Balancing Innovation and Operations

Transcription

Balancing Innovation and Operations
 The Flagship of the Association of Management JOURNAL OF
MANAGEMENT SYSTEMS
THE CONTINUING MISMATCH
BETWEEN IT GOVERNANCE THEORY
AND PRACTICE: RESULTS FROM A SYSTEMATIC
LITERATURE REVIEW AND A DELPHI STUDY WITH CIO’S
Daniël Smits & Jos van Hillegersberg
WAL-MART’S LEADERSHIP IN RETAIL SUPPLY CHAIN
Seungjae Shin, Jack E. Tucci & Dustin Odom
BALANCING INNOVATION AND OPERATIONS:
OPPORTUNITIES AND CHALLENGES OF
SECOND GENERATION ENTERPRISE MOBILITY
Sabine Berghaus, Thomas Sammer, Hans Brechbühl & Andrea Back
ENRICHING ENTERPRISE DATA MODELS:
INCORPORATING ACTIVE TAXONOMIES
Peter Aiken, Long Flory & Amita Goyal Chin
VOLUME 24, NUMBER 3, 2014
ISSN 1041-2808
EDITORIAL STAFF
EDITORIAL BOARD

EDITOR-IN-CHIEF
Anil K. Aggarwal
University of Baltimore, USA
Kenneth Kendall
Rutgers University, USA
Q B. Chung
Dorothy E. Agger-Gupta
Fielding Graduate University, USA
Mohamed Latib
PeriscopeIQ, USA
JoongHo Ahn
Seoul National University, Korea
Johnny Lee
Drexel University, USA
Steven Alter
University of San Francisco, USA
Eldon Li
National Chengchi University,
Taiwan
Villanova University, USA

MANAGING EDITOR
Willem A. Hamel
Maximilian Press Publishers

FOUNDER & FOUNDING
EDITOR-IN-CHIEF
Karin Klenke
Leadership Development Institute
(LDI) International, USA

