O'Sullivan, K. (2008) - Strategic Knowledge Management in Multinational Organizations. IGI Global.
O'Sullivan, K. (2008) - Strategic Knowledge Management in Multinational Organizations. IGI Global.
O'Sullivan, K. (2008) - Strategic Knowledge Management in Multinational Organizations. IGI Global.
BY
ABDELKEBIR SAHID
University Hassan 1st, Morocco
YASSINE MALEH
University Sultan Moulay Slimane, Morocco
MUSTAPHA BELAISSAOUI
University Hassan 1st, Morocco
List of Figures xi
List of Acronyms xv
Preface xvii
Chapter 1 Introduction 1
1.1 Context1
1.2 Why Agility Now?2
1.3 The Agility Role3
1.4 IT as a Business Agility Obstacle4
1.5 IT at the Service of Business Agility5
1.6 Research Objective5
1.7 Research Design6
1.8 Contributions and Relevance6
1.9 Book Organization7
Chapter 2 Understanding Agility Concept 9
2.1 Introduction9
2.2 Background of Significant Changes Underlying Agility10
2.3 Production Method Trends13
2.3.1 Lean Manufacturing14
2.3.2 Total Quality Management17
2.4 Agile Management Paradigm Evolution18
2.4.1 Change Management18
2.4.2 Change and Uncertainty Mastering in the
Entrepreneurial Organization21
2.4.3 Work on Agility 21
2.4.4 Agile Continuous Delivery Methods25
2.4.4.1 Scrum25
2.4.4.2 Agile Manifesto26
viii Contents
2.4.4.3 DevOps26
2.4.4.4 Toyota Kata26
Summary27
Chapter 3 Information System Evolution 29
3.1 Introduction29
3.2 Information System Definition and Objective32
3.3 Information System Concept33
3.4 Concepts of Enterprise Application35
3.5 Features of Enterprise Applications35
3.6 Autonomy36
3.7 Distribution37
3.8 Heterogeneity37
3.9 Dynamism38
3.10 EIS and Company Strategy38
3.11 Enterprise Information Systems’ Complexity40
3.12 Complexity Factors40
3.13 Evolution of EISs41
3.14 EIS Governance42
3.14.1 COBIT47
3.14.2 LIBRARY (ITIL) 51
3.14.3 Structure of ITIL v4 52
3.14.4 CMMI 54
3.14.5 Committee of Sponsoring Organizations of the
Treadway Commission (COSO)55
3.15 Urbanization57
3.15.1 The Metaphor of the City 57
3.15.2 The Urbanization of Information System59
3.16 Flexibility60
3.17 Agility61
3.17.1 IS organizational Design64
3.17.2 Competencies and Skills of IS professionals65
3.17.3 IS Development65
3.17.4 Design of IT Infrastructure66
Summary66
Chapter 4 The Conceptual Model for IS Agility 67
4.1 Introduction67
4.2 Literature Review68
4.3 Literature Methodology71
Contents ix
Appendix153
Reference159
Index185
List of Figures
AM Agility Management
APO Align, Plan, and Organise
BAI Build, Acquire, and Implement
BSC Balanced Scorecard
ISO/IEC International Standards Organization/International Electrotech-
nical Commission
CEO Chief of Enterprise Officer
CG Corporate Governance
CIA Confidentiality, Integrity, and Availability
CIO Chief of Information Officer
CMDB Configuration Management Database
CMMI Capability Maturity Model Integration
COBIT Control Objectives for Information and related Technology
COSO Committee of Sponsoring Organizations of the Treadway
Commission
DOI Diffusion of Innovation theory
DSS Deliver, Service, and Support
DIS Direction of information systems
DBPA Data Base Agility Drivers
EDA Exploratory Data Analysis
EDM Evaluate, Direct, and Monitor
EUROSAI European Organization of Supreme Audit Institutions
EIS Enterprise Information Systems
ERP Enterprise Resources Planning
DSR Design Science Research
EG Enterprise Governance
IT Information Technology
ITG Information Technology Governance
ITGI Information Technology Governance Institute
ITIL Information Technology Infrastructure Library
ITSM Information Technology Service Management
IS Information Systems
SLA Service Level Agreement
ISO Information Security Officer
ISMS Information Security Management System
ISG Information Security Governance
xvi List of Acronyms
In the last decade, the use of information systems as a strategic tool has contrib-
uted significantly to the Information Technology revolution. However, the adop-
tion of information systems is rarely successful without adequate precautions and
attention. IT systems’ deployment is both a risky and profitable choice for an
increasingly rapid and evolving economic context.
Nowadays, organizations increasingly require a reactive and proactive response
to uncertain internal and external events and opportunities, demonstrating agil-
ity of action to reach a company’s operational performance. The issue is that
organizations are generally not prepared to deal with significant uncertainties and
unpredictability. Likewise, information systems are not developed to cope with
change and unpredictability. Consequently, for many companies, IT signifies a
constraining factor to business agility requirements.
Strategically, agility implied conquering new markets, taking risks, and con-
sidering new social and environmental challenges. Thus, in operational strategy,
this means integrating stakeholders into the company’s practices and improving
its understanding by re-evaluating all links in chain value to create a competitive
advantage.
In other words, agility necessarily requires strategy and, more specifically,
organization, culture, and business model to convey the need for responsiveness
as effectively as possible.
Faced with the various transformations, and needs of the internal and/or exter-
nal environment, it is essential to structure the company’s information system (EIS)
to facilitate its evolution and modify its positioning, structure, and skills. All this in
harmony with the company’s strategic development, while ensuring global consist-
ency in terms of permanent IT alignment with the global strategy, interoperability,
integration, autonomy, and flexibility. In other words, the EIS must be agile.
The book’s purpose is to analyze and explain the impact of IT systems’ strate-
gic agility on organizations’ business performance in response to highly uncertain
and unexpected events potentially significant.
The present book aims to create an explanatory framework that illustrates
how and under what conditions IT helps organizations to detect and respond to
uncertain events supported by learning capabilities. The main question of this
book is the following: What is the role and impact of strategic IS agility on the
operational agility of organizations in response to uncertain events?
This book delivers comprehensive coverage of the elements necessary for the
development and the implementation of effective Information systems’ strategic
xviii Preface
agility. The book dissertation includes the concept, theory, modeling, and archi-
tecture of an agile information system. It covers state of the art, concepts, and
methodologies for developing information system strategies taking into account
the environment, the current development of information technologies, and the
general trend of IS agility. The book should help companies to formulate the
information systems’ processes of the twenty-first century to grow in the com-
petitiveness of its area.
Abdelkebir Sahid
Yassine Maleh
Mstapha Belaissaoui
Chapter 1
Introduction
1.1 Context
Nowadays, managers increasingly require a proactive and reactive response to
uncertain internal and external events and opportunities, demonstrating flexibility
and agility of action to match the company’s operational performance. The issue
is that organizations are generally not prepared to deal with significant uncertain-
ties and unpredictability. Usually, business practices were certain and predictable
(Kidd, 1995). Likewise, information systems are not developed to cope with change
and unpredictability. Consequently, for many companies, information technology
(IT) is a significant factor that constraints business agility requirement.
A study by Tucci, Mitchell, and Goddard (2007) shows that less than half of
chief executive officers’ CEOs trust IT to contribute to the success of their busi-
ness. An MIT study of 1,500 IT managers shows that 71% of American compa-
nies are in phase 1 or 2 of enterprise architecture maturity (Ross & Beath, 2006),
which explains why IT is a barrier to business agility in many organizations.
The lack of agility hurts the company’s performance, for example, due to delays
in the launch of new products. Thus, according to Foster and Kaplan (2001), a six-
month delay in the product launch in the pharmaceutical and cosmetics industry
has decreased the product’s turnover by more than 30% over its lifetime. Another
example is General Electric’s plan to save $10 billion with real-time information in
its GE cockpits for monitoring the company’s performance and rapidly adapting
to changes required (Melarkode, From-Poulsen, & Warnakulasuriya, 2004).
There are significant differences between companies’ ability to detect uncer-
tain and unexpected events in different sectors of activity to react quickly by
changing their operations and business processes. With this quality, the company
can cope with surprising and unavoidable changes by expanding (or reducing)
these specific capacities or reducing cycle times beyond current levels of flexibility
(Sengupta & Masini, 2008).
These two examples highlight the benefits of IT in improving responsiveness and
agility. This book analyzes the role and impact of IT agility on operational agility to
help organizations deal with uncertain and unpredictable consecutive events.
Today, agility has become a necessary quality, especially in an always unstable
economic environment, making it mandatory, even indispensable (Conboy, 2009;
Imache, Izza, & Ahmed-Nacer, 2012; Sharifi & Zhang, 1999; Zhang & Sharifi, 2000).
Likewise, IT agility has become the primary purpose of any information systems’
department, a quality that any company must have, to meet the customers’ needs,
face competitiveness challenges and rapid technological evolution.
Faced with the various transformations and needs of the internal and/or exter-
nal environment, it is essential to structure the company’s information system (EIS)
to facilitate its evolution and modify its positioning, structure, and skills. All this in
harmony with the company’s strategic development, while ensuring global consist-
ency in terms of permanent IT alignment with the global strategy, interoperability,
integration, autonomy, and flexibility. In other words, the EIS must be agile.
Strategy” (Nagel & Dove, 1991) was published by the Iacocca Institute at Lehigh
University (Kidd, 1994). Following this first report, the Agility Forum is created
to explore the agility concept in more depth.
Agile manufacturing was developed as a new manufacturing paradigm to
address customer requirements in volatile markets. Agile Manufacturing incor-
porates the full range of flexible production technologies, the lessons learned
from total quality management, “just-in-time” production, and “lean” produc-
tion (Goldman, 1994).
Goldman and Nagel (1993) defined agility as the ability to succeed in a continu-
ally changing and unpredictable competitive environment and to react quickly to
unforeseen changes in global markets, where demand for low-cost, high-performance,
high-quality products, and services is paramount for customers.
Several publications on agile manufacturing and agile enterprises (Dove, 2002;
Kidd, 1994, 1995) followed the work of Goldman and Nagel (1993) and Goldman,
Nagel, and Preiss (1995). Subsequently, the concept was extended to supply chains
and business networks (Mason-Jones & Towill, 1999; Swafford, 2004; Towill &
Christopher, 2002; Van Hoek, Harrison, & Christopher, 2001; Yusuf, Gunasekaran,
Adeleye, & Sivayoganathan, 2004). Recently, many researchers have analyzed how
IT can support business agility and how agility can improve information systems
performance (Desouza & Awazu, 2006; Sambamurthy, Bharadwaj, & Grover, 2003).
