailor-<br />
238
Björn Johansson <strong>and</strong> Linda Bergkvist<br />
built. Consequently, it is recommended that an outsourcing knowledge transfer should include work<br />
packages for documentation, the creation of formalised instructions <strong>and</strong> h<strong>and</strong>s-on training.<br />
Other challenges in the MainOp case are related to differences in ways of working. The supplier’s offshore<br />
site, which manages first <strong>and</strong> second line support, is referred to as a factory, supporting several<br />
clients. This means that the work processes have similarities with industrialised, routine based work.<br />
The first <strong>and</strong> second lines support a range of different clients but how it is done does not differ. The<br />
outsourcing coordinator at the supplier’s offshore site summarised the challenge of different ways of<br />
working as:<br />
“The way of working in Sweden is very, very different from way of working here in [the<br />
offshore site]. Basically it is about that in Sweden the support was in a very customer oriented<br />
way, very tailored way, it was not so much based on processes, it was based basically<br />
on a very close relationship towards the customer <strong>and</strong> there was a dedicated team<br />
for the support. This is something that we do not have in [the offshore site]. This is a big<br />
service center, <strong>and</strong> it is a very process <strong>and</strong> rigid directed way of working, strictly based<br />
on processes. It is more like a factory so to say. I guess that a lot of people in Sweden<br />
were surprised how we work <strong>and</strong> how we organize our work. So this is more or less the<br />
big difference between the [offshore site] factory approach <strong>and</strong> this very customer oriented<br />
approach in Sweden. This was the main challenge during the outsourcing preparations”.<br />
From this it can be stated that IS outsourcing should be preceded by an examination of involved parties’<br />
way of working so that differences not will be a surprise when outsourcing becomes actual.<br />
During outsourcing, the need of communication channels came apparent. Team members at the third<br />
line of support experienced the necessity for single point of contact to facilitate the communication between<br />
the second <strong>and</strong> third lines of support. The Unix specialist at the supplier’s onshore site said:<br />
“Channels of communication are important for knowing with whom to communicate. It<br />
does not have to be a personal relation but communication must be easy. For example if<br />
I want to share information with a group of people I can use this communication channel.<br />
Then I know that the information has received the other ones. The communication channel<br />
can be informal or formal; the main thing is that communication is easy”.<br />
Through a single point of contact, it becomes possible to share information between different teams<br />
through one person. Thus, communication channels, such as a single point of contact, are believed to<br />
facilitate problems related to information <strong>and</strong> knowledge sharing. However, the team members at the<br />
first <strong>and</strong> second lines of support did not mention any problems connected to communication <strong>and</strong> information<br />
sharing. Explanations are related to the fact that they received answers to most of their<br />
questions <strong>and</strong> if they did not, unmanaged tickets were passed on to another competence area or to<br />
the third line. From this, it can be stated that communication channels for information <strong>and</strong> knowledge<br />
sharing are important in outsourcing relationships.<br />
Another finding from the MainOp case is that employees from the third <strong>and</strong> second line differ in their<br />
mentality towards their client, i.e. the end-users. It is stated that third line support always strives for<br />
satisfied end-users <strong>and</strong> that is why they help the second line when needed: if they did not, the enduser<br />
would suffer. For the second line, on the other h<strong>and</strong>, the end-users are quite unknown <strong>and</strong> that is<br />
why their motivation is related to the business agreement rather than to satisfied end-users. The outsourcing<br />
coordinator at the supplier’s offshore site explained it as: “We miss this very close relationship<br />
with the customer. […] We really make it work based on service level agreements.” Thus, people<br />
at the second line do their work according to what is written in the business agreement. One explanation<br />
for this is that the second line supports a lot of different clients <strong>and</strong> end-users. From this it, can be<br />
recommended that expectations should be discussed during outsourcing preparations to avoid misunderst<strong>and</strong>ings<br />
later on. One lesson learned from the MainOp case is that not only representatives<br />
from the business level should be part of the preparations, but also representatives from the system<br />
level <strong>and</strong> process level, to be able to learn more about each other.<br />
Lessons learned from the DevMen <strong>and</strong> the MainOp cases are summarised in Table 1. They are then<br />
discussed from a boundary spanning perspective in the next section.<br />
239
Björn Johansson <strong>and</strong> Linda Bergkvist<br />
Table 1: Summary of lessons learned from the DevMen <strong>and</strong> MainOp cases<br />
Lessons learned Main source<br />
Keep IS activities that require deep business knowledge in-house or onshore DevMen case<br />
Make sure to have a strong leader at the offshore site DevMen case<br />
Learn about differences in organisational culture during IS outsourcing preparation DevMen case<br />
Adopt agile ways of working to facilitate cooperation <strong>and</strong> the feeling of working as one DevMen case<br />
team in geographically dispersed teams<br />
Make sure that actors at both the onshore site <strong>and</strong> the offshore site have a common un- MainOp case<br />
derst<strong>and</strong>ing of each party’s expectations <strong>and</strong> responsibilities according to the IS outsourcing<br />
agreement<br />
When outsourcing tailor-built IS, detailed IS specifications should be included as part of MainOp case<br />
the knowledge transfer<br />
IS outsourcing should be preceded by an examination of involved parties’ way of working MainOp case<br />
Established communication channels for information <strong>and</strong> knowledge sharing are crucial<br />
during IS outsourcing relationships<br />
3. Concluding propositions from a boundary spanning perspective<br />
MainOp case<br />
The boundary spanning perspective has a potential in describing outsourcing relationships as described<br />
by Du <strong>and</strong> Pan (2010). They define boundary spanners as someone who operates at the periphery<br />
of an organisation. This person could then be described as having a boundary role, <strong>and</strong> according<br />
to Aldrich <strong>and</strong> Herker (1977) there are basically two functions performed by boundary roles:<br />
information processing <strong>and</strong> external representation. The information processing role is described as<br />
dealing with information overload. The basic thought about the information processing function is that<br />
it should be able to select information acting as both filters <strong>and</strong> facilitators. As stated by Aldrich <strong>and</strong><br />
Herker (1977), the information processing function of a boundary role decides an organisations ability<br />
to adapt to environmental contingencies. However, it is dependent on the expertise of the boundary<br />
role incumbents <strong>and</strong> the success in selecting, transmitting, <strong>and</strong> interpreting information. The external<br />
representation function is then related to how an organisation responds to environmental influence<br />
(Aldrich & Herker, 1977). Aldrich <strong>and</strong> Herker (1977) describe three different ways for dealing with environmental<br />
constraints <strong>and</strong> contingencies: first, by an internal structural differentiation match patterns<br />
of relevant information; second, by gaining power over relevant elements in the environment, <strong>and</strong><br />
from that manipulating it so that it conforms to the organisation’s needs; <strong>and</strong> third, a compromise position<br />
which means a modal pattern of use of boundary personnel. In summary, it can be said that individuals’<br />
technical <strong>and</strong> communicative abilities constitute the organisation’s boundary-spanning capability<br />
(Du & Pan, 2010).<br />
It can be stated that IS outsourcing relationships face numerous challenges in developing <strong>and</strong> delivering<br />
software services across firm boundaries. This is especially the case in the context of information<br />
systems development. Fisk et al (2010) state that a persistent problem in the IS development context<br />
is the different parties’ different knowledge. They also state that this boundary problem hinders project<br />
success <strong>and</strong> they claim that boundary spanning significantly affects IS development success. According<br />
to Levina <strong>and</strong> Vaast (2008), the boundaries are related to lack of shared economic, intellectual,<br />
social, <strong>and</strong> symbolic resources. To deal with these boundaries, it can be said that boundary spanners<br />
are necessary, but it can also be said that they need to be developed to deal with a specific set of<br />
tasks. This is described in a set of propositions that aims at shaping future research but also as guidance<br />
for how to think about IS outsourcing relationships.<br />
The analysis of lessons learned from the cases from the boundary spanning perspective resulted into<br />
the following propositions:<br />
Proposition 1: IS activities that require frequent face to face interaction <strong>and</strong> deep business knowledge<br />
should be kept in-house if the boundary spanner role that deals with the information overload is<br />
are present at either of the organisations in the IS outsourcing relationship.<br />
However, to deal with the information overload there is a need to decide on what information the different<br />
actors in the relationship are dependent on, which, if not totally clear, according to Shao <strong>and</strong><br />
David (2007), could be one reason to remain onshore.<br />
240
Björn Johansson <strong>and</strong> Linda Bergkvist<br />
Proposition 2: An extensive boundary spanner role is crucial when developing new <strong>and</strong> immature<br />
outsourcing relationships with non-established processes for ways of working.<br />
This can be related to the statement by Holmström, Olsson et al (2008) who state that when establishing<br />
new offshore relationships, designers need to be trained extensively.<br />
To be able to develop this extensive boundary spanner role, it can be suggested that there is a need<br />
to examine organisational culture in depth <strong>and</strong> that it should be done before the implementation of the<br />
outsourcing as suggested in proposition 3.<br />
Proposition 3: The client’s <strong>and</strong> supplier’s organisational cultural differences should be examined in<br />
the preparation phase of the IS outsourcing relationship.<br />
It is stated by for instance Fabriek et al. (2008) that the more cultural alike <strong>and</strong> the more familiar the<br />
client <strong>and</strong> the supplier are, the more likely it is that the relationship will bring successful outcomes.<br />
They state that team members should be introduced on both sides to learn about each other’s way of<br />
working, in order to reduce distances related to organisational fundamentals. However, if there are<br />
cultural differences, it ought to be of interest to have knowledge about these to be able to deal with<br />
them.<br />
Proposition 4: Boundary spanners have a specific importance when outsourcing relationships are<br />
new <strong>and</strong> immature.<br />
As described Holmström, Olsson et al. (2008), in new <strong>and</strong> immature outsourcing relationships, intense<br />
communication on a daily basis between both managers <strong>and</strong> designers is important due to nonestablished<br />
ways of working. This means that it is fruitful to adopt a development methodology that<br />
focuses on the team rather than on the techniques. It also means that a common underst<strong>and</strong>ing of<br />
each party’s expectations <strong>and</strong> responsibilities according to the contractual agreement is necessary<br />
<strong>and</strong> the boundary spanner plays a crucial role for being able to have that. Lee et al (1999) state that a<br />
prerequisite for managing outsourcing relationships is the client’s <strong>and</strong> the supplier’s common underst<strong>and</strong>ing<br />
<strong>and</strong> a systematic way of working. It can also be related to what Davey <strong>and</strong> Allgood (2002)<br />
recommend about IS: that packaged IS solutions are preferable to tailor-built IS, since packaged systems<br />
often are well specified. From this, it can be stated that tailor-built IS should not be outsourced<br />
but they can be if boundary spanners have a specific role in making sure that detailed IS specifications<br />
are included in the knowledge transfer.<br />
All of this can be concluded in the final proposition, proposition 5 that states that: Communication<br />
channels must be in place to reach desired levels of knowledge exchange quality <strong>and</strong> for informal<br />
communication opportunities.<br />
It can be concluded that boundary spanners at both ends of the relationship play an extremely important<br />
role in this context.<br />
This research contributes to the knowledge base on the management of IS outsourcing relationships<br />
by describing lessons learned from two cases. From this, some propositions are presented that aim to<br />
act as both a guiding tool for how to further develop boundary spanner roles in outsourcing relationships<br />
<strong>and</strong> to act as a base for future research on outsourcing relationships.<br />
References<br />
Aldrich, H., & Herker, D. 1977. Boundary spanning roles <strong>and</strong> organization structure. The Academy of <strong>Management</strong><br />
Review, 2(2): 217-230.<br />
Beasley, M., Bradford, M., & Dehning, B. 2009. The value impact of strategic intent on firms engaged in information<br />
systems outsourcing. International Journal of Accounting <strong>Information</strong> Systems, 10(2): 79-96.<br />
Bergkvist, L., & Fredriksson, O. 2008. Outsourcing Terms - A Literature Review from an ISD Perspective. Paper<br />
presented at the 16th European Conference on <strong>Information</strong> Systems (ECIS 2008), Galway, Irel<strong>and</strong>.<br />
Beverakis, G., Dick, G. N., & Cecez-Kecmanovic, D. 2009. Taking <strong>Information</strong> Systems Business Process Outsourcing<br />
Offshore: The Conflict of Competition <strong>and</strong> Risk. Journal of Global <strong>Information</strong> <strong>Management</strong>, 17(1):<br />
32-48.<br />
Davey, H., & Allgood, B. 2002. Offshore Development, Building Relationships Across International Boundaries: A<br />
Case Study. <strong>Information</strong> Strategy: The Executive´s Journal, 18(3): 13-16.<br />
241
Björn Johansson <strong>and</strong> Linda Bergkvist<br />
Du, W., & Pan, S. L. 2010. Boundary spanning by design: Insights from a vendor perspective, International Conference<br />
<strong>Information</strong> Systems (ICIS), Vol. paper 222.<br />
Edwards, H. K., & Sridhar, V. 2005. Analysis of Software Requirements Engineering Exercises in a Global Virtual<br />
Team Setup. Journal of Global <strong>Information</strong> <strong>Management</strong>, 13(2): 21-41.<br />
Fabriek, M., Br<strong>and</strong>, M. v. d., Brinkkemper, S., Harmsen, F., & Helms, R. 2008. Reasons for Success <strong>and</strong> Failure<br />
in Offshore Software Development Projects. Paper presented at the Sixteenth European Conference on <strong>Information</strong><br />
Systems, Galway, Irel<strong>and</strong>.<br />
Fisk, A., Berente, N., & Lyytinen, K. 2010. Boundary spanning competencies <strong>and</strong> information system development<br />
project success, ICIS 2010 proceedings. Paper 96<br />
Gonzales, R., Gasco, J., & Llopis, J. 2010. <strong>Information</strong> Systems Outsourcing: An Empirical Study of Success<br />
Factors. Human Systems <strong>Management</strong>, 29(3): 139-151.<br />
Holmström Olsson, H., Conchúir, E. Ó., Ågerfalk, P. J., & Fitzgerald, B. 2008. Two-Stage Offshoring: An Investigation<br />
of The Irish Bridge. MIS Quarterly, 32(2): 257-279.<br />
Kern, T. 1997. The Gestalt of an <strong>Information</strong> Technology Outsourcing Relationship: An Exploratory Analysis. Paper<br />
presented at the Eighteenth International Conference on <strong>Information</strong> Systems, Atlanta, Georgia, USA.<br />
King, W. R., & Torkzadeh, G. 2008. <strong>Information</strong> Systems Offshoring: Research Status <strong>and</strong> Issues. MIS Quarterly,<br />
32(2): 205-225.<br />
Kniberg, H. 2007. Scrum <strong>and</strong> XP from the Trences. How we do Scrum. USA: C4Media, Publisher of InfoQ.com.<br />
KPMG. 2007 Strategic Evolution. A Global Survey on Sourcing Today<br />
http://www.kpmg.com.au/Portals/0/rasita_strategic-evolution200701.pdf 27 January<br />
Lacity, M., & Willcocks, L. 2001. Global IT Outsourcing - In search for Business Advantage. Chichester: John<br />
Wiley & Sons Ltd.<br />
Lacity, M. C., Khan, S., Yan, A., & Willcocks, L. P. 2010. A Review of the IT Outsourcing Empirical Literature <strong>and</strong><br />
Future Research Directions. Journal of <strong>Information</strong> Technology, 25(4): 395-433.<br />
Lee, S.-K., Lee, J., & Shin, H. 1999. The Triangular Structure of Key Actors in Outsourced <strong>Information</strong> Systems<br />
Development Projects. Journal of <strong>Information</strong> Technology <strong>Management</strong>, 10(3-4): 1-24.<br />
Levina, N., & Vaast, E. 2008. Innovating or doing as told? Status differences <strong>and</strong> overlapping boundaries in offshore<br />
collaboration. MIS Quarterly, 32(2): 307-332.<br />
Lindstrom, L., & Jeffries, R. 2004. Extreme Programming <strong>and</strong> Agile Software Development Methodologies. <strong>Information</strong><br />
Systems <strong>Management</strong>, 21(3): 41-52.<br />
Ravi, F. 2008. IS outsourcing - a strategic perspective. Business Process <strong>Management</strong> Journal, 14(6): 858-864.<br />
Shao, B. B. M., & David, J. S. 2007. The Impact of Offshore Outsourcing on IT Workers in Developed Countries.<br />
Communications of the ACM, 50(2): 89-94.<br />
Strauss, A. L., & Corbin, J. 1990. Basics of Qualitative Research: Grounded Theory, Procedures, <strong>and</strong> Techniques.<br />
Newbury Park, CA: Sage Publications.<br />
Yin, R. K. 2009. Case study research: design <strong>and</strong> methods (4 ed.). Thous<strong>and</strong> Oaks, Calif.: Sage.<br />
242
A Fair Partnership Model by Sharing the Benefit of<br />
<strong>Knowledge</strong> Creation<br />
Ghassan Kbar<br />
Riyadh Techno Valley, King Saud University, Saudi Arabia<br />
gkbar@ksu.edu.sa<br />
gahkbar@yahoo.com<br />
Abstract: Sharing of information <strong>and</strong> knowledge as well as providing the relevant financial support is the main<br />
factor for creating innovations, while protecting the Intellectual property (IP) will satisfy the requirement for<br />
sharing of knowledge fairly <strong>and</strong> preserve the right of the inventors. In order to benefit from the innovations by<br />
creating or enhancing the characteristics of associated products at science parks, investors need to be<br />
encouraged for spending enough funds for the development. This can be done by providing a fair partnership<br />
model that intends to identify the role, right, <strong>and</strong> responsibility of each party, in addition to providing a good<br />
incentive program to attract the Venture Capital (VC) fund to support the project development. In this paper, a<br />
survey has been conducted to evaluate projects that are running in Saudi Arabia in order to underst<strong>and</strong> the<br />
difficulties in attracting funds through a Venture Capital program, so the proper solution can be recommended.<br />
Moreover, a proper partnership model that is based on a good incentive <strong>and</strong> a fair sharing of profit <strong>and</strong> risk is<br />
presented. Two categories of partnership models <strong>and</strong> fair methods for sharing the benefit of IP <strong>and</strong> the Return of<br />
Investment ROI have been proposed. These categories are based on sharing the development <strong>and</strong> investment.<br />
The partnership development model includes the owner of the idea, the funding partner, <strong>and</strong> the operational<br />
partner. The calculations of the two partnership models have been presented, which highlight on the distribution<br />
of profit or loss in a fair manner. Providing a fair partnership solution would improve the trust among partners <strong>and</strong><br />
attracted them to work harder toward successful projects<br />
Keywords: knowledge economy, partnership, venture capital, investment<br />
1. Introduction<br />
<strong>Information</strong> sharing is critical for the creating of useful knowledge. At the same time protecting the<br />
Intellectual property (IP) satisfies the requirement for sharing of knowledge to a certain group, <strong>and</strong><br />
encourages innovators, researchers, partners <strong>and</strong> investors to put extra effort to develop their ideas<br />
towards innovation. Networks encourage sharing of knowledge <strong>and</strong> play an important role for bringing<br />
innovation-specific resources <strong>and</strong> expertise for entrepreneurial teams to create new opportunities<br />
(Rothwell 1991), <strong>and</strong> (Zaheer 2005). Stakeholders such as government agencies, universities,<br />
science parks, suppliers <strong>and</strong> competitors have a great influence on innovation (Gibb 1995). In<br />
addition, partnership between industry <strong>and</strong> universities has been considered in many countries as<br />
part of national policies to strengthen innovation. Most innovative firms, around 90%, had formal links<br />
with universities according to study done by Wilkinson et al. (1996). Additionally, a significant<br />
relationship was found between the introduction of new products <strong>and</strong> university networking (Freel<br />
2003). Hence, collaboration among universities <strong>and</strong> industries as well as government agencies,<br />
science parks <strong>and</strong> investors is highly recommended for successful innovative products. Since there<br />
would be many parties involved in the development <strong>and</strong>/or investment to create product from the<br />
innovation, there should be a proper <strong>and</strong> fair way to share the benefit <strong>and</strong> profit/loss of the<br />
investment. This can be done through an attractive partnership model. Where the model should<br />
identify what the partnerships can accomplish, the initial terms <strong>and</strong> conditions to be, the best way of<br />
communication that can be used to discuss their possible involvement, the development of a fair<br />
business sharing model, <strong>and</strong> what role <strong>and</strong> commitment of each party to have.<br />
In order to have an effective partnership relationship management, there is a need to build<br />
partnership culture, which can be done through openness, creativity, ability, <strong>and</strong> resiliency (Stephen<br />
2006). Building a trust <strong>and</strong> mutually beneficially relationship is the main criteria for accomplishing the<br />
goals of all partners to obtain an effective partnership. According to Stephen (2006), this can be done<br />
by; all partners are entered in the agreement voluntarily, all partners have equal power <strong>and</strong><br />
accountability, all partners share information <strong>and</strong> knowledge openly, all partners are equally valuable,<br />
all partners want to arrive at the best outcome, <strong>and</strong> partners seek out <strong>and</strong> support success for other.<br />
Partnership culture should be based on a fair model, where fairness becomes the main critical issue<br />
for successful partnership since it provides a good chance for partners to accept the deal <strong>and</strong> allows<br />
them to quickly grow their business together. Partner Relationship <strong>Management</strong> (PRM) is about<br />
underst<strong>and</strong>ing the needs of one’s business partners to satisfy those needs while maintaining the trust<br />
among all parties. In order for partners to underst<strong>and</strong> each other commitments in the partnership<br />
243
Ghassan Kbar<br />
model, Stephen (2006) developed a survey with 15 questions that are focused of building trust,<br />
solving conflict, meet the needs of partners, sharing information <strong>and</strong> experiences, respect other party<br />
time, reinforcing the vision, monitoring the relationship, providing constructive feedback, how to reach<br />
the proper decisions, addressing the hard time, <strong>and</strong> celebrating the accomplishments.<br />
The current practice in almost all organizations doesn’t tackle the partnership issues fairly to attract<br />
partners <strong>and</strong> investors to contribute to the development <strong>and</strong> investment cycles. In order to build an<br />
effective partnership that is based on trust, a strategic framework that defines the vision, mission <strong>and</strong><br />
strategic directions has to be done first. Then a proper partnership culture should be prepared. A fair<br />
partnership model would boost the trust <strong>and</strong> prepare the ground for best partnership culture.<br />
Moreover, fairness is associated with fair in responsibility <strong>and</strong> commitment, fair in right <strong>and</strong> benefit,<br />
<strong>and</strong> fair in distributing the rewards <strong>and</strong> celebrating the accomplishments. On the other h<strong>and</strong>, a<br />
mechanism for assessing the value flows at the individual role level within partnerships has been<br />
covered by Optimice (2008). Where, the fundamental process for creation of the Partnership<br />
Scorecard is value network analysis (VNA). VNA identifies both tangible <strong>and</strong> intangible value flows<br />
between identified roles in the partnership. In this way performance is assessed at the “role” level<br />
enabling corrective or enhancement actions to be implemented directly. Fairness in development <strong>and</strong><br />
investment partnerships can be achieved by calculating the overall cost of the system associated with<br />
these partnerships, <strong>and</strong> based on the contribution of each party there would be appropriate benefit. In<br />
addition to fairness, there should be a proper incentive program which brings confidence <strong>and</strong> used to<br />
attract the Venture Capital (VC) organizations or bodies to fund the project development. This has an<br />
effect on improving the climate of investment <strong>and</strong> building the trust among researchers <strong>and</strong> the VC<br />
bodies. In order to achieve this target, it is recommended to simplify the administrative procedures at<br />
all institutions related to investment activity, intensify the advisory side to strengthen the confidence in<br />
investment environment, solve the problems of corruption <strong>and</strong> mismanagement, <strong>and</strong> encourage the<br />
foreign investment.<br />
A partnership model allows funders to share the responsibility <strong>and</strong> profits where VC tries to facilitate<br />
the work between the investors <strong>and</strong> funder by getting some financial reward for the funder that ranges<br />
from 15% to 30%, in addition to around 2.5% for management expensive. This is unlike a bank loan<br />
where the investors have to return the loan plus interest in regards whether the project is successful<br />
or not, but in VC the investors would take all the profit generated from their projects. To build the trust<br />
between funders through VC <strong>and</strong> investors <strong>and</strong> reducing the risk, the fund can be done in different<br />
steps which can be aligned to seed fund phase, starting phase, growing <strong>and</strong> development phase,<br />
transition phase, final funding phase <strong>and</strong> exit phase. There are some disadvantages for partnership<br />
through VC, such as the involvement in managing the project which might direct it to different<br />
direction that is the opposite to the will of executive managers, <strong>and</strong> the high risk that might be<br />
associated with loosing the invested money in case of project failure. By looking at the case of<br />
funding projects <strong>and</strong> companies in the development countries such as King Saudi Arabia (KSA), there<br />
are around 700 companies or projects have been licensed but couldn't start because of the lack in<br />
funding <strong>and</strong> expertise (Saudi-chamber 2011). To overcome this problem, these projects can be<br />
evaluated to attract funding through Venture Capital program, where proper partnership models that is<br />
based on good incentive <strong>and</strong> fair sharing of profit <strong>and</strong> risk can be adopted. The role of government<br />
has facilitated the VC funding for small <strong>and</strong> medium projects to minimize the risk (Saudi-fund 2011).<br />
There are advantages of funding projects through partnership compared to loan funding which<br />
includes the following: partnership commitment according to participation, the ability to distribute profit<br />
among partners according to level <strong>and</strong> amount of share, the possibility of partner exiting the projects<br />
by selling its shares. However, the disadvantage of partnership model is the possibility of stopping the<br />
execution of the projects in case some partners can't commit to provide the agreed funding. Funding<br />
projects through Incubators <strong>and</strong> Science Parks can be done to support innovation (Sophia-antipolis<br />
2011), (Galbraith 2002), <strong>and</strong> (ncsu 2011). Science parks at development countries are facing<br />
difficulties in attracting companies to have partnership <strong>and</strong> to fund the technological projects. These is<br />
related to lack of trust among investors in the research outcome, lack of knowledge in Venture Capital<br />
funding, some of the legal constraints that discourages the investment in technologies, weakness <strong>and</strong><br />
lack of management skills, <strong>and</strong> lack of fair partnership models. In the following section VC project<br />
funding at KSA would be analyzed to determine the obstacles facing its progress, <strong>and</strong> in section III,<br />
fair partnership models are presented to attract investors <strong>and</strong> innovators to work together.<br />
244
Ghassan Kbar<br />
2. Partnership <strong>and</strong> VC project funding in KSA<br />
In order to identify the problems facing the technological entrepreneurship projects at KSA, a survey<br />
has been conducted through contacting companies' managers in Saudi Arabia as shown in Figure 1.<br />
According to this survey, the most critical obstacles facing the VC project funding are related to lack of<br />
skills (61%), education programs (54%), research capability (51%), <strong>and</strong> management (37%), which all<br />
contributes to lowering the trust among investors <strong>and</strong> funders. There are other obstacles associated<br />
with funding constraints that are caused by the lack of knowledge <strong>and</strong> good incentive program to<br />
attract partners through a fair partnership models. There are some other obstacles associated with<br />
acquiring knowledge, existing regulations <strong>and</strong> conf<strong>using</strong> procedures <strong>and</strong> company processes. These<br />
results give an indication to the main obstacles facing the development countries, where skills,<br />
experiences <strong>and</strong> knowledge are the main factors in slowing down the creation of knowledge based<br />
economy compared to the existence of funding. This will reduce the trust among VC organizations to<br />
involve in the partnership <strong>and</strong> to support the development of technological projects.<br />
Figure 1: Obstacles <strong>and</strong> difficulties facing technological entrepreneurship projects at KSA<br />
3. Fair partnership models<br />
Two categories of partnership models <strong>and</strong> fair methods for sharing the benefit of IP <strong>and</strong> the Return of<br />
Investment ROI are described in this section. These categories are based on development <strong>and</strong><br />
investment. In both partnership models, the following methodology describes how to reach a effective<br />
fair partnership. First, the involved parties have to be determined. Then, their direct <strong>and</strong> indirect<br />
contributions to the shared project would be identified, <strong>and</strong> finally the formulas that calculate the value<br />
of the project at a particular time <strong>and</strong> how profit or loss can be distributed fairly among partners need<br />
to be done. The partnership development model includes the following parties, the owner of the idea,<br />
the funding partner, <strong>and</strong> the operational partner. Up on completion of the development, these 3<br />
parties would share the value of IP that is based on the stage of innovation <strong>and</strong> partner’s<br />
contributions. Where there are 4 innovation stages which include novel idea, proof of concept,<br />
prototype, <strong>and</strong> advance prototype. The following presents the percentage contribution of each party,<br />
<strong>and</strong> the calculation of the development partnership model that is based on the bellow assumptions:<br />
D = Total expense of development (for the period of the projects)<br />
P = Partnership development contribution = D/X, where 1/X is the percentage of contribution<br />
K = Science Park development contribution = D(1 – 1/X)<br />
V = Value of IP<br />
Idea Owner share = O<br />
R = Residue of share = V – O<br />
Partner share of V = [(1/X)*100]% of R = y of R<br />
245
Ghassan Kbar<br />
Science Park share of V = [100-(1/X)*100]% of R = z of R<br />
Assumptions: for New Ideas O = 50% of V, for Proved Ideas O = 60% of V, for Prototype O = 70%<br />
of V, for Advance prototype O = 80% of V.<br />
Therefore, the science park share of IP would be: z of (V – O), <strong>and</strong> the Partner share of IP would be y<br />
of (V – O)<br />
Development Partnership Calculation:<br />
As shown in Table 1, the formula used for calculating the benefit of all partners in the development<br />
partnership model is presented, <strong>and</strong> Table 2 shows an example for sharing the IP benefit. The<br />
following assumptions <strong>and</strong> formulas are used in the tables:<br />
D = Total expense of development (for the period of the projects) = equip cost + office cost +<br />
service cost + training cost + developer cost + travel cost + core equip cost<br />
P = Partnership development contribution = D/X<br />
K = Science Park development contribution = D(1 – 1/X)<br />
V = Value of IP<br />
Idea Owner share = O<br />
R = Residue of share = V – O<br />
Partner share of V = [(1/X)*100]% of R = y of R<br />
Science Park Share of V = [100-(1/X)*100]% of R = z of R<br />
Table 1: Sharing of intellectual property formula<br />
Entering state of the projects<br />
New Ideas Proved Ideas Prototype Advance prototype<br />
Intellectual Owner share of O = 50% of O = 60% of V O = 70% of V O = 80% of V<br />
property<br />
IP<br />
V<br />
Science Park<br />
share of IP<br />
z of (V – O)<br />
Partner share of<br />
IP<br />
y of (V – O)<br />
Example: D = 6,000,000 SR, X = 3, V = 20,000,000 SR<br />
P = 6,000,000/3 = 2,000,000 SR (Partner contribution)<br />
K = 6,000,000 – 2,000,000 = 4,000,000 (Science Park contribution)<br />
Y = [(1/X)*100]% = (1/3*100)% = 33 %<br />
z = [(100- 1/X)*100]% = (100-1/3*100)% = 67 %<br />
Table 2: Example for sharing of intellectual property calculation<br />
Entering state of the projects<br />
New Ideas Proved Ideas Prototype Advance<br />
prototype<br />
Intellectual Owner share of O = 50% of V = O = 60% of V = O = 65% of V = O = 70% of V =<br />
property IP<br />
10,000,000 12,000,000 13,000,000 14,000,000<br />
Science Park z of (V – O) = z of (V – O) = z of (V – O) = z of (V – O) =<br />
share of IP 67%<br />
67%<br />
67%<br />
67%<br />
(20,000,000- (20,000,000- (20,000,000- (20,000,000-<br />
10,000,000) 12,000,000) 13,000,000) 14,000,000)<br />
=6,700,000 =5,360,000 =4,690,000 =4,020,000<br />
Partner share of y of (V – O) = y of (V – O) = y of (V – O) = y of (V – O) =<br />
IP<br />
33%<br />
33%<br />
33%<br />
33%<br />
(20,000,000- (20,000,000- (20,000,000- (20,000,000-<br />
10,000,000) 12,000,000) 13,000,000) 14,000,000)<br />
=3,300,000 =2,640,000 =2,310,000 =1,980,000<br />
EL=Expense left D-D = 0 5%D = 300,000 10%D = 600,000 15%D =<br />
over (Science<br />
Park)<br />
sR<br />
sR<br />
9,000,000 SR<br />
246
Ghassan Kbar<br />
Entering state of the projects<br />
New Ideas Proved Ideas Prototype Advance<br />
prototype<br />
6.7 m – 4 m = 5.36 m – 4 m + 4.69 m – 4 m 4.02 m – 4m +<br />
Science Park<br />
profit<br />
2.7 m<br />
0.3m = 1.66m<br />
Partner profit 3.3m-2m= 1.3m 2.64m-<br />
2m=0.64m<br />
Investment Partnership Calculation:<br />
+0.6m = 1.29 m<br />
2.31m-<br />
2m=0.31m<br />
0.9m = 0.92m<br />
1.98m-2m=-<br />
0.02m<br />
The partnership investment model includes the owner of IP, the investing partner, the funding partner,<br />
<strong>and</strong> the operational partner. At any stage of the investment, these 4 parties would share the value of<br />
the business which based on the invested capital or partners’ contributions, the current value of IP<br />
<strong>and</strong> the current value of the business. The proposed method provide fair distribution of benefit which<br />
preserve the right of involved parties <strong>and</strong> consequently attract partners to invest in developing new<br />
innovation <strong>and</strong> creating useful products. The development partnership model would be excellent for<br />
Incubation, <strong>and</strong> the investment partnership model would be excellent for Science Park.<br />
As shown in Table 3, the formula used for calculating the benefit of all partners in the investment<br />
partnership model is presented, Table 4 shows an example for sharing the profit generated from this<br />
investment, <strong>and</strong> Table 5 shows another example for sharing the loss generated from this investment.<br />
The following assumptions <strong>and</strong> formulas are used in the tables:<br />
I = Total expense of Investment (for the period of the projects) = value of IP + equip cost+<br />
operation cost<br />
Pi = Partnership Investment contribution = I/w<br />
Fi = Funder Investment contribution = I/F<br />
Ki = Science Park Investment contribution = I – I/w – I/F<br />
V i= current Value of Investment<br />
Initial Value of IP = V<br />
Current Value of IP =Vc =V+20% of (Vi-I)<br />
ROI =Return of Investment or Profit/Loss of Investment = Vi-I-Vc<br />
Partner share of Vi = [(1/w)*100]% of ROI = p of ROI<br />
Funder share of Vi = [(1/F)*100]% of ROI = q of ROI<br />
Science Park Share of Vi = [100-(1/w+1/F)*100]% of ROI = s of ROI<br />
Table 3: Sharing of investment partnership formula<br />
IP owner Science Park Partner Funder<br />
Investment cost<br />
percentage<br />
0 [1-(1/W+1/F)]% of I 1/W% of I 1/F% of I<br />
ROI percentage<br />
of parties<br />
V-Vc s of ROI p of ROI q of ROI<br />
In order to calculate the profit or loss at a particular time in the partnership investment model, there is<br />
a need to know the correct value of the project investment including the value of current IPs, the<br />
overall cost of the project <strong>and</strong> its current assets, <strong>and</strong> the market value of the product outcome, in<br />
addition to the indirect business value such as knowledge <strong>and</strong> employees experiences. The most<br />
challenging issue is related to accurate estimation of the current IPs <strong>and</strong> knowledge creation,<br />
whereas the estimation of current assets <strong>and</strong> product value would be easier. The estimation of<br />
knowledge <strong>and</strong> employees experiences is subjective <strong>and</strong> depends on how relevant these parameters<br />
to organizations or partner. Therefore, the current value of investment has to be calculated on a<br />
project basis, where the indirect benefit related to knowledge <strong>and</strong> experiences might vary from<br />
country to country, <strong>and</strong> from organizations to other. Example experiences <strong>and</strong> knowledge in<br />
development countries would be valued more than developed countries because of the relatively low<br />
st<strong>and</strong>ard education in these development countries.<br />
247
Ghassan Kbar<br />
Example (profit): Investment cost: I = 50,000,000 SR , Pi: 1/W=30%, Fi=1/F=50%, Ki=20%, Initial<br />
value of IP V= 20,000,000 SR<br />
V i= current Value of Investment = 100,000,000 SR<br />
Current value of IP = Vc = 20m+0.2*(100m-50m)=20m+10m=30m<br />
ROI = Vi-I-Vc = 100m-50m-10m = 40m<br />
Table 4: Example for sharing the profit of investment partnership calculation<br />
IP owner Science Park Partner Funder<br />
Investment cost<br />
percentage<br />
0 0.2*50m= 10m 0.3*50m= 15m 0.5*50m= 25m<br />
ROI percentage of V-Vc=25m-<br />
s of ROI = p of ROI = 0.3*40m q of ROI = 0.5*40m<br />
parties (profit) 20m=5m 0.2*40m= 8m<br />
= 12m<br />
= 20m<br />
Example (Loss): Investment cost: I = 50,000,000 SR , Pi: 1/W=30%, Fi=1/F=50%, Ki=20%, Initial<br />
value of IP V= 20,000,000 SR<br />
V i= current Value of Investment = 40,000,000 SR<br />
Current value of IP = Vc = 20m+0.2*(40m-50m)=20m-2m=18m<br />
ROI = Vi-I-Vc = 40m-50m-2m = -12m<br />
Table 5: Example for sharing the loss of investment partnership calculation<br />
IP owner Science Park Partner Funder<br />
Investment cost<br />
percentage<br />
0 0.2*50m= 10m 0.3*50m= 15m 0.5*50m= 25m<br />
ROI percentage of V-Vc=18m-20m= - s of ROI = 0.2*(- p of ROI = 0.3*(- q of ROI = 0.5*(parties<br />
(loss)<br />
2m<br />
12)m= -2.4m 12)m= -3.6m 12)m= -6m<br />
4. Conclusion<br />
The concept of fair partnership models has been presented, which is based on a fair calculation<br />
method for sharing the benefit/loss of the knowledge creation, as well as presenting a proper way for<br />
attracting funds through VC. The fair partnership methodology requires identifying the relevant<br />
partners, their contribution, <strong>and</strong> the formula for calculating their shares <strong>and</strong> return on investment. The<br />
VC funding in development country at Saudi Arabia has been analysed <strong>and</strong> the indications has shown<br />
a lack of trust in innovation caused by low level of innovation skills <strong>and</strong> problems in education<br />
programs <strong>and</strong> management, in addition to other obstacles associated with regulation <strong>and</strong> internal<br />
process. A new method for sharing the IP among partners <strong>and</strong> innovators has been described, which<br />
provide a fair <strong>and</strong> proper way for sharing the benefit or loss. In addition to presenting the method for<br />
sharing benefit or loss among investors <strong>and</strong> partners who support the project development toward<br />
creating products to assist the knowledge based economy. Two examples for calculating the benefit<br />
<strong>and</strong> loss for all partners in the investment partnership model has been presented, where it is clear<br />
how fair is the suggested solution in sharing the outcome of the projects. This would achieve a high<br />
level of trust among partners, <strong>and</strong> therefore make them doing their best toward achieving successful<br />
project <strong>and</strong> celebrating their achievement.<br />
References<br />
Freel, M. (2000) “External linkages <strong>and</strong> product innovation in small manufacturing firms”, Entrepreneurship <strong>and</strong><br />
Regional Development, 12, 245-266.<br />
Galbraith, (2002) “The Chronicle of Higher Education”, Technology Parks Become a force in Europe, vol 48,<br />
Issue 18.<br />
Gibb, A. (1995) “Learning skills for all: The key to success in small business development”, ICSB Annual<br />
Conference Proceedings, 1-21.<br />
Ncsu, (2011) [online], http://centennial.ncsu.edu/technology-incubator.php.<br />
Optimice, (2008) The Partnership Scorecard, [online],<br />
http://www.optimice.com.au/documents/ThePartnershipScorecard.pdf, Optimice.<br />
Rothwell, R. (1991) “External networking <strong>and</strong> innovation in small <strong>and</strong> medium size manufacturing firms in<br />
Europe”, Technovation, 11(2). pp. 93-112.<br />
248
Ghassan Kbar<br />
Saudi-chamber, (2011) [online], http://www.chamber.org.sa/English/<strong>Information</strong>Center/Pages/db.aspx.<br />
Saudi-fund, (2011) [online], http://www.chamber.org.sa/English/EDC/Pages/FundingSupport.aspx.<br />
Sophia-antipolis, (2011) [online], http://investincotedazur.com/en/projet/implantation.php.<br />
Stephen M. Dent, (2006) “Implementing a Plan for Success, Partnership Relationship <strong>Management</strong>”, [online],<br />
www.partneringintelligence.com, Partnership Continuum, Inc.<br />
Zaheer, A. <strong>and</strong> Bell, G.G.(2005) “Benefits from network position: Firm capabilities, structural holes <strong>and</strong><br />
performance”, Strategic <strong>Management</strong> Journal, 26, 809-825.<br />
Wilkinson, F., Lawson, C, Keeble, D., Lawton-Smith, H. <strong>and</strong> Moore, B. (1996) “Innovative behaviour of<br />
technology-based SMEs”, joint CBR/Warwick SME Centre conference on innovation in small firms,<br />
University of Cambridge, Cambridge.<br />
249
Measuring the Effectiveness of National <strong>Knowledge</strong> Based<br />
Economy<br />
Ghassan Kbar <strong>and</strong> Abdul Aziz AlDusari<br />
Riyadh Techno Valley, King Saud University, Saudi Arabia<br />
gkbar@ksu.edu.sa<br />
gahkbar@yahoo.com<br />
adawsari@KSU.EDU.SA<br />
Abstract: Effective <strong>Knowledge</strong> <strong>Management</strong> KM is an important process for h<strong>and</strong>ling information which is<br />
essential for implementing successful projects <strong>and</strong> makes improvement to the knowledge based economy. KM<br />
deals with how knowledge is produced, shared in a secure manner, <strong>and</strong> used by organizations or individual for<br />
the benefit of the economy. In order to achieve an effective KM that contributes to the overall knowledge<br />
economy, there should be a proper way to measure it according to well known set of criteria. In this paper an<br />
analytical method has been devised based on different performance indicators to verify the availability of useful<br />
knowledge which is linked successful knowledge investment <strong>and</strong> its business continuity. Unlike other methods<br />
that focus on descriptive approach, the analytical method relies on qualitative approach that is based on how the<br />
probability of the knowledge factors can occur in a certain environment. This new method would allow managers<br />
to evaluate the performance of knowledge based economy of different nations an assist them in identifying the<br />
reason for lacking economy growth, <strong>and</strong> therefore plan for improvement.<br />
Keywords: knowledge economy, measuring effectiveness, performance indicator, assess of knowledge<br />
1. Introduction<br />
New information that is created by individual or group would become useful knowledge once is shared<br />
among other <strong>and</strong> used to improve the operation of related phenomenon. In this era, the computer<br />
technology contributes so heavily to superabundance of information which starts to become part of<br />
the solution for knowledge management KM, in a variety of domains. By the mid-1990s, knowledge<br />
management initiatives were flourishing because of the wide spread of the Internet. The International<br />
<strong>Knowledge</strong> <strong>Management</strong> Network (IKMN), begun in Europe in 1989, went online in 1994 <strong>and</strong> was<br />
soon joined by the U.S.-based <strong>Knowledge</strong> <strong>Management</strong> Forum <strong>and</strong> other KM-related groups <strong>and</strong><br />
publications. In 1994 the IKMN published the results of a knowledge management survey conducted<br />
among European firms, <strong>and</strong> the European Community began offering funding for KM-related projects<br />
through the ESPRIT program in 1995. <strong>Knowledge</strong> is not only about creation of information, but rather<br />
about developing certain pattern <strong>and</strong> distributes it efficiently to selective people. The mechanism of<br />
creation of knowledge, storing it, sharing it <strong>and</strong> dissemination <strong>and</strong> how to convey them meaningfully<br />
to some other person is called knowledge management KM.<br />
<strong>Knowledge</strong> <strong>Management</strong> relates directly to the effectiveness with which the managed knowledge<br />
enables the members of the organization to deal with today's situations <strong>and</strong> effectively envision <strong>and</strong><br />
create their future (bel97a 2004).<br />
A sound KM depends on the effective distribution of KM <strong>and</strong> not only the production of efficient KM.<br />
This can be done through secure Wireless network that has the advantages of flexibility, mobility,<br />
easy administration, reducing the information-related risk, <strong>and</strong> support of security (G. Kbar 2005).<br />
Wireless Local Area Network (WLAN) technology is rapidly becoming a crucial component of<br />
computer networks that widely used in the past few years (Jim 2002), (Rob 2001), (Signa 2001), <strong>and</strong><br />
(Nortel 2001). It provides mobility as well as essential network services where wire-line installation<br />
proved impractical. The inclusion of the newer IEEE 802.11g versions of the st<strong>and</strong>ard offers a firm<br />
basis for high performance wireless LANs. Companies <strong>and</strong> organizations are investing in wireless<br />
networks at a higher rate to take advantage of mobile, real-time access to information. However,<br />
users of wireless technology need to be aware of its performance in term of coverage, throughput,<br />
accessibility <strong>and</strong> security. The security factor is critical in wireless LAN. There are many research<br />
papers discussing how to improve the security of wireless system to an equivalent or better rate than<br />
wired LAN (Nortel 2011), (Lisa 2001), (Schwartau 2001), (Dave 2002), <strong>and</strong> (Blackwell 2002).<br />
Successful collaborative platform strategies provide value for users by improving knowledge sharing.<br />
This encourages many enterprises that have been tantalized by the promise of collaborative<br />
technologies claiming to offer everything from better innovation to streamlined workflows. However<br />
250
Ghassan Kbar <strong>and</strong> Abdul Aziz AlDusari<br />
successful sustainable collaborative platform strategies must be designed, from the ground up,<br />
around three major factors, which are usability, impact on end user, <strong>and</strong> organizational readiness.<br />
Collaborative platform success is dependent on user adoption <strong>and</strong> adoption is based on thoughtful<br />
design <strong>and</strong> forward-thinking enterprise processes (nGenera 2010). A knowledge society is an<br />
indication of the ability of society to produce <strong>and</strong> use of knowledge as well as sharing of knowledge<br />
<strong>using</strong> the proper technology (Paul 2003).<br />
A READINESS ASSESSMENT is a necessary part of 'due diligence' in any serious new initiative,<br />
most especially so in corporate business, where a failed initiative is more often than not painfully<br />
costly (Ann 2008). With respect to the company's knowledge <strong>and</strong> KM status, the KeKma-Audit (Ann<br />
2008) READINESS Analysis is designed to determine/show: the Current READINESS State, the<br />
Desired READINESS State, the READINESS Gap State (difference between current & desired state),<br />
the True READINESS State (what is perceived vs what really is), the Necessary ACTION (what needs<br />
to done to bridge gaps). The method used in KeKma-Audit can be used for determining the<br />
organization's readiness not only to implement KM, but also its readiness to be truly a knowledgebased,<br />
knowledge driven organization. However, this method focuses on the descriptive<br />
questions/answer approach to determine the gap, which can't be quantified to measure the<br />
organization performance. In this paper a new analytical method that is based on how the probability<br />
of the knowledge factors can occur in certain environment has been suggested to quantify the<br />
performance of certain organization. This new method would allow managers to evaluate the<br />
performance of knowledge based economy of different nations or organizations <strong>and</strong> assist them in<br />
identifying problems <strong>and</strong> guide them on how to plan for improvement.<br />
2. Measuring the effectiveness of <strong>Knowledge</strong> Based Economy (KBE)<br />
The World Bank invented a method for assessing the knowledge which is known as "<strong>Knowledge</strong><br />
Assessment Methodology (KAM)" (Worldbank 2011). This method includes 109 parameters which<br />
can be used to assess the core of knowledge based economy that is associated with economical<br />
incentive, education, innovation, <strong>and</strong> ICT. There is no correlation among the different parameters<br />
used in this assessment, <strong>and</strong> what would be the overall performance indicator for a particular nation.<br />
In addition, these parameters that are used for measuring the effectiveness are grouped in 8<br />
elements. These elements are economical performance, system of economy, government, innovation<br />
system, education system, workers, equal employment opportunities, <strong>and</strong> ICT. Evaluation of these<br />
parameters is subjective <strong>and</strong> is based sometime on absolute values, or relative values, To complete<br />
the assessment of a particular country, it requires to cover the 109 parameters, where many variables<br />
have to be considered. These variables include some of the indexes such as; annual GDP growth,<br />
human development index, poverty index, composite risk rating, capital formation, trade, tariff, IP,<br />
export, interest rate, rule <strong>and</strong> law, regulatory quality, political stability, control of corruption, research,<br />
publication, employment, technology, <strong>and</strong> many other parameters. To simplify the procedure, the<br />
World Bank reduces the groping to six which are <strong>Knowledge</strong> Economy Index, <strong>Knowledge</strong> Index,<br />
Economic Incentive, Innovation, Human capital, <strong>and</strong> ICT. Table 1 presents some of the result given<br />
by the KMA 2009 measurement (info.worldbank 2009).<br />
In this paper to validate the performance of <strong>Knowledge</strong> based Economy for certain nation, a<br />
quantitative <strong>Knowledge</strong> Base Economy (KBE) assessment methodology has been used to evaluate<br />
the outcome based on identified Key Performance Indicators PKI as shown in the next subsection.<br />
This new method try to simplify the measurement performance procedure based on defining a new<br />
set of groups <strong>and</strong> parameters. By looking at the topic of sustainable nation’s knowledge based<br />
economy, we can determine three main indicators which affect the KBE performance which are<br />
knowledge, investment, <strong>and</strong> Business continuity. Each of these elements group is associated with<br />
different parameters as will be explained in the subsection B. There are different PKI group that can<br />
be used to analyze the performance of the knowledge based economy. The first PKI can be used to<br />
check the probability of having the required useful knowledge, where PKI=100% means a nation<br />
would have all the required knowledge factors to build its economy. The second PKI is the ability to<br />
invest which can be measured by the different factors as explained below, where the total PKI of<br />
100% would mean a high success in the project investment. The third PKI is the ability to maintain the<br />
success of the business which can be measured by the different factors as explained below, where<br />
the total PKI of 100% would mean of having high business project success continuity. In the<br />
subsection B, the description of each performance indicators <strong>and</strong> their factors which contributes to the<br />
overall value of these indicators is included.<br />
251
Table 1: KEI <strong>and</strong> KI indexes (KAM) 2009<br />
Rank<br />
1 +2 Denmark<br />
Co un try (click o n the<br />
nam e to see basic<br />
scorecard)<br />
Ghassan Kbar <strong>and</strong> Abdul Aziz AlDusari<br />
KEI<br />
KI<br />
Eco no m ic<br />
Incentiv e<br />
Re gim e<br />
Innovation<br />
Education<br />
9.5 2 9.49 9.61 9.49 9.78 9.21<br />
2 -1 Sw e den 9.51 9.57 9.33 9.76 9.29 9.66<br />
3 -1 Finl<strong>and</strong> 9.37 9.39 9.31 9.67 9.77 8.73<br />
4<br />
N eth e rla nd s 9.3 5 9.39 9.22 9.45 9.21 9.52<br />
5 +2 Norway 9.31 9.25 9.47 9.06 9.60 9.10<br />
6 +6 Canada 9.17 9.08 9.45 9.44 9.26 8.54<br />
7 +2 Unite d Kingdom 9.10 9.06 9.24 9.24 8.49 9.45<br />
8 +6 Irel<strong>and</strong> 9.05 8.98 9.26 9.08 9.14 8.71<br />
9 -3 Unite d States 9.02 9.02 9.04 9.47 8.74 8.83<br />
10 -5 Sw itze r la n d<br />
9.0 1 9.09 8.79 9.90 7.68 9.68<br />
11 -3 A u str a lia 8.97 9.08 8.66 8.88 9.69 8.67<br />
12 +3 Ge rm any 8.96 8.92 9.06 8.94 8.36 9.47<br />
13 +4 Icel<strong>and</strong> 8.95 8.76 9.54 8.07 9.41 8.80<br />
14 -3 N ew Ze al<strong>and</strong> 8.92 8.97 8.79 8.66 9.78 8.46<br />
15 -5 Austria 8.91 8.78 9.31 9.00 8.48 8.85<br />
16 -3 B e lg ium 8.80 8.77 8.87 8.93 9.14 8.25<br />
17 +2 Luxembourg 8.64 8.37 9.45 9.00 6.61 9.51<br />
18 +3 Ta iw a n, Ch in a<br />
8.4 5 8.79 7.42 9.27 7.97 9.13<br />
19 +1 Singapore 8.44 8.03 9.68 9.58 5.29 9.22<br />
20 -4 Jap an 8.42 8.63 7.81 9.22 8.67 8.00<br />
2.1 Quantitative KBE assessment methodology<br />
In order to assess the performance of a sustainable nation’s knowledge based economy, there is a<br />
need to identify the main indicators that affect the KBE performance, as well as the elements related<br />
to them <strong>and</strong> how they are correlated to each other. There three are three main keywords associated<br />
with the sustainable KBE; knowledge, investment, <strong>and</strong> Business continuity. The first main indicator<br />
associated with KBE is the required knowledge which determines the level of competency <strong>and</strong> ability<br />
to play an important role for building a strong KBE. The second main indicator is investment, which is<br />
needed for developing projects required for the success of KBE. The third main indicator is continuity<br />
of business for sustainable KBE. These three indicators (knowledge, investment <strong>and</strong> business<br />
continuity KIC) are the one that needs to be measured <strong>and</strong> evaluated in order to measure the<br />
effectiveness of the KBE. Furthermore, the elements associated with each of these indicators have to<br />
be identified, as well as the correlation that exists among them. There is direct correlation between<br />
the knowledge <strong>and</strong> investment indicators since it is unlikely that an investment can be done without<br />
the existence of knowledge. However, there is less dependency among the first 2 indicators <strong>and</strong> the<br />
business continuity indicator since it is mainly depends on entrepreneurship, technology<br />
infrastructure, management <strong>and</strong> leadership. The main indicator of successful KBE is investment<br />
indicator which directly affects the nation economy. However, in order to quantify the investment<br />
indicator value, the effect of its elements including the knowledge indicator has to be assessed. The<br />
elements affect the value of investment indicator are knowledge, fund, technology infrastructure,<br />
skills/experience, <strong>and</strong> management. The percentage or the value of these elements has to be<br />
determined, <strong>and</strong> their values need to be optimized in order to maximize the overall investment<br />
252<br />
ICT
Ghassan Kbar <strong>and</strong> Abdul Aziz AlDusari<br />
indicator value to be close to 100%. To determine the percentage of each element is the investment<br />
indicator, we can refer to the goals that have been identified for a particular nation’s KBE, <strong>and</strong> try to<br />
link these elements to the goals by identifying the repetition of each element in the defined goals. Eg.<br />
Let’s analyze the goals of a particular science park (rtv 2011), listed below:<br />
Goals of (rtv 2011):<br />
Increase the level of interaction between KSU <strong>and</strong> Saudi knowledge-based industry, business<br />
<strong>and</strong> commerce. (requires management)<br />
Diversify the employment opportunities for graduates <strong>and</strong> post graduates. (requires knowledge,<br />
skills)<br />
Create a site that can be groomed to encourage foreign direct investment in the form of<br />
technology-based companies. (requires fund, technology infrastructure)<br />
Raise the profile of KSU as modern industry <strong>and</strong> business facing centre of learning. (requires<br />
knowledge)<br />
Create a source of independent income from KSU from its estate <strong>and</strong> from investments in<br />
technology-Based companies. (requires fund, management)<br />
Create an appropriate environment for establishing <strong>and</strong> developing a school of entrepreneurship.<br />
(requires knowledge)<br />
By looking at the above example, we can find that knowledge is repeated 3 times, management 2<br />
times, fund 2 times, skills <strong>and</strong> technology infrastructure one time. This can be related to percentage of<br />
the 5 elements, where the percentage of a particular element equal: element repetition/ total num of<br />
repetition X 100. Therefore, the knowledge or Metric <strong>Knowledge</strong> Investment (MKI) indicator would be<br />
(element repetition/ total num of repetition X 100 = 3/9X100= 30%) of the investment indicator, the<br />
fund or MKI indicator would be (2/9X100= 25%), the skills/experiences affects the MKI indicator by<br />
(1/9X100= 10%), the technology infrastructure affects the MKI indicator by (1/9X100= 10%), <strong>and</strong> the<br />
management affects the MKI indicator by (2/9X100= 25%).<br />
In order to determine the elements affecting the availability of useful knowledge indicator <strong>and</strong> their<br />
percentages, there is a need to identify how knowledge is created <strong>and</strong> how to quantify the contribution<br />
of these elements in creating a nation’s knowledge. <strong>Knowledge</strong> depends on the following elements;<br />
invention (discover new idea), additional value (innovation, quality of research), documentation, proof<br />
of new information, protection, <strong>and</strong> sharing of information. To determine the percentage of each<br />
element is the knowledge indicator, we can refer to the education system for a particular university<br />
<strong>and</strong> schools, <strong>and</strong> try to link these elements to their effect of the success of this education system by<br />
giving an equal or close value for the core, the quality, <strong>and</strong> processing of information. Therefore, the<br />
core (base knowledge, educational programs) would have a value of 35%, <strong>and</strong> 35% to quality which<br />
is divided among the additional value of 20%, <strong>and</strong> the proof of new information of 15% which is<br />
related to review process <strong>and</strong> implementation, <strong>and</strong> finally 30% for the processing of information which<br />
is divided equally (of 10%) among for the rest elements of documentation, protection <strong>and</strong> sharing of<br />
information.<br />
2.2 Key performance indicator definition <strong>and</strong> value<br />
By referring to the previous section which identifies the main indictors of KBE <strong>and</strong> theirs elements as<br />
well as the values <strong>and</strong> distribution of these elements that quantify the indicators (Availability of Useful<br />
<strong>Knowledge</strong>, Metric <strong>Knowledge</strong> Investment, <strong>and</strong> Business Project Continuity), the following sub<br />
sections explain in details the relevance <strong>and</strong> effect of these elements to the creation of the identified 3<br />
indicators. These indicators are used to measure the effectiveness of a nation’s KBE as shown in next<br />
section.<br />
2.2.1 Availability of Useful <strong>Knowledge</strong> (AUK) (maximum PKI of 100%)<br />
The following indicators can be used to evaluate the availability of useful knowledge which is a key<br />
factor for building a successful <strong>Knowledge</strong> Based Economy, where<br />
AUK=ADNI+CDV+RI+PNI+PK+ASI:<br />
ADNI Ability to Discover New Idea (maximum of 35% of the AUK's PKI) that depends on the following<br />
Items:<br />
253
Ghassan Kbar <strong>and</strong> Abdul Aziz AlDusari<br />
Having wide base knowledge 10% (base of education, level of experience of researcher or<br />
student, number of contributing to events)<br />
Having good Education system 10% (curriculum, type of delivery, experience level of instructor,<br />
qualification of Instructor)<br />
Having good Competition program 5% (university competition, national competition, world<br />
competition)<br />
Having good Reward 5% (based on achievement <strong>and</strong> outcome)<br />
Gaining experiences 5% (ability to gain experience, availability of opportunity to gain experiences)<br />
CDV Characteristic Additional Value (maximum of 20% of the AUK's PKI) that depends on the<br />
following Items:<br />
Quality of research 5% (ability to publish in conference <strong>and</strong> journals, internal evaluation of<br />
research)<br />
Ability for innovation <strong>and</strong> creativity 5% (help <strong>and</strong> fund, innovation skills, sharing events <strong>and</strong> learn<br />
about innovation)<br />
Evaluated by high st<strong>and</strong>ard organization 5% (evaluated by partners, evaluated by professional<br />
people, evaluated by marketing <strong>and</strong> investment professionals)<br />
Sharing <strong>and</strong> partnership 5% (existing of partner with companies, existing of joint research)<br />
RI Registering of <strong>Information</strong> (maximum of 10% of the AUK's PKI) that depends on the following<br />
Items:<br />
Existing of technology 3% (existing of technology hardware, software program for aided design<br />
<strong>and</strong> documentation)<br />
Willing for documentation 3%<br />
Ability to retrieve information 4% (easy to access information <strong>and</strong> publication)<br />
PNI Prove of New <strong>Information</strong> (maximum of 15% of the AUK's PKI) that depends on the following<br />
Items:<br />
Review of work 3% (reviewed by professional people, peer review)<br />
Ability to Implement a proof of concept 3% (design, pseudo code, algorithm)<br />
Ability to simulate 3% (simulation software)<br />
Ability to implement solution 5-6% (partial implementation, prototype, functional prototype,<br />
advance prototype)<br />
Existing of necessary facilities 3% (equipment, lab, software)<br />
PK Protecting of <strong>Knowledge</strong> (maximum of 10% of the AUK's PKI) that depends on the following<br />
Items:<br />
Having IP system 5%<br />
Sharing of profit 5% (partial, limited)<br />
ASI Absolute of Sharing of <strong>Information</strong> (maximum of 10% of the AUK's PKI) that depends on the<br />
following Items:<br />
Willing to share information 2%<br />
Workshop, conference <strong>and</strong> journal publication 4%<br />
Seminar <strong>and</strong> lecture presentation 2%<br />
Discussion & Brain storm 2%<br />
2.2.2 Metrics of knowledge Investment (MKI) (maximum PKI of 100%)<br />
The following indicators can be used to evaluate the possibility of successful knowledge investment,<br />
where MKI=AUK+APF+EI+ARS+GMT:<br />
AUK Availability of Useful <strong>Knowledge</strong> (maximum of 30% of the MKI's PKI) which can be measured as<br />
explained before.<br />
254
Ghassan Kbar <strong>and</strong> Abdul Aziz AlDusari<br />
APF Ability to provide Fund (maximum of 25% of the MKI's PKI) that depends on the following Items:<br />
Existing of fund 10% (organization support, government support, Angel fund<br />
Strategy for partnership 8% (venture capital: trust in research outcome, trust in team work, trust in<br />
project management, trust in organizational management, other party support, government legist<br />
elation, investment skills, ip ownership)<br />
Variety of funds 2%<br />
Mechanism of acquiring fund 5% (preparation, strategy, communication)<br />
EI Existing Infrastructure (maximum of 10% of the MKI's PKI) that depends on the following Items:<br />
Services <strong>and</strong> facility 3%<br />
Equipments 5%<br />
Consultation <strong>and</strong> support 2%<br />
ARS Availability of Required Skills (maximum of 10% of the MKI's PKI) that depends on the following<br />
Items:<br />
Local skills 3%<br />
Attract new skills 4% (ability to attract, involve imported skilled people in management)<br />
Legistelation 3%<br />
GMT Good <strong>Management</strong> Team (maximum of 25% of the MKI's PKI) that depends on the following<br />
Items:<br />
Experienced staff 10% (limited experience, academic experience, relevant experience,<br />
entrepreneurship skill)<br />
Ability to learn <strong>and</strong> training 3%<br />
Sharing experience 2%<br />
Right person for right position 10% (accepting position for non local, advertise position, appoint<br />
through friendship, not checking qualification)<br />
2.2.3 Business Project Continuity (BPC) (maximum PKI of 100%)<br />
The following indicators can be used to evaluate the possibility of maintaining the continuity <strong>and</strong><br />
successful business project, where BPC= EA+DTI+MLP:<br />
EA Entrepreneurship Ability (maximum of 30% of the BPC's PKI) that depends on the following Items:<br />
Entrepreneurship skills 15% (courage, wise, making right decision)<br />
Communication skills 8% (ability to market ideas)<br />
Exposing to other practices 7 % (sharing of events, good listener, reading related article <strong>and</strong><br />
news)<br />
DTI Developing the Technology Infrastructure (maximum of 20% of the BPC's PKI) that depends on<br />
the following Items:<br />
Updated Technology 8%<br />
Continuous Access <strong>and</strong> Business Continuity Plan 12%<br />
MLP <strong>Management</strong> & Leadership Performance maximum of 50% of the BPC's PKI) that depends on<br />
the following Items:<br />
<strong>Management</strong> skills <strong>and</strong> qualification 15%<br />
Having right staff with right expertise 8%<br />
Execution according to plan 12%<br />
Monitoring <strong>and</strong> apply right appraisal 10%<br />
Training <strong>and</strong> education 5%<br />
255
Ghassan Kbar <strong>and</strong> Abdul Aziz AlDusari<br />
3. Comparing the knowledge based economy performance between<br />
developed <strong>and</strong> development countries<br />
Based on the study that has been conducted at Riyadh Techno Valley, <strong>and</strong> the experiences of people<br />
in developed <strong>and</strong> development countries, Table 2 presents a comparison between developed <strong>and</strong><br />
development countries. This comparison highlights the average performance key indicators in order to<br />
measure the availability of useful knowledge AUK. It is clear from this table that AUK in development<br />
countries is nearly one third less than developed countries. This indicates that development countries<br />
suffer from building a proper knowledge based economy. These problems are associated with their<br />
average education system, low research capability, improper review process, <strong>and</strong> average Intellectual<br />
Properties outcomes.<br />
In Table 3, a comparison between developed <strong>and</strong> development countries based on the average<br />
metric of knowledge investment MKI performance indicator is presented. It is clear that low AUK as<br />
well as problems in providing enough variety funding for technological projects, low technical profiles,<br />
<strong>and</strong> poor management experiences in development countries would give a average indicator for<br />
investment in the knowledge based projects.<br />
Table 2: Average performance key indicators for the Availability of Useful <strong>Knowledge</strong> (AUK) at<br />
developed vs development countries (maximum PKI of 100%)<br />
Ability to Discover<br />
New Idea<br />
ADNI (max 35%)<br />
Characteristic<br />
Additional Value<br />
CDV (max 20%)<br />
Registering of<br />
<strong>Information</strong><br />
Type of PKI Developed Countries Development Countries<br />
Base knowledge 10% 10 6<br />
Education system 10% 8 6<br />
Competition program 5% 4 2<br />
Reward 5% 4 2<br />
Experiences 5% 5 3<br />
Research quality 5% 5 2<br />
Creativity 5% 4 1<br />
High st<strong>and</strong>ard 5% 4 2<br />
Sharing, partnership 5% 4 2<br />
Existing technology 3% 3 3<br />
Documentation 3% 3 1<br />
RI (max 10%) Retrieve information 4% 4 3<br />
Prove of New<br />
<strong>Information</strong><br />
PNI (max 20%)<br />
Protecting of<br />
<strong>Knowledge</strong><br />
PK (max 10%)<br />
Absolute of<br />
sharing<br />
<strong>Information</strong><br />
Review process 3% 3 1<br />
Proof of concept 3% 3 3<br />
Simulation 4% 4 1<br />
Implement solution 7% 6 2<br />
Necessary facilities 3% 3 1<br />
Intellectual Properties 5% 5 3<br />
Sharing profit 5% 4 5<br />
Share information 2% 2 2<br />
<strong>Knowledge</strong> Events 4% 3 3<br />
Presentation 2% 2 1<br />
ASI (max 10%) Brain storm 2% 2 1<br />
Total 91 56<br />
4. Conclusion<br />
The concept of knowledge management has been presented, where it shows the importance of<br />
effective knowledge sharing <strong>using</strong> latest technologies <strong>and</strong> successful collaborative platform<br />
strategies. In addition to determining the organization's readiness not only to implement KM, but also<br />
its readiness to be truly a knowledge-based, knowledge driven organization. Unlike the descriptive<br />
approach used checking the organization's readiness to identify the gap <strong>and</strong> try to fill in this gap, a<br />
better method <strong>using</strong> analytical approach has been suggested in this paper. Where, a new method for<br />
measuring the effectiveness of national based economy has been presented, <strong>and</strong> is based on<br />
analytical approach. It uses different performance indicators that are associated with the availability of<br />
knowledge, the knowledge investment <strong>and</strong> business project continuity. A comparison between<br />
developed <strong>and</strong> development countries have shown average performance indicators in the<br />
development countries which is due to problems in their education system, average research<br />
capabilities <strong>and</strong> Intellectual Properties, low projects funding <strong>and</strong> lack of management experiences.<br />
256
Ghassan Kbar <strong>and</strong> Abdul Aziz AlDusari<br />
Table 3: Average performance key indicators for the Metric <strong>Knowledge</strong> Investment MKI at developed<br />
vs development countries (maximum MKI of 100%)<br />
AUK Availability<br />
of Useful<br />
<strong>Knowledge</strong><br />
(max 30%)<br />
APF Ability to<br />
provide Fund<br />
(max 25%)<br />
Type of MKI Developed<br />
Countries<br />
Development Countries<br />
91*0.3=27.3 56*0.3=16.8<br />
Existing of fund 10% 9 7<br />
Partnership Strategy 8% 8 4<br />
Variety of funds 2% 2 0.4<br />
Mechanism of acquiring fund 5% 5 2<br />
EI Existing<br />
Services <strong>and</strong> facility 3% 3 2<br />
Infrastructure<br />
Equipments 5% 4 4<br />
(max 10%) Consultation <strong>and</strong> support 2% 2 1<br />
ARS Availability<br />
Local skills 3% 3 1<br />
of Required Skills Attract new skills 4% 3 2<br />
(max 10%) legist elation 3% 3 1.3<br />
GMT Good<br />
<strong>Management</strong><br />
Team<br />
Experienced staff 10% 9 5<br />
Ability to learn <strong>and</strong> training 3% 3 2<br />
Sharing experience 2% 2 1<br />
(max 25%) Right person for right position 10% 9 6<br />
Total 92.3 55.5<br />
References<br />
Bellinger, G bel97a, (2004) <strong>Knowledge</strong> <strong>Management</strong>—Emerging Perspectives, [online], http://www.systemsthinking.org/kmgmt/kmgmt.htm,.<br />
Blackwell (2002), Assessing WLAN Security Threats, [online],<br />
http://www.80211planet.com/tutorials/article/0,4000,10724_953481,00.html,<br />
David Paul A. & Foray Dominique (2003), Economic Fundamentals of the knowledge Society Policy Futures in<br />
Education, Volume 1.<br />
Geier Jim, (2002), Assigning 802.11b Access Point Channels, [online],<br />
http://www.80211planet.com/tutorials/article/0,4000,10724_972261,00.html<br />
Hylton Ann, (2008) A Readiness Assessment is Essential in a KM <strong>and</strong> <strong>Knowledge</strong> AUDIT Initiative, [online],<br />
http://KeKma-audit.com , <strong>Knowledge</strong> Auditor.<br />
Info.Worldbank, (2009), http://info.worldbank.org/etools/kam2/KAM_page5.asp.<br />
Kbar G., Ubeida W.S (2005) Wireless Network as solution for efficient distribution of <strong>Knowledge</strong> <strong>Management</strong>.<br />
ICICKM 2nd International Conference on Intellectual Capital <strong>Knowledge</strong> <strong>Management</strong> <strong>and</strong> Organizational<br />
Learning, AUD-Dubai.<br />
Molta Dave, (2002), WLAN Security on the Rise [online],<br />
http://www.networkcomputing.com/1303/1303ws2.html.<br />
nGenera Insight (2010), Enabling Collaborative Platform Adoption, [online], http://www.moxiesoft.com.<br />
Nortel, (2001), IEEE 802.11 St<strong>and</strong>ard For Wireless LANs, [online],,<br />
http://www.nortelnetworks.com/solutions/financial/collateral/mar00_wireless.pdf.<br />
Phife Lisa (2001), Wireless Privacy: An Oxymoron, [online],<br />
http://www.80211planet.com/columns/article/0,4000,1781_786641,00.html.<br />
Rtv, (2011), http://www.rtv.com.sa,<br />
Schenk Rob, (2001), Wireless LAN Deployment <strong>and</strong> Security basics network, [online],<br />
http://www.extremetech.com/article/0,3396,s%253D1034%2526a%253D13521,00.asp.<br />
Signa Services (2001), Best Practices for Deploying Wireless LANs, [online], Planet,<br />
http://www.80211planet.com/tutorials/print/0,,10724_985421,00.html.<br />
Schwartau, (2001), How to Break Into a Network with Only Three Keystrokes, [online],<br />
http://searchwebservices.techtarget.com/originalContent/0,289142,sid26_gci770991,00.html.<br />
Worldbank, (2011), http://www.worldbank.org/kam,<br />
257
Empirical Study on IT Productivity in eGovernment in<br />
Korea<br />
Dong-Hyun Kim <strong>and</strong> Hyun-Joo Kim<br />
National <strong>Information</strong> Society Agency, Seoul, Korea<br />
kimdh@nia.or.kr<br />
hyunjoo@nia.or.kr<br />
Abstract: Korean government ministries are asked to carry out their works <strong>and</strong> to operate internal organization<br />
along the principle of economic efficiency. We develop <strong>and</strong> apply IT systems in order to make work processes<br />
more efficient <strong>and</strong> more effective. Certainly they have done their jobs, but still must be subjected to an economic<br />
efficiency assessment. But it is not easy to assess IT systems in non-profit organizations with economic<br />
measurement for the reason why they have various <strong>and</strong> different stakeholders <strong>and</strong> their services are frequently<br />
intangible. Many scholars <strong>and</strong> researchers take interests in assessing IT systems in non-profit organizations as<br />
well. The purpose of this paper is to offer the real calculation which provides an overall statement concerning the<br />
economic efficiency of the IT system in public sector in Korea. It also provides some factors to be considered<br />
when not only assessing IT systems in non-profit organizations but also presenting a methodological frame for IT<br />
evaluation <strong>and</strong> the government ministries.<br />
Keywords: ICT, productivity, intellectual property, non-profit organization, assessment<br />
1. Introduction<br />
Korean Intellectual Property Office (KIPO) is the major governmental authority in charge of intellectual<br />
property matters in Korea. KIPO offers information on patent applications <strong>and</strong> provides an accurate<br />
examination/trial service to satisfy global st<strong>and</strong>ards. The mission of KIPO is to help Korea become an<br />
advanced country, by providing legal <strong>and</strong> institutional administration with regard to the creation <strong>and</strong><br />
utilization of highly creative, value-added intellectual property <strong>and</strong> by promoting technological<br />
innovation <strong>and</strong> industrial development(see http://www.kipo.go.kr/).<br />
eGovernment refers to the delivery of government services <strong>and</strong> production improvement through IT<br />
applications ([Chen], [Sprecher]). eGovernment services include eGovernment initiatives to create<br />
efficiencies at both inter- <strong>and</strong> intra- governmental agency levels ([Lee]). As one of eGovernment<br />
initiatives KIPO set out to automate its workforce several years ago, computerizing all administrative<br />
procedures for their knowledge workers. Now a days KIPO wanted to know whether if this strategy<br />
has resulted in increased employee productivity throughout the organization or not. And also it wanted<br />
to underst<strong>and</strong> the business value of such strategy to itself.<br />
Recently there have been many attempts to underst<strong>and</strong> <strong>and</strong> measure the returns from information<br />
technology investment in public sector([Braaksma et al], [Danayan], [Castelnovo et al]). The purpose<br />
of this paper is to offer the real calculation which provides an overall statement concerning the<br />
employee productivity of the KIPO IT system. It also provides some factors to be considered when not<br />
only assessing IT systems in non-profit organizations but also presenting a methodological frame for<br />
IT evaluation <strong>and</strong> the government ministries.<br />
2. Study methodology<br />
To underst<strong>and</strong> <strong>and</strong> explore the impact of IT system on employee productivity during the two-month<br />
evaluation period, we used couple of data collection techniques:<br />
Surveys to collect satisfaction data<br />
Employees interviews<br />
System-generated data<br />
Sample surveys <strong>and</strong> controlled experiment are the primary data collection techniques ([Guba],<br />
[Orlikowski]). Hence we surveyed some employees who had experienced old ways without IT systems<br />
to collect satisfaction data of IT systems. Due to KIPO's help, surveys were easy to administer <strong>and</strong><br />
could be collected efficiently from sample emloyees. But since surveys can be impacted by a<br />
participant's willingness to respond <strong>and</strong> other user reporting biases, we also collected other<br />
information.<br />
258
Dong-Hyun Kim <strong>and</strong> Hyun-Joo Kim<br />
We interviewed some employees to gather open-ended responses, to allow for follow-up questions,<br />
<strong>and</strong> to uncover unanticipated information. We also asked them to keep activity logs capturing how<br />
often <strong>and</strong> for how long activities were performed, defining a core set of activities with clear start <strong>and</strong><br />
stop points. Then we reviewed system-generated data to figure out the productivity of the employees<br />
who were performing certain activities with IT.<br />
This paper was designed to quantitatively underst<strong>and</strong> the impact to productivity <strong>and</strong> to develop a<br />
deeper underst<strong>and</strong>ing of the qualitative findings with knowledge workers in the office. We defined<br />
employee productivity as organization's average quantity of output produced by one employee<br />
([Barton]). We consider a catalogue of criteria containing the quality criteria which are related to<br />
quality improvements within the public agency, <strong>and</strong> to the effect on the staff of the public<br />
administration:<br />
Improved job performance<br />
Acceleration of work procedures <strong>and</strong> processes<br />
St<strong>and</strong>ardised <strong>and</strong> uniform administrative work<br />
Public image improvement<br />
Attractiveness of working conditions<br />
3. Korea Intellectual Property Office <strong>and</strong> information system overview<br />
(http://www.kipo.go.kr)<br />
3.1 Korea Intellectual Property Office<br />
After a patent application is filed with the KIPO, a patent right is granted through various steps. The<br />
Korean system is characterized by (ⅰ) First-to-File Rule; (ⅱ) Publication of Unexamined Application; (ⅱi)<br />
Request for Examination. Either the inventor of an invention or his assignee can file a patent<br />
application for the invention with KIPO. The applicant may be either a natural person or a juristic<br />
person.<br />
When a patent application is submitted to KIPO, it is checked to ensure that all requirements<br />
necessary to accord the application a filing date have been satisfied. Applications that have not yet<br />
been published will be automatically laid-open in the official gazette called "Patent Laid-open Gazette"<br />
after 18 months from the filing date in the Republic of Korea or, if the right of priority is claimed from<br />
an earlier foreign filing, from the priority date.<br />
A patent application will be taken up for examination only if a request for examination is made either<br />
by the applicant or by any interested party within 5 years from the filing date of the application. If the<br />
examiner finds a ground for rejection of a patent application, a notice of preliminary rejection will be<br />
issued; <strong>and</strong> the applicant will be given an opportunity to submit a response to the preliminary rejection<br />
within a time limit designated by the examiner. Such time limit is extendable upon the request for an<br />
extension by the applicant.<br />
When a patent applicant receives a notice of decision to grant a patent he should pay, as a<br />
registration fee, the first 3 years' annuities within 3 months from the date of receipt of such notice.<br />
Where the examiners finds no grounds for refusal of a patent application, KIPO publishes the patent<br />
registration after the patent applicant pays the registration fee. Once a patent has been published in<br />
the Patent Registration Gazette, any person may file an opposition against the registration of a patent<br />
between the date on which the patent is registered <strong>and</strong> the date that marks a lapse of three months<br />
since the publication date.<br />
Figure 1: Procedures for granting a patent<br />
259
3.2 <strong>Information</strong> system overview<br />
Dong-Hyun Kim <strong>and</strong> Hyun-Joo Kim<br />
KIPOnet is an office automation system that enables complete electronic management of IPR affairs.<br />
It provides applicants with a breadth of electronic services such as on-line filing <strong>and</strong> patent<br />
information searches. All their administrative procedures are computerized. When an application is<br />
received via the Internet or on paper, KIPO h<strong>and</strong>le everything electronically including filing, prior art<br />
searches, examination, registration, <strong>and</strong> publishing.<br />
As of 2007, the KIPOnet system comprises 39 subsystems while integrating redundant legacy<br />
systems. For example, the Electronic Application Preparation System (KEAPS), the General<br />
Receiving System, the Formality Check System, the Search System, the Trial Administration System,<br />
<strong>and</strong> the Gazette Publication System. In February 2005, KIPO integrated networks, which were<br />
physically divided, into an internal network for IPR administration <strong>and</strong> an external network for public<br />
access, providing access to internal <strong>and</strong> external sites simultaneously. The introduction of the<br />
Enterprise Security <strong>Management</strong> System <strong>and</strong> the Security Patrol Center enabled KIPOnet to operate<br />
around the clock, even in an emergency.<br />
The receipt, or if needed rejection, of an Internet-based application is immediately sent to the<br />
applicant or transmitted to a formality examiner of KIPO after it is received via the internal server in<br />
real time through the SSL channel. Applications passing a formality examination are loaded into an<br />
integrated database as an XML-based electronic dossier, which enable examiners to judge its<br />
patentability. After the examination, the application data is utilized for registration <strong>and</strong> publication. The<br />
Internet gazettes have been offered in PDF-format at the web site (http://www.kipo.go.kr) since July<br />
2001.<br />
Figure 2: Concept of the KIPOnet system<br />
4. Measuring IT productivity in KIPO<br />
In 2001, the McKinsey Global Institute found that IT had diverse <strong>and</strong> complex impact depending on<br />
when, where, <strong>and</strong> how it was deployed [Kellison]. Therefore we seek to answer the question, "how did<br />
IT drive productivity growth in the KIPO in the 2000s?" This report focuses on the relationship<br />
between IT <strong>and</strong> productivity in two parts: a process management part for the administration <strong>and</strong> a<br />
data management part for the effective data search <strong>and</strong> examination. We conducted this study by first<br />
outlining the business process <strong>and</strong> evaluating the impact of IT applications. We define IT productivity<br />
of each business process as the ratio of the number of units produced <strong>and</strong> the number of employees<br />
when they do their works with IT.<br />
260
Dong-Hyun Kim <strong>and</strong> Hyun-Joo Kim<br />
As a result, by digitizing the entire patent administration process, including the application,<br />
examination, registration, <strong>and</strong> trial of patents, KIPOnet has faithfully supported the renovation of<br />
patent administration <strong>and</strong> its internal work process. In fact, since IT was deployed in the business<br />
processes, IT has increased the average productivity by 5.6% in e-filing process <strong>and</strong> 16.5% in<br />
registration process.<br />
This is because that IT system enables filing online applications, automatic retrieval of a variety of<br />
notifications <strong>and</strong> filing records, <strong>and</strong> providing convenient services involving notifications <strong>and</strong> issuance<br />
of certificates. KIPO also introduced the work-at-home system for examiners. While examination<br />
circumstances vary, some examiners only have to commute to work one day a week.<br />
Table 1: IT productivity in e-filing process<br />
before<br />
IT(avg)<br />
‘99 '00 ‘01 '02 ‘03 '04 ‘05 ‘06<br />
number of applications<br />
(thous<strong>and</strong>)<br />
185 231 283 289 290 306 327 359 367<br />
number of employees 34 47 42 42 42 42 42 42 42<br />
rate of IT productivity compared<br />
with before IT<br />
1.00 0.90 1.24 1.2 1.27 1.34 1.43 1.5 1.61<br />
Table 2: IT productivity in registration process<br />
number of registrations<br />
(thous<strong>and</strong>)<br />
number of<br />
employees<br />
rate of IT productivity<br />
compared with before<br />
IT<br />
before<br />
IT(avg)<br />
‘99 '00 ‘01 '02 ‘03 '04 ‘05 ‘06<br />
73 148 126 130 153 155 165 198 250<br />
26 26 26 26 26 26 26 26 26<br />
1.00 2.00 1.71 1.77 2.07 2.11 2.24 2.68 3.39<br />
The number of applications increased rapidly every year so that examiners have had burdensome<br />
duties to examine. To disburden workload, KIPO increased the workforce <strong>and</strong> boosted the<br />
outsourcing of prior art searches. The number of examiners exp<strong>and</strong>ed from 400 in 1999 to 728 in<br />
2005, while the portion of outsourced prior art searches rose from 13% in 2000 to 50% in 2005.<br />
Despite the skyrocketing of patent applications, KIPO reduced the average examination period, which<br />
is the time for a first action on patent applications from over 28.1 months in 1998 to 9.8 months in<br />
2006. As a result, KIPOnet has doubled the employee productivity in examination process. IT system<br />
improved productivity by speeding up examination processes. More up-to-date <strong>and</strong> more precise<br />
forms of communication reduced transport time, dead time, <strong>and</strong> preparation time. But the productivity<br />
remained almost same through recent years except 2006, in which KIPO encouraged examiners to do<br />
their jobs <strong>and</strong> to reduce the examination period.<br />
Table 3: IT productivity in examination process<br />
number of units examined<br />
(thous<strong>and</strong>)<br />
‘99 ‘00 ‘01 ‘02 ‘03 ‘04 ‘05 ‘06<br />
796 711 610 828 991 1,140 1,518, 2,244<br />
number of examiners 402 380 382 453 513 558 728 727<br />
rate of IT productivity<br />
compared with before IT<br />
2.0 1.9 1.6 1.8 1.9 2.1 2.1 3.1<br />
To have a high quality result concerning productivity, other criteria <strong>and</strong> multi-dimensional approach<br />
should be required. That is, we have to consider some parameters beyond parameters can be<br />
quantified because IT systems can have different effects in different circumstances. In the case of<br />
261
Dong-Hyun Kim <strong>and</strong> Hyun-Joo Kim<br />
KIPO, qualitative <strong>and</strong> strategic parameters would be more important than parameter in monetary<br />
terms since KIPO is a non-profit organization. We surveyed <strong>and</strong> evaluated KIPOnet in 4 qualitative<br />
terms: the quality of work process, acceleration of work processes, st<strong>and</strong>ard <strong>and</strong> uniform work flow,<br />
satisfaction.<br />
3,500<br />
3,000<br />
2,500<br />
2,000<br />
1,500<br />
1,000<br />
500<br />
0<br />
no. of units<br />
no. of examiners<br />
productivity<br />
‘93 ‘94 ‘95 ‘96 ‘97 98 ‘99 '00 '02 ‘03 '04 ‘05 ‘06<br />
Figure 3: IT productivity in examination process<br />
(months)<br />
40<br />
30<br />
20<br />
10<br />
0<br />
97 98 99 00 01 02 03 04 05 06<br />
patents 35.5 28.1 23.6 20.6 21.3 22.6 22.1 21 17.6 9.8<br />
trademarks 17.4 12.5 9.7 9.8 12.2 11.9 10.7 9.6 7.3 5.9<br />
Design 9.6 7.3 7.2 7.1 9.6 8.4 7.3 6.8 6.7 5.9<br />
Figure 4: The examination period (unit : months)<br />
We evaluated the qualitative effects related to work, i.e. whether the quality of the work process as<br />
such <strong>and</strong> hence also of the product is improved. We assessed the qualitative improvements of<br />
transparency of administrative work, simplified internal workflows, as well as elimination of redundant<br />
<strong>and</strong> routine operations. When evaluating this criterion, the effects should be differentiated in terms of<br />
formal improvement (the workflow improves itself) <strong>and</strong> material improvement (the result of the<br />
workflow is improved) As a result, KIPO showed significant improvement of the formal work<br />
process(7.1 point out of 10) <strong>and</strong> some improvement of the result of the workflow. KIPO established<br />
the intelligent search <strong>and</strong> examination system, KIPO published examination guidelines <strong>and</strong> began<br />
evaluating examinations. It introduced an examination quality index to help manage examinations.<br />
From a score of 100 points in 1999, the index rose to 125 points in 2005. Furthermore, to increase the<br />
fairness of examinations, KIPO started <strong>using</strong> examination notes in 2005 as a means of recording <strong>and</strong><br />
publishing the major decisions of examiners.<br />
Table 4: Examination quality index<br />
Year 2000 2001 2002 2003 2004 2005 2006<br />
Quality index 100 106.4 112.3 116.2 122.1 125.3 128.7<br />
262
Dong-Hyun Kim <strong>and</strong> Hyun-Joo Kim<br />
We measured the improvement by speeding up work procedures <strong>and</strong> processes. Acceleration of work<br />
procedures <strong>and</strong> processes enables faster performance (reducing cycle time). The effects are due to<br />
electronic communications, elimination of media inconsistency, access to up-to-date databases by all<br />
authorised users, <strong>and</strong> even by elimination of individual working positions The assessment of the<br />
qualitative criterion is the result of a critical evaluation of the improvements which the IT measure will<br />
offer to users in the organization unit concerned.- Acceleration: whether cycle time is reduced by<br />
reducing traveling time <strong>and</strong> preparation. As a result, KIPO showed significant improvement of the<br />
acceleration of work processes as present cycle time had been reduced by up to 30%.<br />
We evaluated st<strong>and</strong>ard <strong>and</strong> uniform work flow: the extent to which IT system would replace old work<br />
flow with st<strong>and</strong>ardized <strong>and</strong> uniform one. This can be due to up-to-date access to data with uniform<br />
structures <strong>and</strong> due the harmonisation of administrative procedures on both organizational <strong>and</strong> IT<br />
level. There was significant improvement thanks to st<strong>and</strong>ardization of data structures <strong>and</strong> process<br />
routines within KIPO(6.9 point out of 10).<br />
5. Conclusion<br />
The most remarkable benefit of KIPOnet has been the shift in their work process; namely, from a<br />
paper-based paradigm to an electronic paradigm. With a state-of-the-art IT infrastructure, KIPO has<br />
become more IT-oriented. Indeed, IT accelerated the KIPO productivity revolution, pushing annual<br />
labor productivity growth higher. For internal efficiency, KIPO enhanced efficiency <strong>and</strong> transparency<br />
of the intellectual property administration with computerized searches <strong>and</strong> renovated business<br />
processes. e-Filing <strong>and</strong> registration processes of patents are administrative processes which are<br />
good collaborated with IT. Both processes deal with a set of meta information like patent's applicant's<br />
information <strong>and</strong> thus IT systems can easily check whether if the applicants fill basic information in the<br />
application or registration forms. In fact, employee productivity in both processes increases even<br />
though the number of applications are increased high <strong>and</strong> the number of staffs has been never<br />
increased.<br />
On the other h<strong>and</strong>s, employee productivity in substantial examination was doubled when the IT<br />
system introduced first but it has not been increased any more <strong>and</strong> stayed even. Substantial<br />
examination is complicated <strong>and</strong> nuanced jobs requiring experience, expertise, judgement, interaction<br />
<strong>and</strong> collaboration. Increasing productivity for these employees, whose jobs can't be automated, has<br />
thus far proven to be a major challenge for software developers around world.<br />
References<br />
Baily, Martin Neil <strong>and</strong> Eric Zitzewitz (2001) “Service Sector Productivity Comparisons: Lessons for<br />
Measurement,” in Charles R. Hulten, Edwin R. Dean, <strong>and</strong> Michael J. Harper, editors New Developments in<br />
Productivity Analysis pp. 419-456<br />
Barton, Neil. (2006) "Benchmarking, Outsourcing, <strong>and</strong> Evaluation in the IT Industry: or "Commoditization is in the<br />
eye of the Stakeholder"", Proceedings of the 13th European Conference on IT Evaluation, pp1-13<br />
Braaksma, Jan & Comm<strong>and</strong>eua, Arnold & Berghout, Egon (2007) “The Business case for ICT investment<br />
evaluation in nonprofit organizations”, Proceedings of the 13th European Conference on IT Evaluation,<br />
pp91-102<br />
Castelnovo, Marian & Simonetta, Massimo (2007) “The Evaluation of eGovernment projects for SLGOs”,<br />
Proceedings of the 13th European Conference on IT Evaluation, pp130-139<br />
Chen, Y.N., H M Chen, W Huang <strong>and</strong> R K H Ching. (2006) "EGovernment Strategies in Developed <strong>and</strong><br />
Developing Countries: An Implementation Framework <strong>and</strong> Case study", Journal of Global <strong>Information</strong><br />
<strong>Management</strong>, Vol 14, No 1, pp23-46.<br />
Danayan, Lucy (2007) “Measuring return on government IT investment”, Proceedings of the 13th European<br />
Conference on IT Evaluation, pp175-185<br />
Guba, E. G. & Lincoln, Y. S. (1989) Fourth Generation Evaluation, SAGE Publications, Inc, Newbury Park.<br />
Kellison,. Matt (2001) “The McKinsey Global Institute Productivity Studies: Lessons for Canada”, Mckinsey Global<br />
Institute, CSLS Research Report 2004-10, November, 2004<br />
Lee, S.M., Tan, X., <strong>and</strong> Trimi, S. (2005) "Current Practices Of Leading EGovernment Countries",<br />
Communications Of The ACM, Vol. 48, No 10, pp99-104.<br />
Lewis, William W. (2004) The Power of Productivity: Wealth, Poverty, <strong>and</strong> the Threat to Global Stability (Chicago:<br />
University of Chicago Press).<br />
Orlikowski, W. & Baroudi, J. (1991) "Studying information technology in organizations: research approaches <strong>and</strong><br />
assumptions", <strong>Information</strong> Systems Research, Vol. 2, No., pp1-28.<br />
Sprecher. M. (2000) "Racing to EGovernment: Using the internet for citizen service Delivery", Government<br />
Finance Review, Vol 16, pp21-22.<br />
263
Impact of Inter Organizational Networks on Adoption<br />
Process of <strong>Information</strong> Technology<br />
Erdem Kirkbesoglu <strong>and</strong> Gizem Ogutcu<br />
Baskent University, Ankara, Turkey<br />
erdemk@baskent.edu.tr<br />
ogutcu@baskent.edu.tr<br />
Abstract: The purpose of this study is to generate a conceptual framework that reveals the impact of interorganizational<br />
networks on the adoption process of information technologies. A great majority of the previous<br />
research that focuses on the adoption process of information technologies are empirical studies based on interorganizational<br />
factors (for instance; the structure, the strategy or culture of the organization). These are the<br />
studies which maximize organizational benefit (performance based) <strong>and</strong> which give suggestions to the<br />
practitioners towards increasing efficiency. Unlike these, in this study, the macro factors (for example strong <strong>and</strong><br />
weak ties, level of dependency, level of isomorphism among organizations) emerging as a result of the interorganizational<br />
interactions were considered instead of intra-organizational factors. Due to the fact that the most<br />
significant field of application for information technologies is the organization, a conceptual assessment was<br />
made in this study from the aspect of organizational communities <strong>and</strong> organization theories. In developing this<br />
model, basic statements of various organization theories such as network theory, institutional theory <strong>and</strong><br />
dependency theory were used. At the end of the study, a number of propositions related to inter organizational<br />
interaction that affect adoption <strong>and</strong> sustained use of innovative technologies in a network context are composed<br />
for future studies.<br />
Keywords: information technology adoption, network theory, dependency, isomorphism<br />
1. Introduction<br />
The roles of information technology (IT) on today’s organizations have significantly changed over the<br />
last decade. Advances in new information technology <strong>and</strong> changes in the global environment have<br />
made it increasingly difficult for organizations to make decisions regarding information technology<br />
adoption. Moreover, information systems in a global environment are influenced by different cultures,<br />
laws, information technology infrastructure, <strong>and</strong> the availability <strong>and</strong> role of skilled personnel<br />
(Dasgupta et al., 1999). IT has become the tool used to manage change in business strategies <strong>and</strong><br />
internal corporate processes by many organizations. Organizations are making significant<br />
investments in information technology to align business strategies, enable innovative functional<br />
operations <strong>and</strong> provide extended organizational networks. These organizations have adopted<br />
information technology to foster changes in managing customer relationships, manufacturing,<br />
procurement, the supply chain <strong>and</strong> all other key activities <strong>and</strong> to enhance their competitive capabilities<br />
(Chen <strong>and</strong> Tsou, 2007).<br />
Thus, IT now is one of the major factors improving productivity <strong>and</strong> performance of the organizations.<br />
It is a tool used to manage business strategies <strong>and</strong> internal corporate processes <strong>and</strong> it is a nervous<br />
system of organizations that determines the organization’s competitiveness. So it can create the<br />
competitive advantage <strong>and</strong> innovation for every business. However, <strong>Information</strong> Technology itself<br />
cannot create the value-added to the organization. It can only make the better products <strong>and</strong> services<br />
via changing the working processes. Moreover, every organization can acquire the same technology<br />
<strong>and</strong> also it is easy to be copied in a short period of time. To sustain the competitive advantages,<br />
managers should focuses on contextual factors on the process of IT adoption. It is clear that even<br />
though IT has evolved from its traditional to more strategic role within an organization, the adoption<br />
process of any new technology can be problematic for many organizations. Several factors appear to<br />
accelerate or impede the diffusion of IT in all organizations.<br />
Identifying why <strong>and</strong> how organizations adopt information technology is crucial for providing a<br />
successful adoption process. Several studies have identified different variables that can explain why<br />
firms adopt information technology with different intensities <strong>and</strong> speeds (e.g., Teo <strong>and</strong> Pian, 2003;<br />
Premkumar et al., 1997). A great majority of these studies are composed of the empirical studies<br />
based on intra-organizational factors <strong>and</strong> variables. However, adoption <strong>and</strong> expansion of information<br />
technologies are maintained through the inter-organizational relationships. Both structural properties<br />
of the organizations <strong>and</strong> their interactions with their environment are important. Therefore, in addition<br />
to the micro factors based on the structures of organizations, it is necessary that macro perspectives<br />
264
Erdem Kirkbesoglu <strong>and</strong> Gizem Ogutcu<br />
that ground on inter-organizational interactions should be put forth <strong>and</strong> located on a conceptual<br />
ground.<br />
The purpose of this study is to generate a conceptual framework that reveals the impact of interorganizational<br />
networks on the adoption process of information technologies. Since the most<br />
important application field of information technologies is organizations, in this study it is aimed at<br />
generating a conceptual framework from the aspect of organization communities <strong>and</strong> organization<br />
theories. In developing this model, basic statements of various organization theories such as network<br />
theory, institutional theory <strong>and</strong> dependency theory were used. As a result of the study, testable<br />
propositions were formed for future studies.<br />
2. Literature review<br />
Adoption can be defined as a decision to make full use of a new idea as the best course of action<br />
available (Rogers, 1995). In other words, adoption involves some form of evaluation of an innovation<br />
to determine if it will best satisfy the needs of the prospective adopting organization, as well as the<br />
sustained use of the innovation (Hausman <strong>and</strong> Johnston, 2005). Since information technology began<br />
to have an important impact on the way firms are both managed <strong>and</strong> organized, researchers have<br />
investigated the organizational factors behind the degree of adoption of computing, robotic or<br />
telecommunications technologies (Bruque <strong>and</strong> Moyano, 2006: 242). Organizational factors behind<br />
information technology adoption may be as important as other elements such as technical factors<br />
(Premkumar et al., 1997), although they are usually seen as less significant by practitioners (Fletcher<br />
<strong>and</strong> Wright, 1995).<br />
A great majority of the previous research that focuses on the adoption process of information<br />
technologies are empirical studies based on intra-organizational factors because such studies are<br />
those which maximize organizational benefit <strong>and</strong> which are performance based. Particularly, they give<br />
suggestions <strong>and</strong> make recommendations for increasing efficiency in order to avoid from the criticisms<br />
of implementers. Therefore, they are mostly related with internal factors such as the structure,<br />
strategy or culture of organization. For instance, the previous studies has focused adoption of<br />
information technology in small <strong>and</strong> medium-sized organizations (Bruque <strong>and</strong> Moyano, 2006; Fink,<br />
1998); a technology leaders who support the technological change (Brancheau <strong>and</strong> Wetherbe, 1990;<br />
Roberts <strong>and</strong> Liu, 2001); the managers’ support for the adoption of information technology (Leonard-<br />
Barton <strong>and</strong> Deschamps, 1988; Soliman <strong>and</strong> Janz, 2004); information technology as competitive<br />
advantage <strong>and</strong> selection of suitable IT strategies (Powell <strong>and</strong> Dent-Micallef, 1997; Fletcher <strong>and</strong><br />
Wright, 1995); cultural dimensions of information technology adoption (Leidner et.al., 2006).<br />
Besides empirical studies, there are quite a lot of conceptual studies.The most used theories are the<br />
technology acceptance model (TAM) (Davis, 1989), theory of planned behaviour (TPB) (Ajzen 1991),<br />
unified theory of acceptance <strong>and</strong> use of technology (UTAUT) (Venkatesh et al. 2003), diffusion of<br />
innovations (DOI) (Rogers, 1995), <strong>and</strong> technology, organization <strong>and</strong> environment (TOE) framework<br />
(Tornatzky <strong>and</strong> Fleischer 1990). Although these conceptual models had a significant contribution in<br />
literature, they couldn’t provide many explanations regarding the behavioral patterns of organizational<br />
communities. The one that emphasizes inter-organizational interaction <strong>and</strong> the importance of the<br />
environment factor among these conceptual models has been TOE. The TOE framework identifies<br />
three aspects of an enterprise's context that influence the process by which it adopts <strong>and</strong> implements<br />
a technological innovation: technological context, organizational context, <strong>and</strong> environmental context.<br />
Technological context describes both the internal <strong>and</strong> external technologies relevant to the firm.<br />
Current equipment <strong>and</strong> practices within organization <strong>and</strong> the set of available technologies that<br />
can be transferred from the organization.<br />
Organizational context refers to internal descriptive measures about the organization such as<br />
scope, size, <strong>and</strong> managerial structure.<br />
Environmental context is the external context in which an organization conducts its business such<br />
as industry, competitors, <strong>and</strong> government (Tornatzky <strong>and</strong> Fleischer 1990).<br />
The TOE framework as originally presented, <strong>and</strong> later adapted in IT adoption studies, provides a<br />
useful analytical framework that can be used for studying the adoption <strong>and</strong> assimilation of different<br />
types of IT innovation (Oliviera <strong>and</strong> Martins, 2011: 112). The TOE framework has a solid theoretical<br />
basis, consistent empirical support <strong>and</strong> the potential of application to IS innovation domains, though<br />
specific factors identified within the three contexts may vary across different studies (Oliviera <strong>and</strong><br />
265
Erdem Kirkbesoglu <strong>and</strong> Gizem Ogutcu<br />
Martins, 2011: 112). Although TOE emphasizes the internal <strong>and</strong> external components of the<br />
organizations, the environment context as external component includes new <strong>and</strong> varying factors that<br />
influence the IT adoption. There are plenty of studies in literature that develop TOE framework <strong>and</strong><br />
redefine it (e.g., Chong et al., 2009; Kuan <strong>and</strong> Chau, 2001). However, none of these studies mentions<br />
about the effect of inter-organizational networks. Hence, our purpose in this study is to develop a<br />
model that puts forth the effects of inter-organizational networks on the adoption process of<br />
information technologies within the scope of environmental context.<br />
3. Conceptual framework of adoption<br />
Previous models of organizational adoption are primarily limited to the intra-organizational context<br />
where the organizations make an adoption decision <strong>and</strong> employees subsequently decide whether to<br />
use the innovation. Our framework in this study is specifically related to critical inter organizational<br />
relationships. We categorize our conceptual framework with network components of adoption<br />
process. And three organization theories (network theory, dependency theory <strong>and</strong> institutional theory)<br />
will underlie our conceptual framework <strong>and</strong> also specific propositions.<br />
3.1 Social network of organizations: Strong <strong>and</strong> weak ties<br />
Social network theory concerns how actors (e.g., individuals, groups, organizations, etc.) are tied by<br />
some sort of social relationship (e.g., advice giving, resource sharing, alliance partnership, etc)<br />
(Moliterno <strong>and</strong> Mahony, 2011). Today’s organizations have to be involved in a cooperation network<br />
with different actors in order to survive in the complex business environment <strong>and</strong> ensure<br />
sustainability. Assuring the stability of commercial life requires that the relationships within this<br />
network should be managed successfully <strong>and</strong> in coordination for long years. Each organization is<br />
embedded within multiple overlapping networks, such that changes in one network impact their<br />
functionality <strong>and</strong> relationship with organizations in other networks to which they are members. Social<br />
interactions among the actors have some positive or negative effects on economical behaviour (Uzzi,<br />
1997: 36). This effect of actors on economical processes also provides that they get close to some<br />
different actors <strong>and</strong> create relational actions for the purpose of gaining some benefits. Actors such as<br />
organizations or the representatives of the organization make use of their social interactions during<br />
the process of realizing the economical actions.<br />
Granovetter (1985: 504) indicates that behaviors among actors who are the representatives of the<br />
organization are embedded into the social networks established based on the relations, which is<br />
significant in ensuring trust in social life. That is, actors have some network relations in social life <strong>and</strong><br />
these networks develop in time based on trust. According to Uzzi (1999: 483) relations based on trust<br />
appearing in network mechanisms creates an effect that can hinder opportunist behaviors <strong>and</strong> abuse<br />
of actors. Hence, it is pointed out that a general belief that forming relations with well-known actors<br />
where trust expectations arise among networks members results in positive outcomes will occur (Uzzi,<br />
1999: 483). One of the reasons why actors establish a network mechanism by forming social relations<br />
among themselves is that actors outside the social network mechanism experience more problems in<br />
terms of obtaining knowledge than the others. Uzzi, (1999: 483) puts forth that special knowledge that<br />
parties have will spread through the established relationships <strong>and</strong> brings in skills for the parties<br />
engaged in commercial relations. Therefore, social relations established based on mutual trust enable<br />
to transfer technical <strong>and</strong> strategic knowledge that cannot be obtained by market relations. In the event<br />
that knowledge that will be necessary for the actors forming social network mechanism to take<br />
rational decisions is insufficient or absent, actors react in line with the knowledge coming from the<br />
network channel. Thus, the ability of actors will be constrained to decide independent from the<br />
network mechanism <strong>and</strong> embedded social relations will be effective on the decisions taken <strong>and</strong><br />
actions in conclusion.<br />
Granovetter (1973: 1367) mentions that the relations within inter organizational networks are based<br />
on strong <strong>and</strong> weak ties. At this point strong ties cover the social relations <strong>and</strong> norms based on trust<br />
among individuals. On the other h<strong>and</strong>, weak ties are the weak <strong>and</strong> rare market relations that operate<br />
without any humanly or social connection among the parties (Granovetter, 1983: 205). While the<br />
weak ties include the sources <strong>and</strong> information that can be obtained outside the actors’ own social<br />
atmosphere, the strong ones cover the routine sources <strong>and</strong> knowledge that the actors attain from<br />
the other actors. It is an indicator of a high level of social sharing <strong>and</strong> confidence among<br />
organizations that the ties among organizations in a network mechanism are strong. In networks<br />
where strong ties are provided, competition is kept behind. In such networks, the central organizations<br />
266
Erdem Kirkbesoglu <strong>and</strong> Gizem Ogutcu<br />
of the network defined as reputable, big <strong>and</strong> authoritative are highly trusted. In the event that<br />
information circulating in the network is not reliable, central organizations shall be considered as<br />
model by the small scaled follower organizations. Thus, adoption of an innovation will be faster.<br />
Proposition 1.1. As the number of strong ties among the central <strong>and</strong> follower organizations increases,<br />
the level of IT adoption in the network increases as well.<br />
Proposition 1.2. As the number of weak ties among the central <strong>and</strong> follower organizations increases,<br />
the level of IT adoption in the network decreases.<br />
On the other h<strong>and</strong>, Granovetter (1983) stresses the importance of weak ties that may be formed with<br />
the organizations outside the network. Weak ties would particularly enable fast access to information<br />
<strong>and</strong> adaptation to change (Granovetter, 1983: 202). Granovetter (1973: 1367) states that<br />
organizations with a lot of weak ties outside the network will have a great advantage in terms of<br />
spreading innovations. Weak ties provide that organizations have access to sources <strong>and</strong> information<br />
outside their own social setting (Granovetter, 1983: 209).<br />
The strength of a tie can be stated with concepts as the duration of the ongoing interactions,<br />
emotional intensity, intimacy <strong>and</strong> reciprocal services realized (Granovetter, 1973: 1360). Granovetter<br />
(1983: 202) suggests that organizations with a limited number of weak ties will lack the opportunity to<br />
access information in the distant parts of the social system <strong>and</strong> confine themselves with information in<br />
the network. According to Burt (2004), it is not possible to form weak ties outside the network for<br />
every actor. Burt (2001; 2004; 2005) uses the concept of structural holes to shed a new light on the<br />
concept of social capital. Structural holes theory defines information <strong>and</strong> control advantage that<br />
broker – central - organizations possess in providing the relationship between networks (Burt, 1992).<br />
Mediating organizations in organizational life provide the circulation of information in different aspects<br />
of the economic system <strong>and</strong> they affect the structure for their personal benefit. Thanks to this,<br />
information transfer between different networks is obtained (Gargiulo <strong>and</strong> Benassi, 2000: 184).<br />
Central organizations get crucial advantages of his bridging function <strong>and</strong> the position possessed by<br />
him provides an advantageous point in the organizational field (Burt, 2004: 356). The realization of<br />
structural holes <strong>and</strong> the provision of linkages between these holes are directly related to actors’<br />
experience. For this reason, brokers (such as central organizations) provide information transfer<br />
between unrelated networks <strong>and</strong> mediate between the actors who have no chance of achieving a<br />
relationship with other actors by their own. These kinds of central – broker - organizations in the<br />
organizational field develop different interpretation <strong>and</strong> prediction capabilities in order to gain<br />
competitive advantage (Burt, 2004: 356). Thus, weak ties formed outside the network will<br />
accelerate the entry of the recent innovations transferred into the network. The entry of innovations<br />
will accelerate that several organizations in the network make use of these innovations.<br />
Proposition 2. As the number of weak ties central organizations from outside the network increases,<br />
the level of adoption within the network increases as well.<br />
3.2 Dependency in social networks<br />
The basis of studies conducted regarding the dependency relationships among organizations is<br />
based on the resource dependency theory (Pfeffer ve Salancik, 1978). Resource dependency theory<br />
speaks to competitive processes by which resource scarcities brought about by widespread use of a<br />
st<strong>and</strong>ard lead to change (Leblebici et al., 1991; Sherer, 2001). According to the resource dependency<br />
theory, organizations are not completely self-sufficient. They cannot internally provide all the<br />
resources <strong>and</strong> needs they require. They have to obtain some resources needed from the factors in<br />
their environment, which will cause them to interact with the factors in their environment. One of the<br />
main problems of organizations is to supply their resource needs from other organizations when<br />
resources are scarce. This situation makes it compulsory that resource supply is stable <strong>and</strong> support<br />
from resource providers is obtained. Should an organization experience trouble in providing<br />
resources, it will be difficult to maintain its activities. Therefore, it may be required that the<br />
organization should fulfill the expectations of the organizations it is interacting with.<br />
Pfeffer <strong>and</strong> Salancik (1978) mentioned that dependency relationship appears in two conditions. (1)<br />
To what extent the required resource is important in order for the organization to survive? (2) Are<br />
there any other organizations that possess the required resource? If an organization is highly<br />
dependent on another, the latter one is in a stronger position in that relationship. Thus, the central<br />
267
Erdem Kirkbesoglu <strong>and</strong> Gizem Ogutcu<br />
organizations that are strong in the dependency relationship want that innovation they have is<br />
adopted by the follower organizations. Because central organizations want to ensure continuity of<br />
dependency relationship. The follower organization that transfers an information technology would<br />
have to be dependent to the central organization for a while.<br />
NETWORK C<br />
Strong Ties<br />
NETWORK A<br />
NETWORK B<br />
Weak Ties<br />
Organization<br />
Figure 1: Strong <strong>and</strong> weak ties of organizations (Burt, 1992)<br />
Proposition 3. As the dependency between the follower <strong>and</strong> central organization in a network<br />
increases, the level of adoption in the network increases as well.<br />
3.3 Isomorphic inclination in organizational networks<br />
Institutional literature emphasizes that organizational structure <strong>and</strong> processes tend to become<br />
isomorphic with the accepted norms for organizations of particular types (DiMaggio <strong>and</strong> Powell,<br />
1983). According to the institutional theory, the structures <strong>and</strong> processes of organizations are<br />
shaped as a result of their compliance in the institutional environment they exist in (Ozen, 2007:<br />
240). The institutional environment is a built environment which include the rational structures,<br />
norms, rules, beliefs <strong>and</strong> legends formed outside <strong>and</strong> over the organizations (Ozen, 2007: 241).<br />
According to DiMaggio <strong>and</strong> Powell (1991: 67-74), organizations adopt the structures <strong>and</strong><br />
implementations suggested by the common laws <strong>and</strong> become isomorphic.<br />
The theory claims that firms become more similar due to isomorphic pressures <strong>and</strong> pressures for<br />
legitimacy. Because organizational decisions are not driven purely by rational goals of efficiency, but<br />
also by social <strong>and</strong> cultural factors <strong>and</strong> concerns for legitimacy. Such an environment is named as the<br />
institutional environment. In order for the organizations to survive, being technically efficient is not<br />
enough but they need to validate themselves by adopting the institutions in this environment. As a<br />
result, since organizations living in the same “organizational area” must adapt to the similar<br />
institutions regardless of their specific rational requirements, they become structurally isomorphic<br />
(Meyer <strong>and</strong> Rowan, 1977; Scott <strong>and</strong> Meyer, 1991). This means that firms in the same field tend to<br />
become homologous over time, as competitive <strong>and</strong> customer pressures motivate them to copy<br />
industry leaders. For example, rather than making a purely internally driven decision to adopt ecommerce,<br />
firms are likely to be induced to adopt <strong>and</strong> use e-commerce by external isomorphic<br />
pressures from competitors, trading partners, customers, <strong>and</strong> government. Mimetic, coercive, <strong>and</strong><br />
normative institutional pressures existing in an institutionalized environment may influence<br />
organizations' predisposition toward an IT-based interorganizational system (Teo et al. 2003).<br />
268
Erdem Kirkbesoglu <strong>and</strong> Gizem Ogutcu<br />
Several positions, policies, procedures, programs in modern organizations <strong>and</strong> opinions of the<br />
important groups of the society are validated by public opinion <strong>and</strong> laws (Meyer <strong>and</strong> Rowan, 1977).<br />
These elements of the formal structure are expressive indicators of strong institutional rules that serve<br />
like rationalized myths (Ozen, 2007). Meyer <strong>and</strong> Rowan (1977) argue that they should adopt these<br />
rationalized innovations that functions as a myth. By this way, organizations adopt these innovations<br />
not because of increasing their own technical efficiencies but because it is externally “legitimate”. In<br />
order to demonstrate to the external environment that they are doing to this, they consider external or<br />
ceremonial assessment criteria (certificates, documents, awards… etc.) (Meyer <strong>and</strong> Rowan,1977). In<br />
conclusion, organizations become isomorphic with the organizations around them by copying them.<br />
Hence, rationalized institutional rules <strong>and</strong> institutional myths will create the most fundamental impact<br />
facilitating the spread of innovation in a network. The source of these effects will be the significant<br />
organizations in the state, professional organizations <strong>and</strong> the organizations in the institutional field.<br />
Proposition 4. As the rationalized institutional rules <strong>and</strong> institutional myths in a network towards<br />
innovation become widespread, the level of adoption increases.<br />
In the light of our testable propositions, conceptual model can be summarized in Figure 2.<br />
Outside the Network<br />
Low Adoption<br />
Low Dependency<br />
Within the Network Weak Ties<br />
Low Dependency<br />
High Adoption<br />
Unknown<br />
High Institutionalization<br />
Strong Ties<br />
Figure 2: Conceptual model of IT adoption for inter organizational networks<br />
4. Conclusion<br />
In this study, we developed a conceptual framework that reveals the contribution of interorganizational<br />
networks in the process of adoption of information technologies. The empirical <strong>and</strong><br />
theoretical studies regarding the adoption of information technologies mostly focus on factors inside<br />
the organization. Most adoption researchers have mainly focused on evaluating a few variables that<br />
impact the adoption of specific technologies by a single organization or consumer, mostly<br />
disregarding a holistic consideration of factors that might shape cooperative adoption, especially in a<br />
network context. Thus, strong <strong>and</strong> weak ties, dependency relations <strong>and</strong> isomorphic inclination which<br />
are escape researchers’ notice as a topic of organizational networks investigated in this study. This<br />
study reveals the fact that not only the efficiency based technical environment but also the institutional<br />
environment <strong>and</strong> the dependency relationships should be analyzed by the implementers. Therefore, it<br />
will be beneficial that IT adoption is measured with both micro variables <strong>and</strong> macro interactions.<br />
References<br />
Ajzen, I. (1991). “The theory of planned behavior”, Organizational Behavior <strong>and</strong> Human Decision Processes, Vol.<br />
50, pp 179-211.<br />
Brancheau, J. C. <strong>and</strong> Wetherbe, J. C. (1990). “The Adoption of Spreadsheet Software: Testing Innovation<br />
Diffusion Theory in the Context of End-User Computing”. <strong>Information</strong> Systems Research, Vol. 1. pp. 115-<br />
143.<br />
Bruque, S. <strong>and</strong> Moyano, J. (2007). “Organisational determinants of information technology adoption <strong>and</strong><br />
implementation in SMEs: The case of family <strong>and</strong> cooperative firms”. Technovation 27. p. 241–253.<br />
Burt, R. (1992). Structural holes. Chicago: University of Chicago Press.<br />
Burt, S.R. (2001). Structural Holes versus Network Closure as Social Capital. University of Chicago <strong>and</strong> Institute<br />
European d’Administration d’Affaires. No: 773-702-0848.<br />
Burt, S.R. (2004). “Structural Holes <strong>and</strong> Good Ideas”, American Journal of Sociology. 110 (2): 349-399.<br />
Burt, S.R. (2005). Brokerage & Closure. New York, Oxford University Press.<br />
269
Erdem Kirkbesoglu <strong>and</strong> Gizem Ogutcu<br />
Chen, J.S. & Tsou, H.T. (2007). "<strong>Information</strong> technology adoption for service innovation practices <strong>and</strong><br />
competitive advantage: the case of financial firms" <strong>Information</strong> Research, 12(3) paper 314<br />
Chong, A.Y.L., Ooi, K.B., Lin, B.S. <strong>and</strong> Raman, M. (2009). “Factors affecting the adoption level of c-commerce:<br />
An empirical study”, Journal of Computer <strong>Information</strong> Systems, Vol. 50, No. 2, pp 13-22.<br />
Dasgupta, S., Devraj A., Anthony I. <strong>and</strong> Shanthi G, (1999), ‘Determinants of <strong>Information</strong> Technology Adoption:<br />
An Extension of Existing Models to Firms in a Developing Country’, Journal of Global <strong>Information</strong><br />
<strong>Management</strong> (July–September), 30–40.<br />
Davis, F.D. (1989). “Perceived usefulness, perceived ease of use, <strong>and</strong> user acceptance of information<br />
technology”, "MIS Quarterly", Vol. 13, No. 3, pp 319-340.<br />
DiMaggio, P. J. <strong>and</strong> Powell, W. (1983). “The iron cage revisited institutional isomorphism <strong>and</strong><br />
collective rationality in organizational fields”, American Sociological Review, Vol. 48, 147-60.<br />
Edward B. R. <strong>and</strong> Wenyun K. L. (2001). “Ally or acquire? How technology leaders decide”. MIT Sloan<br />
<strong>Management</strong> Review. 43, 1, 26–34.<br />
Fletcher, K. <strong>and</strong> Wright, C., (1995). “Organizational, strategic <strong>and</strong> technical barriers to successful implementation<br />
of Database Marketing”. International. Journal of <strong>Information</strong> <strong>Management</strong> 15, 115–126.<br />
Gargiulo, M. ve Benassi, M. (2000). “Traped in your own net? Network cohesion, structural holes <strong>and</strong> the<br />
adaptation of social capital”. Organization Science, 11 (2): 183-196.<br />
Granovetter, M. (1973). “Strength of Weak Ties”. American Journal of Sociology, 78: 1360-1380.<br />
Granovetter, M. (1983). “The strength of weak ties: A network theory revisited”. Sociological Theory, 1: 201-233.<br />
Granovetter, M. (1985). “Economic Action <strong>and</strong> Social Structure: The Problem of Embeddedness”. American<br />
Journal of Sociology, 91(3): 481-510.<br />
Hausman, A. <strong>and</strong> Johnston, W.J. (2005). “Cooperative adoption of complex systems: a comprehensive model<br />
within <strong>and</strong> across networks”. Journal of Business & Industrial Marketing. Vol:20/4/5. p. 200–210.<br />
Kuan, K.K.Y. <strong>and</strong> Chau, P.Y.K. (2001). “A perception-based model for edi adoption in small businesses <strong>using</strong> a<br />
technology-organization-environment framework”, <strong>Information</strong> & <strong>Management</strong>, Vol. 38, No. 8, pp 507-521.<br />
Leblebici, H., Salancik, G., Copay, A., & King, T. 1991. Institutional change <strong>and</strong> the transformation of<br />
interorganizational fields: An organizational history of the U.S. radio broadcasting industry. Administrative<br />
Science Quarterly, 36: 333-363.<br />
Leidner, Dorothy E. <strong>and</strong> Kayworth, Timothy. (2006). "A Review of Culture in <strong>Information</strong> Systems Research:<br />
Toward a Theory of <strong>Information</strong> Technology Culture Conflict”, MIS Quarterly, (30: 2).<br />
Leonard-Barton, D. <strong>and</strong> Deschamps, I. (1988). “Managerial influence in the implementation of new technology”.<br />
<strong>Management</strong> Science, Vol. 34, pp. 1252-1265.<br />
Meyer, J. W. <strong>and</strong> Rowan, B. (1977). “Institutional organizations: formal structure as myth <strong>and</strong><br />
ceremony”, American Journal of Sociology, Vol. 83, 340-63.<br />
Moliterno, T.P. <strong>and</strong> Mahony, D.M. (2011). “Network Theory of Organization: A Multilevel Approach”. Journal of<br />
<strong>Management</strong>. 37: 443-467.<br />
Oliveira, T <strong>and</strong> Martins, M, F. (2011). “Literature Review of <strong>Information</strong> Technology Adoption Models at Firm<br />
Level”. The Electronic Journal <strong>Information</strong> Systems Evaluation. Vol. 14 Issue 1, pp.110-121.<br />
Ozen, Ş. (2007). New Institutional Theory. A. S. Sargut ve Ş. Özen (edt) Organization Theories . Ankara: Imge,<br />
237-331.<br />
Pfeffer, J. <strong>and</strong> Salancik, G. (1978). The external control of organizations: A resource dependence<br />
perspective, New York, Harper & Row<br />
Powell, T.C., Dent-Micallef, A., (1997). “<strong>Information</strong> technology as competitive advantage: the role of human,<br />
business <strong>and</strong> technology resources”. Strategic <strong>Management</strong> Journal. Vol. 18, 375–405.<br />
Premkumar, G., Ramamurthy, K., Crum, M., (1997). “Determinants of EDI adoption in the transportation<br />
industry”. European Journal of <strong>Information</strong> Systems. Vol: 6, 107–121.<br />
Rogers, E. (1995), Diffusion of Innovations, 4th ed., The Free Press, New York, NY.<br />
Scott, W. Richard, <strong>and</strong> John W. Meyer. (1991). The Organization of Societal Sectors: Propositions <strong>and</strong> Early<br />
Evidence. Pp. 108-142 in The New Institutionalism in Organizational Analysis, edited by Walter W. Powell<br />
<strong>and</strong> Paul J. DiMaggio. Chicago: University of Chicago Press.<br />
Sherer, P. D. (2001). Reconciling best-practice <strong>and</strong>firmdifference perspectives in strategic IR/HRM research.<br />
Paper presented at the annual meeting of the Industrial Relations Research Association, New Orleans.<br />
Soliman, K.S., Janz, B.D., (2004). ”An exploratory study to identify the critical factors affecting the decision to<br />
establish Internet-based interorganizational information systems”. <strong>Information</strong> <strong>and</strong> <strong>Management</strong>. 41, 697–<br />
706.<br />
Teo, H. H. Wei, K. K. <strong>and</strong> Benbasat, I. (2003). “Predicting Intention to Adopt Interorganizational Linkages: An<br />
Institutional Perspective”. <strong>Management</strong> <strong>Information</strong> Systems Quarterly. Vol. 27, No. 1. pp. 19-49.<br />
Teo, T.S.H. <strong>and</strong> Pian, Y., (2003). “A contingency perspective on Internet adoption <strong>and</strong> competitive advantage”.<br />
European Journal of <strong>Information</strong> Systems. Vol: 12, 78–92.<br />
Tornatzky, L. <strong>and</strong> Fleischer, M. (1990). The process of technology innovation, Lexington, MA, Lexington Books.<br />
Uzzi, B. (1997). “Social structure <strong>and</strong> competition in interfirm networks: The paradox of embeddedness”.<br />
Administrative Science Quarterly, 42: 35-67.<br />
Uzzi, B. (1999). “Social relations <strong>and</strong> networks in the making of financial capital”. American Sociological Review.<br />
Vol: 64 481-505.<br />
Venkatesh, V., Morris, M.G., Davis, G.B. <strong>and</strong> Davis, F.D. (2003). “User acceptance of information technology:<br />
Toward a unified view”, MIS Quarterly, Vol. 27, No. 3, pp. 425-478.<br />
270
Portfolio <strong>Management</strong> in Non-Profit Organizations: The<br />
Case of Groningen’s Municipality<br />
Bert Kleersnijder <strong>and</strong> Egon Berghout<br />
University of Groningen, The Netherl<strong>and</strong>s<br />
bkleersnijder@gmail.com<br />
e.w.berghout@rug.nl<br />
Abstract: The purpose of this research is to develop a method to support governing the information function, <strong>and</strong><br />
in particular, the planning <strong>and</strong> prioritization of IT projects. Groningen’s municipality serves as a case study<br />
organization. The core of the methodology consists of the ‘Hourglass’, which provides the overview of IT <strong>and</strong><br />
service programs. The Hourglass supports the Municipal Council to supervise the college program, which, in its<br />
turn, is based on a long-term strategy. These layers all play a subsequent role in the development of the project<br />
portfolio. Consequently, the Hourglass provides a transparent methodology that enables the development <strong>and</strong><br />
tracing of the IT project portfolio of Groningen’s municipality. The Hourglass methodology has been derived from<br />
the reviewing of literature <strong>and</strong> the conducting of case studies of Groningen’s municipality. Literature regarding<br />
characteristics of the organization itself <strong>and</strong> external literature has been used. Within the municipality, the<br />
characteristics of projects <strong>and</strong> programs were studied <strong>and</strong> key decision makers were interviewed. The Hourglass<br />
methodology has now been operational for one year. This research also contains a method that prioritizes the<br />
proposed projects in a portfolio model. By <strong>using</strong> the prioritization technique, the implications that new projects<br />
have for the organization can be assessed in a significantly better manner. The Hourglass is also an instrument<br />
for the guidance of finances, planning of capacity <strong>and</strong> scheduling. Because of the Hourglass model, the<br />
successful <strong>and</strong> timely completion of projects has increased significantly.<br />
Keywords: project portfolio management, ICT project prioritization, non-profit, municipalities<br />
1. Introduction<br />
At Groningen’s municipality, internal business reviews indicated that it is important to organize the<br />
resources supporting the primary process <strong>and</strong> the government of the I&A organization. Conclusions<br />
from this research were to further organize the government of the I&A function <strong>and</strong> to develop a<br />
method for the planning <strong>and</strong> prioritization of I&A projects (BOIA report, 2008). The purpose of this<br />
research is to propose a method that helps to govern the I&A function, <strong>and</strong> particularly the section on<br />
planning <strong>and</strong> prioritization of I&A projects. Groningen’s municipality serves as a case study<br />
organization. Within the context of this organization, the methods are developed to govern the I&A<br />
function, the ICT projects <strong>and</strong> how to apply this governance. First, a literature review is discussed is<br />
set forth. Then, interviews were conducted with the involved employees <strong>and</strong> documents of the<br />
organization were reviewed. Finally, the research has led to the development of an I&A governance<br />
method, including a project portfolio <strong>and</strong> prioritization method.<br />
2. Portfolio theory<br />
Research by Jeffery <strong>and</strong> Leliveld indicated that 41% of their surveyed organizations have little<br />
overview of how much they spend on ICT, 46% of the organizations do not have their applications<br />
<strong>and</strong> infrastructure properly identified, 47% of the organizations do not have a central overview of ICT<br />
projects, 57% of the organizations had no criteria for these projects to weigh them together <strong>and</strong> 41%<br />
of the organizations did not calculate the periodic return on investment (ROI) for each project (Jeffery<br />
<strong>and</strong> Leliveld, 2004). These problems indicate that there is definitely a need for additional governance<br />
over ICT, <strong>and</strong> portfolio theory could possibly provide this governance. The portfolio theory is rooted in<br />
finance where stock portfolios are defined to reduce risks. In 1990, Markowitz, Miller <strong>and</strong> Sharpe<br />
received the Nobel Prize for their work in this area. Many propagate the use of portfolio theory to<br />
reduce risks associated with IT investments. For instance, Maizlitz propagates portfolio management<br />
to assess IT (Maizlitz, 2005). Portfolio management should particularly be considered when the<br />
strategic contributions of IT remain uncertain, when the transparency of investment funds remain<br />
insufficiently transparent, when there seem to be too many projects, when incomplete criteria for the<br />
assessment of IT projects are applied, or when there is inadequate IT governance (Maizlitz, 2005).<br />
Maizlitz’s research indicates that most organizations could benefit from portfolio management<br />
(Maizlitz, 2005).<br />
From the literature, several portfolio management <strong>and</strong> project descriptions can be derived. Portfolio<br />
management comprises all structured processes for evaluating projects in a portfolio (diagram) along<br />
different dimensions. This primarily concerns the composition of the portfolio <strong>and</strong> the total number of<br />
271
Bert Kleersnijder <strong>and</strong> Egon Berghout<br />
projects (Simon et al, 2010). Cooper defines portfolio management as a dynamic decision-making<br />
process in which an organization continuously evaluates , selects <strong>and</strong> prioritizes projects. Projects<br />
can be accelerated or stopped by dividing the available resources (time <strong>and</strong> money). The process is<br />
characterized by uncertain <strong>and</strong> constantly changing information, multiple goals, strategic<br />
considerations <strong>and</strong> sensitivities <strong>and</strong> different decision makers (Cooper et al, 1999).<br />
When organizations work with project portfolios, information is provided on the individual projects,<br />
however, also on the accomplishments of the portfolio as a whole. For example, information on the<br />
number <strong>and</strong> type of these projects, on how funds are used, on the variation in the service of relevant<br />
ICT services <strong>and</strong> on the costs of ICT provision is provided. There is also information about the<br />
percentage of successful projects, the number of ongoing projects <strong>and</strong> the estimation of the hours in<br />
various ICT disciplines that are needed for the project. This can be used as governance information<br />
for the I&A office or ICT governance function (Kaplan, 2005).<br />
Bonham further states that a ‘Project <strong>Management</strong> Office’ (PMO) audit team should have an input on<br />
the prioritization of the portfolio. After a periodic review of these projects, the projects will have to be<br />
reviewed again to check if they are in line with the organization, technology <strong>and</strong> consistency of other<br />
projects. After this checking, the final scores on the projects can turn out to be a bit higher or lower<br />
<strong>and</strong> the results provide the management with a better insight on how the projects relate to each other.<br />
The aforementioned PMO is concerned with the information on projects within an organization. The<br />
main target is to govern <strong>and</strong> monitor the projects. A PMO team can help an organization to get a good<br />
underst<strong>and</strong>ing of the portfolio so that the organization can establish its objectives more efficiently <strong>and</strong><br />
can achieve them at a lower cost. PMO is not about managing projects, but about the why, which <strong>and</strong><br />
how of tackling projects. PMO should be seen as a layer on top of the previous projects, but can also<br />
operate in an internal project. The PMO can generate management information that can help the<br />
management to make decisions concerning the projects (Bonham, 2004).<br />
There are several ways to prioritize projects. Mathematical formulas can be used to maximize the<br />
portfolio to an optimal portfolio to develop the generation of income (Wen & Shih, 2006; Bardhan et al,<br />
2004; Kim et al, 2009). In practice, this method is not often applied to prioritizing projects. This is<br />
because the prioritization cannot be applied to projects of which the long-term benefits of ICT<br />
investment cannot be identified at an early stage, because there are not enough financial details<br />
available on the project, <strong>and</strong> because the earnings of the ICT project are not quantifiable (Wen &<br />
Shih, 2006). Methods with a multi-criteria approach assess quantitative <strong>and</strong> qualitative consequences<br />
of an investment project (Renkema & Berghout, 2005). Scoring methods are seen as a multi-criteria<br />
approach that can help managers evaluate ICT investments based on the objectives of the<br />
organization (Wen & Shih, 2006). In this scoring method, projects are compared <strong>and</strong> assessed on<br />
values <strong>and</strong> then the total scores are listed (Wen & Shih, 2006; Kim et al, 2009). Scoring methods are<br />
particularly interesting because they offer a way to include the non-financial criteria in the assignment<br />
of value as well (Wen & Shih, 2006). Ghasemzadeh also uses the scoring method in his project<br />
portfolio technique. The total weighted score is the final score of the project <strong>and</strong> is then placed in the<br />
overall list (Ghasemzadeh & Archer, 2000).<br />
3. Characteristics of municipalities<br />
Government agencies differ from commercial organisations in many ways <strong>and</strong> one of these<br />
differences lies within their administration. The Netherl<strong>and</strong>s is a decentralized unitary country. The<br />
Dutch government comprises three levels of government. Besides the central government, there are<br />
12 provinces <strong>and</strong> 431 municipalities. The provinces have the function of ensuring the implementation<br />
of state policy in the regional plans. The municipalities have the function of ensuring the quality of the<br />
citizens’ immediate environment. The provinces <strong>and</strong> municipalities are also referred to as 'local<br />
governments'. The municipalities are the basic cells of democracy; of all governments, they are the<br />
closest to the citizen. The municipality is autonomous, meaning that it is competent to regulate <strong>and</strong><br />
govern the local economy at its discretion. On the other h<strong>and</strong>, the municipality is obligated to cooperate<br />
with the central government <strong>and</strong> to assist on the implementation of their 'higher' rules. Once a<br />
task is regulated by this higher law, municipalities are required to implement them. The city council<br />
represents the highest form of management within the municipality. This council represents the<br />
citizens of the city, formulates policies <strong>and</strong> sets priorities. The council ensures that the municipal<br />
Board of Executives has achieved the envisioned policies <strong>and</strong> goals. The city council <strong>and</strong> municipal<br />
executives are also engaged in the municipality’s administration. It sets the rules <strong>and</strong> carries them<br />
out. The municipality is not a business, but technically many processes work in a similar way as in<br />
272
Bert Kleersnijder <strong>and</strong> Egon Berghout<br />
businesses. The Municipal Clerk is the highest civil servant in the municipality <strong>and</strong> forms a<br />
management team together with the directors from the various departments in the municipality. This<br />
management team is called a General <strong>Management</strong> Team or AMT.<br />
4. Portfolio method design<br />
In light of the goal of this research, it is essential that the I&A projects are planned <strong>and</strong> prioritized. All<br />
corporate wide projects that meet the definition of 'project' will have to be weighted according to the<br />
criteria. The portfolio method was developed so that each department will have a department portfolio<br />
<strong>and</strong> a large corporate portfolio can be created. There will always be a bigger dem<strong>and</strong> for ICT projects<br />
than one organization can h<strong>and</strong>le. It is therefore necessary to make choices <strong>and</strong> question why certain<br />
projects should be executed (Glaser, 2006). To effectively apply the prioritization, there are four<br />
necessities, namely a good project proposal, an existing ICT strategy within an organization that<br />
shows the choices that need to be made, a process designed to evaluate <strong>and</strong> compare project<br />
proposals, <strong>and</strong> an opportunity to take steps to adjust the scope of the project to (Glaser, 2006).<br />
To ensure a proper prioritization, projects have to be set against certain criteria <strong>and</strong> need to be<br />
weighed. The principle is that all projects are assigned a certain value <strong>and</strong> are prioritized for the<br />
implementation before they are executed. This is done in phases so that projects which are located<br />
further into the future can be mapped (Glaser, 2006). In the prioritization process, the department’s<br />
information manager will inform the project leader <strong>and</strong> the commissioner to take the lead in<br />
prioritizing. They apply the criteria, weigh the issues <strong>and</strong> determine the priority. This will create the<br />
department portfolio. It is the municipality’s joint portfolio manager’s task to draw up a broad corporate<br />
portfolio based on the department portfolios. It is therefore possible that the corporate portfolio<br />
manager recommends a re-prioritization when a common weighing factor changes.<br />
4.1 Prioritization criteria<br />
Based on the previous components, the portfolio manager will create an optimal portfolio selection<br />
which best fits the municipality’s needs. Prioritization is used to see which projects should be<br />
executed first. Decision criteria support this prioritization. When developing a prioritization process, it<br />
is important that the criteria are kept simple <strong>and</strong> specifically designed for the specific organization<br />
(Bonham, 2004). The criteria used in our method have been identified through interviews with project<br />
leaders, department heads, principals, information managers <strong>and</strong> policy-makers. This has resulted in<br />
two main categories of criteria, being ‘necessity’ <strong>and</strong> 'business'.Glaser (2006) calls the PID (Project<br />
Initiation Document) the beginning of the project prioritization process; the proposal must meet a<br />
number of requirements before it is read, <strong>and</strong> then the project proposal can be assessed. The<br />
prioritization technique provides the organization with the important points which should receive a<br />
sufficient score before the proposal is made to insert a certain project into the project portfolio. Each<br />
proposal receives a score for each area established within the organization. A scale of 5 (significant<br />
contribution) to 1 (minimal or no contribution) is used. Then the scores are added up <strong>and</strong> the projects<br />
with the highest scores are included in the portfolio (Glaser, 2006).<br />
4.1.1 The 'necessity' criteria<br />
For the 'necessity' criteria, the author of the PID is requested to assign only one criterion from 1 to 5,<br />
<strong>and</strong> is the heaviest weighed selection. These 'necessity' criteria are based on interviews. They are<br />
listed in the table 1.<br />
For the 'business' criteria, the author of the PID is requested to indicate the status of the project on all<br />
criteria (6-10). The following table shows the ranked criteria listed as 'business' criteria.<br />
With the scoring method, projects are compared <strong>and</strong> values are assessed. Then, the total scores are<br />
posted on a list (Wen & Shih, 2006; Kim et al, 2009). Ghasemzadeh & Archer also weigh on the basis<br />
of scoring in their project portfolio technique. The total weighed score is the final score of the project<br />
<strong>and</strong> is then placed on the overall list (Ghasemzadeh & Archer, 2000). This is also the methodology<br />
applied for Groningen’s municipality. The prioritization technique indicates that the proposal of the<br />
project should be scored in order to add a project to the project portfolio. Each proposal receives a<br />
score for each area established by the organization. A scale of 5 (significant contribution) to 1<br />
(minimal or no contribution) is used. Then, the scores are added up <strong>and</strong> the projects with the highest<br />
scores are included in the portfolio (Glaser, 2006). Within the context of Groningen’s municipality, a<br />
273
Bert Kleersnijder <strong>and</strong> Egon Berghout<br />
scale of 2 (significant contribution) to 1 (minimal or no contribution) has been chosen <strong>and</strong> all projects<br />
have been included in the list. The complete list of prioritized projects arises <strong>and</strong> because the scoring<br />
methodology is used, a list of the top scoring projects is placed at the top of the list. An example of<br />
how the criteria are applied is described in figure 2 where the project portfolio sheet is displayed.<br />
Table 1: Necessity criteria<br />
Necessity Weight Description Score<br />
0 1 2<br />
Legal necessity 24 A change in existing legislation or Project has no Project has no Project has a<br />
new legislation as a result of the legal necessity. clear legal legal necessity.<br />
project. Example: under usual Law<br />
Disclosure of public law<br />
restrictions, a digital registration<br />
system is required.<br />
necessity.<br />
Political priority 18 A change in existing local policy or<br />
new local policy as a result of the<br />
project.<br />
Public interest 18 The project is directly relevant to<br />
citizens. This can be both a direct<br />
<strong>and</strong> an indirect interest. Example:<br />
Expansion of digital services on<br />
Organizational<br />
necessity<br />
Technical<br />
necessity<br />
4.1.2 The 'business' criteria<br />
Table 2: Business criteria<br />
the website.<br />
12 The project is important for the<br />
development of the organization.<br />
Example: Replacement of an<br />
application with another<br />
application, making the<br />
organization work more effectively.<br />
12 A project must be executed<br />
technically. Hardware/software is<br />
replaced/outdated or support has<br />
stopped; a project is technically<br />
necessary or a prerequisite for<br />
another project.<br />
Project has no<br />
political priority.<br />
Project has no<br />
interest for<br />
civilians.<br />
Project has no<br />
organizational<br />
necessity.<br />
Project has no<br />
technical<br />
necessity.<br />
Project has a<br />
partial political<br />
priority.<br />
Project has a<br />
partial interest<br />
for civilians.<br />
Project has a<br />
partial<br />
organizational<br />
necessity.<br />
Project has a<br />
partial technical<br />
necessity.<br />
Project has a<br />
high political<br />
priority.<br />
Project has a<br />
high interest for<br />
civilians.<br />
Project has a<br />
high<br />
organizational<br />
necessity.<br />
Project has a<br />
high technical<br />
necessity.<br />
Business Weight Description Score<br />
0 1 2<br />
Communality 8 The implementation of the<br />
No<br />
Some<br />
High<br />
project affects a large part of communality. It communality communality. It<br />
the organization. For example: is department between affects all<br />
The introduction of the<br />
‘Complaints’ system for all<br />
departments.<br />
related. departments. departments.<br />
Time 6 A project that is under pressure No direct effect Project should Project should<br />
<strong>and</strong> has certain deadlines. on the be completed be completed<br />
organization. within two<br />
years.<br />
within one year.<br />
Return 6 Projects with a return on Project does Project Project gets<br />
investments; Clarified in the not get finances possibly gets finances<br />
business proposal.<br />
returned. finances<br />
returned.<br />
returned.<br />
ICT vision 3 Project that is part of the ICT Project does Project partly Project fits into<br />
vision.<br />
not fit into the fits into the ICT the ICT vision.<br />
ICT vision. vision.<br />
Finance 3 The basis of the funding of the Finance <strong>and</strong> Finance <strong>and</strong> Finance <strong>and</strong><br />
project.<br />
budget are not budget might budget are<br />
arranged. be arranged. arranged.<br />
4.1.3 Prioritization Instrument<br />
When the criteria have been determined, they will be added to the instrument. Figure 1 displays the<br />
score model. In this process, the following questions are asked: how will the project contribute to an<br />
objective <strong>and</strong> what is the necessity of the project. Also asked is the question of how much impact the<br />
project has <strong>and</strong> if the constraints (ROI, guaranteed funding) are met.<br />
274
Bert Kleersnijder <strong>and</strong> Egon Berghout<br />
Figure 1: Scoring model with example (based on interview sessions <strong>and</strong> workshops, Groningen’s<br />
municipality, 2009-2010)<br />
Only one criterion can be rated from the 1 to 5 criteria, implying that there can be only one dominant<br />
need. Furthermore, the legal necessity is prevalent <strong>and</strong> dominates the other four criteria. When there<br />
are several top scoring necessities, for example, all are ‘legally necessary’, criteria from the column<br />
'business' may still have an impact. For example: When a business project has to be finished in 2010<br />
<strong>and</strong> a project on the basis of legal necessity has to be finished in March 2011, the project with the<br />
greatest pressure will receive a higher priority. Ratings can be assigned to all of the criteria from 6<br />
to10. All ratings have an option to score 0, 1 or 2. The overall scores determine the priority in the<br />
portfolio. Therefore, it is possible that multiple projects with similar scoring totals <strong>and</strong> identical<br />
priorities coexist. By <strong>using</strong> the prioritization technique, the portfolio of projects can be better assessed.<br />
It is also an instrument that helps with the financing of projects, with the planning of the capacity for<br />
projects <strong>and</strong> with the overall scheduling of projects. By applying the method, successful <strong>and</strong> timely<br />
completion of projects has improved significantly. The I&A’s support capacity is limited. When there is<br />
additional insight into the planning <strong>and</strong> prioritization of the projects, this capacity can be better used<br />
<strong>and</strong> controlled.<br />
The prioritization of projects will give an overview of the projects that contribute most to cost savings.<br />
Under severe budget cuts, the portfolio as a tool can be used to effectively deal with the resources<br />
<strong>and</strong> the depletion of resources through better monitoring, especially when the portfolio contains many<br />
projects, when many interests are involved <strong>and</strong> when the resources are limited. There are also many<br />
shared interests <strong>and</strong> similar starting positions. A lot of businesses are communal, similar or identical<br />
in their processes. The budgets are always limited, <strong>and</strong> are also being cut under the influence of<br />
economic cycles. Prioritization of projects is necessary for this reason alone. However, there are more<br />
reasons to prioritize <strong>and</strong> govern: there is limited manpower to implement the projects, projects overlap<br />
<strong>and</strong> the absorption capacity of the organization has its limits (Bonham, 2004; Glaser, 2006;<br />
Berenschot, 2001). In this method, prioritization criteria are established based on interviews with<br />
employees involved in the projects of the organization, after which the scores to weigh the projects<br />
were developed. The prioritization tool, the project portfolio included for this research, is realized in an<br />
excel sheet. The organization has presented two parts with developed criteria : the first part<br />
containing five criteria is the 'necessity' of the project (in the sequence Legal need, Political priority,<br />
Public interest, Organizational need, <strong>and</strong> Technical need). Furthermore, the second part has five<br />
criteria that concern the 'business' (Communality, Time, Return, ICT vision, <strong>and</strong> Finance).<br />
The project portfolio also contains a main data set to make governance <strong>and</strong> accountability possible.<br />
Besides general information such as name, number, department, division, owner, project manager,<br />
fixed budget <strong>and</strong> start <strong>and</strong> finish date (overall planning in quarters), there is data that presents the<br />
phase of the project, the entered changes (with changing colours compared to the previous entries) in<br />
the timetable, the available budget <strong>and</strong> the capacity requirements. The score <strong>and</strong> priority are mapped,<br />
as well as the estimated hours, at the start of the project, to assess the capacity possibilities within the<br />
department, within the programs <strong>and</strong> within the departments of centralized corporate groups, of the<br />
functional application administrators <strong>and</strong> of the technical application managers. They all create their<br />
own detailed plans on the basis of a corporate-wide project portfolio <strong>and</strong> therefore, the capacity for<br />
projects can be checked. When a project changes the planning of time <strong>and</strong> capacity, it is the task of<br />
the project leader to adapt the planning <strong>and</strong> to send a progress report to the PPM officer <strong>and</strong> the<br />
commissioner of the project. In order to rate the quality of this governance method, the criteria, use of<br />
275
Bert Kleersnijder <strong>and</strong> Egon Berghout<br />
prioritization tool <strong>and</strong> project portfolio sheet were review by the staff of Groningen’s municipality. They<br />
determined that the methodologies comply with the organization. The instrument was adapted <strong>using</strong><br />
suggestions from the employees involved, with some exp<strong>and</strong>ed additions. The sheet is displayed in<br />
Figure 2.<br />
5. Conclusions <strong>and</strong> recommendations<br />
In this research, a method has been developed to plan <strong>and</strong> prioritize projects in Groningen’s<br />
municipality. This method is referred to as the Hourglass method. Decision-making within a<br />
municipality is complex <strong>and</strong> therefore it is difficult to translate the political priorities. The Hourglass<br />
method increases the transparency of the decision-making in the organization. It is now much clearer<br />
which projects are being implemented <strong>and</strong> on the basis of which arguments <strong>and</strong> whether or not this<br />
supports the strategy of the organization. When monitoring business cases <strong>and</strong> projects, these have<br />
to be checked to establish their contribution to the city council programs. When there is a delay in, for<br />
instance, nationwide projects, or associated organizations stagnate (including municipalities <strong>and</strong><br />
provinces), capacity for a certain project can be allocated to other projects. This research has shown<br />
that there is sufficient support from the departments to create a project portfolio overview. However, it<br />
lacks the continuance of the translation of decisions (for example the college program) into the project<br />
portfolio. Ultimately, the governing mechanism I&A for departments should work in such a way that<br />
there is a thorough check on the positioning within the project portfolio of projects from the college<br />
program <strong>and</strong> of projects arisen from the visions from organization’s objectives. The AMT will always<br />
need to know which projects, within the department, are in progress <strong>and</strong> when a project is missing<br />
from the portfolio, it should be added <strong>and</strong> prioritized immediately. Furthermore, the portfolio overviews<br />
can be used for justification towards the Council.<br />
276
Bert Kleersnijder <strong>and</strong> Egon Berghout<br />
Figure 2: Project portfolio sheet (based on interview sessions <strong>and</strong> workshops, Groningen’s<br />
municipality, 2009-2010)<br />
References<br />
Bardhan, I., Bagchi, S., Sougstad, R,. 2004. Prioritizing a Portfolio of <strong>Information</strong> Technology Investment<br />
Projects, Journal of <strong>Management</strong> <strong>Information</strong> Systems, fall 2004, Vol. 21, No. 2, pp. 33-60.<br />
Berenschot, 2001. Onderzoek inrichting van de I&A-functie in de Gemeente Groningen, deel 1-A advies.<br />
Gemeente Groningen.<br />
Berenschot, 2001. Onderzoek inrichting van de I&A-functie in de Gemeente Groningen, deel 1-B<br />
dienstrapportages. Gemeente Groningen.<br />
Berghout, E., Renkema, T. 2005. Investeringsbeoordeling van IT-projecten, een methodische aanpak, 3 e<br />
herziende druk. <strong>Information</strong> <strong>Management</strong> Institute B.V.<br />
Bonham, S. 2004. IT Project Portfolio <strong>Management</strong>. ARTECH House, Inc.<br />
Cooper, R.G., Edgett, S.J., Kleinschmidt, E.J., 1999. New Product Portfolio <strong>Management</strong>: Practices <strong>and</strong><br />
Performance, Journal of Product Innovation <strong>Management</strong>, Volume 16, Issue 4, pages 333–351, July 1999<br />
Ghasemzadeh, F., Archer, N.P., 2000. Project portfolio selection through decision support, Michael G. DeGroote<br />
School of Business, Elsevier, accepted 24 February 2000.<br />
Glaser, J. 2006. IT Proposals Competing For Attention - Learn How To Prioritize, Healthcare Financial<br />
<strong>Management</strong><br />
Jeffery, M. <strong>and</strong> Leliveld, I. Best practices in IT portfolio management, Sloan management review, spring 2004.<br />
Kaplan, J. 2005. Strategic IT Portfolio <strong>Management</strong>, Pittiglio, Rabin TOod & McGrath (PRTM)<br />
277
Bert Kleersnijder <strong>and</strong> Egon Berghout<br />
Kaplan, R.S., Norton, D. 1992. The balanced scorecard: measures that drive performance, Harvard Business<br />
Review, January-February, p 71-79.<br />
Kim, S.J. et all. 2009. A Scoring Method For Prioritizing non-mutually-exclusive information technologies. Human<br />
Systems <strong>Management</strong>.<br />
Maizlitz, B. en H<strong>and</strong>ler, R. 2005. IT portfolio management, step by step, John Wiley, Hoboken..<br />
Projectgroep BOIA, 2008. Rapport Bedrijfskundig Onderzoek Informatie- & Automatiseringsfunctie Gemeente<br />
Groningen. Gemeente Groningen.<br />
Projectgroep BOIA, 2010. Uitvoeringsplan BOIA Gemeente Groningen. Gemeente Groningen.<br />
Simon, D. en Fischbach, K. en Schoder, D. 2010. Application portfolio management- An ingrated Framework <strong>and</strong><br />
a software tool evaluation approach, Communications of the ACM, Volume 26.<br />
Wen, H.J., Shih, S.C. 2006. Strategic information technology prioritization, Journal Of Computer <strong>Information</strong><br />
Systems.<br />
278
Why is an IS Project Late? – A Case Study<br />
Juha Kontio<br />
Turku University of Applied Sciences, Turku, Finl<strong>and</strong><br />
juha.kontio@turkuamk.fi<br />
Abstract: <strong>Information</strong> system (IS) projects are challenging <strong>and</strong> different types of information systems failures can<br />
be identified. One type of the failures is process failures. Process failure occurs when the project timetable or<br />
budget is overrun. This paper presents a case study of a project that falls into this failure definition. This<br />
information system project started in 2008 <strong>and</strong> the aim was to create an information system to the Turku<br />
University of Applied Sciences for the teaching process. The goal of the project was to define, develop <strong>and</strong><br />
implement new easy-to-use web-based tools for curriculum management, yearly planning of the degree<br />
programs’ teaching, students’ personal study plans, <strong>and</strong> teachers’ yearly work load management. This new tool<br />
should combine all the information in a single database instead of the separate information systems <strong>and</strong><br />
databases we used to have. At the beginning of the project necessary functions that the new system should<br />
provide were defined. Based on these definitions a competitive bidding was launched with the idea that in the<br />
markets there are information systems that can be easily tailored to our specific needs. However, only one<br />
provider turned out to have an information system that fulfilled the initial definitions stated in the bid. This provider<br />
was selected <strong>and</strong> the actual tailoring of their information system for our purposes started in the summer of 2008.<br />
The definition <strong>and</strong> piloting phase showed that the basic operations in the information system are quite easily<br />
tailored to our needs. On the other h<strong>and</strong>, many of our specific needs required more work than was estimated.<br />
The operational use of the information system started in the spring of 2009 with the curriculum management <strong>and</strong><br />
yearly planning of degree programs’ teaching features. Since then the number of users has quickly increased <strong>and</strong><br />
at the same time new necessary corrections have been identified. These features have been prioritized <strong>and</strong> the<br />
other features have postponed. The project was supposed to end in 2009, but modifications in curriculum<br />
management <strong>and</strong> yearly planning of degree programs’ teaching features are still continuing. In addition, both<br />
teachers’ yearly work load management <strong>and</strong> students’ personal study plans features have been postponed to<br />
2011. Our paper introduces the whole IS project <strong>and</strong> discusses the reasons why the project is still continuing <strong>and</strong><br />
why this project is a process failure. We will also reflect our experiences <strong>and</strong> try to provide observations for future<br />
IS project management.<br />
Keywords: information system project, project delay, higher education, case study<br />
1. Introduction<br />
<strong>Information</strong> systems can be analyzed in many different ways. However, it is a fundamental difficulty in<br />
defining exactly what constitutes IS success <strong>and</strong> failure (Fowler <strong>and</strong> Horan, 2007). Still, companies<br />
that have formally defined success, measured success <strong>and</strong> acted on the results, have improved their<br />
IT project outcomes (Thomas <strong>and</strong> Fern<strong>and</strong>ez, 2008). In addition, several critical success factors of<br />
projects have been identified (Fortune <strong>and</strong> White, 2006) <strong>and</strong> based on their literature review the five<br />
most cited success factors are:<br />
Support from senior management<br />
Clear realistic objectives<br />
Strong/detailed plan kept up to date<br />
Good communication/feedback<br />
User/client involvement.<br />
DeLone <strong>and</strong> McLean provide a popular model (Figure 1) to evaluate the success of an information<br />
system (DeLone <strong>and</strong> McLean, 1992, DeLone <strong>and</strong> McLean, 2003). The dimensions of the model are<br />
as follows. First, information quality refers to the quality of the information like the relevance,<br />
reliability, accuracy <strong>and</strong> completeness of the information. Second, system quality refers to system<br />
performance like usability, availability, system efficiency <strong>and</strong> response time. Third, service quality<br />
refers to user support. Fourth, user satisfaction refers to overall satisfaction with the information<br />
system including such as interface satisfaction. Fifth, intention to use <strong>and</strong> use describe how the<br />
information system is used. Sixth, net benefits are about the impacts the information system has to<br />
the organization, users <strong>and</strong> other stakeholders.<br />
Another viewpoint to information systems is to look information system failures. One traditional way to<br />
analyze information system failures is provided by Lyytinen <strong>and</strong> Hirscheim (1987). They categorize<br />
failures in four categories (Lyytinen <strong>and</strong> Hirschheim, 1987):<br />
279
Correspondence failure<br />
Process failure<br />
Interaction failure<br />
Expectation failure.<br />
<strong>Information</strong><br />
Quality<br />
System<br />
Quality<br />
Service<br />
Quality<br />
Juha Kontio<br />
Intention<br />
to use<br />
User<br />
Satisfaction<br />
Use<br />
Net<br />
Benefits<br />
Figure 1: Updated DeLone & McLean IS success model (DeLone <strong>and</strong> McLean, 2003)<br />
Correspondence failure emphasizes the management view of IS. The IS is a failure if the overall goal<br />
of the IS is not met. Process failure has two dimensions: the IS project cannot produce a workable<br />
system or the project develops a workable IS, but the timetable or budget is overrun. Interaction<br />
failure relates to usage level of the information system. Finally, expectation failure happens when the<br />
certain goals of the information system cannot be met such as low maintenance costs. For this paper<br />
the process failure category is the most interesting. This category relates to problems of management<br />
in predicting the required resources, budgets <strong>and</strong> possible problems. (Lyytinen <strong>and</strong> Hirschheim, 1987)<br />
Managers need to be aware of alarming signals during the project <strong>and</strong> they have to seek<br />
opportunities to turn the troubled project around. In addition, it must be understood that project<br />
conditions might change rapidly during implementation. The most important challenge is that<br />
managers do not focus on how to fix a problem rather they recognize that a problem exists <strong>and</strong> needs<br />
to be fixed. (Pan et al., 2008) Different failures could be caused by unrealistic expectations<br />
(correspondence failure), lack of resources (process failure), weak management of contractors<br />
(process failure) (Brown <strong>and</strong> Jones, 1998). The literature review by Fowler <strong>and</strong> Horan (2007)<br />
identified six most regularly cited risk factors associated with IS failure:<br />
Lack of effective project management skills/involvement,<br />
Lack of adequate user involvement,<br />
Lack of top-management commitment to the project,<br />
Lack of required knowledge/skills in the project personnel,<br />
Poor/inadequate user training <strong>and</strong><br />
Lack of co-operation from users.<br />
To avoid failures organizations should address certain questions (Gauld, 2007): 1) Are the risks in the<br />
project fully understood <strong>and</strong> manageable?, 2) Ensure that key persons are leading the project, 3)<br />
Ensure that staff <strong>and</strong> other end-users see the benefits of a proposed new IS <strong>and</strong> 4) Is the large<br />
project essential or could a series of smaller projects suffice? Furthermore, three effective practices<br />
for IT projects are identified (Thomas <strong>and</strong> Fern<strong>and</strong>ez, 2008): 1) Agree on the definition of success, 2)<br />
Measure success consistently, 3) Use the results.<br />
This paper presents a case study of an information system project that falls into process failure<br />
definition. The project is still continuing <strong>and</strong> in this paper we will analyze the reasons why the project<br />
is way behind its’ original schedule. In the next sections, we will introduce the project, the research,<br />
the results <strong>and</strong> finally discuss the observations.<br />
280
2. The project<br />
2.1 Background <strong>and</strong> requirements<br />
Juha Kontio<br />
In 2008, the Turku University of Applied Sciences was <strong>using</strong> an old information system (Study<br />
register) to manage students <strong>and</strong> their study credits <strong>and</strong> assessments. The information system<br />
contained<br />
Student register<br />
Curriculum register (courses <strong>and</strong> implementations)<br />
Students’ credits<br />
Basic teacher information<br />
User management.<br />
In addition, a separate Lotus Notes database was used for detailed curriculum descriptions.<br />
Necessary information was manually copied to the Study register IS. The Study register IS is used for<br />
management of several types of information such as disciplines, degree programs, students’ cohorts,<br />
students’ study times <strong>and</strong> students’ credits. Furthermore, the system is used to produce many<br />
important documents <strong>and</strong> certificates such as the degree certificate, the study certificate <strong>and</strong> list of<br />
student’s credits. Finally, some official statistics are produced from this system.<br />
However, the Study register IS lacked some increasingly important features. It did not support the<br />
curricula design process <strong>and</strong> it did not provide useful tools for managing competence based curricula.<br />
Neither did the system support the yearly planning of degree programs’ teaching <strong>and</strong> course level<br />
implementation design. Allthough teachers were linked to every course; this system did not support<br />
the management of teachers’ yearly working loads. Teachers’ yearly working loads were managed in<br />
an inhouse information system, which was not integrated into any other information systems. Finally,<br />
there was not a tool for interactive planning of students’ individual study plans.<br />
The new system should provide tools <strong>and</strong> support for better management of the teaching process. It<br />
should combine curriculum, planning of degree programs’ teaching <strong>and</strong> course implementation,<br />
management of teachers’ yearly working loads <strong>and</strong> management of students’ individual study plans.<br />
The new system should be browser based <strong>and</strong> the user interface should be easy to use. The new<br />
system will be used by both students <strong>and</strong> personnel.<br />
The future situation with the new system is described in the figure 2 below. The introduction of the<br />
new system will end the lifecycle of three other information systems: the curricula database in Lotus<br />
Notes, the course implementation plans IS (Totsu) <strong>and</strong> the teachers’ yearly working load<br />
management IS (Tilipussi). The new system will be connected with following systems:<br />
LDAP: user management system in Turku University of Applied Sciences. The access priviliges<br />
will be maintained here.<br />
Financials: an information system managed by the city of Turku. Contains information of the<br />
accounts <strong>and</strong> cost pools.<br />
Salary IS: an information system managed by the city of Turku. Contains information of every<br />
employer <strong>and</strong> is the system used for salary management.<br />
Study register: the IS is described earlier, but the role will change partly. Still maintains its role for<br />
assessments <strong>and</strong> providing necessary certificates.<br />
2.2 The new project<br />
The information system project started in 2008 <strong>and</strong> the aim was to create an information system for<br />
the teaching process in the Turku University of Applied Sciences. The project was planned to finish at<br />
the end of 2009. At the beginning requirements were prioritized <strong>and</strong> three main phases could be<br />
identified based on the information system’s desired functions:<br />
Curriculum <strong>and</strong> teaching<br />
Working load management <strong>and</strong> salary information<br />
Students’ personal study plans <strong>and</strong> connections to study register.<br />
281
Financials<br />
Salary IS<br />
Up‐to‐date information of<br />
accounts <strong>and</strong> cost pools<br />
Juha Kontio<br />
Teachers’ yearly working load<br />
NEW<br />
SYSTEM<br />
Figure 2: The future with the new information syste m<br />
Access priviligies<br />
LDAP<br />
User <strong>Management</strong><br />
Study register<br />
‐ Students<br />
‐ Teachers<br />
‐ Assessments<br />
Course information,<br />
implementations, assessment ,...<br />
The original project schedule is presented in Figure 3. Every phase<br />
also had a goal for the start of<br />
operational usage. Both the schedule <strong>and</strong> the estimates for the beginning of the operational use were<br />
created with the best knowledge available at the time the project was started.<br />
Figure 3: Project plan<br />
The three phases were further divided into smaller subphases as shown in the Table 1.<br />
Table 1: Project phases<br />
Phase Subphases Functions<br />
Phase I:<br />
Startup<br />
Curriculum structure<br />
Curriculum <strong>and</strong> Requirement analysis<br />
C urriculum description<br />
teaching<br />
Setup of the pilot<br />
Competence matrix<br />
environment<br />
Yearly teaching plan<br />
Piloting<br />
Course implementation plan<br />
Tailoring<br />
D ata conversion from old system<br />
Conve rsion of old data<br />
LPAD-connections<br />
Approval<br />
Installation<br />
Operational use<br />
Connections to Study Register<br />
IS<br />
Phase II: Requirement analysis<br />
Tailoring of the teacher’s working load management<br />
W orking load<br />
Design<br />
features<br />
m anagement <strong>and</strong> Implemen tation <strong>and</strong> tailoring<br />
Process definitions<br />
salary information<br />
Testing<br />
Connections to Salary IS <strong>and</strong> Financials<br />
IS<br />
282
Juha Kontio<br />
Phase<br />
In stallation<br />
Operational use<br />
Subphases Functions<br />
Phase III:<br />
Piloting<br />
Structure/format of students’ individual<br />
study plan<br />
Students’<br />
Analysis<br />
Process definitions<br />
individual study<br />
Desing<br />
Data transfer to/from Study Register<br />
IS<br />
plans <strong>and</strong><br />
Tailoring<br />
connections to<br />
Testing<br />
study register.<br />
Installation<br />
Operational use<br />
3. Research<br />
3.1 Design <strong>and</strong> methods<br />
Methodologically this research is a single case study research. This approach is viable research<br />