PUBLISHER
Maximilian Press Publishers
Tammy Arthur
Mississippi College, USA
Robert P. Cerveny
Florida Atlantic University, USA
Amita Goyal Chin
Virginia Commonwealth University,
USA
H. Michael Chung
California State University, Long
Beach, USA
Rashmi Malhotra
St. Joseph’s University, USA
Michael Mulvey
Dublin Institute of Technology,
Ireland
Makoto Nakayama
De Paul University, USA
Samuel Rabinowitz
Rutgers University, USA
Kevin D. Clark
Villanova University, USA
Bonnie Roach
Ohio University, USA
Robert Giacalone
University of Denver, USA
Elliot B. Sloane
Center for Healthcare Information
Research and Policy, USA
Richard Grover
University of Southern Maine, USA
John Hamilton
James Cook University, Australia
Stephen C. Hayne
Colorado State University, USA
Clyde W. Holsapple
University of Kentucky, USA
Robert Holtfreter
Central Washington University, USA
Soon-Young Huh
Korea Advanced Institute of Science
and Technology (KAIST), Korea
Richard Jacobs
Villanova University, USA
Julie Kendall
Rutgers University, USA
Detmar W. Straub
Georgia State University, USA
Vijayan Sugumaran
Oakland University, USA
Euiho Suh
Pohang University of Science and
Technology, Korea
Junping Sun
Nova Southeastern University, USA
Minoo Tehrani
Roger Williams University, USA
William Wagner
Villanova University, USA
George L. Whaley
San Jose State University, USA
J
JOURN
NAL OF MANA
AGEMEN
NT SYST
TEMS
V
Vol. 24, No. 3, 2014
A
ARTICLE
ES
T
THE CONT
TINUING MISMATCH
M
H BETWEE
EN IT GOVE
ERNANCE
E THEORY
Y
A
AND PRAC
CTICE: RES
SULTS FRO
OM A SYST
TEMATIC LITERATU
URE REVIE
EW
A
AND A DEL
LPHI STUD
DY WITH CIO’S
C
D
Daniël Smitss & Jos van Hillegersber
H
rg ......................................................................................................... 1
W
WAL-MAR
RT’S LEADE
ERSHIP IN
N RETAIL SUPPLY
S
CH
HAIN
S
Seungjae Shiin, Jack E. Tucci
T
& Dusttin Odom ....................
.
..................................................................... 21
B
BALANCIN
NG INNOVA
ATION AN
ND OPERAT
TIONS: OP
PPORTUNITIES
A
AND CHAL
LLENGES OF
O SECON
ND GENERA
ATION EN
NTERPRISE
E MOBILIT
TY
S
Sabine Bergh
haus, Thomaas Sammer, Hans
H
Brechb
bühl & Andrrea Back ................................................... 31
E
ENRICHIN
NG ENTERP
PRISE DAT
TA MODEL
LS: INCOR
RPORATING
G ACTIVE
E
T
TAXONOM
MIES
P
Peter Aiken, Long Flory & Amita Go
oyal Chin ....................
.
..................................................................... 45
IInformation
n for Contriibutors ................................................................................................................. 63
Journal off Managementt Systems, Vool. 24, Numbeer 3, 2014
JJournal of Maanagement Sy
ystems, Vol. 24, Number 3, 2014
1
Journal
J
of Managgement Syystems
ISSN #104 1-2808
A Publiccation off the Assoociation of Managgement
____________
__________
___________
__________
__________________________________________________ THE
T
CON
NTINUING
G MISMAT
TCH BETW
WEEN IT GOVERN
NANCE
THEORY
T
AND PRA
ACTICE: RESULTS
S FROM A SYSTEMATIC
LITERAT
TURE REV
VIEW AND A DELP
PHI STUD
DY WITH CIO’S
Daniël Smits, Un
niversity of Twente,
T
Ensschede, The Netherlandss
Jos van Hillegersber
H
g, University
y of Twente, Enschede, The Netherlands
AB
BSTRACT
IT governanc
ce (ITG) con
ntinues to be a ‘top ten’ issue for C
CIOs. The g
goal of this sstudy is to d
determine
w
which disciplines and fra
ameworks are used for ITG and wh
hich streamss in ITG literrature best a
align with
ccurrent prac
ctices. Anoth
her goal is to
t collect in
ndications on
n how to im
mprove ITG using litera
ature and
e
experts from
m practice. This
T
study describes
d
th
he results off a systema
atic literature
e review an
nd Delphi
sstudy of ITG effectivenes
ss and matu
urity and ass
sesses the (m
mis)match b
between ITG
G theory and practice.
T
The Delphi study
s
was conducted
c
with
w a group of 14 CIOs of mid-size
ed and large
er organizations. The
rresults show
w that six ITG streams can be distiinguished. W
We conclude
e that these
e six stream
ms are an
e
effective way
y to study the variety of
o ITG practices. The sttudy further concludes that a mism
match still
e
exists between ITG theo
ory and practtice and as well
w as the n
need for an ITG maturityy model.
K
Keywords:
IT govern
nance, CIO,, IT architecture, Portfo
olio manage
ement, Beh
havior, Delphi study,
Systemattic literature review
INTR
RODUCTIO N
IT governance (ITG) is a “top 10” is
ssue for CIO
Os. “IT gove
ernance con
ntinues to ap
ppear as an
n ongoing
‘t‘top 10’ CIO
O management issue in
n Gartner’s annual EXP
XP survey off CIOs,” wa
as the concclusion of
G
Gartner analyst J. Maho
oney based on the Exec
cutive Progrrams’ worldw
wide surveyy of more than 2,300
C
CIOs (Mahon
ney, 2012).
ITG is also a relatively new
n
topic: The
T first pub
blications ap
ppeared in th
he late 1990
0s (Webb, P
Pollard, &
R
Ridley, 2006
6). While a considerable
c
e body of lite
erature on IT
TG exists, d
definitions off ITG in the literature
vvary greatly (Webb et al.,
a 2006; Lee & Lee, 20
009). The un
nderlying vie
ews can be clustered in
n several
w
ways. For ou
ur research we
w adopt thrree views: IT
TG as a fram
mework or au
udit processs; ITG as IT decisionm
making; and ITG as a brranch of corp
porate goverrnance (Mussson, 2009).
T
There are qu
uite a lot of opinions
o
on the question
n: “What exa
actly is ITG?
?” (Webb et al., 2006; L
Lee et al.,
2
2009). These opinions are
a sometim
mes colored by the inte
erests of sup
ppliers or institutions. M
Moreover,
Journal off Managementt Systems, Vool. 24, Numbeer 3, 2014
2
The Continuing Mismatch between IT Governance Theory and Practice
researchers have suggested that a gap exists between theoretical frameworks and practice (Peterson,
Parker, & Ribbers, 2002).
Our Research
The goal of our research program is to determine how to improve ITG effectiveness and maturity. The
goal of this study is to determine which streams in ITG literature best align with current practices and
which disciplines and frameworks are used for ITG. Another goal is to collect indications on how to
improve ITG using literature and experts from practice.
In literature, constructs like dimensions, focus areas or principles are often used to refine the concept of
ITG. Dimensions may include IT compliance management or business/IT alignment (Novotny,
Bernroider & Koch, 2012); examples of focus areas are value delivery or resource management (ITGI,
2003); and principles could be strategy or responsibility (ISO/IEC, 2008). For applicability in practice we
use the more practical term ‘discipline.’ Examples of disciplines are architecture or portfolio
management which directly relate to roles or functions in an organization, such as architect or portfolio
manager.
The goal of this study is to answer the following questions:
a. Which stream(s) of ITG best align with current practices?
b. According to practitioners, which disciplines should play an important role in ITG?
c. Is there (still) a mismatch between ITG practice and theoretical frameworks?
The last question was added because we expect a mismatch and are looking for new or innovative
ways to improve ITG. Another important goal thus was to collect indications on how to improve ITG
using experts from practice and literature.
This paper is organized as follows. The next section presents the research methodology. The section
on ITG shares some insights from ITG literature and the design of our initial model. Next follows
sections on the results of the systematic literature review and the Delphi sessions. The paper
concludes with a discussion of the research questions and a section on conclusions, limitations and
implications for future research.
RESEARCH METHODOLOGY
We adopted a research method based on a combination of a systematic literature review and a Delphi
study using the Spilter Group Decision Support System (GDSS). Our research process started with
exploring the research domain through a systematic literature review in the domain of ITG. As a next
step we performed a Delphi study in a meeting with a group of Dutch CIOs (see Figure 1).
Systematic Literature Setup
A systematic literature review (Petticrew & Roberts, 2008) on ITG was set up and performed using
Scopus and the Association for Information Systems (AIS) database. Scopus is the world’s largest
abstract and citation database and includes scholarly journals and book publishers including Wiley
Blackwell, Springer Science & Business Media, Taylor & Francis, Sage Publications, Nature Publishing,
IEEE and ACM. It also includes content from providers such as LexisNexis, Thomson Reuters (Web of
Science), JSTOR, ARTstor, Credo Reference, Encyclopedia Britannica, World Book, ABC-CLIO, The
HathiTrust Library and many others.
Journal of Management Systems, Vol. 24, Number 3, 2014
3
Daniël Smits & Jos van Hillegersberg
Figure 1. Overview of the Study
Literature study
Initial model
Delphi study
Result model
In recent papers, ITG is sometimes called ‘corporate governance of IT’ as in ISO/IEC 38500 (Calder,
2008). Others use ‘enterprise governance of IT’ or ‘enterprise governance’ (Dietz & Hoogervorst, 2012;
Van Grembergen & De Haes, 2010). In some papers ITG is called ‘IS governance’ in which IS stands
for ‘information systems’ management (Brown & Renwick, 1996). In the period of August 2012 to
September 2012 we made an initial selection of documents in Scopus searching for ITG in the title,
abstract or author keywords. For our selection we used the keywords: ‘IT governance,’ ‘governance of
IT,’ ‘IS governance’ and ‘enterprise governance.’
The use of additional keywords also resulted in the selection of a substantial set of non-IT related
corporate governance or enterprise governance documents which were excluded during the selection
process.
After analyzing the set we discovered our set was missing important documents. In the period of April
2013 to May 2013 we updated our set from Scopus and used the same keywords in the eLibrary of the
AIS. The AIS is a worldwide professional association with a large eLibrary of documents which are not
completely covered by Scopus.
The search capabilities of AIS are less advanced, which resulted in a less clean result set. After
removing doubles the resulting set was manually selected by title and abstract. Author keywords were
not available in the export files. During the manual selection process documents were selected which
satisfied the following rules:
‐
‐
‐
‐
‐
The topic of the document must be ITG;
Performance related;
Written in the languages English, German or Dutch;
Claims must be justified or based on research; and
Duplicated studies are excluded.
To collect indications on how to improve ITG from literature we also made a breakdown on a few
subjects which might deliver clues on new or innovative ways to improve ITG. First, we are interested in
ITG maturity as our research program is focused on improving ITG effectiveness and maturity. Second,
we are interested in the disciplines architecture and portfolio management. Recent literature presumes
that linking ITG with these disciplines can greatly improve IT efficiency and IT effectiveness (e.g.
Wittenburg, Matthes, Fischer & Hallermeier, 2007; Nieman, 2006). Third, we are interested in
documents related to social aspects. Contemporary literature is often based on structural, top-down,
planning processes. Critics argue that social aspects like culture, behavior and collaboration need more
attention (more on this in the next section).
To select papers related to ITG maturity we used the keywords: ‘maturity’ or ‘mature’ to search in the
title, abstract or author keywords. To select papers related to the disciplines of architecture and portfolio
management we used the keywords ‘architecture’ and ‘portfolio.’ Selecting papers related to social
aspects in a systematic way is more difficult because it is less clear which keywords should be used.
We expected the use of social related phrases like behavior, culture or collaboration. This means
Journal of Management Systems, Vol. 24, Number 3, 2014
4
The Continuing Mismatch between IT Governance Theory and Practice
however that the selection found might not be complete. The keywords we used were ‘behavior,’
‘behaviour,’ ‘collaborate,’ ‘collaboration,’ ‘culture’ and ‘social.’
A manual selection afterward was used to determine if the document was in scope. To be in scope the
document had to satisfy the additional rule that the topic of the document is ITG, in relation to the
relevant keywords.
Delphi Study Setup
A Delphi method may be characterized as a method for structuring a group communication process so
that the process is effective in allowing a group of individuals, as a whole, to deal with a complex
problem and obtain “the most reliable consensus of opinion of a group of experts” (Linstone & Turoff,
1975). There are several types of applications of the Delphi method in information systems research
(Okoli & Pawlowski, 2004). We use it to generate propositions and as a construct validation. The
construct in this study are the six ITG streams (see Table 6 below).
Careful selection of participants is important. The quality and responses of a Delphi panel are as good
as the experts (Linstone et al., 1975; Taylor-Powell, 2002). To accomplish this “structured
communication” several elements should be provided: Some feedback of individual contributions of
information and knowledge; some assessment of the group judgment or view; some opportunity for
individuals to revise views; and some degree of anonymity for the individual responses (Linstone et al.,
1975). With 14 participants, we also complied with the next guideline: “Ten to 15 people may be
adequate for a focused Delphi where participants do not vary a great deal.” (Taylor-Powell, 2002).
Earlier research of the IT Governance Institute (ITGI, 2008) showed that CIOs and IT management are
the best parties to ask questions about ITG: “Although championship for ITG within the enterprise
comes from the C-level, in daily practice ITG is still very much a CIO/IT director issue” (ITGI, 2008).
Technical Details of the Delphi Study
The Delphi study was conducted during a meeting of the CIO Platform Netherlands (CIOPN). The
CIOPN counts more than 100 members and delivers a good reflection of the Dutch situation within the
government and private enterprises. To become a member of the CIOPN an organization must have at
least 1,000 employees, have a sales volume of €500 million and/or an IT budget of more than €25
million. For governmental organizations no specific sales volumes are required.
Different people often have different understandings of the same concept. To address this we first
presented, explained and discussed what ITG is using the six identified ITG streams. The efficiency of
the meeting was increased by a supplemental group communication process (Linstone et al., 1975).
We used the GDSS to improve the effectiveness of the group meetings (Fjermestad & Hiltz, 2000). For
this purpose we selected the innovative tool Spilter by Canast which is a user-friendly, web-based
GDSS (Spilter, n.d.).
The participants had to respond to questions and statements using a laptop or tablet. There was no
hierarchy or dominance; each opinion counted and could be recorded. Responses were anonymous to
the rest of the group. For example, when asked to rate the streams, we used the tool to show graphs of
the responses and obtain consensus before going on to the next step. For some questions, for example
when asked to enter disciplines, responses were shared. Each participant was shown all responses
instead of only his or her own. Participants could also add their own responses or adopt them from the
group list. In advance we defined a maximum number of responses for each question.
Journal of Management Systems, Vol. 24, Number 3, 2014
5
Daniël Smits & Jos van Hillegersberg
IT GOVERNANCE
A survey conducted by the ITGI showed that in practice frameworks are the most important enablers for
effective ITG (ITGI, 2011). Other enablers are toolkits, benchmarking, certifications, networking, white
papers and ITG related research. Some of the frequently cited frameworks are: COBIT, ITIL, ISO/IEC
27001, ISO/IEC 17799 and BS 7799 (Musson, 2009). The frameworks which are used for ITG vary a lot
as can be seen in different surveys from the ITGI which are summarized in Table 1 (ITGI, 2008; ITGI,
2011).
Table 1. Use of ITG Frameworks
Framework
2011
2007
2005
ITIL or ISO/IEC 20000
ISO/IEC 17799, ISO/IEC 27000 or other security frameworks
Internally developed frameworks
Six Sigma
COBIT (ISACA)
PMI/PMBOK
Risk IT (ISACA)
IT Assurance Framework (ISACA)
CMM or CMMI
ISO/IEC 38500
BMIS (Business Model for Information Security, ISACA)
PRINCE2
Val IT (ISACA)
TOGAF
COSO ERM
28%
21%
24%
10%
14%
2%
14%
1%
13%
9%
33%
5%
9%
3%
4%
4%
2%
0%
0%
1%
4%
15%
13%
13%
12%
10%
9%
8%
8%
6%
5%
3%
2%
With 13% growth for Six Sigma, 12% growth for PMI/PMBOK, 11% growth for security frameworks, 4%
growth for ITIL, 3% growth for TOGAF (from 0), 1% decrease for COBIT in a period of four years there
is no clear leader. Furthermore it shows that more general frameworks like Six Sigma are fast growers
too.
The relation with project and portfolio management frameworks like PMI/PMBOK, PRINCE2 and
architecture frameworks like TOGAF can be illustrated with cases found in academic research in which
ITG is implemented using portfolio management and architecture (Wittenburg et al., 2007).
COBIT uses a classification which consists of five focus areas: Strategic alignment, value delivery,
resource management, risk management and performance measurement. The latest COBIT release is
COBIT 5.0 (ISACA, 2013). In COBIT 5.0 the concepts and ideas contained in these focus areas are
maintained and built upon in the framework, but the focus areas themselves have not been literally
maintained (Bernard, 2012; ISACA, 2013).
A recent literature survey by Novotny et al. (2012) on dimensions and operationalization of ITG reveals
nine ITG dimensions which are listed in Table 2.
Four dimensions are clearly complementary to the focus areas of COBIT 5.0: Compliance management,
decision authority and responsibility, investment management and ITG improvement.
Journal of Management Systems, Vol. 24, Number 3, 2014
6
The Continuing Mismatch between IT Governance Theory and Practice
Table 2. Dimensions of ITG (Novotny et al., 2012)
Dimension
Input
IT compliance management
IT risk management
IT decision authority and responsibility
IT performance and quality measurement
IT investment management
IT resource and capability management
ITG improvement
Output
Business/IT alignment
Business value delivery
Another well-known classification is the trichotomy of Peterson, O’Callaghan and Ribbers (2000):
structure, processes and relational mechanisms (De Haes & Van Grembergen, 2005). This is concise
and practical but as Willson and Pollard (2009) have shown, ITG is not limited to structure, processes
and mechanisms but also relies on complex relationships, between history and present operations.
Furthermore, culture and human factors are seen as one of the factors that most influenced the
implementation of ITG by 50% of the participants of a large global survey conducted by ITGI (2011).
Human behavior was included into the ISO/IEC 38500—the international standard for ITG—too. The
standard defines six principles for directors and top management which are: Responsibility, strategy,
acquisition, performance, conformance and human behavior (ISO/IEC, 2008).
RESULTS OF THE SYSTEMATIC LITERATURE REVIEW
The first selection between August and September 2012 using Scopus resulted in a set of 484
documents. During the second selection between April and May 2013 using Scopus an additional 169
documents were found (see Table 3).
Table 3. Totals systematic literature review
Library
Documents
Scopus
1st selection (8/2012–9/2012)
2nd selection (4/2013–5/2013)
Total selected
Remove doubles
Total excl. doubles
In scope
484
+ 169
665
- 6
659 100%
269 41%
AIS
Added (4/2013–5/2013)
+ 62
Total
In scope
Journal of Management Systems, Vol. 24, Number 3, 2014
#
331
%
7
Daniël Smits & Jos van Hillegersberg
After removing doubles a result set of 659 documents was left. When applying the selection criteria
listed in the former section the result set decreased to 269 documents. A manual selection on AIS using
the same criteria produced 62 additional documents.
In summary, after completing the first and second analysis the systematic literature review resulted in a
set of 331 documents in scope. The analysis of the resulting documents will be repeated several times
in the future.
Breakdown by Subject
The breakdown of the result set into subsets for the three topics is summarized in Table 4.
Table 4. Documents on ITG Grouped by Specific Topics
Documents (Total # selected = 331)
#
%
On ‘maturity’ or ‘mature’
22
7%
On ‘architecture’
On ‘portfolio’ management
On ‘architecture’ or ‘portfolio’ management
25
14
35
8%
4%
11%
On ‘collaborate’ or ‘collaboration’
On ‘behavior’ or ‘behaviour’
On ‘culture’
On ‘social’
On all social related keys
5
6
15
7
33
2%
2%
5%
2%
10%
The numbers included in the table are the totals after the manual selection to determine if the document
was in scope.
A summary of the year of publication of the documents is shown in Table 5.
Table 5. Publications by Year
Documents (per topic)
AIS
Scopus
Total complete set
Maturity
% of total
Architecture & portfolio
% of total
Social aspects
% of total
1995–2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 Total
7
5
12
3
1
4
1
25%
3
25%
3
3
6
3
8
11
1
9%
1
2
17% 18%
3
21
24
2
8%
1
4%
21
21
5
30
35
1
5
5% 14%
5
3
24% 9%
1
5%
7
34
41
3
7%
2
5%
3
7%
7
48
55
7
60
67
17
33
50
4
6
3
7% 9% 6%
7
9
6
13% 12% 12%
6
5
11
17% 7% 22%
5
5
62
269
331
22
7%
35
11%
33
10%
The percentages are the number of documents in a year compared to the number of documents in the
same year in the complete set.
Journal of Management Systems, Vol. 24, Number 3, 2014
8
The Continuing Mismatch between IT Governance Theory and Practice
The Complete Set
The oldest documents in our complete set of 331 documents are from 1995 but the vast majority is from
2006 or later. Documents from 2013 are sparse because of the time of the selection and the fact that it
always takes some time before publications are added to the databases.
The Topic ‘Maturity’
Related to ITG ‘maturity’ we found 30 unique documents. From this set 22 documents were found to be
in scope. This set also includes papers which minimally discuss the topic. Regarding ITG maturity the
COBIT framework is used the most in contemporary research papers. The maturity model of COBIT is
based on the Capability Maturity Model (CMM). Other maturity models are only found when focusing on
other than general ITG perspectives. These maturity models are mostly based on CMM too.
Documents on ITG maturity are relatively new. The first documents on ITG maturity are from 2007/2008.
The Topic Disciplines (‘Portfolio’ Management or ‘Architecture’)
We found 43 unique documents which combine ITG with ‘architecture’ and/or ‘portfolio’ (management).
From this set 35 documents were in scope, also including papers which minimally discuss the topic.
Table 4 shows the number of selected documents related to the disciplines ‘architecture’ and ‘portfolio’
(management) individually and both disciplines combined.
The list of documents mainly consists of case studies (14), models or frameworks (9), a few surveys (4)
and several other more specific types of papers (8). Some of the more interesting papers include a
case study at the BMW group (Wittenburg et al., 2007), a paper discussing ‘enterprise engineering’
which is relevant to the ‘bottom-up’ view (Dietz et al., 2012) and a paper on quantitative portfolio
management reporting anomalies or ambiguous ITG rules (Verhoef, 2007).
As can be seen in Table 5 documents which combine ITG with architecture and portfolio (management)
are mostly relatively new too. The number of publications started to grow from 2006/2007, just like the
rest of the set.
The Social Aspects Topics (‘Collaboration,’ ‘Behavior,’ ‘Culture’ or ‘Social’)
When selecting papers related to social aspects we found 39 unique documents. From this set 33
documents were found to be in scope, which also includes papers which minimally discuss the topic.
This set of documents is very diverse. These documents however might contain indications on how to
improve ITG because they use a clearly different perspective on ITG. Some of the more interesting
papers discuss the relation between ITG and Chinese culture (Zhong, Vatanasakdakul, & Aoun, 2012),
user-driven innovation or ‘shadow IT’ (Györy, Cleven, Uebernickel, & Brenner, 2012) and
‘entrepreneurial behavior’ influencing ITG (Bradley & Pratt, 2011).
Documents on social aspects were written in all periods examined and could be found in the complete
period as with the complete set of documents.
The Initial Model
Scholars have different opinions on what exactly ITG is. In our literature review we identified six
streams based on two views. The first viewing angle handles the scope of ITG. The second viewing
angle handles the direction in which ITG works.
Journal of Management Systems, Vol. 24, Number 3, 2014
9
Daniël Smits & Jos van Hillegersberg
Scope of ITG
Different streams can be distinguished; some use a small and others a broad scope.
Weill and Ross (2004) use a short definition, defining ITG as “the decision rights and accountability
framework for encouraging desirable behaviour in the use of IT.” These authors can be viewed as the
main contributors to this stream that focuses on decision-making. They look at ITG from a decisionmaking perspective. As components for ITG, this stream uses elements like IT decisions or decision
archetypes (Weill et al., 2004; Weill & Ross, 2005). Others complement this with the context in which
the decision is made (Xue, Liang, & Boulton, 2008).
A clear proponent of the broad definition and founder of COBIT is the ITGI. Currently, however, ITIL or
ISO 20000 are the most frequently mentioned external frameworks used as a basis for ITG (ITGI,
2011). Some researchers define ITG “as the process by which decisions are made around IT
investments” and claim ITIL V3 can provide a well matured framework for ITG (Nabiollahi & bin
Sahibuddin, 2008).
In this study we use three streams of ITG as a starting point: IT auditing, decision-making and ITG as
integral part of corporate governance (Musson, 2009). At one end of the continuum, stress is put on
corporate conformance; at the other end, the concern with corporate performance (Bhimani &
Soonawalla, 2005).
Since our research focuses on performance and not on conformance we need to differentiate between
both parts of corporate governance. We define ‘corporate governance, conformance perspective’ as
related to rules and regulations and ‘corporate governance, performance perspective’ as related to
performance and value creation.
Working Direction of ITG
Most scholars see governance as a top-down phenomenon often based on structure, processes and
planning. Another view on ITG is bottom-up. To explain this view we make a side-step to institutional
economics in which two contrasting worldviews coexist, which go all the way back to the 18th century
Enlightenment and can be described as top-down or bottom-up (Easterly, 2008).
The top-down view of ITG sees the governance of an organization as determined by the rules written
by the management and leaders of the organization. The bottom-up view sees ITG as emerging
spontaneously from the social norms, customs, traditions, beliefs and values of employees within the
organization in which the governance only formalizes what is already mainly shaped by the attitudes of
individuals.
Followers of the second view often also criticize structural, top-down, planning processes. Lindblom
(1959) for example proposes an alternative to the analytical planning approach by “muddling through”
with the argument that real world problems are far too complex to solve this way. Humans face
dilemmas "that are quite different from the wide number of options that management models lay out in
front of decision makers" (Ciborra, 1997). Schwarz and Hirschheim (2003) have found that IT
executives should approach their governance structure as an ‘architecture’ instead of formalized
hierarchies and argue that researchers “need to change their views of IT ‘structure’ to embrace a more
social and dynamic existence.” Dietz et al. (2012) use the designation distributed governance to make
clear that the involvement of the employee should include governance.
Journal of Management Systems, Vol. 24, Number 3, 2014
10
The Continuing Mismatch between IT Governance Theory and Practice
Table 6. Six ITG Streams
View
IT Governance Stream
Scope
1. IT audit
2. Decision-making
3. Part of corporate governance, conformance perspective
4. Part of corporate governance, performance perspective
Direction
A. Top-down
B. Bottom-up
While the top-down view is related to structure, processes and planning the bottom-up view is related to
social aspects like culture, behavior and collaboration.
This results in four ITG streams for the first view (scope) and two ITG streams for the second view
(direction) are summarized in Table 6.
RESULTS OF THE DELPHI STUDY
The participants of the Delphi meeting can be characterized as fourteen Dutch CIOs responsible for IT
budgets larger than €25 million. The attendees provided a well balanced mix from different branches
(see Table 7).
Table 7. Meeting Attendance
Attendee #
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Type of organization
Agriculture
Hospital
Heavy industry
Wholesale
Engineering
Chemical industry
Non-profit
Retail
Power company
Seaport
Health insurer
City
Public health care
Finance
Of the participating CIOs 57%, report to the CFO and 21% to the CEO. Of the remaining three CIOs,
one reported to the COO, one was a member of the Board of Directors and the third has the function of
CTO (see Table 8).
Journal of Management Systems, Vol. 24, Number 3, 2014
11
Daniël Smits & Jos van Hillegersberg
Table 8. Reporting Line
As a CIO I report to:
CEO
CFO
COO
Other
Total
3
8
1
2
21%
57%
7%
14%
14
100%
When questioned on the rate of effectiveness of their current ITG practice (anonymously), 29% of the
CIOs rated it as sufficient (grade = 6; 10 = excellent in the Netherlands). An even larger group of 65%
rated it as good (grade = 7 or 8). Only one CIO rated it as poor (grade = 3) and did not answer the rest
of the questions.
In regard to our second research question we asked the CIOs to rate the current level of ITG
implementation for the first four ITG streams. The answers of the CIOs varied a lot (see Table 9).
Table 9. Views on ITG Implementation (regarding Scope)
#
IT auditing
Decision-making
Conformance
Performance
Min
Max
Mean
σ
5%
50%
18%
12%
10%
60%
33%
17%
10%
50%
22%
7%
10%
70%
27%
18%
The first two rows show the minimum and maximum values. The third and fourth rows show the
arithmetic mean and standard deviation between the answers (σ).
Furthermore we questioned participants about the direction of the implementation, i.e. the last two
streams. Five answers were possible: ‘Completely top-down,’ ‘Largely top-down,’ ‘Mixed,’ ‘Largely
bottom-up’ or ‘Completely bottom-up’ with a free format field for motivation (see Table 10).
Table 10. Working Direction of ITG
Responses
Completely
top-down
Largely
top-down
Mixed
Largely
bottom-up
Completely
bottom-up
#
%
0
0%
6
46 %
5
38 %
2
15 %
0
0%
As a part of the third research question we asked, “Which disciplines play an important role for ITG in
your opinion?” We added three examples of disciplines (architecture, portfolio management and IT
management) to explain what we meant by disciplines. The nonsense and too generic answer of ‘IT
Journal of Management Systems, Vol. 24, Number 3, 2014
12
The Continuing Mismatch between IT Governance Theory and Practice
management’ was added to the examples and accurately detected by each of the CIOs. None of them
added this discipline to the list.
The results are summarized in Table 11. The most often mentioned disciplines are portfolio
management and architecture, which were mentioned by 62% and 46% of the CIOs respectively.
Table 11. Important Disciplines for ITG according to the CIOs
Discipline
Portfolio management
Architecture
Security
Project and program management
Demand management
Innovation
Process design and management
Number of
times
mentioned
%
8
6
4
4
3
3
3
62%
46%
31%
31%
23%
23%
23%
Thirteen CIOs answered the next question, “What has to be done to improve ITG in your opinion?” Six
of them also prioritized the results (see Table 12).
It was planned to cluster the ‘Actions to improve ITG’ but due to lack of time this was done manually
afterwards by the researchers. The answers are categorized using the six principles of ISO/IEC 38500
which are ‘Responsibility,’ ‘Strategy,’ ‘Acquisition,’ ‘Performance,’ ‘Conformance,’ and ‘Human behavior.’
The highest scores were received for ‘Good ownership of processes and corresponding applications,’
‘Maturity benchmark’ and ‘Educate business managers.’ Ownership was seen as especially important
by all six CIOs who also prioritized. Due to double answers this was also repeated in ‘Process owners
(having)’ and ‘Responsibility push towards business owners.’
On the question, “Do you want to be kept informed on the results of the research?” all CIOs responded
positively.
DISCUSSION
Current levels of ITG implementation were appraised by the CIOs as sufficient or better (with one
exception). This was a surprise. However it is possible that self-rating results provides a more positive
appraisal than an objective evaluation by an independent third party. The discussion concerns our three
research questions:
Research Question (A): “Which stream(s) of ITG best align with current practices?”
None of the CIOs rated any of the scope streams at 0%, which means all four streams are seen as
relevant by the CIOs.
Journal of Management Systems, Vol. 24, Number 3, 2014
13
Daniël Smits & Jos van Hillegersberg
Table 12. Actions to Improve ITG
Action
Group
Responsibility
Strategy
Details
1
 Good ownership of processes and
3
corresponding applications
 Process owners (having)
 Responsibility push towards business
owners
 IT fixed on agenda board, with IT present.
BPO assigned on senior level on key
processes by the board.
 Confront business with the consequence of
their choices
 Formally approved information management
strategy
2
3
4
1
Priority
5 6 7
Total
1
1
5
83%
1
3
50%
1
17%
3
50%
1
17%
1
1
1
1
1
1
1
Performance
Conformance
Human
Behavior
Not grouped
For infrastructure too!
 Determine the fundament: IT is yield driven
and not cost driven.
 Agile IT
 Lean IT
 The CIO role must disappear in favor of a
control instrument
 Educate business managers
 Professionalize the client (NL:
opdrachtgeverschap)
 Communicate and collaborate; business
result first
 Observe the engagements (more discipline)
 Simplification
 User groups
1
1
1
1
3
50%
7%
1
4
0%
67%
0%
1
3
50%
3
50%
1
1
17%
17%
1
17%
4
67%
3
50%
2
1
1
1
1
1
1
3
1
1
1
31%
1
Acquisition
 Maturity benchmark
 Consider IT as a part of a business project.
%
Overall
%
1
29%
2%
26%
1
1
1
1
1
1
2
33%
2
1
1
33%
17%
17%
42
5%
100%
When asked for the working direction of ITG none of the CIOs chose one of the extremes (‘Completely
top-down’ or ‘Completely bottom-up’), which means that both are seen as relevant too. Our research
further reveals that on the question “What stream is most important?” the CIOs have different opinions.
So all six ITG streams of the initial model (Table 6) were seen as relevant. Because the six streams are
a result from the literature study this means that the literature and the CIOs are in agreement on this
part. As such, a broad definition of ITG best aligns with current practices.
Mixed or largely bottom-up was chosen by 54% of the CIOs which means that more than half of the
group think bottom-up is at least the same or even more important than top-down. Or as one of the
Journal of Management Systems, Vol. 24, Number 3, 2014
14
The Continuing Mismatch between IT Governance Theory and Practice
CIOs stated, “Bottom-up is naturally just as important” as top-down. Contemporary ITG approaches are
mostly top-down.
That none of the CIOs chose completely top-down or completely bottom-up and the relative high score
of 54% for mixed or largely bottom-up implementation relevance can be seen as a confirmation of the
opinions of critics on current top-down approaches.
Research Question (B): “According to practitioners, which disciplines should play an
important role in ITG?”
Our literature review showed that publications on research covering ITG combined with portfolio
management and architecture are still rare and seemed to start growing from 2006/2007. Case studies
in literature contain clear descriptions on the way ITG, architecture and portfolio management relate in
practice (Wittenburg et al., 2007). Books describing best practices on the combination of disciplines are
also available (e.g. Nieman, 2006). In the literature, architecture and portfolio management are seen as
important disciplines for ITG too. This was confirmed by the CIOs (see Table 11). The disciplines which
are most often mentioned are portfolio management and architecture with respectively 62% and 46%.
The Delphi study confirms that the participating CIOs agree on the relevance of these disciplines and
encourage this direction for our research program. The extra disciplines that were put forward by the
CIOs give us input for additional research.
When asked for indications on how to improve ITG, it is interesting to see that the answers to the
question: “What has to be done to improve ITG?” did not include disciplines (Table 12). Improvement of
portfolio management, architecture, security, project management, program management or innovation
was not mentioned. This might be explained by the fact that there are other issues for improvement
besides disciplines with higher priorities.
The indications mentioned are of a completely different kind. Most answers (86%) can be categorized
as part of: Responsibility, performance and human behavior. The highest score for ‘Good ownership of
processes and corresponding applications’ shows there are still issues regarding responsibilities and
accountabilities. Being one of the core issues of ITG, this seems a little contrary to the high scores for
the rating of the ITG practices. More research on what lies behind is needed.
As a result of our literature review we found that COBIT is the framework which is most often used in
contemporary research papers on ITG maturity. Relating to our streams, COBIT especially covers ‘IT
audit’ and ‘Top-down.’ There are critiques of COBIT, especially from the group of scholars we
categorized as being in the stream of ‘Bottom-up.’ Further research is needed to determine why the
CIOs don’t use existing maturity benchmarks for ITG. The need for such a benchmark is a welcome
confirmation of the relevance of the maturity part of our research program. It indicates the need for
another ITG maturity model. This might be so because contemporary maturity models are mostly
similar to CMM. CMM is largely based on process maturity. In contrast, literature and practice indicate
the need for maturity models which pay more attention to the social aspects of ITG.
The high score for ‘Educate business managers’ shows there are still issues in the collaboration
between business and IT management. We expect these to be a mix of content and social factors too.
Research Question (C): “Is there (still) a mismatch between ITG practice and
theoretical frameworks?”
The use of internally developed frameworks is diminishing fast as can be seen in Table 1. In the survey
of 2011, this was not an option in the questionnaire. However it was possible to choose the option
Journal of Management Systems, Vol. 24, Number 3, 2014
15
Daniël Smits & Jos van Hillegersberg
‘Other (please specify).’ Because ‘Internally developed frameworks’ was not included in the tables we
conclude it was often declined, with a percentage not high enough to reach the result tables (below
1.6%). So contemporary organizations don’t use internally developed frameworks for ITG.
Comparing the resulting disciplines with the results of the ITGI surveys (Table 1) there are a few things
that attract attention. Service management (ITIL or ISO/IEC 20000) was ranked top of the ITGI lists,
while in our results it was only mentioned twice.
Portfolio management, architecture, security and project and program management are the most
frequently mentioned disciplines. PMI/PMBOK and PRINCE2 deal with project, program and portfolio
management which are fast growers in the ITGI survey too. Architecture has a clear link with TOGAF
which received a negligible percentage of 3% in the ITGI survey of 2011. Security was in the top four in
our research. Several security frameworks like ISO/IEC 17799/27000 are indeed used as the second
most frequently used frameworks for ITG in practice (ITGI, 2011).
So we can see there is a substantial correspondence between the mentioned disciplines and the
frameworks used in practice. These disciplines however deviate from a conventional list of dimensions
(Table 2). The literature study also delivered examples of papers in which alternative factors are
suggested (e.g. Chin, Brown, & Hu, 2004; Maidin & Arshad, 2010; Nfuka & Rusu, 2010; Mohamed,
2012).
Some disciplines can be used to implement some of the dimensions. An example is IT investment
management or resource management using portfolio management. So dimensions, disciplines and
frameworks do not match.
Demand management, innovation and process design and management can only be related to the
more general frameworks.
The interest of the CIOs in the research is a confirmation of the relevance of our research program.
CONCLUSIONS
The research goals of the study are to determine if there is still a mismatch between ITG practices and
theory and to collect indications on how to improve ITG using literature and experts from practice. To
answer these questions we defined three sub-questions. The conclusions are grouped around these
questions.
“Which stream(s) of ITG best align with current practices?”
We defined six ITG streams, four of which define the scope of ITG. ITG can be seen as an audit
process, as IT decision-making, as an integral part of corporate governance from a conformance
perspective and as an integral part of corporate governance from a performance perspective. Two
streams define the direction in which ITG works (top-down or bottom-up).
Our results show that ITG is a broad working field in which all six streams (as shown in Table 4) are
seen as relevant. ‘Mixed’ or ‘Largely bottom-up’ were chosen by 54% of the CIOs which means that
more than half of the group considered bottom-up as at least equally or even more important than topdown. Contemporary ITG approaches are mostly top-down.
We conclude that a broad definition of ITG best aligns with current practices and that these six streams
are an effective way to study the variety of ITG practices. There was consensus between the CIOs in
Journal of Management Systems, Vol. 24, Number 3, 2014
16
The Continuing Mismatch between IT Governance Theory and Practice
the Delphi study on the relevance of each stream in the initial model and thus on the initial model itself
(Table 6).
“According to practitioners, which disciplines should play an important role in ITG?”
In literature, constructs like dimensions (as shown in Table 2), focus areas (COBIT) or principles
(ISO/IEC 38500) are often used. For recognition in practice we use the more practical term ‘discipline.’
The most often mentioned disciplines are portfolio management and architecture which were
mentioned by 62% and 46% of the CIOs (Table 11). Publications on research covering ITG combined