IT constitutes a key business agility asset and a significant capability that can
hinder or facilitate business agility. Over the years, IT has considerably developed
and achieved considerable maturity to optimize the use of limited and costly tech-
nological resources, roles and relationships have been defined (Hagel & Brown,
2001). IT has become standardized and shared knowledge through the years,
reducing prices due to economies of scale.
The literature presents three research streams with different perspectives on
the relationship between IT capabilities and organizational agility (performance).
According to the first trend, IT capacity is not essential and does not hinder the
company’s agility performance. The other view is that IT capabilities contribute
to strengthening the company’s agility (performance). For the third stream, IT
capabilities contribute to improving the company’s agility (performance), but
under certain limited conditions and circumstances. This doctoral book will pro-
vide additional research resources related to the third stream.
the reduced interaction between the company and IT; (flat Business-IT alignment)
moreover, differences between Top Management and IT managers regarding the
importance of IT and the appropriate time for new technology adoption.
IT infrastructure and application complexity prevents the rapid development
and deployment of new systems to support business agility.
Which are the role and impact of IT systems’ strategic agility in responding to
uncertain events?
Part 1: Introduction
General Introduction
Chapter II
Chapter I Chapter III
Understanding Agility
Introduction Information
Concept
Systems Evolution
and will implement an agile approach to managing all these aspects. Chapter 6
proposes recommendations on when and how cloud computing is a useful tool
and outlines the limitations of recent studies and future research perspectives. Its
primary objective is to explore how agility influences decision-making to adopt
cloud computing technology, and how the cloud can increase IT agility. A survey
was conducted in the Middle East and North Africa region covering medium and
large organization from the manufacturing and service industries.
Finally, we discuss the key findings of this book, the limitations, the contribu-
tions to the academic and the business world and some recommendations for
future research.
Chapter 2
Abstract
Manufacturers have experienced many stages of evolution and paradigm
shift. The paradigm shifts from crafts to mass production, then to lean pro-
duction, and finally to agile manufacturing (AM). Agility will reduce the
time to market for appropriate products and services. Twenty-first century
companies must meet a demanding customer base that will increasingly seek
high quality, low-cost products adapted to their specific and continually
evolving needs. It is time for companies to compete, and “push the bounda-
ries” in response to delivery, product quality, and overall excellence in cus-
tomer service and satisfaction. For addressing these challenges, a new way
to manage businesses was proposed called “Agility,” AM is defined as the
ability to survive in a competitive environment characterized by the con-
tinual and unpredictable changes, by responding effectively to the changing
markets with products and services designed by the customer. This chapter
presents a review of research related to the agility concept through an analy-
sis of the variously proposed studies. This analysis was conducted based on
a meta-model of three words (Agility, Management, and Organization).
2.1 Introduction
Numerous studies have suggested an explanation of the agility concept; they
define agility as the ability to operate and compete in a continuous and dynamic
change context. The Advanced Research Programs Agency and the Agility Forum
define agility as
Agility, lean, and flexibility are strategic organizational philosophies that have
attracted researchers’ attention recently.
According to these definitions, the Lean and flexibility concepts are a part of
agility scope; other researches argue that they constitute distinct and separable
philosophies. Also, numerous academic and practical studies have treated flexibil-
ity and lean of manufacturing, providing specific elements and definitions with
analytical models to assign it (Evans, 1991; Narain, Yadav, Sarkis, & Cordeiro,
2000; Upton, 1994). Lean Manufacturing is the result of various practices. First,
it was presented by researchers at the Massachusetts Institute of Technology as
part of a fundamental study of international practices in the automotive industry
(Womack, Womack, Jones, & Roos, 1990). Links and roles between agility, flex-
ibility, and lean can provide a partial agility definition. To respond to Industry
requirements for agility appeared firstly in the report of the twenty-first Century
Manufacturing Enterprise Strategy (Nagel & Dove, 1991).
Agility includes four main dimensions: inputs, outputs, external influences, and
internal operations (Goldman & Nagel, 1993; Yusuf, Sarhadi, & Gunasekaran, 1999):
For Dove (1995), agility factors emerge through the relationships between
organizational entities. These factors include the relationship between opportun-
istic customers and adaptable producers, known as opportunity management.
Another critical factor for environmental uncertainty is the relationship between
flexible producers and the relentless technology defined as innovation management.
actively developed in the United States between the nineteenth and twentieth
centuries – following the discovery of the steam engine developed at the end of the
seventeenth century (Boyer, 2004). This phase recognizes growth amplified with
the advent of Taylorism and Henry Ford’s assembly lines, which was the moment
when “all-purpose” products left the production line at full speed, thus respond-
ing to increasingly intense consumer demands. The latest is Lean Manufacturing,
which is developed in Japan, and it was not until the late 1990s that it was accepted
as a viable production alternative (Hormozi, 2001), although Boyer (2004) situates
the development of Lean as early as 1945. Lean manufacturing attempts to use
the benefits of mass production in conjunction with just in time (JIT) principles
and waste disposal to minimize the total cost of producing a product (Hormozi,
2001). The latter paradigm is therefore characterized by large quantities produced
and more varieties of products than those offered by mass production (Hormozi,
2001). Fig. 2 provides a synopsis of the development of these three paradigms.
With each paradigm shift in production methods, pro-active countries toward
these significant changes have reaped the benefits of their market leadership
(Hormozi, 2001). For example, North America and Europe’s inability to adopt
Lean to compete in the 1980s cost them valuable profits and market shares in
some vital industries. Examples include the automobile, metal industry, consumer
electronics, and household appliances (Boyer, 2004). They have tried to beat their
competitors with massive investments in automation, often generating very costly
failures (Hormozi, 2001).
Based on this observation, many researchers and practitioners gathered in the
United States in 1991 to propose a new production method, AM (Nagel & Dove,
1991). Since 1991, many authors have taken this shift by proposing the bases of this
new paradigm, or simply by admitting it (Bottani, 2009; Brown & Bessant, 2003;
Goldman & Nagel, 1993; Gunasekaran, 1999; Gunasekaran & Yusuf, 2002;
Hormozi, 2001; Ramasesh et al., 2001; Ren, Yusuf, & Burns, 2003; Sharifi &
Zhang, 1999; Tidd & Bessant, 1997; Yusuf, Gunasekaran, Adeleye, & Sivayoga-
nathan, 2004; Yusuf & Schmidt, 2013; Zhang & Sharifi, 2000). However, while
the literature has been massively oriented toward the acceptance of a new para-
digm, two articles temper this evolution. Indeed, for Vázquez-Bustelo, Avella,
and Fernández (2007), AM is not fundamentally different from previous produc-
tion paradigms and models. While Lean manufacturing has been perceived as an
improvement of the mass production model, Vázquez-Bustelo et al (2007) argue,
however, that AM breaks with the mass model due to the production of highly
customized products and its focus on operational proactivity rather than reactiv-
ity. For Sarkis (2001), agility seems to be a paradigm at the meta-paradigm level.
DevOps
2007
Agile
Manifesto TOYOTA
Scrum 2001
CRAFT KATA
1995 PRODUCTI INDUSTRY 2001
MASS ON 4.0
Befor 2011
PRODUCTI
ON 18Centry
19th-20th LEAN -JIT
END OF 20
Centry Centry
Strategic Information System Agility
While economies of scale and the permanent quest for maximum efficiency
regarding production capacity constitute a rule for organizations to generate
profits, this mode of production creates rigid capabilities that lead to difficul-
ties in reconfiguring plants. This rigidity will gradually become a constraint to
changing production methods, particularly in Japan with Lean. Indeed, since the
early 1980s, organizations have considered the search for flexibility in production,
waste disposal, time reduction, and production cycles as priorities.
The economic and marketplace conditions have led to an increase in the vari-
ety of products and services required. Due to this phenomenon, markets appear,
change, and disappear at an alarming rate (Goldman & Nagel, 1993). These
changes need organizations to maintain productivity and cost improvement while
monitoring emerging demands and being able to re-engineer the production sys-
tem’s organization (McCarthy & Tsinopoulos, 2003) rapidly.
Thus, production has become more than just a transformation of primary
materials into marketable products. It is about a transformation of information
(customer needs, design data, data production, etc.), geographical transforma-
tion (“logistics”), and availability transformation (“stock and deadline control”).
Indeed, manufacturing is today the process of transforming an idea into a physi-
cal and desirable product (McCarthy & Tsinopoulos, 2003).
The concept of AM is first appeared in the Lehigh University report
entitled “21st Century Manufacturing Enterprise Strategy”: An Industry-Led
View (Nagel & Dove, 1991), then several articles of different types (research and
popularization) were published to develop the concept or accept it (Gunasekaran,
1999; Gunasekaran & Yusuf, 2002; Sharifi & Zhang, 1999; Zhang & Sharifi, 2000).
In summary, manufacturing systems are complex adaptive systems, whose con-
figurations have evolved through different modes such as artisanal production, mass
production, lean manufacturing, and agile production. Fig. 3 proposes a synopsis of
the changes in the various production methods and their associated characteristics.
Reconfigurable
Flexible
Specialized
Comprehensive
The Lean Manufacturing has been defined by Bamber, Hides, and Sharp
(2000) as a set of principles and practices that aim to eliminate all waste from the
system and is based on the maximum use of resources by focusing on the reduc-
tion or elimination of waste and activities without added value in the system
(Bamber, Hides et al., 2000) in a study on reducing lean meat consumption.
Many manufacturing players have promoted Japanese manufacturing meth-
ods such as JIT, Kaizen, Total Quality Control, and worker incentives such as
total employee participation have revolutionized the business world (Csillag,
1988; Dertouzos, Lester, & Solow, 1989; Willmott, 1994). However, Womack
et al. (1990) have shown that, based on research on Japanese manufacturing
firms, it is clear that the Japanese production paradigm did not happen overnight.
Other researchers in the manufacturing field (Bicheno, 1994; Cheng & Podolsky,
1996; Cusumano, 1994) go so far as to assert that the gradual transition between
extreme. Tayloristic mindsets in planning material requirements and inspecting
buffered systems, a lean manufacturing system structured according to tasks, con-
tinuous improvement, JIT and quality assurance, and the multi-skilled worker
from one production to another could have predicted.
The limitations of lean manufacturing regarding adverse effects, including the
lack of young workers willing to work in factories, excessive product variety, and
extreme pressure on suppliers, were highlighted by Cusumano (1994). Neverthe-
less, Japanese experts (Ohno, 1988) have worked closely with major companies
such as Toyota, acting as pioneers, to develop lean manufacturing. According
to Bicheno (1994), these Japanese experts knew that the organizations should
satisfy the JIT, Total Quality (TQ), and Team Involvement (TI) (Sharp, Irani,
& Desai, 1999) to become a world-class factory manufacturing. The trilogy
is presented in Fig. 4. Where we can see that beyond factory production, a
16 Strategic Information System Agility
THE TRILOGY
LEAN
MANUFACTURING
JIT
Distribution
Supply
TQ TEAMS
MANUFACTURING
COSTUMER
support structure are key elements of QM. The model also incorporates the
concept of three total quality principles: total participation, process improve-
ment, and customer focus, which are universally recognized as catalysts for TQM
and are discussed in the literature (Crosby, 1979; Deming, 2000; Ishikawa, 1985;
Juran, 1986; Xiao, Ford, & Feigenbaum, 2013).