methodology in IS-research for several reasons. First, the researcher can study information systems<br />
in a natural setting, learn about the real-life situation, <strong>and</strong> generate theories from practice (Benbasat<br />
et al., 1987, Cavaye, 1996). Second, case methods allow the researcher to underst<strong>and</strong> the nature<br />
<strong>and</strong> complexity of the processes taking place (Benbasat et al., 1987).<br />
This<br />
research aims at describing the reasons of a project falling behind its’ schedule in the Turku<br />
University of Applied Sciences. The research question is "What reasons can be identified for the delay<br />
of an information system project?”<br />
In a typical case study research multiple data collection methods are used (Benbasat et al., 1987).<br />
This involves combining different techniques such as observation <strong>and</strong> document <strong>and</strong> text analysis<br />
(Broadbent et al., 1998). Participant-observation was the main data collection method in this research.<br />
It means that the researcher may have a variety of roles within the case study situation <strong>and</strong> really<br />
participate in the events being studied (Yin, 1994). In this research, the roles of the researcher<br />
included a) chair of the project steering group b) member of the executive board of the University, <strong>and</strong><br />
c) the member of the staff. The participant-observation has happened from the beginning of the<br />
project to the end of March 2011. The different roles of the researcher provided different viewpoints to<br />
the underst<strong>and</strong>ing <strong>and</strong> also guiding the project. As a chair of the project steering group the researcher<br />
participated in making project related decisions. As a member of the executive board of the University<br />
the researcher participated decisions relating the information systems in the University <strong>and</strong> thus also<br />
this new information system. Finally, as a member of the staff the researcher used the information<br />
systems similarly as other staff member <strong>and</strong> collected data about the project. These three roles<br />
correspond quite well with the three levels where an information system success could be measured<br />
(Fowler <strong>and</strong> Horan, 2007): organizational, b) process level <strong>and</strong> c) individual level. Besides the<br />
participant-observation data was also gathered from existing documents which included system<br />
documentation, project group memos, steering group memos <strong>and</strong> presentations of the new<br />
information system.<br />
3.2 The case organization<br />
The Turku University of Applied Sciences<br />
(TUAS) is one of the largest of its kind in Finl<strong>and</strong>. The<br />
University is administered by the City of Turku, which means that University has to use some of the<br />
information systems provided by the City. Examples of these systems are the Financials <strong>and</strong> Salary<br />
IS (see figure 2).<br />
The TUAS has almost 9000 students <strong>and</strong> we educate Bachelors <strong>and</strong> Masters in about 50 different<br />
Degree Programs.The TUAS is organized in six faculties that promote multidisciplinary learning<br />
(Figure 4). Each faculty has several degree programs <strong>and</strong> students from 700 to 2500. The faculties<br />
differ from each by the preparedness of ICT technology – others are reluctant with new technology<br />
while others look new technology with too much expertise <strong>and</strong> might be extra critical. The broad<br />
variety of Degree Programs create challenges for the teaching process – finding solutions suitable for<br />
both small <strong>and</strong> big programs require a lot of planning <strong>and</strong> design.<br />
283
Turku University of Applied Sciences<br />
City<br />
Council<br />
City Board<br />
Organisation Chart<br />
1.1.2011<br />
TUAS<br />
Delegation<br />
TUAS<br />
Board<br />
Rector<br />
Vice<br />
Rectors<br />
Executive<br />
Board<br />
Figure 4: Organisation chart of TUAS<br />
4. Results<br />
Juha Kontio<br />
Development <strong>and</strong><br />
Administration<br />
• Administrative Services<br />
- General administration<br />
- Financial administration<br />
-Communications<br />
- Quality <strong>and</strong> evaluation<br />
- Facilities <strong>and</strong> other<br />
support services<br />
• Educational Services<br />
- Student counselling<br />
services<br />
- International relations<br />
- Centralised<br />
educational services<br />
- Open University of<br />
Applied Sciences<br />
- Library<br />
- Language Centre<br />
• Innovation Services<br />
- Co-ordination unit for<br />
continued education<br />
- Research <strong>and</strong><br />
Development Centre<br />
- Regional Development<br />
-Personnel Services<br />
-IT-services<br />
Arts Academy<br />
Turku: • Film <strong>and</strong> Media • Fine Arts • Journalism • Music<br />
• Performing Arts<br />
Health Care<br />
Turku: • Advanced Nursing Practice (Master’s Degree)<br />
• Biomedical Laboratory Science • Dental Hygiene<br />
• Emergency Care<br />
• Health Promotion (Master’s Degree)<br />
• Nursing • Radiography <strong>and</strong> Radiotherapy<br />
• <strong>Management</strong> <strong>and</strong> Leadership in Health Care<br />
(Master’s Degree)<br />
Salo: • Nursing (in Finnish <strong>and</strong> in English)<br />
Life Sciences <strong>and</strong> Business<br />
Turku: • Biotechnology <strong>and</strong> Food Technology • Business<br />
• Business <strong>Information</strong> Systems (Master’s Degree)<br />
• Business <strong>Information</strong> Technology<br />
• Entrepreneurship <strong>and</strong> Business (Master’s Degree)<br />
• International Business (in English)<br />
Technology, Environment <strong>and</strong> Business<br />
Turku: • Automotive <strong>and</strong> Transportation Engineering<br />
• Civil Engineering • Construction (Master’s Degree)<br />
• Construction <strong>Management</strong><br />
• Design • Environmental Technology (Master’s Degree)<br />
• Fisheries <strong>and</strong> Environmental Care<br />
• Industrial <strong>Management</strong><br />
• Mechanical <strong>and</strong> Production Engineering • Professional Sales<br />
• Sustainable Development<br />
Uusikaupunki: • Business Logistics<br />
Telecommunication <strong>and</strong> e-Business<br />
Turku: • Electronics • Library <strong>and</strong> <strong>Information</strong> Services<br />
• Library <strong>and</strong> <strong>Information</strong> Services (Master’s Degree)<br />
• <strong>Information</strong> Technology (in Finnish <strong>and</strong> in English)<br />
• Technology Competence Leadership (Master’s Degree)<br />
Salo: • Business • Business <strong>Information</strong> Technology<br />
• <strong>Information</strong> Technology<br />
Well-being Services<br />
Turku: • Beauty Care • Hospitality <strong>Management</strong><br />
• Hospitality <strong>Management</strong> (Master’s Degree)<br />
• Occupational Therapy • Physiotherapy<br />
• Rehabilitation (Master’s Degree)<br />
• Social Services • Social Services (Master’s Degree)<br />
Loimaa: • Business • Business <strong>Information</strong> Technology • Social Services<br />
Salo: • Social Services<br />
The project started quite well <strong>and</strong> first features were piloted <strong>and</strong> tested in the winter of 2008. The<br />
definition <strong>and</strong> piloting phase showed that the information system is quite easily tailored to our needs.<br />
First parts of the information system were taken in operational use in the spring 2009. At the<br />
beginning, the curriculum management <strong>and</strong> yearly planning of degree programs’ teaching features<br />
were implemented. However, the more users were envolved with the system the more challenges<br />
were recognized. Especially the specific needs of our organization <strong>and</strong> processes required more work<br />
than was initially estimated. These features did not hinder the use of the system, but we needed to be<br />
aware of these shortages.<br />
Figure 5 shows the real project schedule which differ substantially from the original project plan<br />
shown in Figure 3. The exceeding of the project’s original timing has many reasons. The reasons are<br />
listed in table 2 with short descriptions.<br />
Figure 5: True project timing<br />
284
Table 2: Identified reason of the project to be late<br />
Juha Kontio<br />
Reason Description<br />
Our process complexity The information system provided mostly right features, but the internal logic of<br />
the IS was not correspondent to our processes after all.<br />
Required amount of system<br />
tailoring<br />
A lot of modifications were needed to the user interface of the system –<br />
concepts <strong>and</strong> term used had to be changed to increase the underst<strong>and</strong>ability<br />
of the system <strong>and</strong> to connect the user experience with the process description<br />
<strong>and</strong> definitions.<br />
Too positive project plan The first experiences of the system suggested an efficient <strong>and</strong> straightforward<br />
project. Therefore the project plan was designed <strong>and</strong> the schedules were set<br />
too positively <strong>and</strong> too optimistically.<br />
Deficiencies in the IS The experiences of the information system during the two <strong>and</strong> a half years<br />
have given the impression that the system has been built quickly <strong>and</strong> flexibility<br />
has not been a major issue.<br />
Piloting poorly resourced In each project phases a piloting group of 10 to 15 people were nominated<br />
from the faculties <strong>and</strong> administration. However, the piloting group was not<br />
given proper resources to actually focus on the piloting in none of the phases.<br />
The piloting was supposed to happen on the side of the normal daily tasks <strong>and</strong><br />
routines.<br />
Goals of piloting unclearly<br />
stated<br />
The piloting goals were not defined clearly. The piloter were not fully aware<br />
what they were expected to do <strong>and</strong> report. This caused that the time <strong>and</strong> effort<br />
put on piloting was not at satisfied level throughout the pilot group. As a result,<br />
the piloting did not give reliable answers for the next steps of the project. The<br />
lack of true piloting resources caused phases II <strong>and</strong> III to happen in two parts –<br />
the next steps were postponed in order to wait better resources.<br />
Quality of test plans During the project test plans were not throughly designed rather testing was<br />
mostly ad-hoc testing. In addition, test reports were not properly produced.<br />
This resulted that certain functionalities were poorly tested.<br />
Not enough time to test Testing was also performed on the side of the normal work which lowered the<br />
quality of testing. Since the project schedule was quite tight <strong>and</strong> time for<br />
testing was short, decisions concerning the project were sometimes made in a<br />
hurry.<br />
Problems with data<br />
conversions<br />
Connections to information<br />
systems provided by the city<br />
Data conversion <strong>and</strong> transfer from old systems to the new system turned out<br />
be problematic. The main reason for these problems was the poor quality of<br />
the data – there were inconsistencies, integrity errors <strong>and</strong> missing data. These<br />
generated problems in setting up the new system <strong>and</strong> slowed down the<br />
adoption of the system.<br />
The new information system was planned to be integrated with information<br />
systems run by the City of Turku. The connections were mostly designed <strong>and</strong><br />
programming had begun when the City announced that the main financials<br />
system will be replaced with a new one (SAP). This delayed the<br />
implementation because the new financials system was totally different <strong>and</strong><br />
this required new design <strong>and</strong> programming as well. The main difference was<br />
moving from one level accounts to two level accounts.<br />
Limited IS Budget The information system was bought after the competitive bidding <strong>and</strong> at the<br />
same time an agreement was made that a certain amount of maintenance<br />
work is allowed. The phase II was started in the winter of 2008, but in May<br />
2009 the phase was stopped <strong>and</strong> postponed. The reason this strong action<br />
was that the tailoring <strong>and</strong> correction works in the phase I required so much<br />
more work than the budget for 2009 allowed.<br />
Lack of resources: the IS<br />
provider<br />
The IS provider had other implementation project going on simultaneously with<br />
our project. Unfortunately they lacked enough resources/manpower to promote<br />
two projects parallel rather the other one would have to wait another.<br />
285
5. Discussion<br />
Juha Kontio<br />
This case study research identified several reasons why our IS project is late. According to the failure<br />
categories by Lyytinen <strong>and</strong> Hirscheim (1987) this case study presents a typical example of an<br />
information system process failure. <strong>Information</strong> system process failure happens when a workable IS is<br />
developed but the timetable is overrun. An important question at this point is – what could we have<br />
done to avoid these problems? As Gaud (2007) proposed organizations should address certain<br />
questions to avoid project failures. Our organization followed part of their recommendations. For<br />
example, the key persons were envolved to the project. The benefits of the new IS were<br />
communicated to the management board, but less with other staff members <strong>and</strong> end-users. In<br />
addition, we should have analysed the risks of the project more carefully. The three effective practices<br />
(Thomas <strong>and</strong> Fern<strong>and</strong>ez, 2008) could have helped us too. Our organization has not a definition for<br />
successful IS project <strong>and</strong> we are not measuring project successes consistently.<br />
Looking back to the project, there are a number of reasons that are out of reach, but also many<br />
reasons that we should have managed better. Our study showed reasons that are management<br />
related issues such as too positive project plan, piloting poorly resourced, not enough time to test <strong>and</strong><br />
limited IS budget.<br />
In addition to management related reasons, we can identify a reason category for integration:<br />
problems with data conversions <strong>and</strong> connections to information systems provided by the city. The<br />
later one is also a good example of rapid changes in the project conditions that affect the<br />
implementation significantly. In this case, the old financials IS of the City of Turku was replaced with a<br />
new IS.<br />
Our project succeeded partly on the five most cited success factors of projects (Fortune <strong>and</strong> White,<br />
2006). The project had the support from the senior management, but the project should have<br />
communicated better with the management, staff <strong>and</strong> end-users to maintain the positive momentum.<br />
The project objectives were realistically set, but the project timing was too optimistically set. We<br />
involved users to test <strong>and</strong> pilot the information system, but we could have used much bigger number<br />
of testers <strong>and</strong> piloters.<br />
When comparing our results with the DeLoan <strong>and</strong> Mclean IS success model, we see that many<br />
reasons to the process failure have connections to the factors in their model as well:<br />
<strong>Information</strong> quality – The problems with data conversions<br />
System quality – Deficiencies in the IS; Required amount of system tailoring<br />
Service quality – Lack of resources: the IS provider<br />
Intention to use – Piloting badly resourced, not enough time to test.<br />
As the above connections list show there are lot of evidence also from the viewpoint of this model that<br />
the project has not been a success story.<br />
The project delay has also influenced the life cycles of other information systems. The original idea<br />
was that this new system would replace old systems <strong>and</strong> provide one system for doing many things.<br />
However, the delays have given extra lifetime to the Course implementation plan IS <strong>and</strong> to the<br />
Teacher’s yearly working load management IS. This has caused additional costs in licencies, because<br />
the environment of the old system needed to be continued.<br />
An important question is how we could have done better? Could we have avoided the most regular<br />
risk factors of the IS projects? The major issue is the management of the project, which is also the<br />
first risk factor listed by Fowler <strong>and</strong> Horan (2007). We should have created a very strong project<br />
management with enough power to decide for example the resources to be used in testing <strong>and</strong><br />
piloting. This would have improved the user involvement as well (2 nd most cited risk factor)! The<br />
project had a steering group <strong>and</strong> almost full-time project manager, but the management did not have<br />
any possibilities to order how different faculties should do – the management could only express<br />
strong recommendations. In addition, we should have put more effort on testing. Proper test plans<br />
should have been made rather that just listing interesting cases <strong>and</strong> testing them.<br />
286
Juha Kontio<br />
There are also reasons that we could not solve at this point. For example, the poor quality of data in<br />
the information systems to be integrated is not simple question. Actually, it is a question of culture <strong>and</strong><br />
underst<strong>and</strong>ing the importance of providing high quality data into the information systems. When the<br />
single points of data entries are seriously managed the overall quality of data will be good.<br />
6. Conclusions<br />
Despite the fact that we can categorize this project as a process failure, the information system is in<br />
operational use <strong>and</strong> it serves the purpose it was mentioned to. Unfortunatelly the project has been a<br />
hard experience because of the disappointments caused by the delay. Many important <strong>and</strong> waited<br />
features have been postponed which has been challenging for the University. However, we are<br />
confident that the future information system will eventually provide all the features that were written in<br />
the requirements at the beginning of the project.<br />
For other people, our case study has shown <strong>and</strong> confirmed that project management has a vital role<br />
in information system projects. Furthermore, the success <strong>and</strong> risk factors lists contain relavant<br />
information to famialize with for a positive project.<br />
References<br />
Benbasat, I., Goldstein, D. K. & Mead, M. 1987. The Case Research Strategy in Studies of <strong>Information</strong> Systems.<br />
MIS Quarterly, 11, 369 - 386.<br />
Broadbent, M., Darke, P. & Shanks, G. 1998. Successfully completing case study research: combining rigour,<br />
relevance <strong>and</strong> pragmatism. <strong>Information</strong> Systems Journal, 8, 273 - 289.<br />
Brown, A. & Jones, M. 1998. Doomed to failure: Narratives of inevitability <strong>and</strong> conspiracy in a failed IS project.<br />
Oraganizational Studies, 19, 73-89.<br />
Cavaye, A. L. M. 1996. Case Study Research: a multi-faceted research approach for IS. <strong>Information</strong> Systems<br />
Journal, 6, 227 - 242.<br />
Delone, W. H. & Mclean, E. R. 1992. <strong>Information</strong> Systems Success: The Quest for the Dependent Variable.<br />
<strong>Information</strong> Systems Research, 3, 60 - 95.<br />
Delone, W. H. & Mclean, E. R. 2003. The DeLone <strong>and</strong> McLean model of information systems success: A ten-year<br />
update. Journal Of <strong>Management</strong> <strong>Information</strong> Systems, 19, 9 - 30.<br />
Fortune, J. & White, D. 2006. Framing of project critical success factors by a system model. International Journal<br />
of Project <strong>Management</strong>, 24, 53 - 65.<br />
Fowler, J. J. & Horan, P. 2007. Are <strong>Information</strong> Systems' Success <strong>and</strong> Failure Factors Related? An Exploratory<br />
Study. Journal of Organizational & End User Computing, 19, 1-22.<br />
Gauld, R. 2007. Public sector information system project failures: Lessons from a New Zeal<strong>and</strong> hospital<br />
organization. Government <strong>Information</strong> Quarterly, 24, 102-114.<br />
Lyytinen, K. & Hirschheim, R. 1987. <strong>Information</strong> system failures - a survey <strong>and</strong> classification of the empirical<br />
literature. Oxford Surveys in <strong>Information</strong> Technology, 4, 257-309.<br />
Pan, G., Hackney, R. & Pan, S. L. 2008. <strong>Information</strong> Systems implementation failure: Insights from prism.<br />
International Journal of <strong>Information</strong> <strong>Management</strong>, 28, 259-269.<br />
Thomas, G. & Fern<strong>and</strong>ez, W. 2008. Success in IT projects: A matter of definition? International Journal of Project<br />
<strong>Management</strong>, 26, 733 - 742.<br />
Yin, R. K. 1994. Case Study Research - Design <strong>and</strong> Methods, Thous<strong>and</strong> Oaks, SAGE Publications, Inc.<br />
287
Research on Performance Review Model for National<br />
Database Project<br />
Misoo Kwon<br />
National <strong>Information</strong> Society Agency, Seoul, Korea<br />
kwonms@nia.or.kr<br />
Abstract: The Korean government launched the National Database Project (NDP) in the late 1990s in order to<br />
preserve, utilize <strong>and</strong> share resources <strong>and</strong> information that are of major importance. It made a total of 773 billionwon<br />
investment from 1999 to 2010 <strong>and</strong> established databases incorporating 300 million pieces of information in<br />
139 categories. The NDP has not only satisfied the citizens’ right to know through distribution <strong>and</strong> utilization of<br />
the database but also exp<strong>and</strong>ed information infrastructure which further created social/economic values through<br />
new businesses <strong>and</strong> market environment. The performance review model presented in this paper is developed<br />
based on NDP <strong>and</strong> the result of 2010 performance review on 2009 NDP is also briefly introduced. Performance<br />
review categories for NDP include business performance <strong>and</strong> economic impact. Business performance can be<br />
then broken down into four sub-categories - user satisfaction, system utilization, system performance <strong>and</strong> data<br />
assurance. User satisfaction is for reviewing whether the provided data are useful <strong>and</strong> measures accuracy,<br />
usability <strong>and</strong> fidelity of information. System utilization is for reviewing how the provided data are used in business<br />
<strong>and</strong> measures frequency of use <strong>and</strong> level of convenience. System performance is for reviewing whether the<br />
stored data can be provided easily <strong>and</strong> immediately at the time of need <strong>and</strong> measures system processing speed.<br />
Data assurance is for reviewing whether the stored data are effective <strong>and</strong> reliable for business <strong>and</strong> measures<br />
data integrity, accuracy <strong>and</strong> consistency. Economic impact measures return on investment (ROI) which converts<br />
the cost of saved time into the current value. In 2010, the performance review was carried out on 50 databases<br />
that were established in 2009 mainly in terms of business performance <strong>and</strong> economic impact. Tools that were<br />
used for review were a survey questionnaire, checklist <strong>and</strong> survey tool for each performance review category.<br />
From users, user satisfaction <strong>and</strong> convenience were the two categories surveyed through face-to-face interviews<br />
<strong>and</strong> online surveys (on a five-point scale). From system managers, system performance, utilization rate <strong>and</strong> timesaving<br />
were surveyed <strong>using</strong> a survey checklist. As for reviewing data assurance, a survey tool was used. The<br />
business performance score for NDP in 2010 was 84.6 by earning 77.3 points for user satisfaction, 79.2 points<br />
for utilization <strong>and</strong> 99.8 points for data assurance. Analyzing the amount of time saved as the current value<br />
against the project budget invested into NDP each year indicates that the cost-saving impact against investment<br />
was 245.0% in 2008 <strong>and</strong> 306.9% in 2009 with a sign of increasing number of usage, amount of time saved <strong>and</strong><br />
ROI from the previous year.<br />
Keywords: Korean database project, database performance review, data assurance, system utilization, user<br />
satisfaction, ROI<br />
1. Background of National Database Project <strong>and</strong> performance review<br />
In line with the efforts to computerize administrative affairs of public organizations in the 1980s, the<br />
Korean government launched the National Database Project (NDP) in the late 1990s in order to<br />
preserve, utilize <strong>and</strong> share resources <strong>and</strong> information that are of major importance. It made a total of<br />
773 billion-won investment from 1999 to 2010 <strong>and</strong> established databases incorporating 300 million<br />
pieces of information in 139 categories. The NDP has not only satisfied the citizens’ right to know<br />
through distribution <strong>and</strong> utilization of the database but also exp<strong>and</strong>ed information infrastructure which<br />
further created social/economic values through new businesses <strong>and</strong> market environment.<br />
The NDP, as introduced in this paper, is a project carried out by the Korean Ministry of Public<br />
Administration <strong>and</strong> Security (MOPAS) with a budget allocated from the Ministry of Strategy <strong>and</strong><br />
Finance (KRW 25.1 billion in 2011) in order to select references that are considered highly important<br />
to be preserved <strong>and</strong> utilized at the national level <strong>and</strong> information that must be shared among different<br />
government bodies <strong>and</strong> incorporate them into a database. National <strong>Information</strong> Society Agency is<br />
supporting project selection <strong>and</strong> management as a specialized institution for the project. Performance<br />
review of the project helps decision making process regarding the sustainability of the project by<br />
assessing the achievement <strong>and</strong> evaluating the usability <strong>and</strong> accuracy of the database. In particular,<br />
the references to be brought onto the database have a wide range of raw data <strong>and</strong> it usually takes<br />
three to five years to collect such data year by year. Therefore, project performance review every year<br />
enforces a strong feedback system under which projects with the least performance are delayed for<br />
the next year.<br />
The performance review model presented in this paper is developed based on NDP <strong>and</strong> the result of<br />
2010 performance review on 2009 NDP is also briefly introduced.<br />
288
2. Performance review model for NDP<br />
2.1 Measuring performance<br />
Misoo Kwon<br />
The performance review model for NDP is a systemized model that reviews the performance of NDP<br />
in an efficient way based on theoretical <strong>and</strong> practical cases of precedent studies regarding information<br />
<strong>and</strong> technology performance measurement. This is because the NDP deals with of heterogeneous<br />
<strong>and</strong> multiple databases that consist of enormous amount of information <strong>and</strong> a wide range of data<br />
services. Performance review categories for NDP include business performance <strong>and</strong> economic<br />
impact. Business performance can be then broken down into four sub-categories - user satisfaction,<br />
system utilization, system performance <strong>and</strong> data assurance.<br />
User satisfaction is for reviewing whether the provided data are useful <strong>and</strong> measures accuracy,<br />
usability <strong>and</strong> fidelity of information.<br />
System utilization is for reviewing how the provided data are used in business <strong>and</strong> measures<br />
frequency of use <strong>and</strong> level of convenience.<br />
System performance is for reviewing whether the stored data can be provided easily <strong>and</strong><br />
immediately at the time of need <strong>and</strong> measures system processing speed.<br />
Data assurance is for reviewing whether the stored data are effective <strong>and</strong> reliable for business<br />
<strong>and</strong> measures data integrity, accuracy <strong>and</strong> consistency.<br />
Economic impact measures return on investment (ROI) which converts the cost of saved time into<br />
the current value.<br />
2.2 Performance review indicators<br />
Main principles for developing performance review indicators for NDP are integration, objectivity,<br />
integrity <strong>and</strong> visibility. Integration means that the indicator must be a st<strong>and</strong>ardized one that can be<br />
applied commonly to many databases serving different goals. Objectivity means that it must be<br />
objective for universal validity against diverse databases. Integrity means that the indicator must allow<br />
review of the entire project goals <strong>and</strong> visibility means that it must be clear enough to show the result<br />
of performance review.<br />
The performance review indicators developed from the above principles are introduced by each<br />
category as in Table 1 below:<br />
Table 1: Performance review indicators<br />
Category Sub-category Review indicator<br />
<strong>Information</strong> usability<br />
User satisfaction<br />
<strong>Information</strong> accuracy<br />
<strong>Information</strong> fidelity<br />
Utilization convenience<br />
System utilization<br />
Utilization rate<br />
Business performance<br />
Utilization efficiency<br />
System performance<br />
System management status<br />
System processing speed<br />
Data integrity<br />
Data assurance<br />
Data accuracy<br />
Data consistency<br />
Economic impact Return on investment (ROI)<br />
Each review indicator for measuring business performance has significance in following terms:<br />
<strong>Information</strong> usability: This indicator is for reviewing whether the data in the database can be<br />
usefully applied to business <strong>and</strong> measures usability of the established database, upgrade level of<br />
business or knowledge <strong>and</strong> distinction of information.<br />
<strong>Information</strong> accuracy: This indicator is for reviewing whether there is no error in the contents of<br />
the database <strong>and</strong> measures reliability of search result, conformity of information as dem<strong>and</strong>ed,<br />
<strong>and</strong> contents error occurrence.<br />
289
Misoo Kwon<br />
<strong>Information</strong> fidelity: This indicator is for reviewing whether the data can satisfy user requirements<br />
<strong>and</strong> measures quantitative sufficiency of information, diversity of information <strong>and</strong> substitutability<br />
for existing resources.<br />
Utilization convenience: This indicator reviews whether a user can easily use wanted data <strong>and</strong><br />
measures convenience of database use <strong>and</strong> search speed.<br />
Utilization rate: This indicator reviews the performance of database use such as the number of<br />
visits, searches <strong>and</strong> downloads.<br />
Utilization efficiency:This indicator is for reviewing whether the provided data increased business<br />
efficiency of user in terms of the amount of time saved.<br />
System management status: This indicator is for reviewing whether the database system is<br />
maintaining its optimized operation level. In particular, it reviews whether database management<br />
system monitoring is performed <strong>and</strong> checks the number of times that data were tuned.<br />
System processing speed: This indicator reviews whether the response time <strong>and</strong> throughput<br />
satisfy transaction requirements of each business process. In detail, it reviews the average<br />
response time of database <strong>and</strong> throughput.<br />
Data integrity: This indicator reviews if there are any data missing from required processes for<br />
business support. Specifically, it reviews the ratio of business <strong>and</strong> logical null values.<br />
Data accuracy: This indicator reviews whether the patterns <strong>and</strong> codes of data in the database are<br />
accurate. Specifically, it measures the ratio of data threshold compliance, ratio of pattern<br />
accuracy <strong>and</strong> ratio of code accuracy.<br />
Data consistency: This indicator reviews whether there is any inconsistency between the same<br />
data within the database.<br />
2.3 Performance review time <strong>and</strong> reviewer<br />
Performance review of NDP is one that is carried out during the second half of every year on the<br />
project result of the previous year. The reason for reviewing the performance afterwards is to<br />
measure the outcomes <strong>and</strong> impact of investment, find any problems in project operationas well as<br />
ways to improve them, <strong>and</strong> further improve performance.<br />
Performance review is carried out by selected survey agencies under the management of National<br />
<strong>Information</strong> Society Agency, which is the main organization supporting the project. The result of<br />
performance review is reported to the Ministry of Public Administration <strong>and</strong> Security <strong>and</strong> is used for<br />
selecting the next year NDP.<br />
3. Result of performance review in 2010<br />
3.1 Overview<br />
In 2010, the performance review was carried out on 50 databases that were established in 2009<br />
mainly in terms of business performance (user satisfaction, system utilization, system performance<br />
<strong>and</strong> data assurance) <strong>and</strong> economic impact.<br />
The review target was database users, system managers operating <strong>and</strong> managing developed<br />
databases, while the target for data assurance review was the entire databases developed during<br />
2009. Database users included internal users who use the developed database for business<br />
processes within their organization, relevant users who utilize the database from outside <strong>and</strong> the<br />
general citizens.<br />
Tools that were used for review were a survey questionnaire, checklist <strong>and</strong> survey tool for each<br />
performance review category as described above <strong>and</strong> face-to-face interview <strong>and</strong> online survey were<br />
the methods of review. From users, user satisfaction <strong>and</strong> convenience were the two categories<br />
surveyed through face-to-face interviews <strong>and</strong> online surveys (on a five-point scale). From system<br />
managers, system performance, utilization rate <strong>and</strong> time-saving were surveyed <strong>using</strong> a survey<br />
checklist. As for reviewing data assurance, a survey tool was used.<br />
Reviewing data assurance is to inspect any error in data values of the database. During the process,<br />
an automation tool is used based on st<strong>and</strong>ard information <strong>and</strong> business codes as defined in columns.<br />
290
Misoo Kwon<br />
Among the review indicators introduced above, system management status <strong>and</strong> system processing<br />
speed are reviewed as reference for underst<strong>and</strong>ing the current status only <strong>and</strong> not reflected in the<br />
result of the performance review.<br />
For continued projects, project budget <strong>and</strong> saved cost are converted into the current (2010) value.<br />
Amount of cost-saving was calculated only for the use of databases that were established with the<br />
NDP budget.<br />
3.2 Performance analysis method<br />
Based on the performance review model for NDP, business performance score was calculated by<br />
taking into consideration user satisfaction as 40%, utilization as 30% <strong>and</strong> data assurance as 30%. All<br />
weights applied afterwards were set according to the survey result from project stakeholders, which<br />
was carried out <strong>using</strong> the Delphi method.<br />
Business performance score = (user satisfaction x 0.4) + (utilization x 0.3) + (data assurance x<br />
0.3)<br />
3.2.1 Measuring user satisfaction score<br />
User satisfaction score was measured after obtaining answers to questions regarding the usability,<br />
accuracy <strong>and</strong> fidelity of information on a five-point scale <strong>and</strong> converting it to a score out of 100 (very<br />
satisfactory 100; satisfactory 75; moderate 50; unsatisfactory 25; very unsatisfactory 1)<br />
3.2.2 Measuring utilization score<br />
Utilization score incorporated the user survey result on how convenient it is to use information in the<br />
database as 40%, how many times each database was used per year as 30% <strong>and</strong> how much time<br />
was saved after having the database established as 30%. The score was then converted onto a 100point<br />
scale.<br />
Utilization = (utilization convenience x 0.4) + (utilization rate x 0.3) + (amount of time saved x 0.3)<br />
Utilization convenience score was calculated <strong>using</strong> the same method as the user satisfaction score<br />
<strong>and</strong> was also converted into the score on a 100-point base.<br />
Utilization rate score was measured through normal distribution of the number of data processing<br />
cases by each organization according to the survey checklist <strong>and</strong> was taken into relative evaluation<br />
on a 100-point scale.<br />
Utilization score = {ln(k) / ln(A)} × 100<br />
ln(k) = log conversion value of number of data processing cases<br />
ln(A) = log conversion value of project with the largest number of data processing cases<br />
Utilization efficiency score was measured through normal distribution of the amount of time saved<br />
after database establishment <strong>and</strong> was taken into relative evaluation with the full score being 100.<br />
Utilization efficiency score = {ln(t) / ln(B)} × 100<br />
ln(t) = log conversion value of amount of time saved<br />
ln(B) = log conversion value of project with the largest amount of time saved<br />
The amount of time saved was measured by taking the amount of saved time given by survey<br />
respondents <strong>and</strong> surveyor in a ratio of 5 to 5.<br />
3.2.3 Measuring data assurance score<br />
For checking errors in data values, the review was focused on assessing data integrity, accuracy <strong>and</strong><br />
consistency. Data integrity was reviewed through checking the physical or business null values to see<br />
‘if there is a null value’. Data accuracy was reviewed through finding out the ‘accuracy of data<br />
threshold’ which checks the effective range of data;‘accuracy of data type’ which checks the type,<br />
pattern <strong>and</strong> date type compliance; <strong>and</strong> ‘accuracy of st<strong>and</strong>ard codes’ which checks code compliance.<br />
Consistency review was focused on checking ‘data consistency’ which also finds out referential<br />
integrity or exclusiveness of ID data.<br />
291
3.3 Analyzing economic impact of NDP<br />
Misoo Kwon<br />
ROI of the project was measured by first finding out the cost saved through database with the number<br />
of usage, average amount of time saved <strong>and</strong> existing labor cost <strong>and</strong> then dividing the cost value by<br />
project budget. Then the ROI value was converted into a percentage.<br />
ROI = (cost saved through national database / project budget) x 100<br />
Cost saved through NDP = number of usage per year * cost saved per each usage (amount of<br />
time saved * labor cost per hour)<br />
Labor cost per hour reflects the characteristics of each type of database users by applying<br />
government employee salary if business managers within organizations are the main users <strong>and</strong> the<br />
average pay of the entire industry if the most of the users are general citizens <strong>and</strong> users from outer<br />
organizations.<br />
3.4 Analyzing survey result<br />
3.4.1 Business performance<br />
The business performance score for NDP in 2010 was 84.6 by earning 77.3 points for user<br />
satisfaction, 79.2 points for utilization <strong>and</strong> 99.8 points for data assurance. This is an overall increase<br />
from the previous year – business performance score increased by 1.6 points (from 83.0 points in<br />
2009), user satisfaction by 1.3 points, utilization by 2.5 points <strong>and</strong> data assurance by 0.9 points. The<br />
increase in user satisfaction score was mainly due to the significant improvement in ‘usability’ <strong>and</strong><br />
‘accuracy’ of information while the main driver for increase in utilization score was the overall<br />
improvement of ‘utilization convenience’.<br />
The average score for the entire data assurance was significantly high at 99.8 points. The error rate<br />
for each assurance category shows that lack of compliance to the basic requirement of database<br />
design such as ‘data integrity’ <strong>and</strong> ‘data accuracy’, or lack of control in the stage of input was likely to<br />
cause more errors. There were also many cases showing inconsistency of the actual structure of the<br />
established database with the submitted output of database design, leading to the analysis result that<br />
there need to be some measures to improve the quality of national database schema information.<br />
Table 2: 2009 vs 2010 business performance comparison<br />
Business performance User satisfaction Utilization Data assurance<br />
2009 2010 2009 2010 2009 2010 2009 2010<br />
83.0 84.6 76.0 77.3 76.7 79.2 98.9 99.8<br />
3.4.2 Economic impact<br />
The average amount of time saved through databases, as reviewed in 2010, was approximately 3.3<br />
hours (compared to 1.9 hours in 2009). The amount of time saved for project managers was provided<br />
by the managers in the project managing organization, whereas the amount of time saved for general<br />
users was calculated by averaging the amount of time saved for internal employees, users from<br />
external organizations <strong>and</strong> the general citizens who use the developed databases. The total of<br />
average amount of time saved is an average value of the amount of time saved for project managers<br />
<strong>and</strong> general users.<br />
Table 3: 2009 vs 2010 time spent <strong>and</strong> saved<br />
Type<br />
Project managers<br />
Before database<br />
establishment<br />
After database<br />
establishment<br />
Time saved<br />
‘10 3.3 h (198.5 min) 0.2 h (13.4 min) 3.1 h<br />
‘09 1.5 h(87.8 min) 0.3 h (15.3 min) 1.2 h<br />
General Users ‘10 4.0 h(241.7 min) 0.4 h (26.6 min) 3.6 h<br />
292
Type<br />
Average time saved<br />
Misoo Kwon<br />
‘09 2.9 h(176.5 min) 0.4 h (22.5 min) 2.6 h<br />
Before database<br />
establishment<br />
After database<br />
establishment<br />
‘10 - 3.3 h<br />
‘09 - 1.9 h<br />
Time saved<br />
Analyzing the amount of time saved as the current value against the project budget invested into NDP<br />
each year indicates that the cost-saving impact against investment was 245.0% in 2008 <strong>and</strong> 306.9%<br />
in 2009 with a sign of increasing number of usage, amount of time saved <strong>and</strong> ROI from the previous<br />
year. This is because the sub-projects of NDP are continued for many years <strong>and</strong> therefore the costsaving<br />
impact against investment is increasing with time.<br />
Table 4: Time saved <strong>and</strong> ROI through NDP<br />
Year<br />
Converted project<br />
budget (KRW)<br />
No. of usage<br />
per year<br />
Time saved<br />
(hour)<br />
Cost saved per<br />
usage (KRW)<br />
Total cost saved<br />
(adjusted) (KRW)<br />
2008 40,535,460,000 17,588,822 1.8 21,317 99,311,625,674 245.0<br />
2009 62,948,588,689 33,950,823 3.3 39,823 193,182,687,716 306.9<br />
References<br />
Jang, Won-Seok <strong>and</strong> Lee, Eun-Jung (2005) Public-sector Informatization: Study on Performance Evaluation<br />
Methodology for Public-sector IT Project, paper presented in the great winter symposium of the Korea<br />
Association for Public Administration, Seoul.<br />
Kim, Joon-Han (2002) Establishing IT Evaluation System in the Central Government, Newsletter of the Korea<br />
Association for Public Administration, Seoul.<br />
Lee, Kwang-Hee (2008) Government Affairs Evaluation from the Perspective of Evaluation Methodology. Seoul.<br />
Lee, Kwang-Hee <strong>and</strong> Han, Jong-Hee (2006) Policy Evaluation <strong>and</strong> Performance <strong>Management</strong>, Seoul.<br />
Mun, Tae-Soo (2002) Case Study on Development <strong>and</strong> Application of Public-sector IT Project Evaluation Method<br />
paper presented in the great autumn symposium of the Korea Association for Policy Analysis <strong>and</strong><br />
Evaluation, Seoul.<br />
Noh, Hwa-Joon <strong>and</strong> Noh, Yu-Jin (2004) Policy Evaluation System Reform for Efficient Outcome-oriented<br />
<strong>Management</strong>, Newsletter of the Korea Association for Policy Analysis <strong>and</strong> Evaluation, Vol. 14, No. 1, Seoul.<br />
Niven, P. R. <strong>and</strong> Samil PWC Consulting (2005) Government & Public-sector BSC, Sigma Insight, Seoul.<br />
Yoon, Sang-Oh (2004) Measures to Make National IT Project Evaluation Efficient, Studies on the Korean Society<br />
<strong>and</strong> Administration, Vol. 15, No. 1, Seoul<br />
293<br />
ROI<br />
(%)
Multi-Scope Evaluation of Public Administration Initiatives<br />
in Process Automation<br />
Luigi Lavazza<br />
Università degli Studi dell’Insubria, Varese, Italy<br />
luigi.lavazza@uninsubria.it<br />
Abstract: Public administrations are among the most active organizations in promoting process automation<br />
based on software systems. For evident reasons, public administrations are interested in evaluating the<br />
effectiveness of their process automation initiatives. However, when performing these evaluations, public<br />
administrations have to deal with a specific characteristic of their environment: the scope of the assessment can<br />
be more or less wide, i.e., it can extend beyond the boundaries of the public administration, to include the<br />
companies, organizations, citizens, suppliers, etc. that directly or indirectly interact with the processes. In fact, the<br />
effectiveness of a process initiative does not concern only the public administration that is promoting it, but<br />
involves all the stakeholders that, to various extents, participate in the process. Although traditional methods for<br />
measurement planning <strong>and</strong> execution – like the GQM (Goal/Question/Metrics) – can be used, evaluators have to<br />
define specific means to deal with the multiplicity of scope definitions that can be chosen in order to define the<br />
boundaries of the assessment. In this paper we illustrate the usage of the GQM to define measurement plans <strong>and</strong><br />
how to update them in order to deal with extended scopes. The proposed technique is illustrated through two<br />
case studies, taken from actual evaluations in which the author was involved. The presented evaluation approach<br />
is more effective than traditional econometric methodologies. On the one h<strong>and</strong>, it lets the evaluator choose the<br />
set of indicators that are more suitable for the purpose; on the other h<strong>and</strong> it goes beyond the traditional economic<br />
<strong>and</strong> financial indicators, extending the analysis to factors that allow a more comprehensive underst<strong>and</strong>ing of the<br />
effects of process automation.<br />
Keywords: software process measurement, process evaluation, evaluation scope, Goal/Question/Metrics (GQM)<br />
1. Introduction<br />
Public administrations (PAs) are interested in process automation because of several reasons: to<br />
increase internal efficiency; to favor citizens in accessing the services provided by the PA; to enhance<br />
or make more efficient business activities, not necessarily involving the PA (in this case the process<br />
automation services are seen as infrastructures). Whatever the type of process automation initiatives<br />
carried out by a PA, several actors <strong>and</strong> stakeholders are generally involved, because of the very<br />
nature of PAs. In fact, a PA is generally involved in providing services to the citizens, to suppliers, to<br />
companies, to other PA entities, to no-profit organizations, etc. While automating its services, the PA<br />
affects not only its internal processes, but also the ones of the citizens, suppliers <strong>and</strong> external entities<br />
that use (sometimes indirectly) these services.<br />
In general, a PA needs to evaluate the efficiency of its services. This is of course due to the fact that<br />
the provided services are paid with the citizens’ money (via taxes): the PA has to show citizens (<strong>and</strong><br />
electors) that their money is well spent. The need for evaluation is even more pressing when new<br />
initiatives are undertaken: in fact the success of the initiative has to be proved, <strong>and</strong> weak points <strong>and</strong><br />
problems have to be identified in order to be tackled <strong>and</strong> corrected. When evaluations of process<br />
automation initiatives are decided, the multiplicity of scopes emerges as a variable to be duly taken<br />
into account. In fact, by definition, an evaluation makes reference to a scope. In our case, the effects<br />
of the process automation initiatives are perceived at various levels: the PA itself, the companies <strong>and</strong><br />
citizens that directly interact with the PA, the citizens that are the targets of the final effects of the<br />
process.<br />
For instance, in a process for procuring educational material, the PA is the procurer, a company is the<br />
supplier, a set of schools are the immediate beneficiary, <strong>and</strong> the pupils are the final beneficiaries. As<br />
a consequence, the evaluation can be performed at various levels: one can take into account the<br />
effects for the PA, the effects for the company, the effects for the school, the final consequences for<br />
citizens (pupils <strong>and</strong> their families).<br />
It is quite clear that the sets of issues that are of interest for the various actors <strong>and</strong> stakeholders are<br />
disjoint. For instance, the citizen will be interested in the cost <strong>and</strong> quality of the supply, while the<br />
supplier will be interested also in the duration <strong>and</strong> the profitability of the supply process.<br />
294
Luigi Lavazza<br />
In conclusion, when a PA plans an evaluation of process automation initiatives, it has to decide what<br />
the scope of the evaluation is. On the one h<strong>and</strong>, it is clear that performing the assessment embracing<br />
the whole set of scopes would provide the most complete <strong>and</strong> precise indications; on the other h<strong>and</strong>,<br />
however, the cost of the evaluation increases with the extension of the addressed scope.<br />
An instrument for planning multi-scope evaluations is thus needed. Such instrument should produce<br />
well defined plans on which it is possible to reason in order to find a good trade-off between the cost<br />
of the assessment <strong>and</strong> the representativeness of the results. In this paper a method for planning <strong>and</strong><br />
executing multi scope evaluations based on the well know Goal/Question/Metrics (GQM) technique<br />
(Basili <strong>and</strong> Weiss 1984, Basili <strong>and</strong> Rombach 1988, Basili et al. 1994) is presented. The method is<br />
illustrated by means of two cases studies, derived from real evaluation activities.<br />
2. The case studies<br />
The first case study is derived from an evaluation activity dealing with the process automation<br />
initiatives of a local administration. In this case, the automation initiatives embraced several different<br />
processes; some of the deployed software systems dealt with internal operations such as<br />
communication <strong>and</strong> recording, while others (like the invoice management <strong>and</strong> payment system <strong>and</strong><br />
the <strong>Information</strong> Technology contract management system) dealt with processes involving external<br />
entities. The deployed software systems were also different in nature: some were developed ad-hoc,<br />
while others were built as services of a common document management platform. In any case, our<br />
evaluation –as described in detail in Section 3.1– abstracted away from the specificity of the software<br />
systems, concentrating on the effects on the target processes. The multiplicity of scopes of the<br />
initiative, <strong>and</strong> consequently of the evaluation, is schematically illustrated in Figure 1 (a).<br />
The second case study is derived from an evaluation activity dealing with an initiative of a local<br />
administration aiming at establishing a common e-procurement platform to manage bids. In this case,<br />
the automation initiatives embraced processes at two levels: the management of the bid within the<br />
PA, <strong>and</strong> the actual execution of the bid, involving providers <strong>and</strong> the entities that are the beneficiaries<br />
of the goods or services being acquired through the bid. The multiplicity of scopes of the initiative, <strong>and</strong><br />
consequently of the evaluation, is schematically illustrated in Figure 1 (b).<br />
External actors<br />
Local administration<br />
Administration<br />
processes<br />
Companies<br />
Citizens<br />
Process<br />
automation<br />
PAs <strong>and</strong> other<br />
organizations<br />
Suppliers<br />
Local entities<br />
Administration<br />
processes<br />
Companies<br />
Hospitals, schools, etc.<br />
Process<br />
automation<br />
Citizens<br />
(a) (b)<br />
Figure 1: Local administration process automation (a) <strong>and</strong> Procurement process automation (b)<br />
scopes<br />
3. Definition of the evaluation criteria <strong>and</strong> measurement plan<br />
The evaluation was defined <strong>and</strong> planned according to the GQM method. It must be noted that in<br />
applying the GQM method the author exploited a quite relevant experience: see for instance<br />
(Fuggetta et al. 1998, <strong>and</strong> Lavazza <strong>and</strong> Mauri 2006). Automated support (Fuggetta et al. 1998,<br />
Lavazza <strong>and</strong> Barresi, 2005) was also used, to some extent.<br />
3.1 Local administration process automation<br />
The evaluation of the local administration process automation addressed five of the several initiatives<br />
of the local administration. Five goals were defined, differing with respect to the addressed quality.<br />
The goals were defined as follows, according to the usual GQM format:<br />
Purpose: evaluation<br />
Object: the five considered automation initiatives<br />
295
Luigi Lavazza<br />
Quality: Efficiency, Transparency, Simplification, Resource usage, Resource savings.<br />
Point of view: the local administration management.<br />
Context: the general directions of the local administration.<br />
The qualities of interest, which originated a GQM goal each, were characterized as follows:<br />
Efficiency: the ratio between the “volume” of product <strong>and</strong> the (various types of) resources used.<br />
Transparency: the possibility to observe the state of a procedure <strong>and</strong> of its artifacts <strong>and</strong> products.<br />
Simplification: the number of activities that were automated or made superfluous.<br />
Resource usage: the quantity of the various types of resources used to carry out the procedures.<br />
Resource savings: the monetary value of resource savings required to carry out the procedures.<br />
In general it was required to measure both the situation resulting from the process automation<br />
initiatives <strong>and</strong> the difference with respect to the previous situation.<br />
It was decided to initially deal only with the inner scope, directly addressed by process automation<br />
(Figure 1). In fact, the process automation initiatives were expected to affect the local administration<br />
in a quite straightforward manner (Figure 2). Thus, by evaluating how process automation initiatives<br />
affect the five identified qualities, we expected to get also a general picture of how the local<br />
administration would benefit from the initiatives. The evaluation was then extended to the effects on<br />
the outer level. The GQM plan was therefore initially defined in terms of the inner scope. The quality<br />
focuses identified for every quality <strong>and</strong> plan are schematically illustrated in Table 1 (for the sake of<br />
simplicity, we do not report the questions <strong>and</strong> metrics defined for each plan).<br />
External actors<br />
Local administration<br />
Companies<br />
Administration processes<br />
Resource<br />
saving<br />
Resource usage<br />
Citizens<br />
Process<br />
automation<br />
Efficiency<br />
PAs <strong>and</strong> other organizations<br />
Transparency<br />
Simplification<br />
Figure 2: Local process automation: qualities affecting the local administration<br />
Benefits at the local level affect the performance of the PA, <strong>and</strong> thus change the way the provided<br />
services are perceived by external actors. In order to define a GQM plan that evaluates the process<br />
automation initiatives at the external actor level, we identified the interactions with the external actors<br />
that take place in the considered processes: these interactions determine how the qualities<br />
considered in the local level GQM plan (i.e., the qualities reported in column ‘Quality focuses’ in Table<br />
I.) are perceived externally. The externally perceivable effects of internal process qualities are<br />
reported in Table 2.<br />
Because of limitations in the time <strong>and</strong> money available for the evaluations, the GQM plan for the<br />
external actor level was not executed. However, we were able to show that:<br />
The GQM plan for the external scope is different from the GQM plan for the internal scope;<br />
296
Luigi Lavazza<br />
The former can be derived from the latter, observing cause-effect relations in the process that are<br />
the object of the evaluation.<br />
Table 1: Local evaluation of the local process automation: quality focuses<br />
Quality Quality focus Evaluation time(s)<br />
Number of procedure instances carried out in the After process automation;<br />
Efficiency<br />
observation period<br />
Procedure execution time<br />
difference<br />
After process automation;<br />
difference<br />
Number of observable states<br />
After process automation;<br />
difference<br />
Transparency<br />
Amount of information types made available Difference<br />
Completeness <strong>and</strong> timeliness of the available information<br />
After process automation;<br />
difference<br />
Number of automated activities Difference<br />
Simplification<br />
Resource usage<br />
Resource<br />
savings<br />
Number of eliminated activities Difference<br />
Paper documents eliminated (number, types, instances) Difference<br />
St<strong>and</strong>ardized data types Difference<br />
Amount of human resources employed (in the whole<br />
process)<br />
After process automation<br />
Delay in monitoring the amount of human resources<br />
employed<br />
After process automation<br />
Amount of the different types of resources employed (in the<br />
whole process)<br />
Difference<br />
Table 2: Evaluation of external effects of PA process automation: quality focuses<br />
Quality Quality focus External perception<br />
Efficiency Procedure execution time Service completion time<br />
Transparency Number of observable states Service state (e.g., % completed)<br />
Amount of information types made available Detailed state information<br />
Completeness <strong>and</strong> timeliness of the available<br />
information<br />
Real-time service monitoring<br />
Simplification Number of automated activities<br />
Decreased amount of interactions <strong>and</strong> trips<br />
to the PA offices<br />
Number of eliminated activities<br />
Decreased amount of interactions <strong>and</strong> trips<br />
to the PA offices<br />
Paper documents eliminated (number, types,<br />
instances)<br />
Less trivial work to do; less paper to h<strong>and</strong>le<br />
St<strong>and</strong>ardized data types Ease of interaction<br />
By employing the effort saved thanks to<br />
Resource Amount of human resources employed (in the automated <strong>and</strong> cancelled activities, it is<br />
usage<br />
whole process)<br />
possible to increase the amount <strong>and</strong> quality<br />
of provided services.<br />
Resource<br />
savings<br />
Amount of the different types of resources<br />
employed (in the whole process)<br />
Less expensive services. On the long term,<br />
a more cost effective organization of the<br />
whole administration.<br />
3.2 Procurement process automation<br />
The evaluation of the procurement process automation addressed the comparison of the situation<br />
after the introduction of a specific e-procurement platform with the previous situation, characterized by<br />
procurement processes carried out either “manually” or with some support from commercial, non<br />
specific e-procurement tools.<br />
Six goals were defined, differing with respect to the addressed quality. The goals were defined as<br />
follows, according to the usual GQM format:<br />
Purpose: evaluation<br />
Object: the procurement process<br />
297
Luigi Lavazza<br />
Quality: Efficiency, Effectiveness, Transparency, Competitiveness, Simplification, Money savings.<br />
Point of view: the local administration management.<br />
Context: the general directions of the local administration.<br />
The qualities of interest, which originated a GQM goal each, were characterized as follows:<br />
The evaluation of efficiency was based on the duration of bids <strong>and</strong> on the amount of employed<br />
resources, both human <strong>and</strong> material.<br />
The evaluation of effectiveness was based on the final price of the goods <strong>and</strong> services acquired<br />
through the bids.<br />
Transparency was evaluated on the basis of the amount of information published on-line <strong>and</strong> on<br />
the time required to retrieve information regarding the bids.<br />
Competitiveness was related to the number of providers involved in the various phases of the<br />
bids.<br />
Simplification was evaluated on the basis of the st<strong>and</strong>ardization of the process <strong>and</strong> the number of<br />
activities that were automated or eliminated by the e-procurement process.<br />
Money savings concerned the amount of money saved either thanks to a cheaper management<br />
of the procurement process or because of the better prices obtained.<br />
With respect to the scopes depicted in Figure 1(b), it was decided to initially address the inner scope,<br />
then to extend the measurement to the effects on the outer level. The GQM plan was therefore initially<br />
defined in terms of the inner scope. In particular, the quality focuses identified for every quality <strong>and</strong><br />
plan are schematically illustrated in Table 3. A relevant variation factor that applies to all the GQM<br />
goals is the number <strong>and</strong> value of the considered bids. Because of space limits, we do not report the<br />
questions <strong>and</strong> metrics defined for each plan.<br />
Table 3: Evaluation of the procurement process: quality focuses<br />
Quality Quality focus External perception<br />
Efficiency<br />
Effectiveness<br />
Transparency<br />
Competitiveness<br />
Simplification<br />
Money savings<br />
Duration of bids, per phase<br />
Effort employed in the management of the bids<br />
Amount of material resources employed, per type <strong>and</strong> per bid<br />
Price per bid type<br />
Quality delivered per bid<br />
On-line bid<br />
On-line evaluation criteria<br />
Quality, quantity <strong>and</strong> delivery time of the information concerning<br />
the bids<br />
Number of providers involved in each phase of the process<br />
(invited, offering, participating to the auction)<br />
St<strong>and</strong>ardization of the process<br />
Number of automated activities<br />
Number of eliminated activities<br />
Money saved because of a better usage of human resources in<br />
the management of the process<br />
Money saved because less material resources are used in the<br />
process<br />
Money saved because of better prices obtained<br />
After process<br />
automation;<br />
difference<br />
After process<br />
automation;<br />
difference<br />
After process<br />
automation;<br />
difference<br />
After process<br />
automation;<br />
difference<br />
After process<br />
automation;<br />
difference<br />
After process<br />
automation;<br />
difference<br />
In order to define a GQM plan that evaluates the process automation initiatives at the provider level,<br />
we proceeded as follows:<br />
We considered the processes involved in the automation initiatives. To this end we built a<br />
schematic model of the process, which is illustrated in Figure 3 (the activities on the left h<strong>and</strong> side<br />
are performed by the PA, while the ones on the right h<strong>and</strong> side are performed by providers).<br />
298
Luigi Lavazza<br />
For each process, we identified the interaction with the external actors.<br />
For every interaction, we identified the features of interest (often indicated by column ‘Quality<br />
focuses’ in Table 3) <strong>and</strong> the possible cause-effect relationships that may suggest that the<br />
qualities considered in the first GQM plan (the one involving the local administration level) can be<br />
extended to the GQM plan addressing the outer level.<br />
Moreover, we identified the process features (such as durations of the activities or resource used)<br />
that characterize practically any process <strong>and</strong> are therefore of general interest.<br />
[ no auction ]<br />
Preparation<br />
Publication<br />
Receipt of offers<br />
<strong>and</strong> negotiation<br />
Evaluation of offers<br />
[ auction ]<br />
Auction<br />
Formalization of results<br />
[offer]<br />
[Bid tender]<br />
[Offer]<br />
Participate<br />
in auction<br />
Figure 3: Schematic model of the procurement processes<br />
Registration<br />
Bid monitoring<br />
Decision to participate<br />
Offer preparation<br />
[ auction ]<br />
Offer delivery<br />
Receipt of results<br />
[ participation ]<br />
[ no participation ]<br />
[ no auction ]<br />
Table 4: Evaluation of the external effects of procurement process automation: quality focuses<br />
Quality Quality focus<br />
Efficiency<br />
Effectiveness<br />
Effort employed in the management of the bids<br />
Amount of material resources employed, per type per bid<br />
Number of distinct clients<br />
Number of known bids<br />
Number of participated bids<br />
Number of win bids<br />
Transparency Quality, quantity <strong>and</strong> delivery time of information concerning the bids<br />
Simplification<br />
St<strong>and</strong>ardization of the process<br />
Number of automated activities<br />
Number of eliminated activities<br />
299
Luigi Lavazza<br />
The externally perceivable effects of internal process qualities are reported in Table 4. Four of the six<br />
qualities addressed at the internal level were applicable also at the provider level. Note that, unlike in<br />
Table 2, in Table 4 we do not just describe the external perception of the ‘internal’ quality focuses;<br />
instead, we redefine the quality factors altogether, in order to reflect the change of scope.<br />
The measurement process could have been further extended, e.g., to involve citizens <strong>and</strong> other PAs<br />
that will use the specific e-procurement platform.<br />
The illustrated GQM plans have been successfully executed. The results are sketched in next<br />
session.<br />
4. Impact on business<br />
Because of confidentiality reasons we can give only qualitative indications about the effects of the<br />
described initiatives in terms of consequences on the business.<br />
Concerning local process automation, the duration of processes was reduced between 40 <strong>and</strong> 52 %.<br />
The savings were converted in money in order to be summed <strong>and</strong> compared with the costs. It was<br />
estimated that the balance of costs <strong>and</strong> savings would reach the parity after three years from the<br />
beginning of the initiative, <strong>and</strong> that afterwards the savings would remain steadily greater than<br />
operation <strong>and</strong> maintenance costs.<br />
The process automation had also the effect of eliminating several clerical activities. The human<br />
resources that were freed from such tasks could be reallocated to more satisfactory jobs.<br />
The consequences of the e-procurement automation initiative for the public administration were:<br />
The bid management process duration decreased of about 30%<br />
The work saved ranged from 10% to 22%, depending on the roles.<br />
In general, <strong>using</strong> e-procurement allowed the public administration to save money on the price of<br />
the acquired services <strong>and</strong> goods, with no decrease in quality. Quite interestingly, there seems to<br />
be a sort of economy of scale effect: savings are bigger (in percentage) for bigger bids, while for<br />
small bids a moderate increase in prices was frequently observed.<br />
Providers saved 42% of the employee work needed for carrying out bids. However, no appreciable<br />
reduction of management activity was observed. This suggests that the automation of e-procurement<br />
affects only the most clerical activities.<br />
5. Related work<br />
The Balanced Scorecards (BSC) technique (Kaplan <strong>and</strong> Norton 1992) suggested that strategic<br />
management should consider several interrelated aspects, namely it should address the financial<br />
perspective, the internal process perspective, the innovation <strong>and</strong> learning perspective <strong>and</strong> the<br />
customer perspective. These indications are clearly relevant in our case, since we are evaluating<br />
initiatives concerning the process (internal process perspective), which determine the financial<br />
performances (financial perspective) <strong>and</strong> the satisfaction of the customer (customer perspective).<br />
Several researchers have addressed the need of dealing with wide scopes, involving several aspects<br />
<strong>and</strong> requiring measures at different levels, often proposing combinations of GQM <strong>and</strong> CSB concepts<br />
<strong>and</strong> practices (Becker <strong>and</strong> Bostelman 1999, Buglione <strong>and</strong> Abran 2000, Bianchi 2001, Card 2003).<br />
Recently the GQM+Strategies approach has been proposed (Basili et al. 2010), to extend the GQM<br />
paradigm for measuring the success or failure of goals <strong>and</strong> strategies.<br />
The work reported here shares some motivations with GQM+Strategies, sine we are dealing with<br />
multi-level strategic goal achievement assessment. Nevertheless our work (started in 2008 <strong>and</strong><br />
completed in 2009) did not benefit from the indications provided in (Basili et al. 2010), <strong>and</strong> was<br />
carried out in a more immediate, ad-hoc way. As such, it provides some real-life examples of<br />
problems <strong>and</strong> hints of solutions that could be useful also to those who are going to apply<br />
GQM+Strategies.<br />
300
6. Conclusions<br />
Luigi Lavazza<br />
When evaluating process automation initiatives based on software systems, it is often the case that<br />
the evaluation, in order to be complete, has to measure the effects of the involved processes out of<br />
the boundaries of the organization that promoted the automation. This is particularly true when the PA<br />
is involved, since PA processes tend to involve companies, organizations, citizens, etc. that directly or<br />
indirectly interact with the administration’s processes.<br />
In this paper we have first of all highlighted the existence of a multiplicity of scopes that measurement<br />
plans addressing process automation need to consider. Then we have shown that the multiplicity of<br />
scopes can be managed by means of multiple related GQM plans (Figure 4).<br />
External actors<br />
Regional entities<br />
Local<br />
processes<br />
Process<br />
automation<br />
GQM plan<br />
GQM plan<br />
GQM plan<br />
Figure 4: Schematic model of the procurement processes<br />
In defining the measurement process, one can start from the inner scope –i.e., that of the promoting<br />
organization– <strong>and</strong> derive the corresponding GQM plan (the one on the bottom of Figure 4). This<br />
GQM plan can then be extended to address the enclosing scope. We have suggested that a carefully<br />
analysis of the business processes can indicate how to extend the original GQM plan, thus re<strong>using</strong><br />
the GQM plan definition <strong>and</strong> minimizing the effort to be devoted to measurement. This process can be<br />
iterated until the outer scope is reached.<br />
We have shown the viability of the proposed approach by reporting the measurement plans for a<br />
couple of real cases involving the public administration.<br />
In conclusion, we believe that this paper can help people involved in evaluations of process<br />
automation initiatives by providing a few hints on the organization of the measurement plans.<br />
Finally, it can be noticed that the general approach of adapting/extending the measurement plans<br />
according to changes/extensions in scope can be used for several different kinds of process<br />
evaluations. In fact, the proposed approach is suited not just for process automations, but also for all<br />
those cases when the multiple scopes are applicable, while the general goals remain stable. This is<br />
the case, for instance, for many software developers, whose goals are always the same (keeping<br />
development cost <strong>and</strong> time under control, providing good quality, etc.) while the perception of the<br />
goals depends on the scope of the analysis, which can involve developers, managers, suppliers,<br />
customers, etc.<br />
References<br />
Basili, V. <strong>and</strong> Weiss D. (1984) “A methodology for collecting valid software engineering data” IEEE Transactions<br />
on Software Engineering, vol. SE-10, no. 6, pp. 728-738.<br />
Basili, V. <strong>and</strong> Rombach, D. (1988) “The TAME project: towards improvement-oriented software environments,”<br />
IEEE Transactions on Software Engineering, vol. 14, no. 6, pp. 758-773.<br />
Basili, V., Caldiera, G., <strong>and</strong> Rombach, D. (1994) “Goal/Question/Metric Paradigm,” in Encyclopedia of Software<br />
Engineering, vol. 1, J. C. Marciniak, Ed.: John Wiley & Sons, pp. 528-532.<br />
301
Luigi Lavazza<br />
Basili, V., Lindvall, M., Regardie, M., Seaman, C., Heidrich, J., Munch, J., Rombach, D. <strong>and</strong> Trendowicz, A.<br />
(2010) “Linking Software Development <strong>and</strong> Business Strategy Through Measurement” Computer, vol. 43,<br />
no. 4, pp. 57-65.<br />
Becker, S.A. <strong>and</strong> Bostelman, M.L. (1999) “Aligning Strategic <strong>and</strong> Project Measurement Systems” IEEE Software,<br />
vol. 16, no. 3, pp. 46-51.<br />
Bianchi, A.J. (2001) “<strong>Management</strong> Indicators Model to Evaluate Performance of IT Organizations” International<br />
Conference on <strong>Management</strong> of Engineering <strong>and</strong> Technology, vol. 2, IEEE Press, pp. 217-229.<br />
Buglione, L. <strong>and</strong> Abran, (2000) A. “Balanced Scorecards <strong>and</strong> GQM: What Are the Differences?” 3rd European<br />
Software Measurement Conference, Federation of European Software Measurement Association, pp. 18-<br />
20.<br />
Card, D. (2003) “Integrating Practical Software Measurement <strong>and</strong> the Balanced Scorecard” 27th Annual<br />
International Computer Software <strong>and</strong> Applications Conference, IEEE CS Press, p. 362-363.<br />
Fuggetta, A., Lavazza, L., Morasca, S., Cinti, S., Oldano, G. Orazi, E. (1998) “Applying G/Q/M in an Industrial<br />
Software Factory”, ACM Transactions on Software Engineering <strong>and</strong> Methodology, vol. 7, no. 4.<br />
Kaplan, R. <strong>and</strong> Norton, D. (1992) “The Balanced Scorecard - Measures that Drive Performance”, Harvard<br />
Business Review, vol. 70, no. 1.<br />
Lavazza, L. <strong>and</strong> Barresi, G. (2005) “Automated Support for Process-aware Definition <strong>and</strong> Execution of<br />
Measurement Plans”, International Conference on Software Engineering – ICSE 2005, St. Louis, Missouri,<br />
May.<br />
Lavazza, L. <strong>and</strong> Mauri, M. (2006) “Software Process Measurement in the Real World: Dealing with Operating<br />
Constraints”. Software Process Workshop – SPW/Prosim 2006, Shanghai, May. Lecture Notes in Computer<br />
Science Volume 3966.<br />
302
eBusiness Model Design <strong>and</strong> Evaluation: The Pieces Make<br />
the Puzzle<br />
Monika Magnusson<br />
Karlstad University, Sweden<br />
Monika.Magnusson@kau.se<br />
Abstract: SMEs (Small <strong>and</strong> Medium-sized Enterprises) nowadays have to deal with the highly complex situation<br />
of global competition, fast technology development <strong>and</strong> extensive business networking. Because of their importance<br />
for the economy, it is essential that SMEs embrace new technology <strong>and</strong> adapt to societal changes such as<br />
the increasing use of eCommerce. Few innovations in history offer as much benefits as eCommerce, at least<br />
theoretically. However, many SMEs are poor at managing technology as a strategic weapon since their human<br />
<strong>and</strong> financial resources are limited. There is a need in SMEs for elementary conceptual tools for designing <strong>and</strong><br />
evaluating their eCommerce model. While there are frameworks <strong>and</strong> methods for business model design <strong>and</strong><br />
evaluation, earlier research on eCommerce (or eBusiness) models often focus on business model categories<br />
rather than how to design a specific company's plan for eCommerce. Further knowledge of these matters would<br />
facilitate for SMEs to gain benefits from eCommerce. The purpose of this theoretical study is to suggest a conceptual<br />
framework for the evaluation <strong>and</strong> design of eBusiness models in SMEs. The framework integrates eBusiness<br />
model elements from earlier research with a model of organizational change levels. Additionally, a number<br />
of variants or ‘values’ for the eBusiness model elements are proposed as a tool for design or evaluation together<br />
with a set of ‘guiding questions’. The importance of IT in an eBusiness model is acknowledged as technology<br />
factors are integrated in the framework. Furthermore, it is proposed that it is valuable to conceptually separate<br />
the business model from the eBusiness model as some companies chose to offer a different value proposition or<br />
target other customer segment in the eCommerce endeavor than in their traditional sales <strong>and</strong> marketing channels.<br />
Keywords: eBusiness model, eCommerce, SME, eBusiness model design <strong>and</strong> evaluation<br />
1. Introduction<br />
Few innovations in history offer as much benefits as eCommerce, at least theoretically. For SMEs<br />
eCommerce present a cost efficient way of marketing <strong>and</strong> selling their products <strong>and</strong> services to a<br />
world-wide market, at a twenty-four seven basis. Small <strong>and</strong> medium-sized enterprises (SMEs) are<br />
sometimes called the backbone of a country because of their importance for generating employment,<br />
engendering competition <strong>and</strong> creating economic wealth (Hay & Kamshad 1994). Because of their<br />
importance for the economy, it is essential that SMEs embrace new technology <strong>and</strong> adapt to societal<br />
changes such as the increasing use of eCommerce even if this is not always an easy task. Today’s<br />
SMEs must deal with the highly complex situation of global competition, fast technology development<br />
<strong>and</strong> extensive business networking. Although the ideal is that all companies with prominent business<br />
ideas will survive <strong>and</strong> prosper, the reality is different. A finely attuned interplay between several business<br />
elements is also necessary. This interplay can best be described as a business model. A business<br />
model is ‘a conceptual tool that contains a set of elements <strong>and</strong> their relationships <strong>and</strong> allows<br />
expressing the business logic of a specific firm’ (Osterwalder et al., 2005:10). Accordingly, an eBusiness<br />
model is a ‘blue print’ of how a company creates revenue by their use of eCommerce.<br />
SMEs are sometimes claimed to be poor at managing technology as a strategic weapon due to limited<br />
human <strong>and</strong> financial resources (Buratti & Penco 2001). There is a need in SMEs for elementary,<br />
but yet powerful, conceptual tools for designing <strong>and</strong> evaluating their eCommerce model. However, the<br />
relatively few frameworks <strong>and</strong> methods that exist (see for example Morris et al. 2005 <strong>and</strong> Osterwalder<br />
et al. 2005) give limited support for designing the IT part of the (e-)business model. This is unfortunate<br />
as the SMEs in the study of Kim et al. (2008) found the matching of technology with business needs<br />
to be one of the major challenges <strong>and</strong> obstacles in forming an eBusiness strategy. The design or<br />
evaluation of an eBusiness model in a structured <strong>and</strong> systematic way could assist SMEs in these<br />
matters. The purpose of this study is therefore to propose a conceptual framework for the design <strong>and</strong><br />
evaluation of eBusiness models in SMEs. The study is theoretical in nature like most other studies of<br />
business model elements.<br />
2. Business models vs eBusiness models<br />
There is still no consensus in academic literature regarding the definition of the concept ‘business<br />
model’ (Morris et al, 2005, Yunus et al., 2010). In this study we will use the definition of Osterwalder et<br />
al. (2005:10) that builds on a substantial literature review:<br />
303
Monika Magnusson<br />
“A business model is a conceptual tool that contains a set of elements <strong>and</strong> their relationships<br />
<strong>and</strong> allows expressing the business logic of a specific firm. It is a description of the<br />
value a company offers to one or several segments of customers <strong>and</strong> of the architecture<br />
of the firm <strong>and</strong> its network of partners for creating, marketing, <strong>and</strong> delivering this value<br />
<strong>and</strong> relationship capital, to generate profitable <strong>and</strong> sustainable revenue streams.”<br />
This definition is one of the more comprehensive ones. In short a business model is a “blueprint of<br />
how a company does business” (Osterwalder at al., 2005:2). The phenomenon of business models<br />
were not acknowledged to any larger extent in research until the late 1990s, a couple of years after<br />
Internet’s breakthrough. The focus was initially on defining the concept “business model” <strong>and</strong> on identifying<br />
different categories of eBusiness models (Osterwalder et al., 2005). Timmers (1999) description<br />
of various types of electronic commerce models is a well-known source in this phase.<br />
Osterwalder et al. (2005) describe how the research in the area then evolved into listing business<br />
model components or elements <strong>and</strong> describing or modeling these in reference models <strong>and</strong> ontologies.<br />
The next step in research, which according to Osterwalder et al. still were in its infancy in 2005, is to<br />
apply the business model concept in applications <strong>and</strong> conceptual tools for management.<br />
Although the business model concept originated from Internet commerce most frameworks are generic<br />
in nature <strong>and</strong> equally applicable to traditional commerce. For some organizations, such as pure<br />
e-tailors, the eBusiness model is the business model. However, for traditional retailers or bricks-<strong>and</strong>mortars<br />
starting a web shop as a complement, the eBusiness model may differ from the (overall)<br />
business model. The eBusiness model can for example have another target market, a slightly different<br />
value proposition, other distribution channels etc.<br />
Wu <strong>and</strong> Hisa (2008:95) describe eCommerce as the use of eCommerce technologies to “execute<br />
transactions, communicate, <strong>and</strong> innovate to support commerce through cyberspace”. This study uses<br />
a similar definition. ECommerce is here defined as digital transactions of commercial business information<br />
between a buyer <strong>and</strong> a seller via communication channels such as the Internet or telecommunications<br />
networks. Both business-to-business commerce (B2B) <strong>and</strong> business-to-consumer (B2C) are<br />
included as well as trade in both physical <strong>and</strong> digital products <strong>and</strong> different types of services. Moreover,<br />
we focus on what Rappa (2004) refers to as a merchant model respectively a manufacturer<br />
model for eCommerce. The former include e-tailors or retailers that operate solely over the web as<br />
well as mail-order businesses with both web <strong>and</strong> traditional mail-order sales <strong>and</strong> moreover, traditional<br />
brick-<strong>and</strong>-mortar retailers with web storefronts. The latter allows manufacturer to sell, lease or license<br />
their products or services directly to the customers. For the purpose of this study the concepts of<br />
eBusiness (model) <strong>and</strong> eCommerce (model) will be used as interchangeably as earlier research use<br />
the concept eBusiness model when they in fact refer to business models for eCommerce (that focus<br />
solely on buyer-seller in contrary to eBusiness).<br />
3. eBusiness model elements<br />
Several studies have proposed business model elements or components (e.g. Osterwalder & Pigneur,<br />
2002; Morris et al., 2005, Yunus et al., 2010). While some components are frequently suggested there<br />
is also a large variety. The literature reviews in Morris et al. (2005) <strong>and</strong> Shafer et al. (2005) revealed a<br />
large number of elements proposed for both generic business models <strong>and</strong> for eBusiness models.<br />
Different suggestions on how to structure or organize these elements also exist. Osterwalder et al.<br />
(2005) suggests four ‘pillars´; product, customer interface, infrastructure management <strong>and</strong> financial<br />
aspects. These ‘pillars’ are then specified in nine business model building blocks; value proposition<br />
(product), target customer, distribution channel, relationship (customer interface), value configuration,<br />
core competence, partner network (infrastructure management), cost structure <strong>and</strong> revenue model<br />
(financial aspect). The framework of Osterwalder et al. (2005) has several similarities with the business<br />
model elements that Pateli <strong>and</strong> Giaglis (2004:308) suggest for evaluations of business models<br />
for eBusiness. The elements in their framework are mission (or strategic objectives), target market<br />
(defined by scope <strong>and</strong> market segment), value proposition (or product/service offering), resources<br />
(defined by capabilities <strong>and</strong> assets), key activities (in form of intra- <strong>and</strong> inter-organizational processes),<br />
cost <strong>and</strong> revenue model (defined by cost <strong>and</strong> revenue streams, pricing policy), <strong>and</strong> value<br />
chain/net (in form of alliances <strong>and</strong> partnerships).<br />
Morris et al. (2005) propose a number of ‘guiding questions’ to assist the design divided into six areas:<br />
factors related to the offering, market factors, internal capability factors, competitive strategy<br />
factors, economic factors <strong>and</strong> personal/investor factors. Morris et al. (2005) also identify three generic<br />
304
Monika Magnusson<br />
categories of business model elements in earlier studies labeled economic, operational <strong>and</strong> strategy.<br />
Yunus et al. (2010) found that three similar elements are usually distinguished in academic literature;<br />
the value proposition, the value constellation (how the company is organized to be able to deliver the<br />
product or service to its customers) <strong>and</strong> the revenue model (foc<strong>using</strong> on how profit is created from<br />
sales, costs, <strong>and</strong> capital employed). Shafer et al. (2010) divide their elements into components for<br />
strategic choices, value network, create value <strong>and</strong> capture value. Demil <strong>and</strong> Lecocq (2010) build on<br />
Penrose 1 ideas of how growth occurs in a firm as they suggest that the essential components in a<br />
business models is resources & competences, value proposition, internal & external organization,<br />
volume & structure of revenues, volume & structure of costs <strong>and</strong> margin. Three themes or areas for<br />
business model thus emerge in earlier research:<br />
Strategic issues concerning the value proposition <strong>and</strong> the market segment – What is our value<br />
proposition <strong>and</strong> for whom? This includes deciding which products <strong>and</strong> services to offer <strong>and</strong> how<br />
these add value to the customers.<br />
Operational issues concerning how to organize the company <strong>and</strong> its interaction with the context to<br />
be able to deliver the value propositions to the customers in an efficient way. This includes key<br />
activities/business processes, partner network, distribution channels, necessary competences<br />
<strong>and</strong> other resources.<br />
Financial issues such as revenue model, cost structure <strong>and</strong> margins.<br />
From an information system’s perspective these give little support for designing the information systems<br />
that should make operational the strategies <strong>and</strong> business processes. The dominating point of<br />
view in earlier research seems to be that the business model is separated from the business processes<br />
<strong>and</strong> information <strong>and</strong> communication systems (c.f. Osterwalder & Pigneur, 2002; Petrovic et<br />
al.,2001). Wu <strong>and</strong> Hisa (2008:102) argue for example that “A business model is a mediating construct<br />
between technologies <strong>and</strong> business value”. de Reuver <strong>and</strong> Haaker (2009) however, suggest that the<br />
construction of a mobile service business model includes design issues concerning the service domain<br />
(including targeting <strong>and</strong> value creating elements), the technology domain, the organizational<br />
domain <strong>and</strong> the financial domain.<br />
The productivity paradox 2 has highlighted that the development of new information systems needs to<br />
walk h<strong>and</strong> in h<strong>and</strong> with the development of business strategies <strong>and</strong> processes. This is acknowledged<br />
in business model research although technology seldom is mentioned as an actual part of a business<br />
model. Rather it is discussed how technology can be applied to implement the business model in the<br />
next step. However, these arguments are contradicting since the concept of business models arose<br />
as a result of new technologies such as Internet. Chesbrough <strong>and</strong> Rosenbloom (2002) for example<br />
claim that the process of defining a business model “begins with articulating a value proposition latent<br />
in the new technology”. Since then a number of new technologies <strong>and</strong> applications have found its way<br />
into eCommerce; mobile phones <strong>and</strong> lately smart phones, iPads, information kiosks, Facebook, blogs<br />
etc. Wu <strong>and</strong> Hisa (2008) claim that internet commerce <strong>and</strong> mobile commerce will be followed by ucommerce<br />
– ubiquitous commerce enabled by wireless <strong>and</strong>/or embedded IT. All these innovations<br />
offer slightly different opportunities, highly intertwined with the technology in question, which calls for<br />
a necessity to incorporate the technology in the business model.<br />
4. A business model framework<br />
Earlier studies have suggested different ways of <strong>using</strong> frameworks to facilitate design <strong>and</strong>/or evaluation<br />
of (e-) business models. Morris et al., (2005:729) presents a framework in “three increasingly<br />
specific levels of decision making”. Gordijn et al. (2000) propose an ontology for describing actors <strong>and</strong><br />
the exchange of value object. Several have also showed how different business model elements can<br />
be utilized to analyze <strong>and</strong> compare empirical business models (c.f. Demil & Lecocq, 2010; Yunus et<br />
al., 2010). Osterwalder et al. (2005) present matrixes that assist the analysis of the alignment between<br />
the business model elements <strong>and</strong> a) IT infrastructure services, b) the IT application portfolio<br />
<strong>and</strong> c) requirement engineering goals. Furthermore, they also suggest a matrix for combining business<br />
model elements with balanced scorecards. Neither of the sources in the literature review includes<br />
information technology as a major component of business models although for example Weill<br />
<strong>and</strong> Vitale (2002:18) state that an eBusiness model is “heavily IT enabled”. There are also numerous<br />
1 Penrose, E.T. (1959), The Theory of the Growth of the Firm, John Wiley, New York.<br />
2 The fact that the adoption of new IT often does not lead to an increased productivity in the organization was first acknowledged<br />
by Erik Brynjolfsson (1998) “Beyond the Productivity Paradox: Computers are the Catalyst for Bigger Changes”, online<br />
at http://ebusiness.mit.edu/erik/bpp.pdf (May 2011).<br />
305
Monika Magnusson<br />
empirical examples where technology plays a vital role in the business model. Among those are ebooks,<br />
<strong>and</strong> sms tickets for buses <strong>and</strong> trains. Yet another reason for incorporating IT in the business<br />
model is the ongoing debate of lacking alignment between business strategy <strong>and</strong> IT.<br />
Österle (1995) <strong>and</strong> Nilsson (1999) present a conceptual model that focus on organizational change on<br />
three levels; the strategy level, the process level <strong>and</strong> the system (technology) level, see<br />
Figure 1. The level model, as presented by Österle (1995) <strong>and</strong> Nilsson (1999), has a relatively high<br />
level of abstraction. Neither of authors makes an in-depth explanation of what is covered at each<br />
level, possibly because these concepts are already thoroughly attended to in other literature. The<br />
strategy level that focuses on strategic development may include issues such as product assortment,<br />
target markets, customer relationship, resources etc. (Magnusson, 2006). The business process level<br />
focus on improvements in processes <strong>and</strong> operations. The systems level finally, corresponds to what<br />
de Reuver <strong>and</strong> Haaker (2009) call the technology domain with issues concerning development of<br />
IS/IT. The arrows in Figure 1 intend to illustrate that development at one level might, or ought to, result<br />
in development at the other levels. Thus, when applied to business model design, changes in for<br />
example strategic issues as target customers should be followed up by analyzing necessary or enabled<br />
changes in the other levels.<br />
Strategy level<br />
Process level<br />
System level<br />
Figure 1: Organizational levels of development (source: Österle (1995), Nilsson (1999))<br />
To acknowledge the need for a business model that considers all the organizational levels the ‘three<br />
level model’ will serve as a point of departure for the conceptual framework that is to be constructed in<br />
this study. Elements from earlier business model research were thus classified in accordance with the<br />
levels in the ‘three level model’. The selected eBusiness model elements are briefly described in<br />
Table 1, for more thorough explanations see the listed references.<br />
Table 1: eBusiness model elements<br />
Business Model<br />
Elements<br />
Strategy level<br />
Description Example of references<br />
Value Proposition The bundle of products <strong>and</strong> services that a company<br />
offers <strong>and</strong> the value that these create for a<br />
specific customer segment.<br />
Target Customers The segments of customers that the company wants<br />
to offer value to.<br />
Competitive Strategy How the company will gain <strong>and</strong> hold advantage over<br />
Revenue Model <strong>and</strong><br />
Cost Structure<br />
Process level<br />
Key Activities/Processes<br />
Distribution <strong>and</strong> Communication<br />
Channels<br />
their competitors.<br />
How the company will make money by different<br />
revenue streams <strong>and</strong> the monetary consequences<br />
of the business model.<br />
The value chain of activities, processes, resources<br />
<strong>and</strong> actors arranged to produce <strong>and</strong> distribute the<br />
value proposition.<br />
The channels through which the company communicates<br />
with their customers <strong>and</strong> delivers the value<br />
proposition.<br />
Osterwalder et al.(2005);<br />
Chesbrough <strong>and</strong> Rosenbloom<br />
(2002)<br />
Osterwalder et al. (2005)<br />
Chesbrough <strong>and</strong> Rosenbloom<br />
(2002)<br />
Morris et al. (2005), Osterwalder<br />
et al. (2005)<br />
Osterwalder et al. (2005) 3<br />
Osterwalder et al. (2005)<br />
Core Competences The competences necessary to execute the com- Osterwalder et al. (2005)<br />
3 Osterwalder et al. (2005) use the concept *Value configuration’.<br />
306
Monika Magnusson<br />
Business Model<br />
Elements<br />
pany’s business model.<br />
Description Example of references<br />
Partner Network<br />
System level<br />
The network of cooperative agreements with other<br />
companies necessary to efficiently offer <strong>and</strong> commercialize<br />
value.<br />
Osterwalder et al. (2005)<br />
Technology The necessary software, hardware <strong>and</strong> networks to Chaffey (2002), Chang <strong>and</strong><br />
execute the business model. The sourcing <strong>and</strong><br />
hosting of the eCommerce system.<br />
Chen (2009)<br />
Security Security in the transactions as a whole, including<br />
means of payment <strong>and</strong> the storage <strong>and</strong> transmission<br />
of personal information.<br />
Chang <strong>and</strong> Chen (2009)<br />
Systems Integration The integration between the eCommerce system<br />
<strong>and</strong> internal IS <strong>and</strong> partners’ <strong>and</strong> customers’ IS.<br />
Chaffey (2002)<br />
The elements for the strategy <strong>and</strong> the process levels were selected by studying elements in earlier<br />
research <strong>and</strong> selecting the elements that were most frequently mentioned. The resulting elements<br />
corresponded well with the most frequently found components in the literature study of Shafer et al.<br />
(2005). The elements were then classified in accordance with the ‘three level model’ by considering<br />
whether a specific element had mainly to do with the production <strong>and</strong> distribution of the products or<br />
service (process level) or whether they mainly concerned an overall plan for maintaining or changing<br />
the organization’s competitive position on the market (strategy level). As this study aims to integrate<br />
technology into the eBusiness model important elements at the technology level were also identified<br />
in earlier studies.<br />
4.1 The relationship between the business model <strong>and</strong> the eBusiness model<br />
Earlier studies have rarely discussed the difference between the overall/generic business model <strong>and</strong><br />
the eBusiness model as the ‘e’ often is implicitly built-in to the model. However, in some companies<br />
eCommerce is utilized to reach new customers or to market other value propositions than in the traditional<br />
marketing channels. The eBusiness model is a part of the overall business model <strong>and</strong> should<br />
encompass both strategies, processes <strong>and</strong> IS/IT (system) decisions. Thus, although the business<br />
model elements are the same in the business model as in the eBusiness model, some adjustments in<br />
the design or ‘value’ of the individual elements may take place, see Figure 2.<br />
Figure 2: The relationship between the business model <strong>and</strong> the eBusiness model<br />
307
Monika Magnusson<br />
5. The processes of design <strong>and</strong> evaluation of eBusiness models<br />
5.1 Designing the elements<br />
Designing a business model means creating a unique combination of business elements in perfect<br />
interplay. Strategic decisions of which products to offer on which markets need to be combined with<br />
decisions on which distribution channels <strong>and</strong> technical platforms to use, to best market the products<br />
<strong>and</strong> reach the target customers. The choices are many <strong>and</strong> difficult <strong>and</strong> there is no single ‘best practice’.<br />
While some companies are bound to start from an existing value offering others may start from a<br />
market segment, looking for ways to develop an attractive value propositions for customers in that<br />
segment. Sometimes the launching of new technology is the starting point for new business models.<br />
The sudden increase in apps for so called smart phones is one example of this. A possible starting<br />
point that decreases the complexity of designing the element is to identify possible ‘values’ or variants<br />
for the elements. In Table 2 potential values of the identified elements are proposed. These are only<br />
examples <strong>and</strong> should not be seen as an exhaustive list of values/variants.<br />
Table 2: Business model elements <strong>and</strong> potential variants<br />
Strategy level Element variants References<br />
Value Proposition<br />
Target Customers<br />
Competitive<br />
Strategy<br />
Revenue Model<br />
<strong>and</strong> Cost Structure<br />
Process level<br />
Key Activi-<br />
Mainly products/mainly services/heavy mix<br />
St<strong>and</strong>ardized/some customization/high customization<br />
Access to product/product itself/product bundled with other firm’s product<br />
Assortment; broad, medium or narrow (similar to physical store, adjusted,<br />
decreased or increased)<br />
Value source; efficiency, complementarities, lock-in, novelty<br />
B2B/B2C/both<br />
Geographical segment; local/regional/national/international<br />
Demographical segment<br />
Broad vs niche market<br />
Image of operational excellence/consistency/dependability/speed<br />
Product or service quality/selection/features/availability<br />
Innovation leadership/low cost efficiency/ intimate customer relation-<br />
ship/experience/br<strong>and</strong>ing<br />
Revenue methods; sales/leasing/subscription/support etc.<br />
Pricing <strong>and</strong> revenue sources; fixed/mixed/flexible<br />
Pricing methods; cost-based methods/competition-basedmethods/dem<strong>and</strong>-based<br />
pricing etc.<br />
Operating leverage; high/medium/low<br />
Volumes; high/medium/low<br />
Margins; high/medium/low<br />
Marketing, selling, distribution, sourcing, pricing, customer relationties/Processesships,<br />
after-sales etc.<br />
Distribution <strong>and</strong><br />
Traditional distribution channel/online channel<br />
Communication Marketing channels; sales team/catalogue/internet market-<br />
Channels<br />
ing/newsletter/ e-mail/affiliate/TV/radio/social media/sms etc.<br />
Core Compe- Manufacturing, marketing, selling, distribution, sourcing, pricing, custencestomer<br />
relationships, after-sales etc.<br />
Partner Network Suppliers, collaboration partners, industry networks, universities etc.<br />
System level<br />
Technology Type of eCommerce application <strong>and</strong> technologies in use (e.g. web<br />
shop, e-catalogue etc.)<br />
Sourcing; custom-made or off-the-shelf software, SaaS (Software as a<br />
Service) etc.<br />
Hosting; external or internal<br />
Access platforms; Internet, mobile phone, tablet computers, interactive<br />
TV etc.<br />
Security Payment security, data security, physical security etc.<br />
Systems Integra- St<strong>and</strong>-alone eCommerce system or integration with legacy systems<br />
tion such as ERP (Enterprise Resources Planning), external integration with<br />
customers, suppliers <strong>and</strong>/or collaboration partners.<br />
308<br />
Morris et al.<br />
(2005)<br />
Amit <strong>and</strong> Zott<br />
(2001)<br />
Morris et al.<br />
(2005)<br />
Morris et al.<br />
(2005)<br />
Morris et al.<br />
(2005)<br />
Avalonitis <strong>and</strong><br />
Indounas,<br />
(2005)<br />
Lefebvre et al.<br />
(2005)<br />
Chaffey (2002)
5.2 Guiding questions<br />
Monika Magnusson<br />
Another approach that can facilitate the design or evaluation of an eBusiness model is to use ‘guiding<br />
questions’. Some examples of guiding questions are presented in Table 3. Morris et al. (2005), among<br />
others, present similar questions. The questions could also be connected to the different identified<br />
business model elements in Table 2, foc<strong>using</strong> on the pros <strong>and</strong> cons of different alternatives. Similar<br />
questions can be used to evaluate an existing business model although the center of attention then<br />
will be on how well the existing design is in terms of the elements ‘values’ <strong>and</strong> the interplay between<br />
the elements.<br />
Table 3: Guiding questions for eBusiness model design<br />
Strategy level<br />
Value proposition What is our value proposition to the customers? (i.e. What value do we create for our<br />
customers?)<br />
What products <strong>and</strong>/or services should we offer? (Assortment, quality, customization<br />
etc.)<br />
Target customers In what market segments are our target customers? (Geographically, consumers<br />
<strong>and</strong>/or organizations, demographically etc.)<br />
What customer needs should our products/services fulfill?<br />
Competitive strategy How will we gain <strong>and</strong> hold advantage over our competitors?<br />
Revenue model <strong>and</strong><br />
cost structure<br />
Distribution <strong>and</strong><br />
communication<br />
channels<br />
Key activities/processes<br />
Regarding our value proposition – what distinguish us from our competitors?<br />
Which are our major revenue streams?<br />
Which pricing method should we adopt?<br />
Considering the design of elements at strategy, process level <strong>and</strong> systems level –<br />
what are the costs?<br />
Process level<br />
Which distribution <strong>and</strong> communication channels are best for a value proposition <strong>and</strong><br />
customer segment?<br />
What are the key processes/activities for enabling our value proposition?<br />
(And what is the most efficient way of performing a key process?)<br />
What are the key resources?<br />
Core competences What are the core competences for accomplishing our value proposition?<br />
Partner network What collaboration partners do we need to be able to offer our value proposition in a<br />
cost efficient way?<br />
System level<br />
Technology What type of eCommerce application(s) best supports our value proposition?<br />
Which technology platforms are most appropriate for our target customers?<br />
Where do we host the eCommerce system?<br />
Security What are the security risks in the technology <strong>and</strong> how do we h<strong>and</strong>le them?<br />
Systems integration Which data from other IS (internal <strong>and</strong> external) do we need for our value proposition?<br />
Is it feasible <strong>and</strong> financially motivated to integrate these systems?<br />
5.3 Interplay between the elements<br />
The idea behind the business model concept is that a number of elements need to harmonize <strong>and</strong><br />
interact for a company to succeed. However, we will propose that the difficult puzzle of making a<br />
company successful can be summarized in four elementary pieces that need to fit together; the market<br />
offering, the target customer, the business infrastructure <strong>and</strong> profitability, see Figure 3. The latter<br />
is in fact the result of the other three. The ‘right’ market offering in terms of value proposition, competitive<br />
strategy, pricing etc. offered to the ‘right’ target customers/market segments <strong>and</strong> produced by the<br />
‘right’ business infrastructure (in terms of processes, partner networks, resources, technologies, competences,<br />
distribution <strong>and</strong> communication channels) creates profitability.<br />
6. Contributions <strong>and</strong> discussion<br />
The here presented framework, building on research on business models <strong>and</strong> eBusiness models,<br />
acknowledges a number of elements that need to be considered when an eCommerce initiative is<br />
initialized. The same elements <strong>and</strong> their interplay may be utilized to evaluate if improvements in the<br />
eBusiness model are needed <strong>and</strong> how. Earlier studies have already proposed frameworks <strong>and</strong> ontologies<br />
for business models. The framework presented in this paper develops these further by incorporating<br />
the enabling technology in the model. This is valuable as research on organizational<br />
development (see Österlee 1995 <strong>and</strong> Nilsson, 1999) emphasize that technology need to be designed<br />
309
Monika Magnusson<br />
<strong>and</strong> changed in interplay with business strategy <strong>and</strong> business processes. The technology further has<br />
the power to affect the design of other business element as it enables <strong>and</strong> delimits the value proposition,<br />
payment methods, <strong>and</strong> distribution <strong>and</strong> communication channels for example.<br />
Figure 3: The business model puzzle<br />
Another contribution of the paper is the mapping of variants of eBusiness model elements in Table 2.<br />
These could help SMEs design their eBusiness model elements by identifying alternative choices.<br />
The list of business model element variants needs to be further enhanced <strong>and</strong> extended in forthcoming<br />
studies. Also the ‘guiding questions’ could serve as a design tool for SMEs by concretizing business<br />
model decision-making.<br />
A contribution to theory is the clarification of the relationship between a business model <strong>and</strong> an<br />
eBusiness model, see Figure 2. The model acknowledge that while there are obvious similarities between<br />
the two, they do not necessary coincide.<br />
A suitable step for forthcoming research would be to empirically test the framework. Further research<br />
could also suggest a suitable process for the design of an eBusiness model respectively for the evaluation<br />
of an eBusiness model.<br />
Acknowledgement<br />
This research has been sponsored by The Swedish Retail <strong>and</strong> Wholesale Development Council.<br />
References<br />
Amit, R. <strong>and</strong> Zott, C. (2001) “Value creation in EBusiness”, Strategic <strong>Management</strong> Journal, Vol. 22, No. 6-7, pp.<br />
493-520.<br />
Avlonitis, G.J. <strong>and</strong> Indounas, K.A. (2005) “Pricing objectives <strong>and</strong> pricing methods in the service sector”, Journal<br />
of Service Marketing, Vol. 19, No. 1, pp. 47-57.<br />
Buratti, N. & Penco, L. (2001). “Assisted technology transfer to SMEs: lessons from an exemplary case”. Technovation,<br />
Vol. 21, pp. 35-43.<br />
Chaffey, D. (2002). EBusiness <strong>and</strong> ECommerce <strong>Management</strong>, Harlow: Pearson Education.<br />
Chang, H.H <strong>and</strong> Chen, S.W. (2009) “Consumer perception of interface quality, security, <strong>and</strong> loyalty in electronic<br />
commerce”, <strong>Information</strong> & <strong>Management</strong>, Vol. 46, pp. 411-417.<br />
Chesbrough, H. <strong>and</strong> Rosenbloom, R. (2002) “The Role of the Business Model in Capturing Value from Innovation:<br />
Evidence from Xerox Corporation’s Technology Spinoff Companies”, Industrial <strong>and</strong> Corporate Change,<br />
Vol. 11, No. 3, pp. 529-555.<br />
Demil, B. <strong>and</strong> Lecocq, X. (2010) “Business Model Evolution: In search of Dynamic Consistency”, Long Range<br />
Planning, Vol. 43, pp. 227-246.<br />
de Reuver, M. <strong>and</strong> Haaker, T. (2009) ”Designing viable business models for context-aware mobile services”,<br />
Telematics <strong>and</strong> Informatics, Vol. 26, pp. 240-248.<br />
Gordijn, J., Akkermans, H. & van Vliet, H. (2000), “What’s in an electronic business model?”, in EKAW ’00 Proceedings<br />
of the 12 th European Workshop on <strong>Knowledge</strong> Acquisition, Modeling <strong>and</strong> <strong>Management</strong>, pp. 257-<br />
273, Springer Verlag, London.<br />
310
Monika Magnusson<br />
Hay, M. <strong>and</strong> Kamshad, K. (1994) “Small Firm Growth: Intentions, Implementation <strong>and</strong> Impediments”, Business<br />
Strategy Review, Vol. 5, No. 3, pp. 49-68.<br />
Kim, D., Ow, T.T. <strong>and</strong> Junc, M. (2008) “SME Strategies: An Assessment Of High vs. Low Performers”, Communications<br />
of the ACM, Vol. 51, No.11, pp. 113-117.<br />
Lefebvre, L-A., Lefebvre, E., Elia, E. & Boeck, H. (2005) “Exploring B-to-B eCommerce adoption trajectories in<br />
manufacturing SMEs”, Technovation, Vol. 25, pp.1443-1456.<br />
Magnusson, M. (2006) Adoption av elektronisk h<strong>and</strong>el i små och medelstora företag: innehåll, kontext, process<br />
och samspelet mellan dessa. Doctoral Thesis. Karlstad University Studies 2006:48.<br />
Morris, M., Schindehutte, M. <strong>and</strong> Allen, J. (2005) “The entrepreneur’s business model: toward a unified perspective”,<br />
Journal of Business Research, Vol. 58, pp. 726-735.<br />
Nilsson, A.G. (1999) “The Business Developer’s Toolbox: Chains <strong>and</strong> Alliances between Established Methods”,<br />
in Nilsson, A.G., Tolis, C. & Nellborn, C. (eds.) (1999) Perspectives on Business Modelling: Underst<strong>and</strong>ing<br />
<strong>and</strong> Changing Organisations, Springer-Verlag, Berlin.<br />
Osterwalder, A. <strong>and</strong> Pigneur, Y. (2002) “An eBusiness Model Ontology for Modeling eBusiness”, Proceedings<br />
from the 15th Bled Electronic Commerce Conference, June 17-19.<br />
Osterwalder, A., Pigneur, Y. <strong>and</strong> Tucci, C. (2005) “Clarifying business models: origins, present, <strong>and</strong> future of the<br />
concept”, Communications of AIS, Vol.16, pp. 1-25.<br />
Pateli, A.G. <strong>and</strong> Giaglis, G.M. (2004) “A research framework for analyzing eBusiness models”, European Journal<br />
of <strong>Information</strong> Systems, Vol.13, pp. 302-314.<br />
Petrovic, O., Kittl, C. <strong>and</strong> Teksten, R.D. (2001) ”Developing Business Models for eBusiness”, online at<br />
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1658505 (May 2011).<br />
Rappa, M. (2004) ”Business Models on the web – Managing the digital enterprise”, online at<br />
http://digitalenterprise.org/models/models.html (May 2011).<br />
Shafer. S.M., Smith, H.J. <strong>and</strong> Linder, J.C. (2005) “The power of business models”, Business Horizons, Vol. 48,<br />
pp.199-207.<br />
Timmers, P. (1999) Electronic commerce: strategies <strong>and</strong> models for business-to-business trading, New York:<br />
Wiley.<br />
Weill, P. <strong>and</strong> Vitale, M. (2002) “What IT infrastructrure capabilities are needen to implement eBusiness models?”,<br />
MIS Quarterly, Vol. 1, No.1, March, pp.17-34.<br />
Wu, J-H. <strong>and</strong> Hisa, T-L. (2008) “Developing eBusiness dynamic capabilitites: An analysis of eCommerce innovations<br />
from I-, M-, to U-commerce”, Journal of Organizational Computing <strong>and</strong> Electronic Commerce, Vol.18,<br />
pp. 95-111.<br />
Yunus, M., Moingeon, B. <strong>and</strong> Lehmann-Ortega, L. (2010) “Buildning Social Business Models: Lessons from the<br />
Grameen Experience”, Long Range Planning, vol.43, pp. 308-325.<br />
Österle, H. (1995) Business in the <strong>Information</strong> Age – Heading for New Processes. Berlin: Springer.<br />
311
Using Goal Modelling to Evaluate Goals for eService Development<br />
in Government<br />
Monika Magnusson <strong>and</strong> Marie-Therese Christiansson<br />
Karlstad University, Sweden<br />
Monika.Magnusson@kau.se<br />
Marie-Therese.Christiansson@kau.se<br />
Abstract: Public eServices have had a fast spread during the last decade. While eServices could enable cost<br />
savings <strong>and</strong> improve customer service, the development may be costly <strong>and</strong> time-consuming, involving complex<br />
challenges such as business process redesign, changes in organisational culture <strong>and</strong> customer behaviour. Adding<br />
to the complexity is the hierarchy of goals for eServices at transnational, national <strong>and</strong> organisational levels.<br />
Earlier research emphasise the importance of alignment between an organisation’s use of information technology<br />
<strong>and</strong> its business goals. This complex structure of multi-level goals is often implicit <strong>and</strong> difficult to h<strong>and</strong>le in practice.<br />
The purpose of this study is to examine how goal modelling can be utilised to improve eService development<br />
in government by serving as a tool for evaluation of goals. In a case study of a Swedish municipality’s eService<br />
development project, we found goal modelling to be valuable for evaluating goal alignment between the municipality’s<br />
local action plan, the national action plan <strong>and</strong> the project plan for the EU project Smart Cities. Other benefits<br />
are e.g. the ability to detect missing or implicit goals <strong>and</strong> tasks <strong>and</strong> moreover to improve planning,<br />
management <strong>and</strong> evaluation of eService development. The recommendation is to use goal models <strong>and</strong> an<br />
‘alignment matrix’ to improve goal alignment <strong>and</strong> the overall goal quality.<br />
Keywords: goal modelling, eGovernment, eService alignment, evaluation<br />
1. Introduction<br />
The increase of public eServices has been rapid during the last decades. This development is heavily<br />
promoted at both EU <strong>and</strong> national levels as eServices accessible across the EU members states<br />
strengthen domains such as e-Identification, e-Procurement, e-Justice, e-Health, mobility <strong>and</strong> social<br />
security. (European Commission, 2010). Among the benefits for the public sector are cost savings<br />
<strong>and</strong> improved customer service (Schneider, 2003; Boyer et al., 2002). However, the development<br />
process may be complex <strong>and</strong> costly though it affects not only the information systems (IS) but also<br />
the business processes <strong>and</strong> the strategies of the organisation. Furthermore, both employees <strong>and</strong><br />
citizens need to be willing to use eServices in their regular operations for the benefits to arise. A clear<br />
underst<strong>and</strong>ing of the goals may facilitate a voluntary adoption of eServices. One success factor in<br />
eService development is therefore the ability for organisations to communicate how eServices contribute<br />
to citizens’ wellbeing <strong>and</strong> companies’ efficiency as well as the organisation’s own business<br />
performance (Christiansson, 2011).<br />
Adding to the complexity of eService development is the large bouquet of policies <strong>and</strong> goals at different<br />
levels. In EU member states, there are goals at the transnational level that should be met. There<br />
are also goals at the national level that at best are coherent with EU goals. In addition, each municipality<br />
has their own goals. To achieve goals at superior levels, there needs to be intentional dependencies<br />
where lower level goals can serve as means for higher level goals. Furthermore, eServices are<br />
often developed in projects meaning in practice that four levels of goals must be met <strong>and</strong> aligned.<br />
Goal modelling is an approach for capturing, expressing <strong>and</strong> making the goals in an organisation explicit,<br />
thereby facilitating communication <strong>and</strong> providing a basis for change. The purpose of this study<br />
is to examine how goal modelling can be utilised to improve eService development in government by<br />
serving as a tool for evaluation of the goals. The research question investigated is: What are the<br />
benefits of <strong>using</strong> goal modelling in evaluation of eService Development in Government?<br />
2. Literature review<br />
2.1 eGovernment<br />
eGovernment can be described as governments providing administrative processes as eServices for<br />
their customers (citizens, visitors, companies <strong>and</strong> other government agencies) through web sites; i.e.<br />
an instance of e-Commerce (Schneider, 2003). Customers interact with governments through the<br />
Internet to ask questions <strong>and</strong> get access to information <strong>and</strong> services (e.g. updated government regulations,<br />
official documents, applications etc. (Alsaghier et. al 2009). An eService is here defined as “all<br />
interactive services that are delivered on the Internet <strong>using</strong> advanced telecommunications, informa-<br />
312
Monika Magnusson <strong>and</strong> Marie-Therese Christiansson<br />
tion, <strong>and</strong> multimedia technologies” (Boyer et al., 2002:175). Among the providers’ benefits is that services<br />
can be offered at a lower cost <strong>and</strong> to a wider geographical market (Boyer et al., 2002).<br />
Well-structured <strong>and</strong> effective business processes are a prerequisite for providing <strong>and</strong> performing<br />
eServices. However, business process improvements require a methodical approach (Becker et. al<br />
2003). Boyer et al. (2002: 176) stress the importance that “eServices must be carefully planned <strong>and</strong><br />
implemented in order for eServices to become a valuable <strong>and</strong> strategic channel”.<br />
2.2 Strategic alignment of eService<br />
Bleistein et al. (2006b) emphasise the importance of alignment between an organisation’s use of IT<br />
<strong>and</strong> its business strategy. In addition, alignment between business processes <strong>and</strong> IT is a challenge<br />
<strong>and</strong> success factor in eGovernment projects (Melin <strong>and</strong> Axelsson, 2009). In order to align business<br />
strategy <strong>and</strong> IT (e.g. eServices), systems requirements <strong>and</strong> solution specifications for IT must be<br />
aligned with business processes (e.g. goals, actions, business logic <strong>and</strong> customers) in order to support<br />
business performance (Christiansson <strong>and</strong> Christiansson, 2006). Organisations foc<strong>using</strong> more on<br />
the “e” then on the ”business” may forget about the value added idea (Davenport, 1993) as an essential<br />
prerequisite for an organisation’s return on its investments into IT (Alpar <strong>and</strong> Olbrich, 2005). Unfortunately,<br />
Melin <strong>and</strong> Axelsson (2009:254) found a weak alignment between business processes <strong>and</strong> IT<br />
in their study <strong>and</strong> give some examples of eGovernment challenges, i.e. “…the size of project, the<br />
diversity of users, <strong>and</strong> organizations involved. Alignment between organizational goals <strong>and</strong> an ISD<br />
(IT) project, IO perspective, the existence of multiple, <strong>and</strong> partially conflicting goals.” To be able to<br />
validate the alignment between business goals <strong>and</strong> the use of IT, there is a need for requirement engineering<br />
methods that encompass the business strategy. However, Bleistein et al. (2006b) claim that<br />
this is not usually the case in requirement engineering approaches. Also Österle (1995) <strong>and</strong> Nilsson<br />
(1999) emphasise the importance of developing business strategies, business processes <strong>and</strong> IS/IT in<br />
a holistic manner. The key issue is thus to decompose business goals in a way that facilitates the<br />
design of business processes <strong>and</strong> IT solutions, this may be accomplished by goal modelling.<br />
2.3 Goal modelling<br />
A goal is here defined as a desired state or condition that the organisation wants to achieve (Andersson<br />
et al., 2008). Morasky (1977:89) conclude; “goals should serve to facilitate the evaluation of system<br />
effectiveness <strong>and</strong> the control of system behaviour. In order to provide this facilitation, goals must<br />
be specific, manifest, focus on the receiving system <strong>and</strong> include a time dimension.” By specific means<br />
that the goal should be clear <strong>and</strong> unambiguous because: “A vague, nonspecific goal is of little use to<br />
the system analyst or planner because any number of outputs can be constructed as appropriate to<br />
goal attainment. In order to make a goal optimally useful for evaluation, the statement of the goal<br />
must be painfully specific” (Morasky, 1977:87). Every organisation has a large number of formal <strong>and</strong><br />
informal goals that guide its operations. Ideally, one goal is ranked as the overall goal that all other<br />
goals should contribute to. However, in reality, goals may be irrelevant, conflicting or lack a plan for<br />
achieving them. It is essential to clarify, discuss <strong>and</strong> manifest which goals that should guide the operations<br />
of the organisation, i.e. to analyze <strong>and</strong> communicate the goals. Goal modelling is an approach<br />
to capture <strong>and</strong> make the goals of an organisation explicit (Andersson et al. 2008). A goal<br />
model is typically represented graphically as an organised, <strong>and</strong> often tree-formed, structure of goals<br />
where a goal (end) is broken down into sub-goals that serve as means for reaching the end (Kavakli,<br />
2004).<br />
2.3.1 Goal categories <strong>and</strong> structures<br />
Goals can be classified as soft goals (visions or abstract goals), hard goals (objectives or quantitatively<br />
measurable goals) or tasks (actions) aimed at fulfilling goals (Bleistein et al., 2006b; Gordijn et<br />
al., 2006). Soft goals are qualitative <strong>and</strong> not possible to measure quantitatively in contrast to hard<br />
goals. To get clear-cut criteria for achievement, soft goals need further refinement (Gordijn et al.,<br />
2006). This refinement is achieved by specifying soft goals into hard goals <strong>and</strong> tasks. Tasks are<br />
courses of action carried out to achieve goals (Gordijn et al., 2006).<br />
In practice, goals are expressed <strong>and</strong> designed at different organisational levels. Österle’s (1995) <strong>and</strong><br />
Nilsson’s (1999) ‘three level model’ illustrates how an interplay between changes in business strategies,<br />
business process <strong>and</strong> IS/IT takes place, or should take place, see Figure 1. In IT-based innova-<br />
313
Monika Magnusson <strong>and</strong> Marie-Therese Christiansson<br />
tions, such as eServices, the strategy level corresponds to providing services, the (operative) process<br />
level corresponds to the performance <strong>and</strong> the system level to delivering services.<br />
Figure 1: The three level model (Österle, 1995; Nilsson, 1999).<br />
2.3.2 Goal modelling – some rationales<br />
Soft goals <strong>and</strong> visions found in government policies or regulations are not directly achievable. Rather,<br />
they are “achieved through a network of intentional dependencies” (Gordinj et al.,2006:27). Goal<br />
modelling is utilised to plan, reveal, analyse or evaluate these dependencies between goals. Ideally<br />
the goal models should enlighten why different organisational goals exist <strong>and</strong> how business processes,<br />
<strong>and</strong> tasks fulfil the goals. Goal modelling enables the discovery of ‘logical holes’ i.e. soft goal<br />
without measurable (hard) goals or tasks to fulfil them or, vice versa, planned actions without a clear<br />
relationship to goals. Mapping of goals is therefore a natural step during the analysis of the current<br />
(as-is) situation as well for the desirable (to-be) situation. Goal modelling is also vital for underst<strong>and</strong>ing<br />
organisational problems <strong>and</strong> suitable solutions, <strong>and</strong> thereby possible to use both in the design <strong>and</strong><br />
evaluation of eServices. Gordijn et al. (2006:26): claim that “Software engineers must first underst<strong>and</strong><br />
an eService before they can build effective systems to support it. That means underst<strong>and</strong>ing [...] the<br />
enterprise’s goals <strong>and</strong> intentions”. In an eGovernment setting, goal modelling can also be utilised to<br />
ensure that local goals are in line with transnational <strong>and</strong> national goals.<br />
2.3.3 Goal modelling techniques<br />
There are different approaches to goal modelling. Typically, a preliminary set of goals are first identified<br />
<strong>and</strong> listed before their interrelationships are analysed, although the process is iterative in character.<br />
When analysing interrelationships between goals, new goals are often identified. Subsequently,<br />
the identification of goals could result in the decomposition of one goal into several others. Soft goals<br />
(visions), hard goals <strong>and</strong> tasks can be decomposed into sub elements such as other soft goals, hard<br />
goals, tasks or resources. The sub elements thus contribute to the higher level elements, see Figure<br />
2. Kavakli (2004) claims that asking ‘how-<strong>and</strong>-why-questions’ can refine goals <strong>and</strong> goal models. That<br />
is, by reflecting on why a goal or task exists it is possible to find higher-level elements <strong>and</strong> by asking<br />
how the element should be made operational it is possible to reach more refined means. As shown in<br />
Figure 2, with the AND-decomposition link, sometimes a combination of tasks is needed to fulfil a<br />
hard goal. Subsequently a task or a hard goal can be achieved be one of many alternatives tasks (the<br />
OR-decomposition link).<br />
314
Monika Magnusson <strong>and</strong> Marie-Therese Christiansson<br />
Figure 2: Goal model structure adapted from Bleistein et al. (2006a: 847)<br />
3. Methodology<br />
A case study of an eService project in Karlstad municipality was undertaken. Karlstad has approximately<br />
85 000 citizens <strong>and</strong> 7000 employees. The studied eService project took part in a wider collaboration<br />
of the Interreg IVB North Sea Region Programme; the Smart Cities project<br />
(www.smartcities.info). The local project owner was the municipality’s IT department. The goal analysis<br />
was performed in the spring of 2009 <strong>and</strong> was limited to official <strong>and</strong> documented goals. The research<br />
strategy was what Kavakli (2004) describe as an expert-analytical approach with a ‘analyse<br />
existing document strategy’. Data were first gathered via official documents such as policy documents,<br />
action plans, project plans <strong>and</strong> website information. Next, these elements were structured into<br />
graphical goal models according to the structure in Figure 2 to illustrate decomposition links <strong>and</strong> contribution<br />
links between elements at different levels. The authors’ individual classifications <strong>and</strong> goal<br />
structures were then compared, analysed <strong>and</strong> aligned until there was consensus. Next, the goal models<br />
were discussed <strong>and</strong> further analysed with the municipality’s project manager <strong>and</strong> an IT-architect at<br />
the IT department at the municipality during two workshops. Some changes in interrelationships between,<br />
<strong>and</strong> formulations of, goals were performed during an iterative process in an email conversation<br />
until there was an agreement. The final report was sent to the local project manager, <strong>and</strong> presented at<br />
the Smart Cities Steering Committee in June 2009.<br />
4. The municipality case –a goal modelling example<br />
An extract from the goal analysis is presented in the paper in order to state some examples of our<br />
findings. The transnational level was excluded from our example but is analyzed in the same way.<br />
Only manifested, i.e. explicitly stated goals were used. The goals were analyzed in terms of inter-level<br />
alignment (goal contribution between levels) <strong>and</strong> intra-level alignment (goal contribution at the same<br />
level) by asking questions such as; “Does goal B contribute to goal A?” <strong>and</strong> “Can goal B be considered<br />
as a refinement or decomposition of goal A?” Also in some documents, goals were explicitly<br />
decomposed into sub-goals (as in Table 1). Moreover, the overall quality of the goals in terms of clarity,<br />
scope etc. (c.f. Morsaky, 1977) are discussed. The formulations in the original documents are<br />
used in the tables although translated into English in Table 1 <strong>and</strong> 2.<br />
4.1 Goals at the national level<br />
At the national level, the primary policy document was the “Action plan for eGovernment – New<br />
grounds for IT-based business development in Public Administration” (Regeringskansliet, 2008). The<br />
action plan was constructed in 2008 <strong>and</strong> the overall goal to be implemented in 2010 was that the administration<br />
should be “as simple as possible for as many as possible” (NG1). Four sub-goals for prioritized<br />
policy areas are also presented; see Table 1.<br />
4.2 Goals at the municipal level<br />
At the time of the project the essential document guiding the municipality’s eService development was<br />
the “Action plan <strong>and</strong> goals for eGovernment 2009-2011”. The stated goals are presented in Table 2.<br />
Among the actions mentioned in documents are the eService projects, a study of customers’/citizens’<br />
315
Monika Magnusson <strong>and</strong> Marie-Therese Christiansson<br />
needs, a citizen panel, <strong>and</strong> a citizens’ survey, development of channel strategies <strong>and</strong> mapping of<br />
business processes. The latter is also specified into further actions that need to take place during the<br />
mapping. An internal organisation, an ‘e-office’, which supports the different departments in their development<br />
of eServices should further be created <strong>and</strong> a communication plan for external <strong>and</strong> internal<br />
communication developed. Tasks that are meant to fulfil each goal are not stated.<br />
Table 1: Goals at the national level (Regeringskansliet, 2008)<br />
Goal<br />
level &<br />
no.<br />
Goal statement Goal type Contributes<br />
to<br />
NG1 In 2010, it should be as easy as possible for as many people as possible<br />
to exercise their rights <strong>and</strong> fulfil their obligations <strong>and</strong> take part of govern-<br />
ment service.<br />
NG2 The authorities have regulations that allow inter-organisational collaboration<br />
for e-governance <strong>and</strong> effective information h<strong>and</strong>ling that makes information<br />
easily accessible <strong>and</strong> useful, with regard to the privacy <strong>and</strong><br />
security.<br />
NG3 The authorities have the technical conditions that support eGovernment.<br />
An efficient, robust <strong>and</strong> future-proof electronic communication infrastructure<br />
[is] promoted. The authorities have a security level that generates<br />
high confidence in e-governance. St<strong>and</strong>ardisation of concepts <strong>and</strong> information<br />
structures, interfaces for electronic services <strong>and</strong> electronic communication,<br />
etc. builds on the authority’s or the sector's total needs <strong>and</strong> in<br />
conformity with international st<strong>and</strong>ards<br />
NG4 The systems for business support that is common for several authorities<br />
are harmonised <strong>and</strong> automated at an appropriate level in order to avoid<br />
unnecessary costs <strong>and</strong> increase the overall productivity. The employees<br />
have the necessary skills to monitor <strong>and</strong> enforce development. The government’s<br />
overall IT costs are followed up regularly.<br />
NG5 Citizens <strong>and</strong> enterprises can easily perform <strong>and</strong> track their err<strong>and</strong>s <strong>and</strong><br />
gain access to the administration's overall services <strong>and</strong> information.<br />
Overall<br />
goal<br />
quality<br />
Soft goal<br />
Soft<br />
goal(s)<br />
Soft<br />
goal(s)<br />
Soft<br />
goal(s)<br />
Soft<br />
goal(s)<br />
NG1 is the overall goal. However, it is not obvious how N1 were decomposed into NG2-NG5. A ‘midlayer’<br />
of sub goals to NG1 like “It should be easy to perform err<strong>and</strong>s that span different authorities”<br />
would clarify the relationships between NG1 <strong>and</strong> NG2 respectively NG4. NG5 is furthermore similar<br />
to N1. Notable is that all goals are soft goals. The clarity of the goals would improve if only one goal<br />
were h<strong>and</strong>led in each goal statement. At present, the focus of each goal statement is too wide <strong>and</strong> in<br />
coherent. Furthermore, the language is ambiguous (see for example NG2). The statements of the<br />
goals are thus far from “painfully specific” (see Morasky, 1977:87).<br />
Table 2: Goals at the municipal level (Karlstad kommun, 2008a)<br />
Goal<br />
level &<br />
no.<br />
Goal statement Goal<br />
type<br />
MG1 All services that the municipality offers <strong>and</strong> all the obligations that we<br />
impose on local residents to be executed, should be possible to conduct<br />
as eServices within five years, where it is feasible <strong>and</strong> economically<br />
justified. At the end of 2011, 35 new eServices should have been created.<br />
MG2 We shall always start from the citizens’ or the businesses’ needs when<br />
planning the provision of eServices.<br />
MG3 EServices should be designed so that it becomes as easy as possible<br />
for citizens to use them.<br />
MG4 All forms should be digital. In the long run, they should also be possible<br />
to submit <strong>and</strong> sign electronically.<br />
MG5 Safe <strong>and</strong> reliable login shall be available to all municipal residents over<br />
Overall<br />
goal<br />
quality<br />
Hard<br />
goal(s)<br />
NG1<br />
NG1<br />
NG1<br />
NG1<br />
Contributes<br />
to<br />
NG1, NG5<br />
Soft<br />
goal<br />
MG3<br />
Soft<br />
goal<br />
NG1<br />
Hard<br />
goal(s)<br />
MG1, NG1<br />
Soft NG3 (MG1 &<br />
the age of 15 <strong>and</strong> for all businesses.<br />
goal MG3)<br />
Unclear whether there is an overall municipal goal for eServices <strong>and</strong> how the goals contribute to<br />
each other (unclear goal structure). High alignment with national goal (NG1, NG3 & NG5). MG1<br />
contain two goals where the last sentence is a sub-goal to the first sentence. Notable is also that two<br />
of the hard goals (MG1 & MG4) having ‘fuzzy’ features that make them less measurable in practice.<br />
316
4.3 Goals at the project level<br />
Monika Magnusson <strong>and</strong> Marie-Therese Christiansson<br />
In the project plan for the eService project, only four goals are explicit; see Table 3. However, a number<br />
of tasks or “issues that must be solved” are provided in the document. Among the mentioned<br />
tasks are that all eServices within the municipality need to be documented <strong>and</strong> categorised in a service<br />
catalogue <strong>and</strong> that a My Page solution, where the citizens <strong>and</strong> businesses can see all their err<strong>and</strong>s<br />
<strong>and</strong> personal information, should be created.<br />
Table 3: Goals at the project level (Karlstad kommun, 2008b)<br />
Goal<br />
level &<br />
no.<br />
Goal statement Goal<br />
type<br />
PG1 Safe <strong>and</strong> reliable login – for all citizens(older than 15 years) <strong>and</strong> com- Soft<br />
panies in the municipality<br />
goal<br />
PG2 Stored information in the Meta catalogue about person <strong>and</strong> company Hard<br />
information must be 100% correct. A quality check must be done to<br />
guarantee this.<br />
goal<br />
PG3 60% of all paper forms should be digital Hard<br />
goal<br />
PG4 75% of all err<strong>and</strong>s should be done through Internet (if it is possible to Hard<br />
use Internet for that kind of err<strong>and</strong>) – “My Account/My Page” will be an<br />
important part to fulfil these requirements<br />
goal<br />
PG5 35 new eServices should be created before the end of 2011 Hard<br />
goal<br />
Overall<br />
goal<br />
quality<br />
Contributes to<br />
MG5<br />
MG1, PG1<br />
MG4<br />
PG4, MG1<br />
Unclear whether there is an overall project goal <strong>and</strong> how the goals contribute to each other (unclear<br />
goal structure). High alignment with municipal goals (MG1, MG3 & MG4) although PG1 is identical<br />
to MG5 <strong>and</strong> PG5 is identical to parts of MG1. PG4 has to wide a scope <strong>and</strong> is therefore difficult to<br />
achieve within the project. Also PG5 is difficult to achieve within the project as it is the different<br />
departments, not the project, that decide if they want to develop eServices (c.p. Morasky’s statement<br />
that goals should focus on the receiving system). Moreover, PG4 contain both goal (end) <strong>and</strong><br />
task (mean). Also PG2, contain both goal <strong>and</strong> task. PG1, PG3 <strong>and</strong> also PG5 to some extent, lack<br />
tasks to fulfil them.<br />
4.4 Goal alignment in practice – a goal model<br />
In Table 1 to 3 alignments between goals at different levels are analyzed. Another way to analyze<br />
goals <strong>and</strong> clarify goal dependencies is by structuring them into goal models. The graphical representation<br />
enables a prompt overview of goals as a whole. A goal model over the goals at the municipal<br />
<strong>and</strong> the project level is shown in Figure 3. As shown in the figure, some goals, such as PG1 <strong>and</strong> PG3<br />
lack explicit tasks or a plan to fulfil them in the studied documents. Some of the goal statements are<br />
shortened to increase the readability. The municipal actions plan is here seen as a task to fulfil goals<br />
at national level, while the eService project is stated as a task in the municipality’s local actions plan<br />
for eGovernment. The notation from Bleistein et al. (2006a) has been extended with a symbol for ‘levels’<br />
to facilitate analysis of goals at different levels. Also a symbol for detecting identical goals was<br />
included; see the symbol legend in Figure 3.<br />
5. Conclusions<br />
5.1 Findings<br />
The purpose of this study is to investigate how goal modelling can be utilized to improve eService<br />
development in government by serving as a tool for evaluation. According to the case study, goal<br />
modelling facilitates an intentional <strong>and</strong> functional decomposition of goals. The ‘logical’ <strong>and</strong> complex<br />
chain of goals <strong>and</strong> means, from transnational to local level, may be clarified <strong>and</strong> improved. Ideally<br />
goals at lower levels are constructed to specify <strong>and</strong> contribute to goals at higher levels. Our study<br />
showed that the alignment between goals at different organizational levels in some cases where good<br />
but for other goals were weak or invisible. Overall, relatively few references were made to goals at<br />
superior levels in the studied documents. Goal modelling <strong>and</strong> analysis is thus valuable for identifying<br />
a lack of alignment between multi-level goals.<br />
317
Municipal level<br />
Develop an<br />
e‐office<br />
Project level<br />
A services catalogue<br />
should be created<br />
All services need to<br />
be documented<br />
<strong>and</strong> categorized<br />
Modell legend<br />
MG1. All services as e‐<br />
services within 5 years. 35<br />
new e‐Services until 2011<br />
PG5. 35 new e‐<br />
Services until 2011<br />
Monika Magnusson <strong>and</strong> Marie-Therese Christiansson<br />
MG5. Safe <strong>and</strong> reliable<br />
login for all citizens <strong>and</strong><br />
companies<br />
PG2. 100 % correct<br />
information in meta<br />
catalogue<br />
A quality check<br />
must be done<br />
MG4. All forms<br />
digital<br />
PG1. Safe <strong>and</strong> reliable<br />
login for all citizens <strong>and</strong><br />
companies<br />
Municipal<br />
action plan<br />
e‐Service project<br />
Develop channel<br />
strategies<br />
Mapping of<br />
business<br />
processes<br />
PG3. 60% of all<br />
paper forms<br />
should be digital<br />
MG3. E‐services<br />
should be designed<br />
to be easy to use<br />
Perform a needs’<br />
analysis<br />
PG4.75% of all err<strong>and</strong>s<br />
should be done through<br />
Internet<br />
A My Page<br />
citizens’ portal<br />
MG2. Start from the<br />
citizens’ <strong>and</strong> the<br />
businesses’ needs when<br />
planning e‐services<br />
Create a citizens’<br />
panel<br />
A My Page<br />
citizens’ portal<br />
Hard goal<br />
Soft goal Task<br />
Level boarder contribute to identical to Decomposition link<br />
Perform a<br />
citizens’ survey<br />
Figure 3: Goal model over goals at municipal <strong>and</strong> project level<br />
The benefits of <strong>using</strong> goal modelling are also that unclear, ambiguous, inadequate, unrealistic or misplaced<br />
goals can be identified, discussed <strong>and</strong> adjusted. Several goal at all three studied levels were<br />
difficult to underst<strong>and</strong> <strong>and</strong> interpret as they either contained several goals in one, or were fuzzy in<br />
nature; this complicates the fulfilling of the goals. Some goals were also found to be identical which is<br />
problematic as it may result in an ambiguous situation regarding who has responsibility <strong>and</strong> authority<br />
for achieving the goal, for assigning resources, carrying costs etc. Yet other goals were found to be<br />
hard if not impossible to achieve within the project as the target of the goals (see PG4 <strong>and</strong> PG5) were<br />
out of the ‘influential scope’ of the project. A possible solution is to reformulate the project goals to<br />
better fit the project’s authority or to change the projects ownership from the IT department to a higher<br />
organisational level. The latter was also decided shortly after our report was h<strong>and</strong>ed over.<br />
The perhaps most important benefit of goal modelling <strong>and</strong> analysis for eService development is its<br />
ability to facilitate the realization of goals <strong>and</strong> plans by visualising if <strong>and</strong> how goals <strong>and</strong> visions are<br />
decomposed into measurable objectives <strong>and</strong> concrete tasks. The case study revealed that several<br />
318
Monika Magnusson <strong>and</strong> Marie-Therese Christiansson<br />
important soft <strong>and</strong> hard goals were missing or implicit in all the studied documents for a clear-cut argumentation<br />
from eService vision to necessary tasks to occur. This weakens the transparency <strong>and</strong><br />
ability to communicate rationales for eServices. Several goals were also missing tasks to fulfil them<br />
which hinder the achievement of desired effects. Furthermore, we found a large gap in the intentional<br />
dependencies between several goal decompositions that suggest that ‘in-between-goals’ are needed.<br />
The line of argumentation from vision-soft goal to measurable objectives to tasks was thus weak at all<br />
levels. This may result in insecurity among citizens <strong>and</strong> employees regarding why actions are taken<br />
<strong>and</strong> whether they are appropriate.<br />
There are obviously also disadvantages with <strong>using</strong> goal modelling <strong>and</strong> analysis for evaluation of<br />
eServices. Among these are that it may be a time-consuming <strong>and</strong> costly undertaking as in reality not<br />
only the goal documents but also the people developing <strong>and</strong> <strong>using</strong> these preferably should take part<br />
in the analysis.<br />
5.2 Recommendations<br />
We suggest that project manager <strong>and</strong> policymakers should start with identifying goals at superior<br />
levels <strong>and</strong> then create strong chains of ends-means structures down to concrete, suitable <strong>and</strong> sufficient<br />
actions (tasks). An early modelling <strong>and</strong> evaluation in terms of goal clarity, goal levels, goal dependencies<br />
<strong>and</strong> goal logic (relations between soft goals, hard goals <strong>and</strong> tasks) in an eService project<br />
may improve the project’s success rate <strong>and</strong> prevent problems later on as it facilitates the detection of<br />
missing or inappropriate goals or tasks, <strong>and</strong> a poor alignment between goals.<br />
To strengthen the alignment between goals, we suggest <strong>using</strong> an ‘alignment matrix’ inspired by the<br />
‘three level model’ (Österle, 1995; Nilsson, 1999) <strong>and</strong> our finding as a complementary to the goal<br />
model. Ideally, the point of departure is the transnational <strong>and</strong> national level followed by the municipality<br />
level illustrated in Table 4. An example from Karlstad municipality case, of how a strategic soft goal<br />
can be refined into goals <strong>and</strong> tasks for the operational process- <strong>and</strong> system level is shown. Note that<br />
the goal or task statements ideally first should be ‘quality checked’ for clarity, scope etc.<br />
Table 4: The ‘alignment matrix’ for eService development<br />
Goal<br />
level,<br />
type &<br />
no.<br />
Goal or task statement in the organisation Contributes<br />
to<br />
Strategy level<br />
MG1 All services that the municipality offers <strong>and</strong> all the obligations that<br />
we impose on local residents to be executed, should be possible to<br />
conduct as eServices within five years, where it is feasible <strong>and</strong><br />
economically justified.<br />
NG1, NG4,<br />
NG5<br />
Refined by or<br />
decomposed<br />
into<br />
PG1, PG2,<br />
PG3, PG5<br />
etc.<br />
Process level<br />
PG5 35 new eServices until 2011 MG1 T1 - Tn<br />
T1 Develop an ‘e-office’ PG5<br />
System level<br />
PG1 Safe <strong>and</strong> reliable login – for all citizens (older than 15 years) <strong>and</strong><br />
companies in the municipality<br />
The matrix will serve as a tool for evaluating the alignment between goals at different conceptual organisational<br />
levels; strategy, process <strong>and</strong> system level. The ‘alignment matrix’ together with an extended<br />
goal model (see Figure 3) will establish an approach for planning, managing <strong>and</strong> evaluating<br />
eService development. We believe that this approach will be helpful in communicating the rationales<br />
for eServices as well as for motivating actions both within <strong>and</strong> outside the organisation <strong>and</strong> moreover,<br />
for bridging the gap between business strategy, business processes <strong>and</strong> eService solutions. Most<br />
importantly, this approach will improve the organisation’s ability to show transparency, communicate<br />
eService rationales <strong>and</strong> to work in a result-oriented way.<br />
References<br />
Alsaghier, H. Ford, M. Nguyen, A. <strong>and</strong> Hexel, R. (2009) “Conceptualising Citizen’s Trust in eGovernment: Application<br />
of Q Methodology”, Electronic Journal of eGovernment, Vol. 7, No. 4, pp. 295-310.<br />
Alpar, P. <strong>and</strong> Olbrich, S. (2005) “Legal Requirements <strong>and</strong> Modelling of Processes in eGovernment”, The Electronic<br />
Journal of eGovernment, Vol. 3, No. 3, pp. 107-116.<br />
319<br />
MG1
Monika Magnusson <strong>and</strong> Marie-Therese Christiansson<br />
Andersson, B., Bergholtz, M., Edirisuriya, A., Ilayperuma, T., Jayaweera, P., Johannesson, P. <strong>and</strong> Zdravkovic, J.<br />
(2008) “Enterprise Sustainability through the Alignment of Goal Models <strong>and</strong> Business Models”, Proceedings<br />
of BUSITAL 2008.<br />
Becker, J. Algermissen, L. <strong>and</strong> Niehaves, B. (2003) “Processes in EGovernment Focus: A Procedure Model for<br />
Process Oriented Reorganisation in Public Administrations on the Local Level”, in Traunmüller, R. (Ed.)<br />
Proceedings of EGOV 2003, Springer Lecturer Notes 2739, pp. 147-150.<br />
Bleistein, S.J., Cox, K., Verner, J. <strong>and</strong> Phalp, K.T. (2006a) “B-SCP: A requirements analysis framework for validating<br />
strategic alignment of organizational IT based on strategy, context, <strong>and</strong> process”, <strong>Information</strong> <strong>and</strong><br />
Software Technology, Vol. 48, pp. 846–868.<br />
Bleistein, S.J., Cox, K. <strong>and</strong> Verner, J. (2006b) “Validating strategic alignment of organizational IT requirements<br />
<strong>using</strong> goal modeling <strong>and</strong> problem diagrams”, The Journal of Systems <strong>and</strong> Software, Vol. 79, No. 3, pp. 362-<br />
378.<br />
Boyer, K.K., Hallowell, R. <strong>and</strong> Roth, A.V. (2002) “EServices: operating strategy – a case study <strong>and</strong> a method for<br />
analyzing operational benefits”, Journal of Operations management, Vol. 20, pp.175-188.<br />
Christiansson, M-T. <strong>and</strong> Christiansson, B. (2006) The Encounter between Processes <strong>and</strong> Components – Towards<br />
a Framework for a Close-to-Business Requirements Specification for Acquisition of Component-<br />
Based <strong>Information</strong> Systems, PhD thesis No. 14, Linköping University (in swedish).<br />
Christiansson, M-T. (2011) “Improving Business Processes <strong>and</strong> Delivering Better eServices - a Guide for Municipalities<br />
from Smart Cities” (forthcoming at http://www.smartcities.info/)<br />
Davenport, T. H. (1993) Process Innovation – Reengineering Work through <strong>Information</strong> Technology, Harvard<br />
Business School Press, Boston.<br />
European Commission (2010) The European eGovernment Action Plan 2011-2015,<br />
http://ec.europa.eu/information_society/activities/egovernment/action_plan_2011_2015/index_en.htm<br />
Gordijn, J., Yu, E. <strong>and</strong> van der Raadt, B. (2006) ”eService Design Using i* <strong>and</strong> e 3 value Modeling”, IEEE Software,<br />
Vol. 23, No. 3, pp. 26-33, May/June 2006.<br />
Karlstads kommun (2008a) "H<strong>and</strong>lingsplan och mål för e-förvaltning 2009-2011".<br />
Karlstad kommun (2008b) "Project description City of Karlstad - Work package 3", working document.<br />
Kavakli, E. (2004) “Modeling organizational goals: Analysis of current methods”, Proceedings of the 2004 ACM<br />
Symposium on Applied Computing, Nicosia, CY, March 2004, pp. 1339 - 1343<br />
Melin, U. <strong>and</strong> Axelsson, K. (2009) “Managing eService development – comparing two eGovernment case studies”,<br />
Transforming Government: People, Process <strong>and</strong> Policy”, Vol. 3, No.3, pp. 248-270.<br />
Morasky, R.L. “Defining goals—a systems approach”, Long Range Planning Vol.10, No. 2 (April 1977), pp. 85–<br />
89.<br />
Nilsson, A.G. (1999). “The Business Developer’s Toolbox: Chains <strong>and</strong> Alliances between Established Methods”,<br />
in Nilsson, A.G., Tolis, C. <strong>and</strong> Nellborn, C. (eds). Perspectives on Business Modelling: Underst<strong>and</strong>ing <strong>and</strong><br />
Changing Organisations. Berlin: Springer.<br />
Regeringskansliet (2008) "H<strong>and</strong>lingsplan för e-förvaltning - Nya grunder för IT-baserad verksamhetsutveckling i<br />
offentlig förvaltning". http://www.regeringen.se/content/1/c6/09/65/12/4ffd1319.pdf (accessed at 2011-03-<br />
15).<br />
Schneider, G. P. (2003) Electronic Commerce (4 ed.). Boston, MA: Thomson Learning Inc.<br />
Österle, H. (1995) Business in the <strong>Information</strong> Age – Heading for New Processes. Berlin: Springer.<br />
320
Alignment in Enterprise Architecture: Investigating the<br />
Aspects of Alignment in Architectural Approaches<br />
Thanos Magoulas, Aida Hadzic, Ted Saarikko <strong>and</strong> Kalevi Pessi<br />
IT University of Göteborg, Sweden<br />
thanos.magoulas@ituniv.se<br />
aida.hadzic@gu.se<br />
ted.saarikko@ituniv.se<br />
kalevi.pessi@ituniv.se<br />
Abstract: The purpose of this paper is to take a first step in remedying the dearth of rational appraisal of<br />
approaches to Enterprise Architecture by closer examining a h<strong>and</strong>ful of guides <strong>and</strong> frameworks. Our ultimate aim<br />
in this inquiry is to provide knowledge about the various dimensions of enterprise architectures that dem<strong>and</strong><br />
alignment between its constitutionals parts. Therefore the efforts of our study were focused on elucidating the<br />
following issue: How are the various forms <strong>and</strong> aspects of architectural alignment treated by the investigated<br />
approaches to Enterprise Architecture? Due to the lack of commonalities between the assorted approaches, an<br />
independent metric is required. We therefore utilize the concept of alignment <strong>and</strong> analyze how the various forms<br />
<strong>and</strong> aspects of architectural alignment are treated by formalized approaches to Enterprise Architecture. This<br />
methodology was applied to the Zachman Framework, The Open Group Architecture Framework (TOGAF), the<br />
Extended Enterprise Architecture Framework (E2AF) <strong>and</strong> the Generalised Enterprise Reference Architecture <strong>and</strong><br />
Methodology (GERAM). Our investigation clearly demonstrates that: 1) Approaches to Enterprise Architecture<br />
provide guidance for socio-structural <strong>and</strong> functional alignment, but not for infological or socio-cultural alignment.<br />
2) The area of contextual alignment is described by all investigated approaches as being free from barriers in<br />
general <strong>and</strong> functional barriers in particular. Some – but not all – forms of contextual alignment are established<br />
through contractual agreements. 3) None of the investigated approaches discuss the mutual interdependence<br />
that exists between the various forms of alignment.<br />
Keywords: enterprise architecture, architectural alignment, Zachman framework, TOGAF, E2AF, GERAM<br />
1. Introduction<br />
The organizations of today are facing a world fraught with uncertainty. Increasingly capricious <strong>and</strong><br />
dem<strong>and</strong>ing consumers necessitate careful consideration in to which products or services to offer at<br />
any given time. Meanwhile, competition is no longer limited to a geographical region as corporations<br />
are able to vie for business on a global market. The traditional modus oper<strong>and</strong>i based on comm<strong>and</strong><br />
<strong>and</strong> control is no longer able to satisfy the needs of the modern enterprise in this brave new world of<br />
opportunism <strong>and</strong> innovation.<br />
It is clear that the modern organization needs a new blueprint in order to stay ahead of the game – or<br />
at the very least stay in the game. To this end, much attention has been paid to Enterprise<br />
Architecture over the past couple of decades – not just as a means to improve competitiveness, but<br />
also to reduce complexity, increase changeability, provide a basis for evaluation et cetera.<br />
A literary review by Schöenherr (2009) clearly shows that the level of interest in Enterprise<br />
Architecture is indeed increasing. Although rather limited in scope when originally coined by John<br />
Zachman (1987), the concept has since then been exp<strong>and</strong>ed <strong>and</strong> interpreted by academia as well as<br />
the private <strong>and</strong> public sectors. The different views on how to approach Enterprise Architecture are<br />
often documented <strong>and</strong> compiled into “guides” or “frameworks” which are intended to instruct<br />
practitioners in how to apply this concept to their organization. However, the numerous approaches all<br />
present disparate views on what exactly Enterprise Architecture entails <strong>and</strong> how it is best<br />
administered (Rood 1994, Whitman et al 2001, Sessions 2007, Schöenherr 2009). This essentially<br />
leaves the practitioner in the dark as the approaches offer virtually no common ground, no common<br />
language <strong>and</strong> no common orientation on which to base a comparison.<br />
The purpose of this paper is to take a first step in remedying the dearth of rational appraisal of<br />
approaches to Enterprise Architecture by closer examining a h<strong>and</strong>ful of guides <strong>and</strong> frameworks. Due<br />
to the lack of commonalities, we intend to utilize the concept of alignment as a metric. Alignment is<br />
said to describe the condition of IS/IT being in harmony with business needs (Henderson <strong>and</strong><br />
Venkatraman 1992). This would not only ensure full utilization of resources, but also drive synergic<br />
effects (Luftman et al 1996, Papp 2001) – a situation very much in conformity with the aims of<br />
Enterprise Architecture. Succinctly put, we wish to analyze following question: How are the various<br />
321
Thanos Magoulas, Aida Hadzic, Ted Saarikko <strong>and</strong> Kalevi Pessi<br />
forms <strong>and</strong> aspects of architectural alignment treated by the investigated approaches to Enterprise<br />
Architecture?<br />
2. Research methodology<br />
The approaches addressed in this paper are the Zachman Framework (Zachman 1987, Sowa <strong>and</strong><br />
Zachman 1992), The Open Group Architecture Framework - TOGAF (TOGAF 2009), the Extended<br />
Enterprise Architecture Framework – E2AF (Schekkerman 2006:a, 2006:b, 2006:c) <strong>and</strong> the<br />
Generalised Enterprise Reference Architecture <strong>and</strong> Methodology - GERAM (Bernus <strong>and</strong> Nemes<br />
1994, GERAM 2003). The first <strong>and</strong> second of these frameworks were elected due to their popularity,<br />
E2AF due to its explicit focus on the extended enterprise <strong>and</strong> GERAM due to its focus on<br />
customization.<br />
The study at h<strong>and</strong> has been conducted <strong>using</strong> the best, first-h<strong>and</strong> literary sources available. It is<br />
however possible that some documentation regarding these approaches is unavailable due to for<br />
instance intellectual property or fragmented documentation.<br />
Given the inherent difficulties in the comparison this paper seeks to carry out, the most meaningful<br />
approach would be to apply the approaches to actual organizational needs <strong>and</strong> practices. Therefore,<br />
as a baseline for our evaluation, this comparison will utilize the MIT1990s framework for<br />
organizational research (Morton 1991). Furthermore, we will exp<strong>and</strong> upon this model <strong>using</strong> research<br />
by (Dahlbom 1996, Magoulas <strong>and</strong> Pessi, 1998, Spanos et al 2002).<br />
2.1 Research model<br />
Our research model defines the realized architecture of an enterprise in five basic areas of interests.<br />
They are: (1) the area of goals, objectives <strong>and</strong> values, (2) the area of enterprise activities <strong>and</strong> their<br />
management, (3) the area of decisional rights <strong>and</strong> responsibilities, (4) the area of primary<br />
stakeholders <strong>and</strong> lastly, (5) the area of information systems <strong>and</strong> the corresponding ICT. These<br />
resources together define the information infrastructure of the enterprise.<br />
Figure 1: Model for research<br />
From the perspective of alignment, information systems <strong>and</strong> <strong>Information</strong> <strong>and</strong> Communication<br />
Technology (ICT) forms a natural centre as this area permeates all aspects of the enterprise. While<br />
information systems today tend to be computerized, the essential feature is its emphasis on proper<br />
procedure (Putnam 1966). If collectively viewed, the architecture of information systems defines those<br />
systems that provide the enterprise with information <strong>and</strong> services. These may be transactional,<br />
322
Thanos Magoulas, Aida Hadzic, Ted Saarikko <strong>and</strong> Kalevi Pessi<br />
relational, informative, decisional or innovative in nature (Magoulas <strong>and</strong> Pessi, 1998). This area<br />
covers activities such as project planning, project management, modelling, architectural design <strong>and</strong><br />
simulation.<br />
2.2 Aligning the constitutional parts of an Enterprise Architecture<br />
The concept of alignment has been expressed in several ways. As a result, alignment is treated<br />
synonymously to the following ideas: (1) fit, (2) link, (3) harmony, (4) balance, (5) fusion, (6)<br />
integration, (7) relationship, (8) compatibility <strong>and</strong> (9) conformity (see for instance Avison et al 2004).<br />
However, within the context of informatics, the concept of alignment is given in terms of harmonious<br />
relationships between two areas of interest in general <strong>and</strong> the enterprise as a whole in particular. In<br />
the latter case, the alignment is called contextual <strong>and</strong> we discuss it briefly later on.<br />
A sense of socio-cultural alignment<br />
Whereas goals <strong>and</strong> objectives usually take the shape of a hierarchy, other aspects like values, norms,<br />
culture et cetera define the conditions under which this hierarchy is formed (Hedberg 1980, Langefors<br />
1975, 1986). The social organization should therefore not limit its concerns to profitability, but must<br />
also promote a favorable environment for the individuals that work towards collective goals (Ackoff<br />
1967, Hedberg 1980).<br />
Socio-cultural alignment is reflected in the harmonious nature of relationships between the areas of<br />
information systems <strong>and</strong> the areas of goals, objectives <strong>and</strong> values. The crucial assumption here is<br />
that information <strong>and</strong> knowledge is the glue that holds business <strong>and</strong>/or social communities together<br />
(Magoulas <strong>and</strong> Pessi, 1998). Such alignment can be defined as:<br />
Stakeholders Expectation (Time) = Delivered contributions (Time)<br />
The notion is to determine how shared values, mutual goal-commitments <strong>and</strong> collaborative behaviour<br />
are addressed within the enterprise. The soundness of the socio-cultural alignment may be expressed<br />
<strong>and</strong> assessed in terms of cultural feasibility, i.e. shared values <strong>and</strong> priorities, social feasibility, codetermination,<br />
shared visions, shared goals as well as continuity of mutual commitments.<br />
Furthermore, it is of profound interest to determine the manner in which the organization settles upon<br />
its common goals.<br />
A sense of functional alignment<br />
An enterprise activity may also be described as a process in that it involves a group of activities<br />
organised in such way as to produce a certain product or service. Thus, any form of process<br />
transforms a certain object from a certain state to another desired or expected state (McKenzie 1984).<br />
Processes require resources, tools, skills et cetera, which all require coordination. The need for<br />
coordination may further increase if there are interdependencies among several processes.<br />
Functional alignment is a state of harmonious relationships between the area of information systems<br />
<strong>and</strong> the area of activities <strong>and</strong> processes. The fundamental assumption here is that information <strong>and</strong><br />
knowledge are critical <strong>and</strong> in many cases strategic resources (Magoulas <strong>and</strong> Pessi, 1998). Such an<br />
alignment can be defined in the following manner:<br />
Required information capabilities (Time) = Available information capabilities (Time)<br />
The equation represents the essentials of Galbraith’s (1973, 1977) contingency theory, <strong>and</strong><br />
essentially expresses the necessity for the enterprise to satisfy its need for information in a timely<br />
manner.<br />
Any form of informational activity performed by the systems may be seen as a non-separated part of<br />
an enterprise activity. In several approaches, enterprise processes are treated as the "creator" as well<br />
as "user" of information. In other words, while the quality of information systems depends on the<br />
quality of enterprise processes, the quality of enterprise processes depends on the quality of<br />
information systems.<br />
323
Thanos Magoulas, Aida Hadzic, Ted Saarikko <strong>and</strong> Kalevi Pessi<br />
The dimension of functional alignment ultimately boils down to issues of co-ordinated development,<br />
i.e. how the development of the information systems has been synchronized with the development of<br />
enterprise processes. The soundness of functional alignment should therefore be based on process<br />
effectiveness; support, flexibility, inter-dependency, quality improvement, degree of required coordination,<br />
degree of required synchronisation <strong>and</strong> economy.<br />
A sense of socio-structural alignment<br />
Usually, decisional rights <strong>and</strong> responsibilities are the result of design rather than cultivation. This is<br />
either achieved through the decomposition of enterprise ends into a comprehensible structure of<br />
elementary task-based units (Simon 1962, 1969), or the integration of existing task-based units into a<br />
comprehensible structure of authority <strong>and</strong> responsibilities (Churchman 1971). At any moment in time<br />
the structure is expected to simultaneously satisfy expectations from society as well as systemic<br />
desirability (Checkl<strong>and</strong> 1981, Hedberg 1980).<br />
Socio-structural alignment defines <strong>and</strong> integrates the area of information systems with the area of<br />
power, i.e. sources of authorities <strong>and</strong> responsibilities. The crucial assumption here is that information<br />
<strong>and</strong> knowledge are significant sources of power (Magoulas <strong>and</strong> Pessi, 1998). Therefore the concept<br />
of “<strong>Information</strong> Politics” used by Davenport (1997) reflects the very same issues as socio-structural<br />
alignment. In any case, socio-structural alignment concerns the harmonious relationships between the<br />
structure of power <strong>and</strong> the information systems. Such alignment can be defined as:<br />
Established socio-structure = Accepted socio-structure<br />
A balanced equation means that the established socio-structure is accepted by the stakeholders of<br />
the enterprise. A misaligned socio-structure can manifest itself in terms of conflicts, alienation,<br />
absenteeism, et cetera (Hedberg 1980, Davenport 1997). However, this form of alignment is impacted<br />
by the requisites of comprehensibility. A lack of comprehensibility leads to inability to manage both<br />
processes <strong>and</strong> information. Therefore, rather than technological sophistication, the requisite of<br />
simplicity (<strong>and</strong> efficiency) of processes should dominate the structuring of the enterprise.<br />
Furthermore, the structure of information-flows should map the boundaries of responsibilities.<br />
Unclear, complex <strong>and</strong> incomprehensible information structures lead to loss of manageability. There is<br />
a broad consensus regarding the various models that promote or inhibit the socio-structural<br />
alignment. Among the more commonly referenced are: Business monarchy, IT-utopia, federalism,<br />
feudalism, dualism <strong>and</strong> anarchism (Davenport 1997, Weill et al. 2006, Boddy 2009).<br />
A sense of infological alignment<br />
The stakeholders are the backbone of all organisations. They may be executives, employees, support<br />
staff, customers, suppliers, shareholders, local communities or other groups concerned with the<br />
enterprise. The stakeholders are the source of knowledge <strong>and</strong> experience as well as conflict due to<br />
their individuality. Since individuality may clash with the participatory nature of systems one might<br />
describe the most significant qualities of stakeholders in terms of collaboration, communication <strong>and</strong><br />
commitment (Ackoff 1967, Checkl<strong>and</strong>, 1981).<br />
Infological alignment reflects the harmonious relationships between the area of information systems<br />
<strong>and</strong> the area of the individual stakeholders. The basic assumption in this case is that information is<br />
knowledge communicated through our language (Langefors 1975, 1986).<br />
Infological alignment expresses the requisites for locality, comprehensibility <strong>and</strong> meaningfulness.<br />
Cognitive distance, working styles, decision styles, communicative styles <strong>and</strong> perspectives can be<br />
seen as significant factors for the actors’ willingness to use <strong>and</strong> accept the information systems. Such<br />
alignment can be expressed as:<br />
Required information = Provided information + extra information<br />
However, information is knowledge communicated through the use of data. Accordingly, infology<br />
comprises different approaches to further sound communication. Yet communicating information<br />
outside its natural (local) boundaries can be problematic (Langefors 1975, 1986, Hugoson 1989,<br />
1990, Magoulas <strong>and</strong> Pessi, 1998). In many cases the communication of information requires<br />
324
Thanos Magoulas, Aida Hadzic, Ted Saarikko <strong>and</strong> Kalevi Pessi<br />
additional information. Furthermore, the value of information <strong>and</strong> information systems depend entirely<br />
on the effects that these tools have on the individual <strong>and</strong> his social surrounding.<br />
Not all kinds of information can be universally communicated. The globalisation of information should<br />
receive specific treatment <strong>and</strong> should be established through negotiation (Hugoson 1989). <strong>Information</strong><br />
systems should support the learning processes that take place within the functions of the<br />
organisation. Hence, st<strong>and</strong>ard operating procedures should be avoided as much as possible –<br />
especially in dynamic environments. Lastly, the goodness of infological integration can be measured<br />
in terms of infological completeness; that is to say a clear <strong>and</strong> unequivocal underst<strong>and</strong>ing of means<br />
<strong>and</strong> ends. A state of infological alignment can thus be demonstrated when information conforms to<br />
the tacit knowledge of actors in terms of validity, functionality <strong>and</strong> relevance (Langefors 1975, 1986,<br />
Mendelson 2000, Argyris 1980, Hewitt 1986, Ackoff 1967, Simon 1962, 1969).<br />
A sense of contextual alignment<br />
Contextual alignment concerns the harmonious relationships between the enterprise as a whole, its<br />
information systems <strong>and</strong> its external environment. The concerned relationships have only an indirect<br />
impact on the information systems <strong>and</strong> the different areas of interests. These areas may at first<br />
glance seem unrelated, but since the flow of information permeates the organization, it is necessary<br />
to be mindful of the subtle manner in which different areas influence one another. Contextual<br />
alignment also includes the enterprise’s boundaries as well as its interaction with its environment<br />
(Tichy, 1983). Although it may be difficult (or even impossible) for the organization to affect any change<br />
beyond the limits of its enterprise areas, one should be mindful of opportunities <strong>and</strong> impediments as<br />
they are usually the impetus for organizational change. Such alignment can be defined as:<br />
Expected enterprise behavior = Observed enterprise behavior<br />
Those factors that relate to the indirect interaction between organizational areas as well as<br />
environmental circumstances are critical to attaining contextual alignment.<br />
3. A comparative analysis of approaches<br />
The tables below express the manner in which the investigated approaches address the various<br />
aspects of the various forms of alignment. In this sense, a clear view of alignment denotes that the<br />
covered aspects are well understood <strong>and</strong> in harmony with the expectations of the stakeholders,<br />
whereas an unclear view depicts a fuzzy or incomprehensible state of alignment.<br />
3.1 Socio-cultural alignment<br />
The socio-cultural alignment reflects a harmonious contribution of the information systems & ICT to<br />
the ever changing expectations of the internal as well as external stakeholders of the enterprise. In<br />
many cases, the lack of socio-cultural guidelines can be attributed to the underlying paradigms of the<br />
investigated approaches. That is to say, some approaches presuppose that information resources<br />
should be treated as independent of organization <strong>and</strong> culture.<br />
Table 1: View of the socio-cultural alignment<br />
View of the<br />
socio-cultural<br />
alignment<br />
Clear<br />
Unclear<br />
ZACHMAN TOGAF GERAM<br />
Insufficient guidance<br />
regarding relationship<br />
between IS <strong>and</strong> ICT to<br />
objectives of planner<br />
<strong>and</strong> owner.<br />
Insufficient details<br />
offered regarding<br />
“maximum<br />
enterprise<br />
benefits”.<br />
325<br />
Alignment based on<br />
requirements of IT<br />
<strong>and</strong> business rather<br />
than objectives.<br />
E2AF<br />
Collective needs of<br />
the extended<br />
enterprise should be<br />
satisfied, but little<br />
practical guidance.
Thanos Magoulas, Aida Hadzic, Ted Saarikko <strong>and</strong> Kalevi Pessi<br />
3.2 Sociostructural alignment<br />
The socio-structural alignment reflects a harmonious situation where the information systems & ICT<br />
capabilities are characterized by a clear, comprehensible, <strong>and</strong> accepted form of authority <strong>and</strong><br />
responsibility. The fuzziness of structural alignment is derived from the propensity of approaches to<br />
describe the area of authority <strong>and</strong> responsibilities rather than the relationships between the concerned<br />
area <strong>and</strong> its relationship to area of information systems. Another source of misgivings is the paradigm<br />
underlying each one of investigated approaches. Some approaches presuppose that information<br />
resources should be treated as independent of organization <strong>and</strong> structure.<br />
Table 2: View of the socio-structural alignment<br />
View of the<br />
sociostructural<br />
alignment<br />
Clear<br />
Unclear<br />
ZACHMAN TOGAF GERAM<br />
Insufficient or<br />
missing guidance<br />
regarding the areas<br />
of authority <strong>and</strong><br />
responsibilities with<br />
the areas of IS &<br />
ICT.<br />
Based on governance<br />
contracts, IT<br />
responsibility, Data<br />
trustee, Ownership of<br />
common app.<br />
Insufficient guidance<br />
regarding the<br />
relationship between<br />
the area of<br />
responsibility <strong>and</strong> the<br />
business objectives.<br />
View of<br />
responsibilities &<br />
roles of functional<br />
areas.<br />
Insufficient<br />
guidance regarding<br />
harmonization of<br />
control over<br />
operations with the<br />
capabilities of IS &<br />
ICT.<br />
E2AF<br />
Offers guidance<br />
based on level of<br />
influence of<br />
concerned<br />
stakeholders.<br />
3.3 Functional alignment<br />
The functional alignment concerns the harmonious contribution of available information systems &<br />
ICT capabilities to the information, service, transactions, <strong>and</strong> relations required by either the business<br />
processes or business units of the enterprise. Some forms of obscurity or incomprehensibility are<br />
based on the fact that the approaches refer to the architecture of just one information system that<br />
serves the whole enterprise <strong>and</strong> its surroundings. Another cause for doubt is due to the fact that the<br />
investigated approaches describe a constitutional areas of enterprise (in this case processes) rather<br />
than the relationships to other areas.<br />
Table 3: View of the functional alignment<br />
View of the<br />
functional<br />
alignment<br />
Clear<br />
Unclear<br />
ZACHMAN TOGAF GERAM<br />
Insufficient guidance<br />
regarding business<br />
processes <strong>and</strong> the<br />
area of information<br />
<strong>and</strong> ICT.<br />
Alignment ensured<br />
by operational<br />
contracts between<br />
customers of <strong>and</strong><br />
providers.<br />
Insufficient guidance<br />
on how services are<br />
integrated into<br />
business processes<br />
<strong>and</strong> subsequently<br />
implemented.<br />
326<br />
Harmonization<br />
between required IS<br />
services <strong>and</strong><br />
provided IS services.<br />
Insufficient guidance<br />
regarding the<br />
modelling of the<br />
various entities of an<br />
enterprise.<br />
E2AF<br />
Alignment between<br />
business processes<br />
& IS ensured<br />
through basic<br />
principles.
3.4 Infological alignment<br />
Thanos Magoulas, Aida Hadzic, Ted Saarikko <strong>and</strong> Kalevi Pessi<br />
The infological alignment concerns the sound use of the available information systems & ICT<br />
capabilities to support <strong>and</strong> satisfy the required informational, service, transactional <strong>and</strong> relational<br />
needs of human stakeholders. In many cases, the infological doubtfulness can be explained in terms<br />
of the paradigm underlying each one of investigated approaches. That is to say, some approaches<br />
presuppose that the meaning of information should be independent of human interpretation since<br />
“facts are always facts”.<br />
Table 4: View of the infological alignment<br />
View of the<br />
infological<br />
alignment<br />
Clear<br />
Unclear<br />
ZACHMAN TOGAF GERAM<br />
Insufficient guidance<br />
regarding how<br />
information<br />
requisites such as<br />
quality, availability,<br />
comparability,<br />
consistency, etc. are<br />
treated.<br />
3.5 Contextual alignment<br />
Insufficient guidance<br />
of to avoid<br />
information paradox<br />
<strong>and</strong> still promote<br />
sharing <strong>and</strong><br />
availability of data.<br />
Insufficient guidance<br />
on how to align<br />
stakeholders to IS<br />
<strong>and</strong> ICT.<br />
Insufficient guidance<br />
on aligning human<br />
capabilities, mental<br />
models, etc <strong>and</strong> IS<br />
capabilities.<br />
E2AF<br />
Collective<br />
underst<strong>and</strong>ing<br />
established through<br />
communication<br />
between internal<br />
external<br />
stakeholders.<br />
The most essential property of contextual alignment is given in terms of harmony between the<br />
external <strong>and</strong> internal environments of the enterprise. The rise of new approaches to Enterprise<br />
Architecture merely expresses the goodness of architecture in terms of external (i.e. extrinsic) <strong>and</strong><br />
internal (i.e. intrinsic) values. Contextual harmony fills in the blanks with regards to the plurality of<br />
legal regulations, principles of intellectual property, plurality of languages used within the external <strong>and</strong><br />
internal environment of the enterprise et cetera.<br />
Table 5: View of the contextual alignment<br />
View of<br />
the<br />
contextual<br />
alignment<br />
Clear<br />
ZACHMAN TOGAF GERAM<br />
Alignment between EA<br />
<strong>and</strong> governance<br />
established through<br />
operational <strong>and</strong><br />
governance contracts.<br />
The enterprise must be<br />
aligned with regulations<br />
<strong>and</strong> laws <strong>and</strong> take<br />
intellectual property into<br />
consideration.<br />
327<br />
Securing architectural<br />
alignment between<br />
areas of enterprise by<br />
crossing functional<br />
barriers.<br />
Integration <strong>and</strong><br />
interoperability<br />
between the<br />
heterogeneous<br />
environments of<br />
enterprise.<br />
E2AF<br />
Approach<br />
advocates<br />
economic, legal,<br />
ethical <strong>and</strong><br />
discretionary<br />
viewpoints.<br />
Strong emphasis<br />
on external<br />
partners.