with portfolio management and architecture are still rare but seem to have started growing from
2006/2007.
When asked on what has to be done to improve ITG the disciplines did not show up again. As
indications to improve ITG the highest scores were received for ‘Good ownership of processes and
corresponding applications’, a ‘Maturity benchmark’ and ‘Educate business managers.’ Thus current
ITG maturity models seem to deliver no or no appropriate maturity benchmark information. This
indicates the need for another ITG maturity model.
“Is there (still) a mismatch between ITG practice and theoretical frameworks?”
We conclude that there is a substantial correspondence between the mentioned disciplines and the
frameworks used in practice. These disciplines however deviate from conventional lists of dimensions,
e.g. Table 2.
There is no clear match between the disciplines and the frameworks used in practice. Because
dimensions, disciplines and frameworks do not match we conclude it seems most likely there is still a
mismatch between ITG practice, frameworks and theory.
Implications of the Research
Some scholars prefer a small scope for ITG. Our study shows that a broad definition of ITG best aligns
with current practices. One of the reasons ITG continues to be a 'top 10' CIO management issue might
be an oversimplification of the reality in contemporary organizations. Current approaches and
frameworks are mostly ‘top-down’ based on process, structure and planning. This study shows that
‘bottom-up’ is just as important. This means that frameworks which lack sufficient attention to the social
aspects of ITG are incomplete.
We conclude there is a need for a framework and/or an ITG maturity model which combines elements
like process, structure and planning as can be found in current frameworks with elements related to
social aspects like behavior, collaboration and culture.
Limitations of the Research
The data collection was limited to a small number of Dutch CIOs. The results might be impacted by the
culture in Dutch organizations. Thus the composition of the group and the country of origin might have
impacted the results.
Future Research
As the results might be impacted by the culture in Dutch organizations it would be interesting if the six
streams are seen as relevant by CIOs in other countries too. More research has to be done to
Journal of Management Systems, Vol. 24, Number 3, 2014
Daniël Smits & Jos van Hillegersberg
17
determine the implications of the indications to improve ITG collected during the literature study and the
Delphi study.
The design of a framework and an ITG maturity model which combine ‘top-down’ elements like
processes and structure with the more social ‘bottom-up’ elements like behavior, collaboration and
culture will be the next step in our research program. As a next step we will also determine the focus
areas and capabilities needed to improve ITG.
References
Bernard, P. (2012). COBIT 5: A management guide. Zaltbommel, the Netherlands: Van Haren
Publishing.
Bhimani, A. & Soonawalla, K. (2005). From conformance to performance: The corporate
responsibilities continuum. Journal of Accounting and Public Policy, 24(3), 165-174.
Bradley, R. V. & Pratt, R. M. (2011). Exploring the relationships among corporate entrepreneurship,
IT governance, and risk management. In: Proceedings of the 44th Annual Hawaii International
Conference on System Sciences, pp.1-10. Piscatawy, NJ: IEEE.
Brown, C. V. & Renwick, J. S. (1996). Alignment of the IS organization: The special case of
corporate acquisitions. ACM SIGMIS Database, 27(4), 25-33.
Calder, A. (2008). ISO/IEC 38500: International standard for corporate governance of IT (IT
governance). Ely, UK: IT Governance Limited.
Chin, P. O., Brown, G. A., & Hu, Q. (2004). The impact of mergers & acquisitions on IT governance
structures: A case study. Journal of Global Information Management, 12(4), 50-74.
Ciborra, C. U. (1997). De Profundis? Deconstructing the concept of strategic alignment.
Scandinavian Journal of Information Systems, 9(1), 67-82.
De Haes, S. & Van Grembergen, W. (2005). IT governance structures, processes and relational
mechanisms: Achieving IT/business alignment in a major Belgian financial group. In: Proceedings
of the 38th Annual Hawaii International Conference on System Sciences, (p. 237b). Piscatawy, NJ:
IEEE.
Dietz, J. L. G. & Hoogervorst J. A. P. (2012). Principles of enterprise engineering. In: A. Albani, D.
Aveiro, & J. Barjis (Eds.), Advances in enterprise engineering, VI, pp.15-30. Berlin, Germany:
Springer.
Easterly, W. (2008). Design and reform of institutions in LDCs and transition economies institutions:
Top down or bottom up? American Economic Review: Papers & Proceedings, 98(2), 95-99.
Fjermestad, J. & Hiltz, S. R. (2000). Group support systems: A descriptive evaluation of case and
field studies. Journal of Management Information Systems, 17(3), 113-157.
Györy, A., Cleven, A., Uebernickel, F., & Brenner, W. (2012). Exploring the shadows: IT
governance approaches to user-driven innovation. In: Proceedings of the European Conference on
Information Systems 2012, (Paper 222). Retrieved from http://aisel.aisnet.org/ecis2012.
Journal of Management Systems, Vol. 24, Number 3, 2014
18
The Continuing Mismatch between IT Governance Theory and Practice
ISACA. (2013). COBIT 5.0. Retrieved from http://www.isaca.org/cobit.
ISO/IEC. (2008). 38500: International standard for corporate governance of IT (IT governance).
ITGI. (2003). Board briefing on IT governance (second edition). Meadows, IL: IT Governance
Institute.
ITGI. (2008). IT governance global status report - 2008. Meadows, IL: IT Governance Institute.
ITGI. (2011). Global status report on the governance of enterprise IT (GEIT) - 2011. Meadows, IL:
IT Governance Institute.
Lee, J. & Lee, C. (2009). IT governance-based IT strategy and management: Literature review and
future research directions. In: A. Cater-Steel (Ed.), Information technology governance and service
management: Frameworks and adaptations, (pp. 44-62). New York, NY: Hershey.
Lindblom, C. E. (1959). The science of muddling through. Public Administration Review, 19(2), 7988.
Linstone, H. A. & Turoff, M. (1975). The Delphi method: Techniques and applications. Reading, MA:
Addison-Wesley Publishing Company.
Mahoney, J. (2012). Briefing for IT leaders: Tomorrow’s trends and today’s decisions. Stamford,
CT: Gartner.
Maidin, S. S. & Arshad, N. H. (2010). Information technology governance practices in Malaysian
public sector. In: Proceedings of the 2010 International Conference on Financial Theory and
Engineering, (pp. 281-285). Piscatawy, NJ: IEEE.
Mohamed, N. (2012). A conceptual framework for information technology governance effectiveness
in private organizations. Information Management & Computer Security, 20(2), 88-106.
Musson, D. (2009). IT governance: A critical review of the literature. In: A. Cater-Steel
(Ed.), Information technology governance and service management: Frameworks and
adaptations, (pp. 63-81). New York, NY: Hershey.
Nabiollahi, A. & bin Sahibuddin, S. (2008). Considering service strategy in ITIL V3 as a framework
for IT governance. In: Proceedings of the International Symposium on Information Technology, Vol.
1, (pp.1-6). Piscatawy, NJ: IEEE.
Nfuka, E. N. & Rusu, L. (2010). Critical success factors for effective IT governance in the public
sector organizations in a developing country: The case of Tanzania. Paper presented at the 18th
European Conference on Information Systems, Pretoria, South Africa, 7-9 June, 2010.
Niemann, K.D. (2006). From enterprise architecture to IT governance. Berlin, Germany: Springer.
Novotny, A., Bernroider, E. W. N., & Koch, S. (2012). Dimensions and operationalisations of IT
governance: A literature review and meta-case study. Paper presented at CONF-IRM 2012, Vienna,
Austria, May 21-23, 2012.
Journal of Management Systems, Vol. 24, Number 3, 2014
19
Daniël Smits & Jos van Hillegersberg
Peterson, R. R., O’Callaghan, R., & Ribbers, P. M. A. (2000). Information technology governance
by design. Paper presented at the International Conference on Information Systems, Brisbane,
Australia, December 10-13, 2000.
Peterson, R. R., Parker, M. M., & Ribbers, P. M. A. (2002). Information technology governance
processes under environmental dynamism: Investigating competing theories of decision-making
and knowledge sharing. Paper presented at the 23th International Conference on Information
Systems, Barcelona, Spain, December 15-18, 2002.
Petticrew, M. & Roberts, H. (2008). Systematic reviews in the social sciences: A practical guide.
Hoboken, NJ: John Wiley & Sons.
Schwarz, A. & Hirschheim, R. (2003). An extended platform logic perspective of IT governance:
Managing perceptions and activities of IT. The Journal of Strategic Information Systems, 12(2),
129-166.
Spilter. (n.d.). Spilter. Retrieved from http://www.spilter.nl.
Taylor-Powell, E. (2002). Quick tips collecting group data: Delphi technique. Madison, WI:
University of Wisconsin. Retrieved from http://www.uwex.edu/ces/pdande/resources/pdf/Tipsheet4.pdf.
Van Grembergen, W. & De Haes, S. (2010). A research journey into enterprise governance of IT,
business/IT alignment and value creation. International Journal of IT/Business Alignment and
Governance, 1(1), 1-13.
Verhoef, C. (2007). Quantifying the effects of IT-governance rules. Science of Computer
Programming, 67(2), 247-277.
Webb, P., Pollard, C., & Ridley, G. J. (2006). Attempting to define IT governance: Wisdom or folly?
In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences, (p.194a).
Piscatawy, NJ: IEEE.
Weill, P. & Ross, J. (2004). IT governance: How top performers manage IT decision rights for
superior results. Boston, MA: Harvard Business School Press.
Weill, P. & Ross, J. (2005). A matrixed approach to designing IT governance. MIT Sloan
Management Review, 46(2), 26-34.
Willson, P. & Pollard, C. (2009). Exploring IT governance in theory and practice in a large multinational organisation in Australia. Information Systems Management, 26(2), 98-109.
Wittenburg, A., Matthes, F., Fischer, F., & Hallermeier, T. (2007). Building an integrated IT
governance platform at the BMW Group. International Journal of Business Process Integration and
Management, 2(4), 327-337.
Xue, Y. J., Liang H. G., & Boulton, W. R. (2008). Information technology governance in information
technology investment decision processes: The impact of investment characteristics, external
environment, and internal context. MIS Quarterly, 32(1), 67-96.
Journal of Management Systems, Vol. 24, Number 3, 2014
20
The Continuing Mismatch between IT Governance Theory and Practice
Zhong, X., Vatanasakdakul, S., & Aoun, C. (2012). IT governance in China: Cultral fit and IT
governance capabilities. Paper presented at the Pacific Asia Conference on Information Systems
2012, Ho Chi Minh City, Vietnam, July 11-15, 2012.
Author Biography
Daniël Smits is a management consultant at Sogeti Netherlands B.V. specialized in
governance, portfolio management and enterprise architecture. He followed the traditional career path
of programmer, designer, information analyst and project manager, and gained much experience in
complex, mostly strategic, projects covering the interface between business and ICT. In addition to his
regular activities as consultant, he is responsible for Sogeti’s governance services, and is the chairman
of the Ngi department Governance (Ngi is the Dutch association of ICT-professionals) and the
chairman of the NAF workgroup IT governance (NAF is the Dutch Architecture Forum). In 2012, Daniël
started doctoral research at the University of Twente on governance maturity and effectiveness.
Jos van Hillegersberg is a full professor of Business Information Systems at the School of
Management and Governance, University of Twente. He is head of department of the Industrial
Engineering and Business Information Systems Group (IEBIS). He is leading several research and
university-industry collaborations in both national and international consortia.
Journal of Management Systems, Vol. 24, Number 3, 2014
21
Journal
J
of Managgement Syystems
ISSN #104 1-2808
A Publiccation of the Assocciation off Manageement
____________
__________
___________
__________
__________________________________________________ WAL-M
MART’S LE
EADERSH
HIP IN RE
ETAIL SU
UPPLY CH
HAIN
Seungja
ae Shin, Miss
sissippi State Universityy, Meridian, M
Mississippi, USA
Jack E.. Tucci, Arka
ansas Tech University,
U
R
Russellville, Arkansas, U
USA
Dustin Odom,
O
Mississippi State
e University, Meridian, M
Mississippi, U
USA
AB
BSTRACT
T
This study examines Ra
adio Frequen
ncy Identification (RFID ) technologyy use in sup
pply chain op
perations
ffor Wal-Marrt to determ
mine if it giv
ves them a competitive
e advantage
e over their rivals. This article
ccompares Wal-Mart’s
W
fin
nancial ratios
s against its major comp
petitors’ in th
he period of pre-, pilot-, a
and postimplementation. The study uses inve
entory efficie
ency ratios a
and per emp
ployee profittability ratio collected
ffrom the 2000-2013 financial state
ements to in
nvestigate th
he impact o
of RFID tech
hnology. In all three
p
periods, Wal-Mart show
ws superior efficiency
e
in inventory m
managementt and per employee pro
ofitability.
T
There is imp
provement fo
or GMROII between prre-RFID periiod and posst-RFID period. Wal-Ma
art shows
sstronger rela
ationships be
etween ISR, DII and perr employee p
profitability b
but its compe
etitors show
w stronger
rrelationships
s between IT
TR and per employee
e
prrofitability. T
Thus, Wal-M
Mart needs m
more time to reap the
ffull benefit off supply chain operation efficiency frrom the RFI D implemen
ntation.
K
Keywords:
RFID, Wa
al-Mart, Reta
ail Supply Ch
hain, Innova
ation
INTR
RODUCTIO N
W
Wal-Mart is a giant glob
bal retailer and
a much off this successs can be attributed to its cost minimization
sstrategies in supply cha
ain managem
ment that se
et industry sstandards. A
As such, it is not surpriising that
W
Wal-Mart is ranked 9th in Gartner’s
s Top 25 Su
upply Chain in 2012. In Gartner’s liist, there is no other
rretail company ahead off Wal-Mart.
W
Wal-Mart is superior in its informattion technolo
ogy operatio
ons. Wal-Ma
art invested heavily in a central
d
database sys
stem and sa
atellite comm
munications system in th
he 1980s. In
n the 1990s, Wal-Mart de
eveloped
the largest private
p
secto
or data warrehouse in the
t
world (M
Mark, 2012).. In the 21sst Century, W
Wal-Mart
invested hea
avily in Radio
o Frequency
y Identificatio
on (RFID) te
echnology. R
RFID is defin
ned as a wire
eless tool
u
used to track
k merchandise. Combin
ned with its database
d
syystem to colllect data, de
ecode it, and
d make it
ccomputerized for better inventory op
peration, it is
s the heart o
of supply cha
ain management system
m (Hsieh,
P
Prudilova, & Binshan, 2010).
2
Wal-M
Mart’s historry is one of making an effort to reduce inventtory cost.
W
Wal-Mart’s annual
a
reporrts from 2000 to 2013 re
eport that (1
1) inventory share from net sales de
ecreased
old decreased from 52 d
to 9% from 11%,
1
(2) a number of da
ays before in
nventory is so
days to 40 d
days, and
((3) a numbe
er of annual inventory tu
urns increased from 7 to
o 9. Wal-Ma
art continuess to make significant
Journal off Managementt Systems, Vool. 24, Numbeer 3, 2014
22
Wal-Mart’s Leadership in Retail Supply Chain
efforts to reduce inventory levels using information systems to provide a competitive advantage over its
competitors. An information system with integrated RFID allows Wal-Mart to accurately track product
location from manufacturer, to distributor, to storage pallets, to distribution center, to truck, and finally to
the store.
In this paper, the authors analyze the financial data of both Wal-Mart and its competitors in the retail
industry to answer the following two questions:
(1) Is there a significant relationship between inventory operation efficiency and per employee
profitability in the retail industry?
(2) Are there any changes in the financial ratios related to Wal-Mart’s inventory operation efficiency
and per employee profitability in the periods of pre-RFID, pilot of RFID, and implementation of
RFID against its competitors?
This study is organized as follows: first, the authors provide a literature review, secondly, a discussion
of the research approach, which includes data collection procedure, research hypothesis, and research
methods. Finally, the authors provide analysis and conclusions.
LITERATURE REVIEW
Many academic research papers attribute Wal-Mart’s success to their low cost offerings and consider
this as their competitive advantage. Wal-Mart’s supply chain management is the main distinguishing
factor that allowed for the growth from a small retailer in rural Arkansas to a global leader. Wal-Mart first
displays leadership of the retail industry by adopting a decision making system based on data analysis
provided by a barcode scanning system combined with an Electronic Data Interchange (EDI) with
vendors, and a point-of-sale system with real time data collection (Mark, 2012). Chandran (2003) states
that Wal-Mart is in a leadership position in the retail industry because of efficient supply chain practices
that result from their automated distribution centers and computerized inventory systems. Wal-Mart is
recognized for managing its own trucking system and an innovative cross-docking logistic technique
whereby they can transfer products from inbound trailers to outbound trailers without intermediate
storage.
Wal-Mart continues to validate its leadership role in supply chain management for the U.S. Retail
Industry over time. Some papers compare Wal-Mart’s superiority in inventory operation efficiency with
its major competitors. The first illustration of this is comparison of capital charge for inventory per $1 of
sales. While Wal-Mart pays $0.009 in 1994, K-Mart pays $0.017 for its every dollar of inventory (Gill
and Abend, 1997). The second instance is in 1989 when Wal-Mart’s distributing costs were as low as
1.7 percent of its cost of sales whereas major competitors K-Mart (3.5 percent of cost of sales) and
Sears (5 percent cost of sales) were operating at a higher distributing cost (Mark, 2012). The third
instance is in 2011 when Wal-Mart was able to achieve a more efficient level of inventory turnover (11.5
times) than its major competitors Target (8.7 times), Amazon.com (6.2 times) and Sears (4.7 times)
(Mark, 2012). These three examples of supply chain management efficiency leadership account for
Wal-Mart being the pioneer in Supply Chain Management. Wal-Mart’s pilot Radio Frequency
Identification (RFID) project decreased their stockout rate by 16 percent (Visich, Khumawala & Reyes,
2009). A real time portrayal of stock can be accounted for and identified with RFID communication
technology being placed in crucial spots in Wal-Mart stores.
A critical decision to make in inventory operation is how much and how frequently to reorder. A trade-off
exists between the amount to order and the frequency of the order, except for products where the
demand is unstable (i.e., large order quantity with less frequent order vs. small order quantity with more
Journal of Management Systems, Vol. 24, Number 3, 2014
23
Seungjae Shin, Jack E. Tucci & Dustin Odom
frequent order). The economic order quantity (EOQ) is a conventional model for inventory decision
making that minimizes the sum of the total ordering cost and carrying cost. Just-in-time (JIT) is a
method for inventory decision making, whose main purpose is to control a restricted size of inventory
with a frequent order and small size order quantity. With coordinating RFID technology and JIT logistic
systems, Wal-Mart controls reduced inventory and facilitates operational efficiency for trucking, crossdocking, and distribution centers with real-time decision making (Qu et al., 2012).
Freeman et al. (2011) claims Wal-Mart as a technology leader as well as a business leader in the retail
sector because Wal-Mart holds the world’s largest private sector data warehouse and operating data
enabled supply chain that permits collaborative planning, forecasting, replenishment (CPRF) and
vendor managed inventory (VMI). Wal-Mart grants access to its data for its suppliers to keep its
inventory cost low. Wal-Mart successfully seized the rewards of information technology by re-organizing
its business lines. Just-in-time as an approach of improving competitiveness and reducing costs has
shown to be very effective for Wal-Mart’s supply chain. With the entrance of RFID allowing the creation
of real-time databases, it presents the opportunity to integrate efficient economic order quantity
targeting a limited inventory. Minimizing inventory is proving to be a tactic to realizing a sustained
competitive advantage in the field of cost reduction. Cost restrictions through effective inventory
management are reducing storage footprint, inventory taxes and insurance costs which are the leading
factors motivating corporations searching for efficiency and profitability (Emiliani et al., 2007; Horngren,
2011). However, one of the biggest dilemmas in obtaining the cost advantage is “supplier” cooperation
and regional economic infrastructure (Glaser, Tucci, & Anghel, 2006). Wal-Mart has defeated much of
this opposition with buyer power. An overlooked advantage of the effect of reduced inventory is that it
adds a societal oriental approach to the entire supply chain by being “greener” through the minimization
of spoilage, shrinkage, and obsolescence resulting from inventory reduction.
RESEARCH METHOD
Research Hypothesis
In this paper, the authors want to investigate how good Wal-Mart’s supply chain operation is compared
with its competitors. Operational efficiency is a measure of output to input ratio which is used for
comparing companies within the same industry. Inventory operation efficiency is used as a
performance indicator for supply chain operation. Per employee efficiency, such as profit per employee
is a useful metric when comparing business performance of retail stores or retail companies. The null
hypothesis examines if the ratios’ mean value of competitors and Wal-Mart are the same in the
inventory operation efficiency or per employee efficiency, i.e., Ho: µCompetitor = µWal-Mart. The alternative
hypothesis examines if the ratios’ mean values for Wal-Mart is better. The last hypothesis is existence
of any relationship between per employee efficiency and inventory operation efficiency, i.e., how to
affect per employee efficiency by improved inventory operation efficiency. The following are main
hypothesis to be tested in this study.
H1: The mean for competing companies’ inventory efficiency is equal to the mean for
Wal-Mart’s.
H2: The mean for competing companies’ per employee profitability is equal to the
mean for Wal-Mart’s.
H3: There is a relationship between inventory operation efficiency and per employee
profitability.
Journal of Management Systems, Vol. 24, Number 3, 2014
24
Wal-Mart’s Leadership in Retail Supply Chain
DATA COLLECTION
A total of 25 companies, including Wal-Mart, are examined in this study. The 24 competitors of WalMart are chosen from the industry section of Department/Specialty Retail Store on the NASDAQ web
sites (http://www.nasdaq.com/symbol/wmt/competitors). The first criterion for inclusion in this research
is that the companies used must be publicly traded in order to gain available financial data. The next
criterion is the companies examined must be competitors of Wal-Mart in multiple key product segments.
All 25 companies have been listed in U.S. stock markets such as NYSE and NASDAQ for 14 years
since 2000. The following is a stock symbol list of 25 companies: ALCS, AMZN, BBY, BIG, BONT,
COST, CVS, DDS, DG, DLTR, FDO, FRED, HD, JCP, KR, KSS, LOW, M, RSH, SHLD, SWY, TGT,
TUES, WAG, and WMT. Once the companies are selected, the next step is to identify how to measure
labor efficiency and inventory operation efficiency for each firm. It was determined the most objective
way to do this was through observation of each company’s financial statements. Financial statements
are collected for the fiscal years of 2000 through 2013 for each of the 25 companies from the
CompuStat database. Out of 25 companies, only one company does not have 2013 financial
statements (Alico Inc.) at the time of writing this paper. The data is summarized for three periods (PreRFID, Pilot, and Implementation). Therefore, the total number of data in this data set is 349 (25
companies * 14 year -1), which is a sum of period 1 (100 data), period 2 (100 data), and period 3 (149
data).
The financial ratios for efficiency for inventory operation are inventory turnover ratio (ITR), inventory to
sales ratio (ISR), and days-in-inventory (DII). The financial ratio of profitability associated with inventory
operation is gross margin return on inventory investment (GMROII), which is calculated by gross profit
divided by inventory. The last financial ratio related with labor efficiency is per employee gross profit
(PEGP), which is calculated by gross profit divided by number of full time employees. While the higher
ITR, GMROII, and PEGP are, the better they are; the lower DII and ISR are, the better they are.
DESCRIPTIVE STATISTICS
Once the fourteen year information for each financial ratio is collected for the 25 companies, the data
was grouped in three time periods: Period 1, 2000-2003; Period 2, 2004-2007; and Period 3, 20082013. Wal-Mart introduced RFID technology in 2003 and initiated a pilot test (Hunt et al., 2007). In 2004,
Wal-Mart announced the result of RFID pilot study. Wal-Mart issued the first RFID mandate during the
pilot phase, which required its top 100 suppliers to put RFID tags on their pallets and case lots
beginning January 2005 (Hunt et al., 2007). This was expanded quickly to the top 300 suppliers. In
2007, Wal-Mart announced that it would charge Sam’s Club suppliers a $2 penalty for each pallet
without a RFID tag shipped to its distribution centers, beginning January 2008 which was the start of
the implementation period (Weier, 2008). This was a serious message to 60,000 Wal-Mart and Sam’s
Table 1. Competitors Financial Ratio: Mean (S.D.)
ITR
ISR
DII
GMROII
PEGP
Period 1
Period 2
Period 3
5.09 (2.87)
0.16 (0.06)
90.06 (38.27)
2.21 (0.92)
$49,546.93 (23,003.89)
5.04 (2.72)
0.16 (0.06)
90.18 (37.29)
2.23 (0.75)
$58,360.08(31,234.56)
5.43 (3.10)
0.16 (0.06)
86.20 (38.80)
2.31 (0.84)
$64,577.45 (37,056.13)
Journal of Management Systems, Vol. 24, Number 3, 2014
25
Seungjae Shin, Jack E. Tucci & Dustin Odom
Club suppliers, which meant that without RFID technology, they were not going to deal with Wal-Mart in
the near future. Period 1 is the pre-RFID stage and Period 2 is the pilot stage of RFID technology and
Period 3 is the implementation stage of RFID on a company-wide supply chain level. Table 1 presents
mean and standard deviation of five ratios of the 24 competitors of Wal-Mart in each period. Table 2
shows the same data for Wal-Mart in each period. Table 3 shows null hypothesis to be tested in the
next section.
Table 2. Wal-Mart’s Financial Ratio: Mean (S.D.)
ITR
ISR
DII
GMROII
PEGP
Period 1
Period2
Period3
7.32 (0.30)
7.57 (0.31)
8.30 (0.48)
0.11 (0.31)
49.92 (2.11)
2.21 (0.12)
$38,267.82 (2,996.60)
0.10 (0.00)
48.27 (1.97)
2.53 (0.15)
$43,973.98 (2,015.98)
0.09 (0.01)
44.11 (2.53)
2.97 (0.19)
$53,449.13 (2,865.79)
Table 3. Null Hypothesis
Period 1
Period2
Period3
ITR
ISR
DII
GMROII
µCompetitor = 7.32
µCompetitor = 0.11
µCompetitor = 49.92
µCompetitor = 2.21
µCompetitor = 7.57
µCompetitor = 0.10
µCompetitor = 48.27
µCompetitor = 2.53
µCompetitor = 8.30
µCompetitor = 0.09
µCompetitor = 44.11
µCompetitor = 2.97
PEGP
µCompetitor = 38,268
µCompetitor = 43,974
µCompetitor = 53,449
T-TEST RESULT
Table 4 shows the t-test results for the 24 competing companies’ ratios against Wal-Mart for each time
period. Two-tailed p-values are used for each ratio in each period. In the ITR, ISR, DII, and PEGP, all
p-values are near zero indicating that the null hypothesis is rejected with 1% significance level. In the
GMROII, in Period 1, the null hypothesis is not rejected because of the high p-value, 0.955. However, in
Table 4. T-Statistics (P-value)
Period 1 (n = 96)
Period 2 (n=96)
Period 3 (n=143)
ITR
-7.595
(0.000)
-9.130
(0.000)
-11.093
(0.000)
ISR
8.589
(0.000)
10.159
(0.000)
12.332
(0.000)
DII
22.520
(0.000)
11.013
(0.000)
12.974
(0.000)
GMROII
0.057
(0.955)
-3.948
(0.000)
-9.402
(0.000)
PEGP
4.804
(0.000)
4.513
(0.000)
3.591
(0.000)
Journal of Management Systems, Vol. 24, Number 3, 2014
26
Wal-Mart’s Leadership in Retail Supply Chain
Period 2 and 3, the null hypotheses are rejected because of near zero p-values. Therefore, in all three
periods, the ITR, ISR, DII, and PEGP of Wal-Mart are significantly improved values than those of its
competitors. There is no difference in GMROII in Period 1 between Wal-Mart and its competitors but in
Period 2 and 3, Wal-Mart’s GMROII values are improved a lot compared to that of competitors.
CORRELATION
Table 5 is the correlation matrix for the above five ratios. According to Anderson et. al, (2008), the rule
of thumb for selecting independent variables of regression analysis is that if the correlation coefficient is
greater than 0.70, then it should not be used in a multiple regression because of multicollinearity. The
GMROII has a common component of inventory with the three inventory operation ratios and a
common component of gross profit with the PEGP. Thus, GMROII is not chosen as an independent and
a dependent variable in the regression models.
Table 5. Correlation Matrix
ITR
ISR
DII
GMROII
PEGP
ITR
ISR
DII
GMROII
PEGP
1.00000
-0.86178
-0.87241
0.68350
0.44709
1.00000
0.96601
-0.73302
-0.45714
1.00000
-0.64109
-0.44586
1.00000
0.36795
1.00000
REGRESSION ANALYSIS
The data set used in the regression study is both a cross-sectional and a time series panel data. As a
cross-sectional data, the values of variables such as inventory related ratios and profit ratio are
collected for 25 retail companies including Wal-Mart. As a time series data, the values of the variables
are collected for 14 years. Therefore, the total number of observation used is 349, which are 25
retailers by 14 years minus one missing data. The independent variables are ITR, ISR, and DII and the
dependent variable is PEGP. Because of high correlation index, instead of multiple linear regressions,
three simple linear regression analyses are used. Because the distribution of PEGP is skewed, log
transformation of PEGP (LN-PEGP) is used. Because the main focus of this study is comparison
between Wal-Mart and its competitors, a slope dummy variable for Wal-Mart, WMT, is introduced with
an assumption that impact of independent variables (ITR, ISR, and DII) to dependent variable (LNPEGP) is different between two groups, competitor groups and Wal-Mart. The slope dummy variable
makes a product term with independent variables. The followings are three simple regression models:
LN-PEGPit = β0 + β1ITRit + β2(ITR*WMT)it +εit .............................................................. (1)
LN-PEGPit = β0 + β1ISRit + β2(ISR*WMT)it +εit ............................................................. (2)
LN-PEGPit = β0 + β1DIIit + β2(DII*WMT)it +εit ................................................................ (3)
For i = 1~25, t = 2000~2013, WMT = 1 if it is Wal-Mart, = 0 otherwise.
Journal of Management Systems, Vol. 24, Number 3, 2014
27
Seungjae Shin, Jack E. Tucci & Dustin Odom
Estimating the panel data regression model by ordinary least square method (OLS) might provide a
biased solution caused by unobserved heterogeneity (Dougherty, 2006). To test homoskedasticity
assumption, the Breusch-Pagan (BP) Test is used. The BP Test is supposed to detect
heteroskedasticity by running a regression with the squared residuals as a dependent variable. To test
autocorrelation, the Durbin-Watson (DW) statistic (d) is used. Because all three p-values from the BP
tests are near zero, the null hypothesis of homoskedasticity can be rejected with a 1% significance level.
Thus, all three models qualify heteroskedasticity. The DW statistics are far less than critical values of
DW test, all three models have autocorrelation problem. To overcome the problems from BP test and
DW test, the authors choose the panel data regression approach. There are two models in the panel
data regression: fixed effect model and random effect model. According to Greene (2012), while the
fixed effect assumes that individual heterogeneity is correlated with independent variables, the random
effect assumes that the individual heterogeneity is uncorrelated with the independent variables. Jerry A.
Hausman developed a test for determining which model is appropriate, i.e., Hausman Test. To do the
Hausman Test, the individual dummy variables must be introduced in each equation. The null
hypothesis for the Hausman test was that no differences result between the fixed effect model and the
random effect model. Because of the p-value from the Hausman test is greater than 1% significance,
the null hypothesis cannot be rejected. Therefore, the random effect model is more appropriate. Table 6
summarizes the test results of three tests.
Table 6. Results from the Tests
Equation
BP Test: p-value
DW Test*
PH Test: p-value
(1)
(2)
(3)
9.17e-16
4.694e-5
2.01e-4
DW = 0.2929
DW = 0.3359
DW = 0.3226
0.5233
0.5187
0.4935
* Critical Values: DU(n=100,α=.01, k=3)=1.482, DU(n=150,α=.01, k=3)=1.584
Table 7 summarizes the results from the random effect models. All coefficient of variables in each
equation model have near zero p-values and model fit p-value is also near zero. Thus the model and its
coefficients are acceptable with a significance level of 1%. Because the dependent variable has logtransformation, when one unit of increase in an independent variable, the dependent variable changes
β1 % for Wal-Mart’s competitors and (β1 + β2)% for Wal-Mart itself. In equation (2) and (3), Wal-Mart’s
ISR and DII have a stronger impact to PEGP than its competitors. In equation (1), Wal-Mart’s
competitors’ ITR have much stronger impact to PEGP than Wal-Mart’s ITR, because the sign of β1 and
β2 are opposite.
CONCLUSION
The infusion of advanced “real-time” information technology, advanced inventory systems, and the
willingness of the suppliers to conform to RFID standards has allowed Wal-Mart to increase inventory
management efficiency, create a more efficient market, and at the same time, contribute towards the
creation of a greener environment by reducing wastes created by holding excess inventory. With
significant advances in information technology with integration of RFID technology, Wal-Mart has been
able to leverage these assets to significantly overcome the problems of time and distance differentials.
Journal of Management Systems, Vol. 24, Number 3, 2014
28
Wal-Mart’s Leadership in Retail Supply Chain
Table 7. Result from the Random Effect Regression
Equation
βo
(p-value)
β1
(p-value)
β2
(p-value)
R2
F
(p-value)
(1)
10.5140
(0.0000)
0.0711
(0.0000)
-0.0424
(0.0002)
0.2958
77.669
(0.0000)
(2)
11.5001
(0.0000)
-3.8594
(0.0000)
-4.2333
(0.0000)
0.3755
104.005
(0.0000)
(3)
11.4064
(0.0000)
-0.0059
(0.0000)
-0.0085
(0.0000)
0.3491
92.76
(0.0000)
In the T-test analysis, Wal-Mart shows its excellence for inventory operation efficiency and per
employee gross profit regardless of periods. Thus, Wal-Mart’s RFID initiative cannot explain Wal-Mart’s
superiority in inventory operation efficiency and per employee profit efficiency after the implementation
of RFID technology. But Wal-Mart’s GMROII is improved from the period of pre-RFID to pilot and
implementation periods. Therefore, Wal-Mart has had an excellent supply chain reputation before the
RFID technology adoption. However, improvement in GMROII is important in retail because GMROII is
a ratio of productivity of inventory, i.e., per inventory gross profit. From the GMROII’s point view, WalMart’s RFID initiative has been successful for the last 10 years.
In the regression analysis, we found that there is a strong relationship between inventory operation
efficiency and per employee profitability in the retail industry. Wal-Mart shows a stronger relationship
between ISR/DII and LN-PEGP, but its competitors show a stronger relationship between ITR and LNPEGR. While low ITR usually happens in overstocking, high ITR shows strong sales performance or
shortage of inventory. Under the circumstance of efficient control of inventory, high ITR can be
maintained without stock shortage. The RFID technology is proven to be effective in reducing stock-out
rate (Shin and Eksioglu, 2014). An employee productivity ratio like PEGP, gets less productive as a
company’s size grows because of complexity of internal process, increase of communications cost, and
layers of bureaucracy. In 2013 data, among the 24 retailers, Wal-Mart’s market share is 34%. The
second largest one is only 9%. Even if Wal-Mart has a greater value of ITR than its competitors, the
response of per employee productivity to a change of inventory efficiency is smaller than its competitors
because of its large company size effect. As Hsieh et al. (2010) said, the benefit of RFID technology is
a long run benefit. Even if there has been an improved GMROII and positive relationship between
inventory efficiency and labor productivity, to prove Wal-Mart’s stronger efficiency of inventory and labor
against its competitors, it might need more time.
References
Anderson, D. R., Sweeny, D. J., & Williams, T. J. (2008). Modern Business Statistics: With Microsoft
Excel, 3rd Edition. Stamford, Conn: Cengage Learning.
Chandran, M. H. (2003). Wal-Mart’s Supply Chain Management Practices. Retrieved from
http://mohanchandran.files.wordpress.com/2008/01/wal-mart.pdf
Dougherty, C. (2006). Introduction to Econometrics, 3rd Edition, New York: Oxford University Press.
Journal of Management Systems, Vol. 24, Number 3, 2014
Seungjae Shin, Jack E. Tucci & Dustin Odom
29
Emiliani, B., Stec, D., Grasso, L., & Stodder, J. (2007). Better thinking, better results: Case study
and analysis of an enterprise-wide lean transformation, 2nd Edition. Kensington, Conn: Center for
Lean Business Management.
Freeman, R. B., Nakamura, A. O, Nakamura, L. I., Prud’homme, M, & Pyman, A. (2011). Wal-Mart
Innovation and Productivity: A Viewpoint. Canadian Journal of Economics, 44(2), 486-508.
Gill, P. & Abend, J. (1997). Wal-Mart: The Supply Chain Heavyweight Champ. Supply Chain
Management Review, 1(1), 8-16.
Glaser-Segura, D. A., Jack E. T., & Anghel, L. D. (2006). Supply Chain Management and the
Romanian Transition. The AMFITEATRU ECONOMIC Journal, Academy of Economic Studies Bucharest, Romania, 8(19), 18-26.
Horngren, C. T., Datar, S. M., Rajan, M. (2011). Cost Accounting: A Managerial Emphasis. Upper
Saddle River, NJ: Pearson Prentice Hall.
Hsieh, C., H. Prudilova, and L. Binshan, (2010). Radio Frequency Identification Systems at
Universities: Current Status and Future Applications. Proceeding of 2010 Southwest Decision
Sciences Institute Conference. Dallas, TX.
Hunt, D., Puglia, A. and Puglia, M. (2007). RFID – A Guide to Radio Frequency Identification,
Hoboken, New Jersey: John Wiley & Sons, Inc.
Mark, K. (2012). Half a Century of Supply Chain Management at Wal-Mart. Harvard Business
School Press, 9B12D010.
Qu, T., Luo, H., Cao, N., Fang, J., Zhong, R. Y., Pang, A.L.Y., Qiu, X, & Huang, G. Q. (2012). RFIDEnabled Just-In-Time Logistics Management System for “SHIP” – Supply Hub in Industrial Park.
Proceeding of 42nd International conference on Computer and Industrial Engineering, Cape Town,
South Africa.
Shin, S. & Ekisoglu, B. (2014). Effects of RFID Technology on Efficiency and Profitability in Retail
Supply Chains. Journal of Applied Business Research, 30(3), 633-645.
Visich, J. K., Li, S., Khumawala, B. M., & Reyes, P. M. (2009). Empirical Evidence of RFID Impacts
on Supply Chain Performance. International Journal of Operations and Production Management,
29(12), 1290-1315.
Weier, M. H. (2008). Wal-Mart Gets Tough On RFID. Retrieved from http://www.informationweek.com/walmart-gets-tough-on-rfid/205900561
Author Biography
Seungjae Shin received a Ph.D. in information sciences (2003) at the University of Pittsburgh
and a Ph.D. in Industrial and Systems Engineering (2013) at Mississippi State University. He is
currently an Associate Professor of Information Systems and Supply Chain Management at Mississippi
State University, Meridian. His research areas are telecommunications industry analysis and supply
chain management.
Journal of Management Systems, Vol. 24, Number 3, 2014
30
Wal-Mart’s Leadership in Retail Supply Chain
Jack Tucci received his Ph.D. in 1996 from the Department of Management at the University of
North Texas. He is currently William M. Lemley Chair Professor of Management and Marketing at
Arkansas Tech University. His research efforts are focused on sustainable strategic management.
Dustin Odom received a Master of Business Administration (2011) at Mississippi State
University. He is currently a Counselor for the Mississippi State University-Small Business
Development Center and also an Adjunct Lecturer of Marketing for Mississippi State University,
Meridian.
Journal of Management Systems, Vol. 24, Number 3, 2014
31
Journal
J
of Managgement Syystems
ISSN #104 1-2808
A Publiccation of the Assocciation off Manageement
____________
__________
___________
__________
__________________________________________________ BALANCING IN
NNOVATION AND OPERAT
TIONS: OP
PPORTUN
NITIES AND
CHA
ALLENGES
S OF SEC
COND GE
ENERATIO
ON ENTE
ERPRISE MOBILIT
TY
Sabin
ne Berghaus
s, University
y of St.Gallen
n, St. Gallen
n, Switzerlan
nd
Thomas Sa
ammer, Nam
mics AG, St. Gallen, Swittzerland
Hans Bre
echbühl, Tuc
ck School of Business att Dartmouth College, Ha
anover, New
w Hampshire, USA
Andrea Back, University
U
off St.Gallen, S
St. Gallen, S
Switzerland
AB
BSTRACT
A new generration of mob
bile IT is driv
ving new thin
nking and in
nnovation in most areas of organizattions and
iss challenging corporate IT. From a “computing”” perspective
e, this secon
nd-generatio
on enterprise
e mobility
((SGEM), su
uch as sma
artphones and
a
media tablets, ena
ables perva
asiveness, m
much more intuitive
ccomputing, and
a
contexttual intelligence. This changes
c
wha
at can be d
done with IT
T in enterprrises and
ccreates new
w challenges
s for IT dep
partments. Based
B
on th
hree group iinterviews a
and twelve individual
interviews including data
a from 31 co
orporations, we explore how corpora
ations are re
esponding to
o SGEM.
B
Based on th
his data, we
e derive thre
ee opportuniities and fou
ur challenge
es. The syn
nthesis of the results
rreveals that SGEM has
s changed employee
e
ex
xpectations for professional IT and
d led to fund
damental
isssues conce
erning the ro
ole and objec
ctives of corrporate IT de
epartments. The results contribute tto a more
h
holistic picture of corporrate usage of
o SGEM and illustrate h
how the new
w perception
n of IT is challenging
ccommon pra
actice.
K
Keywords:
Corporate
e IT, Mobile
e Computing
g, Enterprisse Mobility, Enterprise Mobile, Ro
ole of IT,
Smartpho
one, Tablet Computer
C
INTR
RODUCTIO N
T
Today, corpo
orations face
e unceasing and increas
singly rapid IT innovatio
on, which cha
allenges in p
particular
the IT deparrtments of la
arge organizations. Mob
bile IT has be
een introducced in organ
nizations (Bu
uckellew,
C
Custis, Espo
osito, & Less
ser, 2013; Gartner,
G
2013
3) and mean
nwhile it is sseen as the logical exte
ension for
b
business serrvices (Frostt & Sullivan,, 2014a), wh
hich encomp
passes all kiinds of highly portable ccomputer
d
devices, suc
ch as tablett computer or smartphones, but a
also wearab
ble devices, which acco
ording to
G
Gartner will drive 50 % of app in
nteractions by 2017 (G
Gartner, 201
14a). Starti ng with rem
markable