Fig. 5 provides a quality management framework that requires responsible
managers and effective leadership, values, attitudes, and behaviors that support
quality policy, communication, teamwork, recognition, internships, and training
to implement quality management.
This results from the leadership process, and as Revans (1983) said: “There is
no learning without action and no action without learning.” This could provide
the argument that learning and change are synonymous. Ho (1999b) discusses
in more detail that if learning has been successful, organizational behavior will
be taken to a dynamic and challenging level, which will give the organization a
culture of continuous improvement.
The concept of continuous improvement is an example of what strategy theo-
rists have called “dynamic capacity” (Teece & Pisano, 1994). In their paper, Tidd
and Bessant (1997) suggest that dynamic capacity through continuous improve-
ment (the advantage of innovation) over price alone is no longer a viable strategy
for most companies and, therefore, Meredith and Francis (2000) have suggested
that “competitive advantage is increasingly based on a dynamic ability to be com-
petitive, in an environment of frequent difficult, and often unpredictable change.”
Also, have a capacity to learning provides mechanisms for a high organizational
proportion, participates in its innovation, and adapts to processes supporting
competitiveness.
Numerous authors consider the ability and capacity of an organization to
successfully foster and manage change through innovation and continuous learn-
ing to be a significant strategic advantage. For example, Bessant and Francis
(1999) explained that when a large proportion of an organization engages in
learning and innovation processes:
Also, Sharp et al. (1999) and Castka et al. (1991) discussed participation in
the change process as a factor in reducing resistance to change and improvement,
indicating a strong link between learning and innovation participation and suc-
cessful organizational change.
Rattner and Reid (1994) presented the development of increased global com-
petition as the primary responsibility for developing a new production manage-
ment approach that integrates agility into work processes (Rattner & Reid, 1994).
Therefore, Skinner (1969) had already led the way in 1969 by considering that
a manufacturing strategy should be the primary driver of a competitive busi-
ness strategy and that it was the missing link in the business improvement efforts
of many organizations. As mentioned in the previous paragraph, the underlying
trend toward perceived change has laid the foundations for the emergence of a
new commercial era beyond traditional sectors such as mass production, world-
class manufacturing principles, and lean manufacturing.
20 Strategic Information System Agility
In their paper, Hooper and Steeple (1997) draw the structure of AM and its inter-
relationship with other manufacturing methodologies and, like Fig. 8 of the Agility
Forum framework, suggest that AM should be considered as a general expression
22 Strategic Information System Agility
that encompasses the integration of several diverse systems, technologies, and phi-
losophies. The structure of AM is a customer-focused manufacturing model and
is broadly similar to the TQM; however, the concept of virtual enterprises and
decentralized organization are elements. In their paper (Hooper & Steeple, 1997),
researchers provide a model structure, for agile enterprise Fig. 9, which seems insuf-
ficient as a framework for entrepreneurial activity since the search for opportunities
in new markets is not represented. However, it is taken into account in the model of
the agility, Fig. 8 as involved enabling subsystems.
For an organization, continuous awareness of the operating environment
is required to assess the business’s potential risk, as demonstrated by the agile
business framework illustrated by Dove (1995) and presented in Fig. 9. In
this context, Meredith and Francis (2000) discussed the need for a thorough
environmental scan, which organizations need to identify market opportunities.
According to Kidd (1996), the fundamental resource of an agile enterprise is
“knowledge” and, like the main dimension of the agility of the American agile
forum, the “mobilization of human resources through knowledge and informa-
tion,” he suggests, if people and knowledge are exploited.
Understanding Agility Concept 23
Customer wants
and needs
Supplier
Flexible
Human Resource
Decentralization
Organization Competitors
Customer
Solutions
Fig. 9. AM Structure.
In its report, Kidd (1996) suggested that AM can be considered as the integra-
tion organization, highly qualified, and knowledgeable personnel and advanced
technologies to achieve cooperation and innovation in response to the need to
provide customers with high quality customized products. This concept is cen-
tral to his book “Agile Manufacturing: Forging New Frontiers” and is illustrated
in Fig. 10. Therefore (Kidd, 1995), each organization must develop a method-
ology to integrate the organization, staff, and technology to enable these three
primary resources to adapt through a coordinated and interdependent system.
Fig. 11 shows the structure of an AM Enterprise.
A new manufacturing paradigm, known as “agility,” has been proposed as a
winning concept through which companies maintain their competitive advantage
into this new era. Agility concept includes two factors:
24 Strategic Information System Agility
Agile
Lean
Mass
Craft
Lean Agility
Craft Skills
There are many unities between lean and agility, such as the effective best prac-
tice use of tools and techniques, to improve the company’s effectiveness and effi-
ciency, as shown in Fig. 12.
Initially, agility focuses on economies of scope rather than economies of scale
(Dove, 2002). Lean operations are generally associated with the efficient use of
resources. The concept expresses an effective response to a changing environment
while being productive. Agile organizations are not just able to implement changes,
but also react to premeditate and unforeseen environmental events in just time.
kata requires the creation of a structure for the quotidian and habitual practice of
enhancement work, because it is the daily practice that improves results. The con-
tinuous cycle of establishing target future states, setting weekly goals and improv-
ing daily work is what has driven Toyota’s improvement (Soltero & Boutier, 2017).
Summary
Today, changes are faster than ever. Turbulence and uncertainty in the business
environment have become the primary cause of manufacturing industry failures
(Small & Downey, 1996). The perception of a need for change to initiate the emer-
gence toward a new commercial era goes beyond traditional sectors (mass pro-
duction and lean manufacturing) (Dove, 1991). A new manufacturing paradigm,
known as “agility,” has been proposed as a strategy to maintain a competitive
advantage in this era. The paradigm expresses the organization’s ability to cope
with crisis times, unexpected changes, survive to modern environmental threats,
and take advantage of change as opportunities (Goldman et al., 1995).
The concept of agility has emerged from the flexibility and lean manufacturing
(Dove, 2002; Kidd, 1995) and was adopted by software organizations in the form
of agile system development (Aoyama, 1998; Beck et al., 2001). Until emerging as
a key function of information systems.
Industry 4.0 is an inevitable revolution covering a wide range of innovative
technologies such as cyber-physical systems, Radio Frequency IDentification
(RFID) technologies, IoT, cloud computing, big data analytics, and advanced
robotics. The Industry 4.0 paradigm is transforming business in many industries;
for example automotive, logistics, aerospace, defense, and energy sectors. A grow-
ing amount of academic research is focusing on Industry 4.0 technologies and
implementation issues (Frank, Dalenogare, & Ayala, 2019; Ghobakhloo, 2018).
Industry 4.0 enables real-time planning and control, allowing companies to be flex-
ible and agile in responding to rapidly changing conditions; for example reducing
planning cycles and frozen periods by faster reacting to changes in demand, sup-
ply, and prices (Oztemel & Gursev, 2020). Business analytics approaches provide
the capability of predicting future events and patterns such as customer behavior,
delivery time, and manufacturing output. Real-time delivery routing and tracking
also enables organization’s flexibility, efficiency, and agility (Barreto, Amaral, &
Pereira, 2017; Cui, Kara, & Chan, 2020).
In Chapter 3, we discuss the development of information systems until intro-
ducing the agility concept.
This page intentionally left blank
Chapter 3
Abstract
This chapter presents an analysis illustrating the evolution of information
systems’ development based on three interdependent phases. In the first
period, information systems were mainly considered as a strictly technical dis-
cipline. Information technology (IT) was used to automate manual processes;
each application was treated as a separate entity with the overall objective of
leveraging IT to increase productivity and efficiency, primarily in an organiza-
tional context. Secondly, the introduction of networking capabilities and per-
sonal computers (instead of fictitious terminals) has laid the foundations for
a new and broader use of information technologies while paving the way for a
transition from technology to its actual use. During the second phase, typical
applications were intended to support professional work, while many systems
became highly integrated. The most significant change introduced during the
third era was the World Wide Web, which transcended the boundaries of the
Internet and the conventional limits of IT use. Since then, applications have
become an integral part of business strategies while creating new opportu-
nities for alliances and collaborations. Across organizational and national
boundaries, this step saw a transformation of IT in the background. These
new ready-to-use applications are designed to help end-users in their daily
activities. The end-user experience has become an essential design factor.
3.1 Introduction
First generation information systems were mainly considered as a strictly technical
discipline. To automate existing manual processes, each application is considered
a separate entity, and its use aims to increase organizational productivity and effi-
ciency. As a result, the primary efforts of IT professionals have been to develop new
methods for modeling organizational information; hence, database management
was the “killer application” (Chen, 1976; Halpin, 2001). Also, the possibility of
networking and advent of personal computers (instead of terminals) has provided
the cornerstone for a new and broader use of information technology (IT), which
promotes a transition in the use of technology and its use. However, the second
phase’s conceptual challenge was to manage the information rather than merely
collect it and store it in a central database. (Aiken, Liu Sheng, & Vogel, 1991; Batra,
Hoffer, & Bostrom, 1988; Dennis, George, Jessup, Nunamaker, Jr, & Vogel, 1988;
Drucker, 1995; Gallupe, DeSanctis, & Dickson, 1988; Olson, 1985; Zwass, 1992).
The designation of the services reflected this commitment to support management
rather than office work: most IT services became management services and were
coordinated by IT system managers (Couger, Zawacki, & Oppermann, 1979).
However, during this period, the most of Information System (IS) activities
focused primarily on data management, with little attention to information man-
agement needs (Goodhue, Quillard, & Rockart, 1988; Senn, 1978).
Since the 1980s to the early 1990s, research has focused more on identifying
relevant IT applications, which has led to new applications, supported through
generic system types, in data processing systems and management information
system (MIS). CIOs realized that it is possible to effectively leverage the advanced
information content of MIS applications in support of top management’s deci-
sion-making processes. Thus, during the second phase, a new concept was devel-
oped, including decision support systems (Kasper, 1996), expert systems (Yoon,
Guimaraes, & O’Neal, 1995), data warehousing (Chenoweth, Corral, & Demir-
kan, 2006), intelligent system (Gregor & Benbasat, 1999), knowledge manage-
ment systems (Alavi & Leidner, 2001), and executive information systems (Walls,
Widmeyer, & El Sawy, 1992).