View of<br />
the<br />
contextual<br />
alignment<br />
Unclear<br />
4. Discussion<br />
Thanos Magoulas, Aida Hadzic, Ted Saarikko <strong>and</strong> Kalevi Pessi<br />
ZACHMAN TOGAF GERAM<br />
Insufficient guidance<br />
regarding how IS<br />
relates to the<br />
enterprise <strong>and</strong> its<br />
surrounding<br />
environment.<br />
Unclear guidance as<br />
to how the parts of<br />
the architecture fit<br />
together.<br />
Unsatisfactory<br />
guidance regarding<br />
how the architecture<br />
is aligned with the<br />
laws of humanity<br />
rather than the laws<br />
of nature.<br />
Framework does not<br />
cover issues of<br />
alignment between<br />
business & IT strategy.<br />
Insufficient guidance<br />
regarding how the<br />
alignment between EA<br />
& enterprise purposes<br />
is established.<br />
Scarce guidance<br />
regarding how the<br />
alignment between EA<br />
& its implementation is<br />
managed.<br />
Insufficient guidance<br />
regarding how the role<br />
of IS promotes the<br />
responsiveness of the<br />
enterprise to<br />
environmental<br />
changes.<br />
E2AF<br />
Lack of guidance<br />
regarding how to<br />
manage conflicting<br />
expectations <strong>and</strong><br />
viewpoints of<br />
partners.<br />
The common denominator of any enterprise architecture is given in terms of various forms of sound<br />
alignment between its constitutional parts. Thus, without alignment any sense of architecture<br />
disappears. Hence, the ultimate aim of our efforts was to improve the existing body of knowledge<br />
offered by the investigated approaches (frameworks, methods, reference models, et cetera). Each<br />
one of the concerned approaches provides system of concepts, principles, guidelines <strong>and</strong>/or values<br />
that is intended to support any effort in the process of designing, developing implementing <strong>and</strong><br />
evaluating an enterprise architecture that is capable of maintaining alignment between its<br />
constitutional parts. Thus, our focus has been to clarify how each one of the investigated approaches<br />
treats the issues associated with alignment. This section briefly discusses the manner in which the<br />
investigated approaches treat socio-structural, functional, infological, socio-cultural <strong>and</strong> contextual<br />
alignment.<br />
Firstly, the analysis of functional alignment demonstrates that three of the four approaches: TOGAF,<br />
GERAM <strong>and</strong> E2AF have a clear <strong>and</strong> strong reference to the different aspects of functional alignment.<br />
However the treatment of alignment provided by the Zachman framework approach is both unclear<br />
<strong>and</strong> weak.<br />
Secondly, the analysis of socio-structural alignment confirms that three of the four approaches:<br />
TOGAF, GERAM <strong>and</strong> E2AF have a clear <strong>and</strong> strong reference to the different aspects of structural<br />
alignment. Again, the approach to alignment provided by the Zachman framework approach is both<br />
doubtful <strong>and</strong> weak.<br />
Thirdly, the analysis of infological alignment shows that only one of the investigated approaches,<br />
namely E2AF, offers clear <strong>and</strong> strong guidance with regards to infological alignment. Accordingly, the<br />
approach to alignment provided by the three other approaches, the Zachman framework, TOGAF <strong>and</strong><br />
GERAM, was either doubtful or brief with few clear guidelines.<br />
Fourthly, the analysis of socio-cultural alignment shows that none of the investigated approaches<br />
provide strong <strong>and</strong> clear guidance with regards to socio-cultural alignment.<br />
Lastly, the analysis of the contextual alignment shows that three of the investigated approaches,<br />
TOGAF, GERAM, <strong>and</strong> E2AF, provide a comprehensive <strong>and</strong> strong view of alignment. However the<br />
Zachman framework does not provide sound guidelines.<br />
328
Thanos Magoulas, Aida Hadzic, Ted Saarikko <strong>and</strong> Kalevi Pessi<br />
It also bears mentioning that the Sc<strong>and</strong>inavian school of thought carries with it explicit consideration<br />
of alignment between the hard & soft aspects (please see figure 2) of design in general <strong>and</strong> EA in<br />
particular. Yet practical examples of architectures that align hard <strong>and</strong> soft aspects can also be found<br />
within international companies such as Xerox (Howard 1992).<br />
Figure 2: The hard & soft aspects of the architecture<br />
5. Conclusions<br />
The primary aim of this inquiry has been: How are the various forms <strong>and</strong> aspects of architectural<br />
alignment treated by the investigated approaches to Enterprise Architecture? This issue has been<br />
investigated with respect to socio-cultural, socio-structural, functional, infological <strong>and</strong> contextual<br />
alignment. Our study has provided us with the following conclusions:<br />
Firstly, our investigation clearly demonstrates that approaches to Enterprise Architecture provide<br />
guidance for socio-structural <strong>and</strong> functional alignment, but less so for infological or socio-cultural<br />
alignment. A possible explanation may be that investigated approaches follow a paradigm that<br />
dem<strong>and</strong>s the independence of information <strong>and</strong> information systems from, cognitive, organizational<br />
<strong>and</strong> technological aspects, (as explained by Brancheau, J.C <strong>and</strong> Wetherbe, J.C, (1986)). Another<br />
interpretation of the same issue is that investigated approaches are derived from a tradition of<br />
engineering design rather than architectural design. This would account for the focus on requirements<br />
<strong>and</strong> constraints found in the “hard” aspects of the enterprise, rather than the “softer” aspects such as<br />
goals <strong>and</strong> decision making that characterizes architectural design.<br />
Secondly, the area of contextual alignment is described by all investigated approaches as being free<br />
from barriers in general <strong>and</strong> functional barriers in particular. Some – but not all – forms of contextual<br />
alignment are established through contractual agreements. This is presumably in response to the<br />
heterogeneity inherent to most environments. Some approaches explicitly mention the requisite to<br />
respect regulations <strong>and</strong> laws.<br />
Finally, none of the investigated approaches discuss the mutual interdependence that exists between<br />
the various forms of alignment. However, the architectural patterns of the enterprise are the result of<br />
organizational forces rather than rationality. This follows previous research by Mintzberg (1989).<br />
References<br />
Ackoff, R. L. (1967) <strong>Management</strong> Misinformation Systems. <strong>Management</strong> Science,Vol. 4, No. 4.<br />
Argyris, C. (1980) Some Inner Contradictions in <strong>Management</strong> <strong>Information</strong> Systems. I H. Lucas, F. L<strong>and</strong>, T.<br />
Lincoln och K. Supper, red. The <strong>Information</strong> Systems Environment, North-Holl<strong>and</strong>.<br />
329
Thanos Magoulas, Aida Hadzic, Ted Saarikko <strong>and</strong> Kalevi Pessi<br />
Avison, D., Jones, J., Powell, P., Wilson, D. (2004) Using <strong>and</strong> validating the strategic alignment model, Journal of<br />
Strategic <strong>Information</strong> Systems, 223-246<br />
Bernus, P. <strong>and</strong> Nemes, L. (1994) A Framework to Define a Generic Enterprise Reference Architecture <strong>and</strong><br />
Methodology. In Proceedings of the International Conference on Automation, Robotics <strong>and</strong> Computer Vision<br />
(ICARCV'94), Singapore, November 10–12, 1994.<br />
Boddy, D., Boonstra, A., Kennedy, G. (2009) Managing <strong>Information</strong> Systems, Strategy <strong>and</strong> Organisation.<br />
Pearson Education, Third edition<br />
Brancheau, J.C , Wetherbe, J.C, (1986). <strong>Information</strong> Architectures: Methods <strong>and</strong> practice, <strong>Information</strong> Processing<br />
& <strong>Management</strong> Vol. 22, No. 6, pp. 453-463<br />
Checkl<strong>and</strong>, P. (1981). Systems Thinking, Systems Practice, John Wiley & Sons.<br />
Churchman C.W. (1971). The design of inquiring systems: basic conscept of systems <strong>and</strong> organization, Basic<br />
Books, New York<br />
Dahlbom, B. (1996). The new informatics, Sc<strong>and</strong>inavian journal of <strong>Information</strong> systems, volume 8, issue 2<br />
Davenport, T. (1997). <strong>Information</strong> ecology, Oxford University press.<br />
Galbraith, J. R. (1973). Designing Complex Organizations, Addison-Wesley.<br />
Galbraith, J. R. (1977). Organizational Design, Addison-Wesley.<br />
GERAM. (2003) The Generalised Enterprise Reference Architecture <strong>and</strong> Methodology: Version 1.6.3 (Final).<br />
IFIP-IFAC Task force on Architectures for Enterprise Integration. In Bernus, P., Nemes, L. <strong>and</strong> Schmidt, G.<br />
(Eds.) H<strong>and</strong>book on Enterprise Architecture. Springer-Verlag, Berlin.<br />
Hedberg, B. (1980). Using Computerized <strong>Information</strong> Systems to Design Better Organization <strong>and</strong> Jobs. I N.<br />
Bjørn-Andersen, red. The Human Side of <strong>Information</strong> Processing, North-Holl<strong>and</strong>.<br />
Henderson, J., Venkatraman, N. Strategic Alignment: A model for organizational transformation through<br />
information technology, T. Kochan & M. Unseem, eds, Transforming Organizations, Oxford University<br />
Press, NY, 1992.<br />
Hewitt, C. (1986). Offices are Open Systems. ACM Transactions on Office <strong>Information</strong> Systems, Vol. 4, No. 3.<br />
Howard, R. (1992). The CEO as Organizational Architect: An Interview with Xerox’s Paul Allaire. Harvard<br />
Business Review, September-October 1992.<br />
Hugoson, M-Å. (1989) A System of Systems: A theory of information systems Architecture <strong>and</strong> Interaction.<br />
Strukturering av informationsystem, Chalmers tekniska högskola, Göteborg, SVING & SVIG<br />
Hugoson, M-Å (1990) Versamhetsbaserad Systemstrukturering. Principer och tilläpmningar, Göteborg,<br />
Programator AB,(in Swedish)<br />
Hugoson, M-Å., Magoulas, T., Pessi, K. (2008) Interoperability Strategies for Business Agility. J.L.G.<br />
Langefors, B. (1975). Control Structure <strong>and</strong> Formalized <strong>Information</strong> Analysis in Organizations. I E. Grochla och<br />
N. Szyperski, red. <strong>Information</strong> Systems <strong>and</strong> Organizational Structure. Berlin och New York, Walter de<br />
Gruyter.<br />
Langefors, B. (1986). <strong>Information</strong> <strong>and</strong> <strong>Management</strong> Systems. Erhvervs Økonomisk Tidsskrift. Særtryk. Udgivet af<br />
Foreningen af Danske Civiløkonomer.<br />
Luftman, J.N. (Ed) (1996) Competing in the <strong>Information</strong> Age: Strategic Alignment in Practice. Oxford University<br />
Press, New York.<br />
McKenzie, K.D. (1984). A Strategy <strong>and</strong> desiderata for organizational design. Human Systems <strong>Management</strong> 4.<br />
North Holl<strong>and</strong>.<br />
Magoulas T. <strong>and</strong> Pessi K.: Strategic IT <strong>Management</strong>. Doctoral Dissertation. Department of Informatics<br />
Gothenburg, Sweden, (in Swedish) (1998)<br />
Mendelson, H. (2000). Organizational Architecture <strong>and</strong> Success, The <strong>Information</strong> Technology Industry,<br />
<strong>Management</strong> Science, Vol. 46, No. 4, <strong>Information</strong> Technology Industry (Apr., 2000) pp. 523-529<br />
Mintzberg, H.(1989). Mintzberg on <strong>Management</strong>, Free Press (July1, 1989).<br />
Morton, M.S.S (1991) Introduction. In Morton, M.S.S (Ed.) The Corporation of the 1990s: <strong>Information</strong> Technology<br />
<strong>and</strong> Organizational Transformation. Oxford University Press.<br />
Papp, R. (2001) Strategic <strong>Information</strong> Technology: Opportunities for Competitive Advantage. IDEA Publishing<br />
Group.<br />
Putnam, A., E. R. Barlow, et al. (1966). Samordnad företagskontroll - totala informationssystem i praktisk<br />
belysning, J Beckmans bokförlag. (in Swedish)<br />
Rood, A. M. (1994) Enterprise Architecture: Definition, content <strong>and</strong> utility. Enabling Technologies: Infrastructure<br />
for Collaborative Enterprises, 1994, p. 106-11.<br />
Schekkerman, J. (2006:a) Enterprise Architecture Assessment Guide: Version 2.2. Institute For Enterprise<br />
Architecture Developments.<br />
Schekkerman, J. (2006:b) Extended Enterprise Architecture Framework Essentials Guide: Version 1.5. Institute<br />
For Enterprise Architecture Developments.<br />
Schekkerman, J. (2006:c) Extended Enterprise Architecture Viewpoints Support Guide. Institute For Enterprise<br />
Architecture Developments.<br />
Schöenherr, M. (2009) Towards a Common Terminology in the Discipline of Enterprise Architecture. In Service-<br />
Oriented Computing --- ICSOC 2008 Workshops, George Feuerlicht <strong>and</strong> Winfried Lamersdorf (Eds.).<br />
Lecture Notes In Computer Science, Vol. 5472. Springer-Verlag, Berlin, Heidelberg 400-413.<br />
Sessions, R. (2007) A Comparison of the Top Four Enterprise Architecture Methodologies. ObjectWatch Inc.<br />
Simon, H. (1962). The Architecture of Complexity. Proceedings of the American Philosophical Society, Vol. 106,<br />
No. 6: 467-482.<br />
Simon, H. (1969). The Sciences of the Artificial, The MIT Press<br />
330
Thanos Magoulas, Aida Hadzic, Ted Saarikko <strong>and</strong> Kalevi Pessi<br />
Sowa, J.F. <strong>and</strong> Zachman, J.A. (1992) Extending <strong>and</strong> Formalizing the Framework for <strong>Information</strong> Systems<br />
Architecture. IBM Systems Journal, Vol. 31, No. 3: 590-616.<br />
Spanos, Y.E., Prastacos, G.P. <strong>and</strong> Poulymenakou, A. (2002) The relationship between communication<br />
technologies adoption <strong>and</strong> management. <strong>Information</strong> <strong>and</strong> <strong>Management</strong> 39, p. 659-675.<br />
Tichy, N.M., (1983) Managing Strategic Change: Technical, Political, <strong>and</strong> Cultural Dynamics, Wiley<br />
TOGAF. (2009) The Open Group Architecture Framework: Version 9, Enterprise Edition.<br />
Zachman, J. A. (1987) A Framework for <strong>Information</strong> Systems Architecture. IBM Systems Journal, Vol. 26, No. 3:<br />
276-292.<br />
Weill, P., Ross. J.W., Robertson D.C. (2006). Enterprise Architecture As Strategy: Creating a Foundation for<br />
Business Execution, Harvard Business Press<br />
Whitman, L., Ramach<strong>and</strong>ran, K. <strong>and</strong> Ketkar, V. (2001) A taxonomy of a living model of the enterprise. In Peters,<br />
B.A., Smith, J.S., Medeiros, .D.J. <strong>and</strong> Rohrer, M.W. Proceedings of the 2001 Winter Simulation Conference.<br />
p. 848-855.<br />
331
eCitizen Satisfaction: The Case of eGovernment Websites<br />
Panagiotis Manolitzas 1 , Athanasios Vozikis 2 , Denis Yannacopoulos 3 <strong>and</strong><br />
Nikolaos Matsatsinis 1<br />
1<br />
Technical University of Crete, Chania, Greece<br />
2<br />
University of Piraeus, Greece<br />
3<br />
Technological Educational Institute of Piraeus, Aigaleo, Greece<br />
pmanol@gmail.com<br />
avozik@gmail.com<br />
dgian@teipir.gr<br />
Abstract: Governments across Europe face the challenge of responding to public dem<strong>and</strong> for more valuable,<br />
responsive, transparent, efficient <strong>and</strong> effective services. The scope of our research is to evaluate eGovernment<br />
services in Greece, analysing data of user satisfaction. Our research was conducted from March 1st, 2010 to<br />
June 20th, 2010. For the purposes of the research a web site was constructed <strong>and</strong> the users had the opportunity<br />
to answer a web based questionnaire <strong>and</strong> to express their satisfaction from The National Portal of Public<br />
Administration ‘Hermes’. The analysis of the data is based on the MUSA method. MUSA (Multicriteria<br />
Satisfaction Analysis) is an ordinal regression model which is based on the principles of multicriteria decision<br />
analysis. The analysis of data showed that the majority of users declared that they are satisfied from the<br />
eGovernment portal. In addition, our research, through the MUSA methodology, unveiled the quantitative global<br />
<strong>and</strong> partial user satisfaction levels <strong>and</strong> determined the weak <strong>and</strong> strong points of the web portal. Furthermore, the<br />
findings of our study will help governments to improve the effectiveness of their e-services <strong>and</strong> to develop more<br />
effective <strong>and</strong> valuable websites.<br />
Keywords: eGovernment, website evaluation, e-services, user satisfaction, multicriteria analysis<br />
1. Introduction<br />
Nowadays, all Governments across the world try to provide valuable services through the public<br />
sector to both citizens <strong>and</strong> businesses. E- Government gave the advantage to governments to<br />
achieve this goal. <strong>Information</strong> Technology is increasingly being viewed as a key component in<br />
improving the way the public sector provides services to citizens (Seneviratne, 1999). In Greece, the<br />
Operational Programme <strong>Information</strong> Society promotes the <strong>Information</strong> <strong>and</strong> Communication<br />
Technology (ICT) in the public sector. Electronic government (eGovernment) is the transformation of<br />
the public sector's organization <strong>using</strong> ICT in order to serve the citizen <strong>and</strong> the enterprises better<br />
(Terpsiadou & Economides 2009). Web portals, kiosks <strong>and</strong> mobile technologies were some of the<br />
emerging means of offering government services (Potnis 2010.).<br />
The scope of our research is to evaluate eGovernment services in Greece, analysing data of user<br />
satisfaction. Service quality is considered the main determinant of customer satisfaction (Speng &<br />
McKoy 1996). The importance of service quality evaluation through customer satisfaction<br />
measurement is reinforced by the necessity of adopting a continuous improvement philosophy <strong>and</strong><br />
underst<strong>and</strong>ing customer perception.<br />
Our paper is divided into 3 sections. In the first section we present the most common eGovernment<br />
types <strong>and</strong> their characteristics <strong>and</strong> we review many surveys that have been contacted for web sites<br />
evaluation. In the second section we present the methodology we used for the evaluation of the<br />
government portal. Finally, we describe the sampling process of the survey, the data analysis <strong>and</strong> the<br />
survey results.<br />
2. eGovernment- web site evaluation<br />
eGovernment is the use of information <strong>and</strong> communication technologies, <strong>and</strong> particularly the Internet,<br />
as a tool to achieve better government (OECD 2003). In other words, electronic Government provides<br />
the benefit of st<strong>and</strong>ardized services of information or even transactions, <strong>using</strong> electronic means <strong>and</strong><br />
mainly the Internet (Giannakopoulos & Manolitzas, 2009). Essentially, eGovernment concerns<br />
transactions that are related to the interactions of Public Administration (OECD 2003): (a) with citizens<br />
(Government to Citizens-G2C) providing services that are related to the submission of tax of income,<br />
the publication of certificates etc, (b) with businesses (Government to Businesses-G2B) providing<br />
services that are related to the submission of tax, contributions of social insurance, submission of<br />
statistical data, etc, <strong>and</strong> finally (c) with public services in a particular type of transaction (Government<br />
332
Panagiotis Manolitzas et al.<br />
to Governement-G2G) the possibilities provided via the completed interconnection <strong>and</strong> the<br />
interdepartmental collaborations for communication among the public services. An additional category<br />
is government-to-employee, which is used to describe the connection that can be established among<br />
people within the government through the use of computers <strong>and</strong> the Internet (Blakemore & Dutton,<br />
2003; ESCWA 2003), which is also referred by (Evans & Yen 2006) as intra-government (Nagi &<br />
Hamdan 2009).<br />
Nowdays a crucial factor from the implementation <strong>and</strong> the development of an eGovernment project is<br />
the web site that will be constructed. Over the last ten years, all governments are trying to develop<br />
complex information systems in order to offer valuable electronic services to the citizens. The last five<br />
years many citizens prefer to communicate <strong>and</strong> interact with the central government via the<br />
government portals. In Greece the public sector created a centralized web portal (www.ermis.gov.gr)<br />
so as to the services provided to gain added value <strong>and</strong> to benefit users (citizens <strong>and</strong> enterprises). The<br />
governmental Portal provides through a central point completed briefing in the citizens <strong>and</strong> the<br />
enterprises with regard to all their transactions with the Public Administration (natural or electronic), as<br />
well as selected services of Electronic Transactions.<br />
During last years many web site evaluation methodologies have been proposed. For example many<br />
researchers used the servqual method (Parasuraman et al, 1988) in order to measure the quality of a<br />
website. Other researchers like Iwaarden et al (2004) presented a survey amongst students at<br />
Northeastern <strong>and</strong> Erasmus Universities in order to identify the most important quality aspects in the<br />
design <strong>and</strong> use of websites. The SERVQUAL model proposes a universal set of quality dimensions<br />
(tangibles, reliability, responsiveness, assurance <strong>and</strong> empathy), although there is some criticism for<br />
the results of this scale (Grigoroudis et al 2008). Another model that has been widely used is the<br />
EUCS (end-user computing satisfaction). This model has been tested <strong>and</strong> validated in various<br />
research settings. The results of this model have shown that end user computer satisfaction varied<br />
across cultures <strong>and</strong> may mean differently from one group to another (Deng et al, 2008). Also, other<br />
approaches have been developed for the evaluation of websites. These deal with site usability <strong>and</strong><br />
design, content, quality <strong>and</strong> user satisfaction. Huizingh (2000) determined how different groups of<br />
companies are actually <strong>using</strong> the Web <strong>and</strong> their sites are structured. To provide focus to his study, he<br />
developed a framework with two essential aspects of Web sites: content <strong>and</strong> design. He analyzed<br />
different groups of sites to gain underst<strong>and</strong>ing how the new tools are used by various companies. The<br />
research also showed that larger web sites seem to be richer <strong>and</strong> more advanced. Aladwani <strong>and</strong><br />
Palvia (2002) developed a multidimensional scale for measuring user-perceived web quality. The<br />
results of the two-phased investigation uncovered four dimensions of perceived web quality (technical<br />
adequacy, specific content, content quality, <strong>and</strong> appearance) <strong>and</strong> provided evidence for the<br />
psychometric properties of the 25-item instrument (Robbins & Stylianou 2003). On the other h<strong>and</strong><br />
Raquel (2001) used protocol analysis to measure the usability of a web site. For the purpose of this<br />
research about 15 usability principles <strong>and</strong> 3 evaluation parameters were used as a framework to<br />
analyze the verbal protocols of a sample of users. The results of the survey underscored the<br />
importance of two crucial usability goals for commercial web sites: clear path to products <strong>and</strong><br />
transparency of the ordering process. In this study will be used a multicriteria methodology in order to<br />
examine the users satisfaction from an electronic government site.<br />
3. The MUSA method<br />
The MUSA (Multicriteria Satisfaction Analysis) method is a multicriteria preference disaggregation<br />
analysis technique (Grigoroudis & Siskos 2002; Siskos et al 1998). Assuming that the customers’<br />
global satisfaction depends on a set of criteria representing service characteristic dimensions, the<br />
main objective of the MUSA method is the aggregation of individual judgements into a collective value<br />
function (Kyriazopoulos et al 2007). The method is an ordinal regression based approach used for the<br />
assessment of a set of collective satisfaction functions in such a way that the global satisfaction<br />
criterion becomes as consistent as possible with customers’ judgements (kyriazopoulos et al 2007).<br />
According to the methodology of the model the required data are collected via a questionnaire. The<br />
customer evaluates the provided services <strong>and</strong> expresses his/her judgements, namely their global<br />
satisfaction <strong>and</strong> his/her satisfaction with regard to the set of discrete criteria (Mihelis et al, 2001). A<br />
detailed presentation of the mathematical formula of the MUSA method can be found in (Grigoroudis<br />
& Siskos 2002, Siskos Yet al 1998).<br />
The MUSA model combines the weights <strong>and</strong> the average satisfaction indices in order to create the<br />
action diagrams (figure 1). These diagrams help the user or the decision maker to determine<br />
333
Panagiotis Manolitzas et al.<br />
improvement actions. In addition, action diagrams indicate the strong <strong>and</strong> weak points of the<br />
customer satisfaction <strong>and</strong> define the required improvement efforts (Kyriazopoulos et al 2007). They<br />
also provide a form of gap analysis, since they show what the customer wants (importance) <strong>and</strong> gets<br />
(performance) (Grigoroudis & Arabatzis 2010). Action diagrams are divided into four sectors<br />
according to performance (high/low) <strong>and</strong> importance (high/low) that may be used to classify actions<br />
(Michelis et al 2001; Kyriazopoulos et al 2007; Arabatzis & Grigoroudis 2010; Grigoroudis et al 2008)<br />
a) status guo: no action is required, b) leverage opportunity: these areas can be used as advantage<br />
against competition, c) transfer resources: the resources of the company can be used effectively in<br />
another sector, d) action opportunity: this area indicates critical satisfaction dimensions that should be<br />
improved.<br />
Figure 1: Action diagram<br />
Apart from the action diagrams, MUSA application produces improvement diagrams (figure 2). As we<br />
analyzed before, action diagrams have the ability to indicate which dimension of satisfaction must be<br />
improved. However, they do not determine the result of the effort that must be made.<br />
Figure 2: Improvement diagram<br />
334
Panagiotis Manolitzas et al.<br />
Another disadvantage of action diagrams is that they do not inform how much efforts must be made<br />
for improvement to be achieved. This kind of problem is solved by improvement diagrams. More<br />
specifically, improvement diagrams take into account customers dem<strong>and</strong>ing level <strong>and</strong> are used in<br />
order to rank improvement priorities. Improvement diagrams are divided into quadrants according to<br />
dem<strong>and</strong> <strong>and</strong> effectiveness. Thus, priority should be given to satisfaction criteria having large room for<br />
improvement <strong>and</strong> needing little effort. Finally, satisfaction dimensions should rank last in terms of<br />
priority with low dissatisfaction level needing substantial effort to improve.<br />
4. Users satisfaction survey<br />
4.1 Satisfaction criteria<br />
The most important stage of the survey is the development of the questionnaire. The set of<br />
satisfaction criteria in this survey is based on bibliographical research. Grigoroudis et al (2008)<br />
introduced a questionnaire in order to measure the web site quality. We used some questions of this<br />
survey but we added more according to the needs of this survey. The questionnaire developed for the<br />
purpose of this study consists of two major parts. The first part investigates the users’ profile: 1)<br />
Gender (Male-Female), 2) Age (18-25, 36-45, 46-55, over 56), 3) Educational level (secondary<br />
education, higher education, Postgraduate/ dictatorate), 4) Income level (
4.2 Sample<br />
Panagiotis Manolitzas et al.<br />
The research was conducted from March 1 st , 2010 to June 20 th , 2010. For the purposes of the<br />
research a web site was developed. Through the web site the users had the opportunity to answer a<br />
web based questionnaire. The questionnaire had 18 questions <strong>and</strong> 130 questionnaires were collected<br />
from a r<strong>and</strong>om sample of users. The hierarchical structure of the set of criteria <strong>and</strong> sub-criteria about<br />
users’ satisfaction is presented in figure 3.<br />
The responders consisted of 71 women <strong>and</strong> 59 men. Most of the responders were young. More<br />
specifically, 104 responders were 18-25, 20 of them were 26-35, 5 were 36-45, <strong>and</strong> 1 responder was<br />
46-55. Analyzing the income level, the majority of responders (95) earn less than 700€ per month, 23<br />
questioned earn 701€-1400€, 7 of those surveyed earn 1401€-2000€, 2 earn between 2001€-3000€<br />
<strong>and</strong> 3 responders earn more than 3000€. Regarding the educational level 17 responders have<br />
graduated from secondary education, 94 of the responders holds a BSc degree <strong>and</strong> the rest 19 users<br />
holds an MSc degree or a PhD.<br />
4.3 Survey results<br />
4.3.1 Global satisfaction function<br />
This section refers to the results provided by the MUSA method. The functions of satisfaction<br />
constitute the most important results of MUSA, since they express the real value that users give in a<br />
determined level of satisfaction. Analyzing figure 4, it is obvious that the average global satisfaction<br />
index is very high (78,89) indicating that the users are very satisfied regarding the e-gov Portal. The<br />
added value curve for the global set of users is presented in figure 4. The added value curve has a<br />
concave appearance, revealing that the users are satisfied even if a small percent of their prospects<br />
is achieved. In addition the following figure shows the estimated value function given by the users to<br />
the provided service. For example the users who declared to be “Somehow Dissatisfied”, actually<br />
according to this value function they give a value of 65% to the provided services. This shows we are<br />
dealing with extremely non-dem<strong>and</strong>ing customers. If for example the users were neutral the given<br />
value for the above level of satisfaction scale would be less than 50%.The “Non-dem<strong>and</strong>ing<br />
customers” situation refers to the case of a concave value function; customers express that they are<br />
satisfied, although only a small portion of their expectations is fulfilled. (For more details please refer<br />
to (Grigoroudis & Siskos 2002).<br />
Figure 4: Global satisfaction function (added value curve)<br />
4.3.2 Main satisfaction criteria frequencies<br />
In table 1 we observe that the users are very satisfied considering the particular high output of web<br />
site in the criterion of content.<br />
336
Table 1: Criteria weights <strong>and</strong> satisfaction indices<br />
Panagiotis Manolitzas et al.<br />
Criteria Weight Satisfaction Indices<br />
Content 36% 85,98%<br />
Navigation 25% 79,81%<br />
Structure & Design 19,5% 73,29%<br />
Appearance 19,5% 70,5%<br />
Global Satisfaction - 78,89%<br />
In addition, the users seems to be very satisfied from the criterion of navigation (satisfaction indices<br />
79,81%) but on the other h<strong>and</strong>, they do not attribute great importance to the others criteria like<br />
structure <strong>and</strong> appearance. The satisfaction indices of these criteria are very high but for the visitors do<br />
not attribute particular importance.<br />
4.3.3 Action diagram<br />
As presented in the previous section, the gap analysis in this study is based on the major results of<br />
the MUSA. Particularly <strong>using</strong> the previously presented weights <strong>and</strong> average satisfaction indices of all<br />
criteria a series of action diagrams may be developed in order to further study user’s satisfaction <strong>and</strong><br />
prioritize improvement actions In figure 5 we observe that the criterion of content <strong>and</strong> navigation<br />
belongs to the area of action opportunity. Therefore, in this criterion the web site developer must<br />
focus his/her efforts on improvement, so that it can be used as a competitive advantage. Besides, the<br />
criterion of Structure <strong>and</strong> Appearance is found in the area of ‘Status Quo’ <strong>and</strong> must be the second<br />
priority of the web developer.<br />
Figure 5: Action diagram<br />
4.3.4 Improvement diagram<br />
As we can observe from figure 6 (improvement diagram), improvement priorities of the web portal<br />
should focus on the appearance criterion.<br />
The criterion of appearance presents the highest effectiveness <strong>and</strong> simultaneously the smallest<br />
improvement. Consequently, we will get an improvement in terms of satisfaction paying little effort.<br />
Alternatively the improvement of content, Structure & design <strong>and</strong> navigation can be also considered<br />
due to the high effectiveness level or the low dem<strong>and</strong>ing level that users appear in these criteria.<br />
337
Figure 6: Improvement diagram<br />
5. Conclusions<br />
Panagiotis Manolitzas et al.<br />
In this survey we have made a first attempt to measure users’ satisfaction from an eGovernment<br />
portal in Greece <strong>using</strong> Multicriteria Analysis. In the future, the questionnaire must be updated with<br />
more questions. Furthermore, the same survey must run across different levels of ages, educational<br />
level in order to examine if there is a difference in satisfaction between these categories. Finally, the<br />
installation of a permanent user’s satisfaction barometer is an important extension. Through this<br />
barometer we will have the ability to track changes concerning users’ perceptions through a period of<br />
time.<br />
6. Appendix 1: Brief presentation of the Musa method<br />
The preference disaggregation model MUSA (MUlticriteria Satisfaction Analysis) assesses global <strong>and</strong><br />
partial satisfaction functions Y * *<br />
<strong>and</strong> Xi respectively, given customers’ judgments Y <strong>and</strong> Xi. Following<br />
the principles of ordinal regression analysis under constraints <strong>using</strong> linear programming techniques,<br />
the ordinal regression analysis equation has as follows:<br />
n<br />
⎧ ~ *<br />
* + −<br />
⎪Y<br />
= ∑ bi<br />
X i − σ + σ<br />
⎪ i=<br />
1<br />
⎨ n<br />
⎪<br />
⎪∑<br />
bi<br />
= 1<br />
⎩ i=1<br />
(1)<br />
~ *<br />
* *<br />
where Y is the estimation of the global satisfaction function Y X<br />
, i are the partial satisfaction<br />
+<br />
−<br />
functions, σ <strong>and</strong> σ<br />
b<br />
are the overestimation <strong>and</strong> the underestimation error, respectively, <strong>and</strong> i is<br />
the weight of the i-th criterion.<br />
100<br />
*m yj y j *2<br />
0<br />
Y j *<br />
σ j +<br />
y j 1 y j 2 y j m y j α<br />
σ j -<br />
* Yj 338
Panagiotis Manolitzas et al.<br />
Satisfaction function <strong>and</strong> error variables for the j-th customer<br />
*<br />
*<br />
It should be noted that Y <strong>and</strong> X i are monotonic functions normalised between 0 <strong>and</strong> 100 (see 0).<br />
Also, in order to reduce the number of the mathematical constraints the following transformation<br />
equations are used:<br />
⎪⎧<br />
z<br />
⎨<br />
⎪⎩ w<br />
m<br />
ik<br />
= y<br />
m+<br />
1<br />
= b x<br />
− y<br />
* k+<br />
1<br />
i i<br />
m<br />
− b x<br />
* k<br />
i i<br />
for<br />
for<br />
m = 1, 2, ..., α −1<br />
k = 1, 2, ..., α −1<br />
<strong>and</strong><br />
i<br />
i = 1, 2, ..., n<br />
According to the aforementioned definitions <strong>and</strong> the assumptions, the basic estimation model can be<br />
written in a linear program formulation, as it follows:<br />
M<br />
⎧<br />
+ -<br />
⎪[<br />
min]<br />
F = ∑σ<br />
j + σ j<br />
j=<br />
1<br />
⎪<br />
⎪under<br />
the constraint s<br />
⎪ j<br />
j<br />
n xi<br />
−1<br />
y −1<br />
⎪<br />
+ -<br />
⎪∑∑wik<br />
− ∑zm−σj+<br />
σ j = 0 for j = 1, 2, ..., M<br />
i=<br />
1 k = 1 m=<br />
1<br />
⎪<br />
α −1<br />
⎪<br />
⎨∑<br />
zm<br />
= 100<br />
⎪m=<br />
1<br />
⎪ n αi<br />
−1<br />
⎪∑∑wik<br />
= 100<br />
⎪ i= 1 k=<br />
1<br />
⎪z<br />
m ≥ 0,<br />
wik<br />
≥ 0 ∀ m, i <strong>and</strong> k<br />
⎪<br />
+ -<br />
⎪σ<br />
j ≥ 0,<br />
σ j ≥ 0 for j = 1, 2, ..., M<br />
⎪<br />
⎩<br />
where M is the number of customers, n is the number of criteria, <strong>and</strong><br />
which variables Xi <strong>and</strong> Y are estimated.<br />
, are the j-th level on<br />
The preference disaggregation methodology consists also of a post optimality analysis stage in order<br />
to face the problem of model stability. The final solution is obtained by exploring the polyhedron of<br />
near optimal solutions, which is generated by the constraints of the above linear program. This<br />
solution is calculated by n linear programs (equal to the number of criteria) of the following form:<br />
⎧<br />
⎪[<br />
] ′ = ∑<br />
⎪<br />
⎨<br />
⎪<br />
≤ +<br />
⎪<br />
⎪⎩<br />
− αi<br />
1<br />
max F wik<br />
for i = 1, 2, ..., n<br />
k=<br />
1<br />
under the constraint s<br />
*<br />
F F ε<br />
all the constraints<br />
of LP (3)<br />
where ε is a small percentage of F*. The average of the solutions given by the n LPs (4) may be taken<br />
as the final solution. In case of non-stability this average solution is less representative.<br />
The assessment of a performance norm may be very useful in customer satisfaction analysis. The<br />
average global <strong>and</strong> partial satisfaction indices are used for this purpose <strong>and</strong> can be assessed<br />
according to the following equations:<br />
S =<br />
α<br />
∑<br />
m=<br />
1<br />
p<br />
m<br />
y<br />
* m<br />
<strong>and</strong> s =<br />
i<br />
α<br />
i<br />
∑<br />
k=<br />
1<br />
p<br />
x<br />
k * k<br />
i i<br />
339<br />
* j<br />
xi y j *<br />
(2)<br />
(3)<br />
(4)<br />
(5)
Panagiotis Manolitzas et al.<br />
where S <strong>and</strong> si are the average global <strong>and</strong> partial satisfaction indices, <strong>and</strong> p m k<br />
<strong>and</strong> pi are the<br />
frequencies of customers belonging to the y m k<br />
<strong>and</strong> xi satisfaction level, respectively.<br />
References<br />
Aladwani, A.M. <strong>and</strong> Palvia, P.C. (2002) ‘Developing <strong>and</strong> validating an instrument for measuring user-perceived<br />
web quality’, <strong>Information</strong> <strong>and</strong> <strong>Management</strong>, Vol.39, No.3, pp 467–476.<br />
Blakemore, M. <strong>and</strong> Dutton, R. (2003) ‘eGovernment, e-society <strong>and</strong> Jordan: Strategy, theory, practice, <strong>and</strong><br />
assessment’, First Monday, Vol 8, No.11.<br />
Deng X., Doll W. J., Al-Gahtani, S. S. <strong>and</strong> Larsen T. J. (2008) “A cross-cultural analysis of the end-user<br />
satisfaction instrument: a multi-group invariance analysis”, <strong>Information</strong> & <strong>Management</strong>, Vol 45, No. 4, pp<br />
211-220.<br />
Doll, W. J., Xiadong, D., Raghunathan, T. S., Torkzadeh G. <strong>and</strong> Xia W. (2004) “The meaning <strong>and</strong> measurement<br />
of user satisfaction: a multigroup invariance analysis of the end-user computing satisfaction instrument”,<br />
Journal of <strong>Management</strong> <strong>Information</strong> Systems, Vol 21, No. 1, pp 227-262.<br />
Economic <strong>and</strong> Social Commission for Western Asia (ESCWA), (2003) Promoting eGovernment applications<br />
towards an information society in ESCWA member countries Beirut, Lebanon: Economic <strong>and</strong> Social<br />
Commission for Western Asia (ESCWA).<br />
Evans, D. <strong>and</strong> Yen, D. C., (2006) “eGovernment: Evolving relationship of citizens <strong>and</strong> government, domestic, <strong>and</strong><br />
international development”, Government <strong>Information</strong> Quarterly, Vol 23, No. 2, pp 207−235.<br />
Giannakopoulos, D. <strong>and</strong> Manolitzas, P., (2009) ‘Measuring eGovernment: The Case of eGovernment across the<br />
27 European Union Member States. A Comparative Measurement of the Progress of Online Services<br />
Delivery Using Multi-Criteria Analysis (MINORA)’, Proceedings of the 9th European Conference on<br />
eGovernment (ECEG 2009), London, UK, pp 290-295.<br />
Grigoroudis, E. <strong>and</strong> Arabatzis, G., (2010) ‘Visitors' satisfaction, perceptions <strong>and</strong> gap analysis: The case of Dadia–<br />
Lefkimi–Souflion National Park’, Forest Policy <strong>and</strong> Economics, Vol. 12, No. 3, pp 163-172.<br />
Grigoroudis, E. <strong>and</strong> Siskos, Y. (2002) ‘Preference disaggregation for measuring <strong>and</strong> analysing customer<br />
satisfaction: The MUSA method’, European Journal of Operational Research, Vol. 143, No. 1, pp 148-170.<br />
Grigoroudis, E., Litos, C., Moustakis, V., Politis, Y. <strong>and</strong> Tsironis, L. (2008) ‘The assessment of user-perceived<br />
web quality: Application of a satisfaction benchmarking approach’, European Journal of Operational<br />
Research, Vol. 187, No. 3, pp 1346-1357.<br />
Huizingh, E. (2000) ‘The content <strong>and</strong> design of web sites: an empirical study’, <strong>Information</strong> & <strong>Management</strong>, Vol.<br />
37, No. 3, pp 123-134.<br />
Iwaarden, T., Wiele, L., <strong>and</strong> Millen R. (2004) ‘Perceptions about the quality of web sites: A survey amongst<br />
students at Northeastern University <strong>and</strong> Erasmus University’, <strong>Information</strong> <strong>and</strong> <strong>Management</strong>, Vol. 41, No. 8,<br />
pp 947–959.<br />
Kyriazopoulos, P., Spyridakos, A., Grigoroudis, E., Siskos, Y., <strong>and</strong> Yannacopoulos, D. (2007). ‘The quality of eservices:<br />
Measuring satisfaction of internet customers, Operational Research: An International Journal’, Vol.<br />
7, No. 2, pp 233-254.<br />
Mihelis, G., Grigoroudis, E., Siskos, Y., Politis, Y. <strong>and</strong> Mal<strong>and</strong>rakis Y. (2001) ‘Customer satisfaction<br />
measurement in the private bank sector’, European Journal of Operational Research, Vol. 130, No. 2, pp<br />
347-360.<br />
Nagi, E. <strong>and</strong> Hamdan, M. (2009) ‘Computerization <strong>and</strong> eGovernment implementation in Jordan: Challenges,<br />
obstacles <strong>and</strong> successes’, Government <strong>Information</strong> Quarterly, vol. 26, pp 577-583.<br />
OECD (2003) The eGovernment imperative, OECD Publications Service, France.<br />
Parasuraman, A., Zeithaml, V.A., <strong>and</strong> Berry, L.L. (1988) ‘SERVQUAL: A multiple item scale for measuring<br />
consumer perceptions of service quality’, Journal of Retailing Vol. 64, No. 1, pp 14–40.<br />
Pateli, A. <strong>and</strong> Philippidou, S. (2008) ‘Public <strong>Management</strong> Change <strong>and</strong> One-Stop Government Experience from<br />
the Greek Citizen Service Center (CSC)’, 2 nd International Conference on Methodologies, Technologies <strong>and</strong><br />
Tools enabling eGovernment, Corfu, Greece.<br />
Potnis, D. (2010) ‘Measuring e-Governance as an innovation in the public sector’, Government <strong>Information</strong><br />
Quarterly, Vol. 27, No. 1, pp 41-48.<br />
Raquel, B.F. (2001) ‘Using protocol analysis to evaluate the usability of a commercial web site’, <strong>Information</strong> &<br />
<strong>Management</strong>, Vol.39, No. 2, pp151-163.<br />
Robbins, S.S., <strong>and</strong> Stylianou, A.C. (2003) ‘Global Corporate Web Sites: An Empirical Investigation of Content<br />
<strong>and</strong> Design’, <strong>Information</strong> & <strong>Management</strong>, Vol. 40, No. 3, pp 205-212.<br />
Seneviratne, S. J. (1999) <strong>Information</strong> technology <strong>and</strong> organizational change in the public sector. In G. D. Garson<br />
(Ed.), <strong>Information</strong> technology <strong>and</strong> computer applications in public administration: Issues <strong>and</strong> trends (pp.<br />
41−61). Hershey, PA: Idea Group Publishing.<br />
Siskos, Y., Grigoroudis, E., Zopounidis, C. <strong>and</strong> Saurais, O. (1998) ‘Measuring customer satisfaction <strong>using</strong> a<br />
collective preference disaggregation model’, Journal of Global Optimization, Vol. 12, No. 2, pp 175-195.<br />
Speng R.A., <strong>and</strong> McKoy, R.D. (1996) ‘An empirical examination of a model of perceived service quality <strong>and</strong><br />
satisfaction’, Journal of Retailing, Vol. 72, No. 2, pp 201-214.<br />
Terpsiadou, M. <strong>and</strong> Economides, A. (2009) ‘The use of information systems in the Greek public financial<br />
services: The case of TAXIS’, Government <strong>Information</strong> Quarterly, Vol. 9, No. 3, pp 468-476.<br />
340
Underst<strong>and</strong>ing the Impact of <strong>Knowledge</strong> Sharing in<br />
Organisations: A Case Study<br />
Magdeline Mashilo <strong>and</strong> Tiko Iyamu<br />
Tshwane University of Technology, Pretoria, South Africa<br />
Mashilom@tut.ac.za<br />
Iyamu@tut.ac.za<br />
Abstract: <strong>Knowledge</strong> is critical to employees’ effective <strong>and</strong> efficient performance <strong>and</strong> this manifest in the<br />
organisation’s performance at large. Unfortunately, knowledge gap amongst employees within organisations,<br />
including higher institutions of learning do exist. <strong>Knowledge</strong>able experts in different field are expected to share<br />
their knowledge with others to increase productivity, efficiency <strong>and</strong> effectiveness within the organisations. This is<br />
not necessarily the case, <strong>and</strong> it has begun to have a noticeable <strong>and</strong> deep-rooted impact on organisations. The<br />
study employed contingency theory to examine the impact <strong>Knowledge</strong> sharing on the organisation.<br />
Keywords: knowledge sharing, contingency theory, performance, organisation<br />
1. Introduction<br />
<strong>Knowledge</strong> sharing remains an important factor <strong>and</strong> process in many organisations including higher<br />
institutions of learning. Lin (2007:136) defines knowledge sharing as activities that encourage<br />
individuals <strong>and</strong> groups to work together, to facilitate exchange of their knowledge to foster continuous<br />
learning, <strong>and</strong> to increase the likelihood of achieving individual, group <strong>and</strong> organisational goals.<br />
For specific objectives <strong>and</strong> within context, knowledge is shared among individuals, groups <strong>and</strong><br />
organisations. According to Yan <strong>and</strong> Chen (2007:96), knowledge sharing comprises a set of<br />
behaviours about knowledge exchange which involves different actors. Kang et al. (2008:1550)<br />
argued that knowledge sharing results from social interaction that leads to knowledge exchange<br />
including transfer. Individuals <strong>and</strong> groups are only able to contribute to the objectives <strong>and</strong> goals of the<br />
organisation if they have the knowledge to do so. As is argued by Hsu (2008:1316), knowledge<br />
sharing within organisations cannot be regarded as having been successful if organisational<br />
performance is below average.<br />
<strong>Knowledge</strong> sharing is not as easy as we are made to believe. There are challenges which could<br />
threaten the value <strong>and</strong> performance of the organisation.<br />
<strong>Knowledge</strong> sharing presents a challenge in many organisations, including higher institutions of<br />
learning. Higher institutions of learning are challenged to gain access to individual knowledge as well<br />
as to make the knowledge widely <strong>and</strong> easily accessible to the community at large (Kidwell, V<strong>and</strong>er<br />
Linde & Johnson, 2000:31).<br />
In many organisations including higher institutions of learning, employees are accused of holding on<br />
to their out-dated operational ways which influence innovation <strong>and</strong> change management from a<br />
different perspective, argued to be negative. Thus, there is a need for paradigm shift to accommodate<br />
change to the benefit of individuals <strong>and</strong> the environment at large. Sohail <strong>and</strong> Daud (2009:132) argued<br />
that the attitude of line managers (or supervisors) <strong>and</strong> their subordinates are the main contributors to<br />
knowledge sharing, whether it be successful or unsuccessful within the organisation. <strong>Management</strong><br />
should address change initiatives by placing more emphasis on organisational learning <strong>and</strong><br />
knowledge sharing.<br />
<strong>Knowledge</strong> sharing in higher institutions (HI) of learning is intended to improve decision-making as<br />
well as to reduce turnaround time of curriculum development <strong>and</strong> research output. In addition, it could<br />
enhance academic <strong>and</strong> administrative services thereby reducing overall costs to the institution’s<br />
management.<br />
<strong>Knowledge</strong> sharing practices are part of the main activity of HI of learning since its primary objectives<br />
are knowledge creation, acquisition <strong>and</strong> dissemination. According to Yang <strong>and</strong> Chen (2007:96),<br />
knowledge sharing can depict a set of behaviours about knowledge exchange, which involve different<br />
actors.<br />
341
Magdeline Mashilo <strong>and</strong> Tiko Iyamu<br />
This study investigated the factors which impact knowledge sharing in higher institutions of learning, a<br />
case of South Africa. Based on the findings from the investigation, a framework was developed. The<br />
framework is aimed at underst<strong>and</strong>ing the factors which influences knowledge sharing in the<br />
organisation, particularly in higher institution of learning with multicultural diverse. The frame could<br />
assist to avoid pitfalls when developing knowledge related strategy.<br />
2. Research methodology<br />
The case study method was selected as the research design. A case study method is a tool that<br />
seeks to achieve a deep underst<strong>and</strong>ing of a specific phenomenon or problem (Creswell, 2007:73). In<br />
the study, emphasis was placed on individual <strong>and</strong> group behaviours <strong>and</strong> actions during <strong>and</strong> how<br />
knowledge was shared within the environment of higher institution of learning in South Africa. The<br />
case study method was employed <strong>using</strong> a South African university, referred to in the study as<br />
Cheetah University of Technology. One university was used in the study mainly because all the<br />
universities in the country are structured in the way <strong>and</strong> have similar culture, historical background.<br />
Data were collected <strong>using</strong> two types of approaches, namely semi-structured interviews <strong>and</strong><br />
documentation from a qualitative perspective. According to Leedy <strong>and</strong> Ormrod (2009:145) qualitative<br />
research entails multiple forms of data collection. These allowed the researcher to have direct contact<br />
with interviewees in order to become familiar with the context they are in <strong>and</strong> to exp<strong>and</strong> on certain<br />
questions.<br />
Responses from interviewees gave rise to follow up questions, because the interviews were<br />
approached in both formal <strong>and</strong> informal manners. The other approach, documentation, focused more<br />
on all written documents that furnished background on the phenomenon being researched. These<br />
documents, which included policies <strong>and</strong> annual reports, were used in the study.<br />
In the data analysis, the contingency theory (CT), from the perspective of contingency model was<br />
employed (1988:281). The components of the contingency model, namely, structure, environment,<br />
strategy <strong>and</strong> performance were followed.<br />
CT implies a proper fit between organisational context <strong>and</strong> structure for the organisation to perform<br />
successfully (Umanath, 2003:552). The fit within contingency theory is critical as it determines<br />
organisational performance. According to Miller (1992:130) the internal <strong>and</strong> external dem<strong>and</strong> of the<br />
environment must fit the environment to get better performance. The case study was analysed by<br />
<strong>using</strong> the following components as identified by Blanton et al (1992:352):<br />
Structure – The CT analysis the structure to determine whether it contributes to the organisations<br />
performance, as it aims to manage processes <strong>and</strong> activities of the organisation. It is important that the<br />
organisational structure must be well designed to ensure a clear flow of activities, including how<br />
individuals <strong>and</strong> groups share their knowledge tend to performance better (Hollenbeck et al.,<br />
2002:600). Individual <strong>and</strong> group behaviours can be influence by different aspects of management<br />
which will have an impact on their performance.<br />
Strategy - The key areas were students <strong>and</strong> research outputs, as well as delivery of excellent<br />
services that in turn contributes to nation building. Individuals <strong>and</strong> groups including students are<br />
encouraged to be self-sufficient in order to retrieve supporting documents for their work.<br />
Based on the institution’s strategy, employees need to underst<strong>and</strong> that the objectives of the university<br />
are to work independently by following policies <strong>and</strong> procedures within their different departments <strong>and</strong><br />
to be assured that these documents are easily accessible for knowledge sharing by all.<br />
Environment – The institution reflect the imbalances relating to racial lines, staff profiles <strong>and</strong><br />
students’ intake, resulting from the policy of the previous government. The higher institutions allow its<br />
employees to develop through in-house training thereby encouraging them to improve their<br />
performance.<br />
Performance - Performance was judged by students’ success rate <strong>and</strong> research output rate. The last<br />
three years performances were rated as well as how far the institution has supported them to achieve<br />
their results. The collaboration in the organisation could either enhanced or reduced performance<br />
(Souchon & Hughes, 2007:1253).<br />
342
Magdeline Mashilo <strong>and</strong> Tiko Iyamu<br />
According to Donaldson et al. (2004:608), an organisation that aligned to fit its structure to its<br />
contingencies will enhance performance compared to organisations that are out of fit.<br />
3. Data analysis<br />
Structure<br />
Similar to the rest of the world, higher institutions of learning in South Africa follow the same<br />
organisational structure. The case studied, Cheetah University of Technology (CUT), was divided into<br />
two main categories, which constitute academics <strong>and</strong> non-academics. It is managed by the vice<br />
Chancellor (VC), who was assisted by Deputy Vice Chancellors (DVCs). The academic staff were<br />
responsible for teaching <strong>and</strong> learning, while non-academic rendered support to the services provided<br />
by the university.<br />
The non-academic division was further divided into sections <strong>and</strong> sub-sections, <strong>and</strong> each was<br />
managed by senior managers <strong>and</strong> directors. The reporting hierarchy of the university includes top<br />
management <strong>and</strong> middle management. One of the employees explained this as follows:<br />
We have the main administration, with specialized departments such as students’ bursaries, <strong>and</strong><br />
students’ accounts, not including general enquiries. My department is under students’ recruitment <strong>and</strong><br />
retention <strong>and</strong> advisors.<br />
Employees within the university that were on different hierarchical levels included directors,<br />
managers, professors, lecturers, secretaries <strong>and</strong> administrators. The role of the academic staff role<br />
was to increase the success rate <strong>and</strong> research outputs of the university by teaching <strong>and</strong> mentoring<br />
students to achieve their goals.<br />
Among other things, the staffs (such as directors, managers, professors, lecturers, secretaries <strong>and</strong><br />
administrators) were expected to transfer their skills to their sub-ordinates, in order to improve on their<br />
efficiency <strong>and</strong> to provide excellent services to their clients as well as recruitment of skilled personnel.<br />
The behaviour of management has an impact on how processes were carried out in the institution<br />
including decision making that affects employees’ progress, processes <strong>and</strong> activities. One of the<br />
senior administrators expressed himself as follows:<br />
Amongst employees in my department there are no challenges because everybody st<strong>and</strong>s for each<br />
other. We are four in the department, <strong>and</strong> if someone is not available you won’t even notice that we<br />
are short staff. We can speak both Afrikaans <strong>and</strong> English to be able to assist all races.<br />
The structure of the university allows for a clear flow of information where students were not supposed<br />
to be challenged when searching for information. One stop (most of the information relating to the<br />
university is found at the enquiry desk) service enables employees to provide relevant information at a<br />
central point. Crucial information was disseminated in different ways to employees <strong>and</strong> students. A<br />
respondent stated:<br />
They’ve the notice board that is accessible by everybody <strong>and</strong> they write down who’s not there <strong>and</strong><br />
their duties so that all of us can take note in case you need to assist in that section. The structure<br />
allows them to communicate very closely.<br />
The structure of some departments was influenced by a racial divide. All decisions were made in<br />
favour of, <strong>and</strong> along racial lines <strong>and</strong> affiliations. Sharing of acquired knowledge presented a<br />
challenge. This was attributed to lack of relationships <strong>and</strong> meaningful communication. This was<br />
frustrating, affected <strong>and</strong> derailed productive in the environment. Working conditions became<br />
unpleasant <strong>and</strong> employees’ performance was compromised in favour of racial allegiance.<br />
Most of the challenges were racial. As an employee working closely with academics you were<br />
suppose to go to the department <strong>and</strong> introduce yourself <strong>and</strong> some of the academics won’t accept you.<br />
The situation was intimidating; when you make appointment they will say that they’re busy.<br />
In some cases it was very difficult to initiate or embark on projects where all services were controlled<br />
by whites who had occupied those positions for long period <strong>and</strong> they were not willing to delegate.<br />
Strategy<br />
343
Magdeline Mashilo <strong>and</strong> Tiko Iyamu<br />
The University’s strategy focuses on people-orientated, staff development, both academic <strong>and</strong> nonacademic<br />
as well as students’ performance. Teaching, research <strong>and</strong> community engagement were<br />
the main strategic areas of the university. The university has attracted <strong>and</strong> retained some of the best<br />
staff <strong>and</strong> students <strong>and</strong> continues to reach its objectives As a result, the university had a strategy to<br />
train <strong>and</strong> equip its employees, to perform their individual tasks. One of the interviewees put it as<br />
follows:<br />
Currently in my department everybody knows how to perform <strong>and</strong> address different functions as well<br />
as to manage other employees. Additional method that we normally use is to keep up with current<br />
issues.<br />
Other strategies of the university were: the University was committed to excellence, within the field of<br />
academia. It also offered good support to staff <strong>and</strong> its students by promoting <strong>and</strong> rewarding good<br />
teaching <strong>and</strong> providing appropriate academic student support. The university remained committed to<br />
promoting racial, ethnic <strong>and</strong> gender equality even though there were some departments that were not<br />
comfortable with these practices.<br />
The university aimed to recruit excellent academics that were from previously disadvantaged areas. In<br />
addition, they specifically encouraged excellent postgraduate students from these groups to pursue,<br />
further their academic studies. This strategy had led to mentorship as described by one of the<br />
employees:<br />
I’ll make sure that there are st<strong>and</strong>ard procedures that I’ll put in place in terms of training new staff <strong>and</strong><br />
they must work closely with mentors irrespective of racial groupings.<br />
The university strategy also focused on research output. As part of the university strategy, library<br />
services had various resources to supply employees <strong>and</strong> students with relevant materials for their<br />
research <strong>and</strong> other academic activities. The university had received international recognition<br />
regarding their research output <strong>and</strong> it was arguably acclaimed to be the best university in South<br />
Africa, in terms of research <strong>and</strong> student output. Many of the employees acknowledged this, as<br />
expressed by one of the interviewees:<br />
It’s the best university with best resources. If you need databases or books, <strong>and</strong> any academic related<br />
materials, they are available <strong>and</strong> accessible. Also, each department had enough budgets throughout<br />
the academic cycle.<br />
All members were immediately given responsibility on decision making in the department. These<br />
departments invested in the development <strong>and</strong> training of their staff in order to provide excellent<br />
services as well as to maintain the university record of success rate.<br />
Post apartheid, the university was m<strong>and</strong>ated to transform from its former status of being white only.<br />
The university had fair mixed of student registration particularly for those from previously<br />
disadvantaged communities as part of transformation, <strong>and</strong> to increase students’ academic success<br />
rate <strong>and</strong> staff retention.<br />
Environment<br />
The university aimed to address the imbalance relating to staff profile <strong>and</strong> demographics, which still<br />
existed. Even though the university continued to strive for excellence, some areas were behind<br />
schedule with their Master’s <strong>and</strong> Doctoral programmes. This was attributed to the lack of knowledge<br />
sharing <strong>and</strong> access to electronic resources. An interviewee was quoted as saying:<br />
Academics are not sharing enough information with post graduate students <strong>and</strong> I’ve<br />
come to realize that our Master <strong>and</strong> Doctorate students are not performing very well;<br />
they’re way behind schedule of between two to three years.<br />
The university encouraged employees to be proactive in individual <strong>and</strong> group engagement within the<br />
environment. Resources that were provided were easy to access, thereby enhancing <strong>and</strong> improving<br />
delivery. Employees were expected to build a working relationship with experts within their specialised<br />
fields, to promote continuous <strong>and</strong> enriched learning.<br />
344
Magdeline Mashilo <strong>and</strong> Tiko Iyamu<br />
Currently experts are willing to train staff but they will tell you that you must ask <strong>and</strong> be specific<br />
around where you encounter problems.<br />
The University was dominated by white employees. This presented a serious challenge when trying to<br />
transform into a more balanced demographic environment. Many of the white employees had difficulty<br />
in accepting the paradigm shift which was evident in the environment.<br />
Performance<br />
Similar to higher institutions, including universities, Cheetah University of Technology strived very<br />
hard to perform excellently. Their core business <strong>and</strong> focus were students <strong>and</strong> research output.<br />
Materials <strong>and</strong> resources needed to carry out processes <strong>and</strong> activities related to student <strong>and</strong> research<br />
outputs enjoyed high priority.<br />
Over the last three years (2007 to date), the students’ success rate had remained at eighty-six<br />
percent (86%). This performance was attributed to frequent <strong>and</strong> continuous sharing of acquired<br />
knowledge among the staff as dictated by the strategy of the university. Research has grown by<br />
nearly two percent (1.84%), year-on, over the last three (2007 to 2010) years. Through knowledge<br />
sharing many of the employees had developed, <strong>and</strong> this in-turn increased <strong>and</strong> maintained the<br />
performance of the university.<br />
4. Findings<br />
From the analysis presented above, some factors were found to be critical in the sharing on<br />
knowledge in institutions of learning. The factors are discussed as follows:<br />
Transformation<br />
The registration of previously disadvantaged students has risen considerably but it was not at the<br />
level that the government recommends. The university was gradually changing from their old way of<br />
doing things. For example, they have started communicating as well as teaching in English language.<br />
<strong>Management</strong> were willing to take adhere to advice on how to grow <strong>and</strong> develop their employees to<br />
provide excellent services. Most of the employees complied with the policy of the university on<br />
transformation <strong>and</strong> had positive attitude towards fulfilling the operational requirements.<br />
Few employees that have been in the system for long periods of time were not willing to share the<br />
knowledge <strong>and</strong> experience that they have acquired during their years of service at the university.<br />
Racial divide<br />
Racial divide exists at the university community. This became prevalence because a considerable<br />
number of the white employees had difficulty in accepting black employees as their colleagues in the<br />
system. Those who couldn’t h<strong>and</strong>le or find it difficult to integrate with people of other races<br />
intentionally attempted to derail processes <strong>and</strong> activities at the university. These groups of white<br />
employees either reluctantly or bluntly refused to share their acquired knowledge <strong>and</strong> experience.<br />
Some of them had rather resign.<br />
It was important to appoint supervisor to mediate between the groups in order to unite them in<br />
achieving the common objectives of the university. Some employees thought that they had no choice<br />
but to make peace with themselves, <strong>and</strong> were willingly to integrate with colleagues of different races.<br />
Culture<br />
Some employees grouped themselves according to racial lines, which made it difficult for new staff to<br />
fit into their work environment. This has made it difficult for some departments to retain new staff<br />
because there was no support from colleagues including some managers. As a result, many of the<br />
new staff lacked a sense of belonging <strong>and</strong> knowledge sharing with them (non-white) remained a<br />
serious challenge.<br />
Employees find it difficult to fit into the system of the university. Cultural affiliations were upheld<br />
strongly by some individuals <strong>and</strong> groups in the environment. Culture dominated the individuals <strong>and</strong><br />
345
Magdeline Mashilo <strong>and</strong> Tiko Iyamu<br />
groups instead of the university’s interest. Culture was a barrier to knowledge sharing because by<br />
people resisting change as other employees of different races continued to be disadvantaged. Staff<br />
with expertise in the different departments within the university sometimes intimidated new staff with<br />
their capabilities <strong>and</strong> knowledge.<br />
Job security<br />
Experts within departments were insecure about their job for the future. They believed that vigorous<br />
younger employees would take over their jobs <strong>and</strong> they might be forced to take early retirement. They<br />
were not prepared for that.<br />
The behaviour of some of the managers was influenced by their racial <strong>and</strong> cultural affiliations. Many<br />
employees could get away with so many things including manipulating the system, which their nonwhite<br />
counterparts could not get away with.<br />
Technology<br />
<strong>Knowledge</strong> sharing reduces the inefficiencies of searching the World Wide Web <strong>and</strong> retrieving on-line<br />
information. University intranet had a quick link to activities <strong>and</strong> processes for easy access. As a<br />
result, processes <strong>and</strong> activities were linked to be informative. These documents informed employees<br />
on how to perform their individual <strong>and</strong> group functions. Other staff members needed someone to take<br />
them through the process. Employees used intranet or internet to convey information to fellow<br />
colleagues including students.<br />
Through technology, knowledge sharing becomes the key to successful collaborative work <strong>and</strong> early<br />
intervention to help students <strong>and</strong> employees including the academic staff to execute their<br />
assignments <strong>and</strong> tasks. ZU depended on technology to facilitate services to its clients to produce<br />
excellent results. Students were encouraged to take computer literacy courses to enable them to<br />
access electronic resources. These resources were readily available.<br />
Documentation<br />
Documents in the department have been replaced overpowered by the use of electronic resources,<br />
such as emails, telephones <strong>and</strong> face book. Recently at ZU communication between a lecturer <strong>and</strong><br />
students is done via face book. The library has introduced e-communication for to the librarians. Most<br />
of the time information is not documented.<br />
The next section presents the interpretation of the case study.<br />
5. Interpretation of the results from the case studies<br />
The results from the case study, Cheetah University of Technology (CUT) were interpreted. The<br />
interpretation focuses on the factors which influence knowledge sharing at the university. These<br />
factors (context, awareness, value, content, experiment, repository <strong>and</strong> change) as depicted in Figure<br />
1 below are described as follows:<br />
Context<br />
<strong>Knowledge</strong> was defined, acquired, shared <strong>and</strong> applied in the context of the departments, divisions<br />
<strong>and</strong> the university at large. However, some of the employees acquired knowledge which was not<br />
necessary to perform their tasks. Even though some of these employees tried to share the<br />
knowledge, colleagues could often not relate to it, therefore, it was sometimes misinterpreted.<br />
Awareness<br />
The lack of trust in the CUT <strong>and</strong> job insecurity ZU were caused by ignorance. Since the new<br />
dispensation, no employees have lost their jobs, <strong>and</strong> no students or staff has been harmed. Yet,<br />
these factors continue to derail sharing of knowledge <strong>and</strong> information.<br />
Organisational Value<br />
346
Magdeline Mashilo <strong>and</strong> Tiko Iyamu<br />
The value of knowledge is difficult to measure. However, what is more important is the value an<br />
organisation places on the sharing of knowledge. However the value is realised when people adopt<br />
knowledge-sharing behaviour as a culture <strong>and</strong> practice, <strong>and</strong> became aware of the enhanced<br />
performance of the organisation.<br />
Change<br />
Context<br />
Repository<br />
Figure 1: Factors influencing knowledge sharing<br />
Content<br />
Awareness<br />
<strong>Knowledge</strong><br />
Sharing<br />
Experiment<br />
Value<br />
Content<br />
In some instances, employees consciously or unconsciously provided colleagues with content which<br />
was not related to their duties <strong>and</strong> responsibilities. Correct information helps to create awareness,<br />
which in turn, provides choices. If there are no choices, no decisions can be made, <strong>and</strong> inefficiency is<br />
subsequently resulted. This creates uncertainty in the environment.<br />
Experiment<br />
At the university knowledge was shared through various means, one of which is experiment. In the<br />
context of this study, experiment constituted analysed actions which meant putting experience into<br />
practice. Many employees benefited from these actions <strong>and</strong> practice, which were channelled towards<br />
them consciously or unconsciously.<br />
Repository<br />
The rapid <strong>and</strong> evolving developments in information <strong>and</strong> communication technology (ICT) have<br />
transformed the human ability to memorise into a comprehensive data store in technological form that<br />
is known as a repository. The repository is able to hold, <strong>and</strong> virtualised knowledge.<br />
Change<br />
<strong>Knowledge</strong> is continuous artefact, it only come to reality when it practice has impact of negative of<br />
positive change. Change in the context of knowledge sharing within the university environment should<br />
not affect communication adversely despite the racial divide <strong>and</strong> fields of specialisation.<br />
From the analysis of the case study, a conclusion can be drawn on the impact of knowledge sharing<br />
on organisational performance. This is discussed in the following section.<br />
6. The impact of knowledge sharing on the organisation<br />
The performance of the institution, with particular focus on studentship <strong>and</strong> research is dependent on<br />
knowledge. <strong>Knowledge</strong> sharing is influenced by many factors as discussed above. Even though<br />
347
Magdeline Mashilo <strong>and</strong> Tiko Iyamu<br />
managers <strong>and</strong> other employees acted within the University defined processes <strong>and</strong> procedures,<br />
factors such as culture <strong>and</strong> trust among individual levels influenced <strong>and</strong> impacted on how knowledge<br />
was shared in the institution.<br />
Unfortunately, performance contracts or any other techniques were not in place to monitor, manage<br />
<strong>and</strong> ensure that employees subscribed to the university’s strategy to share knowledge <strong>and</strong><br />
information. The structure allowed managers including the employees to use their discretion (as they<br />
saw it fit) in certain areas. Even though there were rules <strong>and</strong> regulation in the University environment,<br />
this did not guarantee a positive outcome.<br />
Individual actions resulting from diverse cultural backgrounds sometime derailed activities <strong>and</strong><br />
processes in the environment. The employees could not be forced to perform their tasks or behave in<br />
a prescriptive way. In many cases, knowledge sharing depended on the agenda of individual<br />
managers, who might coerce employees into certain modes of behaviour. Employees took advantage<br />
<strong>and</strong> exploited the environment. Some employees who were privileged shared <strong>and</strong> communicated<br />
information with colleagues of their choice, when information was supposed to be made available to<br />
the entire unit or department.<br />
The university environment played important role in terms of knowledge acquisition <strong>and</strong> sharing. The<br />
university had employees with different racial, cultural <strong>and</strong> educational backgrounds, situated in<br />
different divisions <strong>and</strong> departments who needed to use a combination of ways to acquire knowledge.<br />
Given the university’s structure <strong>and</strong> environment, diversity in areas of specialization was supposed to<br />
be a necessary condition for knowledge acquisition.<br />
<strong>Knowledge</strong> is an investment when shared among employees within the context, content <strong>and</strong> value<br />
structure of the university. <strong>Knowledge</strong> content, in context, <strong>and</strong> relevance saves the university both<br />
time <strong>and</strong> money through increased efficiency <strong>and</strong> efficacy, which will improve productivity, as well as<br />
increasing students <strong>and</strong> research output. Access to research results allows lecturers <strong>and</strong> students to<br />
benefit from the experiences of others <strong>and</strong> avoids costly duplication of efforts. While the benefits are<br />
substantial, knowledge sharing is difficult <strong>and</strong> challenging to sustain due to distractive <strong>and</strong> derailing<br />
factors such as personal interest rather than the good of the university.<br />
7. Conclusion<br />
Some of the findings were prima facie evidences that led to the study, but there was no empirical<br />
evidence to them. This is one of the strengths of the study. Thus, the study has contributed to the<br />
body of knowledge.<br />
<strong>Knowledge</strong> sharing is critical to transformation in South African higher institutions. The study will<br />
contribute to the development of <strong>and</strong> transformation in South African higher institutions from the<br />
perspective of knowledge sharing <strong>and</strong> management.<br />
References<br />
Bagraim, J. 2007. Motivating the South African workforce. In: WERNER, A. (Ed.). Organisational behaviour : a<br />
contemporary South African perspective. Pretoria: Van Schaik: pp. 69-98.<br />
Bakker, A. B. <strong>and</strong> Schaufeli, W. B. 2008. Positive organisational behaviour: engaged employees in flourishing<br />
organizations. Journal of organizational behaviour(29): pp. 147-154.<br />
Becerra-Fern<strong>and</strong>ez, I. <strong>and</strong> Sabherwal, R. 2001. Organizational knowledge management: a contingency<br />
perspective. Journal of management information systems, 18(1): pp. 23-55.<br />
Betts, S. C. 2003. Contingency theory: science or technology? Journal of business <strong>and</strong> economics research,<br />
1(8): pp. 123-130.<br />
Blanton, J. E., Watson, H. J. <strong>and</strong> Moody, J. 1992. Toward a better underst<strong>and</strong>ing of information technology<br />
organization: A comparative case study MIS quarterly, 16(4): pp. 531-555.<br />
Creswell, J. W. 2007. Qualitative inquiry <strong>and</strong> research design: choosing among five approaches. 2nd ed.<br />
London: Sage.<br />
Denzin, N. K. <strong>and</strong> LINCOLN, Y. S. 2008. Collecting <strong>and</strong> interpreting qualitative materials. 3rd ed. Thous<strong>and</strong><br />
Oaks, CA: SAGE.<br />
Donaldson, L. 2001. The contingency theory of organizations. London: SAGE.<br />
Donaldson, L., Scott, W. R., Martin, J. <strong>and</strong> Weick, K. E. 2004. Challenging the foundations of organization<br />
theory. Work, employment <strong>and</strong> society, 18(3): pp. 607–620.<br />
Dubé, L. <strong>and</strong> Paré, G. 2003. Rigor in information systems positivist case research: current practices, trends, <strong>and</strong><br />
recommendations. MIS quarterly, 27(4): pp. 597-635.<br />
348
Magdeline Mashilo <strong>and</strong> Tiko Iyamu<br />
Hollenbeck, J. R., Moon, H., Ellis, A. P. J., West, B. J., Ilgen, D. R., Sheppard, L., et al. 2002. Structural<br />
contingency theory <strong>and</strong> individual differences: examination of external <strong>and</strong> internal person–team fit. Journal<br />
of applied psychology, 87 (3): pp. 599–606.<br />
Hsu, I. C. 2008. <strong>Knowledge</strong> sharing practices as a facilitating factor for improving organizational performance<br />
through human capital: a preliminary test. Expert systems with applications, 35(3): pp. 1316-1326.<br />
Kang, Y.-J., Kim, S.-E. & Chang, G.-W. 2008. The impact of knowledge sharing on work performance: an<br />
empirical analysis of the public employees’ perceptions in South Korea. International journal of public<br />
administration, 31(14):1548-1568<br />
Kidwell, J. J., V<strong>and</strong>er Linde, K. M. & Johnson, S. L. 2000. Applying corporate knowledge management practices<br />
in Higher Education. Educause quarterly, 4:28-33<br />
Leedy, P. D. & Ormrod, J. E. 2009. Practical research: planning <strong>and</strong> design. 8th ed. Upper Saddle River:<br />
Pearson<br />
Lin, H.-F. 2007. Effects of extrinsic <strong>and</strong> intrinsic motivation on employee knowledge sharing intentions. Journal<br />
of information science, 33(2):135–149.<br />
Sohail, M. S. & Daud, S. 2009. <strong>Knowledge</strong> sharing in higher education institutions: perspectives from Malaysia.<br />
The journal of information <strong>and</strong> knowledge management systems, 39(2):125-142<br />
Yan, C. & Chen, L.-C. 2007. Can organizational knowledge capabilities affect knowledge sharing behavior?<br />
Journal of information science, 33(1):95-109<br />
349
Contextual Inquiry into Business Requirements Elicitation<br />
of Indigenous Enterprise: A Case of the Malaysian Batik<br />
Microenterprise<br />
Nor Laila Md Noor <strong>and</strong> Ariza Nordin<br />
Universiti Teknologi MARA, Shah Alam, Malaysia<br />
norlaila@fskm.uitm.edu.my<br />
ariza@fskm.uitm.edu.my<br />
Abstract: Batik is a traditional art form whose charm lies in its power of storytelling. Batik making is practiced by<br />
various indigenous communities in Asia <strong>and</strong> Africa <strong>and</strong> has evolved into a socio-economic uplift existing as<br />
cottage industry. The Malaysian batik industry was revived by the government intervention to emphasize batik as<br />
a cultural identity <strong>and</strong> also to improve the livelihood of batik producers where the majority operates as indigenous<br />
microenterprises. However, the batik making tasks <strong>and</strong> the management of batik microenterprises are currently<br />
not supported by the use of ICT. To facilitate batik microenterprises ICT adoption we proposed the development<br />
of ICT-based work systems that emphasize the cultural context of batik production. We argued that a technology<br />
conception needs to consider the ecological aspect of batik production that comprises of resources, technology<br />
<strong>and</strong> geography to underst<strong>and</strong> barriers <strong>and</strong> opportunities of technology. To support our argument, we conducted a<br />
batik microenterprise business requirements elicitation to formulate the technology conception for an ICT-based<br />
work system. We adopted the framework that considers a cultural diversified practice <strong>and</strong> focus on the cultural<br />
context as a business requirement for ICT adoption. We conducted a contextual inquiry <strong>using</strong> multi-activity<br />
inquiry that include site visits, face-to-face <strong>and</strong> focus group interviews with an informal community of practice of<br />
batik making. Our participants are representatives of batik advocators, entrepreneurs, practitioners <strong>and</strong><br />
apprentices. We strategize the focus group inquiry in a workshop setting <strong>using</strong> verbal <strong>and</strong> visual cues to navigate<br />
the chaotic <strong>and</strong> fragmented storytelling of group members. From the contextual analysis conducted, we<br />
discovered that the technological conception for batik microenterprise is incomplete. The fear of batik cultural<br />
erosion is overlook as batik makers are more concern with it. Our work will contribute to the systems engineering<br />
of ICT-based work systems for indigenous or cultural influenced business.<br />
Keywords: socio-technical system, community informatics, requirements engineering, microenterprise,<br />
technology adoption, indigenous business<br />
1. Introduction<br />
Batik is an indigenous cultural artifact that is influenced by the creativity of a single or collective<br />
human actions inspired by natural surroundings. Batik is predominant in various indigenous<br />
communities in South East Asia, Africa, India <strong>and</strong> China. The charm of batik lies in its power of<br />
pictorial storytelling where batik motifs depict everyday lives <strong>and</strong> practices. Batik making has evolved<br />
into a socio-economic uplift within indigenous communities <strong>and</strong> has long existed as a cottage<br />
industry. In Malaysia, the batik industry has been revived by the government intervention in support of<br />
the industry. Besides emphasizing batik as a cultural identity, the Malaysian government is also<br />
interested in improving the livelihood of batik producers where the majority operates their trade as<br />
microenterprises. The interest to promote <strong>and</strong> increase the production of batik is currently hampered<br />
by use of traditional methods of batik making like h<strong>and</strong> painting <strong>and</strong> block printing. Currently the<br />
management of batik microenterprises is also not supported by the use of ICT. This situation prevails<br />
as batik makers are concerned with issues of the disruption of the craft's cultural heritage <strong>and</strong> acts of<br />
design theft when batik designs are published. The unique situation of batik making as an indigenous<br />
business is a strong motivating factor to explore on the ICT adoption of batik microenterprise to gain<br />
an insight on to improve their operational efficiencies <strong>and</strong> market positioning. Here, we present our<br />
technology conception approach for batik microenterprises practices from the framework of sociotechnical<br />
systems. We scope our work on the elicitation of business requirements for batik<br />
microenterprise business management. Realizing that batik making involves a cultural heritage<br />
influence, we focus on the dem<strong>and</strong> of rational <strong>and</strong> affective attitude towards batik making in the<br />
elicitation. We argue that the approach of contextual inquiry can help us gain better underst<strong>and</strong>ing of<br />
the batik making situation before attempting to look into possible socio-technical systems solutions.<br />
Our paper covers a broad literature review of microenterprise <strong>and</strong> batik making, technology adoption<br />
<strong>and</strong> socio-technical systems issues. We then report on the contextual inquiry work that we conducted<br />
to elicit business requirements of batik making <strong>and</strong> our findings highlighted pertinent issues in<br />
business <strong>and</strong> ICT strategy alignment.<br />
350
2. Literature review<br />
2.1 The Batik Making enterprise<br />
Nor Laila Md Noor <strong>and</strong> Ariza Nordin<br />
The Malaysian batik industry is clustered under the creative industry <strong>and</strong> divided into small <strong>and</strong><br />
medium enterprises (SMEs) <strong>and</strong> the cottage industry which operates as microenterprises (Wan Teh<br />
1997). However, based on Porter’s industry cluster (Porter 1990) batik will be placed as a h<strong>and</strong>icraft<br />
industry <strong>and</strong> categorized as a historic know-how-based cluster. Within this cluster, the batik business<br />
knowledge is based on the traditional activities that survived over the years through the inheritance<br />
phenomenon across generations spurned by a mentoring process knowledge transfer traditions. Batik<br />
microenterprise business model is about producing batik traditionally for the local market <strong>and</strong> batik<br />
microenterprise are known for the expertise in batik making technique <strong>and</strong> design creativity. In<br />
Malaysia there is no official differentiation batik manufacturers <strong>and</strong> batik artist <strong>and</strong> both belong to one<br />
nationwide community of batik makers. Batik has been endorsed as a cultural heritage entity by<br />
UNESCO in 2009. The knowledge asset is one of the preservation entities. Batik exists as the object<br />
of traditions that inherits traits of traditional knowledge <strong>and</strong> preservation, imperative to the community<br />
memory. As a h<strong>and</strong>icraft product, batik reflects the cultural aspect of the batik making community <strong>and</strong><br />
is subjected to the batik makers’ prioritized agenda. The batik maker is comprehended to have both<br />
an artist <strong>and</strong> a designer attitude within batik making task model. A batik maker is a person who<br />
assumes the role as an artist, a designer <strong>and</strong> a promoter to make batik for cultural <strong>and</strong> business<br />
endeavour. The versatility of the role playing is due to the craftsmen model of business as<br />
microenterprises <strong>and</strong> livelihood strategies. As the role of batik maker is to “make” batik, this dem<strong>and</strong>s<br />
both rational <strong>and</strong> affective attitude towards the artefact <strong>and</strong> its making. The attitude of an artist<br />
features of adhering to self-driven task model, having artistic sense <strong>and</strong> life enrichment objective. On<br />
the other h<strong>and</strong> the designer attitude emphasized on engineering process driven task model, having<br />
technical sense <strong>and</strong> creative sensibility as attitude towards product development. Our synthesized<br />
underst<strong>and</strong>ing of the Malaysian batik maker is illustrated in Figure 1 <strong>and</strong> is derived from formal<br />
sources of batik maker definitions (Jamal 1994; Ismail 1997; Elamvazuthi <strong>and</strong> Morris 2000).<br />
Batik<br />
Maker<br />
Batik<br />
Task Model<br />
Need to create<br />
Romanticist<br />
Artist<br />
Attitude<br />
Designer<br />
Attitude<br />
Rationalist<br />
Need for a new product<br />
or product range<br />
Artistic<br />
Sense<br />
Self-Driven Life<br />
Task Model Enrichment<br />
Transcendental<br />
Proximity Serendipity<br />
Aesthetics<br />
Creative<br />
Engineering Sensibility<br />
Process Driven (Trends)<br />
Task Model<br />
Technical Sense<br />
(Style & Fit)<br />
Batik<br />
Design Artifact<br />
Figure 1: A synthesized underst<strong>and</strong>ing Malaysian Batik Maker<br />
Effort of promoting <strong>and</strong> upgrading the batik industry must not ignore the cultural <strong>and</strong> business context<br />
of batik making. The background knowledge of the batik maker also gives an important insight to their<br />
attitude towards ICT adoption.<br />
2.2 ICT adoption, community informatics, socio-technical systems <strong>and</strong> knowledge<br />
systems<br />
The adoption <strong>and</strong> diffusion of ICT throughout a productive system assumes a core position in the new<br />
economy <strong>and</strong> has spurred numerous ICT adoption research conducted from different approaches.<br />
Generally there are three approaches to ICT adoption: the diffusion approach, the adoption approach<br />
<strong>and</strong> the domestication process (Manueli, et al 2007).<br />
351
Nor Laila Md Noor <strong>and</strong> Ariza Nordin<br />
2.2.1 The diffusion approach<br />
In the diffusion approach, the Roger’s Diffusion of Innovation (DOI) theory is used to explain the role<br />
of the media <strong>and</strong> interpersonal contact in providing information that influences a person’s opinion <strong>and</strong><br />
judgment of the technology that leads to the adoption of the technology. DOI theory is used to view<br />
the adoption stages <strong>and</strong> factors leading to adoption. From the DOI theory, the Rogers’ Innovation-<br />
Decision Process model is used to gain further underst<strong>and</strong>ing of the adoption process related to issue<br />
of access. ICT adoption by SMEs is studied in many settings. In the Italian industries, Atzeni <strong>and</strong><br />
Carboni (2006) revealed that weak ICT penetration is due to the size of industry, the lower<br />
reorganization of work practices <strong>and</strong> the sectoral specialization. For the Malaysian SMEs, Khong <strong>and</strong><br />
Eze (2008) confirmed the factors of DOI theory <strong>and</strong> added two other factors which are ICT security<br />
<strong>and</strong> costs. For SMEs in Pol<strong>and</strong>, Spain, Portugal <strong>and</strong> the United States, Arendt (2008) highlighted that<br />
the impact of the lack of access to ICT is less important when compared to the lack of proper<br />
knowledge, education <strong>and</strong> skilled owner-managers <strong>and</strong> employees within the enterprise. This<br />
indicates that the issue ICT non-adoption cannot be solved simply by the provision of ICT access.<br />
ICT adoption studies also scope into adoption by rural poor foc<strong>using</strong> on the barrier to ICT adoption<br />
from the digital divide perspective. Barriers often cited are factors of limited physical access, socioeconomic<br />
<strong>and</strong> socio-personal factors <strong>and</strong> low education level of potential adopters (Foley et al 2002).<br />
However, when addressing ICT adoption in community development, issues of technology<br />
compatibility is more important than issues of access. Helmersen (2006) criticised the approach of<br />
ICT adoption that forces Western technologies on the poor in developing <strong>and</strong> third world nations <strong>and</strong><br />
stressed the need to have a deep local insight that attempt to underst<strong>and</strong> the cultural context that<br />
facilitates ICT adoption. Similarly, Kivunike, et al (2009) studied the facilitating <strong>and</strong> inhibiting factors of<br />
ICT adoption by the rural poor in Ug<strong>and</strong>a from a dem<strong>and</strong>-oriented perspective. They too highlighted<br />
the importance of underst<strong>and</strong>ing the contextual factors that influence ICT adoption. They then<br />
suggested that strategies of ICT adoption should move beyond the provision to facilitate adoption <strong>and</strong><br />
the use of ICT by the rural poor by considering factors such as maintenance costs, quality of services,<br />
ICT skills <strong>and</strong> creating awareness of potential benefits in the rural communities.<br />
Community ICT adoption has evolved into a new discipline known as community informatics (CI) <strong>and</strong><br />
is related to the discipline known as development informatics or ICT4D. Led by Gurstein (2008),<br />
research on CI explored into various methods of research inquiry <strong>and</strong> practice. Moor (2009)<br />
conceived different aspects of community informatics research to consist of contexts/values, cases,<br />
process/methodology, <strong>and</strong> systems <strong>and</strong> is illustrated in Figure 2.<br />
Figure 2: Pillars of community informatics research (sources: Moor 2009)<br />
Moor (2009) also highlighted two important CI research contexts: community-centred development<br />
<strong>and</strong> community knowledge sharing through the development of socio-technical systems such as<br />
knowledge management systems (KMS).<br />
352
Nor Laila Md Noor <strong>and</strong> Ariza Nordin<br />
2.2.2 The adoption approach<br />
The adoption approach explains the adoption decision of users applying different individual <strong>and</strong> social<br />
decision making theories. The adoption literature began with the technology acceptance model (TAM)<br />
which was first presented by Davis in 1975. Since then TAM has been validated in numerous<br />
technology settings <strong>and</strong> is heavily cited in the literature. TAM is used to determine adoption<br />
influencing factors in IT systems both in the voluntary <strong>and</strong> m<strong>and</strong>atory used systems <strong>and</strong> adoption is<br />
reflected in the overall user acceptance. Key constructs of TAM are perceived usefulness <strong>and</strong><br />
perceived ease of use of IT systems <strong>and</strong> have been used to determine the acceptance of the<br />
technology. However in TAM, personal control factors like behavioural accounts are not taken into<br />
consideration. TAM is also used with the Delone <strong>and</strong> McLean IS Success Model to determine the<br />
influence of systems quality <strong>and</strong> information quality of the IT systems on the success <strong>and</strong> failures of IT<br />
systems. Further extension of TAM will be the <strong>Information</strong> Technology Adoption Model (ITAM) by<br />
Dixon (1999) that seeks to refine the IT requirements of the information systems that influences IT<br />
adoption leading to the development of the IT adoption framework that includes the interaction<br />
between individuals, technology <strong>and</strong> tasks (FITT framework). The FITT framework focuses on the<br />
significance of the optimal interaction (fit) of individual user, technology, <strong>and</strong> task attributes. Now the<br />
fit between the attributes is seen to be more important than the individual attributes themselves. For<br />
example, IT skills of the users are not sufficient for the success of an introduction. The IT skills must<br />
match the requirements by the IT software.<br />
2.2.3 The domestication process<br />
Domestication is described as the process of technology adoption into everyday life <strong>and</strong> originates<br />
from other disciplines such as anthropology, consumption studies <strong>and</strong> media studies. Domesticating<br />
ICT involves a process of bringing new forms of ICT into the home (Chen <strong>and</strong> Zhang 2009) <strong>and</strong><br />
involves the integration of technologies into social relationships <strong>and</strong> structures. The domestication<br />
framework has four concurrent phases: the appropriation, the objectification, the incorporation <strong>and</strong> the<br />
conversion. This approach of adoption considers the context in which ICT is experienced by the<br />
people <strong>using</strong> them. Conceptual context distinctions are applied to approach where three important<br />
distinct contexts are identified. The first is the work <strong>and</strong> leisure context, the second will be the endusers<br />
that belong or do not belong to a demographic group <strong>and</strong> the third is the private <strong>and</strong> the public.<br />
2.3 Microenterprise, work systems <strong>and</strong> socio-technical systems<br />
Research on ICT adoption by SMEs attempt to determine whether ICT adopted throughout the<br />
production process can produced positive outcomes related to operational efficiencies, increased<br />
revenues <strong>and</strong> better market positioning. Alter (2002), defined a work systems framework that outline<br />
nine elements that can be used to analyze the professional context to address issues of productivity<br />
<strong>and</strong> sustainability. However, the challenge of microenterprise ICT adoption is multi-dimension where<br />
human factor is a central issue (Duncombe <strong>and</strong> Molla 2009). Kamal, et al (2010) raises the issues of<br />
affordability, awareness, management capabilities <strong>and</strong> the lack of ICT infrastructure which are not<br />
address in the earlier work systems framework such as Alter’s framework. Duncombe <strong>and</strong> Molla<br />
(2009) who presented four archetypes of information systems formalization amongst SMEs in<br />
Botswana, pointed out the importance of looking into the systemic approach when considering the<br />
adoption of information systems in SMEs. A firmer assertion was made by Hoffman, et al (2009) who<br />
argued that work systems can be viewed from a socio-technical systems perspective to include a<br />
cultural phenomena approach that will help researchers comprehend the application of works systems<br />
outside the professional work context. They further elaborated on the macrocognition approach to<br />
help comprehend work systems robustness, resilience <strong>and</strong> adaptiveness.<br />
A micro-perspective of microenterprise ICT adoption can be viewed from the theoretical lens of sociotechnical<br />
systems (STS). STS is a social system sitting upon a technical base <strong>and</strong> comprises of the<br />
technology, the people <strong>and</strong> their personal communication <strong>and</strong> tasks, views, organizational structures,<br />
co-operation <strong>and</strong> others (Whitworth 2008). Here an STS perspective will shed some light on factors to<br />
work on to promote microenterprise ICT adoption. This view is aligned to earlier findings of Tschiersch<br />
<strong>and</strong> Schael (2003) who stated that as industry gets shaped by technology through the process of<br />
production automation, computer-supported information <strong>and</strong> co-operation networks, the reliance will<br />
no longer be on mere technical systems but rather on STS. Three technology related dimensions of<br />
STS are namely, the workplace, the group work <strong>and</strong> the network. In the workplace dimension, the<br />
concern will be on the actual use of technology within the working process. According to Tschiersch<br />
353
Nor Laila Md Noor <strong>and</strong> Ariza Nordin<br />
<strong>and</strong> Schael (2003), from the human centered perspective, the most complex aspect of human work<br />
takes into consideration the intrinsic need of people to develop themselves further <strong>and</strong> to experience<br />
through their work, challenges, motivation, success <strong>and</strong> satisfaction. They further added that the<br />
design of STS should try to fulfill meaningful <strong>and</strong> rewarding tasks which also take account of the<br />
individuality of the human operator. The approach to design a socio-technical system is to explicitly<br />
recognize the technology’s symbiotic relationship with society, <strong>and</strong> so tries to involve end-users in the<br />
creation of the technical products that will affect their lives.<br />
2.4 Business requirements elicitation<br />
The traditional approach of requirements elicitation is mainly centered on hardware <strong>and</strong> software<br />
requirements <strong>and</strong> is often dominated by technical issues of functionality, connectivity, interoperability<br />
<strong>and</strong> security. Isabirye (2009) highlighted the issue of design-reality gaps between ICT analysts <strong>and</strong><br />
users which is due to the detachment from the context of a proposed system to be implemented. This<br />
follows Heeks (2002) beliefs of the gaps between the system design which is based on the analyst’s<br />
perceptions <strong>and</strong> the reality which is often foreign to the analyst. According to Disse (2001) system<br />
requirements are best determined through merging the different viewpoints of the stakeholders<br />
involved. Whitworth (2009) presented a comprehensive view of socio-technical requirements that he<br />
hierarchically group into physical, information, personal <strong>and</strong> communal requirements. He suggested<br />
that STS which involves community influence <strong>and</strong> participation should consider personal <strong>and</strong><br />
communal requirements that he prescribed in his WOSP model. We interpret this into the necessity of<br />
underst<strong>and</strong>ing the cultural context of the problem domain of batik making. This implies that the<br />
technological conception of an ICT-based work system for batik microenterprise dem<strong>and</strong>s a holistic<br />
underst<strong>and</strong>ing of problem situation <strong>and</strong> current resolution towards community empowerment with<br />
desirable cultural identity development. A contextual inquiry is necessary for the requirements<br />
elicitation.<br />
2.5 Contextual inquiry<br />
Contextual inquiry is a technique for examining <strong>and</strong> underst<strong>and</strong>ing users <strong>and</strong> their workplace, tasks,<br />
issues <strong>and</strong> preferences. It is a synthesis of ethnographic, field research, <strong>and</strong> participatory design<br />
methods that provide designers with grounded <strong>and</strong> detailed knowledge of user work as a basis for<br />
their design (Hotzblatt <strong>and</strong> Jones 1993). Within the human computer interaction (HCI) literature,<br />
contextual inquiry is commonly-known as the user-centered approach. In contextual inquiry, studies<br />
on the users are made in the context of their work by observing how they perform tasks, the tools they<br />
used <strong>and</strong> the process involved in their work. Contextual inquiry can be conducted in a laboratory<br />
where participants in the inquiry are observed under a usability testing set-up or conducted in an<br />
ethnography study set-up or conducted as a focus group workshop (Summers, et al 2004). Outside<br />
the context of HCI studies contextual inquiry is also used in information systems requirements that<br />
apply the soft systems methodology (SSM) as seen in the work of Bednar <strong>and</strong> Welch (2006, 2009).<br />
The strength of conducting contextual inquiry in requirements elicitation is the ability to investigate the<br />
phenomenon of processes that involves human interaction which gives an opportunity to recognize<br />
individual emergence. This will be useful if the work system is seen as a network of human actors,<br />
interacting <strong>and</strong> communicating <strong>using</strong> available means (including technological artifacts), <strong>and</strong> then<br />
complexity is recognized through the individual sense-making processes of each actor Bednar <strong>and</strong><br />
Welch (2009).<br />
3. Methodology<br />
We aim to formulate a technological conception of an ICT-based work system for batik<br />
microenterprise. We employed contextual inquiry in the elicitation of business requirements of batik<br />
microenterprise to gain insight on batik making operational efficiency <strong>and</strong> sustainability. Based on our<br />
literature work, our research took into account the importance of community <strong>and</strong> cultural context of the<br />
batik microenterprise. We described our approach in the next sub-section.<br />
3.1 The overall method<br />
The data collection is conducted over a period of six months through different data collecting activities<br />
consisting of personal interview with stakeholders, visits to actual business sites <strong>and</strong> focus group<br />
interview before attempting to produce the refinements of the business requirements. (Figure 3).<br />
354
Nor Laila Md Noor <strong>and</strong> Ariza Nordin<br />
Figure 3: Overall method<br />
Although the focus of this research is on batik microenterprise the contextual inquiry covers other<br />
batik making stakeholders to gain an underst<strong>and</strong>ing of the batik making ecosystem. The data<br />
collection was done sequentially to allow for re-adjustment <strong>and</strong> re-alignment of our underst<strong>and</strong>ing the<br />
batik making context.<br />
3.2 Sampling<br />
In this study, the duality strategy (individual – collective) is chosen for the unit of analysis <strong>and</strong><br />
comprises of (1) individual microenterprise/SME <strong>and</strong> (2) the collective- component of informal batik<br />
community of practice made of advocators, designers <strong>and</strong> apprentice). The overall sampling for the<br />
contextual inquiry is done based these different stakeholders <strong>and</strong> the roles of the actors within these<br />
groups are illustrated in Table 1.<br />
Table 1: Hierarchy of Batik Makers<br />
Actor Role<br />
Apprentice A novice designer who have less than 5 years experience of practice.<br />
Designers A designer with experience more than 5 years in practice <strong>and</strong> still actively practicing.<br />
Advocating<br />
Designers<br />
A teacher for formal learning who is a textile designer by formal training <strong>and</strong> practice with<br />
more than 10 years practicing experience or teaching or mentoring<br />
3.3 Face-to-face interview<br />
We conducted face-to-face interview with an advocating designer <strong>and</strong> a practising designer to<br />
familiarise with the research context. As we familiarised with the research phenomenon our ability of<br />
foc<strong>using</strong> into areas the respondents considered important is crucial. For example, one of the<br />
respondents introduced the conception design by accident/serendipity which means that knowledge is<br />
sometimes shared in ad hoc situations <strong>and</strong> this received further attention in the following interviews.<br />
The interviews were recorded <strong>and</strong> after transcription they were sent to the respondents to be verified.<br />
3.4 Focus group interview<br />
The focus group interview was conducted as a story-telling workshop that allows the participants to<br />
share their story <strong>and</strong> able to express their opinion. The participants consist of representatives from<br />
three actor groups shown in Table 1. The preparation of the workshop was done to take great care<br />
that participants’ opinions are respected.<br />
3.4.1 Instrumentations<br />
Two types of instruments were used. The first is the visual cues which are digitized images of batik<br />
artefacts. Artefact digitization sessions were done during the early stage of the research before focus<br />
groups session. The visual cues are used similarly like technology probe to trigger stories <strong>and</strong><br />
boundaries for the storytelling session. Verbal cues are used by facilitator to align stories with the research<br />
questions formulated prior to the workshops. The verbal sues used are shown in Table 2.<br />
355
Table 2: Verbal cues<br />
Nor Laila Md Noor <strong>and</strong> Ariza Nordin<br />
Objective Cues<br />
Domain <strong>Knowledge</strong><br />
Acquisition<br />
Applied Design<br />
<strong>Knowledge</strong><br />
Visualization<br />
Aesthetic <strong>Knowledge</strong><br />
Visualization<br />
Tell us your life story of making batik:<br />
How you do learn to make batik? How do you get involve in batik making?<br />
What are your social network, social responsibility as a batik maker?<br />
How can we identify traditional <strong>and</strong> contemporary batik?<br />
Describe your experience to produce a batik product from planning to finish<br />
product:<br />
How do you know what to produce?<br />
Describe stages of idea development until sketches of design<br />
How do you know your product has aesthetics value realized?<br />
How do you judge batik aesthetics?<br />
3.4.2 Procedures<br />
The activities of the focus group interview are described in Table 3.<br />
Table 3: Focus group activities<br />
Component Description<br />
Structure Each focus group workshop was conducted with 12 selected participants who are group<br />
according to their actor’s role.<br />
Timeframe<br />
Introduction. (5 minutes):<br />
(150 The facilitator explained the research-driven story to the group <strong>and</strong> provided everyone with<br />
minutes)<br />
paper <strong>and</strong> pens. The timing was controlled to avoid unnecessary delay.<br />
Case Story Session (5 – 10 minutes)<br />
The workshop participants spent time before the session writing their story based on their<br />
experience of a particular theme. As the story is being told, participants were told to note<br />
details of the story <strong>and</strong> ideas for questions <strong>and</strong> not to interrupt, <strong>and</strong> to respect confidentiality.<br />
The observer for each group took notes.<br />
Conversational & Informal Dialogue (25 – 30 minutes)<br />
The listeners write down their immediate reflections on the story: similarity/difference of the<br />
story with own story. Then they share their reflections within the group, one at a time with no<br />
interruptions. The observer for each group took notes.<br />
Group Ethics Promotes Emergence Not Forcing: Critical, asking <strong>and</strong> answering probing questions about the<br />
& Protocol<br />
subject matter in order to do it better not to force emergence.<br />
Promotes Caring: Ensure that our questions <strong>and</strong> our answers are generated in a climate of<br />
respect for the values.<br />
Promotes Confidentiality: Respecting the storytellers who are taking the risks to share their<br />
experiences. Video Recording is done with permission from participants<br />
3.5 Actual site visit<br />
We visit two batik microenterprise sites to make live observation of the batik making realities. We also<br />
conducted informal interview with the batik maker. The live observations verify processes of batik<br />
making for each technique to gain inside knowledge of actual practices <strong>and</strong> to gain real life<br />
experience in batik making for comparison with stories acquired from interviews <strong>and</strong> focus group<br />
sessions.<br />
4. Analysis <strong>and</strong> findings<br />
A micro analysis was conducted where content of the transcripts from the personal <strong>and</strong> focus group<br />
interview were coded to make sense of data to facilitate the emergence of open codes <strong>using</strong> the In<br />
Vivo Coding by Atlas TI. As the process is tedious, we took care to avoid the tendency of overconceptualizing.<br />
The open codes for this study were derived from multiple sources of data allowing a<br />
precise differentiation among categories.<br />
Two important discoveries emerged. The first is the business reliance on batik makers’ tacit<br />
knowledge gained from personal experience, batik mentor storytelling <strong>and</strong> non-textual references<br />
such as photographs <strong>and</strong> images from books <strong>and</strong> other repositories of knowledge that includes batik<br />
collection. The second is the concern for the business sustainability in the globalization era related to<br />
the concept of batik cultural erosion. This stems from batik makers resort for discontinuity of batik<br />
cultural rules in order to survive the socioeconomic impact of business globalization. We further<br />
enumerate three dimensions that cover competency deficit, isolated strategies <strong>and</strong> diverse level of<br />
need shown in Figure 4. The rest of this section presents the dimensions <strong>and</strong> related elements.<br />
356
Isolated<br />
Strategies<br />
Nor Laila Md Noor <strong>and</strong> Ariza Nordin<br />
Batik Maker’s<br />
Position<br />
(Promoting Cultural Erosion)<br />
Diverse Needs<br />
Competency<br />
Figure 4: Dimensions of Batik Makers’ position<br />
Lack of cultural knowledge <strong>and</strong> mimetic style related to batik maker’s competency dimension is a<br />
main concern for business sustainability of batik making. Competency refers to set of skills, related to<br />
cultural knowledge <strong>and</strong> attributes that allow an individual to make batik. Two types of competency are<br />
personal <strong>and</strong> mimetic. Personal competency relates to individual emotional intelligence while mimetic<br />
competency relates to mimetic styles capability <strong>and</strong> social semiotic. The workshop participants have<br />
also pointed out due to livelihood condition batik makers have adversities to deal with. As a result<br />
personal competency development has been neglected as survival process strives for better income<br />
<strong>and</strong> living conditions. The process of survival dem<strong>and</strong>s low cost of production <strong>and</strong> product market<br />
availability. Mostly isolated unwritten strategies that govern behaviours to meet those dem<strong>and</strong>s places<br />
the batik maker in a difficult position to oblige to the cultural rules (indigenous nature) <strong>and</strong> fitting in the<br />
business scenario. Four areas of concern related to these strategies are:<br />
Efficiency: the optimal method to accomplish batik making task;<br />
Calculability: quantifiable aesthetics values rather than subjective, establishing mass production, to<br />
match quantity with quality <strong>and</strong> to meet dem<strong>and</strong> at lowest cost of production;<br />
Predictability: St<strong>and</strong>ardized <strong>and</strong> uniformity;<br />
Control: Replacement of human <strong>and</strong> non-human technologies in batik making.<br />
These findings have huge implication on the development of ICT-based works systems for batik<br />
microenterprise. Although batik makers were concern with efficiency, they are not willing to sacrifice<br />
the indigenous nature of their batik artifacts. An ICT-based work system that only increases their<br />
operational efficiency may not be able to help them retain the competency of batik making which is<br />
seen to be more crucial. A new set of requirements dictated by the batik domain knowledge cannot be<br />
ignored. A relevant ICT-based work system for batik microenterprise will be one that supports the<br />
knowledge creation of batik either for an individual or for a community of batik makers.<br />
5. Conclusion<br />
In this paper we have presented our concern for the technology conceptualization required for the<br />
development of an ICT-based work system for the batik microenterprise. We attempted a business<br />
requirement elicitation work for batik microenterprise by conducting a contextual inquiry aligning it with<br />
concern of batik community. We made two important discoveries of batik makers’ concern which<br />
influences the batik making business requirements. The first is on the reliance of tacit knowledge of<br />
batik making <strong>and</strong> the second is on the fear of batik cultural erosion which cannot be overcome by the<br />
development of production-based work systems that only emphasize efficiency. From our findings, we<br />
are suggesting that any attempt to develop an ICT-based work system for batik microenterprise must<br />
357
Nor Laila Md Noor <strong>and</strong> Ariza Nordin<br />
not ignore these two concerns. Our future work will be on the exploration of future ICT-based work<br />
systems for batik microenterprise.<br />
Acknowledgements<br />
This research is supported by the research grant (Grant No: 01-01-01-SF0068) awarded by the<br />
Ministry of Science, Technology <strong>and</strong> Innovation, Malaysia under the E-Science Grants Scheme.<br />
References<br />
Arendt, L. (2008). Barriers to ICT adoption in SMEs: how to bridge the digital divide? Journal of Systems <strong>and</strong><br />
<strong>Information</strong> Technology, 10(2):93-110<br />
Atzani, G. E. <strong>and</strong> Carboni,O. A. (2006). North-South Disparity in ICT Adoption in Italy: An Empirical Evaluation of<br />
the Effects of Subsidies. Working Papers 2006/08, Centro Ricerche Economiche Nord Sud, Università di<br />
Cagliari <strong>and</strong> Università di Sassari<br />
Bednar, P.M. <strong>and</strong> Welch, C. (2008). Generating Real Business Value: Transcending the Socio-Technical<br />
Dimension. Proceedings of the European Conference of <strong>Information</strong> Systems (ECIS 2008).<br />
Bednar, P.M. <strong>and</strong> Welch, C. (2009). Contextual Inquiry <strong>and</strong> Requirements Shaping in <strong>Information</strong> Systems<br />
Development, Springer, pp:225-236<br />
Dixon DR (1999). The Behavioral Side of <strong>Information</strong> Technology. International Journal Medical Informatics,<br />
56(1-3):117-123.<br />
Duncombe, R. <strong>and</strong> Heeks, R. (2001) <strong>Information</strong> <strong>and</strong> Communication Technologies <strong>and</strong> Small Enterprise in<br />
Africa, Lessons from Botswana. IDPM, University of Manchester.<br />
Duncombe, R. Molla, A. (2009). Formalisation of <strong>Information</strong> Systems in sub-Saharan African Small <strong>and</strong> Medium<br />
Enterprises: Case of Botswana. African Journal of <strong>Information</strong> Systems, 1(2):1-29.<br />
Elamvazuthi , I. <strong>and</strong> Morris, A. (2000). “An investigation of the Colour of Reactive Dye on Woven Fabrics for the<br />
Batik Colouring Process”, Proceedings of the Malaysian Science <strong>and</strong> Technology Congress, Kuala Lumpur,<br />
Malaysia, pp:680-700<br />
Foley, P, Alfonso, X. <strong>and</strong> Ghani. F. (2002) The Digital Divide in a World City. Report Prepared by IECRC <strong>and</strong><br />
Citizens Online for the Greater London Authority, London Connects <strong>and</strong> the London Development Agency.<br />
Heeks, R. (2002). Failure, Success <strong>and</strong> Improvisation of <strong>Information</strong> Systems Projects in Developing Countries.<br />
Manchester: Manchester University.<br />
Helmersen, P. (2006). Human Factors in Emerging Markets: First World Solutions Addressing Third World<br />
Needs. Proceedings of the 20 th International Symposium on Human Factors in Telecommunication, France,<br />
20-23 March<br />
Hoffman, R.R., Norman, D.O. <strong>and</strong> Vagners, J. (2009). “Complex Sociotechnical Joint Cognitive Work Systems”?<br />
IEEE Intelligent Systems, May-June 2009<br />
Ismail, S.Z. (1997). The Traditional Malay H<strong>and</strong>icraft Design. Kuala Lumpur: Dewan Bahasa dan Pustaka.<br />
Jamal ,S.A. (1994). Form & Soul. Dewan Bahasa dan Pustaka: Ministry of Education Malaysia Kuala Lumpur<br />
Khong, S.T. <strong>and</strong> Eze, U.C. (2008). An Empirical Study of Internet-Based ICT Adoption Among Malaysian SMEs.<br />
Communications of the IBIMA, Vol 1.<br />
Manueli, K., Latu, S., <strong>and</strong> Koh, D. (2007). ICT Adoption Models. Proceedings of the 20th Annual Conference of<br />
the National Advisory Committee on Computing Qualifications (NACCQ 2007), Nelson, New Zeal<strong>and</strong>.<br />
Moor, A. (2009). Collaboration Patterns as Building Blocks for Community Informatics. Keynote Address, Prato<br />
Community CIRN Conference 2009, Prato, Italy.<br />
Porter, M. (1990). The New Competitive Advantage of Nations. Free Press: New York.<br />
Stillman, L. <strong>and</strong> Linger, H. (2009). Community Informatics <strong>and</strong> <strong>Information</strong> Systems: Can They Be Better<br />
Connected? The <strong>Information</strong> Society: An International Journal, 25(4): 225-264<br />
Summers,K., Knudtzon, K., Weeks, H.,, Kaplan, N., Chisik, Y., Kulkarni, R., Moulthrop, S (2004). Supporting<br />
Sociable Literacy in the International Children’s Digital Library. Proceedings of the 2004 Conference on<br />
Interaction Design <strong>and</strong> Children: Building a Community.<br />
Tschiersch, I. <strong>and</strong> Schael, T. (2003). Concepts of Human Centered Systems<br />
W.H. Wan Teh (1996) Malay H<strong>and</strong>icraft Industries. Kuala Lumpur: Dewan Bahasa dan Pustaka,<br />
358
HOT-fit Evaluation Framework: Validation Using Case<br />
Studies <strong>and</strong> Qualitative Systematic Review in Health<br />
<strong>Information</strong> Systems Evaluation Adoption<br />
Maryati Mohd Yusof<br />
Universiti Kebangsaan Malaysia, Bangi, Malaysia<br />
mmy@ftsm.ukm.my<br />
Abstract: Rigorous evaluation allows us to assess the extent to which Health <strong>Information</strong> Systems (HIS) achieve<br />
their intended outcomes <strong>and</strong> support the services of healthcare delivery systems. We learn that current<br />
evaluation methods focus on different aspects of HIS <strong>and</strong> they can be improved upon. Based on previous<br />
evaluation studies, we developed a new evaluation framework, HOT-fit (Human, Organization <strong>and</strong> Technology-fit)<br />
that focus on the three factors <strong>and</strong> their fit with each other. It also makes use of earlier models of IS evaluation,<br />
particularly the IS Success Model <strong>and</strong> the IT-Organisation Fit Model. The framework was validated <strong>using</strong> a case<br />
study of a Fundus Imaging System (FIS) of a primary care organization in the UK <strong>and</strong> a qualitative systematic<br />
review of fifty-five case studies. The applicability of the framework is currently being tested in another case study<br />
of a Critical Care <strong>Information</strong> Systems (CCIS) of a tertiary care in Malaysia. The framework has been<br />
progressively refined over the evaluation phases in terms of its dimension, measures <strong>and</strong> sub measures. The<br />
research identifies <strong>and</strong> highlights the following dominant adoption factors: technology (ease of use, system<br />
usefulness, system flexibility, time efficiency, information accessibility <strong>and</strong> relevancy); human (user training, user<br />
perception, user roles, user skills, clarity of system purpose, user involvement); organisation (leadership <strong>and</strong><br />
support, clinical process, user involvement, internal communication, inter organisational system, as well as the fit<br />
between them. The case studies <strong>and</strong> synthesis of the selected evaluation studies of HIS adoption has brought<br />
together disparate findings that summarize the research area, which can be used to better underst<strong>and</strong> adoption<br />
issues <strong>and</strong> to learn from earlier adoption cases. The study shows that comprehensive, specific evaluation factors,<br />
dimensions <strong>and</strong> measures in the HOT-fit framework are applicable in HIS evaluation. We argue that the use of<br />
such framework is useful for the evaluation of both HIS <strong>and</strong> IS, regardless of their context.<br />
Keywords: health information systems, evaluation, framework, human factors, organizational factors, qualitative<br />
1. Introduction<br />
Rigorous evaluation enables one to assess the extent to which HIS achieve its outcomes <strong>and</strong> support<br />
the services of healthcare delivery systems <strong>and</strong> to guide the future investment <strong>and</strong> development of<br />
HIS. However, HIS evaluation is unclear <strong>and</strong> conf<strong>using</strong> (Gremy, 1999) <strong>and</strong> it is argued that an<br />
existing strong foundation for good evaluation theory <strong>and</strong> practice is yet to be disseminated in an<br />
underst<strong>and</strong>able form (Ammenwerth et al., 2004). Evaluation of HIS is also difficult to perform,<br />
particularly in selecting a framework to be applied <strong>and</strong> methods to be used (Mohd. Yusof et al.<br />
2008a). In the search for a comprehensive evaluation approach that could appropriately guide <strong>and</strong><br />
facilitate the evaluation of HIS, we learned the existing evaluation frameworks are incomprehensive in<br />
terms incorporating three important evaluation aspects: human, organisation, technology <strong>and</strong> the fit<br />
between them <strong>and</strong>/or use unspecific evaluation measures. Therefore, a critical review was taken to<br />
investigate this problem further. The aim of this paper is to discuss the progressive design of a new<br />
evaluation framework for HIS, known as HOT-fit (Human, Organization <strong>and</strong> Technology-fit) <strong>and</strong> its<br />
validation <strong>using</strong> case studies <strong>and</strong> a qualitative systematic review.<br />
2. Theoretical background<br />
A critical appraisal of selected HIS evaluation frameworks is undertaken in order to identify their<br />
evaluation dimensions <strong>and</strong> measures. The frameworks are compared based on their inclusion of<br />
human, organisational <strong>and</strong> technological factors. Our review indicates that current evaluation methods<br />
can be improved upon. We found that each of the considered frameworks evaluates different aspects<br />
of HIS. Therefore, it is possible to consider, when evaluating HIS, a more comprehensive HIS<br />
evaluation framework that would incorporate all technological, human <strong>and</strong> organisational issues. The<br />
importance of human <strong>and</strong> organisational factors in the development <strong>and</strong> implementation of IS has<br />
been advocated in the IS literature (Kaplan <strong>and</strong> Harris-Solomone, 2009). Rigorous evaluation of HIS<br />
can be undertaken by addressing these factors as well as the fit or alignment between them (Mohd.<br />
Yusof et al., 2008a).<br />
The proposed HOT-fit framework was developed after a critical investigation of the existing findings of<br />
HIS <strong>and</strong> IS evaluation studies (See Figure 1). We adopted The IS Success Model because of its<br />
comprehensive, specific evaluation categories, extensive validation <strong>and</strong> its applicability to HIS<br />
359
Maryati Mohd Yusof<br />
evaluation (De Lone <strong>and</strong> McLean, 1992; De Lone <strong>and</strong> McLean, 2004). HOT-fit makes use of the IS<br />
Success Model in categorising its evaluation factors, dimensions <strong>and</strong> measures. Findings from the<br />
selected literature of IS <strong>and</strong> Health Informatics were used to identify the evaluation dimensions <strong>and</strong><br />
measures of HIS. In addition, the IT-Organisation Fit Model (Scott Morton, 1991) is used to<br />
complement the IS Success Model by integrating its featured organisational factors <strong>and</strong> the concept<br />
of fit between the human, organisational <strong>and</strong> technological factors.<br />
Figure 1: Human-Organization-Technology fit (HOT-fit) framework<br />
Human, organisation <strong>and</strong> technology are the essential components of IS <strong>and</strong> the impacts of HIS are<br />
assessed in the net benefits. These three factors <strong>and</strong> the impacts of HIS correspond to nine<br />
interrelated dimensions of HIS success: System Quality, <strong>Information</strong> Quality, Service Quality, System<br />
Development, System Use, User Satisfaction, Organisational Structure, Organisational Environment<br />
<strong>and</strong> Net Benefits. Each of these dimensions is associated with a number of evaluation measures. The<br />
description of the evaluation factors, dimensions <strong>and</strong> measures of the earlier version of the proposed<br />
HOT-fit framework is discussed extensively in Mohd. Yusof et al., 2008b. During the analysis of the<br />
systematic review, we identified System Development, a new dimension of human factor, which<br />
relates to a number of processes in a system development life cycle, including clarity of system<br />
purpose, feasibility study, planning, design, system selection, installation strategy, conversion style<br />
<strong>and</strong> maintenance. Other relevant evaluation measures include project management, scheduling, <strong>and</strong><br />
momentum, user involvement <strong>and</strong> relationship with technical people.<br />
Based on its comprehensive dimensions <strong>and</strong> outcome measures, the framework can be used to<br />
evaluate the performance, effectiveness <strong>and</strong> impact of HIS or IT in healthcare settings. The three<br />
evaluation factors can be evaluated throughout the whole system development life cycle as specified<br />
in the System Development dimension. As mentioned above, each phase focuses on different<br />
issues. This framework can be applied <strong>using</strong> qualitative, quantitative or a combination of both<br />
approaches. Subsequently, any data collection methods from both approaches can be employed<br />
during the conduct of the evaluation.<br />
3. Research methodology<br />
3.1 Research approach<br />
Our research design consists of two research strategies, namely case study <strong>and</strong> systematic review.<br />
Our qualitative approach employs both inductive <strong>and</strong> deductive reasoning. In being inductive, we<br />
repeated cycles of data collection <strong>and</strong> analysis to generate propositions inductively from the data<br />
cycles (<strong>using</strong> data already collected as well new data collected by that purpose) (Kaplan <strong>and</strong> Maxwell,<br />
1994). On the contrary, we used the deductive reasoning to test prior propositions associated with the<br />
proposed framework on new cases (Murphy et al., 1998).<br />
360
Maryati Mohd Yusof<br />
In order to validate its usefulness, the HOT-fit framework was tested in real clinical settings of a<br />
Fundus Imaging System in a NHS primary care organisation in the UK. The framework was further<br />
validated <strong>using</strong> fifty-five case studies selected in the systematic review. We then apply the framework<br />
in another case study of a Critical Care <strong>Information</strong> Systems (CCIS) used in a tertiary care in<br />
Malaysia. The approach used in this study was that of a subjectivist, case study <strong>and</strong> systematic<br />
review strategy employing qualitative methods.<br />
Our research design consists of two research strategies, namely case studies <strong>and</strong> a systematic<br />
review that were conducted in two phases (See Figure 2). Another case study is being conducted in<br />
the third phase.<br />
Figure 2: Validation process for the Human-Organization-Technology fit (HOT-fit) framework<br />
The exploratory case study provide us the underst<strong>and</strong>ing of the actual clinical setting, thereby guided<br />
us to select <strong>and</strong> to better underst<strong>and</strong> the relevant studies in our second research strategy, the<br />
systematic review. The review was carried out over 12 months <strong>using</strong> a larger sample of case studies<br />
(fifty five cases) from various sources, health information systems types <strong>and</strong> clinical contexts. The<br />
decision to conduct this systematic review was taken on the basis that it can provide wider<br />
perspectives to the adoption issues of HIS, particularly in the critical factors that contribute to its<br />
success <strong>and</strong> failure. The use of systematic review was also chosen in order to validate our proposed<br />
framework further, which spans across the human, organisation <strong>and</strong> technology issue <strong>and</strong> the fit<br />
between them.<br />
A systematic review comprises the synthesis of both qualitative <strong>and</strong> quantitative research in a<br />
comprehensive manner, thus provides the underst<strong>and</strong>ing of various contexts of Health <strong>Information</strong><br />
Systems (HIS) adoption in clinical practice. The ability to examine the most critical adoption factors<br />
<strong>and</strong> to validate the proposed framework across a bigger sample of case studies <strong>using</strong> the systematic<br />
review is argued to be more advantageous <strong>and</strong> informative compared to the conduct of a few more<br />
case studies. Time factor is another issue involved in the selection of the systematic review since the<br />
conduct of individual case study is much more time consuming as opposed to the conduct of a<br />
systematic review. The information from the variance of case studies also offered richer information<br />
<strong>and</strong> more outlooks to the adoption issues. In addition, the systematic review can support decisionmaking<br />
by informing the most critical factors for HIS adoption.<br />
This systematic review consists of a number of discrete activities: 1) identification of the need for a<br />
review, 2) formulation of a research question, 3) development of a review protocol 4) location of<br />
studies, 5) selection of primary studies, 6) quality assessment of included studies, 7) data extraction,<br />
8) data analysis, 9) interpretation of results, 10) report writing.<br />
361
Maryati Mohd Yusof<br />
The search for articles that addressed issues pertinent to HIS evaluation was conducted <strong>using</strong> a<br />
number of databases ranging from medical, informatics <strong>and</strong> engineering field. The search terms were<br />
individualized for each database <strong>and</strong> included terms for: (health or medical) informatics, system,<br />
computer based, evaluation <strong>and</strong> assessment. In this systematic review, evaluation study is defined as<br />
a methodical, empirical assessment of health information system in clinical settings. The type of study<br />
design selected is case study as it provides underst<strong>and</strong>ing <strong>and</strong> insight into the research question.<br />
Thus, other study designs, such as experiment <strong>and</strong> survey are not included in this systematic review.<br />
HIS st<strong>and</strong>s for any computer based information systems that involves human interaction used in<br />
healthcare settings. All computer or knowledge based training <strong>and</strong> education systems for healthcare<br />
professional are excluded in the review, as they are not directly related to clinical care (or clinical use<br />
of technology). Searches were limited to human subjects <strong>and</strong> articles published in English, between<br />
1985 <strong>and</strong> 2005, <strong>and</strong> were completed from January to February 2006. The studies were searched<br />
both electronically <strong>and</strong> manually in order to cover a comprehensive range of literature. The selection<br />
of studies involves a multi-stage process] (See Figure 3).<br />
Figure 3: Methods of study selection<br />
A number of steps were taken to ensure the quality of both research strategies. For the case study,<br />
two tests, namely construct validity <strong>and</strong> reliability were done to establish the quality of the empirical<br />
research. In addition, potential bias was overcome by conducting a reliability test <strong>and</strong> data<br />
triangulation. Foc<strong>using</strong> on the systematic review, a checklist of the assessment of qualitative research<br />
was used to assess all selected empirical papers by judging their serious flaw.<br />
3.2 Application of framework<br />
The HOT-fit framework was used as a guideline in the evaluation of the FIS <strong>and</strong> CCIS. Based on the<br />
HOT-fit framework, four techniques were used to analyse the results: coding, analytic memos (such<br />
as reflection notes, displays, <strong>and</strong> concept maps), <strong>and</strong> contextual <strong>and</strong> narrative analysis (Miles <strong>and</strong><br />
Huberman, 1994; Kaplan <strong>and</strong> Maxwell, 1994). The field notes were fully transcribed on marginmarked<br />
paper. The margins were used to note any reflections, themes relevant to HOT-fit <strong>and</strong><br />
statements which were unclear or needed to be confirmed with the participants. The data were coded<br />
<strong>and</strong> categorised under similar themes or concepts of the HOT-fit framework <strong>and</strong> refined throughout a<br />
series of analyses. These codes correspond to each factor, dimensions <strong>and</strong> measures described in<br />
the HOT-fit framework (See Figure 1). Further, texts under the same category were compared to<br />
identify variations <strong>and</strong> nuances in meanings. Categories were compared to discover connections<br />
between themes. Concept maps were drawn to underst<strong>and</strong> the relationship between a number of<br />
concepts involved in the evaluation of the FIS.<br />
362
Maryati Mohd Yusof<br />
Further framework validation <strong>and</strong> identification of HIS adoption factors were undertaken through a<br />
qualitative systematic review. A number of the following steps were taken to identify the adoption<br />
factors of Health <strong>Information</strong> Systems in the selected studies (Adapted from Wyatt (personal<br />
communication, October 11, 2005)):<br />
1. Assess the adoption status of each study. This was done by classifying the study outcome as<br />
positive, negative, mixed positive <strong>and</strong> negative or unclear for the following adoption criteria (that are<br />
based on the phases in the system development life cycle): system installation, clinical acceptance,<br />
clinical use at specified months, impact on clinical practice, impact on patient care <strong>and</strong> impact on<br />
health organisation.<br />
2. For each study with at least one definite positive, mixed or negative outcome, assess the presence<br />
of the following potential success factors according to the HOT-fit framework <strong>and</strong> emerging themes:<br />
Technology factors such as ease of system use, system flexibility <strong>and</strong> information accessibility.<br />
Human factors such as user training <strong>and</strong> user attitude towards system.<br />
Organisation factors such as leadership, system champion <strong>and</strong> clinical process.<br />
All three factors of technology, human <strong>and</strong> organisation that influence the net benefits.<br />
Factors that influence specific type of system<br />
The fit between human, organisation <strong>and</strong> technology.<br />
3. Identify the most critical adoption factors according to their occurrences in the case studies <strong>and</strong><br />
their association with the success <strong>and</strong> failure of HIS adoption cases.<br />
4. Examine the relationship between these critical factors <strong>using</strong> a conceptual map.<br />
4. Results<br />
The research identifies <strong>and</strong> highlights the following dominant adoption factors: technology (ease of<br />
use, system usefulness, system flexibility, response time/turnaround time, information accessibility,<br />
information relevancy, technical support); human (clarity of system purpose, user involvement, system<br />
design, user training, user perception, user skill/knowledge, user role); organisational (clinical<br />
process, leadership, champion, medical sponsorship, project committee, bridger/mediator), internal<br />
communication, resources, organisational readiness, Inter-organisational Systems as well as fit<br />
between them.<br />
5. Discussion <strong>and</strong> conclusions<br />
The multi-disciplinary approach of HOT-fit addresses the essential components of IS, namely human,<br />
organisation <strong>and</strong> technology, <strong>and</strong> the fit between them <strong>using</strong> a comprehensive, continuous <strong>and</strong><br />
systematic approach. The use of HOT-fit framework can unfold the complexity <strong>and</strong> can greatly<br />
increase the underst<strong>and</strong>ing of the whole human, organisational <strong>and</strong> technology issues, their<br />
relationships <strong>and</strong> fit with each other, system problems <strong>and</strong> performance. In addition, the HOT-fit<br />
framework can also be used to identify the process <strong>and</strong> information requirement of complex<br />
application. HOT-fit provides comprehensive evaluation factors, dimensions <strong>and</strong> measures to analyse<br />
the overall view of the essential system components, development, use, <strong>and</strong> net benefits. It also<br />
incorporates the system development dimension to enable a continuous <strong>and</strong> systematic evaluation.<br />
These are the elements that should be identified to ensure the realisation of HIS.<br />
We evaluate the adoption of two case studies <strong>and</strong> carried out a systematic review to justify their<br />
realisation <strong>and</strong> relative contributing factors. The findings offer a strong indication of the applicability<br />
of the framework to HIS evaluation where the adoption factors in the human, organization, technology<br />
<strong>and</strong> fit between them identified in both research strategies confirmed with the essence of the<br />
proposed framework – the three factors, their respective dimensions, measures <strong>and</strong> the fit between<br />
them. A number of challenges have been encountered while applying the HOT-fit framework in data<br />
analysis. First, there are a number of data that share the same evaluation measures; careful<br />
consideration has to be taken in selecting the most appropriate measures for each data. Second, the<br />
classification of data analysis according to the three evaluation factors has affected the flow of the<br />
narrative approach of presenting the data <strong>and</strong> can result in confusion to the reader.<br />
363
Maryati Mohd Yusof<br />
This systematic review has a number of unavoidable limitations (Chaudhry et al., 2006). Firstly,<br />
although we searched the literature comprehensively, we were able to identify a limited number of<br />
articles related to the case studies of the evaluation of HIS adoption. Many studies relevant to our<br />
topics used either experimental methods such as r<strong>and</strong>omised controlled clinical trials or surveys only<br />
which offer limited insight to HIS adoption. A large number of studies lacked rigour in measuring the<br />
HIS adoption, although their scope was relevant to our research questions. These studies only focus<br />
on limited evaluation aspects, which do not inform the adoption status sufficiently. Reports on system<br />
development, adoption status <strong>and</strong> human <strong>and</strong> organisational issues were also unavailable or limited<br />
in a number of studies.<br />
A number of studies barely described the methodology used in obtaining the result, making it difficult<br />
to assess whether the study was systematic or not, <strong>and</strong> which methodology was used. These studies<br />
present significant findings of the development <strong>and</strong> net benefits of HIS adoption despite the lack of<br />
clear methodological descriptions. They presented the success or failure of HIS adoption in a story<br />
telling manner. Conflict in our selection process, as to whether or not to include them in the systematic<br />
review, was resolved by considering the importance of the findings of these studies to theory <strong>and</strong><br />
practice. The credibility of these studies was justified by checking the credibility of their source or the<br />
existence of such kind of systems <strong>and</strong> their respective settings. A number of authors were contacted<br />
<strong>and</strong> the internet was searched to obtain additional information on the methodology <strong>and</strong> findings of the<br />
selected studies. However, the former approach (contacting authors) was not always feasible, as the<br />
authors were unavailable or unable for other reasons to respond to the reviewer’s queries (Lloyd<br />
Jones, 2004).<br />
Secondly, the selected studies involve a wide range of systems that are described <strong>using</strong> various<br />
terms. We attempted to resolve this problem by structuring our review according to our well defined<br />
HIS taxonomy (Mohd. Yusof et al., 2008a) <strong>and</strong> by identifying both system definitions <strong>and</strong><br />
characteristics.<br />
Thirdly, the heterogeneity in the selected studies caused difficulties in selecting them for inclusion <strong>and</strong><br />
subsequently in extracting <strong>and</strong> analysing them. The use of inconsistent terms <strong>and</strong> jargon, studies<br />
description, methodology <strong>and</strong> research findings created confusion. Further, data from a series of<br />
publications that were produced from the same study were extracted together to gain a broader<br />
picture of the overall evaluation process of that particular study. The difficulty of this process lies in the<br />
effort to extract the combination of comprehensive data from the separate or overlapping/redundant/<br />
replicated findings <strong>and</strong> heterogeneous reporting styles in different publications of the same study.<br />
Fourthly, the relationship of the reviewer, who is conducting a systematic review, with the primary<br />
case studies included in his/her review is quite different from the type of relationship the primary<br />
researchers have with their cases. Its difference lies in a lack of direct contact that enables the<br />
reviewer to fully experience the conduct of the research, observe the setting, <strong>and</strong> enquire participants<br />
for additional information, such as term clarification or event occurrences (Lloyd Jones, 2004). The<br />
study findings of the systematic review were limited by the findings reported in the primary study only.<br />
Similar to the approach taken to check the credibility of the primary studies, authors were contacted to<br />
provide further information, although again this may not always be feasible.<br />
Although our case study focused on specific settings, the proposed evaluation framework is<br />
potentially useful to researchers <strong>and</strong> practitioners for conducting thorough evaluation studies of other<br />
HIS or IT applications in healthcare settings. Thus, our comparative studies can be exp<strong>and</strong>ed in<br />
various system types <strong>and</strong> domains to identify general <strong>and</strong> specific adoption factors. The evaluation<br />
measures can be progressively refined <strong>and</strong> defined into sub measures to enable evaluation at the<br />
granule level, in addition to the general level. As proposed here, the framework can <strong>and</strong> should be<br />
applied in a flexible way, taking into account different contexts <strong>and</strong> purposes, stakeholders’ point of<br />
views, phases in system development life cycle, <strong>and</strong> evaluation methods.<br />
References<br />
Ammenwerth, E., Brender, J., Nykanen, P, Prokosch, H.-U., Rigby, M., Talmon, J. <strong>and</strong> HIS-EVAL Workshop<br />
Participants (2004) Visions <strong>and</strong> strategies to improve evaluation of health information systems: Reflections<br />
<strong>and</strong> lessons based on the HIS-EVAL workshop in Innsbruck. International Journal of Medical Informatics,<br />
73(6), 479-491.<br />
Gremy, F., Fessler, J.M. <strong>and</strong> Bonnin, M. (1999) <strong>Information</strong> systems evaluation <strong>and</strong> subjectivity, International<br />
Journal of Medical Informatics, 56, 13-23.<br />
364
Maryati Mohd Yusof<br />
Kaplan, B., <strong>and</strong> Harris-Solomone, K.D. (2009) Journal of American Medical Association, 16(3), 291-299.<br />
DeLone, W.H. <strong>and</strong> McLean, E.R. (2004) Measuring e-commerce success: applying the<br />
DeLone & McLean <strong>Information</strong> Systems Success Model, International Journal of Electronic Commerce, 9, 31-47.<br />
DeLone, W.H. <strong>and</strong> McLean, E.R. (1992) <strong>Information</strong> Systems Success: The Quest for the Dependent Variable,<br />
<strong>Information</strong> Systems Research 3, 60-95.<br />
Scott Morton, M.S. (1991) The Corporation of the 1990s, Oxford University Press, New York.<br />
Mohd. Yusof, M., Papazeripoulou, A., Paul, R.J., <strong>and</strong> Stergioulas, L. (2008) Investigating Evaluation Framework<br />
for Health <strong>Information</strong> Systems. International Journal of Medical Informatics, 77(6), 377-385.<br />
Mohd. Yusof, M., Kuljis, J., Papazeripoulou, A., <strong>and</strong> Stergioulas, L. (2008) An Evaluation Framework for Health<br />
<strong>Information</strong> Systems: incorporating human, organizational <strong>and</strong> technology-fit factors (HOT-fit). International<br />
Journal of Medical Informatics, 77(6), 386-398.<br />
Kaplan, B., <strong>and</strong> Maxwell, J. (1994) Qualitative Research Methods for Evaluating Computer <strong>Information</strong> Systems,<br />
In C. E. Aydin, Anderson, J. G., Jay, S.J. (Ed.), Evaluating Health Care <strong>Information</strong> Systems; Methods <strong>and</strong><br />
Applications, 45-67. Thous<strong>and</strong> Oaks, Sage Publication.<br />
Murphy, E., Dingwall, R., Greatbatch, D., Parker, S. <strong>and</strong> Watson, P. (1998) Qualitative research methods in<br />
health technology assessment: a review of the literature, Health Technology Assessment, 2(16), 1-275.<br />
Miles, M. B. <strong>and</strong> Huberman, A. M. (1994) Qualitative Data Analysis: An exp<strong>and</strong>ed sourcebook, Sage Publication,<br />
Thous<strong>and</strong> Oaks, California.<br />
Chaudhry, B., Jerome, W., Wu, S., Maglione, M., Mojica, W., Roth, E., Morton, S. C. <strong>and</strong> Shekelle, P. G. (2006)<br />
Systematic Review: Impact of health information technology on quality, efficiency, <strong>and</strong> costs of medical<br />
care, Annals of Internal Medicine, 144, E12-E22.<br />
Lloyd Jones, M. (2004) Application of systematic review methods to qualitative research: practical issues, Journal<br />
of Advanced Nursing 48(3), 271-278.<br />
365
Remembering <strong>and</strong> Recalling: The ERP System as an<br />
Organizational Memory<br />
Gunilla Myreteg<br />
Uppsala University, Sweden<br />
gunilla.myreteg@fek.uu.se<br />
Abstract: The purpose of an enterprise resource planning (ERP) system is to bring several benefits to the<br />
company by <strong>using</strong> a mutual database <strong>and</strong> real time data. Empirical studies yet show that several companies<br />
judge the ERP project as unsuccessful. Implementing <strong>and</strong> <strong>using</strong> an ERP system is a complex process. The<br />
organization must decide what information about daily events <strong>and</strong> transactions needs to be saved <strong>and</strong> thereby<br />
possible to take out for future use. How is the ERP system involved in the process of creating, <strong>using</strong>, <strong>and</strong><br />
maintaining a purposeful data base in an organization? The paper is based on a case study of a medium sized<br />
Swedish manufacturing company during the process of implementing <strong>and</strong> <strong>using</strong> an ERP system. The IT artefact<br />
is conceptualized as an evolving <strong>and</strong> embedded system, which is brought into a dynamic social context. The<br />
social dimension makes the process of implementing an ERP system complex <strong>and</strong> indeterminate. The analysis<br />
investigates the possibilities <strong>and</strong> obstacles that may occur during the process, regarding how, when <strong>and</strong> by<br />
whom information should be stored in, or taken out of, the ERP system. The purpose is to develop an<br />
underst<strong>and</strong>ing of how an ERP system is involved in the process of storing <strong>and</strong> recalling information about events<br />
<strong>and</strong> transactions taking place in the organization. The analysis investigates the ERP system as part of the<br />
organizational memory, <strong>using</strong> the theoretical concepts acquisition, retention, maintenance, search <strong>and</strong> retrieval.<br />
The model is found to be fruitful, since it enhances our underst<strong>and</strong>ing of ERP system usage in an organization.<br />
The analysis investigates the difficulties users encountered, <strong>and</strong> suggests explanations to these difficulties based<br />
on the model of the organizational memory. The aspect of maintenance of information showed to be an<br />
especially important aspect to underst<strong>and</strong> the obstacles to making use of an ERP system’s potential. An ERP<br />
system has the technical possibility to store information for a very long time. Since the system does not<br />
discriminate between high <strong>and</strong> low quality data, it will also store incorrect data forever. A conclusion drawn is that<br />
managers <strong>and</strong> users need to consciously plan the use of the ERP system as part of the organizational memory in<br />
order to utilize the potential benefits of the system. The ERP system per se does not create <strong>and</strong> maintain an<br />
efficient information usage.<br />
Keywords: ERP systems, information processing, information needs, organizational memory<br />
1. Introduction<br />
The starting point is that organizations strive for efficiency <strong>and</strong> for making good decisions. Decision<br />
making is not, however, a rational process but can be described as a bounded rationality. The<br />
decision maker settles for a satisfactory alternative, compared to the aspirations she has formed<br />
before the decision (Simon, 1979). Aspiration levels are changing as new experiences are made<br />
(Simon, 1979). Earlier experiences made by actors in an organization are thus of importance to<br />
underst<strong>and</strong> what is going on in an organization today.<br />
Earlier experiences <strong>and</strong> knowledge of the past are, following this logic, of importance to an<br />
organization <strong>and</strong> its quest for efficiency. History is remembered as memories. Not only do the<br />
individual’s memories come to use in an organization; there are means to retain memories within the<br />
organization (Walsh <strong>and</strong> Ungson, 1991). Organizational memory is defined as “the means by which<br />
knowledge of the past is brought to bear on present activities, thus resulting in higher or lower levels<br />
of organizational effectiveness” (Stein <strong>and</strong> Zwass, 1995, p. 89). The definition involves the<br />
assumption that organizational memory is connected to organizational effectiveness. It allows the<br />
availability of an organizational memory to lead to higher as well as lower levels of effectiveness. The<br />
organizational memory involves possibilities as well as obstacles to members that are active in an<br />
organization. Activities may concern a great variety of tasks, such as planning, decision making,<br />
leading, controlling, communication <strong>and</strong> so on.<br />
Organizational memory need to rely on information technology (IT) support, <strong>and</strong> the expectation is<br />
that an IT-supported memory carries advantages in fulfilling the requirements of organizational<br />
effectiveness <strong>and</strong> decision making (Stein <strong>and</strong> Zwass, 1995). In previous research, findings suggest<br />
that managers need to view IT as a resource, rather than IT in a service role, to ensure the usage of<br />
opportunities for competitive actions (Vannoy <strong>and</strong> Salam, 2010). An ERP system that reaches across<br />
the complete organization has the possibility to be successful in supporting the organizational<br />
memory, since it is important that the IT support is distributed throughout the organization (Stein <strong>and</strong><br />
Zwass, 1995). An ERP system is an evolving <strong>and</strong> embedded system which is brought into a dynamic<br />
366
Gunilla Myreteg<br />
social context (Orlikowski, 2000). Organizational life is complex with a lot of things going on: a “mishmash<br />
of interrelated influences” (Scapens, 2006, p. 10) that we need to underst<strong>and</strong>. The social<br />
dimension makes the process of implementing an ERP system complex <strong>and</strong> indeterminate.<br />
The analysis investigates the possibilities <strong>and</strong> obstacles that may occur during the process, regarding<br />
how, when <strong>and</strong> by whom information should be stored in, or taken out of, the ERP system. The<br />
purpose is to develop an underst<strong>and</strong>ing of how an ERP system is involved in the process of storing<br />
<strong>and</strong> recalling information about events <strong>and</strong> transactions taking place in the organization. The<br />
underst<strong>and</strong>ing will however not lead to a generalization of explanations that predict the process,<br />
conditioned or restricted by a number of contingency variables, or the like. This is not possible, since<br />
human behaviour is carried out in a complex environment <strong>and</strong> also depends on “the very facts of<br />
human long-term memory <strong>and</strong> of the capability of human beings individually <strong>and</strong> collectively, to learn.”<br />
(Simon, 1979, p. 510) Organizational life <strong>and</strong> practices are affected by broad economic, social, <strong>and</strong><br />
organizational trends, but are also affected <strong>and</strong> shaped by unique factors in the specific organization.<br />
2. Organizational memory <strong>and</strong> ERP systems<br />
<strong>Information</strong> about the past can <strong>and</strong> is stored in the organization (Walsh <strong>and</strong> Ungson, 1991). The<br />
possibilities of automation of routines through the use of IT (Zuboff, 1988) have led to a reducing of<br />
costs for information storage. Still, not everything is recorded; a distinction is made between what is<br />
considered relevant to future actions or not (Levitt <strong>and</strong> March, 1988). The organizational memory is<br />
orderly but contradictive, due to inconsistencies <strong>and</strong> ambiguities (Levitt <strong>and</strong> March, 1988). Claims are<br />
made that the ERP system may be used by management as a means to take control of processes of<br />
efficiency, <strong>and</strong> ensuring a wise decision making, since it supports st<strong>and</strong>ardization <strong>and</strong> automation,<br />
which may serve as a foundation for mutual underst<strong>and</strong>ing, coordination, <strong>and</strong> the sharing of real-time<br />
information within the organization (Chapman, 2005). The ERP system is embedded within the<br />
organization as it is closely involved with surrounding conditions (Orlikowski, 2000). Experience plays<br />
an important role when an ERP system is implemented, <strong>and</strong> both formal training <strong>and</strong> participation in<br />
practice are useful means in the process of learning the new technology (Robey, et al., 2000). A risk<br />
lies in an organization relying on past experiences so that they form a competency trap (Levitt <strong>and</strong><br />
March, 1988), where old experiences have shaped the organizational memory in a way that becomes<br />
an obstacle to letting new experiences change organizational action (Robey, et al., 2000) even when<br />
the old procedure is inferior.<br />
The notion of organizational memory has been elaborated upon in the field of information systems by<br />
use of the theoretical concepts acquisition, retention, maintenance, search <strong>and</strong> retrieval (Figure 1).<br />
Acquisition Retention Search Retrieval<br />
Producer of<br />
Holding storage<br />
(ERP system)<br />
Consumer of<br />
information information<br />
Maintenance<br />
Figure 1: The ERP system as part of the organizational memory (elaborated from Stein <strong>and</strong> Zwass,<br />
1995, p. 103).<br />
Acquisition is when the organization, by internal or external, organizational or individual producers of<br />
information, acquires information. If this information is put into a holding storage, such as an ERP<br />
system, the information is retained within the organization. An organizational memory is created. After<br />
retention it is necessary to maintain the information within the holding storage, so that it is saved over<br />
time. This leads to the possibility of later making a search for the information in the holding storage.<br />
This possibility means that organizational memories can be recalled: retrieval. The fact that<br />
information may be acquired <strong>and</strong> saved by one person, <strong>and</strong> later searched for <strong>and</strong> “remembered” by<br />
367
Gunilla Myreteg<br />
another shows us that we are talking about an organizational memory <strong>and</strong> not an individual memory.<br />
Our individual memories are personal. Organizational memories are impersonal <strong>and</strong> can be retrieved<br />
by anyone that have access to the holding storage <strong>and</strong> have the capability or capacity of making the<br />
search (cf. Stein <strong>and</strong> Zwass, 1995).<br />
In order to access information from the organizational memory, members first have to locate the<br />
information. The search process may be carried out by a search engine in the information system, or<br />
perhaps by an e-mail broadcast on the company Intranet (An<strong>and</strong>, et al., 1998). Acquisitions are made<br />
by producers of information, while retrievals are made by the consumers of information (Stein &<br />
Zwass 1995). The present analysis will investigate if it is fruitful to view the ERP system as part of the<br />
organizational memory.<br />
3. The case of ABG, <strong>and</strong> users’ expectations<br />
ABG is a medium sized manufacturing company in Sweden. The present article reports the findings<br />
concerning two of the company’s three business areas (Alpha <strong>and</strong> Beta). The case study was carried<br />
out from 2003 to 2005. Interviews, observation <strong>and</strong> documentation were used to construct a deep <strong>and</strong><br />
rich description of the process where ABG selected <strong>and</strong> implemented an ERP system.<br />
The studied users were: (1) employees in the production that were concerned with a high degree of<br />
st<strong>and</strong>ardized work tasks (business area Alpha), <strong>and</strong> (2) employees involved in production<br />
characterized by high quality st<strong>and</strong>ards <strong>and</strong> non-st<strong>and</strong>ardized work tasks (business area Beta). The<br />
former considered the ERP system to be of minor importance to the performance of tasks. They also<br />
thought that the use of ERP would take time away from production without leading to higher customer<br />
satisfaction. An IT system was not considered to be able to replace human experience <strong>and</strong> the<br />
intuitive feeling of how to plan production. The latter users considered the ERP system to have great<br />
potential as a support to their activities. The ERP system was expected to result in lower costs due to<br />
errors (by specifying instructions as know-how within the ERP system) <strong>and</strong> an increased customer<br />
satisfaction (by less number of complaints).<br />
Further users were (3) the administrative staff, performing accounting, payments <strong>and</strong> reporting tasks,<br />
<strong>and</strong> (4) the sales force. Administration wanted the ERP system to be simple <strong>and</strong> intuitive to use, so<br />
that users would make fewer mistakes within the system. Time was often used for correcting the<br />
mistakes that administration spotted, that is, if a mistake was spotted. They considered it better if<br />
users would use IT correctly, so administration would be able to work more efficiently. The sales force<br />
was located on the firm’s premises <strong>and</strong> viewed the ERP system to be an important tool for their daily<br />
work. The ERP system was expected to help them find better ways to make corrections <strong>and</strong> notations<br />
to customer orders, since customers often returned with suggestions of changes, or since production<br />
made suggestions for changes during the development of a customer tailed solution. Now, corrections<br />
were often done by pencil notations on the original order print out, or by sticking a post it note on to<br />
the print out. Often, it was difficult to know what was included in the final order due to a number of<br />
consecutive changes or messy pencil notes. A final user (5), management, considered the ERP<br />
system to be a means of getting users to act more responsible when it came to <strong>using</strong> IT as a support<br />
to all various tasks. They found there was a need of awareness that IT was supposed to be used for<br />
all information management in the firm, by all users <strong>and</strong> with an improved consistency.<br />
4. Using the ERP system: Organizational memory in practice<br />
Not until the ERP system was chosen <strong>and</strong> implemented, the majority of informants said they<br />
understood what the ERP system was all about. After <strong>using</strong> the ERP system, the general opinion was<br />
that it technically had potential for the company, <strong>and</strong> it was considered to be a sound investment. Still,<br />
users found that there were obstacles or impediments in realizing the potential. It was difficult to know<br />
how to use the ERP system, <strong>and</strong> several users were confused when they realized that all routines<br />
were affected: “With the new ERP system everything has changed!” (Accounting clerk, December<br />
2004). A majority of informants mentioned the need of a “new way of thinking”. Users in production<br />
had come to realize that “the ERP system will never be better than we ourselves make it” (Operations<br />
manager, January 2005). There were troubles in <strong>using</strong> the smart functionalities that the supplier had<br />
demonstrated. The h<strong>and</strong>ling of the system was generally considered to be more intricate than had<br />
been expected.<br />
All users were having difficulties, in varying degrees, <strong>using</strong> the ERP system. Some typical situations<br />
kept reoccurring. One problem was that users did not know where to find certain information or a<br />
368
Gunilla Myreteg<br />
needed routine. Another problem was that when the user had found the routine, he did not know how<br />
to work it. A third problem that kept on surfacing was how to take advantage of the smart solutions or<br />
automatic data processing functions that the vendor had demonstrated at the sale. An explanation to<br />
why these smart functions could not be used lay in the poor quality of the database. Data was often<br />
incorrect or incomplete, <strong>and</strong> an unsolved issue concerned the matter of when <strong>and</strong> who should fill in<br />
the gaps <strong>and</strong> correct poor data.<br />
4.1 Where do I...?<br />
Based on the model of the organizational memory by Stein <strong>and</strong> Zwass (1995) the situation of where<br />
information or a data routine was located needs to be separated into two instances. The first relates to<br />
the acquisition <strong>and</strong> retention of a memory. When a user experiences something that should be<br />
remembered in the future, information has to be fed into the ERP system. This is done through the<br />
use of a data routine, <strong>and</strong> ensures the retention of the experience. The individual memory is hereby<br />
transformed into an organizational memory. An example is when a sales person receives a call from a<br />
customer wanting to order a product. The sales person has to know where to find the order form. This<br />
instance may be paralleled to finding something on a map: the user knows there is a routine, <strong>and</strong><br />
needs to know how to start it. This type of problem decreased as users got acquainted with the ERP<br />
system.<br />
Another instance was when a user wanted to find a piece of information. This is a matter of retrieval of<br />
information that exists in the data base. An example is when a production planner wants to know how<br />
many pieces of a certain detail are needed to make one product of type X. The production planner<br />
needs to know how to search for the specifications for product X, <strong>and</strong> where in the list of<br />
specifications the wanted detail occurs, which might be in several operations. This problem also<br />
decreased as users got more <strong>and</strong> more acquainted with the ERP system. For some information the<br />
problem however remained. This was when the design of the ERP system was not prepared for a<br />
certain mode of search. For instance, the sales person in Beta often got a call from customers saying<br />
“I want to order what I had last time, but I don’t know what you call that thingy!” Since the last order<br />
may have been placed <strong>and</strong> delivered two or three years earlier, the sales person had no chance of<br />
remembering what product the customer had bought. Since neither of them knew the name or article<br />
number of the product, it was impossible to fill out the electronic order form. To proceed, the sales<br />
person needed to check the customer’s history to see old orders, <strong>and</strong> through this list find the article<br />
number of the wanted product. The ERP system that were used did not, however, support a search<br />
for order history sorted by customer. The only way for the user to find the needed information was to<br />
instead turn to the old IT system, <strong>and</strong> make the search there. Since no new information was entered<br />
into the old IT system, this would soon be out of date; new orders were not retained. The solution to<br />
the problem was therefore seen as temporary, <strong>and</strong> a better solution was needed.<br />
4.2 How do I...?<br />
A firm has to decide <strong>and</strong> communicate what information is necessary to retain (Stein <strong>and</strong> Zwass,<br />
1995). The analysis identifies this to be an intricate potential obstacle to a firm’s use of an ERP<br />
system. When the needed data routine is found, it is not always easy to fill it out. The question often<br />
is: How do I make this routine work out? The routine might ask for some information to be entered into<br />
a data field without the user being sure what information is requested, or the user has to decide<br />
whether a box should be ticked or not. Informants tried to solve this type of problem by making lists<br />
for themselves where they noted explanations or advice on how to fill out certain fields et cetera.<br />
Advice was given by the administrative staff, by the vendor of the ERP system <strong>and</strong> also between<br />
colleagues. Sometimes, informants said, it was not possible to wait to get some good advice because<br />
of the hurry to complete tasks; perhaps an order was running the risk of getting a late delivery, or the<br />
hurry was due to difficulties in planning <strong>and</strong> the risk of a fall in production. In these cases users felt an<br />
urge to move the goods forward in the chain of productions. For these instances he or she had to<br />
come up with a solution, <strong>and</strong> sometimes the simple solution was to chance it <strong>and</strong> insert some<br />
information regardless of its quality. This was especially mentioned among users in production in<br />
department Alpha.<br />
Another example of solution that illustrates the users’ interest of finding simple solutions is the issue<br />
of creating a new article in the ERP system. The norm, coming from management <strong>and</strong> administration,<br />
was to start from scratch <strong>and</strong> insert all information that was needed. The user should open a new<br />
form for an article, insert a product name, make a list of specification <strong>and</strong> note all operations et cetera.<br />
369
Gunilla Myreteg<br />
Informants were aware of the norm; however, they said this led to an unnecessary waste of time. The<br />
more practical approach, according to users, was to pick an already existing article that resembled the<br />
new article as much as possible, to make a copy of this article, <strong>and</strong> thereafter make the necessary<br />
changes, for example in product name, the amount of material that ought to be needed or the type of<br />
machine that should be used. Since the individual user are not aware of the many pieces of<br />
information that lies hidden to him or her, but that other users need for their tasks, the user does not<br />
make all the changes to the copy that would have been needed. Therefore, the habit of copying<br />
existing articles instead of starting from scratch creates several mistakes, <strong>and</strong> the need of making<br />
corrections, further on in the flow. As a total, the assumed time saving habit actually is a time<br />
dem<strong>and</strong>ing <strong>and</strong> costly habit to the firm.<br />
In order to use the ERP system for retention purposes, it is necessary that users are informed <strong>and</strong><br />
educated on what information is needed <strong>and</strong> how this information is needed in different situations or<br />
for different tasks in the firm. Since a user tends to balance time to needs, or his or her effort to time,<br />
it is necessary that the user has the required underst<strong>and</strong>ing of the entire work flow. It is likewise<br />
important that he or she has the ability to judge <strong>and</strong> estimate the consequences of a choice.<br />
4.3 When <strong>and</strong> who shall...?<br />
At the sale, the vendor had demonstrated some smart solutions or automatic functions that would be<br />
useful, especially in production planning <strong>and</strong> costing. One example is how the ERP system<br />
automatically runs through all orders <strong>and</strong> schedules them according to delivery date, with<br />
consideration taken to time of delivery of input goods, bought components or in-house made<br />
components, as well as the supply of man-hours <strong>and</strong> machine hours. The scheduled orders can be<br />
re-run at any point in time, in order to always have an optimum plan of how to prioritize the stock of<br />
orders. The ERP system can likewise show to what extent every machine or work group (a team of<br />
men, or a combination of machine <strong>and</strong> men) is utilized, <strong>and</strong> avoid queues. This was considered a<br />
great potential for the firm. In practice, however, these automatic functions were rarely, or not at all,<br />
used in ABG. The reasons were several: members of the organization had forgotten that the function<br />
existed, or did not know where to find it <strong>and</strong>/or how to use it (compare above). Some informants<br />
pointed out the fact that basic data concerning all articles that the firm could offer had to be complete<br />
<strong>and</strong> correct in order for the ERP system to make just <strong>and</strong> realistic calculations. If for example<br />
requirements concerning use of time were wrongly estimated, the prioritization of orders would not be<br />
true to dem<strong>and</strong>s, <strong>and</strong> the automatic list might be greatly misleading; ca<strong>using</strong> the firm to miss crucial<br />
delivery dates instead of guarding <strong>and</strong> keeping them.<br />
The fact that several pieces of information in the data base were incomplete <strong>and</strong>/or incorrect was<br />
generally known in the firm. During the implementation process, some efforts had been made to<br />
correct some of the missing pieces: a couple of production managers that kept some personal records<br />
(i.e. individual memories in their minds) of wrongly described plans of manufacture (for example<br />
amount <strong>and</strong> type of input resources, order or operations or prescribed usage of machinery) tried to<br />
make the necessary changes during the weekend before kickoff. This was done as far as these users<br />
could remember some of the things what were wrong, <strong>and</strong> were mainly done for the orders that were<br />
currently running, at that point in time. Apart from this effort, no extra time or people were assigned to<br />
the task. <strong>Management</strong> considered it to be a continuous <strong>and</strong> shared responsibility among all staff <strong>and</strong><br />
all users of the ERP system: they should all make the necessary changes of <strong>and</strong> correction to<br />
incorrect data, as well as filling the gaps where data was missing altogether.<br />
The model of organizational memory explains the long-term storage of information as a need of<br />
maintenance. Stein <strong>and</strong> Zwass (1995) describe this as firstly, <strong>and</strong> simply, that information is stored<br />
over time, but secondly, <strong>and</strong> more complex, the way the system respond to new knowledge,<br />
integrates this with old knowledge, <strong>and</strong> also how the system selectively forgets knowledge. The<br />
simple aspect of keeping information over time is a possibility well met by an ERP system, since the<br />
data base has the technical possibility of keeping information everlasting. This is at the same time a<br />
problem: incorrect <strong>and</strong> misleading information is also possible to keep forever. As a consequence, the<br />
firm meets the risk of making the same mistakes over <strong>and</strong> over again. The ERP system does rarely<br />
respond automatically to new knowledge. Even if a user in production report actual time that differ to<br />
budgeted time for a certain article, the ERP system does not respond to the difference. The ERP<br />
system does not contain a method for integrating new information with old: in order for incorrect data<br />
to be changed into a correct figure, a user has to enter the new information. The old data will by this<br />
action be erased. The ERP system will hereby help the user to forget the old practice or old value<br />
370
Gunilla Myreteg<br />
used, which in turn makes learning possible. In order for this to come about, however, the user has to<br />
enter the current, valid data into the data base.<br />
5. Conclusions <strong>and</strong> discussion<br />
The present article shows that the notion of an ERP system as part of the organizational memory<br />
proved to be helpful to explain how an ERP system is involved in the process of creating, <strong>using</strong>, <strong>and</strong><br />
maintaining a purposeful data base in an organization. Possibilities are easily pointed out, such as the<br />
effect of increased access to information. The obstacles to usage are however in more need of<br />
explanation.<br />
The present analysis showed how the technical design may cause an insurmountable obstacle to<br />
performing the necessary search <strong>and</strong> retrieval of needed information. On the other h<strong>and</strong>, several<br />
problems related to questions of where a certain data routine would be found <strong>and</strong> how it should be<br />
worked, which was linked to acquisition <strong>and</strong> retention, were found to be passing problems. Some<br />
early problems disappear as users get acquainted to the structure of an ERP system. An important<br />
issue, however, is the aspect of maintenance of information. An ERP system has the technical<br />
possibility to store information for a very long time. Unfortunately, the system does not discriminate<br />
between high <strong>and</strong> low quality data, but will also store incorrect data forever.<br />
The implication of missing or incorrect data may lead to the inability to use an ERP system’s<br />
automatic routines, such as scheduling of orders, or planning of utilization of resources such as<br />
machinery <strong>and</strong> man-time; functionality that carry great promises to the firm. Furthermore, missing or<br />
incorrect data may cause discussion, conflicts <strong>and</strong> frustration among users. For example, erroneous<br />
data concerning budgeted time for operations in production will mislead employee performance<br />
evaluations, <strong>and</strong> may falsely show people to be underachieving. Costing <strong>and</strong> pricing will be difficult to<br />
perform, <strong>and</strong> profitability estimations of products <strong>and</strong> orders will be ambiguous, <strong>and</strong> difficult to<br />
interpret. Learning is obstructed, since it is unclear what operations <strong>and</strong> tasks are well carried out or<br />
not. It will not be obvious what activity should be routinized <strong>and</strong> what activity would need to be<br />
changed.<br />
After the implementation, users in the case company experienced many changes: the interface was<br />
new, as were the functionality <strong>and</strong> the h<strong>and</strong>ling of data; even were quite a few of the descriptions of<br />
work processes <strong>and</strong> work tasks experienced as new to the users. Confusion was great, <strong>and</strong> everyone<br />
tried to orientate oneself. Not yet two months after the kickoff, the CFO said, with a mixture of<br />
desperation, laughter <strong>and</strong> resignation: “it’s difficult to know for sure if things are better than before, but<br />
at least they are different!” (December 2004). After reading the story of ABG <strong>and</strong> the following<br />
analysis, it is not unreasonable to react by surprise. It is almost incredulous that this situation is<br />
allowed to continue in a firm. This example disrupts our image of the effective, modern organization.<br />
However, we should remember that practise is a mish-mash of interrelated influences (Scapens,<br />
2006), that all decisions in a firm are carried out in situations of incomplete information (Simon, 1979),<br />
<strong>and</strong> that earlier experiences made by actors are important for us to underst<strong>and</strong> what is going on there<br />
today.<br />
Since people in the case had been used to incomplete <strong>and</strong> incorrect data, they were used to making<br />
decisions without putting too much trust in information they could retrieve from the information<br />
system. Experience <strong>and</strong> intuition had a strong hold upon decision makers, since such abilities were of<br />
great value in making wise decisions. The imperfections of decision making, the lack of respect<br />
among organizational members towards IT usage, <strong>and</strong> the limited possibilities of getting sufficient<br />
support from the information system were in this case considered to be a poor tradition that<br />
management wanted to change. The case however illustrates how management need to underst<strong>and</strong><br />
that the ERP system per se does not create <strong>and</strong> maintain an efficient information usage. Managers<br />
<strong>and</strong> users need to consciously plan the usage of the ERP system as part of the organizational<br />
memory in order to utilize the potential benefits of the system.<br />
References<br />
An<strong>and</strong>, V., Manz, C.C. <strong>and</strong> Glick, W.H., (1998) “An Organizational Memory Approach to <strong>Information</strong><br />
<strong>Management</strong>”, The Academy of <strong>Management</strong> Review, Vol 23, No. 4, pp 796-809.<br />
Chapman, C.S., (2005) “Not because they are new: Developing the contribution of enterprise resource planning<br />
systems to management control research”, Accounting, Organizations <strong>and</strong> Society, Vol 30, No. 7-8, pp 685-<br />
689.<br />
371
Gunilla Myreteg<br />
Levitt, B. <strong>and</strong> March, J.G., (1988) “Organizational Learning”, Annual review of sociology, Vol 14, No. 1, pp 319-<br />
338.<br />
Orlikowski, W.J., (2000) “Using Technology <strong>and</strong> Constituting Structures: A Practice Lens for Studying Technology<br />
in Organizations”, Organization Science, Vol 11, pp 404-428.<br />
Robey, D., Boudreau, M.-C. <strong>and</strong> Rose, G.M., (2000) “<strong>Information</strong> technology <strong>and</strong> organizational learning: a<br />
review <strong>and</strong> assessment of research”, Accounting, <strong>Management</strong> <strong>and</strong> <strong>Information</strong> Technologies, Vol 10, No.<br />
2, pp 125-155.<br />
Scapens, R.W., (2006) “Underst<strong>and</strong>ing management accounting practices: A personal journey”, The British<br />
Accounting Review, Vol 38, No. 1, pp 1-30.<br />
Simon, H.A., (1979) “Rational Decision Making in Business Organizations”, The American Economic Review, Vol<br />
69, No. 4, pp 493-513.<br />
Stein, E.W. <strong>and</strong> Zwass, V., (1995) “Actualizing Organizational Memory with <strong>Information</strong> Systems”, <strong>Information</strong><br />
Systems Research, Vol 6, pp 85-117.<br />
Walsh, J.P. <strong>and</strong> Ungson, G.R., (1991) “Organizational Memory”, Academy of <strong>Management</strong> Review, Vol 16, No.<br />
1, pp 57-91.<br />
Vannoy, S.A. <strong>and</strong> Salam, A.F., (2010) “Managerial Interpretations of the Role of <strong>Information</strong> Systems in<br />
Competitive Actions <strong>and</strong> Firm Performance: A Grounded Theory Investigation”, <strong>Information</strong> Systems<br />
Research, Vol 21, No. 3, pp 496-515.<br />
Zuboff, S., (1988). In the age of the smart machine: the future of work <strong>and</strong> power, Heinemann Professional,<br />
Oxford.<br />
372
Environmental Scanning Practice of Enterprise 50: Small<br />
Medium Enterprise (E50 SMEs) in Malaysia<br />
Roslina Othman <strong>and</strong> Siti Rohimi Hamedon<br />
International Islamic University Malaysia<br />
drroslina@gmail.com<br />
srohimi@iium.edu.my<br />
Abstract: This study investigates the effects of organizational <strong>and</strong> owner/ manager profile on environmental<br />
scanning practice of Enterprise 50 Small Medium Enterprise (E50 SMEs) in Malaysia. It investigates the extent of<br />
environmental scanning practice <strong>and</strong> the factors related to information sources that E50 SMEs utilized for<br />
environmental scanning. Based on the constructs of the measures, a research scale was developed for the study<br />
<strong>and</strong> data were collected via self-administered mail survey among the E50 SMEs in Malaysia. The results showed<br />
positive effects of organizational <strong>and</strong> owner/ manager profile on environmental scanning practice of E50 SMEs.<br />
There are also findings on the extent environmental scanning on the business environment sectors of E50 SMEs<br />
with respect to utilization of information sources. Implications of our findings for SMEs owner/ managers <strong>and</strong><br />
practitioners, the study’s limitations <strong>and</strong> future research directions are subsequently addressed.<br />
Keywords: environmental scanning, information sources, small medium enterprise, SMEs, Enterprise 50, E50<br />
SMEs<br />
1. Introduction<br />
Environmental scanning is the activity by which a company’s decision makers acquire “information<br />
about events <strong>and</strong> relationships in the outside environment, the knowledge of which would assist the<br />
management in its task of charting the company future course of action” (Aguilar 1967; Choo & Auster<br />
1992). The term “environmental scanning” (ES) refers to the means by which managers study <strong>and</strong><br />
monitor relevant business environments (Temtine 2006). Due to the presently complex business<br />
environment characterized by globalization <strong>and</strong> internationalization of markets, according to Simard &<br />
Rice (2006), there is a need for greater efficiency, effectiveness <strong>and</strong> competitiveness is based on<br />
innovation <strong>and</strong> knowledge especially to small medium enterprises (SMEs), as an important segment<br />
of domestic industries, which represent a key source of endogenous growth as well as an impetus for<br />
broad based economic development must continuously seek to find new sources of growth through<br />
strengthening its capabilities <strong>and</strong> competitiveness. This characterization has put increasing pressure<br />
upon the management of these firms especially the SMEs that must now compete globally (Temtine<br />
2006) <strong>and</strong> that in order to lower their operating costs, increase productivity <strong>and</strong> quality <strong>and</strong> respond to<br />
the increasing requirements of their customers <strong>and</strong> other business partners, a number of these firms<br />
scan the environment <strong>and</strong> make sizable investments to improve performance (Burns 2001).<br />
2. Background<br />
Environmental scanning linked to information seeking behavior of organizations through its human<br />
assets enables it to underst<strong>and</strong> changes in its external environment so that it is able to: avoid<br />
surprises, identify threats <strong>and</strong> opportunities, gain competitive advantage, <strong>and</strong> improve long-term <strong>and</strong><br />
short-term planning (Simard <strong>and</strong> Rice 2006). For managers in any given industry, conditions <strong>and</strong><br />
trends in the industry determine in large measure what areas of external information will be relatively<br />
most important (Aguilar 1967). This study is concern with the environmental scanning practice of<br />
owners/ managers with regard to utilization of information sources to acquire external information. It<br />
will be examined as the extent of environmental scanning on business environmental sectors, the<br />
type <strong>and</strong> category of information sources that owner/ manager used <strong>and</strong> regard as important that<br />
triggers scanning practice in utilization of information sources. Kourtely (2005) assert that for a firm to<br />
possess a competitive advantage, it must constantly monitor several information sources<br />
simultaneously. They note that this information sources should provide intelligence on the business<br />
environment.<br />
The expected outcome of this study would be to identify a list of high impact information sources<br />
category <strong>and</strong> type that constitutes the successful utilization of information to environmental scanning<br />
practice specific to Enterprise 50 (E50) SMEs in Malaysia <strong>and</strong> also could identify the business<br />
environment sectors that would trigger environmental scanning practice by utilizing information<br />
sources. The relationship between organizational <strong>and</strong> owner/ manager profile <strong>and</strong> environmental<br />
scanning practice of E50 SMEs will also be revealed. This study would also sight the extent of<br />
373
Roslina Othman <strong>and</strong> Siti Rohimi Hamedon<br />
environmental scanning practice of Enterprise 50 SMEs that can be used as a benchmark to those<br />
SMEs not in the Enterprise 50 category.<br />
2.1 Environmental scanning practice<br />
The primary purpose of environmental scanning is to provide a comprehensive view or underst<strong>and</strong>ing<br />
of the current <strong>and</strong> future condition of the five environmental constituents or dimensions: social,<br />
economic, political, regulatory, <strong>and</strong> technological (Temtine 2006). An owner/manager scans the<br />
environment to detect external changes or events which may affect the firm (Choo 2002). Given its<br />
challenging nature, owners/managers need to underst<strong>and</strong> the concept of environmental scanning <strong>and</strong><br />
define specific goals for utilization of sources in business environment scanning. Many researchers<br />
have expressed the need to know more about how managers scan the environment within their work<br />
setting (Correia <strong>and</strong> Wilson, 2001; Nastanski 2004). There is sufficient evidence to indicate that<br />
organizations that engage in more environmental scanning perform more successfully than those that<br />
do not (Choo 2001; Beal 2000) <strong>and</strong> there is evidence that the personal success of managers is<br />
enhanced as a result of their environmental scanning efforts (Kourtely 2005). Many literatures stated<br />
that scanning information was accessed through the attitude of top managers, as the decision maker<br />
of the company, towards environmental scanning <strong>and</strong> through the communication pattern established<br />
among managers within each organization (Correia <strong>and</strong> Wilson, 2001). The measurement of<br />
environmental scanning activities has often been done through a measurement of the frequency of<br />
the scanning activities. However, increasing levels of competition, technology <strong>and</strong> rapid change have<br />
created turbulence environment that makes it increasingly difficult to keep track, interpret <strong>and</strong> respond<br />
to rapid change that obstruct organization from adapting to changes in its environment <strong>and</strong> thus<br />
impact the ability of the organization in utilization of information sources in order to meet its objectives<br />
(Kourtely 2005).<br />
2.2 Owner/ manager profile<br />
Kourtely (2000) in his paper stated that top management is used as respondents in the environmental<br />
scanning study due to the top management as having a wide breadth of knowledge of all the<br />
organizations’ functions, activities <strong>and</strong> operating environment. A number of demographic variables<br />
can affect perceptions on environmental scanning activities. Those are information on the age (Choo<br />
1994 <strong>and</strong> EBharimi 2000), years of formal education, functional background (Aguilar 1967; Choo<br />
1994 <strong>and</strong> Jorosi 2006); <strong>and</strong> their management position (Aguilar 1967 <strong>and</strong> EBharimi 2000). Therefore<br />
we hypothesized that:<br />
H1 Owner/ manager profile is associated with Environmental Scanning Practice<br />
2.3 Organizational profile<br />
The main criteria that predominate to define the small medium enterprises (SMEs) sector are the<br />
number of employees, turnover <strong>and</strong> the balance sheet total (Burns, 2001) year founding (Daft et al.<br />
1988; Kourtely 2000; Kourtely 2005). Employee size is the most useful discriminator in the context of<br />
management research (Beal 2000; Burns 2001; Jorosi 2006) <strong>and</strong> of each respondent; his or her firm's<br />
primary industry group (Daft et al. 1988; Sawyer et al. 2000; Farhad <strong>and</strong> Karami 2001). Julien’s et al.<br />
(1999) research model on technological scanning in manufacturing SMEs included the firms’<br />
characteristics <strong>and</strong> the entrepreneurs’ profile as two factors affecting a firms’ scanning behavior,<br />
considered the size of firm <strong>and</strong> management proactivities on environmental scanning practices.<br />
Therefore we hypothesized that:<br />
H2 Organization profile is associated with Environmental Scanning practice<br />
3. Research design<br />
3.1 Context of the study<br />
Malaysia E50 SMEs was selected as the context of the study as E50 SMEs are Malaysia’s<br />
enterprising homegrown companies, which are well positioned for the future (SMIDEC 2009).<br />
Manufacturing, Manufacturing-Related Services <strong>and</strong> Agro-based industries<br />
374
Roslina Othman <strong>and</strong> Siti Rohimi Hamedon<br />
"Small <strong>and</strong> medium enterprises in the manufacturing, manufacturing related services<br />
<strong>and</strong> agro-based industries are enterprises with full-time employees not exceeding 150 or<br />
with annual sales turnover not exceeding RM25 million"<br />
Services, Primary Agriculture <strong>and</strong> <strong>Information</strong> & Communication Technology<br />
"Small <strong>and</strong> medium enterprises in the services, primary agriculture <strong>and</strong> <strong>Information</strong> &<br />
Communication Technology (ICT) sectors are enterprises with full-time employees not<br />
exceeding 50 or with annual sales turnover not exceeding RM5 million"<br />
A total of 548,000 are active SMEs <strong>and</strong> they contributed 32 percent of the country’s gross domestic<br />
product, 56 percent to employment <strong>and</strong> 19 percent to total export. It is encouraging to note that the<br />
Malaysian SMEs have been registering double-digit growth in value-added terms in a variety of<br />
industries in recent years (Companies Commission of Malaysia, CCM 2006). Enterprise 50 is an<br />
annual award programme jointly organised by Malaysia Small <strong>and</strong> Medium Industries Development<br />
Corporation (SMIDEC), Deloitte Kassim Chan supported by sponsoring companies. The qualifying<br />
criteria of the companies to be nominated must: 1) Be homegrown <strong>and</strong> locally incorporated with at<br />
least 40 percent local equity, 2) Not listed on any stock exchange, 3) Can be either parent company<br />
or subsidiary but not both taking part together <strong>and</strong> 4) Have three years audited financial figures. The<br />
nominations were evaluated based on a mix of qualitative <strong>and</strong> quantitative criteria since both are<br />
reflective of a company’s success (“active posturing” <strong>and</strong> “operational Finesse’).<br />
Quantitative selection criteria for Enterprise 50 include: 1) Operating profit before tax, 2) Gross<br />
turnover, 3) Profit growth over the last 3 years, 4) Turnover growth over the last 3 years, 5) Return on<br />
assets, 6) Export revenue/ turnover <strong>and</strong> 7) Investment in capital/ training <strong>and</strong> research <strong>and</strong><br />
development. Qualitative selection criteria for Enterprise 50 include management outlook, market<br />
presence, major innovations <strong>and</strong> <strong>Information</strong> technology usage.<br />
3.2 Data collection, population <strong>and</strong> sample<br />
The research used a cross sectional self-administered survey method on Enterprise 50 Small Medium<br />
Enterprise (E50 SMEs) in Malaysia. Questionnaires were distributed at r<strong>and</strong>om <strong>and</strong> a total of 102<br />
usable questionnaires were collected <strong>and</strong> analyzed.<br />
3.3 Instrument<br />
There were three sections in the questionnaire. Section one require respondents to answer questions<br />
pertaining to their profile. Section two requires respondents to answer the organization profile that<br />
consists of the industry group, the number of full-time employees <strong>and</strong> the yearly turnover (Analoui <strong>and</strong><br />
Karami 2001; Burns 2001). The measured operational definition for environmental scanning practice<br />
in utilization of information sources is the frequency with which owners/managers use specific<br />
information sources to gather information about events outside the organization. The measurement of<br />
environmental scanning activities was done through a measurement of the frequency of the scanning<br />
activities adopted from Miller (1995). In section three, the respondents are required to indicate the<br />
frequency or how often do they seek <strong>and</strong>/ or receive useful information about what is happening<br />
outside the company in the following business environment sectors: customers, competitors,<br />
suppliers, socioeconomic conditions, technological issues, <strong>and</strong> regulatory changes adopted from Daft<br />
et al. (1988), Ngamkroeckjoti <strong>and</strong> Johri (2000) <strong>and</strong> Beal (2000). Useful information means that it helps<br />
them to underst<strong>and</strong> what’s happening outside the company. The five-point scales are 1 = ’never’, 2 =<br />
‘seldom’, 3 = ‘sometimes’, 4 = ‘usually’, 5 = ‘always’, to be written in the given space. There are 31<br />
information sources categories classified as human/ oral information sources, document/ written<br />
information sources <strong>and</strong> other information sources. These categories has been used successfully in<br />
previous study, they were adopted to ensure a comprehensive investigation of environmental<br />
scanning practice <strong>and</strong> to maintain methodological consistency with previous research.<br />
4. Results<br />
This study used SPSS for Windows Version 16 to analyze the data. Majorities (85.3 %) of the<br />
respondents were male <strong>and</strong> 73.5% of the respondents claimed they were from 41 to 50 years old.<br />
The majorities (68.6 %) of the respondents were Bachelor Degree holders <strong>and</strong> only 2.9% had<br />
Doctorate/ PhD qualification. In general 26.4% were without tertiary education. It was found that<br />
majorities (51.0%) of the respondents were Managing Directors, 2.0% Chief Executive Officer (CEO)<br />
of the company, only 1.0% is the President of a company <strong>and</strong> majorities (84.3%) of the respondents<br />