A
An earlier version of this papeer has previoussly been publishhed in the Procceedings of thee Nineteenth A
Americas Confeerence on
Innformation Sysstems (Sammeer, Brechbühl, & Back, 2013).
Journal off Managementt Systems, Vool. 24, Numbeer 3, 2014
32
Balancing Innovation and Operations: Opportunities and Challenges of Second Generation Enterprise Mobility
improvements in the hardware capabilities of these devices, mobile IT affects all layers of digital
technology – including the content, service, network and device layer (Yoo, Henfridsson, & Lyytinen,
2010) – by enabling various innovations and technological changes (Yoo, 2010). These changes are
substantial. In the content layer, mobile IT now offers more capabilities than ever for storing and
consuming any kind of multimedia content. This is evidenced mobile traffic making up for 40 % of
YouTube’s total traffic (YouTube, 2014), or the fact that 60 million photos are uploaded every day on
the mobile-only platform Instagram (Instagram, 2014). Remarkable improvements are also evident in
the service layer, as mobile IT now offers an extensive range of application functionality that serves the
user for almost any propose. Facts concerning applications for mobile devices are testimony to this: For
example, Statista reports a total of 75 billion app downloads from the Apple app store between June
2008 and October 2014 (Statista, 2014a) and forecasts 268 billion app downloads by 2017 in total
(Statista, 2014b). Also, Gartner forecasted that mobile apps will have a significant impact on
information infrastructure (Gartner, 2014b). The network layer, so far one of the mayor limitations of
mobile IT, has also made remarkable improvements; wireless high-speed internet access is now
available in most areas of the world and for 2014, the International Telecommunication Union reported
2.3 billion active mobile broadband subscriptions worldwide, with 55 % of them in developing countries
(ITU, 2014). This opens up new market opportunities, as in many parts of the world – especially in
emerging markets – mobile IT is often the only available technology that supports Internet access. And
finally, innovation is also not stagnant on the device layer: There is a growing number of new kinds of
devices which offer intuitive and mostly restriction-free access to services and content with an everincreasing quality and functionality, coupled with decreasing prices for such devices (Harris, Ives, &
Junglas, 2012; L. Pitt, Berthon, & Robson, 2011). These changes are evident and fundamental. In the
context of corporate IT, we therefore label this new generation as second-generation enterprise mobility
(SGEM), which is the focus of our study.
Such wide-reaching technological developments influence organizations (Gillespie, 2007; Klein & Sorra,
1996; Rogers, 2003) and create a need for corporations to respond effectively to these changes and to
exploit the emerging opportunities (Berghaus & Back, 2014). Unlike previous technological innovations,
SGEM is entering organizations faster and more invasively due to the introduction of personal
consumer electronics to the workplace (Harris et al., 2012; Ortbach, Brockmann, & Stieglitz, 2014).
Concerning this challenge of responding to SGEM, research can improve the adoption process of
SGEM by acting as a facilitator for knowledge transfer and support practice by deriving insights from
empirical studies. From an academic perspective, such issues are also valuable and contribute new
insights from the latest industry practice to academic discourse. We therefore adopt an explorative
research approach and examine, on a large scale, how corporations are actually reacting to SGEM by
summarizing opportunities and challenges derived from industry practice. Based on three expert group
interviews with CIOs, and an additional twelve interviews with C-Levels from multinational corporations,
we consider the following research question related to corporate IT: What opportunities and challenges
do IT departments in corporations experience with SGEM?
The remainder of the paper is organized as follows. Section 2 gives an introduction to the theory by
defining SGEM. Section 3 discusses the methodological approach and describes the sample. Section 4
reports on the results and describes the identified opportunities and challenges. Section 5 discusses
the results and implications for theory and practice, as well as the limitations of the study.
THEORETICAL BACKGROUND
So far, mobile IT has been defined by the distinction between portable and non-portable computer
devices (Kristoffersen & Ljungberg, 1999). This definition is sufficient for the first generation of mobile
IT innovation witnessed in the early 2000s, but nowadays the portability of computer devices is only
Journal of Management Systems, Vol. 24, Number 3, 2014
Sabine Berghaus, Thomas Sammer, Hans Brechbühl & Andrea Back
33
one aspect that sets mobile IT apart from conventional IT. The features of mobile IT now include
additional aspects such as improved human-computer interaction, data visualization methods, usability
and a remarkable market penetration, which offers corporations a new communication and distribution
channel for products and services (L. Pitt et al., 2011; Stieglitz & Brockmann, 2012). We use the term
SGEM to refer to this new generation of mobile IT and its usage in the context of corporate IT.
To frame the research, we define SGEM by three characteristics which we derive from the theory of
ubiquitous computing (Lyytinen et al., 2004; Weiser, Gold, & Brown, 1999; Weiser, 1991). One aspect
of ubiquitous computing is a superior usability and an intuitive human-computer interaction. This is
evident for SGEM, as the intuitiveness relating to such devices has increased to a level at which even
people who are generally uncomfortable with computers are able to interact with media tablets without
prior training. If we compare this kind of usability and intuitive usage with PDAs or tablet computers
from the early 2000s, the distinction becomes clear (L. Pitt et al., 2011). This increased usability
enables also a better integration into the context, providing computer support in situations where
computers had before been perceived as distracting and inappropriate (such as in a sales talk or
counseling interview). We call this intuitive computing.
A second characteristic is the market penetration of such devices. These new devices are a market
success – especially compared with their predecessors – and have reached such a high diffusion rate
that they are now pretty much available to anyone. Along with the market penetration, the portability of
the devices has also increased and led to a situation where SGEM is with us anywhere, and anytime
(Harris et al., 2012). These developments led to a new dimension of connectivity (Dery & MacCormick,
2012), which we call pervasiveness.
Another distinction can be made in terms of the functionality of the hardware (Jonsson, Holmström,
Lyytinen, & Nilsson, 2010; L. F. Pitt, Parent, Junglas, Chan, & Spyropoulou, 2010). SGEM devices
possess a range of sensors that enable contextual intelligence (the devices relate to their environment,
like context-aware applications, automated capture or sensitive and responsive computer
environments). This aspect of ubiquitous computing is frequently mentioned by various different authors
(Begole, 2011; Jonsson, Westergren, & Holmström, 2008) and termed contextual intelligence.
Contextual intelligence can also be counted to one characteristic of the Internet of Things, based on the
concept that everyday objects can be connected anytime, anyplace with anything (Frost & Sullivan,
2014b).
By comparing these characteristics with devices that corporations recognize as the driving force of
mobile IT innovation (Harris et al., 2012), namely novel smartphones, such as the iPhone or Android
devices, and media tablets, such as the iPad or certain Android tablets, it can be recognized that these
devices conform well to the characteristics of ubiquitous computing:
1. Intuitive computing: Mobile IT devices support an intuitive and accessible computing experience.
These devices can be seamlessly integrated into a conversation and enhance, it rather than
detract from it.
2. Pervasiveness: Mobile IT devices are highly portable, allow continuous connectivity – and thus
a constant data and application consistency, and are available to pretty much anyone,
anywhere, and anytime. This not only leads to a better reachability of existing customers, but
also to the possibility to reach new customers (e.g. in emerging markets).
3. Contextual intelligence: Mobile IT devices can interact with and react to the environment, due to
sensory input such as location, acceleration, light conditions, user identification and so forth.
Journal of Management Systems, Vol. 24, Number 3, 2014
34
Balancing Innovation and Operations: Opportunities and Challenges of Second Generation Enterprise Mobility
We use these three characteristics to define SGEM. These three characteristics also set the scope of
the research, as the article covers only technology that conforms to all of these three characteristics
(such as smartphones and media tablets). However, the characteristics defined can also be applied to
newer technologies, such as wearable technology or connected objects and machines, subsumed in
the term “Internet of Things”. This shows that our definition of SGEM is also sound for the next
generation of technology to be implemented in organizations.
Regarding the research question, we further need to define the terms “opportunity” and “challenge”.
Opportunities refer to fields of application where the adoption of SGEM leads to a relative business
advantage compared to other solutions (Porter & Millar, 1985). In this process of gaining a relative
business advantage due to technology adoption, the objective is to replace existing systems with a
superior one. Such adoption processes are always challenging for organizations (Rogers, 2003).
However, regardless of whether a corporation exploits such opportunities, technological innovation is
an external influence that is inevitably challenging (Gillespie, 2007; Klein & Sorra, 1996; Rogers, 2003).
We therefore define a challenge as a need for a change in approach or action, created by the
emergence of SGEM.
METHOD
In particular with mobile technology it becomes increasingly difficult to separate digital products and
services from technology. Our research therefore follows a socio-materialistic approach (Leonardi,
2012; Orlikowski, 2009) to gain a complete view of the challenges and opportunities associated with
SGEM. As opposed to the understanding of technology as “exogenous force” our definition SGEM does
not see technology as an autonomous impact, but is interconnected with humans in an institutional
context (Orlikowski, 2009). By following this approach, we ensure gaining a complete view and
preventing a blind spot due to focusing exclusively on technology issues. Therefore, we decided to use
qualitative data to capture “the voice” of the participants and conducted three expert group interviews
and twelve telephone interviews. While the individual interviews followed a very structured approach,
the expert group interviews were conducted as moderated roundtable discussions to foster an
exchange of experiences. By combining these two approaches we ensured to capture issues that
would maybe not have been revealed by a too stringent and structured approach. Concerning the
participants, we invited only CIOs or officers in charge of mobility solutions as we assume that they
have a complete view of the challenges and opportunities the associated organization experiences with
SGEM. To have a comparable sample, the study focuses on large corporations and we therefore
gathered data from 31 multinational corporations with more than one million dollars in revenue and
more than three thousand employees. All corporations in the sample are from a variety of industries
that operate globally. The sample includes organizations from the following industries: financial services
(26 %), logistics (13 %), IT (13 %), food (13 %), heavy industry (13 %), manufacturing (10 %),
electronic industry (6 %), and others (6 %). The three expert group interviews were held in 2012 and
attended by CIOs from multinational corporations in Europe and the US. The interviews were
moderated roundtable discussions and lasted five to six hours. For the analysis, the discussions were
audio-recorded and then transcribed.
In addition, we conducted twelve interviews with CIOs or officers in charge of mobility solutions of
multinational corporations from Germany, Austria and Switzerland that employ SGEM devices in
different areas of their corporation. The data collection primarily comprised in-depth telephone
interviews conducted in 2011 (June-December). The interviews lasted an average of about 100 minutes
and were audio-recorded and transcribed. We followed a semi-structured questionnaire that covered
the following areas with respect to the solutions of interest: strategic reasons, benefits of the solution,
organizational issues, and strategic and technological challenges. The analysis followed the approach
recommended by Miles and Huberman for qualitative content analysis (Miles, Huberman, & Saldaña,
Journal of Management Systems, Vol. 24, Number 3, 2014
Sabine Berghaus, Thomas Sammer, Hans Brechbühl & Andrea Back
35
2014). Based on the transcripts, two of the authors independently identified issues that the corporations
in the sample are experiencing with SGEM. The issues had to apply to the definition of SGEM given in
the previous section. After collecting material on the issues, the authors independently categorized
them into two categories: opportunities and challenges for corporate IT. In a series of three workshops,
the authors jointly synthesized and categorized the data, yielding three opportunities and four
challenges.
RESULTS
In this section, we describe the opportunities and challenges identified in the course of the analysis.
Empirical evidence is presented as direct quotations on a given issue. We identified three generic
opportunities concerning sales, service, and internal efficiency and four challenges for corporate IT,
including the usability vs. security challenge, innovation management, software development style, and
staffing.
Opportunities
In general, all organizations in our sample reported at least one benefit they experience with SGEM. In
the following section, we describe three generic opportunities which we derived from our data. These
opportunities are likely to apply to any industry and any organization.
Sales
Several corporations report that the integration of SGEM into sales activities created value for them.
Common examples are media tablet solutions that introduce computer-support to face-to-face
conversations. In conversations, media tablets are experienced as an appropriate device for enabling
computer support, in contrast to common IT devices, such as laptops or desktop computers. One
company reports that so far, they had a guideline for their field staff not to use laptop computers in
interviews or talks, as they create a barrier between them and the client:
“Why tablets? We have this guideline for our consultants, which says that it is not ideal to use a
laptop. If you open the laptop it creates a psychological wall between the consultant and the
client.” (Head of Sales, Swiss banking company)
However, computers can support such activities with additional information or the possibility to visualize
different outcome scenarios. Through using media tablets, corporations can overcome these limitations
and use software applications to support their staff in such activities. For example, the sales and
consulting personnel of a bank uses a media tablet solution to communicate their offers to clients.
These offers are complex and highly customizable financial services, which are intangible and hard to
communicate to clients. Media tablets are now used during the client meetings and the service can be
customized to the customer’s needs with results depicted onscreen. In addition, SGEM offers
organizations an additional communication channel. For example, the Eaton Corporation now offers
resellers and end-customers a media tablet application that gives them full access to the extensive
product portfolio of the company, and support for cross references for some thousand specific technical
elements. Before, this was only possible for associated consulting experts. However, due to the
possibility of providing enhanced users-services for SGEM, this service now is publically available. By
opening up this comprehensive database to customers and making it available in a user-friendly and
intuitive way, the corporation achieved additional purchases:
“Imagine a pump that goes in a John Deere tractor, or a Boeing 737. It has all kinds of
configurations. […] We search them in the app and boom! ‘This is the pump you need,’ from
Journal of Management Systems, Vol. 24, Number 3, 2014
36
Balancing Innovation and Operations: Opportunities and Challenges of Second Generation Enterprise Mobility
thousands of different types of pumps. And we’ve made it before. We make it at this plant, and
the lead time is this. Here’s the engineering drawing. Here’s the data that goes with it in an email. Now the customer embeds it into his system. He sees it. ‘I can use that.’ This cycle time
used to take weeks, and we’ve shrunk it down to a couple of hours. We had an engineer in a
design session do a product cross-reference right there, and he made a $470,000 initial sales
deal. It would have never happened without the app.” (CIO, Industrial Sector – IT, Eaton
Corporation)
Service
The pervasiveness and intuitiveness of SGEM has also led to additional customer self-service options.
Due to the increased pervasiveness of SGEM, new opportunities for self-service processes are enabled.
One example is the application provided by an insurance company that allows clients to report claim
cases (e.g. car accidents). The client is guided through the claim report process and additional
information, such as photos and location, are added to the report. The report is then submitted
electronically via the application. In addition, the application provides clients with safety instructions and
other useful information in accident cases. The process is digitalized and no paperwork is needed.
Thus, service availability is increased and the insurance company achieves an increased information
quality for the claim evaluation process. These novel self-service options that SGEM enable are of
particular interest for insurance companies:
“In 5 to 10 years, when the technology is further improved, we will have the opportunity to
provide our customers with an App which will enable them to scan their home and automatically
receive a customized offer.” (Director, Swiss insurance company)
Mobile applications are also employed to outsource a complete process to the customer. Airlines, for
example, now provide customers with applications allowing them to search for flight offers, book flights,
make mobile check-ins with seat reservation, and save the boarding pass on their mobile device. Such
self-service options for clients reduce paperwork, decrease points of contact, and save time for
customers, as they no longer have to queue at a counter.
Internal Efficiency
Pervasiveness is also capitalized in tasks that require employees to travel. Such tasks can be
effectively supported and enhanced with additional information offered by SGEM devices. Standard
corporate approval processes for employee requests are simpler, quicker, and more efficient. Business
cases of even higher impact include advanced computer-support for activities at construction sites, for
inspections of industrial facilities, for job navigation or stock-updates in rural areas. For example, media
tablet usage created efficiency gains on the construction site of an airport in Qatar:
“It’s a huge open space. We put in our own Wi-Fi throughout the construction site, and launched
an iPad-based inspection app for the people in the field. We measured a 3- to 5-fold gain on
daily productivity for people who had the app.” (CIO, Bechtel Corporation)
A comparable example can be given for the inspection of industrial facilities:
“We program operators’ routine duties into their mobile devices, including checklists for
procedures. Every procedure in our complex facilities has to be done exactly right. We saw work
force productivity go up by a factor of two, but for us the greater benefit is the assurance that
our procedures are done right, to make sure we don’t have a catastrophic failure.” (CIO,
Chevron Global Upstream)
Journal of Management Systems, Vol. 24, Number 3, 2014
Sabine Berghaus, Thomas Sammer, Hans Brechbühl & Andrea Back
37
Other benefits include increased information quality about the inventory of stores in rural areas, for
example the solution used by Holcim’s India sales force:
“Every day they go to the dealer, and they enter into their phones how many bags of cement are
there, from us and from our competitors, as well as the respective prices. The data get sent
centrally for analysis. And our margin has gone up 10 %, because we have the relevant market
intelligence by knowing the development of volume and price.” (CIO, Holcim)
Challenges For Corporate IT
Along with the benefits and possibilities of SGEM, corporations also experience challenges that call for
new approaches to address and benefit from the emergence of this new technological generation.
Usability vs. Security Challenges
SGEM have reached almost everyone, regardless of demographics. This means that when SGEM
devices are not supported or allowed at work, people will enjoy using them anyway in their personal
lives. The convenience of applications used in private lives therefore creates expectations for
professional applications. Hence, experiences with IT in personal life also form the reference point for
experiences with IT in work life (Ip, 2010). CIOs experience this as a spill-over effect between
professional and private life and perceive this as challenging:
“The trend is really coming from consumer IT—people do something at home, then they bring it
to work, and they bring expectations of what it should be.” (CIO, Holcim)
This conforms to the spill-over theory which predicts that experiences in personal or family life positively
or negatively spill-over to work life and vice versa (Grzywacz & Marks, 1999). Employees expect
corporate IT applications to be as convenient as the consumer applications they use in their spare time:
“There is an expectation that it should be just as easy for people to access and use corporate
information from a mobile device as it is for them in their personal lives.” (CIO, Eastman
Chemical Company)
But achieving comparable usability is only one aspect. Corporations often experience usability as a
trade-off with security. Hence, CIOs face the challenge of balancing productivity, ease-of-use, and
security:
“[…] as a corporate entity, we value our intellectual property, […] we try to balance this dynamic
between productivity and security.” (CIO, Eastman Chemical Company)
The core challenge is to ensure data security and to define appropriate policies while exploiting the
usability of consumer applications. IT departments therefore have to achieve both objectives: increased
usability and ensured security. While several corporations report that they already integrate SGEM
devices into the corporate IT infrastructure, issues remain in reconsidering existing and introducing new
policies and governance models. These polices and models are needed to ensure a secure and stable
operation, while adapting existing and prospective software applications to a competitive level of
usability.
Journal of Management Systems, Vol. 24, Number 3, 2014
38
Balancing Innovation and Operations: Opportunities and Challenges of Second Generation Enterprise Mobility
Innovation Management
These competing demands of usability and security have led to a situation where IT departments are
viewed as an obstacle to innovation:
“Sometimes we were our own worst enemy, because all we started with was ‘No’ with respect to
security every time anybody talked to us. They got tired of it and started finding other ways to go
about it.” (CIO, Bechtel)
But innovation enabled by SGEM occurs in nearly all parts of organizations. The different departments
strive to employ these devices and often start projects independently from one another. Executives
describe this as a quite unstructured and unorganized process with implications for long-term
operability. The challenge for IT departments is to manage these projects and ensure a certain level of
credibility as a facilitator for innovation:
“In talking with our customers, we find that frequently IT is not in the discussion relative to app
development, mobile or social applications. These are being developed in the business units,
with some third party. Often they’re coming out of the marketing department working with media
firms who have gone into the IT space. What’s concerning is, ‘Are these groups taking
responsibility for the operations, and ensuring that this is all going to work and be secure?’ And
the answer is usually not.” (VP of Strategy and Product Line Management, CompuWare)
This requires a change in how IT departments interact with the business units. The challenge for
corporate IT is therefore to manage these innovation projects and bundle the efforts without slowing
down the process:
“[…] we’re trying to push IT people into the business units, because when you are stuck in the
back office, you can’t know everything about what the company is doing. You’ll be missing the
innovation engine, which is the most important part, and which we believe will come from the
business, not from IT.” (CIO, Nestlé)
Software Development Style
To satisfy the expectations of the business units, IT departments see themselves also challenged by a
new paradigm of software development. While conventional software development often takes a
waterfall approach and adheres to rigid plans, application development for SGEM is agile, relies on
flexible, iterative planning cycles, and focuses on delivering working software frequently (Dingsøyr,
Nerur, Balijepally, & Moe, 2012; Fowler & Highsmith, 2001). This has led to a situation where corporate
IT finds itself in competition with third party software developers from the consumer application market,
also because corporate IT often needs to comply with internal process regulations. This challenge is,
for example, manifested in the approach of some IT departments to establish a second track for
software development:
“We set up our own mobile application development organization to compete with the third
parties that the business units go to. We’re saying, ‘Let us be one of those. Let us compete for
the same business, but on their terms, not as an IT group. If you need it in three weeks, we will
have it to you in three weeks. We scrapped our old development methodologies because
they’re just too big and too cumbersome and take too long.” (CIO, Bechtel)
Journal of Management Systems, Vol. 24, Number 3, 2014
Sabine Berghaus, Thomas Sammer, Hans Brechbühl & Andrea Back
39
Staffing
Adapting to these new expectations on usability and software development cycles also creates staffing
problems. The challenge is that usually the right talent is still absent within IT. This starts with the right
skill-set to develop user-friendly applications:
“[To develop a] total[ly] different UI, that is totally intuitive to our employee, […] a whole different
skill-set for IT [is needed]. So you have to really take a step back and say, […] Intuitiveness is a
very important component, and the UI may not be the same on your mobile devices.” (CIO,
Time Warner Cable)
In addition, IT employees not only need an understanding of IT, but also of the business activities IT
should support. CIOs realized this challenge and recognize that they have to redefine their role profiles:
“We hire folks that fit very well into an ERP organization. ERP is important, but it’s not what
differentiates performance for us. So after looking at that, we’re hiring dual-degree people who
can apply technology to the business problems we’re facing. We have a large IT organization
that’s perfectly suited for the problems we’ve had over the last decade. But when you look at the
problems we’re going to have in the next decade, we don’t have the skills that we need.” (CIO,
Chevron Global Upstream)
IMPLICATIONS AND DISCUSSION
The results reveal that SGEM creates several opportunities for corporations to achieve relative
advantages. However, to obtain such advantages, corporations face a series of challenges. Even when
corporations are not exploiting these opportunities, SGEM creates additional needs to respond, as
these new technologies are so invasive that they change the perception of what IT should look like and
what to expect from an application. This is evident from the sample data and also supported by a recent
study (Harris et al., 2012), which showed that employees and business units are not satisfied anymore
with the established standards in professional computing. This section will present some implications
for organizations that become evident from our findings.
Prepare for increasing ubiquity
With the technological development ongoing, it becomes even more substantial for IT departments and
business units to collaborate. There are predictions that by 2020 a possible 50 billion devices will be
connected – from conveyor belts and machine parts to automobiles and wearable devices. The
“Internet of Everything” has been named one of the top technology trends in 2014 by Gartner (Gartner,
2013). This means for companies that currently embedded IT structures inevitably will become
ubiquitous and mobile devices will make use of sensor technologies and context awareness to provide
information (Aarts & Encarnação, 2006). Corporate IT departments will need to provide the appropriate
technological infrastructure, but also take changing behavior in human-computer interaction into
account. While the advent of ubiquitous computing might increase productivity on the one hand, it also
raises security and privacy issues, that companies will have to prepare for (Amoroso, 2013; Fleisch &
Tellkamp, 2006; Friedewald & Raabe, 2011).
Enabling innovations
Our findings show that while SGEM offers some promising opportunities for organizations it can cause
a range of challenges for IT departments, which are expected to ensure efficient operations, but also to
support the business units in a more dynamic and innovative way to facilitate their projects and
Journal of Management Systems, Vol. 24, Number 3, 2014
40
Balancing Innovation and Operations: Opportunities and Challenges of Second Generation Enterprise Mobility
activities. These objectives are perceived as competing, and most IT departments focus on
operations, not on innovation. This need for a balanced role of IT departments, of being on the one
hand operational and on the other hand, innovation-focused is also evident in initial approaches to
overcoming the new challenges created by SGEM. For example, one approach is the definition of core
services where operations are ensured, and a flexible boundary where innovation is facilitated.
Through this approach, the IT department maintains core services and grants access to additional
services. This is also supported by a recent study (Drnevich & Croson, 2013) that argues that IT both
enhances current capabilities and enables new capabilities and therefore is required be critical to an
organization’s business level strategy.
Adopting a new role for IT in organizations also has managerial implications. We believe that IT
departments need to be aware that ensuring operations alone will not satisfy the organization’s needs
for IT in the future. We recommend considering a new strategic positioning of IT departments to fulfill
both roles, ensuring operations and facilitating innovation. This will require new capabilities in IT
departments, demanding a broader business understanding and sometimes hiring new people. Since
technology is an important enabler of business success it should be seen as an essential part of an
overall digital strategy.
Toward a digital business strategy
Therefore, these new expectations of IT require IT departments to restructure and rethink the existing
approaches and role of IT within the organization. In the academic literature, this issue is part of the
research stream on IT alignment (Oh & Pinsonneault, 2007), but the objective of IT alignment is limited
to aligning IT objectives with the business objectives of the organization. However, in the past it has
often been the case that business strategy has directed IT strategy, while recent studies stress the
importance of a common and pro-active digital strategy (Bharadwaj, El Sawy, Pavlou, & Venkatraman,
2013; Mithas, Tafti, & Mitchell, 2013). Our results suggest that SGEM requires IT alignment to go even
further than just aligning the objectives. IT departments are now required to collaborate much more
closely with business units and not only aligning the objectives, but go further and be a part of the
business objectives.
This also challenges the established typologies of IS strategies, like that of Chen et al. (Chen, Mocker,
Preston, & Teubner, 2010), which suggests that an organization’s IS strategy falls into one of three
categories: IS innovator, IS conservative, or is simply undefined. Reflecting on the results, we suggest
that successful IS strategies require balancing the two extremes of IS innovator and IS conservative
and adopting both objectives. Going forward this perspective might also develop further. With IT
departments and business departments having to collaborate more closely, we argue that it will be
necessary to develop a common digital business strategy. This has also been confirmed by the work of
(Bharadwaj et al., 2013), who argue that IT strategy should not be subordinate to or even separate from
business strategy, but to merge both into a digital business strategy, which extends its scope beyond
traditional boundaries and covers digitization of products and services and the information around them
as well as transcends current functional and process silos.
CONCLUSION
In this research we have explored the opportunities and challenges that mobile technology creates for
corporate IT departments. We conducted three expert group interviews and twelve interviews with CLevel executives from multinational corporations. The findings suggest that SGEM on the one hand has
great potential to enhance business success in sales, service and internal efficiency, but on the other
hand creates challenges for corporate IT in innovation management, software development style,
staffing and balancing usability and security. We argue that IT departments need to prepare to not only
Journal of Management Systems, Vol. 24, Number 3, 2014
Sabine Berghaus, Thomas Sammer, Hans Brechbühl & Andrea Back
41
ensure operations but see themselves as enabler of innovations. This will be even more essential in the
future when devices become increasingly connected. In addition to this organizations should not see IT
objectives as subordinate to business objectives but merge both into a common digital business
strategy.
However, this study is subject to several limitations. As we follow an explorative approach, we do not
test for any relationships or causalities. The work contributes to existing theories on IT strategy, but still
needs further empirical validation. Beyond the gathered qualitative data, we recommend that future
research collect quantitative data too and apply a longitudinal research approach. Nevertheless we
think that our results provide valuable insights into the challenges and opportunities of enterprise
mobility for practitioners as well as for researchers.
References
Aarts, E. & Encarnação, J. (2006). Into Ambient Intelligence. In: E. Aarts & J. Encarnação (Eds.),
True Visions. The Emergence of Ambient Intelligence, pp.1-16. Springer Berlin Heidelberg.
Amoroso, E. G. (2013). From the enterprise perimeter to a mobility-enabled secure cloud. IEEE
Security & Privacy, 11(1), 23-31.
Begole, B. (2011). Ubiquitous computing for business: Find new markets, create better businesses
and reach customers around the world 24-7-365. New Jersey: Ft Press.
Berghaus, S. & Back, A. (2014). Adoption of Mobile Business Solutions and its Impact on
Organizational Stakeholders. BLED 2014 Proceedings, Paper 8.
Bharadwaj, A., El Sawy, O. A., Pavlou, P. A., & Venkatraman, N. (2013). Digital Business Strategy:
Toward a Next Generation of Insights. MIS Quarterly, 37(2), 471-482.
Buckellew, P., Custis, K., Esposito, R., & Lesser, E. (2013). The “upwardly mobile” enterprise:
Setting the strategic agenda, pp. 1-24. Somers, NY. Retrieved from http://public.dhe.ibm.com/
common/ssi/ecm/en/gbe03574usen/GBE03574USEN.PDF.
Chen, D. Q., Mocker, M., Preston, D. S., & Teubner, A. (2010). Information Systems Strategy:
Reconceptualization, Measurement, and Implications. MIS Quarterly. 34(2), 233-259.
Dery, K., & MacCormick, J. (2012). Managing Mobile Technology: The Shift from Mobility to
Connectivity. MIS Quarterly Executive, 11(4), 159-173.
Dingsøyr, T., Nerur, S., Balijepally, V., & Moe, N. B. (2012). A decade of agile methodologies:
Towards explaining agile software development. Journal of Systems and Software, 85(6), 12131221.
Drnevich, P. L. & Croson, D. C. (2013). Information Technology and Business-Level Strategy:
Toward an Integrated Theoretical Perspective. MIS Quarterly, 37(2), 483-509.
Fleisch, E., & Tellkamp, C. (2006). The Business Value of Ubiquitous Computing. In: G. Roussos
(Ed.), Ubiquitous and Pervasive Commerce, pp. 93-113.
Fowler, M., & Highsmith, J. (2001). The agile manifesto. Software Development, 9(8), 28-35.
Journal of Management Systems, Vol. 24, Number 3, 2014
42
Balancing Innovation and Operations: Opportunities and Challenges of Second Generation Enterprise Mobility
Friedewald, M. & Raabe, O. (2011). Ubiquitous computing: An overview of technology impacts.
Telematics and Informatics, 28(2), 55-65.
Frost & Sullivan. (2014a). Next Generation Enterprise Mobility Management Market Insight: From
Devices, to Content and Applications Management. Retrieved from http://www.frost.com/sublib/displayreport.do?id=9838-00-7C-00-00.
Frost & Sullivan. (2014b). Top Technologies in Information and Communication Technologies —
2014 (Technical Insights): Game Changing ICT Technologies (Vol. 2014). Retrieved from
http://www.frost.com/prod/servlet/ti-services-reports.pag.
Gartner. (2013). Press Release: Gartner identifies the top 10 strategic technology trends for 2014.
Retrieved from http://www.gartner.com/newsroom/id/2603623.
Gartner. (2014a). Press Release: Gartner Says by 2017, Mobile Users Will Provide Personalized
Data Streams to More Than 100 Apps and Services Every Day. Retrieved June 19, 2014, from
https://www.gartner.com/newsroom/id/2654115.
Gartner. (2014b). Press Release: Gartner Says Mobile Apps Will Have a Significant Impact on
Information Infrastructure. Retrieved June 19, 2014, from http://www.gartner.com/newsroom/id/2764317.
Gillespie, A. (2007). PESTEL analysis of the macro-environment. Foundations of Economic, Oxford
University Press, USA.
Grzywacz, J. G., & Marks, N. F. (1999). Reconceptualizing the work-family interface: An ecological
perspective on the correlates of positive and negative spillover between work and family. Journal of
Occupational Health Psychology, 5(1), 111-126.
Harris, J., Ives, B., & Junglas, I. (2012). IT consumerization: when gadgets turn into enterprise IT
tools. MIS Quarterly Executive, 11(3), 99–112.
Instagram. (2014). Instagram Press Stats. Retrieved June 19, 2014, from http://instagram.com/press.
Ip, K. F. R. (2010). Use of Social Software in Personal and Organizational Settings—An Exploratory
Study into the Use of Instant Messaging in the Banking Industry. City University of Hong Kong.
ITU. (2014). The World in 2014. ICT Facts and Figures, pp.1-8. Geneva. Retrieved from
http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2014-e.pdf
Jonsson, K., Holmström, J., Lyytinen, K., & Nilsson, A. (2010). Desituating Context in Ubiquitous
Computing. International Journal of Actor-Network Theory and Technological Innovation, 2(3), 4055.
Jonsson, K., Westergren, U. H., & Holmström, J. (2008). Technologies for value creation: an
exploration of remote diagnostics systems in the manufacturing industry. Information Systems
Journal, 18(3), 227-245.
Klein, K. J., & Sorra, J. S. (1996). The Challenge of Innovation Implementation. Academy of
Management Review, 21(4), 1055-1080.
Journal of Management Systems, Vol. 24, Number 3, 2014
Sabine Berghaus, Thomas Sammer, Hans Brechbühl & Andrea Back
43
Kristoffersen, S., & Ljungberg, F. (1999). “Making place” to make IT work. Proceedings of the
international ACM SIGGROUP conference on Supporting group work - GROUP ’99, pp. 276-285.
New York, New York, USA: ACM Press.
Leonardi, P. M. (2012). Materiality, sociomateriality, and socio-technical systems: What do these
terms mean? How are they different? Do we need them. In: P. M. Leonardi, B. A. Nardi, & J.
Kllinikos (Eds.), Materiality and organizing: Social interaction in a technological world, First ed., pp.
25-48. Oxford: Oxford University Press.
Lyytinen, K. J., Yoo, Y., Varshney, U., Ackerman, M., Davis, G., Avital, Michel Avital, Robey, D.,
Sawyer, S., & Sorensen, C. (2004). Surfing the Next Wave: Design and Implementation Challenges
of Ubiquitous Computing. Communications of the Association for Information Systems, 13(1), 697716.
Miles, M. B., Huberman, A. M., & Saldaña, J. (2014). Qualitative Data Analysis. A Methods
Sourcebook, Third ed., p.408. Thousand Oaks, CA: SAGE Publications.
Mithas, S., Tafti, A., & Mitchell, W. (2013). How a Firm’s Competitive Environment and Digital
Strategic Posture Influence Digital Business Strategy. MIS Quarterly, 37(2), 511-536.
Oh, W., & Pinsonneault, A. (2007). On the Assessment of the Strategic Value of Information
Technologies: Conceptual and Analytical Approaches. MIS Quarterly, 31(2), 239-265.
Orlikowski, W. J. (2009). The sociomateriality of organisational life: considering technology in
management research. Cambridge Journal of Economics, 34(1), 125-141.
Ortbach, K., Brockmann, T., & Stieglitz, S. (2014). Drivers for the Adoption of Mobile Device
Management in Organizations. Proceedings of the 22th European Conference on Information
Systems, Tel Aviv, Israel.
Pitt, L., Berthon, P., & Robson, K. (2011). Deciding When to Use Tablets for Business Applications.
MIS Quarterly Executive, 10(3), 133-139.
Pitt, L. F., Parent, M., Junglas, I., Chan, A., & Spyropoulou, S. (2010). Integrating the smartphone
into a sound environmental information systems strategy: Principles, practices and a research
agenda. The Journal of Strategic Information Systems, 20(1), 27-37.
Porter, M. E., & Millar, V. E. (1985). How information gives you competitive advantage. Harvard
Business Review, 63(4), 149–160.
Rogers, E. (2003). Diffusion of innovations, 5th ed., p. 576. New York: Free Press.
Sammer, T., Brechbühl, H., & Back, A. (2013). The New Enterprise Mobility : Seizing the
Opportunities and Challenges in Corporate Mobile IT. Proceedings of the 19th Americas
Conference on Information Systems, 1–8.
Statista. (2014a). Apple App Store: Number of downloads 2008-2014 | Statistic. Retrieved June 19,
2014, from http://www.statista.com/statistics/263794/number-of-downloads-from-the-apple-app-store/.
Journal of Management Systems, Vol. 24, Number 3, 2014
44
Balancing Innovation and Operations: Opportunities and Challenges of Second Generation Enterprise Mobility
Statista. (2014b). Mobile app store: worldwide free and paid downloads 2011-2017 | Forecast.
Retrieved June 19, 2014, from http://www.statista.com/statistics/271644/worldwide-free-and-paid-mobile-appstore-downloads/.
Stieglitz, S., & Brockmann, T. (2012). Increasing Organizational Performance by Transforming into
a Mobile Enterprise. MIS Quarterly Executive, 11(4), 189-204.
Weiser, M. (1991). The Computer for the 21st Century. Scientific American, 265(3), 94-104.
Weiser, M., Gold, R., & Brown, J. S. (1999). The origins of ubiquitous computing research at PARC
in the late 1980s. IBM Systems Journal, 38(4), 693-696.
Yoo, Y. (2010). Computing in Everyday Life: A Call for Research on Experiential Computing. MIS
Quarterly, 34(2), 213–231.
Yoo, Y., Henfridsson, O., & Lyytinen, K. (2010). The New Organizing Logic of Digital Innovation: An
Agenda for Information Systems Research. Information Systems Research, 21(4), 724-735.
YouTube. (2014). YouTube Statistics. YouTube Press Release. Retrieved June 18, 2014, from
http://www.youtube.com/yt/press/statistics.html.
Author Biography
Sabine Berghaus is research associate and PhD student at the Competence Center Mobile
Business at the University of St. Gallen. Previously she has worked as senior information architect at
SapientNitro on a number of corporate portal, user interface, e-commerce, and mobile projects for
clients from various industries. Her research interests focus on mobility and technology-enabled
collaboration and its effect on organizations.
Thomas Sammer has earned his PhD in business innovation at the University of St. Gallen and
has been visiting researcher at the Center for Digital Strategies at the Tuck School of Business at
Dartmouth. Since 2014 he is a senior consultant at Namics with a focus on mobile business.
Hans Brechbühl is the Executive Director of the Center for Digital Strategies and an Adjunct
Associate Professor at the Tuck School of Business at Dartmouth. Hans leads the center’s outreach
and partnership-building efforts, building relationships with Global 1000 corporations in the Americas
and in Europe. His research interests focus on the organizational dynamics in a collaborative,
networked environment and the enabling role of information technology in today’s corporations. He is a
judge for the annual CIO 100 Awards and a member of the World Economic Forum’s Global Council on
“The Future of IT Software and Services”.
Andrea Back is professor and director of the Institute of Information Management at the
University of St. Gallen since 1994. She is head of the Competence Centers Business 2.0 and Mobile
Business. Her research focuses on social business software applications, future workplace, mobile
business and knowledge & corporate learning management with a focus on management frameworks
and methods.
Journal of Management Systems, Vol. 24, Number 3, 2014
45
Journal
J
of Managgement Syystems
ISSN #104 1-2808
A Publiccation off the Assoociation of Managgement
____________
__________
___________
__________
__________________________________________________ ENRICHIN
E
NG ENTERPRISE D
DATA MO
ODELS:
INCORPO
ORATING
G ACTIVE TAXONO
OMIES
Peter Aik
ken, Virginia Commonwe
ealth Universsity, Richmo
ond, Virginia,, USA
Long Flo
ory, Virginia Commonwe
C
alth Universsity, Richmon
nd, Virginia, USA
Amita
A
Goyall Chin, Virgin
nia Common
nwealth Univversity, Richmond, Virgin
nia, USA
AB
BSTRACT
E
Effective infformation and
a
system
ms remains an importtant potenttial competiitive advantage for
o
organizations and an important
i
IS
S leadership
p responsib
bility. Enterrprise data models (EDM) are
rrequired components of
o any inte
egration solution. Mana
aging the EDM betterr, permits business
le
eadership to
o more easily collabora
ate with IT to leverage an enterprrise's sole, n
non-depletab
ble, nond
degrading, durable,
d
strategic asset – its data! We
W describe
e the processs of enriching EDMs with active
taxonomies and demons
strate the uttility that the
ese enriched
d enterprise
e data mode
els can have
e both on
o
organizational productiviity and on increasing the
e utility of ED
DMs.
K
Keywords:
Enterprise
e data, Data
a models, Ta
axonomies
INTR
RODUCTIO N
E
Enterprise in
nformation architectures have long been
b
consid
dered key to improving e
enterprise in
ntegration
((Chen et al.,, 2006). Lac
ck of integrated informattion consum
mes inordinatte enterprise
e resources that can
b
be more effe
ectively deployed elsew
where. When
n this occurss both IT prrojects and dependent business
o
operations ta
ake longer, cost more, and deliverr less, at inccreased riskk levels. Entterprise data
a models
componentt of informattion integrattion solution
((EDM) are foundational
f
ns and have
e proven the
emselves
invaluable in
n such divers
se domains as power management
m
and cyber ssecurity ana
alysis (Cheniine et al.,
2
2014; Shash
hidhar et al., 2010), de
eveloping us
seful data w
warehousess (Shashidha
ar et al. 20
010), and
b
business con
ntinuity management (Ba
ajgoric, 2014
4).
W
We present a validated
d means off enriching traditional E
EDM by inccorporating active taxo
onometric
ccapabilities. These capabilities 1) permit better use o
of existing EDM and 2) facilita
ate EDM
improvements – to corrrect internal errors and
d evolve refe
ference EDM
M more dire
ectly into en
nterprisesspecific versions. We illu
ustrate the utility
u
of these
e capabilitie s as experie
enced by a large IT orga
anization.
T
These resu
ults provide promise for broaderr-based ap
pproaches iincorporating
g more on
ntological
ccapabilities in the future..
Journal off Managementt Systems, Vool. 24, Numbeer 3, 2014
46
Enriching Enterprise Data Models: Incorporating Active Taxonomies
The next section of this paper describes how EDM provide the necessary underpinnings for achieving
enterprise integration. Next, we describe typical challenges to successful enterprise modeling – ranging
from their enormous complexity to lack of internal diagnostic, correction, and improvement mechanisms.
We describe the EDM enrichment process and illustrate the use of active taxonomies to evolve EDM
more rapidly. We describe the evaluation process, the results, and our assessment. The paper
concludes with some suggestions for future research.
EDM ARE FOUNDATIONAL TO AUTOMATED ENTERPRISE INTEGRATION
“Essentially, all models are wrong, but some are useful.” (Box et al., 1987)
This section describes how EDM provide the necessary underpinnings for achieving enterprise
integration. EDM are a necessary but insufficient prerequisite to automated enterprise integration.
Automated enterprise integration has long been a goal and EDM have always been part of the solution.
A traditional definition of EDM would include building definitions from models to data models and then
to enterprise data models.
A model is a representation of something else. Consistent across multiple definitions is the concept that
the model is of a smaller scale than the thing/concept being modeled. Useful models formally describe
the essence of the modeled object. Similarly, information exchanged using the model constitutes an
essential set of information shared between the two exchanging systems.
Data models are widely understood to be representations of arrangements of things/concepts that the
organization wishes to maintain formally. Data are organized into attributes. Attributes are grouped into
entities. Entities are grouped into models. Models specify arrangements of data attributes representing
modeled details, grouped into data entities corresponding roughly to business concepts, and formally
arranged into models representing conceptual relationships of interest to the organization. Data models
were first used to develop databases for cooperating software programs (Chen, 1976). Software
program families can share data definitions at the attribute, structure, and model levels. This is
immediately useful because data must be perfectly fit-for-use at the most atomic level to avoid an array
of technical challenges. (Model views and other technical devices can be implemented to
programmatically control variability.) System-wide data sharing has long been an ERP goal (Beard et
al., 2004).
When the scope of the data modeling extends beyond a family of systems, it is referred to as an
enterprise data model. In this capacity the EDM function as the specifications required to achieve
integration – optimized to support enterprise strategy.
Most are familiar with the traditional paper/electronic based representations (See Figure 1) including
those maintained using CASE tools. However, EDM can exist in alternative forms including:



Conceptual models existing in the minds of various domain experts;
Model components encoded as rules in various ETL facilities; and
Anything that is used to translate data from one form/format to another.
In all instances, a definitive representation of the source data arrangement and the target data
arrangements are required before it is possible to specify any data transformation operations.
The sum of these and other architectural components constitute the knowledge of the enterprise's data
arrangements – technical knowledge required before any transformation can occur. At the enterprise
level, sharing is optimized when the EDM scope is enterprise-wide (Leonard et al., 2012). In practice,
Journal of Management Systems, Vol. 24, Number 3, 2014
47
Peter Aiken, Long Flory & Amita Goyal Chin
Figure 1. Visual Representation of an Enterprise Data Model
EMD rarely covers the entire enterprise but have proven sufficient utility to be recommended as an
essential component of enterprise strategy (Ross et al., 2006).
Organizations employ their data and other strategic assets in pursuit of strategy. As part of coordinated
efforts, different groups often need data items in other forms. Since these disparate systems were not
designed to work together, they do not automatically interoperate. Systems are built with unacceptable
data variations and thereafter require more resources to operate as well as interoperate.
Data transformations are required to achieve the interoperability. An important goal of interoperability is
minimization of transformation effort. Optimization occurs with 100% automation of enterprise data
transformations replacing manual processing and diagnostics. All organizations suffer to some degree
from poor quality data (acting as fuel) – that is data that isn't fit for use. Data can suffer along an array
of dimensions arranged from architectural to model to value to representational (Yoon et al., 2000). The
suffering comes in the form of confusion and errors resulting from homonym, synonym, incompatible
field types/lengths, inadequate documentation, and other data challenges.
Enterprise integration efforts seek to achieve improvements by facilitating the interaction among
organizations, individuals, and systems (Petrie, 1992). Enterprise integration goals focus on improving
the overall performance of large, complex systems in areas such as processing efficiency, unit
responsiveness, and perceived quality.
Journal of Management Systems, Vol. 24, Number 3, 2014
48
Enriching Enterprise Data Models: Incorporating Active Taxonomies
Figure 2. Spoke and Hub Integration
Application 1
Application 2
Application 3
15 Interfaces
(N*(N-1))/2
Application 4
Application 5
Application 6
Automated integration depends on a conceptual spoke and hub model as shown in Figure 2, and
differing implementation configurations are possible (Nachouki et al., 2010). The appeal of this
approach is based on its three-way scalability that permits variations in the:
1. number of data items (ideally data structures) from each system are to be shared;
2. number of applications connected to the hub;
3. amount of interconnectivity among hub-connected systems.
By varying these three we can describe all integration challenges. In order to implement automated
solutions to these challenges, we must encode various transformations, control their scope and
respond to changes in the volume of data exchanged.
This code is an instance of the process portion of an input  process  output version of the EDM.
Integration is not possible without the implementation of a governed vocabulary (attributes), rules for
what constitute various enterprise concepts (entities), and rules for how they relate to each other
(relationships), combined into an information architecture, representing the essential data that governs
enterprise operations. Poor management of this metadata detracts from organizational performance
(Lee et al., 2003).
CHALLENGES TO SUCCESSFUL ENTERPRISE MODELING
We describe typical challenges to successful enterprise modeling – ranging from their enormous
complexity to lack of internal diagnostic, correction, and improvement mechanisms.
Everyone agrees that using an enterprise data dictionary to achieve common vocabulary is both a good
idea and produces tangible benefits. So why are we not getting better results? Organizational data
management capabilities have not improved over the past 25 years (Aiken et al., 2011). Data volume
has certainly increased markedly, presenting enterprises with increasingly challenging problems to
solve. Fundamentally the characteristics of problem resolution follow the de facto ontology design
criteria from (Gruber, 1993).
Journal of Management Systems, Vol. 24, Number 3, 2014
49
Peter Aiken, Long Flory & Amita Goyal Chin