The management services were renamed information systems’ services. The
primary objective of which was to make information accessible to all departments
of the organization. Issues of inter-connectivity, scalability, and reliability of the
information system have become essential. Also, enterprise resource planning
(ERP) software is emerging with an exponential increase in installations in large
organizations (Beatty & Smith, 1987; Hayes, Hunton, & Reck, 2001; Scheer &
Habermann, 2000; Sharif, Irani, & Love, 2005).
In the third phase, the most critical change introduced was the emergence of
global networks and the World Wide Web, which have overcome the traditional
limitations of IT use.
Since then, applications have become an integral part of business strategies
and created new opportunities to develop alliances and collaborations beyond
organizational and national boundaries (Lyytinen & Rose, 2003; Walters, 2001).
Many researchers perceive Internet computing as a significant computer revo-
lution that has changed previous computer concepts (Isakowitz, Stohr, & Balasu-
bramanian, 1995), in different ways, mainly how a computer service is developed
and compiled. A new concept marked this phase: the “digital enterprise” (Bauer,
Poirier, Lapide, & Bermudez, 2001).
The Internet has enabled new digital relationships to be established through
inter-organizational systems, taking advantage of e-commerce and e-business
trends (Allen, 2003; Daniel & White, 2005; Shore, 2006), electronic markets
(Albrecht, Dean, & Hansen, 2005; Bakos et al., 2005), new application services
and Customer Relationship Management (CRM), other services (Currie, Mcco-
nnell, Parr, McClean, & Khan, 2014; Ma, Pearson, & Tadisina, 2005; Susarla,
Barua, & Whinston, 2006). The Internet has allowed the emergence of new
Information System Evolution 31
Competitiveness
Politics Technologies
Demand-
Groupings of
Customers
Interests
Others
INFORMATION
Partners Banks
Third-Party
Supplier
• Monitoring and decision-making
information system. Project-
• Piloting information system teams
• operational information system
Fig. 14. Systemic View of the Company and the Environment. Source: Galliers
(2006).
Information System Evolution 33
People Information
(Users and acquisition
specialists)
Data Information
(Knowledge, models) storage
Information
Systems
Materials Information
(Support, Machines) processing
Procedures and
Information
Softwares
sharing
(Programs and
methods)
Rather than being wiring that passes data between different locations, the
information system represents an effective way of connecting people. It capital-
izes collective knowledge, actively structures the organization and management,
and ensures the availability of relevant information where and when it is needed
while ensuring the company’s responsiveness and its communication with the
environment (markets, partners, etc.).
The objective of the information system is to allow the decision-maker to have
information that will enable them to decide a suitable action at the right time
(Dove, 1995; van Grembergen & De Haes, 2009a; Zhang & Sharifi, 2000).
There are various definitions related to the information system: an informa-
tion system consists, at least, of a person of a given psychological type who faces
a problem in an organized context for which he needs evidence to arrive at a solu-
tion, where a presentation method makes the proof available. It determines the
main variables of a MIS (Mason & Mitroff, 1973).
According to Dove (1995), Van Grembergen and De Haes (2009a), and Zhang
and Sharifi (2000), an Information system is an organized set of resources:
Decision-making
system
Decision information
memorized be memorized
Information Systems
Representation of information
Information
to be
memorized Information
saved
Operating System
Enterprise
application
Resource
context
1
*
Human * *
Resources
Application Component Decomposes
Hardware
* *
manipulates
Resource provides Manipulation
Software * *
Functionality Data
Resources
Distribution
Proxy servicess
Heterogeneity
The three attributes are mutually perpendicular to each other in the sense that they
constitute the application’s independent dimensions. Each of these characteristics can
create specific problems to make different applications work together. The objective
is to manage these dimensions in order to increase the capacity of applications. To
these three dimensions, some authors such as Hasselbring (2000) have added another
dimension called dynamism, because applications can evolve according to the evolu-
tions and changes that occur in place in their environment, as shown in Fig. 18.
3.6 Autonomy
An organizational application is autonomous, when it is possible to design and
execute it independently. In the context of databases, Hasselbring (2000) proposes
a classification of autonomy notion by defining several aspects of this concept:
Information System Evolution 37
3.7 Distribution
The second characteristic of enterprise applications is the distribution, which
refers to the fact that applications are often physically distributed over the enter-
prise network. This is achieved by distributing the data and/or processing in such
a way that specific data and/or processing in the information system can be imple-
mented at the local level.
Among the techniques most often used to enable application, distribution is based
on the implementation of middleware such as CORBA (Group, 1997), Java/RMI
(Newcomer, 2002; Vaughan-Nichols, 2002), and MOM (Hohpe & Woolf, 2004).
3.8 Heterogeneity
The heterogeneity is an aspect inherent in the fact that enterprise applications can
be developed and deployed independently and according to different approaches
and methodologies. There are several reasons why heterogeneity can occur at dif-
ferent levels, and three primary levels of heterogeneity can be distinguished (Wie-
derhold, 1992):
This heterogeneity expresses the fact that the symbolic name of a concept can
be interpreted differently according to the applications considered. These seman-
tic conflicts occur mainly when (1) the same symbolic name covers different
concepts (in this case homonymy) or (2) several symbolic names cover the same
concept (and in this case synonymy).
Semantic problems are a fact in any company. Also, it becomes vital that these con-
flicts are identified and resolved as soon as possible, preferably during the upstream
phases of the project. Many authors (Hasselbring, 2000; Roman et al., 2005) admit
that the heterogeneity of applications is the real challenge in the field of integration.
38 Strategic Information System Agility
3.9 Dynamism
The dynamism of enterprise applications is another feature introduced by Sarkis
(2001). Indeed, as current information systems are open and exposed to frequent
changes in response to strategic, commercial, or technological changes affecting the
company, the applications of these systems should evolve dynamically to cope with
these changes. Dynamism is a dimension that generally manifested in two ways:
⦁⦁ The first aspect concerns the dynamism in the behavior that an application can
display autonomously according to its internal configuration.
⦁⦁ The second aspect concerns the changes that can occur within the application
components of an application, such as the modification of specific compo-
nents, the arrival of new components, the deletion of specific components
considered obsolete, and the temporary lack of some components and the
substitution of some components.
Strategy
Objectives
+
Orientation
+
Resources
Fig. 19. What is the Strategy?
Information System Evolution 39
exist before. It then appears that the IS, first placed at the service of an existing
positioning, then modifies the scope of what is possible and opens the prospect
of a new positioning for managers. The IS has become a new type of asset, and
information asset that the company can value under the same profitability con-
straint as its other assets.
An information system is generally considered a simple support resource for
strategy, whereas it can be a strategic weapon capable of giving a sustainable
competitive advantage to the organization successfully exploiting it (Kumar &
Stylianou, 2014; Swafford, Ghosh, & Murthy, 2008).
It is easy to conclude that there are many components to enable the manufac-
turing company to be digitized from one end to the other.
Robotics are therefore used for manufacturing activities, but also sometimes
elsewhere. The Internet of Things (IoT) is also in place to ensure communication
between heterogeneous objects.
The company may also have an ERP System and a CRM to manage customer
relations.
Dashboards are set up to allow the company to monitor its main KPIs (Key
Performance Indicators) constantly.
We also talk about mobility. Mobile devices are used in many of the company’s
processes.
The use of cloud-hosted services is also required for several activities. Gone are
the days when the company had to have an infrastructure with several local servers.
The flexibility brought to new digital technologies allows us to put the cus-
tomer back at the heart of the information system. It is a form of return to crafts-
manship thanks to p ersonalized services, combined with lower costs and
quality made possible by automation. The whole relationship between the indus-
try and its ecosystem is rethought. The digital factory thus makes it possible to
imagine new products collaboratively thanks to new processes and materials in a
close relationship with customers and suppliers. It also links R&D and design,
operators, and support services.
Company information systems thus benefit from rapid implementation, low
costs, and better information circulation at all levels of the company. Specific
products can be manufactured and customized much more efficiently than mass
production. Machines, products, and systems can be configured, optimized, and
controlled independently of each other. Small Medium Enterprises (SMEs) can
thus break free from the limitations of a small factory by taking advantage of
processes and material flows more quickly and efficiently.
with a trajectory of the evolution of the information system toward its progres-
sive overhaul. The renovation of information systems tends toward the addition of
devices that promote agility. It is necessary to be able to modify systems more quickly
and more reliably in order to take into account business and technical developments
(Valentine, 2016).
To achieve quality objectives and ensure the continuous improvement of the
enterprise information system, the company must be managed according to a
governance framework based on a set of good practices and standards combined
with agile practices.
A comprehensive enterprise information system program should include IT
governance. IT governance is the primary means by which stakeholders can
ensure that IT investments create business value and contribute to the achieve-
ment of business objectives. This strategic alignment of IT with business is both
challenging and essential. IT governance programs go further and aim to improve
IT performance and deliver optimal business value while meeting regulatory com-
pliance requirements (Benaroch & Chernobai, 2017).
While the CIO is generally responsible for the implementation of IT govern-
ance, the CEO and Board of Directors must receive reports and updates to fulfil
their IT governance responsibilities and to ensure that the program is working
well and delivering business benefits (Turel & Bart, 2014).
In recent decades, board members have generally not been involved in oversee-
ing IT governance. Computer science was a mysterious and frightening art, and
they did not want to dive in and get shot down by a smart-alec technology genius.
However, today, it is a critical and inevitable responsibility, and frameworks have
been put in place to manage IT efforts.
Several IT governance frameworks can guide the implementation of an IT
governance program. Although frameworks and guidelines such as CobiT, ITIL,
ValIT, and ISO 38500 (Simonsson & Johnson, 2006) have widely adopted, there
is no comprehensive standard IT governance framework; the combination that
works best for an organization depends on business factors, corporate culture, IT
maturity, and staffing capacity. The level of implementation of these frameworks
will also vary by organization.