375
Roslina Othman <strong>and</strong> Siti Rohimi Hamedon<br />
were not the owner of the company. It was found that the majorites (72.5%) of the companies were<br />
manufacturing related services with Majority (59.8%) of the companies employed from 1 to 50 full-time<br />
employees <strong>and</strong> that majority (55.9%) of the company had yearly turnover of between RM 20,000,001<br />
to RM 25 Million. None of the respondents indicated that their company have more than 150 full-time<br />
employees nor they have yearly turnover of more than RM25 million which confirmed that the study<br />
respondents are only from small medium enterprises, SMEs category.<br />
4.1 Reliability <strong>and</strong> internal consistency assessment<br />
The study uses Cronbach’s Alpha to report the reliability of the constructs. The frequency method of<br />
measuring the environmental scanning practice in six business environment sectors was found to be<br />
highly reliable <strong>and</strong> suitable to measure the concepts employed in the study with Cronbach’s Alpha<br />
ranged from .647 to .997 as shown in Table 1 (Hair et al. 2006).<br />
Table 1: Cronbach’s Coefficients for the frequency scales<br />
<strong>Information</strong> Sources Cronbach’s Alpha<br />
business/ professional associations .971<br />
chance encounters .694<br />
consultants .911<br />
other outsiders .926<br />
subordinates .863<br />
peers .695<br />
board members .923<br />
scheduled meeting .818<br />
daily Newspapers .842<br />
trade publications .783<br />
books/ government publications .914<br />
technical magazines/ academic journals .692<br />
Exhibitions .933<br />
consultants schedule report .909<br />
other written materials .647<br />
personal subscriptions .894<br />
photocopied articles .997<br />
commercial information services .735<br />
training & development .722<br />
audio/ visual .793<br />
Internet .798<br />
SMIDEC Portal .734<br />
SMEInfo Portal .677<br />
Other Government Portals .871<br />
competitors Portals .768<br />
business Associate Portals .871<br />
other Private Company Portals .702<br />
Analysis from Table 2 indicates that all information sources categories formed three factors namely<br />
the three types of information sources (human/ oral information sources, document/ written<br />
information sources <strong>and</strong> other information sources) <strong>and</strong> was found to have high values of Cronbach’s<br />
Alpha indicating that all constructs are accurate.<br />
Table 2: Cronbach’s coefficients<br />
Factors Number of Items Cronbach’s<br />
Alpha<br />
Human/ oral information sources 8 .916<br />
Document/ written information sources 9 .954<br />
Other information sources 10 .903<br />
376
Roslina Othman <strong>and</strong> Siti Rohimi Hamedon<br />
It is also observed that one document/ written information sources (industry exhibitions) is also loaded<br />
on factor 2 (human/ oral information sources). Out of 31 items, 4 items (stock exchange market,<br />
information services companies, written materials by other company <strong>and</strong> online database) does not<br />
meet the cut-off point.<br />
4.2 Environmental scanning practice of E50 SMEs<br />
Results in Table 3, table 4 <strong>and</strong> Table 5 below indicated that majority, 60.4% of the E50 SMEs do<br />
environmental scanning frequently to seek <strong>and</strong>/ or receive useful information about what is happening<br />
outside the company in the six business environmental sectors via human/ oral information, 53.7%<br />
via document/written information sources, <strong>and</strong> that majority (66.7%) of the E50 SMEs owners/<br />
managers do environmental scanning frequently to seek <strong>and</strong>/ or receive useful information about what<br />
is happening outside the company in the six business environmental sectors via other information<br />
sources.<br />
Table 3: Mean frequency human/ oral information sources per business environment sector<br />
Customers<br />
information<br />
business/ professional associations 4.57 4.40* 4.53 4.51 4.57 4.58<br />
Chance encounters 4.32* 4.03* 3.69* 4.19* 4.49* 4.12*<br />
consultants 4.55 4.32* 4.49* 3.75* 4.57 4.53<br />
Other outsiders 4.57 4.40* 4.53 4.43* 4.53 4.41*<br />
subordinates 4.57 4.24* 4.39* 3.75* 4.39* 4.35*<br />
peers 4.66 3.81* 4.37* 4.56 4.40* 4.40*<br />
Board members 4.57 4.36* 4.29* 4.53 4.53 4.53<br />
Industrial Exhibition 4.51 4.28* 4.38* 4.28* 4.38* 4.29*<br />
* mean frequency = 4 (round-off to the nearest integer)<br />
Table 4: Mean frequency document/ written information sources per business environment sector<br />
scanned<br />
1 = never<br />
2 = seldom<br />
3 = sometimes<br />
4 = usually<br />
5 = always Customers<br />
information<br />
scheduled meetings 3.62* 3.73* 2.92 3.42 3.22 3.17<br />
daily Newspapers 3.75* 3.78* 3.96* 3.77* 3.73* 2.92<br />
trade publications 4.09* 3.42 3.05 3.31 3.06 3.91*<br />
books/ government Publications 3.39 3.40 3.16 3.18 2.79 3.58*<br />
technical magazines/ academic journals 3.50* 3.01 3.42 3.42 3.91* 3.51*<br />
consultants Schedule reports 3.56* 3.84* 3.63* 3.64* 3.64* 3.79*<br />
other written materials 3.29 3.61* 3.00 3.02 3.00 2.78<br />
personal subscriptions 4.00* 3.51* 3.52* 3.24 3.23 2.82<br />
photocopied articles 3.80* 3.84* 3.81* 3.81* 3.81* 3.79*<br />
* mean frequency = 4 (round-off to the nearest integer)<br />
Results from Table 6, Table 7 <strong>and</strong> Table 8 below showed that owner/ manager E50 SMEs preferred<br />
to obtain information mostly pertaining to customer information from their conversation with peers,<br />
business/ professional associations, board members, subordinates <strong>and</strong> other outsiders. In general<br />
E50 SMEs highly rely on fellow workers, people around their business circle <strong>and</strong> to use human/ oral<br />
information sources (conversation with peers in the company, including formal <strong>and</strong> informal meeting)<br />
most frequently to scan the business environment while the most frequent business information sector<br />
scanned is customer information. It was also found that in general, E50 SMEs used document/ written<br />
information sources (correspondence, daily newspapers, books/ government publications, daily<br />
377<br />
Competitors<br />
<strong>Information</strong><br />
Competitors<br />
information<br />
Suppliers<br />
information<br />
Suppliers<br />
information<br />
Socioeconomic<br />
Conditions<br />
Socioeconomic<br />
Conditions<br />
Technological<br />
Issues<br />
Technological<br />
Issues<br />
Regulatory<br />
Changes<br />
Regulatory<br />
Changes
Roslina Othman <strong>and</strong> Siti Rohimi Hamedon<br />
newspapers <strong>and</strong> technical magazines/ journals) least frequently <strong>and</strong> the least frequently business<br />
environment scanned are on regulatory changes. The most frequently scanned business<br />
environment sector is customer information.<br />
Table 5: Mean frequency other information sources per business environment type<br />
Customers<br />
information<br />
commercial information services 3.83* 3.88* 3.62* 3.54* 3.58* 3.51*<br />
training & development 3.74* 3.88* 3.62* 3.49 3.30 3.64*<br />
audio/ visuals 3.62* 3.70* 3.41 3.46 3.44 3.66*<br />
Internet 3.53* 3.65* 3.32 3.30 3.25 3.75*<br />
SMIDEC Portal 3.46 3.71* 3.39 3.53* 3.48 3.81*<br />
SMEInfo Portal 3.93* 3.98* 4.14* 3.68* 3.71* 3.75*<br />
Other Government Portals 3.84* 3.89* 3.59* 3.65* 3.44 3.66*<br />
Competitors Portals 3.74* 3.78* 3.36 3.42 3.42 3.91*<br />
Business Associate Portals 3.84* 3.89* 3.59* 3.65* 3.44 3.66*<br />
Other Private Company Portals 3.74* 3.34 3.01 2.88 3.25 3.53*<br />
*mean frequency = 4 (round-off to the nearest integer)<br />
Table 6: Means of 10 most frequently used information sources per business environment<br />
Business environment<br />
<strong>Information</strong> Sources Categories<br />
Sector Scanned Mean<br />
1 Peers Customer information 4.66<br />
2 business/ professional associations Regulatory Changes 4.58<br />
3 board members Customer information 4.57<br />
4 Subordinates Customer information 4.57<br />
5 other outsiders Customer information 4.57<br />
6 Consultants Technological Issues 4.57<br />
7 business/ professional associations Technological Issues 4.57<br />
8 business/ professional associations Customer information 4.57<br />
9 Consultants Regulatory Changes 4.55<br />
10 board members Technological Issues 4.53<br />
1 = never 2 = seldom 3 = sometimes 4 = usually 5 = always<br />
Table 7: Means of the 10 least frequently used information sources per business environment sector<br />
scanned<br />
Business environment<br />
<strong>Information</strong> Sources Categories<br />
Sector Mean<br />
1 technical magazines/ journals Supplier <strong>Information</strong> 3.01<br />
2 other Private Company Portals Supplier <strong>Information</strong> 3.01<br />
3 Correspondence Technological issues 3.00<br />
4 Correspondence Supplier <strong>Information</strong> 3.00<br />
5 daily newspapers Regulatory changes 2.92<br />
6 scheduled meeting Supplier information 2.92<br />
7 other Private Company Portals Socioeconomic conditions 2.88<br />
8 Peers Regulatory changes 2.82<br />
9 books/ government publications Regulatory changes 2.79<br />
10 Correspondence Regulatory changes 2.78<br />
1 = never 2 = seldom 3 = sometimes 4 = usually 5 = always<br />
In general E50 SMEs more frequently do environmental scanning <strong>using</strong> human/ oral information<br />
sources (mean=4.36, SD=.432), than <strong>using</strong> document/ written information sources (mean=3.60,<br />
SD=.513). Other information sources are the least used by E50 SMEs to scan business environment<br />
sectors (mean=3.46, SD=.604). In general E50 SMEs do environmental scanning frequently <strong>using</strong> all<br />
types of information sources.<br />
378<br />
Competitors<br />
information<br />
Suppliers<br />
information<br />
Socioeconomic<br />
Conditions<br />
Technological<br />
Issues<br />
Regulatory<br />
Changes
Roslina Othman <strong>and</strong> Siti Rohimi Hamedon<br />
Table 8: Business environment sectors scanned in order of frequency<br />
Business <strong>Information</strong> Sectors<br />
Mean<br />
Customer <strong>Information</strong> 3.9947<br />
Competitor <strong>Information</strong> 3.8771<br />
Technological Issues 3.7779<br />
Regulatory Changes 3.7691<br />
Supplier <strong>Information</strong> 3.7538<br />
Socioeconomics Condition 3.6594<br />
4.3 Analysis of the relationships<br />
1 = never<br />
2 = seldom<br />
3 = sometimes<br />
4 = usually<br />
5 = always<br />
A series of t-tests <strong>and</strong> one-way ANOVA analysis were done to explore if the environmental scanning<br />
practice in the six business environmental sectors of E50 SMEs with relate to the frequency of<br />
scanning <strong>and</strong> the type of information sources utilized differ across profiles of the owner/ manager. The<br />
generic assumptions underlying all t-test <strong>and</strong> ANOVA were done <strong>and</strong> met before the analysis. It was<br />
found that age <strong>and</strong> whether or not one is company owner do not have any effect on the environmental<br />
scanning practice in the six business environment sectors. Gender, highest formal education <strong>and</strong><br />
position in the company do differentiate the environmental scanning frequency in the six business<br />
environment sectors.<br />
Analyzing further on the extent of environmental scanning practice of E50 SMEs, female owner/<br />
manager of E50 SMEs scan slightly more frequently on customer information <strong>and</strong> technological<br />
issues than the male owner/ manager. However, only 14.7% of owner/ managers are female. Owner/<br />
manager of E50 SMEs with Diploma as their highest formal education that represents only 9.8% of<br />
the respondents do environmental scanning on business environment sectors more frequently than<br />
respondents with other formal education <strong>and</strong> President of E50 SMEs do environmental scanning<br />
more frequently than respondents holding other positions in the customer <strong>and</strong> technological sectors<br />
while the chief executive office of E50 SMEs do environmental scanning more frequently in relation to<br />
supplier, socioeconomic <strong>and</strong> regulatory sectors. However, both President <strong>and</strong> Chief Executive Officer<br />
of E50 SMEs represent the minority (3.0%) of the respondents.<br />
The influence of owner/ manager profile on ES Practice is further analyzed in relation to information<br />
sources types used to acquire external information. Through a series of t-tests <strong>and</strong> one-way ANOVA<br />
analyses, it indicates that age do not differentiate the environmental scanning practice with relate to<br />
the type of information sources utilized. Gender, highest formal education <strong>and</strong> position in the<br />
company differentiate the environmental scanning practice of the owner/ manager with relate to<br />
document/ written <strong>and</strong> other information sources utilized respectively <strong>and</strong> this represent 53.3% of the<br />
total items accounted for the difference.<br />
Female E50 SMEs scan more frequently utilizing other information sources as compared to male E50<br />
SMEs, however female E50 SMEs represents the minority. Diploma holders scan more frequently<br />
utilizing the document/ written information sources <strong>and</strong> other information sources than those with<br />
other highest formal education while Chief Executive Officer seems to scan more frequently than<br />
those holding other positions in the company. Diploma holders (9.8% of the respondents) <strong>and</strong> Chief<br />
Executive Officer (1.0% of the respondents) represent the minority of the company. As compared to<br />
none owner, owner of the company seems to scan more frequently utilizing human/oral information<br />
sources. However, owners only represent the minority (15.7%).<br />
Except for highest formal education <strong>and</strong> position in the company, there is no significant difference<br />
between ES practice <strong>and</strong> other owner/ manager profile. This indicates that gender, age <strong>and</strong> being the<br />
owner of the company or not do not have an influence on ES practice.<br />
There is no significant difference between those without tertiary education <strong>and</strong> those with tertiary<br />
education in terms of their ES practice. The independent t-test on position in the company <strong>and</strong> ES<br />
practice showed that there is no significant difference between high management <strong>and</strong> middle<br />
management in the company in relation to their ES practice.<br />
379
Roslina Othman <strong>and</strong> Siti Rohimi Hamedon<br />
In summary, owner/ manager profile do not differentiates ES Practice. Thus, Hypothesis H1 is not<br />
substantiated. All subsequent analysis was conducted on the combined sample of 102 respondents.<br />
4.3.1 Relationship between organization profile <strong>and</strong> environmental scanning practice<br />
Hypothesis H2: Organization profile is associated with ES Practice<br />
The influence of organization profile on the business environment sectors scanned to acquire external<br />
information was analyzed. There are three items for organization profile namely the industry group,<br />
the number of full-time employee <strong>and</strong> the company yearly turnover <strong>and</strong> the six business environment<br />
sectors that yield 18 significant levels (p- values) to analyze.<br />
The type of industry that the company is in does influence the business environment sector that the<br />
company scanned. Considering the extent of scanning, manufacturing related services that represent<br />
the majority (69.5%) of E50 SMEs do scanning more frequently than companies in other industry<br />
group for all business environments except in technological sector. The yearly turnover of the<br />
company does not differentiate the business environmental sectors scanned.<br />
The number of full-time employees in the company does differentiate the business environment sector<br />
scanned only in the socioeconomic sector <strong>and</strong> analyzing the extent of scanning, company with the<br />
total number of 101 to150 full-time employees scanned the more frequently as compared to other<br />
type of industry. However, company with 101 to 150 full-time employees is only 4.9% which<br />
represents the minority <strong>and</strong> thus cannot be considered significant.<br />
Results indicate that company industry group differentiates the type of information sources utilized for<br />
environmental scanning in the six business environment sectors. The number of company full-time<br />
employees does not significantly differentiate the type of information sources utilized except for the<br />
oral/ human information sources utilized. The company with the total number of 101 to 150 full-time<br />
employees seems to scan most frequently <strong>using</strong> the human/ oral information sources. However, this<br />
represents the minority as only 4.9% of the company with 101 to 150 full-time employees which<br />
cannot be considered significant. The company yearly turnover does not significantly differentiate the<br />
type of information sources used except for other information sources utilized. The company with<br />
yearly turnover from RM10,000,001 to RM15 Million (21.6%, the minority) seems to scan more<br />
frequently <strong>using</strong> other information sources than company with other income brackets. Thus, it cannot<br />
be considered significant because of the small number of respondents in this category included in the<br />
sample.<br />
The Chief Executive Officer of E50 SMEs (2.0% of the respondents, the minority) do environmental<br />
scanning more frequently than those holding other positions. The company with number of employees<br />
from 101-150 seems to do environmental scanning more frequently than other companies <strong>and</strong> the<br />
company with yearly income of between RM10,000,001 to RM 15 Million seems to do environmental<br />
scanning more frequently that those with other yearly income brackets.<br />
The result indicate that the number of employee <strong>and</strong> yearly income of the company do not influence<br />
ES practice which explains that, except for industry group, there is no significant difference between<br />
Organization Profile <strong>and</strong> ES practice.<br />
An independent t-test on type of industry <strong>and</strong> environmental scanning practice showed that there is a<br />
significant difference between those in the manufacturing industry <strong>and</strong> those not in the manufacturing<br />
industry in terms of their environmental scanning practice.<br />
In summary, this finding is empirical evidence that for each E50 SMEs, the extent of environmental<br />
scanning practice with respect to the company industry group is not homogeneous <strong>and</strong> is perceived<br />
differently according to the specific type of industry they belong. However, company industry group<br />
represents only 33.3% of the organization profile dimensions. Hence, organization profile do not<br />
differentiates ES Practice which resulted hypothesis H2A is not substantiated <strong>and</strong> all subsequent<br />
analysis was conducted on the combined sample of 102 respondents.<br />
380
5. Conclusion<br />
Roslina Othman <strong>and</strong> Siti Rohimi Hamedon<br />
Organizational profile is not a significant predictor of environmental scanning practice <strong>and</strong> owner/<br />
manager profile do not differentiates environmental scanning practice. This study exposed several<br />
worthy contributions <strong>and</strong> implications for academics <strong>and</strong> practitioners. Practically, this study can assist<br />
organizations which used information about events <strong>and</strong> relationships in the outside environment to<br />
assist the management in its task of charting the company future course of action in many ways. The<br />
first contribution is the establishment of an instrument that integrates owner/ manager characteristics<br />
<strong>and</strong> organizational characteristics in assessing environmental scanning practice for E50 SMEs in<br />
particular <strong>and</strong> SMEs in general. The instrument developed in this study can be used for E50 SMEs<br />
due to the uniqueness in the characteristics of E50 SMEs <strong>and</strong> SMEs as compared to the large<br />
organizations to measure the influence of owner/ manager characteristics <strong>and</strong> organizational<br />
characteristics on their environmental scanning practice.<br />
The finding of the study will help SMEs <strong>and</strong> agencies to identify factors that influence environmental<br />
scanning practice the most <strong>and</strong> to develop programmes <strong>and</strong> information sources to suit the needs of<br />
SMEs due to its unique characteristics. The finding has impact on the extent of environmental<br />
scanning practice <strong>and</strong> identifying information sources used for scanning the six business<br />
environmental sectors especially to the Government. Environmental scanning capabilities of SMEs<br />
need to be developed. Thus, the agencies concerned may desire to start considering to evaluate the<br />
information dimensions such as the accessibility, the awareness of the availability, the reliability, <strong>and</strong><br />
the timeliness of the information sources made available, considered by Enterprise 50 SMEs to have<br />
high impact that trigger their environmental scanning practices that would bring about in gearing for<br />
developing <strong>and</strong> nurturing reliable <strong>and</strong> competitive Malaysia SMEs through utilization of its various<br />
information sources under the Malaysian Government support programmes.<br />
References<br />
Aguilar, F.J. (1967). Scanning the Business Environment, New York: Macmillan Publishing Co.<br />
Analoui, & Karami. (2001). Strategic management in Small <strong>and</strong> Medium Enterprises, London, UK: Thompson<br />
Learning.<br />
Auster, E. & Choo, C.W. (1994). How senior managers acquire <strong>and</strong> use information in environmental scanning.<br />
<strong>Information</strong> Processing <strong>and</strong> <strong>Management</strong>, 30(5): 607-18.<br />
Auster, E. & Choo, W. C. (1991). Environmental scanning: A conceptual framework for studying the information<br />
seeking behavior of Executives. ISIS ’91: Proceedings of the 54 th Annual Meeting , Medford, NJ: Learned<br />
information, 3-8.<br />
Beal, R.M. (2000). Competing effectively: environmental scanning, competitive strategy, <strong>and</strong> organizational<br />
performance in small manufacturing firms. Journal of Small Business <strong>Management</strong>, 38(1), 27-47.<br />
Burns, P. (2001). Entrepreneurship <strong>and</strong> small business. Hampshire, UK: Palgrave.<br />
CCM (2006). Companies Commission of Malaysia. ‘Centre of Excellence’. Retrieved 12 November, 2008.<br />
http://www.ssm.com.my/AR2006/Eng_web/content.<br />
Choo, C. W. (1994). Perception <strong>and</strong> use of information sources by chief executives in environmental scanning.<br />
Library <strong>and</strong> <strong>Information</strong> Science Research; 16(1), 23-40.<br />
Choo, C. W., & Auster E. (1994) Chief Executive Officers <strong>Information</strong> & Decision Making: Scanning the business<br />
environment for strategic advantage. Library Trends, vol. 30, 205-206.<br />
Choo, C. W. (2001). Environmental scanning as information seeking <strong>and</strong> organization Learning. <strong>Information</strong><br />
Research, 7(1), Retrieved 20 August, 2006. http: <strong>Information</strong>R.net/ir/7-1/paper112.html.<br />
Choo, C. W. (2002). <strong>Information</strong> <strong>Management</strong> for the Intelligent Organization: The art of scanning the<br />
Environment. 3 rd ed. New York: <strong>Information</strong> Today, Inc.<br />
Correia, Z., & Wilson, T. T. (2001). ‘Factors influencing environmental scanning in the organizational context’.<br />
<strong>Information</strong> Research. 7(1), paper 121. Retrieved 10 June, 2006. http://informationr.net/ir/7-<br />
1/paper121.html.<br />
Daft, R.L., Sormunen, J., & Parks, D. (1988). Chief executive scanning, environmental characteristics, <strong>and</strong><br />
company performance: an empirical study. Strategic <strong>Management</strong> Journal, 9(2), 123-39.<br />
EBharimi, B. P. (2000). Environmental complexity, importance, variability <strong>and</strong> scanning behavior of Hong Kong<br />
executives. International Business Review, 9 (2), 253-270.<br />
Farhad, A. & Karami, A. (2001). How Chief Executives’ perception of the environment impacts company<br />
performance. Journal of <strong>Management</strong> Development, 21(4), 290-306.<br />
Hair et al. (2006). Multivariate Data Analysis. USA: Pearson Educational International.<br />
Jorosi, B. N. (2006). The information needs <strong>and</strong> information seeking behaviours of SME managers in Botswana.<br />
Libri, 56 (2), 97-107<br />
Julien, P. A., Raymond, L., Jacob, R., & Ramangalahy, C. (1999). Types of technological scanning in<br />
manufacturing SMEs: An empirical analysis of patterns <strong>and</strong> determinants. Entrepreneurship <strong>and</strong> Regional<br />
Development, 11 (4), 281-300<br />
381
Roslina Othman <strong>and</strong> Siti Rohimi Hamedon<br />
Kourtely, L., (2000). Scanning the business environment: Some conceptual Issues. Benchmarking: An<br />
international journal, 7(6), 406-413.<br />
Kourtely, L. (2005). Scanning the business external environment for information: Evidence from Greece.<br />
<strong>Information</strong> Research, 11(1).<br />
Miller, G. P. (1995). Environmental Scanning: A Person-Situation Interaction Perspective. PhD Dissertation. USA:<br />
University of Michigan Press.<br />
Nastanski, M. (2004). The value of active scanning to senior executives: Insight from key decision-makers.<br />
Journal of <strong>Management</strong>, 23(5): 426-436.<br />
Ngamkroeckjoti, C., & Johri, M, L. (2000). Scanning Processes in Thail<strong>and</strong>. Business Process <strong>Management</strong><br />
Journal, 6(4), 331-41.<br />
Sawyer, O.O., Ebharimi, B. P., & Thibodeaux, M. S. (2000). Executive environmental scanning, information<br />
source utilization, <strong>and</strong> firm performance. Journal of applied <strong>Management</strong> Studies, 9(1), 95-116.<br />
Simard, C., & Rice, C. E. (2006). Managerial information behaviour: Relationships among Total Quality<br />
<strong>Management</strong> orientation, information use environments, <strong>and</strong> managerial roles. Total Quality <strong>Management</strong><br />
<strong>and</strong> Business Excellence, 17 (1), 79-95.<br />
SMIDEC. (2009). Annual Report. Kuala Lumpur: Percetakan Nasional Malaysia Berhad<br />
Temtine, Z. T. (2006). Monitoring environmental complexities <strong>and</strong> changes: Some lessons from small firm.<br />
International Journal of Globalisation <strong>and</strong> Small Business, 1(3), 286-300.<br />
382
Underst<strong>and</strong>ing Financial <strong>and</strong> non-Financial <strong>Information</strong> to<br />
Assess Listed Johannesburg Stock Exchange (JSE)<br />
Companies’ Performances<br />
Elmarie Papageorgiou 1 <strong>and</strong> Herman de Bruyn 2<br />
1<br />
University of the Witwatersr<strong>and</strong>, Johannesburg, South Africa<br />
2<br />
University of Johannesburg, South Africa<br />
Elmarie.Papageorgiou@wits.ac.za<br />
hdebruyn@uj.ac.za<br />
Abstract: Today there is an urgent need for companies to adapt to the constantly changing business conditions<br />
as the business environment exposes executives to so much data that data needs to be converted into useful<br />
information. Executives of companies need to underst<strong>and</strong> what information is available since recent research has<br />
shifted to a broader, more profitable focus on the global business environment <strong>and</strong> competitive forces. The<br />
purpose of the paper is to investigate the reality of financial <strong>and</strong> non-financial information in listed Johannesburg<br />
Stock Exchange (JSE) companies. An exploration is undertaken to see what financial <strong>and</strong> non-financial<br />
information are available, how it is used (or not) to make decisions <strong>and</strong> to solve problems to assess the<br />
company’s performance <strong>and</strong> the role played by executives in that process by <strong>using</strong> Executive <strong>Information</strong><br />
Systems (EISs). A mixed method was used; quantitative <strong>and</strong> qualitative in nature. An empirical study <strong>and</strong><br />
observations derive from a questionnaire to executives of 334 listed JSE companies. Thereafter structured<br />
interviews were undertaken with executives in listed JSE companies, foc<strong>using</strong> on the underst<strong>and</strong>ing of financial<br />
<strong>and</strong> non-financial information to enhance the performance of companies. The findings of the study conclude that<br />
several factors have served to enhance the dem<strong>and</strong> <strong>and</strong> increasing awareness of EISs activities to assess the<br />
performance of listed JSE companies. The three most important elements in upgrading information on EISs by<br />
respondents are as follow: financial information: Income statement, comparative figures, Balance sheet <strong>and</strong> nonfinancial<br />
information: director’s information, logo, contact details of the company. Companies portray a positive<br />
image by upgrading all crucial information that is important for companies to have a competitive advantage. The<br />
role played by executives in the process concluded that respondents selected executives as the main decisionmaker<br />
for implementing EISs <strong>and</strong> as the responsible person to define the requirements of an EIS. Executives<br />
must work together with the developers to discuss the requirements of the EIS <strong>and</strong> to ensure that the information<br />
is made available to the system. It is noted that respondents also selected executives as the main decision<br />
makers in deciding the content of EISs, to add new features, to ensure the integrity <strong>and</strong> to assure ownership to<br />
an EIS. The findings from the interviews concluded that successful EISs provide executives with the necessary<br />
real-time information <strong>and</strong> is a trusted source of information to provide financial <strong>and</strong> non-financial information. The<br />
value of the study explains that the trend has increasingly shifted towards management empowerment to improve<br />
the reality in underst<strong>and</strong>ing financial <strong>and</strong> non-financial information of companies to assess their performances.<br />
Keywords: development of executive information systems, executives, financial information, management<br />
information, non-financial information, South Africa, use of executive information systems<br />
1. Introduction <strong>and</strong> background<br />
The changing business l<strong>and</strong>scape creates new challenges for <strong>Information</strong> Technology (IT) as top<br />
management expects technology to drive immediate results to subsequently deliver a world-class<br />
business while focussing on innovations that are the building blocks for the future (Cramm 2010:124).<br />
Wessels (2008:149) states that IT changes at a rapid pace <strong>and</strong> businesses need to adapt to<br />
incorporate theses changes to remain competitive. According to Cramm (2010:124) the next wave of<br />
innovation is in connecting companies, people, computers <strong>and</strong> systems, a system top management<br />
<strong>and</strong> other users can use to underst<strong>and</strong> financial <strong>and</strong> non-financial information. Cramm (2010:124)<br />
states that 90 percent of employees who are not employed in IT, definitively work with IT <strong>and</strong> are a<br />
key source for innovation as they are on the front-lines dealing with customers, suppliers, competitors<br />
<strong>and</strong> shareholders.<br />
2. Research objective <strong>and</strong> research questions<br />
The purpose of the paper is to investigate the reality of financial <strong>and</strong> non-financial information in listed<br />
Johannesburg Stock Exchange (JSE) companies used to assess the company’s performance <strong>and</strong> the<br />
role played by executives in that process by <strong>using</strong> Executive <strong>Information</strong> Systems (EISs). The<br />
research questions investigated were to establish what financial <strong>and</strong> non financial information are<br />
available on listed JSE company’s Web sites <strong>and</strong> EISs, how is it used to make decisions <strong>and</strong> solve<br />
problems <strong>and</strong> to determine the role of executives by <strong>using</strong> EISs to ensure a sustainable strategic<br />
competitiveness for listed JSE companies.<br />
383
3. Literature study<br />
Elmarie Papageorgiou <strong>and</strong> Herman de Bruyn<br />
Today businesses are forced to become part of the IT environment to compete with local <strong>and</strong><br />
international markets as businesses need to apply for ‘new’ IT to have a competitive advantage.<br />
Nieman <strong>and</strong> Bennett (2002:36) state that with the developments in wireless applications <strong>and</strong><br />
electronic communications, new business opportunities have been created. According to Phillips<br />
(2011:37) diverse types of information are needed to make a business better. Executives of<br />
companies need to underst<strong>and</strong> what information needs to be accessible in order to make decisions<br />
<strong>and</strong> to solve problems to be competitive. According to Cheung <strong>and</strong> Babin (2006:1590) executive<br />
users become more computer literate, request more sophisticated IT support <strong>and</strong> in many cases take<br />
charge of the system development process.<br />
<strong>Information</strong> needs to be immediately available in a format that executives <strong>and</strong> other users can<br />
underst<strong>and</strong>. Spreadsheets need to be replaced with real-time systems that deliver information that is<br />
relevant, quick, real-time, accessible <strong>and</strong> easy to underst<strong>and</strong> (Phillips, 2011:37). The real-time system<br />
manages daily transactions as to the out-dated information that is even hard to remember or discover<br />
what went wrong; never mind to correct the problem (Phillips, 2011:37). Halabi, Barrett <strong>and</strong> Dyt<br />
(2008:168) states that the “collection <strong>and</strong> collation of financial information to produce accounting<br />
reports will be useful for decision-making <strong>and</strong> conveying information to external parties.” Computers<br />
systems make information timelier <strong>and</strong> available to improve decision-making (Gelinas & Dull, 2008:2).<br />
Naicker (2010:21) concluded that financial decisions are based on the information available in<br />
sourcing relevant <strong>and</strong> accurate information to ensure that the decision making process encompasses<br />
all aspects of the business.<br />
According to Van Zyl (2011:12) companies that are not strong in the field of data, technology <strong>and</strong><br />
analytics <strong>and</strong> are therefore gradually falling behind the top performers who are well advanced in the<br />
term of analytics. The term, analytics is the application of computer technology <strong>and</strong> statistics to solve<br />
problems in business <strong>and</strong> industry (Van Zyl, 2010:12). Users need systems that provide them with<br />
access to diverse types of information in order to be competitive. Businesses have chosen information<br />
technology to provide relevant <strong>and</strong> accurate information to top management <strong>and</strong> executives.<br />
According to De Vries, Mulig <strong>and</strong> Lowery (2004:644) executives are faced with many complex stets of<br />
data <strong>and</strong> the opportunity exists to use Executive <strong>Information</strong> Systems (EISs) as a tool which can be<br />
tailored to the specific needs <strong>and</strong> requirements of businesses. Martin, Dehayes, Hoffer <strong>and</strong> Perkins<br />
(2005:223) “…emphasis that competitive information has become so important in the last few years<br />
that many organisations call their EISs business intelligent systems or competitive intelligence<br />
systems.” Findings by Venter (2002:209) conclude that “South African companies are keeping abreast<br />
of international trends regarding the use of the Internet as a medium of communication with investors<br />
<strong>and</strong> shareholders.” Bullock (2011:20) stated that integrated reporting is not yet m<strong>and</strong>atory in the<br />
European Union <strong>and</strong> it will be interesting to watch how integrating reporting in South Africa develops.<br />
Voogt (2010:28) states that the role of the Chief <strong>Information</strong> Officer has changed dramatically over the<br />
past few years since the skills of the CFO in addressing IT risk strategically <strong>and</strong> underst<strong>and</strong>ing the<br />
impact of IT across all business functions will be invaluable in addressing IT governance.<br />
The driving force behind the EIS is threefold: firstly, the structure, the drive to formulate a structure<br />
that is acceptable to all users. The structure of the business consists of different user groups of<br />
information <strong>and</strong> has unique information requirements as the level of detail <strong>and</strong> nature of information<br />
differ considerably (Hall, 2008:4). According to Meyer (2011:50) wise executives know that strategic<br />
thinking, formulation <strong>and</strong> strategic implementation are not purely rational processes as people at all<br />
levels feel that they have their role to play. <strong>Management</strong> needs information that is summarised <strong>and</strong><br />
orientated towards reporting as to more detailed information that is required at lower levels of<br />
management. Secondly, the content, the drive towards pressure from competitors, potential investors<br />
<strong>and</strong> stakeholders to ensure all financial <strong>and</strong> non-financial information is easy accessible. When<br />
deciding the content of an EIS Averweg <strong>and</strong> Roldán (2006:625) stated that ‘EIS is a computer-based<br />
technology designed in response to the specific need of executives” to evaluate what is important for<br />
making both strategic <strong>and</strong> tactical decisions.” And lastly, the commitment of top management to<br />
exp<strong>and</strong> EISs to other users, as information software technology improves in a digital environment top<br />
management must utilise the ‘new’ technology available for strategic decision making <strong>and</strong> managing<br />
daily business activities in order to assess the company’s performance to remain competitive. Arnott,<br />
384
Elmarie Papageorgiou <strong>and</strong> Herman de Bruyn<br />
Jirachiefpattana <strong>and</strong> O’Donnell (2007:2078) added that an EIS support the work <strong>and</strong> top management<br />
are committed to provide rapid access to critical information.<br />
4. Research methodology <strong>and</strong> data collection<br />
The research study used a mixed method, quantitative <strong>and</strong> qualitative in nature. Questionnaires <strong>and</strong><br />
interviews were used to collect data. The exploration proceeded in two stages: firstly, questionnaires<br />
were used to determine the status quo, the existence of EISs in businesses <strong>and</strong> the role of executives<br />
in <strong>using</strong> EISs; secondly, interviews with management were conducted with businesses that plan to<br />
implement an EIS. In stage one, the questionnaires were distributed via e-mail to all the 334 listed<br />
JSE companies for the attention of executives <strong>and</strong> top management. In stage two, seven respondents<br />
from the questionnaire were selected to participate in the interview process to collect in-depth<br />
information regarding their company’s EISs status <strong>and</strong> how financial <strong>and</strong> non-financial information are<br />
used to assess the company’s performance. Questions asked in the interviews varied from structured<br />
questions to open-ended questions. The questions <strong>and</strong> results are reflected in the Interview Annexure<br />
A.<br />
5. Findings of the study<br />
All the companies that participated in the study are located in South Africa <strong>and</strong> represent eight of the<br />
twelve industries listed on the JSE <strong>and</strong> are as follow: Property, Mining, Construction, Manufacturing,<br />
Retail, Financials, Telecommunications, <strong>and</strong> Leisure <strong>and</strong> Entertainment. Sixty five companies<br />
responded to the questionnaire, a response rate of 19.5%. The survey data from the questionnaires<br />
provides useful insights of listed JSE companies regarding their annual financial <strong>and</strong> non-financial<br />
elements available on the company’s Web site, existence of EISs <strong>and</strong> the person/s who make<br />
decisions, determine the requirements, add new features, ensure integrity <strong>and</strong> assure ownership of<br />
an EIS. The data confirmed that there is a growing interest in EISs since there are currently 38.5%<br />
companies who have implemented EISs <strong>and</strong> another 20% of the respondents confirmed to implement<br />
EISs in the near future, a total of 58.5%. From the findings it can be concluded that there are<br />
similarities between companies irrespective of the different industries. Questions in the electronic<br />
questionnaire <strong>and</strong> interviews refer to the research objectives of the study.<br />
5.1 Quantitative results<br />
The results of the questionnaire were presented by <strong>using</strong> basic frequency <strong>and</strong> are presented in<br />
tabular format in Table 1 to 10. Table 1 represents a rank ordered of the elements available on the<br />
company’s Web site. The percentages of respondents reporting on the availability of annual financial<br />
elements on the company’s Web site indicate that displaying current information focus heavily on the<br />
full annual report (92.3%), followed by the chairman’s report (52.3%) <strong>and</strong> then corporate information<br />
(47.7%). This indicates that it provides information to users to evaluate <strong>and</strong> to compare the<br />
company’s performances for possible investment opportunities in the future.<br />
Table 1: A rank ordered of the elements available on the company’s Web site<br />
Annual financial elements available on the company’s Web site Marked<br />
Count Percentage<br />
Full Annual Report 60 92.3%<br />
Chairman's Report 34 52.3%<br />
Corporate <strong>Information</strong> 31 47.7%<br />
Financial Summary 30 46.3%<br />
Balance Sheet 29 44.6%<br />
Income Statement 29 44.6%<br />
Cash Flow Statement 27 41.5%<br />
Notes to the accounts 26 40.0%<br />
<strong>Management</strong> Report 26 40.0%<br />
Audit Report 25 38.5%<br />
Links to non-financial information 25 38.5%<br />
Changes in Equity Statement 23 35.4%<br />
385
Elmarie Papageorgiou <strong>and</strong> Herman de Bruyn<br />
Annual financial elements available on the company’s Web site Marked<br />
Count Percentage<br />
Year-end-Review 23 35.4%<br />
Other 7 10.8%<br />
The other annual financial elements (10.8%) are indicated in Table 2. In our digital era all listed JSE<br />
companies are expected to have a Web site but surprisingly, one of the respondents indicated that<br />
their company does not have a Web site. As the author was searching for the outst<strong>and</strong>ing e-mail<br />
addresses on the Internet regarding the mailing list of the questionnaires, a few listed JSE companies<br />
did not have Web sites or their Web sites were under construction. Companies also indicated that<br />
sustainability reports, share information <strong>and</strong> operation reports are valuable financial information for<br />
users.<br />
Table 2: Other annual financial elements<br />
Other annual financial elements available on the company’s Web site<br />
All presentations to investors on results.<br />
All Circulars to shareholders.<br />
Equity raising information; <strong>and</strong><br />
BEE transactions.<br />
Operations report.<br />
Our financial information also displays XBRL info <strong>and</strong> a financial analyser.<br />
Production Quarterly Reports.<br />
Products <strong>and</strong> Services Brochure;<br />
Sustainability Report;<br />
Share price information; <strong>and</strong><br />
Shareholders information.<br />
Company does not have a Web site.<br />
Share data.<br />
Subsidiary financial results;<br />
Operations review; <strong>and</strong><br />
Five year financial review.<br />
Sustainability report.<br />
Value added statement.<br />
As per Table 3 respondents from companies with an EIS could select more than one person<br />
responsible for implementing the original EIS in their company in comparison with all the respondents<br />
to the questionnaire. It is noted that executives (27.7%) are given the responsibility to implement EISs<br />
<strong>and</strong> managers were not even considered responsible to implement EISs.<br />
Table 3: Responsible person/s for implementing the original EIS in their company<br />
Responsible person/s for implementing the original EIS in your company Marked<br />
Count Percentage<br />
Executive 18 27.7%<br />
CEO 5 7.7%<br />
MIS 6 9.2%<br />
Accountant 4 6.2%<br />
Manager 0 0.0%<br />
Other:<br />
Business Intelligence Department<br />
1 1.1%<br />
Sub Total 25 38.5%<br />
Total 65 100.0%<br />
386
Elmarie Papageorgiou <strong>and</strong> Herman de Bruyn<br />
Respondents from companies with an EIS could select more than one person responsible for defining<br />
the requirements of an EIS in comparison with all the respondents to the questionnaire as per Table<br />
4. Nearly twenty eight percent (27.7%) executives are given the responsibility to define the<br />
requirements followed by CEOs (21.5%). Executives must work together with the developers to<br />
discuss the requirements of an EIS <strong>and</strong> to ensure the information is made available to the system.<br />
Some executives personalised EISs <strong>and</strong> made it their own system since failures of any of these<br />
responsibilities can reduce the effectiveness of an EIS.<br />
Table 4: Person/s defining the requirements of EISs<br />
Person/s defining the requirements of EISs Marked<br />
Count Percentage<br />
Executive 18 27.7%<br />
CEO 14 21.5%<br />
MIS 8 12.3%<br />
Accountant 7 10.8%<br />
Manager 4 6.2%<br />
Other: 1 1.5%<br />
Sub Total 25 38.5%<br />
Total 65 100.0%<br />
As per Table 5 respondents could select more than one person deciding the content of EISs. It is<br />
noted that executives (64.0%) were selected as the main decision makers deciding the content of<br />
EISs followed by CEOs (36.0%).<br />
Table 5: Person/s deciding the content of EISs<br />
Person/s deciding the content of EISs<br />
Executive<br />
CEO<br />
<strong>Management</strong> Committee<br />
Accountant<br />
MIS<br />
Manager<br />
Other<br />
Count/<br />
%<br />
Main Some Minor None<br />
Count 16 7 2 0<br />
% 64.0% 28.0% 8.0% 0.0%<br />
Count 9 13 2 1<br />
% 36.0% 52.0% 8.0% 4.0%<br />
Count 7 10 6 2<br />
% 28.0% 40.0% 24.0% 8.0%<br />
Count 7 13 5 0<br />
% 28.0% 52.0% 20.0% 0.0%<br />
Count 3 13 7 2<br />
% 12.0% 52.0% 28.0% 8.0%<br />
Count 4 9 11 1<br />
% 16.0% 36% 44.0% 4.0%<br />
Count 1 1 2 5<br />
% 11.1%% 11.1% 22.2% 55.6%<br />
In Table 6 respondents from companies with an EIS could select more than one person responsible<br />
for adding new features to EISs in comparison with all the respondents to the questionnaire.<br />
Executives (29.2%) by far exceed the other persons involved. Auditors <strong>and</strong> investors were not<br />
selected as they are regarded as outside persons. Only one person was selected as other; MIS – as<br />
this person could be appointed in an advisory capacity.<br />
387
Table 6: Person/s adding new features to EISs<br />
Elmarie Papageorgiou <strong>and</strong> Herman de Bruyn<br />
Person/s adding new features to EISs Marked<br />
Count Percentage<br />
Executive 19 29.2%<br />
Middle <strong>Management</strong> 12 18.5%<br />
Accountants 12 18.5%<br />
CEO 11 16.9%<br />
Auditors 0 0.0%<br />
Investors 0 0.0%<br />
Other users outside the company – MIS 1 1.5%<br />
Sub Total 25 38.5%<br />
Total 65 100.0%<br />
In Table 7 respondents from companies with an EIS could select more than one person responsible<br />
for ensuring the integrity of EISs in comparison with all the respondents to the questionnaire. The<br />
main persons involve are accountants (27.7%) followed closely by the executives (20.0%) to ensure<br />
the integrity of EISs. Only one CEO <strong>and</strong> five auditors were selected <strong>and</strong> no investors were selected<br />
for a person ensuring the integrity of EISs.<br />
Table 7: Person/s ensuring the integrity of EISs<br />
Person/s ensuring the integrity of EISs<br />
Marked<br />
Count Percentage<br />
Accountants 18 27.7%<br />
Executive 13 20.0%<br />
Middle <strong>Management</strong> 9 13.8%<br />
Auditors 5 7.7%<br />
Other users outside the company 1 1.5%<br />
CEO 1 1.1%<br />
Investors 0 0.0%<br />
Sub Total 25 38.5%<br />
Total 65 100.0%<br />
The respondents could select more than one person by stating ‘yes’ or ‘no’ to the person assuring<br />
ownership of EISs as per Table 8. Regarding the ownership of EISs, executives (84.0%) had the<br />
highest percentage followed by a group of persons nearly equally spread between CEOs (76.0%),<br />
Middle management (72.0%), IT persons (72.0%) <strong>and</strong> Accountants (68.0%).<br />
Table 8: Person/s assuring ownership of EISs<br />
Person/s assuring ownership of EISs<br />
Yes No<br />
Count % Count %<br />
Executive 21 84.0% 4 16.0%<br />
CEO 19 76.0% 6 24.0%<br />
Middle <strong>Management</strong> 18 72.0% 7 28.0%<br />
IT Persons 18 72.0% 7 28.0%<br />
Accountants 17 68.0% 8 32.0%<br />
Auditors 2 8.0% 23 92.0%<br />
388
Elmarie Papageorgiou <strong>and</strong> Herman de Bruyn<br />
Person/s assuring ownership of EISs<br />
Yes No<br />
Count % Count %<br />
Non-management Staff 1 4.0% 23 96%<br />
Investors 0 0.0% 25 100.0%<br />
Other users outside the company 1 5.0% 18 95.0%<br />
Table 9 presents a rank ordered of financial information available on EISs. The respondents could<br />
select only one type of financial information available on their EISs. The six most important types of<br />
financial information that are upgraded on a regular basis are both Income statement <strong>and</strong><br />
comparative figures (88.0%), followed by both Balance sheet <strong>and</strong> Cash flow statement (84.0%) then<br />
Actual versus budget figures (82.0%), <strong>and</strong> lastly both financial ratios <strong>and</strong> financial summary (72.0%).<br />
Table 9: Financial information available on EISs<br />
Financial information available on EISs<br />
Yes, regularly<br />
upgraded<br />
Yes, but not<br />
always upgraded<br />
Count % Count % Count %<br />
Income Statement 22 88.0% 1 4.0% 2 8.0%<br />
Comparative Figures 22 88.0% 1 4.0% 2 8.0%<br />
Balance Sheet 21 84.0% 1 4.0% 3 12.0%<br />
Cash flow Statement 21 84.0% 1 4.0% 3 12.0%<br />
Actual versus Budget figures for the<br />
company<br />
20 80.0% 0 0.0% 5 20.0%<br />
Financial Ratios 18 72.0% 2 8.0% 5 20.0%<br />
Financial Summary 18 72.0% 4 16.0% 3 12.0%<br />
<strong>Management</strong> Report 17 68.0% 3 12.0% 5 20.0%<br />
Graphs on Financial Ratios / Budgets vs.<br />
actual of the company<br />
16 64.0% 2 8.0% 7 28.0%<br />
Trend Analysis 16 64.0% 1 4.0% 8 32.0%<br />
Exchange Rates information 15 60.0% 0 0.0% 10 40.0%<br />
Drill down to Chart of Account level 13 52.0% 3 12.0% 9 36.0%<br />
5-Year Review 12 48.0% 5 20.0% 8 32.0%<br />
Links to the JSE 12 48.0% 3 12.0% 10 40.0%<br />
On-time, real-time 12 48.0% 4 16.0% 9 36.0%<br />
Database Access 11 44.0% 2 8.0% 12 48.0%<br />
Report Writer for Formal Reports 10 40.0% 3 12.0% 12 48.0%<br />
Audit Report 10 40.0% 3 12.0% 12 48.0%<br />
Exception Reports 10 40.0% 3 12.0% 12 48.0%<br />
Interest Rates 9 36.0% 2 8.0% 14 56.0%<br />
Fixed Asset Register 7 28.0% 3 12.0% 15 60.0%<br />
Capability to do What-if-analysis 6 24.0% 3 12.0% 16 64.0%<br />
Investors Guide 6 24.0% 2 8.0% 17 68.0%<br />
VAT Reports 5 20.0% 1 4.0% 19 76.0%<br />
Taxation Enquiries 4 16.0% 1 4.0% 20 80.0%<br />
Other 3 12.0% 2 8.0% 20 80.0%<br />
389<br />
No
Elmarie Papageorgiou <strong>and</strong> Herman de Bruyn<br />
Table 10 presents a rank ordered of non-financial information available on EISs. The three most<br />
important types of non-financial information that are upgraded on a regular basis are logo of the firm<br />
(60.0%), followed by the directors of the firm (52.0%), <strong>and</strong> then contact details of the firm (48.0%).<br />
Companies do make sure all their information regarding the general contact details, logo, director’s<br />
contact details <strong>and</strong> structure of the firm are all updated in order for suppliers, customers <strong>and</strong> investors<br />
to contact them at all times. Companies portray a positive image to all by upgrading all crucial<br />
information that is important to contact companies.<br />
Table 10: Type of non-financial information available on EISs<br />
Type of non-financial information<br />
available on EISs<br />
Yes, regularly<br />
upgraded<br />
Yes, but not always<br />
upgraded<br />
Count % Count % Count %<br />
Logo of Firm 15 60.0% 5 20.0% 5 20.0%<br />
Directors of the Firm 13 52.0% 2 8.0% 10 40.0%<br />
Contact details of Firm 12 48.0% 3 12.0% 10 40.0%<br />
Organisational Structure of Firm 10 40.0% 5 20.0% 10 40.0%<br />
Scheduling Meetings 10 40.0% 2 8.0% 13 52.0%<br />
Booking of Internal Venues 10 40.0% 2 8.0% 13 52.0%<br />
Internal Telephone list/E-mail of staff 10 40.0% 0 0.0% 15 60.0%<br />
Complement of Staff (Headcount) 9 36.0% 3 12.0% 13 52.0%<br />
Medical Aid for Staff 9 36.0% 4 16.0% 12 49.0%<br />
Leave Forms/ Leave Available 9 36.0% 3 12.0% 13 52.0%<br />
Pension Fund for Staff (Retirement <strong>and</strong><br />
Contributions)<br />
8 32.0% 3 12.0% 14 56.0%<br />
Products/Services 8 32.0% 4 16.0% 13 52.0%<br />
Calendar of events/meetings 8 32.0% 3 12.0% 14 56.0%<br />
Internet Banking 7 28.0% 3 12.0% 15 60.0%<br />
Mission Statement 7 28.0% 6 24.0% 12 48.0%<br />
Application form for personal loans 7 28.0% 3 12.0% 15 60.0%<br />
Links to News Agencies 6 24.0% 6 24.0% 13 52.0%<br />
Other Important Contacts, like Auditors,<br />
Consultants, Investors, <strong>and</strong> Contractors<br />
6 24.0% 5 20.0% 14 56.0%<br />
Computer <strong>and</strong> workstation assistance 6 24.0% 1 4.0% 18 72.0%<br />
IRP5 5 20.0% 0 0.0% 20 80.0%<br />
Shareholders of the Firm 5 20.0% 5 20.0% 15 60.0%<br />
Street Map for local deliveries 5 20.0% 1 4.0% 19 76.0%<br />
Multimedia <strong>and</strong> Hypermedia 5 20.0% 5 20.0% 15 60.0%<br />
Order form for Stationery <strong>and</strong> Printing 5 20.0% 0 0.0% 20 80.0%<br />
UIF 4 16.0% 2 8.0% 19 76.0%<br />
First Aid 4 16.0% 1 4.0% 20 80.0%<br />
Fire Drill 4 16.0% 1 4.0% 20 80.0%<br />
Salary <strong>and</strong> Wage<br />
Negotiations/Agreements<br />
3 12.0% 2 8.0% 20 80.0%<br />
Labour Laws 3 12.0% 3 12.0% 19 76.0%<br />
Fixed Assets per office, room or section 2 8.0% 3 12.0% 20 80.0%<br />
Travel Agencies/Accommodation 2 8.0% 3 12.0% 20 80.0%<br />
Canteen facility 2 8.0% 1 4.0% 22 88.0%<br />
390<br />
No
Type of non-financial information<br />
available on EISs<br />
Elmarie Papageorgiou <strong>and</strong> Herman de Bruyn<br />
Yes, regularly<br />
upgraded<br />
Yes, but not always<br />
upgraded<br />
Count % Count % Count %<br />
Parking bay allocation 1 4.0% 1 4.0% 23 92.0%<br />
Unions 1 4.0% 1 4.0% 23 92.0%<br />
Car Hiring information 0 0.0% 1 4.0% 24 96.0%<br />
Wine <strong>and</strong> Dine 0 0.0% 3 12.0% 22 88.0%<br />
5.2 Qualitative results<br />
Other 4 29.0% 1 7.0% 9 64.0%<br />
Face-to-face interviews are armed with a list of structured questions to the interviewees. Apart from<br />
the interviewing, other data was gathered by observation, document studies <strong>and</strong> annual reports. All<br />
the respondents to the questionnaires were categorised into two groups. The interview questions <strong>and</strong><br />
the results of the interviews are presented in two tables as Group A <strong>and</strong> B in Interview Annexure A.<br />
The stratification of the different interview groups <strong>and</strong> the number of companies interviewed were as<br />
follows:<br />
Group A: Companies with EISs – Interviews with management of five companies<br />
Group B: Companies who plan to implement EISs – Interviews with management of two<br />
companies<br />
Seven executives <strong>and</strong> upper level management across all the listed JSE companies were<br />
interviewed. The names of the companies were not disclosed for confidentiality purposes.<br />
5.2.1 Group A – Results of companies with EISs<br />
One executive of five listed JSE companies with an EIS were r<strong>and</strong>omly selected from the respondents<br />
to the questionnaire to determine how EISs are used in their companies. A successful EIS provides<br />
the executive with the necessary real-time information that is needed in decision making <strong>and</strong> solving<br />
problems under time pressure. The EIS is a trusted source of information for companies in Group A.<br />
All the companies had different software options for their EIS. All the companies have used EISs for<br />
five years plus. The number of users accessing EISs varied from twenty six to over five hundred users<br />
with the majority of users being in the range of twenty six to fifty users. All interviewees confirmed that<br />
the accountant was the main user of an EIS in their business followed by the executive. All the<br />
interviewees indicated the following motivation factors for having an EIS; improve the effectiveness<br />
<strong>and</strong> efficiency of executives, provide easier, faster access to information <strong>and</strong> interface with other<br />
software packages. Interviewees selected quality of information, availability of information regularly,<br />
response time, increase productivity <strong>and</strong> user-friendliness as crucial factors to add strategic value for<br />
<strong>using</strong> an EIS. All interviewees confirmed that an EIS assists in decision-making. According to the<br />
interviewees the following exciting IT developments are planned for the future of their company;<br />
integration to group level, as EIS is paper based <strong>and</strong> only available to group level after 15 working<br />
days, adapt to new information technology, knowledge management portal, <strong>and</strong> Improved HR MIS<br />
systems, replace general ledger, improve processes, automate functions, updating <strong>and</strong> adapting to<br />
the latest technology.<br />
5.2.2 Group B – Results of companies that plan to implement an EIS<br />
One executive of two listed JSE companies that plan to implement an EIS were r<strong>and</strong>omly selected<br />
from the respondents to the questionnaire to be interviewed to determine how EISs can used in their<br />
companies in the future. Both executives stated that an EIS: would improve the immediate availability<br />
of information; could be used to drill down to transaction level; is user-friendly; decreases the working<br />
days substantially to produce consolidated Group results <strong>and</strong> increases the strategic value for<br />
decision making <strong>and</strong> immediate problem solving. The EIS is supported <strong>and</strong> empowered by the CEO<br />
<strong>and</strong> FD. Both the interviewees seek quicker, better <strong>and</strong> more efficient ways to do their day-to-day<br />
activities <strong>and</strong> have timeous reports. In both companies the main <strong>and</strong> planned users of the EIS are<br />
executives, CEOs <strong>and</strong> accountants. Currently both companies’ management reports are paperbased.<br />
The introduction of an EIS it would enhance the communication capabilities <strong>and</strong> improve the<br />
existing database of the company.<br />
391<br />
No
6. Conclusion<br />
Elmarie Papageorgiou <strong>and</strong> Herman de Bruyn<br />
The trend towards decision-making <strong>and</strong> problem-solving at all levels of business creates a need for a<br />
specialised information system. EISs address the needs of businesses in underst<strong>and</strong>ing financial <strong>and</strong><br />
non-financial information in order to assess companies’ performances. The type of information<br />
required by executives <strong>and</strong> top management is directly related to the level of management <strong>and</strong> the<br />
degree of structure in the type of decisions they deal with daily. The higher the level of management<br />
in the business, the more unstructured the decisions become. The financial <strong>and</strong> non-financial<br />
information, that is available on listed JSE company’s Web sites <strong>and</strong> EISs are used by top<br />
management <strong>and</strong> executives, <strong>and</strong> is usually summarised for decision-making <strong>and</strong> problem-solving to<br />
create a competitive advantage. Detailed information is available for a more in-depth analysis if<br />
required. Top management needs to be committed in <strong>using</strong> EISs <strong>and</strong> the constant drive to update<br />
information to be competitive. Underst<strong>and</strong>ing financial <strong>and</strong> non-financial information was explored in<br />
detail in interviews conducted to determine: what information was collected, how it was used, <strong>and</strong><br />
what role was played by executives in the process of <strong>using</strong> EISs. The outcomes of the interviews<br />
have limited value but definitely add value to the study as interviewees shared their experiences<br />
regarding their EISs to demonstrate the strategic value of EISs <strong>and</strong> to persuade top management to<br />
support EISs. Both financial <strong>and</strong> non-financial information was collected by <strong>using</strong> EISs to access<br />
quality, reliable <strong>and</strong> real-time information. Executives <strong>and</strong> accountants were the main users of EISs<br />
<strong>and</strong> the main motivation factors for <strong>using</strong> EISs were: to improve the effectiveness <strong>and</strong> efficiency of<br />
executives, to provide easier, faster access to information, <strong>and</strong> to interface with other software<br />
packages. The findings from the interviews concluded that successful EISs not only provided<br />
executives with necessary real-time information but that they were also trusted sources of information.<br />
In conclusion, it all begins with an IT paradigm shift to influence top management to create a culture<br />
of continuous awareness to improve <strong>and</strong> recognise IT issues when introducing a business<br />
management information tool, for listed JSE companies. IT is only useful to businesses if it is<br />
managed as an integrated business function, otherwise it risks wasting valuable information for<br />
decision-making <strong>and</strong> problem-solving. The decision to integrate <strong>and</strong> re-structure IT in a business is a<br />
key feature to inform management of the consequences of their business’s operations <strong>and</strong> the<br />
impacts of past decision making processes. IT should without doubt be the core vision for businesses<br />
<strong>and</strong> should be used as a strategic tool to focus on accessing information that is relevant, accurate <strong>and</strong><br />
timeous. EISs can be used to assist businesses to exp<strong>and</strong> <strong>and</strong> develop their businesses in<br />
underst<strong>and</strong>ing financial <strong>and</strong> non-financial information.<br />
A limitation of the study was the low response rate; this was due to the following reasons: some<br />
executives were out of office for long periods of time, addresses obtained from McGregor BFA did not<br />
include all the e-mail addresses of the companies, some non-respondents had no Web sites, some<br />
listed JSE companies obtained from McGregor BFA were de-listed or suspended by the time the<br />
questionnaires were e-mailed, some companies failed to participate in the survey or were unable to<br />
complete the survey due to time constrictions, some companies were not in a position to disclose the<br />
name or e-mail addresses of top management, some company policies forbad any participation in<br />
completing questionnaires <strong>and</strong> some addressed executives had already left the company at the time<br />
of the survey. Extending the questionnaire to a larger group of interviewees would be desirable in<br />
order to enhance the outcome of the findings.<br />
Future research could be to examine businesses in similar industries that might highlight specific<br />
concerns of different companies in the same industry. Further research could also assist businesses<br />
that do not have an EIS, establish how businesses access <strong>and</strong> use their financial <strong>and</strong> non-financial<br />
information to assess their companies’ performances. This would be of great values as financial <strong>and</strong><br />
non-financial information is critical for companies to strengthen their competitiveness in a very<br />
competitive digital environment.<br />
References<br />
Arnott, D. Jirachiefpattana, W. <strong>and</strong> O'Donnell, P. (2007) Executive information systems development in an<br />
emerging economy, Decision Support Systems, 42(4):2078-2084.<br />
Averweg, U.R. <strong>and</strong> Roldán, J.l. (2006) Executive information system implementation in organisations in South<br />
Africa <strong>and</strong> Spain: A comparative analysis. Computer St<strong>and</strong>ards & Interfaces, 58(6):625-634.<br />
Bullock, S. (2011) Reporting integrated learning from global leaders, Accountancy SA, Dec 2010 – January 2011,<br />
20-23.<br />
392
Elmarie Papageorgiou <strong>and</strong> Herman de Bruyn<br />
Cheung, W., <strong>and</strong> Babin, G. (2006) A metadatabase-enabled executive information system (Part A): A flexible <strong>and</strong><br />
adaptable architecture, Decision <strong>and</strong> Support Systems, 42:1589-1598.<br />
Cramm, S. (2010) Helping Businesses help themselves, Harvard Business Review, November 2010, 124.<br />
De Vries, P., Mulig E.V. <strong>and</strong> Lowery, K. (2004) A useful tool for data scanning in Executive <strong>Information</strong> System,<br />
Vol 104(8), 644-649.<br />
Gelinas, U.J. <strong>and</strong> Dull, R.B. (2008) Accounting <strong>Information</strong> Systems, 7 th ed,:Thomson, Mason USA.<br />
Halabi, A.K. Barrett R. <strong>and</strong> Dyt R. (2008) Underst<strong>and</strong>ing financial information used to assess small firm<br />
performance: An Australia qualitative study, Qualitative Research in Accounting <strong>and</strong> <strong>Management</strong>, Vol<br />
7(2):163-179/<br />
Hall, J.A. (2008) Accounting <strong>Information</strong> Systems, 6 th ed., South Western, Mason USA.<br />
Martin, E.W., Dehayes, D., Hoffer, J.A. <strong>and</strong> Perkins, W.C. (2005) Managing information technology. 5 th<br />
ed,:Pearson, Upper Saddle River.<br />
Meyer, T. (2011) The art of strategy what CEOs need to know, Accountancy SA, Dec 2010 – Jan 2011, 50-51.<br />
Naicker, D. (2010) CFO Responsibilities in an emerging market, Accountancy SA, September 2010, 21.<br />
Nieman, G. <strong>and</strong> Bennett, A. (2002) Business management, Van Schaik, Pretoria.<br />
Phillips, K. (2011) To Liberate Accountants first empowers the business, Accountancy SA, Dec 2010 – Jan 2011,<br />
37.<br />
Van Zyl, J. (2010) More than a gut feeling, Finweek, 11 November 2010, 12.<br />
Venter, J.M.P. (2002) A survey of current online reporting practices in South Africa, Meditari Accountancy<br />
Research, 10:209-225.<br />
Voogt, T. (2010) IT Governance Dear CFO what should we do?, Accountancy SA, October 2010, 28-30.<br />
Wessels, P.L. (2008) The identification <strong>and</strong> discussion of strategies for implementing an IT skills framework in the<br />
education of professional accountants, SA Journal of Accounting Research, 22(1), 147-172.<br />
393
Designing a Model for Evaluating the <strong>Information</strong><br />
Technology Level in Organizations <strong>using</strong> Fuzzy TOPSIS<br />
Shabnam Pas<strong>and</strong>ide, Abbas Toloie Eshlaghi, <strong>and</strong> Reza Radfar<br />
Science <strong>and</strong> Research Branch, Islamic Azad University, Tehran, Iran<br />
Sh.pas<strong>and</strong>ide@gmail.com<br />
toloie@gmail.com<br />
radfar@gmail.com<br />
Abstract: Implementation of information technology has a grown aspect in the modern management issues <strong>and</strong><br />
one of the important things is to evaluate the level of information technology in organization. this paper aims to<br />
present a model for evaluating the information technology (IT) level in organization by <strong>using</strong> Fuzzy TOPSIS. The<br />
criteria of information technology have been organized into four main categories <strong>and</strong> in each of them; the main<br />
<strong>and</strong> sub- criteria related to each parameter are defined. As the qualitative <strong>and</strong> quantitative criteria, due to the<br />
vague nature of IT, are not definitive, a linguistic term is employed to assess the importance of each criterion. In<br />
order to determine the weight of each parameter, a committee of experts gathered as decision makers (DMs) to<br />
consider the criteria <strong>and</strong> weights were assigned accordingly to each parameter, which leads to a decision making<br />
matrix that included the criteria <strong>and</strong> weights, <strong>using</strong> a multi-criteria-decision-making (MCDM) evaluation. The<br />
Method used to evaluate the weights was "Grouping" <strong>and</strong> for the evaluation, TOPSIS extended to a Fuzzy<br />
environment. The result of the decision making indicates the level of information technology of the organization<br />
under study <strong>and</strong> their respective rank. According to the simulation results <strong>and</strong> reviews of various experts in the<br />
field, the proposed model design was approved <strong>and</strong> can be applied to any organization which approaching<br />
information technology. The model was applied in two organizations <strong>and</strong> the results discussed about these<br />
organizations as a case study.<br />
Keywords: information technology, fuzzy set, TOPSIS, evaluation, MCDM<br />
1. Introduction<br />
Decision making related to <strong>Information</strong> technology problems is a complex issue due to its variety <strong>and</strong><br />
exp<strong>and</strong>ed area that it has many intangibles <strong>and</strong> non-financial benefits which are inherent in the<br />
implementation of IT (Gunasekaran,Love 2001). Multi criteria decision making (MCDM) methods are<br />
suitable for solving such problems that have more than one or two criteria or in many practical<br />
decision-making problems, such as the selection of a partner for an enterprise in the field of supply<br />
chain management, ranking research units of universities, Sustainable energy planning <strong>and</strong> so on<br />
(Brougha 2004, Pohekar , Ramach<strong>and</strong>ran 2004). So these criteria usually classified into two<br />
categories: subjective citeria: have linguistic/ qualitative definition, <strong>and</strong> objective criteria: are defined in<br />
quantitative terms (Liang 1999). Decision-makers usually need to provide their preferences over<br />
alternatives. TOPSIS is one of the well-known methods for multiple-criteria decision-making (MCDM),<br />
That was first developed by Hwang & Yoon (1981). This technique aids to select the best alternative<br />
which has the shortest distance from a positive ideal solution (PIS) but also has the farthest distance<br />
from the negative ideal solution (NIS) (Chen 2000). In this method the weights <strong>and</strong> rating of criteria<br />
are defined precisely (Teghem, Delhaye. & Kunsche 1989), but in a real world scenario, crisp data<br />
provided by decision-makers is usually are not reliable because of uncertainty of the situations, lack of<br />
time, knowledge or data (Atanassov,<strong>and</strong> Gargov 1989). Hence, good models for these problems<br />
should be able to accept vague values not only exact ones, so the use of fuzzy numbers <strong>and</strong> linguistic<br />
terms are suitable <strong>and</strong> adequate for this purpose (Lee 2009).<br />
There have been some papers that have used fuzzy TOPSIS in a variety of applications. Utilizing<br />
TOPSIS technique, in all of the decision problems, are considered extensively. Some of those<br />
articles, to a good extent, after introducing Fuzzy theory (Zadeh 1965), solve the difficulty of the<br />
uncertainties of the decision environment. Thus TOPSIS is extended to the fuzzy environment <strong>and</strong> a<br />
new method called FUZZY TOPSIS has been introduced. Most of the steps of TOPSIS can be easily<br />
generalized to a fuzzy environment, except max <strong>and</strong> min operations in finding the ideal solution <strong>and</strong><br />
negative ideal solution (Hwan & Yoon 1981). This new method has become a solution for the decision<br />
problems. In this section some of the researches in this have been discussed.<br />
For example, an applied this technique for modifying a framework of evaluating performance of<br />
companies based on financial ratio (Chu 2002). Boran , Genc, Kurt, & Akay 2009 have developed a<br />
model of fuzzy TOPSIS for selecting supplier. Chang <strong>and</strong> Chen 2009 have employed a similar<br />
approach <strong>using</strong> Shannon’s Entropy weighting method in their paper. Mahdavi et al. (2008) have been<br />
394
Shabnam Pas<strong>and</strong>ide, Abbas Toloie Eshlaghi, <strong>and</strong> Reza Radfar<br />
proposed a model of TOPSIS for the fuzzy environment with the introduction of suitable negation for<br />
acquiring ideal solutions. They have suggested a new method for measuring distances of ideals.<br />
In this paper a new method for evaluation an organization’s IT level is presented. This model is based<br />
on group decision making <strong>and</strong> multi criteria <strong>and</strong> alternatives <strong>and</strong> TOPSIS extended into a fuzzy<br />
environment is applied. The method is more suitable for human judgment where no identification<br />
metric for quantity values is present. Moreover, where quality values have no exact definition.<br />
After modifying a frame work for the model, linguistic terms are assigned to the weights <strong>and</strong> they are<br />
subsequently rated in order to evaluate the values of the criteria for each alternative(Zadeh 1975),<br />
that the concept of it was developed by Buckley (1985) <strong>and</strong> Kaufmann (1991). In next step the fuzzy<br />
Topsis model performed in IT units <strong>and</strong> finally, an expert group of decision makers evaluate these<br />
criteria <strong>and</strong> alternatives <strong>and</strong> rank them based on their final scores.<br />
2. Preliminaries<br />
2.1 Grouping decision making technique<br />
The Grouping Decision Making (GDM) technique is one of the prominent methods for evaluating<br />
importance of the weights of different criteria. Criteria are presented to the determiner simultaneously<br />
<strong>and</strong> the difference lies in the method of their presentation. It is probable that decision makers (DMs)<br />
make different decisions if they are faced with the criteria in one setting. For n decision makers, the<br />
equation is as follows:<br />
2.2 Fuzzy sets <strong>and</strong> operations<br />
In the following, some basic definitions of fuzzy sets from (Zimmermann 1996, Zadeh 1965, Chen<br />
2000) that are used in the paper are briefly.<br />
Definition 2.2.1. A fuzzy set à in a universe of discourse X is characterized by a membership function<br />
µÃ(x) which associates with elements x in X a real number in the interval [0,1]. The function value<br />
µÃ(x) is termed the grade of membership of x in Ã.<br />
Definition 2.2.2. A fuzzy set à of the universe of discourse X is convex if <strong>and</strong> only if,<br />
[λx1+(1-λ)x2] Min[µÃ(x1), µÃ(x2)] x1,x2 X where λ [0,1] (2)<br />
Definition 2.2.3. A fuzzy set à of the universe of discourse X is called a normal fuzzy set implying that<br />
Definition 2.2.4. A fuzzy number is a fuzzy subset in the universe of discourse X that is both convex<br />
<strong>and</strong> normal.<br />
Definition 2.2.5. A fuzzy set à defined on X <strong>and</strong> any number α [0,1], the α-cut à α , <strong>and</strong> the strong αcut<br />
à α+ are defined as<br />
à α ={<br />
à α+ ={ (4)<br />
The α-cut, contains all the elements of the universal set x whose membership are greater than or<br />
equal to the specified value of α.<br />
Definition 2.2.6. A triangular fuzzy number à can be defined by a triplet (a1,a2,a3).the membership<br />
function is defined as<br />
395<br />
(1)<br />
(3)
Shabnam Pas<strong>and</strong>ide, Abbas Toloie Eshlaghi, <strong>and</strong> Reza Radfar<br />
Definition 2.2.7. Some operations for positive fuzzy numbers described as (Zimmermann 1996)<br />
, α (6)<br />
Definition 2.2.8 Distance measurement ( ) can be calculated as (Chen 2000)<br />
3. Proposed method<br />
In this section, a fuzzy Topsis approach, with a new application for IT evaluating, will be proposed.<br />
The significance of the weights of various criteria <strong>and</strong> the ratings of qualitative criteria are considered<br />
as linguistic variables. These linguistic variables can then be expressed in positive triangular fuzzy<br />
numbers as indicated in tables 1 (Burkley Kafmann) <strong>and</strong> 2.<br />
Table 1: Linguistic variables for the importance weight<br />
Very low (VL)<br />
Low (L)<br />
Medium low (ML)<br />
Medium (M)<br />
Medium high (MH)<br />
High (H)<br />
Very High (VH)<br />
Table 2: Linguistic variables for the ratings<br />
Very poor (VP)<br />
Poor (P)<br />
Medium poor (MP)<br />
Medium (M)<br />
Medium good (MG)<br />
Good (G)<br />
Very Good (VG)<br />
In figure 1, linguistic value for importance weight is shown.<br />
(0; 0; 0:1)<br />
(0; 0:1; 0:3)<br />
(0:1; 0:3; 0:5)<br />
(0:3; 0:5; 0:7)<br />
(0:5; 0:7; 0:9)<br />
(0:7; 0:9; 1:0)<br />
(0.9;1.0;1.0)<br />
(0; 1; 10)<br />
(0; 10; 30)<br />
(10; 30; 50)<br />
(30; 50; 70)<br />
(50; 70; 90)<br />
(70;90; 100)<br />
(90;99;100)<br />
Using this method, the normalized decision matrix (X) is required typically, which allows a comparable<br />
scale for all rating in X by<br />
Where rij (0 ≤ rij ≤ 1) is defined as the normalized performance rating of alternative Ai on criteria Cj .<br />
396<br />
(12)<br />
(5)<br />
(7)<br />
(8)<br />
(9)<br />
(10)<br />
(11)
Shabnam Pas<strong>and</strong>ide, Abbas Toloie Eshlaghi, <strong>and</strong> Reza Radfar<br />
Considering the different significant of each criterion, the weighted normalized fuzzy decision matrix<br />
can be as<br />
1<br />
0.9<br />
0.8<br />
0.7<br />
0.6<br />
0.5<br />
0.4<br />
0.3<br />
0.2<br />
0.1<br />
0<br />
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1<br />
Figure 1: Linguistic values for importance weight<br />
Where. in which is assumed as a weighted matrix.<br />
According to the weighted normalized fuzzy decision matrix, we know that the elements , are<br />
normalized positive triangular fuzzy numbers <strong>and</strong> their ranges belong to the closed interval of zero<br />
<strong>and</strong> ne i.e. [0,1].<br />
Fuzzy positive-ideal solution (FPIS, ) <strong>and</strong> fuzzy negative-ideal solution (FNIS, ) defined as<br />
,<br />
Where <strong>and</strong> ,j= 1,2,....,n<br />
The distance of each alternative from <strong>and</strong> can be currently calculated as<br />
The proximity coefficient of each alternative is calculated as<br />
Obviously, as CCi approaches to 1, an alternative Ai is closer to the FPIS (A + ) <strong>and</strong> farther from VFIS<br />
(A - ).Therefore according to the proximity coefficient, all alternatives can be ranked <strong>and</strong> the best one<br />
will be selected from among a set of feasible alternatives.<br />
In table 3, four main factors of information technology are categorized (Lim 2001). As will be stated<br />
later on, it could be customized or changed into any organization. This table was chosen as a<br />
framework for our study.<br />
397<br />
(13)<br />
(14)<br />
(15)<br />
(16)
Shabnam Pas<strong>and</strong>ide, Abbas Toloie Eshlaghi, <strong>and</strong> Reza Radfar<br />
Table 3: Framework of criteria <strong>and</strong> related sub criteria<br />
factors criteria Sub-criteria<br />
IT<br />
strategy<br />
IT<br />
Resource<br />
IT<br />
Use<br />
IT<br />
Performance<br />
4. Numerical example<br />
Policy -ISP contents<br />
Organization Vision<br />
Appropriateness of implementation Plan<br />
Organization chart CIO<br />
Authority, Skill<br />
IT committee<br />
Establishment<br />
Viewpoint - president’s IT sight<br />
- CIO’s IT mind<br />
Investment IT Budget<br />
Rate of Investment(ROI)<br />
Infrastructure Network # LAN port/# total employee<br />
Hardware # PC/# total employee(#TE)<br />
#PC connected to LAN/#TE<br />
Software #installed Software/#PC<br />
Security #Virus vaccine SW/#PC<br />
Backup <strong>and</strong> Recovery<br />
facility Computer training centres<br />
Conference facility<br />
Human resource IT department #Division related<br />
Human<br />
#Individuals qualified <strong>and</strong> certified<br />
resource<br />
IT operation #Guidelines<br />
Helpdesk operation<br />
IT training #Training courses /#TE<br />
#Training/#IT resource<br />
PC PC use skill<br />
Internet Mean internet use time/day<br />
#Active Email ID/#TE<br />
Intranet #Electronic document/#total doc<br />
Internet usage<br />
<strong>Information</strong>/data sharing<br />
Functions of intranet(paperless system)<br />
User satisfaction Business Process improvement<br />
IS satisfaction<br />
Motivation<br />
Web Site Contents, <strong>Information</strong>, Interface<br />
Accessibility, design<br />
Public service<br />
Responsibility, transparency<br />
IT project #IT project(SI project)<br />
Amount of funds to IT company<br />
IT Event # IT Training for citizen<br />
# Various IT event<br />
In this section, the proposed model, in two different organizations, is applied <strong>and</strong> the simulations were<br />
carried out in MATLAB (R2008) On a Pentium IV, 2 GB RAM processor.<br />
Table 4: Importance weight for evaluating 38 sub-criteria<br />
Sub-Criteria Importance-weight<br />
C1 0.8002 0.9311 0.9791<br />
C2 0.7114 0.8670 0.9587<br />
C3 0.6598 0.8401 0.9587<br />
C4 0.6067 0.8021 0.9487<br />
C5 0.4288 0.6700 0.8435<br />
C6 0.6015 0.7905 0.9387<br />
C7 0.5964 0.7791 0.9289<br />
C8 0.5720 0.7740 0.9387<br />
C9 0.8202 0.8831 0.9345<br />
C10 0.5876 0.6431 0.6944<br />
C11 0.5805 0.6466 0.7067<br />
398
Shabnam Pas<strong>and</strong>ide, Abbas Toloie Eshlaghi, <strong>and</strong> Reza Radfar<br />
Sub-Criteria Importance-weight<br />
C12 0.5548 0.6086 0.6585<br />
C13 0.3387 0.4619 0.5692<br />
C14 0.4027 0.4765 0.5392<br />
C15 0.4808 0.5440 0.5951<br />
C16 0.2567 0.5165 0.7077<br />
C17 0.7870 0.9349 0.9895<br />
C18 0.4111 0.6323 0.8242<br />
C19 0.7519 0.8024 0.8445<br />
C20 0.8147 0.8650 0.9064<br />
C21 0.7508 0.8013 0.8435<br />
C22 0.7460 0.7966 0.8430<br />
C23 0.7199 0.7765 0.8285<br />
C24 0.3410 0.5574 0.7563<br />
C25 0.7289 0.8206 0.9043<br />
C26 0.8161 0.8831 0.9378<br />
C27 0.8450 0.9039 0.9519<br />
C28 0.8567 0.9157 0.9635<br />
C29 0.8537 0.9094 0.9546<br />
C30 0.8458 0.9047 0.9581<br />
C31 0.8070 0.9448 0.9895<br />
C32 0.7675 0.9251 0.9895<br />
C33 0.8139 0.9587 1.0000<br />
C34 0.7057 0.8834 0.9791<br />
C35 0.7675 0.9251 0.9895<br />
C36 0.8577 0.9135 0.9536<br />
C37 0.7833 0.8425 0.8965<br />
C38 0.8213 0.8840 0.9354<br />
Each sub-criteria is evaluated by a group which consists of 10 experts <strong>and</strong> their weights, with the<br />
contribution of Equation (1), have been calculated <strong>and</strong> the results are gathered in Table 4.<br />
Table 5: Evaluating sub-main criteria weights<br />
Criteria Fuzzy Weight Criteria Fuzzy Weight<br />
C1 0.7545 0.8985 0.9689 C11 0.5557 0.7671 0.9154<br />
C2 0.5990 0.7848 0.9338 C12 0.6357 0.7395 0.8144<br />
C3 0.6109 0.6109 0.6109 C13 0.4259 0.4259 0.4259<br />
C4 0.4289 0.4289 0.4289 C14 0.3736 0.5300 0.6204<br />
C5 0.5688 0.7689 0.9031 C15 0.8024 0.8024 0.8024<br />
C6 0.8650 0.8650 0.8650 C16 0.8013 0.8013 0.8013<br />
C7 0.7461 0.7461 0.7461 C17 0.3410 0.5574 0.7563<br />
C8 0.5467 0.5467 0.5467 C18 0.7832 0.7832 0.7832<br />
C9 0.7959 0.9428 0.9930 C19 0.7359 0.9040 0.9843<br />
C10 0.8221 0.8221 0.8221 C20 0.7117 0.7117 0.7117<br />
Table 6: Evaluating main criteria weights<br />
Criteria Fuzzy Weight Criteria Fuzzy weight<br />
C1 0.8139 0.9587 1.0000 C11 0.8346 0.9689 1.0000<br />
C2 0.7937 0.9487 1.0000 C12 0.5765 0.7756 0.9251<br />
C3 0.6062 0.7921 0.9251 C13 0.1178 0.3436 0.5792<br />
C4 0.3644 0.5894 0.7548 C14 0.6429 0.8209 0.9349<br />
C5 0.6434 0.8313 0.9587 C15 0.7870 0.9349 0.9895<br />
C6 0.6935 0.8759 0.9650 C16 0.6216 0.8005 0.9251<br />
C7 0.6997 0.8706 0.9689 C17 0.5621 0.7675 0.9251<br />
C8 0.2954 0.5165 0.7237 C18 0.5435 0.7484 0.9154<br />
C9 0.7057 0.8834 0.9791 C19 0.7740 0.9387 1.0000<br />
C10 0.7321 0.7823 0.8325 C20 0.6910 0.7413 0.7916<br />
The 38 sub-criteria by means of geometric mean, which means by <strong>using</strong> equation (1), have been<br />
transformed into 20 criteria. The results are listed in Table 5. Moreover, geometric mean of these 20<br />
399
Shabnam Pas<strong>and</strong>ide, Abbas Toloie Eshlaghi, <strong>and</strong> Reza Radfar<br />
criteria along with that of 20 main-criteria, which are evaluated by the group of experts, indicated in<br />
Table 6, constitutes the final weights of the main- criteria <strong>and</strong> is listed in Table 7.<br />
<strong>Information</strong> technology criteria in the IT unit of each organization, (Alternatives= A1, A2), have been<br />
evaluated by four experts of that organization (Pi; i=1, 2, 3, 4) <strong>and</strong> the evaluations are listed in Table<br />
8. Also, the linguistic terms with the contribution of Table 2 are converted into the fuzzy values <strong>and</strong> by<br />
means of agrouping technique are aggregated then in next step by <strong>using</strong> equation (1) they are<br />
transformed into the 20 values for the main- criteria. The result is shown in table 9. Moreover,<br />
considering the defined models the level of organization’s IT have been ranked.<br />
Table 7: Evaluating main <strong>and</strong> sub-criteria weights<br />
Criteria Fuzzy Weight Criteria Fuzzy Weight<br />
C1 0.7837 0.9281 0.9843 C11 0.6811 0.8621 0.9568<br />
C2 0.6895 0.8628 0.9663 C12 0.6053 0.7573 0.8680<br />
C3 0.6085 0.6956 0.7518 C13 0.2240 0.3826 0.4967<br />
C4 0.3954 0.5028 0.5690 C14 0.4901 0.6596 0.7616<br />
C5 0.6049 0.7994 0.9305 C15 0.7947 0.8661 0.8911<br />
C6 0.7745 0.8704 0.9136 C16 0.7058 0.8009 0.8610<br />
C7 0.7225 0.8059 0.8502 C17 0.4378 0.6540 0.8365<br />
C8 0.4019 0.5314 0.6290 C18 0.6525 0.7656 0.8468<br />
C9 0.7494 0.9126 0.9861 C19 0.7547 0.9212 0.9921<br />
C10 0.7758 0.8020 0.8273 C20 0.7013 0.7263 0.7506<br />
Table 8: Linguistic terms for evaluating the IT units<br />
A1 A2<br />
C P1 P2 P3 P4 P1 P2 P3 P4<br />
C1 VL VL VL VL M MH M M<br />
C2 VH MH H MH H H H H<br />
C3 VH H MH H H H H H<br />
C4 ML L ML VL M MH M MH<br />
C5 VL VL VL VL H VH H MH<br />
C6 VH H H H H H H H<br />
C7 M M M M M MH M M<br />
C8 VL L VL L H MH H H<br />
C9 VL VL L VL M M M M<br />
C10 50 50 50 50 50 50 50 50<br />
C11 55 55 55 55 50 50 50 50<br />
C12 90 90 90 90 75 75 75 75<br />
C13 65 65 65 65 55 55 55 55<br />
C14 H H H H M M M M<br />
C15 H H H H M M M M<br />
C16 VL VL L L M M M M<br />
C17 L L L ML H VH H H<br />
C18 VL L VL L M M M M<br />
C19 L L ML L M MH M M<br />
C20 VL L VL L M MH H MH<br />
C21 VL L L VL H MH M M<br />
C22 VL VL VL VL H MH H MH<br />
C23 VL ML L L H MH H H<br />
C24 L ML L L H VH MH H<br />
C25 MH H MH M M M M M<br />
C26 M M M M M VH M M<br />
C27 M M M M M MH M M<br />
C28 0 0 0 0 M M M M<br />
C29 0 0 0 0 L ML L L<br />
C30 0 0 0 0 H H H MH<br />
C31 M M M M M VH M M<br />
C32 0 0 0 0 H H H H<br />
C33 ML M ML M M M M M<br />
C34 M M MH M L ML L ML<br />
400
Shabnam Pas<strong>and</strong>ide, Abbas Toloie Eshlaghi, <strong>and</strong> Reza Radfar<br />
A1 A2<br />
C35 MH M M MH L L L VL<br />
C36 VL VL VL VL M M VL M<br />
C37 0 0 0 0 L L L L<br />
C38 H MH H MH M MH M M<br />
Table 9: The result of the two IT unit evaluations in fuzzy value<br />
Main-Criteria Alternative1 Alternative2<br />
C1 0.9164 0.9581 0.9746 0.9498 0.9966 1.0000<br />
C2 0.9009 0.9427 0.9646 0.9210 0.9659 0.9786<br />
C3 0.9012 0.9448 0.9616 0.9498 0.9966 1.0000<br />
C4 0.9222 0.9643 0.9808 0.9335 0.9792 0.9966<br />
C5 0.9000 1.0000 1.0000 0.9000 1.0000 1.0000<br />
C6 0.9254 1.0000 1.0000 0.9140 1.0000 1.0000<br />
C7 0.9519 1.0000 1.0000 0.9541 1.0000 1.0000<br />
C8 0.9310 0.9760 0.9871 0.9541 1.0000 1.0000<br />
C9 0.9308 0.9749 0.9871 0.8982 0.9416 0.9616<br />
C10 0.9514 0.9977 1.0000 0.9384 0.9838 0.9977<br />
C11 0.9106 0.9527 0.9745 0.9361 0.9816 0.9977<br />
C12 0.9106 0.9527 0.9745 0.9269 0.9723 0.9954<br />
C13 0.9211 0.9632 0.9797 0.8883 0.9317 0.9647<br />
C14 0.9537 1.0000 1.0000 0.9541 1.0000 1.0000<br />
C15 0.9462 0.9919 0.9989 0.9149 0.9583 0.9779<br />
C16 0 0 0 0 0 0<br />
C17 0 0 0 0.9292 0.9742 0.9852<br />
C18 0.9489 0.9943 1.0000 0.9179 0.9620 0.9808<br />
C19 0.9580 1.0000 1.0000 0.8942 0.9363 0.9683<br />
C20 0 0 0 0.9507 0.9966 1.0000<br />
In Table 10, fuzzy positive ideal solution (FPIS), fuzzy negative ideal solution (FNIS) <strong>and</strong> the proximity<br />
coefficient of each alternative( CCi )which are the results of <strong>using</strong> the mentioned models, corresponds<br />
to each unit, have been listed. Thus <strong>using</strong> this model the rank orders are as follows that A2 is bigger<br />
than A1.<br />
Table 10: Comparison results<br />
Ai FPIS FNIS CCi<br />
1 17.367 2.8487 0.1413<br />
2 15.9524 4.2181 0.2091<br />
5. Conclusion<br />
Considering the widespread dimensions of <strong>Information</strong> Technology <strong>and</strong> also its complicated nature, it<br />
is necessary to use multiple criteria decision models. Due to define the importance of respective<br />
criteria, taking advantage of various expert groups is needed, so the uses of fuzzy systems enable us<br />
to assess the importance of these criteria. In this paper the extended one MCDM model into a fuzzy<br />
environment (i.e. Fuzzy TOPSIS) is developed. Here, all criteria are assumed to be positive, thus<br />
positive triangular fuzzy numbers are assigned for assessing weights <strong>and</strong> values. The proposed<br />
model is not affiliated into the criteria <strong>and</strong> if needed, can be developed with changes in time,<br />
technology, <strong>and</strong> region simultaneously. According to the obtained results from the provided model ,<br />
which are listed in table 10, <strong>and</strong> performing it in two organizations as a case study, it has been found<br />
that in comparison CC 2 is closer to a unity than CC 1 <strong>and</strong> its distance from FINS is more far than that<br />
of the first organization. This indicates that the IT value of the second organization has a better rank<br />
order than that of the first organization. This model enable IT managers <strong>and</strong> executives to select the<br />
best among their suppliers or if different branches exist they can assess the performance of their units<br />
in ranking mode. This model can be programmed in the VISUAL software package <strong>and</strong> made<br />
401
Shabnam Pas<strong>and</strong>ide, Abbas Toloie Eshlaghi, <strong>and</strong> Reza Radfar<br />
available for units in order to facilitate the use for individuals <strong>and</strong> to make it quick <strong>and</strong> easy for the<br />
decision making process.<br />
References<br />
Atanassov.K.,<strong>and</strong> Gargov,G. (1989) ”Interval-valued intuitionistic fuzzy sets”, Fuzzy Sets <strong>and</strong> Systems,Vol. 31,<br />
pp 343-349.<br />
Boran ,F. E., Genc.S., Kurt.M. <strong>and</strong> Akay.D.(2009) “A multi-criteria intuitionistic fuzzy group decision making for<br />
supplier selection with TOPSIS method”, Expert Systems with Applications Vol. 36, pp 11363–11368.<br />
Brugha,C.M.(2004) “Structure of multi-criteria decision-making”, Journal of the Operational Research Society,<br />
Vol. 55, pp 1156-1168.<br />
Buckley, J.J.(1985) ” Fuzzy hierarchical analysis”, Fuzzy Sets <strong>and</strong> Systems, Vol. 17 ,pp 233–247<br />
Chen, C.T.(2000) “Extension of Fuzzy Topsis for Group Decision Making under Fuzzy Environment”, Fuzzy Sets<br />
<strong>and</strong> Systems, Vol. 114, pp 1-9.<br />
Chu, T.C.(2002) “Facility Location Selection Using Fuzzy Topsis under Group Decisions”,<br />
International Journal of Uncertainty, Fuzziness <strong>and</strong> <strong>Knowledge</strong>-Based Systems, Vol. 10, No.6,<br />
pp 687 – 701.<br />
Gunasekaran, A., Love, P. E. D., Rahimi, F. <strong>and</strong> Miele, R. (2001) “A Model for Investment Justification in<br />
<strong>Information</strong> Technology Projects” , International Journal of <strong>Information</strong> <strong>Management</strong>, Vol 21, No. 5, October<br />
, pp 349-364.<br />
Hung, C.c. <strong>and</strong> Chen, L. H. (2009) A fuzzy Topsis decision making model with entropy weight under intuitionstic<br />
fuzzy environment. Proceedings of International Multiconference of Engineers <strong>and</strong> Computer Scientists, ,<br />
Vol. 1,1 march.<br />
Hwang, C.L.<strong>and</strong> Yoon ,K.( 1981) Multiple Attribute Decision Making: Methods <strong>and</strong> Applications, Springer, Berlin.<br />
Kaufmann, A. Gupta,M.M. (1991) Introduction to Fuzzy Arithmetic: Theory <strong>and</strong> Applications, VanNostr<strong>and</strong>-<br />
Reinhold, New York.<br />
Lee, A.H.I.(2009) “A fuzzy AHP evaluation model for buyer-supplier relationship with the consideration of<br />
benefits, opportunities,costs <strong>and</strong> risks.International”, Journal of Production Research, Vol. 47, No. 15,pp<br />
4255-4280.<br />
Lee ,A. H. I. , Chen, W.C. <strong>and</strong> Chang, C.Jan.(2008) “A fuzzy AHP <strong>and</strong> BSC Approach for Evaluating<br />
Performance of IT Department in The Manufacturing industry in Taiwan”, An International Journal Expert<br />
Systems with Applications, Vol. 34, No.1 ,pp 96-107.<br />
Liang, G.Sh.(1999) “Fuzzy MCDM based on ideal <strong>and</strong> anti-ideal concepts”, European Journal of Operational<br />
Research, Vol. 112,pp 682-691.<br />
Lim, S. K. (2001) <strong>Information</strong> Technology Evaluate Methods <strong>and</strong> <strong>Management</strong> :A Framework to evaluate the<br />
information level, IGI PubilshingHershey,London,Melborn,Singapore.<br />
Mahdavi,I. ,Mahdavi-Amiri,N,, Heidarzade,A. <strong>and</strong> Nourifar,R.(2008) ”Designing a model of fuzzy TOPSIS in<br />
multiple criteria decision making”, Applied Mathematics <strong>and</strong> Computation, Vol. 206,pp 607–617.<br />
Pohekar,S.D. <strong>and</strong> Ramach<strong>and</strong>ran,M. (2004) “Application of multi-criteria decision making to sustainable energy<br />
planning”, Renewable <strong>and</strong> Sustainable Energy Reviews,Vol.8, No.4,pp 365-381.<br />
Teghem ,J., Delhaye. Jr. C.<strong>and</strong> Kunsche. P.L. (1989) “An interactive decision support system(IDSS) for<br />
multicriteria decision aid”, Mathematics <strong>and</strong> Computation Modelling, Vol. 12,No.10-11,pp 1311-1320.<br />
Zadeh,L.A.(1965) “Fuzzy Sets”, <strong>Information</strong> <strong>and</strong> Control, Vol. 8,pp 338-353.<br />
Zadeh,L.A.(1975) “The Concept of a Linguistic Variable <strong>and</strong> Its Application to Approximate<br />
Reasoning”,<strong>Information</strong> Science,Vol. 8,pp 199-249(I),pp 301-357(II).<br />
Zimmermann, H.J.(1996) Fuzzy set theory <strong>and</strong> its applications. Boston:Kluwer Academic Publishers.<br />
402
Can eGovernment Systems Bridge the Digital Divide?<br />
Elias Pimenidis 1 , Lazaros Iliadis 2 , <strong>and</strong> Christos Georgiadis 3<br />
1 University of East London, UK<br />
2 Democritus University of Thrace, Nea Oresteias, Greece<br />
3 University of Macedonia, Thessaloniki, Greece<br />
e.pimenidis@uel.ac.uk<br />
lIliadis@duth.gr<br />
geor@uom.gr<br />
Abstract: Electronic Government systems are often seen as panacea in the remedy of all failings of governance.<br />
With a history span of almost two decades, eGovernment implementations have often reached dead ends <strong>and</strong><br />
have regularly failed to deliver the promise that the governments that have initiated them have made to their<br />
citizens. Despite an abundance of development models <strong>and</strong> best case scenarios identified in literature,<br />
eGovernment services are continually failing to attract the citizens <strong>and</strong> to capture their trust <strong>and</strong> faith. The main<br />
reason quoted for such failures is the lack of innovation <strong>and</strong> inclusivity in the way a service is designed <strong>and</strong><br />
delivered. The digital divide is the major risk of marginalizing sectors of society or even whole continents due to<br />
lack of access to web based services. In the developing world it is mainly the lack of, or poor infrastructure that<br />
maintains <strong>and</strong> often widens the divide, while in the developed world it is lack of skills <strong>and</strong> difficulty of accessing<br />
services that leads citizens to ab<strong>and</strong>on their efforts in <strong>using</strong> services online. Whatever the reason that leads to<br />
non-access of services the effect is similar <strong>and</strong> those citizens that fall victim to it are increasingly consumed into<br />
the trap of the digital divide. Efforts <strong>and</strong> initiatives to address the divide have primarily focused on building the<br />
infrastructure <strong>and</strong> providing access to the web. However, the quality <strong>and</strong> accessibility of online services is quite<br />
often then reason why citizens distance themselves from web-based services <strong>and</strong> the internet in total. This paper<br />
attempts to explore the shortfall in criteria for evaluating a government’s efforts in planning, implementing <strong>and</strong><br />
delivering services that address the operational requirements of efficient government, but equally cater for the<br />
needs of the citizens as end users of the service.<br />
Keywords: eGovernment, digital divide, eGovernment development, eGovernment attractiveness, eGovernment<br />
evaluation<br />
1. Introduction<br />
The majority of countries on a worldwide scale have implemented or at least have a strategic plan in<br />
place for implementing eGovernment applications aiming to improve the performance of governance<br />
delivery <strong>and</strong> improving the way citizens interact <strong>and</strong> complete transactions with government<br />
organizations <strong>and</strong> departments.<br />
Although the above general aim of eGovernment systems appears inclusive of the majority of cases,<br />
the specific aims of the different eGovernment systems vary considerably. The more advanced<br />
countries in terms of eGovernment systems deployment are found amongst the group of developed<br />
countries <strong>and</strong> they usually are the basis upon which other countries form their strategies <strong>and</strong><br />
implementations (Savvas et al 2009, Shareef et al 2010).<br />
Such imitations of “successful” results often lead to problems as the countries <strong>and</strong> organizations that<br />
adopt them lack in compatibility of the application domain, the infrastructure to capitalise on the<br />
potential benefits <strong>and</strong> in most cases cannot even guarantee the accessibility of the service to its<br />
intended recepients. This creates a different notion of the digital divide, not one relating to the lack of<br />
technology <strong>and</strong> internet access, but one that relates to lack of available services that target the needs<br />
of their customers. In contrast, when citizens <strong>and</strong> businesses find available <strong>and</strong> desirable online<br />
services they’ll seek all possible routes to access them to reap the benefits <strong>and</strong> in this way the<br />
obstacles leading to the digital divide can be overcome (Pimenidis et al 2009).<br />
What constitutes appropriate <strong>and</strong> successful eGovernment services <strong>and</strong> what are the criteria upon<br />
which we can evaluate a country’s potential in delivering suitable services to its citizens are issues<br />
that have been widely explored by researchers but with the focus being primarily on technological<br />
issues. Literature is rich in papers attempting to discuss this issue, with the majority foc<strong>using</strong> on<br />
concepts such the e-readiness rankings (recently renamed digital economy rankings) <strong>and</strong> their<br />
relevant criteria as provided by the Economist Intelligence Unit (2011) <strong>and</strong> the eGovernment<br />
development rankings as provided by the eGovernment survey conducted by the United Nations<br />
Department of Economic <strong>and</strong> Social Affairs (UN 2010).<br />
403
Elias Pimenidis, Lazaros Iliadis, <strong>and</strong> Christos Georgiadis<br />
2. eGovernment capacity measurement<br />
Since the dawn of online services many people believed that the power of information <strong>and</strong><br />
communications technology (ICT) could drive social change in predictable <strong>and</strong> desirable ways. The<br />
past two decades have supplied many successful examples of eGovernment services, but there is at<br />
least an equal number of those that demonstrate the triumph of hope over experience in the ability of<br />
eGovernment to drive change. The use of government portals, the shop window of many<br />
eGovernment programs, has on average attracted no more than 30% of the population, making them<br />
appear as either inefficient or in the worst case exposing the rest of the citizens to the risk of the<br />
digital divide(Millard 2010). eGovernment is promoted as a means of transforming government,<br />
empowering the citizens <strong>and</strong> ushering in a new era of deliberative democracy. In doing so though<br />
governments <strong>and</strong> related agencies do not shift the focus away from technology <strong>and</strong> towards the social<br />
<strong>and</strong> process reengineering exercises required to empower such services. Instead ICT remain at the<br />
core of a country’s “world view” of digital services <strong>and</strong> the ability to improve efficiency, effectiveness<br />
<strong>and</strong> social inclusion <strong>and</strong> equality.<br />
Since 2000, the Economist Intelligence Unit (EIU) has been assessing the world's largest economies<br />
on their ability to absorb information <strong>and</strong> communications technology (ICT) <strong>and</strong> to use it for economic<br />
<strong>and</strong> social benefit. This benchmarking exercise was originally termed the "e-readiness rankings" <strong>and</strong><br />
has evolved as the definitive guide to a country’s potential of delivering technology empowered<br />
services. Since 2010 the study has been renamed as the "digital economy rankings", to reflect the<br />
increasing influence of ICT in economic (<strong>and</strong> social) progress. Despite the social element taken into<br />
consideration for the first time, the emphasis has not shifted from its technology dominated core.<br />
Infrastructure metrics, points of access, telephone l<strong>and</strong>line density are predominant amongst the<br />
assessment criteria to rank a country as to its ability to develop <strong>and</strong> deliver online services. The digital<br />
economy rankings assess the quality of a country's ICT infrastructure <strong>and</strong> the ability of its consumers,<br />
businesses <strong>and</strong> governments to use ICT to their benefit. It is perceived that when a country uses ICT<br />
to conduct more of its activities, the economy can become more transparent <strong>and</strong> efficient. The EUI<br />
ranking allows governments to gauge the success of their technology initiatives against those of other<br />
countries, while companies that wish to invest or trade internationally can use them as an overview of<br />
the world's most promising business locations from an ICT perspective (EIU 2011).<br />
The eGovernment survey conducted by the UN addresses more issues relating to social aspects <strong>and</strong><br />
targets transparency in government <strong>and</strong> the involvement of the public in decision making. The survey<br />
attempts to benchmark technology used <strong>and</strong> the relevant investment against the effectiveness of the<br />
solutions (UN 2010).<br />
None of the above reports seeks the reasons for failure or slow progress in a country’s capacity to<br />
reflect the public’s / user’s requirements into its plans <strong>and</strong> implementations of government led online<br />
service. Instead a blanket assumption that all shareholders would benefit from the implementation of<br />
eGovernment services has been adopted, without investigating whether these reflect actual user<br />
needs as these are perceived by the public.<br />
2.1 eGovernment expectations<br />
The World Bank’s website provides an extensive definition of eGovernment as… “eGovernment refers<br />
to the use by government agencies of information technologies (such as Wide Area Networks, the<br />
Internet, <strong>and</strong> mobile computing) that have the ability to transform relations with citizens, businesses,<br />
<strong>and</strong> other arms of government. These technologies can serve a variety of different ends: better<br />
delivery of government services to citizens, improved interactions with business <strong>and</strong> industry, citizen<br />
empowerment through access to information, or more efficient government management. The<br />
resulting benefits can be less corruption, increased transparency, greater convenience, revenue<br />
growth, <strong>and</strong>/or cost reductions”… (World Bank Group, 2009).<br />
In <strong>using</strong> such a highly strategic but rather generic definition as the basis for assessing eGovernment<br />
effectiveness researchers tend to miss out on the issues that are central to the requirements of the<br />
public. Unless these issues are addressed, the public / users won’t be attracted to online government<br />
services regardless of the technology available to them. What most governments aim for can be<br />
summarised (but not limited to) in the following. From this list only the first point is directly relevant to<br />
the public in terms of addressing direct requirements, while the others are long term targets of<br />
government which may benefit the public in general on a long term basis.<br />
404
Higher quality of services<br />
Elias Pimenidis, Lazaros Iliadis, <strong>and</strong> Christos Georgiadis<br />
Improved efficiency of exercising governance<br />
Reduced waste in public administration<br />
Wider inclusiveness<br />
Reduced corruption<br />
Higher government accountability<br />
The public needs / seeks services that address their problems in a direct <strong>and</strong> immediate way <strong>and</strong><br />
provide solutions that are cost effective for them. The issues of technology <strong>and</strong> access to connectivity<br />
can be overcome if the right incentives are there <strong>and</strong> if the citizens can see tangible benefits from<br />
<strong>using</strong> them. The research literature is full of examples where even in remote <strong>and</strong> poorly serviced<br />
areas in the world users utilise any technology available to reap the benefits of solutions that would<br />
provide convenience <strong>and</strong> cost savings in communicating <strong>and</strong> transacting with governments (Bolissian<br />
et al 2006, Buys et al 2008, Pimenidis et al 2009,).<br />
3. Citizen focused services<br />
For governments to evaluate their own strategies for developing <strong>and</strong> deploying online services for the<br />
use of their citizens, they need to be able to answer the following questions.<br />
Does it Work?<br />
From whose point of view is the service right?<br />
How attractive are services to citizens?<br />
Are citizens “Forced” into <strong>using</strong> eGovernment services?<br />
How do we assess the success of eGovernment services?<br />
What about those that are not computer literate or cannot access the services for other reasons<br />
(such as disability)?<br />
James, as early as 2005, claimed that eGovernment initiatives can only succeed if government<br />
information services are easy to underst<strong>and</strong> <strong>and</strong> to locate by citizens with basic access to ICT <strong>and</strong><br />
minimal computer literacy. Similarly, interacting with government must be quick <strong>and</strong> straightforward<br />
while to address the needs of people that might be otherwise restricted to accessing online services,<br />
a range of delivery modes should be offered. In such a situation people will be able to choose from a<br />
range of service delivery modes, but will prefer the added convenience <strong>and</strong> functionality of online,<br />
electronic <strong>and</strong> voice-based channels, as the quality <strong>and</strong> accessibility of those services improves.<br />
Governments must focus on continuing to ensure that people with a disability can access government<br />
information <strong>and</strong> services with ease.<br />
The Australian government included the following guidelines as part of their strategic plan towards<br />
inclusive <strong>and</strong> effective eGovernment services.<br />
Authentication <strong>and</strong> personal or business information will need to be provided only once through a<br />
simplified government sign-on, to access government information <strong>and</strong> services <strong>and</strong> for ongoing<br />
interactions, transactions <strong>and</strong> updates. This will be a single sign-on, except where circumstances<br />
require otherwise. It will be possible to group diverse transactions <strong>and</strong> complete them at the same<br />
time, without navigating the underlying structure <strong>and</strong> complexity of government. People will be able to<br />
interact with many areas of government without needing to underst<strong>and</strong> exactly which agencies deliver<br />
which services. Privacy <strong>and</strong> security rights will be paramount in all service delivery channels offered<br />
by government, <strong>and</strong> will underpin the implementation of this strategy. People will manage the integrity<br />
of <strong>and</strong> access to their own personal details. Anyone unable to do this will be able to nominate agents<br />
to manage personal details on their behalf (Department of Finance <strong>and</strong> Administration, 2006).<br />
In adopting similar strategies governments across the world <strong>and</strong> in particular in developing countries<br />
will need to increasingly manage their programs <strong>and</strong> interactions with stakeholders electronically,<br />
providing organisations <strong>and</strong> businesses with the same benefits <strong>and</strong> options of interacting<br />
electronically.<br />
405
Elias Pimenidis, Lazaros Iliadis, <strong>and</strong> Christos Georgiadis<br />
Governments need to present a consistent <strong>and</strong> unified face regardless of whether approaches are<br />
made in person, over the telephone, <strong>using</strong> the Internet or any other form of technology. This<br />
consistency will address the common frustration associated with trying to underst<strong>and</strong> government<br />
structures to find the right agency. Government must also match private sector best practice for<br />
electronic interactions. This consistency will extend to non-government entities delivering government<br />
services. For example, the burden for business will be reduced by increasingly embedding<br />
government processes in the natural systems being used by the business community (Shareef et al<br />
2010).<br />
3.1 Citizen’s requirements for eGovernment services<br />
Simply converting paper bureaucracy into digital bureaucracy will not satisfy many people; in time it’ll<br />
dissuade even the most avid users of online services <strong>and</strong> would result in widening or even worse<br />
creating a wider gap in the context of the digital divide (Pimenidis et al 2009).<br />
eGovernment should focus on the use of ICT to assist in the transformation of government structures<br />
<strong>and</strong> operations for cooperative <strong>and</strong> integrated service delivery. If the technology does not result in<br />
better outcomes for citizens <strong>and</strong> agencies it will mean nothing more than an added cost to<br />
government expenses. Imitations of “successful” results often lead to problems as the countries <strong>and</strong><br />
organizations that adopt them lack in compatibility in the application domain, the infrastructure to<br />
capitalise on the potential benefits <strong>and</strong> in most cases cannot even guarantee the accessibility of the<br />
service to the its intended audience.<br />
To add further to the above, governments should use the quality of services provided as a means of<br />
reinstating trust to government <strong>and</strong> enhancing transparency of operations. The Freedom on the Net<br />
2011 report identifies that the more technological advances that appear in the use of Internet related<br />
technologies, the higher the rate of violations of citizens rights identified in terms of freedom in the use<br />
of the Internet. Such violations are not just limited to countries where democracy has been oppressed<br />
over a considerable time, but also in democratic countries such as the USA, the United Kingdom <strong>and</strong><br />
Australia (Kelly <strong>and</strong> Cook 2011). Although such violations are infrequent in the above mentioned<br />
countries when compared to those related to countries such as China, Cuba <strong>and</strong> Iran, they still<br />
undermine the potential <strong>and</strong> objectives of eGovernment services inducing or increasing mistrust to<br />
government. At the same time, the negative relation between technology <strong>and</strong> transparency in<br />
communication, as portrayed in the above report, invalidates or at least reduces the gravity of<br />
technology as the prominent <strong>and</strong> decisive factor in assessing a country’s readiness to deliver useful<br />
<strong>and</strong> reliable online services.<br />
Advanced countries in terms of use of the Internet <strong>and</strong> related ICT in conducting business <strong>and</strong><br />
government transactions such as the UK, have long accepted the need to different strategies when<br />
addressing the needs of eGovernment strategy. The UK approach to Transformational Government is<br />
about creating conditions in which government transforms itself. Its implementation plan, since 2006,<br />
draws upon best practice in the public <strong>and</strong> private sector to create that transformational environment,<br />
bringing technology <strong>and</strong> business functions together through a Service Transformation Board. The<br />
key objective of Transformational Government has been to identify barriers to change that could not<br />
be removed by individual departments but that required collective action. The implementation plan<br />
explains what the Service Transformation Board <strong>and</strong> other stakeholders should do to address these<br />
issues (HM Government 2005).<br />
The UK <strong>and</strong> Australia are only two examples amongst the technologically advanced ones where the<br />
right strategy <strong>and</strong> successful implementation exist harmoniously. However, the majority of countries<br />
are still seeking a successful blend in achieving the above <strong>and</strong> in doing so, they often risk driving a<br />
section of their citizens on the verge of the digital divide.<br />
4. The digital divide <strong>and</strong> its relevance<br />
The digital divide has been termed as the lack of / or limited access to the internet <strong>and</strong> electronic<br />
services. As access improves with improvements to infrastructure, reductions in connectivity costs<br />
<strong>and</strong> increase in b<strong>and</strong>width available, a new notion of the digital divide emerges through the lack of<br />
availability of suitable, easy to use <strong>and</strong> useful e-services for the wider public. The advent of new<br />
technologies embraced by the tech-savvy generations lead to marginalization of those who do not<br />
have access or do not have the means or the incentives to embrace them. Mobile systems appear to<br />
406
Elias Pimenidis, Lazaros Iliadis, <strong>and</strong> Christos Georgiadis<br />
make the breakthrough in terms of accessibility, but the infrastructure has to be provided, services to<br />
be developed in the context of meeting the users’ / citizens’ objectives (Pimenidis et al 2009, Buys et<br />
al 2008).<br />
Internet usage numbers are most often cited to describe this divide. In the year 2000 the Millennium<br />
Declaration called upon its adherents to ‘make available the benefits of new technologies, specifically<br />
information <strong>and</strong> communications’. Three indicators were chosen to measure ICT availability in<br />
countries <strong>and</strong> the indicator pertaining to the Internet is defined as the number of users per 100<br />
inhabitants. James (2005) argued that the Internet use indicator applies poorly to the latter sector,<br />
because there it represents the illegitimate transposition of a developed-country concept to an entirely<br />
different <strong>and</strong> inappropriate institutional setting.<br />
4.1 The digital divide <strong>and</strong> eGovernment services<br />
The digital divide is discussed in academic, professional <strong>and</strong> popular writing <strong>and</strong> comments under a<br />
variety of categorizations. These include north-south, developed-developing world, urban-rural, richpoor<br />
<strong>and</strong> so on. The contemporary divide can take some unusual forms. For example there has<br />
recently been discussion of a divide between those who use the Internet <strong>and</strong> those who can use it,<br />
but choose not to do so because of the marginal opportunity cost of leisure time (Goldfarb <strong>and</strong> Prince<br />
2008). Another form of divide is between those who are highly sensitive about <strong>and</strong> those who are<br />
indifferent to personal privacy. The latter two divisions are manifestations of more fundamental<br />
factors than a shortage of time, a deficiency in technological skills or a lack of adequate access to the<br />
Internet.<br />
When a citizen has to deal with the state, such transactions have two distinct <strong>and</strong> important<br />
characteristics. First such transactions are often m<strong>and</strong>atory <strong>and</strong> second the state is the monopoly<br />
provider of the service she needs or is obliged to use. In principle, in such circumstances, key public<br />
sector values, including equity <strong>and</strong> fairness, decree that the government cannot force a citizen to use<br />
an on-line service without access to technology, the ability to use it <strong>and</strong>, perhaps as noted above,<br />
support in <strong>using</strong> it. It may be possible for businesses to offer products <strong>and</strong> services solely on-line<br />
(<strong>and</strong> this is increasingly common), but to offer a m<strong>and</strong>atory government service purely in on-line form<br />
is to discriminate against certain classes of citizens. In practice therefore even where there is top<br />
class on-line service available, as long as there continues to be a digital divide, governments will<br />
continue to be obliged to maintain at least one <strong>and</strong> possibly several alternative channels for service<br />
delivery. Beneficially though this might be in terms of bridging the digital divide, the maintenance of<br />
services across multiple channels might have considerable impact on cost, coordination <strong>and</strong><br />
consistency (Ebbers et al, 2008; Janssen et al, 2003).<br />
To aid discussion, a five way classification of digital divisions will be used. These five forms of divide<br />
can be mapped onto the EU e-inclusion categories (EU, 2006b). Each form presents a different set of<br />
socio-technical problems <strong>and</strong> requires a different set of solutions – assuming that a solution is<br />
required at all. The five categorizations together with the corresponding EU e-inclusion categories in<br />
parentheses are as follows:<br />
Structural (e-accessibility, geographic, inclusive eGovernment);<br />
Demographic (ageing, socio-cultural, inclusive eGovernment);<br />
Educational (competences, socio-cultural);<br />
Economic (social-cultural, inclusive eGovernment);<br />
Physiological (e-accessibility, socio-cultural, inclusive eGovernment).<br />
These categories are by no means mutually exclusive. A group or individual will most probably fall<br />
into several of them simultaneously.<br />
Given the above categories one can extract valid <strong>and</strong> justifiable criteria for assessing the suitability of<br />
a country’s potential to deliver useful online services that provide added value to their users <strong>and</strong><br />
promote inclusivity. E-readiness <strong>and</strong> eGovernment capability can no longer be assessed solely on the<br />
basis of a set of criteria that closely relate to the use of <strong>and</strong> availability of ICT, but should exp<strong>and</strong> to<br />
factors that relate to <strong>and</strong> address critical issues of the digital divide (Savvas et al 2009).<br />
407
Elias Pimenidis, Lazaros Iliadis, <strong>and</strong> Christos Georgiadis<br />
5. A strategy for enhanced services <strong>and</strong> inclusivity<br />
Currently, eGovernment systems aim at improving operational efficiency in governance primarily<br />
targeting cost-cutting <strong>and</strong> faster processing of taxes <strong>and</strong> other income generating activities, ignoring<br />
or not foc<strong>using</strong> in the best of cases on the citizens’ needs. One cannot help but asking the question<br />
whether governments have the capacity, the interest <strong>and</strong> the incentive to improve eGovernment<br />
systems? Only if they really mean to achieve real e-democracy, to fight corruption, to improve the<br />
level of services, to minimise citizen life disruption in receiving such services <strong>and</strong> achieve equality<br />
across society will they strive to develop such systems <strong>and</strong> services to the citizen’s advantage.<br />
Web-services <strong>and</strong> the semantic web offer an opportunity for governments to capitalise on existing<br />
services <strong>and</strong> offer citizens the choice of a variety of safe <strong>and</strong> trusted vehicles through which they can<br />
interact with government services. The wider the choice <strong>and</strong> the wider spread the mediums of delivery<br />
of such services they become, the greater the level of inclusivity will be achieved. Infrastructure<br />
problems cost of access <strong>and</strong> familiarity with emerging technologies can be overcome if the service is<br />
attractive <strong>and</strong> if it is delivered over a range of access media (Kolsaker <strong>and</strong> Lee-Kelley 2009,<br />
Pimenidis et al 2009).<br />
5.1 The case Australia<br />
Conforming to the above <strong>and</strong> aiming to promote inclusivity <strong>and</strong> equal treatment of all members of the<br />
public that interact with the government, presenting a consistent <strong>and</strong> unified face regardless of<br />
whether approaches are made in person, over the telephone, <strong>using</strong> the Internet or any other form of<br />
technology, the Australian government used the model portrayed in figure 1 below.<br />
Here the last aspect of the model is value for money shown as the bottom layer of the diagram. The<br />
location of this layer does not signify order of importance (i.e. least important) but illustrates the<br />
pathway through which it is achieved. Therefore if one were to assess the capability of such a system<br />
to deliver value for money both to the user (member of the public) <strong>and</strong> the government as owner of<br />
the system, one would have to consider aspects of connectivity <strong>and</strong> capabilities of the public sector.<br />
The reader should note that the concept of technology used is not relevant as there are multiple<br />
channels of access, but what matters most is the process integrating the four levels of service delivery<br />
shown in the middle of the government.<br />
Figure 1: Connected government - client's view – (source Department of Finance <strong>and</strong> Administration<br />
2006)<br />
408
Elias Pimenidis, Lazaros Iliadis, <strong>and</strong> Christos Georgiadis<br />
The government uses the opportunities presented by connected government <strong>and</strong> technology to<br />
improve its business processes. It will reform poorly designed <strong>and</strong> redundant processes <strong>and</strong> reduce<br />
duplication by st<strong>and</strong>ardising similar processes across agencies <strong>and</strong>, where possible, combine those<br />
processes. Agencies will operate in a collaborative, connected manner, rather than in isolation from<br />
each other.<br />
The considerable benefits from a more connected approach include more agile service delivery <strong>and</strong><br />
the ability to quickly redeploy services to different sites, including temporary locations (Department of<br />
Finance <strong>and</strong> Administration 2006).<br />
A government’s ability to respond to emergencies will also be enhanced. All the parties that need to<br />
respond to an emergency situation will be linked <strong>and</strong> operating under a common framework.<br />
Connected government <strong>using</strong> new technology also offers new ways to think about policy <strong>and</strong> delivery.<br />
In this way a government can provide a seamless service to people progressing through different<br />
stages of initiatives that cross several agencies. As connected government exp<strong>and</strong>s <strong>and</strong> a whole of<br />
government approach to systems is adopted, more opportunities like these will arise. In doing so the<br />
government achieves efficiency in its own processes <strong>and</strong> appears more attractive <strong>and</strong> potentially<br />
more trustworthy to the citizen.<br />
In following the above approach the government is able to review <strong>and</strong> consolidate its websites, so that<br />
it is easier for people to find what they want. A simpler, more streamlined government online presence<br />
will be easier to promote, enhancing awareness <strong>and</strong> use. User accounts will address the growing<br />
diversity of people interacting with government. Each user will be able to construct a personalised<br />
view of government highlighting the services <strong>and</strong> information most relevant to their needs.<br />
Providing multiple points of access the government addresses the risk of inducing more acute forms<br />
of digital divide of the types discussed in section three above. Citizens feel the benefits of equal<br />
treatment, do not feel marginalized <strong>and</strong> will gradually be attracted by the simplicity of the process in<br />
<strong>using</strong> technology that already is available in everyday devices that are in their possession, i.e. mobile<br />
phones, television sets, etc.<br />
The emphasis shifts away from technology <strong>and</strong> moves towards processes which reflect educational<br />
<strong>and</strong> cultural diversity, as well as the need to support people with disabilities.<br />
Systems that address all of the above requirements will most probably be able to address the digital<br />
divide whether this of international or transnational extent. The objectives upon which such efforts are<br />
centred should also form the basic (along with access to ICT) criteria in assessing a country’s ability<br />
to offer effective services to its public (Janssen et al, 2003).<br />
6. Conclusion<br />
The sole reliance of a country’s effort on improving access to ICT in improving the way the public<br />
interacts with the government is a rather flawed approach. The wider the choice <strong>and</strong> the wider spread<br />
of the mediums of delivery of e-services, the greater the level of inclusivity will be achieved <strong>and</strong> wider<br />
inclusivity will yield better interaction <strong>and</strong> satisfaction.<br />
Problems with infrastructure, cost of access <strong>and</strong> familiarity with emerging technologies can be<br />
overcome if the service is attractive <strong>and</strong> if it is delivered over a range of access media.<br />
The Digital Divide can be overcome if the now mature technologies are put to the right effect to<br />
contribute to process reengineering, transforming government to a more effective <strong>and</strong> public friendly<br />
entity, delivering value for money to its citizens.<br />
A key question that remains unanswered <strong>and</strong> could provide the scene for further research is the<br />
availability of an evaluation framework for assessing a government’s strategy <strong>and</strong> its resulting<br />
implementation in terms of their ability to address both governmental <strong>and</strong> end user requirements.<br />
References<br />
Bolissian J., Pimendis E., liadis L., <strong>and</strong> Andreopoulou Z. (2006) E-Readiness or Digital Exclusion – Evaluating a<br />
Country’s Status, Proceedings of the 2nd E-Democracy National Conference with International<br />
409
Elias Pimenidis, Lazaros Iliadis, <strong>and</strong> Christos Georgiadis<br />
Participation, 16-17 March 2006, Athens Bar Association <strong>and</strong> the Scientific Council for the <strong>Information</strong><br />
Society, Athens, Greece, pp. 87-96<br />
Buys, P., Dasgupta, S., Thomas, T. <strong>and</strong> Wheeler, D. (2008) Determinants of a Digital Divide in Sub-Saharan<br />
Africa: A Spatial Econometric Analysis of Cell Phone Coverage, The World Bank Development Research<br />
Group, Sustainable Rural <strong>and</strong> Urban Development Team, Washington DC, USA.<br />
Department for Business,Innovation <strong>and</strong> Skills (BIS) <strong>and</strong> Department for Culture, Media <strong>and</strong> Sport (dcms) (2009),<br />
Digital Britain – Final Report, The Stationery Office Limited.<br />
Department of Finance <strong>and</strong> Administration (2006) Responsive Government A New Service Agenda 2006<br />
eGovernment Strategy, Australian Government <strong>Information</strong> <strong>Management</strong> Office<br />
Ebbers W., Pieterson W. <strong>and</strong> Noordman H. (2009). Electronic government: Rethinking channel management<br />
strategies, Government <strong>Information</strong> Quarterly, 25, 181–201.<br />
EU (2006). e-Inclusion, European Commission, Brussels. Retrieved January 18, 2011 from:<br />
http://ec.europa.eu/information_society/policy/accessibility/index_en.htm<br />
Goldfarb A. <strong>and</strong> Prince, J. (2008.) Internet adoption <strong>and</strong> usage patterns are different: Implications for the digital<br />
divide, <strong>Information</strong>, Economics <strong>and</strong> Policy, 20(1), 2-15.<br />
HM Government (2005) Transformational Government Implementation Plan, UK Cabinet Office<br />
James J. (2005) The global digital divide in the Internet: developed countries constructs <strong>and</strong> Third World<br />
Realities, Journal of <strong>Information</strong> Science, Vol. 31, No. 2, pp 114–123<br />
Janssen M. Wagenaar R. <strong>and</strong> Beerens J. (2003) Towards a Flexible ICT-Architecture for Multi-Channel<br />
EGovernment Service Provisioning, In R. Sprague (ed.), Proceedings of the 36th Annual Hawaii<br />
International Conference on System Sciences, Track 5, 148-157.<br />
Kelly S. <strong>and</strong> Cook S. (eds) (2011) Freedom on the Net 2011 A Global Assessment of Internet <strong>and</strong> Digital Media,<br />
Freedom House, NewYork<br />
Kolsaker A. <strong>and</strong> Lee-Kelley L. (2009) Singing from the Same Hymnsheet? The Impact of Internal Stakeholders<br />
on the Development of e-Democracy, Electronic Journal of eGovernment Vol. 7 No. 2 pp155 – 162<br />
Milliard, J. (2010). Government 1.5 – is the bottle half full or half empty? European Journal of ePractice, 9.3.<br />
Retrieved January 26, 2011 from: www.epractice.eu/files/European Journal epractice Volume 9.3_1.pdf<br />
Pimenidis E, Sideridis A.B, Antonopoulou E (2009) Mobile Devices <strong>and</strong> Services: Bridging the Digital Divide in<br />
Rural Areas, International Journal of Electronic Security <strong>and</strong> Digital Forensics (IJESDF), Vol. 2, No. 4, pp.<br />
424-434<br />
Savvas I, Pimenidis E, Sideridis A. (2009) Mapping eGovernment stakeholder requirements to public<br />
administration operational needs , IADIS International Journal on WWW/Internet, Vol. 7, No. 1, pp 152-165<br />
Shareef S, Pimenidis E, Arreymbi J <strong>and</strong> Jahankhani H (2010) ‘Vision of Electronic Government Implementation in<br />
the Kurdistan Region of Iraq’, Proceedings of the 10th European Conference on eGovernment, University of<br />
Limerick, Irel<strong>and</strong>, 17-18 June 2010, pp 575-584.<br />
Sipior J <strong>and</strong> Ward B (2005) Bridging the Digital Divide for eGovernment inclusion: A United States Case Study,<br />
Electronic Journal of eGovernment Vol. 3, No 3, pp 137-146<br />
The Economist Intelligence Unit (2010) Digital economy rankings 2010-Beyond e-readiness, The Economist<br />
United Nations Department of Economic <strong>and</strong> Social Affairs (2010) United Nations EGovernment Survey 2010 -<br />
Leveraging eGovernment at a time of financial <strong>and</strong> economic crisis, The UN Publishing Section, New York<br />
410
Contributions to the Measurement <strong>and</strong> <strong>Management</strong> of<br />
Intellectual Capital – an Accounting Perspective<br />
Rui Alex<strong>and</strong>re Pires 1 <strong>and</strong> Maria do Céu Gaspar Alves 2<br />
1<br />
University of Minho, Portugal<br />
1<br />
EsACT - Polytechnic Institute of Bragança, Mir<strong>and</strong>ela, Portugal<br />
2<br />
NECE / University of Beira Interior, Covilhã, Portugal<br />
rucapires@ipb.pt<br />
mceu@ubi.pt<br />
Abstract: intellectual capital (IC) represents a set of strategic assets, with an intangible nature, which contributes<br />
to the creation of competitive advantages <strong>and</strong> sustainable value, <strong>and</strong> therefore should be identified, measured,<br />
managed <strong>and</strong> published by organizations. The research carried out has shown the importance of IC for a<br />
sustainable success of an organization but also the paucity <strong>and</strong> the poverty of means to measure IC <strong>and</strong> to<br />
efficiently manage these important resources. The paper reviews the theoretical <strong>and</strong> empirical IC literature <strong>and</strong><br />
has as main purpose to obtain an enhanced underst<strong>and</strong>ing of the contributions of management control <strong>and</strong><br />
accounting systems for IC measurement <strong>and</strong> management, <strong>and</strong> particularly about the relationship between<br />
strategic management accounting practices (SMAP) <strong>and</strong> IC. Thus, specific objectives of this study are:<br />
addressing the definition of intellectual capital, identifying the main components of IC; underst<strong>and</strong>ing the role of<br />
management control <strong>and</strong> accounting in the measurement <strong>and</strong> management of IC <strong>and</strong>, addressing the<br />
relationship between IC <strong>and</strong> SMAP. The literature review was done <strong>using</strong> different sources. First, we used the<br />
ProQuest search keys on “Intellectual capital”, “Intangible assets” <strong>and</strong> “Strategic management accounting<br />
practices”. Then a manual search was done covering some of the major journals in the field. Next, we searched<br />
the sites FASB <strong>and</strong> IASB concerning statements <strong>and</strong> reporting relative to IC. Finally, we conducted a world-wide<br />
web search. In the particular case of SMAP it is visible that they enable the identification <strong>and</strong> management of<br />
some IC resources as the ability of innovation, production structures (with e.g. target costing), management of<br />
quality systems (with e.g. quality costing) <strong>and</strong> relationships with suppliers <strong>and</strong> customers (with e.g. the value<br />
chain costing).<br />
Keywords: intellectual capital; human capital; structural capital; relational capital; management control <strong>and</strong><br />
accounting; strategic management accounting practices<br />
1. Introduction<br />
The organizational environment has recently suffered several changes. Among them are the<br />
globalization of business, the increased physical mobility (people <strong>and</strong> products) <strong>and</strong> financial (capital),<br />
the continuous innovation, the increased competition, the increased customer dem<strong>and</strong>s <strong>and</strong><br />
sophistication of information technologies <strong>and</strong> communication (Haldma <strong>and</strong> Lääts, 2002; Bukh et al.<br />
2005; Löfsten <strong>and</strong> Lindelöf, 2005; Cuganesan et al., 2007, Tayles et al., 2007; Ferreira, 2008).<br />
These changes have forced organizations to constantly change <strong>and</strong> adapt to their surroundings in<br />
order to maintain competitive positions. To this purpose, they have turned to new sources of value<br />
creation, including research <strong>and</strong> development, innovation, competence <strong>and</strong> employees skills,<br />
information technology, development of processes based on knowledge <strong>and</strong> the ability to attract <strong>and</strong><br />
retain business partners (Cañibano et al., 2000; Starovic <strong>and</strong> Marr, 2003; Zambon, 2003, RICARDIS,<br />
2006; García-Meca <strong>and</strong> Martinez, 2007).<br />
For while the traditional competitive advantages result from the collection <strong>and</strong> use of tangible<br />
resources, such as long-term heavy machinery, competitive advantages are now associated with<br />
intangible assets based on knowledge (Bontis, 2001; Widener, 2006; Cuganesan et al., 2007; Marr,<br />
2008).<br />
In the literature these resources based on knowledge, <strong>and</strong> of an intangible nature, are recognized by<br />
the name of intellectual capital (IC) (Starovic <strong>and</strong> Marr, 2003; Abeysekera <strong>and</strong> Guthrie, 2005;<br />
Abeysekera, 2006; Jørgensen, 2006; Beattie <strong>and</strong> Thomson, 2007; Tan et al., 2008; Cleary, 2009;<br />
Kasztler <strong>and</strong> Leitner, 2009). Thus, the term IC is the set of strategic resources such as knowledge,<br />
information, know-how, intellectual property, reputation of products <strong>and</strong> organization, <strong>and</strong> relations<br />
with business partners that contribute to the achievement of competitive advantages <strong>and</strong> to create<br />
sustainable value (Bukh et al., 2005; Cuganesan et al., 2007). Or, more simplistically, the IC<br />
represents all of the intangible assets of an organization (Cleary, 2009).<br />
411
Rui Alex<strong>and</strong>re Pires <strong>and</strong> Maria do Céu Gaspar Alves<br />
Several authors (Zambon, 2003; Abeysekera, 2006; Marr, 2008) therefore consider that the IC has<br />
become increasingly important for organizations since it represents the set of resources essential to<br />
achieve strategic competitive advantages <strong>and</strong> thus determinant in the creation of value <strong>and</strong> in the<br />
success of organizations. “Success <strong>and</strong> value creation of any organization in today’s economy is<br />
driven by intellectual capital” (Marr, 2008:29). It is therefore essential to identify, measure, manage,<br />
recognize <strong>and</strong> report IC. Since traditional accounting systems fail to recognize it (they just recognize<br />
some intangibles in the balance, so the book value of an organization tends to be different from its<br />
market value) (Cañibano et al., 2000; Cuganesan et al., 2007; Abeysekera, 2008), it is the MCA<br />
function to contribute to the identification, measurement, reporting <strong>and</strong> management of resources that<br />
constitute the IC (MERITUM, 2001; Daum, 2003; Marr, 2008).<br />
It is especially strategic management accounting role to analyze aspects related to the IC, since it<br />
mainly aims at providing information to support strategic decisions that enhance the achievement of<br />
competitive advantages, <strong>and</strong> these features contribute to this end (Tayles et al., 2002; Abeysekera,<br />
2006; Beattie <strong>and</strong> Thomson, 2007). However, there is little literature that relates MCA to the IC or to<br />
intangibles (Tayles et al., 2007). And “although IC <strong>and</strong> the measurement of IC by organizations has<br />
been an emerging area of substantial research interest, research efforts to date have led to mixed<br />
<strong>and</strong> inconclusive outcomes” (Shang <strong>and</strong> Lin, 2010:15)<br />
In this context, the main objective of this study is to underst<strong>and</strong> in general terms, the contributions of<br />
accounting <strong>and</strong> management control for measuring <strong>and</strong> managing IC, <strong>and</strong> specifically to identify the<br />
relationships between IC <strong>and</strong> SMAP. Thus, the specific objectives of this study are: addressing the<br />
definition of IC, identifying the main components of IC, underst<strong>and</strong> the role of MCA in the<br />
measurement <strong>and</strong> management of IC <strong>and</strong>, addressing the relationship between IC <strong>and</strong> SMAP.<br />
Nowadays IC resources are crucial <strong>and</strong> “it is a critical part in IC management to identify the required<br />
resources <strong>and</strong> select a suitable strategy to reduce resource gaps in response to the complicated <strong>and</strong><br />
changing environment” (Shang <strong>and</strong> Lin, 2010:16). Thus, while studying the relationship between MCA<br />
<strong>and</strong> IC, our study makes a contribution to the existing knowledge by offering some insights about how<br />
to make IC measurable through SMAP. In addition, the analysis of the relationship between SMAP<br />
<strong>and</strong> IC resources has novelty nature <strong>and</strong> contributes to a better strategic management of IC.<br />
Given the proposed objectives, this work is structured as follows: section 2 deals with the definition of<br />
IC <strong>and</strong> some models of IC measurement are discussed. The third section highlights the importance of<br />
MCA for the measurement <strong>and</strong> management of IC <strong>and</strong> the key tools identified in the literature as<br />
useful for measuring <strong>and</strong> managing IC. In the following section a connection is established between<br />
IC <strong>and</strong> SMAP. Finally, in section 5, we present the main findings, the limitations of the study <strong>and</strong><br />
some suggestions for future research.<br />
2. Intellectual capital<br />
According to Bontis (2001) the first use of the term “Intellectual Capital” is attributed to John Kenneth<br />
Galbraith, who in a letter to the economist Michael Kalecki in 1969 wrote: “I wonder if you realize how<br />
much those of us in the world around have owed to the intellectual capital you have provided over<br />
these past decades.”<br />
In general, the IC is recognized in the literature as a set of key resources for achieving competitive<br />
advantage <strong>and</strong> value creation in an era of globalization, constant technological changes <strong>and</strong><br />
processes based on knowledge (Widener, 2006; García-Mecca <strong>and</strong> Martinez, 2007). These strategic<br />
resources, intangible in nature are related to people <strong>and</strong> can be more or less dependent on them<br />
(RICARDIS, 2006). However there are various definitions of IC contained in many studies, <strong>and</strong> there<br />
is a lack of a st<strong>and</strong>ard definition of IC (Chong, 2008). In this context, <strong>and</strong> to underst<strong>and</strong> with some<br />
precision what constitutes IC, in this section, the definition <strong>and</strong> components of IC are discussed.<br />
2.1 Definition of intellectual capital<br />
The term IC is used in literature to represent a set of strategic assets, based on knowledge, with an<br />
intangible nature, (Abeysekera <strong>and</strong> Guthrie, 2005; Bukh et al., 2005; Abeysekera, 2006; Jørgensen,<br />
2006; RICARDIS, 2006; Ferreira, 2008; Tan et al., 2008; Cleary, 2009; Kasztler e Leitner, 2009).<br />
“Together with physical <strong>and</strong> financial capital, intellectual capital is one of the three vital resources of<br />
412
Rui Alex<strong>and</strong>re Pires <strong>and</strong> Maria do Céu Gaspar Alves<br />
organizations” (Marr, 2008:5). However, there is still no consensus on IC concept (Starovic <strong>and</strong> Marr,<br />
2003; Tayles et al., 2007; Abeysekera, 2008).<br />
The project MERITUM (2001) considers that IC represents all kinds of intangible assets either<br />
formally owned or used or informally established <strong>and</strong> mobilized. According to this project, the<br />
organization’s IC is more than the sum of human, structural <strong>and</strong> relational resources; IC is also about<br />
how these resources are used together to create value (Marr, 2008). Thus, this definition considers<br />
some important aspects. First <strong>and</strong> foremost IC consists of intangible assets (nonphysical).<br />
Additionally, IC resources do not have to be owned by the organization, being enough that they are<br />
used by it. For example, the human resources who are working for the company are not its property<br />
(Bontis, 2001). Finally, the definition presented in the project MERITUM (2001) establishes that IC is<br />
composed by three groups of resources (human, structural <strong>and</strong> relational) <strong>and</strong> argues that beyond the<br />
individual functioning of resources it is important that they operate as a whole (to the extent that the<br />
whole is worth more than the sum of its parts) (Marr, 2008).<br />
Based on MERITUM (2001), the project RICARDIS (2006) defines IC as the combination of human,<br />
organizational <strong>and</strong> relational resources, including intangible activities of an organization (Bontis,<br />
2001). It is here assumed that the IC includes the knowledge, competences, experience <strong>and</strong><br />
employees skills (human resources); the research <strong>and</strong> development activities, routines, procedures,<br />
the organization's systems <strong>and</strong> databases <strong>and</strong> intellectual property rights (activities <strong>and</strong> organizational<br />
resources); <strong>and</strong> resources related to external relations with customers, suppliers <strong>and</strong> partners in<br />
research <strong>and</strong> development (relational resources). It follows that the combination of intangible<br />
resources <strong>and</strong> activities allows an organization to transform a set of material, financial <strong>and</strong> human<br />
resources into a system capable of creating value for stakeholders (Bontis, 2001; Marr, 2008).It can<br />
be achieved when an adequate connection of the resources is established through appropriate<br />
intangible activities (MERITUM, 2002). In the project RICARDIS (2006) it is considered that for the<br />
intangibles to be considered part of the IC of an organization they have to be internalized in a lasting<br />
<strong>and</strong> efficient way <strong>and</strong>/or appropriated by the organization. This definition, which is a little more<br />
extensive than those presented in other studies, considers that the IC consists of several components<br />
(as will be outlined in the next section), <strong>and</strong> presents a set of illustrative examples of the IC. In<br />
addition, while analyzing this definition it appears that the IC is only part of the intangibles, as it<br />
indicates that only the intangibles that are internalized <strong>and</strong>/or appropriated by an organization belong<br />
to the IC.<br />
Other authors (Bukh et al., 2005; Cuganesan et al., 2007) present more specific definitions. However,<br />
these definitions, based on illustrative examples, have the disadvantage of not covering all resources<br />
that can be part of the IC. Bukh et al. (2005), for example, define IC as knowledge resources in the<br />
form of employees, customers, processes or technology that an organization can mobilize in its<br />
processes in order to create value.<br />
There is a diversity of IC definitions <strong>and</strong> the only common aspect in the definition of IC is related to<br />
the fact that the resources allow the creation of value <strong>and</strong> that the benefits are not extinguished in a<br />
given time (Abeysekera, 2006). In fact, these resources of strategic nature when identified <strong>and</strong><br />
properly managed enable the acquisition of competitive advantages <strong>and</strong> a sustainable creation of<br />
value (Ferreira, 2008). Beattie <strong>and</strong> Thomson (2007) even consider that IC is now recognized as a<br />
resource that contributes most to the market value of the organizations operating in industries based<br />
on knowledge.<br />
Apart from the lack of a consensus definition for IC, the terms "IC" <strong>and</strong> "intangibles" are still used in<br />
the literature, quite often, in an indifferent form (Beattie <strong>and</strong> Thomson, 2007). This may occur because<br />
the IC is studied in various fields of knowledge such as accounting, strategic management, <strong>and</strong><br />
human resources management, among others (Starovic <strong>and</strong> Marr, 2003).<br />
Thus, while in accounting research the term "intangibles" is generally used (MERITUM, 2001) in<br />
management research the term "IC" is more used. In this sense, Beattie <strong>and</strong> Thomson (2007)<br />
consider that the definitions of intangibles made by traditional accounting are limited as they only<br />
include items such as intellectual property <strong>and</strong> patents, which are recognized in the balance. So, the<br />
traditional concept of "intangible asset" refers to the set of intangibles or IC elements that may be<br />
recognized as assets in the current model of st<strong>and</strong>ard accounting (Starovic <strong>and</strong> Marr, 2003).<br />
413
Rui Alex<strong>and</strong>re Pires <strong>and</strong> Maria do Céu Gaspar Alves<br />
Therefore, intangibles such as relationships with customers or employees skills are excluded since<br />
these are resources that can’t be controlled by the company in an accounting sense (Marr, 2008).<br />
In this context, Beattie <strong>and</strong> Thomson (2007) argue the need for a thorough debate in order to<br />
st<strong>and</strong>ardize the definition of IC, which will build a more coherent body of theory (Abeysekera, 2006,<br />
2008). In a way, Krist<strong>and</strong>l <strong>and</strong> Bontis (2007) have already initiated this debate by building a common<br />
definition for IC <strong>and</strong> intangibles (<strong>using</strong> the definitions of studies in which intangibles <strong>and</strong> IC are used<br />
as synonyms), <strong>using</strong> the approach based on resources.<br />
As for the components of the IC it seems that there is a broad consensus about the existence of three<br />
main components (human capital, structural capital or internal, <strong>and</strong> external or relational capital)<br />
(Beattie <strong>and</strong> Thomson, 2007; Cuganesan et al., 2007, Tayles et al., 2007).<br />
2.2 Intellectual capital measurement<br />
Organizations try to create <strong>and</strong> recreate tools to measure the IC <strong>using</strong> for this purpose, several<br />
models of measurement. Some are more generic, since they are used by different organizations, <strong>and</strong><br />
others are more specific <strong>and</strong> are designed for a particular sector or organization (Bontis, 2001;<br />
MERITUM, 2001; Starovic <strong>and</strong> Marr, 2003).<br />
Accordingly, various models of IC measurement are reported <strong>and</strong> analyzed in the literature. Some<br />
more holistic <strong>and</strong> other more analytical, some money related <strong>and</strong> others not (Zambon, 2003). Among<br />
these instruments the Market-to-book Value, the Hidden Value, the Tobin’s Q, the Economic Value<br />
Added (EVA TM ), the Balanced Scorecard, the Sk<strong>and</strong>ia Navigator, the IC-Index, the Technology<br />
Broker, the Intangible Asset Monitor, the Value Added Intellectual Coefficient, <strong>and</strong> the Value Chain<br />
Scoreboard st<strong>and</strong> out (Mouritsen, 1998; Starovic <strong>and</strong> Marr, 2003; Tan et al., 2008). Measurement<br />
models such as the Market-to-Book Value, the Tobin's Q, EVA TM <strong>and</strong> the Hidden Value are more<br />
holistic <strong>and</strong> money related, while the Balanced Scorecard, the Sk<strong>and</strong>ia Navigator, the Intangible<br />
Asset Monitor <strong>and</strong> the Value Chain Scoreboard are more analytical (atomistic ) <strong>and</strong> non-monetary.<br />
The Technology Broker despite being an analytical model has monetary expression. The IC-Index, in<br />
turn, is a holistic model, non-monetary, <strong>and</strong> the Value Added Intellectual Coefficient is presented as a<br />
holistic model but with monetary <strong>and</strong> non-monetary expression (Zambon, 2003).<br />
While the Balanced Scorecard, the Sk<strong>and</strong>ia Navigator, the IC-Index, the Intangible Asset Monitor <strong>and</strong><br />
the Value Chain Scoreboard are instruments that use indicators (scoreboards) related to IC <strong>and</strong><br />
provide an alternative view of performance, the EVA TM <strong>and</strong> Value Added Intellectual Coefficient are<br />
related to the return on assets methods (ROA). Models such as the Market-to-Book Value, the Tobin's<br />
Q <strong>and</strong> the Hidden Value are related to the market capitalization methods <strong>and</strong> the Technology Broker,<br />
in turn, is a direct method of IC (Zambon, 2003; Ferreira, 2008).<br />
Some studies (Mouritsen, 1998, Tayles et al., 2007, Huang <strong>and</strong> Wang, 2008) analyze the use of<br />
these tools by organizations to measure <strong>and</strong> manage intangible assets. Interestingly, they conclude<br />
that tools developed for IC measurement are not always used in organizations with intensive IC <strong>and</strong>,<br />
sometimes, they do not respond adequately to the information needs (Huang <strong>and</strong> Wang, 2008). For<br />
example, Tayles et al. (2007) find that measures based on value, as for example EVA TM , are strongly<br />
associated with high levels of IC, while instruments such as the Intangible Asset Monitor <strong>and</strong> the<br />
Sk<strong>and</strong>ia Navigator (specific models of performance evaluation which are considered useful for<br />
evaluating the intangible resources) are not correlated with the IC degree. The authors also believe<br />
that it is important to use financial <strong>and</strong> non financial measures to capture the influence of intangible<br />
resources on organizational performance. This view is also shared by Daum (2003) <strong>and</strong> Marr (2008),<br />
who warn that the selected measures should take into account the organizational strategy <strong>and</strong> the<br />
value creation system. Usually, the non financial measures are more commonly associated with<br />
intangible assets (Starovic <strong>and</strong> Marr, 2003) <strong>and</strong> financial measures are more associated with physical<br />
resources, although financial measures also appear associated with intangible assets (Widener,<br />
2006).<br />
But beyond the IC measurement, it is essential to make its management. The identification <strong>and</strong> IC<br />
measurement without their proper IC management makes no sense (MERITUM, 2001). So, possible<br />
contributions of MCA for the IC management <strong>and</strong> measurement will be examined in the next section.<br />
414
Rui Alex<strong>and</strong>re Pires <strong>and</strong> Maria do Céu Gaspar Alves<br />
3. <strong>Management</strong> control <strong>and</strong> accounting<br />
The traditional accounting system does not consider information on IC (Zambon, 2003; Abeysekera<br />
<strong>and</strong> Guthrie, 2005; Widener, 2006; García-Meca <strong>and</strong> Martinez, 2007; Huang <strong>and</strong> Wang, 2008) nor<br />
shows in the balance sheet the value of various intangible assets (Cañibano et al., 2000). This is<br />
because there are several problems related to identification, measurement <strong>and</strong> recognition of IC<br />
elements as human resources, innovation, customers <strong>and</strong> technology (Bontis, 2001; García-Meca et<br />
al., 2005; Marr, 2008). For this reason, the traditional accounting does not comply, in the whole, the<br />
main aim of showing the true economic situation of an organization <strong>and</strong> financial statements lose<br />
some usefulness (Abeysekera, 2008; Huang <strong>and</strong> Wang, 2008). The restrictive accounting rules do not<br />
allow many of the intangibles to be recognized in financial statements, especially the internally<br />
generated intangibles (Starovic <strong>and</strong> Marr, 2003; Marr, 2008). Instead many of the costs associated<br />
with IC development are traced directly to costs <strong>and</strong> reflected in the income statement (Abeysekera,<br />
2008).<br />
In this sense, alternative forms are needed for the accounting treatment of IC resources (Cuganesan<br />
et al., 2007). Especially since this is a set of resources that allows us to obtain competitive advantage<br />
<strong>and</strong> sustainable value, intangible assets must be properly identified, measured <strong>and</strong> managed<br />
(MERITUM, 2001; Tayles et al., 2007). It is essential to make informed decisions, test <strong>and</strong> revise the<br />
organizational strategy, manage the risks associated with IC (Marr, 2008), to underst<strong>and</strong> how value is<br />
created for proper allocation of resources, <strong>and</strong> provide information on IC value so that investors can<br />
evaluate the potential of organizations (Daum, 2003; Starovic <strong>and</strong> Marr, 2003). In this context, several<br />
authors (Johanson et al., 2001; Mouritsen <strong>and</strong> Larsen, 2005; Widener, 2006, Tayles et al., 2007)<br />
consider that for the identification, measurement <strong>and</strong> management of IC, management control <strong>and</strong><br />
accounting (MCA) assumes a particular relevance. Tayles et al., (2002) also consider that SMAP may<br />
have an essential role in providing IC information to support decision-making. For strategic decisionmaking<br />
purposes managers need information related to the strategic resources that contribute to the<br />
creation of competitive advantages <strong>and</strong> sustainable value. In order to contribute to this goal,<br />
Johanson et al., (2001) <strong>and</strong> Mouritsen <strong>and</strong> Larsen (2005) find that the MCA system, sometimes<br />
through the adoption of SMAP, is adequate.<br />
In this context, the next section establishes a connection between SMAP <strong>and</strong> IC, demonstrating the<br />
SMAP contribution to the identification <strong>and</strong> management of some resources that form the IC.<br />
4. Strategic management accounting practices <strong>and</strong> intellectual capital<br />
In developing its activities organizations use intangible assets that are essential to achieve its<br />
strategic objectives <strong>and</strong> to create sustainable value (Widener, 2006). It is therefore essential to<br />
identify, first, the strategic objectives of an organization <strong>and</strong> then the intangible resources <strong>and</strong><br />
activities that affect these objectives, <strong>and</strong> finally to develop a set of monitoring activities <strong>and</strong><br />
management (MERITUM, 2001; Marr, 2008). According to Marr (2008:4) “identifying <strong>and</strong> managing<br />
the right intellectual capital is <strong>and</strong> will increasingly be the key differentiator between successful,<br />
mediocre, <strong>and</strong> failing enterprises”. Since the monitoring of these activities <strong>and</strong> the strategic<br />
management of intangible assets that make up the IC is necessary to supply <strong>and</strong> use of financial <strong>and</strong><br />
non financial information, related for example with customers <strong>and</strong> efficiency of operations (Bontis,<br />
2001; Starovic <strong>and</strong> Marr, 2003), the question that arises is whether the SMAP contribute to the<br />
identification <strong>and</strong> IC management.<br />
Tayles et al. (2002, 2007) consider that if the decision of having intensive IC is a strategic decision of<br />
an organization, the SMAP as tools to aid strategy can contribute to their management. This is<br />
because they can contribute to the provision of adequate information for the organizations to maintain<br />
or improve their resources <strong>and</strong> to carry out their activities in a suitable way.<br />
According to Guilding et al. (2000) <strong>and</strong> Cadez <strong>and</strong> Guilding (2008), SMAP provide the information<br />
oriented to strategy, oriented to future <strong>and</strong> on the outside of the organization, also including the<br />
provision of financial <strong>and</strong> non financial information. These authors, taking into account the work of<br />
Guilding et al. (2000) <strong>and</strong> Cravens <strong>and</strong> Guilding (2001) identify 16 SMAP which are classified into five<br />
categories: costing, planning, control <strong>and</strong> performance measurement, strategic decision making,<br />
competitors’ accounting, <strong>and</strong> customers' accounting.<br />
415
Rui Alex<strong>and</strong>re Pires <strong>and</strong> Maria do Céu Gaspar Alves<br />
The paper then presents in some detail SMAP (life cycle costing, quality costing, target costing, value<br />
chain costing, benchmarking, <strong>and</strong> competitor cost assessment, competitive position monitoring <strong>and</strong><br />
customer profitability analysis) with the purpose to identify possible links between these practices <strong>and</strong><br />
the resources that constitute the SMAP. Table 1 presents the SMAP identified <strong>and</strong> defined by Cadez<br />
<strong>and</strong> Guilding (2008) <strong>and</strong> the connection to some features of IC associated to them is established.<br />
Table 1: Strategic management accounting practices <strong>and</strong> intellectual capital<br />
Practice Definition IC Resources<br />
Attribute<br />
costing<br />
Life cycle<br />
costing<br />
It costs the product attributes that are appealing to<br />
customers. These attributes that are the subject of<br />
costing include variables of the product performance,<br />
reliability, repairs during the product assurance<br />
period, reliability of supply <strong>and</strong> after sales service.<br />
It evaluates the costs based on the phases of the<br />
lifecycle of the product or service, which are the<br />
design, introduction, growth, maturity, decline <strong>and</strong><br />
eventual ab<strong>and</strong>onment.<br />
Quality costing It considers that quality costs are associated with the<br />
creation, identification, <strong>and</strong> prevention <strong>and</strong><br />
remedying of faults.<br />
Target costing It is a practice used during the design process <strong>and</strong><br />
product design, which involves the cost estimate for<br />
a target by subtracting the profit margin from the<br />
market price. Subsequently, the product is projected<br />
to the determined cost taking into account the costs<br />
of engineering <strong>and</strong> marketing.<br />
Value chain<br />
costing<br />
It defines the allocation of costs for activities<br />
necessary to create, acquire, produce, sell <strong>and</strong><br />
provide services in respect of a product or service.<br />
Benchmarking It consists of a continuous <strong>and</strong> systematic process of<br />
comparing products, services <strong>and</strong> processes in order<br />
to identify best practices that lead to superior<br />
Integrated<br />
performance<br />
measurement<br />
Strategic<br />
costing<br />
Strategic<br />
pricing<br />
performance.<br />
Evaluation system of the performance usually<br />
focused on acquiring performance knowledge related<br />
to the requirements of customers, possibly including<br />
non financial measures. This system involves the<br />
monitoring of the critical factors to ensure customer<br />
satisfaction.<br />
It uses data related costs based on strategic <strong>and</strong><br />
marketing to identify <strong>and</strong> develop strategies that<br />
enhance the achievement of sustainable competitive<br />
advantages.<br />
It is the analysis of strategic factors in the process of<br />
setting prices. These factors include the reaction of<br />
competitors to price, elasticity, market growth, <strong>and</strong><br />
economies of scale <strong>and</strong> experience.<br />
Br<strong>and</strong> valuation It consists of the financial valuation of the br<strong>and</strong><br />
through the assessment of its strengths such as<br />
leadership, stability, market, internationalization, <strong>and</strong><br />
support trend, combined with historical results of the<br />
br<strong>and</strong>.<br />
Customer’s knowledge<br />
Customer’s assistance<br />
Customer’s satisfaction<br />
Trust in the organisation<br />
Innovation<br />
Research <strong>and</strong> development<br />
Relationship with customer<br />
Quality management <strong>and</strong><br />
improvement<br />
<strong>Management</strong> systems<br />
Customer’s satisfaction<br />
Capacity to innovate<br />
Structure <strong>and</strong> production<br />
processes<br />
Organizational flexibility<br />
Product functionality<br />
Customer’s satisfaction<br />
Marketing capacity<br />
Innovation<br />
Research <strong>and</strong> development<br />
Relationship with suppliers <strong>and</strong><br />
customers<br />
Competitiveness<br />
Functionality <strong>and</strong> product quality<br />
Internal processes<br />
Customer’s satisfaction<br />
Customer’s knowledge<br />
Customer’s satisfaction<br />
Strategy<br />
<strong>Management</strong> capacities<br />
Capacities <strong>and</strong> marketing<br />
activities<br />
Market intensity<br />
Competition in the market<br />
Experience of the organisation<br />
Br<strong>and</strong>s<br />
Market leadership<br />
Systems of information (historical<br />
results)<br />
Competitor cost It consists in providing regular estimates of the costs Capacity to develop estimates<br />
416
assessment<br />
Rui Alex<strong>and</strong>re Pires <strong>and</strong> Maria do Céu Gaspar Alves<br />
of competitors in order to permit know competitors<br />
investments, cost structure, <strong>and</strong> contribute to a more<br />
efficient competition.<br />
<strong>Management</strong> capacity<br />
Competitiveness<br />
Practice Definition IC Resources<br />
Competitive<br />
position<br />
monitoring<br />
Competitor<br />
performance<br />
appraisal<br />
Customer<br />
profitability<br />
analysis<br />
Lifetime<br />
customer<br />
profitability<br />
analysis<br />
Valuation of<br />
customers as<br />
assets<br />
5. Final remarks<br />
It analyzes the positions of competitors in the<br />
business sector through evaluation <strong>and</strong> monitoring of<br />
sales trends of competitors, market share, sales<br />
volume <strong>and</strong> costs, unit costs <strong>and</strong> return on sales.<br />
The information provided by this practice can serve<br />
as a basis for evaluating the marketing strategy of a<br />
competitor.<br />
It consists in the analysis of statements published by<br />
a competitor as part of the evaluation of the main<br />
sources of competitive advantages that belong to<br />
that competitor.<br />
It consists in the analysis of sales <strong>and</strong> costs that can<br />
be assigned to a specific customer in order to<br />
determine the outcome by customer.<br />
It considers the extension of the timeframe in the<br />
analysis of results by customers in order to foresee<br />
the following years. This practice therefore turns on<br />
the set of future revenue flows <strong>and</strong> costs involved in<br />
maintaining a specific client.<br />
It consists in determining the value of customers for<br />
the company. To determine this value we can, for<br />
instance, calculate the present value of future income<br />
flows accredited to a specific customer.<br />
Relationships with the competitors<br />
Strategy<br />
Research <strong>and</strong> development<br />
Patent<br />
Image <strong>and</strong> reputation<br />
Competitor’s knowledge<br />
Customer’s knowledge<br />
Relationships with customers<br />
Marketing activities<br />
Capacity to develop estimates<br />
Customer’s knowledge<br />
Customer’s knowledge<br />
Market knowledge<br />
Organizations today face new challenges related to globalization of businesses, increased<br />
competitiveness, <strong>and</strong> constant innovation, adoption of new technologies, increased customer<br />
dem<strong>and</strong>s <strong>and</strong> networking. In this context <strong>and</strong> in order to maintain its competitive position they have to<br />
tap into new sources of value creation, since the traditional sources of value related to tangible assets<br />
have lost some importance.<br />
The knowledge resources of intangible nature, within such circumstances are strategic assets that<br />
enable organizations to meet new challenges. These knowledge resources are recognized in the<br />
literature as IC <strong>and</strong>/or intangible. Through the analysis of some definitions it is proved that there is still<br />
no consensus as to what represents the IC. However, the authors agree that the resources that are<br />
part of the IC contribute to the achievement of competitive advantages <strong>and</strong> to create sustainable<br />
value. In literature there is also some consensus on the division of IC into three components: human<br />
IC, structural IC <strong>and</strong> relational IC.<br />
Regarding the contributions of accounting <strong>and</strong> management control for IC measurement <strong>and</strong><br />
management, it appears that the main usefulness of these systems relates to the provision of<br />
information about resources that are part of the IC to enable its management <strong>and</strong> exploitation to<br />
achieve competitive advantages <strong>and</strong> the creation of sustainable value. In this context, several tools<br />
are used to identify, measure, manage <strong>and</strong> report IC. In the particular case of SMAP, as practice<br />
oriented to strategy, the study suggests that these practices contribute to the identification <strong>and</strong><br />
management of some intangible assets such as innovation, research <strong>and</strong> development, production<br />
processes, management tools, customer satisfaction <strong>and</strong> analysis of relationships with customers,<br />
competitors <strong>and</strong> suppliers.<br />
Nowadays, it is a critical part in IC management to identify the required resources <strong>and</strong> select a<br />
suitable strategy to reduce resource gaps, thus, by studying the relationship between SMAP <strong>and</strong> IC<br />
417
Rui Alex<strong>and</strong>re Pires <strong>and</strong> Maria do Céu Gaspar Alves<br />
resources, this study makes a contribution to the existing knowledge, has novelty nature <strong>and</strong>,<br />
contributes to a better strategic management of IC. This paper also extends previous literature by<br />
<strong>using</strong> a different approach in the study of IC.<br />
For the completion of this work it matters to draw attention to some limitations that should be taken<br />
into consideration. The main limitation is related to the limited review carried out, since all works of<br />
literature review <strong>and</strong> empirical studies were not thoroughly analyzed.Moreover the analyzed studies<br />
were not collected systematically over a period of time <strong>and</strong> there is the probability that some major<br />
work might have been left out.<br />
In this sense, this work results in some clues to future developments. The first task to be done is<br />
related to a deeper literature review that encompasses a set of reference journals in the accounting<br />
field, within a limited period of time, <strong>and</strong> that allows a relationship between the SMAP <strong>and</strong> IC. Another<br />
future development is linked to the achievement of an exploratory study, through case studies,<br />
allowing the identification of the intangible assets that are related <strong>and</strong> can be identified <strong>and</strong> managed,<br />
by different practices identified in the strategic management accounting literature by Cadez <strong>and</strong><br />
Guilding (2008). That said, a third development relates to the realization of a quantitative study, data<br />
collection through questionnaire, which permits the establishment of wider relations between the<br />
different SMAP <strong>and</strong> the resources that are part of IC.<br />
Acknowledgements<br />
The authors would like to thank the financial support from Portuguese Foundation for Science <strong>and</strong><br />
Technology (FCT – Fundação para a Ciência ea Tecnologia - Programa de Financiamento<br />
Plurianual das Unidades de I&D) <strong>and</strong> the Research Unit NECE – Núcleo de Estudos em Ciências<br />
Empresariais, University of Beira Interior, Portugal. The authors also thank the valuable comments<br />
<strong>and</strong> suggestions made by an anonymous reviewer on an earlier version of this paper.<br />
References<br />
Abeysekera, I. (2006) “The project of intellectual capital disclosure: researching the research”, Journal of<br />
Intellectual Capital, vol.7, pp. 61-77.<br />
Abeysekera, I. (2008). Intellectual capital accounting – Practices in a developing country. London: Routledge.<br />
Abeysekera, I. <strong>and</strong> Guthrie, J. (2005) “An empirical investigation of annual reporting trends of intellectual capital<br />
in Sri Lanka”,.Critical Perspectives on Accounting, vol.16, pp.151-163.<br />
Beattie, V. <strong>and</strong> Thomson, S.J. (2007) “Lifting the lid on the use of content analysis to investigate intellectual<br />
capital disclosures”, Accounting Forum, vol. 31, pp. 129-163.<br />
Bontis, N. (2001) “Assessing knowledge assets: a review of the models used to measure intellectual capital”,<br />
International Journal of <strong>Management</strong> Reviews, vol. 3, pp. 41-60.<br />
Bukh, P.N., Nielsen, C., Gormsen, P. <strong>and</strong> Mouritsen, J. (2005) “Disclosure of information on intellectual capital in<br />
Danish IPO prospectuses”, Accounting, Auditing & Accountability Journal, vol.18, pp. 713-732.<br />
Cadez, S. <strong>and</strong> Guilding, C. (2008) “An exploratory investigation of an integrated contingency model of strategic<br />
management accounting”, Accounting, Organizations <strong>and</strong> Society, vol. 33, pp. 836-863.<br />
Cañibano, L., García-Ayuso, M. <strong>and</strong> Sánchez, M.P. (2000) “Accounting for intangibles: a literature review”, The<br />
Journal of Accounting Literature, vol.19, pp.102-130.<br />
Chong K. (2008) “Intellectual capital: definitions, categorization <strong>and</strong> reporting models”, Journal of Intellectual<br />
Capital, vol. 9, nº4, pp.609-638.<br />
Cleary, P. (2009) “Exploring the relationship between management accounting <strong>and</strong> structural capital in a<br />
knowledge-intensive sector”, Journal of Intellectual Capital, vol.10, pp. 37-52.<br />
Cravens, K.S. <strong>and</strong> Guilding, C. (2001) “An empirical study of the application of strategic management accounting<br />
techniques”, Advances in <strong>Management</strong> Accounting, vol.10, pp. 95–124.<br />
Cuganesan, S., Boedker, C. <strong>and</strong> Guthrie, J. (2007) “Enrolling discourse consumers to affect material intellectual<br />
capital practice”, Accounting, Auditing & Accountability Journal, vol.20, pp.883-911.<br />
Daum, J.H. (2003). Intangible assets <strong>and</strong> value creation. West Sussex: Wiley.<br />
Ferreira, A.L.P. (2008). A divulgação de informação sobre capital intelectual em Portugal. Unpublished Master<br />
thesis, Porto.<br />
García-Meca, E. <strong>and</strong> Martínez, I. (2007) “The use of intellectual capital information in investment decisions - An<br />
empirical study <strong>using</strong> analyst reports”, The International Journal of Accounting, vol.42, pp. 57-81.<br />
García-Meca, E., Parra, I., Larrán, M. <strong>and</strong> Martínez, I. (2005) “The explanatory factors of intellectual capital<br />
disclosure to financial analysts”, European Accounting Review, vol.14, pp.63-94.<br />
Guilding, C., Cravens, K.S. <strong>and</strong> Tayles, M. (2000) “An international comparison of strategic management<br />
accounting practices”, <strong>Management</strong> Accounting Research, vol.11, pp.113-135.<br />
Haldma, T. <strong>and</strong> Lääts, K. (2002) “Contingencies influencing the management accounting practices of Estonian<br />
manufacturing companies”, <strong>Management</strong> Accounting Research, vol. 13, pp. 379-400.<br />
418
Rui Alex<strong>and</strong>re Pires <strong>and</strong> Maria do Céu Gaspar Alves<br />
Huang, C. And Wang, M. (2008) “The effects of economic value added <strong>and</strong> intellectual capital on the market<br />
value firms: an empirical study”, International Journal of <strong>Management</strong>, vol. 25, pp. 722-731.<br />
Johanson, U., Mårtensson, M. <strong>and</strong> Skoog, M. (2001) “Mobilizing change through the management control of<br />
intangibles”, Accounting, Organizations <strong>and</strong> Society, vol. 26, pp.715-733.<br />
Jørgensen, K.M. (2006) “Conceptualising intellectual capital as language game <strong>and</strong> power”, Journal of<br />
Intellectual Capital, vol.7, pp. 78-92.<br />
Kasztler, A. <strong>and</strong> Leitner, K. (2009) Na SNA-based approach for management control of intellectual capital.<br />
Journal of Intellectual Capital, 10, 329-340.<br />
Krist<strong>and</strong>l, G. <strong>and</strong> Bontis, N. (2007) “Constructing a definition for intangibles <strong>using</strong> the resource based view of the<br />
firm”, <strong>Management</strong> Decision, vol. 45, pp.1510-1524.<br />
Löften, H. <strong>and</strong> Lindelöf, P. (2005) “Environmental hostility, strategic orientation <strong>and</strong> importance of management<br />
accounting – an empirical analysis of new technology-based firms”, Technovation, vol. 25, pp. 725-738.<br />
Marr, B. (2008) Impacting future value: how to manage your intellectual capital. <strong>Management</strong> Accounting<br />
Guideline (MAG), jointly published by CMA, AICPA <strong>and</strong> CIMA.<br />
MERITUM (2001) Measuring intangibles to underst<strong>and</strong> <strong>and</strong> improve innovation management. Final report,<br />
European Community under the Targeted Socio-Economic Research (TSER).<br />
Mouritsen, J. (1998) “Driving growth: economic value added versus intellectual capital”, <strong>Management</strong> Accounting<br />
Research, vol. 9, pp. 461-482.<br />
Mouritsen, J. <strong>and</strong> Larsen, H.T. (2005) “The 2nd wave of knowledge management: The management control of<br />
knowledge resources through intellectual capital information”, <strong>Management</strong> Accounting Research, vol.16,<br />
pp.371-394.<br />
RICARDIS (2006). Reporting intellectual capital to augment research, development <strong>and</strong> innovation in SMEs.<br />
European Commission, Brussels.<br />
Shang S. <strong>and</strong> Lin S. (2010) “A model of intellectual capital management capability in the dynamic business<br />
environment”, <strong>Knowledge</strong> <strong>Management</strong> Research <strong>and</strong> Practice, vol. 8, pp. 15-23.<br />
Starovic, D. <strong>and</strong> Marr, B. (2003) Underst<strong>and</strong>ing corporate value: managing <strong>and</strong> reporting intellectual capital.<br />
Published by Chartered Institute of <strong>Management</strong> Accountants (CIMA).<br />
Tan, H.P., Plowman, D. <strong>and</strong> Hancock, P. (2008) “The evolving research on intellectual capital”, Journal of<br />
Intellectual Capital, vol. 9, pp. 585-608.<br />
Tayles, M., Bramley, A., Adshead, N. <strong>and</strong> Farr, J. (2002) “Dealing with the management of intellectual capital: the<br />
potential role of strategic management accounting”, Accounting, Auditing & Accountability Journal, vol. 15,<br />
pp.251-267.<br />
Tayles, M., Pike, R.H. <strong>and</strong> Sofian, S. (2007) “Intellectual capital, management accounting practices <strong>and</strong><br />
corporate performance: Perceptions of managers”, Accounting, Auditing & Accountability Journal, vol. 20,<br />
pp. 522-548.<br />
Widener, S.K. (2006) “Associations between strategic resource importance <strong>and</strong> performance measure use: The<br />
impact on firm performance”, <strong>Management</strong> Accounting Research, vol.17, pp. 433-457.<br />
Zambon, S. (Eds.) (2003). Study on the measurement of intangible assets <strong>and</strong> associated reporting practices.<br />
Prepared for the Commission of the European Communities, Enterprise Directorate General.<br />
419
Executive <strong>Information</strong> Systems (EIS) Implementation for<br />
Education <strong>Management</strong> – a Conceptual Framework<br />
Rozilawati Razali <strong>and</strong> Mahamsiatus Kamaruddin<br />
Universiti Kebangsaan Malaysia, Selangor Darul Ehsan, Malaysia<br />
rozila@ftsm.ukm.my<br />
siatus09@gmail.com<br />
Abstract: Education management is a social process to identify, maintain, stimulate <strong>and</strong> unite human resources<br />
<strong>and</strong> physical assets in a comprehensive way in order to meet educational aspirations. Education management of<br />
a country in general involves several layers of management that requires different types of information from<br />
various operational units. As the units are mainly scattered all around the country <strong>and</strong> managed individually, most<br />
education information are isolated <strong>and</strong> disintegrated. On the other h<strong>and</strong>, the strategic planning <strong>and</strong> direction for<br />
education has to be centralised where it originates from the authority body, namely the Ministry of Education<br />
(MOE). MOE is responsible for planning, managing <strong>and</strong> monitoring the administration of those units so that they<br />
align with the national educational goals. These tasks are not straightforward to accomplish for a huge business<br />
like education, especially when the information are not easily <strong>and</strong> readily accessed. Fortunately, information age<br />
offers computer technology <strong>and</strong> applications as a powerful means to assist people in managing their businesses.<br />
The issues of education management above can be resolved, for instance, by having an Executive <strong>Information</strong><br />
System (EIS). EIS is capable of not only retrieving <strong>and</strong> storing information in a repository, it can also consolidate<br />
isolated information <strong>and</strong> perform comparative analyses through its mapping <strong>and</strong> merging feature. This paper<br />
aims to discuss how EIS can be applied in education domain. A conceptual framework that consists of critical<br />
success factors <strong>and</strong> characteristics of EIS implementation, particularly for education management is included in<br />
the paper. The framework was proposed based on literature reviews as well as field study that uses Malaysia<br />
context as a case. The results indicate that EIS can become a potential <strong>and</strong> feasible solution for addressing<br />
education management issues. The framework can act as a guideline to education’s stakeholders for introducing<br />
<strong>and</strong> implementing EIS in managing their respective education businesses.<br />
Keywords: Executive <strong>Information</strong> System (EIS), EIS for education management, critical success factors of EIS<br />
1. Introduction<br />
Education management can be defined as a social process to identify, maintain, stimulate, <strong>and</strong><br />
consolidate resources to meet educational aspirations. It involves various top management tasks<br />
such as planning, arranging, managing, directing <strong>and</strong> controlling as well as acquiring co-operation<br />
from individuals involved in education. It is influenced by specific plans <strong>and</strong> policies that contain<br />
strategic formulation <strong>and</strong> directions for education business in a country.<br />
Education management is very critical to any nation as it determines the future of the young citizens.<br />
It involves various community levels <strong>and</strong> background, <strong>and</strong> its execution covers a wide range of<br />
geographical areas. Education in most countries comprises different types of operational units that<br />
are distributed all around the country. It normally has four distinct hierarchical levels; federal, state,<br />
district <strong>and</strong> school. The planning <strong>and</strong> direction is centralised where it originates from the federal<br />
authority body, namely the Ministry of Education (MOE). Besides planning, MOE is also responsible in<br />
managing <strong>and</strong> monitoring the administration of education business across units. MOE needs to<br />
monitor actions <strong>and</strong> status as well as coordinate measures <strong>and</strong> perform comparative analysis as a<br />
benchmark in measuring achievements in education. These tasks are not so straightforward to<br />
perform as the units are mainly scattered <strong>and</strong> managed individually. This is one of the reasons why<br />
most education information are isolated <strong>and</strong> disintegrated.<br />
In the era of information <strong>and</strong> communication technology (ICT), computer applications offer a powerful<br />
means to assist people in managing their businesses. The ability to asses a variety of information is<br />
an important asset for any organisation to improve productivity (Diez & Macintosh 2009). The<br />
management of an organisation only needs to know what information it requires. The technology in<br />
general has the capacity to get the information for them <strong>and</strong> maximise its use. The management later<br />
uses the information to make important decisions <strong>and</strong> establish new knowledge to improve the<br />
organisation’s services <strong>and</strong> performance. With ICT, these managerial tasks are very much feasible.<br />
One possible option is by having an Executive <strong>Information</strong> System (EIS).<br />
Executive <strong>Information</strong> System (EIS) is a specialised information system that allows executives to<br />
monitor the management of an organisation. EIS can also be used to support organisational planning<br />
420
Rozilawati Razali <strong>and</strong> Mahamsiatus Kamaruddin<br />
where it assists in developing options <strong>and</strong> strategies for future actions for the organisation (Ikart<br />
2005). One interesting feature of EIS is it offers a method of merging <strong>and</strong> mapping information from<br />
various sources. This enables executives to view <strong>and</strong> analyse internal <strong>and</strong> external information as a<br />
whole. The issues of isolated <strong>and</strong> disintegrated education information mentioned above can perhaps<br />
be resolved by EIS through this feature. To become a successful EIS, its implementation should be<br />
carried out efficiently <strong>and</strong> effectively (Hoffer 2007). This situation raises a concern about the<br />
contributing factors that are necessary to ensure the success of EIS implementation for education<br />
management.<br />
The potential of EIS in supporting education management however has yet to be explored. This paper<br />
aims to discuss how EIS can be implemented <strong>and</strong> used for managing education matters. Critical<br />
success factors (CSF) <strong>and</strong> characteristics of EIS implementation for education management are<br />
included in the paper. Those elements were identified through literature reviews as well as field study<br />
that uses Malaysia context as a case. The field study involved several key players in EIS development<br />
projects, which was conducted by <strong>using</strong> semi-structured interviews. Based on these factors, the paper<br />
proposes a framework of EIS implementation for education management.<br />
This paper is organised as follows: Section 2 provides some background information on EIS <strong>and</strong> CSF.<br />
Section 3 elaborates the study that includes both reviews <strong>and</strong> field work. Section 4 discusses the<br />
findings <strong>and</strong> describes the proposed framework. Section 5 discusses how to apply the proposed<br />
framework. Finally, Section 6 concludes the paper with a summary of the main findings <strong>and</strong> future<br />
work.<br />
2. Background<br />
The integration of computer technology to information is seen as a strategic platform that can support<br />
a variety of management tasks. One instance of such integrations is Executive <strong>Information</strong> System<br />
(EIS). An Executive <strong>Information</strong> System (EIS) is a sophisticated information system that enables<br />
executives to plan, monitor <strong>and</strong> control business processes through computer technology. EIS has<br />
been introduced since 1970 <strong>and</strong> it is now widely used in almost every domain (Armine 2005). EIS<br />
improves the ability of decision makers to formulate solutions by providing access to internal <strong>and</strong><br />
external organisational information (Anita 2006). This enables executives to view a situation from<br />
different perspectives <strong>and</strong> thus formulate appropriate action strategies (McLeod 2007). Furthermore, it<br />
can help to develop the leadership credibility by assisting executives in developing options <strong>and</strong> action<br />
plans for future strategy by providing systematic information searching <strong>and</strong> retrieval features. EIS is<br />
able to not only capture <strong>and</strong> store information but also merge <strong>and</strong> map isolated data as well as<br />
generate comparative analysis. Besides being an information-based system, EIS also contains<br />
Business Intelligence (BI) elements (Rasmussen et al. 2009). BI offers the use of dashboard or<br />
scoreboard that allows executives to analyse a situation from several different viewpoints. As a high<br />
potential system, many studies investigated <strong>and</strong> discussed EIS. Some examples are summarised in<br />
Table 1 below.<br />
Table 1: Studies related to Executive <strong>Information</strong> Systems (EIS)<br />
Author Description<br />
Porrawatpreyakorn et al. (2009) <strong>Knowledge</strong> transfer in EIS development<br />
Nurul et al. (2008) Integration of extraction agent <strong>and</strong> profiling user agent in data<br />
management module of EIS development<br />
Arnott et al. (2007) Cultural fit factor in EIS implementation<br />
Hwang et al. (2007) EIS framework for petrochemical industry<br />
Ong et al. (2004) Agent-based approach in EIS database design model<br />
Waiman & Gilbert (2006) Meta database implementation for EIS data analysis<br />
Ikart (2005), Poon & Wagner (2001),<br />
Success factors of EIS implementation<br />
Armine (2005)<br />
Salmeron & Herrero (2005) AHP technique implementation on CSFs of EIS<br />
DeVries et al. (2004) Schematic faces to visual EIS output<br />
Bruce et al. (2003) EIS internal <strong>and</strong> external information<br />
Walters et al. (2003) <strong>Information</strong> sources to EIS for strategic decision making<br />
Azlinah (2001) Intelligent agent in EIS database management<br />
Liang & Mir<strong>and</strong>a (2001) Dashboard <strong>and</strong> scorecard approach on web-based EIS for public<br />
agency<br />
421
Rozilawati Razali <strong>and</strong> Mahamsiatus Kamaruddin<br />
Relying on the technology solely cannot guarantee the implementation of EIS can be successful.<br />
Studies on EIS should focus on the contributing elements that can influence the success of EIS<br />
implementation (Ikart 2005). Those important success elements are known as Critical Success<br />
Factors (CSF) (Caralli 2004). CSF for EIS in essence is a set of elements that must be fulfilled by the<br />
activities involved in EIS implementation process (Salmeron & Herrero 2005). In other words, CSF is<br />
a relatively small number of significant elements that must go right for the process to succeed. As EIS<br />
supports business process, the fulfillment of CSF is necessary for not only the EIS implementation but<br />
also the organisation as a whole.<br />
Due to its importance, organisations from various domains including education continue to invest in<br />
EIS projects as a way to strengthen <strong>and</strong> improve the efficiency of their management. The ability of<br />
EIS to generate a variety of information <strong>and</strong> illustrates the performance of educational programmes to<br />
education managers has been seen as an advantage that can help in addressing issues in education<br />
management. The potential of EIS to support education management has not been fully explored.<br />
Moreover, studies on CSF for EIS in education domain are almost non-existent. This indicates that<br />
such studies must be established.<br />
3. The study<br />
The study described in this paper encompasses two phases: Phase 1 <strong>and</strong> Phase 2. Phase 1 involved<br />
the identification of CSF through literature reviews. On the other h<strong>and</strong>, Phase 2 concerned the<br />
identification <strong>and</strong> confirmation of CSF through a field work. The phases worked complementarily<br />
where the former provided the theoretical background whereas the latter confirmed the phenomenon<br />
from empirical perspective.<br />
The study aimed to answer the following questions:<br />
What are the necessary elements to ensure the success of EIS implementation for education<br />
management?<br />
How the elements identified in (i) can be categorised into several distinct critical success factors<br />
(CSF) for EIS?<br />
Based on the identified CSF in (ii), what would be the possible framework of EIS implementation<br />
for education management?<br />
Phase 1 was accomplished by reviewing previous studies concerning EIS implementation whereas<br />
Phase 2 employed a field study as the means to gather viewpoints from industrial EIS experts. The<br />
field study used semi-structured interviews with open-ended questions. The data gathered from both<br />
phases were analysed by <strong>using</strong> content analysis. In essence, content analysis is the systematic<br />
description of behaviour asking who, what, where, where <strong>and</strong> how questions within formulated orderly<br />
rules to limit the effects of analyst bias (Fraenkel & Wallen 2008). It normally describes the contents of<br />
interviews <strong>and</strong> related documents systematically (Krippendorff 2004). The approach was chosen as it<br />
analyses data in an organised way, which is particularly necessary for answering “what” <strong>and</strong> “how”<br />
questions. The important step in content analysis is the identification of categories that comprise a set<br />
of related elements. The categories are then used as the bases for the proposed framework. Figure 1<br />
illustrates the research design employed in this study.<br />
The following paragraphs describe briefly the process involved <strong>and</strong> the methodology used in each<br />
phase:<br />
3.1 Phase 1: Reviews<br />
The reviews were made on the published articles concerning the CSF for EIS implementation. The<br />
searching was done through online sources for both conference <strong>and</strong> journal articles that were<br />
published within fifteen years since 1996. The keywords used in the searching were “critical success<br />
factors” <strong>and</strong>/or “executive information system” as well as “education management”. A number of<br />
articles emerged but only five papers covered both CSF <strong>and</strong> EIS, which was the interest of the study:<br />
(Abdullah 1997; Bajwa et al. 1998; Srivihok 1999; Poon & Wagner 2001; Salmeron & Herrero 2005).<br />
These papers however discussed CSF for general EIS implementation, particularly for profit-based<br />
businesses. None of the articles investigated CSF for EIS implementation in education management<br />
context. This phase also involved the construction of questionnaire for the inteviews, which were<br />
formulated based on CSF themes proposed by Kaniklides & Kimbles (1995) <strong>and</strong> Salmeron & Herrero<br />
(2005).<br />
422
Figure 1: Research design<br />
3.2 Phase 2: Field study<br />
Rozilawati Razali <strong>and</strong> Mahamsiatus Kamaruddin<br />
Phase 1<br />
Phase 2<br />
The main objective of the field study was to capture the necessary elements for a successful EIS<br />
implementation for education management. The field study was qualitative in nature where the data<br />
collection was accomplished through interviews <strong>and</strong> the analysis was mainly interpretive. The field<br />
study questions were constructed based on organisational-technological aspects, which were<br />
identified based on literature <strong>and</strong> document reviews. The sessions were conducted individually, one<br />
at a time within a period of three months. Each session took about two hours. Prior to execution, the<br />
validity <strong>and</strong> accuracy of the questions were reviewed by two EIS experts. As the study concerned<br />
education management <strong>and</strong> EIS, the subjects were selected based on their knowledge <strong>and</strong> familiarity<br />
on both aspects. There were four officers from the Ministry of Education (MOE) <strong>and</strong> one government<br />
agency officer participated in the study. Those officers were selected because they were involved in<br />
EIS projects at their respective organisations. Moreover, MOE officers can be considered as experts<br />
<strong>and</strong> stakeholders in education management. The selection was based on relevance (purposive)<br />
sampling <strong>and</strong> the number of participation was small. Nevertheless, the participation was seen as<br />
sufficient for a qualitative study. The participation was voluntary in order to adhere to the ethical<br />
policies. The participants were aware that the field study was intended for research purposes.<br />
4. Results <strong>and</strong> analysis<br />
The content analysis was used to identify common categories (CSF) of EIS implementation for<br />
education management from both literature <strong>and</strong> field study. The analysis started with a theory or<br />
relevant research findings as guidance for initial codes (Shieh & Shannon 2005). The analysis was<br />
supported by triangulation technique, which is one of the methods to confirm qualitative findings<br />
423
Rozilawati Razali <strong>and</strong> Mahamsiatus Kamaruddin<br />
(Miles & Huberman 1994). The triangulation concerned about moving from case (field study) to crosscase<br />
(reviews) <strong>and</strong> vice-versa to determining how many items share similar characteristics. The<br />
analysis was a deductive directed approach where key categories of CSF were identified. On the<br />
other h<strong>and</strong>, each article <strong>and</strong> the outcome of each interview session were considered as a transcript<br />
respectively. The significant elements from those transcripts were analysed individually <strong>and</strong><br />
comprehensively through inductive approach. Later, these elements were compared across<br />
transcripts <strong>and</strong> grouped into a set of distinct categories. Any new element emerged from the<br />
transcripts was constantly compared with those already encountered until no new insights could be<br />
gained. Therefore, these steps were iterative. The analysis process was executed by <strong>using</strong> Nvivo<br />
software.<br />
From the analysis, four common categories were discovered: People, Process, Product <strong>and</strong><br />
Environment. Each category comprises several elements, as shown in Table 2. These categories are<br />
indeed CSF of EIS implementation for education management. People are human resources who are<br />
involved directly or indirectly in executing EIS implementation initiatives. Process is defined as<br />
activities performed during system development, including the upgrading or maintenance process.<br />
Product refers to artifacts that are used <strong>and</strong> produced by the process. Environment refers to<br />
organisational <strong>and</strong> managerial factors such as plan/policy, management practices as well as politics<br />
<strong>and</strong> culture.<br />
Table 2: CSF for education EIS development<br />
Factors Items Field<br />
study<br />
1 2 3 4 5<br />
People<br />
Executives / top management (managerial)<br />
Support <strong>and</strong> involvement<br />
Development team (operational)<br />
⁄ ⁄ ⁄ ⁄ ⁄<br />
Technical skills<br />
Education personnel (managerial <strong>and</strong> operational)<br />
⁄ ⁄ ⁄ ⁄ ⁄<br />
<strong>Information</strong> management<br />
⁄ ⁄<br />
Process<br />
Development activities (planning)<br />
Development methodology<br />
System requirements ⁄ ⁄ ⁄<br />
System maintenance<br />
Data extraction (execution)<br />
⁄ ⁄<br />
Periodically<br />
Adequate*<br />
⁄<br />
Correct ⁄ ⁄<br />
Updated ⁄<br />
Data management (execution)<br />
Data analysis (execution)*<br />
⁄<br />
Hardware <strong>and</strong> software infrastructure (planning) ⁄ ⁄ ⁄<br />
Product Integrated features, functions, etc. ⁄ ⁄ ⁄ ⁄ ⁄<br />
Environment<br />
Plan/Policy<br />
Education strategic plan*<br />
Key performance indicators (KPI) *<br />
St<strong>and</strong>ard Operating Procedure (SOP) *<br />
Project management<br />
<strong>Management</strong> best practices<br />
⁄<br />
Financial<br />
⁄<br />
System awareness ⁄ ⁄ ⁄<br />
IS sources<br />
Politics <strong>and</strong> culture<br />
⁄ ⁄ ⁄ ⁄<br />
Cooperation to information sharing<br />
⁄ ⁄ ⁄ ⁄<br />
Attitude towards projects ⁄ ⁄<br />
Organisation culture towards projects ⁄<br />
Note: 1 – Abdullah, 2 – Bajwa et al., 3 – Poon & Wagner, 4 – Salmeron & Herrero, 5 – Srivihok.<br />