Clarity: Ontology vocabulary should be objective in the intended meanings.
Coherence: Ontology should be logically consistence.
Extendibility: Ontology should be easily expended with minimal workload.
Minimal encoding bias: Ontology should be independent of implementation mechanisms.
Minimal claims: Ontology should make minimal claims about the domain.
Achieving these has been difficult at enterprise level and more successful at the business domain level
(Calhau et al., 2010).
General Modeling Difficulties
Modeling difficulties are compounded by incorrect documentation – be it missing or inaccurate. This
can be compounded by difficulties achieving appropriate access to SMEs and SME/Analyst
communication that is properly incentivized to share and trained to do so. Enough time must be
allocated to analysis to ensure subsequent phase success. The pressure of that time spent doing
analysis is not viewed as productive by non-system builders. Since data evolve, they can behave
perversely unlike projects (Bernstein et al., 2008).
Specific EDM Difficulties
Aside from general modeling difficulties, EDM are complicated by highly complex subject matter and
deficiencies in the tool-base.
EDM Complexity
EDM are voluminous and complex. Below are statistics from recent EDMs with which we have worked.




ADRM has hundreds of entities.
FTI contains almost 700 entities and more than 3,000 attributes.
The three PeopleSoft modules (pay, personnel and training are often implemented as a set)
contain approximately 7,000 data attributes instantiated approximately 26,000 times on 1,400
screens.
SAP out of the box contains tens of thousands of tables.
For the novice user, these volumes represent a cognitive nightmare and it can take months to become
familiar with a single EDM (Lee et al., 2003).
Lack of Capabilities
EDM typically exist within traditional CASE tools and suffer from generally primitive search functions
such that users desiring access to EDM contents are limited to either:



Exact term matching (searching for entities, attributes, or definitions);
Browsing (I'll know it when I see it);
Or both.
For example, a user wanting information on “customers” from EDM would type “customer” into a dialog
box similar to Figure 3. Unaided the EDM returns all metadata with the word “customers” in title or in
the definition – diving directly from the forest to the leaf level. As a result, users miss opportunities to
get information on related concepts such as “member” and “guest.”
Journal of Management Systems, Vol. 24, Number 3, 2014
50
Enriching Enterprise Data Models: Incorporating Active Taxonomies
Figure 3. Typical CASE Tool Query Facility
If a data map contains these concepts, they can be understood easily with a glance. Data maps
typically do not exist for the conceptual, rule-based, or transformation rules referenced previously.
Reference Data Model Use
Reference data models are a subset of EDMs designed to act as a guide/overview for a specific
domain. Organizations acquire reference data models (RDM) to guide their evolution. Numerous
reference EDMs are sold by organizations such as IBM, Teradata, Financial Transactions International,
ADRM Software, etc. The RDM value proposition rests on domain specific customization and therefore
relevance to the purchaser. Reference models can be purchased for retail, financial services, insurance,
healthcare, etc.
Purchasing organizations analyze their existing (as-is) information architecture capabilities, against the
best practices represented by the RDM. That is the two models are compared. The purchaser
conceptually maps its existing environment against the reference model. The enterprise keeps those
aspects it liked of the old system and combines those with aspects of the reference model and
develops a target, or to-be, architecture as a development goal. The reference EDM severs as a
bridge/framework helping the organization migrate towards better industry practices embedded within
the reference EDM. Reference models are sold and treated as read-only products – incapable of
evolving with the enterprise. Instead they are updated periodically as releases from the vendor.
THE EDM ENRICHMENT PROCESS PERMITS MORE RAPID EDM EVOLUTION
“Enrich:
To add greater value or significance to – to enrich the mind with knowledge;
To make finer in quality, as by supplying desirable elements or ingredients – to
enrich soil”
Journal of Management Systems, Vol. 24, Number 3, 2014
51
Peter Aiken, Long Flory & Amita Goyal Chin
Figure 4. Key is to extend the utility of EDM search to include conceptual neighborhoods.
Keyword Searches
Enterprise Taxonomic Capabilities
(filtering, matching, extensions)
Enterprise Data Model
Exact Matches
Preferred Terms
Synonyms
Extended Terms
We describe the Master Definition Harmonizer (MDH) enrichment process and illustrate the use of
active taxonomies to evolve EDM more rapidly.
MDH Architecture
Figure 4 shows the MDH architecture. It integrates taxonometric capabilities into existing EDM
infrastructures. Without losing existing functionality, analysts will have broad new ranges of
classification, exploration and analysis capabilities.
Any EDM or data model maintained in using popular CASE tools can be exported (using off-the-shelf
spreadsheet technologies) to form EDM taxonometric seed metadata. This is used as a seed file and
compared against thousands of domain specific relationships existing in a COTS taxonomy product
(see Figure 5) through an auto-classification process.
The MDH analyzes all existing relationships against any existing taxonomy. Essentially all parentchild/child-parent relationships are compared in context to all other items. Additional cycles incorporate
coagulation, sub-division, textual substring, and synonym analyses (see Figures 6, 7, and 8) with a goal
of normalizing the vocabulary. Possible matches and logical suggestions as to how the metadata
should be structured are pushed back to the original CASE tool-based model.
The steps required to create a useful version are depicted in Figure 9 and described below.
1.
2.
3.
4.
Extract metadata from existing, un-enriched EDM.
Develop EDM taxonometric seed metadata.
(Re)Establish EDM base-line taxonomy.
Evaluate results/improve EDM taxonometric seed (Repeat from Step 3 with increasing
refinement).
5. Achieve good enough starting EDM taxonomy.
6. Periodically enrich version of the EDM using the EDM taxonomy.
7. Refine terms and re-issue ARM Taxonomy.
Journal of Management Systems, Vol. 24, Number 3, 2014
5
52
Enriching
E
Enterrprise Data Moodels: Incorporating Active T
Taxonomies
Figu
ure 5. Some
e of the thou
usands of rellationship exxisting in a C
COTS taxono
omy productt
(Wand
d, Inc., 2013
3).
Figu
ure 6. Sub-division ana
alysis resultss
JJournal of Maanagement Sy
ystems, Vol. 24,
2 Number 3, 2014
53
P
Peter Aiken, Lo
ong Flory & Amita
A
Goyal Ch
hin
Figure
e 7. Textuall substring a
analysis resu
ults
D
During Phas
se I, Steps 3 through 5 repeat until the team ju
udges a suffficiently rich or satisfacttory EDM
taxonomy ha
as been cre
eated – this
s has been repeatedly accomplish
hed in five o
or fewer cyycles and
returns afte
cconsistently reaches the
e point of diminishing
d
er ten cycle
es. Phase III begins once 'good
e
enough' has
s been achie
eved the ED
DM taxonom
my is periodi cally improvved using a manual approach –
ccycling between Steps 5-7.
5 We will illustrate this
s process ass implementted and evalluated by ou
ur subject
d
data architec
cts in the nex
xt section.
gure 8. Syn
nonym analyysis results
Fig
Journal off Managementt Systems, Vool. 24, Numbeer 3, 2014
54
Enriching Enterprise Data Models: Incorporating Active Taxonomies
Figure 9. Development and use of active taxonometric capabilities
Phase I:
Taxonometric
Seeding
Develop Seed
ADRM Taxonomy
ADRM
Metadata
Develop Seed
ADRM Taxonomy
No
Good
Enough
Starting
Seed?
Yes
ADRM
ADRM V+1
ADRM
Taxonomy
Phase II:
Taxonometric
Improvement
Capabilities
Once the seed has been established but before iterative refinement has begun, it is possible to
enhance query results in a number of ways including the following.