IT governance is a relatively new term, first coming into general use in the late
1990s (Hansen-Magnusson, 2010). Until about 2009, definitions of IT governance
tended to primarily focus on creating the right settings for the effective internal
management of technological infrastructure and IT department (Ali & Green,
2012; Weill & Ross, 2004; Xue, Liang, & Boulton, 2008). IT departments were
expected to deal with a multitude of different issues, including rapid technological
change over a brief period. “Boards needed little or no understanding of technical
issues because the technology was simply a tool to implement a strategy” (Carter
& Lorsch, 2004). Thus the role of IT governance originally had an internal and
primarily operational focus. From around 2003, however, a growing range of
scholars began to consider IT governance as deserving board attention (Cater-
Steel, 2009). Perhaps awareness of the need to distinguish between governance
and management arose because “new technologies are themselves creating strate-
gic choice for businesses worldwide” (Carter & Lorsch, 2004). Others brought the
44 Strategic Information System Agility
Levels
Rights
Structures Legal Regulatory
Socio-Cultural
Technological
Environmental
Accountability
Direction
Setting
Management
Performance
Transformation
Management
Process
Market Maturity
Dimension Definition
Structures This dimension is concerned with the planning and
organizational elements outlined in the high-level governance
strategy of organizations. Four main governance structures are
included, namely: rights, accountability, configuration,
and levels
Processes Processes refer to the tools used for the control and evaluation
of IT governance. There are eight core elements in the processes
dimension, as displayed in Fig. 20, that organizations should
enact for effective IT governance. Processes are fundamental
elements of IT governance frameworks
Relational Relational mechanisms refer to the internal and external
mechanisms relationship management required to ensure the successful
implementation of IT governance. Three relational mechanisms
are identified, namely: network, hierarchy, and market
Timing The timing dimension addresses the temporal aspects associated
with IT governance implementation, namely: maturity, life cycle,
and rate of change
External Different external influences shape the mix of mechanisms
influences used by organizations and should be taken into consideration
when implementing IT governance. The external influences
include organizational, competitive, economic, political, legal or
regulatory, sociocultural, technological, and environmental factors
3.14.1 COBIT
The Information Systems’ Audit and Control Association (ISACA) and the ITGI
have founded COBIT in 1992. The first edition of COBIT was published in 1996,
and the fifth and latest edition was published in April 2012. The framework has
grown to be, and still is, one of the most significant global frameworks for IT
governance (Omari, Barnes, & Pitman, 2012). COBIT was initially built as an IT
audit guideline (ISACA, 2012), because the framework contained a comprehen-
sive set of guidelines to improve audit and compliance, provided detailed guid-
ance on governance practices, and offered auditors several customized checklists
for various aspects of controls assessment (Hiererra, 2012). These aspects make
COBIT a perfect framework for establishing control over IT, facilitating perfor-
mance measurement of IT processes, and allowing executives to bridge the gap
between control requirements, technical issues, and business risks (Brustbauer,
2016). Also, COBIT has significant business value in terms of increased com-
pliance, corporate risk reduction, and proper accountability, and is proven to
be a useful tool to establish a baseline for process maturity (Wang et al., 2011).
Moreover, the framework is growing to be universally applicable due to its full
implementation as an IT governance framework (Ribeiro & Gomes, 2009; van
Grembergen & de Haes, 2009).
From an IT governance perspective, the primary objective of COBIT is to
enable value creation through ensuring benefits are realized, risk reduced, and
resources optimized. It is also proclaimed to provide business stakeholders with
an IT governance model that improves the management of risks associated with
IT and leverages a top-down structure to ensure systematic management of
the detailed processes to achieve proper IT governance (Von Solms, 2005). The
COBIT framework is considered to be a generic, comprehensive, independent,
and large body of knowledge designed to measure the maturity of IT processes
within organizations of all sizes, whether commercial, not-for-profit, or in the
public sector (Elhasnaoui, Medromi, Chakir, & Sayouti, 2015; Wang et al., 2011).
48 Strategic Information System Agility
The COBIT 5 domains are broken into 37 high-level IT processes, and over
300 detailed IT controls covering aspects of IT management and governance
(ISACA, 2012). Another distinctive feature within COBIT lies in its ability to
identify seven categories of enablers (or factors):
⦁⦁ information;
⦁⦁ services, infrastructure, and applications; and
⦁⦁ availability.
⦁⦁ The introduction of new concepts such as focus areas and design factors allows
the company to propose good practices to adopt a governance system to its needs.
⦁⦁ Updating the alignment with standards, frameworks, and best practices
improve the relevance of COBIT.
⦁⦁ An open-source model will allow the global governance community to con-
tribute to future updates by providing feedback, sharing applications, and
50 Strategic Information System Agility
ITIL Foundation introduces some key concepts that are important for a good
understanding of the framework. These concepts include standard terms such
as service providers, stakeholders, and risks. Nevertheless, new concepts are also
emerging.
ITIL 4 does not focus on service delivery, as was the case in version 3, but
rather on value creation. It is not up to the service provider alone to provide
this value. Instead, it is a co-creation, the result of a partnership with the cus-
tomer. This version does not aim at respecting processes, but rather at pursu-
ing objectives: outcomes and improved customer experience as one of the main
objectives.
⦁⦁ Focus on Value: everything the organization does must, in some way, provide
value to customers or other stakeholders.
⦁⦁ Start Where You Are: when an organization wants to improve something, it
should not eliminate all current methods, but should keep the good things and
change what does not work.
⦁⦁ Progress Iteratively With Feedback: The organization should implement
improvement processes in small steps, even if they are large projects. Immedi-
ately evaluate each step and start over where necessary.
⦁⦁ Collaborate and Promote Visibility: The organization must work closely with
other parties such as customers and suppliers to promote its visibility.
⦁⦁ Think and work Holistically: Do not think of the IT organization as an island,
but as part of a network where the sum of all parts creates value for customers.
⦁⦁ Keep it Simple and Practical: The organization must ensure that its work and
processes remain as simple as possible and remove any steps that do not pro-
vide value.
⦁⦁ Optimize and Automate: Whenever possible, optimize or automate tasks,
unless it means higher costs or a poorer customer experience.
⦁⦁ The underlying ITIL Service Management processes remain – but are now
called “practices.”
⦁⦁ The underlying processes from Release 3, such as Incident Management, Service
Level Management, and Capacity Management, remain fundamentally unchanged.
However, the 26 processes of v3 are replaced by the 34 practices of ITIL 4.
Why practices? Because ITIL 4 not only describes how a process works, but also,
for example, for each of the practices, looks in more detail at the skills the team needs,
how they can work with the suppliers and the technology that can be used to do this.
ITIL itself has become more agile. This can be seen mainly in the seven guid-
ing principles. The emphasis on value generation, improvement in small steps, the
importance of process simplicity, etc., is all part of this. There is a clear percep-
tion of agile thinking. These agile ITIL guidelines also facilitate collaboration
with agile teams. To demonstrate that version 4 is adapted to the agile philosophy,
Axelos recently published a case study of Spotify, which is known to be one of
the most agile companies.
However, this version does not provide a complete answer to the agile, lean and
DevOps aspects. Admittedly, Foundation mentions the terms agile and DevOps.
There are few concrete solutions on the possibilities of combining ITIL with
more agile methods. Example: how should a helpdesk that has to comply with
strict service level agreements collaborate with an agile back office team? How do
IT Ops and DevOps work best together?
54 Strategic Information System Agility
3.14.4 CMMI
The CMMI is a model for assessing the level of maturity of an organization’s
systems, product and/or software development. Its objective is to control engi-
neering processes and consequently, the quality of the products and services
resulting from these processes. It provides a reference for best practices in soft-
ware development.
The CMMI is an extension of the CMM (Capability Maturity Model), pre-
sented by the SEI (Software Engineering Institute) in the 1980s.
At the US Department of Defense (DoD) request, the SEI developed a set of
criteria to determine whether a project would be completed on time, on budget,
and to specifications.
In 2001, the SEI created a new version of the CMM, incorporating all the
advances of other models that had emerged to fill specific gaps in the CMM.
The latest version of the CMMI (version 2.0) was released in 2018. It allows the
model to be applied to the development of hardware, software, and services in all
industries.
CMMI proposes a set of objectives aimed at guaranteeing the quality of
projects (Ramírez-Mora, Oktaba, & Patlán Pérez, 2020). It is accompanied by
a repository of good practices expected to achieve these objectives. CMMI pro-
vides a framework for the definition of the organization’s key processes, including
project management (planning, resource management, risk management, etc.),
engineering (requirements management, technical solutions, product integration,
etc.), and support (configuration management, quality assurance, measurement,
analysis, etc.). It is a tool to help define and improve processes.
The need to implement a CMMI model in an organization arises when the
company detects recurring problems such as late deliveries, budget overruns, cus-
tomer dissatisfaction, and lack of management visibility.
CMMI, therefore, aims to:
⦁⦁ improve the quality of the delivered product and the productivity of the project;
⦁⦁ increase customer satisfaction by better meeting their requirements;
⦁⦁ reduce costs and meet deadlines; and
⦁⦁ give better visibility to management and allow better risk management.
The good practices recommended by the model are grouped into 25 key pro-
cesses (Process Area), themselves grouped into five levels of maturity/capacity:
Level 1: Initial. Every organization defaults to level 1. Project management is
not defined within the organization. Effectiveness relies on the skills and motiva-
tion of individuals. No control is carried out.
The project can succeed but with cost and time overruns. Success factors are
not identified, and the project does not build on experience.
Level 2: Managed. Project management is defined at the organization level
and is applied by default to all projects. All projects meet the CMMI level 2 mod-
el’s objectives with the processes proposed by the organization, or by default with
processes defined at the project level. The project builds on what has been done
previously, thanks to better discipline. Successes are repeatable.
Information System Evolution 55
3.15 Urbanization
The dynamism of enterprise applications is another feature introduced by Singh
et al. (2005). Indeed, since current information systems are open and subject
to frequent changes in response to strategic, business, or technological changes
affecting the company, the applications of these systems must then be able to
evolve dynamically to cope with these changes.
As illustrated in Fig. 22, based on Izza and Imache (2010) proposes an urbani-
zation approach, in which Urbanization contributes to the various dimensions of
the EIS.
The design of the EIS, considering their interactions, and the alignment pro-
cess will be implemented according to the governance guidelines defined by the
company’s strategy. Thus, the approach to urbanization and alignment is first
from top to bottom (analysis and strategic design), and then from bottom to
top (execution and validation), which will increase EIS flexibility and alignment,
enhancing its agility.
Through the urbanization process, the architecture of the EIS can be struc-
tured more efficiently. In this regard, the rules of urbanization and rules of good
practice are used, which lead to a digressive decomposition of the overall EIS
dimensions: Zone, Neighborhood, and Block.
60 Strategic Information System Agility
IS Strategy
EIS Governance
Urbanization
Fig. 22. EIS Urbanization and Alignment.