The following paragraphs explain the interrelationships among the elements <strong>and</strong> factors identified<br />
above:<br />
To ensure successful EIS implementation for education management, management <strong>and</strong> operational<br />
personnel (people) have to be brought together into the planning <strong>and</strong> execution of the development<br />
424<br />
⁄<br />
⁄<br />
⁄<br />
⁄
Rozilawati Razali <strong>and</strong> Mahamsiatus Kamaruddin<br />
activities (process) to produce an integrated <strong>and</strong> collaborative EIS (product), which is supported by<br />
plan/policy/procedure, management best practices, reasonable politics <strong>and</strong> culture values<br />
(environment).<br />
The EIS players (executives, development team <strong>and</strong> educational personnel) must be given adequate<br />
support <strong>and</strong> commitment towards EIS initiatives. They should be given the authority to plan <strong>and</strong><br />
coordinate EIS implementation. This means they should be allowed to manage EIS implementation<br />
project attributes (financial, system awareness <strong>and</strong> IS sources). During the planning of EIS<br />
implementation, they certainly have to consider education KPI <strong>and</strong> KRA, organisation’s strategic plans<br />
<strong>and</strong> SOP as well as project management policies. A good plan can only be formulated if the<br />
information received during the planning is accurate <strong>and</strong> complete. This depends on the co-operation<br />
given by personnel <strong>and</strong> units in the organisation. This is difficult to accomplish unless the organisation<br />
imposes information sharing culture where every personnel is encouraged to share “what they know,<br />
have <strong>and</strong> need” with others across the units. Such an environment can be introduced if every<br />
personnel has right attitude <strong>and</strong> culture towards EIS <strong>and</strong> practises positive working values. The<br />
planning must also include software <strong>and</strong> hardware requirements (infrastructure) as well as the<br />
identification of suitable development methodology to be used including system requirements <strong>and</strong><br />
maintenance (development activities). During the execution of the project, those elements are used to<br />
develop EIS that integrates internal isolated information periodically (data integration module) so that<br />
the information is updated, adequate <strong>and</strong> correct to be used by executives in decision making<br />
process. The information is then organised properly for easy access (data management module).<br />
Besides information capturing <strong>and</strong> retrieving, EIS should also be able to perform comparative<br />
analyses <strong>and</strong> generate useful reports (data analysis module). This is achieved by mapping <strong>and</strong><br />
merging internal information with external information. As a result, an integrated <strong>and</strong> collaborative EIS<br />
can be produced for education users. The users encompass personnel from MOE, state <strong>and</strong> district<br />
education departments. Figure 2 below illustrates the proposed framework based on the elements<br />
discussed above.<br />
Figure 2: The proposed framework<br />
5. Applying the framework<br />
The framework may not be conclusive as it needs to be confirmed <strong>and</strong> refined further through other<br />
empirical settings. It however provides a conceptual overview of CSF for EIS implementation<br />
concerning education management. Education stakeholders <strong>and</strong> practitioners can use the framework<br />
425
Rozilawati Razali <strong>and</strong> Mahamsiatus Kamaruddin<br />
as a guideline for the development of EIS for education management. They are now aware of the<br />
necessary CSF for a successful EIS implementation. To researchers, the framework triggers the<br />
needs to identify the suitable mechanism that can help practitioners in executing the implementation<br />
process.<br />
6. Conclusion <strong>and</strong> future work<br />
This paper discussed CSF of EIS implementation for educational management. The CSF has been<br />
identified through literature reviews as well as field study. The CSF includes people, process, product<br />
<strong>and</strong> environment aspects. Each of these factors comprises a set of related elements. The CSF <strong>and</strong><br />
their respective elements are integrated to form a conceptual framework of EIS implementation for<br />
educational management. The framework can act as a guideline to education’s stakeholders for<br />
introducing <strong>and</strong> implementing EIS in managing their respective education businesses. The proposed<br />
framework may not be conclusive. As the study focused on subjects at federal level, future studies<br />
should be conducted on subjects at other education units such as state <strong>and</strong> district. In addition, the<br />
elements in each CSF should be investigated more closely in order to underst<strong>and</strong> how they affect EIS<br />
development <strong>and</strong> influence each other.<br />
Acknowledgements<br />
The authors thank the respondents participated in the study. This work was funded by the Ministry of<br />
Education Malaysia.<br />
References<br />
Abdullah J.A. (1997) Factors Influencing the Success of the EIS Implementation, Admin Sci. J. King Saudi<br />
University. Vol. 9, pp 39-59.<br />
Anita, C. (2006) A Practical Guide to <strong>Information</strong> Systems Strategic Planning. 2 nd Edition, Auerbach Publications,<br />
US.<br />
Armine, N.T. (2005) Factors Affecting the Implementation a Successful Executive <strong>Information</strong> System, 3 rd<br />
International Conference: Sciences of Electronic, Technologies of <strong>Information</strong> <strong>and</strong> Telecommunications,<br />
Tunisia, March 27-31, 2005.<br />
Arnott, D., Jirachiefpattana, W., O’Donnell, P. (2007). “Executive information systems development in<br />
anemerging economy”, Decision Support Systems, Vol. 42, pp 2078-2084.<br />
Azlinah, M. (2001) “Executive information system model for public institutions of higher learning in Malaysia”,<br />
Unpublished Thesis, National University of Malaysia, Kuala Lumpur.<br />
Bajwa, D. S., Rai, A., Brennan, I. (1998) “Key Antecedents of Executive <strong>Information</strong> System Success: A Path<br />
Analytic Approach”, Decision Support Systems, Vol. 22, pp 31-43.<br />
Bruce, A.W., James, J.J., Gary K. (2003) “Strategic <strong>Information</strong> <strong>and</strong> Strategic Decision Making: the EIS/CEO<br />
Interface in Smaller Manufacturing Companies”, <strong>Information</strong> & <strong>Management</strong>, Vol. 40, pp 487-495.<br />
DeVries, P., Mulig, E.V., Lowery, K. (2004) “A Useful Tool for Data Scanning in Executive <strong>Information</strong> Systems:<br />
Schematic Faces”, Industrial <strong>Management</strong> <strong>and</strong> Data Systems, Vol. 104, No 8, pp 644-649.<br />
Diez, E., McIntosh, B.S. (2009) “A Review of the Factors Which Influence the Use <strong>and</strong> Usefulness of <strong>Information</strong><br />
Systems”, Environmental Modelling & Software, Vol. 24, pp 588-602.<br />
Fraenkel, J. R <strong>and</strong>, N.E. Wallen (2008) How To Design And Evaluate Research in Education. McGraw-Hill: NY<br />
Hoffer, J.A., George, J.F., Valacich, J.S. (2007) Modern System Analysis & Design. 5 th Edition, United State of<br />
America, Addison Wesley Longman Inc.<br />
Hwang, W.T., Tien, S.W., Shu, C.M. (2007). “Building an Executive <strong>Information</strong> System for Maintenance<br />
Efficiency in Petrochemical Plants”, An Evaluation Trans ICheme Part B, Process Safety & Environment<br />
Protection, Vol. 85, pp 139-146.<br />
Ikart, E.M. (2005) “A Theory-based Model for the Study of Executive <strong>Information</strong> Systems Adoption by the Toplevel<br />
Managers”, [online], http://ro.uow.edu.au/commpapers/512/<br />
Kaniclides, A., Kimble, C. (1995) “A Framework <strong>and</strong> Use of Executive <strong>Information</strong> System”, Proceedings of<br />
GRONICS '95, Groningen, The Netherl<strong>and</strong>s, Ed T LOURENS, February 1995. 47-52.<br />
Krippendorff, K. (2004). Content Analysis: An Introduction to Its Methodology. 2 nd Edition. Sage Publications,<br />
USA.<br />
Liang, L.Y., Mir<strong>and</strong>a, R. (2001) “Dashboards <strong>and</strong> Scorecards: Executive <strong>Information</strong> Systems for the Public<br />
Sector”, [online], http://www.gfoa.org/downloads/Dashboards.pdf<br />
McLeod, R., Schell, G.P. (2007) <strong>Management</strong> <strong>Information</strong> Systems, 10 th Edition. USA : Pearson Prentice Hall.<br />
Miles, M.B., Huberman, A.M. (1994) Qualitative Data Analysis. 2 nd Edition, Sage Publication, USA.<br />
Nurul I.Y., Juzlinda M.G., Ahmad S.S. (2008) “Integrating Agent into Executive <strong>Information</strong> System: A Case<br />
Study in KUIS”, Proceedings of the International Conference on Computer <strong>and</strong> Communication<br />
Engineering, Kuala Lumpur, Malaysia 2008.<br />
Ong, V., Duan, Y., Xu, M., Mathews, B. (2004) “Revitalising Executive <strong>Information</strong> Systems Design <strong>and</strong><br />
Development”, Proceedings of the International Conference on <strong>Information</strong> Systems (EMCIS).<br />
Poon, P., Wagner, C. (2001) “Critical Success Factors Revisited: Success <strong>and</strong> Failure Cases of <strong>Information</strong><br />
Systems for Seniors Executives”, Decision Support Systems, Vol. 30, pp 393-418.<br />
426
Rozilawati Razali <strong>and</strong> Mahamsiatus Kamaruddin<br />
Porrawatpreyakorn, N., Quirchmayr, G., Chutimaskul, W. (2009) “Requirements for a <strong>Knowledge</strong> Transfer<br />
Framework in the field of Software Development Process <strong>Management</strong> for Executive <strong>Information</strong> Systems<br />
in the Telecommunications Industry,” Proceedings of IAIT.<br />
Rasmussen, N., Chen, C.Y., Bansal, M. (2009) Business Dashboards : A Visual Catalog for Design <strong>and</strong><br />
Deployment. John Wiley & Sons, Inc. USA.<br />
Salmeron, J.L., Herrero, I. (2005) “An AHP-based Methodology to Rank Critical Success Factors of Executive<br />
<strong>Information</strong> Systems”, Computer St<strong>and</strong>ard & Interfaces, Vol. 28, pp 1-12.<br />
Shieh, H.F., Shannon, S.E. (2005) “Three Approaches to Qualitative Content Analysis”, Qualitative Research,<br />
Vol. 15, No. 9, pp 1277-1288.<br />
Srivihok, A. (1999) “Underst<strong>and</strong>ing Executive <strong>Information</strong> Systems Implementation: An Empirical study of EIS<br />
Success Factors”, Proceeding of 32 nd Hawaii International Conference on System Sciences.<br />
Waiman, C., Gilbert, B. (2006) “A Metadatabase-enabled Executive <strong>Information</strong> System (Part B): Methods for<br />
Dynamic Multidimensional Data Analysis,” Decision Support Systems, Vol. 42, pp 1599-1612.<br />
Walters, B.A., Jiang, J.J., Klein, G. (2003) “Strategic <strong>Information</strong> & Strategic Decision Making: the EIS/CEO<br />
Interface in Smaller Manufacturing Companies”, <strong>Information</strong> <strong>and</strong> <strong>Management</strong>, Vol. 40, pp 487-495.<br />
427
The ISD Process as a Live Routine<br />
David Sammon, Tadhg Nagle <strong>and</strong> John McAvoy<br />
University College Cork, Irel<strong>and</strong><br />
dsammon@afis.ucc.ie<br />
t.nagle@ucc.ie<br />
j.mcavoy@ucc.ie<br />
Abstract: The objective of this exploratory study is to view an ISD process as an organisational routine in an<br />
effort to identify the inefficiencies in the process. To meet this objective we present the findings from a sixteen<br />
month case study of an ISD organisation, examining the ISD process the starting point of which is the<br />
requirements elicitation (RE) phase. A variety of data gathering techniques are used across two phases of data<br />
collection. The case data is organised as a narrative network (NN) of the organisational routine (ISD process)<br />
allowing us to underst<strong>and</strong> the ISD process as a collection of functional events/narrative fragments, generated by<br />
the enactment of the organisational routine. The NN is showing itself to be a very powerful device to appreciate<br />
the knock-on impacts of vague <strong>and</strong> incomplete requirements (poor requirements elicitation) on downstream<br />
ISD process ’patterns of action’. In the findings of this research we generate an ‘ostensive’ rule that defines a<br />
valid sequence of action in the ISD process. As a case study, the methods <strong>and</strong> results provide a means of<br />
comparison to additional cases of ISD organisations.<br />
Keywords: routines, <strong>Information</strong> Systems Development (ISD), narrative network, case study<br />
1. Introduction<br />
<strong>Information</strong> Systems Development (ISD) organisations are faced with increasing dem<strong>and</strong>s to deliver<br />
high quality information systems more efficiently. However, irrespective of the strategies or<br />
methodologies adopted to organise an organisation’s ISD process, requirements elicitation (RE) still<br />
remains a critical phase, having significant impacts on software quality <strong>and</strong> costs (c.f. Chakraborty et<br />
al., 2010). In fact, it is widely reported that incomplete <strong>and</strong> inaccurate user requirements collection,<br />
during a RE phase, can lead to failed ISD projects (Mathiassen et al., 2007, Chakraborty et al., 2010)<br />
(Byrd et al., 1992).<br />
Invariably, organisations are continually looking to improve the process of [1] gathering <strong>and</strong><br />
documenting user requirements, <strong>and</strong> [2] developing solutions around what the customer<br />
wants. However, while there is a substantial body of knowledge around RE, enumerating factors,<br />
tools, <strong>and</strong> techniques focused on creating an effective RE process (c.f. Benbasat et al., 1987, Byrd et<br />
al., 1992, Mathiassen et al., 2007, Chakraborty et al., 2010); the intricacies of the process of RE have<br />
been under researched. Furthermore, as argued by (Chakraborty et al., 2010) there are very few<br />
studies examining how the social process associated with RE unfolds. However, ISD has been<br />
viewed as a ‘social process rather than a merely technical one’ (Hansen <strong>and</strong> Rennecker, 2010),<br />
p.450) enacted by various development team members (human actors) (e.g. project managers (PM),<br />
business analysts (BA), developers, testers, etc.). In an effort to address this paucity of research<br />
around viewing RE as a social process, we propose that the ISD process should be viewed as an<br />
‘organisational routine’ (c.f. Pentl<strong>and</strong> <strong>and</strong> Feldman, 2008), the first phase of which is RE. Therefore,<br />
the objective of this exploratory research study is to view an ISD process as an organisational routine<br />
in an effort to identify the inefficiencies in the ISD process.<br />
The remainder of this paper is organised as follows. The next section describes organisational<br />
routines <strong>and</strong> the use of a narrative network (NN) to represent ‘live routines’. This is followed by a<br />
description of the research design. The case analysis is then presented where the ISD process is<br />
visualised as a NN <strong>and</strong> four ‘patterns of action’ are highlighted (reflecting the inefficiencies in the ISD<br />
process). The paper concludes with a rule to address the ISD process inefficiencies.<br />
2. Organisational routines<br />
Organisational routines are a foundation for underst<strong>and</strong>ing business processes <strong>and</strong> are defined as<br />
repetitive <strong>and</strong> recognisable ‘patterns of action’ carried out by multiple actors (Pentl<strong>and</strong> <strong>and</strong> Feldman,<br />
2007; 2008). The theory of organisational routines emphasises the participation of multiple actors<br />
(human <strong>and</strong> non-human) <strong>and</strong> ‘this is what distinguishes a routine as organisational rather than<br />
individual’ (Pentl<strong>and</strong> <strong>and</strong> Feldman, 2007p. 787). Indeed, if organisational routines are viewed as a<br />
‘generative system’, multiple human actors suggests multiplicity of perspective <strong>and</strong> underst<strong>and</strong>ing;<br />
therefore, different actions may be taken <strong>and</strong> different actors may be used (e.g. non-human –<br />
428
David Sammon, Tadhg Nagle <strong>and</strong> John McAvoy<br />
computer-based artefacts) at various points in accomplishing the same routine (Pentl<strong>and</strong> <strong>and</strong><br />
Feldman, 2007; 2008). This view of organisational routines promotes the concept of ‘live routines’<br />
over ‘dead routines’, where ‘live routines’ involve people, who are capable of ‘learning from<br />
experience’ <strong>and</strong> ‘dead routines’ are artefacts that are ‘rigid, mundane, mindless’, <strong>and</strong> can be explicitly<br />
stored (c.f. Pentl<strong>and</strong> <strong>and</strong> Feldman, 2008). Therefore, ‘live routines’ are not fixed patterns; they are<br />
‘generative systems’ that can produce ‘patterns of action’ based on local judgement <strong>and</strong> improvisation<br />
by actors.<br />
Any social system that satisfies the definition of an organisational routine must consist of two<br />
complementary aspects: the ‘ostensive’ <strong>and</strong> the ‘performative’ (Pentl<strong>and</strong> <strong>and</strong> Feldman, 2007; 2008).<br />
While the ‘ostensive’ aspect consists of the abstract, generalised underst<strong>and</strong>ings of the human actors<br />
regarding enacting a routine (a model of) <strong>and</strong> the steps involved in accomplishing the task (a model<br />
for), the ‘performative’ aspect consists of the concrete, specific performances/enactment of the routine<br />
(Pentl<strong>and</strong> <strong>and</strong> Feldman, 2007). However, in the realities of an organisational environment, while<br />
“performances are often filled with improvisations – adjustments <strong>and</strong> variations that make it possible<br />
to get things done in diverse situations” (Pentl<strong>and</strong> <strong>and</strong> Feldman, 2007, p.787) there is a need for an<br />
effective representation of the ‘patterns of action’ that define the ‘performances’ of organisational<br />
routines.<br />
Within the context of this research study viewing the ISD process as an organisational routine has<br />
significant value, for example, irrespective of the methodology adopted for ISD there will always be an<br />
associated recognisable pattern of repetitive actions (e.g. requirements gathering, coding, testing) to<br />
be carried out by multiple actors (e.g. business analyst, developer, tester). However, while the<br />
‘ostensive’ aspects of the organisational routine may be captured in the design of the organisational<br />
artefact (e.g. the adopted ISD methodology), <strong>and</strong> while this may constrain the performances in some<br />
desirable way, it is the actual performances (‘performative’ aspects) inherent in the execution of the<br />
ISD process that are of most interest in an effort to underst<strong>and</strong> how the routine actually lives in the<br />
organisational environment.<br />
2.1 A narrative network of an organisational routine<br />
A narrative network (NN) is a new methodological device that provides ‘an explicit representation of<br />
an organisational routine as a pattern of action’ <strong>and</strong> provides ‘a way to describe patterns of action, as<br />
well as the actions’ (Pentl<strong>and</strong> <strong>and</strong> Feldman, 2008, p.244). The NN is an appropriate conceptual tool<br />
when examining ‘live routines’, where it is expected that different ‘patterns of action’ will emerge over<br />
time, therefore, the NN ensures a dynamic <strong>and</strong> longitudinal focus on organisational practices (c.f.<br />
Yeow <strong>and</strong> Faraj, 2011; Pentl<strong>and</strong> <strong>and</strong> Feldman, 2008). The NN is founded on key principles emerging<br />
from a synthesis of research on: structuration theory, actor-network theory, <strong>and</strong> organisational<br />
routines (c.f. Yeow <strong>and</strong> Faraj, 2011; Pentl<strong>and</strong> <strong>and</strong> Feldman, 2008).<br />
The NN is defined as “a collection of functional events related by their sequential occurrence in a<br />
story or set of stories” (Pentl<strong>and</strong> <strong>and</strong> Feldman, 2008, p.244). Therefore, the “functional event is the<br />
building block of a narrative; it is a fragment that advances the story” (Pentl<strong>and</strong> <strong>and</strong> Feldman, 2008,<br />
p.244). A functional event is similar to the structure of a simple sentence, two actors (human <strong>and</strong> nonhuman)<br />
connected by some action, ‘subject-verb-object’ <strong>and</strong> uncovers ‘important information about<br />
who does what’ (Pentl<strong>and</strong> <strong>and</strong> Feldman, 2008, p.244). In the context of this research study, typical<br />
functional events for an ISD process include: a customer requests a system, a business analyst<br />
gathers customer requirements, a developer writes code, <strong>and</strong> a tester evaluates the system.<br />
Therefore, the NN perspective represents the functional events (narrative fragments) of an<br />
organisational routine as ‘nodes’ in the network <strong>and</strong> the sequence of functional events as ‘ties’ in the<br />
network (c.f. Yeow <strong>and</strong> Faraj, 2011; Pentl<strong>and</strong> <strong>and</strong> Feldman, 2008). As a result, the NN perspective<br />
facilitates the explicit ‘capture of actors, artefacts <strong>and</strong> actions as well as the process by which work is<br />
currently or potentially done’ (Yeow <strong>and</strong> Faraj, 2011). The NN perspective facilitates the examination<br />
of actual ‘patterns of action’ that emerge from the living routines <strong>and</strong> not just a limited view of<br />
expected/idealised patterns reflected in a process design (Pentl<strong>and</strong> <strong>and</strong> Feldman, 2008).<br />
Furthermore, the NN perspective facilitates foc<strong>using</strong> on the tasks that actors engage in when enacting<br />
a ‘live routine’ in all its variations, as opposed to just simply foc<strong>using</strong> on one version of the process<br />
<strong>and</strong> its decision points, as provided by process flowcharts (Yeow <strong>and</strong> Faraj, 2011).<br />
In the research design section we provide a commentary on how to construct the NN of the ISD<br />
process. Using a NN perspective to analyse an organisation’s ISD process, <strong>and</strong> the associated<br />
429
David Sammon, Tadhg Nagle <strong>and</strong> John McAvoy<br />
internal interactions between the multiple human actors, will provide new insights through viewing the<br />
ISD process as a ‘live routine’. In the next section we now present the case study research design.<br />
3. Research design<br />
In the context of this research study, a ‘freshness in perspective’ (c.f. Eisenhardt, 1989 p.548) is<br />
required on the topic despite the fact that the ISD process <strong>and</strong> the associated methodologies<br />
themselves have received considerable attention in past research. Therefore, in light of the lack of<br />
theoretical maturity around the viewing an ISD process as an organisational routine, this exploratory<br />
research sought to build theory <strong>using</strong> a single instrumental case study design. While an ‘instrumental<br />
case study’ research strategy was adopted for this study, it allowed the researchers to pursue a deep<br />
underst<strong>and</strong>ing of an issue as a primary focus, while the ‘case itself was of secondary interest’ (Stake,<br />
2000). Therefore, to fulfil the objective of this research, studying a single instrumental case facilitated<br />
uncovering <strong>and</strong> teasing out the diverse organisational stories of those ‘living the case’ (Stake, 2000).<br />
See Table 1 for a detailed outline of the case study research protocol.<br />
3.1 Case study<br />
The objective of this exploratory study is to view an ISD process as an organisational routine in an<br />
effort to identify the inefficiencies in the ISD process. Considering the ISD process as an<br />
organisational routine, organised as a NN, will provide a fresh perspective to underst<strong>and</strong>ing an<br />
organisation’s ISD lifecycle. For this exploratory case study research, the organisation is referred to<br />
as DevCo. DevCo has established itself on the global market as a trusted service provider of webbased<br />
data management applications, serving a range of government, healthcare <strong>and</strong> private sector<br />
organisations. Coupling geographical location with specific segments of the ISD lifecycle, the<br />
organisations structure is defined as follows: (i) London (UK) – incorporates business analysis, project<br />
management <strong>and</strong> business development, (ii) Cork (Irel<strong>and</strong>) – incorporates call centre operations, after<br />
sales service <strong>and</strong> first line support, (iii) Moscow (Russia) - incorporates software development,<br />
technology infrastructure maintenance <strong>and</strong> software testing.<br />
DevCo values long term relationships with its clients, to meet <strong>and</strong> exceed their evolving expectations,<br />
which is evident in the long term contracts they hold with their clients. From a process perspective<br />
DevCo demonstrate continuing commitment to developing its software products to the highest quality<br />
st<strong>and</strong>ards (e.g. e-GIF (UK e-Government Interoperability Framework) st<strong>and</strong>ards of best practice,<br />
Royal National Institute of Blind People (RNIB) (See it Right st<strong>and</strong>ard) <strong>and</strong> W3C-WAI (up to AAA)<br />
usability st<strong>and</strong>ards). Furthermore, DevCo offices are certified to the ISO 27001 st<strong>and</strong>ard for<br />
information management <strong>and</strong> security by the British St<strong>and</strong>ards Institute (BSI), ensuring that all<br />
information h<strong>and</strong>led conforms to best practices in a highly secure <strong>and</strong> audited data management<br />
environment.<br />
Emerging from a strong organisational necessity, the research objective was in line with the CEO’s<br />
requirement for an external analysis of DevCo’s ISD lifecycle <strong>and</strong> his belief that it could be more<br />
efficient. As a result, this was the point of departure for the three person research team from which the<br />
case study research protocol was developed (see Table1).<br />
Table 1: Case study research protocol (after: (Kelliher, 2005)<br />
Research Activity Description<br />
Objective To identify the inefficiencies in an ISD process<br />
Approach Case Study (October 2009 – January 2011)<br />
Motivation CEO’s interest in achieving ISD process efficiencies.<br />
Case Selection Process A software development organisation where the CEO sought improvements in the<br />
ways of working<br />
Case Access A unique openness to share information <strong>and</strong> a willingness to make personnel<br />
available for the research, to the extent that operations were suspended for three<br />
days to enable workshops to be carried out<br />
Instrument The research team (three researchers) were the primary research instruments in<br />
the application of the data gathering techniques<br />
Boundary Device ISD lifecycle, the first phase of which is requirements elicitation (RE)<br />
Data Gathering On-site observations by research team; Semi-structured interviews; Round table<br />
Techniques<br />
Data Organisation &<br />
Analysis Techniques<br />
discussions; Intensive on-site workshops with global project team participants<br />
The NN perspective was used to organise the case data <strong>and</strong> facilitate the data<br />
reduction <strong>and</strong> analysis process to build a logical chain of evidence for the case.<br />
430
David Sammon, Tadhg Nagle <strong>and</strong> John McAvoy<br />
3.2 Data gathering, organisation <strong>and</strong> analysis<br />
The sixteen month exploratory research project was broken into two phases for the purposes of data<br />
gathering. The data gathering was conducted over a seven month period (October-April) <strong>using</strong> a<br />
variety of techniques, as presented in Table 1. Table 2 now presents that data gathering conducted in<br />
chronological order. In total, 25 hours of interview data recorded, <strong>and</strong> 24 hours of workshop data<br />
recorded across the three workshops.<br />
Table 2: Chronology of data gathering<br />
Phase/Date Technique Focus<br />
1/October- Interviewing / Round Preliminary group-based interviews/discussions on organisational<br />
December Table Discussion<br />
requirements<br />
2/March-<br />
workshops with participants organised around ISD process for core<br />
On-Site Workshop<br />
April<br />
organisational projects<br />
2/March- Interviewing /<br />
Interviews with BAs/PMs/developers around assessment of<br />
April Observation<br />
communication tool effectiveness within ISD process<br />
Phase 1 data gathering involved preliminary group based interviews <strong>and</strong> discussions that provided a<br />
detailed background description of the organisation <strong>and</strong> its ISD process at a high level. Following on,<br />
Phase 2 of the research strategy set out to provide qualitative richness <strong>and</strong> to develop a deeper<br />
underst<strong>and</strong>ing of the organisation’s ISD process. In particular, after phase 1, themes were identified<br />
from the preliminary group-based interviews/discussions <strong>and</strong> areas of interest were highlighted. This<br />
provided the research team with the opportunity to focus their attentions for phase 2 data gathering. It<br />
was important that phase 2 data gathering was effective as the organisation made a significant<br />
commitment to the research both financially <strong>and</strong> in terms of disruption to operations during the three<br />
workshops. Two of the workshops took place in Moscow (Russia) <strong>and</strong> employees from the London<br />
(UK) <strong>and</strong> Cork (Irel<strong>and</strong>) offices were also made available for participation over a three day period. The<br />
third workshop took place in Cork (Irel<strong>and</strong>) <strong>and</strong> several London (UK) employees were also made<br />
available for participation.<br />
Furthermore, phase 2 data gathering workshops were organised around the projects which defined<br />
the fabric of the ISD organisation to date. For the most part these projects are revenue generating for<br />
external customers (predominantly long-term public sector contracts), with a growing number of<br />
internal customer projects initiated in more recent years – to introduce efficiencies through technology<br />
enhanced processing. Workshop participants were challenged on aspects of requirements elicitation<br />
(RE), development, test <strong>and</strong> release activities currently undertaken by various organisational actors<br />
as part of the existing ISD process execution. Also, due to the globally distributed nature of the<br />
organisation, attention was focused on the effectiveness of the communication tools used (specifically<br />
by business analysts/project managers <strong>and</strong> developers in the absence of face-to-face<br />
communication) in support of various activities in the ISD process.<br />
Analysing the data collected in phase 2, the case data is organised as a narrative network (NN) of the<br />
organisational routine, which provides an insight into the ‘patterns of action’ (c.f. Pentl<strong>and</strong> <strong>and</strong><br />
Feldman, 2008) that define the ISD process. The steps associated with constructing a NN are now<br />
presented in Table 3.<br />
Table 3: Construction of a narrative network (after: Pentl<strong>and</strong> <strong>and</strong> Feldman, 2008)<br />
Step Description This Research Study<br />
1. define boundary<br />
of focal<br />
phenomenon<br />
2. choose a point of<br />
view<br />
3. collect narratives<br />
<strong>and</strong> code the<br />
fragments<br />
4. relate codes by<br />
sequence<br />
The NN is defined by a generic storyline that defines some<br />
sphere of activity. Organisational research uses purpose as an<br />
important part of a boundary.<br />
Fieldwork data will contain data from someone’s point of view,<br />
so we never know the whole story. The researcher can pick a<br />
single point of view or aggregate several different ones.<br />
Gather data <strong>using</strong> methods that seem appropriate to ensure<br />
that narrative fragments are complete <strong>and</strong> that the researcher<br />
can uncover the connections that informants are making<br />
Narrative fragments need to be related in ordered sequence –<br />
a ‘what happens next’?<br />
431<br />
ISD process<br />
Aggregate of views<br />
from BAs/PMs,<br />
developers, testers<br />
Face-to-Face<br />
Interviews; Intensive<br />
Workshops;<br />
Observation<br />
All events were<br />
connected in<br />
sequence
4. Case analysis<br />
David Sammon, Tadhg Nagle <strong>and</strong> John McAvoy<br />
In this section, for the purposes of clarity, we present one aggregated ‘performance’ (c.f. Pentl<strong>and</strong> <strong>and</strong><br />
Feldman, 2008) of the functional events associated with the organisational routine (ISD process). It is<br />
worth noting that for the purposes of this paper, we are documenting what can be<br />
considered the ‘worst-case scenario’ within the ISD process. It is not to say that these<br />
’patterns of action’ always occur within DevCo but they do at times define the fabric of the<br />
organisation’s approach to the ISD process <strong>and</strong> by the organisation’s own admission are<br />
unacceptable <strong>and</strong> need to be changed. The NN is now presented in the next section.<br />
4.1 A narrative network of the ISD process<br />
For the purposes of this paper we are interested in representing the ’patterns of action’ of the DevCo<br />
personnel for the requirements elicitation (RE) <strong>and</strong> development efforts only. Therefore, we have<br />
excluded representing ISD testing for simplicity. The NN is illustrated in Figure 1, while Table 4<br />
contains a list of the functional events/narrative fragments associated with the ISD process.<br />
Figure 1: Narrative network of the ISD process<br />
Table 4: Functional events (narrative fragments) of the ISD process<br />
NN Label Functional Event/Narrative Fragment<br />
ISD1 BAs/PMs gather customer requirements<br />
ISD2 BAs/PMs create tickets (requirements) with a ‘pending status’ on in-house ticketing system<br />
ISD3 Lead developers spend time cleaning the specification (tickets) with BAs/PMs<br />
ISD4<br />
Lead developers flag incomplete requirements with ‘in discussion’ status on in-house ticketing<br />
system<br />
ISD5 Lead developers assign tickets to developers<br />
ISD6 Developers conduct technical research on requirements<br />
ISD7 Developers seek clarification on tickets (requirements) from lead developers<br />
ISD8 Lead developers clarify issues for developers<br />
ISD9 Lead developers seek clarification of issues from BAs/PMs<br />
ISD10 BAs/PMs clarify issues for lead developers<br />
ISD11 Developers write code based on requirements<br />
ISD12 Developers email BAs/PMs about ‘in discussion’ status tickets<br />
ISD13 BAs/PMs send requirements clarifications by email to developers<br />
As can be seen in Figure 1, the ISD process (organisational routine) begins with the BAs/PMs in the<br />
London office gathering the customer requirements (ISD1) <strong>and</strong> structuring the ISD project<br />
requirements as a set of tickets on the in-house ticketing system (ISD2). The lead developers in the<br />
Moscow office then clean the requirements specification with the BAs/PMs (ISD3) <strong>and</strong> categorise<br />
432
David Sammon, Tadhg Nagle <strong>and</strong> John McAvoy<br />
some of the tickets, that have incomplete/vague requirements, with an ’in discussion’ status (ISD4). At<br />
this point the lead developers assign the ’high priority’ fully specified requirements to developers<br />
(ISD5). The developers then undertake research on the technical aspects required to fulfil each<br />
requirement (ISD6) <strong>and</strong> in 100% of all requirements the developers seek some form of<br />
simple/complex clarification for the lead developers (ISD7). Depending on the nature of the<br />
clarification being sought, lead developers either provide the information to the developers directly<br />
(ISD8) at which time the developers then write code based on the requirement (ISD11), or the lead<br />
developers seek clarification on the issues from the BAs in the London office (ISD9). When the<br />
BAs/PMs provide clarification on the issues (ISD10), the lead developers pass the information onto<br />
the developers (ISD8), at which time the developers either commence writing code (ISD11) or<br />
undertake technical research (ISD6) before coding the requirement (ISD11).<br />
As time progresses through the release of the project (a release usually lasting 3 months on average<br />
for most projects) some of the ’in discussion’ status tickets remain incomplete <strong>and</strong> the developers<br />
email the BAs/PMs for clarification on these requirements (ISD12) in an effort to complete the release<br />
on time. This necessitates the BAs/PMs to urgently gather requirements from the customer (ISD1)<br />
<strong>and</strong> once the required information is gathered the BAs/PMs send the updates by email to the<br />
developers (ISD13) to complete the release. On receipt of this requirements clarification information,<br />
the developers undertake further technical research (ISD6) before coding the requirement (ISD11).<br />
4.2 The ISD process inefficiencies as ‘patterns of action’<br />
Based on the storytelling of the organisational actors (PMs/BAs/lead developers/developers) <strong>and</strong><br />
appreciating the narrative fragments generated from their representation of the ISD process (see<br />
Figure 1), four defining ’patterns of action’ emerged which represented a macro perspective on the<br />
functional events of the ISD process. The four ’patterns of action’ were referred to as: BA/PM<br />
Helplessness, Awaiting Communication, Buffer Time Erosion, <strong>and</strong> Pressure Cooker Development by<br />
DevCo personnel. Table 5 provides detail of the narrative fragments from Table 4 associated with<br />
each of the four ’patterns of action’.<br />
Table 5: ISD process ‘patterns of action’<br />
Functional Event/Narrative Fragment Pattern of Action<br />
ISD1 ISD2 ISD3 ISD4 BA/PM Helplessness<br />
ISD4 ISD12 / ISD7 ISD8 / ISD7 ISD9 ISD10 Awaiting Communication<br />
ISD12 ISD1 ISD13 Buffer Time Erosion<br />
ISD13 ISD6 ISD11 Pressure Cooker Development<br />
4.2.1 ‘BA/PM helplessness’ pattern of action<br />
Within DevCo the BAs <strong>and</strong> PMs, based in the London office, are the first points of contact with their<br />
customers. Therefore, the BAs/PMs are responsible for gathering the system requirements from these<br />
end-users; however, managing these customers is a problem for the BAs/PMs <strong>and</strong> as one PM<br />
described the situation “we often feel helpless when determining the requirements of the customer”.<br />
Based on our analysis it is obvious that this sense of helplessness comes from the customers’ lack of<br />
appreciation of the immediate nature of requirements elicitation (RE) as part of an efficient ISD<br />
process. However, this lack of immediacy is linked to the organisation’s willingness to accommodate<br />
the customer <strong>and</strong> the nature of the customer themselves. While this willingness is a unique selling<br />
point for DevCo, in the market for attracting <strong>and</strong> retaining business, it is the root cause of<br />
inefficiencies to their internal downstream ISD processes, due to the fact that the RE process cannot<br />
be completed in an expeditious fashion <strong>and</strong> with the required completeness of information.<br />
As can be seen from the narrative fragments in Table 5, the defining characteristic of the ’BA/PM<br />
Helplessness’ pattern of action, worryingly, is the fact that the RE process ends up with high priority<br />
requirements ’in discussion’ due to incompleteness (ISD4). Therefore, DevCo often find that they are<br />
commencing the development of the customer solution with incomplete, vague <strong>and</strong> in some cases<br />
missing system requirements; where some of the missing requirements are identified later in the ISD<br />
process as being extremely critical to the functionality of the system overall. These incomplete, vague<br />
<strong>and</strong> missing requirements create what is referred to as the ‘Awaiting Communication’ pattern of<br />
action.<br />
433
4.2.2 ‘Awaiting communication’ pattern of action<br />
David Sammon, Tadhg Nagle <strong>and</strong> John McAvoy<br />
Three differing ’Awaiting Communication’ patterns of action are observed within the DevCo ISD<br />
process, caused directly by the ineffective RE process (see Table 5). Two of the patterns of action<br />
(ISD7 ISD8 / ISD7 ISD9 ISD10) ca<strong>using</strong> inefficiency relate directly to the way in which<br />
customer requirements are communicated to the developers, by the BA/PM, <strong>using</strong> their in-house<br />
ticketing system. It emerged during the case that BAs/PMs document requirements by going into a<br />
level of overcomplicated technical detail that is not required by the developers. As suggested by one<br />
of the developers “we want to know what to do, not how to do it, therefore, the BA should better define<br />
the problem, not the solution”. In one extreme case an example was made of a requirements ticket<br />
where four to five years of data history was captured but contained ‘zero useful information for the<br />
developers’. This scenario has led to a situation where developers seek clarification, within their office<br />
or externally from the BA/PM, on 100% of requirements captured on the ticketing system for a project<br />
release. This excess clarification is a waste of time for both developers <strong>and</strong> BAs/PMs themselves <strong>and</strong><br />
links directly to the ineffective representation of the customer requirements by the BA/PM in the first<br />
instance, not to mention if the requirements are also vague/incomplete.<br />
The remaining <strong>and</strong> most challenging of the ’Awaiting Communication’ patterns of action (ISD4 <br />
ISD12) triggers what developers (Moscow office) refer to as the ‘fire-fighting stage’ <strong>and</strong> relates to the<br />
number of vague/incomplete requirements remaining to be developed at the end of a project release<br />
to the customer. The key point of this example is the fact that these requirements are considered ‘high<br />
priority’ for the release by the BA/PM <strong>and</strong> the customer, but remain incomplete in terms of<br />
specification. Based, on our analysis, it is the developers who flag the existence of these<br />
vague/incomplete requirements to the BA/PM coming toward the end of the release. This creates<br />
what is referred to as ‘Buffer Time Erosion’ pattern of action by the BAs/PMs.<br />
4.2.3 ‘Buffer time erosion’ pattern of action<br />
From the BA/PM perspective the term ‘Buffer Time Erosion’ suggests that the end of the release is<br />
close for the specific project <strong>and</strong> as one PM suggests “the developers have nothing to do on the<br />
project <strong>and</strong> are awaiting responses on the high priority requirements that are still vague/incomplete in<br />
terms of specification”. It is important to note that the incompleteness of the requirements is a BA/PM<br />
problem <strong>and</strong> dem<strong>and</strong>s an additional execution of the RE process by the BAs/PMs. Therefore, the<br />
BA/PM gets the customer to provide a complete specification for the outst<strong>and</strong>ing requirements <strong>and</strong><br />
passes the details to the developers in the Moscow office. As a result, an ineffective RE process at<br />
the outset of the release (the ’BA/PM Helplessness’ pattern of action) creates the ‘Buffer Time<br />
Erosion’ pattern of action at a later stage in the release (ISD process) requiring a further attempt at<br />
RE by the BA/PM. However, this revisited completion of the specification of requirements triggers the<br />
’Pressure Cooker Development’ pattern of action.<br />
4.2.4 ‘Pressure cooker development’ pattern of action<br />
The ’Pressure Cooker Development’ pattern of action (ISD13 ISD6 ISD11) exists due to the<br />
incorporation of vague/incomplete requirements into an existing system release which will need to be<br />
researched by developers, prior to writing the code, to avoid technical inconsistencies with existing<br />
functionality. As a result, the collective development workload required by developers to complete the<br />
release is greater than the time period remaining (see example in ’Awaiting Communication’ pattern of<br />
action). Therefore, in an effort to complete the project release for the customer, additional developers<br />
may need to be seconded to the development efforts to ensure that the release date is not missed. It<br />
was reported by developers that this has an impact on the progress made in other projects at that<br />
point in time but is a necessary step to ensure customer satisfaction in terms of the delivery of<br />
expected functionality. Other issues are caused by this reassignment of developers but they are<br />
beyond the scope of what is being specifically addressed in this paper; for example, the late testing of<br />
the functionality contained in the release.<br />
5. Summary: ISD as a ‘live routine’<br />
Based on our observations <strong>and</strong> analysis it is obvious that DevCo need a more efficient ISD process.<br />
Therefore, the ‘performative’ aspect of the organisational routine needs to be improved without<br />
constraining the enactment of the routine. A set of rules could be suggested to model a partial<br />
representation of the ‘ostensive’ aspect of the organisational routine (ISD process) in an effort to<br />
express a “potentially infinite set of performances with a finite set of rules” (Pentl<strong>and</strong> et al., 2010),<br />
434
David Sammon, Tadhg Nagle <strong>and</strong> John McAvoy<br />
p.929). It is worth reiterating that the ‘ostensive’ aspect of a routine is a ‘generative resource’ where<br />
actors ‘draw on their underst<strong>and</strong>ing of a routine to reproduce it, to plan, guide, <strong>and</strong> account for their<br />
actions with respect to the routine’ (Pentl<strong>and</strong> <strong>and</strong> Feldman, 2007, p.787). This is similar to the<br />
concept of sense making (c.f. (Weick et al., 1999) where the ‘ostensive’ aspects of routines allow<br />
actors to recognise <strong>and</strong> organise diverse parts of a performance (story) as a coherent whole (c.f.<br />
Pentl<strong>and</strong> <strong>and</strong> Feldman, 2007).<br />
Table 6: Ostensive rule to address ISD process inefficiencies<br />
Pattern of Action Process Inefficiency Ostensive Rule<br />
BA/PM Helplessness<br />
Awaiting Communication<br />
Buffer Time Erosion<br />
Pressure Cooker<br />
Development<br />
‘High priority’ customer requirements are not<br />
completely specified by BAs/PMs<br />
Developers seek clarification on ‘high priority’<br />
customer requirements<br />
BAs/PMs return to customer to gather ‘high<br />
priority’ requirements before eminent end of<br />
release<br />
Developers work under pressure to complete<br />
‘high priority’ requirements for customer release<br />
Every customer requirement<br />
that is gathered, if of a ‘high<br />
priority’, should be<br />
completely specified<br />
regarding ‘what the customer<br />
wants’ - otherwise its priority<br />
is dropped until complete<br />
specification is available<br />
In the context of our exploratory case study research a rule could be suggested that defines a valid<br />
sequence of action in the ISD process. However, it is important to appreciate that for whatever reason<br />
this hypothesised rule (see Table 6), no matter how simple, will not always be attainable in practice.<br />
Therefore, while a future failure to completely specify requirements could be generated by<br />
expedience, time pressure, customer uncertainty, etc., the organisational actors may be more<br />
equipped to appreciate the implications of such a failure <strong>and</strong> the improvisations that are needed to be<br />
made as a result of having a partial representation of the ‘ostensive’ aspect of the organisational<br />
routine (ISD process). While we have suggested generating a rule, that defines a valid sequence of<br />
action in the ISD process, it is not suggested as imposing structure on the ‘performative’ aspect of the<br />
organisational routine, but more to highlight the ‘ostensive’ aspect. As argued by (Fiol <strong>and</strong> O'Connor,<br />
2003) actions can become routinised if excessively governed by rules <strong>and</strong> procedures, while more<br />
room can be allowed for individual discretion if structures are less specified, allowing for a more fluid,<br />
flexible, <strong>and</strong> adaptive performance (‘performative’ aspect of the organisational routine).<br />
References<br />
Benbasat, I., Goldstein, D. K. & Mead, M. 1987. The Case Study Research Strategy In Studies Of <strong>Information</strong><br />
Systems. Mis Quarterly, 11, 369-386.<br />
Byrd, T. A., Cossick, K. L. & Zmud, R. W. 1992. A Synthesis Of Research On Requirements Analysis And<br />
<strong>Knowledge</strong> Acquisition Techniques. Mis Quarterly, 16, 117-28.<br />
Chakraborty, S., Sarker, S. & Sarker, S. 2010. An Exploration Into The Process Of Requirements Elicitation: A<br />
Grounded Approach. Journal Of The Association For <strong>Information</strong> Systems, 11, 212-249.<br />
Eisenhardt, E. M. 1989. Building Theories From Case Study Research. Academy Of <strong>Management</strong> Review, 14,<br />
532-550.<br />
Fiol, C. M. & O'connor, E. J. 2003. Waking Up! Mindfulness In The Face Of B<strong>and</strong>wagons. Academy Of<br />
<strong>Management</strong> Review, 28, 54-70.<br />
Hansen, S. & Rennecker, J. 2010. Getting On The Same Page: Collective Hermeneutics In A Systems<br />
Development Team. <strong>Information</strong> And Organization, 20, 44-63.<br />
Kelliher, F. 2005. Interpretivism And The Pursuit Of Research Legitimisation: An Integrated Approach To Single<br />
Case Design. The Electronic Journal Of Business Research Methodology, 3, 123-132.<br />
Mathiassen, L., Tuunanen, T., Saarinen, T. & Rossi, M. 2007. A Contingency Model For Requirements<br />
Development. Journal Of The Assoication For <strong>Information</strong> Systems, 8, 569-597.<br />
Pentl<strong>and</strong>, B. T. & Feldman, M. S. 2007. Narrative Networks: Patterns Of Technology And Organization.<br />
Organization Science, 18, 781-795.<br />
Pentl<strong>and</strong>, B. T. & Feldman, M. S. 2008. Designing Routines: On The Folly Of Designing Artifacts, While Hoping<br />
For Patterns Of Action. <strong>Information</strong> And Organization, 18, 235-250.<br />
Pentl<strong>and</strong>, B. T., Hærem, T. & Hillison, D. 2010. Comparing Organizational Routines As Recurrent Patterns Of<br />
Action. Organization Studies, 31, 917-940.<br />
Stake, R. E. (Ed.) 2000. Case Studies, London: Sage.<br />
Weick, K. E., Sutcliffe, K. M. & Obstfeld, D. 1999. Organizing For High Reliability: Processes Of Collective<br />
Mindfulness. Research In Organizational Behavior, Vol. 21, 1999.<br />
Yeow, A. & Faraj, S. 2011. Using Narrative Networks To Study Enterprise Systems And Organizational Change.<br />
International Journal Of Accounting <strong>Information</strong> Systems, In Press, Corrected Proof.<br />
435
Using Geographic <strong>Information</strong> to Assess Urban<br />
Environmental Indicators in the City of Lisbon<br />
Teresa Santos, Ségio Freire <strong>and</strong> José António Tenedório<br />
e-GEO, FCSH, Universidade Nova de Lisboa, Portugal<br />
teresasantos@fcsh.unl.pt<br />
sfreire@fcsh.unl.pt<br />
ja.tenedorio@fcsh.unl.pt<br />
Abstract: Cities are complex <strong>and</strong> dynamic systems that reproduce the interactions between socio-economic <strong>and</strong><br />
environmental processes at a local <strong>and</strong> global scale. This complexity constitutes a significant challenge for urban<br />
planning. One effective source of information about the urban environment is remote sensing data. Sealed<br />
surfaces generate intense rainwater run-off which the drainage network cannot accommodate, thus promoting<br />
flooding events. Mapping urban flood risk implies knowing the spatial distribution <strong>and</strong> extent of the pervious <strong>and</strong><br />
impervious areas in the city. These are important variables for planning, mitigation, preparedness <strong>and</strong> response<br />
to potential events. Green areas are an important l<strong>and</strong> use in urban areas, performing relevant environment<br />
functions, such as improving urban climate, reducing atmospheric pollution, providing amenities, aesthetical<br />
benefits <strong>and</strong> a good environment for urban populations. However, the urbanization process generally occurs at<br />
the expense of agricultural or forested areas, thus contributing to degrade the urban environment quality. The<br />
present case study addresses the quantification of impervious l<strong>and</strong> at the city scale through remote sensing data.<br />
A methodology for generating a large-scale L<strong>and</strong> Cover Map for the city of Lisbon, Portugal is proposed. The<br />
data source is Very-High Resolution (VHR) IKONOS pansharp image, from 2008, with a spatial resolution of 1 m,<br />
<strong>and</strong> a normalized Digital Surface Model (nDSM) from 2006. The methodology was based on the object-based<br />
extraction of features of interest, namely: vegetation, soil <strong>and</strong> impervious surfaces. After deriving the l<strong>and</strong> cover<br />
information from remote sensing data, several applications can be implemented. Indicators on l<strong>and</strong> sealing area,<br />
quantification of green area, or the available vacant soil in the city, are ecological measures that can be used as<br />
tools for cities to assess <strong>and</strong> communicate different environmental risks, <strong>and</strong> promote strategies <strong>and</strong> measures of<br />
sustainable urban development <strong>and</strong> disaster risk management. It is demonstrated that <strong>using</strong> a methodology<br />
based on large-scale geographic information, quick updating of detailed l<strong>and</strong> cover information is possible <strong>and</strong><br />
can be used to support decisions in a crisis situation where official maps are generally outdated, or to evaluate<br />
the quality of the urban environment.<br />
Keywords: very-high resolution satellite image, impervious mapping, soil sealing, Lisbon, IKONOS, LiDAR<br />
1. Introduction<br />
Regular updates of l<strong>and</strong> cover status <strong>and</strong> l<strong>and</strong> cover condition are required to improve our<br />
underst<strong>and</strong>ing of nearly every aspect of the changing environment, including fluxes of water, carbon<br />
dioxide <strong>and</strong> other trace gases, changing coastlines <strong>and</strong> their influence on marine resources,<br />
biodiversity, l<strong>and</strong> <strong>and</strong> soil resources use intensity, or urban patterns of environmental significance<br />
(CEOS 2010). The present study demonstrates that automatic classification of remote sensing data<br />
allows creating spatial knowledge, which can be implemented to support decision-making, identifying<br />
major areas for policy intervention. Integrated environmental information based on urban indicators<br />
allows for policy monitoring <strong>and</strong> evaluation.<br />
L<strong>and</strong> impermeabilization is a direct result of urban development. The occurrence of surfaces<br />
impenetrable by water like roads, buildings or sidewalks, induces changes on the natural environment<br />
like the decrease in water quality, fish\animal populations or groundwater reserves, <strong>and</strong> increase in<br />
habitat fragmentation, flooding events or urban heat isl<strong>and</strong> effects. Consequently, the amount of<br />
impervious surface area is a good measure of environmental quality.<br />
Several methods can be used to estimate the percentage of impervious l<strong>and</strong> at different l<strong>and</strong>scape<br />
levels. Maps with the spatial distribution of the city’s l<strong>and</strong> cover can be very helpful in reporting areas<br />
which are more vulnerable <strong>and</strong> where negative impacts of urbanization should be minimized.<br />
One obvious source of information about the urban environment is remote sensing data. The<br />
constantly increasing availability <strong>and</strong> accessibility of modern remote sensing technologies has<br />
provided new opportunities for a wide range of urban applications such as mapping <strong>and</strong> monitoring of<br />
the urban environment (l<strong>and</strong> cover, l<strong>and</strong> use, morphology, urban structural types), socio-economic<br />
estimations (population density), characterization of urban climate (microclimate, human health<br />
conditions), analysis of regional <strong>and</strong> global impacts – (ground water <strong>and</strong> climate modeling, urban heat<br />
isl<strong>and</strong>s) or urban security <strong>and</strong> emergency preparedness (sustainability, vulnerability) (Esch 2010).<br />
436
Teresa Santos, Ségio Freire <strong>and</strong> José António Tenedório<br />
Remote sensing imagery due to its spectral, temporal <strong>and</strong> geographic characteristics, can be used in<br />
monitoring processes, as a source for related information like l<strong>and</strong> use <strong>and</strong> l<strong>and</strong> cover, surface<br />
roughness, terrain relief or soil moisture. Sawaya et al. (2003) explored the potential of VHR IKONOS<br />
<strong>and</strong> QuickBird satellite imagery for mapping <strong>and</strong> analysis of urban impervious surface area <strong>and</strong> water<br />
resources at local scales. Bauer et al. (2004) mapped <strong>and</strong> quantified the degree of impervious surface<br />
area over a large geographic area <strong>and</strong> over time, <strong>using</strong> a multi-temporal L<strong>and</strong>sat imagery data set.<br />
Yuan <strong>and</strong> Bauer (2006) compared the normalized difference vegetation index (NDVI) <strong>and</strong> percent<br />
impervious surface as indicators of surface urban heat isl<strong>and</strong> effects in L<strong>and</strong>sat imagery. Aponte<br />
(2007) used a QuickBird image in order to detect different types of impervious surfaces, <strong>and</strong> studied<br />
the relationship between the rainfall-infiltration-runoff rates, the l<strong>and</strong> cover <strong>and</strong> the geomorphologic<br />
susceptibility. Zhang et al. (2009) extracted vegetation <strong>and</strong> impervious surface as indicators of urban<br />
l<strong>and</strong> surface temperature from IKONOS imagery.<br />
The present work details the development of an updated <strong>and</strong> detailed map of imperviousness for the<br />
city of Lisbon <strong>using</strong> IKONOS-2 satellite imagery. The Vegetation-Impervious-Soil (VIS) model,<br />
developed by Ridd (1995), was used as the basis for extracting l<strong>and</strong> cover information at the cityscale.<br />
It is a conceptual representation that allows simplifying the analysis of urban surfaces by<br />
decomposing it in three basic l<strong>and</strong> cover components: vegetation, impervious surface <strong>and</strong> soil.<br />
After collecting data on l<strong>and</strong> cover from remote sensing data, several indicators can be assessed.<br />
Indicators on l<strong>and</strong> sealing area, quantification of green area, or the vacant l<strong>and</strong> available in the city,<br />
are ecological measures that can be used for monitoring <strong>and</strong> analyzing trends over the territory.<br />
Studies on impacts of urbanization, responses to natural <strong>and</strong> man-made disasters, vulnerability<br />
analysis or ho<strong>using</strong> conditions, all require l<strong>and</strong>-based indicators. The geographical data constitute the<br />
base of the spatial representation of the indicators. Urban indicators are designed to measure the<br />
quality of life <strong>and</strong> the nature of development of an urban area. These indicators can be used to make<br />
policy <strong>and</strong> planning decisions, to identify whether policy goals <strong>and</strong> targets are being met, <strong>and</strong><br />
sometimes to predict change.<br />
2. Data set <strong>and</strong> study area<br />
The dataset explored in this paper includes spectral data, acquired by the IKONOS-2 satellite. The<br />
IKONOS image was acquired in June, 30, 2008, <strong>and</strong> has a spatial resolution of 4 m in the<br />
multispectral mode (visible <strong>and</strong> near-infrared b<strong>and</strong>s) <strong>and</strong> 1 m in the panchromatic mode, <strong>and</strong> a<br />
radiometric resolution of 11 bits.<br />
The study area is the city of Lisbon (Figure 1). The municipality occupies an area of 84 Km 2 , <strong>and</strong> is a<br />
typical European capital city, with a very diverse l<strong>and</strong> use dynamics, varying from historical<br />
neighborhoods where the street-network is dense <strong>and</strong> the most of the area is built-up, to modern<br />
residential ones, with on-going construction of roads <strong>and</strong> multi-family buildings. Between these two<br />
situations, there are more heterogeneous places with l<strong>and</strong> uses such as residential, parks,<br />
agriculture, vacant l<strong>and</strong>, industrial, utilities, <strong>and</strong> schools.<br />
3. Methodology<br />
The cartographic workflow based on remote sensing data, begins with the pre-processing stage<br />
where the images are orthorectified. Afterwards, the digital processing takes place to produce a map<br />
with the location of the l<strong>and</strong> cover features.<br />
The nomenclature is organized in two levels of detail, following the VIS model. The 1 st level includes<br />
the classes “Vegetation”, “Impervious Surfaces”, <strong>and</strong> “Soil”. On the 2 nd level, seven classes were<br />
defined: “Trees”, “Low Vegetation”, “Buildings”, “Roads”, “Other impervious surfaces”, “Soil”, <strong>and</strong><br />
“Shadows <strong>and</strong> Water” (Table 1).<br />
Green areas are an important l<strong>and</strong> use in urban areas which perform relevant environment functions,<br />
such as improving urban climate, reducing atmospheric pollution, providing amenities, aesthetical<br />
benefits <strong>and</strong> a good environment for urban population. Green l<strong>and</strong> cover includes trees, shrubl<strong>and</strong>,<br />
herbaceous <strong>and</strong> agriculture fields.<br />
Impervious surfaces can generally be defined as anthropogenic features, such as roads, buildings,<br />
sidewalks <strong>and</strong> parking lots, through which water cannot infiltrate into the soil. The artificial surface<br />
cover can be used to evaluate the quality of urban streams, <strong>and</strong> to study effects of runoff. Impervious<br />
437
Teresa Santos, Ségio Freire <strong>and</strong> José António Tenedório<br />
surface is increasingly recognized as a key indicator for assessing the sustainability of l<strong>and</strong> use<br />
changes due to urban growth.<br />
Figure 1: Study area <strong>and</strong> data set used for building Lisbon’s impervious surface map<br />
Table 1: L<strong>and</strong> cover nomenclature<br />
Level 1 Level 2<br />
Vegetation Trees<br />
Low vegetation<br />
Impervious surface Buildings<br />
Roads<br />
Other impervious surfaces<br />
Soil Soil<br />
Shadow <strong>and</strong> Water Shadow <strong>and</strong> Water<br />
Soil is vacant l<strong>and</strong> <strong>and</strong> is usually comprised of soil with little vegetation, thin soil, s<strong>and</strong> or rocks.<br />
Shadows occur in remotely sensed imagery when objects totally or partially occlude the direct light<br />
from a source of illumination, which include cast shadows (shadows cast on the ground, or on other<br />
objects, by high-rise objects), <strong>and</strong> self-shadows (the part of the object that is not illuminated)<br />
(Salvador et al. 2001). Great difficulty arises in classification <strong>and</strong> interpretation of shaded objects in an<br />
image due to the reduction or total loss of spectral information of those shaded objects (Dare 2005).<br />
This issue is particularly significant in urban environments where tall buildings are often present.<br />
Water is included in the same class as shadow, since both are dark objects in the image that will not<br />
be used for producing urban indicators.<br />
3.1 Pre-processing<br />
Based on the original IKONOS-2 imagery, a pansharp image of the visible <strong>and</strong> panchromatic b<strong>and</strong>s<br />
was produced, <strong>using</strong> the method available at PCI Geomatica. This new pansharp image has a spatial<br />
resolution of 1 m. The IKONOS-2 pansharp image was then orthorectified in order to reduce the<br />
geometric distortions introduced by the relief <strong>and</strong> to attribute a national coordinate system (ETRS89).<br />
438
Teresa Santos, Ségio Freire <strong>and</strong> José António Tenedório<br />
The orthorectification was performed based on the Rational Polynomial Coefficients (RPCs) available<br />
with the image, <strong>and</strong> a set of 48 ground control points retrieved from the 1:1 000 planimetry <strong>and</strong><br />
altimetric cartography of 1998 (a Digital Terrain Model - DTM). Furthermore, 55 check points were<br />
selected to evaluate the transformation. The obtained Root Mean Square Error (RMSE) was less than<br />
one pixel, as desired. Afterwards, a Normalized Difference Vegetation Index (NDVI) (Rouse et al.<br />
1973) image was produced to integrate the dataset for feature extraction.<br />
The images selected to be used in the next processing stages were the IKONOS pansharp image (1<br />
m resolution) <strong>and</strong> the NDVI image (1 m resolution).<br />
3.2 Feature extraction<br />
Current <strong>and</strong> future VHR satellite imagery provides an advantageous alternative to traditional methods<br />
in detecting <strong>and</strong> mapping urban features. However, their effective use requires the development of<br />
novel approaches that enable a timely <strong>and</strong> consistent discrimination, classification <strong>and</strong> delineation of<br />
these specific l<strong>and</strong> uses with quality indices that match the corresponding map scale. In this context,<br />
Geographic Object Based Image Analysis (GEOBIA) approaches are the recent response to this<br />
emerged sophisticated user needs <strong>and</strong> expectations on geographic information products (Hay <strong>and</strong><br />
Castilla 2008).<br />
All feature extraction was performed in Feature Analyst (FA) v4.2 (by VLS) for <strong>ArcGIS</strong> (ESRI). The<br />
classification is based on a supervised approach <strong>and</strong> aims at extracting the three main components of<br />
l<strong>and</strong> cover: “Vegetation”, “Impervious Surfaces” <strong>and</strong> “Soil”. The first step is the manual digitizing of<br />
training areas for each class, followed by the definition of parameters like the number of b<strong>and</strong>s to be<br />
classified, the type of input representation, <strong>and</strong> aggregation. The classifier uses feature<br />
characteristics such as spectral response/color, size, shape, texture, pattern, shadow, <strong>and</strong> spatial<br />
association, for feature classification. After an initial classification, there is the possibility to remove<br />
clutter or add missing areas. This hierarchical learning adaptive process allows to iteratively improve<br />
the image classification. The classified map can then be post-processed to aggregate <strong>and</strong><br />
geometrically generalize the features.<br />
The first class to be extracted was “Shadow <strong>and</strong> Water”. Dark objects, that include both water <strong>and</strong><br />
shadows, were extracted with a histogram thresholding method. A synthetic brightness image was<br />
initially computed though the mean value of the near-infrared, red <strong>and</strong> green b<strong>and</strong>s <strong>and</strong> then a pixelbased<br />
histogram of brightness was analyzed to determine an optimum threshold value for shadows<br />
<strong>and</strong> non-shadows (a threshold value of 170 was set). As mentioned by Zhou et al. (2009), this<br />
histogram is bimodal, with the lower part being occupied by the darker features (shadows <strong>and</strong> water).<br />
In our case study, the selected threshold included shadows <strong>and</strong> deep water bodies.<br />
After extracting shadows <strong>and</strong> water elements, the next steps explored the possibility of classifying the<br />
study area in two major classes - “Vegetation”, “No-vegetation” – <strong>and</strong> in the subsequent stages, each<br />
individual class of the nomenclature was extracted independently.<br />
The vegetation extraction was conducted for the unclassified areas (i.e., no shadow or water<br />
elements). In order to separate vegetated from non-vegetated surfaces in the urban environment, the<br />
NDVI was used, based on the pansharp image. A threshold of 0.22 was determined depending on the<br />
intensity values to mask the vegetated regions. This layer st<strong>and</strong>s for the level 1 class “Vegetation”<br />
<strong>and</strong> includes the city’s green surface. In the 2 nd level of the nomenclature, two classes were<br />
distinguished: “Trees” <strong>and</strong> “Low Vegetation”. The first class identifies trees <strong>and</strong> tall bushes, whereas<br />
the other identifies lawns <strong>and</strong> other herbaceous vegetation. The “Trees” were extracted with FA <strong>using</strong><br />
8 training areas, the pansharp <strong>and</strong> the NDVI image, Bull Eye’s 3 for the input representation, width 5,<br />
masking in the level 1 class “Vegetation”, <strong>and</strong> 5 pixels of aggregation. After training the classifier, the<br />
final map was obtained after one ‘add missing areas’ process. The low vegetation class was the<br />
remaining vegetation.<br />
The next major class to be extracted was “Soil”, <strong>and</strong> was applied in the unclassified areas (i.e., no<br />
shadow, no water, <strong>and</strong> no vegetation). The dataset included the pansharp image <strong>and</strong> the nDSM. The<br />
classifiers’ learning was done in two independent extractions, considering two types of soil classes:<br />
bare l<strong>and</strong> with some earth, <strong>and</strong> thin soil. Bare l<strong>and</strong> was extracted with the Manhattan algorithm, width<br />
3, <strong>and</strong> 100 pixels of aggregation, <strong>and</strong> the other class with the same algorithm, but considering 50<br />
pixels for aggregation. The bare soil was subject to an iteration of removing clutter. The final step was<br />
439
Teresa Santos, Ségio Freire <strong>and</strong> José António Tenedório<br />
the generalization of the soil polygons <strong>using</strong> the aggregate polygons tool from <strong>ArcGIS</strong>. The<br />
parameters were merging polygons that distance 2 m, <strong>and</strong> considering areas grater or equal to 100<br />
m 2 .<br />
The map of impervious areas includes a wide range of materials, some of which have very different<br />
spectral properties (e.g., pavement, concrete, roof tiles, etc.). The 1 st level class “Impervious Surface”<br />
corresponds to the l<strong>and</strong> surface after masking out the “Vegetation”, “Soil”, “Shadow”, <strong>and</strong> “Water”<br />
classes. In the 2 nd level of the nomenclature, three classes were distinguished: “Buildings”, “Roads”<br />
<strong>and</strong> “Others”, based on the pansharp image <strong>and</strong> the nDSM.<br />
“Buildings” were extracted in three stages, considering different roof materials. For the red tiles, the<br />
parameters used were Manhattan representation, width 7, <strong>and</strong> 75 pixels of aggregation. For the<br />
darker roof materials <strong>and</strong> for the brighter ones, Manhattan representation, width 7, <strong>and</strong> 100 pixels of<br />
aggregation were the selected parameters. All learning’s were followed by remove clutter or add<br />
missing data iterations to reach the final “Buildings” class. The last step included generalizing the<br />
building polygons <strong>using</strong> the same parameters as for the “Soil” class: merging polygons that distance 2<br />
m, <strong>and</strong> considering areas grater or equal to 100 m 2 .<br />
The class “Roads” was extracted in three independent processes, <strong>using</strong> different parameters. For the<br />
larger roads, Bull’s Eye 2, width 25, <strong>and</strong> 1100 pixels of aggregation were considered. For the narrow<br />
roads, Bull’s Eye 2, width 19, <strong>and</strong> 500 pixels of aggregation were considered. The remaining asphalt<br />
pavement was extracted with Bull’s Eye 2, width 25, <strong>and</strong> 500 pixels of aggregation. These three<br />
layers were then merged to produce the “Roads” class. The final layer was obtained by<br />
generalization, <strong>using</strong> 2 m as merging distance <strong>and</strong> 100 m 2 as minimum area.<br />
The “Other impervious surfaces” (like sidewalks or railroads), were the remaining areas within the<br />
“Impervious surface” class, after masking out the “Buildings” <strong>and</strong> “Roads” classes.<br />
Figure 2 shows the final L<strong>and</strong> Cover Map produced for 2008 (LCM2008), for the city of Lisbon, <strong>using</strong><br />
satellite data.<br />
3.3 Accuracy assessment<br />
The thematic accuracy of the LCM2008 was evaluated based on a stratified r<strong>and</strong>om sampling. For<br />
each strata (i.e., each level 2 l<strong>and</strong> cover class), 100 r<strong>and</strong>om points were analyzed through visual<br />
analysis of the imagery <strong>and</strong> ancillary data. From the 700 samples, 2 were excluded from the<br />
evaluation because it was not possible to correctly identify the class. The samples were then used to<br />
build the error matrix <strong>and</strong> to derive thematic accuracy indexes. From this analysis, we conclude that<br />
the LCM2008 has an Overall Accuracy of 89% <strong>and</strong> a KHAT statistic of 87%, in the most detailed level.<br />
These values indicate great agreement between the reference data <strong>and</strong> the classified map.<br />
4. Building urban indicators<br />
Studies on impacts of urbanization, responses to natural <strong>and</strong> man-made disasters, vulnerability<br />
analysis or ho<strong>using</strong> conditions, all require updated l<strong>and</strong> cover information. In this case study, we<br />
propose a set of indicators, strictly assessed from VHR imagery.<br />
From LCM2008, two variables are extracted for building the proposed urban indicators: the area<br />
(Table 2) <strong>and</strong> the spatial distribution of each l<strong>and</strong> cover class in the city (Figure 2). Using the area of<br />
each l<strong>and</strong> cover, urban environmental indicators strictly based on VHR imagery can be assessed<br />
(Table 3).<br />
5. Conclusions<br />
The LCM2008 provides a detailed <strong>and</strong> cost-effective digital map of the city of Lisbon. This case study<br />
demonstrates the utility of l<strong>and</strong> cover mapping for building urban indicators for monitoring planning<br />
actions. The mapping methodology presented, ensures that urban planners have updated data on<br />
l<strong>and</strong> cover at a regular basis. This tool can be used for monitoring the incidence of l<strong>and</strong> cover change<br />
within the city, decide on which areas of priority intervention, or assess natural resource sites for<br />
preservation <strong>and</strong> restoration.<br />
440
Teresa Santos, Ségio Freire <strong>and</strong> José António Tenedório<br />
Figure 2: L<strong>and</strong> cover map of 2008 derived from IKONOS imagery for the city of Lisbon<br />
Table 2: Areas of the level 1 <strong>and</strong> 2 l<strong>and</strong> cover classes in the city of Lisbon<br />
Level 1 Area Level 2 Area<br />
Vegetation 2428 Trees 1101<br />
Low vegetation 1327<br />
Impervious surface 4907 Buildings 1213<br />
Roads 1352<br />
Other impervious surfaces 2342<br />
Soil 839 Soil 839<br />
Shadow <strong>and</strong> Water 299 Shadow <strong>and</strong> Water 299<br />
441
Teresa Santos, Ségio Freire <strong>and</strong> José António Tenedório<br />
Table 3: Urban indicators based on VHR data, in the city of Lisbon<br />
Acknowledgements<br />
Indicator based on VHR data Value<br />
Green area available in the city 29 %<br />
Tree area available in the city 13 %<br />
Bare soil available in the city 101 %<br />
Impervious area available in the city 58 %<br />
Building area available in the city 14 %<br />
Impervious area that is occupied by Building 4<br />
Green area vs. impervious area 0.5<br />
Pervious area vs. impervious area 0.7<br />
This work was conducted in the framework of project GeoSat - Methodologies to extract large scale<br />
GEOgraphical information from very high resolution SATellite images, funded by the Portuguese<br />
Foundation for Science <strong>and</strong> Technology (PTDC/GEO/64826/2006).<br />
References<br />
Aponte, A.G.P. (2007) “Runoff coefficients <strong>using</strong> a quickbird image for mapping flood hazard in a Tropical<br />
Coastal City, Campeche, Mexico”, Geoscience <strong>and</strong> Remote Sensing Symposium, 2007. IGARSS 2007.<br />
IEEE International, pp 4702 – 4706.<br />
Bauer, M.E., Heinert, N., Doyle, J. (2004) “Impervious Surface Mapping <strong>and</strong> Change Monitoring <strong>using</strong> L<strong>and</strong>sat<br />
Remote Sensing”, American Society of Photogrammetry <strong>and</strong> Remote Sensing Annual Conference –<br />
ASPRS, Denver, Colorado.<br />
CEOS, (2010) “The Earth Observation h<strong>and</strong>book”, [online], Committee on Earth Observation Satellites,<br />
http://www.eoh<strong>and</strong>book.com/.<br />
Dare, P.M. (2005) “Shadow analysis in high-resolution satellite imagery of urban areas”, Photogrammetric<br />
Engineering & Remote Sensing, Vol. 71, No. 2, pp 169–177.<br />
Esch, T. (2010) “Urban Remote Sensing – How Can Earth Observation Support the Sustainable Development of<br />
Urban Environments?” REAL CORP 2010 Cities for Everyone. Liveable, Healthy, Prosperous, Vienna,<br />
Austria.<br />
Hay, G. J., <strong>and</strong> Castilla, G. (2008) “Geographic Object-Based Image Analysis (GEOBIA): A new name for a new<br />
discipline?”, Object-Based Image Analysis – spatial concepts for knowledge-driven remote sensing<br />
applications, Eds: T. Blaschke, S. Lang, G. J. Hay, Springer-Verlag., pp 75-89.<br />
Ridd, M.K. (1995) “Exploring a V-I-S (Vegetation-Imperious Surface-Soil) Model or Urban Ecosystem Analysis<br />
Through Remote Sensing: Comparative Anatomy of Cities”, International Journal of Remote Sensing, Vol.<br />
16, pp 2165-2185.<br />
Rouse, J.W., Hass, R.H., Schell, J.A., <strong>and</strong> Deering, D.W. (1973) “Monitoring vegetation systems in the great<br />
plains with ERTS, Third NASA ERTS Symposium, Vol. 1, pp 309-317.<br />
Salvador, E., Cavallaro, A., Ebrahimi, T. (2001) “Shadow identification <strong>and</strong> classification <strong>using</strong> invariant color<br />
models”, IEEE International Conference on Acoustics, Speech <strong>and</strong> Signal Processing, Vol. 3, pp<br />
1545−1548.<br />
Sawaya, K., Olmanson, L., Heinert, N., Brezonik, P., Bauer, M. (2003) ”Extending Satellite Remote Sensing to<br />
Local Scales: L<strong>and</strong> <strong>and</strong> Water Resources Monitoring <strong>using</strong> High-resolution Imagery”, Remote Sensing of<br />
Environment, Vol. 88, pp 144-156.<br />
Yuan, F., Bauer, M.E. (2006) “Mapping impervious surface area <strong>using</strong> high resolution imagery: a comparison of<br />
object-oriented classification to per-pixel classification”, American Society of Photogrammetry <strong>and</strong> Remote<br />
Sensing ASPRS Annual Conference, Reno, Nevada.<br />
Zhang, X., Zhong, T., Wang, K., Cheng, Z. (2009) “Scaling of impervious surface area <strong>and</strong> vegetation as<br />
indicators to urban l<strong>and</strong> surface temperature <strong>using</strong> satellite data”, International Journal of Remote Sensing,<br />
Vol. 30, pp 841-859.<br />
Zhou, W., Huang, G., Troy, A., Cadenasso, M.L. (2009). “Object based l<strong>and</strong> cover classification of shaded areas<br />
in high spatial resolution imagery of urban areas: A comparison study”, Journal of Remote Sensing of<br />
Environment, Vol. 113, pp 1769-1777.<br />
442
Reflections on the Role of the Lecturer as Teacher,<br />
Researcher <strong>and</strong> Mentor in a Project-Based Approach for<br />
IS/IT Majors at Three Different Academic Institutions<br />
Elsje Scott 1 , Peter Weimann 2 <strong>and</strong> Nata van der Merwe 3<br />
1<br />
University of Cape Town, South Africa<br />
2<br />
Beuth Hochschule, Berlin, Germany<br />
3<br />
Cape Peninsula University of Technology, Cape Town, South Africa<br />
elsje.scott@uct.ac.za<br />
weimann@beuth-hochschule.de<br />
nata@smartsearch.co.za<br />
Abstract: This paper focuses on the role of the lecturer embarking on a project-based approach to teaching in<br />
the IS/IT environment. An initial literature survey provides an underst<strong>and</strong>ing of the project-based approach, how<br />
it helps to prepare students for a changing business environment, <strong>and</strong> the expertise required of lecturers<br />
embarking on this approach. The authors then reflect on their own experiences in <strong>using</strong> the project-based<br />
approach to prepare students for future careers in IT. The paper explores their roles as teachers, mentors <strong>and</strong><br />
researchers, discusses the challenges that were encountered, <strong>and</strong> identifies some critical success factors. From<br />
the lecturer’s point of view, the project-based approach offers a win-win scenario for both students <strong>and</strong> lecturers:<br />
it gives students the competencies required by industry, while at the same time it gives lecturers the opportunity<br />
to keep up with industry expectations, <strong>and</strong> creates opportunities for sharing experiences with professional<br />
practitioners as well as fellow academics.<br />
Keywords: <strong>Information</strong> systems, project-based approach, lecturer skills, teaching <strong>and</strong> learning strategies<br />
1. Introduction<br />
<strong>Information</strong> technology (IT) has become an integral part of almost all the business activities of modern<br />
organisations, making it essential for IT to be aligned with business on the strategic, tactical <strong>and</strong><br />
operational levels (White, 2004). This alignment between business <strong>and</strong> IT is a dynamic one, which<br />
should respond to changes in technology as well as changes in the business environment. The<br />
literature confirms that employees who can continuously align technology to the organisation’s needs<br />
constitute vital resources for achieving a sustained competitive advantage (Peppard <strong>and</strong> Ward, 2004).<br />
In a previous paper (Van der Merwe, Scott <strong>and</strong> Weimann, 2010) we argued that a project-based<br />
teaching approach can enhance the development of the competencies required for IS/IT students to<br />
succeed in a modern, complex business environment. We then derived a model to show how projectbased<br />
learning can help students to acquire the necessary experience <strong>and</strong> knowledge, the flexibility<br />
to learn new skills, the agility needed to adapt to a fast-changing environment, <strong>and</strong> the ability to fulfil<br />
specific roles in an organisation (van der Merwe et al., 2010).<br />
This paper focuses on the role of the lecturer, for whom the project-based approach presents a twofold<br />
challenge. Firstly, teaching <strong>and</strong> learning strategies that promote the integration of theoretical <strong>and</strong><br />
practical knowledge must be introduced into the classroom. Secondly, the lecturer must stay in tune<br />
with changing business requirements <strong>and</strong> expectations. This paper presents the reflections of<br />
lecturers from three academic institutions, two in South Africa <strong>and</strong> one in Europe, on their<br />
experiences of <strong>using</strong> the project-based approach. In doing so, it describes the strategies employed at<br />
the three institutions to engage <strong>and</strong> motivate their students, <strong>and</strong> discusses the critical success factors<br />
that emerged <strong>and</strong> the difficulties that were encountered.<br />
2. The project-based approach<br />
In the project-based approach, students work in small collaborative groups to explore <strong>and</strong> solve realworld<br />
business problems. Lecturers must carefully plan, manage <strong>and</strong> assess the projects to ensure<br />
that students learn relevant academic concepts, while at the same time developing key skills required<br />
in the modern business environment, such as collaboration, communication <strong>and</strong> critical thinking.<br />
According to Gerogiannis <strong>and</strong> Fitsilis (2005), the project-based approach is a powerful <strong>and</strong> widely<br />
adopted tool that provides students with the opportunity to actively develop their knowledge through<br />
practical experience. Active participation in challenging projects also improves students’ cognitive,<br />
collaborative, methodological <strong>and</strong> technical skills. Yam <strong>and</strong> Rossini (2010) believe that students who<br />
443
Elsje Scott, Peter Weimann <strong>and</strong> Nata van der Merwe<br />
are exposed to experiential learning through the project-based approach, develop a ‘feel’ for the<br />
activities involved.<br />
The relationship between the kinds of knowledge honoured in academia, <strong>and</strong> the kinds of<br />
competence valued in professional practice, is a challenging one (Schön, 1983). Traditional skills <strong>and</strong><br />
abilities are no longer sufficient for students entering the modern job market (Barron <strong>and</strong> Darling-<br />
Hammond, 2008); they must be able to gather, synthesise, <strong>and</strong> analyse information, <strong>and</strong> work with<br />
others to make use of the newly acquired knowledge, while responding to a continuously changing<br />
technical, economic <strong>and</strong> social environment. Baron <strong>and</strong> Darling-Hammond (2008) assert that<br />
students learn more deeply if they have engaged in activities that require the application of<br />
classroom-gathered knowledge to real-world problems, as in the project-based approach.<br />
Thomas (2000) points out that the project-based learning model distinguishes itself from traditional<br />
teaching by emphasising the learner <strong>and</strong> the project, with the focus on how information is processed<br />
<strong>and</strong> used. Students discover their ability to acquire the knowledge <strong>and</strong> skills needed to accomplish<br />
project tasks, which instils <strong>and</strong> reinforces the habit of life-long learning. According to Norman, Rose<br />
<strong>and</strong> Lehmann (2004), student-centered learning fosters a creative environment that offers increased<br />
opportunity for students to develop skills in areas such as oral <strong>and</strong> written communication, critical<br />
thinking, personal relationships, <strong>and</strong> the ability to work in diverse groups.<br />
Baron <strong>and</strong> Darling-Hammond (2008) claim that project-based learning is superior to traditional<br />
methods of instruction in supporting flexible problem solving, reasoning skills, <strong>and</strong> generating<br />
accurate theories <strong>and</strong> sound explanations. While project-based learning is not the only strategy with<br />
which to achieve effective learning in complex areas, it has been considerably more successful than<br />
traditional methods in training competent <strong>and</strong> skilled practitioners <strong>and</strong> promoting long-term retention<br />
of knowledge <strong>and</strong> skills (Strobel <strong>and</strong> van Barneveld, 2008).<br />
According to Mergendoller, Markham, Ravitz, & Larmer (2006), project-based learning differs from<br />
more traditional teaching strategies in that teachers provide students with suggestions for further<br />
study or inquiry rather than assigning preset learning activities. This appeals to students, since<br />
instead of reading or hearing about facts <strong>and</strong> concepts, they are personally involved in solving<br />
realistic problems that reflect the day-to-day decisions <strong>and</strong> dilemmas of the business world<br />
(Mergendoller et al, 2006). In turn this leads to higher student engagement <strong>and</strong> motivation (Tech,<br />
2010).<br />
Unlike the frequently competitive nature of the traditional teaching approach, the project-based<br />
approach calls for sharing of ideas <strong>and</strong> collaboration, with students having to work together to reach a<br />
common goal (Gerogiannis <strong>and</strong> Fitsilis, 2005; Messmer,1999). Experience of teamwork <strong>and</strong> the<br />
project environment is a vital learning experience for IS/IT graduates, who will be entering a business<br />
environment that has evolved from being functionally organised or process driven, to what is currently<br />
referred to as a project-driven environment (Crawford, Morris, Thomas, & Winter, 2006).<br />
The role of the lecturer as a teacher is very different from the role of the lecturer as a mentor (Shaw,<br />
Woodford <strong>and</strong> Benwell, 2007). The teacher provides clarity <strong>and</strong> direction; while the mentor acts as a<br />
sounding board, providing guidance <strong>and</strong> support without telling students what to do (Shaw et al.,<br />
2007). Grant (2009) finds the lecturer to be an important determinant of the success of the projectbased<br />
approach, since although students control their own use of resources <strong>and</strong> the artifacts they<br />
produce, they still rely heavily on the lecturer for guidance when faced with choices <strong>and</strong> challenges.<br />
Mergendoller et al. (2006) ascribe the successful implementation of project-based teaching to how<br />
well lecturers adopt the role of mentor in their classrooms, which encourages students to become<br />
motivated independent learners (Wurdinger <strong>and</strong> Rudolph, 2009).<br />
It remains a challenge for a lecturer to implement project-based teaching in such a way that students<br />
receive the full benefit of this approach. We believe that to accomplish this, the lecturer must fulfil<br />
three roles: those of teacher, researcher <strong>and</strong> mentor. As a teacher, the lecturer must ensure that the<br />
core syllabus is covered; the researcher must stay abreast of developments in teaching pedagogy as<br />
well as in technology <strong>and</strong> business; <strong>and</strong> the mentor must encourage attitudes of enquiry <strong>and</strong><br />
independence in their students.<br />
444
3. Reflective practice<br />
Elsje Scott, Peter Weimann <strong>and</strong> Nata van der Merwe<br />
For the successful implementation of project-based teaching, we subscribe to the notion of <strong>using</strong><br />
reflection to explore the roles of teacher, mentor <strong>and</strong> researcher. Confucius (551 BC - 479 BC) stated:<br />
”by three methods we may learn wisdom: first, by reflection, which is noblest; second, by imitation,<br />
which is easiest; <strong>and</strong> third by experience, which is the bitterest”. The value of reflection in the pursuit<br />
of knowledge remains relevant today.<br />
Schön (1983) proposes that reflection enables professional practitioners to criticise the implicit<br />
underst<strong>and</strong>ings that have developed around repetitive experiences, <strong>and</strong> encourages them to make<br />
new sense of situations. This reflection can occur in two ways: practitioners can reflect on a situation<br />
<strong>and</strong> explore their underst<strong>and</strong>ing of how they h<strong>and</strong>led it; or they can use reflection-in-action while they<br />
are in the midst of a situation (Schön, 1983).<br />
According to Argyris (1991) reflection gives us an underst<strong>and</strong>ing of learning through experience <strong>and</strong>,<br />
by engaging in collective dialogue about our experience, we build our underst<strong>and</strong>ing of it. Argylis<br />
(1991) states that to continue learning, we should critically reflect on our own behaviour, <strong>and</strong><br />
advocates that people at all levels of an organisation should reflect critically on their organisational<br />
practices to enable change.<br />
Jordi (2010) describes reflection as an activity where people recapture their experience, think about it,<br />
<strong>and</strong> evaluate it to extract new knowledge from it. He argues that reflective practice should not just be<br />
a cognitive exercise; it should help us get in touch with dissonances, like fear <strong>and</strong> stress, that cause<br />
mind-body disunity. Reflective practices facilitate integrated experiential learning by including the<br />
richness <strong>and</strong> complexity of human experience <strong>and</strong> the increased awareness that accompanies the<br />
knowledge creation process.<br />
In light of the above, we deem it important to reflect on our experiences as they have played out in the<br />
three case studies described in this paper. The next section gives an account of our reflections on<br />
the role of the lecturer as teacher, mentor <strong>and</strong> researcher <strong>using</strong> the project-based approach at three<br />
academic institutions: University of Cape Town (UCT) <strong>and</strong> Cape Peninsula University of Technology<br />
(CPUT), both in Cape Town, South Africa, <strong>and</strong> Beuth Hochschule (BHT) in Berlin, Germany. All three<br />
institutions offer a bachelor degree in <strong>Information</strong> Systems.<br />
4. Reflections on the use of the project-based approach at three different<br />
institutions<br />
The project-based approach is being used at all three institutions for teaching project management to<br />
third-year students. At UCT <strong>and</strong> CPUT the courses are taught on campus through face-to-face<br />
contact time, while the BHT course is taught as an online blended course.<br />
4.1 Reflections on course design<br />
At UCT a systems development group project is the major deliverable of the third year capstone<br />
course of the IS undergraduate curriculum. The course includes topics like requirements planning,<br />
software design, software construction, <strong>and</strong> testing. Templates, checklists, patterns <strong>and</strong> guides are<br />
custom designed <strong>and</strong> support the creation of the relevant artefacts (Scott, 2006). A comprehensive<br />
assessment strategy uses a range of instruments to conduct formal summative assessment, formal<br />
continuous assessment <strong>and</strong> an informal formative assessment (Scott & van der Merwe, 2003). The<br />
course content adheres to international curriculum st<strong>and</strong>ards as specified in the IS Model Curriculum<br />
(Gorgone, et al., 2003) <strong>and</strong> the Computing Curricula 2005 (Shackelford, et al., 2006). The main<br />
objective of the course is to give students a real world experience of the diverse <strong>and</strong> complex nature<br />
of the <strong>Information</strong> Systems profession <strong>and</strong> provide them with adequate skills for the global<br />
marketplace. Mitigation strategies <strong>and</strong> a reflective approach have been applied to the course design<br />
over a number of years, resulting in the development of a framework that has been used to achieve a<br />
highly sophisticated project-based learning experience.<br />
At UCT, lecturer skills are developed through a collaborative mentorship program. New lecturers are<br />
teamed with experienced lecturers when teaching the project-based approach for the first time, to<br />
gather experience <strong>and</strong> share the necessary knowledge <strong>and</strong> skills.<br />
445
Elsje Scott, Peter Weimann <strong>and</strong> Nata van der Merwe<br />
At CPUT an integrated systems development project is central to the project management course<br />
taken by third year students studying towards either a National Diploma in Financial <strong>Information</strong><br />
Systems or a bachelor degree in Financial <strong>Information</strong> Systems. Both students <strong>and</strong> prospective<br />
employers attach great value to the integration of practical <strong>and</strong> theoretical knowledge <strong>and</strong> skills that is<br />
achieved through this real-world learning experience. The curriculum focuses on the underst<strong>and</strong>ing of<br />
the project management life-cycle <strong>and</strong> processes, the project team <strong>and</strong> teamwork, as well as the<br />
importance of communication in the project <strong>and</strong> business environment. Life skills needed in the<br />
complex work environment are also incorporated.<br />
The lecturer involved at CPUT worked in the IT industry in a project environment <strong>and</strong> also attended<br />
courses whilst working in the private sector. A number of years of lecturing experience <strong>and</strong> learning<br />
through trial-<strong>and</strong>-error helped develop the necessary teaching <strong>and</strong> mentoring skills. However, there is<br />
no involvement of other lecturers, no formal skills transfer strategy, <strong>and</strong> no succession or contingency<br />
plans exist.<br />
The course “<strong>Information</strong> Systems Project” at BHT is taken by undergraduate students in their third<br />
year of an online Bachelor of <strong>Information</strong> Systems degree. This course comprises a major capstone<br />
project through which students must demonstrate their ability to integrate the theoretical <strong>and</strong> practical<br />
knowledge acquired during the previous two years of studying information systems. Prior to this<br />
project, students have completed courses adhering to the national German curriculum guideline<br />
(Wissenschaftliche Kommission (WK) Wirtschaftsinformatik im Verb<strong>and</strong> der Hochschullehrer, 2007),<br />
<strong>and</strong> have participated in a project management course taught according to the PMBOK of the PMI<br />
(Project <strong>Management</strong> Institute (PMI), 2004).<br />
At BHT the lecturer draws on personal experience in systems development <strong>and</strong> project management<br />
gained prior to his assignment at the university. In Germany, lecturers must have at least three years<br />
industry experience, in addition to appropriate academic qualifications, to apply for a lecturing post at<br />
a University of Applied Sciences.<br />
4.2 Reflections on Industry involvement<br />
For the capstone course at UCT, the business problem is usually a comprehensive web-based<br />
information management system with a particular focus or theme for each year. A list of<br />
specifications <strong>and</strong> functionality guidelines related to this generic theme is provided, <strong>and</strong> each student<br />
team is required to communicate with an industry sponsor who will provide them with an appropriate<br />
business problem. The sponsors are available for meetings <strong>and</strong> queries, provide guidance to the<br />
teams regarding user requirements <strong>and</strong> business processes, <strong>and</strong> review some project deliverables,<br />
but no monetary assistance is provided. At the end of each year UCT holds an exposition of the final<br />
systems for sponsors <strong>and</strong> other industry partners. This exposure has led to organisations<br />
approaching UCT to host student projects, creating a pool of project requests that already exists at<br />
the onset of the course.<br />
Many students at CPUT come from disadvantaged backgrounds <strong>and</strong> do not have access to<br />
computers at home. To level the playing field, all groups are given the same business problem, which<br />
is provided by a sponsor in the Financial Services industry. The system requirements are such that it<br />
can be developed in the university computer labs. Contact time on the lecturing time-table is<br />
sacrificed for dedicated team meetings <strong>and</strong> lab time, <strong>and</strong> for interaction with the sponsor.<br />
At BHT, it is felt that industry involvement in student projects might limit the opportunity for teams to<br />
make their own mistakes, which is an important element in developing knowledge by reflecting on<br />
experience. It would also restrict the ability of the lecturer to put teams under deliberate stress by<br />
introducing artificially constructed problems into their project (such as a change of requirements or a<br />
quality audit).<br />
4.3 Reflections on student mentoring<br />
At UCT, the three lecturers participating in the course act as project managers (PM) <strong>and</strong> provide<br />
guidance to their allocated project teams based on their own experience. Project teams must<br />
manage their own work, adhere to strict deadlines <strong>and</strong> meet their PM on a regular basis for<br />
discussions <strong>and</strong> the reviewing of deliverables. Fourth year students with excellent technical skills<br />
assist as technical mentors in workshops <strong>and</strong> tutorials. Masters students act as quality managers,<br />
446
Elsje Scott, Peter Weimann <strong>and</strong> Nata van der Merwe<br />
assisting in most of the project management tutorials. Students also benefit from an optional<br />
additional mentorship program driven by IS graduates working in industry. In collaboration with the<br />
course co-ordinator, these alumni have compiled a series of advanced topics addressing areas that,<br />
due to time constraints, might not otherwise receive sufficient attention during the course.<br />
At CPUT, all mentoring is done by the course co-ordinator, who has a formal meeting with each<br />
project team every second week. Students are encouraged to make additional appointments when<br />
needed. Teams submit weekly reports that are used by the course co-ordinator to monitor progress<br />
<strong>and</strong> individual participation, <strong>and</strong> to intervene <strong>and</strong> approach individuals or teams when needed.<br />
BHT students participate in two face-to-face meetings with their project mentor; apart from this, they<br />
communicate through internet technology. The teams meet the lecturer once a week online via Skype<br />
or Adobe Connect. Email is used for asynchronous communication <strong>and</strong> document exchange, together<br />
with Moodle, BHT’s web-based open-source learning, collaboration <strong>and</strong> research content<br />
management system.<br />
4.4 Reflections on teaching <strong>and</strong> learning strategies<br />
The teaching <strong>and</strong> learning strategies implemented at UCT focus on the development of awareness<br />
<strong>and</strong> underst<strong>and</strong>ing which, together with the acquisition of competence, facilitates transcendence<br />
(Cockburn, 2002). A wide range of interventions that integrate theory <strong>and</strong> practice ensure that<br />
students progress through Cockburn’s (2002) stages of following, detaching <strong>and</strong> fluency. Selected<br />
readings are used as sensitising devices to aid underst<strong>and</strong>ing <strong>and</strong> give meaning to phenomena<br />
occurring in the capstone environment. For both students <strong>and</strong> lecturers, reflection gives rise to<br />
“involvement <strong>and</strong> mattering” which according to Dreyfus (1999) nurtures transcendence through<br />
different stages of skills acquisition to grow competence, underpin life-long learning <strong>and</strong> finally to<br />
empower students.<br />
The teaching methods used at CPUT aim to actively engage students as much as possible, by<br />
encouraging them to learn from their own experiences, enhance their critical thinking ability, link<br />
theoretical concepts to their practical application, integrate new information with prior knowledge <strong>and</strong><br />
apply this in real-life situations. The teaching methods are learner-centred, <strong>and</strong> enabled through<br />
constructive <strong>and</strong> reflective learning. Care is taken that students do not passively receive new<br />
information, but become actively involved in internalising it, <strong>and</strong> they are encouraged to reflect on<br />
their learning experiences.<br />
Students at BHT experience the problems of working <strong>and</strong> communicating in a team <strong>and</strong> meeting the<br />
challenges of the magic triangle: in time, in budget, <strong>and</strong> in scope with high quality deliverables. The<br />
role of the lecturer is that of a mentor. The teams are expected to ask the right questions <strong>and</strong> to<br />
explain the options they want to discuss. Part of their marked deliverable at the end of the project is a<br />
self-reflective essay on the problems <strong>and</strong> experiences in their project work.<br />
4.5 Reflections on staying relevant <strong>and</strong> up to date, both in terms of teaching<br />
pedagogy <strong>and</strong> in terms of changing business requirements <strong>and</strong> expectations<br />
At UCT the challenge of providing an intellectually <strong>and</strong> socially stimulating environment calls for<br />
inspired <strong>and</strong> dedicated teaching <strong>and</strong> learning. A lecturer cannot meet all these dem<strong>and</strong>s alone.<br />
However, close connections with industry partners through research projects, the presentation of real<br />
world cases, boot-camps, customised mentorship programs, <strong>and</strong> visiting alumni students, all help to<br />
provide a “window to the real world”.<br />
The lecturer at CPUT gains benefit from participating in collaborative research with lecturers at other<br />
universities; attending, presenting <strong>and</strong> networking at conferences; <strong>and</strong> membership of professional<br />
organisations (which also provide networking opportunities). Unfortunately, due to heavy workloads<br />
<strong>and</strong> lack of time, it is not possible to conduct regular visits to business in order to learn more of<br />
current best practices <strong>and</strong> changing requirements.<br />
Undergraduate students at BHT must spend three months working in industry before they can write<br />
their bachelor thesis, <strong>and</strong> a further three months while the thesis is being completed. During these six<br />
months students are closely supervised by a university lecturer. This period of close interaction<br />
447
Elsje Scott, Peter Weimann <strong>and</strong> Nata van der Merwe<br />
between student, university <strong>and</strong> industry gives the lecturer a valuable opportunity to discover industry<br />
requirements relating to student qualifications <strong>and</strong> to exchange technology <strong>and</strong> research interests.<br />
4.6 Reflections on the roles of teacher, mentor <strong>and</strong> researcher<br />
Fundamental to UCT’s mission of becoming the central point of academic excellence in Africa, is its<br />
research-led identity. This leaves the teacher <strong>and</strong> mentor with the challenge of not only doing<br />
research-led teaching, but also research-led mentoring. The roles of teacher, mentor <strong>and</strong> researcher<br />
are thus inextricably linked, which necessitates deliberate <strong>and</strong> ongoing reflection-in-action to nurture<br />
the construction <strong>and</strong> reconstruction of knowledge <strong>and</strong> to cultivate a spirit of innovation.<br />
The single CPUT lecturer must fulfil all three roles of teacher, mentor, <strong>and</strong> researcher. The mentoring<br />
<strong>and</strong> guiding process is extremely time-consuming, leaving little time for conducting research,<br />
developing contacts, <strong>and</strong> visiting business. Collaborative research papers have made an important<br />
contribution to the development of skills needed to successfully implement the project-based<br />
approach.<br />
At BHT it is difficult to adequately address these roles in online sessions <strong>and</strong> the rare face-to-face<br />
meetings with student teams. Written communication, especially via email, helps to meet the needs of<br />
students <strong>and</strong> makes it possible for the lecturer to gather information that is relevant to research work.<br />
Putting on a specific hat (mentor, lecturer or researcher) <strong>and</strong> informing the teams that you are<br />
addressing them in a specific role makes it easier to overcome the communication challenge.<br />
4.7 Reflections on critical success factors<br />
Carefully planned interventions are critical to the success of the project-based approach at UCT.<br />
These ensure that students develop into reflexive practitioners with a real world perspective, <strong>and</strong><br />
sound technological, management <strong>and</strong> interpersonal skills. A comprehensive assessment strategy<br />
with associated timelines encompasses all the course objectives. The assessment instruments <strong>and</strong><br />
accompanying documentation are available to students via an electronic learning management<br />
system, ensuring that students are aware of the assessment criteria <strong>and</strong> associated st<strong>and</strong>ards. Other<br />
critical success factors are the effective mentoring process that cultivates a relationship of trust; <strong>and</strong><br />
the peer-evaluation process that encourages team member participation.<br />
Industry involvement is critical to the success of the project-based experience at CPUT. Students<br />
benefit from personal growth as well as improvement of skills, <strong>and</strong> very good feedback is received<br />
when these students do their in-service training. It is also very important that students are provided<br />
with a clear deliverables schedule <strong>and</strong> that deadlines are strictly enforced. Carefully planned<br />
additional material <strong>and</strong> case studies are critical to stimulate self-exploration of core subject matter.<br />
At the start of the project, a lot of time is spent on team development <strong>and</strong> team building. This is<br />
followed-up by close monitoring of team participation <strong>and</strong> coherence in teams, <strong>and</strong> intervention of the<br />
lecturer as mentor when needed. After deliverables are h<strong>and</strong>ed in <strong>and</strong> marked, students are given the<br />
opportunity for reflection <strong>and</strong> all deliverables are submitted as a project portfolio for final assessment<br />
at the end of the project. Multiple assessments are used that incorporate individual as well as team<br />
assessments, <strong>and</strong> a peer evaluation is included in the calculation of the final marks.<br />
At BHT, balancing the dual roles of mentor <strong>and</strong> teacher is critical to the success of the course. The<br />
same person who mentors the team for six months must also be able to assess them objectively,<br />
highlighting the importance of clearly defined deliverables <strong>and</strong> project acceptance criteria. A further<br />
critical success factor is the ability to communicate effectively with the team via electronic media, so<br />
that students will trust the lecturer as mentor sufficiently to share their problems <strong>and</strong> ask for advice,<br />
while at the same time respecting the judgement of the lecturer as teacher.<br />
4.8 Reflections on challenges <strong>and</strong> major concerns<br />
Lecturers following the project-based approach face the challenge of instilling passion <strong>and</strong><br />
maintaining a high level of motivation amongst students, while at the same time assisting them to deal<br />
with problems that emulate professional practice.<br />
At UCT, the initial sourcing, evaluation <strong>and</strong> selection of industry-based projects is a daunting task.<br />
Related to this is the additional concern that students may fail to meet the expectations of their<br />
448
Elsje Scott, Peter Weimann <strong>and</strong> Nata van der Merwe<br />
sponsor. Students are often tempted to neglect other academic subjects while working on their<br />
projects, or may be distracted by personal commitments, <strong>and</strong> so careful guidance is needed to<br />
manage their time. Equal <strong>and</strong> fair participation of team members is not always the norm, <strong>and</strong> factors<br />
like the diversity of skills, different work ethics <strong>and</strong> cultural backgrounds must be properly controlled<br />
<strong>and</strong> monitored to prevent conflict. Successfully addressing all of these issues dem<strong>and</strong>s time,<br />
commitment, passion <strong>and</strong> dedication from the lecturer.<br />
Some students at CPUT have difficulty adapting to project-based teaching methods, which may be<br />
attributed to lack of self-confidence or to lack of commitment. Technical resources also present a<br />
problem, as computer lab equipment (hardware <strong>and</strong> software) at CPUT is not leading-edge, <strong>and</strong><br />
many students have no other equipment to work on. A major concern is the lack of planning for skills<br />
transfer to other lecturers. If another lecturer were to take over, there would be a very steep learning<br />
curve <strong>and</strong> not everybody is prepared to put in the time <strong>and</strong> effort required to use the project-based<br />
approach.<br />
At BHT the biggest challenge of the online taught course is defining projects that are business-related<br />
<strong>and</strong> technologically stimulating. The concept of an online-learning approach makes it difficult to get<br />
industry on board as project sponsor, which would provide the lecturer with real life business<br />
problems. Another major concern is the difficulty of transferring skills <strong>and</strong> knowledge during online<br />
mentoring sessions.<br />
5. Discussion<br />
Schön (1983) believes that everybody needs to become competent in taking action <strong>and</strong><br />
simultaneously reflecting on this action to learn from it. According to Jordi (2010) reflective practices<br />
help to create meaning, leading to integrated experiential learning. As lecturers, we consider it<br />
essential to critically reflect on our project-based teaching experiences in order to ensure the<br />
innovative development <strong>and</strong> growth of our courses.<br />
Mergendoller et al. (2006) state that building the capacity <strong>and</strong> skill of lecturers embarking on this more<br />
complex form of teaching is a significant challenge, <strong>and</strong> effective project-based teaching does not<br />
happen automatically. UCT has an effective mentoring program in place for lecturers who are new to<br />
the project-based approach, resulting in a healthy environment where knowledge <strong>and</strong> skills are not<br />
limited to one or two lecturers. At the other institutions there is a lack of succession <strong>and</strong> contingency<br />
planning, <strong>and</strong> a real concern is that the project-based approach may be ab<strong>and</strong>oned if a different<br />
lecturer takes over the course.<br />
Mergendoller et al (2006) refer to the challenge for lecturers in learning to cope with new<br />
responsibilities, including the development of new teaching methods <strong>and</strong> classroom-management<br />
techniques, the balancing of direct instruction with student self-discovery, the facilitation of learning<br />
among groups, <strong>and</strong> the creation of assessments that enhance the learning process. These issues are<br />
echoed in the preceding lecturer reflections. In addition, the time <strong>and</strong> effort dem<strong>and</strong>ed by projectbased<br />
teaching detracts from the time needed to fulfil the role of researcher, which in this environment<br />
has two components: collaboration <strong>and</strong> networking with other academics, <strong>and</strong> linking with industry. In<br />
all three cases, the lecturers have maintained adequate academic collaboration <strong>and</strong> networking, but<br />
expressed concern about effective linking with industry.<br />
Shaw et al (2007) state that the role of a teacher differs from that of a mentor, <strong>and</strong> students often find<br />
it difficult to make this distinction. At UCT <strong>and</strong> CPUT this was not the case <strong>and</strong> students adapted with<br />
ease to the fact that a lecturer can be both a teacher <strong>and</strong> a mentor. However, at BHT role distinction<br />
was encountered as a problem, possibly as a result of the small number of face-to-face meetings held<br />
during the online blended course. This anomaly might be worth exploring in future research.<br />
Gerogiannis <strong>and</strong> Fitsilis (2005) argue that an important factor influencing the success of project-based<br />
learning is that the project should reflect real-world challenges. At UCT <strong>and</strong> CPUT, industry<br />
involvement is seen as a critical success factor for project-based teaching, <strong>and</strong> students report that it<br />
significantly enhances the learning experience. It is also encouraging to note the contribution of UCT<br />
alumni who themselves experienced the value of real-world industry involvement as students. The<br />
different teaching model used at BHT has led to a lack of industry involvement which makes project<br />
definition more difficult.<br />
449
Elsje Scott, Peter Weimann <strong>and</strong> Nata van der Merwe<br />
Because of the online study method used at BHT, their project teams closely resemble the definition<br />
of a virtual team, i.e. teams whose members use technology to varying degrees in working across<br />
locational, temporal, <strong>and</strong> relational boundaries to accomplish an interdependent task (Martins, Gilson<br />
& Maynard, 2004). It is interesting to note that the South African project teams, especially at CPUT,<br />
show characteristics similar to virtual teams in large organisations, because of their multi-cultural<br />
make up, their distributed working styles (at home, with the sponsor, in the labs), <strong>and</strong> their limited<br />
face-to-face meeting opportunities due to travel costs, involvement in different courses <strong>and</strong> part-time<br />
work. The effects of proximity among team members fall off rapidly with even very small distances<br />
(Fiol & O’Connor 2005; Kraut, Fussell, Brennan, & Siegel 2002) <strong>and</strong> so team members who live close<br />
to each other but meet irregularly, may experience very similar dynamics to members of virtual teams<br />
interacting across great distances. This is a topic that calls for more research. A comparison<br />
between teams in an online project-based environment versus the virtual team caused by<br />
circumstance in the face-to-face approach at the other two institutions also warrants further<br />
investigation.<br />
An important element in effective mentoring, evident at all three institutions, is the relationship of trust<br />
that must exist between the lecturer as mentor <strong>and</strong> the students, as well as between the members of<br />
the student groups themselves. Without trust, students will not have the confidence to approach the<br />
mentor for guidance <strong>and</strong> be willing to accept the feedback offered. Effective mentoring also needs to<br />
address team harmony, since despite the best efforts of team building, trust between members of the<br />
group can break down <strong>and</strong> undermine the learning opportunity (Huff, Cooper & Jones, 2002).<br />
6. Conclusion<br />
In an attempt to enhance the learning experience of IS/IT students, we have gone beyond st<strong>and</strong>ard<br />
classroom practices <strong>and</strong> used the project-based approach to expose students to the complexities of<br />
the modern-day business environment. After reflecting on our experiences, we conclude that although<br />
the project-based approach places heavy dem<strong>and</strong>s on the lecturer in the roles of teacher, mentor <strong>and</strong><br />
researcher, it simultaneously provides valuable opportunities for personal growth <strong>and</strong> the expansion<br />
of skills <strong>and</strong> knowledge. We identified a number of challenges <strong>and</strong> concerns at the three institutions<br />
<strong>and</strong> also identified areas for further investigation <strong>and</strong> research. Argylis (1991) reminds us that<br />
reflection can help practitioners to realise the wealth of knowledge embedded in their own experience,<br />
<strong>and</strong> to use this embedded knowledge to improve <strong>and</strong> advance their work. This was certainly our<br />
experience of <strong>using</strong> reflection to explore the role of the lecturer as teacher, mentor <strong>and</strong> researcher in<br />
the project-based approach, <strong>and</strong> our respective courses will be enhanced by the insights we have<br />
gained.<br />
References<br />
Argyris, C. (1991) Teaching smart people how to learn. Harvard Business Review, May-June.<br />
Barron, B. & Darling-Hammond, L. (2008). Teaching for meaningful learning: A review of research on inquirybased<br />
<strong>and</strong> cooperative learning. In Powerful Learning: What We Know About Teaching for Underst<strong>and</strong>ing.<br />
San Francisco, CA: Jossey-Bass. Retrieved from http://www.edutopia.org/pdfs/edutopia-teaching-formeaningful-learning.pdf<br />
[14 March 2011]<br />
Cockburn, A. (2002). Agile Software Development. Pearson Education Inc.<br />
Crawford, L., Morris, P., Thomas, J. & Winter, M. (2006) Practitioner development: From trained technicians to<br />
reflective practitioners. International Journal of Project <strong>Management</strong>, 24, 722-733.<br />
Dreyfus, H. L. (1999). Anonymity versus commitment: The dangers of education on the internet. Ethics <strong>and</strong><br />
<strong>Information</strong> Technology, 1, 15-21.<br />
Fiol, C., & O’Connor, E. (2005). Identification in Face-to-face, Hybrid, <strong>and</strong> Pure Virtual Teams: Untangling the<br />
Contradictions. Organization Science, 16(1), pp. 19-32.<br />
Gerogiannis, V., & Fitsilis, P. (2005). “A Project-Based Learning Approach for Teaching ERP Concepts”. The<br />
International Journal of Learning, Vol 12. http://www.Learning-Journal.com [28 October 2009]<br />
Gorgone, J.T., Davis, G.B., Valacich, J.S., Topi, H., Feinstein, D.L., <strong>and</strong> Longenecker, H.E.: IS 2002: Model<br />
Curriculum <strong>and</strong> Guidelines for Undergraduate Degree Programs in <strong>Information</strong> Systems. Communications<br />
of the Association for <strong>Information</strong> Systems, 11 (1), pp. 1-63 (2003).<br />
Grant, M. (2009). “Underst<strong>and</strong>ing projects in project-based learning: A student's perspective”. Paper presented at<br />
Annual Meetings of the American Educational Research Association. San Diego, CA. April, 2009. Retrieved<br />
from http://www.bie.org/research/study/students_perspective [14 March 2011]<br />
Huff, L., Cooper, J. & Jones, W. (2002). The Development <strong>and</strong> Consequences of Trust in Student Project<br />
Groups. Journal of Marketing Education, 24 (1), 24–34.<br />
Jordi, R.: Reframing the Concept of Reflection: Consciousness, Experiential Learning, <strong>and</strong> Reflective Learning<br />
Practices, Adult Education Quarterly, May 2011; vol. 61, 2: pp. 181-197., first published on September 22,<br />
2010<br />
450
Elsje Scott, Peter Weimann <strong>and</strong> Nata van der Merwe<br />
Kraut, R. E., Fussell, S. R., Brennan, S. E., & Siegel, J. (2002). Underst<strong>and</strong>ing Effects of Proximity on<br />
Collaboration: Implications for Technologies to Support Remote Collaborative Work. In P. Hindis, & S.<br />
Kiesler (Eds.), Distributed Work (pp. 137-62). Cambridge, MA: MIT Press.<br />
Martins, L. L., Gilson, L. L., & Maynard, M. T. (2004). Virtual Teams: What Do We Know <strong>and</strong> Where Do We Go<br />
From Here? Journal of <strong>Management</strong>, 30(6), pp. 805-35.<br />
Mergendoller, J.R., Markham, T., Ravitz, J., & Larmer, J. (2006). Pervasive <strong>Management</strong> of Project Based<br />
Learning: Teachers as Guides <strong>and</strong> Facilitators. In C.M. Evertson & C. S. Weinstein (Eds.), H<strong>and</strong>book of<br />
Classroom <strong>Management</strong> (pp 583 – 615). Lawrence Erlbaum Associates, Inc., Mahwah, New Jersey.<br />
Messmer, M. (1999). Project teams: an opportunity for professional growth. Strategic Finance, November 1999,<br />
pp 12–14.<br />
Norman, C.S., Rose, A.M., & Lehmann, C.M. (2004). Cooperative learning: resources from the business<br />
disciplines. Journal of Accounting Education, 22(1), pp 1 – 28.<br />
Peppard, J., & Ward, J. (2004). “Beyond strategic information systems: towards IS capability”. Journal of<br />
Strategic <strong>Information</strong> Systems, Vol 13, pp 167-194.<br />
Project <strong>Management</strong> Institute (PMI). (2004). PMBOK – A Guide to the Project <strong>Management</strong> Body of <strong>Knowledge</strong>.<br />
(3rd ed.). Sylva, NC.: The Project <strong>Management</strong> Institute.<br />
Schön, D. (1983) The Reflective Practitioner. How professionals think in action, London: Temple Smith.<br />
Scott, E.C. (2006). Systems Development Group Project: A Real World Experience. <strong>Information</strong> Systems<br />
Education Journal, 4(23), pp. 1-10.<br />
Scott, E., & van der Merwe, N. (2003). Using Multiple Approaches to Assess Student Group Projects. Electronic<br />
Journal of <strong>Information</strong> Systems Evaluation, 6 (2), pp. 177-86.<br />
Shackelford, R., McGettrick, A., Sloan, R., Topi, H., Davies, G., Kamali, R. et al. (2006). “Computing Curricula<br />
2005: The Overview Report”. Proceedings of the 37th SIGCSE Technical Symposium on Computer Science<br />
Education. Houston: Texas: ACM.<br />
Shaw, D., Woodford, B.J., Benwell, G.L. (2007). Educating future IS professionals through real-world integration.<br />
International Journal of Teaching <strong>and</strong> Case Studies, 1(1/2), pp 66 – 83.<br />
Strobel, J. & van Barneveld, A. (2008). When is PBL More Effective? A Meta-synthesis of Meta-analyses<br />
Comparing PBL to Conventional Classrooms. Interdisciplinary Journal of Problem-based Learning, 3(1), pp<br />
44-58.<br />
Tech, L.L.K., (2009). “Provide Holistic Development Through Project-Based Learning In Engineering Modules”.<br />
Proceedings of the 5th International CDIO Conference, Singapore Polytechnic, Singapore, 7 – 10 June<br />
2009.<br />
Thomas, J. W. (2000). A review of research on project based learning. Supported by The Autodesk Foundation<br />
111 McInnis Parkway San Rafael, California 94903<br />
(http://www.autodesk.com/foundation/news/pblpaper.htm)<br />
Van der Merwe, N., Scott, E. & Weimann, P. (2010). Can a project-based approach enable IS/IT graduates to<br />
add the F to IT? Proceedings of International Conference on <strong>Information</strong> <strong>Management</strong> <strong>and</strong> Evaluation,<br />
University of Cape Town, South Africa, 25 – 26 March 2010.<br />
White, T. (2004). What business really wants from IT: a collaborative guide for business directors <strong>and</strong> CIOs.<br />
London: Butterworth-Heinemann.<br />
Wissenschaftliche Kommission (WK) Wirtschaftsinformatik im Verb<strong>and</strong> der Hochschullehrer (2007),<br />
Rahmenempfehlung für die Universitätsausbildung in Wirtschaftsinformatik, Wirtschaftsinformatik, 49(4),<br />
pp. 318–326<br />
Wurdinger, S. & Rudolph, J. (2009). Teaching Practices that Improve Student Learning: Five Experiential<br />
Approaches. Journal of Teaching <strong>and</strong> Learning, 6(1), pp 1–13.<br />
Yam, L.H.S. & Rossini, P 2010, “Implementing a Project-Based Learning Approach in an Introductory Property<br />
Course”. Proceedings of the 16 th Annual Conference of the Pacific Rim Real Estate Society, Wellington,<br />
New Zeal<strong>and</strong>, 24 – 27 January 2010.<br />
451
Enterprise <strong>Information</strong> Systems of new Generation<br />
Elena Serova<br />
St. Petersburg State University, Russia<br />
serovah@gmail.com<br />
Abstract: Nowadays, in order to make your business competitive <strong>and</strong> prosperous, it is not enough to rely on<br />
one’s bright mind, intuition or luck. Modern business is a complex multicomponent system, one of the primary<br />
elements of which are <strong>Information</strong> <strong>and</strong> Communication Technologies (ICT). In the today's rapidly changing<br />
competitive business environment, only flexible <strong>and</strong> dynamically developing companies are able to meet<br />
competition, companies that have managed to reduce costs <strong>and</strong> improve business efficiency through the<br />
introduction of advanced information technologies. The use of information technology is an essential component<br />
of a company's strategy to succeed in a rapidly changing world. Such information technologies make it possible<br />
for companies to create information systems for effective communication <strong>and</strong> mutual underst<strong>and</strong>ing among staff<br />
members, as well as to support operational management decision making at all levels. In the future the decisions<br />
in the sphere of information technologies, should allow uniting people, information <strong>and</strong> business processes into a<br />
unified information system in a single complex of technological solutions more effectively. Recent trends in the<br />
development of enterprise information systems (EIS) are associated with the intention to use information<br />
generated within the company, in the external environment to ensure cooperation with other enterprises,<br />
customers <strong>and</strong> partners. There has been a separation of concepts: the traditional Enterprise Resource Planning<br />
(ERP) systems management framework is called back-office, <strong>and</strong> external applications, which appeared in the<br />
system, front-office. The main goal of this work is determination of the main trends of enterprise information<br />
systems development. This paper aims at considering the next main tendencies of EIS development: deepening<br />
the ERP functionality, creating new <strong>and</strong> improve existing control modules of B2B business processes, <strong>using</strong><br />
service-oriented architecture (SOA) <strong>and</strong> new platform solutions, applying knowledge management technologies.<br />
This empirical research also covers Customer Relationship <strong>Management</strong>, Supply Chain <strong>Management</strong> systems<br />
<strong>and</strong> deals with Software as a Service (SaaS) <strong>and</strong> Internet technologies issues.<br />
Keywords: enterprise information systems, enterprise recourse planning systems, customer relations<br />
management systems, supply chain management systems<br />
1. Introduction<br />
Although each enterprise is unique in its financial <strong>and</strong> economic activities, there are a number of<br />
problems common to all enterprises. These include the management of material <strong>and</strong> financial<br />
resources, procurement, marketing <strong>and</strong> much more. Enterprise Resource Planning systems provide<br />
comprehensive management of key aspects of financial, industrial <strong>and</strong> commercial activity of<br />
enterprises. These systems provide managers with complete <strong>and</strong> timely information for management<br />
decisions <strong>and</strong> ensure effective data exchange with business partners.<br />
One possible solution to this problem is the implementation <strong>and</strong> use of Enterprise <strong>Information</strong><br />
Systems which have been rapidly developing in recent years. In industrialized countries, despite<br />
much more favorable options for ICT application, issues of choice <strong>and</strong> implementation of modern<br />
information systems <strong>and</strong> tools, that meet market requirements <strong>and</strong> strategic business objectives, are<br />
also in the spotlight. It should also be noted that the focus has shifted towards the development of<br />
external information infrastructure of a company <strong>and</strong> continue to improve the class of intelligent<br />
information technologies <strong>and</strong> knowledge management systems.<br />
Today in the publications on the topic of business efficiency <strong>and</strong> competitiveness of enterprises, many<br />
names <strong>and</strong> acronyms are mentioned, such as PLM, SCM, CRM, ERP. These names come after the<br />
concepts <strong>and</strong> management techniques used by successful companies. Interest in them is growing in<br />
Russia. Leaders of Russian companies are increasingly turning to the experience of the use of<br />
solutions that help integrate the people, information <strong>and</strong> business processes to effectively manage all<br />
areas of business. The term ERP (Enterprise Resource Planning - ERP), is one of the key issues in<br />
this series of current concepts. What is ERP today, what place it occupies in a number of other<br />
corporate information systems, the basic purpose <strong>and</strong> function, particularly the introduction <strong>and</strong><br />
development trends - these are the main topics examined in this study.<br />
2. Main tendencies of modern enterprise information systems development<br />
Recent trends in the development of enterprise information systems are associated with the intention<br />
to use information generated within the company, in the external environment to ensure cooperation<br />
with other enterprises, customers <strong>and</strong> partners. There has been a separation of concepts: the<br />
452
Elena Serova<br />
traditional ERP management framework is called back-office, <strong>and</strong> external applications, which<br />
appeared in the system, front-office. One can distinguish the following five major areas that define the<br />
development trends of modern enterprise information systems:<br />
Deepen the functionality of ERP.<br />
Develop industry-specific solutions.<br />
Create new <strong>and</strong> improve existing control modules of intercorporate business processes.<br />
Use service-oriented architecture (SOA - Service Oriented Architecture).<br />
Use new platform solutions.<br />
Apply technologies for knowledge management.<br />
As a rule, when the functional (system software <strong>and</strong> hardware) of EIS of new generation is<br />
mentioned, the following components are kept in mind:<br />
ERP in the usual sense of the term,<br />
System of Customer Relation <strong>Management</strong> (CRM)<br />
Supply Chain <strong>Management</strong> System (SCM),<br />
Analytics <strong>and</strong> decision support, i.e. Business Intelligence (BI),<br />
Data management system, i.e. <strong>Information</strong> <strong>Management</strong> System (IMS), to integrate all<br />
components,<br />
eCommerce <strong>and</strong> collaboration via the Internet.<br />
So a complex SAP Business Suite incorporates four solutions:<br />
For Customer Relation <strong>Management</strong> - SAP CRM;<br />
For managing Supplier Relation <strong>Management</strong> - SAP SRM;<br />
For Product Lifecycle <strong>Management</strong>-SAP PLM <strong>and</strong><br />
For Supply Chain <strong>Management</strong> (SAP Supply Chain <strong>Management</strong> - SAP SCM).<br />
3. Evolution of the customer relationship management concept<br />
At present time, it is typical for companies with established client network-oriented services <strong>and</strong> sales,<br />
to have an advanced external information infrastructure. It is generally accepted that CRM<br />
technologies are most appropriate for such enterprises. However, it can be assumed that such<br />
technologies are also applicable at industrial enterprises, which are also interested in the<br />
manufactured products, although, naturally, the functions of resource planning <strong>and</strong> quality have a high<br />
enough priority.<br />
The concept of CRM has passed a series of stages in its development, each being a technology<br />
(system) aimed at improving work with clients in the following areas:<br />
Contact <strong>Management</strong>,<br />
Sales Force Automation,<br />
Customer Support,<br />
Quality <strong>Management</strong>.<br />
Subsequently, all of these systems have been integrated into a single entity within the concept of<br />
CRM. CRM is a rather broad concept, covering all aspects of working with clients: the control over<br />
sales to marketing campaigns, evaluating their effectiveness <strong>and</strong> customer support.<br />
There are many definitions of CRM in recent publications. CRM in the context of IT is regarded as<br />
specialized software to automate <strong>and</strong> improve business processes in marketing, sales, customer<br />
service <strong>and</strong> support. CRM in procedural terms may be a business process. The very concept of CRM<br />
- Customer Relationship <strong>Management</strong> - defines the basic business functions of such systems. By<br />
PriceWaterhouseGroup definition: «CRM is a strategy aimed at creating long-lasting <strong>and</strong> profitable<br />
relationships with customers by underst<strong>and</strong>ing their individual needs." In terms of managing a<br />
company’s business, the CRM system is arranging the front-office procedures related to the client's<br />
needs, to proactively work with clients. In comparison with the orientation of business to improve the<br />
453
Elena Serova<br />
back-office work by taking advantage of ERP systems, CRM is aimed at improving sales, not<br />
manufacturing. Such well-known developers of ERP software, like SAP AG, Microsoft, Baan <strong>and</strong><br />
other have long included the CRM-module in their software systems <strong>and</strong> tried to catch up with Siebel<br />
(Oracle developer), which owns more than half the market of CRM-software.<br />
The CRM-systems are divided into operational, analytical <strong>and</strong> collaborational (systems of<br />
cooperation, interaction).<br />
The main task of CRM is increasing the efficiency of business processes, aimed at attracting <strong>and</strong><br />
retaining customers, i.e. marketing, sales, service <strong>and</strong> maintenance.<br />
4. An implementation strategy <strong>and</strong> the main trends in the CRM concept<br />
development<br />
Speaking about the implementation of customer-centric business strategy, it is necessary to focus<br />
attention on the fact that CRM is not just a set of technology tools, software tools appear here only as<br />
one component of this approach. In the first place, the implementation of the CRM concept is a<br />
defined systematic approach to a company activity. To improve business performance by<br />
implementing CRM-system, one must start with an analysis <strong>and</strong> possible subsequent re-engineering<br />
of business processes.<br />
According to analysts, the main causes of unsuccessful projects during the introduction of CRMsystems<br />
are the lack of integration of communication channels, lack of re-engineering processes <strong>and</strong><br />
inability to provide customers with real benefits <strong>and</strong> rewards.<br />
In general, CRM implementation strategy should be based on the following interrelated points:<br />
Customer-oriented company policy should serve as a basis for the introduction <strong>and</strong> subsequent<br />
adaptation of the system;<br />
The level of technological support is defined by business goals;<br />
Structure of IT resources <strong>and</strong> implementation stages are given detailed business tasks distributed<br />
in time.<br />
Exp<strong>and</strong>ed CRM-system may include a variety of modules, or use information from other applications<br />
<strong>and</strong> databases available at the company. However, maximization of the value of each customer, is<br />
achieved mainly through three elements of marketing strategy: organization of integrated marketing<br />
communications channels, development of programs that stimulate dem<strong>and</strong> <strong>and</strong> creation of products<br />
that meet the needs of clients. Accordingly, the most important technological components of the<br />
CRM-system are the following: the subsystem of interactive with customers, monitoring current<br />
operations, as well as database products <strong>and</strong> analytical modules.<br />
One of the main trends of the CRM concept development is the fact that the majority of CRM-products<br />
are considered as an additional element in a company information infrastructure that realizes a<br />
particular function, <strong>and</strong> integrated into it. It is worth emphasizing one more very important point: it is<br />
impossible to consider CRM only as a project to introduce IT technology. Underestimating the role of<br />
proper organization of business processes <strong>and</strong> changing organizations cultural environment will<br />
inevitably lead to failures of implementation. The company must determine - what should be done to<br />
make the business processes conform to the principles of CRM.<br />
Another trend of CRM in terms of functionality is a shift in focus from operational to analytical software<br />
<strong>and</strong> then to collaborational. There is a growing dem<strong>and</strong> for the analytical capabilities of systems, such<br />
as marketing analytics: the analysis of consumer profile, modeling customer behavior, planning<br />
advertising campaigns, etc.<br />
The main advantages that arise from a company that has chosen CRM as a core business strategy<br />
are the following:<br />
Increased sales. Average - 10% increase in annual sales per sales representative in the initial<br />
three years after the implementation of the system. This is due to more efficient sales system that<br />
allows sales representatives to spend more time on the client <strong>and</strong> carry it more efficiently <strong>and</strong> with<br />
more effective monitoring system.<br />
454
Elena Serova<br />
Increase in percentage of deals won. Average - 5% per annum during the initial three years after<br />
the implementation of the system. Increase in the percentage of deals won due to the fact that<br />
<strong>using</strong> the system (for example, <strong>using</strong> the st<strong>and</strong>ard procedure of training a client). You can screen<br />
out undesirable transactions in the earlier stages of the sales.<br />
An increase in margin. Average - 1.3% on the transaction during the initial three years after the<br />
implementation of the system. Increase in margin due to a better underst<strong>and</strong>ing of customer<br />
needs, higher levels of customer satisfaction, <strong>and</strong> as a consequence of a lesser need for<br />
additional discounts.<br />
Improved customer satisfaction. Average - 3% per annum during the initial three years after the<br />
implementation of the system. Improved customer satisfaction is due to the fact that customers<br />
consider a company focused on solving their specific problems <strong>and</strong> see them more attentive to<br />
their needs.<br />
Reduction of administrative costs on sales <strong>and</strong> marketing. Average - a decline of 10% per annum<br />
during the initial three years after the implementation of the system. Firstly, automation of routine<br />
processes results in reduce cost. Secondly, the system allows to define more precisely targeted<br />
customer segments <strong>and</strong> underst<strong>and</strong> their needs <strong>and</strong> to customize products <strong>and</strong> services for these<br />
segments. In this case it isn’t necessary to disseminate information about all services available to<br />
all customers.<br />
5. Supply chain management<br />
SCM (Supply Chain <strong>Management</strong>) systems are designed for planning, coordination <strong>and</strong> fulfillment of<br />
network-wide supply chain of an enterprise. They allow one to automate <strong>and</strong> manage all stages of the<br />
company supply to control all movement of goods in the company to better meet the dem<strong>and</strong> for the<br />
company's products <strong>and</strong> significantly reduce the costs of logistics <strong>and</strong> procurement.<br />
Typically the following areas, on which Supply Chain <strong>Management</strong> is focused, are identified:<br />
Dem<strong>and</strong> planning;<br />
Supply planning;<br />
Procuring;<br />
Manufacturing;<br />
Storing;<br />
Implementing of orders;<br />
Transporting.<br />
As part of SCM-systems the following two subsystems can be distinguished:<br />
SCP (Supply chain planning). In addition to operational planning, SCP-systems allow to carry out<br />
strategic planning of supply chain structure, i.e. develop plans for the supply chain, to simulate<br />
different situations, to evaluate the level of operations, to compare planned <strong>and</strong> actual values.<br />
SCE (Supply Chain Execution) - execution of supply chains in real time.<br />
SCM-systems can move from the concept of a linear supply chain management to the management<br />
of an adaptive supply network. In the current EIS, they can improve the competitiveness of<br />
enterprises, providing access to partners data <strong>and</strong> resources on supply chain <strong>and</strong> enabling intellectual<br />
adaptation to changing market conditions.<br />
6. Relationship management with suppliers<br />
Many companies try to reduce costs through proper selection of suppliers. SRM (Supplier<br />
Relationship <strong>Management</strong>) systems are designed to control the entire cycle of supply: from strategic<br />
planning to implementation. They allow one to optimize the process of selecting suppliers <strong>and</strong> shorten<br />
procurement cycles. Using the SRM-system, companies can build a stable <strong>and</strong> effective relationships<br />
with suppliers on a long term basis. Combining extensive capabilities for analysis, evaluation <strong>and</strong><br />
ranking of suppliers, taking into account all of the procurement of goods <strong>and</strong> services, aligning of<br />
strategies <strong>and</strong> forecasts of the effectiveness of interaction with suppliers through traditional <strong>and</strong><br />
electronic channels of SRM systems in the EIS next generation, help to identify the best partners, the<br />
most relevant to business requirements.<br />
455
Elena Serova<br />
7. eCommerce <strong>and</strong> collaboration via the internet<br />
The development of eCommerce <strong>and</strong> establishment of interactive communication among companies<br />
<strong>and</strong> their partners, suppliers <strong>and</strong> customers via the Internet, gave rise to shift in the emphasis on<br />
intercorporate sector in the development of the concept of enterprise information systems. Therefore,<br />
the ERP systems of new generation receive Web-based architecture, which was a significant<br />
difference from the previous generation of EIS. EIS corporate data storage of new generation is<br />
designed for use in geographically dispersed Web-based community. EIS can be fully integrated into<br />
the Internet <strong>and</strong> work with data placed not in the proper repository, as well as support the publication<br />
or subscription, initiated by the client <strong>and</strong> communicate with other applications <strong>using</strong> EAI-adapters<br />
(EAI - Enterprise Application Integration) <strong>and</strong> the language of XML.<br />
The integration of ERP-systems with eCommerce B2B (Business-to-Business) <strong>and</strong> B2C (Business-to-<br />
Customer) is a natural <strong>and</strong> logical step in the development of enterprise resource planning systems.<br />
Creating <strong>and</strong> maintaining the systems of Internet commerce, especially B2B systems sector, is most<br />
effective when those systems are integrated into enterprise-wide business processes <strong>and</strong> integrated<br />
into the ERP-system.<br />
Intercorporate integration at the level of the relationship among ERP-systems suppliers <strong>and</strong><br />
customers is provided through the following B2B eCommerce, i.e. e-distribution, e-procurement <strong>and</strong><br />
e-marketplace. As eCommerce sector, B2B allows direct communication between market players -<br />
producers <strong>and</strong> consumers, then we say that eCommerce becomes an element of the integration<br />
among ERP-systems of interacting firms. Thus, enterprise information systems of new generation are<br />
becoming part of a large, rapidly growing electronic market.<br />
8. Software as a Service (SaaS)<br />
Software as a Service (SaaS) or Software on Dem<strong>and</strong> (SoD) is a business model, which offers the<br />
software to consumers, in which the supplier develops web-based application, installs it <strong>and</strong> manages<br />
it by giving customers access to software via the Internet. Customers pay not for owning the software<br />
itself but for <strong>using</strong> it (through the API, accessible via the web <strong>and</strong> frequently used web-services). It is<br />
the service <strong>and</strong> interface that are purchased (user or program interface), i.e. some functionality<br />
without a rigid adherence to the method of its implementation.<br />
Although any paid-for web-service can be classified as SaaS, often this term refers to software for<br />
business, <strong>and</strong>, as a rule, software on dem<strong>and</strong> is positioned as a cheaper <strong>and</strong> simpler alternative to<br />
internal corporate systems (back-office).<br />
Along with such obvious advantages, such as economic feasibility, the use of common software core,<br />
which allows to plan the computing power <strong>and</strong> reduce the overall amount of resources, there are<br />
several constraints that limit the use of this model.<br />
In the first place, these are the problems associated with information security. The possibility of<br />
information leakage virtually eliminates the use of the concept of SaaS for mission-critical systems,<br />
which are h<strong>and</strong>led as strictly confidential data.<br />
Secondly, the concept of SaaS is ineffective for systems that require a deep individual adaptation for<br />
each customer, as well as innovative <strong>and</strong> customized solutions.<br />
Thirdly, the use of software on dem<strong>and</strong> means being tied to a single developer that hosts the software<br />
on its site <strong>and</strong> carrying out its administration <strong>and</strong> support.<br />
And finally, the limiting factor is the need for SaaS permanent connection to the high speed Internet. It<br />
is worth noting, that with the development of the Internet, the significance of this factor is reduced <strong>and</strong><br />
in many developed countries it should not be considered.<br />
Currently, in many functional classes of EIS one can find systems that support a SaaS model. For<br />
example, for CRM <strong>and</strong> HCM (Human Capital <strong>Management</strong>) systems, the concept of SaaS fits<br />
particularly well, <strong>and</strong> is being actively enforced.<br />
456
9. Conclusion<br />
Elena Serova<br />
At present, business technologies, along with information <strong>and</strong> communication technologies, overlap<br />
more <strong>and</strong> more closely. In Russia, as well as worldwide IT became a critical element of the chain of<br />
the product or service design <strong>and</strong> profit. Earnings of companies are growing not only due to a<br />
significant cost reduction <strong>and</strong> management optimization, but also due to the implementation of<br />
modern information technologies <strong>and</strong> systems.<br />
Although each enterprise is unique in its financial <strong>and</strong> economic activities, there are a number of<br />
problems common to all enterprises. These include the management of material <strong>and</strong> financial<br />
resources, procurement, marketing <strong>and</strong> much more. ERP-systems provide comprehensive<br />
management of key aspects of financial, industrial <strong>and</strong> commercial activity of enterprises. These<br />
systems provide managers with complete <strong>and</strong> timely information for management decisions <strong>and</strong><br />
ensure effective data exchange with business partners.<br />
Strengthening of integration processes in the business world leads to the fact that companies are now<br />
involved in the environment that combines inner sphere of the company's business, all business<br />
partners <strong>and</strong> customers. In the future the decisions in the sphere of information technologies, should<br />
allow to integrate people, information <strong>and</strong> business processes into a unified information system in a<br />
single complex of technological solutions more effectively.<br />
References<br />
Axelsson Bjorn, Rozemeijer Frank, Wynstra Finn. (2006) Developing Sourcing Capabilities. Creating strategic<br />
change in purchasing <strong>and</strong> supply management. John Wiley & Sons, USA.<br />
Kazantsev, A.K.,Serova, E.G., Serova, L.S., Rudenko, E.A. (2007) Informatsionno-tekhnologicheskie resursy<br />
rossiyskoy ekonomiki (<strong>Information</strong> technology resources of Russia’s economy), St. Petersburg University<br />
Publishing House, St. Petersburg.<br />
Kumar, V., Reinartz, Werner J. (2006) Customer relationship management: a databased approach, John Wiley &<br />
Sons, Hoboken.<br />
Payne, Adrian. (2006) H<strong>and</strong>book of CRM: achieving excellence in customer management, Elsevier, Amsterdam.<br />
Pearlson Keri E., Saunders Carol S. (2006) Managing <strong>and</strong> Using <strong>Information</strong> Systems. A Strategic Approach.<br />
Third Edition, John Wiley & Sons, USA.<br />
Rainer R., Turban E., Potter Richard E. (2006) Introduction to <strong>Information</strong> Systems: Supporting <strong>and</strong> Transforming<br />
Business, John Wiley, USA.<br />
Serova E.G. (2009) “CRM Concept <strong>and</strong> its place in General Strategy of Company Development”, Proceeding of<br />
the IV Scientific-practical conference “Modern <strong>Management</strong>: problems <strong>and</strong> prospects”, St. Petersburg State<br />
University of Engineering <strong>and</strong> Economics, St. Petersburg, Russia, April, pp. 301–306.<br />
Serova E.G. (2008) “Modern Approaches of Computer Modeling for Business-tasks decision” Proceedings of the<br />
Ninth All-Russian symposium “Strategic Planning <strong>and</strong> Evolution of Enterprises”, CEMI RAS, Moscow, April,<br />
pp. 154–156.<br />
Turban, E., Leidner, D., McLean, E., Wetherbe, J. (2008) <strong>Information</strong> technologies for <strong>Management</strong>.<br />
Transforming Organization in the Digital Economy, John Wiley, New York.<br />
White, Terry. (2004) What business really wants from IT: a collaborative guide for senior business <strong>and</strong> IT<br />
managers, Elsevier, London.<br />
457
Post-ERP Feral System Taxonomy: A Manifestation From<br />
Multiple Case Studies<br />
Sharina Tajul Urus, Alemayehu Molla <strong>and</strong> Say Yen Teoh<br />
RMIT University, Melbourne, Australia<br />
sharina.tajulurus@rmit.edu.au<br />
alemayehu.molla@rmit.edu.au<br />
sayyen.teoh@rmit.edu.au<br />
Abstract: The implementation of ERP usually assumed to eliminate department <strong>and</strong> user based information<br />
systems. However, users seek out alternative when they are uncomfortable with prescribed ERP protocol.<br />
Through user’s innovation <strong>and</strong> creativity, they create their own information system or workaround the system to<br />
facilitate their work, thus evolve a phenomenon known as ‘feral systems’. The previous literature has recognised<br />
the impact of feral systems but has not provided a comprehensive framework for classifying the different<br />
manifestations <strong>and</strong> types of feral systems. This paper proposes a feral system classification taxonomy. The<br />
taxonomy is developed through case studies of three organisations- two from an oil <strong>and</strong> gas sector <strong>and</strong> the third<br />
from automotive components manufacturing. The findings indicate feral systems differ in terms of who authorises<br />
them what they are <strong>and</strong> why they exist. Feral system taxonomy is classified into six different type. This study<br />
offers an in-depth exploration of the manifestations <strong>and</strong> development of feral system taxonomy. As such the<br />
study will contribute on how organisations can identify feral system in order to highlight the impact it brings to the<br />
organization <strong>and</strong> how to better manage feral system.<br />
Keywords: user innovation, post- ERP feral systems taxonomy, case studies, SAP<br />
1. Introduction<br />
The implementation of ERP is assumed to eliminate department <strong>and</strong> user based information systems,<br />
yet some studies (Oliver & Romm 2002) believed it is not always the case. Issues such as lack of<br />
trust on ERP system, users resistance to changes, ineffective training methods <strong>and</strong> complexity in<br />
extracting data from ERP system could lead to users’ resistance or refusal of or building way around<br />
to ERP systems (Houghton & Kerr 2006). Thus, users might not necessarily rely totally on the main<br />
system (ERP) sanctioned by the organisation but rather develop their own systems or database to<br />
facilitate their work- a phenomenon known as “feral systems”.<br />
The development of post ERP-feral system may derive from the users’ innovativeness in <strong>using</strong> the<br />
technologies. This could be well explain by the ‘technologies in- practice’ concept (Orlikowski 2000).<br />
Orlikowski (2000) proposed that a practice lens focuses on knowledgeable human action <strong>and</strong> how its<br />
recurrent engagement with a given technology constitutes <strong>and</strong> reconstitutes particular emergent<br />
structures of <strong>using</strong> technology (technologies-in practice). Therefore, the emphasis have been shifted<br />
on given technologies, embodied structures <strong>and</strong> their influence on use to a focus on human agency<br />
<strong>and</strong> enactment of emergent structures in the recurrent use of the technologies. The enactment were<br />
characterised either in term of inertia (where users choose to use technology to retain their way of<br />
doing things), application (where people choose to use the new technology to refine their ways of<br />
doing things) or even change (where people choose to use the new technology to substantially alter<br />
their ways of doing things) (Orlikowski 2000).<br />
A few researchers (Houghton & Kerr 2006; Kerr & Houghton 2008, 2010; Kerr, Houghton & Burgess<br />
2007) have studied feral systems. Nevertheless, the existing post ERP literature has not provided a<br />
comprehensive taxonomy that will help in the classification of feral systems. Given the difficulty of<br />
researching feral systems (see Behrens 2009), the absence of a clear mechanisms for identifying<br />
feral systems makes the building of a cumulative research tradition to explain the causes <strong>and</strong> impacts<br />
of feral system difficult if not impossible. Further, feral systems might not have uniform <strong>and</strong>/or single<br />
manifestation. Rather they might vary in scope, in purpose <strong>and</strong> in their nature.<br />
This paper therefore addresses the above gap by developing a taxonomy that will help in the<br />
identification <strong>and</strong> classification of feral systems. The main research question is “What are the<br />
different manifestations of Feral Systems <strong>and</strong> How could they be classified?” The framework<br />
developed through multiple case studies. From these, we shed light to the feral system <strong>and</strong> ERP<br />
literature through a deep exploration of the conceptualization <strong>and</strong> classification of the ‘feral system<br />
phenomenon’ within ERP environments. This paper also enables managers to recognise the ‘feral<br />
system phenomenon’ that might influence the use of ERP system in the organisation either in a<br />
458
Sharina Tajul Urus, Alemayehu Molla <strong>and</strong> Say Yen Teoh<br />
positive or negative manner. The remaining part of this paper is organised as follow. Next, a brief<br />
literature provided in the next section. Then, we outline <strong>and</strong> discuss the methodology. Following that,<br />
we describe the cases <strong>and</strong> feral systems in the finding section. The final section concludes the paper<br />
with discussion <strong>and</strong> summary.<br />
2. Background<br />
To conceptualise feral system, we should first define it. Startlingly, there is imprecise definition of feral<br />
system used in the general IS field <strong>and</strong> specific context of ERP research. The review from previous<br />
literature have identified three basic concepts used to define the Post-ERP feral systems – “Feral<br />
systems”, “Workaround systems” <strong>and</strong> “Shadow system”. The definition of the three basic concepts is<br />
illustrated in the above table (Table 1).<br />
Table 1: Summary of feral system conceptualisation<br />
Reference Terminology Definition<br />
Houghton <strong>and</strong> Feral System “An information system (computerized) that is developed by individuals<br />
Kerr (2006)<br />
or group of employees to help them with their work, but is not condoned<br />
by management nor its part of the corporation‘s accepted information<br />
technology infrastructure. Its development is designed to circumvent<br />
existing organizational information system”.<br />
Poelmans Workaround “A coping strategy that deviates from strategies that have been defined<br />
(1999)<br />
System in the work flow system (WFS). End users work around the system to<br />
save the time or efforts or to avoid the limitations of the WFS.”<br />
Behrens <strong>and</strong><br />
Sedera (2004)<br />
Shadow<br />
System<br />
“Systems which replicate in full or in part data <strong>and</strong>/or functionality of the<br />
legitimate system in the organization”.<br />
While feral, shadow <strong>and</strong> workaround systems are sometimes used interchangeably, Houghton <strong>and</strong><br />
Kerr (2006) argue that the feral systems are not similar to workaround. This is because workaround is<br />
created with the intention to bypass a recognized problem <strong>and</strong> to fix the problem temporarily<br />
(Koopman & Hoffman 2003; Poelmans 1999). On the contrary, feral systems are the deliberate<br />
attempts to permanently circumvent a fully functional <strong>and</strong> operationally sound system. Nevertheless,<br />
while all feral systems can be classified as workaround systems, the reverse is not true. As such,<br />
workaround systems become feral systems only when they are user created <strong>and</strong> their usage is<br />
outside the formal information systems. For example, Koopman <strong>and</strong> Hoffman (2003) reported how<br />
end users created a workaround system by modifying input data <strong>and</strong> operations to compensate the<br />
deficiency of a formal system.<br />
One notable observation from the literature is that, the concept of “system” in feral system has not<br />
always been clear. Some authors proposed feral system as ‘system’ or ‘information system’(Behrens<br />
& Sedera 2004; Houghton & Kerr 2006) , while other define it as strategy (Poelmans 1999). The<br />
‘system’ also sometimes refers to a fully functional information system which has been created<br />
outside accepted ERP systems (Behrens 2009; Houghton & Kerr 2006) or the use of personal<br />
software like Microsoft Excel <strong>and</strong> Microsoft Access (Houghton & Kerr 2006; Kerr, Houghton &<br />
Burgess 2007). One thing obvious about the previous studies on feral systems is that there is hardly a<br />
clear framework to identify <strong>and</strong> classify feral systems. In order to conceptualise feral system definition,<br />
there are few relevant questions to illustrate its concept. These questions surround issues such as:<br />
Who sanctions them? What it is? Why it is exists? Answers from these questions will chart a direction<br />
to the development of feral system taxonomy. Thus, this study is the first to use both previous studies<br />
<strong>and</strong> case evidence to define feral system classification taxonomy.<br />
3. Research method<br />
This research utilised qualitative research approach <strong>using</strong> exploratory multiple case studies.<br />
Exploratory case study is useful for studying complex phenomenon in their natural setting <strong>and</strong><br />
appropriate for new topic areas (Eisenhardt 1989). Four large organisations from Malaysia that have<br />
implemented ERP systems were approached. Three agreed to participate, which we will refer here as<br />
Case A, B <strong>and</strong> C. Data were collected through face-to-face interviews with 30 interviewees over the<br />
period of 3 months from 15 th March 2010 until 15 th June 2010. Each interview lasted between 1 hour<br />
to 1 ½ hours. The interview questions were open ended in nature with additional questions exp<strong>and</strong>ing<br />
on emerging themes. Table 2 below provides a summary of interviewees’ profile.<br />
459
Table 2: Summary of interviewee profile<br />
Cases No. of<br />
Participants<br />
Sharina Tajul Urus, Alemayehu Molla <strong>and</strong> Say Yen Teoh<br />
A 13 -Finance <strong>and</strong> Planning<br />
-Engineering <strong>and</strong> Services<br />
-Operations<br />
-Operating Performance &<br />
Improvement<br />
-Human Resource<br />
-Supply Chain <strong>Management</strong><br />
B 4 -Finance <strong>and</strong> Planning<br />
-Human Resource<br />
-SupplyChain <strong>Management</strong><br />
C 13 -MIS/SAP<br />
Departments Covered Interviewees’ Job Titles Participants<br />
Code<br />
-Finance<br />
-Production Planning<br />
Control<br />
-Purchasing Vendor<br />
-Manager (1), Executive (2)<br />
-Senior manager (1) Executive<br />
(1)<br />
-Manager (1), Executive (1)<br />
-Executive (1), Clerk (1)<br />
-Executive (1), Supervisor (1)<br />
-Manager (1), Buyer (1)<br />
-Executive (1), Clerk (1)<br />
-Clerk (1)<br />
-Executive (1)<br />
-Senior manager (1), Manager<br />
(1) , Executive (2)<br />
- Manager (1), Assistant<br />
manager<br />
(2) ,Supervisor (1)<br />
- Executive (1), Supervisor (1),<br />
Clerk (1)<br />
- Ass. Manager (1), Clerk (1)<br />
M1,E2,E3<br />
M4,E5<br />
M6, E7<br />
E8, C9<br />
E10, S11<br />
M12, B13<br />
E14,C15<br />
C16<br />
E17<br />
M18, M19, E20,<br />
E21<br />
M22,M23,<br />
M24,S25<br />
E26,S27,C28<br />
M29, C30<br />
Data analysis was performed <strong>using</strong> the grounded theory method approach proposed by Strauss <strong>and</strong><br />
Corbin (1998). We start with the transcription of the interviews. Since the interviews were conducted<br />
in mixed language (English <strong>and</strong> Bahasa Malaysia), the data was translated into English. This process<br />
carried out to facilitate the analysis process as well as to provide consistency in data transcription. To<br />
ensure validity, a third party verified the translation of interviews from Bahasa Malaysia to English.<br />
Open coding was used to analyse the data as suggested by Strauss <strong>and</strong> Corbin (1998). Coding is the<br />
process of identifying justificatory statements <strong>and</strong> developing conceptual categories from them. By<br />
<strong>using</strong> the open coding, categories along with their properties <strong>and</strong> dimension extracted from the raw<br />
data. The process of coding is an iterative process where we detect the expressive statement in data<br />
<strong>and</strong> form the relation between these.Additionally, it is also appropriate to revise some coding<br />
categories during the analysis stage, which require us to revisit the data that that already coded.<br />
4. Case studies<br />
4.1 Case description background<br />
The following table outline the summary of case profile<br />
Table 3: Summary of case profile<br />
Name Area Founded SAP System <strong>and</strong> Modules Systems Authorisation<br />
Case A Subsidiary 1997 SAP R/3<br />
IT Department,<br />
of leading Oil<br />
Material <strong>and</strong> <strong>Management</strong> , SAP Business Support,<br />
<strong>and</strong> Gas<br />
Financial <strong>Information</strong> <strong>and</strong> Controlling Corporate <strong>Information</strong><br />
Company in<br />
(FICO)<br />
Development Unit<br />
Malaysia<br />
Human Resource <strong>Information</strong> System<br />
(HARIS),<br />
Plant <strong>and</strong> Maintenance<br />
(CIDU)<br />
Case B Subsidiary 1999 SAP R/3<br />
IT Department Unit,<br />
of leading Oil<br />
Material <strong>and</strong> <strong>Management</strong> , SAP Business Support,<br />
<strong>and</strong> Gas<br />
Financial <strong>Information</strong> <strong>and</strong> Controlling Corporate <strong>Information</strong><br />
Company in<br />
(FICO)<br />
Development Unit<br />
Malaysia<br />
Human Resource <strong>Information</strong> System<br />
(HARIS),<br />
Plant <strong>and</strong> Maintenance<br />
(CIDU)<br />
Case C Automotive 1991 SAP ECC 5<br />
<strong>Management</strong> <strong>Information</strong><br />
Components<br />
Financial (FI),<br />
System (MIS) & SAP<br />
Manufacturer<br />
Controlling (CO),<br />
Material <strong>Management</strong> (MM),<br />
Production <strong>and</strong> Planning (PP) <strong>and</strong><br />
Sales <strong>and</strong> Distribution (SD)<br />
department<br />
460
4.2 Description of feral systems<br />
Sharina Tajul Urus, Alemayehu Molla <strong>and</strong> Say Yen Teoh<br />
Thirty interviews were conducted across all departments that used SAP system in the three case<br />
companies (A, B <strong>and</strong> C). We found the feral systems mainly in the finance departments of each case<br />
organisation. Examples are extensive use Microsoft Excel in all three cases, Invoice Tracking System<br />
(Case A), <strong>and</strong> Online Bank Reconciliation (Case A) .Below we describe each of these feral systems.<br />
4.2.1 Use of information technology<br />
A number of instances of Microsoft Excel use have been found in all three cases to overcome either<br />
the limitation or the shortcoming of ERP system in areas such as preparation of petty cash, cashbook<br />
<strong>and</strong> creditor listing <strong>and</strong> report customisation. For example, a Buyer in the Supply Chain <strong>Management</strong><br />
department of case A heavily relies on Excel to produce customised reports. An Executive from the<br />
Engineering <strong>and</strong> Service department of Case A describes how the existing legitimate system is<br />
unable to provide detailed report. That’s why Excel is used to supplement reporting functionalities of<br />
the ERP system:<br />
“You cannot generate report from SAP. The SAP purpose is mainly to key in the data<br />
<strong>and</strong> also attach the report, so that other people could use it for future reference. You can<br />
just click this button (in excel) to know the history, let’s say on the equipment failure <strong>and</strong><br />
then, you key-in into the SAP [...]. SAP is a system where you can gather all the<br />
information that you have <strong>and</strong> store in one particular system. However, detail reports<br />
need to be done separately, in Excel or others.” (E3)<br />
In some other cases, excel is used to duplicate the work in SAP. For example, the Assistant Manager<br />
of Finance department in Case C indicated that their use of Excel instead of SAP to prepare Journal<br />
Voucher duplicates the function of SAP. Another example from Case C is in the area of petty cash<br />
preparation.<br />
“I try to reduce the duplication of my work. It is quite difficult since I need to prepare in<br />
excel, then I need to compile the SAP report <strong>and</strong> check whether it is the same or not.<br />
What I meant with the duplication is referred to the redundancy of the work. Like, for<br />
Petty Cash claim, when I receive the claim from our staff, I need to post it into excel<br />
immediately. I do not need to compile it until end of the month. Then, I need to check<br />
petty cash from excel whether it tale with the system (SAP).” (S25)<br />
Microsoft excel is also used to supplant the function of ERP system. An example is the creditors<br />
ageing used by the Purchasing <strong>and</strong> Vendor department of Case C. Although the creditor ageing is<br />
usually generated through SAP system, in this department, the clerk prepares her own creditors<br />
ageing in Excel, which leads to two versions of truth.<br />
“We use excel to monitor the supplier status. Yes, we can use SAP for that purpose but<br />
we need to go through various report but in excel, I use colour code (from the excel<br />
template) to make it easier to identify [...]. From what I know, the creditors ageing from<br />
the system do not provide me with detail analysis. For example, what is the actual<br />
problem with the specific Purchase Order or why it is hanged?” (C30)<br />
4.2.2 Invoice tracking system<br />
Invoice Tracking System is another example of feral information system found in Case A. An<br />
individual from the Finance Department developed this system. The system has been in use since<br />
2005 <strong>and</strong> was developed for the purpose of tracking <strong>and</strong> monitoring vendors’ payment. Either the IT<br />
Department Unit or SAP Business Support Unit, or Corporate <strong>Information</strong> Development Unit of Case<br />
A. did not sanction the creation <strong>and</strong> use of this system. Thus, IPerintis is not responsible in the<br />
maintenance <strong>and</strong> upgrading of the Invoice Tracking System. Like Bank Reconciliation, the system<br />
duplicates a functionality of SAP, specifically, that of invoice parking:<br />
“Invoice Tracking System is used to monitor outst<strong>and</strong>ing payments to vendors. So,<br />
whenever, there are invoices yet to be approved, we put them there. There is a similar<br />
function in SAP for tracking invoices (M1)<br />
Clerks from Finance <strong>and</strong> Planning Department key-in invoice details in the Invoice Tracking System<br />
while at the same time ‘parking’ the same invoice in the SAP system. They do this process<br />
simultaneously. An executive of Finance <strong>and</strong> Planning department explains this:<br />
461
Sharina Tajul Urus, Alemayehu Molla <strong>and</strong> Say Yen Teoh<br />
“Invoice will be keyed-in into the Invoice Tracking System <strong>and</strong> at the same time we will<br />
enter into the ‘park document' function of SAP. We are doing it simultaneously. From the<br />
park document, we can generate reports. It provides record that shows pending invoice<br />
for payment. Once the issue is settled, we have to remove the invoice from the park <strong>and</strong><br />
post it to the actual cost of the system.” (E3)<br />
4.2.3 Bank reconciliation<br />
Bank Reconciliation is a web based system that is created outside the accepted ERP system<br />
environment by an individual from Finance Department in Case A. Either the IT Department Unit, or<br />
SAP Business Support Unit or Corporate <strong>Information</strong> Development Unit (CIDU) did not sanction the<br />
development <strong>and</strong> use of Bank Reconciliation. Therefore, the maintenance <strong>and</strong> upgrading process of<br />
Bank Reconciliation system is not supported by the IPerintis (the third party that is responsible for<br />
Case A’s information systems management). The system duplicates a functionality of SAP. Although<br />
the Bank Reconciliation function is already available in the SAP system, Finance <strong>and</strong> Planning staffs<br />
prefer to use the Online Bank Reconciliation system. According to the Manager of Finance <strong>and</strong><br />
Planning (M1) of case A:<br />
“When I came here, I thought that everybody is <strong>using</strong> the SAP bank reconciliation which<br />
is one of the functions in Accounts Payable. In SAP, the bank reconciliation function<br />
reads from the tape <strong>and</strong> runs the bank reconciliation but this is not the case in A. We<br />
prepare the bank reconciliation online. I was very surprised at first. When I came here,<br />
the practice is already like that. It is because of the previous user, the people before us.”<br />
According to the Finance <strong>and</strong> Planning Executive (E2), users prefer the feral bank reconciliation<br />
system because “The online version is much simpler. It is very simple since our transaction is not that<br />
much, but the SAP function is there. I think we should be <strong>using</strong> it.” However, the use of this system<br />
<strong>and</strong> the problem it creates (such as the unsuitability of the data codes created <strong>using</strong> the Bank<br />
Reconciliation system for SAP) has been noticed <strong>and</strong> Case A is planning to phase out this feral<br />
system. As noted by the Manager of Finance <strong>and</strong> Planning Department:<br />
“We have the intention to fully utilise the SAP function in the future but of course, we<br />
have to do the clean up before we run the bank reconciliation through SAP. We need to<br />
clean up especially on the SAP account codes. Otherwise, there will be many line items<br />
that will not be reconciled.” (M1)<br />
5. Discussion: Feral system taxonomy<br />
The coding <strong>and</strong> analysis of the interviews has identified three basic dimensions that can be used in<br />
the classification of feral systems. These are the “type of application”, “sanction” <strong>and</strong> “purpose of the<br />
application”. These dimensions correspond to the questions of what is developed, who authorise the<br />
development <strong>and</strong> use <strong>and</strong> why the system is created respectively. The following section discusses<br />
each of these dimensions.<br />
5.1 Sanction <strong>and</strong> ownership (who authorises them?)<br />
In describing feral systems legitimacy play a major role. Legitimacy refers to whether the “system”<br />
created is sanctioned or not by the organization. Because end users to replicate some functionalities<br />
of legitimate system (such as ERP) in an organisation create feral systems (especially feral<br />
information systems), they are not condoned or approved by the management. Sanctioning of system<br />
is also associated with system compliance. Compliance is where a user interacts with systems in the<br />
prescribed manner (Ferneley & Sobreperez 2006). Users comply with the sanctioned information<br />
system such as ERP due to its legality (legitimacy). In such instance, the systems existence is<br />
authorised by the management (or it’s designate such as IT executives) <strong>and</strong> the system is part of an<br />
organisation’s accepted information technology infrastructure. The creation of feral system is usually<br />
beyond an organisation’s accepted information systems. Thus, feral system existence may indicate<br />
users’ uneasiness towards the corporate approved information systems such as ERP system (Kerr,<br />
Houghton & Burgess 2007) or lack of control from the management. For instance, in a situation where<br />
a control system is being well maintained in an organisation, there would be little evidence of feral<br />
system found <strong>and</strong> vice-versa (Houghton & Kerr 2006; Kerr, Houghton & Burgess 2007).<br />
462
Sharina Tajul Urus, Alemayehu Molla <strong>and</strong> Say Yen Teoh<br />
5.2 Type of feral system applications (what it is?)<br />
The type of application refers to what constitutes the “system” in feral systems. The analysis reveals<br />
three general types of feral systems ‘feral information system’ ‘feral data’ <strong>and</strong> ‘feral use of information<br />
technology’. Feral information system refers to an information system or data created or used by<br />
individual or group which intend either to supplant or to supplement a formal organisational<br />
information system. Feral information systems are created as comprehensive or complete systems<br />
with many elements that are highly interrelated <strong>and</strong> interconnected. The unique characteristics of feral<br />
information systems are that they are reasonably well built, have some degree of sophistication in<br />
their functionality <strong>and</strong> provide mechanisms for inputting data, processing it <strong>and</strong> extracting output.<br />
Feral information system usually is a non-sanctioned system <strong>and</strong> operates outside an ERP system<br />
environment. The Bank Reconciliation <strong>and</strong> Invoice Tracking Systems described earlier are example of<br />
feral information system. Other examples of feral information systems reported in the literature include<br />
Webfuse, a learning management system that provides most functionalities of commercial learning<br />
management systems (Behrens, 2009).<br />
The second type of feral system is ‘Feral use of <strong>Information</strong> Technology’. It refers to the use of<br />
<strong>Information</strong> Technology by end users to either supplant an ERP system function or supplement the<br />
limitations of an ERP system. For instance, this is demonstrated through Microsoft Excel used for the<br />
customisation of reporting <strong>and</strong> petty cash preparation as described above. Example from the literature<br />
includes Kerr, Houghton et al.(2007) who reported how Microsoft Excel <strong>and</strong> Access are used for<br />
planning outside SAP system <strong>and</strong> how that led to little or no visibility of the plan to the organisation<br />
<strong>and</strong> its being not reflected in the corporate plan. Ignatiadis <strong>and</strong> N<strong>and</strong>hakumar (2009) also report a<br />
feral use of IT (Excel) for report generation; further processing of data produced by SAP <strong>and</strong> as a<br />
medium of communication which has resulted in portraying a false picture of the company.<br />
Feral <strong>Information</strong> System <strong>and</strong> Feral Use of IT can lead to the third type of feral system which we refer<br />
to as ‘Feral Data’. Feral data refers to data that is stored outside the formal system (such as ERP).<br />
The Petty Cash described earlier are examples of Feral Data. In the literature, it is reported that users<br />
often extract data from the formal system (ERP) <strong>and</strong> made necessary adjustment or modification in<br />
order to suit with their needs (Kerr & Houghton 2008; Kerr, Houghton & Burgess 2007). However,<br />
when such users fail to integrate it back into the formal system for operational, forecasting or<br />
knowledge management purposes, this can lead to the data being out of sync with formal systems<br />
<strong>and</strong> become feral data. Kerr <strong>and</strong> Houghton (2010) have discussed an example of a feral data “grass<br />
stock” which is different from the actual data reported in ERP system <strong>and</strong> which led to inaccurate<br />
forecast <strong>and</strong> business analytics output (Kerr & Houghton 2010).<br />
5.3 The purpose of the artefact (why it exists?)<br />
Based on our case studies, two different purposes of feral systems can be identified. We refer to<br />
these purposes as supplant <strong>and</strong> supplement. Supplant refers to those feral systems that are<br />
developed to replace some, if not most, of the functionalities of the existing ERP system. There are<br />
two main elements to supplanting- circumvention or duplication. Circumvention means ‘getting<br />
around’ the ERP systems (Houghton & Kerr 2006). Circumvention occurs due to the stringent rules<br />
<strong>and</strong> complexities of ERP systems. For example, Bendoly <strong>and</strong> Cotteleer’s (2008) case studies that<br />
examine the circumvention of IT-systems rules following implementation of ERP systems indicate that<br />
users of IT systems may “retain strong intentions to circumvent systems in the presence of perceived<br />
task-technology misfit” (p. 23). Duplication on the other h<strong>and</strong> refers to the act of repeating either fully<br />
or partly the data <strong>and</strong>/or functionality of ERP systems. It means that the information system, data or<br />
use of technology is created for replicating some of the functionalities of ERP systems.<br />
On the other h<strong>and</strong>, supplement feral systems refer to the use of feral information systems or data, or<br />
IT to overcome the lack of functions in installed ERP systems. The supplementing act usually occurs<br />
due to gap between stakeholders’ requirements <strong>and</strong> ERP provisions. As described above, users rely<br />
in office automation technologies such as Microsoft Excel <strong>and</strong> Microsoft Excess when ERP systems<br />
do not provide them with the right tool to undertake their task. Our interviewees indicate that<br />
spreadsheets are suitable for creating reports <strong>and</strong> analysing historical data in situations where the<br />
st<strong>and</strong>ard reporting functionality of the ERP system is insufficient or poor.This implies that supplement<br />
feral systems can be associated with the positive effect of feral system for their host. Some of these<br />
positive effects include providing information <strong>and</strong> functionality that meets the needs of the individual<br />
department within the organisation, capacity to foster creativity, perceived innovativeness qualities<br />
463
Sharina Tajul Urus, Alemayehu Molla <strong>and</strong> Say Yen Teoh<br />
<strong>and</strong> ability to bring stability <strong>and</strong> order (Behrens 2009; Behrens & Sedera 2004). The combination of<br />
the three dimensions of feral systems identified from the case studies, that is: who authorises them<br />
(sanction <strong>and</strong> ownership), what they are (types of application), why they exist (purpose of application)<br />
<strong>and</strong> led us to develop the post-ERP feral system taxonomy. However, since all feral systems are nonsanctioned,<br />
the taxonomy classifies feral systems into six (6) different types as presented in Table 4<br />
below.<br />
5.4 Summary<br />
This study was set out to address two research questions, “What are the different manifestations of<br />
Feral Systems <strong>and</strong> how could they be classified?” For the first question, the study showed that feral<br />
systems could manifest either in the form of a fully developed information system, or data or use of IT.<br />
Regarding the second question, three dimensions – type of application, sanction <strong>and</strong> purpose are<br />
identified as the basis for classifying feral systems. Below we highlight the main contributions of our<br />
study.<br />
Table 4: Post-ERP feral system taxonomy<br />
Type<br />
Types of Application Purpose of<br />
Application<br />
Feral<br />
Inf<br />
o<br />
Sy<br />
st<br />
e<br />
m<br />
Feral<br />
D<br />
a<br />
t<br />
a<br />
Feral<br />
Us<br />
e<br />
of<br />
Technolo<br />
gy<br />
Suppl<br />
a<br />
-<br />
n<br />
t<br />
Supplem<br />
e<br />
nt<br />
Description of Types<br />
1 X X Feral <strong>Information</strong><br />
System created<br />
by end user to<br />
supplant some of<br />
the functionality<br />
of ERP system<br />
<strong>and</strong> not<br />
sanctioned by<br />
authorised IT<br />
2<br />
body.<br />
X X Feral <strong>Information</strong><br />
System created<br />
by end user to<br />
supplement<br />
some of the<br />
functionality of<br />
ERP system <strong>and</strong><br />
not sanctioned<br />
by authorised IT<br />
body.<br />
3 X X Feral data created by<br />
end user to<br />
supplant some of<br />
the functionality<br />
of ERP system<br />
<strong>and</strong> not<br />
sanctioned by<br />
authorised IT<br />
body.<br />
4 X X Feral data created by<br />
end user to<br />
supplement<br />
some of the<br />
functionality of<br />
ERP system <strong>and</strong><br />
not sanctioned<br />
by authorised IT<br />
body.<br />
464<br />
Example from case<br />
studies <strong>and</strong>/ Or<br />
Previous Studies<br />
Bank Reconciliation,<br />
Invoice Tracking<br />
system<br />
(case studies)<br />
MyInfocom or Webfuse<br />
Response<br />
(Behrens 2009; Jones<br />
et al. 2004)<br />
Dairy (Kerr, Houghton<br />
& Burgess 2007)<br />
Grass Stock (Kerr &<br />
Houghton 2010)<br />
Moving Average Price,<br />
Source List<br />
(Ignatiadis &<br />
N<strong>and</strong>hakumar<br />
2009)
Type<br />
Sharina Tajul Urus, Alemayehu Molla <strong>and</strong> Say Yen Teoh<br />
Types of Application Purpose of<br />
Application<br />
Feral<br />
Inf<br />
o<br />
Sy<br />
st<br />
e<br />
m<br />
Feral<br />
D<br />
a<br />
t<br />
a<br />
Feral<br />
Us<br />
e<br />
of<br />
Technolo<br />
gy<br />
Suppl<br />
a<br />
-<br />
n<br />
t<br />
Supplem<br />
e<br />
nt<br />
Description of Types<br />
5 X X Feral use of<br />
technology by<br />
end user to<br />
supplant some of<br />
the functionality<br />
of ERP system<br />
<strong>and</strong> not<br />
sanctioned by<br />
authorised IT<br />
body.<br />
6 X X Feral use of<br />
technology by<br />
end user to<br />
supplement<br />
some of the<br />
functionality of<br />
ERP system <strong>and</strong><br />
not sanctioned<br />
by authorised IT<br />
body.<br />
Example from case<br />
studies <strong>and</strong>/ Or<br />
Previous Studies<br />
Petty Cash,<br />
Journal Voucher,<br />
Creditors Ageing,<br />
Sales Order (case<br />
studies)<br />
<strong>Management</strong> Report ,<br />
Planning, Service<br />
Order (case<br />
studies)/<br />
(Ignatiadis &<br />
N<strong>and</strong>hakumar<br />
2009; Kerr,<br />
Houghton &<br />
Burgess 2007)<br />
From the theoretical perspective, this paper contributes to ERP <strong>and</strong> IS research by developing<br />
comprehensive feral system taxonomy. Using examples from multiple cases, we arrive at the post–<br />
ERP feral system taxonomy that explains different classification <strong>and</strong> manifestation of feral system into<br />
six different classes. By citing examples from previous literature, we have shown that the developed<br />
taxonomy has validity. Although previous study have identified “feral systems” concept like Behrens &<br />
Sedera (2004) , Houghton <strong>and</strong> Kerr (2006), Kerr, Houghton et al (2007), Kerr <strong>and</strong> Houghton (2010),<br />
this study extends the feral system conceptualisation in a wider scope by classifying them in a more<br />
comprehensive approach. This will facilitate future research in this area.<br />
On the practical point side, this paper could facilitate managers to recognise the ‘feral system<br />
phenomenon’ that might influence the use of ERP system in the organisation either in a positive or<br />
negative manner. For instance, supplement feral systems can provide a positive outcome in terms of<br />
providing information <strong>and</strong> functionality that meets the needs of the individual department within the<br />
organisation, the capacity to foster creativity, perceived innovativeness qualities <strong>and</strong> ability to bring<br />
stability <strong>and</strong> order (Behrens 2009; Behrens & Sedera 2004). Thus managers can tolerate, even if not<br />
encourage, such systems. On the other h<strong>and</strong>, supplant feral systems can have negative impacts as<br />
they can undermine installed ERP systems. In addition, such systems can increase workload, create<br />
redundant work, <strong>and</strong> raise data integrity <strong>and</strong> quality problem (Behrens & Sedera 2004). Thus<br />
managers need to carefully manage <strong>and</strong> control feral system.<br />
References<br />
Behrens, S 2009, 'Shadow Systems: The Good, The Bad <strong>and</strong> The Ugly', Communication of the ACM, vol. 52, no.<br />
2, pp. 124-9.<br />
Behrens, S & Sedera, W 2004, 'Why Do Shadow Systems Exists after an ERP implementation? Lesson From a<br />
Case Study', paper presented to Association for <strong>Information</strong> System<br />
Bendoly, E & Cotteleer, MJ 2008, 'Underst<strong>and</strong>ing behavioural sources of process variation following enterprise<br />
system deployment', Journal of Operations <strong>Management</strong>, vol. 26, no. 1, pp. 23-44.<br />
Eisenhardt, KM 1989, 'Building Theories from Case Study Research', Academy o/<strong>Management</strong> Review, vol. 14,<br />
no. 4, pp. 532-50.<br />
Ferneley, EH & Sobreperez, P 2006, 'Resist, comply or workaround? An examination of different facets of user<br />
engagement with information systems ', European Journal of <strong>Information</strong> Systems, vol. 15, no. 4, pp. pp.<br />
345-56<br />
465
Sharina Tajul Urus, Alemayehu Molla <strong>and</strong> Say Yen Teoh<br />
Houghton, L & Kerr, D 2006, 'A study into the creation of feral information systems as a response to an ERP<br />
implementation within the supply chain of a large government-owned corporation.', Int .J. Internet <strong>and</strong><br />
Enterprise <strong>Management</strong>, vol. 4, no. 2.<br />
Ignatiadis & N<strong>and</strong>hakumar, J 2009, 'The Effect of ERP system workarounds on organisational control',<br />
Sc<strong>and</strong>inavian Journal of <strong>Information</strong> Systems, vol. 21, no. 2, pp. 59-09.<br />
Jones, D, Behrens, S, Jamieson, K & Tansley, E 2004, 'The Rise <strong>and</strong> Fall of Shadow System: Lesson For<br />
Enterprise System Implementation', paper presented to Association for <strong>Information</strong> Systems (ACIS 2004).<br />
Kerr, D & Houghton, L 2008, 'Feral Systems: The likely Effect on Business Analytics Functions in an Enterprise<br />
Resource Planning System Environment', paper presented to 19th Australasian Conference on <strong>Information</strong><br />
Systems, Christchurch, New Zeal<strong>and</strong>, 3-5 December 2008.<br />
---- 2010, 'Just In Time or Just in Case: A Case Study on the Impact of Context in ERP Implementation ',<br />
Australasian Journal of <strong>Information</strong> Systems, vol. 16, no. 2.<br />
Kerr, D, Houghton, L & Burgess, K 2007, 'Power Relationship that lead to the development of Feral Systems',<br />
Australasian Journal of <strong>Information</strong> Systems, vol. 14, no. 2, pp. 141-52.<br />
Koopman, P & Hoffman, RR 2003, 'Work-arounds, Make-work <strong>and</strong> Kludges', Human Centered Computing.<br />
Oliver, D & Romm, C 2002, 'ERP system in Universities: Rationale Advanced of thier Adoption ', in Enterprise<br />
Resource Planning: Global Opportunities <strong>and</strong> Challenges, Idea Group Publishing, Hesley PA, pp. 44-60.<br />
Orlikowski , W 2000, 'Using Technology <strong>and</strong> Constituting Structures: A Parctice Lens for Studying Technology in<br />
Organizations', Organization Science, vol. 11, no. 4, pp. 404-28.<br />
Poelmans, S 1999, 'Workarounds <strong>and</strong> Distributed Viscosity in Workflow System: A Case Study', SIGGGROUP<br />
Bulletin, vol. 20, no. 11, pp. 11-2.<br />
Strauss, A & Corbin, J (eds) 1998, Basics of Qualitative Research: Technique <strong>and</strong> Procedures Developing<br />
Grounded Theory, Second edn, SAGE Publications Ltd, California.<br />
466
Open Source Disease Control Software Development: The<br />
Role of Patients<br />
Jose Teixeira 1 <strong>and</strong> Reima Suomi 2<br />
1<br />
Turku Center for Computer Science, Turku, Finl<strong>and</strong><br />
2<br />
Turku School of Economics, Turku, Finl<strong>and</strong><br />
Jose.Teixeira@tse.fi<br />
Abstract: Healthcare information systems are traditionally developed in institutional organizations such as<br />
medical providers’ research labs, software houses <strong>and</strong> hospitals. IT <strong>and</strong> medical professionals are the perpetual<br />
analysts <strong>and</strong> developers of most health-care information systems on the market. A new phenomenon is emerging<br />
patients that turn themselves in the creators of new healthcare information systems. For this paper we extend our<br />
previous research on how chronic patients are taking the lead on the open-source development of new<br />
healthcare information systems <strong>and</strong> its implications for providers of commercial healthcare information systems.<br />
By systemically screening online communities of diabetic patients, we try to aggregate the feedback that those<br />
patients are giving to these new open-source systems. Moreover, we try to answer how different this new opensource<br />
software is from the installed traditional solutions.<br />
Keywords: eHealth, chronic care, patient empowerment, open-source, user innovation<br />
1. Introduction<br />
We have observed an enormous investment in healthcare information systems but organizations<br />
continue questioning the benefits of such investments. Many studies examining the information<br />
systems performance have been far from conclusive (Devaraj <strong>and</strong> Kohli 2000). Challenges in the<br />
integration <strong>and</strong> st<strong>and</strong>ardization of information systems, the non user-friendliness of many information<br />
systems together with socio-technical <strong>and</strong> organizational issues are limiting the benefits of<br />
investments in healthcare information systems (Kuhn <strong>and</strong> Giuse 2010).<br />
It is empirically observable that healthcare information systems are customary developed by IT<br />
corporations supplying healthcare delivery organizations. Medical <strong>and</strong> IT professionals are the<br />
perpetual developers <strong>and</strong> analysts of healthcare information systems. It is important to notice that<br />
patients rarely take direct participation in the systems design, analysis <strong>and</strong> development. Viitanen<br />
(2009) points out the fact that those patients have very limited access to their own health information,<br />
<strong>and</strong> that current systems do not support interactive collaboration between patients <strong>and</strong> healthcare<br />
workers. In addition, she remarks that current healthcare systems do not allow clinicians to involve the<br />
patients in their own decision-making process or collect patient’s self-reported impressions of their<br />
clinical status. All this gives an idea that current healthcare services are far away from the patientcentered<br />
healthcare idea.<br />
In our previous research, we introduced <strong>and</strong> explored a new phenomenon where chronic patients<br />
develop their own small healthcare systems (Teixeira <strong>and</strong> Suomi 2010). These empowered patients<br />
take the lead, <strong>and</strong> develop by themselves applications that they perceive useful for their chronic<br />
condition. In a second stage, they publish their software artefacts on Internet as an open-source<br />
project, where they look for other potential users, testers or even developers that could contribute in<br />
project's software development.<br />
Figure 1 illustrates how the studied open-source chronic healthcare software communities evolve.<br />
The creation of a community seems to be always triggered by a patient looking for a solution that<br />
could ease her or his health condition: The open-source community is one place where the patient<br />
could look for a solution. If his or her needs are not well addressed he or she can join the open-source<br />
community by contributing to an existing project steering the development of the product to address<br />
his or her needs. Alternatively, if possessing the necessary skills, he or she can try to develop his or<br />
her own solution turning it public to benefit from contributions of other patients.<br />
A web inquiry on http://sourceforge.net, the most popular web-based software source code repository<br />
revealed 38 projects related with the query “diabetes”. From these 38 open-source software projects<br />
publicly available on the Internet, 14 were actively downloaed with at least one weekly average<br />
download. Many of them supported different insulin pump <strong>and</strong> glucose meter models. The structured<br />
observation performed by Teixeira <strong>and</strong> Suomi (2010) identified three open-source healthcare<br />
467
Jose Teixeira <strong>and</strong> Reima Suomi<br />
application targeting chronic patients where the developers manifest their chronic patient status. The<br />
authors strongly believe that many other software applications are developed by the patients<br />
themselves, but developers are reluctant in publicly revealing their chronic patient condition.<br />
Figure 1: The development of open-source chronic healthcare software (Teixeira <strong>and</strong> Suomi 2010)<br />
Our main research question is “what is the feedback that those patients are giving to those new<br />
patient to patient open-source chronic-healthcare systems?” , secondarily we also address “how<br />
different those new open-source systems are from the installed traditional systems”.<br />
With Table 1 we capture information about the three open-source software projects explored by<br />
Teixeira <strong>and</strong> Suomi (2010): First “GNU Gluco Control” that targets diabetics <strong>and</strong> offers an unique<br />
multi-devices support; secondly the “MySHI (My Self Health <strong>Information</strong>)” a database for tracking<br />
personal health information that allows its users to run a web-based health information database in<br />
their own computers: <strong>and</strong> finally “PumpDownload” a diabetes monitoring software that aims to<br />
compatibility with many meters <strong>and</strong> pumps as possibly. Its is important to refer that code contributions<br />
are the ones building the functionality of the core software; non-code contributions are often<br />
localization/translation efforts <strong>and</strong> functional testing.<br />
Table 1: Open-source health systems explicitly developed by patients (authors)<br />
Project Link (http://) Code<br />
contributors<br />
GGC ggc.sourceforge.<br />
net<br />
MSHI sourceforge.net/<br />
projects/myshi/<br />
PD pumpdownload.s<br />
ourceforge.net/<br />
3 active product<br />
core developers<br />
+ 2 active writing<br />
plug-ins for<br />
specific patient<br />
devices.<br />
One very active<br />
developer.<br />
One active<br />
developer + one<br />
anonymous<br />
fixing code bugs.<br />
Non-code<br />
contributions<br />
Many doing<br />
software<br />
translation to<br />
other languages<br />
Positive reviews Negative reviews<br />
Many <strong>using</strong><br />
sourceforge<br />
project<br />
recommendation<br />
<strong>and</strong> review<br />
mechanisms.<br />
None<br />
None None None<br />
None None. Developer<br />
prefers direct<br />
email contact<br />
rather than<br />
forums.<br />
None. Developer<br />
prefers direct<br />
email contact<br />
rather than<br />
forums.<br />
This phenomenon where patients develop their own software that eases their life seems to be a<br />
manifestation of the user innovation phenomenon as described by von Hippel (2005). Users can<br />