Contextualizing search response visually by illustrating portions of one or more trees to which
the search belongs. This permits 1) resolution of multiple trees to a single authoritative tree and
2) refinement of the original query term into more domain specific contexts.
Enhancing this above information using various counts to illustrate the quantity of occurrences
with each category.
Status of various taxonomy modifications such as unevaluated, proposed, and standard.
Generating ERD configurations illustrating relationships between related entities.
Standard learning capabilities are incorporated where systematically variation candidate terms are
exposed for analysis and harmonization by SMEs/stewards/analysts. Workflow capabilities compliment
existing practices. The refinement process enriches EDM with taxonometric capabilities permits new
searches to return conceptually "surrounding" results including (See Figure 10):




Exact term;
Related terms;
Frequently examined next terms;
Related data sources;
Journal of Management Systems, Vol. 24, Number 3, 2014
55
P
Peter Aiken, Lo
ong Flory & Amita
A
Goyal Ch
hin










Applicable subjec
ct areas;
Relatted application sources;
Cross
s-referenced
d terms;
Broad
der/narrower/Not related
d terms;
Prefe
erred terms;
Exten
nded terms;
Syno
onyms;
Homo
onyms;
Associated goverrnance/busin
ness roles; or
o
Steward coverag
ge.
F
Figures 11 and
a 12 illustrrate the refinement proce
ess occurs a
as users worrk with termss. Capabilitie
es permit
a
analysts to quickly
q
confirrm and sepa
arate and strructure the m
metadata. T
The enrichme
ent process presents
term analysis, permittin
ng knowledg
ge workers and subjecct matter exxperts to ad
dd metadata further
cclassifying them
t
as brroader, narrrower, relate
ed, etc. Fig
gure 12 illu
ustrates how
w these ca
apabilities
a
accelerate model
m
unders
standing.
ASSESSING OF THE RES
SULTS AND THE ASS
SESSMEN
NT
W
We describe
e the evaluattion process
s, the results
s, and our asssessment. We were fo
ortunate to b
be able to
o
obtain hands
s on review
ws of the acttive taxonom
mic capabilitties working
g with data architects in
n a large
o
organization. They work
ked with a copy
c
of an ARDM referrence mode
el for a yearr as we evo
olved the
technology used
u
to imple
ement B.
Figurre 10. Taxonomy Refine
ement Facility
Journal off Managementt Systems, Vool. 24, Numbeer 3, 2014
5
56
Enriching
E
Enterrprise Data Moodels: Incorporating Active T
Taxonomies
Figure 11. Taxono
omy Refinem
ment Capabillities for furth
her refining tthe initial au
uto-classifica
ation
Figure 12.
1 Taxonom
my Refineme
ent Capabilitties for refining the hiera
archy
JJournal of Maanagement Sy
ystems, Vol. 24,
2 Number 3, 2014
57
Peter Aiken, Long Flory & Amita Goyal Chin
Primary Usage Scenario – Making sense of the EDM
Querying ARDM (in its native modeling environment) for the term "customer" resulted in more than 100
hits among the entities, attributes, and definitions. Each of the 23 models containing the terms
customer were individually opened and browsed. Individual result sets were copied to an integrative
spreadsheet. Considerable effort was expended to obtain an integrated results set and thus a "holistic"
picture, alphabetized as shown in Figure 13. For an analyst new to the domain the results are at once
overwhelming and misleading.
Working through the Phase I auto-classification cycles resulted in an initial customer metadata
hierarchy showing:
Customer Categories [occurrences]
Customer Support [16 expanded]
Customer order product
Customer order product allocation
Customer account channel product summary
Customer account product distribution
Manufacturer customer account exclusion
Manufacturer customer exclusion
Customer finance term
Customer sales term
Customer spouse (party)
Customer spouse employment
Customer currency usage
Customer language usage
Customer shipment method
Customer activity
Customer ancestry
Customer event
Customer Categorization [30]
Customer Value (Marketing) [16]
Customer Accounting [10]
Customer Restriction [5]
Customer Property [27]
That is, the seeding phase returned six categories of customer data and grouped 16 attributes into the
"customer support" category. This greatly simplified the cognitive load on the analysts. Another
capability permitted analysts to display concepts grouped as an ERD of Figure 14.
Combined these new capabilities were well received by the analysts. It was unanimously agreed that:




Proof of concept was overwhelmingly demonstrated;
From the user perspective modern search capabilities were easily incorporating into the various
analysis processes;
MDH permitted programmatic harmonization of literally many models within EDM framework;
and
Already the system had paid for itself saving hundreds of hours of analyst time.
Journal of Management Systems, Vol. 24, Number 3, 2014
5
58
Enriching
E
Enterrprise Data Moodels: Incorporating Active T
Taxonomies
Figure 13. Terms returrned from AD
DRM in resp
ponse to a se
earch for "cu
ustomer"
Figure
e 14. ER Mo
odel Generatted using MDH
JJournal of Maanagement Sy
ystems, Vol. 24,
2 Number 3, 2014
59
P
Peter Aiken, Lo
ong Flory & Amita
A
Goyal Ch
hin
U
Unintended Usage Sce
enario – Dia
agnosing an
nd Improvin
ng the EDM
A
An additiona
al use for the
ese capabilitties arose during the co
ourse of the evaluation. During the prior two
yyears of EDM
M use, the organization had collecte
ed a numberr of questions/concerns. These inclu
uded:
S
Structural Fla
aw Categories








Incon
nsistent Entitty Definitions
s
Incon
nsistent card
dinality acros
ss models
Conc
cept inconsis
stencies: Same Entity us
sed in differe
ent taxonomy contexts.
In appropriate joining of independent con
ncepts
Struc
ctural Incons
sistencies
ping)
Incon
nsistent and lack of use of categorization (subtyp
Sema
antic Confus
sion
Missing structure
es and conce
epts
C
Combined, iff true, these
e categories could make
e it difficult to
o use as refe
erence model. The taxo
onometric
ccapabilities were
w
judged invaluable by
b the analy
ysts who prefferred the crrude, beta-version softw
ware to its
a
absence. Th
heir estimate
es were thatt they spentt 80% of the
eir time atte
empting to figure out the project
ccontext and 20% addres
ssing the acttual problem
m. Just lowerring their loo
ok-for time frrom 80 to 60
0% would
in effect double their productivity.
p
This permitted accura
ate diagnosttics required
d to investiigate the
p
potential EDM flaws. The
e ROI was affirmed
a
to be positive.
Figure 15. Acttive Linked T
Taxonomies
CONCLU
USIONS AN
ND SUGGE
ESTIONS F
FOR FUTUR
RE RESEA
ARCH
O
Our work has resulted in
n a set of capabilities rep
presented in
n Figure 15 a
adopted by tthe host organization
a
as best prac
ctices. As da
ata gets bigg
ger it will be increasinglyy important tto develop ccapabilities to
o help us
m
make sense of it all. Sy
ystems are built
b
with un
nacceptable data variatiions and the
erefore requ
uire more
Journal off Managementt Systems, Vool. 24, Numbeer 3, 2014
60
Enriching Enterprise Data Models: Incorporating Active Taxonomies
resources to operate as well as interoperate. Semi-automating this process makes use of EDMs more
palatable and increases likelihood of overall success by reducing the scale of the challenge.
References
Aiken, P. H., Gillenson, M., Zhang, X., & Raffner, D. (2011). Data Management and Data
Administration: Assessing 25 Years of Practice. Journal of Database Management, 22(3), 24-44.
Beard, J. W. & Sumner, M. (2004). Seeking strategic advantage in the post-net era: Viewing ERP
systems from the resource-based perspective. Strategic Information Systems, 13(2), 129-150.
Bernstein, P. A. & Haas, L. M. (2008). Information Integration in the Enterprise. Communications of
the ACM, 51(9), 72-79.
Box, G. E. P., and Draper, N. R. (1987). Empirical Model Building and Response Surfaces. John
Wiley & Sons: New York, NY.
Calhau, R. F. & Almeida, F. D. (2010). An Ontology-based Approach for Semantic Integration. In:
14th IEEE International Conference on Enterprise Distributed Object Computing (EDOC), 111-120.
Chen, D., Doumeingts, G., & Vernadat, F. (2008). Architectures for enterprise integration and
interoperability: Past, present and future. Communications of the ACM, 59(7), 647-659.
Chen, P. P.-S. (1976). The Entity-Relationship Model - Toward a Unified View of Data, ACM
Transactions on Database Systems, 1(1), 9-36.
Chenine, M., Ullberg, J., Nordström, L., Wu, Y., & Ericsson, G. N. (2014). A Framework for WideArea Monitoring and Control Systems Interoperability and Cybersecurity Analysis. IEEE
Transactions on Power Delivery, 29(2), 633-641.
Gruber, T. R. (1993). Toward Principles for the Design of Ontologies Used for Knowledge Sharing
(Technical Report KSL 93-04). In: N. Guarino & R. Poli (eds.), International Workshop on Formal
Ontology, Padova, Italy.
Lee, J., Siau, K., & Hong, S. (2003). Enterprise Integration with ERP and EAI. Communications of
the ACM, 46(2), 54-60.
Leonard, J. & Seddon, P. (2012). A Meta-model of Alignment. Communications of the AIS, 31(11),
231-259.
Nachouki, G. & Chastang, M. P. (2010). Multi-Data Source Fusion Approach in Peer-To-Peer
Systems. The International. Journal of Database Management Systems, 2(1), 60-79.
Nijaz, B. (2014). Business continuity management: a systemic framework for implementation,
Kybernetes, 43(2), 156-177.
Petrie, C. (1992). Forward to the conference proceedings. In: Enterprise Integration Modeling:
Proceedings of the First International Conference, MIT Press, Cambridge, MA.
Journal of Management Systems, Vol. 24, Number 3, 2014
Peter Aiken, Long Flory & Amita Goyal Chin
61
Ross, J. W., Weill, P., & Robertson, D. C. (2006). Enterprise Architecture as Strategy: Creating a
Foundation for Business Execution. Harvard Business School Press: Boston, MA.
Shashidhar, K. K. & Manjaiah, D. H. (2010). Enterprise Data Model - A Study with Reference to
Technical Institution. Proceedings of the 2010 International Conference on Web Information
Systems and Mining, Vol. 2. 323-326.
Wand, Inc. (2013). Enterprise Taxonomies. Retrieved from http://www.wandinc.com/wand-taxonomy-libraryportal.aspx
Yoon, Y., Aiken, P. H., & Guimaraes, T. (2000). Managing Organizational Data Resources: Quality
Dimensions. Information Resources Management Journal, 13(3), 5-13.
Author Biography
Peter Aiken founded Data Blueprint (an internationally recognized data engineering company)
in 1999 and is an Associate Professor (Information Systems/Virginia Commonwealth University). His
experience and research has widely explored data and its relationship to systems and business
engineering. He is the author of Data Reverse Engineering and Clive Finkelstein's co-author of Building
Corporate Portals Using XML (McGraw-Hill 1996/99). His sixth book XML in Data Management is coauthored with David Allen. He has held leadership positions with the US Department of Defense and
consulted with numerous organizations around the world. His research has appeared in the
Communications of the ACM, IBM Systems Journal, IEEE Software, and others. He holds Senior
Membership in ACM & IEEE. He was DAMA International President 2009-2012. He has received two of
their Achievement Awards and the International Stevens Award from the IEEE Computer Society. He
has lectured internationally on data and related topics.
Long Flory is a Senior Analyst and Lead Information Architect at AnalyticArt (a managerial and
information consulting firm). She is also a PhD candidate (Information Systems at Virginia
Commonwealth University). Her experience and research have encompassed data quality and
governance, business analytics, big-data processing, information architecture and mining, knowledge
management, decision support, risk management, process improvement, and human resource
management. Her research has appeared in AMCIS, INFORMS, Human Resource Management, etc.
She has developed dozens of innovative and practical solutions that leverage data and technology to
drive value-added business results. She regularly delivers curriculum and lectures in academic and
corporate colleges/universities around the world. She has received various Excellence Achievement
awards.
Amita Goyal Chin is an Associate Professor in the Information Systems Department at Virginia
Commonwealth University. She received her B.S. in Computer Science and M.S. and Ph.D. in
Information Systems, all from The University of Maryland at College Park. Her research interests
include database systems, data management, and data governance. Her research has appeared in the
Communications of the ACM, Journal of Computer Information Systems, Journal of Database
Management, and others.
Journal of Management Systems, Vol. 24, Number 3, 2014
6
62
JJournal of Maanagement Sy
ystems, Vol. 24, Number 3, 2014
INFORMATION
63
INFORMATION
____________________________________________________________________________________
Information for Contributors
ABOUT THE JOURNAL
Founded in 1989, the Journal of Management Systems (JMS) is the flagship publication of the
Association of Management (AoM) and its sister organization, the International Association of
Management (IAoM). The primary mission of JMS is two-fold: (1) to promote the integration
and cross-fertilization of the behavioral/organizational and information sciences and (2) to
encourage, sharpen, and expand the dialogue between academicians and practitioners from
an interdisciplinary perspective.
AIMS AND SCOPE
JMS draws from a number of management disciplines including organizational, human
resources, and information systems and information technology, and related disciplines.
Papers may be empirical articles, theoretical and methodological papers, surveys and field
research, practitioner-oriented papers and case studies, position papers on current
management issues, integrative and evaluative reviews, and reports of recent technological
advances of applied value. High priority is given to manuscripts that cross disciplinary
boundaries as well as those with a dual focus on theory and practice.
JMS invites new submissions that address a variety of organizational, managerial, information
systems and technology issues in contemporary global economy of the twenty-first century
including, management education and development, organizational theory, design and
development, leadership, team dynamics, business analytics, decision making, globalization,
business strategy, strategic alliances and networks, emerging markets, buyer/consumer
behavior, supply chain management, international-multinational marketing, operations
management, service operations, human resources management, industrial relations, TQM,
integrated marketing management communication, corporate social responsibility, ethics, trust,
public policy in a changing marketing environment, international management, comparative
management, international marketing, organization communication and information systems,
health care administration, labor markets, gender and diversity in organizations, cross cultural
business practices, entrepreneurship, technology and innovation management, qualitativequantitative research methods, measurements, and data analyses, conflict management,
marketing strategy, services management and marketing practices in "For-Profit" and "Not-ForProfit" environments, B2B and B2C electronic commerce, and excellence in management
education and innovative teaching practices, issues, trends, and advances.
Journal of Management Systems, Vol. 24, Number 3, 2014
64
Information for Contributors
REVIEW PROCESS
JMS employs a double-blind, double-peer review process.
All manuscripts are read by the Editor-in-Chief, who assesses them for relevance and
goodness of fit with regard to the mission and goals of JMS. At this point, a manuscript which
is not congruent with the stated purpose of JMS is returned to the author.
Manuscripts which pass the initial screening process are assigned to editorial board members,
and then undergo double-blind, double-peer reviewing. The journal’s reviewers are selected
based on their content expertise and familiarity with the literature and the methodologies
employed in the study.
Manuscript evaluations are based on the adequacy of the literature review, conceptual
development of propositions, quality of research design, adequacy of data analysis, legitimacy
of conclusions, and practical significance along with criteria assessing the quality of the
author's writing style and clarity of presentation. Not all evaluation criteria may apply to a given
submission.
JMS reviewers use a standard manuscript evaluation form and provide open-ended comments
for both the editors and the author(s).
MANUSCRIPT SUBMISSION
Authors are invited to submit their manuscripts electronically to the Editor-in-Chief, Q B. Chung,
at [email protected].
In addition to submitting manuscripts, any correspondence about manuscripts under review,
and other inquiries about the journal should be sent to:
Q B. Chung
[email protected]
Editor-in-Chief, Journal of Management Systems
Bartley 3089
Villanova University
800 Lancaster Avenue
Villanova, PA 19085
USA
All submissions must be made in Microsoft Word or a compatible file format, double-spaced
throughout (including abstracts, captions, tables, references, acknowledgments, and
quotations) with one-inch margins.
Journal of Management Systems, Vol. 24, Number 3, 2014
INFORMATION
65
Authors should also state in the e-mail message that the manuscript has not been published
previously and is not currently under review elsewhere. The entire manuscript should be
prepared as one Word document.
MANUSCRIPT PREPARATION
1. Manuscripts should be prepared according to the guidelines of the Publication Manual of the
American Psychological Association. Manuscripts which not adhere to these guidelines will not
be sent out for reviews but returned to the author(s) for format adjustments.
2. Except in unusual cases, manuscripts should not exceed 25 double-spaced pages, including
figures, tables, and references.
3. The title page should include the title of the article, name(s) of the author(s), affiliation(s),
address(es), phone number(s), and e-mail address(es), and a suggested running head (not to
exceed 40 characters). To facilitate blind review, implications of authorship should appear only
on the title page. The title page is to be followed by the abstract. The text of the paper should
begin on the third page.
4. The abstract consisting of 100 to 150 words should provide a brief, comprehensive
summary of the content of the manuscript.
5. Tables, numbered with Arabic numerals, should be arranged sequentially and numbered in
the order in which they appear in the text and placed at the end of the manuscript. Each table
should have a caption centered above the table; explanatory notes to a table (e.g., probability
levels, explanations of abbreviations, etc.) should appear at the bottom of the table.
6. Figures (graphs, line drawings, photographs, charts), numbered consecutively with their
respective captions, should also be cited in the order in which they appear in the text. Figure
captions should be typed double-spaced on a separate sheet of paper. All illustrations must be
camera-ready; photographs must be of professional quality; and drawings should be prepared
in ink or press-on tape.
7. Mathematical expressions and notations should be used judiciously and only as required by
the subject matter. All symbols must be identified.
8. Footnotes to the body of the manuscript should not be used. Instead, the material they
contain should be incorporated in the text.
9. References should be listed alphabetically at the end of the manuscript. References to the
same author(s) are arranged according to the year of publication, the earliest first. Text
citations must correspond accurately to the references in the bibliography. In the text, for
references to the work of up to five authors, all authors should be cited the first time the
reference occurs in the body of the manuscript; in subsequent citations the surname of the first
Journal of Management Systems, Vol. 24, Number 3, 2014
66
Information for Contributors
author should be followed by et al. and the year. Reference citations in parentheses should be
arranged alphabetically.
The following examples illustrate the correct style of capitalization and punctuation of journal
articles and books for the reference section:
Brook, P.O., Russell, D.W., & Price, J.L. (1988). Discriminant validation of measures of
job satisfaction, job involvement, and organizational commitment. Journal of Applied
Psychology, 73, 2, 139-145.
Locke, E.A. (1976). The nature and causes of job satisfaction. In M.D. Dunnette (Ed.)
Handbook of industrial and organizational psychology (pp. 1294-1349). Chicago: RandMcNally.
Vroom, V.R. (1964). Work and motivation New York: Wiley.
10. A biographical sketch of each author of approximately 250 words in length must be
included at the end of the paper.
11. Word processing: Do not right justify text; left justification only. Tuck all periods and
commas inside quotation marks. Use two hyphens for an en (-) dash. Do not use all capital
letters for effect in headlines; use upper and lower case letters. Do not double space between
paragraphs.
12. The final version of manuscript accepted for publication in the Journal of Management
Systems must be submitted electronically as a single Microsoft Word document or in a
compatible file format.
PERMISSIONS
A copyright release must be executed before a manuscript can be released for publication.
Contributors are responsible for obtaining permission from copyright owners for figures
(reproduced or adapted), tables (reproduced or adapted), or lengthy quotes (500+words) that
have been published elsewhere. The Association of Management Publication Agreement is
mailed to authors during the final stages of the editorial review process; return of the signed
form completes the review process.
PROOFS
Once a draft manuscript has completed the review process, any remaining typographical
errors must be corrected by the author(s) in a timely fashion, usually 48 hours. Authors receive
page proofs for final corrections. At this stage, no content changes, additions or deletions are
permissible; such changes will be charged to the author(s). When completed, the manuscript is
returned to the Editor-in-Chief electronically for final review. Accepted papers are then
Journal of Management Systems, Vol. 24, Number 3, 2014
INFORMATION
67
forwarded to Maximilian Press Publishers, which publishes JMS quarterly on the journal’s
website.
Note: The publisher reserves the right to uphold its standards of publication in the market place.
All rights are reserved to reject submissions not conforming to publication procedures.
SPECIAL ISSUES
The Editor-in-Chief commissions special issues on topics that reinforce the mission of the
journal and appoints guest editor(s) to lead the development of the special issue.
Journal of Management Systems, Vol. 24, Number 3, 2014
Journal of Management Systems, Vol. 24, Number 3, 2014
Maximilian Press
P U B L I S H E R S
Maximilian Press Book Publishers
P.O. Box 72894
Richmond, Virginia 23235
[email protected] | [email protected] | [email protected]