3.16 Flexibility
The significant of IT organizational infrastructure capacity as a critical compo-
nent of the organization’s survival and competitiveness continues to grow. Shar-
ing IT infrastructure considered widely as the basis for shared IT capabilities used
to develop IT applications and support business processes (Chung, Rainer Jr, &
Lewis, 2003; Darke, Shanks, & Broadbent, 1998). IT infrastructures are generally
the foundation of shared IT capabilities that enable the development of IT appli-
cations and support business processes (Lim, 2014). According to Zhu (2004),
IT infrastructure as a set of IT organizational resources and capabilities that are
shared across the organization and form the foundation on which IT applications
are developed and business processes are supported. IT infrastructure capabilities
are usually provided by IT/IS (service) organizational functions, but may also
Information System Evolution 61
3.17 Agility
In the field of IS research, the concept of agility is often associated with terms
such as flexibility, dynamic and organic. As previously mentioned, the concepts
of flexibility and agility have been linked to the broader challenge of combining
62 Strategic Information System Agility
Table 3. (Continued)
Table 3. (Continued)
3.17.3 IS Development
In information systems development (ISD), research related to agility has focused
on the use of agile methods. Conceptual research helped to define the key varia-
bles of the research (Lee & Xia, 2005). Developed measurement scales for the two
central components of ISD flexibility: response effectiveness and the effectiveness
of the response. Later, based on an exhaustive review of the use of the concepts
of flexibility, agility, and leanness in business studies, Conboy (2009) defines the
agility of an ISD method as follows:
The continuous readiness of an ISD method to create change quickly or inher-
ently, to adopt it proactively or reactively, and to learn from the change while con-
tributing to the perceived value of the client (economy, quality, and simplicity),
through its common components and its relationship to its environment (Conboy,
2009).
Several case studies then attempted to identify a history of flexibility or agil-
ity in IST. A central book is that companies should follow the principles of the
so-called agile ISD methods (Baskerville & Pries-Heje, 2004; Saonee Sarker &
Suprateek Sarker, 2009)).
However, it was acknowledged that adoption of such methods is a slow learn-
ing process (Berger & Beynon-Davies, 2009; Cao, Mohan, Xu, & Ramesh, 2009;
Wang, Li, Sun, & Yang, 2012). Many other variables, such as the organizational
context, the various attributes of the project, and collective and individual con-
sciousness, define the ability of project teams to effectively deploy agile principles
(Cao et al., 2009; Kalle & Rose, 2003; Ramesh, Singh, & Sharma, 2011; Zheng,
Ng, & Sripanidkulchai, 2011).
66 Strategic Information System Agility
Summary
The company’s master plan, which is a strategic plan designed to pilot IT devel-
opment in the company, by translating its strategy into actions relating to the
information system, has mostly satisfied these needs. However, today, agility has
become a necessary quality, especially in a constantly unstable economic environ-
ment, making it necessary, even indispensable (Conboy, 2009; Imache et al., 2012;
Sharifi & Zhang, 1999; Zhang & Sharifi, 2000).
IT agility has become the primary purpose of any information systems depart-
ment, more than that; it is a quality that any company must have, to meet the cus-
tomers’ needs, face competitiveness challenges, and rapid technological evolution.
Faced with the various transformations and needs of the internal and/or exter-
nal environment, it is essential to structure the EIS to facilitate its evolution and
modify its positioning, structure, and skills, all in harmony with the strategic evo-
lution of its company, while ensuring overall consistency in terms of permanent
IT governance with the global strategy, interoperability, integration, autonomy,
and flexibility. In other words, the EIS must be agile.
Chapter 4
Abstract
In the current era, multiple factors have driven the IS information system
to be able to cope with changes caused by internal and external factors
that affect the organization’s strategy. A variety of environmental factors
can influence organizational capacity and performance and tend to change
organizational strategy, including political, socio-economic, financial, and
technological changes. At the beginning of the twenty-first century, other
changes are expected, such as those associated with cybercrime and artificial
intelligence. In this chapter, the authors discuss the concept of agility, the
dimension of agility, relevant literature studies, proposed agility models, and
the authors propose their conceptual model of strategic agility for IS.
4.1 Introduction
Today, the Department of Information Systems has more than ever the need to
manage better their company’s IT policy, which must not only make it possible to
offer service availability or continuous business improvement but above all offer
competitive advantages linked to the use of information technology. In such a
context, IT Departments must be based on the best approaches and practices
to offer maximum agility to adapt to functional and technical evolutions and to
open up in order to better connect to partners’ processes, while safeguarding and
reusing existing IT assets without calling into question the technologies used for
several years. Within this framework, a new type of information system, a natural
evolution of current systems, will have to be defined and developed and which
must be capable of being recycled over time, of being reconfigured effectively
without generating new difficulties. In our opinion, this is a significant opportu-
nity to define and use a tool-based approach based on a rigorous methodological
approach to guide architects and decision-makers in their process of develop-
ment, redesign, and modernization of corporate information systems.
To cope with the internal and external pressures that the company is under-
going, to control changes with the necessary reactivity, and to reduce costs, it is
Authors Definitions
Goldman, 1995 For the company, agility means being capable of having
a competitive advantage and continually predict the
unpredictable requirements of customers
Zhang and Agility means the capacity of an organization to detect,
Sharifi, 2000 analyze, and understand changes emerged by business
environment, in the aim to face these changes (by changing
its internal and external activities) and to perform
appropriate solutions in fastest time
Helo, 2004 Agility means the capacity of the organization to respond
to a change in a flexible way
Power, 2005 Agility means a combination of market knowledge and
virtual corporation to take advantage of opportunities in a
volatile marketplace
White, Daniel, and Supply chain managers must admit change but still need to
Mohdzain, 2005 improve a strategy that allows them to match supply and
demand at an adequate cost. The capacity to accomplish
this has been named supply chain agility. Information
and more precisely an agile information systems were
recognized as being a critical factor in achieving agility in
the supply chain
Swafford, Ghosh, An organization supply chain agility directly influences its
and Murthy, 2008 capacity to create and deliver innovative products to its
consumers in a brief time and cost with effective manner
Holmqvist and Agility permits organizations to be able to sense and
Pessi, 2006 respond rapidly to unpredictable events and thus satisfy
customer requirement changes. This capability is critical
in today’s business world. New technologies and the new
manners of management of the business are presented
continuously to create or change the global requests
of the market
Lee et al., 2006 The company needs to address the specificities of the sites
covering the activities of the global business. Companies
must have the capacity (that is agility) to develop and
deploy systems quickly to answer to the new business needs
Desouza, 2007 Agility as a result of routines and quotidian practices that
support strategizing between owners, senior management,
and other essential strategy processes participants, such as
managers, consultants, and staff
Braunscheidel and Agility for supply chain is set as the company capability to
Suresh, 2009 more effectively collaborating with distribution partners to
face market changes rapidly
70 Strategic Information System Agility
Table 4. (Continued)
Authors Definitions
Mithas et al., 2011 Postulate that knowledge management and agility are two
important intermediaries that help implemented
Yi, Ngai, and Agility for the supply chain is considered as a basic type of
Moon, 2011 operational capability required for the high performance of
the company
Kryvinska, 2012 The agility supply chain is regarded as a crucial type
of operational ability required for highly company
performance
Sørensen and Defining academic agility as the ability of an academic
Landau, 2015 field to examine quickly and ingeniously environmental
changes in its central academic debate
Liu, Yang, Qu, Nowadays nearly all organizations count on information
and Liu, 2016 systems to operate. Agility in Information systems can be
considered as critical to achieving overall agility in business
Park, El Sawy, A combination of sensing agility, decision-making agility,
and Fiss, 2017 and acting agility
Ravichandran, Agility is a competence that allows firms to adapt to
2018 contingencies posed by the environment
Zhou et al., 2018 The capability to detect and respond to demands
embedded in online customer reviews
Dave and Arthur, Agility can be defined across four dimensions (creating the
2019 future, anticipating opportunities, adapting quickly, and
learning continuously); agility occurs with four stakeholders
(strategy, organization, leader, and individual); and agility
is supported by four human resources (HR) tools (people,
performance, information, and work)
How can firms become agile? How can they acquire the needed capacities?
What exactly are these capacities?
As concerns, the agility concept was increasingly used in union with other
terms such as the flexibility, the adaptability, and the reactivity. Inspired by the
success of the agile methods in the field of the IT programming at the beginning
of the 1990s, the practitioners interpreted the idea of the agile methods used in
programming, an interpretation that still influences the adoption of the agility
concept of many IS professionals.
In the research literature, the concept of agility was attached to the way, which
the system information reacted to face unpredictable changes such as the increase
user’s requirements, the process business changes, the strategic changes, the com-
petitiveness, the organizational structure, the market changes, and the future
changes.
In summary, various facets of agility were underlined by diverse authors who
led to varied points of view. Therefore, the IS agility research was divided into
several sub-domains such as (infrastructure, strategic IS, IT skills of IS profes-
sionals, governance of the IS, IS development methods, and software develop-
ment). Though there is a difference in agility definition in the literature, these
definitions are not opposite. However, the disadvantage is related to the lack of
the global view of IS agility, lack of theoretical clarity, and conceptual parsimony
in a different IS agile research areas, as shown in Fig. 23.
Strategy
Changes
Technology
& People
Innovation
IS
R&D Legal
Changes
Future
Strategy Formulation
Identification of
Agility Drivers Missing Capabilities
Assessment Identification of
Changes/Pressures of
Agility Providers
Agility Needs
Marketplace
Technology Analysis
Customer Req Implementation
Assessment
Competition Basis of
Agility level
Social Factors
Performance
Measurement
STRATEGIES
Reconfigurability, Flexible People, Virtual
Enterprise, Strategic Alliances, Core
Competencies, Reengineering, Supply
Chain Integration, Responsive Logistic,
STEP, Heterogeneous, Computer
Systems, Concurrent Engineering.
RAPID VIRTUAL
PERTNERSHIP ENTREPRISE
SYSTEMS TECHNOLOGIES
MRPII, Internet, WWW,
Rapid hardware, Flexible Part
Electronic Commerce, CAD, Agile
Feeders, Modular Grippers,
CAE, ERP, TOC System,
Manufacturing Real time control Information,
Kanban, (CIM, ABC/ABM,
Technology (CAD/CAE, CAPP,
JIT). Systems CAM), Multimedia, Graphical
Simulator.
PEOPLE
ORGANIZATIONAL AGILITY
MANUFACTURING
RESPONSIVENESS FLEXIBILITY
AGILITY
Culture
Organizational
Suppliers leadership Customer
Memberships
reward system
AGILE ENTREPRISE
Quickness Competency
Agility capabilities Responsiveness Flexibility
AGILITY ENABLERS/PILLARS
In short, the number of changes and their type, specification or feature, cannot
be readily shaped and are probably indefinite. Therefore, the authors (Lin et al.,
2006) have evolved a model containing four aspects to be agile. The first prospect
is that customer requirement, competition criteria, market, technology, and social
factors are changing competition in business environments (Agility drivers). In
the second aspect, the agile organization tries to enrich and satisfy customers
based on components such as cost, time, purpose, and hardiness. Agility capa-
bilities involved in the third facet are flexibility, responsiveness, quickness, and
competency. The proposed model is presented in Fig. 27.