develop exactly what they want without relying on manufacturers to act as their agents that very often<br />
468
Jose Teixeira <strong>and</strong> Reima Suomi<br />
do not meet their requirements. Moreover, users that innovate expect to benefit from <strong>using</strong> a product<br />
or service, while manufacturers expect to benefit from selling a product or service. Previous<br />
qualitative <strong>and</strong> quantitative research in many different fields clearly evidence the important role that<br />
users play as first developers of products <strong>and</strong> services that become a later sold by manufacturing<br />
firms (Hippel 2005).<br />
This research contrasts from previous research where the intellectual property resulting from users<br />
involvement is retained <strong>and</strong> controlled by firms. In the phenomenon being study users develop<br />
software that remains in the public body by open-source manners, where the product <strong>and</strong> its<br />
blueprints are freely available for everyone. Moreover, it is important to notice that user's purchasing<br />
behaviour in healthcare is more constrained than in many other verticals where literature already<br />
addresses the involvement of users within firm's product development: For instance, a physician<br />
advise, a national healthcare system reimbursement scheme or a personal health insurance<br />
contractual line can have a huge impact on what medical technology a patient acquires.<br />
The chronic healthcare area, where the phenomenon being studied occurs, is extremely relevant. The<br />
number of citizens to live with a chronic illness in the US is estimated to be 88 millions, circa 33% of<br />
the all country population, being one main challenge of the US national healthcare system. Dozens of<br />
studies, reports <strong>and</strong> audits reveal that sizable proportions of chronically ill patients have not received<br />
effective therapy <strong>and</strong> do not had optimal disease control. Effective chronic care requires a lot of<br />
interaction between the healthcare provider <strong>and</strong> a participative patient, where the therapy is adjusted<br />
for both disease control <strong>and</strong> patient well-being (Rothman <strong>and</strong> Wagner 2003). For diabetes patients,<br />
self-control is vitally important <strong>and</strong> effective at the same time .<br />
2. Methodological considerations<br />
In order to aggregate the patients feedback associated with these new systems, this research took<br />
the form of a structured observation based on publicly available Internet data. The three specific<br />
criteria to the structured observation research method as stated by Martinko <strong>and</strong> Gardner (1985) <strong>and</strong><br />
Mintzberg (1970). First, we relied on an observation by a person other than the subject, secondly we<br />
made use of category systems, thirdly, we did not r<strong>and</strong>omize the sampling procedures. Guided by<br />
Bryman (1995) we opted for non-participant observation where the researcher observes with little<br />
immersion on the setting. The authors believe that this research method fits both the study a<br />
phenomena in which no previous research literature seems available <strong>and</strong> the nature of the opensource<br />
software development where project records are publicly available. We pointed our lenses on<br />
online communities of diabetic patients publicly available on the Internet where patients socialise <strong>and</strong><br />
exchange information related with their chronic status. This rich information is available among others<br />
in the forms of discussion forums, wikis <strong>and</strong> community produced documents; it allows us to build<br />
narratives on what feedback the patients are giving on each specific product. Diabetics often reviewed<br />
devices such as pumps <strong>and</strong> meters, healthcare records tailored for diabetics <strong>and</strong> other Internet<br />
resources full of diabetes specific information. Our structured observation drove us to the identification<br />
of the feedback that those patients provided for each specific open-source solution on different online<br />
communities.<br />
In Table 2 we the list the different online communities of patients covered in our research. Patient<br />
oriented documentation was often freely available together with open-discussion forums. Some of<br />
theses communities had support from several non-governmental organizations, others seamed to be<br />
maintained by volunteers within a national community of patients.<br />
Table 2: Observed patient to patient online communities (authors)<br />
Community Internet link Country Language<br />
Tudiabetes http://www.tudiabetes.org International English<br />
Juvenation http://juvenation.org International English<br />
Diabetesdaily http://www.diabetesdaily.com USA English<br />
Diabetessupport http://www.diabetessupport.co.uk UK English<br />
Usenet-newgroup news://de.sci.medizin.diabetes Germany German<br />
Shotuporputup http://www.shootuporputup.co.uk UK English<br />
Midiabetes http://midiabetes.cl Chile Spanish<br />
Wordpress blogs http://worldgnat.wordpress.com Canada English<br />
469
Jose Teixeira <strong>and</strong> Reima Suomi<br />
The authors were the two observers, performing the observation <strong>and</strong> classification independently in<br />
constant communication <strong>and</strong> results control. The observation was performed in Turku University <strong>using</strong><br />
simple <strong>and</strong> wide available tools such as a Internet browser, a Usenet newsreader <strong>and</strong> spreadsheet<br />
software; it started on the seventh of February 2011 taking a non-continuous period of five days. On<br />
the google search engine <strong>and</strong> <strong>using</strong> the three open-source project names <strong>and</strong> official websites as<br />
keywords, we identified the patient to patient online communities presented in Table 2 , after manually<br />
filtering query results. Google found a total of 1353 of web-pages mentioning the studied open-source<br />
projects, from where we have been able to identify the eight mentioned patient to patient online<br />
communities. All the eight online communities provided search <strong>and</strong> indexing mechanisms, enabling<br />
an easy search for relevant users-feedback on the studied chronic care software projects.<br />
We performed the observations on patient-community information following six different behavioural<br />
classes that guided the structured observation. In Error! Reference source not found. we describe<br />
how we classified the expressed feedback by carefully analysing the patient-provided free-form text<br />
feedback. Using the simple evernote software available at http://www.evernote.com/, two individuals<br />
classified the captured free-form text sentences in parallel obtaining the identical results, therefore<br />
reducing the risk ambiguous behavioural classifications. Note that a single patient phrase could<br />
express multiple behavioural attitudes towards the software.<br />
Table 3: Structured observation classification system (authors).<br />
Behavioural classification Description<br />
User looks for use information Patient looks for information/help on how to use the software.<br />
User express positive feedback Patient expresses satisfaction with the software or gratifies its developer.<br />
User express negative feedback Patient expresses dissatisfaction with the software or blames its<br />
developer.<br />
User reports a bug Patient reports a bug/malfunction on the software.<br />
User requests a new feature Patient suggest a new feature/requirement to the software.<br />
User requests a competitor<br />
feature<br />
Patient suggest a new feature/requirement to the software explicitly<br />
mentioning a competitor product already implementing it.<br />
During our research we identified several open-source healthcare applications targeting chronic<br />
patients; however it is extremely hard to find evidence in the public available information about opensource<br />
projects where the developers manifest their chronic patient condition. This condition limited<br />
the set of analysed projects, even if the research authors strongly believe that many software<br />
applications are developed by the patients themselves, very few publicly reveal themselves as chronic<br />
patients. From an universe of 36 chronic care healthcare software projects analysed, just three<br />
projects contained public information where the lead developer revealed his patient status.<br />
These three projects formed a sample of many other existing healthcare applications developed by<br />
patients. The three projects were started by geographically distributed developers; project’s lead<br />
developers that publicly revealed their nationalities were from Canada, US, Germany <strong>and</strong> Slovenia.<br />
Two of the applications address the diabetes chronic disease <strong>and</strong> one other address fat-related<br />
diseases.<br />
The three cases studied are shortly introduced below.<br />
Project A: GNU Gluco Control<br />
The first of the three studied open-source software projects is named GGC- GNU Gluco Control <strong>and</strong><br />
both the software application <strong>and</strong> its source code can be downloaded from http://ggc.sourceforge.net/.<br />
Current software available version is 0.4 Beta <strong>and</strong> its software developers provide language<br />
translation for English, German <strong>and</strong> Slovene suggesting that those developers contribute from<br />
different geographical locations, a typical pattern in open-source development teams. From the<br />
sizable set of project’s software artefacts we found a research relevant text file, in which the two<br />
leading developers clearly admit their chronic disease “since we are diabetics ourselves, we are trying<br />
to make this software the best it can be” (GGC software project text file README.en, 2010).<br />
Project B: My Self Health <strong>Information</strong><br />
The second observed project is named MSHI- My Self Health <strong>Information</strong>; it is a web-based<br />
application that allows tracking <strong>and</strong> learning about personal health. The base of the software comes<br />
470
Jose Teixeira <strong>and</strong> Reima Suomi<br />
from the USDA National Nutrient Database for St<strong>and</strong>ard Reference (2009) <strong>and</strong> it seems to be<br />
targeted for patients with fat-related diseases. Besides being a project based on web technologies,<br />
the developer is not providing any kind of Internet service, <strong>and</strong> it is suggested that end-user should<br />
install <strong>and</strong> run the software in their own computer, warning of serious risks with posting health<br />
information on any site on Internet. In a wiki supporting the project development he states his believe<br />
that individuals should be able to keep their personal health data organized <strong>and</strong> still private (MyShi<br />
software project page, 2010). A bundle software archive containing both the software <strong>and</strong> its source<br />
code can be downloaded from http://sourceforge.net/projects/myshi/, 0.03b Beta was the latest<br />
release. The project is available only in the English language <strong>and</strong> some software source code<br />
comments suggest that the developer is from the United States. Within the MyShi software project<br />
page, retrieved on the seventh of April 2010 the developer states that the software “is about all that<br />
stuff we maybe should be tracking but don't because it's not easy. diet, weight, blood pressure,<br />
exercise etc” <strong>and</strong> that “MySHI is open source <strong>and</strong> development is driven by the uses” revealing the<br />
user-driven nature of the project. It was important to observe that this project had a single software<br />
developer contributing to the project.<br />
Project C: Pump Download<br />
Third open-source software in our research is named Pump Download <strong>and</strong> its software artifacts can<br />
be downloaded from its Internet site at http://pumpdownload.sourceforge.net/. Current software available<br />
version is 2.0 Beta <strong>and</strong> it is available only in the English language. The lead developer personal blog<br />
revealed his nationality to be Canadadian. Within the project main webpage, the developer expresses<br />
some of his project initiative motivations, below quoted, that together with some software source code<br />
give a strong evidence of his diabetic health condition:<br />
“I got tired of software that had ugly interfaces <strong>and</strong> produced bad records. A few<br />
companies which will go unnamed, make great insulin pumps <strong>and</strong> meters, but write<br />
horrible software. None of them work on Linux, <strong>and</strong> they only support one insulin pump,<br />
or one meter.” (PumpDownload software project page, 2010).<br />
The project was launched in January 2006 <strong>and</strong> <strong>and</strong> it was downloaded 342 time by the beginning of<br />
April 2010. This download number keep it far away from a sourceforge.net popular software<br />
application status, however we must have in consideration that this project is targeting the very<br />
specific diabetics public. Our observation noted that the download peaks shown in Figure 2 are<br />
correlated with the release of new software versions, suggesting that the project maintains a set of<br />
final users that look out for upgrading the software at every new release.<br />
Figure 2: PumpDownload downloads <strong>and</strong> b<strong>and</strong>width evolution (http//sourceforge.net 2010)<br />
471
3. Cross-project analysis<br />
Jose Teixeira <strong>and</strong> Reima Suomi<br />
A quantitative summary of our research is presented within Table 4 . Surprisingly, no patients<br />
provided negative feedback on any of the studied patient to patient open-source software<br />
applications. MyShi software was not targeted in any of the observed communities, Pump download<br />
collected minor feedback however GNU Gluco control software was considerably mentioned in the<br />
communities. It is very important to retain that most of the feedback provided was extremely positive,<br />
many commercial solutions were not so well recognized by patients within the observed online<br />
communities.<br />
Table 4: Observed patient to patient online communities (authors) <strong>and</strong> (http://sourceforge.net 2010)<br />
Behaviour GNU Gluco Control MyShi Pumpdowlo<strong>and</strong><br />
User download >10 000 548 342<br />
User looks for use information 4 0 0<br />
User express positive feedback 8 0 3<br />
User express negative feedback 0 0 0<br />
User reports a bug 1 0 0<br />
User requests a new feature 5 0 1<br />
User requests a competitor feature 1 0 0<br />
It is extremely hard to figure out why GNU Gluco Control is more popular than the other studied<br />
software. However, the researcher would like to point out that the lead developer of GNU Gluco<br />
control was member in two of the observed communities. Moreover, he communicated several times<br />
with another patients presenting by very simple manners its open-source project. The authors did not<br />
notice any other marketing initiative conducted by members of the studied open-source software<br />
projects.<br />
After conducting this study, the authors perceived that those patients are satisfied with their hardware<br />
devices such as pumps <strong>and</strong> meters, however they present very often criticism to the software<br />
complementing the medical devices. Most of the negative feedback provided on traditional<br />
commercial medical software were: Poor functionality of the software; absence of software that could<br />
run in non-Microsoft operating systems such as Macintosh <strong>and</strong> Linux; lock-in mechanisms where one<br />
device only work with a single correspondent software <strong>and</strong> vice-versa; lack of data export capabilities<br />
that could allow patients to work their medical data in the common Microsoft excel spreadsheet<br />
software; <strong>and</strong> finally many patients stated that some software was made by developers that do not<br />
underst<strong>and</strong> the patient chronic condition status quotidian implications. '<br />
Surprisingly, <strong>and</strong> addressing the second research question, only once an user requested missing<br />
features that are available in competitor products. This could suggest that, from the functional pointof-<br />
view, the open-source solutions do not differer from the commercial solutions. They support the<br />
same use-cases but implemented by different manners, however future research is needed by<br />
systemically comparing the features provided by the studies open-source software <strong>and</strong> the existing<br />
commercial products on the market.<br />
4. Lessons learned <strong>and</strong> implications<br />
The researchers, after the literature review process, were not able to find previous research literature<br />
covering the exact phenomenon addressed by this research. Existing literature on patient-centric<br />
healthcare information systems is widely available, but most of it ignores that few patients are taking<br />
the lead in the creation of new healthcare information systems, by themselves, in the form of opensource<br />
applications.<br />
Even if the studied phenomenon seems to be a great example of user innovation, but it is widely<br />
ignored by scholars on innovation related topics. The high end-user satisfaction observed on some of<br />
the analysed patient-driven software applications suggests that, like in other areas, open-source<br />
chronic care solutions are credible <strong>and</strong> often preferred by users over proprietary ones. However the<br />
amount of collected data warns any generalization on how innovative <strong>and</strong> satisfying this patient-driven<br />
software is for chronic patients.<br />
472
Jose Teixeira <strong>and</strong> Reima Suomi<br />
Future <strong>and</strong> more rigorous research, surveying both patients <strong>and</strong> health-care professionals, should be<br />
conducted by evaluating the studied patient-to patient solutions. Both healthcare system regulators<br />
<strong>and</strong> police-makers should be aware of the echoes of the open-source phenomenon implications in<br />
healthcare. Some existing policies could introduce insuperable barriers to the development<br />
inexpensive open-source solutions in healthcare. Forcing patients that developing their one solutions,<br />
to pay expensive certification programs, like the Certification Commission for Health <strong>Information</strong><br />
Technology in the USA, to use their own solution by legal manners can produce perverse results.<br />
From the patient behavioural point of view, it is empirically observable that those patients are<br />
progressively taking a more active role in the management of their diseases, that chronic patients<br />
interact more <strong>and</strong> more with one another within Internet communities. From the technology point of<br />
view, a lot of development initiatives focus on mobile devices that patients can carry along with them<br />
in a daily basis. Moreover, the software development processes are turning less complex, <strong>and</strong> the<br />
number of individuals with the necessary skills to develop mobile software applications is increasing.<br />
The authors strongly believe that all these factors will intensify the observed phenomena, forecasting<br />
a strong development of the chronic healthcare information systems in the following years.<br />
This research has strong implications for the traditional entities developing commercial healthcare<br />
information systems. As suggested by Lee <strong>and</strong> Mendelson (2008) the emergence of free <strong>and</strong> opensource<br />
software solutions will increase the healthcare market competitiveness forcing commercial<br />
entities to lower prices <strong>and</strong> increase quality. Most of the healthcare information systems producers<br />
sell their products to the healthcare delivery organizations rather than to the patients directly. The<br />
research authors argue that chronic care commercial players could be in a situation described by<br />
Bower <strong>and</strong> Christiansen (1995), where corporations are so focused addressing the immediate needs<br />
of their direct customers, that they lose the disruptive innovation potential for final end-users. It seems<br />
possible that healthcare commercial players could benefit from the studied phenomenon both by<br />
gathering requirements <strong>and</strong> re<strong>using</strong> software assets from patients open-source community. Many<br />
features were suggested by user of open-source software that commercial players should analyse.<br />
In addition, a considerable amount of the communities criticism on existing commercial solutions<br />
points out a lack multi-platform support <strong>and</strong> the existence of user lock-in mechanisms. For instance,<br />
many users complain that their software only works on computers running Microsoft operating<br />
systems; <strong>and</strong> many others complain that they lose all their medical data when purchasing a new<br />
medical device. The studied phenomenon might force existing commercial players to invest in<br />
software development targeting different platforms; And, for the benefit of users, this phenomenon<br />
could pressure existing players to give up from lock-in mechanisms embedded their products.<br />
The phenomenon will also differentiate patients, dividing them to technology-aware <strong>and</strong> technologyignorant.<br />
The ones with skills <strong>and</strong> motivation to search for solutions from the open-source market will<br />
be better off than those not having that capacity. As reported by Lorig et al. (1993), a patient by<br />
working around solutions <strong>and</strong> alternatives, even when they would not be perfect or very beneficial<br />
from the medical point of view, is a therapeutic process that will lead to the feeling of the control of the<br />
disease, <strong>and</strong> finally to real better care results. Moreover in certain illnesses, patients themselves have<br />
also been used to support <strong>and</strong> coach other patients facing similar challenges, in here reported<br />
phenomenon patients are <strong>using</strong> their software skill for the benefit of other patients in similar condition.<br />
Among many other health-care actors, patients are the ones that most benefit from this <strong>and</strong> here<br />
reported phenomenon. The free nature of the studied software solutions enable chronic patients both<br />
to benefit directly by <strong>using</strong> it at a reduced cost <strong>and</strong> to benefit indirectly by the market effects that these<br />
solutions have in the extremely competitive market of chronic-care technological solutions. As<br />
mentioned by some patients in the studied Internet communities, these open-source solutions allowed<br />
them to capture <strong>and</strong> manage their data, without losing it with a shift of a medical device or<br />
correspondent vendor. Moreover, several patients mentioned privacy issues reporting fears of missmanagement<br />
their medical data by some of the medical technology vendors.<br />
References<br />
2010a. GGC software project text file README.en. GNU Gluco Control (GGC). Available at:<br />
http://ggc.sourceforge.net/docs/README.en [Accessed April 15, 2010].<br />
2010b. MyShi software project page. Available at: http://htrack.net/ [Accessed April 15, 2010].<br />
2010c. PumpDownload software project page. Available at: http://pumpdownload.sourceforge.net/ [Accessed<br />
April 15, 2010].<br />
473
Jose Teixeira <strong>and</strong> Reima Suomi<br />
Bower, J. & Christiansen, C., 1995. Disruptive technologies: catching the wave . Harvard Business Review (USA)<br />
, 73 (1), 43-54.<br />
Bryman, A., 1995. Research Methods <strong>and</strong> Organization Studies, TAYLOR & FRANCIS LTD. Available at:<br />
[Accessed April 13, 2010].<br />
Devaraj, S. & Kohli, R., 2000. <strong>Information</strong> technology payoff in the health-care industry: a longitudinal study. J.<br />
Manage. Inf. Syst., 16(4), 41-67.<br />
Eric von Hippel, 2005. Democratizing innovation: The evolving phenomenon of user innovation. Journal für<br />
Betriebswirtschaft, Volume 55(1), 63-78.<br />
Johanna Viitanen, 2009. User-centred Approach to Healthcare ICT Development. Licentiate’s Thesis. HELSINKI<br />
UNIVERSITY OF TECHNOLOGY.<br />
Teixeira, J. & Suomi, R., 2010. Chronic Patients as Developers of Innovative Healthcare <strong>Information</strong> Systems. In<br />
Proceedings of ECIME 2010. The 4th European Conference on <strong>Information</strong> <strong>Management</strong> <strong>and</strong> Evaluation.<br />
Lisbon.<br />
Kuhn, K. & Giuse, D., 2001. From Hospital <strong>Information</strong> Systems to Health <strong>Information</strong> Systems Problems,<br />
Challenges, Perspectives. Methods of <strong>Information</strong> in Medicine, (2 2010), 275-287.<br />
Lee, D. & Mendelson, H., 2008. Divide <strong>and</strong> Conquer: Competing with Free Technology Under Network Effects.<br />
Production <strong>and</strong> Operations <strong>Management</strong>, 17(1), 12-28.<br />
Lorig K., Mazonson P., Holman H., 1993. Evidence suggesting that health education for self-management in<br />
patients with chronic arthritis has sustained health benefits while reducing health care costs. Arthritis<br />
Rheum 1993;36: 439–446<br />
Luthiger, B. & Jungwirth, C., 2007. Pervasive fun. 2007. Available at:<br />
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1422/1340.<br />
Martinko, M.J. & Gardner, W.L., 1985. Beyond Structured Observation: Methodological Issues <strong>and</strong> New<br />
Directions. The Academy of <strong>Management</strong> Review, 10(4), 676-695.<br />
Mintzberg, H., 1971. Managerial Work: Analysis from Observation. <strong>Management</strong> Science, 18(2), B97-B110.<br />
Raymond, E.S., 2001. The Cathedral <strong>and</strong> the Bazaar: M<strong>using</strong>s on Linux <strong>and</strong> Open Source by an Accidental<br />
Revolutionary, O'Reilly \& Associates, Inc.<br />
Rothman, A.A. & Wagner, E.H., 2003. Chronic Illness <strong>Management</strong>: What Is the Role of Primary Care? Annals of<br />
Internal Medicine, 138(3), 256-261.<br />
U.S. Department of Agriculture, Agricultural Research Service., 2009. USDA National Nutrient Database for<br />
St<strong>and</strong>ard Reference. Available at: http://www.ars.usda.gov/ba/bhnrc/ndl [Accessed April 15, 2010].<br />
Anderson, R. M., & Funnell, M. M. (2005). Patient empowerment: reflections on the challenge of fostering the<br />
adoption of a new paradigm. Patient education <strong>and</strong> counseling, 57(2), 153-157.<br />
Funnell, M. M., & Anderson, R. M. (2004). Empowerment <strong>and</strong> self-management of diabetes. Clinical Diabetes,<br />
22(3), 123.<br />
Rodgers, S., & Chen, Q. (2005). Internet community group participation: psychosocial benefits for women with<br />
breast cancer. Journal of Computer Mediated Communication, 10(4), 00-00.<br />
Str<strong>and</strong>burg, K. J. (2008). Users as Innovators: Implications for Patent Doctrine. University of Colorado Law<br />
Review, 79(2), 467.<br />
Toobert, D. J., Hampson, S., & Glasgow, R. (2000). The summary of diabetes self-care activities measure:<br />
results from 7 studies <strong>and</strong> a revised scale. Diabetes Care, 23(7), 943.<br />
474
Value of <strong>Knowledge</strong> <strong>Management</strong> Systems: A Review<br />
Paper<br />
Nelly Todorova<br />
University of Canterbury, Christchurch, New Zeal<strong>and</strong><br />
nelly.todorova@canterbury.ac.nz<br />
Abstract: One of the basic knowledge management questions is how organizations can turn the knowledge that<br />
they have into something that adds value. While there is general agreement on the importance of value creation<br />
through knowledge generation, diffusion <strong>and</strong> utilization, the concept of value in the context of knowledge<br />
management has not been defined. This fundamental issue is complicated by the different paradigms underlying<br />
KM such as information management, strategic management, business process re-engineering, philosophy <strong>and</strong><br />
economics. Defining value in the context of KM will lead to better underst<strong>and</strong>ing of the potential sources of value<br />
creation from knowledge management <strong>and</strong> better management of knowledge assets. It will inform the<br />
measurement of knowledge <strong>and</strong> its impacts on organizations. It will lead to recognition of the contribution of<br />
knowledge assets to organizational success. This paper provides a comprehensive literature review reporting on<br />
prior research on value creation <strong>and</strong> how this can improve the underst<strong>and</strong>ing of value in the context of knowledge<br />
management. The subject of value is very complex due to its subjective nature, multiple levels of sources <strong>and</strong><br />
users <strong>and</strong> a multitude of underpinning disciplines <strong>and</strong> perspectives. Current research has called for the need for<br />
integration of these perspectives <strong>and</strong> greater underst<strong>and</strong>ing of the value dimensions at different levels. This<br />
paper presents a preliminary holistic framework of value dimensions in order to gain better underst<strong>and</strong>ing of the<br />
value created from KM initiatives from multiple perspectives at organizational level. This framework can be used<br />
to map out specific value priorities for organizations <strong>and</strong> align them with measurements that are set for evaluation<br />
of KM initiatives.<br />
Keywords: knowledge management, evaluation, value creation, KM systems<br />
1. Introduction<br />
The 21st century is a knowledge economy <strong>and</strong> knowledge workers are the most valuable asset of<br />
organizations (Drucker, 2000). <strong>Knowledge</strong> is needed to deal with complexity, to provide value-added<br />
services <strong>and</strong> to encourage innovation. Achieving sustainable competitive advantage is only possible<br />
through what an organization knows, how it utilizes <strong>and</strong> how fast it can learn something new (Prusak,<br />
1997). <strong>Knowledge</strong> <strong>Management</strong> is an approach that was developed to leverage this new core<br />
resource. <strong>Knowledge</strong> management (KM) aims to help employees effectively create, share <strong>and</strong> utilize<br />
knowledge to enhance the organisation’s knowledge (Jashapara, 2004)<br />
To pursue this advantage companies have invested billions of dollars in knowledge management<br />
systems to facilitate the storage <strong>and</strong> flow of knowledge within the organization. However, it is not<br />
enough to generate knowledge <strong>and</strong> make it available. Many organizations which have invested in KM<br />
systems have realised that knowledge management is not a one-off investment but a continuous<br />
process (KPMG Survey, 2003). KM systems are often perceived as “glorified information systems” as<br />
there is a gap between their promise <strong>and</strong> what they deliver (Geisler, 2008 p 255). The important<br />
success factor is to provide knowledge which adds value. One of the primary questions for<br />
<strong>Knowledge</strong> <strong>Management</strong> researchers <strong>and</strong> practitioners is how organizations can transform the<br />
knowledge that they have into something that adds value.<br />
While there is general agreement on the importance of value creation through knowledge generation,<br />
diffusion <strong>and</strong> utilization, the concept of value in the context of knowledge management has not been<br />
defined. This fundamental issue is complicated by the different paradigms underlying KM such as<br />
information management, strategic management, business process re-engineering, philosophy <strong>and</strong><br />
economics. The concept of value generated from knowledge management varies dependent on the<br />
perspective. Defining value in the context of KM will lead to better underst<strong>and</strong>ing of the potential<br />
sources of value creation from knowledge management <strong>and</strong> to better management of knowledge<br />
assets. It will inform the measurement of knowledge <strong>and</strong> its impacts on organizations. It will improve<br />
to recognition of the contribution of knowledge assets to organizational success (Boudreau, 2003 p<br />
361). Therefore, the purpose of this paper is to investigate the sources of value creation at the<br />
organizational level <strong>and</strong> to improve our underst<strong>and</strong>ing of value in the context of knowledge<br />
management initiatives.<br />
475
Nelly Todorova<br />
This paper provides a comprehensive literature review investigating the potential sources of value for<br />
KM initiatives. First, the paper outlines prior research to define the concept of value <strong>and</strong> how value is<br />
created in organizations. As knowledge management systems are predominantly IT-based, the review<br />
of the literature focuses on the current knowledge of value in IT. Then, a discussion of specific<br />
characteristics of KM systems follows with particular focus on issues with defining <strong>and</strong> assessing<br />
value in the context of KM <strong>and</strong> the progress made up to date. Based on this overview of the literature,<br />
a preliminary model of KM value is presented.<br />
2. Prior research on value<br />
In order to underst<strong>and</strong> the process of value creation from KM systems, it is important to underst<strong>and</strong><br />
what value means. Value is a concept that is not well understood <strong>and</strong> there is no agreed definition in<br />
the literature (Fischer et al 2011). There are many perspectives of value <strong>and</strong> the literature refers to<br />
different phenomena. At the organizational level of analysis there are two components of value: use<br />
value <strong>and</strong> exchange value (Bowman <strong>and</strong> Ambrosini 2000). Use value refers to the perception of users<br />
of the quality of a product or a service as compared to their needs. Exchange value refers to the<br />
monetary amount that the user pays to the seller for the use value. As assessments of the use value<br />
are made by the individual users, they are subjective. Qureshi et al (2006) state that things have<br />
value when people consider them useful, important or desirable. This definition confirms the notion<br />
that value is a relative <strong>and</strong> context-based concept. Lepak et al. (2007) suggest that the degree of<br />
perceived value by a user depends on the perceived novelty <strong>and</strong> appropriateness of the product or<br />
service. The novelty <strong>and</strong> appropriateness of a product or service will be evaluated differently by<br />
different users depending on their level of knowledge of the product <strong>and</strong> the existing alternatives, <strong>and</strong><br />
the meaning of the new product/service in their context. An important implication of this definition of<br />
value <strong>and</strong> its subjective <strong>and</strong> context-specific nature is that there will be competing views on what is<br />
valuable among different users of value.<br />
The literature on value creation at organizational level views value from different perspectives <strong>and</strong><br />
considers different ways in which organizations can create new value or value creation processes.<br />
Porter (1985) states that companies create new value when they find new ways of doing things by<br />
<strong>using</strong> new technologies, methods <strong>and</strong> raw materials. The innovation process changes or establishes<br />
new valuation of the use or exchange value of the product or service. Lepak et al (2007) argue that<br />
value creation processes include all activities that provide a greater level of novelty <strong>and</strong><br />
appropriateness than the users already have. The production of new use value does not necessarily<br />
mean the creation of new exchange value however. The exchange value can only be assessed if the<br />
new use value is sold. The dynamic capabilities literature also studies how organizations create value.<br />
Dynamic capabilities are the abilities of the organization to create, integrate <strong>and</strong> release resources.<br />
Creation of new resources can occur through reconfiguration, leverage, learning <strong>and</strong> integration of<br />
existing resources. The HR management literature contributes to this stream of value creation by<br />
examining the role of management practices to motivate employees <strong>and</strong> build up their skill in order for<br />
them to achieve organizational goals <strong>and</strong> thus create value.<br />
Value can be perceived from a target user that is not direct internal or external customer. The purpose<br />
of the organization is to create value to many targets. One of these targets from the perspective of<br />
social responsibility is society. Post & Sachs ( 2002 p 16) argue that organizations should not survive<br />
if they do not take responsibility for the well-being of society as a whole. Organizations realise that<br />
how they do business impacts on society <strong>and</strong> in return society responds to this impact. Societal value<br />
has to be visible. There is a shift from concentrating on value to a select group (shareholders) to<br />
addressing issues of the society in which organizations operate (Tissen, et al., 1998 p 57).<br />
Organizational value can be extended beyond financial value <strong>and</strong> profit to include the impacts to<br />
society <strong>and</strong> the environment. Society’s perception of value may lead to a decision to purchase a<br />
product or a service <strong>and</strong> therefore businesses affect their long-term profits by the way they interact<br />
with society (Marker, et al., 2009).<br />
Finally, a body of existing research that is relevant to value creation concentrates on the resources<br />
needed by the organization in order to create value. According to the resource-based view of the firm<br />
(RBV) the main source of sustainable competitive advantage are resources that are valuable, rare,<br />
imperfectly imitable <strong>and</strong> non-substitutable (Bowman&Swart 2007). Valuable resources that are unique<br />
generate economic rents (Noe, Colquitt, Simmering, & Alvarez, 2003 p 227). To generate rents, a<br />
resource must contribute to a product or service that has use value or utility to internal or external<br />
customers.<br />
476
Nelly Todorova<br />
Human capital represents the value of the skills, tacit knowledge <strong>and</strong> capabilities of the individuals<br />
associated with an organization. Individuals in organizations possess general or public knowledge<br />
(generic human capital), occupation-specific human capital <strong>and</strong> industry-specific capital. Occupationspecific<br />
<strong>and</strong> industry-specific knowledge relate to established knowledge domains in professions,<br />
sometimes they are obtained through certification with a professional body <strong>and</strong> hold more value to the<br />
individuals <strong>and</strong> the organizations. Finally, employees as a result of their work experience in an<br />
organization gain firm-specific knowledge such as unique processes, documentation or trade secrets.<br />
Such knowledge is only applicable <strong>and</strong> valuable to a particular organization. Therefore, the acquisition<br />
of firm-specific knowledge increases the value of human capital to the organization <strong>and</strong> reduces the<br />
employee mobility. However, research shows the issues of sharing knowledge increase with<br />
increased proportions of firm-specific knowledge (Lepak&Snell 2003). As employees gain more of<br />
what is uniquely valuable to the organization, they are more reluctant to share it as they perceive this<br />
capital as a valued asset. From organizational perspective, knowledge increases <strong>and</strong> its value<br />
increases with the number of users <strong>and</strong> moving it to the organizational level. Organizations face a key<br />
issue of selecting KM practices which enable <strong>and</strong> encourage sharing.<br />
Structural capital is a component of intellectual capital <strong>and</strong> refers to the value of the processes <strong>and</strong><br />
packages that allow human capital to be used effectively to create value (Smith & McKeen, 2003,<br />
p356). It relates to the knowledge that has been captured/institutionalised within the structure,<br />
processes <strong>and</strong> culture of the organization (Petrash, 1996). Structural capital has embedded in it<br />
socially validated <strong>and</strong> useful knowledge <strong>and</strong> it can be classed as a knowledge asset (Boisot, 1998,<br />
p117; Bowman & Swart, 2007)<br />
Customer capital is another component of intellectual capital <strong>and</strong> represents the value of the<br />
relationships of an organization with the people with whom they do business (Smith & McKeen, 2003<br />
p356, Ravald & Gronroos, 1996, p23, Petrash, 1996)<br />
Social capital<br />
Social capital is based on the assumption that social relationships have value. It is a know-who, an<br />
informal organization, a social structure that exists in parallel to the formal hierarchy of an<br />
organization (Smedlund, 2008). Social capital is both a resource <strong>and</strong> a value driver. Relationships<br />
between employees <strong>and</strong> contacts from outside the organization are considered a resource. Internal<br />
network structures based on trust <strong>and</strong> common beliefs <strong>and</strong> norms allow organizations to acquire,<br />
integrate <strong>and</strong> release resources, which is one of the most important value drivers (Smedlund, 2008).<br />
Social capital is the sum of the actual <strong>and</strong> potential resources available that derive from the<br />
relationships possessed by an individual or in a social unit (Nahapiet & Ghoshal, 1998). The<br />
structural, cognitive <strong>and</strong> relational dimensions of social capital influence the combination <strong>and</strong><br />
exchange of intellectual capital which then directly affects the creation of new intellectual capital.<br />
There are different perceptions of the components of social capital but they all fall in three categories-<br />
networks, norms <strong>and</strong> beliefs. McElroy et al (2006) in their synthesis of the social capital literature<br />
argue that all major forms of social capital are effectively different forms of knowledge. Therefore<br />
knowledge management plays an important role in development of social capital. They propose that<br />
knowledge management should care <strong>and</strong> feed the social capacity of groups <strong>and</strong> organizations to<br />
learn <strong>and</strong> solve problems.<br />
Human capital <strong>and</strong> social capital are parallel <strong>and</strong> complementary <strong>and</strong> they reflect different aspects of<br />
a socially constructed wealth creating activities <strong>and</strong> resources. Similarly, IC is parallel to HC as it<br />
focuses on group activity in contrast to the HC perspective which focuses on individual level activity.<br />
Social capital provides the social relations <strong>and</strong> structures necessary to create <strong>and</strong> enhance HC <strong>and</strong><br />
IC ((Manning, 2010)<br />
In conclusion the subject of value creation is made complex by its subjective nature, multiple levels of<br />
analysis <strong>and</strong> the theoretical discipline scholars use to study it. As outlined in this section, value<br />
creation studies focus on value outcomes such as organizational performance <strong>and</strong> profit, activities<br />
that create value, dynamic capabilities of the organization <strong>and</strong> VRIN resources. The following section<br />
will focus on how these main areas of value research are represented in the context of IT-based<br />
initiatives.<br />
477
Resources<br />
Value-creating<br />
actions<br />
Dynamic<br />
capabilities<br />
Nelly Todorova<br />
VALUE<br />
Performan<br />
ce<br />
Figure 1: Representation of the current body of knowledge in value creation<br />
3. IT <strong>and</strong> value<br />
The current research in IT <strong>and</strong> business value examines how the application of IT impacts<br />
organizational performance <strong>and</strong> how to measure these impacts. In recent years, there have been a<br />
number of studies confirming that IT can contribute to improvements in organizational performance<br />
(Melville et al 2004, Kohli <strong>and</strong> Grover 2008). Studies consider as performance business process<br />
performance <strong>and</strong> perception-related performance as well as financial performance. Therefore, IT<br />
value is represented in different forms <strong>and</strong> at different levels.<br />
The majority of studies on IT value are based on the resource-based view (RBV) of the firm <strong>and</strong><br />
recognize that IT by itself <strong>and</strong> in isolation does not generate value (Nevo <strong>and</strong> Wade 2010, Kohli <strong>and</strong><br />
Grover 2008). It creates value only in certain conditions <strong>and</strong> when there are certain combinations of<br />
mediating factors. Melville et al (2004) point out that a major limitation of the RBV is that it assumes<br />
the best use of resources <strong>and</strong> it does not study what such best practice might be. Thus, the path from<br />
the IT asset to performance remains a black box. It assumes a synergy between the IT asset <strong>and</strong><br />
other complimentary IT <strong>and</strong> organizational resources such as culture, structure <strong>and</strong> business<br />
processes. Such synergy however may not be realized without the presence of enabling conditions.<br />
Researchers have emphasized the lack of study of these paths that lead to economic value <strong>and</strong> how<br />
we enable them (Kohli <strong>and</strong> Grover 2008). One of the issues in assessment of IT value is that it is<br />
difficult to attribute the value generated by IT investments. This is due to the subjectivity of primary<br />
data, lack of reliable secondary data <strong>and</strong> appropriate proxies. Therefore, “how” <strong>and</strong> “why” questions<br />
remain understudied. Kohli <strong>and</strong> Grover(2008) conclude that what we currently know about IT value is<br />
that IT <strong>and</strong> its complementary resources can create value on many levels <strong>and</strong> while we cannot prove<br />
the causality, we can extend our knowledge on mediating factors in the value creation process (Fig 2).<br />
IT INVESTMENTS-------------------MEDIATING FACTORS---------------------IT-BASED VALUE<br />
IT Resources<br />
(human <strong>and</strong><br />
technological)<br />
IT <strong>and</strong> organizational<br />
complimentary resources<br />
Organizational capabilities<br />
IT-Strategy Alignment<br />
IT intermediate value<br />
(such as process<br />
improvement)<br />
Perceived output value<br />
(such as customer<br />
service)<br />
Financial value<br />
Figure 2: Schematic of “What we know” (adapted from Kohli <strong>and</strong> Grover (2008)<br />
Current research has concentrated largely on financial post hoc metrics as representation of value<br />
<strong>and</strong> these metrics have not been able to capture the true value experienced by businesses <strong>and</strong><br />
customers. Researchers have called for broader representation based on observations of practice of<br />
478
Nelly Todorova<br />
IT value from pure financial value to other “intangible” value to all stakeholders such as agility,<br />
flexibility <strong>and</strong> customer service. Ultimately such value indicators still have an economic impact in the<br />
external marketplace.<br />
4. Value of <strong>Knowledge</strong> <strong>Management</strong> systems<br />
KM value assessment is a very new <strong>and</strong> emerging field <strong>and</strong> there is not even an agreement as to<br />
what constitutes a successful KM initiative <strong>and</strong> what performance indicators should be measured to<br />
assess the value of KM systems (Benbya 2010; Fischer et al 2011). Many terms are used to<br />
represent value <strong>and</strong> these include internal performance measures such as successful KM<br />
implementation as well as external performance measures such as cost savings, quality of decision<br />
making, customer service improvements. Many of these performance indicators such as<br />
implementation success do not necessarily guarantee improved organizational performance. There is<br />
no definition of KM value, the few models that exist are at the conceptual stage <strong>and</strong> of a very generic<br />
nature <strong>and</strong> none of them are empirically supported (Fischer et al 2011). Most models concentrate only<br />
on the outcomes such as performance of KM initiatives without considering the capabilities <strong>and</strong><br />
processes that help to achieve this performance. Most studies deal either with knowledge as a<br />
strategic asset or with the benefits or outcomes of KM initiatives.<br />
The research findings on business value of IT are very relevant for KM systems as the majority of<br />
them are IT-based. Evaluation issues such as subjectivity, difficulty in attribution <strong>and</strong> allocation of<br />
value <strong>and</strong> measurement of intangible representations of value will apply equally in this context.<br />
However, there are some specific characteristics of KM systems that require specific<br />
conceptualization <strong>and</strong> treatment of value. KMS are not focused on performance of a task but on<br />
support of creation <strong>and</strong> sharing of knowledge required to perform a task. What makes measurement<br />
of KM value particularly difficult is the elusive <strong>and</strong> intangible nature of knowledge (Fischer et al 2011).<br />
<strong>Knowledge</strong> is complex <strong>and</strong> difficult to transfer <strong>and</strong> is needs to be used to demonstrate its value. This<br />
section shortly outlines the current research relevant to KM value.<br />
Value of knowledge<br />
<strong>Knowledge</strong> management efforts are based on the assumption that the knowledge that individuals<br />
possess <strong>and</strong> create has value (Alavi <strong>and</strong> Leidner 2001). One stream of KM literature focuses on<br />
knowledge as a key resource that improves organizational capabilities <strong>and</strong> performance. <strong>Knowledge</strong><br />
based view of the firm based on supports that knowledge is a strategic asset but there are no studies<br />
that provide evidence of its value. Studies based on the KBV take the objectivist view of knowledge.<br />
The objectivist view of knowledge regards it as an object or entity that people possess but it can exist<br />
independently <strong>and</strong> can be codified (Schultze <strong>and</strong> Stabel 2004). This explicit knowledge is free from<br />
individual subjectivity <strong>and</strong> therefore superior to tacit knowledge which is very difficult to articulate <strong>and</strong><br />
embedded within the individual context of beliefs <strong>and</strong> assumptions. (Jakubik 2007, Hislop 2009 p 19).<br />
<strong>Knowledge</strong> is perceived as commodity. Many studies which use the knowledge-based theory of the<br />
firm adopt this view on knowledge <strong>and</strong> make assumptions that knowledge can be quantified <strong>and</strong><br />
objectively measured through quantitative methods.<br />
Objectivists view tacit <strong>and</strong> explicit knowledge as distinctive <strong>and</strong> separate types <strong>and</strong> the sharing of<br />
these two types is completely different. Sharing of explicit knowledge is easy <strong>and</strong> its only requirement<br />
is a communication channel (Szulanski, 1996) (fig 1). Based on this assumption, the starting objective<br />
of knowledge management is to identify what tacit knowledge is important <strong>and</strong> convert it into explicit<br />
knowledge. Once all knowledge is in explicit form, the objective is to store it in a central repository<br />
which can be accessed by all. Typically technology plays a central role in such projects.<br />
The social or community view of knowledge assumes that knowledge is a social construct which is not<br />
static (Jakubik 2007). It is embedded within processes <strong>and</strong> day to day practices. It is based on the<br />
assumption that practices consist of both physical <strong>and</strong> cognitive elements <strong>and</strong> they are inseparable<br />
(Orlikowski 2002).<br />
This view considers knowledge as a process, not an object. In addition, it contradicts the objectivist<br />
view as it assumes that knowledge is constantly changing as people perform various activities. The<br />
view does not consider tacit <strong>and</strong> explicit knowledge as separate but as two sides of knowledge. Tacit<br />
knowledge is the necessary background that allows the interpretation <strong>and</strong> development of explicit<br />
479
Nelly Todorova<br />
knowledge. This link between tacit <strong>and</strong> explicit knowledge implies that only individuals with sufficient<br />
common knowledge base can exchange knowledge, underst<strong>and</strong> each other <strong>and</strong> correctly interpret the<br />
exchanged knowledge. This view limits the impact of IT on knowledge sharing (Alavi <strong>and</strong> Leidner<br />
2001).<br />
Based on these main assumptions the social view concludes that knowledge sharing requires a<br />
mutual underst<strong>and</strong>ing of tacit assumptions, immersion in practice <strong>and</strong> social interaction. It places<br />
strong emphasis on management <strong>and</strong> leadership practices to support social interaction <strong>and</strong> trust.<br />
While technology can still play a role, it is focused more on connection people to people rather than<br />
people to explicit knowledge.<br />
KM strategies <strong>and</strong> initiatives<br />
Different perspectives of knowledge define different approaches to knowledge management. When<br />
knowledge is viewed as an object the focus of KM initiatives is on building knowledge stocks <strong>and</strong><br />
providing access to them. When knowledge is viewed as a process, the focus of KM is on knowledge<br />
flows <strong>and</strong> supporting the creation <strong>and</strong> sharing of knowledge. Finally, when knowledge is considered<br />
as a capability, KM initiatives aim to build competences, gain strategic advantage from know-how <strong>and</strong><br />
create intellectual capital (Alavi <strong>and</strong> Leidner, 2001).<br />
KM strategies can be divided into two main categories – personalization <strong>and</strong> codification strategies<br />
(Hansen et al 1999). Companies <strong>using</strong> the codification strategy concentrate primarily on transfer <strong>and</strong><br />
reuse of explicit knowledge. The objective is to capture <strong>and</strong> codify knowledge for broader access<br />
within the organization. Such initiatives focus on the design <strong>and</strong> use of searchable repositories of<br />
explicit knowledge <strong>using</strong> technologies such as intranets, groupware <strong>and</strong> document management<br />
systems. <strong>Knowledge</strong> repositories typically contain best practices, lessons learned from past<br />
experiences, knowledge about products, services <strong>and</strong> customers. Some companies include within<br />
their knowledge management activities projects <strong>and</strong> systems that aim to transform data into usable<br />
information through data mining <strong>and</strong> statistical analysis.<br />
Personalization strategies assume that a lot of important knowledge is tacit <strong>and</strong> the main mode of<br />
knowledge transfer is through personal interaction. KM initiatives focus on improving social processes<br />
to facilitate knowledge sharing between individuals. Some of these initiatives rely on the support of IT<br />
to bring people together. For example, organizations work on creation of corporate directories of<br />
internal expertise to connect people to the right experts within the organization; creation of knowledge<br />
networks which allow people to communicate virtually or face to face. Other initiatives may not use<br />
technology at all <strong>and</strong> concentrate on the creation of organizational culture which motivates people to<br />
share their knowledge <strong>and</strong> on providing regular social interactions between employees.<br />
Value of KM systems<br />
The studies on KM value are very fragmented. If we consider the value models from the previous<br />
sections, these studies focus on only one part of the models- outcomes, resources or capabilities in<br />
terms of enabling sharing <strong>and</strong> retrieval. It is very important to consider KM value in the context of KM,<br />
IT <strong>and</strong> other organizational resources required to derive value from KM initiatives <strong>and</strong> the paths that<br />
are taken to produce this value. Based on the review of the literature on value creation <strong>and</strong> IT<br />
business value, a preliminary model is presented to transfer some of the findings to the context of KM<br />
initiatives (Fig 3). It maps out possible resources, outcomes <strong>and</strong> capabilities.<br />
5. Conclusions<br />
<strong>Knowledge</strong> management is an emerging field which draws on theories established in different<br />
disciplines such as information systems, organizational behaviour, economics <strong>and</strong> human resources.<br />
Research in the field is fragmented as researchers represent the individual perspectives of their<br />
discipline. Current research recognizes the need for integration of these perspectives <strong>and</strong> of creating<br />
unified definitions <strong>and</strong> frameworks (Green, Stankosky, & V<strong>and</strong>ergriff, 2010; Laverne&Earl, 2006). The<br />
aim of knowledge management is to leverage knowledge as a strategic asset to gain <strong>and</strong> sustain<br />
strategic advantage <strong>and</strong> to create value for organizations. There are many different approaches to<br />
knowledge management on the continuum between strong technocratic to predominantly humanistic<br />
approaches. There is considerable variety of objectives. Based on the definition of knowledge as a<br />
480
Nelly Todorova<br />
unique <strong>and</strong> inimitable resource most studies in KM start with the assumption that KM projects <strong>and</strong><br />
initiatives create value. However, there is concern that KM has generated a lot of interest <strong>and</strong><br />
investment but no real value (Davenport&Prusak, 1998; Spender 2006). Therefore, there is a need for<br />
identifying the value of KM initiatives to provide organizations with a basis for decisions on KM<br />
investments.<br />
Capabilities Capabilities<br />
Envirnoment<br />
Envirnoment<br />
Impacts Impacts<br />
Community Community<br />
involvement<br />
involvement<br />
Taxes Taxes<br />
Skills Skills<br />
Personality Personality attributes attributes<br />
Tacit Tacit knowledge knowledge<br />
Society Society<br />
Human Human<br />
KM<br />
value<br />
Cognitive Cognitive<br />
Beliefs<br />
Norms Norms<br />
Relational Relational<br />
Social Social<br />
Social<br />
responsibility Economic<br />
Exchange Exchange<br />
value value<br />
Consumer Consumer value value<br />
Use Use value value<br />
Structural Structural<br />
Networks Networks<br />
Trust Trust<br />
Intellectual Intellectual<br />
Shareholder Shareholder<br />
value value<br />
Explicit Explicit<br />
knowledge knowledge<br />
Technology Technology<br />
Human Human<br />
resources resources<br />
Commercializable<br />
Commercializable<br />
assets assets<br />
Customer‐related<br />
assets<br />
Structure‐related<br />
Structure‐related<br />
assets assets<br />
Figure 3: Preliminary KM value model<br />
The subject of value is very complex due to its subjective nature, multiple levels of sources <strong>and</strong> users<br />
<strong>and</strong> a multitude of underpinning disciplines <strong>and</strong> perspectives. Current research has called for the<br />
need for integration of these perspectives <strong>and</strong> greater underst<strong>and</strong>ing of the value dimensions at<br />
different levels. This paper presents a preliminary holistic framework of value dimensions in order to<br />
gain better underst<strong>and</strong>ing of the value created from KM initiatives from multiple perspectives at<br />
organizational level. This framework can be used to map out specific value priorities for organizations<br />
<strong>and</strong> align them with measurements that are set for evaluation of KM initiatives. The preliminary KM<br />
value model needs to be validated <strong>using</strong> qualitative <strong>and</strong> quantitative data. Some dimensions may not<br />
be relevant in the context of Km initiatives <strong>and</strong> others may emerge as more important. In addition, the<br />
dimensions need to be better defined in the context of KM.<br />
References<br />
Boisot, M. (1998). <strong>Knowledge</strong> assets: Securing competitive advantage in the information economy. Oxford:<br />
Oxford University Press.<br />
Bowman, C., & Ambrosini, V. (2000). Value creation versus value capture: towards a coherent definition of value<br />
in strategy. British Journal of <strong>Management</strong>, 11(1), 1-15.<br />
Bowman, C., & Swart, J. (2007). Whose Human Capital? The Challenge of Value Capture When Capital is<br />
Embedded. The Journal of <strong>Management</strong> Studies, 44(4), 488.<br />
Davenport, T., & Prusak, L. (1998). Working knowledge: how organizations manage what they know. Boston:<br />
Harvard Business School Press.<br />
Drucker, P. (2000). <strong>Knowledge</strong>-worker productivity: the biggest challenge. In J. Cortada & J. Woods (Eds.), The<br />
<strong>Knowledge</strong> <strong>Management</strong> Yearbook 2000-2001 (pp. 267-283). Boston: Butterworth-Heinemann.<br />
Fischer, N., Hertlein, M., Smolnik, S. & Jennex, M. (2011). Measuring value of knowledge-based initiativesevaluation<br />
of exiasting models <strong>and</strong> development of a new measurement framework, Proceedings of the 44 th<br />
Hawaii International Conference on System Sciences.<br />
481
Nelly Todorova<br />
Geisler, E. (2008). <strong>Knowledge</strong> <strong>and</strong> knowledge systems. New York: IGI Publishing.<br />
Green, A., Stankosky, M., & V<strong>and</strong>ergriff, L. (Eds.). (2010). In search of knowledge management:pursuing primary<br />
principles. Bingley: Emerald Group Publishing Ltd.<br />
Hislop, D. (2009). <strong>Knowledge</strong> <strong>Management</strong> in Organizations (2nd ed.). Oxford: Oxford University Press.<br />
Housel, T., & Bell, A. (2001). Measuring <strong>and</strong> managing knowledge. Boston: McGraw-Hill, Inc.<br />
Jakubik, M. (2007). Exploring the knowledge l<strong>and</strong>scape: four emerging views of knowledge. Journal of<br />
<strong>Knowledge</strong> <strong>Management</strong>, 11(4), 6.<br />
Jashapara, A. (2004). <strong>Knowledge</strong> management: an integral approach: Pearson Education.<br />
Kang, S.C., Morris, S. S., & Snell, S. A. (2007). Relational archetypes, organizational learning, <strong>and</strong> value<br />
creation: extending the human resource architecture Academy of <strong>Management</strong>. The Academy of<br />
<strong>Management</strong> Review, 32(1), 236.<br />
Kohli, R. & Grover, G. (2008). Business value of IT: an essay on exp<strong>and</strong>ing research directions to keep up with<br />
the times, Journal of the Association for <strong>Information</strong> Systems, 9(1), 23-39.<br />
KPMG European <strong>Knowledge</strong> <strong>Management</strong> Survey at<br />
http://ep2010.salzburgresearch.at/knowledge_base/kpmg_2003.pdf on 12/07/2010<br />
Lavergne, R., & Earl, R. L. (2006). <strong>Knowledge</strong> management : a value creation perspective Journal of<br />
Organizational Culture, Communication <strong>and</strong> Conflict, 10(2), 43.<br />
Lepak, D. P., Smith, K. G., & Taylor, M. S. (2007). Value creation <strong>and</strong> value capture : a multilevel perspective<br />
Academy of <strong>Management</strong>. The Academy of <strong>Management</strong> Review, 32(1), 180.<br />
Manning, P. (2010). Explaining <strong>and</strong> developing social capital for knowledge management purposes. Journal of<br />
<strong>Knowledge</strong> <strong>Management</strong>, 14(1), 83-99.<br />
Marker, A., Johnsen, E., & Caswell, C. (2009). A planning <strong>and</strong> evaluation six-pack for sustainable organizations:<br />
the six-p framework. Performance improvement, 48(8), 27-34.<br />
McElroy, M. W., Jorna, R. J., & Engelen, J. v. (2006). Rethinking social capital theory: a knowledge management<br />
perspective. Journal of <strong>Knowledge</strong> <strong>Management</strong>, 10(5), 124.<br />
Melville, N., Kraemer, K. <strong>and</strong> Gurbaxani, V. (2004). <strong>Information</strong> technology <strong>and</strong> organizational performance: an<br />
integrative model of IT business value, MIS Quarterly, 28(2), 283-322.<br />
Mort, J. (2001). Nature, value <strong>and</strong> pursuit of reliable corporate knowledge. Journal of <strong>Knowledge</strong> <strong>Management</strong>,<br />
5(3), 222.<br />
Nahapiet, J., & Ghoshal, S. (1998). Social capital, intellectual capital <strong>and</strong> the organizational advantage. Academy<br />
of <strong>Management</strong> Review, 23(2), 242-266.<br />
Ndofor, H. A., & Levitas, E. (2004). Signaling the Strategic Value of <strong>Knowledge</strong>. Journal of <strong>Management</strong>, 30(5),<br />
685.<br />
Nevo, S. And Wade, M. (2010). The formation <strong>and</strong> value of IT-enabled resources: antecedents <strong>and</strong><br />
consequences of synergistic relationships. MIS Quarterly, 34(1), 163-183.<br />
Noe, R., Colquitt, J., Simmering, M., & Alvarez, S. (2003). <strong>Knowledge</strong> <strong>Management</strong>: Developing intellectual <strong>and</strong><br />
social capital. In S. Jackson, M. Hitt & A. Denisi (Eds.), Managing <strong>Knowledge</strong> for Sustained Competitive<br />
Advantage (pp. 209-242). San Francisco: John Wiley & Sons.<br />
Petrash, G. (1996). Dow's journey to a knowledge value management culture. European <strong>Management</strong> Journal,<br />
14(4), 365-373.<br />
Post, J., L, P., & Sachs, S. (2002). Redefining the corporation: Stakeholder management <strong>and</strong> organizational<br />
wealth. Stanford, CA: Stanford University Press.<br />
Prusak, L. (Ed.). (1997). <strong>Knowledge</strong> in organizations. Boston: Butterworth-Heinemann.<br />
Qureshi, S., Briggs, R., Hlupic, V. (2006). Value creation from intellectual capital: convergence of knowledge<br />
management <strong>and</strong> collaboration the intellectual b<strong>and</strong>width model, Group Decision <strong>and</strong> Negotiation, 15, 197-<br />
220.<br />
Ravald, A., & Gronroos, C. (1996). The value concept <strong>and</strong> relationship marketing. European Journal of<br />
Marketing, 30(2), 20-29.<br />
Sharkie, R. (2003). <strong>Knowledge</strong> creation <strong>and</strong> its place in the development of sustainable competitive advantage.<br />
Journal of <strong>Knowledge</strong> <strong>Management</strong>, 7(1), 20.<br />
Shin, M., Holden, T., & Schmidt, R. (2001). From knowledge theory to management practice: towards an<br />
integrated approach. <strong>Information</strong> Processing <strong>and</strong> <strong>Management</strong>, 37, 335-355.<br />
Smedlund, A. (2008). The knowledge system of a firm:social capital for explicit, tacit <strong>and</strong> potential knowledge.<br />
Journal of <strong>Knowledge</strong> <strong>Management</strong>, 12(1), 63-77.<br />
Smith, H., & McKeen, J. (2003). Valuing the <strong>Knowledge</strong> <strong>Management</strong> Function. In C. Holsapple (Ed.), H<strong>and</strong>book<br />
of <strong>Knowledge</strong> <strong>Management</strong> (Vol. 2, pp. 353-368). Berlin: Springer Verlag.<br />
Spender, J. C. (2006). Getting value from knowledge management. The TQM Magazine, 18(3), 238.<br />
Tissen, R., Andriessen, D., & Deprez, F. (1998). Value based knowledge management. Amsterdam: Addisson<br />
Wesley Longman.<br />
Tsai, W., & Ghoshal, S. (1998). Social capital <strong>and</strong> value creation:the role of intrafirm networks. The academy of<br />
management journal, 41(4), 464-476.<br />
Vorakulpipat, C., & Rezgui, Y. (2008). Value creation: the future of knowledge management. The <strong>Knowledge</strong><br />
Engineering Review, 23(3), 283.<br />
Wong, K. Y., & Aspinwall, E. (2004). <strong>Knowledge</strong> management implementation frameworks: a review. <strong>Knowledge</strong><br />
<strong>and</strong> Process <strong>Management</strong>, 11(2), 93-104.<br />
482
Accountability <strong>and</strong> the Reconstruction of the Past<br />
Geert-Jan van Bussel<br />
HvA Amsterdam University of Applied Sciences, Amsterdam, The Netherl<strong>and</strong>s<br />
g.j.van.bussel@hva.nl<br />
Abstract: Many organizations have undergone substantial reorganization in the last decade. They re-engineered<br />
their business processes <strong>and</strong> exchanged proprietary, not integrated applications for more st<strong>and</strong>ard solutions.<br />
Integration of structured data in relational data bases has improved documentation of business transactions <strong>and</strong><br />
increased data quality. But almost 90% of the information that organizations manage is unstructured, can not<br />
easily be integrated into a traditional database. Just like structured data, unstructured information in organizations<br />
are records, meant <strong>and</strong> used as evidence for organizational actions <strong>and</strong> transactions. Governments, courts <strong>and</strong><br />
other stakeholders are making increasing dem<strong>and</strong>s for the trustworthiness of records. This is part of a long-term<br />
trend toward defining what accountability means in a digital era. An analysis of literature of information science,<br />
organization science <strong>and</strong> archival science illustrates that for accountability, reconstruction of the past is essential.<br />
Hypothesis of this paper is that for the reconstruction of the past each organization needs (at least) a combination<br />
of three mechanisms: enterprise records management, organizational memory <strong>and</strong> records auditing. Enterprise<br />
records management ensures that records meet the for accountability necessary quality requirements: integrity,<br />
authenticity, controllability <strong>and</strong> historicity. These requirements ensure records that can be trusted. Trusted<br />
records enhance the possibility of reconstructing the past. The organizational memory ensures that trusted<br />
records are preserved for as long as is necessary to comply to accountability regulations. It provides an information<br />
<strong>and</strong> communication technology infrastructure to (indefinitely) store those records <strong>and</strong> to keep them<br />
accessible. Records auditing audits enterprise records management <strong>and</strong> organizational memory to assess the<br />
possibility to reconstruct past organizational actions <strong>and</strong> transactions. These mechanisms ensure that organizations<br />
have a documented underst<strong>and</strong>ing of: the processing of actions <strong>and</strong> transactions within business<br />
processes; the dissemination of trusted records; the way the organization accounts for the actions <strong>and</strong><br />
transactions within its business processes; <strong>and</strong> the reconstruction of actions <strong>and</strong> transactions from business<br />
processes over time. This underst<strong>and</strong>ing is important for the reconstruction of the past in digitized organizations<br />
<strong>and</strong> improve organizational accountability.<br />
Keywords: accountability, governance, enterprise records management, organizational memory, records<br />
auditing<br />
1. Introduction<br />
After attention to the increase of business process efficiency in the 1980s, organizations were faced<br />
with a transformation into an information society in the 1990s. Organizations re-engineered their business<br />
processes <strong>and</strong> exchanged not integrated applications for more st<strong>and</strong>ard solutions. Integration of<br />
structured data in relational databases has improved documentation of actions <strong>and</strong> transactions <strong>and</strong><br />
increased data quality. But almost 90% of the information that organizations manage is unstructured,<br />
can not easily be integrated into traditional databases. This unstructured information is created by<br />
knowledge workers, who create networks of expertise <strong>and</strong> engage in peer-to-peer knowledge sharing<br />
across organizational boundaries. <strong>Knowledge</strong> work has to do with organization-wide <strong>and</strong> inter-organizational<br />
communication <strong>and</strong> collaboration. The storage, dissemination <strong>and</strong> processing of unstructured<br />
information require complex information <strong>and</strong> communication technology (ICT) systems. In this changing<br />
organizational environment, accountability became a hot item, especially because ICT systems<br />
present unique security <strong>and</strong> durability challenges that pose a threat for information quality (Boudrez,<br />
Dekeyser, <strong>and</strong> Dumortier 2005; Bearman 2006).<br />
2. Accountability, ICT <strong>and</strong> the problematic reconstruction of the past<br />
Accountability is the acknowledgement of responsibility for actions, decisions, products, <strong>and</strong> policies,<br />
<strong>and</strong> the obligation to report <strong>and</strong> be answerable for resulting consequences. It is a social relation between<br />
an actor <strong>and</strong> a forum. When the actor is an organization (as it is here), we talk about 'organizational<br />
accountability'. The forum is a designated forum (shareholders, citizens, courts, etc.) or a virtual<br />
entity ('society', 'the people'). A forum will ask an actor to provide insight in its process effectiveness<br />
<strong>and</strong> the lawfulness or unlawfulness of its actions. The forum passes judgement on the conduct of the<br />
actor. It approves or disapproves an account, denounces a policy, condemns behaviour <strong>and</strong> imposes<br />
sanctions. Most actors are part of a complex of relationships, mostly with more than one accountability<br />
forum. Bovens (2006) considers five different types of accountability: political (with fora as representatives,<br />
political parties <strong>and</strong> voters), legal (with courts), organizational (with stakeholders, auditors,<br />
<strong>and</strong> controllers), professional (with peers) <strong>and</strong> social accountability (with interest groups, charities,<br />
etc.)<br />
483
Geert-Jan van Bussel<br />
Barata <strong>and</strong> Cain (2001) prove that accountability without trusted information as evidence of (past) organizational<br />
policies, products, actions <strong>and</strong> transactions is not possible. This means that each 'accountability<br />
regime' needs an organizational accountability function to safeguard that evidence. Within<br />
this function, corporate governance operates as an accountability agent. It is the system by which organizations<br />
are directed <strong>and</strong> controlled. It operates systems of control designed to ensure that organizational<br />
objectives (like accountability) are met (Porter 2009). Within corporate governance, information<br />
governance establishes opportunities, rules <strong>and</strong> authorizations for information management (Kooper,<br />
Maes, <strong>and</strong> Lindgreen 2010). Both types of governance are means for reaching the objective of<br />
organizational accountability (Porter 2009). In order to improve accountability, they have implemented<br />
new ICT systems, concepts <strong>and</strong> methods to structure, organize, process <strong>and</strong> retain the information<br />
that is used within organizational processes (records), as well as all the information that is used to<br />
demonstrate <strong>and</strong> document how actions <strong>and</strong> transactions have been performed within an organization<br />
(meta data).<br />
Ensuring the quality of this information is an important managerial concern of corporate <strong>and</strong> information<br />
governance. It is a daunting task. Redman (2004, p. 22) states convincingly that information<br />
quality is an ‘unfolding quality disaster’ <strong>and</strong> that ‘bad’ information is ‘the norm’ in industry. Records<br />
<strong>and</strong> their meta data are inaccessible, unavailable, incomplete, inconsistent, irrelevant, untimely, inaccurate,<br />
<strong>and</strong> / or not underst<strong>and</strong>able. Their provenance is (mostly) unknown, just like their contextual<br />
environment (Epler 2006). In addition, ICT creates the problem of technological obsolescence, because<br />
records <strong>and</strong> their meta data have a longer lifespan than the configurations in which they are<br />
created or managed (Boudrez, Dekeyser, <strong>and</strong> Dumortier 2005).<br />
Toebak (2010) states that trusted records <strong>and</strong> their meta data are indispensable as evidence <strong>and</strong> necessary<br />
for making reconstructions of (past) organizational policies, decisions, actions <strong>and</strong> transactions.<br />
Reconstructions of the past depend on the organizations' captured, retained <strong>and</strong> accessible records<br />
<strong>and</strong> meta data. Without trusted records <strong>and</strong> meta data as evidence, reconstruction of the organizational<br />
past becomes problematic. This is influencing organizational accountability negatively, because<br />
corrupt records cannot be used as evidence of past happenings..<br />
3. Research question<br />
Literature on organization science (Meijer 2000), information science (Walsh, <strong>and</strong> Ungson 1991; Bussel,<br />
<strong>and</strong> Ector 2009) <strong>and</strong> archival science (Barata, <strong>and</strong> Cain 2001; Shepherd, <strong>and</strong> Yeo 2003; Toebak<br />
2010) suggests that there are several organizational mechanisms that aim at a reconstruction of the<br />
past <strong>and</strong> that try to realize trusted records: enterprise records management (ERM), organizational<br />
memory (OM) <strong>and</strong> records auditing (RA). These mechanisms have only been studied separately. An<br />
approach in which these organizational mechanisms are combined has never been considered,<br />
probably because they have been developed in different scientific <strong>and</strong> professional disciplines. In this<br />
paper, I want to analyze how ERM, OM <strong>and</strong> RA contribute to the realization of trusted records <strong>and</strong> to<br />
the reconstruction of the past, especially to find out whether my hypothesis that organizational accountability<br />
can be improved with a combination of these three mechanisms, is correct.<br />
4. Mechanisms for reconstructing the past<br />
4.1 Enterprise records management<br />
4.1.1 Records <strong>and</strong> the ‘records value chain’<br />
Records are sets of related data with set boundaries <strong>and</strong> with st<strong>and</strong>ardized form <strong>and</strong> structure (Shepherd,<br />
<strong>and</strong> Yeo 2003). They are meant to be evidence for actions <strong>and</strong> transactions (ISO / DIS 15489<br />
2001). They can be text, (moving) images, sound, database records, or combinations thereof. They<br />
are critical for business process performance, for without them production is almost impossible (Toebak<br />
2010). Meta data, linked to records, document how the actions <strong>and</strong> transactions the records were<br />
part of have been performed. Almost 90 % of the information in an organization are records <strong>and</strong> their<br />
attached meta data.<br />
Widely supported within literature (Toebak 2010; Shepherd, <strong>and</strong> Yeo 2003) is the definition of ERM in<br />
clause 3.16 of the ISO / DIS 15489 (2001) st<strong>and</strong>ard: ‘the field of management responsible for the efficient<br />
<strong>and</strong> systematic control of the creation, receipt, maintenance, use <strong>and</strong> disposition of records, in-<br />
484
Geert-Jan van Bussel<br />
cluding the processes for capturing <strong>and</strong> maintaining evidence of <strong>and</strong> information about business activities<br />
<strong>and</strong> transactions in the form of records’. According to Bussel, <strong>and</strong> Ector (2009), ERM organizes<br />
the 'records value chain', the chain that ensures that the 'value' of records is used in business<br />
processes to improve performance. This chain includes all records processes, from creation or receipt<br />
to capture, storage, processing, distribution, structuring, publication, use, appraisal, selection, disposal,<br />
retention, security, <strong>and</strong> preservation. ERM is oriented on records processes, the effects of those<br />
processes on business processes, the reconstruction of past policies, products, actions <strong>and</strong><br />
transactions, <strong>and</strong> the dimensions <strong>and</strong> quality requirements of records.<br />
4.1.2 The dimensions of records<br />
Records have two extra dimensions above the seven dimensions normally associated with information.<br />
Those seven dimensions are meticulously analyzed in literature, e.g., Liu (2004) <strong>and</strong> Francke<br />
(2005). Those dimensions are increasing density, decreasing longevity, disappearing uniqueness,<br />
easy duplicability, exploding mobility, increasing fluidity <strong>and</strong> problematic connectivity. For this paper,<br />
the two extra dimensions for records are important.<br />
The first extra dimension for records is 'contextuality': Records only have meaning within a context<br />
(Duranti 1997). <strong>Knowledge</strong> of the (environment of the) policies, products, actions or transactions for<br />
which the records were generated is necessary for extracting meaning out of records. This knowledge<br />
applies to the existing juridical system, the organizational structure, the procedures by which records<br />
are generated <strong>and</strong> the records collection to which the records belong. Groth (2007) suggests that context<br />
can only be shown with extensive documentation, that it is in the past, <strong>and</strong> that it is necessary for<br />
the tracking <strong>and</strong> the reconstruction of business processes. The context of records captures <strong>and</strong> documents<br />
a social situation in meta data to allow a reconstruction of the past. The second extra dimension<br />
is 'historicity': Brown, <strong>and</strong> Duguid (1996) argue that reading the same text creates a sense of<br />
community, that is threatened by dimensions as fluidity <strong>and</strong> connectivity. Latour (1990) impresses the<br />
need for 'immutable mobiles', which express the combination of immutability <strong>and</strong> mobility. Levy (2001)<br />
emphasizes that 'fixity' is necessary to achieve repeatability of communication. Records need fixity,<br />
for they are recorded for later consultation <strong>and</strong> used for the reconstruction of past happenings. For<br />
those reasons their users need to trust them.<br />
4.1.3 The quality requirements of records<br />
In this age of organizational chains, inter-organizational data warehouses, cloud computing, authentic<br />
registrations, <strong>and</strong> computer mediated exchange, it is crucial that actions <strong>and</strong> transactions can be reliably<br />
reconstructed in context. Trusted records are therefore necessary. In information science, there<br />
is much work done on the quality of aspects as system development, software systems, systems development<br />
organization <strong>and</strong> ICT infrastructure (e.g., Wang, Funk, Lee <strong>and</strong> Pipino 2009). This work is<br />
focused on structured information. It ignores records <strong>and</strong> no attention is paid to its extra dimensions<br />
(Bussel, <strong>and</strong> Ector 2009). That may be one of the reasons for the problems with information quality<br />
Redman (2004) mentioned.<br />
The focus in ERM is exclusively on the quality requirements of records, their meta data <strong>and</strong> the ‘records<br />
value chain’. For records <strong>and</strong> their meta data, four quality requirements are recognized in ERM:<br />
integrity (it must be impossible to add or delete data), authenticity (they must have the required presentation<br />
<strong>and</strong> data), controllability (they can be tested on reliability) <strong>and</strong> historicity (they can be reconstructed).<br />
Those requirements realize the fixity of records <strong>and</strong> enable users to trust them <strong>and</strong> to use<br />
them as evidence. The 'records value chain' ensures that records are correct <strong>and</strong> complete in spite of<br />
all h<strong>and</strong>ling that may be necessary. The requirements for this chain are identical to those for<br />
organizational business processes. They are well-known, namely reliable time of delivery, effectiveness,<br />
efficiency, product quality, alignment of needs, product management, <strong>and</strong> compliance (Bussel,<br />
<strong>and</strong> Ector 2009).<br />
4.1.4 Enterprise records management <strong>and</strong> reconstructing the past.<br />
The deficiencies in records <strong>and</strong> in ERM that existed before ICT was introduced, are still there (Redman<br />
2004). One of the reasons may be the focus on structured information in information science. In<br />
ERM the point is made that the failure to realize the quality requirements of records, the 'records<br />
value chain' <strong>and</strong> their meta data, is a threat to the possibilities to reliably reconstruct the past. Because<br />
of that failure, the organizational accountability function can not be successful. ERM, managing<br />
485
Geert-Jan van Bussel<br />
the ‘records value chain’, ensures that records meet the quality requirements necessary for accountability:<br />
integrity, authenticity, controllability <strong>and</strong> historicity. These requirements ensure records that<br />
can be trusted <strong>and</strong> can be used as evidence. Trusted records improve the possibility of reconstructing<br />
past actions <strong>and</strong> transactions. ERM is process-oriented <strong>and</strong> has only a limited interest in system development,<br />
software systems, <strong>and</strong> ICT infrastructure. That can be a bottle-neck in protecting the quality<br />
requirements of records in digitized environments, for defining preconditions for system development,<br />
software systems <strong>and</strong> ICT infrastructures may not be enough to definitely ensure the quality requirements<br />
of records.<br />
4.2 Organizational memory<br />
4.2.1 What is the organizational memory ?<br />
Organizations have frames of references, shared beliefs, values, routines, structures, <strong>and</strong> artefacts<br />
that reflect the way they have h<strong>and</strong>led their past experiences. OM is the 'stored information from an<br />
organization’s history that can be brought to bear on present decisions' (Walsh, <strong>and</strong> Ungson 1991, p.<br />
61). It is ‘organization’s DNA’ (Spear, <strong>and</strong> Bowen 1999). It is a metaphorical concept that describes<br />
storage, representation <strong>and</strong> sharing of organizational knowledge, culture, power, practices <strong>and</strong> policy.<br />
Kim's (1993, p. 43) view is practical: '(it) includes everything that is contained in an organization that is<br />
somehow retrievable. Thus storage files of old invoices are part of that memory. So are copies of<br />
letters, spreadsheet data stored in computers, <strong>and</strong> the latest strategic plan, as well as what is in the<br />
minds of all organizational members'. Its purpose is to reduce the costs of transactions, to enlarge the<br />
speed of access to past experiences, to help in decision-making <strong>and</strong> to share knowledge. OM is connected<br />
with 'organizational learning', the metaphorical ability of organizations to learn from experiences.<br />
To learn, reliable reconstruction of the past is necessary.<br />
4.2.2 Contents, repositories <strong>and</strong> processes<br />
Four types of memory contents are distinguished: 'information', 'knowledge', 'paradigms' <strong>and</strong> 'skills'.<br />
'<strong>Information</strong>' includes all structured <strong>and</strong> unstructured information in an organization. '<strong>Knowledge</strong>' are<br />
mental templates that give form <strong>and</strong> meaning to an information environment. 'Paradigms' consist of<br />
organizational beliefs, values <strong>and</strong> norms <strong>and</strong> represent behavioural rules <strong>and</strong> ethics. 'Skills' are capabilities<br />
of people, rooted in action, commitment, <strong>and</strong> involvement in a specific context (Stein 1995).<br />
It can be assumed that the repositories imply memory contents. Walsh <strong>and</strong> Ungson (1991) modelled<br />
the OM as a transcendent infrastructure with five 'retention bins'. Those 'bins' are people, culture, processes,<br />
structure, <strong>and</strong> workplace. Moorman <strong>and</strong> Miner (1997) consider organizational artefacts, like<br />
machines, as 'retention bins', because they embody prior learning. Wijnhoven (1996) recognized ICT<br />
systems as a repository. These repositories have different limitations <strong>and</strong> opportunities for storing <strong>and</strong><br />
retaining memory, <strong>and</strong> differ in speed, reliability, susceptibility to degeneration <strong>and</strong> availability. They<br />
are influencing the possibilities for reconstructing the past, for they concern the OM's temporal aspects.<br />
These aspects have been avoided in social research, but they are fundamental for reconstructing<br />
the past. Memories are, for lack of a better word, time-functions (Stein 1995). A durable <strong>and</strong><br />
reliable infrastructure for the OM will help an organization to seek competitive advantages, develop<br />
the organization learning concept, increase autonomy or be accountable (Croasdell 2001).<br />
Holsapple <strong>and</strong> Jones (2004) state that the knowledge processes of acquisition, selection, generation,<br />
assimilation <strong>and</strong> emission bring past knowledge to bear on present activities. Acquisition is acquiring<br />
knowledge from external sources <strong>and</strong> making it suitable for use. Selection refers to the activity of<br />
identifying knowledge, <strong>and</strong> providing it to an activity that needs it. Generation is producing knowledge<br />
by either discovery or derivation from existing knowledge. Assimilation refers to the activities that alter<br />
the state of knowledge by distributing <strong>and</strong> storing it. Emission refers to the embedding of knowledge<br />
into output for release into the environment. It is never stated, but these processes are closely related<br />
to the 'records value chain', for knowledge is largely stored within records.<br />
4.2.3 Organizational memory <strong>and</strong> ICT infrastructure<br />
In OM research, there are two main research directions. The first direction stresses the importance of<br />
a reliable ICT infrastructure for the development of an OM to enable the continuous storage <strong>and</strong> manipulation<br />
of knowledge of ‘good’ quality. Much work is done on ‘organization memory information systems’,<br />
knowledge management systems, hard- <strong>and</strong> software architectures <strong>and</strong> software development<br />
486
Geert-Jan van Bussel<br />
(e.g., Wijnhoven 1996). The second direction focuses on the human aspects of OM, that is a tool to<br />
stimulate 'organizational learning'. This research tries to make the relationship between human knowledge<br />
creation <strong>and</strong> OM more explicit (Nonaka, Konno 1998). Even in this research direction there is<br />
attention for a reliable <strong>and</strong> durable ICT infrastructure (Croasdell 2001).<br />
An OM is based on 'the will to preserve, in order to reuse [it] later or the most rapidly' (Ribière, <strong>and</strong><br />
Matta 1998, p. 130). The ICT infrastructure of the OM continuously captures <strong>and</strong> analyses the knowledge<br />
assets of an organization. It is a collaborative ICT environment where people can query structured<br />
<strong>and</strong> unstructured information in context to retrieve <strong>and</strong> preserve ‘organizational knowledge’.<br />
Although within OM-literature records <strong>and</strong> their meta data are not mentioned, it is clear that they belong<br />
to the knowledge assets of an organization, <strong>and</strong> that they are recorded, stored, secured <strong>and</strong><br />
maintained within the ICT infrastructure of the OM. This ICT infrastructure safeguards the quality requirements<br />
of information over time.<br />
4.2.4 Threats to the organizational memory<br />
The features of the OM are fragile <strong>and</strong> easily influenced by the restructuring of organizations (Boudrez,<br />
Dekeyser, <strong>and</strong> Dumortier 2005). There are many security <strong>and</strong> durability challenges (Bearman<br />
2006). The durability challenges to the OM are important here. First, hard- <strong>and</strong> software configurations<br />
are needed for accessing, retrieving <strong>and</strong> viewing records, which means that a solution for technological<br />
obsolescence should be available. <strong>Information</strong> has a longer lifespan than the configurations<br />
in which it is created or managed. Secondly, the large influx of information that confronts the infrastructure<br />
of the OM requires automated archiving <strong>and</strong> retrieval functionalities. The ICT infrastructure<br />
needs to adapt, transform, renew <strong>and</strong> grow (Hanseth 2002). Thirdly, information is of a diverse<br />
nature. There is a diversity of object types, operating systems <strong>and</strong> applications. The h<strong>and</strong>ling of this<br />
diversity is not self-evident, while at the same time information can be continuously modified. This<br />
endangers the trust in a reliable OM. Fourthly, information can only be reliably used, when it can be<br />
interpreted by users in its original organizational context. Context <strong>and</strong> information need to be forever<br />
linked to realize access, retrieval <strong>and</strong> preservation over time <strong>and</strong> (thus) to allow reconstruction of the<br />
past.<br />
4.2.5 Organizational memory <strong>and</strong> reconstructing the past<br />
ICT infrastructures are the core of OM research. In OM-literature, durable, continuous <strong>and</strong> reliable infrastructures<br />
are almost considered to be self-evident. This may be incorrect. The temporal dimension<br />
of the OM operates 'memories', time-functions, that are used to reconstruct past policies, products,<br />
actions <strong>and</strong> transactions. Records <strong>and</strong> their meta data are never mentioned, but they are part of the<br />
knowledge assets of an organization. An important contribution of OM is that all organizational knowledge<br />
assets are used for reconstructing the past. Although organizational accountability is not mentioned<br />
as an aim of OM, it can be the result of <strong>using</strong> knowledge to reconstruct past happenings. OM is<br />
especially concerned with ‘organizational learning’ when reconstructing past experiences. In general,<br />
OM ensures that information is preserved as long as is necessary. It provides an ICT infrastructure to<br />
(indefinitely) store information <strong>and</strong> to keep it accessible.<br />
4.3 Records auditing<br />
4.3.1 What is records auditing?<br />
There is little work done on RA. It may be considered as a specialized part of internal (or operational)<br />
auditing. It is independent <strong>and</strong> is designed to improve an organization's operations. It helps organizations<br />
accomplish their objectives by bringing a systematic approach to evaluate <strong>and</strong> improve the effectiveness<br />
<strong>and</strong> efficiency of business processes (Porter 2009). It is a systematic process of planned,<br />
logical <strong>and</strong> purposeful steps <strong>and</strong> procedures to assess [1] the management <strong>and</strong> the quality requirements<br />
of records <strong>and</strong> 'records value chain', [2] the functioning of ERM, <strong>and</strong> [3] the ICT infrastructure<br />
that realizes the OM. RA focuses on both technological as non-technological systems. A records auditor<br />
assesses if the records in the OM are accessible, underst<strong>and</strong>able <strong>and</strong> documented, for only than<br />
fact finding <strong>and</strong> reconstruction of past happenings are possible. RA researches:<br />
The processing of actions <strong>and</strong> transactions within business processes;<br />
The dissemination of trusted records;<br />
487
Geert-Jan van Bussel<br />
The way the organization accounts for the actions <strong>and</strong> transactions within its business processes;<br />
<strong>and</strong><br />
The reconstruction of actions <strong>and</strong> transactions from business processes over time.<br />
RA checks for deviations in records, their meta data <strong>and</strong> the 'records value chain' that result from<br />
abnormalities in the execution of business processes <strong>and</strong> / or the information systems used. The importance<br />
of RA increases as the complexity of the records, their meta data en their organizational environment<br />
grows. In RA the 'records value chain', combined with the required ICT infrastructure for the<br />
OM, is considered to be a critical success factor for the performance of business processes (Bussel,<br />
<strong>and</strong> Ector 2009).<br />
4.3.2 Area’s of records auditing<br />
Several area’s of RA can be defined (Epler 2006; Bussel, <strong>and</strong> Ector 2009). First, the input <strong>and</strong> output<br />
factors of a business process are problematic. <strong>Knowledge</strong> workers have difficulties with the excessive<br />
amount of records. Records are also often processed in structures, versions <strong>and</strong> file formats, that cast<br />
doubt on their quality requirements. This creates difficulties in the assessment of the reliability of the<br />
OM. Secondly, the 'records value chain', as implemented in organizational practice. RA concentrates<br />
on the use of records in daily practice <strong>and</strong> checks if this is in accordance with established agreements.<br />
The design of the business processes often does not match the h<strong>and</strong>ling of work, leading to<br />
problems in accountability. As a solution, organizations can choose to structure the records within the<br />
OM according to the organizational processes, or the activities in which knowledge workers perform.<br />
Thirdly, the used ICT infrastructure affects shape, characteristics <strong>and</strong> quality of the OM. ICT aspects<br />
are, for instance, complex interfaces, the 'unfriendliness' of ICT systems, inadequate system performance,<br />
few possibilities to control <strong>and</strong> lack of interactivity. ICT is hardly tailored to a user’s context.<br />
<strong>Knowledge</strong> workers are due to make mistakes, which affect the quality of the records. The potential of<br />
ICT to improve the reliability <strong>and</strong> the durability of records should be used. Fourthly, the workplace of<br />
knowledge workers. This is a focus because distractions from colleagues, the administrative processing<br />
to be performed, the planning of the work, the overall organizational context, <strong>and</strong> ergonomics,<br />
have an impact on a reliable processing <strong>and</strong> capture of records in ICT systems. <strong>Knowledge</strong> workers<br />
with a stressful workplace make more 'mistakes' <strong>and</strong> are more likely to ignore procedures of the 'records<br />
value chain'.<br />
4.3.3 Records auditing <strong>and</strong> reconstructing the past<br />
In RA ERM <strong>and</strong> OM are audited to assess the possibility to reliably reconstruct past organizational<br />
actions <strong>and</strong> transactions <strong>and</strong> to offer consultations on adaptations <strong>and</strong> alterations for improving ERM<br />
<strong>and</strong> OM. RA assesses the processing of actions <strong>and</strong> transactions within business processes <strong>and</strong> the<br />
transformation from input to output, the dissemination of trusted records, the way organizations account<br />
for actions <strong>and</strong> transactions within their business processes, <strong>and</strong> the reconstruction of these actions<br />
<strong>and</strong> transactions over time. RA is an mechanism for organizations to use to ascertain themselves<br />
that the available means for reconstructions are in excellent order <strong>and</strong> ready to be used.<br />
5. Conclusion<br />
In this paper, I analyzed the contribution of ERM, OM <strong>and</strong> RA to realizing trusted records <strong>and</strong> to<br />
reconstructing the past. It is my conclusion that:<br />
ERM safeguards the 'records value chain' <strong>and</strong> ensures that records <strong>and</strong> their meta data meet the<br />
quality requirements of integrity, authenticity, controllability <strong>and</strong> historicity <strong>and</strong> (therefore) can be<br />
reliably used in business processes as source of trusted information;<br />
The OM ensures that records <strong>and</strong> their meta data (as a knowledge asset) are preserved. It<br />
provides an ICT infrastructure to (indefinitely) store records <strong>and</strong> keep them accessible.<br />
RA audits ERM <strong>and</strong> OM periodically to assess the possibility to reliably reconstruct past actions<br />
<strong>and</strong> transactions.<br />
ERM <strong>and</strong> OM have a direct contribution to the realization of trusted records <strong>and</strong> their meta data. RA<br />
checks them to verify it is possible to use them to reconstruct past actions <strong>and</strong> transactions. Its<br />
contribution is indirect. All three organizational mechanisms assist organizations in reconstructing the<br />
past <strong>and</strong> can be used for improving accountability. Theoretically, combining these three mechanisms<br />
will certainly improve accountability more than implementing only one of them. ERM <strong>and</strong> OM are<br />
488
Geert-Jan van Bussel<br />
complementary, Combining the process-oriented emphasis of ERM with the infrastructure-oriented<br />
emphasis of OM will have positive effects on maintaining trusted records <strong>and</strong> on reconstructing the<br />
past over time. RA will ensure that both mechanisms keep doing what they have to do: creating <strong>and</strong><br />
maintaining trusted records, against all odds. My hypothesis seems theoretically viable, but still has to<br />
be validated in practical case studies.<br />
6. Future work<br />
Governments, courts <strong>and</strong> other stakeholders are making increasing dem<strong>and</strong>s for the trustworthiness,<br />
accuracy, <strong>and</strong> reliability of records. Those dem<strong>and</strong>s are creating a need to more clearly define the<br />
'records value chain'. Research is needed to see if recognition of this 'chain' will be a solution for the<br />
problems mentioned in this paper. The preservation of records in the OM is critical. There is as yet no<br />
preservation strategy that guarantees the preservation of records <strong>and</strong> their contextual meta data in<br />
the long term. It is here that much of the future research should be focused, for the ICT infrastructure<br />
is extremely important for preserving records.<br />
Acknowledgements<br />
My thanks to Eric Ketelaar, Peter Horsman, Theo Thomassen, Hans Henseler <strong>and</strong> Peter Toebak who<br />
made valuable suggestions for this evolving paper.<br />
References<br />
Barata, K., <strong>and</strong> Cain, P. (2001) “<strong>Information</strong>, not technology, is essential to accountability: electronic records <strong>and</strong><br />
public-sector financial management”, The <strong>Information</strong> Society Vol. 17, pp. 247-258.<br />
Bearman, D. (2006) “Moments of risk. Identifying threats to electronic records”, Archivaria Vol. 62, Fall, pp. 15-46.<br />
Boudrez, F., Dekeyser, H., <strong>and</strong> Dumortier, J. (2005) Digital Archiving. The new challenge, IRIS, Mont Saint<br />
Guibert.<br />
Bovens, M. (2006) “Analysing <strong>and</strong> assessing public accountability. A conceptual framework” [online], European<br />
Governance Papers, No. C-06-01, http://www.connex-network.org/eurogov/.../egp-connex-C-06-01.pdf.<br />
Brown, J.S. <strong>and</strong> Duguid, P. (1996) “The social life of documents” [online], First Monday, No. 1,<br />
http://www.firstmonday.dk/issues/issue1/documents/.<br />
Bussel, G.J. van, <strong>and</strong> Ector, F.F.M. (2009) Op zoek naar de herinnering. Verantwoordingssystemen, contentintensieve<br />
organisaties en performance, Van Bussel Document Services, Helmond.<br />
Croasdell, D.T. (2001) “IT's role in Organizational Memory <strong>and</strong> Learning”, <strong>Information</strong> Systems <strong>Management</strong> Vol.<br />
18, No. 1, pp. 8-11.<br />
Duranti, L. (1997) “The preservation of the integrity of electronic records”, Proceedings of the DLM-Forum on<br />
electronic records. Brussels, 18-20 December 1996, Luxemburg, pp. 60-65.<br />
Epler, M.J. (2006) Managing information quality. Increasing the value of information in knowledge-intensive<br />
products <strong>and</strong> processes, Springer, Berlin-Heidelberg, 3rd edition.<br />
Francke, H. (2005) “What's in a name ? Contextualizing the document concept”, Literary <strong>and</strong> Linguistic<br />
Computing Vol. 20, No. 1, pp. 61-69.<br />
Groth, P.T. (2007) The origin of data. Enabling the determination of provenance in multi-institutional<br />
scientific systems through the documentation of processes, University of Southampton,<br />
Southampton.<br />
Hanseth, O. (2002) “From systems <strong>and</strong> tools to networks <strong>and</strong> infrastructures. Towards a theory of ICT<br />
solutions <strong>and</strong> its design methodology implications” [online], http://heim.ifi.uio.no/~oleha/Publications-<br />
/ib_ISR_3rd_resubm2.html.<br />
Holsapple, C.W., <strong>and</strong> Jones, K. (2004) “Exploring primary activities of the knowledge chain”, <strong>Knowledge</strong> <strong>and</strong><br />
Process <strong>Management</strong> Vol. 11, No. 3, pp. 155–174.<br />
ISO/DIS 15489 (2001) <strong>Information</strong> <strong>and</strong> documentation -- Records management: Terms <strong>and</strong> Definitions.<br />
Kim, D.H. (1993) “The link between individual <strong>and</strong> organizational learning”, Sloan <strong>Management</strong> Review Vol. 35,<br />
No. 1, pp. 37-50.<br />
Kooper, M., Maes, R. <strong>and</strong> Lindgreen, E.R. (2010) “On the governance of information. Introducing a new concept<br />
of governance to support the management of information”, International Journal of <strong>Information</strong> <strong>Management</strong><br />
(2010). In press. DOI: 10/1016/j.ij.infomgt.2010.05.009<br />
Latour, B. (1990) “Postmodern? No, simply amodern! Steps towards an anthropology of science”, Studies In<br />
History <strong>and</strong> Philosophy of Science, Vol. 21, No. 1, pp. 145-171.<br />
Levy, D.M. (2001) Scrolling forward. Making sense of documents in the digital age, Arcade Publishing, New York.<br />
Liu, Z. (2004) “The evolution of documents <strong>and</strong> its impacts”, Journal of Documentation Vol. 60, No. 3, pp. 279-<br />
288..<br />
Meijer, A. (2000) “Anticipating accountability processes”, Archives & Manuscripts Vol. 28, No. 1, pp. 52-63.<br />
Moorman, C., <strong>and</strong> Miner, A.S. (1997) “The impact of organizational memory on new product performance <strong>and</strong><br />
creativity”, Journal of marketing research Vol. 34, No. 1, pp. 91-106.<br />
Porter, B. (2009) “The audit trinity. The key to securing corporate accountability”, Managerial Auditing Journal<br />
Vol. 24, No. 2, pp. 156-182.<br />
489
Geert-Jan van Bussel<br />
Redman, T.C. (2004) “Data: un unfolding quality disaster” [online], DM Review, No. 8, August, pp. 22-23, 57.<br />
Ribière, M., <strong>and</strong> Matta, N. (1998) “Virtual enterprise <strong>and</strong> corporate memory”, Proceedings of the workshop on<br />
Organizational Memories at the European Conference on Artificial Intelligence at ECAI-98, Brighton, pp.<br />
129-147.<br />
Shepherd, E., <strong>and</strong> Yeo, G. Managing records. A h<strong>and</strong>book of principles <strong>and</strong> practice, Facet Publishing, London.<br />
Spear, S., <strong>and</strong> Bowen, H.K. (1999) “Decoding the DNA of the Toyota production system”, Harvard Business<br />
Review Vol. 77, No. 5, pp. 97-106.<br />
Stein, E. (1995) “Organizational memory: review of concepts <strong>and</strong> recommendations for management”,<br />
International Journal of <strong>Information</strong> <strong>Management</strong> Vol. 15, No. 1, pp. 17-32.<br />
Toebak, P.M. (2010) Records <strong>Management</strong>. Gestaltung und Umsetzung, Hier + Jetzt, Baden.<br />
Walsh, J.P., <strong>and</strong> Ungson, G.R. (1991) “Organizational memory”, The Academy of <strong>Management</strong> Review Vol. 16,<br />
No. 1, pp. 57-91.<br />
Wang, R., Funk, J., Lee, Y., <strong>and</strong> Pipino, L. (2009) Journey to Data Quality, MIT Press, Cambridge (Ms.).<br />
Wijnhoven, F. (1996). “Organizational memory <strong>and</strong> information technology. The missing link”, Coelho, J.D.,<br />
Jelassi, T., König, W., Krcmar, H., O'Callaghan, R., <strong>and</strong> Sääksjärvi, M. (eds.), Proceedings of the Fourth<br />
European Conference on <strong>Information</strong> Systems, Lisbon, pp. 571-584.<br />
490
The Question of Selecting Appropriate Methodics of an<br />
ERP System Implementation in Life&Science Enterprises<br />
as an Important Factor of a Project’s Success Based on the<br />
Example of Polish Experiences<br />
Bartosz Wachnik<br />
Warsaw University of Technology, Pol<strong>and</strong><br />
bartek@wachnik.eu<br />
Abstract: The Life&Science branch is one of the most innovative branches in developed countries’ industry. One<br />
of the most important innovation tools in this branch is the IT systems. <strong>Information</strong> systems usage by producers<br />
from the “Life&Science” branch must be m<strong>and</strong>atorily validated. Implementation of IT systems validation is crucial<br />
according to Polish, European <strong>and</strong> American law requirements. Most common IT systems implementation<br />
methodics do not provide for the specific character of ERP implementation, which m<strong>and</strong>atorily require the<br />
validation process. The cycle of <strong>Management</strong> <strong>Information</strong> Systems production in the “Life & Science” branch is<br />
different than in other branches. Incorrectly selected methodics for ERP implementation lead to a validation cost<br />
increase <strong>and</strong> problems in usage of ERP in its life cycle. In this article, the author would like to present the most<br />
important issues in the methodics of ERP implementation which must be m<strong>and</strong>atorily validated in “Life & Science”<br />
branches. The properly selected methodics in this class of implementation is a key factor, not only for the<br />
project’s success but first of all for the safe production in accordance with quality management systems.<br />
Keywords: ERP, methodics, implementation, validation<br />
1. Introduction<br />
The Life&Science branch is one of the most innovative branches in developed countries’ industry. The<br />
“Life&Science” branch includes enterprises that specialise in pharmacology, cosmetology <strong>and</strong><br />
biotechnologies. At present there are about 800 productive enterprises in the “Life&Science” branch in<br />
Pol<strong>and</strong>. They are both SMEs <strong>and</strong> Polish subsidiaries of international corporations. The Life&Science<br />
branch is characterized by high level of scientific knowledge absorption as well as patent <strong>and</strong><br />
innovation usage. The wide IT systems implementation shows the highly innovative character of this<br />
branch, both in a processive <strong>and</strong> in a productive sense. Therefore expenditure on the implementation<br />
of innovative IT projects is higher in this branch compared to other branches. ERP class systems are<br />
crucial IT systems supporting management in productive enterprises in the “Life&Science” branch.<br />
In the ‘Life&Science’ branch a detailed strategy of informatisation including, among other things, an<br />
ERP system, should embrace the reasons for undertaking this IT project that result from the<br />
organisation’s strategy (D. Remenyi, A. Money, M. Sherwood-Smith 2000), its philosophy (M. Parker,<br />
J. Benson 1988), <strong>and</strong>, consequently, long-term goals <strong>and</strong> priorities in project evaluation. Hence,<br />
strategic IT initiatives can be undertaken for one or more reasons.<br />
Possible reasons<br />
for undertaking an<br />
ERP system<br />
implementation as<br />
an IT project<br />
Survival<br />
Innovation<br />
Platform of change<br />
Figure 1: Potential reason for undertaking an ERP system implementation<br />
Strategy related to the survival of an enterprise in the market treats an ERP system implementation<br />
as an instrument enabling a company to survive in the market. An example of this strategy can be<br />
found in ERP system implementation in the ‘Life&Science’ branch in the area of production <strong>and</strong><br />
491
Bartosz Wachnik<br />
logistics, where fulfilling requirements for quality st<strong>and</strong>ards is obligatory. Lack of an appropriate ERP<br />
system can prevent an enterprise from functioning in the market.<br />
Strategy related to the need for rapid innovative achievement treats an ERP system implementation<br />
as an instrument helping to achieve a rapid <strong>and</strong> unique process innovation, resulting e.g. in cost<br />
decrease through productive capacity planning <strong>and</strong> stock management.<br />
Platform of change strategy treats an ERP system implementation as a platform for introducing<br />
stable, gradual changes in the system life cycle of an enterprise. This situation takes place in<br />
companies that function very dynamically in the changing market. ERP systems in modern<br />
“Life&Science” productive enterprises are expected to:<br />
Ensure flexibility in the selection of informative – decisive user units in a dynamically changing<br />
internal <strong>and</strong> external enterprise environment.<br />
Possess various business process models, especially in the area: supply chain management,<br />
warehouse management system, production management, advanced lot of row materials<br />
management, advanced lot of products management, advanced lot of half-finished products<br />
management, bar-codes management <strong>and</strong> quality management.<br />
Provide the possibility to adjust systems in accordance with legal requirements <strong>and</strong> current good<br />
practices in business.<br />
Ensure system validation prospectively <strong>and</strong> retrospectively.<br />
Ensure IT systems scalability in accordance with validation determinants.<br />
A key condition concerning ERP class IT systems in the “Life&Science” branch productive enterprises<br />
is obligatory validation. ERP system validation is process that leads to confirming a productive<br />
system’s capability to complete process repeatedly <strong>and</strong> in accordance with defined criteria.<br />
According to current legal requirements every “Life&Science” branch productive enterprise is obliged<br />
to ensure validation productive machines, IT systems <strong>and</strong> laboratory devices that are critical to<br />
production safety. The classical methodics for ERP systems implementation do not follow the<br />
specificity of introducing systems that do not require obligatory validation. The life cycle of ERP<br />
systems implementation in the “Life&Science” is different to other branches. Selecting appropriate<br />
methodics of an ERP system implementation <strong>and</strong> completing a project according to it has an<br />
influence on the quality of implementation, which is manifested in the following issues:<br />
Gaining a temporary competitive advantage by an enterprise which has adapted an ERP system<br />
as an effect of combining an appropriate business strategy supported by a correctly implemented<br />
ERP system.<br />
Precise mapping of business strategy in the area of an implemented ERP system functionality.<br />
The cost of an ERP system validation during its exploitation<br />
The cost of implementation <strong>and</strong> the cost of application maintenance (TCO) during 3 to 5 years of<br />
its exploitation.<br />
The goal of this article is to present the methodics of implementing ERP systems in the<br />
“Life&Science” branch productive enterprises based the Polish experiences, with stress on:<br />
The influence of the validation process on ERP systems implementation.<br />
The influence of validation requirements on the selection ERP systems <strong>and</strong> implementation<br />
partners completing the project.<br />
2. The validation of ERP systems<br />
The validation of IT systems <strong>and</strong> industrial automation is a requirement included in Polish, European<br />
<strong>and</strong> American legal regulations. According to a Ministry of Health Ordinance on the 3 December 2002<br />
concerning Good Manufacturing Practice requirements validation is defined as an activity aimed at<br />
ensuring in a documented way <strong>and</strong> in accordance with Good Manufacturing Practice principles that<br />
procedures, processes, devices, materials, activities <strong>and</strong> systems actually lead to the designed<br />
results. IT systems’ validation should concern only these systems <strong>and</strong> in the scope of their critical<br />
importance, ensure that they comply with quality st<strong>and</strong>ards <strong>and</strong> consequently ensure health <strong>and</strong><br />
safety of commercial end customers. The validation process is not linked to an IT system’s status but<br />
with its purpose <strong>and</strong> a system’s impact on the process of a finished product’s manufacture.<br />
492
Bartosz Wachnik<br />
We can discern two types of IT system validation (Hojdyś K. 2004):<br />
Prospective validation. Performed before launching routine production of pharmaceutical drugs<br />
destined for sale. In this case validation process can progress simultaneously with IT systems<br />
implementation.<br />
Retrospective validation. In the manufacturing process of a product available for purchase<br />
validation is implemented on the basis of collected historical data concerning production, testing <strong>and</strong><br />
series control. In this case validation process is performed following IT system implementation.<br />
Computer systems used in pharmaceutical industry, cosmetic industry <strong>and</strong> sometimes food industry in<br />
areas regulated by Good Manufacturing Practice are complex both on the stage of design, installation<br />
<strong>and</strong> usage. In the manufacturing process productive machines, industrial automation <strong>and</strong> software<br />
cooperate with each other in a strictly planned manner. An American agency (FDA) introduced the<br />
notion known as a system’s “life cycle” in order to enhance our underst<strong>and</strong>ing of the employed<br />
systems’ connections <strong>and</strong> relations network. At present, there are several models of a system’s life<br />
cycle. The most popular models are circular models presented by PDA <strong>and</strong> the “V” model presented<br />
by the GAMP Forum. We have to consider a designed ERP class IT model in every phase of its life<br />
cycle in three aspects:<br />
System as an actual creation of a programmer or engineer commissioned by a user for a specific<br />
process, implementation of defined tasks.<br />
System’s description defining manner of process implementation, system’s architecture, service<br />
method.<br />
Documentation ensuring system’s compliance with descriptive documentation.<br />
According to the definition of validation this process should confirm system’s capability to complete<br />
processes in a repeatable manner <strong>and</strong> in accordance with defined criteria. Underst<strong>and</strong>ing of this<br />
notion by a provider <strong>and</strong> IT <strong>and</strong> administrative services is the key condition in effective validation<br />
implementation. An important characteristic of IT systems is their reciprocal <strong>and</strong> balanced<br />
development <strong>and</strong> validation. Pushing IT systems implementation <strong>and</strong> assuming that documentation<br />
<strong>and</strong> validation can be completed retrospectively at a later stage is very ineffective. It needs to be<br />
stressed that ERP system validation is part of a coherent validation structure, the so-called Master<br />
Plan Validation both for software <strong>and</strong> equipment. Inappropriate manner of IT system validation<br />
generates costs disproportionate to the obtained effects. In case of prospective validation the problem<br />
is to link the IT system implementation methodics with suitably designed methodics of systems<br />
validation in an appropriate manner.<br />
In case of retrospective validation the problem is to design <strong>and</strong> implement recommendation resulting<br />
from IT system validation. Recommendation consists in a set of tasks (e.g. tests, performing system<br />
regulation, preparing documentation) that have to be completed before determining that a system is<br />
validated. Prospective or retrospective validation supporting IT systems in enterprises from the<br />
„Life&Science” branch is very laborious. In case of retrospective validation creating or recreating<br />
documentation, procedures, completing tests <strong>and</strong> designing reparation procedures present<br />
considerable costs to an enterprise. Well-managed validation strains a total IT system implementation<br />
budget with 4-7% of total costs, while ill-managed validation amount to between 20-30% of total costs.<br />
In Pol<strong>and</strong>, the total cost of computer purchases <strong>and</strong> license purchases inclusive of ERP class IT<br />
system implementation service in a „Life&Science” branch SME amounts to about 1 000 000 PLZ.<br />
Thus the validation cost of a chosen functional system in an ERP system implementation project can<br />
amount to between 70 000 PLZ <strong>and</strong> 300 000 PLZ. It’s worth underlining that ERP system is one of<br />
many different IT systems that require validation. Such a noticeable difference in the cost of<br />
validation project results from the following factors:<br />
Inappropriate choice of methodics for completing an ERP system implementation project:<br />
methodics that does not comply with validation requirements.<br />
Lack of knowledge concerning implementing IT systems projects in productive enterprises in the<br />
“Life&Science” branch.<br />
Lack of knowledge concerning implementing IT systems projects in IT companies.<br />
493
Bartosz Wachnik<br />
3. Criteria of ERP selection <strong>and</strong> implementation partner selection<br />
A key condition of the ERP implementation in “Life&Science” enterprises is their obligatory validation.<br />
This requirement directly determines:<br />
Criteria of ERP system selection.<br />
Criteria of implementation partner selection.<br />
Selecting an ERP system that is going to be implemented <strong>and</strong> then validated as well as selecting an<br />
implementation partner has to be treated as a separate organisational project preceding an ERP<br />
system implementation. It is far more complicated <strong>and</strong> laborious than for parallel projects in other<br />
branches. Numerous ERP system presentations, referential visits <strong>and</strong> interviews with consultants that<br />
will take part in the project or even preliminary functional analyses aimed at identifying a detailed<br />
scope of the project are common practice in ERP system selection. In the „Life&Science” branch<br />
selecting a final partner responsible for an ERP system implementation <strong>and</strong> validation preparation is<br />
often preceded by an additional auditing of the partner’s enterprise. It is recommended by IT system<br />
implementation methodics in the „Life&Science” branch enterprises known as GAMP 4.0. An audit is<br />
aimed at confirming a supplier’s information concerning the project’s implementation methodics,<br />
project group’s competence, potential <strong>and</strong> means of ensuring quality. The audit’s report is the basis of<br />
running a risk analysis for selecting a specific supplier. The table no. 1 presents important ERP<br />
system selection criteria <strong>and</strong> implementation partner selection criteria. While selecting ERP software<br />
we should pay close attention to the verification of system’s functionalities that will be subject to<br />
validation. St<strong>and</strong>ard ERP systems are often increasingly supplemented with additional functionalities<br />
dedicated to the “Life&Science” branch, the so-called vertical solutions. These solutions are designed<br />
by ERP software producers or software companies that closely cooperate with ERP software<br />
producers. Selection of an ERP system for a “Life&Science” branch enterprise will give us two<br />
alternatives: either adapting a st<strong>and</strong>ard ERP system that aligns with our client’s functional<br />
requirement or purchasing a st<strong>and</strong>ard ERP system inclusive of a vertical solution designed for the<br />
„Life&Science” branch. We need to underline that both types of solutions are attractive to the<br />
„Life&Science” branch enterprises <strong>and</strong> correspond to their needs.<br />
4. Methodics of ERP Implementation<br />
Implementing an integrated ERP class system is a complicated project. As far as the level of<br />
complexity, implementation period <strong>and</strong> financial budget are concerned, it is one of the biggest IT<br />
investments for an enterprise. The ERP system implementation period in an SME productive<br />
enterprise from the “Life&Science” branch employing 200 – 300 people differs between 8 <strong>and</strong> 18<br />
months. This type of project usually requires employing about 3-4 consultants <strong>and</strong> programmers by<br />
the implementation partner <strong>and</strong> parallel number of key system users by an implementing enterprise.<br />
In Pol<strong>and</strong>, this type of project is realised on the basis of fixed budgets. In Europe <strong>and</strong> USA this type of<br />
project is implemented on basis of flexible budgets adjusted to changing project requirements. The<br />
cost of ERP system implementation in the “Life&Science” branch is usually higher than parallel<br />
implementation project in the other branches. Every producer offering their ERP system recommends<br />
defined methodics, e.g. SureStep methodics for Dynamics Nav or Dynamics AX systems offered by<br />
Microsoft or ASAP methodics for SAP system. In ERP system implementation project, apart from<br />
methodics recommended by different producers, we can distinguish the following tasks: opening<br />
meeting, often called implementation planning session, technological project, key users’ training<br />
within ERP system functionality range, functional analysis, system parameterising <strong>and</strong> programming,<br />
preliminary tests <strong>and</strong> system tuning, data migration, designing user manual <strong>and</strong> project<br />
documentation, acceptance tests, training final users, system launching <strong>and</strong> post-implementation<br />
support. It needs to be stressed that implementing an ERP system is first of all an organisational<br />
project, not an IT project. Since this decision has a strategic importance for an enterprise, it requires<br />
self-evaluation, analysis <strong>and</strong> thorough change of business processes. St<strong>and</strong>ard methodics provided<br />
by an ERP producer are not designed for specific requirements of the “Life&Science” branch<br />
enterprises. The GAMP manual presents an IT system life cycle in reference to its validation used in<br />
the “Life&Science“ branch enterprises. The “V” model is a st<strong>and</strong>ard process model (ISPE).<br />
494
Bartosz Wachnik<br />
Table 1: Criteria of ERP selection <strong>and</strong> implementation partner selection<br />
Criteria of ERP systems selection Criteria of implementation partner selection<br />
1. Ensuring required specialized functionalities enabling<br />
servicing of business process that will be subjected to<br />
validation, e.g.<br />
• Possibility of completing pick-up process <strong>and</strong><br />
warehouse release process <strong>using</strong> the First Expire<br />
First Out method.<br />
• Warehouse management system has to ensure<br />
the so-called “traceability”: the possibility to fully<br />
monitor the history of raw materials, materials,<br />
wares <strong>and</strong> products from the moment of entry to<br />
the warehouse, through production cycle to<br />
product to product release including information<br />
on who subsequently received the product. This<br />
functionality is crucial when it is necessary to<br />
identify raw materials that are used as ingredients<br />
of a drug that has to be withdrawn from the<br />
market. In this case the traceability functionality<br />
enables us to associate a required batch of<br />
contaminated drugs with raw materials batches<br />
that have been used in the drugs production.<br />
• Managing the batch of product status in a quality<br />
control context. A System on the basis of defined<br />
statuses, should manage the raw materials’ <strong>and</strong><br />
half-finished products’ flow within warehouse<br />
structure.<br />
• Managing access right <strong>and</strong> possibility to monitor<br />
modifications of specific records in ERP system<br />
database.<br />
2. Architecture enabling ERP system integration with<br />
other IT systems of industrial automation e.g.<br />
scales. This type of interface responsible for<br />
integration should be validable if required.<br />
3. The possibility of validating an ERP system within<br />
a defined range.<br />
4. The possibility of further ERP system<br />
developments in accordance with validation<br />
allowing low cost system maintenance, the socalled<br />
TCO (Total Cost of Ownership)<br />
User Requirments<br />
Specification URS<br />
Functional<br />
Specification FS<br />
Design<br />
Specification DS<br />
Computer system design<br />
1. Competence of implementation partner in terms of<br />
implemented functionalities complying with validation<br />
requirements.<br />
2. An implementation partner must have access to a<br />
group of consultants who have knowledge <strong>and</strong><br />
documented experience in completing similar ERP<br />
implementation projects.<br />
3. Organisational structure of project should ensure<br />
knowledge transfer concerning an ERP system’s<br />
functionality from an implementation enterprise to<br />
key system users.<br />
4. A partner should complete an implementation project<br />
in accordance with ERP system implementation<br />
methodics concerning validation conditioning both<br />
prospective <strong>and</strong> retrospective. Methodics should<br />
includes e.g.<br />
• Dividing the whole implementation process into<br />
task that should be precisely defined.<br />
• Full documentation that has to be completed<br />
during project’s implementation, e.g. tests script<br />
used in acceptance testing.<br />
• Verification procedures concerning user<br />
requirements specification completion.<br />
• Adjusting procedures <strong>and</strong> approval procedures<br />
for functional specification <strong>and</strong> user<br />
requirement specification.<br />
• Procedures for creating <strong>and</strong> testing parameters<br />
setting.<br />
• Procedures for creating <strong>and</strong> reviewing source<br />
code in case of programming.<br />
• Procedures for testing software <strong>and</strong> its<br />
documentary evidence.<br />
• Reporting procedures concerning error <strong>and</strong><br />
discordance elimination in created software.<br />
• Software version control procedures.<br />
• Procedures concerning enhancing functional<br />
changes during project implementation.<br />
Process<br />
Qualification PQ<br />
Operational<br />
Qualification OQ<br />
Installation<br />
Qualification IQ<br />
Figure 2: Life cycle of the “V” computer system in reference to its validation according to the GAMP<br />
manual (Hojdyś K. 2004)<br />
The system under-construction <strong>and</strong> then operation moves across the “V” line starting from the top left<br />
corner to the top right corner of the line. We need to underline to underline that this is a st<strong>and</strong>ard IT<br />
system life cycle <strong>and</strong> it has to be adapted to the ERP class IT system requirements. Important general<br />
rules (Hojdyś K. 2004) of practical “V” model usage are:<br />
Documents in the left <strong>and</strong> right corners of the letter “V” have to be mutually coherent.<br />
495
Bartosz Wachnik<br />
User’s requirement specification <strong>and</strong> relative functional specification as well as design<br />
specification should be determined by one system.<br />
The constructed system has to correspond with design specification.<br />
Documents <strong>and</strong> relative tests placed in the right corner of the letter “V” must test all the specified<br />
system parameters.<br />
All the documents <strong>and</strong> requirements presented in the documents have to comply with legal<br />
regulation for Good Production Practice.<br />
In order to efficiently implement an ERP system in the “Life&Science” branch, the project has to be<br />
realised on the basis of specifically designed methodics that comply with validation requirements. A<br />
modified system life cycle “V” that adapts to specific ERP system requirements is most broadly used.<br />
Table 2 presents <strong>and</strong> characterises stages of system life cycle according to the “V” model with<br />
references to parallel ERP system implementation project tasks. Presented methodics enable to<br />
complete prospective validation. An important step in system validation is creating a detailed<br />
validation plan for an ERP system that is going to be implemented. This plan has to comply with the<br />
Main Validation Plan in a “Life&Science” enterprise.<br />
Table 1: ERP system implementation methodics in a „Life&Science” branch enterprise<br />
Tasks in an ERP<br />
implementation project<br />
Defining ERP system<br />
implementation contract<br />
details i.e. implementation<br />
range <strong>and</strong> implementation<br />
budget<br />
Signing an ERP system<br />
implementation<br />
agreement in a<br />
„Life&Science” branch<br />
enterprise.<br />
Opening meeting, the socalled<br />
Implementation<br />
Planning Session<br />
Training key users in<br />
range of ERP system<br />
functionalities.<br />
Steps according<br />
to the V model<br />
User<br />
Requirements<br />
Specification<br />
(URS).<br />
User<br />
Requirements<br />
Specification<br />
(URS).<br />
(URS – User<br />
Requirements<br />
Specification).<br />
Functional analysis (URS – User<br />
Requirements<br />
Specification).<br />
Comments<br />
Detailed identification of an ERP system implementation<br />
range vs. system’s validation range Defining a business<br />
process master list that is critical in reference to ERP<br />
system validation. Identifying detailed number <strong>and</strong> range<br />
of processes implemented <strong>and</strong> then validated in ERP<br />
system will enable us to precisely define implementation<br />
budget <strong>and</strong> validation budget.<br />
Signing an agreement can take place after a thorough<br />
analysis of a selected ERP system <strong>and</strong> implementation<br />
partner. It is important to conduct an audit of the<br />
implementation partner. According to the GAMP 4.0<br />
manual it is crucial in case of ERP class systems.<br />
Meeting of the whole project group on the implementation<br />
partner side <strong>and</strong> client’s side aimed at discussing <strong>and</strong><br />
defining:<br />
A detailed project realisation schedule<br />
Notions that will be used in project’s realisation<br />
Project’s organisational structure<br />
Detailed implementation methodics<br />
Project <strong>and</strong> quality management procedures<br />
Project documentation<br />
Training key users within the range of ERP system<br />
functionalities. Training must be completed with<br />
documentation containing detailed range of trainings,<br />
knowledge transfer methods <strong>and</strong> training’s organisation.<br />
Key users acquainted with the basics of ERP system<br />
functioning will realise project tasks included in functional<br />
analysis more efficiently.<br />
The basis of launching a validation cycle possesses a<br />
detailed specification of user’s requirements, the so-called<br />
URS that contained detailed requirements for every<br />
process included in the business process master list. In<br />
the first stage „Life&Science” branch specialists create a<br />
preliminary URS version. In the second stage, following<br />
selection of the ERP system supplier, the team should<br />
create a final URS version. Developed <strong>and</strong> approved<br />
URS is a key computer system’s specification <strong>and</strong> should<br />
be included in an annex to an ERP system<br />
implementation contract. On the basis of URS, within<br />
functional analysis realisation, we should develop:<br />
ERP Functional Specification<br />
ERP System Design Specification<br />
496
Tasks in an ERP<br />
implementation project<br />
Steps according<br />
to the V model<br />
Functional analysis (FS -Functional<br />
specification)<br />
Functional analysis Design<br />
Specification<br />
System parameterising<br />
<strong>and</strong> programming<br />
Preliminary tests <strong>and</strong><br />
system adjusting<br />
ERP system<br />
design<br />
ERP system<br />
design<br />
Data migration ERP system<br />
design<br />
Final design of user<br />
manuals <strong>and</strong> project<br />
documentation<br />
ERP system<br />
design<br />
System acceptance test Installation<br />
qualification<br />
Bartosz Wachnik<br />
Comments<br />
Functional specification defines the manner in which<br />
processes defined in the URS stage will be operated by<br />
an ERP system. Functional specification should include:<br />
Description of functions completed by the system.<br />
Algorithms of functions completed by the system.<br />
Flow of documents completed by the systems as part of<br />
separate processes<br />
User’s interface description within the range of completed<br />
functions for separate processes<br />
Methods of compiling, processing <strong>and</strong> archiving data<br />
Description of problems concerning data protection e.g.<br />
users’ access rights template.<br />
System design specification defines what requirements<br />
should be fulfilled in regard to:<br />
Reconstructing specifications for ERP software <strong>and</strong><br />
devices cooperating with ERP<br />
User manuals concerning ERP.<br />
Operating procedures for ERP system installation,<br />
environment reconstruction <strong>and</strong> data back-up.<br />
Training service for situations concerning data protection<br />
<strong>and</strong> emergency procedures.<br />
Correct installation of system software <strong>and</strong> application<br />
software cooperating with ERP.<br />
Software license, installation versions, back-up copies.<br />
Power supply protection for critical devices cooperating<br />
with ERP.<br />
Realisation of this task includes the following activities:<br />
ERP system parameterising, e.g. warehouse routing.<br />
ERP system software, e.g. invoice printing software or<br />
goods dispatched notes/ goods received notes software.<br />
Interface programming between an ERP system <strong>and</strong><br />
other IT systems, e.g. scaling system.<br />
Preliminary tests will be completed together i.e. both by<br />
key system users <strong>and</strong> by key consultants. Preliminary<br />
tests have to be conducted on the basis of scripts<br />
prepared beforeh<strong>and</strong>. In case of differences between<br />
system settings <strong>and</strong> requirements’ definition in functional<br />
system analysis, the system is subject to adjusting<br />
regulation. Error elimination on the earliest stage of<br />
system design saves time dedicated both to project<br />
implementation <strong>and</strong> formal validation.<br />
Data migration task includes the following activities:<br />
Preparing data migration tools<br />
Migration data cleansing<br />
Converting data to ERP system<br />
Completing a data migration report<br />
Final design, completion <strong>and</strong> verification of project<br />
documentation i.e.:<br />
System management procedures description (system<br />
manuals)<br />
User manual.<br />
Data migration completion report.<br />
Training completion report.<br />
Installation qualification is aimed at verifying a configured<br />
ERP system in regard to requirements included in the<br />
design specification. This task requires completion of<br />
acceptance tests <strong>and</strong> completed documentation’s<br />
verification within the range of:<br />
Reconstructing specifications for ERP software <strong>and</strong><br />
devices cooperating with ERP<br />
User manual linked to ERP.<br />
ERP system installation operating procedures,<br />
environment reconstruction <strong>and</strong> data back-up.<br />
Training service for situations concerning data protection<br />
497
Tasks in an ERP<br />
implementation project<br />
Steps according<br />
to the V model<br />
System acceptance test. Operating<br />
Qualification<br />
Training final users. Propagation of<br />
awareness<br />
concerning the<br />
used tools<br />
amongst the<br />
employees.<br />
System launching System validation<br />
<strong>and</strong> launching<br />
Post-implementation<br />
support<br />
System acceptance test Performance<br />
Qualification<br />
Bartosz Wachnik<br />
Comments<br />
<strong>and</strong> emergency procedures.<br />
Correct installation of system software <strong>and</strong> application<br />
software cooperating with ERP.<br />
Software license, installation versions, back-up copies.<br />
Power supply protection for critical devices cooperating<br />
with ERP. Any possible errors detected on the<br />
qualification stage should be corrected.<br />
Operating qualification is aimed at verifying a configured<br />
ERP system in regard to requirements included in<br />
functional specification. This task requires completion of<br />
acceptance tests <strong>and</strong> completed documentation’s<br />
verification within the range of:<br />
Operating business processes in ERP system.<br />
Flow of documents in ERP system.<br />
Precision of calculations <strong>and</strong> algorithms for threshold<br />
detection <strong>and</strong> event detection<br />
Generating reports <strong>and</strong> printouts/ hard copies.<br />
Access to data records, modifications <strong>and</strong> copies in ERP<br />
system.<br />
Data transferred to other computerised systems.<br />
Work logs <strong>and</strong> system logs (audit trail)<br />
Any possible errors detected on the qualification stage<br />
should be corrected.<br />
Training end users can be undertaken by the<br />
implementation partner or by key users from the<br />
implementing company. Trainings are aimed at<br />
transferring practical knowledge concerning system’s<br />
functioning.<br />
A system has to be validated before being put into<br />
operation. Validation report should be compiled after<br />
completion of all the testes included in the validation plan.<br />
The decision to launch a system should be preceded by a<br />
risk analysis for the system put into operation. The safety<br />
of clients <strong>using</strong> our products has a superior value. Risk<br />
analysis can indicate in what technological <strong>and</strong> functional<br />
areas system failure may occur. Risk analysis is based on<br />
tests results, opinions of key users from specific<br />
departments <strong>and</strong> opinions of independent experts. On the<br />
basis of this prepared risk analysis report <strong>and</strong> validation<br />
report we can prepare a report approving a system for<br />
operation in productive environment.<br />
System usage After validation completion, an ERP system starts the<br />
phase of exploitation. In case of ERP systems it usually<br />
lasts for about 4-6 years <strong>and</strong> system functions without any<br />
significant upgrade. The GAMP manual recommends<br />
procedures that enhance a system’s stability <strong>and</strong><br />
development. Creating such procedures is a responsibility<br />
of an ERP system user.<br />
Performance qualification is aimed at verifying if an ERP<br />
system functions steadily, in accordance with approved<br />
specifications <strong>and</strong> procedures. Processing qualification is<br />
completed at a defined time after formal launching of an<br />
ERP system.<br />
In the course of an ERP system validation we gain knowledge on the solution under construction both<br />
in the IT, organisational <strong>and</strong> functional context. This knowledge is formally compiled in detailed<br />
validation reports. The following documentation should be completed in the course of ERP system<br />
validation (Rodriguez J. 2003):<br />
Documentation concerning ERP system selection.<br />
Documentation concerning implementation partner selection.<br />
Documentation concerning URS, FS <strong>and</strong> DS completion.<br />
498
Bartosz Wachnik<br />
Tests’ recapitulation containing tests’ effects description inclusive of defining whether their result<br />
was positive, whether any errors were detected <strong>and</strong> the type of detected errors.<br />
Training materials that constituted basis for training both for end <strong>and</strong> key users.<br />
Materials concerning data migration.<br />
Procedures concerning specific business processes service, the so-called SOP, designed in ERP<br />
system.<br />
Procedures concerning specific business processes’ service, the so-called SOP, concerning ERP<br />
system administration.<br />
The GAMP manual presents patterns that are suitable both for documentation <strong>and</strong> procedures<br />
necessary in the exploitation of computerised systems. It is important to adapt these<br />
recommendations to the functioning of the specific ERP systems that we use.<br />
5. Conclusion<br />
The right choice of ERP class system implementation methodics in productive enterprises from the<br />
“Life&Science” branch is one of the key factors for the project’s success. At present enterprises<br />
offering ERP systems or vertical solutions dedicated to the “Life&Science” branch adapt IT system life<br />
cycle based on the “V” model according to the GAMP 4.0 st<strong>and</strong>ard. Thus constructed methodics link<br />
both functional specificity, ERP system technological specificity <strong>and</strong> requirements concerning the “V”<br />
model. It is important for an ERP system receiver to underst<strong>and</strong> how the project will be completed,<br />
therefore an ERP solution supplier should fully present recommended implementation methodics<br />
before launching the implementation. The client has to underst<strong>and</strong> the effective causal links between<br />
successive implementation <strong>and</strong> validation tasks. Recommended methodics should not be treated as a<br />
dogma. Methodics should comply with an enterprise’s specificity, especially in regard to the structure<br />
organisation of an ERP implementation project. It is important for the client to be able to present their<br />
remarks <strong>and</strong> suggestions concerning a proposed implementation conception so that it aligns with the<br />
requirements of an enterprise implementing an ERP system. Before launching a project, an ERP<br />
system provider <strong>and</strong> a company that decided to implement a system should design dedicated<br />
implementation methodics, that is significantly modify st<strong>and</strong>ard implementation methodics offered by<br />
the producer. Thus, the methodics will precisely reflect the specifics <strong>and</strong> the character of a given<br />
implementation. In order to design this type of implementation methodics we should follow the criteria<br />
listed below:<br />
The possibility to stimulate a precise definition of key requirements for users within the range of<br />
the functional analysis which is crucially important in defining User Requirements Specification,<br />
functional specification <strong>and</strong> design specification. The methodics should require confronting the<br />
accumulated knowledge of a system provider <strong>and</strong> the client’s experience <strong>and</strong> expectations.<br />
Guaranteeing a knowledge transfer from consultants to key users both formally, through trainings<br />
<strong>and</strong> h<strong>and</strong>books, <strong>and</strong> informally, during tests, data migration, as well as parametering. Possessing<br />
knowledge about the system by the key users is one of the key factors for an appropriate ERP<br />
system validation.<br />
Guaranteeing a completion of suitable documentation on each implementation stage, if required<br />
by the validation.<br />
Guaranteeing a completion of multileveled tests, i.e. preliminary tests, in-depth tests of selected<br />
functionalities <strong>and</strong> acceptance tests. The methodics should guarantee a suitable documentation<br />
required by the validation within the range of tests completion as well as the regulation of an ERP<br />
system that is being implemented.<br />
The Life&Science branch, especially pharmaceutical companies, is treated as rich compared to other<br />
branches. Implementing management support systems, among others ERP, for this type of<br />
enterprises is more expensive. The reason is the higher labour intensity, resulting mostly from the<br />
questions of validation. Nevertheless, there are cases of implementation where the implementation<br />
budget exceeds the original budget by 100-200% <strong>and</strong> the implementation does not accomplish its<br />
organizational <strong>and</strong> economic goal, e.g. after the validation a system is not recommended for use <strong>and</strong><br />
requires regulation (tunning). Appropriate implementation methodics designed for a given<br />
“Life&Science” branch enterprise may significantly decrease the probability of organizational<br />
turbulence <strong>and</strong> an increase of implementation cost.<br />
499
Bartosz Wachnik<br />
Guaranteeing a knowledge transfer from consultants to key users both formally, through trainings<br />
<strong>and</strong> h<strong>and</strong>books, <strong>and</strong> informally, during tests, data migration, as well as parametering. Possessing<br />
knowledge about the system by the key users is one of the key factors for an appropriate ERP<br />
system validation.<br />
Guaranteeing a completion of suitable documentation on each implementation stage, if required<br />
by the validation.<br />
Guaranteeing a completion of multileveled tests, i.e. preliminary tests, in-depth tests of selected<br />
functionalities <strong>and</strong> acceptance tests. The methodics should guarantee a suitable documentation<br />
required by the validation within the range of tests completion as well as the regulation of an ERP<br />
system that is being implemented.<br />
The Life&Science branch, especially pharmaceutical companies, is treated as rich compared to other<br />
branches. Implementing management support systems, among others ERP, for this type of<br />
enterprises is more expensive. The reason is the higher labour intensity, resulting mostly from the<br />
questions of validation. Nevertheless, there are cases of implementation where the implementation<br />
budget exceeds the original budget by 100-200% <strong>and</strong> the implementation does not accomplish its<br />
organizational <strong>and</strong> economic goal, e.g. after the validation a system is not recommended for use <strong>and</strong><br />
requires regulation (tunning). Appropriate implementation methodics designed for a given<br />
“Life&Science” branch enterprise may significantly decrease the probability of organizational<br />
turbulence <strong>and</strong> an increase of implementation cost.<br />
References<br />
D. Remenyi, A. Money, M. Sherwood-Smith (2000), The Effective Measurement <strong>and</strong> <strong>Management</strong> of IT Cost <strong>and</strong><br />
Benefits, Butterworth-Heinemann, Oxford.<br />
M. Parker, J. Benson (1988), <strong>Information</strong> Economics, Prentice Hall, Upper Saddle River.<br />
Hojdyś K.(2004), Applying the GAMP 4.0 methodics in implementation of IT system validation. Process<br />
optimization on the basis of risk analysis. Oinpharma Ltd. (formerly Polfa Centre for Scientific <strong>Information</strong>),<br />
Warsaw.<br />
International Society for Pharmaceutical Engineering. Good Automated Manufacturing Practice Guide for<br />
Validation of Automated Systems, www.ispe.org<br />
General Principles of Software Validation; (January 2002) Final Guidance for Industry <strong>and</strong> FDA Staff U.S<br />
Department of Health <strong>and</strong> Human Service Food <strong>and</strong> Drug Administration, Washington.<br />
Rodriguez J., Validation of an Enterprise Resource Planning (ERP) System: An SAP Case Study. Journal of<br />
Validation Technology May 2003, Volume 9.<br />
500
PhD<br />
Research<br />
Papers<br />
501
502
<strong>Information</strong> Systems for Production Planning <strong>and</strong><br />
Scheduling <strong>and</strong> Their Impact on Business Performance<br />
Denisa Ferenčíková<br />
Tomas Bata University in Zlin, Czech Republic<br />
ferencikova@fame.utb.cz<br />
Abstract: One of the key activities of production planning <strong>and</strong> scheduling is integrated production management.<br />
In particular, discrete or partially complex production has an impact on many problems otherwise difficult to solve<br />
without <strong>using</strong> an adequate software support tool. Programming advanced planning algorithms lends a broad<br />
accent to optimally utilizing manufacturing resources <strong>and</strong> capacities, resulting in a reduction in production lead<br />
times <strong>and</strong> manufacturing cost savings (e.g. reduced need for overtime <strong>and</strong> cooperation, eliminating the failure to<br />
meet delivery deadlines, etc.). Rigid manufacturing systems (mostly push systems) already prove useless <strong>and</strong><br />
insufficient for most production companies. Due to rapidly changing market conditions, dynamic adjustment of<br />
production plans is becoming extremely important. Implementing a new information system in the area of<br />
production planning <strong>and</strong> scheduling is not always to the benefit of a company. Therefore, it is necessary to know<br />
how to measure the benefits of these applications in relation to the performance of a production process. Defining<br />
efficiency evaluation indicators for software implemented (not just in the manufacturing process) is often a<br />
complicated procedure. The biggest obstacle is the inability to clearly define the benefits of the solution put in<br />
place <strong>and</strong> to separate out issues influenced by any other innovations <strong>and</strong> improvements of a production process.<br />
As regards evaluating an information system implementation, it is necessary to look at changes in actual<br />
production control <strong>and</strong> production planning processes as a whole. A good consultant or a systems integrator not<br />
only sets up software, they also adopt the role of a good teacher - one that helps establish know-how in a<br />
company on a selected application area or aids the introduction of best practices from other similar projects. The<br />
success of system implementation is dependent on many factors. One of the most important of these, in relation<br />
to advanced planning <strong>and</strong> scheduling applications, is the form of production according to differentiation of various<br />
types. This paper also discusses basic dependencies between selected planning algorithms <strong>and</strong> classification as<br />
regards the continuity of a manufacturing process <strong>and</strong> VAT analysis.<br />
Keywords: production planning <strong>and</strong> scheduling, capacity planning, VAT analysis, IS evaluation<br />
1. Introduction<br />
Today, the environment within manufacturing companies is very dynamic. Consequently, the<br />
capability of a production process to rapidly react to altering market conditions is a key weapon for<br />
remaining competitive. A changing market environment causes a rise in complexity as well as the<br />
intensity of production planning. Fortunately, the actual marketplace is bursting with sophisticated<br />
software solutions that can greatly simplify the process of planning <strong>and</strong> scheduling. Generally these<br />
solutions are also able to flexibly react to any immediate alterations in customer dem<strong>and</strong> or the<br />
production process itself.<br />
However, it is not exceptional in reality for a situation in an organization not to change, even after<br />
implementing a costly information system with sophisticated methods for production planning <strong>and</strong><br />
control. Many companies invest considerable financial resources into purchasing various software<br />
solutions, but the results envisaged do not materialize. What is the reason for this? For a concise<br />
explanation, a quote would suffice from the similarly named book by Goldratt (2000): “Technology is<br />
necessary but not a sufficient condition”. In fact, it can be confirmed that this adage holds some truth<br />
in actual practice. Plenty of excellent software solutions are available for production planning <strong>and</strong><br />
control, but not all of them are suitable for every company. Even an impressive <strong>and</strong> sophisticated<br />
information system may not produce positive results if its selection is not preceded by a thorough<br />
analysis of the corporate environment <strong>and</strong> manufacturing process, or if the company <strong>and</strong> its<br />
employees are not adequately poised for implementing it.<br />
Many reasons could be given for unsuccessfully setting up new information systems in reality. In this<br />
paper, <strong>and</strong> in further research, focus is placed on one of these – incorrectly choosing suitable<br />
software for the type of production in question. Every company should be completely familiar with its<br />
manufacturing environment so that it can select the information system most suitable for its purposes<br />
<strong>and</strong> be able to interpret its requirements to the supplier. No business can expect excellent results<br />
from implementation without properly analyzing both its corporate environment <strong>and</strong> the possibilities of<br />
the software application.<br />
503
Denisa Ferenčíková<br />
2. Software tools for production planning <strong>and</strong> control support<br />
Methods <strong>and</strong> software tools for production planning <strong>and</strong> control have been evolving for decades, but it<br />
is only intense development in business informatics recently that has allowed them to be fully<br />
integrated in the planning algorithms of ERP systems or other individual applications for supporting a<br />
production process (Sodomka 2011). A primary distinguishing characteristic of the various planning<br />
methods is the production control principle, i.e. a pull, push or combined system (Fig. 1).<br />
PULL system<br />
Combination<br />
PUSH x<br />
PULL<br />
PUSH system<br />
MRP I MRP II<br />
JIT E-KANBAN<br />
TOC<br />
DBR OPT<br />
APS MSO<br />
SEIBA SRM<br />
N<br />
1960 1970 1980 1990 2000 2010<br />
Figure 1: Evolution of planning methods (modified by Entrup 2005)<br />
Years<br />
One of the first methods to be supported by information systems was Production Control according to<br />
a minimum inventory. This concept was later followed by methods such as MRP I (Material<br />
Requirements Planning) <strong>and</strong> MRP II (Manufacturing Resource Planning), which are still frequently<br />
used in practice (Sheikh 2003).<br />
With a changing market environment <strong>and</strong> growing dem<strong>and</strong>s for flexible manufacturing systems,<br />
st<strong>and</strong>ard push principles in production control are beginning to be dropped in many cases.<br />
<strong>Information</strong> systems producers have also respected this trend <strong>and</strong> are integrating (in their<br />
applications) methods based on pull principles. These are able to plan <strong>and</strong> manage production with<br />
regard to the requirements of Lean manufacturing. Although the core principles of the JIT method<br />
were formulated in Japan as long ago as the 1950s, they were transposed into information systems<br />
some years later. They can be perceived from two perspectives. In a narrow sense, JIT focuses on<br />
managing an internal production process <strong>and</strong> tries to achieve the output desired in the required time,<br />
in prime quality <strong>and</strong> with zero stock. From a wider perspective, JIT aims to bring about the values of<br />
production indicators mentioned above within the whole supply chain (Sledzinski 2004, Sodomka<br />
2011). The most typical example of applying JIT in an information systems environment is Electronic<br />
Kanban (eKanban).<br />
In the late 1970s, when E. M. Goldratt presented his revolutionary Theory of Constraints (later<br />
referred to as TOC), approaches to production planning began to alter. Most companies encounter<br />
the issue that it proves challenging to uniquely determine whether it is better to use push or pull<br />
principles in their production control process. In reality, it is often necessary to combine both<br />
approaches <strong>and</strong>, therefore, information systems producers have introduced new solutions that<br />
support this combination (Goldratt 2000, Sodomka 2011). Examples include a method for address<br />
production called Seiban, <strong>and</strong> others based on the TOC philosophy such as APS (Advanced Planning<br />
<strong>and</strong> Scheduling), DBR (Drum-Buffer-Rope) or OPT (Optimized Production Technology).<br />
More recently, within the development of production planning systems, a typical feature has been a<br />
transition from rigid planning algorithms to various dynamic systems with automated optimization of<br />
the production process. One of the tools mentioned above is the concept of continuous simulation<br />
<strong>and</strong> optimization known as MSO. Despite being one of the most advanced management methods, it is<br />
not often integrated in ERP systems. The next dynamic approach in production planning <strong>and</strong> control<br />
was presented in the late 1990s by German businessman Steffen Berghof. This involved the concept<br />
of cybernetic self-regulatory mechanisms known as SRM. The primary task of SRM is to constantly<br />
compare set goals with actual results then continually update <strong>and</strong> set up relevant parameters in order<br />
to reach <strong>and</strong> maintain the value required (Ferenčíková 2010, Pavlas 2009, Sodomka 2011).<br />
504
Denisa Ferenčíková<br />
3. Correctly identifying the type of production process as a key factor for<br />
successfully implementing planning software<br />
Before starting the implementation process, it is absolutely necessary to properly characterize the<br />
type of production concerned <strong>and</strong> the methodology according to which production should be planned.<br />
Following this initial analysis, a company can start choosing the appropriate software support so that<br />
the latter is able to match set conditions according to the firm’s preferences (Laudon 2007). System<br />
integrators sometimes claim that their software adapts to any manufacturing environment <strong>and</strong>, after<br />
initiating implementation, businesses find out that the system is incapable of meeting all their<br />
requirements. Therefore, a thorough analysis is an inevitable step of any implementation project for<br />
every type of information system (not only production planning applications).<br />
In the following parts of the paper, two models have been selected <strong>and</strong> presented for production<br />
process classification. For each type of production the most important requirements are discussed for<br />
planning systems, those which result from the basic characteristics of each kind of production.<br />
Admittedly, there are other appropriate forms of production system classification, but due to the<br />
complex nature of their contents only two are investigated.<br />
However, it must be pointed out that in practice one often faces situations that are not in accord with<br />
any of the following examples of production process classification. It is often impossible to precisely<br />
place a defined production system in one category because individual types of production often<br />
merge with others. In spite of this, each company has to make clear which type of production system<br />
is dominant <strong>and</strong> the requirements for information systems arising from it, before announcing a tender<br />
<strong>and</strong> discussing the matter with potential suppliers.<br />
4. Types of production process according to production continuity <strong>and</strong><br />
software support<br />
The most common way of production classification for use in information systems is delineation<br />
according to production continuity. The manufacturing process can be split into these types (Vollmann<br />
2005):<br />
Discrete (discontinuous) manufacturing. This is characterized by a break in time in the<br />
production process (e.g. tool change, work-piece or tool clamping etc.). The eventual product is<br />
generally based on a bill of material (BOM). Typically, such sectors are engineering <strong>and</strong> the<br />
electronic industry.<br />
Process (continuous) manufacturing. Unlike discrete manufacturing, this proceeds without any<br />
interruption in time <strong>and</strong> is frequently linked to quality management. The sectors that normally<br />
utilize process manufacturing are the pharmaceutical, food <strong>and</strong> chemical industries.<br />
Repetitive line flow manufacturing. Generally consisting of several small <strong>and</strong> closed<br />
manufacturing cells with continuous one-way material flow <strong>and</strong> no buffer stock, it is typical for<br />
assembly lines or for producing components for the automotive industry.<br />
4.1 Requirements relating to planning software for discrete manufacturing<br />
Discrete manufacturing is very complicated for optimum production scheduling due to its limited<br />
capacities. Therefore, any planning software should facilitate flexible preparation with capacity<br />
selection <strong>and</strong> the possibility of alteration. The system must be able to reschedule production in<br />
entirety should it be necessary to suddenly prepare a prioritized job request for inclusion within a<br />
previously scheduled production plan. In so doing, manufacturing capacities have to be utilized to the<br />
maximum, <strong>and</strong> the time of the process must be kept as short as possible. Another very important<br />
factor is active stock management, which is supported by efficiently linking the planning system with<br />
the purchasing process. Discrete manufacturing is also quite cost-intensive, so the ability of the<br />
information system to continually monitor, evaluate <strong>and</strong> eventually simulate the costs of a produced<br />
item for different variants of production plans is highly valued as well (Sodomka 2011, Vollmann<br />
2005).<br />
4.2 Requirements relating to planning software for process manufacturing<br />
One distinction of process manufacturing is high automation, which increases dem<strong>and</strong>s on linking the<br />
information system with the actual manufacturing process, for example, through the use of MES<br />
505
Denisa Ferenčíková<br />
(Manufacturing Execution Systems) applications. In terms of production planning, what is especially<br />
important is the ability to track production as well as to identify the goods produced <strong>and</strong> their material<br />
composition. Software often has to support evidence concerning production lots in terms of costs,<br />
waste management <strong>and</strong>, not least, lifetime management (especially in the pharmaceutical sector).<br />
Great emphasis is also placed on quality <strong>and</strong> the ability of the system to manage it effectively<br />
(Sodomka 2011, Vollmann 2005).<br />
4.3 Requirements relating to planning software for repetitive line flow manufacturing<br />
One disadvantage of line flow manufacturing is its low flexibility <strong>and</strong> risk of frequent shutdowns due to<br />
failure of a production facility. The collapse of one machine stops the entire production process in the<br />
manufacturing cell. Nevertheless, its advantages are low production costs <strong>and</strong> a relatively short<br />
process time. However, what does this mean for selection of the planning system? Companies<br />
featuring dominant line flow manufacturing should try to find applications that especially support the<br />
pull or both the pull <strong>and</strong> push principles. The reason for this is that manufacturing cells operate on the<br />
basis of plans but customer delivery is conducted by the pull system (Sodomka 2011, Vollmann<br />
2005).<br />
5. Types of production processes according to VAT analysis <strong>and</strong> software<br />
support<br />
VAT analysis describes the main material flow through the whole production process. The deviser of<br />
this classification was E. M. Goldratt, author of the famous Theory of Constraints (TOC), on whose<br />
principles APS systems are based. Classification according to VAT analysis is not actually very<br />
commonplace but proves quite suitable for selecting planning software.<br />
5.1 V-type manufacturing <strong>and</strong> its requirements for planning software<br />
Production known as type V is characterized by a wide range of final products <strong>and</strong> a small amount of<br />
purchased material. It consists of several points of divergence, in which one semi-finished product is<br />
divided into two or more other semi-products. The technological process applicable for all products is<br />
usually the same; i.e. comprising the same operations in the same order <strong>and</strong> <strong>using</strong> the same<br />
resources. It is primarily utilized by the textile, steel <strong>and</strong> chemical industries (Inman 2011, Umble<br />
1990).<br />
Inputs Production process – type V<br />
Outputs<br />
Routing 1<br />
Figure 2: V-type manufacturing (modified by Inman 2011)<br />
One specific aspect of this type of manufacturing is a reverse bill of materials that is divided into<br />
several different products. The materials used are usually purchased in bulk <strong>and</strong>, therefore, it is not<br />
advisable to focus on reducing inventories <strong>and</strong> implementing JIT principles. Emphasis is placed<br />
instead on increasing production efficiency, as well as possibly utilizing manufacturing resources <strong>and</strong><br />
reducing downtime. Therefore, the information system should particularly support capacity planning<br />
<strong>and</strong> the monitoring of production parameters (e.g. OEE).<br />
5.2 A-type manufacturing <strong>and</strong> its requirements for planning software<br />
A-type manufacturing is inverse to the previous principle. The range of finished products is very<br />
limited but with a production process dem<strong>and</strong>ing numerous subcomponents <strong>and</strong> other raw materials.<br />
The entire production procedure consists of several points of convergent assembly, at which two or<br />
more semi-finished products are assembled to form the next component. Such a manufacturing<br />
506
Denisa Ferenčíková<br />
method requires various technological processes for different parts of the final product; some of these<br />
may comprise just two or three operations, whilst others may necessitate many more. A-type<br />
manufacturing is usual in assembly facilities <strong>and</strong> sectors such as the heavy machinery, automotive or<br />
aircraft industries (Inman 2011, Umble 1990).<br />
Inputs Production process – type A<br />
Outputs<br />
Routing 1<br />
Routing 2<br />
Figure 3: A-type manufacturing (modified by Inman 2011)<br />
The information system used for production planning <strong>and</strong> control within an A-type arrangement most<br />
certainly includes BOM (Bill of Material) functionality with an emphasis on the accurate delivery of<br />
components. Additionally, of prime importance is a high level of coordination between the purchase<br />
<strong>and</strong> production processes. A technological layout of production facilities is typical for such<br />
manufacturing, which increases dem<strong>and</strong>s on capacity planning. Therefore, methods based on Theory<br />
of Constraints prove the most suitable, which respect limited resources.<br />
5.3 T-type manufacturing <strong>and</strong> its requirements for planning software<br />
Production denoted as type T contains many similar final products that have in common a limited<br />
number of purchased or produced components. The technological processes used are generally very<br />
similar <strong>and</strong> may consist of divergent points of assembly, at which two or more semi-finished products<br />
are assembled into several variants of the final product. Normally, T-type manufacturing is adopted by<br />
the electronics industry or for the production of consumer goods (Inman 2011, Umble 1990).<br />
Inputs Production process – type A<br />
Outputs<br />
Routing 1<br />
Figure 4: T-type manufacturing (modified by Inman 2011)<br />
This style of production is sometimes referred to as modular. In terms of production take-up, it is<br />
generally the ATO (Assembly-to-Order) or MTO (Make-to-Order) production system where push <strong>and</strong><br />
pull principles are combined. This condition should also be respected in the choice of supporting<br />
software governing production planning <strong>and</strong> control. In T-type production systems it is very common<br />
for materials <strong>and</strong> components to go missing between different orders. Therefore, it is important to<br />
heed the software’s ability to reserve materials for certain orders or implement methods for<br />
designated production with unique numerical identification (Seiban).<br />
507
Denisa Ferenčíková<br />
6. Benefits of implemented planning systems in relation to the performance of<br />
the manufacturing system<br />
Every company that wants to be successful in today’s tough competitive environment must produce<br />
<strong>and</strong> sell good quality products with high functionality <strong>and</strong> low prices. Therefore, it is necessary to bear<br />
in mind the so-called magic triangle: quality, cost <strong>and</strong> time. These three conditions can be greatly<br />
affected by good production planning <strong>and</strong> scheduling systems.<br />
The first of them, quality, may be influenced not only by properly selecting the suppliers of raw<br />
materials, but also by a superior planning process with regard to continuous quality control. An<br />
especially important aspect is preventing a shift of waste to the next step in the manufacturing<br />
process. The further this gets within the production procedure, the greater the cost for the company. A<br />
suitable contender for eliminating this problem is, for example, the Kanban method, because any site<br />
<strong>using</strong> Kanban “does not buy” waste from its predecessor.<br />
The next factor – time - must be considered in evaluating the benefits from implementing a new<br />
information system for production planning <strong>and</strong> control. The number of delayed orders is quite<br />
alarming in some manufacturing companies, but software that has been correctly selected <strong>and</strong><br />
implemented should be able to combat this problem. Emphasis is particularly placed on capacity<br />
management <strong>and</strong> the possibility of simulated planning (what-if functionality), which helps to state real<br />
delivery dates.<br />
The last, no less important monitored indicator, is costs. The total costs of a production process can<br />
be influenced by many factors. Determining the ordering time for purchasing material <strong>and</strong> setting-up<br />
the amount of a purchase order are also important elements that can affect stock levels as well as the<br />
costs needed to hold them. Furthermore, planning software should help to reduce work in a process<br />
that also has a major impact on expense. Costs are, in addition, closely linked with the previous two<br />
indicators: poor quality results in rising costs as well as not sticking to delivery dates (increased<br />
expenses through overtime, any necessary cooperation or penalties for failing to meet delivery terms).<br />
When evaluating the benefits from actually implementing planning software, the following<br />
characteristics <strong>and</strong> their values should be primarily monitored before <strong>and</strong> after implementation:<br />
The stock level of input materials<br />
The work-in-process level<br />
Average processing time (if the processing time of different orders is comparable)<br />
Supplier reliability, respectively the average delay time per order<br />
Average capacity utilization, especially for limited resources<br />
The number of overtime hours needed for completing delayed orders <strong>and</strong> the costs for this<br />
overtime allowance<br />
The costs of unscheduled cooperation for completing delayed orders<br />
The percentage of production costs expended on waste<br />
The rise in sales (an increase in productivity of the production process due to better production<br />
scheduling)<br />
Further research by the author, <strong>using</strong> advanced methods for production planning <strong>and</strong> scheduling in<br />
the actual practice of Czech <strong>and</strong>, later, Slovak manufacturing corporations, shall focus on evaluating<br />
the benefits of individual methods according to the above-mentioned criteria, amongst other things.<br />
The values of these criteria for each method will be considered also in relation to the previouslymentioned<br />
types of production processes.<br />
6.1 Consequential research <strong>and</strong> its methodology<br />
The research itself is realised as the combination of qualitative <strong>and</strong> quantitative methodological<br />
approaches as full-valued research alternatives.<br />
A quantitative questionnaire has been sent to Czech <strong>and</strong> Slovak manufacturing companies. The aim<br />
of the quantitative research is to determine the dependence between the successful implementation<br />
of the concrete planning algorithm <strong>and</strong> the specific type of production system, according to above-<br />
508
Denisa Ferenčíková<br />
mentioned types of classification. Some identified problems, benefits <strong>and</strong> other interesting topics will<br />
be subsequently discussed directly with selected customers <strong>and</strong> then processed into case-studies.<br />
The second part of research focuses on provider/supplier organisations. It is realised by qualitative<br />
questioning in a form of market research, discussions <strong>and</strong> presentations of concrete software<br />
products. The aim of this qualitative research is to make a comprehensive overview of the Czech <strong>and</strong><br />
Slovak market with applications for advanced production planning <strong>and</strong> scheduling, their extension in<br />
practice as well as specification of their strength <strong>and</strong> weaknesses.<br />
6.2 The aims of research<br />
The objective of the research is to find out the cause of the major problems with selection,<br />
implementation or use of selected information system for production planning <strong>and</strong> control in business<br />
practice. Research should prove or disprove the hypotheses saying that success of implementation of<br />
a chosen solution for production planning <strong>and</strong> scheduling is directly dependent on the type of<br />
production system according to the stated classification criteria. After evaluation of these hypotheses,<br />
it would be possible to verify whether companies decide sensibly when selecting a specific solution for<br />
production planning <strong>and</strong> control or whether the price of the offered product is still the most important<br />
criterion for them.<br />
Also benefits, which in suppliers´ opinion the offered solutions would have for customers <strong>and</strong> real<br />
occurrence of these benefits in practice, will be assessed. Benefits will also be assessed in<br />
dependence on a proper choice of a type of solution, in accordance with the above hypotheses.<br />
7. Conclusions<br />
Even if the current dynamic market environment puts great dem<strong>and</strong>s on the flexible operation of<br />
management, especially on production systems, there are plenty of software solutions available that<br />
can greatly simplify <strong>and</strong> streamline the entire production planning <strong>and</strong> control process. However,<br />
precise selection of the most suitable planning system for the definite type of manufacturing<br />
environment in question, <strong>and</strong> following through with properly conducted implementation is often a<br />
complex task for even the most experienced managers <strong>and</strong> system integrators. The real benefit of an<br />
implemented information system can be negatively influenced by a poor database. The system itself<br />
can be excellent <strong>and</strong> ideal for a company, but its results would never be satisfactory without loading it<br />
with true data <strong>and</strong> maintaining data quality continuously. Poor database quality is often due to wrongly<br />
set material <strong>and</strong> time st<strong>and</strong>ards or due to neglecting the regular updating of relevant data. These <strong>and</strong><br />
many other aspects will be also considered during the investigation on the benefits of planning<br />
systems in relation to company performance, the results of which shall be published over time in<br />
relevant professional journals <strong>and</strong> conference proceedings by the author.<br />
Acknowledgements<br />
This work was supported by IGA UTB, project number IGA/58/FaME/11/D.<br />
References<br />
Entrup, M.L. (2005) Advanced Planning in Fresh Food Industries, Physica-Verlag, Heidelberg, Germany.<br />
Ferenčíková, D. <strong>and</strong> Sodomka, P. (2010) “PSIpenta.com: Specialista na složité výrobní procesy”, IT Systems,<br />
vol. 12, No. 6, pp 14-17.<br />
Goldratt, E.M., Ptak, C.A. <strong>and</strong> Schragenheim, E. (2000) Necessary but Not Sufficient: A Theory of Constraints:<br />
Business Novel, North River Press, Great Barrington.<br />
Inman, R.A. (2011) “Theory of Constraints”, [online], Encyclopedia of Business,<br />
http://www.referenceforbusiness.com/management/Str-Ti/Theory-of-Constraints.html.<br />
Laudon, K.C. <strong>and</strong> Laudon, J.P. (2007) <strong>Management</strong> <strong>Information</strong> Systems: Managing the Digital Firm, Prentice<br />
Hall, Upper Saddle River, New Jersey.<br />
Pavlas, R. (2009) “Modelling <strong>and</strong> Optimalization of Industrial Processes” [online], CVIS,<br />
http://www.cvis.cz/eng/hlavni.php?stranka=novinky/clanek.php&id=57.<br />
Sheikh, K. (2003) Manufacturing Resource Planning With an Introduction to ERP, SCM <strong>and</strong> CRM, McGraw-Hill,<br />
New York.<br />
Sledzinski, V. (2004) „Getting Lean: Why is it easier with an ERP system?“ [online], CVIS,<br />
http://www.cvis.cz/eng/hlavni.php?stranka=novinky/clanek.php&id=3.<br />
Sodomka, P. <strong>and</strong> Klčová, H. (2011) Informační systémy v podnikové praxi, Computer Press, Brno.<br />
Umble M. <strong>and</strong> Srikanth, M. (1990). Synchronous Manufacturing, South-Western Publishing Co., Cincinnati, Ohio.<br />
Vollmann, T. at al. (2005) Manufacturing Planning <strong>and</strong> Control Systems for Supply Chain <strong>Management</strong>, McGraw-<br />
Hill, New York.<br />
509
An Evaluation of web Services Proxies Solutions<br />
Antonio Hidalgo L<strong>and</strong>a, Ian Owens <strong>and</strong> Graham Fletcher<br />
Cranfield University, Academy of Defence, MoD, Shrivenham, U.K<br />
a.hidalgo@cranfield.ac.uk<br />
Abstract: This paper reports on a project that develops an evaluative framework to compare different<br />
technologies that have been proposed for improving the reach of web services (WS). WS are increasingly the<br />
communication method of choice for modern information systems. A problem with WS is that they become less<br />
effective over Networks that are disadvantaged. Disadvantaged networks are characterised by low b<strong>and</strong>width<br />
<strong>and</strong> high latency. Examples may include the provision of web services to mobile phones, or the use of web<br />
services in mobile ad-hoc networks (MANETS). A number of proxy or middleware solutions have been proposed<br />
to extend the reach of WS into disadvantged networks. We have developed an evaluation environment <strong>and</strong><br />
framework to assess different solutions with a few to underst<strong>and</strong>ing their relative strengths <strong>and</strong> weaknesses. In<br />
this paper we discuss the motivation for the work, describe the evaluation framework <strong>and</strong> environment, <strong>and</strong><br />
present the results from our initial experiments. Finally we make some observations <strong>and</strong> recommendations.<br />
Keywords: WebServices, SOA, low b<strong>and</strong> width, proxy<br />
1. Introduction<br />
One of the problems in research looking at web services (WS) <strong>and</strong> disadvantaged networks is the<br />
lack of a common framework that help us to compare <strong>and</strong> evaluate the performance of the different<br />
middleware or proxy solutions proposed to improve the reach of WS in networks that suffer from one<br />
or more disadvantage. Many of the proxy solutions identified in our study were designed with different<br />
purposes in mind. Therefore, it is difficult to compare <strong>and</strong> contrast the results of them directly.<br />
The aim of this research is to provide a common framework that allows comparison of the benefits of<br />
different approaches identified from the literature <strong>and</strong> one that evaluates the performance of each<br />
solution. However, there are a number of different disadvantaged network classes that can be<br />
identified, therefore to cover all aspects of each class with a single solution is not a trivial task. But it is<br />
necessary to underst<strong>and</strong> the strengths <strong>and</strong> weaknesses of each approach in order to make unbiased<br />
decisions on deployment of an appropriate solution to overcome different network disadvantages. Our<br />
framework sets out the methods we used to make these unbiased decisions.<br />
In this paper we demonstrate our framework by testing whether the use of compression techniques<br />
improves the performance of a Service Oriented Architecture (SOA) network. SOA is an architecture<br />
which introduces an extensive overhead on the metadata of its messages. It is a commonly held<br />
belief that it is possible to mitigate this overhead of the SOA protocols with compression <strong>and</strong> therefore<br />
the use of compression based solutions should provide a significant advantage over uncompressed<br />
messaging techniques in disadvantaged networks. We use d our framework to test this belief by<br />
comparing two scenarios:<br />
Connectionless communication. No compression.<br />
Connection oriented, with compression.<br />
1.1 Disadvantaged networks<br />
The classes of disadvantaged networks we selected for this experiment are latency <strong>and</strong> b<strong>and</strong>width.<br />
Other disadvantaged classes can be identified in the literature, such as high mobility, noise,<br />
disruptions or power availability (M<strong>and</strong>yam 2010).<br />
Our main focus is to evaluate SOA, therefore our evaluation is limited to SOA-specific protocols such<br />
as HTTP,XML or SOAP. We consider that lower link layer protocols or even network layer protocols<br />
are not relevant to our evaluation due to SOA being independent to these layers. Having said that, as<br />
far as we are focused just on application layer protocols (HTTP,SOAP)(Booth 2004), we are not<br />
interested in feature disadvantages outside the application layer boundaries. E.g. The topology of the<br />
network (number of nodes, state of the nodes, mobility...) are features included on the network layer,<br />
hence they are not included on our evaluations.<br />
510
1.2 Service oriented architecture<br />
Antonio Hidalgo L<strong>and</strong>a, Ian Owens <strong>and</strong> Graham Fletcher<br />
Web Services (WS) are the implementation technology used in many of the major types of SOA<br />
(Booth 2004), therefore we have focused our research on WS. WS bases its messages on HTTP<br />
protocol <strong>and</strong> its meta-data on XML which is added to HTTP messages(Booth 2004). HTTP <strong>and</strong> XML<br />
meta-data can imply a significant overhead due an extensive meta-data format.<br />
1.3 Proxies <strong>and</strong> enhancement mechanisms<br />
Our approach to the problem defines it as an end to end (e2e) scenario, therefore the solutions that<br />
are interesting for us are those which are based on this premise. The most straightforward way to<br />
implement that idea, is by adding two proxies between the two end points. These two proxies will<br />
enhance the communication through the disadvantaged network. The most commonly used<br />
technologies <strong>and</strong> mechanisms available to enhance this type of communication includes<br />
compression, caching, pre-fetching <strong>and</strong> copying <strong>and</strong> forwarding techniques.<br />
Caching <strong>and</strong> prefetching techniques are frequently used to enhance WS over disadvantaged<br />
networks, <strong>and</strong> they can be used to mitigate against latency (Schreiber 2010), or to improve the<br />
communication through mobile networks (Artail 2009) <strong>and</strong> on real-time scenarios (Lam 2008).<br />
However, the content of WS messages can be unpredictable, hence common caching <strong>and</strong> preteching<br />
schemas are difficult to apply if this is case. To improve the performance of these techniques, some<br />
proposals based on artificial intelligence <strong>and</strong> collaborative solutions have been described(Artail 2009,<br />
Ali 2009, Sulaiman 2009).<br />
Copy <strong>and</strong> forwarding is a technique used to assure the delivery of WS messages in low reliability<br />
networks, <strong>and</strong> these techniques are also used on Delay Tolerant Networks (Cerf 2007, Skjervold<br />
2009, Caini 2010).<br />
Data compression techniques are numberous <strong>and</strong> they range from general purpose data<br />
compression algorithms to Document Type Definition (DTD) conscious compression or others<br />
compression oriented to compress XML structures.<br />
The Transport Layer Security (TLS) includes not just security tasks such as session h<strong>and</strong>ling,<br />
ciphering <strong>and</strong> integrity but also includes other issues as compression (deflate algorithm) which could<br />
be applied at same time than the ciphering <strong>and</strong> also could use UDP ports which provides a lightweight<br />
trans- port protocol in the communication (Dierks 2008). We have selected a TLS proxy to test<br />
whether the SOA messaging overhead can be mitigate <strong>using</strong> these compression <strong>and</strong> a lightweight<br />
transport protocol over a disadvantaged networks.<br />
2. Experimental framework<br />
Our experiments are aimed <strong>and</strong> evaluating different technological solutions to the improvement of<br />
SOAP messaging over disadvantaged grids. As mentioned in the introduction our framework<br />
simulates two common characteristics of disadvantaged networks, latency <strong>and</strong> low b<strong>and</strong>width. The<br />
framework is made up of two different virtual machines linked with a virtual network. The service<br />
provider (server) <strong>and</strong> the service requester (client) are hosted in each different machine.<br />
The experiment works by launching a pre-established number of requests from the client. The<br />
requests can be launched simultaneously, therefore queuing <strong>and</strong> load management must be<br />
implemented by the network infrastructure rather than at the application level. The mean <strong>and</strong> decay<br />
values of the exponential distribution is selected to simulate known usage parameters. For example,<br />
the traffic levels generated by 100 users of a chat server.<br />
The services being used are also constructed to simulate real services deployed by NATO troops <strong>and</strong><br />
other organisations working with disadvantaged situations. For this first experiment, the data payload<br />
of the service reply consists of100bytes of uncompressible data, this is similar to the profile of the<br />
jchat servers deployed by NATO. We have deliberately not used highly compressible data as this is<br />
not typical of the data payload of real implementations.<br />
Any technological solution to improve the service success rate must be capable of being inserted into<br />
the structure described. i.e. the service provider <strong>and</strong> consumers must still be communicating via<br />
SOAP over HTTP. We are only interested in technologies that can be added to current commercial<br />
511
Antonio Hidalgo L<strong>and</strong>a, Ian Owens <strong>and</strong> Graham Fletcher<br />
implementations rather than solutions that require significant working. For example the aim is to roll<br />
out the existing jchat service closer to the front line, not re-implement it. There fore, all our<br />
modifications <strong>and</strong> possible technologies are implemented in pairs of SOAP proxies,.as shown in<br />
figure 1 The proxies are installed on the same machines as the service provider <strong>and</strong> consumer,<br />
allowing them to communicate locally <strong>using</strong> SOAP/HTTP. Communication between the proxies is over<br />
the disadvantaged network <strong>and</strong> is in the protocol defined by the proposed enhancement.<br />
In order to eliminate any bias to our experiments introduced by this proxying, solutions are not<br />
compared with the initial simulation from figures 4 <strong>and</strong> 7, but with a NULL proxy solution.<br />
Figure 1: Solutions schema: a couple transparent proxies are situated at both sides of the<br />
communication, client <strong>and</strong> server<br />
Experiment 1 - Stream based compression<br />
In this work, we show how the framework works <strong>using</strong> SSH enhancement over proxies with a<br />
simulation of chat web services.<br />
SSH adds TLS layer into the communication, providing compression to the SOA messages.<br />
Two proxy solutions were tested. The null proxy, that communicates via st<strong>and</strong>ard SOAP/HTTP <strong>and</strong><br />
the SSH proxy that still uses SOAP <strong>and</strong> HTTP but with communications running via <strong>and</strong> SSL<br />
encrypted connection.<br />
Each proxy was evaluated in a network scenario with:<br />
B<strong>and</strong>width between 0 <strong>and</strong> 70 (Kbit/s) with an exponential increase based on real technologies:<br />
1Kbit/s, 2Kbit/s, 4Kbit/s, 8Kbit/s, 10Kbit/s, 30Kbit/s <strong>and</strong> 70Kbit/s.<br />
Latency between 100 <strong>and</strong> 800ms with an exponential increase with the following values: 100ms,<br />
200ms, 400ms, 800ms, 1600ms <strong>and</strong> 2000ms.<br />
The service simulated was a chat web service. The service characteristics were: • Service request<br />
had a data payload of 10 bytes.<br />
Service reply had a data payload of 1024 bytes of r<strong>and</strong>om <strong>and</strong> therefore incompressible data.<br />
The interval between service invocations had an mean value of 2 seconds <strong>and</strong> service<br />
invocations were exponentially distributed.<br />
Each proxy was evaluated in each network configuration for 50 service invocations. The parameters<br />
measured were:<br />
The number of successful service invocations. Our experiment defines a successful service<br />
invocation when it takes less than ten seconds; a person waiting more than that time looses<br />
attention to the system (Nielsen 1993).<br />
The time between service request <strong>and</strong> reply for successful invocations. The results reported for<br />
each network configuration are:<br />
The success rate of service invocations for each proxy.<br />
512
Antonio Hidalgo L<strong>and</strong>a, Ian Owens <strong>and</strong> Graham Fletcher<br />
The difference in success rates for the NULL <strong>and</strong> SSH proxies.<br />
The statistical significance of the differences between the proxies’ successes rates.<br />
The mean service delivery time for successful service invocations for each proxy.<br />
The difference between the mean service delivery time for successful service invocations for the<br />
NULL <strong>and</strong> SSH proxies.<br />
The statistical significance of the differences between the proxies’ mean service delivery time.<br />
Conclusions were drawn on the validity of the evaluation in areas of experimentation where the P<br />
values for the statistical significance was below 0.05.<br />
Experiment Results<br />
To analyse the data obtained in the experiment we compare the SSL proxy results against the NULL<br />
proxy results, then we obtain the statistical significance of those results, to highlight where are a<br />
significant improvement gain.<br />
The figures 2, 3 <strong>and</strong> 4 show the comparison between the number of successful connections between<br />
the null proxy <strong>and</strong> the SSL proxy. The results of the null proxy (figure 2) are significantly better (more<br />
successful connections) than the results with the SSL proxy (figure 3). The figure 4 shows the<br />
difference between both configurations (null proxy configuration connections less SSL proxy<br />
configuration connections) where we can appreciate that the values are mostly all the time positive<br />
(null proxy configuration has more successful connections than SSL proxy configuration).<br />
Figure 2: Quality approach results: Success rate over 50 connections with a null proxy configuration<br />
The figures 7,6 <strong>and</strong> 5 show the comparison between the successful average times. The results of the<br />
null proxy (figure 5) are significantly better (smaller average times) than the results with the SSL proxy<br />
(figure 6). The figure 7 shows the difference between both configurations, the values of the SSL proxy<br />
configuration less the values of the null proxy configuration. As far as we see in the figure 7 all the<br />
values are bigger than zero, that mean that all the responses of the ssl configuration take more time<br />
to get back a response.<br />
513
Antonio Hidalgo L<strong>and</strong>a, Ian Owens <strong>and</strong> Graham Fletcher<br />
Figure 3: Quality approach results: Success rate over 50 connections with a SSL proxy configuration<br />
To achieve a robust solution we include a statistical significance in our analysis. The statistical<br />
significance in the case of the response times is given by for each network configuration (b<strong>and</strong>width<br />
<strong>and</strong> latency) gets the difference between the averages of the successful connection between both<br />
proxies configurations (SSL <strong>and</strong> null) that we call threshold, then, in a process of 10.000 times, we<br />
reorder r<strong>and</strong>omly the set of successful connection <strong>and</strong> check if the difference is bigger than the<br />
threshold. We count the number of cases when the value is bigger <strong>and</strong> the half of the cases when the<br />
value is the same. The significance will be given in both sides of the value, the ones near to one <strong>and</strong><br />
the ones near to zero. Hence we consider that the value is statistical significant if the value given is<br />
bigger than 95% or lower to 5%. The results of this algorithm is shown in the figures 9 <strong>and</strong> 8. The<br />
statistical significance of the successful connections is given by a similar way, but the threshold is<br />
given by the different between the successful connection of both configurations (SSL <strong>and</strong> null proxy).<br />
The tables 2 <strong>and</strong> 1 shows the values of the results where the significance is bigger than 95%.<br />
Meanwhile the response time is improve along b<strong>and</strong>width, specially in a delay range around 800ms<br />
(figure 8, table 2), on the dimension of the delay we can see a improvement of the successful<br />
connections rate. The success rate is improved specially with a b<strong>and</strong>width near to 4 MBps, but with<br />
delays higher than 1600 ms we get a gain on the full delay spectrum(figure 9, table 1).<br />
Experiment 1 Conclusions<br />
Our analysis shows for that case, we have as we could expect, some configurations where the<br />
performance between both proxies has not a major significance (statistical significance) while in other<br />
we show that the null proxy have a significant improvement over the SSH proxy.<br />
We have made efforts to document our experiment to ensure it can be repeated with these <strong>and</strong> other<br />
parameters <strong>and</strong> mechanisms, <strong>and</strong> so we have introduced a new framework to allow the comparison<br />
of future experiments looking at improving the reach of WS through the use of proxy technology.<br />
514
Antonio Hidalgo L<strong>and</strong>a, Ian Owens <strong>and</strong> Graham Fletcher<br />
Figure 4: Quality approach results: Success rate difference between null proxy <strong>and</strong> SSL proxy<br />
configuration<br />
515
Antonio Hidalgo L<strong>and</strong>a, Ian Owens <strong>and</strong> Graham Fletcher<br />
Figure 5: Quality approach results: Mean values of the responses with null proxies<br />
Table 1: Success rate significance values<br />
B<strong>and</strong>width<br />
Delay<br />
100ms 200ms 400ms 800ms 1600ms 2000ms<br />
1 MBps 1<br />
2 MBps 1 2<br />
4 MBps 10 12 15 12 3 2<br />
8 MBps 3 2<br />
10 MBps 3 2<br />
30 MBps 3 2<br />
70 MBps 3<br />
Figure 6: Quality approach results: Mean values of the responses with SSL proxies.<br />
516
Antonio Hidalgo L<strong>and</strong>a, Ian Owens <strong>and</strong> Graham Fletcher<br />
Table 2: Mean response times significance values.<br />
B<strong>and</strong>width<br />
Delay<br />
100ms 200ms 400ms 800ms 1600ms 2000ms<br />
1 MBps<br />
2 MBps 2.42667<br />
4 MBps 2.51232<br />
8 MBps 3.52066<br />
10 MBps 3.38152<br />
30 MBps 3.63374<br />
70 MBps 3.67286<br />
Figure 7: Quality approach results, difference between the mean values of the responses in both<br />
proxies<br />
Figure 8: Significance matrix of response times<br />
517
Antonio Hidalgo L<strong>and</strong>a, Ian Owens <strong>and</strong> Graham Fletcher<br />
Figure 9: Significance matrix of success connections rate<br />
Figure 10: Region A represents a significative improvement in the response times of null proxy<br />
configuration; region B represents a significative improvement of the success<br />
connections rate of the null proxy configuration<br />
518
Antonio Hidalgo L<strong>and</strong>a, Ian Owens <strong>and</strong> Graham Fletcher<br />
3. Conclusions <strong>and</strong> further work<br />
We have demonstrated <strong>and</strong> documented a test framework for proxy solutions to improve the<br />
performance of WS over disadvantaged networks that:<br />
Defines a disadvantaged network scenario.<br />
Demonstrates how the data can be gathered.<br />
Demonstrates how the results can be analysed with the view to calculating the statistical<br />
significance of different technologies.<br />
Show how interpret the results to produce a set of guidelines.<br />
We have used the framework to test the validity of an ”obvious” technology improvement that is<br />
currently used, <strong>and</strong> found that the obvious answer is incorrect. It is a small step to find out how SOA<br />
technologies actually performs over disadvantaged grids.<br />
The paper is being extended to test several other obvious solutions such as caching mechanisms,<br />
prefetching, delay tolerance networks <strong>and</strong> other compressions algorithms more focused on the<br />
content. It is also worth adding, that the framework could be extended to include other parameters to<br />
evaluate others disadvantages such as disruptions.<br />
We conclude my reiterating our motivation for the work. That is proper <strong>and</strong> comparable analysis is<br />
needed of technology solutions. It is not sufficient to rely on the results of experiments run by the<br />
proposers of the technology. If the experiments are ran by the proposers of technology the review <strong>and</strong><br />
the analysis is prone to bias. This framework allows the evaluation of the services <strong>and</strong> networks<br />
independent of the technology review.<br />
References<br />
Ali W. <strong>and</strong> Shamsuddin S.M. Neuro-fuzzy system in web client-side caching. In Computer Systems <strong>and</strong><br />
Applications, 2009. AICCSA 2009. IEEE/ACS International Conference on, pages 888 –895, May 2009.<br />
Artail H. <strong>and</strong> Saab S. A distributed system for consuming web services <strong>and</strong> caching their responses in manets.<br />
Services Computing, IEEE Transactions on, 2(1):17 –33, 2009.<br />
Booth D.,Haas H., McCabe F., Newcomer E., Champion M., Ferris C., <strong>and</strong> Orchard D.. Web services<br />
architecture. 2004.<br />
Caini C., Firrincieli R., Cruickshank H., <strong>and</strong> Marchese M.. Satellite communications: From peps to dtn. In<br />
Advanced satellite multimedia systems conference (asma) <strong>and</strong> the 11th signal processing for space<br />
communications workshop (spsc), 2010 5th, pages 62 –67, 2010.<br />
Cerf V., Burleigh S., Hooke A., Torgerson L., Durst R., Scott K., Fall K., <strong>and</strong> Weiss H.. Rfc 4838, delay-tolerant<br />
networking architecture. IRTF DTN Research Group, 2007.<br />
Dierks T. <strong>and</strong> Rescorla E. Rfc5246: the transport layer security (tls) protocol version 1.2. IETF, Aug, 2008.<br />
Lam G. <strong>and</strong> Rossiter D.. A soap-based streaming content delivery frame- work for multimedia web services. In<br />
Asia-Pacific Services Computing Conference, 2008. APSCC ’08. IEEE, pages 1097 –1102, 2008.<br />
M<strong>and</strong>yam G.D. Improving battery life for wireless web services through the use of a mobile proxy. In Personal<br />
Indoor <strong>and</strong> Mobile Radio Communications (PIMRC), 2010 IEEE 21st International Symposium on, pages<br />
2763 –2768, 2010.<br />
Nielsen J.. Usability engineering. Morgan Kaufmann, 1993.<br />
Schreiber D., Aitenbichler E., Goeb A., <strong>and</strong> Muhlhauser M.. Reducing user perceived latency in mobile<br />
processes. In Web Services (ICWS), 2010 IEEE International Conference on, pages 235 –242, 2010.<br />
Skjervold E., Hafsoe T., Johnsen F.T., <strong>and</strong> Lund K.. Delay <strong>and</strong> disruption tolerant web services for<br />
heterogeneous networks. In Military Communications Conference, 2009. MILCOM 2009. IEEE, pages 1 –8,<br />
2009.<br />
Sulaiman S., Shamsuddin S.M., Forkan F., <strong>and</strong> Abraham A.. Autonomous spy c: Intelligent web proxy caching<br />
detection <strong>using</strong> neurocomputing <strong>and</strong> particle swarm optimization. In Mechatronics <strong>and</strong> its Applications,<br />
2009. ISMA ’09. 6th International Symposium on, pages 1 –6, 2009.<br />
519
Enhancing the Success of Electronic Schools in the<br />
Kenyan Context<br />
Hesbon Nyagowa 1 , Dennis Ocholla 1 <strong>and</strong> Stephen Mutula 2<br />
1 University of Zulul<strong>and</strong>, South Africa<br />
2 University of Kwazulu Natal, South Africa<br />
nyagowa_hesbon@yahoo.co.uk<br />
docholla@pan.uzulu.ac.za<br />
MUTULASM@mopipi.ub.bw<br />
Abstract: This study evaluated the success of the NEPAD ESchool Pilot in Kenya. The evaluation was<br />
underpinned by DeLone <strong>and</strong> McLean’s (D$M) IS Success model which consists of seven dimensions, each of<br />
which contributes to the success of the IS. D&M IS success model’s seven dimensions pertinent to the eSchool<br />
system are: system quality, information quality, service quality, intention to use, use, user satisfaction <strong>and</strong> net<br />
benefits. In the adapted model for ESchool Success evaluation, re-specification was undertaken resulting in<br />
introduction of a new dimension (training effectiveness) <strong>and</strong> removal of ‘intention to use’ dimension from the D&M<br />
IS success model. The measurement of the success of each dimension was based on observation of installed<br />
eSchool systems <strong>and</strong> users’ perceptions. Survey was conducted on the study population of six eSchool <strong>and</strong><br />
5,186 eSchool users. The NEPAD ESchool Pilot in Kenya was found to be successful despite challenges of<br />
implementations. This paper discusses factors which were found to negatively impact on the success of NEPAD<br />
eSchool system in Kenya. The paper concludes with recommendations on how the success rate of eSchools can<br />
be improved in the Kenyan context.<br />
Keywords: eSchool; IS evaluation; eSchool success, Kenya, eLearning; improving eSchool success<br />
1. Introduction<br />
<strong>Information</strong> systems (IS) have generally been accepted as tools that improve efficiency <strong>and</strong><br />
effectiveness in operations in many sectors of economies, with the greatest pay-off realized in the<br />
service sector (Quinn & Baily, 1994; Smith, McKeen & Street, 2004). Extant literature supports the<br />
notion that the implementation of IS generally results in the efficient utilization of resources,<br />
particularly when resources <strong>and</strong> capabilities are well integrated (Araya, Chapparo, Orero, & Joglar,<br />
2007). Despite the dearth of information on the impact of IS in the education sector, many economies<br />
have deployed IS in schools with the aim of improving productivity in learning (Goodison, 2002) <strong>and</strong><br />
management operations in schools (Bush, 2002), <strong>and</strong> increasing access to education (Jamtsho &<br />
Bullen, 2007).<br />
Extant literature shows that eLearning has largely been successful, partly because it is cost effective<br />
to the learner (Burgess & Russell, 2003) as the learners do not forgo earning opportunities during the<br />
study period. An eSchool, on the other h<strong>and</strong>, integrates information communication technologies<br />
(ICT) in curricula delivery for students who are attending a school in the physical sense. Benefits that<br />
may translate in cost reduction include enhanced productivity in school administration, enhanced data<br />
flow for policy making, affordable in-service training of teachers, facilitation of collaboration between<br />
students in different schools (Twinomugisha, Callan & Bunworth, 2005) <strong>and</strong> reduced cost of training<br />
students when they join employment.<br />
The New Partnership for African Development (NEPAD) through its e-Africa Commission is piloting an<br />
eSchool system in 17 African countries, including Kenya. The main objective of the NEPAD eSchool<br />
is to improve the quality of graduating students. This would be evident in the extent to which students<br />
fit in the modern work environment which is highly computer intensive. The NEPAD ESchool Pilot has<br />
not achieved its objectives to date (Evoh, 2007) which include an investigation of how the challenges<br />
of eSchool may be addressed to improve success rate. The pilot project is several years behind<br />
schedule which calls for evaluation study.<br />
The current study evaluated the success of the NEPAD ESchool Pilot in Kenya <strong>using</strong> ESchool<br />
Success model which is an adaptation of DeLone <strong>and</strong> McLean’s (D&M) IS Success model. D&M IS<br />
success model comprises seven dimensions each of which contributes to the success of the IS<br />
implementation. Six of the ESchool Success model corresponds contextually with D&M IS Success<br />
model as in table 1 (Nyagowa, Ocholla & Mutula, 2011). One dimension of D&M IS success model,<br />
the ‘intention to use’ was dropped as a new dimension, ‘training for use effectiveness’ was introduced.<br />
520
Hesbon Nyagowa, Dennis Ocholla <strong>and</strong> Stephen Mutula<br />
Table 1: Corresponding dimensions of eSchool <strong>and</strong> D$M IS success models<br />
D&M IS Success Model Dimensions eSchool System Success Model Dimensions<br />
System Quality Installed Infrastructure Quality<br />
<strong>Information</strong> Quality Content <strong>and</strong> Communication Quality<br />
Service Quality Service of Technical Personnel Quality<br />
Use Extent <strong>and</strong> Exploitative Use<br />
Intention to Use N/A<br />
N/A Training for Use Effectiveness<br />
User Satisfaction User Satisfaction<br />
Net-Benefits Net-Benefits<br />
The main objective of the current study was to establish the extent to which NEPAD eSchool system<br />
was succeeding <strong>and</strong> determine measures which would improve the success rate. This was<br />
accomplished by assessing the success of each of the seven dimensions of ESchool Success model<br />
<strong>and</strong> identifying factors inhibiting higher level success rate in each dimension. The measurement of the<br />
success of each dimension was based on data collected through observations <strong>and</strong> perception of<br />
eSchool users.<br />
2. Literature review<br />
Over the years, many economies have deployed ICT in education delivery for a variety of reasons.<br />
For example, India lured <strong>and</strong> retained students in formal education by providing ICT access in schools<br />
resulting in reduction of the large number of children without basic education (Nambiar, 2005).<br />
Scotl<strong>and</strong> introduced an eSchool system named SCHOLAR which aims to ‘re-culturalize’ school<br />
management in the maintenance of data <strong>and</strong> adoption of new teaching approaches (Simpson, Payne<br />
& Condie, 2005; Condie & Livingston, 2007). There is also the Smart Schools programme initiated in<br />
Malaysia, which applies a range of technologies in the teaching <strong>and</strong> learning of some subjects<br />
including English, Bahasa Melayu, Science <strong>and</strong> Mathematics (Ya’Acob, Nor & Azman, 2005). The<br />
Smart Schools project places emphasis on the curriculum, pedagogy, assessment methods <strong>and</strong><br />
materials for teaching <strong>and</strong> learning (Ya’Acob, Nor & Azman, 2005). A second version of Smart<br />
Schools called the Sekolah Bastari was later introduced <strong>and</strong> democratizes the school setting as it<br />
allows students to move at their own learning pace. Sekolah Bastari culture sparingly liberalizes<br />
deployment of ICT where the facilities would promote students’ aims (EL-Halawany & Huwail, 2008).<br />
NEPAD ESchool was introduced to both increase access to education <strong>and</strong> improve quality of students<br />
graduating from primary <strong>and</strong> secondary schools in Africa (NEPAD, 2003).<br />
The common ideological framework for the deployment of ICT in education is to increase productivity<br />
in schools (Machin, McNally & Silva in Draca, Sadun & Van Reenen, 2006), impart teamwork <strong>and</strong><br />
lifelong learning habits (Duta, 1999; Ya’Acob, Nor & Azman, 2005; Condie & Livingston, 2007), <strong>and</strong><br />
deal with the dual task of both increasing access to education <strong>and</strong> improving the quality of teaching<br />
(Evoh, 2007). Improving access to education is very critical in developing countries where the human<br />
development index is still very low (United Nations Development Programme, 2010). Implementation<br />
of ICT integration in teaching <strong>and</strong> learning is capital intensive (Sanchez & Salinas, 2008; Hulsmann,<br />
2004; Ryan, 2002; Bates, 2001) as realised in the 15 year project of ‘Enlaces network’ in Chilean<br />
schools <strong>and</strong> other projects. Such heavy investments require close monitoring <strong>and</strong> evaluation to guide<br />
them to success <strong>and</strong> get value from them. DeLone <strong>and</strong> McLean IS Success model which recognizes<br />
information systems as comprising seven dimensions has widely been accepted in the information<br />
systems society. Many studies have applied D&M’s IS success model, albeit with necessary respecification,<br />
while evaluating a variety of information systems in different settings, e.g. the ecommerce<br />
system (Chang, Torkzadeh & Dhillon, 2004; Molla & Licker, 2001), the knowledge<br />
management system (Ong & Lai, 2004) <strong>and</strong> educational course content management system among<br />
others. The current study likewise made re-specification to suit use of D&M IS Success model in<br />
evaluating eSchools.<br />
3. Methods<br />
At present, the NEPAD e-Africa Commission is piloting NEPAD ESchool Systems in six secondary<br />
schools in Kenya (Nyagowa, Ocholla & Mutula, 2011). To investigate the success of the eSchools the<br />
study used survey method. The eSchools <strong>and</strong> their users were considered as population of the study.<br />
The sample frame for the study comprised the six eSchools, 4,936 students <strong>and</strong> 250 teachers. All the<br />
521
Hesbon Nyagowa, Dennis Ocholla <strong>and</strong> Stephen Mutula<br />
six schools were purposively included in the sample to provide insight into variation in the eSchools<br />
settings. Stratified probabilistic sampling of eSchool users was done to reduce the costs of data<br />
collection <strong>and</strong> yield results that could be inferred to the population (Guerrero, 2010). To reduce<br />
sampling error in the study an acceptably large sample was sought, <strong>and</strong> the variability of the sample<br />
characteristics was increased by <strong>using</strong> stratification within schools <strong>and</strong> between schools (Hussmann,<br />
Mehran & Varma, 1990). Stratification between schools was based on the population of eSchool<br />
users. Within each school, stratification was done at class level based on number of students in each<br />
class <strong>and</strong> the gender ratio in the case of co-education school.<br />
The respondents were spread across four levels of education (Forms I, II, III <strong>and</strong> IV). Each dimension<br />
of eSchool Success model was assessed <strong>using</strong> many question items. Blaikie (2009) observes that<br />
when many conditions have to be satisfied, the sample size should be made larger. With the average<br />
degree of freedom of 8 for each dimension, a power of alpha = 0.8, <strong>and</strong> the level of confidence of 0.05<br />
set for the current study, the desired sample size came to 754 (MacCallum, Browne & Sugawara,<br />
1996). To accommodate the use of a split-half in undertaking exploratory factor analysis, the ideal<br />
sample size was doubled to 1508. Data collected was triangulated from observations, interviews <strong>and</strong><br />
a questionnaire (Gupta, 2007). Observation was made on installed infrastructure <strong>and</strong> use of the<br />
eSchool. Interviews were conducted for school principals to get in-depth information on benefits of the<br />
eSchool <strong>and</strong> challenges encountered. The questionnaire facilitated collation of perception of eSchool<br />
users on different attributes of all the six dimensions of ESchool Success model. A total of 776<br />
completed questionnaires were returned. This constituted 51.4% response rate which is considerably<br />
high <strong>and</strong> is attributed to the h<strong>and</strong> delivery of the questionnaire (Maxfield <strong>and</strong> Babbie, 2008).<br />
4. Validation of instruments<br />
The study instruments stood the test of reliability <strong>and</strong> validity. Data was found to be stable in the splithalf<br />
exploratory factor analysis <strong>and</strong> had high reliability, with all dimensions recording an alpha value of<br />
0.7 <strong>and</strong> above apart from the ‘training for use effectiveness’ dimension which recorded alpha value of<br />
0.46. A scatter plot (figure 1) of the alpha from exploratory <strong>and</strong> confirmatory factor analysis show<br />
close correlation which confirms stability in the data sets. To validate the conceptualized seven<br />
dimensions of eSchool Success model, a scree plot of the possible factors was made <strong>and</strong> it revealed<br />
an elbow between five <strong>and</strong> nine component positions. The exact position of the elbow could be<br />
pinned to seven components as demonstrated in Figure 2.<br />
Figure 1: Scatter plots of test <strong>and</strong> confirmatory alpha<br />
Construct validity was established through factor analysis. Seven factors with many measurement<br />
items loading to them, in the same way as was theoretically conceptualised, were confirmed. These<br />
522
Hesbon Nyagowa, Dennis Ocholla <strong>and</strong> Stephen Mutula<br />
two findings confirmed that the conceptualized model was suitable for the study <strong>and</strong> would lead to<br />
reliable <strong>and</strong> valid findings.<br />
Eigenvalue<br />
16<br />
14<br />
12<br />
10<br />
8<br />
6<br />
4<br />
2<br />
0<br />
Scree Plot<br />
1<br />
5<br />
9<br />
13<br />
17<br />
21<br />
Component Number<br />
Figure 2: Scree plot of possible factors<br />
5. Presentation of data<br />
25<br />
29<br />
5.1 Success <strong>and</strong> challenges of installed infrastructure<br />
Installed infrastructure ranged from computer laboratories, to computer hardware, operating systems<br />
<strong>and</strong> networks. Computers were connected in star configuration in LAN which was linked to satellite<br />
through VSAT for internet access. The VSATs had been disconnected from the satellite links.<br />
Respondents tended to agree or highly agree that the quality of the installed infrastructure was good<br />
(see Table 2). Respondents lowly rated the quality of the power back-up system <strong>and</strong> the printing<br />
facilities. This is attributed to frequent power outages, unreliable back-up system <strong>and</strong> unavailability of<br />
consumable supplier for Lexmark Laser printers in Kenya.<br />
Table 2: Mean perception of the quality of installed infrastructure<br />
Attribute of installed infrastructure No. Mean<br />
Buildings ho<strong>using</strong> eSchool equipment are suitable for computer laboratories 744 3.3<br />
E- school computer hardware has good speed 757 2.7<br />
ESchool smart boards give clear projection 745 3.1<br />
ESchool software is user friendly 739 3.1<br />
ESchool windows operating system makes it easy for me to navigate the system 747 3.0<br />
ESchool system has reliable power back up 752 2.5<br />
ESchool computer keyboard <strong>and</strong> screens are suitable for my use 753 3.2<br />
ESchool printers are easy to use 753 2.7<br />
5.2 Success <strong>and</strong> challenges of information content <strong>and</strong> communication<br />
The responses could be divided into two categories: those relating to content within the LAN, <strong>and</strong><br />
those relating to communication outside the eSchool. Most respondents were of the opinion that the<br />
content quality was good as shown in Table 3. On the other h<strong>and</strong>, communication effectiveness <strong>and</strong><br />
quality were rated poorly (see variables marked with * in table 3).<br />
523<br />
33<br />
37<br />
41<br />
45<br />
49<br />
53<br />
57<br />
61
Hesbon Nyagowa, Dennis Ocholla <strong>and</strong> Stephen Mutula<br />
Table 3: Perceptions on content <strong>and</strong> communication quality<br />
Aspects of content <strong>and</strong> communication N Mean<br />
Std.<br />
Deviation<br />
It is efficient - getting complete reading materials through the<br />
eSchool system* 749 2.7 1.019<br />
The content retrieved from the eSchool system is specific <strong>and</strong><br />
relevant to curriculum 743 2.9 0.913<br />
Exchange of ideas with peers through e-mail has been<br />
efficient* 751 2.3 1.191<br />
The format quality of content in the eSchool system has<br />
encouraged me to use the system. 744 2.9 0.990<br />
It has been possible to get materials from other eSchools on<br />
time* 745 2.2 1.080<br />
Some teachers in my school participate in developing some<br />
content which is posted to the eSchool system <strong>and</strong> shared<br />
with other eSchools 747 2.6 1.175<br />
I have established friends through interconnection between<br />
my school <strong>and</strong> other eSchools* 746 2.1 1.160<br />
The quality of content <strong>and</strong> its suitability for the curriculum was acceptable to 72.4% of the<br />
respondents. However, quality of communication was unacceptable to 60.7% of the respondents. The<br />
major drawback in communication was limited access to internet connectivity.<br />
5.3 Success <strong>and</strong> challenges of service quality of technical staff<br />
Respondents were asked to rate the technical personnel’s knowledge of their job, the personal<br />
attention they gave to users, <strong>and</strong> how timely their responses were to calls for assistance. These<br />
ratings were divided into expectations <strong>and</strong> perceived actual levels. The level of concurrence was high:<br />
85.9% for the knowledge of work, 77.5% for giving attention to users, <strong>and</strong> 65.4% for timeliness. In this<br />
study, the differences between expected service quality level <strong>and</strong> perceived service quality level were<br />
subjected to a Student T-test to determine whether they were significantly different from zero. Table 4<br />
displays the means <strong>and</strong> Table 5 provides the test statistics.<br />
Table 4: Means of difference in service quality level<br />
Service Gap N Mean Std. Deviation Std. Error Mean<br />
Gap in IS staff knowledge of their work 716 -0.061 1.043 0.0390<br />
Gap in IS staff attention given to users 704 -0.305 1.156 0.0436<br />
Gap in IS staff promptness to tackling user<br />
issues 709 -0.190 1.249 0.0469<br />
The T-test confirms that the gap in IS personnel knowledge of their work was statistically not different<br />
from zero; t = -1.577 <strong>and</strong> p = 0.115. This means that the IS staff actually showed the knowledge level<br />
that they were expected to possess. Corresponding gap in the attention IS technical staff gave to<br />
users <strong>and</strong> the gap in IS personnel promptness in responding to eSchool users were significantly<br />
different from zero. This implies that the attention that was given to eSchool users <strong>and</strong> the<br />
promptness of IS personnel’s responses to technical issues were below expectations.<br />
A consistently high majority of the respondents agreed or highly agreed that the quality of service of<br />
IS personnel was adequate (80.5%), the technical personnel were pleasant (68.3%), <strong>and</strong> that the<br />
524
Hesbon Nyagowa, Dennis Ocholla <strong>and</strong> Stephen Mutula<br />
eSchool system was always kept in good order (63.5%). The overall assessment on these three<br />
points was 2.892, which was high <strong>and</strong> significantly different from 2.0 (see Table 6).<br />
Table 5: T-test statistics<br />
Service Gap T Df<br />
Sig. (2tailed)<br />
Mean<br />
Difference<br />
95% Confidence Interval<br />
of the Difference<br />
Lower Upper<br />
Gap in IS staff knowledge of<br />
their work -1.5771 715 0.1152 -0.0615 -0.1380 0.0150<br />
Gap in IS staff attention given<br />
to users -7.0100 703 0.0000 -0.3054 -0.3909 -0.2199<br />
Gap in IS staff promptness to<br />
tackling user issues -4.0578 708 0.0001 -0.1904 -0.2825 -0.0983<br />
Table 6: T-test of the overall assessment of technical personnel<br />
T df Sig. (2-tailed)<br />
Test Value = 2<br />
Mean<br />
Difference<br />
95% Confidence Interval of<br />
the Difference<br />
Lower Upper<br />
OVSERVQ* 34.047 712 .000 .8920 .8406 .9434<br />
OVSERVQ* is the ‘overall service quality.<br />
5.4 Success <strong>and</strong> challenges of training for use effectiveness<br />
Training quality was found to be effective, with 51.5% agreeing on the variety of methods applied<br />
(figure 3) <strong>and</strong> 78% gained h<strong>and</strong>s-on experience. However, a large majority (88%) required additional<br />
training.<br />
Most respondents (62.2%) complained that the training period was not adequate. In some cases, the<br />
trainer was accused of wasting valuable time, there were frequent power outages, <strong>and</strong> literature was<br />
inadequate. Consequently, many concepts were not well understood by trainees. As a way to improve<br />
training, respondents suggested that the internet connection should be restored; those who did not<br />
benefit from initial training should be given additional training during school holidays; <strong>and</strong><br />
improvements should be made to teaching methods, with users given more time to practice.<br />
Figure 3: Perceptions of the variety of methods applied in training<br />
525
Hesbon Nyagowa, Dennis Ocholla <strong>and</strong> Stephen Mutula<br />
5.5 Success <strong>and</strong> challenges of eSchool extent <strong>and</strong> exploitative use<br />
The study assessed the use of the eSchool system through three parameters: frequency of use,<br />
purpose of use, <strong>and</strong> exploitative or innovative use.<br />
Extent of use<br />
A large proportion (79.6%) of users agreed that the system was easy to use. The frequency with<br />
which the users used the system is high among a slight majority (58.6%). The ease of use of the<br />
eSchool system did not depend on where a user received training. Indeed, a very high majority<br />
(90.4%) of those who trained outside the eSchool system also found the system easy to use.<br />
Majority (61.8%) of respondents said that teachers did not integrate ICT in classroom teaching. The<br />
proportion of teachers disagreeing (53.8%) compared to the proportion of students (62.3%) was<br />
significantly different, since chi-square = 10.14 <strong>and</strong> p = 0.017. The responses elicited by this question<br />
are shown in Table 7.<br />
Table 7: Perception that teachers incorporate the use of the eSchool system in the classroom<br />
Response Frequency Percent Cumulative Percent<br />
Strongly Disagree 251 32.3 34.6<br />
Disagree 198 25.5 61.8<br />
Agree 175 22.6 86.0<br />
Strongly Agree 102 13.1 100.0<br />
Total 726 93.6<br />
A high proportion of the respondents (59.4%) agreed that they used the eSchool system to access<br />
additional material specific to the curriculum. The mean for all the responses is above 2.0. However,<br />
some means are very close to 2.0. All the mean responses were found to be statistically different from<br />
2.0, even though “<strong>using</strong> the eSchool to access lessons taught by teachers in other eSchools” <strong>and</strong><br />
“<strong>using</strong> the eSchool to collaborate with peers” were poorly rated.<br />
Exploitative use<br />
Users engage in the use of the eSchool system for different purposes. A large proportion of the users<br />
(53.3%) agreed that they used the eSchool for independent learning. A small proportion (42.9%)<br />
conceded that they accessed material that was not relevant to the curriculum. Of those who accessed<br />
material not relevant to the curriculum, the majority were teachers (57.5%), with students comprising<br />
42.5%. A large majority (62%) of the respondents agreed that some rules imposed by the<br />
administration prevented their exploitative use of the e-system. The rules affected more students<br />
(62.7%) than teachers (45.2%).<br />
Some of the rules account for the lack of motivation to use the eSchool system. Most (67.4%)<br />
respondents claimed that they had no motivation to use the eSchool system. Besides rules as a<br />
reason for their lack of motivation, some users cited the low computer to user ratio, unavailability of<br />
teachers skilled enough to use the available ICT, <strong>and</strong> outdated learning materials. Those who felt<br />
motivated to use the eSchool gave motivating factors such as: the opportunity to reach a global<br />
network of learners, exposure to new ideas, improved grades in examinations, <strong>and</strong> simplified learning<br />
tasks.<br />
5.6 Success <strong>and</strong> challenges of eSchool user satisfaction<br />
All responses on the level of satisfaction with specific aspects of the eSchool had a mean of 2.5 <strong>and</strong><br />
above. T-test revealed that all the means are statistically different from 2.0, which confirms that the<br />
users were generally satisfied with the stated aspects of the eSchool system.<br />
526
Hesbon Nyagowa, Dennis Ocholla <strong>and</strong> Stephen Mutula<br />
A sizeable proportion of respondents (47.2%) declared that they were satisfied with the eSchool<br />
system. Although the proportion of respondents who were not satisfied was slightly higher than the<br />
proportion satisfied, the mean response was 2.48 <strong>and</strong> was found to be statistically different from 2.0<br />
when subjected to a T-test. This outcome can go either way, <strong>and</strong> therefore more efforts should be<br />
exerted to tilt the outcome in favour of satisfaction. The inconclusiveness of this outcome is also<br />
depicted in the high percentage (76.4%) of respondents who had a complaint about the eSchool<br />
system.<br />
5.7 Success <strong>and</strong> challenges of eSchool net-benefits<br />
A large majority of the respondents agreed that net-benefits accrued from the implementation of the<br />
eSchool system <strong>and</strong> in all facets of net-benefits as conceptualized in this study (see Table 8). A T-test<br />
reveals that all the mean responses of perceived net-benefits are statistically different from 2.0.<br />
Table 8: Means of perceived net-benefits<br />
My parents prefer the eSchool over non eSchools<br />
Infrastructure / resources in eSchools help students perform better<br />
Installation of eSchools helps in the efficient use of resources<br />
Teaching <strong>and</strong> learning through an eSchool is more enjoyable<br />
N Mean<br />
659 2.98<br />
662 3.06<br />
659 3.03<br />
665 3.28<br />
The eSchool system facilitates collaboration between teachers <strong>and</strong> students in<br />
different schools 645 2.82<br />
The eSchool system encouraged me to learn independently<br />
Users of eSchools are willing to offer recommendations for possible improvements<br />
655 2.90<br />
650 2.98<br />
My underst<strong>and</strong>ing of a lesson normally improves when I review the topic from<br />
eSchool content 657 3.00<br />
My team working skills have improved since I started <strong>using</strong> the eSchool<br />
communication system 655 2.90<br />
Measurable net-benefit is a robust means of ascertaining the success of an information system. The<br />
eSchool was implemented to achieve certain objectives which the study now shows it is achieving.<br />
Improving the level of success requires identifying weak areas <strong>and</strong> designing measures to correct<br />
apparent drifts from the desired path.<br />
6. Discussion<br />
The study was designed to ascertain the level of success of the eSchools, identify issues that could<br />
be impeding the success of eSchools <strong>and</strong> collate views of eSchool users on ways of improving the<br />
success of the different dimensions of the eSchool system. These suggestions can be scrutinized<br />
against best practices <strong>and</strong> adapted to the NEPAD ESchool System.<br />
Largely, installed infrastructure was identified as a major area of concern that tends to slow the pace<br />
of eSchool success. The quality of printing facilities <strong>and</strong> power back-up system was poorly rated. This<br />
is similar to a study on complexity of integration of ICT in education in Turkey. Akbaba-Altun (2006)<br />
found out that physical infrastructure including equipment <strong>and</strong> their breakdown was the common<br />
problematic category. Power outages may result in loss of documents, time wastage <strong>and</strong> interruption<br />
in the teaching delivery which cause users to develop negative attitude towards the system. Printing<br />
facility was not accessible because of unavailability of supplies. As a result students may complete<br />
their learning without appreciating how printing is done. The quality of communication was<br />
unacceptable to 60.4% of respondents. Quality of connectivity <strong>and</strong> therefore communication was<br />
adversely affected by the disconnection of VSAT. The users were therefore not exploiting capabilities<br />
527
Hesbon Nyagowa, Dennis Ocholla <strong>and</strong> Stephen Mutula<br />
of eLearning. This is supported by finding in a study of professional development of teachers in which<br />
Ololube (2007) identified poor internet connectivity as one of the barriers to effective professional<br />
development of teachers in Nigeria. In the eSchool situation, lack of interconnectivity will result in<br />
major goals of the eSchool system, including team-working skills <strong>and</strong> lifelong learning (Ya’Acob, Nor<br />
& Azman, 2005; Condie & Livingston, 2007), not be realized.<br />
The cost of internet access in developing countries tends to be high (Ashcroft & Watts, 2005), <strong>and</strong> this<br />
may account for the inability of the Ministry of Education to budget for maintaining internet access in<br />
the eSchools. Organizations reduce access costs by pooling resources <strong>and</strong> subscribing access<br />
through an umbrella body (Adam, 2003; Peterson, 2007). The NEPAD e-Africa Commission had<br />
negotiated access to the internet through the Regional African Satellite Communication Organization<br />
(RASCOM), which is dedicated for use in rural Africa. RASCOM provides state-of-the-art facilities<br />
which allow users to pay for minutes of access in a variety of ways, including the use of scratch cards.<br />
It would be in the interest of NEPAD eSchools’ success if the Ministry of Education pooled the access<br />
requirements of eSchools <strong>and</strong> purchased, as a bundle, satellite access time from RASCOM <strong>and</strong> redistributed<br />
it to the eSchools.<br />
The majority of the respondents (61.8%) disagreed that teachers incorporate ICT in their teaching in<br />
the classroom. In most eSchools, computer hardware were installed in computer laboratories. The<br />
many classes could therefore not access laboratories for most of the teaching. This is similar to<br />
findings on ICT usage <strong>and</strong> perception of social studies teachers in Turkey in which 70.6% of teachers<br />
identified lack of access of existing infrastructure as barrier to ICT usage in teaching <strong>and</strong> learning<br />
(Gulbahar & Guven, 2008). Wide access of ICT would enable the teachers to use the facilities for<br />
teaching <strong>and</strong> give students assignments that may be marked online. Limitation in the distribution of<br />
ICT facilities could be attributed to inadequate funding (Özdemir <strong>and</strong> Kılıç, 2007; Jhurree, 2007).<br />
Insufficient funding was listed by the interviewed principals as one of the main problems bedevilling<br />
the eSchool system.<br />
Majority of respondents agreed that eSchool enhances team working skills <strong>and</strong> lifelong learning skills<br />
with each variable scoring a mean of 2.90. However, chi-square values of 89.238 <strong>and</strong> 53.14 were<br />
relatively low revealing that these perceptions were only weakly supported. This is similar to<br />
evaluation results of Malaysian Smart Schools which found out that over 50% of students valued team<br />
work but were reluctant to work in teams as it was seen as an obstacle to completing exercise<br />
assigned during lessons (Lubis, Ariffin, Muhamad, Ibrahim & Wekke, 2009). Extant literature concur<br />
that the integration of ICT in curriculum delivery empowers students with team working skills <strong>and</strong><br />
abilities for lifelong learning (Duta, 1999; Ya’Acob, Nor & Azman, 2005; Condie & Livingston, 2007).<br />
Achieving this may require re-design of curricula to remove time constraints. In the eSchools, it may<br />
require reduction of breadth of curriculum but compensation with increase in depth which in turn gives<br />
students opportunity for specialist learning strategy as opposed to generalist learning strategy.<br />
Specialist strategy of learning leads to exploitatively use of a system is known to support innovation.<br />
Of the respondents, 53.3% agreed that they exploited the capabilities of the eSchool system for<br />
independent learning, but teachers were not supporting this initiative as reported by 61.8% of the<br />
respondents who also said that teachers did not incorporate the use of ICT in classroom teaching.<br />
This finding concurs with other studies that have confirmed that teachers concentrate on the<br />
development of ICT technical skills (Tondeur, Braak & Valcke, 2007) but fail to use or improve the use<br />
of available infrastructure in classrooms (Ward, 2003). For teachers to productively use ICT in<br />
classrooms, issues of availability of infrastructure, technical competence of the teacher, teachers’<br />
readiness, <strong>and</strong> teachers’ pedagogical skills, must be addressed.<br />
Pedagogical approaches to ICT integration in curricula are known to have wide ranging effects (Yuen,<br />
Law & Wong, 2003). Such pedagogies are different from the usual pedagogical practices that<br />
traditional teachers are trained on (Ya’Acob, Nor & Azman, 2005). The integration of ICT in curricula<br />
requires a pedagogy of inquiry-based learning <strong>and</strong> reflective assessment which have been found to<br />
improve students’ learning <strong>and</strong> meta-cognitive thinking strategies (So & Kim, 2009). Teachers in the<br />
sampled eSchools had not been exposed to pedagogical skills for ICT integration, <strong>and</strong> a large<br />
majority (88%) required additional training. This finding is similar to results from other studies.<br />
Hennessy, Ruthven <strong>and</strong> Brindley (2005) established that teachers are hesitant to use ICT in<br />
classroom teaching partly because of external constraints <strong>and</strong> partly because of the culture of tying<br />
excellent teaching to students passing examination. Pedagogy for passing examination is teacher-<br />
528
Hesbon Nyagowa, Dennis Ocholla <strong>and</strong> Stephen Mutula<br />
centred while integration of ICT in curriculum is student centred. Practicing teachers need re-training<br />
to unlearn traditional pedagogies <strong>and</strong> adopt new pedagogies that will both be student-centred <strong>and</strong><br />
make students high achievers.<br />
7. Conclusion<br />
The NEPAD ESchool Pilot in Kenya appears to be succeeding in attaining its major goals of<br />
improving the quality of graduating students by imparting team working <strong>and</strong> lifelong learning skills,<br />
which should make the students better prepared for the current complex workplace. The study<br />
recognizes that basic infrastructure, training <strong>and</strong> user support are in place. Teachers, students <strong>and</strong><br />
parents are supportive of the eSchool system. Each of the six dimensions is succeeding but a lot of<br />
improvement is required. Infrastructure expansion, sustainability <strong>and</strong> internet connectivity is important<br />
in facilitating user access of learning resources. Access points are currently limited to computer<br />
laboratories making it difficult for teachers to integrate ICT in every day teaching of subjects. Lack of<br />
internet connection is threatening exchange of resources <strong>and</strong> ideas between schools <strong>and</strong> peers.<br />
Further studies should be conducted on effective training methods to impart desired pedagogical skills<br />
to teachers <strong>and</strong> also investigate the ‘training for use effectiveness’ dimension to make it better<br />
measure training effectiveness.<br />
References<br />
Adam, L. (2003). <strong>Information</strong> <strong>and</strong> communication technologies of higher education in Africa: Initiatives <strong>and</strong><br />
challenges, JHEA/RESA, Vol. 1, No. 1, pp. 195-221.<br />
Akbaba-Altun, S. (2006). Complexity of integrating computer technologies into education in Turkey, Educational<br />
Technology <strong>and</strong> Society, Vol. 9, No. 1, pp. 176-187.<br />
Araya, S., Chaparro, J., Orero, A. And Joglar, H. (2007). An integrative view of IS/IT <strong>and</strong> organizational resources<br />
<strong>and</strong> capabilities, Issues in Informing Science <strong>and</strong> <strong>Information</strong> Technology, Vol. 4, pp. 629-639.<br />
Ashcroft, L. <strong>and</strong> Watts, C. (2005). ICT Skills for <strong>Information</strong> Professionals in Developing Countries: perspectives<br />
from a study of the electronic information environment in Nigeria, IFLA Journal, Vol. 31, No. 1, pp. 6-12.<br />
Bates, A.W. (2001) National Strategies for ELearning in Post-secondary Education <strong>and</strong> Training, Paris:<br />
International Institute for Educational Planning, UNESCO.<br />
Blaikie, N. (2009). Desigining Social Research, Polity Press, Cambridge.<br />
Burgess, R.D.J. <strong>and</strong> Russell, E.A.J. (2003). The effectiveness of distance learning initiatives in organizations,<br />
Journal of Vocational Behavior, Vol. 63, Issue 2, pp. 289-303.<br />
Bush, T. (2002). A preparation for school leadership: International perspectives, Journal of Educational<br />
<strong>Management</strong>, Administration <strong>and</strong> Leadership, Vol. 30, No. 4, pp. 417-429.<br />
Chan, J. C-J., Torkzadeh, G. <strong>and</strong> Dhillon, G. (2004). Re-examining the measurement models of success for<br />
Internet commerce, <strong>Information</strong> <strong>and</strong> <strong>Management</strong>, Vo. 41, pp. 577-584.<br />
Condie, R. <strong>and</strong> Livingston, K. (2007). Blending online learning with traditional approaches: Changing practices,<br />
British Journal of Educational Technology, Vol. 38, No. 2, pp. 337-348.<br />
DutaEL-Halawany, H. <strong>and</strong> Huwail, E. I. (2008). Malaysian Smart Schools: A Fruitful Case Study for Analysis to<br />
Synopsize Lessons Applicable to the Egyptian Context, International Journal of Education Using ICT, Vol. 4,<br />
No. 2.<br />
Evoh, C.J. (2007). Policy networks <strong>and</strong> the transformation of secondary education through ICTs in Africa: The<br />
prospects <strong>and</strong> challenges of the NEPAD eSchools initiative, International Journal of Education <strong>and</strong><br />
Development Using <strong>Information</strong> <strong>and</strong> Communication Technology, Vol. 3, Issue 1.<br />
Goodison, T. (2002). Learning with ICT at primary level: pupils’ perceptions, Journal of Computer Assisted<br />
Learning, Vol. 18, pp. 282-289.<br />
Gulbahar, Y. <strong>and</strong> Guven, I. (2008). A survey on ICT usage <strong>and</strong> the perceptions of Social Studies teachers in<br />
Turkey, Educational Technology & Society, Vol. 11, No. 3, pp. 37-51.<br />
Gupta, B.L. (2007). Governance <strong>and</strong> <strong>Management</strong> of Technical Institutes, Concept Publishing Company, New<br />
Delhi.<br />
Hennessy, S., Ruthven, K. And Brindley, S. (2005). Teacher perspectives on integrating ICT into subject<br />
teaching: commitment, constraints, caution, <strong>and</strong> change, Journal of Curriculum Studies, Vol. 37, No. 2, pp.<br />
155-192.<br />
Hulsmann, T. (2004) “The Two-Pronged Attack on Learner Support: Costs <strong>and</strong> Centrifugal Forces of<br />
Convergence”, in U. Bernath <strong>and</strong> A. Szcus (eds.) Supporting the Learner in Distance Education <strong>and</strong><br />
ELearning: Proceedings of the Third EDEN Research Workshop, Oldenburg: Bibliotheksund- <strong>Information</strong>s<br />
sytem der Universitat Oldenburg, pp. 498-504<br />
Hussmanns, F., Mehran, F., <strong>and</strong> Varma, V. (1990). Surveys of Economically Active population.<br />
Jamtsho, S., Bullen, M. (2007). Distant education in Bhutan: Improving access <strong>and</strong> quality through ICT use,<br />
Journal of Distant Education, Vol. 28, Issue, 2, pp. 149, 161.<br />
Jhurree, V. (2005). Technology integration in education in developing countries: Guidelines to policy makers,<br />
International Education Journal, Vol. 6, No. 4, pp. 467-483.<br />
529
Hesbon Nyagowa, Dennis Ocholla <strong>and</strong> Stephen Mutula<br />
Lubis, M.A., Ariffin, S.R., Muhamad, A.T., Ibrahim, S.M. <strong>and</strong> Wekke, S.I. (2009). Integration of ICT in teaching<br />
<strong>and</strong> learning processes: A study of the Smart School of Malaysia, Proceedings of the 5 th WSEAS/IASME<br />
International Conference on Educational Technologoes, www.wsea.us/elibrary/conference/2009/lalaguna/EDUTE/EDUTEC-28.<br />
MacCallum, R.C., Browne, M.W., <strong>and</strong> Sugawara,H.M.(1996). Power Analysis <strong>and</strong> Determination of Sample Size<br />
for Covariance Structure Modelling, Psychological Methods Vol. No. 2, pp 130 -149.<br />
Machin S., McNally, S., <strong>and</strong> Silva, O. (2006). ‘New Technology in Schools: Is There a Payoff?’. Mimeo, CEP-<br />
LSE, http://personal.lse.ac.uk/silvao/ICTinSchools.pdf.<br />
Maxfield, M. G. <strong>and</strong> Babbie, E. R. (2008). Basics of Research Methods for Criminal Justice <strong>and</strong> Criminology, 2 nd<br />
Edition Wadsworth, Belmont, USA.<br />
Molla, A. <strong>and</strong> Licker, S.P. (2001). E-commerce system success: An attempt to extend <strong>and</strong> respecify the DeLone<br />
<strong>and</strong> McLean model of IS success, Journal of Electronic Commerce Research, Vol. 2, No. 4, pp. 131-141.<br />
Nambiar, M.M. (2005). ICT for education: The experience of India, in Harnessing the potentials of ICT for<br />
education: A multi-stakeholder approach (Bracey, B. <strong>and</strong> Culver, T. eds.), Proceedings of the Dublin Global<br />
Forum of the United Nations ICT Task Force, UNICTAF, New York, pp. 19-21.<br />
Nyagowa, O.H., Ocholla, D. N. <strong>and</strong> Mutula, S. (2011). Construction <strong>and</strong> validation of eSchool success model,<br />
Proceedings of the 2 nd International Conference on <strong>Information</strong> <strong>Management</strong> <strong>and</strong> Evaluation (Grant, K.<br />
2011 ed.), Ryerson University, Toronto, Canada, 27 th -28 th 2011.<br />
Ololube, N.P. (2007). The relationship between funding, ICT, selection processes, administration <strong>and</strong> planning<br />
<strong>and</strong> the st<strong>and</strong>ard of science teacher education in Nigeria, Asian-Pacific Forum on Science Learning <strong>and</strong><br />
Teaching, Vol. 8, Issue 1, pp. 1-29.<br />
Ong, Chorng-Shyong <strong>and</strong> Lai, Jung-Yu (2004). Developing an instrument for measuring user satisfaction with<br />
knowledge management systems, proceeding of the 37 th Hawaii International Conference on System<br />
Science<br />
Özdemir, S. <strong>and</strong> Kılıç, E. (2007), Integrating information <strong>and</strong> communication technologies in the Turkish primary<br />
school system. British Journal of Educational Technology, 38: 907–916.<br />
Peterson, L.M. (2007). Articulating the future through collaboration, New Directions for Higher Education, No.<br />
138, pp. 95-102.<br />
Quinn, B.J. <strong>and</strong> Baily, N.M. (1994). <strong>Information</strong> technology: Increasing productivity in services, Academy of<br />
<strong>Management</strong> Executive, Vol. 8, No. 3, pp.28-51.<br />
Ryan, Y. (2002) Emerging indicators of success <strong>and</strong> failure in borderless higher education, A Report for the<br />
Observatory on Borderless Higher Education London.<br />
Sanchez, J. <strong>and</strong> Salinas, A. (2008). ICT <strong>and</strong> learning in Chilean schools: Lessons learned, Computer &<br />
Education, Vol. 51, Issue 4, pp. 1621-1633.<br />
Simpson, M., Payne, F. <strong>and</strong> Condie, R. (2005). Introducing ICT in Secondary Schools: A Context for Reflection<br />
on <strong>Management</strong> <strong>and</strong> Professional Norms, Education <strong>Management</strong> Leadership, 33; 331<br />
Smith, A.H., McKeen, D.J. <strong>and</strong> Street, C. (2004). Linking IT to business metrics, Journal of <strong>Information</strong> Science<br />
<strong>and</strong> Technology, Vol. 1, No. 1, pp. 14-26.<br />
Tondeur, J., Braak, V.J. <strong>and</strong> Valcke, M. (2007). Curricula <strong>and</strong> the use of ICT in education: Two worlds apart?,<br />
British Journal of Educational Technology, Vol. 38, Issue 6, pp. 962-976.<br />
Twinomugisha, A., Callan, J.P. <strong>and</strong> Bunmorth, C. (2005). Deploying ICT in schools: A framework for identifying<br />
<strong>and</strong> assessing technology options, their benefits, feasibility <strong>and</strong> total cost of ownership; in Harnessing the<br />
potentials of ICT for education: A multi-stakeholder approach (Bracey, B. <strong>and</strong> Culver, T. eds.), Proceedings<br />
of the Dublin Global Forum of the United Nations ICT Task Force, UNICTAF, New York.<br />
United Nations Development Programme (2010). The real wealth of nations: Pathway to human development,<br />
Human Development Report.<br />
Ward, L. (2003). Teacher practice <strong>and</strong> the integration of ICT : Why aren’t our secondary school teachers <strong>using</strong><br />
computers in their classrooms?, Proceedings of NZARE/AARE Conference, Auckl<strong>and</strong>, N.Z.<br />
Ya’Acob, A., Nor, M.F.N <strong>and</strong> Azman H. (2005). Implementation of Malaysian Smart schools: An investigation of<br />
teaching-learning practices <strong>and</strong> teacher-student readiness, Internet Journal of e-Language Learning <strong>and</strong><br />
Teaching, Vol. 2, No. 2, pp. 16-26.<br />
Yuen, A.H.K., Law, N. Wong, K.C. (2003). "ICT implementation <strong>and</strong> school leadership: Case studies of ICT<br />
integration in teaching <strong>and</strong> learning", Journal of Educational Administration, Vol. 41 Iss: 2, pp.158 – 170.<br />
530
The Specification of Competency Questions: An<br />
Ontological Support to Match Business Processes, IT <strong>and</strong><br />
Competences of Professionals<br />
Yadary Ortega-González 1 , Giacomo Carli 2 , Aless<strong>and</strong>ro Gr<strong>and</strong>i 2 <strong>and</strong> Mercedes<br />
Delgado-Fernández 1<br />
1<br />
Technical University of Havana (CUJAE), Cuba<br />
2<br />
University of Bologna, Italy<br />
yog@ind.cujae.edu.cu<br />
giacomo.carli@unibo.it<br />
aless<strong>and</strong>ro.gr<strong>and</strong>i@unibo.it<br />
mdelgado@ind.cujae.edu.cu<br />
Abstract: The need of facing continuous changes in <strong>Information</strong> Technologies appears particularly dem<strong>and</strong>ing<br />
for the common knowledge base of firms <strong>and</strong> competences of professionals. <strong>Information</strong> Technologies (IT) within<br />
business processes need to be linked with the required set of competences that a professional can mobilize. In<br />
order to identify the competences activated along with a change in organizational processes, where IT support<br />
large part of the routines, this study introduces a structured procedure. It combines the activities <strong>and</strong> the IT<br />
involved in an organizational process with the competences that a professional is required to apply in that<br />
situation. The proposed procedure captures knowledge from experts to create a dictionary of IT competences of<br />
professions which are matched with organizational processes <strong>and</strong> technologies. In order to manage data about<br />
competences, this study designs an ontological framework which acts as a reference with different practical<br />
applications. For instance, in universities, it could be useful in the implementation of study programs to follow a<br />
problem-based learning approach. In firms, it can enable several human resource management activities, as<br />
selection <strong>and</strong> training programs. Additionally, it can be useful for design particular competences sets that define<br />
curricula of human resources. This study aims to show the specification of the competency questions, which is an<br />
acknowledge technique to offer an ontological support to the procedure. The competency questions, formulated<br />
in natural language, with their respective answers, drive the development of the intended ontology, <strong>and</strong> delimit its<br />
scope. Competency questions are the starting point to identify the terminology that will constitute the classes <strong>and</strong><br />
their relationships in the intended ontology. A case study about the identification of IT competences of Industrial<br />
Engineering profession is presented as an example of the proposed procedure. This practical case explains how<br />
the procedure conceptual model supports the rationale behind the competency questions, which are defined in<br />
interviews with experts. Results are discussed in order to address the next steps of the proposed procedure.<br />
Keywords: knowledge management, competency questions, ontology, human resources management, industrial<br />
engineering, professional competences<br />
1. Introduction<br />
There are several studies which analyse the university-firms relation, foc<strong>using</strong> on competence level.<br />
In this context the subjects stressed are the dynamics of the lifelong learning in the human resource<br />
management policies (Bellini 2008), the different types of research <strong>and</strong> development (R&D) strategies<br />
(D’Este <strong>and</strong> Patel 2007), the allocation of professional competences in the work marketplace<br />
(Rodrigues et al. 2005), the problem-based learning approach <strong>and</strong> the curriculum updating in front of<br />
the economical sectors dem<strong>and</strong>s (Lysaght 2000).<br />
This paper aims to develop an ontological support to capture the role of a profession <strong>and</strong> its<br />
competences inside a business process, in front of some organizational triggers like technological<br />
changes <strong>and</strong> product or service innovations, which should mobilize professional capabilities. The<br />
assumption made here is that the competences of a profession –as a sort of knowledge product of<br />
universities– can be better transferred into a job market environment if firms adopt a knowledge<br />
management solution aware of the professional competences they need to increase their intellectual<br />
capital assets (Debackere <strong>and</strong> Veugelers 2005).<br />
Ontology-based systems for competences management have addressed this issue with different<br />
purposes (Paquette 2007, Dexter <strong>and</strong> Davies 2009). However, literature shows few examples in<br />
which the overall system defines the requirements specification for the ontology. Thus, this paper<br />
specifies the requirements of an ontology that supports a procedure for the identification of the<br />
competences of a profession related to a specific area of knowledge –as IT– that is critical for a<br />
business process performance.<br />
531
Yadary Ortega-González et al.<br />
The remainder of the paper is organized as follows: next section explains the Industrial Engineering<br />
(IE) case study; section 3 introduces the conceptual model of the adopted procedure <strong>and</strong> the need of<br />
an ontology to support its outcome. The fourth section provides a brief background of what<br />
competency questions technique is in the ontological engineering field. Section 5 presents the<br />
application of the aforesaid technique concerning the IT competences of IE in a business consultancy<br />
process. Finally, a roadmap for the ontology development is discussed in section 6.<br />
2. The IT competences of industrial engineering as case study<br />
IE is the branch of the engineering that deals with the analysis, design, implementation <strong>and</strong> improving<br />
of complex systems integrated by people, materials, information, technology, equipment, financial<br />
resources, <strong>and</strong> energy (Salvendy 2001).<br />
In the last years, IE has been called to deliver new capacities to the information society, mainly<br />
because of its transdisciplinary nature (Sink et al. 2001), its changing role (Mundt 1982) <strong>and</strong> its<br />
potential to achieve an integrated view of IT inside the business processes (Davenport <strong>and</strong> Short<br />
1990, Subramoniam 2008). It can be said that the functions of IE have been moving from<br />
manufacturing to services <strong>and</strong> processes, where the information resource <strong>and</strong> knowledge are the raw<br />
materials (Desouza 2004, Champlin 2006).<br />
However, there is not a consensus about IE practices <strong>and</strong> its required competences yet. The<br />
aforementioned creates confusion <strong>and</strong> has serious consequences for the evaluation, acquisition, <strong>and</strong><br />
application of IE knowledge inside firms, especially in the case of the competences of the profession<br />
regarding information-based processes. Afterwards, there is a lack of a clear underst<strong>and</strong>ing for both,<br />
practitioners <strong>and</strong> managers, of how the IT competences of the profession can attain the processes<br />
goals (Matson et al. 2007, Jackson et al. 2008).<br />
Although scientific works reveal the overall competences of IE (Tirado et al. 2007, Marin-Garcia et al.<br />
2008) <strong>and</strong> others are more oriented toward a particular technology (Balderrama et al. 2008), the<br />
connections established among these works <strong>and</strong> the call for new disciplines –that allow the<br />
profession, in a holistic manner, to create business value-added through IT (Van Rensburg 2006)–<br />
appears hard to establish.<br />
As every engineering discipline, IE needs a model to reach a continuous professional development<br />
(Fink 2001). The procedure presented in this paper considers firms’ technological capacity <strong>and</strong> their<br />
business processes as the contexts where engineering must activate its competences. As a result,<br />
professional competences could be updated <strong>and</strong> linked with technologies along the business process.<br />
Therefore, the need of identifying the IT competences which the IE profession mobilizes inside a<br />
business process is the general problem statement for the conceptualization of the procedure<br />
presented in the next section.<br />
3. The PKO procedure<br />
Foc<strong>using</strong> on the IE case study, this paper introduces a procedure entitled PKO (Ortega <strong>and</strong> Delgado<br />
2011). PKO is an acronym derived from the procedure conceptual model, which combines information<br />
about three variables: the profile of a profession (P), a specific body of knowledge (K) <strong>and</strong> an<br />
organizational process (O) where the referred body of knowledge is critical (see Figure 1).<br />
<strong>Information</strong> about the profession covers its job functions <strong>and</strong> its knowledge (theoretical <strong>and</strong><br />
procedural). Data gathered about the studied process regards its goal, the roles involved in it, as well<br />
as its workflow with its tasks. So far, the body of knowledge is provided in a tabular form, in which<br />
each entry denomination is briefly defined in natural language.<br />
The proposed procedure starts from selecting a relevant process object of analysis, where a<br />
professional should apply his IT competences. The general representation of the process is linked to<br />
the IT that support its deployment <strong>and</strong> with a general professional profile of human resources roles<br />
involved in the process. The combination of these three sets of elements serves to identify the<br />
competences of the professional involved in the analysed process.<br />
532
Yadary Ortega-González et al.<br />
Figure 1: The conceptual model of PKO<br />
The procedure execution requires the participation of experts. In order to identify the competences,<br />
the experts have to match the three sources of information (see Figure 2). The scope of the intended<br />
competences is delimited by the business process. That means, professionals are not required to<br />
cover all the competences of the process, but just the intersection of their own group of competences<br />
with a subset of the IT competences required within the process, as shown in Figure 3.<br />
Figure 2: The PKO flowchart<br />
An ontology is an affordable solution to manage the knowledge captured from the experts. It can<br />
serves as knowledge base for the competences within firms or universities.<br />
In this study, ontological engineering is interpreted as “a research methodology which gives us the<br />
rationale of a knowledge base” <strong>and</strong> an ontology is “a system of background knowledge of any<br />
knowledge base […] that explicates the conceptualization of the target world” (Mizoguchi 2003).<br />
The planned ontology can have different applications. In universities, it can be useful to implement<br />
<strong>and</strong> evaluate study programs following a problem-based learning approach. Furthermore, it can<br />
provide alerts of new research scenarios in order to be responsive to business process dem<strong>and</strong>s.<br />
Inside firms, it can support several human resources management activities, as selection <strong>and</strong> training<br />
programs, highlighting the professional role. This last activity can constitute a complex task in the<br />
case of transdisciplinary professions. The ontology can also be important as a way to develop a<br />
communication process between professionals, which has a critical function in teams.<br />
533
Yadary Ortega-González et al.<br />
Figure 3: The PKO scope<br />
Next section presents a brief background about the competency questions technique used in the<br />
specification phase of the intended ontology.<br />
4. Background of competency questions in the ontological engineering field<br />
In the field of artificial intelligence, the definition of an ontology is established as a shared agreement<br />
about a conceptual framework for modelling the knowledge of a domain (Gruber 1993). Some<br />
assumptions or statements can be made concerning the ontology domain, motivated by the PKO use<br />
cases outlined in the previous section. Then, the points of view of the ontology users <strong>and</strong> developers,<br />
the statements can be decomposed in a hierarchy of questions from.<br />
The set of the questions that can be answered by the ontology are known as competency questions.<br />
These questions with their respective solutions, formulated in natural language, are critical to provide<br />
rationale to the ontology (Grüninger <strong>and</strong> Fox 1995). Besides, the formulation of the competency<br />
questions dictates the ontology extensibility, granularity <strong>and</strong> scalability, as well as its efficiency <strong>and</strong> its<br />
perspicuity (Kim et al. 1995).<br />
The methodologies for building ontologies agree on the importance of the ontology specification<br />
phase <strong>using</strong> the competency questions, because they can guide the ontology lifecycle, from the<br />
requirements elicitation to the evaluation of the ontology itself (Fox <strong>and</strong> Grüninger 1997, Staab et al.<br />
2001). Defining the competency questions is an important task for the reuse <strong>and</strong> reengineering of<br />
knowledge resources. Moreover, they can serve as a cognitive resource for the selection of ontology<br />
design patterns, having the same positive effects that software patterns have within software<br />
engineering (Gangemi <strong>and</strong> Presutti 2009).<br />
Recently, has emerged the NeOn Methodology that also uses the competency questions technique to<br />
capture knowledge from experts <strong>and</strong> users (Suárez-Figueroa et al. 2009). NeOn Methodology is a<br />
new development paradigm that puts its emphasis in re<strong>using</strong> ontological <strong>and</strong> non-ontological<br />
resources already developed, instead of building ontologies from scratch (Figure 4).<br />
The selection of NeOn is based on the following arguments:<br />
The methodology covers the state of the art of ontology development. In order to sustain that, it<br />
has identified nine scenarios <strong>and</strong> enhances the guidelines to combine them in lifecycle models –<br />
created ad hoc for each project–, depending on the available knowledge resources. The scenario<br />
1 is conceived for building ontology networks from scratch, without re<strong>using</strong> existing resources.<br />
The second scenario is conceived for building ontologies by re<strong>using</strong> <strong>and</strong> reengineering nonontological<br />
resources, like taxonomies <strong>and</strong> glossaries. in scenarios from 3 to 6 the aim is re<strong>using</strong>,<br />
534
Yadary Ortega-González et al.<br />
merging <strong>and</strong>/or reengineering of ontologies or ontology modules. In the seventh one, the<br />
ontology is built by re<strong>using</strong> ontology design patterns. Scenarios 8 <strong>and</strong> 9 focus on restructuring<br />
<strong>and</strong> localizing ontologies, respectively.<br />
Along with the methodology, the NeOn toolkit has been developed. It supports the methodology<br />
activities.<br />
Finally, the prescriptive tasks to carry out the ontology requirements specification are improved in<br />
this approach, compared with other methodologies.<br />
Figure 4: The nine scenarios in the NeOn Methodology. Source: Gómez-Pérez <strong>and</strong> Suárez-Figueroa<br />
(2009)<br />
Although the goal of this paper is to show the first steps in the specification phase –carried out in the<br />
scenario 1–, in section 6 is explained the lifecycle planned for the PKO ontology.<br />
5. Ontological support for the IT competences of IE<br />
This section aims to obtain the set of the competency questions <strong>and</strong> their respective answers to<br />
support the PKO ontology, derived from the need of formalizing the IT competences of IE inside a<br />
business consultancy process, which takes place into a software company. This business consultancy<br />
process is executed each time a business client of the software company requires to buy one of the<br />
systems offered in its product portfolio.<br />
In this execution of PKO, seven experts belonging to two Cuban software firms <strong>and</strong> to the Cuban<br />
National Commission of IE were involved. Data concerning their expertises <strong>and</strong> provenances is<br />
shown in Figure 5.<br />
As it is suggested in NeOn Methodology, the first steps are the definition of the intended users <strong>and</strong><br />
uses of the PKO ontology. Tables 1 <strong>and</strong> 2 show the planned users <strong>and</strong> uses defined for the PKO<br />
ontology during the first iteration of its lifecycle.<br />
Then, the competency questions technique is applied. In order to adopt this technique a bottom-up<br />
approach is followed according to the conceptual model in Figure 1. The answers of the competency<br />
535
Yadary Ortega-González et al.<br />
questions were provided by the experts. Table 3 shows an excerpt of the approved competency<br />
questions with their respective answers for the IE case study.<br />
Figure 5: Qualifications of the experts involved in the case study<br />
Table 1: Intended users of the PKO ontology<br />
User Description<br />
User 1<br />
Business analyst who needs to increase the intellectual capital of the firm by acquiring the<br />
competences of a profession.<br />
User 2 Professional committee board which wants to identify new scenarios for the profession execution.<br />
User 3<br />
Human agents in the academic environment that want to (re)design a discipline curriculum or<br />
identify a new role of the profession.<br />
User 4<br />
Human agents in the firm environment in charge of training, evaluation <strong>and</strong> others competence<br />
management activities.<br />
Table 2: Intended uses of the PKO ontology<br />
Use Description<br />
1 To manage the competences of the professionals within a business process in front of technological<br />
changes.<br />
2 To identify <strong>and</strong> manage a set of competences related to a new commission assigned to a profession<br />
3 To provide a learning path related to the profession inside an organizational process<br />
4 To implement a case study following a problem-based learning approach<br />
Table 3: The ontology requirements in form of competency questions<br />
Competency questions Answers<br />
Related to the profession<br />
What is the profession<br />
Industrial Engineering<br />
name?<br />
What are the Method Engineering, Business process management, Human factor engineering<br />
skills/knowledge of the<br />
profession?<br />
What are the<br />
Analysis/design/improvement of business process<br />
profession job<br />
functions?<br />
What are the<br />
<strong>Knowledge</strong> manager/business analyst<br />
profession roles?<br />
Related to the body of knowledge (BoK)<br />
What is the overall<br />
<strong>Information</strong> Technology<br />
name of the BoK?<br />
What are the names of<br />
BPM toolkit, ITIL, SAP/R3, enterprise architecture framework<br />
the BoK entries?<br />
536
Yadary Ortega-González et al.<br />
Competency questions Answers<br />
Related to the organizational process<br />
What is the process<br />
Business consultancy for installing/selling (parameterize) an ERP<br />
name?<br />
What is the process<br />
Software firm<br />
owner?<br />
What are the process To analyse (feasibility study) if the information system can be installed in the<br />
goals?<br />
client’s business<br />
To establish an integral project for the ERP installation with a process-oriented<br />
approach<br />
What are the process<br />
Risks analysis, enterprise architecture modelling, business analysis<br />
activities?<br />
Related to the combination of profession <strong>and</strong> the organizational process with the BoK entries<br />
What are the required <strong>Management</strong> of the changes due to the introduction of an information system within<br />
competences that the<br />
the firm.<br />
profession should Ability to coordinate the communication among several stakeholders related to the<br />
mobilized inside the<br />
business process<br />
process?<br />
6. A roadmap in the PKO ontology development<br />
Next steps in the development of the PKO ontology can be managed considering 3 iterations in the<br />
ontology lifecycle, under the assumption that is not fully known a-priori the ontology requirements.<br />
The initial iteration will cover the first scenario, from specification to implementation. It is important to<br />
note that there is a wealth of knowledge on which a consensus is needed. That suggests the reuse<br />
<strong>and</strong> reengineering of knowledge resources already agreed. For example, the classification schema of<br />
the Association for Computing Machinery (ACM) could be a starting point for capturing the IT body of<br />
knowledge. The same kind of research will be performed related to the data of the profession. For the<br />
last iteration (scenarios 4, 5, 6) is planned the use, merge <strong>and</strong> modification of some potentially<br />
resources, like already modelled business processes.<br />
For the achievement of the planned schedule, the set of plug-ins of the NeOn toolkit environment<br />
should be explored. These are the cases, for example, of Cicero <strong>and</strong> Watson tools.<br />
Watson is a semantic search engine developed at the <strong>Knowledge</strong> Media Institute of The Open<br />
University (Sabou et al. 2007). It allows the search of the terms got from the competency questions.<br />
As a result, the retrieved elements can be imported (classes, relations, instances) if they match with<br />
the competency of the PKO ontology.<br />
Cicero was developed in the context of the NeOn project as an extension of the Semantic MediaWiki<br />
<strong>and</strong> it is based on issue-based information systems functionalities (Bechhofer et al. 2008). It facilitates<br />
an asynchronous discussion <strong>and</strong> decision taking process between domain experts <strong>and</strong> ontology<br />
developers. In this case, the Cicero argumentation model could be explored, as a better way to<br />
integrate the rationale behind the competency questions with the ontology development <strong>and</strong><br />
documentation.<br />
The use of Cicero can enable to answer more complex competency questions, like the following:<br />
Given the information of a business process <strong>and</strong> its IT infrastructure, what professions seem to be<br />
more appropriated to perform its roles <strong>and</strong> execute its tasks?<br />
Which competences required by the business process are still not considered as learning<br />
outcomes in the academy curriculum program?<br />
7. Conclusions<br />
This paper revealed the PKO procedure as a step towards the integration of professional<br />
competences into the enterprise architecture blueprint, instead of the traditional view of a profession<br />
built on a curriculum foundation. In fact, the PKO development is motivated by the need to allow<br />
professionals to learn <strong>and</strong> adapt to technological changes occurring in organizations. Such changes<br />
give rise to new bodies of knowledge <strong>and</strong> emergent professional competences. In the achievement of<br />
this effort, many questions arise <strong>and</strong> need an ontological support.<br />
537
Yadary Ortega-González et al.<br />
Hence, with the intention of privileging the conceptualization of the PKO ontology specification, the<br />
procedure conceptual model <strong>and</strong> its main steps were exposed, as a mean to provide a rationale<br />
behind the competency questions of the ontology that will support the procedure outcome. In addition,<br />
it was shown how the procedure scope delimits the level of granularity of the competency questions<br />
that the ontology should be able to answer.<br />
The case study implementation pointed out some issues. The first one is that further research must<br />
be conducted concerning the adoption of mechanisms for the modularisation of sub-domains that are<br />
invariant when PKO is put into practice. Those are the cases of the profession’s principles <strong>and</strong> its key<br />
areas. Additionally, the answers provided by the experts during the case study execution affirm the<br />
adoption of ontology networks. We have to notice that such answers are, themselves, subsets of<br />
knowledge (e.g. ITIL, BPM) that can be reused, speeding up the process of building upon a<br />
consensus.<br />
Consequently, it is important to remark that the application of the NeOn Methodology <strong>and</strong> its toolkit<br />
will have much more attention in the next steps of the PKO ontology development.<br />
Acknowledgements<br />
This research was partially funded by the European Commission, through an Erasmus Mundus<br />
External Cooperation Window (EMECW Lot 19bis) grant. The authors also thank the Department of<br />
<strong>Management</strong> at the University of Bologna <strong>and</strong> the Faculty of Industrial Engineering at CUJAE for<br />
fostering the interdisciplinary nature of the subject of this paper.<br />
References<br />
Balderrama, I. M., Reyes, G. <strong>and</strong> Rabelo, L. C. (2008) "Design of a methodology to update the curriculum<br />
contents in CIM technology in the Industrial Engineering degree of Spain ". Proceedings of the SEFI 2008<br />
Annual Conference. Aalborg, Denmark, European Society for Engineering Education.<br />
Bechhofer, S., Hauswirth, M., Hoffmann, J., Koubarakis, M., Dellschaft, K., Engelbrecht, H., Barreto, J.,<br />
Rutenbeck, S. <strong>and</strong> Staab, S. (2008) Cicero: Tracking Design Rationale in Collaborative Ontology<br />
Engineering. The Semantic Web: Research <strong>and</strong> Applications. Springer Berlin / Heidelberg.<br />
Bellini, R. (2008) "La gestione di competenze e profili professionali nel settore ICT secondo lo st<strong>and</strong>ard EUCIP".<br />
World Computer Congress 2008: ICT Professionalism <strong>and</strong> Competences Milano, Italia, IFIP.<br />
Champlin, B. (2006) "From Industrial Engineering to Services Engineering. Productivity <strong>and</strong> Growth in the 21st<br />
Century ". BPM Conference Washington DC.<br />
D’Este , P. <strong>and</strong> Patel, P. (2007) "University–industry linkages in the UK: What are the factors underlying the<br />
variety of interactions with industry?" Research Policy Vol 36, pp 1295–1313.<br />
Davenport, T. H. <strong>and</strong> Short, J. E. (1990) "The new industrial engineering: information technology <strong>and</strong> business<br />
process redesign". Sloan <strong>Management</strong> Review Vol 31, No. 4, pp 11-27.<br />
Debackere, K. <strong>and</strong> Veugelers, R. (2005) "The role of academic technology transfer organizations in improving<br />
industry science links". Research Policy, Vol 34, pp 321-342.<br />
Desouza, K. C. (2004) "<strong>Knowledge</strong> <strong>Management</strong>: A New Commission for Industrial Engineers". Industrial<br />
<strong>Management</strong>, Vol January-February, pp 26-30.<br />
Dexter, H. <strong>and</strong> Davies, I. (2009) "An Ontology-Based Curriculum <strong>Knowledge</strong>base for Managing Complexity <strong>and</strong><br />
Change". IN IOAN, D. (Ed. Proceedings of the Ninth IEEE International Conference on Advanced Learning<br />
Technologies. Riga, Latvia, IEEE Computer Society.<br />
Fink, F. K. (2001) "Modelling Continuing Professional Development in an Innovative Context". Journal of<br />
Computing <strong>and</strong> <strong>Information</strong> Technology - CIT, Vol 9, No. 3, pp 167-175.<br />
Fox, M. S. <strong>and</strong> Grüninger, M. (1997) "On Ontologies And Enterprise Modelling". Proceedings of the International<br />
Conference on Enterprise Integration Modelling Technology. Springer-Verlag.<br />
Gangemi, A. <strong>and</strong> Presutti, V. (2009) Ontology Design Patterns. H<strong>and</strong>book on Ontologies, Springer.<br />
Gómez-Pérez, A. <strong>and</strong> Suárez-Figueroa, M. (2009) "Scenarios for building ontology networks within the NeOn<br />
methodology". Proceedings of the fifth international conference on <strong>Knowledge</strong> capture. Redondo Beach,<br />
California, USA, ACM.<br />
Gruber, T. R. (1993) "Toward Principles for the Design of Ontologies Used for <strong>Knowledge</strong> Sharing". IN<br />
GUARINO, N. & POLI, R. (Eds.) Proceedings of the International Workshop on Formal Ontology in<br />
Conceptual Analysis <strong>and</strong> <strong>Knowledge</strong> Representation. Padova, Italy, Kluwer Academic Publishers.<br />
Grüninger, M. <strong>and</strong> Fox, M. S. (1995) "Methodology for the Design <strong>and</strong> Evaluation of Ontologies". IN SKUCE, D.<br />
(Ed. IJCAI95 - Proceedings of the Workshop on Basic Ontological Issues in <strong>Knowledge</strong> Sharing.<br />
Jackson, D., Louidor, M. <strong>and</strong> Aikens, H. (2008) "An approach to determine the Industrial Engineering Body of<br />
<strong>Knowledge</strong> through concept mapping". Proceedings of the 2008 ASEE Southeastern Section Conference,<br />
April. Memphis, Tennessee, American Society of Engineering Education.<br />
Kim, H. M., Fox, M. S. <strong>and</strong> Gruninger, M. (1995) "An Ontology of Quality for Enterprise Modelling". Proceedings<br />
of the 4th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET-ICE'95).<br />
Berkeley Springs, WV, USA, IEEE Computer Society.<br />
538
Yadary Ortega-González et al.<br />
Lysaght, R. M. (2000) "Beyond initial certification: the assessment <strong>and</strong> maintenance of competency in<br />
professions". Evaluation <strong>and</strong> Program Planning, Vol 23 No. 1, pp 95-104.<br />
Marin-Garcia, J. A., Garcia-Sabater, J. P., Miralles, C. <strong>and</strong> Rodríguez Villalobos, A. (2008) "Profile <strong>and</strong><br />
competences of Spanish industrial engineers in the European Higher Education Area (EHEA)". Journal of<br />
Industrial Engineering <strong>and</strong> <strong>Management</strong>, Vol 1, No. 2, pp 269-284.<br />
Matson, J., Jacqueline, M., Diane, S. <strong>and</strong> Patterson, P. (2007) "An Industrial Engineering Body of <strong>Knowledge</strong>?"<br />
American Society for Engineering Education Conference. Honolulu, HI, American Society of Engineering<br />
Education.<br />
Mizoguchi, R. (2003) "Part 1: Introduction to ontological engineering". New Generation Computing, Vol 21, No. 4,<br />
pp 365-384.<br />
Mundt, B. (1982) ""The changing role of the Industrial Engineers" ". Paper read at the IIE Seminar, Hong Kong,<br />
November. Hong Kong.<br />
Ortega, Y. <strong>and</strong> Delgado, M. (2011) <strong>Information</strong> processes <strong>and</strong> Industrial Engineering in <strong>Information</strong> Technology<br />
age. A transdisciplinary viewpoint. IN ESPÍN-ANDRADE, R. A., MARX-GÓMEZ, J. & RACET-VALDÉS, A.<br />
(Eds.) Towards a Trans-disciplinary Technology for Business Intelligence, Gathering <strong>Knowledge</strong> Discovery,<br />
<strong>Knowledge</strong> <strong>Management</strong> <strong>and</strong> Decision Making. Aachen (Germany), Shaker Verlag.<br />
Paquette, G. (2007) "An Ontology <strong>and</strong> a Software Framework for Competency Modeling <strong>and</strong> <strong>Management</strong>".<br />
Educational Technology & Society, Vol 10, No. 3, pp 1-21.<br />
Rodrigues, L. L. R., Martis., M. S. <strong>and</strong> Krishnamurthy, G. R. (2005) "Modeling Engineering Competence Pool:<br />
System Dynamics Based Implications for KM & HRM Integration".<br />
Sabou, M., Dzbor, M., Baldassarre, C., Angeletou, S. <strong>and</strong> Motta, E. (2007) "WATSON: A Gateway for the<br />
Semantic Web". Paper read the 4 th European Semantic Web Conference, ESWC. Innsbruck, Austria, June.<br />
Salvendy, G. (Ed.) (2001) H<strong>and</strong>book of Industrial Engineering. Technology <strong>and</strong> Operations <strong>Management</strong>, Wiley-<br />
Interscience.<br />
Sink, D. S., Poirier, D. F. <strong>and</strong> Smith, G. L. (2001) Industrial <strong>and</strong> Systems Engineering in organizations. IN<br />
SALVENDY, G. (Ed.) H<strong>and</strong>book of Industrial Engineering. Technology <strong>and</strong> Operations <strong>Management</strong>. Third<br />
ed. Purdue, Wiley-Interscience.<br />
Staab, S., Studer, R., Schnurr, H.-P. <strong>and</strong> Sure, Y. (2001) "<strong>Knowledge</strong> Processes <strong>and</strong> Ontologies". IEEE<br />
Intelligent Systems, Vol 16, No. 1, pp 26-34.<br />
Suárez-Figueroa, M., Gómez-Pérez, A. <strong>and</strong> Villazón-Terrazas, B. (2009) How to write <strong>and</strong> use the ontology<br />
requirements specification document. IN MEERSMAN, R., DILLON, T. & HERRERO, P. (Eds.) Proceedings<br />
of the Confederated International Conferences, CoopIS, DOA, IS, <strong>and</strong> ODBASE 2009 on On the Move to<br />
Meaningful Internet Systems: Part II. Vilamoura, Portugal, Springer-Verlag.<br />
Subramoniam, S. (2008) "Comm<strong>and</strong>ing the internet era. Technology defines new industrial engineering".<br />
Industrial Engineer, Vol October, 2008, pp 44-48.<br />
Tirado, L. J., Estrada, J., Ortiz, R., Solano, H., González, J., Alfonso, D., Restrepo, G., Delgado, J. F. <strong>and</strong> Ortiz,<br />
D. (2007) "Professional competences: Strategy for curriculum transformation in Industrial Enginering".<br />
Revista Facultad de Ingeniería Universidad de Antioquia, Vol 40, No. Apr./June, pp 123-139.<br />
Van Rensburg, A. (2006) "Industrial engineering disciplines in the next millenium". [online], University of Pretoria,<br />
http://hdl.h<strong>and</strong>le.net/2263/4790<br />
539
The Balanced Scorecard <strong>and</strong> its Practical Applications in<br />
Oracle Balanced Scorecard<br />
Michal Pivnička<br />
Tomas Bata University in Zlin, Czech Republic<br />
pivnicka@fame.utb.cz<br />
Abstract: In today’s rapidly changing world, strategy management is a vital element of management. In<br />
connection with this, there exists a necessity to translate strategy into definite goals <strong>and</strong> steps. This facilitates<br />
communication of corporate strategy to staff at a company, <strong>and</strong> execution is simpler for an employee of the firm.<br />
Furthermore, it is imperative to maintain feedback on information about the state of performance objectives. The<br />
methodology of the Balanced Scorecard proves most appropriate for this task. Implementing the Balanced<br />
Scorecard, however, cannot be successful without the support of a high-quality business information system as,<br />
especially within a larger business, this concept will not function if not working with large amounts of data <strong>and</strong><br />
information. This paper deals with applying Balanced Scorecard methodology in business information systems,<br />
foc<strong>using</strong> on practical applications in Oracle Balanced Scorecard. Beginning with a brief overview of current<br />
knowledge about the Balanced Scorecard, it includes a discourse on the essential logic of this methodology <strong>and</strong><br />
a presentation of its individual components. Attention is also paid to the role of the Balanced Scorecard in<br />
strategic management. Following this, focus switches to the support of the Balanced Scorecard in information<br />
systems. In this section of the paper, concentration is placed on Business Intelligence <strong>and</strong> Corporate<br />
Performance <strong>Management</strong> <strong>and</strong> their relation to the above-mentioned methodology. In the main body of this<br />
study, practical solutions are addressed that support this methodology within the information system of Oracle.<br />
This part is divided into two chapters. First, a solution is dealt with from the perspective of Viewers (end users).<br />
The major benefits for employees of the company are highlighted, as is the influence on the effectiveness of their<br />
work. The other portion is devoted to the duties of designers – people transposing the Balanced Scorecard into<br />
an information system. Therefore, it constitutes a way of setting up <strong>and</strong> customizing the Balanced Scorecard<br />
within an information system. Finally, this paper summarizes the main benefits of integrating the Balanced<br />
Scorecard <strong>and</strong> an information system, such as aligning corporate goals with those of employees, improved<br />
communication <strong>and</strong> better feedback.<br />
Keywords: balanced scorecard, information system, corporate performance management<br />
1. Introduction<br />
For successful management <strong>and</strong> to achieve the objectives for which the same was established, it is<br />
essential that a company possesses a clear shared vision <strong>and</strong> strategy, <strong>and</strong> is consistently assiduous<br />
as regards implementing it. A high level of performance with a strategy can be greatly facilitated if a<br />
suitable tool is used for translating said strategy into operational terms. The Balanced Scorecard<br />
(BSC) seems like the most suitable tool for this purpose. Due to the fact that the BSC works with high<br />
volumes of data (information) that must be current <strong>and</strong> used by everyone in an organization, it is<br />
appropriate if the BSC is supported by a superior information system allowing the BSC to manage<br />
operations. Since the author is well aware of the growing importance of promoting strategic<br />
management with information systems, he has begun to devote itself to this issue. The aim of this<br />
article is to provide basic information about the Balanced Scorecard <strong>and</strong> how this tool is supported in<br />
the Oracle Balanced Scorecard application. Output will be further applied in teaching at the Tomas<br />
Bata University in Zlin, in the Czech Republic.<br />
The thesis begins by briefly introducing strategic management <strong>and</strong> the Balanced Scorecard – its logic<br />
<strong>and</strong> role in strategic management. Afterwards, the Oracle Balanced Scorecard application is<br />
described for Viewers (who use Oracle BSC in their daily jobs), Designers (who design the Balanced<br />
Scorecard) <strong>and</strong> Administrators (who ensure that the application operates without problems).<br />
2. Strategic management <strong>and</strong> the balanced scorecard<br />
Any company that wants to exist for considerable period must apply the process of creating a<br />
strategy. This usually starts with devising the business’ mission <strong>and</strong> clarifying values that the<br />
company both recognizes <strong>and</strong> intends to follow. The following is a formulation of the vision <strong>and</strong><br />
strategy of a company at this point in time. It is necessary to conduct various analyses, on the internal<br />
<strong>and</strong> external environments of a company, before such a strategy may be compiled. In the external<br />
environment, the market position in relation to other players in the same marketplace is taken into<br />
account. As for the internal environment, endeavor is placed on finding core competencies. According<br />
540
Michal Pivnička<br />
to (Collis 2008), this translates into something one can do best <strong>and</strong> that creates value for a target<br />
group of customers. However, these elements are mostly intangible.<br />
After formulating a strategy, it is necessary to optimize it for the operating conditions in place. This<br />
proves essential to successful implementation of the strategy because, with an increase in the<br />
responsibilities <strong>and</strong> autonomy of employees, there is a rise in the importance of knowledge relating to<br />
the business strategy. The implication is that the strategy must be described well <strong>and</strong> measures set<br />
for the relevant strategic objectives. Once complete, operating measures may be established for<br />
which front-line employees are responsible. For this purpose, the Balanced Scorecard (BSC) is the<br />
best option. The BSC consists of a number of interrelated measures <strong>and</strong> value drivers that produce<br />
information on both company performance <strong>and</strong>, as is implicated, the future performance of the<br />
company. Each measure is, of course, relevant to a specific target.<br />
The overarching objective of any enterprise (excluding non-profit organizations <strong>and</strong> the public sector)<br />
is financial performance, i.e. how the company evaluates capital. The disadvantages of concentrating<br />
solely on financial success are a loss of focus on clients - the source of profit for the firm, <strong>and</strong> a<br />
tendency to think in the short-term (improving current financial performance at the expense of the<br />
future), as well as not investing in future business. That is precisely why the BSC reflects not only<br />
measures of financial performance, but also those of other areas of the company’s performance,<br />
which are referred to by the authors of Balanced Scorecard as perspectives.<br />
Financial Perspective is maintained <strong>and</strong> the measures contained therein monitor financial<br />
performance (for example, profit, EVA, ROCE, ROI), which covers the entire gamut of activities of a<br />
company. Customer Perspective contains measures reflecting objectives relating to clients, such as<br />
customer satisfaction, market share, customer loyalty, etc. The performance of the processes leading<br />
to satisfying customer needs forms part of the Internal Perspective. This may contain an innovation<br />
process (for example, the timing of launching a new product on the market), an operation process <strong>and</strong><br />
the after-sales service process. The cornerstone of success of any company is placed in the final<br />
perspective, known as the Learning <strong>and</strong> Growth Perspective. It is the skills of the workforce that are<br />
the basic limiting factor of a company’s performance. Consequently, this is the main reason for<br />
investing in the development <strong>and</strong> skills of individuals, to have a superior information system providing<br />
quality <strong>and</strong> timely information, <strong>and</strong> to create a business culture that will motivate staff.<br />
Measures contained in the perspectives are not r<strong>and</strong>omly chosen but selected on the basis of a<br />
cause-<strong>and</strong>-effect relationship, <strong>and</strong> thereby create a complex in which lower perspective measures<br />
influence higher perspective ones.<br />
The BSC creation process involves:<br />
Clarifying financial goals <strong>and</strong> determining measures for the same;<br />
Performing market segmentation, fixing goals for chosen segments <strong>and</strong> setting measures for<br />
these goals;<br />
Identifying processes that will lead to fulfilling requirements in selected segments <strong>and</strong> determining<br />
their measures;<br />
Identifying the skills necessary – those of employees, information system capabilities,<br />
organizational capital <strong>and</strong> setting measures for them.<br />
If a company decides to first identify their core competencies, capabilities <strong>and</strong> the identification<br />
process, then this step will be preceded by segmenting <strong>and</strong> selecting target segments.<br />
Measures provide the feedback that is a necessary part of such management. In addition to<br />
information on the status of meeting the goals, the BSC also provides information on whether the<br />
assumptions that the corporate BSC holds are valid. For example, if the business meets all its<br />
objectives for customer satisfaction, while in reality the latter does not improve, it is apparent that<br />
some of the assumptions are incorrect.<br />
A term closely connected with the BSC is Strategy Map. Although the BSC exhibits a casual<br />
relationship amongst the measures used, the Strategy Map shows the objectives of perspectives <strong>and</strong><br />
relationships between them. In the hierarchy displayed above (fig. 1) the same is ranked between<br />
541
Michal Pivnička<br />
strategy <strong>and</strong> the BSC because the Strategy Map presents causal relationships between objectives,<br />
from which measures can be derived.<br />
Figure 1: The balanced scorecard <strong>and</strong> its role in strategic management (Kaplan 2004)<br />
3. Oracle balanced scorecard<br />
It is clear that the implementation of the BSC in a business is no simple matter. Especially in relation<br />
to large companies, proper use of the BSC as a strategic tool cannot proceed without the support of a<br />
good quality information system. Without this, it is almost impossible that all information would be<br />
received on time, placed in the right h<strong>and</strong>s, <strong>and</strong> in the correct form. The practical application of the<br />
Balanced Scorecard in Oracle is examined in the rest of this article.<br />
Oracle Balanced Scorecard enables support for the methodology of the Balanced Scorecard. It may<br />
also be used to support, for example, the EFQM or EVA. However, particular attention shall only be<br />
paid to supporting the BSC.<br />
Three types of users possessing different roles can utilize this application:<br />
Viewers: people <strong>using</strong> the system for monitoring performance objectives, for the achievement of<br />
which they are responsible.<br />
Designers: users in charge of designing scorecards, views, KPIs <strong>and</strong> targets for the system. They<br />
define default settings <strong>and</strong> reports.<br />
Administrators: people caring for installation, implementation <strong>and</strong> maintenance of the application.<br />
They set up the application <strong>and</strong> maintain the data structure. Moreover, they are also responsible<br />
for security of the application.<br />
3.1 Viewers<br />
Viewers of this system are people responsible for fulfilling the objectives derived from the strategy, i.e.<br />
objectives that they are responsible for or for which they possess decision-making power. A specific<br />
ID is assigned to each user. Based on this, the application displays for users merely the information,<br />
<strong>and</strong> only in such a way, that they need. Usually, therefore, the objectives owned by Users are<br />
displayed.<br />
3.1.1 Navigating scorecards<br />
After logging into the system, a Viewer will see a list pertaining to the Scorecard (fig. 2) available to<br />
the User that is logged-on. This list is for quick orientation <strong>and</strong> access to an individual Scorecard. It<br />
displays the Scorecard’s name, its owner <strong>and</strong> any additional information relating to these. Viewers<br />
can also look at details of each Scorecard. The hierarchical structure of a Scorecard shows the logical<br />
relationship between the Scorecards, not the data in the same. The application also allows a search<br />
in terms of a Scorecard name or owner. From this list, it is possible to double-click on a Scorecard’s<br />
name to access one of them.<br />
542
Figure 2: List of scorecards window<br />
3.1.2 Scorecards<br />
Michal Pivnička<br />
A Scorecard is a set of interrelated objectives. Each objective in the Scorecard must be part of an<br />
Objective Group. Such an Objective Group links together objectives relating to the same subject. An<br />
objective includes KPIs <strong>and</strong> Dimensions (a way of looking at data) relating to them. The number of<br />
Scorecards is not limited in the application. A Scorecard can be browsed via several different views;<br />
indeed, a Scorecard view, a Tree view, <strong>and</strong> a Detailed view are automatically generated by the<br />
system. They form part of the application’s logic. Custom views are directly aligned with a particular<br />
Viewer. Furthermore, the number of views is not limited. It is often used for a Strategy Map or<br />
thematically-oriented Scorecard.<br />
The Scorecard view (fig. 3) allows the viewing of objectives by each Objective Group. Next to each<br />
objective, an alarm shows the progress in meeting this objective.<br />
Figure 3: Scorecard view<br />
543
Michal Pivnička<br />
A Tree view (fig. 4) presents the hierarchy of Objective Groups <strong>and</strong> objectives. The important<br />
information that it shows is the default KPI. Each objective can contain a huge number of KPIs. The<br />
default KPI is the one that triggers alarms, revealing how targets are able to be met. Their status is<br />
listed in the Status column.<br />
Figure 4: Tree view<br />
A Detailed view (fig. 5) provides a list of objectives <strong>and</strong> their Objective Groups. This view also shows<br />
the actual results, anticipated results, <strong>and</strong> the percentage of deviation from the plan for each<br />
objective.<br />
Figure 5: Detailed view<br />
544
Michal Pivnička<br />
A Custom view (fig. 6) allows a Designer to set the look that precisely gives a current Viewer the most<br />
benefit. Based on a graphical background, this enables one to view one’s objectives as part of an<br />
existing corporate graphic. On this graphical background, links can be added to web sites <strong>and</strong> other<br />
program hotspots to monitor objectives. It allows for insertion, for example, of a Strategy Map.<br />
Figure 6: Strategy map (custom view)<br />
3.1.3 Monitoring activities<br />
Any user responsible for achieving such objectives must be allowed to monitor them, or when viewed<br />
from a different perspective, be able to compare them, etc. Oracle Balanced Scorecard allows the<br />
user to view any objective on its monitor that is authorized. <strong>Information</strong> on them is displayed under<br />
five tabs: performance, cause <strong>and</strong> effect, assessment, information <strong>and</strong> collaboration.<br />
Performance Tab<br />
A Performance Tab shows a company’s performance in graph <strong>and</strong> table form. Data on activities can<br />
be displayed in a number of ways. Each KPI contains its own dimensions, calculations, comparative<br />
values <strong>and</strong> displayed time setting. Therefore, the application is a powerful tool for analyzing KPIs.<br />
From this perspective, one very useful feature seems to be the opportunity to look at KPIs from<br />
different dimensions. This allows data to be viewed at various levels of aggregation, <strong>and</strong> results may<br />
be compared between separate dimension objects (see figure 7). For example, a geography<br />
dimension can contain dimension objects such as a continent, region, state, district, city, etc. It is<br />
possible to display sales for one city <strong>and</strong> then compare them to sales for others. The time dimension<br />
can be set to different periods of time (days, weeks, months, quarters, years) but it must be taken into<br />
account that the chart shows only 12 consecutive periods.<br />
Comparing actual performance to other data, such as a budget, plan, the previous year, competition,<br />
etc., is also achievable. This application additionally permits forecasts for the future (the lighter<br />
columns).<br />
Outputs are, in Oracle Balanced Scorecard, displayed via graphs <strong>and</strong> tables. The application offers<br />
four types of graphs: single bar, multiple bar, simulation tree, <strong>and</strong> profit <strong>and</strong> loss.<br />
The table is displayed below the graph. For the maximum of twelve periods, the items shown are<br />
time, actual outcome <strong>and</strong> comparative values. One may then click on a value in the table to view the<br />
comparison graph.<br />
545
Figure 7: Objective in oracle balanced scorecard<br />
Michal Pivnička<br />
Graphs are also used to compare values according to the dimension.<br />
Figure 8: Comparison of product lines<br />
Oracle Balanced Scorecard also enables charts <strong>and</strong> tables to be printed or exported to Excel, where<br />
further work can take place. It is also possible to create links to various documents, websites,<br />
presentations or other applications.<br />
Other tabs<br />
The task of other tabs is to display additional information on the objectives monitored. The Cause<strong>and</strong>-Effect<br />
tab gives data on objectives affecting the performance of a firm’s declared objectives <strong>and</strong>,<br />
vice versa, objectives that are affected by its objective. An information tab can provide a more<br />
thorough description of the objective. This permits greater specificity on how it contributes to the<br />
objectives of the corporate strategy in one respect, <strong>and</strong> in another it provides further important<br />
information on the objective for the person that is responsible for it. Such data may be, for example, a<br />
546
Michal Pivnička<br />
necessary calculation <strong>and</strong> its interpretation, a more detailed breakdown of activities to be carried out,<br />
setting an alarm, etc. It is also possible to add links to important information. An Assessment tab is<br />
used to supplement qualitative information. The Collaboration tab allows for superior utilization of<br />
human capital, because different users can access <strong>and</strong> contribute high quality information to help in<br />
problem solving. This means that important activities for objective attainment can become more<br />
efficient. In addition, recommendations may include feedback.<br />
3.1.4 Alarms<br />
Alarms indicate the status of the default KPI for an objective, not for all KPIs in the objective.<br />
(Chhabra 2005) Such Alarms display whether the actual data are acceptable, marginal or at an<br />
unacceptable level. Their spacing can be adjusted according to the needs of the company. Any<br />
missing data are marked in gray. Actual results are compared with the plan, budget or forecast data.<br />
By clicking on an alarm, one can bring up detailed picture objectives <strong>and</strong> KPIs.<br />
3.2 The design process for oracle balanced scorecard<br />
The most important, <strong>and</strong> probably the most difficult, step is to devise the Balanced Scorecard. This<br />
implies a thorough underst<strong>and</strong>ing of the vision <strong>and</strong> corporate strategy, <strong>and</strong> expression of strategy by<br />
<strong>using</strong> the Strategy Map. Strategy is expressed as a set of objectives with cause-<strong>and</strong>-effect linkages<br />
between them. Prior to entering Scorecards onto the system, clarity must exist pertaining to all<br />
Objective Groups, objectives, measures <strong>and</strong> dimensions. There should be a Strategy Map <strong>and</strong> a list<br />
of all the things mentioned above. The subsequent insertion of a Scorecard into Oracle Balanced<br />
Scorecard is actually a very simple task for an experienced user. Scorecards <strong>and</strong> their components<br />
can be entered onto a system by every user that has been assigned the role of Designer. They create<br />
all the elements required to build a Scorecard, which is why they must have a very good knowledge of<br />
the strategy <strong>and</strong> BSC. Ideally, they ought to be present at their creation.<br />
A Designer must know the requirements of Viewers. Any Viewer who uses an information system<br />
desires clearly displayed information relevant to their work (their objectives to achieve). A Designer<br />
has to shape <strong>and</strong> make available a presentation of data that Viewers require <strong>and</strong> in the form they<br />
need it. The application provides feedback <strong>and</strong> an overview of current progress in their daily activities.<br />
Viewers’ requirements are important when it comes to designing custom views. Should the Designer<br />
also be the Viewer, naturally everything is easier. However, if the Designer produces Scorecards for<br />
other Viewers, good communication is necessary between both parties for the latter to accurately<br />
convey their needs. This requires all individuals to uniformly interpret the actualities in existence. The<br />
Scorecard should not contain information unnecessary for the Viewer, thereby eliminating any<br />
confusion over information. The Viewer merely focuses attention on critical data <strong>and</strong> information.<br />
Each Scorecard is composed of at least one Objective Group that contains thematically similar<br />
objectives. Furthermore, each objective must contain at least one KPI <strong>and</strong> differing dimensions (see<br />
figure 9).<br />
Figure 9: Structure of a scorecard<br />
547
Michal Pivnička<br />
From this structure one is able to gain an insight into the process of creating a Scorecard, which<br />
proceeds from simple to more complex elements of the Scorecard.<br />
The process of Scorecard creation consists of the following steps:<br />
Creating KPIs <strong>and</strong> dimensions relating to them<br />
Creating Objective Groups <strong>and</strong> objectives<br />
Creating a Scorecard <strong>and</strong> views<br />
Figure 10: The process of creating scorecard<br />
3.2.1 Creating KPIs<br />
As shown in figure 10, the process begins with the creation of KPIs <strong>and</strong> dimensions that are bound to<br />
the KPI. The KPI is a basic unit used to measure performance <strong>and</strong> evaluate progress in a Scorecard.<br />
(Chhabra 2005) When creating a KPI, one can use either predefined KPIs via Oracle Daily Business<br />
Intelligence, or create new KPIs. The name of a KPI can be discretionary, but the system<br />
automatically assigns an internal name to each new KPI. It is a unique KPI denotation <strong>and</strong> serves as<br />
a means of identification when creating two or more KPIs with the same display name. It is also<br />
possible to enter a more detailed description.<br />
The system also permits the characteristics of KPIs to be specified (fig. 11), i.e. whether it is<br />
cumulative value (such as revenue, cost, sales) or a state that represents a snapshot at a point in<br />
time (for example, stocks, property status, orders, etc.). Then the method of aggregation is set (the<br />
average, maximum value, minimum value, sum), as is the method used to estimate future values of<br />
KPIs (the moving average, plan-based, 3-month average performance, custom or no forecast), in<br />
addition to setting properties with automatically generated values for the prototype mode, the numeric<br />
format for the axis, labeling the y-axis (x-axis is always time) <strong>and</strong> calculation methods.<br />
The calculation method allows one to view data variously, for example, as a percentage, variation,<br />
cumulative Year-to-date figure, growth, or contribution, etc.<br />
Figure 11: KPI settings<br />
Since KPIs can be formed by combining the results of the source column in the database or the value<br />
derived from existing KPIs, it is possible to create a formula in the formula editor (fig. 12) that<br />
548
Michal Pivnička<br />
combines two or more KPIs (For Example: Revenue per employee KPI = Total Sales KPI/Number of<br />
employee KPI).<br />
Figure 12: Formula editor<br />
The source of data for each KPI is a column of the table in the database. St<strong>and</strong>ardly it is created for<br />
each KPI source column.<br />
3.2.2 Dimension creation<br />
Each KPI is linked with one or more dimensions. A dimension represents the perspective of how data<br />
can be viewed. Examples of dimensions could take the form of geography, product line, customers,<br />
etc. A dimension is composed of individual dimension objects, with dimensions <strong>and</strong> dimension objects<br />
performing the role of a filter.<br />
The Designer must determine <strong>and</strong> set the dimensions <strong>and</strong> dimension objects that are necessary for<br />
creating the KPIs. It is also important to underst<strong>and</strong> the “parental” relationships between dimension<br />
objects. It is better to have fewer dimension objects as this takes less space up within the database.<br />
Logically, this is why having a lot of information on the database results in increased response time. It<br />
is wiser to design a database for the aggregate data that is of most value to senior management.<br />
If the company in question implements the Daily Business Intelligence application, it is possible to use<br />
dimensions that contain this application.<br />
3.2.3 Development objectives <strong>and</strong> objective groups<br />
From the perspective of the Designer, an objective is a set of KPIs <strong>and</strong> their dimensions. As soon as<br />
all the KPIs are loaded onto the system, it is possible begin entering the objectives. All the objectives<br />
must be part of an Objective Group that clusters together thematically similar objectives.<br />
Consequently, the first step is to create an Objective Group. This is comparatively straight-forward<br />
because the Designer simply enters a name <strong>and</strong> a description.<br />
Then they proceed to the creation of individual objectives. This means making a new objective,<br />
entering its name <strong>and</strong> then assigning KPIs <strong>and</strong> dimensions that must be included. Before allotting<br />
KPIs, the Designer must know for sure which KPI is the most important. This KPI is then designated<br />
as the first one <strong>and</strong> becomes the default KPI. This default KPI triggers alarms – meaning that it<br />
reflects the performance of an objective. Then the Designer can assign other KPIs. If a change in the<br />
default KPI is necessary, it can be changed at any time.<br />
One of the most important aspects is alarm settings. An alarm is, as mentioned above, the status of<br />
the default KPI in relation to an objective that indicates the condition of fulfilling an objective. The<br />
alarms are a reflection of how one manages to meet the default KPI in relation to a default dimension.<br />
When creating objectives, thresholds must be set for the default KPI, <strong>and</strong> this reports when<br />
performance is satisfactory, tolerable <strong>and</strong> intolerable (a problem, take corrective action). It is also<br />
549
Michal Pivnička<br />
important to set whether the objective target exceeded the plan, fell below expectations of the plan or<br />
was within tolerances (fig. 13).<br />
Figure 13: Alarm settings<br />
3.2.4 Creating custom scorecard views<br />
A Scorecard can be created as soon as objectives exist. Creating a Scorecard actually means that it<br />
will be made <strong>and</strong> given any name, <strong>and</strong> then objectives shall be assigned to it that must be included.<br />
The number of objectives in the Scorecard is not limited, just as there is no limit to the number of<br />
Scorecards which may exist. It is also possible to create a Scorecard in a hierarchy (parent – child).<br />
The strategy of the company can then be cascaded down to individuals.<br />
Creating views is the last point in the process of creating a Scorecard. As described above, the<br />
system automatically creates a Tree view, Scorecard view <strong>and</strong> Detailed view. The Designer, however,<br />
has the ability to devise an unlimited number of Custom views. These are tailored exactly to a specific<br />
Viewer. A typical example of the use of a custom view is the insertion of a Strategy Map.<br />
The basis of the custom view is a picture in GIF, JPG, JPEG, SVG or SOW with a maximum size of 1<br />
MB. It serves as a background for entering indicators (alarms), links to websites or other applications,<br />
labels, etc.<br />
Once a Scorecard has been built, the Designer can allot it to the intended Viewer.<br />
4. Some of the problems associated with the implementation of oracle<br />
balanced scorecard<br />
With each solution are some related issues that must be taken into account. Probably the most<br />
important problems that may arise during the implementation of Oracle BSC are:<br />
Inconsistent communication,<br />
Rejection of changes,<br />
Lack of management support.<br />
The main point of the process of the BSC implementation in the information system is communication.<br />
It requires that all participants know <strong>and</strong> underst<strong>and</strong> the business strategy. In particular, a designer<br />
should underst<strong>and</strong> the strategy very well. Customization is also very difficult to communicate. The<br />
user must be able to explain the designer how the application needs to be set. Sometimes a problem<br />
may arise because the user himself is not sure what it needs.<br />
550
Michal Pivnička<br />
When any information system is implemented, the peope play the most important role. Without them,<br />
every attempt to implementation of information system fails. <strong>Management</strong> should not underestimate<br />
the communication with people. <strong>Management</strong> muse persuade employee that the implementation of<br />
information system (in this case Oracle Balanced Scorecard) is good for them (see chapter five). This<br />
should prevent the reluctance to use the system.<br />
Support of management is also very important to any change. Without this support any major change<br />
cannot be done.<br />
5. Main benefits for a company<br />
Using the benefits from implementing the BSC in itself has great advantages. It is mainly to clarify the<br />
business strategy across the company, alignment <strong>and</strong> communication objectives, providing feedback<br />
to individual employees at all levels of corporate hierarchy. Use corporate information system to<br />
support BSC brings more benefits, because it serves as a means empowering impact of corporate<br />
BSC. Specific benefits can be:<br />
Corporate strategy can be visible across entire company,<br />
Outputs can be used by all employees,<br />
People can monitor objectives,<br />
People can better work together to solve problems,<br />
Collaborative learning is encouraged,<br />
Objectives can be cascaded at the level of individual worker,<br />
Feedback to employees is provided,<br />
Scorecards <strong>and</strong> relations among them are well-arranged,<br />
The possibility of customization to individual users,<br />
The role of employees in the company is clarified (a man can see how contributes to the vision<br />
fulfilling),<br />
The objective can be seen from many different perspectives (KPIs, dimensions),<br />
The possibility of more detailed characterization of objectives,<br />
Leadership is easier because manager can see problems <strong>and</strong> can offer help,<br />
Data can be exported to Excel (the possibility of further analysis),<br />
Ease of setting of scorecards (it is very important for designer).<br />
To conclude, the benefits of Oracle BSC is that it allows the BSC to be a full-fledged management<br />
tool - to better exploit its strengths <strong>and</strong> distribute relevant information across the company. Each<br />
employee can see how he manages to fulfill the objectives. Designer could easily turn to respond to<br />
requests from individual users (viewers) <strong>and</strong> adapted form of the information according to their needs.<br />
6. Conclusion<br />
In this paper attention has been paid to Balanced Scorecard methodology <strong>and</strong> its support through the<br />
use of the Oracle Balanced Scorecard application. Utilizing this application simplifies Balanced<br />
Scorecard methodology at all levels of management. Its advantages lie in relatively easy operation<br />
<strong>and</strong> a wide range of options, which enable the proposed Balanced Scorecard transposition into a<br />
business information system. Each individual can access data <strong>and</strong> information relating to their own<br />
performance. However, care must be taken when designing a Balanced Scorecard. Without this,<br />
benefits will be poor. Designing a Balanced Scorecard is the most important step <strong>and</strong> all persons<br />
connected with it must be part of this process. The information system is only a mirror reflecting their<br />
work. A strategy of good communication throughout the company is also essential <strong>and</strong> must include<br />
communication between Designers producing Scorecards for entry onto the system <strong>and</strong> the individual<br />
Viewers who will use the results of their labors. If these conditions are adhered to, the benefits of this<br />
application are sure to positively impact on a company’s performance.<br />
Acknowledgements<br />
This work was supported by IGA UTB, project number IGA/58/FaME/11/D.<br />
551
References<br />
Michal Pivnička<br />
Collis, D. J. <strong>and</strong> Montgomery, C. A. (2008) Competing on Resources, Harvard Business Review, July – August.<br />
Chhabra, S. (2005) 11i Balanced Scorecard Ed 2: Student Guide, Oracle.<br />
Kaplan, R. S. <strong>and</strong> Norton, D. P. (2007) Balanced Scorecard. Strategický systém měření výkonnosti podniku,<br />
<strong>Management</strong> Press, Praha.<br />
Kaplan, R. S. <strong>and</strong> Norton, D. P. (2010) Efektivní systém řízení strategie, <strong>Management</strong> Press, Praha.<br />
Kaplan R. S. <strong>and</strong> Norton, D. P. (2004) Strategy map, Harvard Business School Publishing Corporation, Boston.<br />
Sodomka, P. <strong>and</strong> Klčová, H. (2011) Informační systémy v podnikové praxi, Computer Press, Brno.<br />
Voříšek, J. (2008) Principy a modely řízení podnikové informatiky, Oeconomica, Praha.<br />
552
Challenges in Business Case Development <strong>and</strong><br />
Requirements for Business Case Frameworks<br />
Bart-Jan van Putten 1, 2 , Franziska Brecht 1 , <strong>and</strong> Oliver Günther 1<br />
1<br />
Institute of <strong>Information</strong> Systems, Humboldt-Universität zu Berlin, Germany<br />
2<br />
SAP Research Dresden, Germany<br />
bart-jan.van.putten@sap.com<br />
franziska.brecht@wiwi.hu-berlin.de<br />
Abstract: Business cases (BC) are often used to support information systems (IS) investment evaluation.<br />
Unfortunately, business case development (BCD) is a complex task, especially identifying <strong>and</strong> quantifying the<br />
benefits of a proposed investment. Although today’s business case frameworks (BCF) support BCD to some<br />
extent, they have several limitations. Based on a case study <strong>and</strong> interviews with BC developers, this study further<br />
investigates challenges in BCD, describes limitations of BCF <strong>and</strong> reveals opportunities for the improvement of<br />
BCF. Thus, a starting point is provided for user-centred designers <strong>and</strong> engineers who aim to develop better tool<br />
support for BCD. The results of the study show that the general focus areas should be (1) the support for reuse of<br />
BC components, (2) enabling adaptation <strong>and</strong> maintenance of BCs over longer periods of time, <strong>and</strong> (3) improving<br />
the collaboration among BC stakeholders. More specifically, the interviewees argue that more support is needed<br />
for market potential estimation, determining information quality, clarifying reasoning, <strong>and</strong> the reuse of structure.<br />
Keywords: IS, IT, investment, evaluation, business case, cost-benefit analysis, ROI<br />
1. Introduction<br />
Due to the high expenditures on information systems (IS), it is common practice that companies<br />
evaluate IS investment proposals. ‘Cost-benefit analyses of information systems’ (Sassone 1988),<br />
‘ex-ante information system evaluations’ (Walter & Spitta 2004), <strong>and</strong> ‘IT business cases’ (Brugger<br />
2009) play an important role in supporting investment decision making.<br />
A business case (BC) consist of qualitative <strong>and</strong> quantitative descriptions of benefits, costs <strong>and</strong> risks of<br />
each proposed investment alternative (Farbey et al. 1999a). Although some researchers <strong>and</strong><br />
practitioners use different terminology, the meaning <strong>and</strong> intentions of the components are generally<br />
the same, cf. (Brugger 2009; Gambles 2009; Schmidt 2009).<br />
The development of a BC is a complex task. According to Schmidt (2003), “a short list of what it takes<br />
to produce a good IT BC holds few surprises: one needs to be thorough (track down all possible<br />
impacts, costs, <strong>and</strong> benefits), clear <strong>and</strong> logical (articulate the cause <strong>and</strong> effect chain that leads to<br />
each cost/benefit impact), objective (unbiased, including everything that is material, good or bad) <strong>and</strong><br />
systematic (have good models <strong>and</strong> rules for finding <strong>and</strong> summarizing values). Financial talent also<br />
helps as does a solid grasp of the interplay between IT capacity, service levels, user needs, <strong>and</strong> IT<br />
resource requirements”.<br />
Today’s business case frameworks (BCF), such as document guidelines <strong>and</strong> spreadsheet templates,<br />
support business case development (BCD) to some extent, but have several limitations. The aim of<br />
the study at h<strong>and</strong> is to better underst<strong>and</strong> challenges in BCD, to describe the limitations of BCF <strong>and</strong> to<br />
reveal opportunities for improvement of BCF. This should provide a starting point for user-centred<br />
designers <strong>and</strong> engineers who aim to develop better tool support for BCD.<br />
The structure of this paper is as follows: in section 2, a background for BC, BCD <strong>and</strong> BCF is provided.<br />
In section 3, the research approach is described. Section 4 summarizes the results of the case study.<br />
Based on that, section 5 proposes three solution areas for BCD support. Section 6 reports on the<br />
results of interviews with BC developers <strong>and</strong> section 7 concludes this paper.<br />
2. Background<br />
2.1 Business cases<br />
A BC is a recommendation to decision makers to take a particular course of action for the<br />
organisation, supported by an analysis of benefits, costs <strong>and</strong> risks (...), with an explanation of how it<br />
can best be implemented (Gambles 2009). It documents the relevant facts <strong>and</strong> situational analysis,<br />
553
Bart-Jan van Putten, Franziska Brecht, <strong>and</strong> Oliver Günther<br />
key metrics, financial analysis, allows different projects with different goals to be compared <strong>and</strong><br />
contrasted <strong>and</strong> serves as a communication tool (Gliedman et al. 2004). The BC can be seen as the<br />
successor of cost-benefit analysis (King & Schrems 1978; Sassone 1988). Whereas the principles of<br />
cost-benefit analysis mainly come from accounting <strong>and</strong> are thus financially oriented, BCs put<br />
additional emphasis on strategic benefits, indirect costs, risks, social <strong>and</strong> organisational factors, i.e.,<br />
the ‘intangible’ criteria.<br />
BCs commonly appear as spreadsheets, sometimes accompanied by presentations or explanatory<br />
documents. They may be presented by the project leader (BC ‘owner’ or ‘champion’) to senior<br />
management, which is responsible for prioritizing BCs <strong>and</strong> making investment decisions. This way,<br />
the BC can be used to decide about investment before project execution (‘ex-ante’), to evaluate<br />
progress during project execution <strong>and</strong> to determine to which extent the proposed value of the<br />
investment has been realized after project execution (‘ex-post’) (Ward et al. 1996).<br />
2.2 Business case development<br />
To the best of the author’s knowledge there is no definition of business case development (BCD) in<br />
literature. Therefore the following working definition is proposed: Business case development is the<br />
process of realising the business case as an ‘artefact’, by gathering <strong>and</strong> analysing data to define <strong>and</strong><br />
valuate evaluation criteria, presenting it in documents, spreadsheets or presentations. It may take<br />
place before project execution for investment appraisal, during project execution for continuous<br />
monitoring <strong>and</strong> control, or after project execution for organizational learning. This definition is quite<br />
similar to the definition of IS evaluation by Farbey et al. (1999a, p.205), but focuses on the creation of<br />
the BC as an artefact, rather than the organizational process in which it is used.<br />
There are many problems in BCD, such as those identified by Farbey et al. (1993), <strong>and</strong> most of them<br />
are still prevalent today, cf. (Ballantine & Stray 1998; Farbey et al. 1999b; Irani 2002; Walter & Spitta<br />
2004; Berghout & Remenyi 2003). Ward et al. (2008) found in a study among over 100 European<br />
companies that 65% of respondents indicated their organizations were not satisfied with their ability to<br />
identify all benefits, with 69% reporting that they do not adequately quantify <strong>and</strong> place a ‘value’ on the<br />
benefits for inclusion in the BC. 38% of the respondents believed their current approach led them to<br />
frequently overstate the benefits to obtain funding.<br />
2.3 Business case frameworks<br />
A BCF is a set of guidelines, methods, templates or tools to support BCD. Guidelines often come in<br />
the form of document or presentation outlines, which loosely describe the required components of a<br />
BC, e.g., (Cardin et al. 2007; Gliedman et al. 2004), <strong>and</strong> what metrics to use, depending on the<br />
requirements of the BC evaluators of the organization in which the BCF is used. Although these<br />
guidelines can be helpful <strong>and</strong> hardly limit BC developers in their expressiveness, they mainly concern<br />
the ‘what’, i.e., declarative BCD knowledge, <strong>and</strong> not the ‘how’, i.e., procedural BCD knowledge. One<br />
of the reasons for this is that most BCF have been designed to ease the life of BC evaluators rather<br />
than BC developers. As such, guidelines often do not provide much guidance on how the BC<br />
developer should achieve the desired results.<br />
Methods or techniques such as listed by Irani et al. (1997, p.699) or Renkema <strong>and</strong> Berghout (1997,<br />
p.10) have the potential to support BC developers in the ‘how’ of BCs, but are sometimes rather<br />
generic descriptions, see e.g., (Ward et al. 2008), <strong>and</strong> need to be combined with more specific<br />
methods, see e.g., (Love et al. 2004), to identify <strong>and</strong> quantify the benefits, costs <strong>and</strong> risks for a project<br />
in a specific industry. Moreover, it is a question which method is most suitable in which case (Farbey<br />
et al. 1995; Joshi & Pant 2008).<br />
Like guidelines, templates are often developed <strong>and</strong> kept company internal. Templates are built for<br />
specific types of projects, so companies may use multiple templates. Mostly they come in the form of<br />
a spreadsheet with a rigid structure <strong>and</strong> strict content requirements, thus limiting the expressiveness<br />
of the developer. However, such templates ensure the homogeneity among BCs <strong>and</strong> the investment<br />
alternatives within them. Homogeneity enables BC evaluators to work more efficiently, as they can<br />
then more easily compare <strong>and</strong> prioritize BCs.<br />
Tools or applications often come in the form of advanced spreadsheets, e.g., with data import <strong>and</strong><br />
export functionality, or controls that trigger changes between different worksheets of the spreadsheet.<br />
554
Bart-Jan van Putten, Franziska Brecht, <strong>and</strong> Oliver Günther<br />
Tools mainly aim to increase the efficiency of BCD <strong>and</strong> are often highly organization <strong>and</strong> project typespecific.<br />
Public templates <strong>and</strong> tools, e.g., (BusinessCase.com 2010; SolutionMatrix Ltd. 2010) –<br />
commercial or for free – are often generic implementations of traditional financials investment<br />
appraisal methods, such as Return-on-Investment (ROI), Net Present Value (NPV) <strong>and</strong> Payback Time<br />
(Brealey & Myers 1988), without much support for the real challenges for BC developers: the<br />
identification of benefits <strong>and</strong> the quantification of intangible benefits <strong>and</strong> indirect costs (Ballantine &<br />
Stray 1998; Ward et al. 2008; Irani 2002).<br />
3. Research approach<br />
The research approach of the study at h<strong>and</strong> is based on methodological triangulation, a concept from<br />
social science, described by Denzin (2006). Figure 1 gives a simplified overview of the approach. It<br />
was an iterative process, in which the insights gradually transitioned from challenges/problems to<br />
requirements/solutions. The case study led to a better underst<strong>and</strong>ing of challenges in BCD (section<br />
4). Based on that, three high-level solution areas were defined as a vision for the development of<br />
better BCF (section 5). Finally, interviews were conducted to refine the solution areas in more detail<br />
<strong>and</strong> to derive priorities for future research (section 6). Each of these steps will be described in more<br />
detail in a following section.<br />
Figure 1: Overview of the research approach<br />
4. Case study<br />
One of the authors was involved in the development of a BC at a global IT company. The BC<br />
proposed the ‘productisation’ of a concept for a new software solution, which would involve software<br />
development, marketing, sales <strong>and</strong> support of the solution. Participant observation (K. M. DeWalt et<br />
al. 1998; Douglas 1976) was applied during the BCD project, which took about 14 months. Notes<br />
were taken of all meetings <strong>and</strong> telephone calls, which resulted in a large amount of case data.<br />
Particular attention was given to challenges in BCD. To communicate these challenges in an effective<br />
manner they have been incorporated in a fictional, but realistic story. Story telling is a common<br />
technique in user-centred design to better underst<strong>and</strong> the needs of people <strong>and</strong> to express them<br />
concretely (Norman & Draper 1986). The remainder of this section will first present the story <strong>and</strong> then<br />
extract the BCD challenges. Figure 2 visualizes the story as a BPMN process model.<br />
(Start of BCD story)<br />
Marta is 35 <strong>and</strong> works as a product manager in a large IT company. Marta has an innovative idea for<br />
a new product that could potentially be sold by the company. To get approval from the company’s<br />
senior management for productisation of the idea, Marta needs a BC. The BC should consist of an<br />
explanation of the benefits for the company to extend its product portfolio, a cost model <strong>and</strong> an<br />
analysis of potential risks.<br />
As the company’s senior management is most sensitive to financial arguments (e.g., potential<br />
revenue of the new product), one of the most important things to find out is how many customers<br />
would be interested in the new product. Therefore Marta asks Peter, 28, one of her team members<br />
with experience in business analysis <strong>and</strong> marketing, to collect the required information. To give Peter<br />
a head start, Marta provides him with an old BC for another idea that has been productized in the<br />
past.<br />
555
Bart-Jan van Putten, Franziska Brecht, <strong>and</strong> Oliver Günther<br />
Peter decides to start by analyzing the old BC. It consists of a market potential estimation <strong>and</strong> a cost<br />
model in a spreadsheet. There is also a document which explains several intangible benefits (i.e.,<br />
benefits that could not be quantified) <strong>and</strong> that points to the spreadsheet for the tangible benefit:<br />
expected revenue for the new product, based on a market potential estimation.<br />
The spreadsheet appears to contain an interesting structure to distinguish between cross-selling <strong>and</strong><br />
up-selling opportunities. Unfortunately, Peter can not completely underst<strong>and</strong> the reasoning behind the<br />
calculation methods. Therefore he asks Marta for the name of the author of the BC, but learns that<br />
‘Tim’ is no longer with the company. Thus, Peter designs a new spreadsheet with an adapted<br />
calculation method that is workable for him.<br />
After that, Peter calls David, a software developer. With David he estimates the required development<br />
effort required to turn Marta’s idea into a full-fledged product. He also learns that the company<br />
currently has about 300 existing customers that would potentially be interested in the new product. As<br />
the company does not exactly know how many customers are really <strong>using</strong> the existing product, this<br />
number is an estimate that is based on the number of error messages that the company receives.<br />
Peter then calls Eva, a sales colleague. Eva says that there are about 700 existing customers, of<br />
whom 80% would probably be interested in the new product, as long as the product is interoperable<br />
with legacy systems.<br />
After that, Peter builds a first draft of the market potential estimation spreadsheet. As Eva has a closer<br />
relationship with the company's customers than David, Peter decides to use the numbers that Eva<br />
suggested. To calculate the revenue potential, Peter multiplies the expected number of customers<br />
with his estimation for the number of required licenses per customer <strong>and</strong> the price per license.<br />
Actually, Peter is applying a license-based pricing model, but he is not aware of that.<br />
A few days later, Peter calls Stephan, from the pricing strategy team. Peter explains to Stephan that<br />
he now has some underst<strong>and</strong>ing of the market for the new product. However, to calculate the<br />
potential revenue for the company, he roughly needs to know the price that can be charged for it.<br />
Stephan explains that pricing is a complicated process <strong>and</strong> that it is more likely that a usage-based<br />
pricing model will be applied. Stephan also provides Peter with some prices of similar products that<br />
are already on the market. Finally, Peter changes the pricing model, finishes the market potential<br />
estimation <strong>and</strong> presents it to Marta.<br />
(End of BCD story)<br />
When analysing the story, one sees that Peter, the BC developer, would like to reuse the market<br />
potential estimation template from the earlier BC. Unfortunately he can not underst<strong>and</strong> the reasoning<br />
behind it, nor get in contact with the earlier developer. Therefore he needs to change the calculation<br />
method. As a consequence, he may be <strong>using</strong> a less reliable quantification method <strong>and</strong> it will be<br />
harder to compare the new BC with the earlier one.<br />
Peter receives inconsistent information from David <strong>and</strong> Eva regarding the number of customers. He<br />
decides to replace David's input with Eva's information, but thereby looses the perspective of David,<br />
which may be appreciated by BC evaluators later on. Another issue is that the number of customers is<br />
bound to change. In order to keep the BC accurate, Peter needs to update it continuously, based on<br />
the information that he receives.<br />
Peter needs to apply a pricing model. At first he applies a license-based pricing model, but later on it<br />
appears that he should be <strong>using</strong> a usage-based pricing model. Such a switch is not uncommon in the<br />
iterative BCD process. However, Peter needs to develop <strong>and</strong> change the calculation methods himself.<br />
This is less efficient than if pre-defined pricing models could be applied <strong>and</strong> switched on the fly.<br />
Moreover, the ‘home grown’ method may be less reliable <strong>and</strong> will make the BC less comparable with<br />
other BCs.<br />
5. Solution areas<br />
Reuse: The content of earlier BCs can be valuable. For example, when estimating the payback period<br />
for an investment, it is possible to take an average of the payback periods of several earlier BCs. This<br />
way, data from earlier BCs could be used to evaluate the probability that a newer BCs is reliable. The<br />
reuse of BC content is about re<strong>using</strong> benefit, cost <strong>and</strong> risk factors <strong>and</strong> their values. The reuse of BC<br />
556
Bart-Jan van Putten, Franziska Brecht, <strong>and</strong> Oliver Günther<br />
structure is about re<strong>using</strong> methods for ordering, aggregating <strong>and</strong> manipulating factors <strong>and</strong> values.<br />
Current BCF support reuse to some extent. Especially the strict spreadsheet templates enable – or<br />
enforce – the reuse of structure. However, these templates are often inflexible <strong>and</strong> unusable for<br />
unexpected applications. Moreover, the reuse of content is very limited as spreadsheets are often<br />
unconnected files, residing on a developers’ individual computers. The authors envision BCF that may<br />
look <strong>and</strong> feel like ordinary spreadsheets, but which allow BC developers to interact with content that is<br />
partly stored in central databases <strong>and</strong> which support the development of reusable components of<br />
content <strong>and</strong> structure. This enables the reuse of content <strong>and</strong> structure among BCs <strong>and</strong> among BC<br />
developers.<br />
Figure 2: BCD story, modelled in BPMN<br />
Adaptation: Current BCF often only support adaptation in the sense that BC developers need to put in<br />
manual effort to do so. The authors envision BCF that support the (semi-) automatic adaptation of<br />
BCs, e.g., by st<strong>and</strong>ardizing user input parameters, such as the pricing model, <strong>and</strong> by synchronizing<br />
BC content with real-time dynamic data sources such as the databases in enterprise resource<br />
planning (ERP) systems. This will not just increase the efficiency of BCD, but will also make BCs<br />
more useful on the long-term, e.g., during project execution. Moreover, BCF could show the<br />
discrepancy between actual values (ex-post) <strong>and</strong> estimated values (ex-ante), facilitating project<br />
management interventions <strong>and</strong> organizational learning.<br />
Collaboration: Current BCF, especially spreadsheet-based BCF that are not accompanied by<br />
explanatory text documents, hardly support collaboration. Although it is possible to send around<br />
documents <strong>and</strong> ask people for input, the chances are high that other BC developers <strong>and</strong> evaluators<br />
do not underst<strong>and</strong> the underlying assumptions, the calculation methods used, or have difficulties with<br />
judging the reliability of information. The authors envision BCF that support collaborative BCD across<br />
development projects, across organizations <strong>and</strong> across time, e.g., by making assumptions explicit, by<br />
557
Bart-Jan van Putten, Franziska Brecht, <strong>and</strong> Oliver Günther<br />
clarifying the source of content, by clarifying the quality of content, by enabling different viewpoints on<br />
the same piece of information <strong>and</strong> by providing ways to share <strong>and</strong> protect information. This will not<br />
just increase the efficiency of BCD, but will also make BCs more reliable for evaluators <strong>and</strong> support<br />
today’s collaborative ways of doing business.<br />
6. Interviews<br />
To refine the identification of challenges <strong>and</strong> requirements in the reuse, adaptation <strong>and</strong> collaboration<br />
solution areas, 15 topics were identified (Table 1). Each of the topics was discussed during the eight<br />
structured interviews that were conducted with BC developers, who were invited among the industrial<br />
companies participating in three research projects (ADiWa 2010; Aletheia 2010; SemProM 2010).<br />
They were selected, because they were, or would be, developing BCs for new IS that were under<br />
investigation in those research projects. The interviewees represented different industries: high tech<br />
(3x), information technology (2x), logistics (2x), automotive (1x). The interviewees had experience in<br />
BCD, but were not necessarily experts, <strong>and</strong> were representative for the population of target users of<br />
the advanced BCF.<br />
Each interview consisted of three main parts:<br />
“Business cases in your organization”: This part investigated the development <strong>and</strong> use of BCs in<br />
the organization <strong>and</strong> the role of the interviewee in that matter.<br />
“Business case frameworks in your organization”: This part investigated the use of BCF in the<br />
organization, the role of the interviewee in that matter <strong>and</strong> the interest in a BCF that would be<br />
specific for the technology domain being investigated in the respective research project (Aletheia,<br />
SemProM, or ADiWa).<br />
“Challenges & Requirements”: This part investigated the 15 topics.<br />
Table 1: Research topics within the solution areas <strong>and</strong> the scores from the interviews<br />
Topic Reuse Adapt. Colla. Relevance Challenge Support<br />
Mean SD Mean SD Mean SD<br />
Reuse of Content X 1,14 0,90 0,43 0,53 1,29 0,49<br />
Reuse of Structure X 1,63 0,52 -0,13 1,25 1,75 0,46<br />
Aggregation X 1,14 1,21 1,50 1,22 0,50 0,84<br />
Comparison X 1,50 0,76 1,13 1,13 0,86 1,07<br />
Provider vs. Customer Persp. X 1,38 0,74 0,88 1,36 1,13 0,99<br />
Market Potential Estimation X 1,75 0,46 1,50 0,53 1,00 1,31<br />
Changing Assumptions X 1,14 1,46 0,14 1,57 1,00 1,73<br />
Product Innovation Lifecycle X 1,25 0,71 0,17 0,98 0,57 0,98<br />
Business Model Adaptivity X 1,38 1,06 2,00 0,00 0,60 1,67<br />
Clarifying Reasoning X 1,88 0,35 1,25 0,89 1,38 1,06<br />
Stakeholders’ Opinions X 1,00 1,41 0,00 0,82 0,75 1,58<br />
<strong>Information</strong> Sources X 1,50 0,53 1,00 1,07 1,00 0,58<br />
<strong>Information</strong> Quality X 1,63 0,52 1,13 0,83 1,43 0,53<br />
Sharing X 0,86 1,07 0,33 1,21 0,43 1,40<br />
Security X 1,50 0,76 -0,50 0,84 0,57 0,98<br />
The 15 topics were investigated in the interviews along three dimensions: the relevance dimension,<br />
the challenge dimension <strong>and</strong> the support dimension. The relevance dimension was used to<br />
investigate the required properties of BCs (not of BCF). E.g., a respondent could argue that<br />
‘information quality’ is a relevant property of a BC – or not. It is assumed that relevant properties<br />
should be obtainable through the use of BCF, or in the case that they can not be obtained through the<br />
use of a BCF, the BCF should at least not prevent that. The challenge dimension was used to<br />
investigate the complexity of the BCD task required to obtain (BC developer) or judge (BC evaluator)<br />
the respective property of the BC. E.g., irrespective of the relevance of the topic, the interviewee<br />
could argue that ‘determining information quality’ is a challenging BCD task. It is assumed that<br />
challenging tasks are good c<strong>and</strong>idates for BCF support. The support dimension was used to<br />
investigate the need for BCF support for the respective BCD task. This dimension implicitly measured<br />
a mixture of the respondent’s hope that a BCF would support the BCD task <strong>and</strong> the respondent’s<br />
belief in the ability of a BCF to support the task, which in turn is based on the respondent’s knowledge<br />
of state-of-the-art BCF <strong>and</strong> his/her imagination. Thus, the authors were aware of the inaccuracy of the<br />
558
Bart-Jan van Putten, Franziska Brecht, <strong>and</strong> Oliver Günther<br />
dimension, which was therefore mainly used to provoke responses regarding which BCD tasks<br />
could/should be automated <strong>and</strong> which could/should not.<br />
For each topic, for each dimension, a statement was defined. E.g., for the topic <strong>Information</strong> Quality<br />
the statements were:<br />
“The quality of information in a business case should be clear.” (relevance dimension)<br />
“Determining the quality of information in a business case is a challenge.” (challenge dimension)<br />
“A BCF should support the determination of the quality of information.” (support dimension)<br />
The interviewees were asked to what extent they agreed with the statements. A five point Likert-scale<br />
ranging from -2 (‘strongly disagree’) to +2 (‘strongly agree’), including a ‘no opinion’ option was used.<br />
Table 1 shows the mean scores <strong>and</strong> st<strong>and</strong>ard deviations, all with a sample size of eight. Based on the<br />
mean scores, Figure 3 was drawn. Each dot represents one of the 15 topics. The size of the dot<br />
represents the relevance of the topic (note that the scores have been categorized so that there are<br />
only three different sizes, which makes it easier to see the difference in size). The vertical axis<br />
represents the challenge dimension. The challenging topics need to be understood better <strong>and</strong> thus<br />
require further investigation. The horizontal axis represents the support dimension. If BCF support is<br />
needed, supporting functionality should be implemented.<br />
Figure 3: The 15 topics structured along the three dimensions, based on the interviews<br />
Four topics, Market Potential Estimation (MPE), <strong>Information</strong> Quality (IQ), Clarifying Reasoning (CR)<br />
<strong>and</strong> Reuse of Structure (RS), fall in the highest relevance category. Three of them, MPE, IQ, CR, are<br />
both challenging <strong>and</strong> require BCF support according to the interviewees. One topic, RS, only requires<br />
BCF support but is not perceived as challenging. The remainder of this section will describe the<br />
results of the interviews regarding these four topics in more detail.<br />
Market Potential Estimation (MPE) is about estimating the sales <strong>and</strong> revenue potential for a certain<br />
product or service, offered to a specific market segment. MPE is an issue for companies who sell<br />
products or services <strong>and</strong> thus make ‘provider perspective BCs’. The interviewees strongly agreed with<br />
the relevance of the topic <strong>and</strong> stated that it can be very challenging unless you have a lot of<br />
experience in the respective market. They also strongly agreed with the need for BCF support for this<br />
challenge.<br />
<strong>Information</strong> Quality (IQ) is about making sure that BCs are reliable <strong>and</strong> have predictive value.<br />
Gathering reliable data can be hard, doing quantifications on that data can be hard, but also<br />
determining the quality of information provided by others can be hard, e.g., a precise number may<br />
give an accurate impression, but may be a rough estimate in reality. Interviewees agree with the<br />
relevance of the topic, agree with the challenges <strong>and</strong> agree with the need for BCF support.<br />
559
Bart-Jan van Putten, Franziska Brecht, <strong>and</strong> Oliver Günther<br />
Clarifying Reasoning (CR) is about enabling evaluators <strong>and</strong> other stakeholders of the BC to<br />
underst<strong>and</strong> the reasoning behind estimations. That way, those people may be able to better<br />
determine the quality of information <strong>and</strong> if certain estimates still hold, or if conditions have changed in<br />
such a way that estimates need to be revised. Interviewees strongly agree that this is relevant <strong>and</strong><br />
agree that it can be very challenging, depending on the stakeholders. They also strongly agree that<br />
BCF support is needed for this.<br />
Reuse of Structure (RS) is about enabling BC developers to reapply the same criteria <strong>and</strong><br />
quantification methods as used in other BCs, thereby improving the efficiency of BCD <strong>and</strong> the<br />
reliability <strong>and</strong> comparability of BCs. Interviewees agree that reuse of content <strong>and</strong> structure is relevant.<br />
Although they do not see this as a challenge, they strongly agree with the need for BCF support.<br />
However, they warn that it should always remain possible to make adjustments to templates, that<br />
reuse may lead to more mistakes, that reuse may lead to the comparison of ‘apples <strong>and</strong> eggs’ <strong>and</strong><br />
that reuse only works for the same types of BCs.<br />
7. Conclusion<br />
The aim of this study was to better underst<strong>and</strong> challenges in BCD, to describe limitations of BCF <strong>and</strong><br />
to reveal opportunities for improvement of BCF. In order to achieve this, participant observation was<br />
applied during a 14 month BCD project at a global IT company (the ‘case study’). The derived<br />
challenges in BCD were presented in the form of a story. Next, three solution areas for improvement<br />
of BCF were defined: reuse, adaptation <strong>and</strong> collaboration. These areas were refined to 15 topics,<br />
which were investigated through interviews with BC developers along the relevance, challenge <strong>and</strong><br />
support dimensions. The interviewees argued that more support is especially needed for market<br />
potential estimation, determining information quality, clarifying reasoning <strong>and</strong> the reuse of structure.<br />
This provides a starting point for user-centred researchers, designers, <strong>and</strong> engineers who aim to<br />
develop better tool support for BCD.<br />
The limitations of this study are that the case study was executed with only one company <strong>and</strong> that<br />
only eight interviews were conducted. Overall, the findings presented in this paper should be<br />
considered as explorative. The existing body of knowledge on IS evaluation is relevant, despite<br />
foc<strong>using</strong> more on the organizational challenges in the evaluation of IS, than on the individual<br />
challenges of BC developers in practice.<br />
Future work should move towards the design of an advanced BCF prototype. Usability experiments<br />
should be conducted to test whether the prototype supports the efficiency <strong>and</strong> effectiveness of BCD<br />
<strong>and</strong> if it enhances the satisfaction of BC developers when working with the BCF.<br />
Acknowledgements<br />
The authors thank the SemProM, Aletheia <strong>and</strong> ADiWa project partners who participated in the<br />
interviews. This research is partly funded by the German Ministry for Education <strong>and</strong> Research (BMBF)<br />
under contract 01IA08002, project SemProM, from February 2008 through January 2011.<br />
References<br />
ADiWa, 2010. Available at: http://www.adiwa.net.<br />
Aletheia, 2010. Available at: http://www.aletheia-projekt.de.<br />
Ballantine, J. & Stray, S., 1998. Financial Appraisal <strong>and</strong> the IS/IT Investment Decision Making Process. Journal<br />
of <strong>Information</strong> Technology, 13(1), pp.3-14.<br />
Berghout, E.W. & Remenyi, D., 2003. The Ten Years of the European Conference on IT Evaluation:<br />
Retrospectives <strong>and</strong> Perspectives for Possible Future Research. In 10th European Conference on<br />
<strong>Information</strong> Technology Evaluation. Madrid, Spain.<br />
Brealey, R. & Myers, S., 1988. Principles of Corporate Finance, New York: McGraw-Hill.<br />
Brugger, R., 2009. Der IT Business Case - Kosten Erfassen und Analysieren, Nutzen Erkennen und<br />
Quantifizieren, Wirtschaftlichkeit Nachweisen un Realisieren, Berlin Heidelberg: Springer-Verlag.<br />
BusinessCase.com, 2010. CaseBuilder(TM) for IT Initiatives. Available at:<br />
http://www.businesscase.com/itcasebuilder.html.<br />
Cardin, L. et al., 2007. The Components of a Quality Business Case, Forrester Research, Inc. Available at:<br />
http://www.forrester.com/go?docid=42164.<br />
Denzin, N.K., 2006. Sociological Methods: A Sourcebook, New Brunswick, NJ, USA: Aldine Transaction.<br />
DeWalt, K.M., DeWalt, B. & Wayl<strong>and</strong>, C., 1998. Participant Observation. In H. Bernard, ed. H<strong>and</strong>book of Methods<br />
in Cultural Anthropology. Walnut Creek, CA: AltaMira Press.<br />
Douglas, J., 1976. Investigative Social Research, Beverly Hills, CA: Sage Publications.<br />
560
Bart-Jan van Putten, Franziska Brecht, <strong>and</strong> Oliver Günther<br />
Farbey, B., L<strong>and</strong>, F. & Targett, D., 1995. A Taxonomy of <strong>Information</strong> Systems Applications: The Benefits'<br />
Evaluation Ladder. European Journal of <strong>Information</strong> Systems, 4, pp.41-50.<br />
Farbey, B., L<strong>and</strong>, F. & Targett, D., 1993. How to Assess Your IT Investment: a Study of Methods <strong>and</strong> Practice,<br />
Oxford: Butterworth-Heinemann.<br />
Farbey, B., L<strong>and</strong>, F. & Targett, D., 1999a. IS Evaluation: A Process for Bringing Together Benefits, Costs <strong>and</strong><br />
Risks. In W. Currie & B. Galliers, eds. Rethinking <strong>Management</strong> <strong>Information</strong> Systems: An Interdisciplinary<br />
Perspective. Oxford, UK: Oxford University Press, pp. 204-228.<br />
Farbey, B., L<strong>and</strong>, F. & Targett, D., 1999b. Moving IS Evaluation Forward: Learning Themes <strong>and</strong> Research<br />
Issues. The Journal of Strategic <strong>Information</strong> Systems, 8(2), pp.189-207.<br />
Gambles, I., 2009. Making the Business Case - Proposals that Succeed for Projects that Work, Farnham,<br />
Engl<strong>and</strong>: Gower.<br />
Gliedman, C. et al., 2004. Key Elements in an IT Business Case, Forrester Research, Inc. Available at:<br />
http://www.forrester.com/go?docid=34046.<br />
Irani, Z., 2002. <strong>Information</strong> Systems Evaluation: Navigating Through the Problem Domain. <strong>Information</strong> &<br />
<strong>Management</strong>, 40(1), pp.11 - 24.<br />
Irani, Z., Ezingeard, J. & Grieve, R., 1997. Integrating the Costs of a Manufacturing IT/IS Infrastructure into the<br />
Investment Decision-making Process. Technovation, 17(11-12), pp.695-706.<br />
Joshi, K. & Pant, S., 2008. Development of a Framework to Assess <strong>and</strong> Guide IT Investments: An Analysis<br />
Based on a Discretionary-M<strong>and</strong>atory Classification. International Journal of <strong>Information</strong> <strong>Management</strong>, 28(3),<br />
pp.181-193.<br />
King, J.L. & Schrems, E.L., 1978. Cost-Benefit Analysis in <strong>Information</strong> Systems Development <strong>and</strong> Operation.<br />
ACM Computing Surveys (CSUR), 10(1), pp.19-34.<br />
Love, P.E.D., Irani, Z. & Edwards, D.J., 2004. Industry-centric Benchmarking of <strong>Information</strong> Technology Benefits,<br />
Costs <strong>and</strong> Risks for Small-to-Medium Sized Enterprises in Construction. Automation in Construction, 13(4),<br />
pp.507 - 524.<br />
Norman, D.A. & Draper, S.W., 1986. User-Centered System Design: New Perspectives on Human-Computer<br />
Interaction, Hillsdale, NJ, USA: Lawrence Earlbaum Associates.<br />
Renkema, T.J.W. & Berghout, E.W., 1997. Methodologies for <strong>Information</strong> Systems Investment Evaluation at the<br />
Proposal Stage: a Comparative Review. <strong>Information</strong> <strong>and</strong> Software Technology, 39(1), pp.1 - 13.<br />
Sassone, P.G., 1988. Cost Benefit Analysis of <strong>Information</strong> Systems: A Survey of Methodologies. In Conference<br />
on Supporting Group Work, ACM SIGOIS <strong>and</strong> IEEECS TC-OA. Palo Alto, CA, USA.<br />
Schmidt, M.J., 2009. Business Case Essentials: A Guide to Structure <strong>and</strong> Content 3rd ed., Boston, MA, USA:<br />
Solution Matrix, Ltd.<br />
Schmidt, M.J., 2003. The IT Business Case: Keys to Accuracy <strong>and</strong> Credibility, Solution Matrix Ltd.<br />
SemProM, 2010. Available at: http://www.semprom.org.<br />
SolutionMatrix Ltd., 2010. FREE Excel Financial Metrics Calculator. Available at:<br />
http://www.solutionmatrix.com/download-center.html.<br />
Walter, S.G. & Spitta, T., 2004. Approaches to the Ex-ante Evaluation of Investments into <strong>Information</strong> Systems.<br />
Wirtschaftsinformatik, 46(3), pp.171-180.<br />
Ward, J., Daniel, E. & Peppard, J., 2008. Building Better Business Cases for IT Investments. MIS Quarterly<br />
Executive, 7(1), pp.1-15.<br />
Ward, J., Taylor, P. & Bond, P., 1996. Evaluation <strong>and</strong> Realization of IS/IT Benefits: An Empirical Study of Current<br />
Practice. European Journal of <strong>Information</strong> Systems, 4, pp.214-225.<br />
561
The Relation Between Dynamic Business Models <strong>and</strong><br />
Business Cases<br />
Bart-Jan van Putten 1, 3 2, 4<br />
<strong>and</strong> Markus Schief<br />
1<br />
Humboldt-Universität zu Berlin, Germany<br />
2<br />
Technische Universität Darmstadt, Germany<br />
3<br />
SAP Research Dresden, SAP AG, Germany<br />
4<br />
SAP Research Darmstadt, SAP AG, Germany<br />
bart-jan.van.putten@sap.com<br />
markus.schief@sap.com<br />
Abstract: The agility of companies can be increased when implementing merged or changed business models in<br />
the organization <strong>and</strong> when <strong>using</strong> business cases to determine if it is time to change the business model. This<br />
study clarifies the relation between business models, as an implementation of a company’s strategy, <strong>and</strong><br />
business cases, as an abstraction of a company’s operations. The relations are analyzed from a static as well as<br />
a dynamic point of view by means of inductive reasoning <strong>and</strong> literature review. The explorative findings may be<br />
used as a starting point for further research <strong>and</strong> for the design of future information systems which utilize these<br />
relations.<br />
Keywords: business model, business case, strategy, operations, management, implementation<br />
1. Introduction<br />
Companies are continuously striving for more agility. One of the challenges is the rapid translation of<br />
changes in a company’s strategy to its operations <strong>and</strong> vice versa. For example, after the acquisition of<br />
Sun by Oracle, Oracle cut former Sun partners, without notice, from their hardware maintenance<br />
renewals business (Kovar 2010). For many of those partners, maintenance renewals were an<br />
essential part of economic survival. Therefore, these companies needed a very high degree of agility<br />
to be able to adapt their strategy <strong>and</strong> implement it in changed operations before they would go out of<br />
business.<br />
Unfortunately, there is a gap between business strategy <strong>and</strong> business processes, hampering<br />
companies’ agility (Al-Debei & Avison 2010, p.370). Al-Debei & Avison propose to fill this gap with the<br />
‘business model’ (BM), which can be used to “translate the broad strategy into more specific business<br />
architectural, co-operational, value propositional, <strong>and</strong> financial arrangements needed to achieve the<br />
strategic goals <strong>and</strong> objectives of the business“. This study builds upon that claim <strong>and</strong> aims to show<br />
that ‚business cases‘ (BC), i.e., the (documented) rationale for executing a project or investment in<br />
accordance with the strategy, complement the business model in closing the gap between strategy<br />
<strong>and</strong> operations. The mutual relationships between BM <strong>and</strong> BC may be taken into account in today’s<br />
business practice implicitly, but with some exceptions, e.g., (Casadesus-Masanell & Ricart 2010), they<br />
did not receive much attention in literature. Therefore, this study aims to clarify the relation between<br />
BM <strong>and</strong> BC, based on literature review <strong>and</strong> inductive reasoning. Throughout the study, mergers &<br />
acquisitions (M&A) will be used as an example because they often cause disruptive changes in the<br />
strategy <strong>and</strong> operations of companies.<br />
The structure of this paper is as follows. Section 2 provides a background on the BM <strong>and</strong> BC<br />
concepts <strong>and</strong> the factors ca<strong>using</strong> BM <strong>and</strong> BC dynamics. Section 3 analyzes static similarities between<br />
BMs <strong>and</strong> BCs <strong>and</strong> dynamic influences of a BM on BCs <strong>and</strong> vice versa. Section 4 concludes this<br />
paper.<br />
2. Background<br />
2.1 Business models<br />
While several definitions of business models can be found (Morris et al. 2005), Osterwalder et al.<br />
(2005) provide the following definition: “A business model is a conceptual tool that contains a set of<br />
elements <strong>and</strong> their relationships <strong>and</strong> allows expressing the business logic of a specific firm. It is a<br />
description of the value a company offers to one or several segments of customers <strong>and</strong> of the<br />
architecture of the firm <strong>and</strong> its network of partners for creating, marketing, <strong>and</strong> delivering this value<br />
<strong>and</strong> relationship capital, to generate profitable <strong>and</strong> sustainable revenue streams.”<br />
562
Bart-Jan van Putten <strong>and</strong> Markus Schief<br />
According to Gordijn et al. (2005), in literature, the notion of ‘business model’ is interpreted in the<br />
following ways: (1) as a taxonomy (such as e-shops, malls, auctions) <strong>and</strong> (2) as a conceptual model<br />
of the way we do business. Taxonomies enumerate a finite number of BM types, e.g. (Bambury 1998;<br />
Timmers 1998; Weill & Vitale 2002), while a conceptualization of ‘business model’ describes a metamodel<br />
or a reference model, allowing to describe an infinite number of BMs, e.g., (Amit & Zott 2001;<br />
Gordijn & Akkermans 2003; Mahadevan 2000; Weill & Vitale 2002).<br />
Examples of BM conceptualizations, or ‘ontologies’ (Gruber 1993), are REA, e3-value, <strong>and</strong> BMO<br />
(Andersson et al. 2006), of which BMO is the ontology that is proposed by Osterwalder et al. (2005).<br />
Andersson et al. (2006) state that BMO has the widest scope. For that reason, the BMO ontology will<br />
be used in this study as an exemplary conceptualization, to be able to relate the BM concept to the<br />
BC concept. Table 1 shows the nine BM building blocks (2005).<br />
Table 1: Nine business model building blocks, adopted from (Osterwalder et al. 2005)<br />
Business Model<br />
Building Block<br />
Description<br />
Value Proposition Gives an overall view of a company’s bundle of products <strong>and</strong> services.<br />
Target Customer Describes the segments of customers a company wants to offer value to.<br />
Distribution Channel Describes the various means of the company to get in touch with its customers.<br />
Relationship Explains the kind of links a company establishes between itself <strong>and</strong> its different<br />
customer segments.<br />
Value Configuration Describes the arrangement of activities <strong>and</strong> resources.<br />
Core Competency Outlines the competencies necessary to execute the company’s business model.<br />
Partner Network Portrays the network of cooperative agreements with other companies necessary to<br />
efficiently offer <strong>and</strong> commercialize value.<br />
Cost Structure Sums up the monetary consequences of the means employed in the business<br />
model.<br />
Revenue Model Describes the way a company makes money through a variety of revenue flows.<br />
2.2 Business cases<br />
A BC is a recommendation to decision makers to take a particular course of action for the<br />
organisation, supported by an analysis of benefits, costs <strong>and</strong> risks (...), with an explanation of how it<br />
can best be implemented (Gambles 2009). It documents the relevant facts <strong>and</strong> situational analysis,<br />
key metrics, financial analysis, allows different projects with different goals to be compared <strong>and</strong><br />
contrasted <strong>and</strong> serves as a communication tool (Gliedman et al. 2004). BCs can be developed for any<br />
type of investment or project, including the investment in the extension of a company’s product <strong>and</strong><br />
service portfolio. Such BCs may be termed ‘provider perspective BCs’ as the resulting products are<br />
then sold to customers who may use ‘customer perspective BCs’ to evaluate their investment. BCs<br />
commonly appear as spreadsheets, sometimes accompanied by presentations or explanatory<br />
documents. They may be presented by the project leader (BC ‘owner’ or ‘champion’) to senior<br />
management, which is responsible for prioritizing BCs <strong>and</strong> making investment decisions. This way,<br />
the BC can be used to decide about investment before project execution (‘ex-ante’), to evaluate<br />
progress during project execution, <strong>and</strong> to determine to which extent the proposed value of the<br />
investment has been realized after project execution (‘ex-post’) (J. Ward et al. 1996).<br />
There are many authors who describe the components of a BC, e.g., (Cardin et al. 2007; Gliedman et<br />
al. 2004). Although a large variety of components can be included, the common denominator is a set<br />
of criteria to evaluate the proposed investment. Those criteria are generally classified as benefits,<br />
costs, <strong>and</strong> risks. To support decision making, a value needs to be assigned to each criterion. The<br />
value expresses the estimated future situation, in an absolute manner, or relative to the status quo.<br />
The value can be qualitative, quantitative, financial, or non-financial. To estimate the value, a wide<br />
range of methods can be applied, such as benchmarking <strong>and</strong> pilot projects (J. Ward et al. 2008). With<br />
some exceptions (Ross & Beath 2002; J. Ward et al. 2008), the term BC is infrequently used in<br />
literature. Rather, scientists study ‘information systems (investment) evaluation’. Farbey et al. (1999a,<br />
p.205) define that “as a process that takes place at different points in time or continuously, for<br />
searching for <strong>and</strong> making explicit, quantitatively or qualitatively, all impacts of an IS project”.<br />
2.3 Business model/case dynamics<br />
With a few exceptions (Al-Debei & Avison 2010; Ian MacInnes 2005; Vaccaro & Cohn 2004), most<br />
literature has taken a static perspective on business models (Lindner et al. 2010). They are used to<br />
563
Bart-Jan van Putten <strong>and</strong> Markus Schief<br />
describe the value-creating logic of organizations at a certain moment in time. Hereby the implicit<br />
assumption is that business models remain steady over time, <strong>and</strong> that choices are rarely adjusted.<br />
However, in reality business models do not persist forever. Organizations often have to review their<br />
business models in order to keep in line with changing environments (Afuah & C. Tucci 2003). As a<br />
result, de Reuver et al. (2007) argue that business models have to keep up with external changes<br />
during all phases from development to exploitation.<br />
Johnson et al. (2008) describe ‘business model innovation’ <strong>and</strong> five strategic circumstances that often<br />
require business model change:<br />
The opportunity to address through disruptive innovation the needs of large groups of potential<br />
customers who are shut out of a market entirely because existing solutions are too expensive or<br />
complicated for them.<br />
The opportunity to capitalize on a br<strong>and</strong> new technology by wrapping a new business model<br />
around it, or the opportunity to leverage a tested technology by bringing it to a whole new market.<br />
The opportunity to bring a ‘job-to-be-done’ focus where one does not yet exist.<br />
The need to fend off low-end disrupters.<br />
The need to respond to a shifting basis of competition.<br />
In a similar way, Weiner et al. (2010) mention strategy, market, technology <strong>and</strong> regulatory influences<br />
on the BM. Moreover, the ‘hype cycle phase’ can be considered as an influencing factor (Fenn &<br />
Raskino 2008).<br />
As it takes a tremendous amount of time <strong>and</strong> effort to realize a BM, it is common sense that a BM,<br />
although never completely static, is used for a longer period of time (Demil & Lecocq 2010). This<br />
underst<strong>and</strong>ing is not as common in the area of BCs, where many companies only use BCs prior to<br />
investment (J. Ward et al. 2008), rather than <strong>using</strong> them as a project realization <strong>and</strong> evaluation tool.<br />
However, some authors underst<strong>and</strong> that a BC can also be useful after the initial investment decision<br />
<strong>and</strong> argue for long time use <strong>and</strong> organizational learning (Farbey, L<strong>and</strong> & Targett 1999b; J. Ward et al.<br />
1996).<br />
When a BC is used over a longer period of time, the BC (i.e., the project which the BC represents)<br />
becomes subject to similar influences like BMs. E.g., due to changes on the market, the expected<br />
revenue for a certain product for which the BC was developed, may start to decline. In addition to<br />
such external influences, BCs are subject to company internal factors, among which user<br />
involvement, project management, implementation, communication <strong>and</strong> corporate underst<strong>and</strong>ing<br />
(Farbey et al. 1993).<br />
An illustrative example for BM/BC dynamics can be drawn from mergers <strong>and</strong> acquisitions (M&A),<br />
where heterogeneous BMs <strong>and</strong> BCs need to be aligned. Thus, this study will present concepts in that<br />
context.<br />
3. Relations<br />
3.1 Similarities between business models <strong>and</strong> business cases<br />
According to Brews <strong>and</strong> Tucci (2003), BM implementation <strong>and</strong> management include the "translation"<br />
of the BM as a plan into more concrete elements, such as a business structure (e.g., departments,<br />
units, human resources), business processes (e.g., workflows, responsibilities), <strong>and</strong> infrastructure <strong>and</strong><br />
systems (e.g., buildings, ICT). This study assumes that a BC can be seen as a BM implementation,<br />
which raises the question what they have in common. To provide an initial answer, the BM <strong>and</strong> BC<br />
concepts need to be decomposed. Conceptualizations as described in section 2.1 <strong>and</strong> 2.2 may be<br />
used. The BM concept can be decomposed in its nine building blocks, <strong>and</strong> the BC concept can be<br />
seen as a set of criteria for evaluation, possibly classified as benefits, costs, risks. In Table 2 for each<br />
of the BM building blocks, some examples of common BC evaluation criteria from the domain of<br />
information systems (T.-Y. Chou et al. 2006) are presented.<br />
As a BC can theoretically contain any criterion, a BC does not necessarily contain implementations of<br />
all BM building blocks. However, on the basis of Table 2 one could argue that there are many<br />
overlaps between the BM <strong>and</strong> BC concepts. In addition to the similarities between BM <strong>and</strong> BC, there<br />
564
Bart-Jan van Putten <strong>and</strong> Markus Schief<br />
are differences. For example, BCs often aim to improve ‘competitive advantage’, while Osterwalder et<br />
al. (2005) make the following claim about the BM concept: “We excluded all elements related to<br />
competition <strong>and</strong> to business model implementation, which we underst<strong>and</strong> as related to the business<br />
model but not as internal part of it.” Other common BC criteria that may not be considered as a part of<br />
the BM are strategic alignment, flexibility, <strong>and</strong> risk. Rather than being explicitly part of the BM, these<br />
criteria may be seen as properties of the BM as a whole, or as meta-properties of each of the BM<br />
building blocks.<br />
Table 2: BM building blocks <strong>and</strong> related IS-specific BC evaluation criteria<br />
Business Model Business Case<br />
Value Proposition A BC can be developed <strong>and</strong> maintained for each of the company’s products <strong>and</strong><br />
services. The value proposition then defines the set <strong>and</strong> scope of BCs. A BC may<br />
also be developed to change or extend the company’s value proposition. A portfolio<br />
approach may be used to help management evaluate the relative importance of BCs<br />
(J. M. Ward 1990). Examples of related IS evaluation criteria are:<br />
‘Improved product quality’ (Irani 2002)<br />
‘Provides better products or services to customers’ (Mirani & Lederer 1998)<br />
Target Customer Provider perspective BCs describe market segments <strong>and</strong> customer needs.<br />
‘Improved market share’ (Irani 2002)<br />
‘Provides new products or services to customers’ (Mirani & Lederer 1998)<br />
Distribution Channel BCs describe means to realize the foreseen benefits. Provider perspective BCs may<br />
therefore describe distribution channels. Each channel may incur certain cost <strong>and</strong><br />
revenue streams.<br />
‘Reduced delivery lead times’, ‘Improved product traceability’ (Irani 2002)<br />
Relationship A provider perspective BC could describe this, often as part of the<br />
intangible/strategic benefits.<br />
‘Improved customer loyalty’ (T.-Y. Chou et al. 2006)<br />
‘Improves customer relations’ (Mirani & Lederer 1998)<br />
Value Configuration The BC describes activities <strong>and</strong> resources as part of the benefits realization plan.<br />
The investment in one specific activity or resource could also be the goal of the BC.<br />
BCs may be infeasible due to a lack of resources.<br />
‘Labor savings’ (Ryan & Harrison 2000)<br />
‘Reduced inventory’ (Jones & Beatty 1998)<br />
‘Enhances employee productivity or business efficiency’ (Mirani & Lederer 1998)<br />
Core Competency Responsible persons or required competencies may be described in the BC as part<br />
of the benefits realization plan.<br />
‘Whether the CEO has IT knowledge’, ‘Experience in <strong>using</strong> IS’, ‘Skill of IT staff’ (T.-Y.<br />
Chou et al. 2006)<br />
‘Probability of project completion’ (Bacon 1992; Escobar-Perez 1998)<br />
‘Leader in new technology’ (Irani 2002)<br />
‘Enables focus on core in-house operations’ (Mcauley et al. 2002)<br />
Partner Network May be described as part of the realization plan. Can be described for the<br />
make/buy/partner decision.<br />
‘Ally with partner’, ‘Improved trading partner relations’ (T.-Y. Chou et al. 2006)<br />
‘Helps establish useful linkages with other organizations’ (Mirani & Lederer 1998)<br />
Cost Structure A BC contains a cost structure or ‘cash flow analysis’. The cost structure in the BM<br />
may define upper <strong>and</strong> lower bounds for the cash flow analysis in the BC. The cost<br />
structure may get less attention when it is already certain that the investment needs<br />
to be made (Joshi & Pant 2008).<br />
‘Hardware cost’, ‘Software cost’, ‘Implementation cost’, ‘Maintenance cost’,<br />
‘Consultant cost’, ‘Reduced inventory’ (T.-Y. Chou et al. 2006)<br />
‘Save money by reducing…’ (Mirani & Lederer 1998)<br />
Revenue Model A cash flow analysis is part of a provider perspective BC. The BM may set<br />
benchmarks for BCs, e.g., the minimum level of ROI (Return on Investment).<br />
‘Improved cash flow’ (Jones & Beatty 1998)<br />
‘Net present value’ (Bacon 1992; Escobar-Perez 1998)<br />
‘Internal rate of return’ (Bacon 1992; Escobar-Perez 1998)<br />
3.2 Business models affecting business cases<br />
The similarities between BM <strong>and</strong> BC constitute a static view on the relation between the two concepts.<br />
This static view can be extended with a dynamic view, by analyzing the influence of a change in the<br />
BM on BCs <strong>and</strong> vice versa. Assuming that an M&A usually affects many or all properties of a BM, the<br />
challenge is to identify how these changes impact the various BCs of the participating companies.<br />
Though the impact heavily depends on the nature <strong>and</strong> purpose of each BC, Table 3 presents a<br />
565
Bart-Jan van Putten <strong>and</strong> Markus Schief<br />
fictional example of change of each BM building block, as well as the associated impacts on the BCs.<br />
To ease the underst<strong>and</strong>ing of the relations, they are discussed for each BM building block, every time<br />
assuming a change of that building block only while keeping all other building blocks fixed (ceteris<br />
paribus). The examples apply to fictional companies A <strong>and</strong> B, which are merged into company C,<br />
thereby also merging their BMs. Thus, the properties of company C’s BM building blocks have<br />
transformed compared to the previous BM building blocks of company A <strong>and</strong> B.<br />
Table 3: Examples of BM change affecting BCs<br />
Business Model Building Block<br />
Potential impacts on business cases<br />
(Examples for Change)<br />
Value Proposition: Company A has a<br />
BC for the development of a new<br />
product, which is already part of<br />
company B’s portfolio. Thus,<br />
company C’s product portfolio<br />
contains a redundant product.<br />
Target Customer: Company A has a<br />
BC for a product that is supposed to<br />
address a customer segment which<br />
so far has only been focused on by<br />
company B. Company C can exploit<br />
this customer segment with products<br />
from both former companies.<br />
Distribution Channel: Company A<br />
has a distribution channel that B<br />
does not yet have, but it makes<br />
sense to use it for a specific product.<br />
In company C, A’s distribution<br />
channel can also be used for B’s<br />
products.<br />
Relationship: Company A has a BC<br />
for a product that customers are not<br />
loyal to. In company C, B’s strong<br />
br<strong>and</strong>ing, relationship strategy, <strong>and</strong><br />
customer loyalty can be applied to<br />
company A’s product.<br />
Value Configuration: Company A has<br />
a BC for product development.<br />
Company B has resources which<br />
could be used for that development.<br />
In company C those resources can<br />
be used.<br />
Core Competency: Company A <strong>and</strong><br />
company B have different core<br />
competencies. In company C B’s<br />
core competencies may be applied<br />
to company A’s BCs, if applicable.<br />
Partner Network: Company A has a<br />
BC for a product that doesn’t reflect<br />
company B’s partner network. In<br />
company C, B’s partner network can<br />
be used for company A’s product.<br />
Cost Structure: Company A has a<br />
BC for a product that is based on offshoring.<br />
In company C the strategy<br />
is changed from off-shoring to nearshoring.<br />
The associated cost model<br />
in company C is hence different.<br />
Revenue Model: Company A has a<br />
BC for a product that is based on<br />
upfront license fees. In company C<br />
the revenue model is changed from<br />
license fees to ‘pay per usage’.<br />
Benefits: Decrease if one product attracts the revenues of the other<br />
one (cannibalization effects).<br />
Costs: Decrease due to company B’s experience in this area (e.g.,<br />
some mistakes in development can be avoided).<br />
Benefits: Increase due to additional target customers for company A.<br />
Costs: Decrease due to existing target customer awareness of<br />
company B (e.g., investments in promotion for this target group can<br />
be shared by the different products).<br />
Benefits: Increase due to additional distribution channels available for<br />
company B.<br />
Costs: Increase due to additional costs for the usage of the additional<br />
distribution channel (e.g., logistics costs).<br />
Benefits: Increase of company A’s sales as customer loyalty rises<br />
with the help of company B.<br />
Costs: Increase as company A needs to implement B’s strategy. For<br />
instance, they might spend additional time with customers to build<br />
trust.<br />
Benefits: Increase of company A’s product development efficiency as<br />
capabilities of company B’s resources can be used.<br />
Costs: Increase due to costs for additional resources (e.g., more<br />
alignments needed with all stakeholders).<br />
Benefits: Increase of company A’s BCs due to positive impact of<br />
additional core competencies.<br />
Costs: Increase as firm A’s employees need to be trained in B’s core<br />
competencies.<br />
Benefits: Increase of company A’s BC due to strengths of company<br />
B’s partner network.<br />
Costs: Increase due to costs for interacting with more partners (e.g.,<br />
communication efforts).<br />
Benefits: n/a<br />
Costs: Change due to changing cost structures (e.g., changes in the<br />
wage level <strong>and</strong> the exchange rates will impact the cost structure of<br />
the BC).<br />
Benefits: Change in cash flows due to changing revenue structures<br />
(e.g., switch from license-based payment to pay per usage results in<br />
short-term revenue losses <strong>and</strong> contributes to more regular cash flows<br />
in the long-run).<br />
Costs: n/a<br />
566
Bart-Jan van Putten <strong>and</strong> Markus Schief<br />
3.3 Business cases affecting business models<br />
Similar to a BM change affecting BCs, BCs may affect the BM. There are at least two ways in which<br />
this is possible. First, the analysis of existing BCs can provide insight in the better performing parts of<br />
the business. When merging two companies, the goal is to combine the best of both businesses, but<br />
potential synergies are hard to predict <strong>and</strong> achieve. However, BCs can be used as a basis for synergy<br />
analysis on a more operational level. By comparing BCs from both companies, benchmarks <strong>and</strong><br />
performance rankings can be derived. Based on those rankings, further analyses can be started.<br />
While the well performing BCs can identify best practices, the lesser ones can identify those practices<br />
that should not be continued. The conclusions from the BC analyses may then trigger an adaptation<br />
of the BM.<br />
The second type of effect of BCs on a BM occurs when <strong>using</strong> BCs to simulate the effects of a certain<br />
BM before the BM is implemented in the organization. As Osterwalder et al. (2005) put it: “Simulating<br />
<strong>and</strong> testing business models is a manager’s dream.” For example, in the post-M&A phase the<br />
resulting BM is usually subject to analyses <strong>and</strong> discussions. Often some alternatives are proposed<br />
<strong>and</strong> a decision needs to be made. E.g., if redundant products exist in terms of the BM value<br />
configuration, a decision needs to be made if one product should be dropped for the sake of the other<br />
or if both products will remain in the portfolio. For example, in PeopleSoft’s takeover by Oracle, the<br />
redundant PeopleSoft products remained in the portfolio (Buxmann et al. 2008). Table 4 presents<br />
some exemplary conclusions that may be derived from BC analysis <strong>and</strong> may trigger BM adaptation.<br />
Table 4: Examples of BC analysis affecting the BM<br />
Business Model Building<br />
Blocks<br />
Exemplary conclusions due to BC analysis<br />
Value Proposition A certain product area offers high ROIs.<br />
Target Customer A particular target customer segment creates strong revenues.<br />
Distribution Channel Some distribution channels are more efficient, i.e. create the same revenue with<br />
less costs.<br />
Relationship A particular way how to deal with customers is superior to others.<br />
Value Configuration Certain activities <strong>and</strong> resources outperform other ones in the internal value<br />
chain.<br />
Core Competency A specific competency of involved colleagues (such as very intensive<br />
relationship to the customers) drives performance.<br />
Partner Network One dedicated partnership supports a strong performance of a BC.<br />
Cost Structure Offshoring parts of product development increases overall costs.<br />
Revenue Model Pay-per-use contracts yield better returns on the long run than initial licensebased<br />
fees.<br />
4. Conclusions <strong>and</strong> outlook<br />
The agility of companies can be increased when implementing merged or changed business models<br />
in the organization <strong>and</strong> when <strong>using</strong> business cases to determine if it is time to change the business<br />
model. This study clarifies the relation between business models, as an implementation of a<br />
company’s strategy, <strong>and</strong> business cases, as an abstraction of a company’s operations. The relations<br />
are analyzed from a static as well as a dynamic point of view by means of inductive reasoning <strong>and</strong><br />
literature review. The main contribution of this paper is the relation of two common concepts, which<br />
are often implicitly used <strong>and</strong> related in practice, but which’ relations had not been described explicitly<br />
in literature. Some implications can be found in Table 5. Future work should test the validity of the<br />
proposed relations in practice, e.g., in specific industries <strong>and</strong> in the context of different influencing<br />
factors such as M&A. Moreover, it should be investigated how managers can implement a continuous<br />
BM-BC alignment process in their companies <strong>and</strong> how software tools can be designed to support this<br />
process (Figure 1).<br />
Table 5: Possible actions after a BM or BC change<br />
High<br />
performance<br />
Low<br />
performance<br />
Good alignment Bad alignment<br />
Keep/exp<strong>and</strong> BC After BM change: will performance remain?<br />
After BC change: redesign BM to focus on this<br />
area?<br />
Can we improve the performance of the Stop projects associated with BC<br />
BC?<br />
567
Bart-Jan van Putten <strong>and</strong> Markus Schief<br />
Figure 1: Approach for the alignment of BM <strong>and</strong> BCs<br />
Acknowledgements<br />
The work presented in this paper was performed in the context of the SemProM project<br />
(www.semprom.org, contract 01IA08002) <strong>and</strong> the Software-Cluster project SWINNG (www.softwarecluster.org,<br />
contract 01|C10S05), both funded by the German Ministry for Education <strong>and</strong> Research<br />
(BMBF).<br />
References<br />
Afuah, A. & Tucci, C., 2003. Internet Business Models <strong>and</strong> Strategies, Boston, MA, USA: McGraw-Hill.<br />
Al-Debei, M.M. & Avison, D., 2010. Developing a Unified Framework of the BusinessModel Concept. European<br />
Journal of <strong>Information</strong> Systems, 19, pp.359-376.<br />
Amit, R. & Zott, C., 2001. Value Creation in e-Business. Strategic <strong>Management</strong> Journal, 22(6-7), pp.493-520.<br />
Andersson, B. et al., 2006. Towards a Reference Ontology for Business Models. In 25th International Conference<br />
on Conceptual Modeling. Tucson, AZ, USA.<br />
Bacon, J., 1992. The Use of Decision Criteria in Selecting <strong>Information</strong> Systems/Technology Investments. MIS<br />
Quarterly, 16(3), pp.335-353.<br />
Bambury, P., 1998. A Taxonomy of Internet Commerce. First Monday, 3(10).<br />
Brews, P.J. & Tucci, C., 2003. Building Internet Generation Companies: Lessons from the Front Lines of the Old<br />
Economy. Academy of <strong>Management</strong> Executive, 17(4).<br />
Buxmann, P., Diefenbach, H. & Hess, T., 2008. Die Softwareindustrie: Ökonomische Prinzipien, Strategien,<br />
Perspektiven, Berlin Heidelberg: Springer-Verlag.<br />
Cardin, L. et al., 2007. The Components of a Quality Business Case, Forrester Research, Inc. Available at:<br />
http://www.forrester.com/go?docid=42164.<br />
Casadesus-Masanell, R. & Ricart, J.E., 2010. From Strategy to Business Models <strong>and</strong> onto Tactics. Long Range<br />
Planning, 43, pp.195-215.<br />
Chou, T.-Y., Chou, S.-cho T. & Tzeng, G.-H., 2006. Evaluating IT/IS Investments: A Fuzzy Multi-Criteria Decision<br />
Model Approach. European Journal of Operational Research, 173(3), pp.1026-1046.<br />
Demil, B. & Lecocq, X., 2010. Business Model Evolution: In Search of Dynamic Consistency. Long Range<br />
Planning, 43, pp.227-246.<br />
Escobar-Perez, B., 1998. <strong>Information</strong> Systems Investment Decisions in Business Practice: The Spanish Case.<br />
European Journal of <strong>Information</strong> Systems, 7(3), pp.202-209.<br />
568
Bart-Jan van Putten <strong>and</strong> Markus Schief<br />
Farbey, B., L<strong>and</strong>, F. & Targett, D., 1993. How to Assess Your IT Investment: a Study of Methods <strong>and</strong> Practice,<br />
Oxford: Butterworth-Heinemann.<br />
Farbey, B., L<strong>and</strong>, F. & Targett, D., 1999a. IS Evaluation: A Process for Bringing Together Benefits, Costs <strong>and</strong><br />
Risks. In W. Currie & B. Galliers, eds. Rethinking <strong>Management</strong> <strong>Information</strong> Systems: An Interdisciplinary<br />
Perspective. Oxford, UK: Oxford University Press, pp. 204-228.<br />
Farbey, B., L<strong>and</strong>, F. & Targett, D., 1999b. Moving IS Evaluation Forward: Learning Themes <strong>and</strong> Research<br />
Issues. The Journal of Strategic <strong>Information</strong> Systems, 8(2), pp.189-207.<br />
Fenn, J. & Raskino, M., 2008. Mastering the Hype Cycle, Harvard Business Press.<br />
Gambles, I., 2009. Making the Business Case - Proposals that Succeed for Projects that Work, Farnham,<br />
Engl<strong>and</strong>: Gower.<br />
Gliedman, C. et al., 2004. Key Elements in an IT Business Case, Forrester Research, Inc. Available at:<br />
http://www.forrester.com/go?docid=34046.<br />
Gordijn, J. & Akkermans, H., 2003. Value Based Requirements Engineering: Exploring Innovative e-Commerce<br />
Ideas. Requirements Engineering Journal, 8(2), pp.114-134.<br />
Gordijn, J., Osterwalder, A. & Pigneur, Y., 2005. Comparing Two Business Model Ontologies for Designing e-<br />
Business Models <strong>and</strong> Value Constellations. In 18th Bled eConference eIntegration in Action. Bled, Slovenia.<br />
Gruber, T.R., 1993. A Translation Approach to Portable Ontology Specifications. <strong>Knowledge</strong> Acquisition, 5(2),<br />
pp.199-220.<br />
Irani, Z., 2002. <strong>Information</strong> Systems Evaluation: Navigating Through the Problem Domain. <strong>Information</strong> &<br />
<strong>Management</strong>, 40(1), pp.11 - 24.<br />
Johnson, M.W., Christensen, C.M. & Kagermann, H., 2008. Reinventing Your Business Model. Harvard Business<br />
Review.<br />
Jones, M.C. & Beatty, R.C., 1998. Towards the Development of Measures of Perceived Benefits <strong>and</strong><br />
Compatibility of EDI: A Comparative Assessment of Competing First Order Factor Models. European<br />
Journal of <strong>Information</strong> Systems, 7(3), pp.210-220.<br />
Joshi, K. & Pant, S., 2008. Development of a Framework to Assess <strong>and</strong> Guide IT Investments: An Analysis<br />
Based on a Discretionary-M<strong>and</strong>atory Classification. International Journal of <strong>Information</strong> <strong>Management</strong>, 28(3),<br />
pp.181-193.<br />
Kovar, J.F., 2010. Oracle Cuts Former Sun Partners From Maintenance Renewals Business. CRN. Available at:<br />
http://www.crn.com/news/channel-programs/227700450/oracle-cuts-former-sun-partners-frommaintenance-renewals-business.htm.<br />
Lindner, M.A. et al., 2010. Cloud Economics: Dynamic Business Models for Business on Dem<strong>and</strong>. International<br />
Journal of Business <strong>Information</strong> Systems, 5(4), pp.373-392.<br />
MacInnes, Ian, 2005. Dynamic Business Model Framework for Emerging Technologies. International Journal of<br />
Services Technology <strong>and</strong> <strong>Management</strong>, 6(1), pp.3-19.<br />
Mahadevan, B., 2000. Business Models for Internet-based e-Commerce: An Anatomy. California <strong>Management</strong><br />
Review, 42(4), pp.55-69.<br />
Mcauley, L., Doherty, N. & Keval, N., 2002. The Stakeholder Dimension in <strong>Information</strong> Systems Evaluation.<br />
Journal of <strong>Information</strong> Technology, 17(4), pp.241-255.<br />
Mirani, R. & Lederer, A.L., 1998. An Instrument for Assessing the Organizational Benefits of IS Projects. Decision<br />
Sciences, 29(4), pp.803-838.<br />
Morris, M., Schindehutte, M. & Allen, J., 2005. The Entrepeneur’s Business Model: Toward a Unified Perspective.<br />
Journal of Business Research, 58(6), pp.726-735.<br />
Osterwalder, A., Pigneur, Y. & Tucci, C.L., 2005. Clarifying Business Models: Origins, Present, <strong>and</strong> Future of the<br />
Concept. Communications of the Association for <strong>Information</strong> Systems, 16(1), pp.1-25.<br />
de Reuver, M., Bouwman, H. & MacInnes, I, 2007. What Drives Business Model Dynamics? A Case Survey. In<br />
8th World Congress on the <strong>Management</strong> of eBusiness (WCMeB). Toronto, Ontario, Canada.<br />
Ross, J.W. & Beath, C.M., 2002. Beyond the Business Case: New Approaches to IT Investment. MIT Sloan<br />
<strong>Management</strong> Review, 43(2), pp.51-59.<br />
Ryan, S.D. & Harrison, D.A., 2000. Considering Social Subsystem Costs <strong>and</strong> Benefits in <strong>Information</strong> Technology<br />
Investment Decisions: A View from the Field on Anticipated Payoffs. Journal of <strong>Management</strong> <strong>Information</strong><br />
Systems, 16(4), pp.11-40.<br />
Timmers, P., 1998. Business Models for Electronic Markets. Journal on Electronic Markets, 8(2), pp.3-8.<br />
Vaccaro, V.L. & Cohn, D.Y., 2004. The Evolution of Business Models <strong>and</strong> Marketing Strategies in the Music<br />
Industry. International Journal on Media <strong>Management</strong>, 6(1/2), pp.46-58.<br />
Ward, J.M., 1990. A Portfolio Approach to Evaluating <strong>Information</strong> Systems Investments <strong>and</strong> Setting Priorities.<br />
Journal of <strong>Information</strong> Technology, 5(4), pp.222-231.<br />
Ward, J., Daniel, E. & Peppard, J., 2008. Building Better Business Cases for IT Investments. MIS Quarterly<br />
Executive, 7(1), pp.1-15.<br />
Ward, J., Taylor, P. & Bond, P., 1996. Evaluation <strong>and</strong> Realization of IS/IT Benefits: An Empirical Study of Current<br />
Practice. European Journal of <strong>Information</strong> Systems, 4, pp.214-225.<br />
Weill, P. & Vitale, M., 2002. What IT Infrastructure Capabilities are Needed to Implement E-Business Models?<br />
MIS Quarterly, 1(1), pp.17-34.<br />
Weiner, N., Renner, T. & Kett, H., 2010. Geschäftsmodelle im Internet de Dienste, Fraunhofer IAO.<br />
http://www.itbusinessmodels.org/downloads/weiner_renner_kett_2010_geschaeftsmodelle.pdf.<br />
569
Evaluation of Error <strong>Management</strong> in Health <strong>Information</strong><br />
Systems: A Review<br />
Mohamad Norzamani Sahroni 1, 2 <strong>and</strong> Maryati Mohd Yusof 1<br />
1<br />
National University of Malaysia (Universiti Kebangsaan Malaysia), Bangi,<br />
Malaysia<br />
2<br />
Universiti Teknologi MARA, Shah Alam, Malaysia<br />
zamani@tmsk.uitm.edu.my<br />
mmy@ftsm.ukm.my<br />
Abstract: In a complex environment such as health care, the occurrence of error is inevitable but it is preventable<br />
with early pre-emptive action. This paper discusses the evaluation of errors related to pre <strong>and</strong> post Health<br />
<strong>Information</strong> Systems (HIS) adoption in health care. Various studies in medical informatics show concern on errors<br />
in health care delivery <strong>and</strong> advocate the use of HIS as a means to reduce the error. In general, the evaluation of<br />
medical error in health care can be viewed from two states of circumstances. The first state is related to error that<br />
occurs prior to HIS adoption <strong>and</strong> the second state corresponds to error identified after HIS implementation.<br />
However, the extent of error reduction that can be associated to HIS implementation is subtle. Instead, the use of<br />
HIS has unintended consequences that fosters new error. Thus, it is important to evaluate how HIS outcome<br />
reduced existing error or nurtures new one in clinical process. With regards to the outcome, this research also to<br />
seek identify factor that contributes to medical error. Overall, literature in medical error highlight human as the<br />
major contributing factor to error, apart from technological <strong>and</strong> organizational factors. However, individual is just a<br />
part of a multifaceted health care environment; therefore, it is relevant to investigate other factors that relate or<br />
cause the human error, such as the complexity of organizational process. We also aim to identify potential<br />
intervention that can prevent error from re-occurring. Currently, there are a number of guidelines <strong>and</strong> frameworks<br />
that focus on medical error. Each of these frameworks has its own strength <strong>and</strong> limitation according to its context<br />
towards patient safety. Therefore, our research aims to propose a comprehensive framework on error<br />
management in HIS that could inform decision making to assess <strong>and</strong> mitigate errors prior <strong>and</strong> subsequent to HIS<br />
implementation.<br />
Keywords: evaluation, error, health information systems, review<br />
1. Introduction<br />
Studies in medical informatics show concern on errors in health care delivery. Medical error in our<br />
research context is referred to as “an injury caused by medical management rather than the<br />
underlying condition of patient’ which is contributed to big proportion of adverse event in health care<br />
(Kohn et al. 2000). Therefore, Health <strong>Information</strong> Systems (HIS) is advocated to reduce medical error<br />
as well as to provide better decision making for patient safety <strong>and</strong> cost effective measures. However,<br />
the recent study by (Liu et al. 2011) described that the adoption of HIS remains comparatively slow<br />
due to usability <strong>and</strong> cultural barriers. Earlier, Zapf (1992) usability as type of error associates with<br />
computers <strong>and</strong> particularly with HIS (Borycki <strong>and</strong> Kushniruk 2005). It shows that while HIS aims to<br />
reduce medical error, it also nurtures new one. The occurrence of error shows that patient health<br />
might be threatened by the failure of health care systems <strong>and</strong> to certain extent it can be fatal (Han et<br />
al. 2005).<br />
Error occurred in complex environment such as health care is inevitable. However, error is<br />
preventable if early pre-emptive action is deployed. The following section discusses the occurrence of<br />
error in HIS. Section 3 reviews <strong>and</strong> highlights issues associated to error in HIS. Finally, a conclusion<br />
<strong>and</strong> future work discussed in section 4 on proposing error management model in HIS.<br />
2. Medical error in HIS<br />
Error in health care can be viewed from two states of circumstances; before <strong>and</strong> after HIS adoption.<br />
Prior HIS adoption, the former error occurred in numerous occasions are; during diagnosis due to<br />
incomplete patient history, in prescription such as miscalculation of drug dosage <strong>and</strong> frequency, <strong>and</strong><br />
in transcribing doctor’s h<strong>and</strong>written prescriptions that lead to dispensing wrong drugs to the patient.<br />
Errors occurred in these medical processes can be reduced by implementing HIS such as Computer<br />
Provider Order Entry (CPOE) (Kohn et al. 2000) for better decision making <strong>and</strong> patient safety.<br />
The latter outcome of HIS associated with error after its adoption can be viewed from two<br />
perspectives; the success of HIS in reducing error <strong>and</strong> generating new error subsequent to its<br />
adoption as discusses in section 2.1.1 <strong>and</strong> 2.1.2.