SUPPLY CHAIN
FLEXIBILITY
Increased supply
COMPETITIVE
INFORMATION chain flexibility
BUSINESS
TECHNOLOGY increases supply
PERFORMANCE
INTEGRATION chain agility
SUPPLY CHAIN
AGILITY
system and the ferocity of competition. For a company to be sure of its position
in a context characterized by a rapid and a random change in external environ-
ments, it must have a fast adaptation policy, a strategy to rapidly make significant
changes for all systems to align it with its strategy and conversely; which means,
it must always be agile. Therefore, to achieve enterprise agility, it is necessary to
consider the information system agility as an objective.
In their papers, the researchers discuss the assessment of agility in the POIRE
(Process, Organization, Information, Resource, and Environment).
According to the authors, first of all, we must define the target IS, which will
best serve the company’s strategy, and satisfy the business process, in short, an
aligned information system; Second, to lay down construction rules that allow
the system to avoid repeating gaps in the old information system and anticipate
changes, in short, an Agile IS. Finally, determining the trajectory transformation
from the present IS to the target IS, it needs to emphasize the current informa-
tion system in order to define appropriate criteria for achieving the restructuring
phase. This model is presented in Fig. 29.
AGILITY
Sense Response
Mobile (Customer’s (customer Firm
CRM use of perceived performance
mobile CRM ) Responsiveness )
and response capabilities are aligned. Starting from the argument that increased
CRM use by customers enhances an organization’s opportunities to detect cus-
tomer needs, CRM becomes a substitute measure for corporate perception.
78 Strategic Information System Agility
According to this agility alignment module, the company can execute these pro-
jects in response to the client’s changing demands since the company’s actions are
based on CRM information.
Through CRM use, customers can recognize that the company meets their
specific needs through the real experience they perceive. In other words, a com-
pany’s responsiveness is reflected in the company’s responsiveness as recognized
by the customer. The actual customer experience then determines the level of
customer satisfaction, as customers perceive that the company is meeting their
unique needs. Through CRM use, customers can recognize that the company
meets their specific needs through their perceived real experience. In other words,
a company’s responsiveness is reflected in its reactivity with its customers.
4.4.10 Wu (2019)
In their work, Wu (2019) proposes an IS integration to improve supply chain agil-
ity, based on four key elements. First, on customer sensitivity, for a rapid response
LEADING
BALANCING MONITORING
Executive APPLIYING FOSTERING
IT-leaders BALANCING CONSOLIDATING
Strategic Agility ADABTING EVOLVING
Practices LEVERAGING MONITORING
DEVELOPING REPORTING
Explore Internal
And Effectively Manage Episodes Of
Building And Strengthening
External Communicate Tensions Strategy
Maintaining Strategic
Organizational And Within Praxis
Strategic Agility Influence
Domains Collaborate Organizations Over Time
Executive
IT-leaders
As Strategy
Practitioners
E.g CIO, CTO, Vice-President of IT
4.5.2 Critics
We do not find a general definition of agility; there are various opinions about
the meaning of agility concept. In research, the term of agility is used to define
the way that (IS) can be adapted to cope with the unpredictable change emerging
from internal or external the organization.
No one of the above models has cited IS security, such as a driver for agility.
Also, the proposed models and methodologies do not get up any systemic pro-
cess for the implementation of agility except (Zhang & Sharifi, 2000). Also, the
proposed models are primarily based on manufacturing area and do not give a
holistic and comprehensive approach to agility measurement and improvement in
another organizational context, such as the organization operating in the public
or service sectors.
The Conceptual Model for IS Agility 81
4.8 Capability
The literature has indicated three types of IS capability:
Sensing
Strategy IDENTIFICATION
TREATMENT & ANALYSIS
Ogranizational
D RI VERS
Technology CATEGORIZATION
Security
People VALORIZATION
Legal
R&D
PRIORITIZATION
Results
communication DBPA
Determined Capacity
&
Readjustment
Analyse
&
Strategy Formulation
Diagnostic
Agility
Level need
Implementation
Gap Analysis
Current
Measuring Agility level
Agility Level
of changes faced by the company, as well as the analysis of the impact individual
changes will bring to the company.
The results of this and previous stage can be analyzed in order to determine
the strong and weak point. At this position is should determine an agility level
needed to react with an efficient way to the changes or pressures. The IS needed
agility level is considered equivalent to the degree of drivers change impact. The
difference between the required level of agility and the existing constitutes a sup-
plementary pillar of decision-making after its analysis. In this work, the results of
the examination are typically classified into four types:
The next step following the measuring of needs agility is to define the neces-
sary agility capabilities in the aim to become agile. The last stage of the model
requires determining the agility Drivers, which could provide the necessary capa-
bilities, implement the identified providers, determine the current agility level, and
finally formulate corrective actions in order to enhance performance. It should be
noted that some tools must be developed to support appropriately carry out the
above model.
4.9.1 Sensing
Recall that the allied forces of environmental change include competitor actions,
strategic changes, and changes in consumer preferences or IS staff skills, eco-
nomic changes, regulatory and legal changes, and technological advances. These
different changes require a standby to detect any potential changes regarding
each of these types.
For example, an organization needs the capacity to sense market changes,
track competitors’ actions, consumer preferences change, and economic changes.
Furthermore, sensing regulatory and legal changes that have an impact on a
company is a necessity and this is through government relations’ department or
legal service. Finally, practical research, development, and IT capabilities will be
required to detect technological progress and how an organization can exploit
them to take competitive advantage.
According to Brynjolfsson and Mendelson (1993), the information system is
the core of the company. Viewing its role, the IS must have a strategic intelligence
sensing on all elements influencing the company and its strategy. According to
Brynjolfsson and Mendelson (1993), the information system is the company core.
Viewing its role IS must have sensing on all elements, influencing the company
and its strategy. Today an essential flow of information requires a daily listening
on Aggregators, alerts, RSS feeds, networks social, ERP, and so on, to detect an
opportunity or anticipate a menace. Table 6 illustrates the types of sensing which
organization can adopt.
86 Strategic Information System Agility
⦁⦁ Scientific sensing, which covers all areas that could give the company a com-
petitive advantage based on scientific evolution (science, technology, processes,
and methods).
⦁⦁ Societal sensing: This sensing consists of discerning among a certain number of
changes “demographic evolution, cultural changes, ...” the significant changes,
which are taking place in society and which risk transforming or disrupting the
company and its environment. Through the study of cultural, political, social,
and historical factors, institutional, political actors (state, administrations,
local authorities, trade unions), public opinion, the evolution of regulations,
and the environment.
⦁⦁ Commercial and competitive sensing, which includes the business aspects (cen-
tered on markets, customers, business methods, etc.), moreover, competitive
(about competitors and new entrants, products, and especially new alternative
products, relations with suppliers, consumer relations, etc.).
The Conceptual Model for IS Agility 87
⦁⦁ The strategic sensing, which benefits from the coordination of the various
existing watch structures. Another way to segment the various forms of what
is to distinguish them according to their time horizons, their fields of applica-
tion, and the nature of the actors required: sensing is a “continuous and largely
activity to sense a different change driver such as the technological societal,
commercial and competitive environment. That is mean to permit an organiza-
tion to anticipate changes.”
⦁⦁ Social media sensing: Nowadays, Social Media sensing has become a neces-
sity for any companies that want to plan and manage their communication
on social networks or keep an eye on competitors. Marketing managers can
analyze information on current topics related to their company. Also, it is pos-
sible to monitor exchanges of opinions, discussions, and trends in real time.
The Social Media monitoring allows having a vision on the influencing Web
exchanges. Also, identify and react at real-time to the critics.
To describe and specify the subjects that interest the organization and for
which it is required to collect data or information, it is necessary to define the
sensing axes and the purposes that should concern the strategic factor, commer-
cial, competitive, technological, legal, regulatory, economic, societal, etc. On the
other hand, identifying the objectives targeted by the decision-makers means the
strategic objectives of the company.
The sensing phase must carry out on a regular or variable data sources, giving
the right level of pertinence to the information corresponding directly or indi-
rectly to the sensing axes.
In the phase of identifying, processing, and analyzing the collected data, it is
a question of analyzing the collected information and organizing it in such a way
as to make it exploitable.
Finally, the phase of validation and readjustment after the communication of
the results allowed the adjustment by deepening or reorientation of the objectives
and means of sensing as shown in Fig. 36.
4.9.2 DBPA
DBPA (Agility DataBase Provider) will allow managing agility providers for
each organization and critical information. The establishment of a reference is
necessary to improve the level of agility of the SI and to be able to exploit it in
the future.
By centralizing the various information available after the communication
phase of the results, this will make it possible to manage all the characteristics
of all the providers managed and listened. Building a database is necessary to
improve agility. In an approach based on the results communicated and the rel-
evance of the information, the DBPA will allow managing all the characteristics
on all the agility triggers that press on the IS as:
Definition / Redefinition
Of The Aims And The Axes Of
Surveillance
Identification And
Selection Of Sources Of
Information
SENSING
Treatment / Analysis Of
Collected Information
Communication Of The
SENSING Results
Validation
and DBPA
Readjustment
Consultation
Fig. 36. Sensing Phase.
Summary
From a strategic point of view, agility lies in the conquest of new markets, in
risk-taking, in the apprehension of new social and environmental issues. Thus, at
the level of the operational strategy, it consists of an ability to integrate the stake-
holders into the business practices and a better understanding of the business by
re-estimating all the links of the chain of value in a logic of creating a competitive
advantage. In other words, talking about agility is necessarily about strategy and,
more specifically, about the organization, culture, and management model that
will make it possible to best relay the need for reactivity.
The Conceptual Model for IS Agility 91
Abstract
In order to support transformational business change, IT needs to streamline
the process of bringing new IT processes to life.
In today’s ever-changing business world, nobody knows what is around the
corner, so improving agility is the best way to the future-proof organization.
IT Service Management is the ability to collect data, analyze it, to make
reports, and to implement improvements in agile mode, sometimes make
it challenging to manage all these informational organization assets effec-
tively. To perform real-time monitoring of these activities, manage, and
be able to involve the final user in the heart of the IT process, or reduce
operating cost, agility is the ideal solution.
In this chapter, the authors propose a global strategic model to improve
Information Technology Service Management service management pro-
cesses with the additions of two drivers: agility management and security
management.
5.1 Introduction
According to Brooks (2006), IT service management tools deal with many IT
service management measurements, and most of it will be attractive to people in
the related departments with the same activities. Metrics are identified to show
development and the performance of the system. Therefore, there are three types
of metrics to improve the quality level of the evaluation framework such as effec-
tiveness, capabilities, and efficiency. These elements could be matched into any
technology, process, or service that focuses on Operational Level (Service Sup-
port Domain), Tactical Level (Service Delivery Domain), and Strategic Level.