Mohamad Norzamani Sahroni <strong>and</strong> Maryati Mohd Yusof<br />
2.1.1 Error reduced by HIS<br />
There were number of quantitative studies that described the realization of HIS in reducing errors.<br />
Anderson (1997) from his simulation found that number of adverse drug event <strong>and</strong> length of hospital<br />
stay reduced up to 25 percent <strong>using</strong> Clinical <strong>Information</strong> Systems (CIS) compared to manual systems.<br />
Meanwhile Bates et al. (1998), from their before-<strong>and</strong>-after comparison study proved that more than 50<br />
percent error reduction in all medication processes after the introduction of Computerized Physician<br />
Order Entry (CPOE) in actual setting of two large tertiary hospitals. A number of other studies also<br />
establish the success of HIS in reducing medical errors such (Larum et al. 2001, Hersh 2002, Chung<br />
et al. 2003, Dobson 2003, Potts et al. 2004, Kenagy 2007, Van Doormaal et al. 2009, Poon et al.<br />
2010). A systematic reviewed paper by Kaushal et al. (2003) <strong>and</strong> quasi experimental studied by Poon<br />
(2010) best concluded that the use of HIS significantly reduce medical error rates if not to eliminate all<br />
(Dror 2010).<br />
2.1.2 Error nurtured by HIS<br />
Whilst HIS is a tool to increase patient safety <strong>and</strong> to reduce medical error in healthcare, other studies<br />
revealed undesirable outcome following to HIS adoption. It is due to reason that HIS will consistently<br />
introduce new mistakes <strong>and</strong> new harm every time its adapt with new workflow <strong>and</strong> environment<br />
because of a new or enhanced system took place (Ash et al. 2004, Campbell et al. 2006). Various<br />
studies have been reported that HIS produce unintended adverse consequences (Bell et al. 2004,<br />
Ash et al. 2009, Patel <strong>and</strong> Kane-Gill 2010) after its adoption. Ash et al. (2004) in their qualitative study<br />
found that the implementation of a Patient Care <strong>Information</strong> Systems (PCIS) could actually trigger<br />
new errors that emerge from the process of entering <strong>and</strong> retrieving information, <strong>and</strong> those in the<br />
communication <strong>and</strong> coordination process. Later Ash et al. (2007) <strong>and</strong> (2009) in their mixed method<br />
study, categorized new kind of errors such as juxtaposition errors as one of the eight <strong>and</strong> the nine<br />
types of undesirable consequences. Campbell (2006) also reported the same finding of this<br />
undesirable outcome in HIS. Zhang (2004) <strong>and</strong> Sun et al. (2008) theoretically proposed different<br />
cognitive errors on individuals interactions with HIS. Borycki <strong>and</strong> Kushniruk (2005) through their<br />
simulation discovered more medical errors related to usability problem. Meanwhile, Ammenwerth <strong>and</strong><br />
Shaw (2005) provide a list of typical systems error emerge in HIS such as functional error <strong>and</strong><br />
systems crash that affect the health care processes <strong>and</strong> harm patient. Further, Koppel (2008) added<br />
various possible errors such as wrong medication <strong>and</strong> dose could emerge from the implementation of<br />
Barcoded Medication Administration (BCMA) systems. These scenario gives impression that “errors<br />
can be prevented by designing systems that make it hard for people to do the wrong thing <strong>and</strong> easy<br />
for people to do the right thing” (Kohn et al. 2000) is still questionable.<br />
2.2 The need of evaluation<br />
The evidences of error are symptoms of flawed systems (Newton et al. 2010) <strong>and</strong> that is inadequate<br />
fit the to multifaceted health care processes (Hübner-Bloder <strong>and</strong> Ammenwerth 2009, Ammenwerth et<br />
al. 2010a). Garfield (2009) <strong>and</strong> (Vozikis 2009) explained that many related studies were carried out in<br />
individual medication stages rather than the whole medication process that lead to difficulties to<br />
identify the cause of error occurrence <strong>and</strong> its impact on another medication stages. As an example,<br />
error in dispensing stage could be avoided if error in prescribing stage first identified (Valentin et al.<br />
2009, Van Doormaal et al. 2009). However, study by Garfield et al. (2009) has its limitation which lack<br />
to provide the dearth of medication process that teething problem to recognize the root cause of error.<br />
Thus evaluation in health care cannot be performed from a single <strong>and</strong> linear perspective rather need<br />
thorough analysis because of its complexity (Patel <strong>and</strong> Kane-Gill 2010).<br />
3. Highlight of issues<br />
Based on research background in section 2, this study is intended to highlight three issues related to<br />
error in HIS that further elaborates in the following sub-sections.<br />
3.1 The extent of HIS reduces <strong>and</strong> nurtures error<br />
Despite the latter success of HIS in reducing medical error (Poon et al. 2010), the claim is subtle<br />
(Anderson 1997, Kenagy 2007) <strong>and</strong> has not been demonstrated clearly (Koppel et al. 2005, Koppel et<br />
al. 2008, Ammenwerth et al. 2010b) especially related on the use of common terminology <strong>and</strong><br />
reporting such as type of error that cannot be resolved even after HIS implementation. Study by<br />
Koppel et al. (2005) is the example of work that reports explicitly on type of error occurred but limited<br />
to error on medication process as most other studies reported. The ambiguity of medical error may be
Mohamad Norzamani Sahroni <strong>and</strong> Maryati Mohd Yusof<br />
attributed to lack of underst<strong>and</strong>ing of the evaluation process (Tuten 2009) on the overall medical error<br />
management (Donabedian <strong>and</strong> Bashshur 2003, Hakimzada et al. 2008, Patel <strong>and</strong> Kane-Gill 2010). It<br />
also includes lack of the definition <strong>and</strong> the classification on type of error occurred (Zapf et al. 1992,<br />
Vozikis 2009, Habraken <strong>and</strong> Van Der Schaaf 2010) <strong>and</strong> limited error identification (Esimai 2005,<br />
Koppel et al. 2008, Garfield et al. 2009) of medical processes. Furthermore, it may also contribute to<br />
the difficulty to perform evaluation process (Mohd Yusof 2007) due to the complexity of medical<br />
process (Hübner-Bloder <strong>and</strong> Ammenwerth 2009). So, evaluation of medical error should be allencompassing<br />
in its specific setting if not entirely in the whole complex health care systems in order to<br />
get holistic underst<strong>and</strong>ing on the occurrence of error, <strong>and</strong> how well HIS is integrated <strong>and</strong> supported<br />
medical processes (Garcia-Smith 2007, Hübner-Bloder <strong>and</strong> Ammenwerth 2009). Thus, with a clear<br />
definition <strong>and</strong> classification type of error in HIS, it is expected to underst<strong>and</strong> the extent of HIS<br />
outcome in reducing error as well as nurturing new error in medical process.<br />
3.1.1 Definition of error<br />
Various definitions of error have been applied towards patient safety but there was lack of st<strong>and</strong>ard<br />
definitions <strong>and</strong> taxonomy of medical errors (Vozikis 2009) especially to have a definition of error that<br />
associates with HIS. This situation bring more issues to this area of study that lead to unclear <strong>and</strong><br />
uniform of medical error reporting. Error in general is defined as “failure of planned actions to achieve<br />
their desired goal” (Reason 1995). Cosby (2003) defines error as “a failure to meet some realistic<br />
expectation (an action, process, diagnosis, or endpoint. Therefore, this research context will define<br />
error in HIS is referred to the failure of HIS to attain its desired goal in reducing error <strong>and</strong>/or<br />
preventing new error to occur in medical process because of following wrong or incomplete planned<br />
action or deviating from its original planned action. Failure in the given definition is referring to the<br />
partial failure of HIS instead of total failure where there might be certain goal is not attained or HIS is<br />
produced undesirable outcome (Heeks 2006) such as new error.<br />
3.1.2 Type of error<br />
Literature shows that there are lacks of uniform classification on type of medical error (Vozikis 2009).<br />
This may be resulting of unclear type of error reduces or nurtures in HIS. Table 1 summarizes<br />
different classification on type of medical error.<br />
According to Leape (1993), type of medical error can be viewed from four types of diagnostic,<br />
treatment, preventive <strong>and</strong> other types. This kind of classification is based on general medical<br />
management process where the sub type of error might be changed according to setting <strong>and</strong> context.<br />
Whilst (Koppel et al. 2005) used themes to describe its two types of error; information error <strong>and</strong> HIS<br />
interface flaws. Koppel et al. study is based on the identified 22 previously unexplored medicationerror<br />
in CPOE.<br />
Meanwhile Reason’s (1995) Theory of Human Error proposed that medical error is divided into two<br />
types; slips <strong>and</strong> laps, <strong>and</strong> mistakes. Slips <strong>and</strong> lapse means the failure of the execution of planned<br />
action <strong>and</strong> mistake is the failure of the plan of intended goal even though the execution is faultless.<br />
Besides, Zhang et al. (2004) also proposed two major type cognitive taxonomy of medical error due to<br />
human factor associates with technology; mistakes <strong>and</strong> slips. Mistake is an error occurs because of<br />
the person has incorrect or incomplete knowledge to perform certain task. Meanwhile if error occurs<br />
with the person has correct knowledge to perform certain task, it was a slip. Each type then is divided<br />
into execution <strong>and</strong> evaluation where evaluation is the result of the action of executions. These types<br />
are based on the combination theories of Human Error <strong>and</strong> Norman’s Human Action. Further both<br />
Reason (1995) <strong>and</strong> Zhang et al. (2004) discussed important aspect of human error as well as<br />
contributing factor to human error. Both Reason’s (1995) <strong>and</strong> Zhang et al. (2004) classification looking<br />
consistent to be applied in different setting <strong>and</strong> context of evaluation in health care. In addition, both<br />
studies also highlighted factors associated to the occurrences of medical error. However, the limitation<br />
lingers on the cognitive of human factors.<br />
However, the classification type of error provided by Zapf et al. (1992) is much easier to apply. Zapf et<br />
al. identified functionality to represent technical error, usability to represent human error that<br />
associates with systems, interaction to represent individual communication <strong>and</strong> organization process,<br />
<strong>and</strong> inefficiency that also due to human factor because of lack of knowledge to perform optimal action<br />
path or due to habit. These types of error represent comprehensive approach to evaluation.
Table 1: Type of medical error<br />
Mohamad Norzamani Sahroni <strong>and</strong> Maryati Mohd Yusof<br />
Source Type Sub-Type / (Number of Subtype)<br />
(Zhang et al. 2004) Slips<br />
Mistakes<br />
(Reason 1995) Slips <strong>and</strong> Lapse<br />
Mistakes<br />
(Leape et al. 1993) Diagnostic<br />
Treatment<br />
Preventive<br />
Other<br />
(Koppel et al. 2005) <strong>Information</strong> Error<br />
HIS interface flaws<br />
(Zapf et al. 1992) Functionality<br />
Usability<br />
Inefficiency<br />
Interaction<br />
3.2 Contributing factor to medical error<br />
Execution slip<br />
Evaluation slip<br />
Execution mistake<br />
Evaluation mistake<br />
Recognition failures<br />
Attention failures<br />
Memory failures<br />
Selection failures<br />
(four)<br />
(five)<br />
(two)<br />
(two)<br />
(twelve)<br />
(en)<br />
(four)<br />
(four)<br />
(two)<br />
(one)<br />
The finding from the first issue will lead us seek to identify factors that cause error in HIS.<br />
Researchers (Zhang et al. 2004, Aarts et al. 2007, Borycki et al. 2009b) have commonly agreed that<br />
humans are the cause of errors in the medical field either before or after HIS adoption. However, the<br />
blame entirely on the individual is not acceptable because they are just a part of a multifaceted health<br />
care environment that might be another factor that root ca<strong>using</strong> to human error such as the complexity<br />
of organizational process (Woods <strong>and</strong> Cook 2004, Aarts et al. 2007) <strong>and</strong> the technological failure<br />
(Ammenwerth <strong>and</strong> Shaw 2005, Borycki et al. 2010). This claim is in line with George et al. (2004)<br />
where the organization <strong>and</strong> its processes are most attributable to 90 percent of errors or defects<br />
related to quality of products (HIS) or services rather than looking into human factors per se. Hence, it<br />
is necessary to underst<strong>and</strong> <strong>and</strong> identify the source of error by assessing the entire specific<br />
organizational process as well as to identify potential solution to reduce medical error in HIS (Cosby<br />
2003, Borycki et al. 2009b). Currently there is a model known as Eindhoven Classification Model<br />
(ECM) that has been applied by some studies (Kaplan et al. 1998, Habraken <strong>and</strong> Van Der Schaaf<br />
2010) that described factors related to error; human, organizational <strong>and</strong> technical. However the<br />
studies are not specifically directed to HIS. By identifying factors that contribute to medical error, it is<br />
expected to gain optimal HIS implementation in health care (Poon et al. 2010) by preventing error or<br />
new one to occur. Thus it is important to identify factors that contribute to medical error in HIS before<br />
necessary prevention strategy is applied.<br />
3.3 Framework to evaluate medical error<br />
Currently there are guidelines <strong>and</strong> frameworks developed applicable to medical error. Table 2<br />
represents frameworks with its own strength <strong>and</strong> benefit according to its context. Some guidelines are<br />
suitable to perform after an error occurred but are not adequate enough to take advanced precaution<br />
in preventing error to occur as suggested by (Reason 2000, Borycki et al. 2009a). Even though the<br />
other framework provides error detection, it also has a drawback which is limited to human <strong>and</strong><br />
workflow factors. The immediate framework related to medical error in HIS also has limitation where<br />
they focus on organizational view rather than operational in health care setting. Therefore with the<br />
varieties of strength <strong>and</strong> limitation in presented guidelines <strong>and</strong> frameworks, our research is to propose<br />
a comprehensive framework on error management in HIS that could inform decision making to assess<br />
errors prior <strong>and</strong> subsequent to HIS adoption for finest HIS implementation. Thus, it is important to<br />
have effective evaluation method that assists decision making to prevent medical error.
Table 2: Framework on medical error<br />
Mohamad Norzamani Sahroni <strong>and</strong> Maryati Mohd Yusof<br />
Framework/Source Objective Advantage/Feature Limitation<br />
National Coordinating<br />
Council on Medication<br />
Error Reporting <strong>and</strong><br />
Prevention<br />
(NCC-MERP<br />
1998,2011)<br />
Joint Commission<br />
International (JCI<br />
2011) (Chang et al.<br />
2005)<br />
International<br />
Classification for<br />
Patient Safety<br />
(TWAFPSDG et al.<br />
2009)<br />
Framework for<br />
Diagnosing<br />
Technology-Induced<br />
Errors<br />
(Borycki et al. 2009)<br />
Provides st<strong>and</strong>ard<br />
language <strong>and</strong> item of<br />
error reporting<br />
Presents goal of patient<br />
safety with general<br />
guidelines for all medical<br />
process<br />
Develops uniform<br />
classification of patient<br />
safety<br />
Identify systemic factors<br />
of error<br />
4. Conclusion <strong>and</strong> discussion on future work<br />
All health care<br />
organization use common<br />
format of error reporting<br />
Health care organization<br />
could take necessary<br />
action <strong>using</strong> provided<br />
guideline to avoid the<br />
occurrence of error<br />
Comprehensive guideline<br />
from error detection to<br />
error mitigation<br />
Conceptual framework<br />
that enable to identify<br />
systemic measures<br />
The checklist was<br />
designed purposely for<br />
medication error<br />
It is difficult to provide<br />
advance precaution<br />
action towards error to re<br />
occur<br />
Not specific to HIS<br />
General guideline without<br />
specific steps to<br />
implement.<br />
Not specific to HIS<br />
A conceptual framework<br />
without specific steps to<br />
implement.<br />
Limited to human <strong>and</strong><br />
workflow factors<br />
Not specific to HIS<br />
Focus on organizational<br />
view rather than<br />
operational in health care<br />
setting<br />
This paper has highlighted three issues related to error in HIS; the extent of HIS outcome in reducing<br />
<strong>and</strong> nurturing error, contributing factors to error <strong>and</strong> the limitation of existing framework on error<br />
management. In addition, the classification type of error is also other important issues that have been<br />
raised to specifically highlight error in HIS. These issues are the chains of initial problems to be solved<br />
before a comprehensive model of error management could be proposed.<br />
Our next step is to justify several approaches to model development. Project management<br />
methodology can be considered since the success of HIS adoption relies heavily on how well health<br />
care organization manages HIS project. Some project management features can be associated with<br />
the blunt error of HIS (Reason 1990, Borycki et al. 2009b). Moreover, risk management that has been<br />
applied in project management promised more predictive <strong>and</strong> preventing measures of error to occur in<br />
HIS in providing clear steps for error identification prior to HIS implementation (Reason 2000, Sun et<br />
al. 2008, Borycki et al. 2009a). A number of studies also advocated the application of risk<br />
management as a method on error management in HIS (Koppel et al. 2005, Hales <strong>and</strong> Pronovost<br />
2006, Heeks 2006, Aarts et al. 2007, Borycki et al. 2009a).The proposed model of error management<br />
could provide information on potential error occurrence <strong>and</strong> respective action.<br />
We will employ subjectivist or qualitative method to evaluation; case study will be carried out as a<br />
method to test the propose error management model. Prior to that, expert review will be applied to get<br />
an agreement on certain issues be conducted in order to identify factors contribute to medical error in<br />
HIS in retrospective study.<br />
References<br />
Aarts, J., Ash, J. & Berg, M. (2007) "Extending the underst<strong>and</strong>ing of computerized physician order entry:<br />
Implications for professional collaboration, workflow <strong>and</strong> quality of care", International Journal of Medical<br />
Informatics, 76, S4-S13.<br />
Ammenwerth, E., Breu, R. & Paech, B. (2010a) User-Oriented Quality Assessment of IT-Supported Healthcare<br />
Processes – A Position Paper.<br />
Ammenwerth, E., Schnell-Inderst, P. & Siebert, U. (2010b) "Vision <strong>and</strong> challenges of Evidence-Based Health<br />
Informatics: A case study of a CPOE meta-analysis", International Journal of Medical Informatics, 79, e83e88.<br />
Ammenwerth, E. & Shaw, N. (2005) "Bad Health Informatics Can Kill – Is Evaluation the Answer?", Methods Inf<br />
Med, 44, 1-3.<br />
Anderson, J. G. (1997) "Clearing the Way for Physicians' Use of Clinical <strong>Information</strong> Systems", Communications<br />
of The ACM, 40.
Mohamad Norzamani Sahroni <strong>and</strong> Maryati Mohd Yusof<br />
Ash, J., Sittig, D., Poon, E., Guappone, K., Campbell, E. & Dykstra, R. (2007) "The extent <strong>and</strong> importance of<br />
unintended consequences related to computerized provider order entry", Journal of the American Medical<br />
Informatics Association, 14, 415-423.<br />
Ash, J. S., Berg, M. & Coiera, E. (2004) "Some Unintended Consequences of <strong>Information</strong> Technology in Health<br />
Care: The Nature of Patient Care <strong>Information</strong> System-related Errors", Journal of American Medical<br />
Informatics Association, 11, 9.<br />
Ash, J. S., Sittig, D. F., Dykstra, R., Campbell, E. & Guappone, K. (2009) "The unintended consequences of<br />
computerized provider order entry: Findings from a mixed methods exploration", International Journal of<br />
Medical Informatics, 78, S69-S76.<br />
Bates, D., Leape, L., Cullen, D., Laird, N., Petersen, L., Teich, J., Burdick, E., Hickey, M., Kleefield, S. & Shea, B.<br />
(1998) "Effect of computerized physician order entry <strong>and</strong> a team intervention on prevention of serious<br />
medication errors", Jama, 280, 1311.<br />
Bell, D., Marken, R., Meili, R., Wang, C., Rosen, M., Brook, R. & RAND, E. (2004) "Recommendations for<br />
comparing electronic prescribing systems: results of an expert consensus process", Health Affairs.<br />
Borycki, E. & Kushniruk, A. (2005) "Identifying <strong>and</strong> preventing technology-induced error <strong>using</strong> simulations:<br />
application of usability engineering techniques", Healthcare Quarterly, 8, 99-105.<br />
Borycki, E., Kushniruk, A. & Brender, J. (2010) "Theories, models <strong>and</strong> frameworks for diagnosing technologyinduced<br />
error", Studies in health technology <strong>and</strong> informatics, 160, 714.<br />
Borycki, E., Kushniruk, A., Keay, E., Nicoll, J., Anderson, J. & Anderson, M. (2009a) "Toward an Integrated<br />
Simulation Approach for Predicting <strong>and</strong> Preventing Technology-Induced Errors in Healthcare: Implications<br />
for Healthcare Decision-Makers", Healthcare Quarterly, 12, 90.<br />
Borycki, E., Kushniruk, A., Keay, L. & Kuo, A. (2009b) "A framework for diagnosing <strong>and</strong> identifying where<br />
technology-induced errors come from", Studies in health technology <strong>and</strong> informatics, 148, 181.<br />
Campbell, E., Sittig, D., Ash, J., Guappone, K. & Dykstra, R. (2006) "Types of unintended consequences related<br />
to computerized provider order entry", Journal of the American Medical Informatics Association, 13, 547-<br />
556.<br />
Chung, K., Choi, Y. B. & Moon, S. (2003) "Toward Efficient Medication Error Reduction: Error-Reducing<br />
<strong>Information</strong> <strong>Management</strong> Systems", Journal of Medical Systems, 27, 553-560.<br />
Cosby, K. S. (2003) "A framework for classifying factors that contribute to error in the emergency department",<br />
Annals of Emergency Medicine, 42, 815-823.<br />
Dobson, R. (2003) "US body reviews errors in emergency departments", BMJ, 326, 620.<br />
Donabedian, A. & Bashshur, R. (2003) An introduction to quality assurance in health care, Oxford University<br />
Press, USA.<br />
Dror, I. (2010) "A novel approach to minimize error in the medical domain: Cognitive neuroscientific insights into<br />
training*", Medical Teacher, 1-5.<br />
Esimai, G. (2005) "Lean Six Sigma reduces medication errors", Quality progress, 38, 51-57.<br />
Garcia-Smith, D. (2007) Testing A Model to Predict Successful CIS. The University of Arizona.<br />
Garfield, S., Barber, N., Walley, P., Willson, A. & Eliasson, L. (2009) "Quality of medication use in primary care-<br />
mapping the problem, working to a solution: a systematic review of the literature", BMC medicine, 7, 50.<br />
George, M., Rowl<strong>and</strong>s, D. & Kastle, B. (2004) What is Lean Six Sigma?, McGraw-Hill Professional.<br />
Habraken, M. M. P. & Van Der Schaaf, T. W. (2010) "If only....: Failed, missed <strong>and</strong> absent error recovery<br />
opportunities in medication errors", Quality <strong>and</strong> safety in health care, 19, 37-41.<br />
Hakimzada, A. F., Green, R. A., Sayan, O. R., Zhang, J. & Patel, V. L. (2008) "The Nature <strong>and</strong> Occurrence of<br />
Registration Errors in the Emergency Department", International Journal of Medical Informatics, 7, 169–175.<br />
Hales, B. M. & Pronovost, P. J. (2006) "The checklist--a tool for error management <strong>and</strong> performance<br />
improvement", Journal of Critical Care, 21, 231-235.<br />
Han, Y., Carcillo, J., Venkataraman, S., Clark, R., Watson, R., Nguyen, T., Bayir, H. & Orr, R. (2005)<br />
"Unexpected increased mortality after implementation of a commercially sold computerized physician order<br />
entry system", Pediatrics, 116, 1506.<br />
Heeks, R. (2006) "Health information systems: Failure, success <strong>and</strong> improvisation", International Journal of<br />
Medical Informatics, 75, 125-137.<br />
Hersh, W. R. (2002) "Medical Informatics Improving Health Care Through <strong>Information</strong>", American Medical<br />
Association, 288, 4.<br />
Hübner-Bloder, G. & Ammenwerth, E. (2009) "Key Performance Indicators to Benchmark Hospital <strong>Information</strong><br />
Systems – A Delphi Study", Methods Inf Med, 48, 11.<br />
Kaplan, H., Battles, J. B., Van der Schaaf, T. W., Shea, C. E. & Mercer, S. Q. (1998) "Identification <strong>and</strong><br />
classification of the causes of events in transfusion medicine", Transfusion, 38, 1071-1081.<br />
Kaushal, R., Shojania, K. G. & Bates, D. W. (2003) "Effects of Computerized Physician Order Entry <strong>and</strong> Clinical<br />
Decision Support Systems on Medication Safety: A Systematic Review", Archives of Internal Medicine, 163,<br />
1409-1416.<br />
Kenagy, J. J. (2007) Computerized Provider Order Entry in Multispecialty Ambulatory Care Practices: A<br />
Quantitative Evaluation of <strong>Information</strong> Systems Success. PhD, Capella University.<br />
Kohn, L., Corrigan, J. & Donaldson, M. (2000) "To err is human: building a safer health system", Washington DC,<br />
196–7.<br />
Koppel, R., Metlay, J. P., Cohen, A. & al., e. (2005) "Role of Computerized Physician Order Entry Systems in<br />
Facilitating Medication Errors", JAMA, 293.
Mohamad Norzamani Sahroni <strong>and</strong> Maryati Mohd Yusof<br />
Koppel, R., Wetterneck, T., Telles, J. L. & Karsh, B.-T. (2008) "Workarounds to Barcode Medication<br />
Administration Systems: Their Occurrences, Causes, <strong>and</strong> Threats to Patient Safety", Journal of the<br />
American Medical Informatics Association, 15, 408-423.<br />
Larum, H., Ellingsen, G. & Faxvaag, A. (2001) "Doctors' use of electronic medical records systems in hospitals:<br />
cross sectional survey", British Medical Journal, 323, 1344.<br />
Leape, L., Lawthers, A., Brennan, T. & Johnson, W. (1993) "Preventing medical injury", QRB. Quality review<br />
bulletin, 19, 144.<br />
Liu, L. S., Shih, P. C. & Hayes, G. R. (2011) Barriers to the adoption <strong>and</strong> use of personal health record systems.<br />
Proceedings of the 2011 iConference. Seattle, Washington: ACM.<br />
Mohd Yusof, M. (2007) The Evaluation of Health <strong>Information</strong> Systems Adoption in Clinical Practices. PhD, Brunel<br />
University.<br />
Newton, R. C., Mytton, O. T., Aggarwal, R., Runciman, W. B., Free, M., Fahlgren, B., Akiyama, M., Farlow, B.,<br />
Yaron, S., Locke, G. & Whittaker, S. (2010) "Making existing technology safer in healthcare", Quality <strong>and</strong><br />
safety in health care, 19, i15-i24.<br />
Patel, G. & Kane-Gill, S. (2010) "Medication Error Analysis: A Systematic Approach", Current drug safety, 5, 2-5.<br />
Poon, E. G., Keohane, C. A., Yoon, C. S., Ditmore, M., Bane, A., Levtzion-Korach, O., Moniz, T., Rothschild, J.<br />
M., Kachalia, A. B., Hayes, J., Churchill, W. W., Lipsitz, S., Whittemore, A. D., Bates, D. W. & G<strong>and</strong>hi, T. K.<br />
(2010) "Effect of Bar-Code Technology on the Safety of Medication Administration", New Engl<strong>and</strong> Journal of<br />
Medicine, 362, 1698-1707.<br />
Potts, A., Barr, F., Gregory, D., Wright, L. & Patel, N. (2004) "Computerized physician order entry <strong>and</strong> medication<br />
errors in a pediatric critical care unit", Pediatrics, 113, 59.<br />
Reason, J. (1995) "Underst<strong>and</strong>ing adverse events: human factors", British Medical Journal, 4, 80.<br />
Reason, J. (2000) "Human error: models <strong>and</strong> management", BMJ, 320, 768.<br />
Reason, J. T. (1990) Human error, Cambridge Univ Pr.<br />
Sun, Z., Shi, X., Liu, F., Xie, H. & Li, Z. (Year) Identification <strong>and</strong> analysis of cognitive errors during the process of<br />
man-machine interaction. In: Automation <strong>and</strong> Logistics, 2008. ICAL 2008. IEEE International Conference<br />
on, 1-3 Sept. 2008 2008. 1458-1462.<br />
Tuten, P. (2009) A model for the evaluation of IS/IT investments. D., Nova Southeastern University.<br />
Valentin, A., Capuzzo, M., Guidet, B., Moreno, R., Metnitz, B., Bauer, P. & Metnitz, P. (2009) "Errors in<br />
administration of parenteral drugs in intensive care units: multinational prospective study", BMJ (Clinical<br />
research ed.), 338.<br />
Van Doormaal, J. E., Van Den Bemt, P. M. L. A., Mol, P. G. M., Zaal, R. J., Egberts, A. C. G., Haaijer-Ruskamp,<br />
F. M. & Kosterink, J. G. W. (2009) "Medication errors: The impact of prescribing <strong>and</strong> transcribing errors on<br />
preventable harm in hospitalised patients", Quality <strong>and</strong> safety in health care, 18, 22-27.<br />
Vozikis, A. (2009) "<strong>Information</strong> management of medical errors in Greece: The MERIS proposal", International<br />
Journal of <strong>Information</strong> <strong>Management</strong>, 29, 15-26.<br />
Woods, D. & Cook, R. (2004) The new look at error, safety, <strong>and</strong> failure: a primer. Technical Report, US Veterans<br />
Association, National Centre for Patient Safety, 2004.<br />
Zapf, D., Brodbeck, F. C., Frese, M., Peters, H. & Prümper, J. (1992) "Errors in working with office computers: A<br />
first validation of a taxonomy for observed errors in a field setting", International Journal of Human<br />
Computer Interaction, 4, 311-311.<br />
Zhang, J., Patel, V. L., Johnson, T. R. & Shortliffe, E. H. (2004) "A cognitive taxonomy of medical errors", Journal<br />
of Biomedical Informatics, 37, 193-204.
Non<br />
Academic<br />
Papers<br />
577
578
<strong>Management</strong> of Waiting List for Surgery <strong>Information</strong><br />
System<br />
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
ACSS – Unidade Central de Gestão de Inscritos para Cirurgia, Lisboa, Portugal<br />
rcristovao@acss.min-saude.pt<br />
pagomes@acss.min-saude.pt<br />
Abstract: SIGIC – Integrated <strong>Management</strong> System of the Waiting List for Surgery is an integrated management<br />
system which promotes the access to hospital surgical services in terms of quality, equal treatment, efficiency<br />
<strong>and</strong> effectiveness pointing to sustainability in National Healthcare System (NHS), process <strong>and</strong> patient<br />
management transparency <strong>and</strong> accountability. It was created due to the existence of a significant number of<br />
patients waiting for treatment for longer than the clinical acceptable times, with ominous consequences not only<br />
for the individuals but also for the society, which led the government to take political actions. It manages all<br />
patients of NHS <strong>and</strong> involves public <strong>and</strong> private healthcare providers of surgical treatment. In 6 years, SIGIC<br />
brought great results to the Portuguese NHS by reducing the national waiting list for surgery in 35% <strong>and</strong> the<br />
waiting time in 62%. IGLIC is the information system that supports <strong>and</strong> controls SIGIC <strong>and</strong> interacts with the<br />
different stakeholders such as public <strong>and</strong> private healthcare providers, regional healthcare administrations, the<br />
central administration of NHS, patients, medical <strong>and</strong> clinical practitioners <strong>and</strong> the government. It provides clinical<br />
<strong>and</strong> administrative information, acting in the different stages <strong>and</strong> parts of SIGIC management process. SIGLIC<br />
must give an appropriate answer to each stakeholder according to their specific functions <strong>and</strong> needs in the NHS,<br />
keeping the necessary restriction to sensitive personal data of patients. For that, SIGLIC was built taking into<br />
account the real requirements of clinical activity in hospitals, based on the interactions between the institution <strong>and</strong><br />
the patient. SIGLIC reports in an innovative way the information for clinical governance, foc<strong>using</strong> on the core<br />
business of health which stems from the interaction between organizations <strong>and</strong> patients, designated by event.<br />
The result of that interaction is the identification <strong>and</strong> classification of the patient health problems approached in<br />
the event by scientific terms, as well as its corresponding actions suggested or applied by health providers,<br />
designated by nosological unit. Another key aspect in SIGLIC is the aggregation of the basic parts of the events<br />
in episodes that represent the set of involvements in the resolution of identified problems <strong>and</strong> in the context of a<br />
defined plan of care. SIGLIC must also possess solid information, related to the integrity of collected data. To<br />
enable this it was implemented a redundant system with different sources permanently checking data quality.<br />
This process is extremely important to guarantee that information in SIGLIC is reliable, in order that the right care<br />
is provided to a given patient, the hospital administration makes the right management decisions <strong>and</strong> the<br />
hospitals have the right funding from NHS, based on the correct information. <strong>Information</strong> is a valuable resource to<br />
make decisions <strong>and</strong> that’s what SIGLIC is about. With SIGLIC, the management process of the national waiting<br />
list for surgery is run with transparency to all players <strong>and</strong> users. It assures equal access <strong>and</strong> quality treatment in<br />
all NHS patients waiting for surgery <strong>and</strong> makes healthcare providers <strong>and</strong> patients responsible for their actions<br />
<strong>and</strong> duties in the process.<br />
Keywords: management, information system, surgery, waiting time, waiting list, ICD<br />
1. SIGIC – framework of SIGLIC<br />
SIGLIC is the supporting information system for SIGIC – Integrated <strong>Management</strong> System of the<br />
Waiting List for Surgery in Portugal, a system which promotes the access to surgical treatment in the<br />
following terms:<br />
Quality (st<strong>and</strong>ards <strong>and</strong> protocols for technical quality of the healthcare services);<br />
Equal treatment (maximum waiting time <strong>and</strong> schedule rules safeguarding medical priority <strong>and</strong><br />
waiting time);<br />
Efficiency <strong>and</strong> effectiveness in the search of sustainability of the National Health System (NHS);<br />
Process (guarantees of alternative choice if waiting time is 75% of the maximum waiting time<br />
established);<br />
Transparency <strong>and</strong> accountability (guarantee of information quality <strong>and</strong> user identification in all<br />
database records).<br />
SIGIC was created due to the existence of a significant number of patients waiting for treatment for<br />
longer than clinical acceptable times, with ominous consequences not only for the individuals but also<br />
for the society, which led the government to take political actions. It manages all patients of NHS<br />
searching for surgical treatment <strong>and</strong> involves all public healthcare providers with surgical services<br />
(58) <strong>and</strong> 60 private healthcare providers with conventions for surgical treatment with the NHS. The<br />
next figure shows the institutional framework of SIGIC.<br />
579
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
SI<br />
GI<br />
C<br />
Figure 1: Institutional framework of SIGIC<br />
SIGIC was born in the Portuguese Ministry of Health as a project <strong>and</strong> it was implemented in all<br />
regions of the continent (autonomous regions such as Madeira <strong>and</strong> Azores are not included). After its<br />
implementation, SIGIC’s management <strong>and</strong> control was transferred to a more permanent structure in<br />
the NHS, the National Administration of NHS - ACSS. The central unit responsible to manage <strong>and</strong><br />
control SIGIC inside ACSS is UCGIC. SIGIC is a vertical system which is very close <strong>and</strong> serves<br />
directly the administration of ACSS <strong>and</strong> the Ministry of Health. The holistic perspective of healthcare<br />
is represented schematically in the following picture, locating SIGIC in its universe.<br />
Figure 2: The holistic perspective of healthcare <strong>and</strong> SIGIC<br />
580
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
In Portugal, SIGIC covers 500 thous<strong>and</strong> surgeries per year, 4.5 million surgery appointments <strong>and</strong> a<br />
business volume on surgical services of more than 1.5 billion Euros a year. In a recent study, the<br />
UCGIC estimated that SIGIC saved 51 million Euros to NHS in 2010.<br />
SIGIC takes into account the new st<strong>and</strong>point that European health systems have to face, the<br />
economic efficiency <strong>and</strong> sustainability of NHS. Economic efficiency <strong>and</strong> sustainability presume, on<br />
one h<strong>and</strong>, to guarantee the value for money of services provided <strong>and</strong> an adequate communication to<br />
the patient so that he can perceive it clearly. And on the other h<strong>and</strong> the existence of reasonable costs<br />
affordable by the patient, as illustrated by the figure below.<br />
Figure 3: Key elements to NHS sustainability<br />
The key elements to NHS sustainability are the value for money <strong>and</strong> the cost of services provided.<br />
Cost has to translate the value of the service in a competitive market. Yet even if the client<br />
recognizes in the service provided a value appropriated to the cost, if the amount involved exceeds<br />
the economic <strong>and</strong> financial capability of the patient, the transaction will not take place. So the cost<br />
affects sustainability of NHS because, not only it cannot be too expensive, but also the value<br />
perceived by the patient of those services must be according to his contribution to NHS paid through<br />
taxes, otherwise he will search for alternative health systems which will provide him better value for<br />
money, jeopardizing the NHS.<br />
Value perceived by stakeholders (patients <strong>and</strong> citizens) is the price that they will be willing to pay for<br />
the service provided by NHS according to their expectations in terms of quality <strong>and</strong> cost, in order to<br />
guarantee its sustainability.<br />
The value of services provided results from:<br />
Access: the ability to access public healthcare by potential users. The good or service loses<br />
value when access is difficult. However in the current environment where speed is the hallmark of<br />
the modern world, the increased availability is particularly valuable. The time gained in access to<br />
health services in a very competitive society where there is cost <strong>and</strong> time restrictions, it acquires<br />
actual value;<br />
Quality of service provided – innovation together with increasing knowledge <strong>and</strong> the consequent<br />
requirements, determines the need to qualify the services, highlighting the features we want to<br />
see provided in the products <strong>and</strong> services we consume. Thus, in an environment of broad supply,<br />
the value is changed by an increasingly close correlation with the features that we determined for<br />
the products or services we intend to acquire. This quality should preferably be certified by<br />
581
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
independent <strong>and</strong> competent entities to which we delegate the task of safeguarding the settlement<br />
between the products <strong>and</strong> services;<br />
Risk - increasingly important, it relates to the need to quantify <strong>and</strong> reduce the risk associated with<br />
the transaction (purchase of service or product) in clinical <strong>and</strong> administrative terms. Risk concerns<br />
the potential failure of the treatment, the likelihood of complications or squeals, failure of critical<br />
business processes, the occurrence of unanticipated <strong>and</strong> non-reported increased costs, the<br />
mismatch between expectations <strong>and</strong> results, <strong>and</strong> the occurrence of accidents, insolvency or<br />
incapability of the provider, amongst others;<br />
Reliability - the soundness of institutions <strong>and</strong> systems is a guarantee of continuity, durability,<br />
predictability <strong>and</strong> security. Solid institutions have first to be relevant to its potential clients, to<br />
ensure a team that is motivated <strong>and</strong> aligned with the mission <strong>and</strong> goals of the organization, to<br />
safeguard financial efficiency <strong>and</strong> economic sustainability, to evolve by adapting constantly to<br />
new market dem<strong>and</strong>s. Financing, regulatory, legal, information <strong>and</strong> other kind of systems have to<br />
assure consistency <strong>and</strong> be reliable over time, adapt to changing needs, be steady with the<br />
established goals, add value to the services provided either by interference in increasing quality<br />
<strong>and</strong> by action in reducing costs. People need to trust that NHS provides a service of quality <strong>and</strong><br />
will endure over time;<br />
Results – the value of services provided is measured by the treatment results, both in gains in<br />
health <strong>and</strong> in the implicit or explicit needs of the patient. The outcomes must be objective, satisfy<br />
the patient’s expectations <strong>and</strong> be according to the reference values. Only acceptable results can<br />
promote confidence in a transparent system. These results must address the different needs,<br />
expressed or implied, primarily in the extent of healthcare but also in the extents of comfort,<br />
empathy, aesthetics, availability <strong>and</strong> complementary services (administrative, hospitality,<br />
transport, among others).<br />
Value <strong>and</strong> cost of health services provided must be balanced over time <strong>and</strong> NHS needs to give that<br />
guarantee to the patients <strong>and</strong> the society in general. Time comprises the very notion of a continuity<br />
that is intended to be flexible to the changing environment, the values <strong>and</strong> desires <strong>and</strong> that is the trust<br />
keeper that any system needs to be pursued <strong>and</strong> cherished.<br />
Though directed at the side of access <strong>and</strong> knowledge, SIGIC focused on value chain associated with<br />
the services provided to patients, in search for implementation of a system that contributed decisively<br />
to the sustainability of the NHS. To this extent, SIGIC implemented a controlled competitive system<br />
with private providers based on more competitive access times <strong>and</strong> prices. It promoted internal<br />
negotiation practices in hospitals based on goal-setting <strong>and</strong> minimum levels of services provided. It<br />
promoted the attribution of individual responsibilities in a pre-established hierarchical skills<br />
organization. SIGIC also has implemented procedures for regular monitoring <strong>and</strong> reporting that attend<br />
the various steps in the patient management process. It mobilizes actively the dem<strong>and</strong> by<br />
disseminating <strong>and</strong> providing access to alternative but efficient providers, collaborates with other<br />
institutions in promoting <strong>and</strong> spreading clinical protocols <strong>and</strong> good practices implemented together<br />
with the Ministry of Health, such as the safe surgery program sponsored by the World Health<br />
Organization. SIGIC established indicators <strong>and</strong> periodic reports of compliance procedures, results on<br />
access, productivity, human <strong>and</strong> physical capacity, economic <strong>and</strong> financial indicators. It also audits<br />
regularly health providers <strong>and</strong> reports the results, compliances, constraints <strong>and</strong> recommendations to<br />
their guardianship.<br />
Figure 4 shows the circuit of the patient in SIGIC <strong>and</strong> the transfer to another hospital in order to<br />
guarantee the maximum waiting time established by clinical priority <strong>and</strong> adjusted by type of pathology.<br />
When a public hospital reveals inability to treat a patient in the maximum waiting time established by<br />
the Ministry of Health for his particular problem, SIGIC guarantees the transfer of the patient to a<br />
hospital capable of treating him within the guaranteed maximum waiting time.<br />
Figure 5 shows the evolution of the national waiting list for surgery since SIGIC was implemented in<br />
the NHS.<br />
In 5 years SIGIC reduce the waiting list for surgery by almost 35%, but it also achieved a significant<br />
decrease in waiting time to surgery of 61,6% to 3 months, which is a considerable improvement in the<br />
access to surgical treatment in the NHS. Figure 6 shows that evolution.<br />
582
Figure 4: Circuit of the patient in SIGIC in the NHS<br />
Nr of surgical episodes<br />
250,000<br />
230,000<br />
210,000<br />
190,000<br />
170,000<br />
150,000<br />
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
Evolution of national waiting list for surgery<br />
248,404<br />
221,208<br />
197,150<br />
‐ 34,9%<br />
174,179<br />
164,751 161,621<br />
2005 2006 2007 2008 2009 2010<br />
Figure 5: Evolution of national waiting list for surgery between 2005 <strong>and</strong> 2010, compared at the 31 st<br />
of December (source: SIGLIC)<br />
Median waiting time in month<br />
9<br />
8<br />
7<br />
6<br />
5<br />
4<br />
3<br />
Evolution of nacional waiting time for surgery<br />
8.6<br />
6.9<br />
4.4<br />
‐61,6%<br />
2005 2006 2007 2008<br />
3.7 3.4 3.3<br />
2009 2010<br />
Figure 6: Evolution of national waiting time for surgery in months between 2005 <strong>and</strong> 2010 (source:<br />
SIGLIC)<br />
583
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
This improvement was only possible to accomplish due to increased effectiveness <strong>and</strong> efficiency in<br />
the management of patients registered for surgery enhanced by SIGIC, which has resulted in<br />
increased surgical production in NHS by almost 40% in the last 5 years, either by public or private<br />
hospitals performing surgery on the NHS through conventions, as shown by the figure below.<br />
Nr of surgical episodes<br />
510,000<br />
460,000<br />
410,000<br />
360,000<br />
310,000<br />
260,000<br />
Evolution of scheduled surgical production<br />
345,321<br />
39,8%<br />
403,061<br />
455,503<br />
475,293<br />
482,928<br />
2006 2007 2008 2009 2010<br />
Figure 7: Evolution of scheduled surgical production <strong>and</strong> its average waiting time to surgery between<br />
2006 <strong>and</strong> 2010 (source: SIGLIC)<br />
Not only the surgical production increased, but also the time patients actually wait to surgery has<br />
fallen by 32% to 2,8 months.<br />
The decrease in waiting time for surgery was achieved mostly through better management of access<br />
to surgical care provided by public entities, which was boosted by the rules <strong>and</strong> guidelines issued by<br />
SIGIC. As the figure below proves, since 2006 to 2010 the entries of new patients to the national<br />
waiting list for surgery have increased almost 33% but that didn´t stop the decrease in waiting time.<br />
Figure 8: Evolution of new entries to the national waiting list for surgery between 2006 <strong>and</strong> 2010<br />
(source: SIGLIC)<br />
The next figure shows the results in the improvement in quality of healthcare access made by SIGIC.<br />
584
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
Figure 9: Evolution of the percentage of National Waiting List for Surgery with time above the<br />
established by SIGIC<br />
The weight of patients waiting to their surgery more than the established by SIGIC according to the<br />
clinical priority <strong>and</strong> type of pathology decreased by 39% in the last 5 years, which proves a boost in<br />
quality of surgical care access in Portugal.<br />
2. SIGLIC – information system<br />
SIGLIC is the information system that supports <strong>and</strong> controls SIGIC <strong>and</strong> interacts with public <strong>and</strong><br />
private healthcare providers, regional healthcare administrations <strong>and</strong> the central administration of<br />
NHS. To accomplish its purpose, SIGLIC must act in the different components of the process, such<br />
as:<br />
Registration <strong>and</strong> control of dem<strong>and</strong> for surgical procedures;<br />
Referral networks <strong>and</strong> management of communications network;<br />
Registration of patients interactions with the healthcare providers;<br />
Portfolio of surgical services <strong>and</strong> physical <strong>and</strong> human resources;<br />
Professionals, their accreditations <strong>and</strong> allocation to services;<br />
Registration of the services provided <strong>and</strong> production (supply);<br />
Obtained results (in services provided according to the procedures, in gains in health <strong>and</strong> in<br />
perception of added value in health quality for the patient); <strong>and</strong>,<br />
Funding <strong>and</strong> billing of the entire process.<br />
Each component of the process involves different players: the patient defines the dem<strong>and</strong> <strong>and</strong> is both<br />
client <strong>and</strong> object of change of required services; the medical professionals provide the services<br />
required; the hospitals provide the resources <strong>and</strong> logistics; the government which finances the public<br />
health system (NHS) <strong>and</strong> is both shareholder <strong>and</strong> maker of healthcare regulation. SIGLIC must give<br />
an appropriate answer to each player, keeping the necessary restriction to sensitive personal data of<br />
patients. For that, it has several entities connected by codes not accessible to users which dissociate<br />
the patient personal data of his clinical data. It also has an elaborated system of user profiles which<br />
aims to ensure that only authorized users can access information, <strong>and</strong> that it is available according to<br />
the level of access of each one.<br />
SIGLIC addresses in an innovative way the information for clinical governance, foc<strong>using</strong> on the core<br />
business of health, as illustrated in figure 11.<br />
585
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
HIS: Hospital <strong>Information</strong> System<br />
Figure 10: SIGLIC <strong>and</strong> its interactions with the different players<br />
Figure 11: <strong>Information</strong> architecture of clinical data in SIGLIC<br />
The core business of healthcare stems from the interaction between organizations <strong>and</strong> patients,<br />
designated by event. The event has a minimum data set such as the date of occurrence, the patient,<br />
the professional responsible for the event <strong>and</strong> the service unit where the event occurs. The result of<br />
that interaction is the identification <strong>and</strong> classification in scientific terms of the patient health issues<br />
approached in the event, as well as its corresponding actions proposed or implemented by health<br />
providers, designated by nosological unit. The events, clinical <strong>and</strong> administrative, occur as many as<br />
586
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
needed to complete the diagnosis <strong>and</strong> treatment of the patient. Those set of events are aggregated in<br />
a therapeutic episode. The episode represents the set of interventions in the resolution of identified<br />
diseases <strong>and</strong> in the context of a defined plan of care. The events occur on a specific date in a hospital<br />
unit or service. The approach to a disease or a set of diseases is made with the establishment of a<br />
care plan that projects the necessary events leading to the resolution of identified diseases. The<br />
episode is the series of events in the institution that responds to the care plan <strong>and</strong> is the institutional<br />
response to the problem identified, representing the value of services provided. The institutional<br />
response is according to its available resources (human, physical <strong>and</strong> financial) <strong>and</strong> internal<br />
organization. There can be more than one episode to treat the patient issues, according to his care<br />
plane, <strong>and</strong> the patient can be treated in more than one service <strong>and</strong> hospital. But SIGLIC takes into<br />
account the single episode which aggregates all the therapeutically episodes occurred <strong>and</strong> therefore<br />
the global time the patient waited to be treated from the moment his issues were identified.<br />
The other SIGIC’s stakeholders can access the information through reports from SIGLIC.<br />
SIGLIC is made up of modules that correspond to each of the components of SIGIC process. Each<br />
module corresponds to a feature with or more forms to register or consult information. The following<br />
illustration shows the modules main menu:<br />
Figure 12: Main menu of SIGLIC<br />
The following picture illustrates the layout <strong>and</strong> design of SIGLIC, by <strong>using</strong> one of its forms as an<br />
example.<br />
Figure 13: Form for registering or consulting general data about a surgery<br />
SIGLIC was designed to support all phases of de SIGIC process <strong>and</strong> to give information for all<br />
process' participants, according to their specific functions <strong>and</strong> needs in the NHS. For that, SIGLIC<br />
587<br />
UNs
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
was built taking into account the real needs of clinical activity in hospitals, based on the interactions<br />
between the institution <strong>and</strong> the patient.<br />
SIGLIC must also possess solid information, related to the integrity of collected data. To enable this it<br />
was implemented a redundant system with different sources permanently checking data quality. This<br />
process is extremely important to guarantee that information in SIGLIC is reliable, in order that the<br />
right care is provided to a given patient, the hospital administration makes the right management<br />
decisions <strong>and</strong> the hospitals have the right funding from NHS, based on the correct information.<br />
The figure below shows SIGLIC’s diagram of data acquisition. The database of integrated knowledge<br />
is a unified <strong>and</strong> coherent set of information that is based on the needs revealed by patients,<br />
integrating the production processes while generating cost <strong>and</strong> value <strong>and</strong> which culminates in the<br />
perception of the gains in health <strong>and</strong> the value perceived by the patient.<br />
Figure 14: Diagram of data acquisition in SIGLIC<br />
The information is recorded by hospitals in SIGLIC or in their hospital information system, in<br />
accordance with a set of st<strong>and</strong>ards <strong>and</strong> integrated into the central database of SIGIC, as the<br />
illustrated in the figure 15.<br />
There is a minimal data set to integrate hospital data in the central database of SIGLIC. The hospitals<br />
are responsible for the quality of the data in their information systems. This data is initially validated<br />
by SIGLIC for detect procedural mistakes, in case it detects mistakes or non-reliable information<br />
according to the st<strong>and</strong>ards, SIGLIC provides it for the users.<br />
<strong>Information</strong> is a valuable resource to make decisions <strong>and</strong> that’s what SIGLIC is about. By <strong>using</strong> an<br />
adequate interface it collects data from hospitals information systems. This data is the knowledge<br />
base <strong>and</strong> it can be aggregated by surgical service, hospital, group of pathologies, group of surgical<br />
specialties, hospital, region <strong>and</strong> country. SIGLIC allows that this knowledge is shared with all the<br />
users of the information system in different perspectives, according to needs of each one <strong>and</strong> the part<br />
they play in the health business sector.<br />
588
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
Figure 15: Workflow of information management in SIGLIC<br />
The data collected is about clinical, hospital capacity (human <strong>and</strong> physical resources), services<br />
provided (surgical services <strong>and</strong> procedures), hospital funding (financial resources), medical<br />
professionals, hospital production, dem<strong>and</strong> for surgical caring <strong>and</strong> process management. The private<br />
hospitals with SIGIC convention register directly their clinical <strong>and</strong> administrative activities in SIGLIC.<br />
SIGIC imposes a set of transformations in various information systems. When the healthcare<br />
providers of SIGIC do not have appropriate systems, they can use SIGLIC. So SIGLIC is not only a<br />
central information system used by the Central Administration of NHS to control SIGIC, but also can<br />
be used as a hospital information system to register activity related to surgical treatments. It also as<br />
three levels of management access: central, regional <strong>and</strong> hospital. In each of the three levels there’s<br />
a unit responsible for all matters of SIGIC concerned to their institution.<br />
The next figure shows in general terms how SIGLIC builds the information <strong>and</strong> guarantees its quality.<br />
Figure 16: Construction of the information in SIGLIC<br />
589
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
The data collected by SIGLIC must have identification of the following: author; user that registered the<br />
information; date <strong>and</strong> time of registration; <strong>and</strong> hospital. By gathering that information, SIGLIC<br />
guarantees its quality, that is, the author is responsible for the information conveyed.<br />
The payment to healthcare providers is in accordance to the registered production. SIGLIC also<br />
provides tools to support management through financial reports <strong>and</strong> audit data.<br />
SIGLIC relies on a new paradigm based on the implementation of information systems geared to the<br />
administrative aspects of clinical registration management, as a procedural instrument of services<br />
provided to the patient. In this new approach the registration of clinical activity, complemented with<br />
appropriate administrative information, is transformed into useful information to management for<br />
various levels of use, such as: clinical, administrative <strong>and</strong> management. The information is<br />
aggregated according to the needs <strong>and</strong> access authorizations.<br />
The following picture shows the different features of SIGLIC <strong>and</strong> its interactions with other information<br />
systems, including hospital information systems (HIS), central healthcare information systems like<br />
RNU (National Patient Network) <strong>and</strong> other systems.<br />
Figure 17: Features <strong>and</strong> interactions of SIGLIC with other information systems<br />
SIGLIC is a valuable tool to monitor <strong>and</strong> control all the process <strong>and</strong> procedures regulated by SIGIC<br />
such as:<br />
To support public hospital funding <strong>and</strong> private hospital billing;<br />
To guarantee patients’ rights;<br />
To control the quality of healthcare services provided by institutions;<br />
To regulate surgical activity;<br />
To manage transfer of patients between hospitals;<br />
To promote the communication between all players in the process;<br />
To manage failures <strong>and</strong> irregularities in the process;<br />
To manage supply <strong>and</strong> dem<strong>and</strong> for surgical treatment; <strong>and</strong>,<br />
590
Rita Cristóvão <strong>and</strong> Pedro Gomes<br />
To supply performance indicators (process management, quality <strong>and</strong> clinical).<br />
Finally, the following figure presents some numbers of SIGLIC database in 2010.<br />
Figure 18: SIGLIC database numbers <strong>and</strong> transactions volume in 2010<br />
With SIGLIC, the management process of the national waiting list for surgery is run with transparency<br />
to all players <strong>and</strong> users. It assures equal access <strong>and</strong> quality treatment in all NHS patients waiting for<br />
surgery <strong>and</strong> makes healthcare providers <strong>and</strong> patients responsible for their actions <strong>and</strong> duties in the<br />
process.<br />
591
592
Work<br />
in<br />
Progress<br />
Papers with<br />
Posters<br />
593
594
<strong>Information</strong> <strong>Management</strong> Enabling Collaborative oak Tree<br />
Population Care: How to Define <strong>and</strong> Initiate a Change<br />
<strong>Management</strong> Process in a Local Community in Sweden<br />
Maria Bergenstjerna<br />
Gothenburg University, Göteborg, Sweden<br />
Maria.Bergenstjerna@chalmers.se<br />
Abstract: This short paper presents forthcoming research in information management related to natural<br />
resources, the background <strong>and</strong> analysis of its scope <strong>and</strong> method. It concludes by exp<strong>and</strong>ing on data collection.<br />
Keywords: change, change management, information management <strong>and</strong> sustainable development<br />
1. Introduction<br />
It is argued that biodiversity is a precondition for sustainable development (United Nations 2010). In<br />
this respect, an old oak tree is said to provide an excellent environment, as it grows for one hundred<br />
years, thrives for one hundred years <strong>and</strong> dies for another hundred years. This long continuity is a<br />
prerequisite for the biodiversity that can be found in an oak tree (United Nations 2011). However,<br />
knowledge about these trees in local communities in which they form a natural part is also required in<br />
order for biodiversity to increase.<br />
2. Research scope<br />
There is an oak tree population, which has grown for generations in a local community in Sweden.<br />
One major part of the forest is protected as a nature reserve of national <strong>and</strong> European interest, which<br />
has rendered a veteran oak survey <strong>and</strong> arboricultural management plan (ProNatura 2004). The<br />
remaining part of the community consists of parkl<strong>and</strong>s <strong>and</strong> private properties scattered in forest<br />
remains (Bergenstjerna 2008). Here there are two forests of high conservation interest but they lack<br />
official protection. The local authorities own one of them <strong>and</strong> the other is private. <strong>Management</strong> of such<br />
an oak population in a densely populated community is not well understood by the authorities, nonprofit<br />
organisations nor by local people (Googins <strong>and</strong> Rochlin 2000, Bergenstjerna 2011,<br />
Dalsl<strong>and</strong>skommunernas Kommunalförbund 2011). Therefore, striving for better knowledge as a<br />
prerequisite for preservation <strong>and</strong> protection of the remaining oak trees is important as urbanization<br />
continues.<br />
Recently, there has been an increase in the number of green industry businesses offering a variety of<br />
skilled tree services to property owners in the area, such as tree trimming <strong>and</strong> pruning, tree removal,<br />
tree stump removal <strong>and</strong> emergency tree services. Property owners make tree care choices for safety<br />
reasons but also for aesthetics, gardening ease <strong>and</strong> for economic reasons, not to say the least. Thus,<br />
to avoid conflict with the natural needs of the trees while people are living modern lives in modern<br />
homes there is a need to find means to locally manage an oak tree population through a balance of<br />
interests between on one h<strong>and</strong> private property owners with a right to decide for themselves <strong>and</strong> on<br />
the other h<strong>and</strong> interests of the public expressed through government as a long term need for<br />
biodiversity <strong>and</strong> sustainability (Young et al. 2005).<br />
However, stakeholders vary from having no picture at all of the future oak tree management; what it<br />
actually means, what is important <strong>and</strong> how it should be carried out; to having created long-term<br />
concepts of change management. Thus, some of them have an idea of their own role <strong>and</strong> the role of<br />
others in the change process but these pictures of underst<strong>and</strong>ing are not well communicated.<br />
Therefore, in order to successfully establish <strong>and</strong> pursue collaborative oak tree population care the<br />
stakeholders have a need for close dialog on all aspects of oak tree lives enabled by better<br />
information flow <strong>and</strong> IT use in all its forms (Bol<strong>and</strong> <strong>and</strong> Tenkasi 1995, Friedman <strong>and</strong> Miles 2006).<br />
Therefore, the research scope will be foc<strong>using</strong> information management enabling collaborative oak<br />
tree population care <strong>using</strong> information systems theory (Langefors 1980) <strong>and</strong> system thinking<br />
(Checkl<strong>and</strong> 2000) in order to reach a balanced investment (Forrester 1971, Checkl<strong>and</strong> 1985, Frisk<br />
2011).<br />
595
3. Research method<br />
Maria Bergenstjerna<br />
The research method idea gradually developed through several occasions where we had the<br />
opportunity to unite a private oak tree interest <strong>and</strong> an interest in research. On each occasion we acted<br />
out of a role, the role as private property owner, the role as member of a non-profit organisation, the<br />
role as citizen <strong>and</strong> the role as researcher.<br />
Inspired by the ProNatura veteran oak survey <strong>and</strong> encouraged by the regional authorities, a simple<br />
private oak tree survey was carried out in the surrounding part of the community by the private<br />
property owner. The result showed that there were as many veteran oak trees outside as within the<br />
nature reserve, which highlighted issues of relevant professional knowledge for oak tree population<br />
care (Bergenstjerna 2008). The report was distributed to local <strong>and</strong> regional authorities as well as local<br />
non-profit organisations <strong>and</strong> interested people in the community. Three years later, a new contact was<br />
made with the regional authorities, now as a member of a non-profit organisation. A fine hint from an<br />
authority representative triggered an application arguing for advancing knowledge about oak trees on<br />
private properties through a complementary survey. The survey is to be conducted by members of the<br />
local chapter of The Swedish Society for Nature Conservation, SSNC (2011) <strong>and</strong> qualified expertise<br />
given the permission by private residence owners (Bergenstjerna 2011). The application was made in<br />
the role of a member of the non-profit organisation SSNC together with the local authority.<br />
In the past some thirty years ago, people in the local community put down efforts, out of concern for<br />
the oak trees, to inform the authorities about the need for preservation <strong>and</strong> to engage local people in<br />
their protection. Today, a sustainable future is envisioned when people with different responsibilities,<br />
power <strong>and</strong> influence in the local community come together in a collaborative oak tree population care.<br />
Then what becomes clear to an active citizen reflecting on the present is that change is vital but<br />
managing change will be complex. When change is in its infancy like in this particular situation, some<br />
stakeholders have a vague idea of the change management process <strong>and</strong> others cannot picture the<br />
process at all. It is like a federation, where nobody has the whole picture or the means to control the<br />
others since everybody is a stakeholder with a differing view, means of power, will etc. Who will be<br />
first to attain power? What is the change management task? What suitable means are there for<br />
change management? How can change management operate <strong>and</strong> drive change in a situation where<br />
all stakeholders are not even aware of the phenomena <strong>and</strong> the need for change, where there are no<br />
clear development goals <strong>and</strong> no clear development process to be implemented by relevant<br />
stakeholders? (Enquist et al. 2001, Senge et al. 1999). <strong>Information</strong> <strong>and</strong> knowledge is required in order<br />
to deal with these issues <strong>and</strong> for the process to be wise. Thus, the main issue is how to define <strong>and</strong><br />
initiate change management.<br />
From the researchers eye, it is interesting to see how the private simple survey report (Bergenstjerna<br />
2008) gradually opened people’s hearts <strong>and</strong> minds <strong>and</strong> how they in turn acted on the information. For<br />
example, a local authority representative found inspiration to form an application to the regional<br />
authorities, which argues for a collaborative effort among ten local authorities to find the means to<br />
protect the veteran trees in all their local communities (Dalsl<strong>and</strong>skommunernas Kommunalförbund<br />
2011). Reflecting on this, it appears the action would not have been the same without the written<br />
documents; the private report <strong>and</strong> the SSNC <strong>and</strong> local authority application. Together with the Internet<br />
<strong>and</strong> email conversations it can be argued that documents played an important role in the exchange of<br />
ideas <strong>and</strong> eventually for the research method to develop.<br />
The idea is to use action-research through a change management coaching process in order to find<br />
means for dealing with change management issues (Checkl<strong>and</strong> 2000, Mathiassen 1998). It includes<br />
two researchers who will use a combination of DELTA change management framework, a previous<br />
research result (Enquist et al. 2001) <strong>and</strong> reflection in the research process.<br />
4. Data collection<br />
The scope of the research is thus to be conducted adjacent to change <strong>and</strong> the change management<br />
process preferably <strong>using</strong> action-research through a change management coaching process for data<br />
collection. One researcher will be active in oak tree projects <strong>and</strong> reflect on the change management<br />
process in the local community through the light of the individual roles; as private property owner, as<br />
member of a non-profit organisation, as citizen <strong>and</strong> as researcher. The other researcher, experienced<br />
in change management <strong>and</strong> a mentor, will play an active role in the research process but will be idle<br />
in oak tree projects.<br />
596
Maria Bergenstjerna<br />
Data will be collected through remnants such as documents, notes <strong>and</strong> email conversations with<br />
people in tree care <strong>and</strong> in research that has come out of the process so far <strong>and</strong> will come out during<br />
the forthcoming process, Once the research project is clear <strong>and</strong> set data must be carefully collected<br />
<strong>and</strong> the coaching process should be transparent. Previously, PowerPoint slides <strong>and</strong> a digital<br />
communication tools enabling picture <strong>and</strong> sound recording has been successfully tested in previous<br />
collaboration between the two researchers <strong>and</strong> will therefore serve as method for data collection<br />
together with a research diary.<br />
In this way, knowledge of initiation, development <strong>and</strong> implementation of information management<br />
related with natural resources is likely to grow thereby making a contribution to both science <strong>and</strong><br />
practice.<br />
References<br />
Bergenstjerna, M. (2008) Var finns de skyddsvärda träden utanför naturreservatet Särö Västerskog? En privat<br />
inventering av främst grov ek inom kommunal och privat mark på Särön.<br />
Bergenstjerna, M. (2011) Skyddsvärda träd och trädmiljöer på Särö, Ansökan om bidrag för lokala<br />
naturvårdsprojekt (LONA), Länsstyrelsen Hall<strong>and</strong>.<br />
Bol<strong>and</strong>, R. J. Jr. <strong>and</strong> Tenkasi, R. V. (1995) Perspective Making <strong>and</strong> Perspective Taking in Communities of<br />
Knowing, Organization Science, Vol. 6, No. 4 (Jul. - Aug.) pp. 350-372.<br />
Checkl<strong>and</strong>, P. (1985) Achieving ‘Desirable <strong>and</strong> Feasible’ Change: An Application of Soft Systems Methodology,<br />
Operational Research Society Vol. 36, No. 9, pp 821-831.<br />
Checkl<strong>and</strong>, P. (2000) Soft Systems Methodology: a Thirty Year Retrospective, Systems Research <strong>and</strong><br />
Behavioral Science, 17: S11–S58.<br />
Enquist, H., Magoulas, T., Bergenstjerna, M. <strong>and</strong> Holmqvist, M. (2001) DELTA Meta Architecture for Proactive<br />
<strong>Management</strong> of Coordinated Development in Complex Enterprises <strong>and</strong> <strong>Information</strong> Systems, Final Report,<br />
Project P10525, <strong>Management</strong> of Continuous Needs-based Development <strong>and</strong> Change of Complex<br />
Comm<strong>and</strong> <strong>and</strong> Control Systems, NUTEK Program for Complex Technical System.<br />
Forrester, J. W. (1971) World dynamics, Wright-Allen Press.<br />
Friedman, A. L. <strong>and</strong> Miles, S. (2006) Stakeholders: theory <strong>and</strong> practice, Oxford University Press, Oxford.<br />
Frisk. E. J. (2011) Evaluating as Designing: - Towards a Balanced IT Investment Approach, Ph.D. thesis,<br />
Department of Applied <strong>Information</strong> Technology, Chalmers University of Technology & University of<br />
Gothenburg.<br />
Googins, B. K. <strong>and</strong> Rochlin, S. A. (2000) Creating the Partnership Society: Underst<strong>and</strong>ing the Rethoric <strong>and</strong><br />
Reality of Cross-Sectoral Partnerships, Business <strong>and</strong> Society Review, Issue 105, Part 1, pp 127-144.<br />
Dalsl<strong>and</strong>skommunernas Kommunalförbund (2011) Värna skyddsvärda träd, Ansökan om bidrag för lokala<br />
naturvårdsprojekt (LONA), Länsstyrelsen Hall<strong>and</strong>.<br />
Langefors, B. (1980) Infological models <strong>and</strong> information user views. <strong>Information</strong> Systems 5: 17-32.<br />
Mathiassen, L. (1998) Reflective Systems Development, Sc<strong>and</strong>inavian Journal of <strong>Information</strong> Systems, Vol 10,<br />
Issue 1-2.<br />
Pro Natura <strong>and</strong> Treework Environmental Practice (2004) Särö Västerskog, Veteran Oak Survey <strong>and</strong><br />
Arboricultural <strong>Management</strong> Plan, on behalf of Länsstyrelsen i Hall<strong>and</strong>, Enheten för naturvård &<br />
miljöövervakning, Meddel<strong>and</strong>e 2004:26. Kopieringsbolaget AB, Halmstad.<br />
Senge, P., Kleiner, A., Roberts, C., Ross, R., Roth, G., Smith, B. <strong>and</strong> Guman, E. C. (1999) The dance of change:<br />
The challenges to sustaining momentum in learning organizations. Performance Improvement, 38: 55–58.<br />
The Swedish Society for Nature Conservation, 2011, [online]; http://www.naturskyddsforeningen.se/in-english/<br />
United Nations (2010) International Year of Biodiversity 2010, [online],<br />
http://www.un.org/apps/news/story.asp?NewsID=33393&Cr=envirionment<br />
United Nations (2010) International Year of Forests 2011, [online], http://www.un.org/en/events/iyof2011/<br />
Young, J., Watt, A., Nowicki, P., Alard, D., Clitherow, J., Henle, K., Johnson, R., Laczko, E., McCracken, D.,<br />
Matouch, S., Niemela, J. <strong>and</strong> Richards, C. (2005) Towards sustainable l<strong>and</strong> use: identifying <strong>and</strong> managing<br />
the conflicts between human activities <strong>and</strong> biodiversity conservation in Europe, Biodiversity <strong>and</strong><br />
Conservation, Vol 14, No. 7, pp1641–1661.<br />
597
Motivations in Virtual Communities: A Literature Review<br />
Giovanni Camponovo<br />
University of Applied Sciences of Southern Switzerl<strong>and</strong><br />
Giovanni.Camponovo@supsi.ch<br />
Abstract: One of the major recent trends in the IT l<strong>and</strong>scape is the fast emergence of community-based models<br />
centered on the active participation of users as contributors. This trend is so strong that many observers consider<br />
it as a step in the evolution of systems, for instance by referring to it as Web 2.0. Community-based models<br />
permeated various types of services like social networks, user generated content communities, interest or<br />
practice communities, peer-to-peer networks, open source software communities, wireless communities <strong>and</strong> so<br />
on. However, <strong>using</strong> a community-based model is not a guarantee of success, as the primary key success factor<br />
is the ability to attract a critical mass of contributing users. Therefore, a key research issue is to underst<strong>and</strong> what<br />
motivates users to actively participate in such virtual communities typically characterized by a loose group of<br />
individuals that primarily interact via some computer-mediated communication media. This paper proposes a<br />
review of existing studies of user motivation in various types of virtual communities with the goal of highlighting a<br />
few general motivations that are recurring across the various community types as well as suggesting that<br />
motivations are context sensitive by pointing out that the importance of the various types of motivation is<br />
somewhat different across the different types of communities. The results of this paper are a taxonomy of<br />
communities in four broad types according to their primary orientation (social relationships, contents, interests<br />
<strong>and</strong> resources), a taxonomy of motivations (intrinsic, psychological, social <strong>and</strong> economical) <strong>and</strong> a mapping<br />
between the various community types <strong>and</strong> motivations.<br />
Keywords: virtual communities, motivations, literature review<br />
1. Introduction<br />
The rapid emergence of community-based applications <strong>and</strong> business models centered on the active<br />
participation of users as contributors is probably the most influential trends occurring in the ICT<br />
l<strong>and</strong>scape. This trend is so strong that many observers consider it as a step in the evolution of<br />
information systems. For instance, many now commonly refer to community-based web systems like<br />
social networks, blogs <strong>and</strong> user-generated content sites as “Web 2.0”, implicitly suggesting that they<br />
are more evoluted than the old “Web 1.0” sites. This view is well described by Musser <strong>and</strong> O’Reilly<br />
(2006): “Web 2.0 is a set of economic, social, <strong>and</strong> technology trends that collectively form the basis<br />
for the next generation of the Internet—a more mature, distinctive medium characterized by user<br />
participation, openness, <strong>and</strong> network effects”.<br />
The characteristics or user participation, openness <strong>and</strong> network effects are the basis of a more<br />
general family of community-based business models which includes various types of services such as<br />
communities of interest or practice (e.g. thematic forums <strong>and</strong> news), social networks (e.g. Facebook),<br />
user generated content communities (e.g. Youtube, Flickr), peer-to-peer networks (e.g. BitTorrent),<br />
open source software communities (e.g. SourceForge), wireless communities (e.g. FON) <strong>and</strong> so on.<br />
Although there are many successful examples of business <strong>using</strong> a community-based model, the<br />
major difficulty <strong>and</strong> primary key success factor is the ability of the community to attract a critical mass<br />
of contributing users. It is widely acknowledged that the development <strong>and</strong> sustainability of a<br />
community heavily depends on the involvement of many motivated members willing to make<br />
contributions or share their resources with it. The value of a community does indeed strongly depends<br />
on network externalities (as the number of members increases, the network becomes more valuable<br />
which then attracts even more users <strong>and</strong> so forth) <strong>and</strong> thus building critical mass is a key imperative<br />
for growth <strong>and</strong> sustainability.<br />
Therefore, a key research issue is to underst<strong>and</strong> what motivates users to actively participate in such<br />
virtual communities typically characterized by a loose group of individuals that primarily interact via<br />
some computer-mediated communication media. This research question has been tackled by many<br />
researchers in different contexts <strong>and</strong> with different theoretical models. Because this heterogeneity<br />
makes it difficult to get a comprehensive broad overview of research in this topic, it is useful to<br />
aggregate <strong>and</strong> summarize the various contributions in a literature review. This paper therefore<br />
proposes a review of existing studies of user motivation in various types of virtual communities with<br />
the goal of highlighting a few general motivations that are recurring across the various community<br />
types as well as suggesting that motivations are context sensitive by pointing out that the importance<br />
of the various types of motivation is somewhat different across the different types of communities.<br />
598
2. Methodology<br />
Giovanni Camponovo<br />
Relevant papers about motivations in virtual communities were identified through an extensive<br />
literature review whose initial corpus consisted in the articles published after year 2000 in the top ten<br />
journal in the information systems discipline as proposed by the Association for <strong>Information</strong> Systems<br />
<strong>and</strong> in particular by the ranking of Rainer <strong>and</strong> Miller (2005) 1 as well as the main IS conferences (ICIS<br />
<strong>and</strong> the various regional conferences).<br />
To this corpus, we added other papers we could find through online databases like ACM Digital<br />
Library, ABI Inform, JSTOR, Elsevier <strong>and</strong> SpringerLink. The search strategy used to identify articles in<br />
those search engines was based on combining relevant keywords like virtual communities (with<br />
variants such as online communities, electronic communities, electronic networks of practice as well<br />
as the various specific types of communities identified thereafter in the paper) <strong>and</strong> motivation (with<br />
variants like participation, contribution, gratifications <strong>and</strong> action).<br />
Finally, other references were obtained from this initial corpus by looking at the references cited in the<br />
various papers, with the process being repeated iteratively until no further references were identified.<br />
In this phase we also collected the various papers describing the various general motivation theories<br />
cited in the various articles.<br />
Of all the references collected, we only retained papers proposing empirical studies <strong>using</strong> primary<br />
data: we considered both qualitative studies (e.g. based on interviews or content analysis) <strong>and</strong><br />
quantitative studies (e.g. based on surveys) leaving out purely theoretical papers. These references<br />
were then entered into a reference management software to check for duplications <strong>and</strong> relevant<br />
papers were classified by type of community <strong>and</strong> summarized into a spreadsheet containing the<br />
authors, year or publication, methodology, community type, country, reference theories employed, the<br />
various motivations found <strong>and</strong> their relevance.<br />
3. Literature review<br />
3.1 General motivation theories<br />
Human motivation is a popular theme among researchers in a broad number of disciplines like<br />
psychology, sociology, economics <strong>and</strong> information systems. Consequently, many theories have been<br />
developed to explain human behaviour <strong>and</strong> hereafter we briefly illustrate the ones that are most<br />
relevant to our context (that have been used as a basis to explain motivations for participation in<br />
virtual communities).<br />
One early theory is the expectancy-valence theory (Vroom, 1964; Atkinson, 1966), which suggests<br />
that individuals are motivated to do an activity if they expect that their efforts will lead to a good<br />
performance (expectancy), that will lead to desirable outcomes (instrumentality) that are valuable to<br />
them (valence).<br />
A first stream of motivation theories focuses on the determinants of intentional behaviour. The Theory<br />
of Reasoned Action (Fishbein <strong>and</strong> Ajzen, 1975) suggests that a person’s behavioural intention<br />
depends on his attitude towards the behaviour (i.e. “a function of beliefs about the behaviour’s<br />
consequences <strong>and</strong> evaluations of those consequences”) <strong>and</strong> his subjective norm (i.e. his “beliefs that<br />
relevant referents think he should or should not perform the behaviour <strong>and</strong> his motivation to comply<br />
with the referents”). The Theory of Planned Behaviour (Ajzen, 1991) extends it by adding the<br />
construct of perceived behavioural control to consider “the perceived ease or difficulty of performing<br />
the behaviour”. Building on these two theories, the Technology Acceptance Model (Davis, 1989)<br />
states that intention of <strong>using</strong> a technology is determined by its perceived usefulness (the belief that it<br />
would enhance one’s performance) <strong>and</strong> its perceived ease of use (the belief that it would be free of<br />
effort). Finally, the Unified Theory of Acceptance <strong>and</strong> Use of Technology (UTAUT) (Venkatesh et al.,<br />
2003) combines several of the preceding theories by considering four determinants of intention<br />
(performance expectancy, effort expectancy, social influence <strong>and</strong> facilitating conditions) <strong>and</strong> four<br />
moderating variables (gender, age, experience <strong>and</strong> voluntariness of use). It is worth to notice, that<br />
1 MIS Quarterly, Communications of the ACM, <strong>Information</strong> Systems Research, <strong>Management</strong> Science, Journal of <strong>Management</strong><br />
<strong>Information</strong> Systems, Harvard Business Review, Decision Sciences, IEEE Transactions (various), Decision Support Systems,<br />
ACM Transactions on <strong>Information</strong> Systems <strong>and</strong> European Journal of <strong>Information</strong> Systems<br />
599
Giovanni Camponovo<br />
there are many variants of these models that consider others constructs like trust, playfulness, selfefficacy<br />
etc.<br />
The last aspect of self-efficacy is the cornerstone of the Social Cognitive Theory (B<strong>and</strong>ura, 1977): if<br />
people believe in their capabilities to perform a specific action (the idea of self-efficacy) that they<br />
believe to be capable of attaining a desired outcome (outcome expectancy) they are more inclined to<br />
do so (they also considering perceived impediments <strong>and</strong> opportunities).<br />
The self determination theory (Deci <strong>and</strong> Ryan, 1985; Valler<strong>and</strong>, 1997) offers another well suited<br />
theoretical framework as it explains motivations of people within social contexts. Unlike the preceding<br />
theories, it does not treat motivation as a unitary concept that simply varies in intensity, but<br />
differentiates different kinds of motivations. More specifically, it raises a distinction between intrinsic<br />
motivation (doing something for the pleasure of doing an interesting activity or to satisfy some on<br />
psychological innate needs for competence, autonomy <strong>and</strong> relatedness) <strong>and</strong> extrinsic motivation (we<br />
do something for the purpose of receiving some separable outcome as a result of our action such as<br />
obtaining tangible rewards or avoiding punishments, obtaining social rewards such as approval <strong>and</strong><br />
status or obtaining some psychological reward such as get self-esteem, pride or avoid guilt or<br />
anxiety). While this theory suggests that people can have more than one motivation type, several<br />
studies propose that extrinsic motivation can have a negative effect on intrinsic motivation, the socalled<br />
crowding out effect (see Gagné <strong>and</strong> Deci, 2005 for a brief review).<br />
Another interesting stream of research in social psychology has studied motivations underlying<br />
prosocial behaviour intended to benefit other people such as helping, comforting, sharing <strong>and</strong><br />
cooperating (Batson, 1998). While much of this research studied spontaneous helping in unexpected<br />
situations, some authors have also examined planned helping such as volunteering. For instance,<br />
Clary et al. (1998) propose that people volunteer because it serves one or more functions such as<br />
gaining knowledge, express one’s values, comply with social expectations, get utilitarian<br />
recompenses, enhance one’s ego or protect oneself against negative feelings about oneself. While<br />
members may not see contributing to a virtual community as volunteering, It appears to be fruitful to<br />
examine whether those typical motivations are a factor in members’ decisions to join <strong>and</strong> participate in<br />
a community (Butler, 2004).<br />
Other applicable theories focus on the idea of exchange. Economic exchange theory posits that<br />
individuals behave rationally according to self-interest (i.e. when rewards exceed costs), whereas<br />
social exchange theory (Blau, 1964) suggests that social exchange also involves intangible benefits<br />
such as improved relationships as well as feelings like reciprocal obligation, gratitude, trust etc.<br />
Innovation diffusion theory (Moore, 1999; Rogers, 2003) describe the patterns of adoption of an<br />
innovation among the members of a social system <strong>and</strong> propose a set of factors that influence this<br />
process. These theories describe a number of characteristics of an innovation that favor its diffusion<br />
(relative advantage, compatibility, complexity, trialability, observability) <strong>and</strong> the characteristics of the<br />
different adopter types (from the more venturesome early adopters that may be more attracted by<br />
intrinsic reasons to the more skeptical <strong>and</strong> traditional late adopters which mainly seek proven<br />
solutions <strong>and</strong> less risky outcomes).<br />
Finally, the expectation-confirmation model complements the abovementioned theories by not<br />
foc<strong>using</strong> on the initial adoption of a system, but on its continued use which is also critical for its longterm<br />
viability. This model was ideated by Oliver (1980) to explain repurchase intentions based on<br />
satisfaction, which in turn depends on the confirmation of initial expectations against performance.<br />
This model has been applied to information systems by Bhattacherjee (2001), suggesting that<br />
continuance intention is determined by its perceived usefulness <strong>and</strong> the user satisfaction, with the<br />
latter being determined by the confirmation of expectations following actual use as well as its<br />
perceived usefulness.<br />
Many of the concepts of the various theories are rather similar <strong>and</strong> can be regrouped as follows:<br />
The taxonomy of motivation proposed in table 1 will then be used as a basis to describe the<br />
motivation in the various types of wireless communities, with the exception that effort <strong>and</strong> facilitating<br />
conditions will not be included because they are not motivations in a strict sense, but rather contextual<br />
factors that may hinder or facilitate participation. On the other h<strong>and</strong>, we will distinguish utility into two<br />
600
Giovanni Camponovo<br />
separate concepts: the satisfaction of a personal need <strong>and</strong> the attainment of an external reward. We<br />
also add the concept of reciprocity as it is one of the defining element of virtual communities.<br />
Table 1: Mapping of motivation theories <strong>and</strong> concepts<br />
Psychological factors Social factors Utilitarian factors<br />
THEORY enjoyment competence values relations<br />
Expectancy<br />
Valence<br />
Theory<br />
Theory of<br />
Reasoned<br />
Action<br />
Theory of<br />
Planned<br />
Behaviour<br />
Technology<br />
Acceptance<br />
Model<br />
UTAUT<br />
Social<br />
Cognitive<br />
Theory<br />
Innovation<br />
Diffusion<br />
Theory<br />
Self<br />
Determinati<br />
on Theory<br />
Prosocial<br />
behaviour<br />
theory<br />
attitude<br />
toward<br />
behaviour<br />
attitude<br />
toward<br />
behaviour<br />
Affect /<br />
Anxiety Self-efficacy<br />
intrinsic<br />
motivation<br />
enhanceme<br />
nt<br />
introjection<br />
(competenc<br />
e)<br />
underst<strong>and</strong>i<br />
ng<br />
identificatio<br />
n (values)<br />
introjection<br />
(relatednes<br />
s)<br />
3.2 Definition <strong>and</strong> types of virtual community<br />
social<br />
influence<br />
subjective<br />
norm<br />
subjective<br />
norm<br />
Social<br />
Influence<br />
observabiilt<br />
y (image)<br />
introjection<br />
(approval)<br />
Utility Cost/effort Facilitating<br />
conditions<br />
instrumentality<br />
expectancy<br />
perceived<br />
usefulness<br />
performanc<br />
e<br />
perceived<br />
ease of<br />
use<br />
effort<br />
expectancy<br />
expectancy<br />
outcome<br />
expectation<br />
s<br />
relative<br />
advantage<br />
external<br />
regulation<br />
(rewards)<br />
values social career<br />
perceived<br />
behavioural<br />
control<br />
facilitating<br />
conditions<br />
complexity compatibility<br />
One of the first definition of virtual communities (also called online communities) is the one from<br />
Rheingold (Rheingold, 2002): “social aggregations that emerge from the Net when enough people<br />
carry on those public discussions long enough, with sufficient human feeling, to form webs of personal<br />
relationships in cyberspace”. While this definition highlights the social character as a defining element<br />
of a virtual community, other authors propose a larger set of elements of what constitutes a<br />
community which includes shared resources, interests, needs or activities that are the primary reason<br />
for belonging to the community, common values, reciprocal behaviour <strong>and</strong> a shared context of social<br />
conventions (Whittaker et al., 1997; Preece, 2000).<br />
Based on such a broader view of what constitutes an online community, several authors identify<br />
various types of virtual communities <strong>and</strong> propose different classifications.<br />
Many classifications are based on the primary goal of the community. One of the first of such<br />
classifications is proposed by Armstrong <strong>and</strong> Hagel (1996) who distinguish four different types of<br />
virtual communities: communities of transaction, interest, fantasy <strong>and</strong> relationship. A comparable<br />
classification is proposed by Hummel <strong>and</strong> Lechner (2002), who classify communities from the more<br />
communication oriented to the more transaction oriented, distinguishing five types of communities:<br />
gaming communities, communities of interest, B2B communities, B2C communities <strong>and</strong> C2C<br />
communities. Finally, Markus (2002) proposes an exp<strong>and</strong>ed taxonomy of virtual communities that<br />
encompasses both classifications which distinguishes based on their social orientation (relationship<br />
building <strong>and</strong> entertainment), professional orientation (expert network <strong>and</strong> learning) <strong>and</strong> commercial<br />
orientation (B2B, B2C <strong>and</strong> C2C). We also feel that it is important to add communities of resourcesharing“<br />
such as peer-to-peer networks <strong>and</strong> wireless communities.<br />
601
Giovanni Camponovo<br />
A different criteria is employed by Porter (2004), who based on community structure distinguishes<br />
between member-initiated <strong>and</strong> organization-sponsored communities: the former is established <strong>and</strong><br />
self-managed by members <strong>and</strong> can have a social or professional orientation, the latter is established<br />
<strong>and</strong> managed by either a commercial, non-commercial or governmental organization. This distinction<br />
is also made by Camponovo <strong>and</strong> Picco-Schwendener (2010), who differentiate pure communities<br />
(built <strong>and</strong> managed by members in a self-organized way) <strong>and</strong> hybrid communities (built <strong>and</strong> managed<br />
by an organization that supports individual members that are willing to participate).<br />
Because both criteria are expected have an important impact on members’ motivations, we propose<br />
here to use an integrated taxonomy that combines both criteria which is shown in the figure below<br />
(remark that a community may also span over more than one community type at the same time).<br />
Table 2: Taxonomy of virtual communities (adapted from Markus 2002, Porter 2004)<br />
Type Social orientation Professional orientation Commercial orientation<br />
Subtype<br />
memberinitiated <br />
organizationsponsored<br />
Entertainment<br />
(e.g. gaming,<br />
user-generated<br />
content)<br />
Relationship<br />
building<br />
(e.g. common<br />
interests)<br />
Expert<br />
network<br />
(e.g.<br />
practice,<br />
knowledge)<br />
Learning<br />
(e.g. open<br />
source)<br />
B2B<br />
(e.g. br<strong>and</strong>,<br />
e-markets)<br />
C2C<br />
(e.g. P2P,<br />
auctions)<br />
This framework is used as a basis for the following chapters dedicated to describing the motivation in<br />
the various types of communities. Our choice of community is made firstly by choosing three types of<br />
communities according to their goal: a social-oriented type of community like communities of interest,<br />
a professional-oriented community like open-source communities <strong>and</strong> a commercial oriented<br />
community like a wireless community (C2C). Then within the three types we will make a further<br />
distinction based on community structure, distinguishing between member-initiated <strong>and</strong> organizationsponsored<br />
communities.<br />
3.3 Motivations in wireless communities<br />
A nice starting point for describing research on motivation in wireless communities is a literature<br />
review (Bina <strong>and</strong> Giaglis, 2005) that identifies 8 papers that propose a first list of motivations<br />
(cooperative spirit, gain prestige, challenge telecom firms <strong>and</strong> promote free communication) without<br />
empirical investigation.<br />
The first attempt to study these motivations empirically developed a theoretical model with a broad<br />
mix of intrinsic (enjoyment, competence, autonomy, relatedness), obligation-based (reciprocity,<br />
shared values) <strong>and</strong> extrinsic motivations (explicit rewards, external pressure, self-esteem, ego<br />
involvement, connectivity needs, human capital, career prospect, altruism). The model was tested<br />
with surveys in Greece (Bina <strong>and</strong> Giaglis, 2006) <strong>and</strong> Australia (Lawrence et al., 2007), finding that<br />
different groups of members participate with different mixes of intrinsic <strong>and</strong> extrinsic motivations, with<br />
the former being more prevalent.<br />
Subsequent studies in Canada (Wong <strong>and</strong> Clement, 2007; Cho, 2008) found that similar short-term<br />
motivations based on personal interest (fun, learning, social, professional networking, free access) are<br />
complemented by long-term motivations based on public interest (promoting inclusion in the<br />
<strong>Information</strong> Society, media democracy, civic activism). A recent paper (Shaffer, 2010) found similar<br />
self interest motivations like gratification from <strong>using</strong> technical skills, obtaining free access <strong>and</strong> public<br />
interest motivations like contributing to exp<strong>and</strong>ing broadb<strong>and</strong> access.<br />
Finally, (Camponovo <strong>and</strong> Picco-Schwendener, 2010) analyzed motivations in large ‘hybrid’ community<br />
(supported by a firm) finding that unlike in pure communities members are motivated mainly by<br />
utilitarian (free network access) or psychological (idealism <strong>and</strong> feeling competent) rather than intrinsic<br />
or social motivations (socializing with peers or feel part of a community).<br />
602
Giovanni Camponovo<br />
A graphical summary of these papers <strong>and</strong> the relative motivation is shown below.<br />
Table 3: Motivations in wireless communities<br />
Psychological factors Social factors Utilitarian factors<br />
Author type Interest competenc<br />
enjoymen e self-<br />
t esteem<br />
altruistic<br />
values<br />
social<br />
relations<br />
social<br />
influence<br />
reciprocity<br />
Utility<br />
(pers.<br />
need)<br />
Utility<br />
(rewards)<br />
(Bina <strong>and</strong><br />
pure<br />
Giaglis, 2006)<br />
(Lawrence et<br />
pure<br />
al., 2007)<br />
atlruism,<br />
collective<br />
rewards<br />
interest competence relatedness<br />
ideology<br />
identificatio reciprocity connectivity (insignifican<br />
n<br />
t)<br />
intrinsic competence atlruism,<br />
(Wong <strong>and</strong><br />
Clement, pure<br />
2007)<br />
(Cho, 2008) pure<br />
(Shaffer, variou<br />
2010) s<br />
(Camponovo<br />
<strong>and</strong> Picco- hybrid<br />
Schwendener<br />
2010)<br />
(Camponovo<br />
<strong>and</strong> Piccohybrid<br />
Schwendener,<br />
2011)<br />
collective<br />
rewards<br />
relatedness<br />
ideology<br />
identificatio reciprocity connectivity (insignifican<br />
n<br />
t)<br />
promoting<br />
cooperative<br />
reduce<br />
access<br />
connectivity<br />
membership<br />
costs<br />
(low)<br />
providing social<br />
professional<br />
fun learning<br />
free WiFi networking<br />
related<br />
goals<br />
use<br />
exp<strong>and</strong><br />
technical<br />
connectivity save money<br />
access<br />
skills<br />
cheap<br />
feeling altruistic contact with sense of<br />
reciprocity connectivity router,<br />
competent reasons members community<br />
revenue<br />
cheap<br />
technical spirit of<br />
reciprocity connectivity router,<br />
interest sharing<br />
revenue<br />
It appears that while motivations are very heterogeneous, utilitarian motivation (obtain free<br />
connectivity), together with altruistic motivation (help others by offering access) <strong>and</strong> competence (the<br />
possibility to learn <strong>and</strong> show technical skills) are the most frequently cited motivations. While the mix<br />
of utilitarian <strong>and</strong> altruistic motivation may seem strange, it is worth noticing that with the diffusion of<br />
flat-fee broadb<strong>and</strong> connections offering free access to others does not have any impact on costs or<br />
personal use.<br />
What is more interesting is that social <strong>and</strong> intrinsic motivations are higher in pure communities,<br />
whereas utilitarian motivations are more salient in hybrid communities. This may be explained by the<br />
presence of a firm in hybrid communities, their greater use of rewards (which tend to have a negative<br />
effect on intrinsic motivation (Gagné <strong>and</strong> Deci, 2005)), their larger size (which increases utility due to<br />
network externalities (Economides, 1996) <strong>and</strong> reduces the strength of social ties among members<br />
(Olson, 1971)) or because they emerged later (thus attract late adopters that are more attracted by<br />
tangible aspects (Moore, 1999)).<br />
3.4 Motivations in virtual communities of practice<br />
Virtual communities of interest or practice are without doubt the most studied virtual communities,<br />
probably because they have a much longer tradition than the other types (they exist since more than<br />
30 years in the form of Usenet newsgroups <strong>and</strong> forums) <strong>and</strong> have been widely adopted inside<br />
organizations (in particular to help communication <strong>and</strong> share knowledge among employees). A<br />
selection of the most relevant empirical studies of member motivations in such communities is shown<br />
in the next table.<br />
The investigation of motivation for contributing to organizational communities of practice aimed at<br />
sharing knowledge inside organizations has produced a large body of literature that focuses on the<br />
importance of sharing knowledge as a foundation for a firm’s competitive advantage (cf. Grant, 1991)<br />
<strong>and</strong> the importance of personal beliefs, institutional structure <strong>and</strong> context (cf. Bock et al., 2005 for a<br />
nice literature review).<br />
With regard to empirical studies about the motivations of individuals, various authors have been<br />
inspired by different theories <strong>and</strong> have consequently found rather heterogeneous results as shown<br />
below in table 5. For instance Bock et al. (2002; 2005) found that contributors are driven primarily by<br />
anticipated reciprocal relationships, a sense of self-worth by contributing <strong>and</strong> an organizational climate<br />
that is fair <strong>and</strong> innovative, but may be hindered by extrinsic rewards. In contrast, (Kankanhalli et al.,<br />
603
Giovanni Camponovo<br />
2005) confirmed that self-efficacy was important, but also found that extrinsic factors like rewards<br />
played an important role. Other studies also add recognition as an expert as a relevant motivation<br />
(Ardichvili et al., 2003). It is difficult to fully explain such a heterogeneity of motivation, which probably<br />
depends a lot on contextual factors such as organizational culture (trust, climate, norms etc.), business<br />
sector <strong>and</strong> national culture.<br />
Table 4: Motivations in virtual communities of practice<br />
Author communit<br />
y type<br />
Bock<br />
2002<br />
Ardichvili<br />
2003<br />
Bock<br />
2005<br />
Kankanh<br />
alli 2005<br />
Wasko<br />
2000<br />
Butler<br />
2002<br />
Wasko<br />
2005<br />
Nonneck<br />
e 2006<br />
enterpris<br />
e<br />
enterpris<br />
e<br />
enterpris<br />
e<br />
enterpris<br />
e<br />
public<br />
public<br />
public<br />
public<br />
Peddibh<br />
otla 2005 public<br />
Sangwan<br />
2005<br />
Chen<br />
2006<br />
Huang<br />
2008<br />
public<br />
public<br />
public<br />
Interest<br />
enjoyment<br />
Psychological factors Social factors Utilitarian factors<br />
competenc<br />
e self-<br />
esteem<br />
expected<br />
contributio<br />
n<br />
sense of<br />
self worth<br />
knowledge<br />
selfefficacy<br />
enjoyment<br />
entertainin learn<br />
g<br />
enjoy<br />
myself<br />
entertainm<br />
ent (not<br />
sig.)<br />
selfexpertise<br />
(not sig.)<br />
competenc<br />
e<br />
self<br />
expression<br />
altruistic<br />
values<br />
public<br />
interest<br />
enjoyment<br />
in helping<br />
others<br />
altruism<br />
pro-social<br />
altruistic<br />
benefits<br />
enjoy<br />
helping<br />
offer my<br />
expertise<br />
altruistic<br />
(not sig.)<br />
social<br />
relations<br />
expected<br />
association<br />
s<br />
anticipated<br />
relationship<br />
s<br />
interaction<br />
with a<br />
community<br />
social<br />
benefits<br />
(relations)<br />
social<br />
influence reciprocity<br />
expert<br />
status<br />
image<br />
(not sig.)<br />
visibility<br />
benefits<br />
giving back<br />
Fairness<br />
reciprocity<br />
centrality reputation reciprocity<br />
(not sig.)<br />
make<br />
friends<br />
social<br />
interaction<br />
(-)<br />
social<br />
interaction<br />
expectation<br />
discussing<br />
with people<br />
be a<br />
communit<br />
y member<br />
social<br />
adjustive<br />
(not sig.)<br />
Utility<br />
(pers.<br />
need)<br />
reciprocity valuable<br />
information<br />
<strong>Information</strong><br />
benefits<br />
get<br />
answers<br />
knowledge<br />
& utilitarian<br />
information<br />
needs<br />
knowledge<br />
expectatio<br />
n<br />
usefulness<br />
&<br />
information<br />
Utility<br />
(rewards)<br />
expected<br />
rewards (-)<br />
anticipated<br />
rewards (-)<br />
organizatio<br />
n rewards<br />
Communities of practice in public settings, such as thematic forums <strong>and</strong> newsgroups, have also<br />
received a lot of attention. Motivations differ to a certain extent with regard to enterprise communities,<br />
especially as social aspects <strong>and</strong> personal needs are much higher (Chen, 2007; Huang et al., 2008).<br />
These motivations have been extensively investigated as part of a debate on lurkers versus active<br />
contributors, based on the observation that many members just to get the information they need but<br />
do not actively contribute. Butler et al. (2007) found that active participant have higher social <strong>and</strong><br />
altruistic motivations (they really enjoy interacting with people with similar interests as well as helping<br />
them) but are less motivated by information benefits than lurkers. Nonnecke et al. (2006 ) similarly<br />
focused on the difference between poster <strong>and</strong> lurkers, finding similar results except posters also had<br />
higher motivations with regard to information benefits as well as intrinsic enjoyment. Other papers<br />
also add competence <strong>and</strong> visibility as other significant motivations (Wasko <strong>and</strong> Faraj, 2000; 2005;<br />
Peddibhotla <strong>and</strong> Subramani, 2005; Sangwan, 2005). The absence of rewards from motivations is not<br />
surprising as they are hardly used by this type of communities.<br />
604
Giovanni Camponovo<br />
3.5 Motivations in open source software communities<br />
Literature about motivation in open source software communities is also quite large. In the following<br />
table we summarize the most relevant papers that study contributors’ motivations empirically. It is<br />
worth noticing that there also are a number of papers describe motivations <strong>using</strong> a case-study<br />
methodology or economic models (see Bitzer et al. (2007) for a concise review) which are not<br />
reported in the following table as they do not offer an empirical justification.<br />
In contrast with the other two types of communities examined in this paper, in this case it is often not<br />
possible to make the distinction between member-generated <strong>and</strong> firm-supported communities since<br />
most of the papers described below wither addressed their surveys to a mix of communities (thus<br />
potentially comprising communities of both types) or did not specify to which type the community<br />
belonged.<br />
Table 5: Motivations in Open Source communities<br />
Author<br />
(Hars <strong>and</strong> Ou,<br />
2001)<br />
Interest<br />
enjoyment<br />
self-determination<br />
(Lakhani <strong>and</strong><br />
Wolf, 2005) enjoyment<br />
(David <strong>and</strong><br />
Shapiro, 2008)<br />
(Oreg <strong>and</strong><br />
Nov, 2008)<br />
(Baytiyeh <strong>and</strong><br />
Pfaffman,<br />
2010 )<br />
like the<br />
challenge<br />
flow<br />
Psychological factors Social factors Utilitarian factors<br />
competenc<br />
e selfesteem<br />
human<br />
capital<br />
improve<br />
skills<br />
learn &<br />
get better<br />
selfdevelopme<br />
nt<br />
learning &<br />
creation<br />
altruistic<br />
values<br />
altruism<br />
ideological<br />
motives<br />
ideological<br />
& altrusim<br />
altruistic<br />
altruism<br />
social<br />
relations<br />
community<br />
identificatio<br />
n<br />
like the<br />
team<br />
(low)<br />
interact with<br />
developers<br />
social<br />
influence reciprocity<br />
peer<br />
recognitio<br />
n (low)<br />
enhance<br />
reputation<br />
(low)<br />
reputationbuilding<br />
contribute<br />
because<br />
use<br />
Utility<br />
(pers.<br />
need)<br />
personal<br />
needs<br />
personal<br />
needs<br />
personal<br />
needs<br />
Utility<br />
(rewards)<br />
paid for<br />
developmen<br />
t<br />
paid for<br />
contribution<br />
employer<br />
pressure<br />
(low)<br />
Table 3 shows that the motivations that drive open source participants are variegate. The most<br />
important motivations appear to be the need of feeling competent (which is also close to the feeling of<br />
enjoyment of taking on a challenge) as well as altruism (which is coherent with the values of freedom<br />
behind the open source movement). Another common motivation is linked to personal need: many<br />
open source projects <strong>and</strong> contributions do indeed start with the idea of developing functionalities<br />
needed by the developers themselves. The presence of rewards is also unsurprising, as enterprises<br />
increasingly make use of the open source development model <strong>and</strong> developers are increasingly being<br />
paid to work on it (Fitzgerald, 2006). On the other h<strong>and</strong>, it is surprising that reputation <strong>and</strong> social<br />
relations are seldom found to be important motivations.<br />
4. Discussion <strong>and</strong> conclusions<br />
By performing a literature review of empirical studies in virtual communities, this paper shows that the<br />
motivations that drive members to participate in such communities are rather diverse <strong>and</strong> variegate:<br />
they comprise intrinsic psychological reasons (such as intrinsic enjoyment, need to feel worthy <strong>and</strong><br />
competent <strong>and</strong> good feeling of being altruistic), social reasons (such as the desire to entertain social<br />
relations with interesting people, get social recognition or respect reciprocity exchanges in a<br />
community) as well as economic reasons (such as the utility obtained by satisfying a personal need<br />
as well as extrinsic benefits).<br />
This paper also proposed a classification that distinguishes among various types of virtual<br />
communities based on their orientation (social, professional <strong>and</strong> commercial) <strong>and</strong> their structure (pure<br />
communities self-managed by members <strong>and</strong> hybrid communities supported by a firm or nonprofit<br />
organization).<br />
605
Giovanni Camponovo<br />
By examining empirical paper in three types of communities (communities of practice, open source<br />
communities <strong>and</strong> wireless communities), this paper found that motivations are diverse both within <strong>and</strong><br />
across communities. In particular, while empirical results of papers are somewhat heterogeneous –<br />
namely because of the large number of reference theories employed (see section 3.1) <strong>and</strong> thus often<br />
foc<strong>using</strong> only on a subset of potentially relevant motivations supported by the chosen reference<br />
theory – some general observations can be made. Firstly it appears that the importance of extrinsic<br />
rewards is more important in hybrid communities supported by a firm (this can be seen in wireless<br />
communities <strong>and</strong>, to a lesser extent, in communities of practices). Secondly, it appears that members<br />
often are motivated by a combination of different motivation that reinforce each other such as<br />
satisfying personal needs (which triggers usage of the community) as well as social <strong>and</strong> psychological<br />
needs (which also favor a more active contribution).<br />
Of course this paper has some limitations in that it only focuses on empirical studies (thus neglecting<br />
to do proper justice to the vast amount of more theoretical papers) <strong>and</strong> only considers three types of<br />
virtual communities. It might therefore be interesting to extend this work to pure relationship<br />
communities such as social networks, entertainment communities such as gaming <strong>and</strong> user<br />
generated content communities (e.g. video <strong>and</strong> photo communities), commercial communities (e.g.<br />
social shopping sites, buyer groups, br<strong>and</strong> communities) as well as peer-to-peer networks.<br />
We hope that this work makes a bit of order in the existing research <strong>and</strong> stimulates further research.<br />
We feel that it is especially important to extend existing research in three directions: 1) make an effort<br />
to avoid an excessive proliferation of reference theoretical models by comparing, integrating <strong>and</strong><br />
consolidating reference theories, which would permit both a better evaluation of competing theories<br />
as well as a better comparability of results across studies; 2) better underst<strong>and</strong> the impact of many<br />
contextual factors that could help explain the heterogeneity of results across the different studies both<br />
within <strong>and</strong> across the various types of community <strong>and</strong> 3) exp<strong>and</strong> the research about communities<br />
within <strong>and</strong> across of different types of communities.<br />
Acknowledgment<br />
This paper has been supported by a research project financed by the Swiss National Science<br />
Foundation under grant number 100014-127006.<br />
References<br />
Ajzen, I. (1991) The Theory of Planned Behaviour. Organizational Behaviour <strong>and</strong> Human Decision Processes,<br />
50, 179-211.<br />
Ardichvili, A., Page, V. & Wentling, T. (2003) Motivation <strong>and</strong> Barriers to Participation in Virtual <strong>Knowledge</strong>-<br />
Sharing Communities of Practice. Journal of <strong>Knowledge</strong> <strong>Management</strong>, 7, 64-77.<br />
Armstrong, A. & Hagel, J. (1996) The Real Value of On-Line Communities. Harvard Business Review, 134-141.<br />
Atkinson, J. W. (1966) An Introduction to motivation, Princeton, Van Nostr<strong>and</strong>.<br />
B<strong>and</strong>ura, A. (1977) Self-efficacy: Toward a Unifying Theory of Behavioural Change. Psychological Review, 84,<br />
191-215.<br />
Batson, C. D. (1998) Altruism <strong>and</strong> prosocial behaviour. In Gilbert, D. T., Fiske, S. & Lindzey, G. (Eds.) The<br />
H<strong>and</strong>book of Social Psychology. 4th ed. New York, McGraw-Hill.<br />
Baytiyeh, H. & Pfaffman, J. (2010 ) Open source software: A community of altruists. Computers in Human<br />
Behaviour 26, 1345-1354.<br />
Bhattacherjee, A. (2001) An empirical analysis of the antecedents of electronic commerce service continuance.<br />
Decision Support Systems, 32, 201-214.<br />
Bina, M. & Giaglis, G. M. (2005) Emerging Issues in Researching Community-Based WLANS. Journal of<br />
Computer <strong>Information</strong> Systems, 46, 9-16.<br />
Bina, M. & Giaglis, G. M. (2006) Unwired Collective Action: Motivations of Wireless Community Participants. In<br />
International Conference on Mobile Business. Copenhagen, Denmark.<br />
Bitzer, J., Schrettl, W. & Schroder, P. J. H. (2007) Intrinsic motivation in open source software development.<br />
Journal Journal of Comparative Economics, 35 160-169.<br />
Blau, P. M. (1964) Exchange <strong>and</strong> power in social life, New York, Wiley.<br />
Bock, G.-w. & Kim, Y.-G. (2002) Breaking the Myths of Rewards: an Exploratory Study of Attitudes About<br />
Knowledgte Sharing. <strong>Information</strong> Resources <strong>Management</strong> Journal, 15, 14-21.<br />
Bock, G.-w., Zmud, R. W., Kim, Y.-G. & Lee, J.-N. (2005) ehavioral Intention Formation in <strong>Knowledge</strong> Sharing:<br />
Examining the Roles of Extrinsic Motivators, Social-Psychological Forces, <strong>and</strong> Organizational Climate. MIS<br />
Quarterly, 29, 87-111.<br />
Butler, B. (2004) When is a group not a group: An Empirical Examination of Metaphors for Online Social<br />
Structure. In Academy of <strong>Management</strong> Annual Meeting. New Orleans.<br />
606
Giovanni Camponovo<br />
Butler, B., Sproull, L., Kiesler, S. & Kraut, R. (2007) Community effort in online groups: Who does the work <strong>and</strong><br />
why? IN WEISBAND, S. P. (Ed.) Leadership at a Distance Research in Technologically Supported Work.<br />
London Lawrence Erlbaum Assoc<br />
Camponovo, G. & Picco-Schwendener, A. (2010) A Model for Investigating Motivations of Hybrid Wireless<br />
Community Participants. In 2010 Ninth International Conference on Mobile Business / 2010 Ninth Global<br />
Mobility Roundtable.<br />
Camponovo, G. & Picco-Schwendener, A. (2011) Motivations of hybrid wireless community participants a<br />
qualitative analysis of Swiss FON members In Submitted to ICMB 2011.<br />
Chen, I. Y. L. (2007) The factors influencing members’ continuance intentions in professional virtual communities<br />
-A longitudinal study. Journal of <strong>Information</strong> Science, 33, 451–467.<br />
Cho, H. H.-N. (2008) Towards Place-Peer Community <strong>and</strong> Civic B<strong>and</strong>width: a Case Study in Community<br />
Wireless Networking. The Journal of Community Informatics, 4.<br />
Clary, E. G., Snyder, M., Ridge, R., Copel<strong>and</strong>, J., Stukas, A., Haugen, J. & Miene, P. (1998) Underst<strong>and</strong>ing <strong>and</strong><br />
assessing the motivations of volunteers : A functional approach. Journal of personality <strong>and</strong> social<br />
psychology, 74, 1516-1530.<br />
David, P. A. & Shapiro, J. S. (2008) Community-based production of open-source software: What do we know<br />
about the developers who participate? <strong>Information</strong> Economics <strong>and</strong> Policy., 20 364-398.<br />
Davis, F. D. (1989) Perceived Usefulness, Perceived Ease of Use, <strong>and</strong> User Acceptance of <strong>Information</strong><br />
Technology. MIS Quarterly, 13, 319-340.<br />
Deci, E. L. & Ryan, R. M. (1985) Intrinsic motivation <strong>and</strong> self-determination in human behaviour, New York,<br />
Plenum.<br />
Economides, N. (1996) The Economics of Networks. International Journal of Industrial Organization, 14, 673-699.<br />
Fishbein, M. & Ajzen, I. (1975) Belief, attitude, intention <strong>and</strong> behaviour an introduction to theory <strong>and</strong> research,<br />
Reading, Massachusetts, Addison-Wesley.<br />
Fitzgerald, B. (2006) The Transformation of Open Source Software. MIS Quarterly, 30, 587-598.<br />
Gagné, M. & Deci, E. L. (2005) Self-determination theory <strong>and</strong> work motivation. Journal of Organizational<br />
Behaviour, 26, 331-362.<br />
Grant, R. M. (1991) The Resource-Based Theory of Competitive Advantage: Implications for Strategy<br />
Formulation. California <strong>Management</strong> Review, 33, 114-135.<br />
Hars, A. & Ou, S. (2001) Working for free? ‘- Motivations of participating in open source projects. In 34th Hawaii<br />
International Conference on System Sciences. IEEE.<br />
Huang, E., Hsu, M.-H. & Yen, Y.-R. (2008) Underst<strong>and</strong>ing participant loyalty intentions in virtual communities.<br />
WSEAS Transactions on <strong>Information</strong> Science <strong>and</strong> Applications, 5.<br />
Hummel, J. & Lechner, U. (2002) Social Profiles of Virtual Communities. In 35th Hawaii International Conference<br />
on System Sciences.<br />
Kankanhalli, A., Tan, B. C. Y. & Wei, K. K. (2005) Contributing <strong>Knowledge</strong> to Electronic <strong>Knowledge</strong> Repositories:<br />
An Empirical Investigation. MIS Quarterly, 29, 113-143.<br />
Lakhani, K. R. & Wolf, R. (2005) Why Hackers Do What They Do: Underst<strong>and</strong>ing Motivation <strong>and</strong> Effort in<br />
Free/Open Source Software Projects. In Feller, J., Fitzgerald, B., Hissam, S. & Lakhani, K. R. (Eds.)<br />
Perspectives on Free <strong>and</strong> Open Source Software. Cambridge, MIT Press.<br />
Lawrence, E., Bina, M., Culjak, G. & El-Kiki, T. (2007) Wireless Community Networks: Public Assets for 21st<br />
Century Society. In International Conference on <strong>Information</strong> Technology Las Vegas.<br />
Markus, U. (2002) Characterizing the virtual community. In.<br />
Moore, G. A. (1999) Crossing the chasm : marketing <strong>and</strong> selling high-tech products to mainstream customers,<br />
New York, HarperBusiness.<br />
Musser, J. & O'Reilly, T. (2006) Web 2.0 principles <strong>and</strong> Best Practices. In O’Reilly Radar Report.<br />
Nonnecke, B., Andrews, D. & Preece, J. (2006 ) Non-public <strong>and</strong> public online community participation: Needs,<br />
attitudes <strong>and</strong> behaviour. Electronic Commerce Research 6, 7-20.<br />
Oliver, R. L. J., , $9. (1980) A cognitive model of the antecedents <strong>and</strong> consequences of satisfaction decisions.<br />
Journal of Marketing Research, 17, 460-469.<br />
Olson, M. (1971) The logic of collective action public goods <strong>and</strong> the theory of groups, Cambridge, Harvard<br />
University Press.<br />
Oreg, S. & Nov, O. (2008) Exploring motivations for contributing to open source initiatives: The roles of<br />
contribution context <strong>and</strong> personal values. Computers in Human Behaviour, 24, 2055-2073.<br />
Peddibhotla, N. & Subramani, M. (2005) “Do the Same Motivations Drive All Contributors to Public Document<br />
Repositories? An Empirical Study. In University of Minnesota Research Paper.<br />
Porter , C. E. (2004) A Typology of Virtual Communities: A Multi-Disciplinary Foundation for Future Research.<br />
Journal of Computer-Mediated Communication, 10.<br />
Preece, J. (2000) Online communities designing usability, supporting sociability, Chichester, Wiley.<br />
Rainer, R. K. & Miller, M. D. (2005) Examining differences across journal rankings. Communications of the ACM,<br />
48, 91-94.<br />
Rheingold, H. (2002) Smart mobs the next social revolution, Cambridge, MA, Perseus Pub.<br />
Rogers, E. M. (2003) Diffusion of innovations, New York, Free Press.<br />
Sangwan, S. (2005) Virtual Community Success: A Uses <strong>and</strong> Gratifications Perspective. In 38th Annual Hawaii<br />
International Conference on System Sciences.<br />
Shaffer, G. L. (2010) Peering into the future: How WiFi signal sharing is impacting digital inclusion efforts. In<br />
Mass Media & Communication. Philadelphia, Temple University.<br />
607
Giovanni Camponovo<br />
Valler<strong>and</strong>, J. R. (1997) Towards a hierarchical model of intrinsic <strong>and</strong> extrinsic motivation. Advances in<br />
Experimental Social Psychology, 29, 271-374.<br />
Venkatesh, V., Morris, M. G., Davis, G. B. & Davis, F. D. (2003) User acceptance of information technology:<br />
Toward a unified view. MIS Quarterly, 27, 425-478.<br />
Vroom, V. H. (1964) Work <strong>and</strong> motivation, New York, Wiley.<br />
Wasko, M. & Faraj, S. (2000) It is what one does: why people participate <strong>and</strong> help others in electronic<br />
communities of practice. Journal of Strategic <strong>Information</strong> Systems, 9, 155-173.<br />
Wasko, M. & Faraj, S. (2005) Why Should I Share? Examining <strong>Knowledge</strong>. Contribution in Electronic Networks of<br />
Practice. MIS Quarterly, 29, 1-23.<br />
Whittaker, S., Isaacs, E. & O'Day, V. (1997) Widening the net: workshop report on the theory <strong>and</strong> practice of<br />
physical <strong>and</strong> network communities. ACM SIGCHI Bulletin 29.<br />
Wong, M. & Clement, A. (2007) Sharing Wireless Internet in Urban Neighbourhoods. In Steinfield, C., Pentl<strong>and</strong>,<br />
B., Ackerman, M. & Contractor, N. (Eds.) Third Communities <strong>and</strong> Technologies Conference. East Lansing<br />
(Michigan), Springer.<br />
608
An Enterprise Ontology Approach for Defining Enterprise<br />
<strong>Information</strong> Architecture<br />
Bernardo Gomes, André Vasconcelos <strong>and</strong> Pedro Sousa<br />
Instituto Superior Técnico, Oeiras, Portugal<br />
INOV, Lisboa, Portugal<br />
bernardosilvagomes@gmail.com<br />
<strong>and</strong>re.vasconcelos@ist.utl.pt<br />
pedro.sousa@ist.utl.pt<br />
Abstract: The role played by information in organizations is becoming increasingly important, since it is<br />
becoming clear its relevance as a central background for Enterprise Architecture <strong>and</strong> Enterprise Engineering.<br />
The enormous amount of <strong>Information</strong> in organizations leads to the development of <strong>Information</strong> Architectures in<br />
order to support this problem. Thus, the Portuguese Public Administration, being aware of that, wants to be well<br />
prepared regarding the information context, having a consistent <strong>Information</strong> Architecture to be used as a<br />
reference. Such architecture aims to identify the fundamental business information, define the data independently<br />
from the applications or systems, <strong>and</strong> provide the basis for corporative data management. This work aims to<br />
contribute in the development of that <strong>Information</strong> Architecture, introducing the Enterprise Ontologies theme in the<br />
Portuguese Public Administration context, as a new approach for Enterprise Architecture, especially for<br />
<strong>Information</strong> Architecture development. In this paper we present a new methodology for developing <strong>Information</strong><br />
Architecture, based on the DEMO methodology, in particular in the Transaction concept in order to extract<br />
<strong>Information</strong> Entities, their Attributes <strong>and</strong> Relationships for an <strong>Information</strong> Architecture. In our research this<br />
methodology is being tested in some case studies among the Portuguese Public Administration. The<br />
methodology proposed major steps are: (1) collecting of the necessary amount of data about the case study, (2)<br />
which must be resumed in some legible text. From that text, the first steps of DEMO are performed ((3) Performa-<br />
Informa-Forma Analysis, (4) Coordination-Actors-Production Analysis, (5) Transaction Pattern Synthesis), in<br />
order to identify the Transactions that describe that environment. Based on those Transactions, (6) both the<br />
<strong>Information</strong> Entities <strong>and</strong> Attributes are identified. In order to identify Relationships between those entities, (7) the<br />
Result Structure Analysis step is performed. To complete the methodology, <strong>and</strong> based on the previously results,<br />
an (8) Entity-Relationship is designed to represent the entities <strong>and</strong> their relationships.<br />
Keywords: enterprise architecture, information architecture, information entities, attributes, relationships,<br />
enterprise ontologies, DEMO<br />
1. Introduction<br />
Despite the awareness that we live today in an information society, in many organizations information<br />
is still not well managed (Martin, Dmitriev <strong>and</strong> Akeroyd, 2010: 6-12). Thus, <strong>Information</strong> Architecture<br />
(IA) arises as a top discipline towards the improvement of information management, since it can be<br />
viewed as a structured set of multidimensional interrelated elements that support all information<br />
processes (Watson, 2000: 7059). The highest-level of IA is usually very similar among organizations<br />
from the same business area (Inmon, 2000), which allows the development of reference IAs. Public<br />
administration is not an exception in this context, since the amount of information that it deals with is<br />
larger <strong>and</strong> more dispersed. This sense, it also must have an IA that describes the information entities<br />
that underlie the business processes execution (Vasconcelos, 2007).<br />
This work proposes to contribute to the development of an IA to the Portuguese public administration,<br />
susceptible to be used as a reference. It intends to identify <strong>and</strong> describe the information entities that<br />
cut across the entire public administration. Furthermore, it proposes a new approach to the<br />
formulation of that IA, so that it also considers the essence, coherence, consistence, completeness<br />
<strong>and</strong> objectivity that should be important features of it. This new approach is based in the enterprise<br />
ontologies theme, taking in consideration the DEMO methodology.<br />
Figure 1 presents the problem definition, <strong>using</strong> a conceptual map. In that picture, the most relevant<br />
motivation concepts are depicted, <strong>and</strong> also how they are related to each other. Finally, the<br />
relationships stressed with an orange dashed line are the core problems of this work.<br />
This article is structured in order to address the main themes that are the support for this work. Firstly<br />
there is a review in terms of the ‘state of the art’, in order to describe the major theoretical concepts<br />
that support this work. The themes covered are: enterprise ontologies (including the Ѱ-theory <strong>and</strong><br />
DEMO) <strong>and</strong> information architecture (including Inmon taxonomy). After this theoretical review, it will<br />
609
Bernardo Gomes, André Vasconcelos <strong>and</strong> Pedro Sousa<br />
be described the proposed methodology for develop information architectures based on enterprise<br />
ontologies <strong>and</strong> DEMO. This includes an academic example already developed. Then it will be<br />
described the research questions that driven from this proposal. Finally, some conclusions are drawn,<br />
in order to describe the key ideas that should be retained from this work so far.<br />
Figure 1: Conceptual map defining the context <strong>and</strong> problem for this work<br />
2. Enterprise ontologies<br />
The enterprise ontology concept is a concretization of the ontology definition applied to enterprises.<br />
According to Dietz <strong>and</strong> Hoogervorst (2007), its goal is to underst<strong>and</strong> the essence of the construction<br />
<strong>and</strong> operation of complete systems, more specifically, of enterprises. This definition is aligned with the<br />
system ontology definition, looking through the distracting <strong>and</strong> conf<strong>using</strong> actual appearance of an<br />
enterprise right into its deep essence, like an X-ray machine can let you look through the skin <strong>and</strong> the<br />
tissues of the body right into the skeleton (Dietz <strong>and</strong> Hoogervorst, 2007).<br />
2.1 The Ѱ-Theory<br />
The enterprise ontology as described by Dietz (2006) is founded on the Ѱ-theory. This is a holistic<br />
<strong>and</strong> integrative theory, based in a set of four axioms (Dietz, 2006); the operation axiom; the<br />
transaction axiom; the composition axiom; <strong>and</strong> the distinction axiom.<br />
The operation axiom states that the operation of an enterprise is constituted by the activities of actor<br />
roles, which are elementary chunks of authority <strong>and</strong> responsibility, fulfilled by subjects. These<br />
subjects perform two kinds of acts: production acts (P-acts) <strong>and</strong> coordination acts (C-acts), which<br />
produce production facts (P-fact) <strong>and</strong> coordination facts (C-fact), respectively.<br />
The transaction axiom reads that coordination acts are performed as steps in universal patters, called<br />
transactions, which involve two actor roles <strong>and</strong> are aimed at achieving a particular result. A<br />
transaction (which basic pattern is described in Figure 2) evolves in three different phases: the order<br />
phase (O-phase), the execution phase (E-phase) <strong>and</strong> the result phase (R-phase). It is performed by<br />
two actors: the initiator <strong>and</strong> the executor.<br />
610
Bernardo Gomes, André Vasconcelos <strong>and</strong> Pedro Sousa<br />
Figure 2: The basic transaction pattern (Dietz, 2006)<br />
The composition axiom arises from the two possible ways that a transaction is initiated, namely<br />
enclosing <strong>and</strong> self-activation. It reads that every transaction is enclosed in some other transaction, or<br />
is a customer transaction of the organization under consideration, or is a self-activation transaction.<br />
The distinction axiom reads that there are three distinct human abilities playing a role in the operation<br />
of actors: performa, informa, <strong>and</strong> forma (Dietz, 2006).<br />
2.2 Design <strong>and</strong> Engineering Methodology for Organizations (DEMO)<br />
DEMO (Design <strong>and</strong> Engineering Methodology for Organizations) is firstly a theory about the<br />
‘construction’ <strong>and</strong> the ‘operation’ of organizations. It is also a methodology for the design,<br />
engineering, <strong>and</strong> implementation of organizations <strong>and</strong> networks of organizations (Enterprise<br />
Engineering Institute, 2011). DEMO is based in Ѱ-theory (Hoogervorst <strong>and</strong> Dietz, 2008), <strong>and</strong> takes<br />
into consideration the organization theorem. It is composed by four distinct aspects models, which<br />
correspond to diagrams, tables <strong>and</strong> lists. Its initial point must use all documentation about enterprise,<br />
of whatever kind. There are six major initial steps are: Performa-Informa-Forma analysis;<br />
Coordination-Actors-Production analysis; Transaction Pattern synthesis; Result Structure analysis;<br />
Construction synthesis; Organization synthesis.<br />
3. <strong>Information</strong> Architecture<br />
Dillon (2002: 821-823) defined IA as the process of designing, implementing, <strong>and</strong> evaluating<br />
information spaces that are humanly <strong>and</strong> socially acceptable to their intended stakeholders.<br />
According to Vasconcelos (2007) IA (or data architecture) is proposed as one of the sub-architectures<br />
of the enterprise architecture spectrum. According to Spewak (1993), there are three different<br />
concepts for IA:<br />
<strong>Information</strong> Entity: any person, place, concept or event that is meaningful in the business context,<br />
<strong>and</strong> which information might be stored.<br />
Attribute: some feature of an entity, which details its definition.<br />
Relationship: an attribute that is related with some other entity.<br />
3.1 <strong>Information</strong> entities by Inmon<br />
Inmon taxonomy, introduced by W. Inmon, arises as an important methodology to classify data. Data<br />
can be classified according to three dimensions (Inmon, 1989): primitive vs. derived; historic vs.<br />
611
Bernardo Gomes, André Vasconcelos <strong>and</strong> Pedro Sousa<br />
projected; publics vs. private. Those different type of data determine the data access features <strong>and</strong><br />
also of its management information systems. Taking in consideration those dimensions, we have the<br />
following type of data: primitive data; derived data; historic data; projected data; public data; private<br />
data.<br />
4. <strong>Information</strong> Architecture based on enterprise ontologies<br />
The solution proposed in this work is DEMO based, allowing the creation of an IA for the considered<br />
ontological world. This solution might be organized <strong>and</strong> described in a sequential set of steps. Most of<br />
them are from DEMO methodology, <strong>and</strong> the others are additions made in order to achieve our aim.<br />
Figure 3: The proposed methodology<br />
The purpose of each step of the methodology (Figure 3) might be described as follows:<br />
Step I – Identify <strong>and</strong> separate Performa, Informa <strong>and</strong> Forma items.<br />
Step II – Identify actor roles, C-acts/facts <strong>and</strong> P-acts/results.<br />
Step III – Cluster facts <strong>and</strong> results into transactions; depicts their results.<br />
Step IV – Identify information entities <strong>and</strong> attributes based on the result types of each transaction;<br />
classify attributes <strong>using</strong> Inmon taxonomy.<br />
Step V – Identify dependencies between transactions; identify relationships between entities.<br />
Step VI – Create an E-R model to describe the IA.<br />
4.1 Example<br />
In order to better underst<strong>and</strong> the proposed methodology it will be described an example based on the<br />
library example case used by Dietz (2006), about the operation of a typical library, including the<br />
possibility to be a member of it, loan books, etc. The first two steps, described in (Dietz, 2006), regard<br />
both the performa-informa-forma analysis <strong>and</strong> the coordination-actors-production analysis. Based on<br />
those steps, the third step of the proposed methodology depicts the transactions that describe the<br />
scenario. The result of step III is detailed in Table 1, which also includes a part of step IV, (entities<br />
<strong>and</strong> attributes depicted in green <strong>and</strong> red, respectively.<br />
Table 1: Step III of the proposed methodology<br />
612
Bernardo Gomes, André Vasconcelos <strong>and</strong> Pedro Sousa<br />
Step IV (Table 2) identifies the information entities <strong>and</strong> attributes (classified by Inmon taxonomy).<br />
Table 2: Step IV of the proposed methodology for the library example<br />
Step V of the proposed methodology, described in Figure 4, applies the structure analysis of DEMO.<br />
Figure 4: Step V of the proposed methodology for the library example<br />
Finally, step VI describes the E-R model for this basic IA, depicted in Figure 5.<br />
Figure 5: Step VI of the proposed methodology for the library example<br />
613
5. Research questions<br />
Bernardo Gomes, André Vasconcelos <strong>and</strong> Pedro Sousa<br />
After the description of the proposed methodology <strong>and</strong> of the correspondent academic example, it is<br />
important for the reader to underst<strong>and</strong> the questions that appear associated with its development.<br />
These research questions driven from the challenges faced in creating a new methodology. The<br />
objectives associated with this work might be summed up through the description of a set of major<br />
research questions that the result from it might answer. Thus, the main questions/problems that this<br />
work aims to solve are:<br />
How might enterprise ontologies be used in order to define an IA?<br />
Specifically, how might the transactions defined by DEMO (based on enterprise ontologies) be<br />
used in order to extract the information entities that define an IA?<br />
6. Conclusions<br />
As a response to the awareness of the importance of information among organizations, a Portuguese<br />
Public Administration Agency is developing an IA that might be used as a reference in the Portuguese<br />
public administration context. That architecture intends to depict the most important information<br />
entities that transverse that wide spectrum.<br />
Several efforts have been done in order to create that IA, <strong>and</strong> some other to improve its quality.<br />
However, the actual architecture is still in development, <strong>and</strong> it is expected for it to have a higher<br />
quality. In this context, our work intends to be part of this development process, improving the final<br />
result quality. Taking in consideration a different approach, based on the enterprise ontologies, the<br />
main objective is to underst<strong>and</strong> how the enterprise ontologies, especially the DEMO methodology,<br />
might be used to develop an organization IA. The proposed solution is based in the DEMO, in order to<br />
extract information entities to represent an IA. This information entities, its attributes <strong>and</strong> relations are<br />
intended to be extracted based on the transactions defined by DEMO.<br />
Due to this decision of <strong>using</strong> enterprise ontologies <strong>and</strong> DEMO, there are several issues that are<br />
intended to be addresses <strong>and</strong> possible solved, while there are advantages that are associated. The<br />
work that is intended to be developed in this research aims to combine ‘good practices’ from work<br />
already done, tested <strong>and</strong> accepted. This sense, this aims to be a combination of both IA <strong>and</strong><br />
enterprise ontologies, achieving the best of the two worlds through the benefits from both. The result<br />
from this work might enable the development of an IA not to be as ad hoc as it is nowadays. The<br />
definition of a methodology might enable this development to be schematized <strong>and</strong> well-defined,<br />
enabling better results. Another major advantage that should come out from this work are the features<br />
from DEMO, that should be transposed to the methodology performed. Since this methodology is<br />
based on enterprise ontologies <strong>and</strong> especially the DEMO methodology, its benefits should also be<br />
part of the methodology features. Those benefits are: coherency, consistency, completeness,<br />
modularity, <strong>and</strong> objectivity.<br />
Besides those advantages, there are some problems that might occur during this work. This is a<br />
research to define a new methodology, <strong>and</strong> the possibility for this methodology not be as possible as<br />
we think should not be neglected. This sense, the fact that enterprise ontologies do not define<br />
(clearly) the information entity concept might be a problem in its identification, <strong>and</strong> should be<br />
considered as a vital step for this methodology. Furthermore, there are also other problems that might<br />
appear during the development of this work, which might be related to the complexity associated with<br />
the public administration context. It might be a problem for us to gather the necessary information<br />
(documents, etc.) in order to apply DEMO in order to apply the proposed methodology.<br />
References<br />
Dietz, J.L.G. (2006) Enterprise Ontology: Theory <strong>and</strong> Methodology, Berlin: Springer.<br />
Dietz, J.L.G. <strong>and</strong> Hoogervorst, J.A.P. (2007) 'Enterprise Ontology <strong>and</strong> Enterprise Architecture – how to let them<br />
evolve into effective complementary notions', GEAO Journal of Enterprise Architecture.<br />
Dillon, A. (2002) '<strong>Information</strong> architecture in JASIST: just where did we come from?', Journal of the American<br />
Society for <strong>Information</strong> Science <strong>and</strong> Technology, pp. 821-823.<br />
Enterprise Engineering Institute (2011) Welcome to the website of the Enterprise Engineering Institute, [Online],<br />
Available: HYPERLINK "http://www.demo.nl/" http://www.demo.nl/ [Nobember 2010].<br />
Hoogervorst, J.A.P. <strong>and</strong> Dietz, J.L.G. (2008) 'Enterprise Ontology in Enterprise Engineering', Symposium on<br />
Applied Computing, Fortaleza, 572-579.<br />
614
Bernardo Gomes, André Vasconcelos <strong>and</strong> Pedro Sousa<br />
Inmon, W. (1989) Data Architecture: The <strong>Information</strong> Paradigm, 2 nd edition, QED <strong>Information</strong> Sciences.<br />
Inmon, W. (2000) Using the Generic Data Model, Author.<br />
Martin, A., Dmitriev, D. <strong>and</strong> Akeroyd, J. (2010) 'A resurgence of interest in <strong>Information</strong> Architecture', International<br />
Journal of <strong>Information</strong> <strong>Management</strong>, pp. 6-12.<br />
Spewak, S. <strong>and</strong> Hill, S. (1993) Enterprise Architecture Planning: developing a blueprint for data, applications <strong>and</strong><br />
technology, Boston: QED Pub. Group.<br />
Vasconcelos, A. (2007) PhD Thesis: Arquitecturas dos Sistemas de Informação: Representação e Avaliação,<br />
Lisbon: Author.<br />
Watson, R.W. (2000) 'An Enterprise <strong>Information</strong> Architecture: A Case Study for Decentralized Organizations',<br />
Proceedings of the 33rd Hawaii International Conference on System Sciences, p. 7059.<br />
615
Review of Lean Method Application for Improvement in<br />
Health <strong>Information</strong> Systems<br />
Soudabeh Khodambashi <strong>and</strong> Maryati Mohd Yusof<br />
UKM University, Bangi, Malaysia<br />
s.khodambashi@gmail.com<br />
mmy@ftsm.ukm.my<br />
Abstract: Medical care is undergoing considerable change due to the application of information technology <strong>and</strong><br />
management tools <strong>and</strong> techniques. Health <strong>Information</strong> Systems (HIS) are used extensively in healthcare to<br />
enhance data processing. Various tools <strong>and</strong> techniques including quality management methods are available to<br />
improve efficiency of HIS. Lean method has become relatively popular in improving clinical process cycle <strong>and</strong><br />
work flow, eliminating non-value added activities known as waste. By applying Lean that optimizes clinical work<br />
flow, we can gain safe, efficient <strong>and</strong> high quality care as well as cost reduction. The aim of this paper is to<br />
investigate the application of Lean method <strong>and</strong> its effectiveness in healthcare. We also focus on several Lean<br />
techniques, its major implementation steps as well as the requirements for implementing Lean in healthcare. The<br />
focus would be on implementation of Lean on clinical process related to HIS. The paper also highlights critical<br />
success factor for healthcare organization to consider when implementing Lean method.<br />
Keywords: lean method, health information system, value stream mapping, clinical work flow<br />
1. Introduction<br />
Health <strong>Information</strong> Systems (HIS) are used extensively in healthcare organizations to support various<br />
conventional data processing tasks. They are also used for scheduling, automating nurse stations,<br />
monitoring intensive care patients, <strong>and</strong> providing preliminary diagnoses. The simplest HIS collects<br />
<strong>and</strong> processes data (Yusof et al., 2008b). The application of information technology in healthcare<br />
highlights significant potentials <strong>and</strong> benefits, particularly with regard to innovations in improving both<br />
clinical <strong>and</strong> administrative processes.<br />
A number of quality management methods have been extensively employed in order to improve<br />
health care quality since the last decade. For example, in optimizing clinical workflow as one of the<br />
critical factor of HIS adoption, Lean method would be a better choice (Schweikhart <strong>and</strong> Dembe, 2009,<br />
Yusof et al., 2008a). Health care organizations adopt Lean in their clinical processes. Some of the<br />
public healthcare systems are planning to use Lean or have already adopted it for improving safety<br />
<strong>and</strong> quality of healthcare (Holden, 2010, Jones <strong>and</strong> Mitchell, 2006). It was reported that 53% of the<br />
current hospitals, implemented Lean method (Holden, 2010).<br />
The aim of this paper is to represent the key findings of a literature review on adoption of Lean<br />
method in clinical practices. This paper focuses on Lean concept, tools that would be useful <strong>and</strong><br />
applicable in healthcare, <strong>and</strong> some of the critical success factors for Lean implementation.<br />
2. Lean method<br />
Lean concept was introduced from Toyota Production System <strong>and</strong> it was first implemented in a US<br />
auto manufacturing. Lean is a quality improvement tool which uses quantitative methods for tracking<br />
data to reach the stated goals by documenting progress to improve quality <strong>and</strong> reduce costs<br />
(DelliFraine et al., 2010). Lean aims to improve efficiency by eliminating non-value added activities<br />
that is known as waste (Schweikhart <strong>and</strong> Dembe, 2009).<br />
In Lean method, all steps <strong>and</strong> activities which add value will be maintain by eliminating intermediate<br />
steps, time, <strong>and</strong> people (Poppendieck, 2002). This goal could be achieved by reducing delivery cycle<br />
or shortening delivery batches without adding additional cost (Hines et al., 2004). Lean concept has<br />
been divided into five categories that are value, value stream, flow, pull, <strong>and</strong> perfection (Staats et al.,<br />
2010).<br />
Some of the tools <strong>and</strong> methods in Lean include Value Stream Mapping, Kaizen (short-cycle continues<br />
improvement, Work St<strong>and</strong>ardization, 5S, cellular manufacturing, inventory management, root cause<br />
analysis, A3 report, Poka-yoke (mistake-proofing), change over time reduction (Singh et al., 2010,<br />
Monden <strong>and</strong> Engineers, 1998, Hines et al., 2004, Monden <strong>and</strong> Engineers, 1983, Schonberger, 1986,<br />
Harrison, 1992, Vinodh et al., 2010, Holden, 2010).<br />
616
Soudabeh Khodambashi <strong>and</strong> Maryati Mohd Yusof<br />
One of the primary steps of Lean which is also important is known as the Value Stream Mapping<br />
(VSM) (Vinodh et al., 2010). In Lean methodology, patient pathway is considered as a value stream.<br />
VSM is a structured diagram, originated by Toyota which includes steps that are all key activities such<br />
as resources, people, information, <strong>and</strong> material flow is mapped graphically in a clear <strong>and</strong> explicit<br />
manner (Singh et al., 2010). VSM is used to identify <strong>and</strong> track all types of waste <strong>and</strong> process flow<br />
integration to increase process efficiency by reorganizing <strong>and</strong> redesigning the system (Schweikhart<br />
<strong>and</strong> Dembe, 2009, Singh et al., 2010, Vinodh et al., 2010, McDonald et al., 2002, Lasa et al., 2008).<br />
3. Lean application in healthcare<br />
Application of Lean in healthcare focuses on eliminating wastes (delays) <strong>and</strong> repeated errors <strong>and</strong><br />
inappropriate procedures (Liptak <strong>and</strong> Patras, 2007). Lean supports users to improve their process<br />
around the customer requirements, values, <strong>and</strong> expectations. In the healthcare environment, the<br />
customer can be a patient, their family, a physician, a nurse, an administrator or any other stakeholder<br />
in the process.<br />
Since one of the important objectives of HIS is to assist physicians <strong>and</strong> nurses to trace most of the<br />
activities in automatic clinical workflow, identifying all the steps which are involved in HIS should be<br />
documented <strong>and</strong> reviewed. VSM creates a holistic schema of all the processes <strong>and</strong> workflows to<br />
underst<strong>and</strong> interdependency of functions, departments <strong>and</strong> even the whole unit over another. Once<br />
the value stream is mapped, the next step is to identify the critical path. Possible improvements<br />
should also be studied to improve value stream (Singh et al., 2010). When improvements in VSM are<br />
identified, the future VSM state should be created to show how a process should work after it is<br />
redesigned. If redesigning is implemented in the VSM, smaller number of steps <strong>and</strong> also shorter<br />
waiting time between steps could be achieved. As a result, HIS will fit into the clinical pathways if VSM<br />
is implemented in advance.<br />
Most studies on HIS implementation, reported efficiency in their processes. For example, medical<br />
error reduction, especially drug interaction <strong>and</strong> other prescription errors, increased patient safety <strong>and</strong><br />
foster just in time approach could achieved by integrating IT system such as electronic medical<br />
records (Liptak <strong>and</strong> Patras, 2007). Based on the literature, Lean method has been implemented in<br />
many hospitals in their clinical workflow such as histology laboratories, operating room <strong>and</strong><br />
emergency department. Buesa (2009) reported that workflow improvement is attributed by 40%<br />
reduction of operational costs in technical personnel, increased productivity <strong>and</strong> decrease bottleneck<br />
as a result of Lean implementation in fifteen histology laboratories. Other studies reported process<br />
improvement in terms of reduced patient waiting time <strong>and</strong> other turnaround time (DelliFraine et al.,<br />
2010b).<br />
A number of challenges have been identified from the pertinent literature. One important issue in<br />
improving the VSM is that isolated improvements within one department or part of the system that<br />
belongs to one department increased the risk of sub optimization that helps the individual<br />
departments but harms the overall system. In order to consider limited time <strong>and</strong> budget when a VSM<br />
as a starting point of Lean is designed, problems should identified, prioritized <strong>and</strong> solved according to<br />
their impact on patients <strong>and</strong> the other stakeholders. In addition, physician resistance exists during<br />
quality improvement process. Thus, employee involvement <strong>and</strong> empowerment in suggesting <strong>and</strong><br />
making changes could be helpful. As a result, a Lean project team could prepare a draft of<br />
documentation, then, the entire department can provide their inputs <strong>and</strong> comments in the draft.<br />
Furthermore, formalizing of methods would be helpful for better management <strong>and</strong> improving of the<br />
workflow. To achieve quality improvement, culture <strong>and</strong> creative thinking should be given more<br />
attention. While traditional management tries to blame individuals for errors, Lean mindset shows that<br />
94% of errors “belong to the system” (Graban, 2008, Deming, 1994). When we learn from errors, we<br />
can use knowledge to prevent future errors (Black, 2005). There are so many companies that failed in<br />
Lean implementation especially in the stage of cultural changes (Yamamoto <strong>and</strong> Bellgran, 2010). On<br />
the other h<strong>and</strong>, training through st<strong>and</strong>ardized work decreases the risk of verbal training. Even with<br />
external expert in Lean, internal stakeholders also are needed to translate Lean from general tools to<br />
local context (Holden, 2010).<br />
4. Discussion <strong>and</strong> conclusion<br />
Lean has potential to healthcare process <strong>and</strong> applicable in healthcare as it increases efficiency,<br />
reduces medical errors, increases patient safety, reduces operational cost <strong>and</strong> decrease bottleneck.<br />
By <strong>using</strong> Lean, we aim to improve <strong>and</strong> increase collaboration <strong>and</strong> team work across departments, so<br />
617
Soudabeh Khodambashi <strong>and</strong> Maryati Mohd Yusof<br />
the risk of sub-optimization can be minimized. By only designing the overall process, the entire<br />
problems will not be solved. However, prioritizing them based on constraint to solve them is an<br />
important aspect to consider. Clinicians are the ones who are very familiar with the details of their<br />
work, hence, they can help to identify better. On the other h<strong>and</strong>, st<strong>and</strong>ardizing the work as a<br />
foundation of Lean should also be considered. In order to have clinician’s agreement to accept<br />
st<strong>and</strong>ardized work, it is important to get them involved in the process. Cultural changes are also<br />
needed to achieve the stated result. Furthermore, having a formal training helps us to reach much<br />
better result. Leadership commitment <strong>and</strong> involvement of internal stakeholders also is another factor<br />
in achieving the goal (Graban, 2008). To conclude, it is worth mentioning that implementing quality<br />
management tools in healthcare which is adopted from a different industry requires an adaption from<br />
its original form <strong>and</strong> context. The underst<strong>and</strong>ing of actors, roles <strong>and</strong> responsibilities, clinical workflow,<br />
processes, <strong>and</strong> critical success factors in Lean implementation in healthcare are crucial to achieve<br />
success. Furthermore, considering Lean method before implementation could be helpful for a project<br />
manager to have a speedy development since st<strong>and</strong>ardized work has been done <strong>and</strong> wasteful<br />
activities has been deleted from the clinical process. Moreover, Lean concepts could be helpful in<br />
mapping the value stream of development processes in software development. This paper is<br />
potentially useful for researchers who desire to conduct study on Lean method in HIS <strong>and</strong> evaluate IT<br />
applications in healthcare settings.<br />
References<br />
Black, N. (2005). <strong>Management</strong> Mistakes In Healthcare: Identification, Correction And Prevention. Journal Of The<br />
Royal Society Of Medicine, 98, 432.<br />
Dellifraine, J., Langabeer, J. & Nembhard, I. (2010). Assessing The Evidence Of Six Sigma And Lean In The<br />
Health Care Industry. Quality <strong>Management</strong> In Healthcare, 19, 211.<br />
Deming, W. E. (1994). The New Economics: For Industry, Government, Education, The Mit Press.<br />
Graban, M. (2008). Lean Hospitals: Improving Quality, Patient Safety, And Employee Satisfaction, Productivity<br />
Press.<br />
Harrison, A. (1992). Just-In-Time Manufacturing In Perspective, Prentice Hall.<br />
Hines, P., Holweg, M. & Rich, N. (2004). Learning To Evolve: A Review Of Contemporary Lean Thinking.<br />
International Journal Of Operations & Production <strong>Management</strong>, 24, 994-1011.<br />
Holden, R. J. (2010). Lean Thinking In Emergency Departments: A Critical Review. Annals Of Emergency<br />
Medicine.<br />
Jones, D. & Mitchell, A. (2006). Lean Thinking For The Nhs. London, Nhs Confederation.<br />
Lasa, I. S., Laburu, C. O. & De Castro Vila, R. (2008). An Evaluation Of The Value Stream Mapping Tool.<br />
Business Process <strong>Management</strong> Journal, 14, 39-52.<br />
Liptak, F. & Patras, V. (2007). Process View On Pharmacy Operations.<br />
Mcdonald, T., Van Aken, E. M. & Rentes, A. F. (2002). Utilising Simulation To Enhance Value Stream Mapping: A<br />
Manufacturing Case Application. International Journal Of Logistics Research And Applications, 5, 213-232.<br />
Monden, Y. & Engineers, I. O. I. (1983). Toyota Production System: Practical Approach To Production<br />
<strong>Management</strong>, Industrial Engineering And <strong>Management</strong> Press, Institute Of Industrial Engineers.<br />
Monden, Y. & Engineers, I. O. I. (1998). Toyota Production System: An Integrated Approach To Just-In-Time,<br />
Engineering & <strong>Management</strong> Press.<br />
Poppendieck, M. (2002). Principles Of Lean Thinking. Oopsla Onward.<br />
Schonberger, R. (1986). World Class Manufacturing: The Lessons Of Simplicity Applied, Free Pr.<br />
Schweikhart, S. & Dembe, A. (2009). The Applicability Of Lean And Six Sigma Techniques To Clinical And<br />
Translational Research. Journal Of Investigative Medicine: The Official Publication Of The American<br />
Federation For Clinical Research, 57, 748.<br />
Singh, B., Garg, S., Sharma, S. & Grewal, C. (2010). Lean Implementation And Its Benefits To Production<br />
Industry. International Journal Of Lean Six Sigma, 1, 157-168.<br />
Staats, B. R., Brunner, D. J. & Upton, D. M. (2010). Lean Principles; Learning; And <strong>Knowledge</strong> Work: Evidence<br />
From A Software Services Provider. Journal Of Operations <strong>Management</strong>, In Press, Accepted Manuscript.<br />
Vinodh, S., Arvind, K. & Somanaathan, M. (2010). Application Of Value Stream Mapping In An Indian Camshaft<br />
Manufacturing Organisation. Journal Of Manufacturing Technology <strong>Management</strong>, 21, 888-900.<br />
Yamamoto, Y. & Bellgran, M. (2010). Fundamental Mindset That Drives Improvements Towards Lean<br />
Production. Assembly Automation, 30, 124-130.<br />
Yusof, M. M., Kuljis, J., Papazafeiropoulou, A. & Stergioulas, L. K. (2008a). An Evaluation Framework For Health<br />
<strong>Information</strong> Systems: Human, Organization And Technology-Fit Factors (Hot-Fit). International Journal Of<br />
Medical Informatics, 77, 386-398.<br />
Yusof, M. M., Papazafeiropoulou, A., Paul, R. J. & Stergioulas, L. K. (2008b). Investigating Evaluation<br />
Frameworks For Health <strong>Information</strong> Systems. International Journal Of Medical Informatics, 77, 377-385.<br />
618
National ICT Strategy <strong>and</strong> its Implementation in Building<br />
<strong>Information</strong> Society in Albania<br />
Ermelinda Kordha 1 <strong>and</strong> As. Kozeta Sevrani 2<br />
1 University of Vlora “Ismail Qemali”, Vlore, Albania<br />
2 University of Tirana, Tirane, Albania<br />
Abstract. <strong>Information</strong> <strong>and</strong> Communication Technologies (ICTs) can be seen as tools, which value<br />
depends on implementation. Yet ICTs are changing almost every sector of society <strong>and</strong> economy.<br />
Today, the society has entered in the stage of information society, in which the creation <strong>and</strong><br />
dissemination of information processing has become the most significant economic activity <strong>and</strong><br />
cultural development. Along with the information society is born the <strong>Information</strong> Economy, in which<br />
knowledge is the main source of value. The Republic of Albania sees ICT development as an essential tool<br />
in building an information society, which in turn is fundamental to the rapid development of Albania <strong>and</strong> the<br />
region. Human capital is seen as the main source for the creation of information society in Albania, so, the<br />
application of ICT. This paper aims to analyze the ICT national strategy <strong>and</strong> its implementation through different<br />
initiatives from public <strong>and</strong> private sector. The final goal is to show the impact on building the information society<br />
in Albania. The methodology used is qualitative. The comparison between the strategy <strong>and</strong> data gathered from<br />
different sources about ICT projects as well as 20 interviews with government officials, project leaders <strong>and</strong><br />
managers countrywide have showed the impact <strong>and</strong> fields most developed contributing in building information<br />
society. The strategy must aim to develop the information society both in stimulating competitiveness <strong>and</strong><br />
applying ICT for the benefit of the whole population. Its implementation has contributed only partly in reaching<br />
some of the objectives. Although the focus has been in finalizing projects in e-government <strong>and</strong> e-education, the<br />
results are still far from those required, for a variety of reasons. The policies guiding the private sector have been<br />
more efficient <strong>and</strong> different ICT subsectors are growing.<br />
Keywords: <strong>Information</strong> society, ICT strategy, human development, implementation, business<br />
1. Introduction<br />
Nowadays ICTs can be applied to a tremendously diverse range of human experience. They are<br />
transforming virtually every sector of society <strong>and</strong> the economy. Today’s technological transformations<br />
are intertwined with globalization, <strong>and</strong> together they are creating the new realities of the global<br />
economy. In a society where the information <strong>and</strong> knowledge are of vital importance for the purpose of<br />
development, the role of ICT is growing. So, ICTs play the role of an enabler of development in<br />
several respects, cross-sector productivity <strong>and</strong> economic growth, specific social development goals<br />
<strong>and</strong> political participation <strong>and</strong> good governance, taking the society in the phase of <strong>Information</strong> society.<br />
While there are good grounds for believing that the use of ICTs are positively correlated to productivity<br />
growth, acquiring ICTs is not enough for countries to derive economic benefits (OECD 2003). This is<br />
taken into account when thinking of the proper strategies that lead towards the information society.<br />
Different initiatives have taken place from the EU to help countries <strong>and</strong> regions building national <strong>and</strong><br />
regional ICT strategies. At this point we will try to analyze the Albanian national ICT strategy <strong>and</strong> its<br />
implementation through different projects. Below it will be presented the need for ICT strategy in<br />
striving for the creation of an information society, in general, as well as the results of the exploratory<br />
research about the most developed fields that drive the building of <strong>Information</strong> society .<br />
2. <strong>Information</strong> society <strong>and</strong> ICT strategy<br />
The importance of information is rising in societies around the world. An ‘information society’ is a<br />
society in which we take for granted the role of information as it pervades <strong>and</strong> dominates the activities<br />
of government, business <strong>and</strong> everyday life. The information society will be characterized by the fact<br />
that the rapid <strong>and</strong> convenient delivery of needed information is the ordinary state of affairs (Garfield<br />
2001). Together with the information society is born the information economy, which characterizes an<br />
economy with an increased emphasis on informational activities <strong>and</strong> information industry. Problems<br />
appear already at the definition of information society or information economy (Karvalics 2005). The<br />
term “information economy” refers to “a new global electronic structure, wherein the production of<br />
information goods <strong>and</strong> services dominates wealth <strong>and</strong> job creation, <strong>and</strong> is underpinned by the use of<br />
information <strong>and</strong> communication technologies (ICTs) <strong>and</strong> the global information<br />
infrastructure.”(Cogburn 1999). However, information economy is considered a "stage" of an<br />
economy, coming after manufacturing. <strong>Information</strong> society, is a closely related but wider concept.<br />
Closer terms to information economy would include knowledge economy <strong>and</strong> post-industrial economy.<br />
619
Ermelinda Kordha <strong>and</strong> As. Kozeta Sevrani<br />
<strong>Information</strong> <strong>and</strong> knowledge are the bedrock of the <strong>Knowledge</strong> Economy – the “currency” of modern<br />
societies (Markle foundation 2003). The term ‘<strong>Knowledge</strong> Society’ generally refers to a society where<br />
knowledge is the primary production resource instead of capital <strong>and</strong> labour. Various observers<br />
describe today's global economy as one in transition to a "knowledge economy," as an extension of<br />
an "information society."In today’s increasingly integrated global economy, firms across the economic<br />
l<strong>and</strong>scape, including those in developing countries, will need to learn how to acquire <strong>and</strong> use<br />
information effectively if they hope to succeed. In many cases information strategies are<br />
communicated just as information society development programs, with direct concentration of<br />
governmental resources <strong>and</strong> systematic realization of long-term operative programs (Karvalics 1997).<br />
In visioning <strong>and</strong> in developing ICT strategies, it is important to think strategically of ICTs as enablers<br />
of human development. It is imperative to consider how enhanced access to information can improve<br />
the lives of people as well as stimulate the economy <strong>and</strong> streamline government.<br />
3. Methodology<br />
The methodology used is qualitative. We have analyzed the actual ICT strategy of Albania in the light<br />
of information society. First of all we aimed to underst<strong>and</strong> the stage of strategy implementation, so we<br />
compared the strategy areas <strong>and</strong> data gathered about ICT projects implemented in Albania. Than, we<br />
have administered 20 semi-structured interviews with government officials, project leaders <strong>and</strong><br />
managers countrywide. The goal was to take their perception about ICT strategy implementation in<br />
Albania <strong>and</strong> the factors where Albania should focus more. The interviews were administered face to<br />
face <strong>and</strong> were registered. Then, they were analyzed to identify the most frequently mentioned<br />
problems <strong>and</strong> results in implemented projects. These findings will be showed below.<br />
4. The Albanian ICT strategy in the regional context<br />
ICT adoption <strong>and</strong> its impact in economy <strong>and</strong> society has been especially vigorous in certain Member<br />
States (e.g. Irel<strong>and</strong>, Finl<strong>and</strong>), while this effect has still not materialized in most EU countries (Van Ark<br />
<strong>and</strong> Inklaar 2005). From a policy perspective, the concept of <strong>Information</strong> <strong>and</strong> knowledge societies,<br />
raise the awareness of the need to adopt regional policies together with country‐level initiatives, since<br />
the impact is visible. In the context of ICT strategy, Albanian government has included the national<br />
strategy in the e eSEE – Agenda for the development of <strong>Information</strong> society. The goals of the National<br />
ICT Strategy are to exploit the potential of ICT in order to promote human development in the country,<br />
to support growth <strong>and</strong> sustainable development <strong>and</strong> to increase living st<strong>and</strong>ards for the whole<br />
population. The vision of Albanian strategy is based upon the principles of building an information<br />
society, because the human factor is an important asset. ICT is underpinning technology for all<br />
reforms proposed by Albanian government. Albania has already implemented the strategy document<br />
for 2002-2007 <strong>and</strong> now it is referring to the improvements in the document of 2007 -2013 which<br />
describes the general goals <strong>and</strong> defines strategic actions to achieve the goals.Major strategic areas to<br />
be addressed are:<br />
Government as Promoter, Legislator <strong>and</strong> User of ICT,<br />
Use of ICT for Education, Research, Health <strong>and</strong> Social Services.<br />
Building Infrastructure needed for an Open <strong>Information</strong> Society,<br />
Generating Economic Growth in the Private Sector,<br />
Ensuring Relevance of ICT Strategy within a Regional <strong>and</strong> European Context<br />
All the individual goals cover the areas that are important for building an information society as stated<br />
previously in the literature review.<br />
5. ICT strategy Implementation in Albania<br />
Implementation of ICT strategy has taken place in the past 9 years ( 2002 - 2011) <strong>and</strong> is still going to<br />
be fulfilled in the next two years. According to government officials interviewed in the next future there<br />
will be an extension to this strategy where the development of information society will focus more on<br />
bettering st<strong>and</strong>ard of leaving.<br />
According to the first goal of the strategy, one of the first projects undertaken in the field of ICT is<br />
government network GOVNET. Different state institutions are interconnected through a high speed<br />
fiber optic network enabling them to use financial, human resource <strong>and</strong> operation applications in<br />
different fields, such as justice, internal affairs etc. All the ministries nowadays have their own<br />
620
Ermelinda Kordha <strong>and</strong> As. Kozeta Sevrani<br />
websites <strong>and</strong> an electronic database. Almost all interviewed stated that efforts made so far towards<br />
the electronic dissemination of information have had a positive impact on governance transparency<br />
<strong>and</strong> quality of information is improved.<br />
There are several initiatives in the e-business environment. New businesses can register <strong>and</strong> perform<br />
all their administrative duties, electronically. E-procurement initiative has become fully active but the<br />
expectations about its effectiveness are not materialized as they should. With reference to the ebanking<br />
initiatives, almost all the banks are applying their e-banking tools <strong>and</strong> solutions for their<br />
customers. But not all customers are fully <strong>using</strong> these services. Small <strong>and</strong> medium enterprises have<br />
been trained about ICT know-how <strong>and</strong> development, basic hardware <strong>and</strong> software usage through<br />
different projects. However, some of project managers <strong>and</strong> business leaders stated that businesses<br />
should still be prepared <strong>and</strong> updated for the latest technological ICT developments <strong>and</strong> innovations.<br />
Implementation of these projects as part of fulfilling National ICT strategy has shown also some<br />
problems. One of them is the ICT infrastructure expansion. Although the private sector of ICT is<br />
developing, there is still lack of ICT infrastructure especially in rural areas due to the big amount of<br />
investment needed. So companies that are investing in ICT infrastructure as part of their business,<br />
should be incentivized to better their investing strategies. Another area of further improvement must<br />
be the continuous training of users (businesses <strong>and</strong> individuals) to keep in touch with latest<br />
technologies. Especially business should be incited to use more in depth ICTs with the aim of<br />
bettering their businesses. Not only spread <strong>and</strong> diffusion but also technology penetration must be<br />
considered in this regard.<br />
Data gathered from the interviewees showed that there are some best practices within Albanian<br />
companies <strong>using</strong> ICT. These cases <strong>and</strong> the gaining of competitive advantages must be emphasized<br />
in the next action plans involving businesses. While Individual users need actions involving prices <strong>and</strong><br />
availability of services regarding ICT use <strong>and</strong> access.<br />
6. Conclusions<br />
The information society is seen as one of the most important vehicles for seamless integration into the<br />
European Union. The Government of the Republic of Albania recognizes that the implementation of<br />
ICT is leading, although with some problems toward the information society in Albania. <strong>Information</strong><br />
<strong>and</strong> Communication Technologies have just started to have a bigger attention from the business<br />
community. There is still to be done in terms of ICT infrastructure development <strong>and</strong> ICT SME usage,<br />
to compete regionally or internationally. The factors that should be taken in further consideration are<br />
the human capacities <strong>and</strong> skills, the business environment, <strong>and</strong> ICT infrastructure. Relationship<br />
between <strong>Information</strong> society indicators <strong>and</strong> these factors will be subject of research.<br />
References<br />
Cogburn, D. (2001) ‘Globalization <strong>and</strong> the information economy: Challenges <strong>and</strong> opportunities for Africa’.<br />
available at www.dbsa.org/publications/ictpolsa <strong>and</strong> www.ap.org/books/ictpolsa.<br />
“eSEE (2002) – European Agenda for Development of <strong>Information</strong> society, SEE conference on Cooperation <strong>and</strong><br />
telecommunication policies http://www.eseeuropeconference.org/agenda.html<br />
Evers, H. (2003). Transition towards a <strong>Knowledge</strong> Society: Malaysia <strong>and</strong> Indonesia in Comparative Perspective.<br />
Comparative Sociology, Vol2, Issue 1, pp.355-373.<br />
Karvalics, Z. L. (1997) Emergence <strong>and</strong> characteristics of information strategies. Chances <strong>and</strong> possibilities of<br />
Hungary with special reference to the EU-integration, Available from:<br />
www.tar.hu/isip/itip/ZKL_infstrat_miajovo.doc Accessed: 2010-04-15<br />
Marker, P., McNamara, K. <strong>and</strong> Wallace, L. (2002) ‘The significance of information <strong>and</strong> communication<br />
technologies for reducing poverty’, Department for International Development, London,<br />
Markle Foundation, (2003), Global Digital Opportunities: National Strategies of “ICT for Development”<br />
OECD, (2003) ICT <strong>and</strong> economic growth: Evidence from OECD countries, industries <strong>and</strong> firms.<br />
OECD (2009), Re-thinking e-government services, user centered approaches, OECD (Paris).<br />
Trujillo-Mendoza, M. (2001) ‘The global digital divide: Exploring the relation between core national computing <strong>and</strong><br />
national capacity <strong>and</strong> progress in human development over the last decade’, Doctoral dissertation,;<br />
available at http://studentweb.tulane.edu/~mtruill/index-phddiss.html<br />
UNESCO Asia <strong>and</strong> Pacific Regional Bureau for Education (2004) Guidebook 1 - ICTs in Education <strong>and</strong><br />
Schoolnets. Retrieved from: http://www.unescobkk.org/fileadmin/user_upload/ict/ebooks/SchoolNetKit/guidebook1.pdf<br />
621
A Bottom-Up Approach for the Representation <strong>and</strong><br />
Continuous Update of Technology Architectures<br />
João Soares, José Tribolet <strong>and</strong> André Vasconcelos<br />
Instituto Superior Técnico, Lisboa, Portugal<br />
INESC Inovação, Lisboa, Portugal<br />
joao.s.soares@ist.utl.pt<br />
jose.tribolet@ist.utl.pt<br />
<strong>and</strong>re.vasconcelos@ist.utl.pt<br />
Abstract: In organizations where there are not any concerns about updating <strong>Information</strong> Systems Architecture<br />
(ISA) models in a strict <strong>and</strong> automatic fashion, business requirements <strong>and</strong> pressures frequently lead to an<br />
increasing gap between current <strong>Information</strong> Systems <strong>and</strong> the latest version of their ISA <strong>and</strong>, in particular, their<br />
Technology Architecture (TA) models, when they exist. One of the causes for the lack of “investment" in TA<br />
models is the considerable effort required to “discover" infrastructural features that serve as input to the<br />
development of architectures. This work is focused on devising a bottom up approach for the representation <strong>and</strong><br />
continuous update of TAs <strong>using</strong> tools to automatize the discovery of architectural evidences (such as logs or<br />
network events) <strong>and</strong> a process based on the annotation mechanism to enable interaction contexts that allow<br />
actors to make explicit their knowledge about their activities through graphic representations.<br />
Keywords: information systems architecture, technology architecture, bottom-up, continuous update,<br />
autodiscovery<br />
1. Introduction<br />
Nowadays, as result of a crescent globalization, competition among organizations is becoming more<br />
<strong>and</strong> more driven by its capacity <strong>and</strong> flexibility of reorganization <strong>and</strong> redesign of business processes<br />
<strong>and</strong> business strategies.<br />
Some of the implications that arise from the need to reorganize <strong>and</strong> redesign business processes <strong>and</strong><br />
business strategies reflect themselves on the dem<strong>and</strong> for <strong>Information</strong> Technologies able to support<br />
those new requirements. Enterprise Architecture (EA) <strong>and</strong> the explicitness of an ISA have a key role<br />
in the construction of ISs that aim to contribute proactively to the alignment between business realities<br />
<strong>and</strong> <strong>Information</strong> Technologies realities (L<strong>and</strong>, M. et al, 2008).<br />
This investigation will be focused in a more restrict problematic inside EA: the reality regarding<br />
technologies managed by organizations to support their processes. At a first glance, this work will<br />
cover three great issues: the capture of that reality, the mapping between the results of the capture<br />
<strong>and</strong> architectural models <strong>and</strong> finally, the continuous update of those models.<br />
This document is divided in 5 chapters. Chapter 2 establishes the objectives, motivations <strong>and</strong><br />
contributions of this work. Chapter 3 is about the State of the Art. In chapter 4 there is a description of<br />
the architecture of the solution <strong>and</strong> finally, chapter 5 has conclusions over the work developed until<br />
now.<br />
2. Research problem<br />
Although there is a common agreement in the advantages <strong>and</strong> potential arising out of the<br />
specification of an ISA, it is still not possible to represent that architecture at different levels <strong>and</strong> their<br />
relationship with the business model in a st<strong>and</strong>ardized, universal, simple <strong>and</strong> simultaneously with the<br />
richness <strong>and</strong> rigor required for subsequent inspection <strong>and</strong>/or simulation of different business<br />
scenarios <strong>and</strong> technology (Boar, 1999). More specifically, there is lack of global knowledge of the<br />
current ISA, nor are there any automatic methodologies or processes defined to collect <strong>and</strong> identify<br />
architectural evidences. Those evidences would then be a valid input to the construction of a TA,<br />
resulting in a bottom-up approach, as individual base elements of the system are first specified in<br />
great detail. Taking this context as a starting point, the fact that drives this work lies in precisely the<br />
lack of a global knowledge <strong>and</strong> collaborative update of the current ISA models in current<br />
organizations. The questions that frame this investigation can then be decomposed into other three<br />
modular questions:<br />
622
João Soares, José Tribolet <strong>and</strong> André Vasconcelos<br />
"What architectural evidences should be considered in order to construct a TA?"' The answer to<br />
this question will lead to a well defined set of architectural evidences, ranging from, e.g., simple<br />
logs produced by servers, to network events. The approach to do so, will take into account<br />
different IT contexts.<br />
"How to automatically collect <strong>and</strong> identify architectural evidences" This is one of the challenges of<br />
this work, because it will allow an efficient, fast <strong>and</strong> ruled collection of data, which will be a major<br />
improvement regarding the creation of TAs from scratch. On the other h<strong>and</strong>, in cases where<br />
architectures are already modeled, will allow them to be much more maintainable since the<br />
process of incorporating changes will be much more agile.<br />
"How to map architectural evidences into updated, trustworthy <strong>and</strong> reliable TA models?"' The<br />
answer to this question urges because there is a recognized difficulty in maintaining models<br />
updated <strong>and</strong> aligned with the reality.<br />
3. Related work<br />
3.1 EA methods <strong>and</strong> frameworks<br />
The aim of this section is to introduce <strong>and</strong> describe some of the tools that enterprise architects use to<br />
underst<strong>and</strong> <strong>and</strong> document the structure <strong>and</strong> dynamics of an enterprise. The investigation that<br />
constitutes the backbone of this article contemplated <strong>and</strong> compared other Frameworks like Zachman<br />
Framework (Zachman, J., 2008), TOGAF (TOGAF, 2009), etc., but, for the sake of brevity <strong>and</strong> to<br />
emphasize their relevance, only two of them will be presented here.<br />
3.1.1 ArchiMate<br />
ArchiMate’s aim is to support the description, analysis <strong>and</strong> visualization of EA with special focus on<br />
inter-domain relations, i.e., it provides the possibility to model the main elements (<strong>and</strong> their<br />
dependencies) within each domain <strong>and</strong> the relations between different domains , a feature that other<br />
description languages don't have (Lankhorst, M. et al., 2009). The core concept in ArchiMate is the<br />
service concept. A service is a unit of functionality that some entity makes available to its<br />
environment. This leads to a layered view of enterprise architecture models, where the service<br />
concept is one of the bridges between different layers. ArchiMate concepts are organized in three<br />
layers: Business Layer, Application Layer <strong>and</strong> Technology Layer.<br />
One of the strengths of ArchiMate is the powerful potential to align <strong>and</strong> link subsets of EA. This facet<br />
is particularly interesting in the context of the organizations addressed by this work, because there is<br />
a lack of knowledge of a global ISA.<br />
3.1.2 Framework CEO 2007<br />
This framework (Vasconcelos, 2007) features a taxonomy of concepts used to define an ISA<br />
(architectural primitives). The meta-model of Framework CEO 2007 is organized in the following<br />
architectures: Business<br />
Architecture<br />
Architecture, Organizational Architecture <strong>and</strong> <strong>Information</strong> Systems<br />
This framework will serve as the conceptual basis for the description of TAs <strong>and</strong> ISAs during this<br />
work, because it was developed in the context of the group CODE 1 , as this work is.<br />
3.2 Application discovery <strong>and</strong> dependency mapping<br />
Application discovery is the process of automatically analyzing artifacts of a software application.<br />
Dependency Mapping creates visibility between applications <strong>and</strong> infrastructure dependencies.<br />
Leveraging the power of automation, automated application discovery <strong>and</strong> subsequent dependency<br />
mapping, can capture, connect <strong>and</strong> unveil intricate relationships including the way in which<br />
applications behave <strong>and</strong> relate to the TA on which they rely. Automated application discovery<br />
normally leverages an effective non-agent-based discovery method - passive discovery - to<br />
automatically discover the structural <strong>and</strong> behavioral aspects of applications. Passive discovery<br />
operates by watching the network traffic, examining all the applications as they execute, <strong>and</strong> then<br />
identifying relationships based on real business usage. Some products often use a hybrid approach,<br />
1 Center for Organizational Design <strong>and</strong> Engineering - INESC<br />
623
João Soares, José Tribolet <strong>and</strong> André Vasconcelos<br />
where active discovery is also used to enable the collection of deep <strong>and</strong> fundamental data about<br />
configuration details.<br />
3.3 A dynamic update process<br />
The present section is about describing a process to continuously update an enterprise model.<br />
(Castela, N. et al., 2010). In the process explained in this section, organizational actors act as active<br />
updaters of the AS-IS model, through the comparison between the modeled activities <strong>and</strong> the ongoing<br />
real executed activities, becoming key agents in reducing the gap between the organization <strong>and</strong> its<br />
representation.. The following text expresses the essence of PROASIS (business process model<br />
dynamic updating process): “The “client" of PROASIS (corresponding role of the operational model<br />
that detects misalignment between the model <strong>and</strong> "reality") wants to update the model, so it makes an<br />
annotation (update request). This update request is received by the modeler (which is who actually<br />
update the model if the annotation is approved) <strong>and</strong> by the reviewers. When reviewers receive the<br />
annotation, they can begin the revision of the annotation (which is optional). The approval of the<br />
annotation is made based on the analysis of the annotation (update request) <strong>and</strong> reviews. If the<br />
annotation (request update) is approved, the model will be updated <strong>and</strong> delivered to the “client"".<br />
Besides the fact that PROASIS is suited to business processes, they can be adapted in this work in<br />
order to map architectural evidences into updated, trustworthy <strong>and</strong> reliable TA models. The idea of<br />
<strong>using</strong> an extended version of PROASIS in this work enables a collaborative maintenance of the TA<br />
models originally incipiently build <strong>using</strong> mechanisms of autodiscovery. On the other h<strong>and</strong>, PROASIS<br />
<strong>and</strong> the annotation mechanism could be used in an earlier stage: to “decide" within an organization,<br />
what would be the most commonly accepted language to represent TAs.<br />
4. Solution's architecture <strong>and</strong> methodology<br />
This chapter is about describing the steps that the solution's architecture will follow. According to the<br />
questions that constitute the problem that drive this investigation, as well as the set of proposed<br />
contributions <strong>and</strong> all the related work described earlier, following, there is a description of each<br />
stage/l<strong>and</strong>mark of the proposed solution facing the initial motivation to this problem:<br />
Contexts: It is the phase where different relevant contexts (entities that manage IT assets) are<br />
analyzed in order to propose a structure of concepts to describe the manifestations of IS <strong>and</strong> its<br />
TA exhibited through architectural evidences, considering terms introduced by CEO 2007<br />
framework.<br />
Analysis & Evaluation: In this stage, two activities take part:<br />
Analysis of framework CEO 2007 regarding its capability of expressing detailed TA aspects (e.g.,<br />
regarding network connections, firewalls, etc.).<br />
Analysis of Application Discovery tools regarding its extensibility potential.<br />
Products": This is the phase where “visible work" is done regarding three facets:<br />
CEO 2007: TA extensions; Mapping between the structure of concepts; Adaptation of the<br />
continuous cycle of monitoring <strong>and</strong> verification of the IS <strong>and</strong> verification of its TA reality to the<br />
reality of automatic discover of architectural evidences <strong>and</strong> continuous collaborative update.<br />
Application discovery tools: Necessary extensions.<br />
PROASIS: Adaptation to TA representation <strong>and</strong> maintenance.<br />
The architecture of the desired bottom up approach can then be described briefly in three steps:<br />
Use PROASIS prior to any representation, to agree, inside an organization, on the notation to<br />
represent the TA.<br />
Perform autodiscovery<br />
Use PROASIS as repository to the early representations <strong>and</strong> tool to support collaborative update.<br />
5. Conclusions<br />
EA (ISAs <strong>and</strong> TAs in particular) are regularly relegated to a secondary role in the context of<br />
organizations, due to factors such as counterculture; it is not considered as an essential piece<br />
regarding the organization's survival; it is a job that consumes a certain amount of time <strong>and</strong> requires<br />
considerable e ort, <strong>and</strong> the companies, eager to get quick results, tend to see architecture as an e ort<br />
too high with too many actors involved within the organization. This work began by the clarification of<br />
624
João Soares, José Tribolet <strong>and</strong> André Vasconcelos<br />
the problem together with the motivations <strong>and</strong> contributions towards the solution. Regarding the<br />
related work, several EA Methods <strong>and</strong> Frameworks were revisited according to the potential to be<br />
used in this investigation as well as Application Discovery tools (to quickly capture the infrastructural<br />
reality of an organization) <strong>and</strong> a process to enable collaborative update of TA models. The course of<br />
this investigation will follow the steps described in the previous section to achieve a bottom up<br />
approach.<br />
References<br />
Boar, B. (1999). Constructing Blueprints for Enterprise IT Architecture. New York: John Wiley & Sons.<br />
Castela, N. et al. (2010). Business Process Model Dynamic Updating. CENTERIS 2010 .<br />
L<strong>and</strong>, M. et al. (2008). Enterprise Architecture (The Enterprise Engineering. Springer.<br />
Lankhorst, M. et al. (2009). Enterprise Architecture at Work. Heidelberg: Springer.<br />
TOGAF. (2009). TOGAF Version 9. Van Haren Publishing.<br />
Vasconcelos, A. (2007). Arquitecturas dos Sistemas de Informação: Representação e Avaliação. Instituto<br />
Superior Técnico.<br />
Zachman, J. (2008). John Zachman's Concise Definition of the Zachman Framework. Zachman International.<br />
625