This chapter aims to identify the crucial aspects that propose a comprehen-
sive framework for Information Technology Service Management (ITSM) effi-
ciency. It was collected from a theoretical and empirical research study that
generated answers to the sub-level research questions. The author tried to extract a
framework based on the literature review and various sources from the practical
environment. The framework was used within the far-reaching empirical study to
find ways to compare and identify different corporation metrics. The organizations
were becoming more reliant on a comprehensive framework to control IT service
management in organizations; how Information Technology Infrastructure Library
(ITIL)-ITSM best practices affect organization efficiency and problem-solving.
The IT department’s responsibility for maintaining and securing the IT envi-
ronment now includes all devices’ employees use, but budgets and IT resources
are limited. The framework ITSM proposed exploits the good practices of ITIL
and ISO 2000 and integrated new strategic axes such as agility and security in
order to propose an efficient and agile IT service management. It replaces the
traditional IT services of the “control and control” type, oriented peripherally by
a complete integrated, user-oriented approach with the integration of four disci-
plines of IT management (Service management, Security management, Agility
management, and Asset management).
The IT department’s responsibility for maintaining and securing the IT envi-
ronment now includes all devices employees’ use, but budgets and IT resources are
limited. Agility is the right solution for IT departments to streamline IT processes
and manage all aspects of end-user productivity. The objective is to reinforce the
traditional IT services of the “control and control” type, oriented peripheral by a
complete integrated approach, oriented user. ITSM increases the level of the com-
munication efficiency between business departments and provides a structure to
plan, research, and implement IT services. The needs of IT service management in
organizations can be changed in the ways they do business, communicate, and also
develop and innovate, gain market advantage and differentiate themselves to their
customers (Brooks, 2006). Also, ITSM allows companies to internally govern and
follow the set of global standards. For a better understanding of the ITSM concept
in the organization, reviewing the ITSM component would be useful. ITSM com-
ponents consist of Process, Technology, Manpower (people), Organization, and
Security, which is recently added to the organization construction to improve the
system security (McNaughton, Ray, & Lewis, 2010; Park, Kim, Choi, & Jun, 2008).
As mentioned earlier, the IT service is connected to the four fundamentals of
ITSM. Therefore, when IT is aligned with the business strategy and the organiza-
tion, it can do what it wants to do. Furthermore, IT and new technologies enable
the organization to do new things that were never possible before (Silva Molina,
Plazaola, Flores, & Vargas, 2005). The strategic outcome is that the overall busi-
ness benefits from active IT-related service and IT benefits that are integral to the
company’s business plans will be delivered to the maximum economic value.
In the literature and even references such as ITIL, ISO 20000, and Cobit (van
Grembergen & De Haes, 2009a), there is no practical, concrete, and agile model
for the implementation of IT services and assets management in organizations.
In this work, we propose a global, practical, and agile framework for supporting
IT Service management ITSM. The proposed framework surpasses the limita-
tions of existing methods/referential and meets the needs of international stand-
ards regarding flexibility and agility to improve ITSM processes. This generic
Strategic Agility for IT Service Management 95
agile, secure, and optimal IT Service Center. The proposed framework adopts a
continuous improvement process based on DevOps and the quality management
method PDCA (plan-do-check-act) PDCA.
Table 7. (Continued)
these organizations need a holistic approach that applies agile management and
good governance across the organization, and through which all levels share the
fundamental values of visibility, accountability, and responsibility. For each ITSM
functions, the framework defines four maturity levels that serve as the basis for
understanding an organization ITSM capability. The assessment scope would cover
only the critical processes of the service operation and the service transition. Data
collected through interviews, workshops, literature review, and site visits. A time-
based assessment aims to determine the maturity level of each ITIL process. Based
on the collected answers, the scores are tabulated using a spreadsheet tool (more
details in the research methodology section).
standards are developed and revised based on a defined process and regular
feedback. IT and some other business units have agreed-on IT component and
physical environment security measures. IT budget processes identify and provide
the most significant information security budget requests for the IT Department
and some other business units. The security risk-management process is proac-
tive. Access rights are granted based on a formal and audited authorization pro-
cess. Detailed lifecycle data of security management processes are implemented.
Security incidents are managed on an emergency basis, as agreed on by IT and
some other business units. The IT Department has ad hoc involvement in budget
setting. Some ad hoc staff awareness and training. Investment is using short-term
payback criteria only.
Level 4 – Managed: A regular improvement characterizes maturity. ITSM
management strategy is aligned with the company’s IT strategies and compliance
requirements. However, policies generally target the behavior of end-users, for
example, by informing them of acceptable business practices regarding the physi-
cal security of hardware devices, software downloads, software evaluation copies,
etc., and by informing them of acceptable business practices. These policies must
be applied to both IT users and end-users, as IT staff with administrator rights
must be informed that they could create a risk in the same way as end-users. In
some organizations, for example, in highly regulated industries, it will be easy to
create a corporate culture to adhere to policies. However, other companies, such
as engineering and IT companies, will never be able to control user behavior.
At this level, costs and risks are visible because they can be scheduled annually.
Also, delays are modest, and the quality of service is increasing. The company
has confidence in IT, and end-users feel they have the resources to be effective.
Organizational agility is managed. Regular staff training, awareness-raising, and
advertising campaigns are well defined.
Level 5 – Optimized: Maturity is characterized by a high level of efficiency in
IT service management. Organizations have already solved many problems that
keep IT managers from waking up at night. Previous reactive problems have been
resolved so that both governance and policies are no longer an issue. At this level,
the focus is on aligning the IT financial management provided by the ITSM data
to enable a variety of strategic decision-making activities that are not necessar-
ily related to ITSM but that support business agility. At best, business units do
not even realize that the calculation takes place in the background. Achieving
this level of agility requires close alignment between business services through
an operational ITSM program. At this level, costs and risks are monitored and
planned monthly, delays are short-term, and the quality of service is high. Busi-
ness and IT are now linked to the same objectives.
Fig. 37. DevOps Agility: Aligning People, Technology, and Process for Continuous
Improvement.
productivity (Anderson & Bishop, 2018). Effective initiatives within the ITSM
framework can extend the delivery and management of business services beyond
the areas of computing. Service management teams become an advisory model
for the company, and the integrated process-driven ITSM enables agility that sup-
ports the company’s strategy (Adalı, Özcan-Top, & Demirörs, 2016).
Along with the development solutions and processes, ITSM plays a crucial
role in supporting DevOps practices and objectives such as incident management,
application deployment, and performance management, to name just a few. The
conception and implementation of new agile ITSM are a real challenge. The pro-
posed DevOps model connects people, process, and technology to ensure con-
tinuous improvement of IT services, as shown in Fig. 37.
Process management: While technology management has been the central ele-
ment of IT, most IT organizations realize that poor service delivery pretty much
with technology. IT should be prepared to restore services as quickly as possible
in the event of a problem. Well-defined roles and responsibilities are essential for
service disruptions. Anyone involved in the delivery and support of the service
must perform without confusion or delay. This ability can be the critical difference
between the success and failure of an IT organization trying to establish credibil-
ity as a service provider. These situations are examples of process problems. Tri-
umphant commercial success is complicated to achieve until they are processed.
People: Clearly, improved processes are useless without people. Neverthe-
less, the people component of IT refers to more than a simple understanding of
how process re-engineering and process management affect IT, staff. It also refers
to skill sets, attitudes, and the new roles and responsibilities staff must assume
Strategic Agility for IT Service Management 105
From To
Users Customer
Inward-looking Outward-looking
Technology focus Process focus
Ad hoc processes Rationalized, streamlined processes
Best efforts Measured, accountable processes
Entirely in-house Balanced in-/outsourcing
Fragmented, silos Integrated, end-to-end
Reactive Proactive
Operations manager Service management
System skills Listening skills
106 Strategic Information System Agility
Level 5 :
Optimized
Level 4 :
Measured
• IT as a strategic
business partner
Level 3 :
• Effective
Managed
• Collaboration knowledge
based process sharing and
are measured to individual
empowerment
Level 2 : • Collaboration
identify
bottlenecks and
Defined • Shared decision- inefficiencies • Self-Servicing
making • IT as service • Self-remediation
Level 1 : • Analyze trends provider • Self-Learning
Initial • Fight fires • Set thresholds • Measured • IT and business
• Some shared • Central Services and metric linkage
automated Assets costs • IT Business
decision-
making process across • Guarantee SLAs/ improves
• Poor • Process are
ITSM lifecycle OLAs business process
• Ad hoc managed but
• Mature problem, • Measure and risk and cost
configuration, report service optimization
• Undocumented not change, assets availability • The impact of IT
• Unpredictable standardized management • Predictability and services and
• Uncontrolled • No central • Process are Visibility of entire assets security is
• No automation infrastructure standardized IT process and optimized
• Multiple help
• Desktop across the Performance
desks
software organization • The impact of IT
distribution services and
• Minimal IT
• Initiate problem assets security is
operations
management
• User/customer
• Alert and event
call notification
management
Fig. 38. Devops ITSM Maturity Model for Continues the Organization’s Measure
and Improvement.
the service center of a leading port sector organization in Morocco. The organi-
zation manages more than 30 ports and sites with more than 1,000 users. The
Information System department has 40 employees with different profiles. The
purpose is to study IT service practices and assess the organization’s ability to
transform traditional IT support into a global and agile IT service center through
the implementation of the proposed framework. Fig. 39 shows the ITSM frame-
work architecture proposed for an eventual implementation in the organization.
Data Collection: The questionnaire was carried out in several stages. A first
version has been developed to take into account the different theoretical assump-
tions. This first version has been tested with IT service managers and consultants.
This pre-test allowed rephrasing some questions to improve the comprehension
of the questionnaire and to improve the quality of the given answers. In the end,
the questionnaire consists of 100 questions divided into four topics: IT service
management maturity, IT asset management maturity, IT security management
maturity, and IT agility maturity level. Table 9 shows the organization ataff and
Turnover, and Table 10 describes participants’ semographics.
108
Strategic Information System Agility
Year Frequency
Size of the Company 2019 More than 1,000
(# of Employees)
Position Senior Executives 366
Executives 95
Supervisory Officers 415
Qualified non-supervisory 146
Non-supervisory 79
Evolution of Turnover 2014 More than $1,4 million
and Revenue of the 2015 More than $1,5 million
Company for the last 5
2016 More than $1,7 million
years in $
2017 More than $1,8 million
2018 Less than $2 million
related to maturity levels as shown in Fig. 40. The toolbox worksheet contains
contextual answers for each question in the assessment. The formulas in the tool-
box will average the answers to calculate the score for each practice. The score
is a numerical result (zero to five or expressed as a percentage) representing the
maturity level of the audited ITSM.
Case Description: To be able to meet the requirements of the proposed ITSM
Framework, all employees must feel concerned and involved. To this end, the
quality department has undertaken a series of strategic actions. These actions are
planned following an agile model based on DevOps. Inspired by Deeming wheel
and DevOps, the authors organize the reports into four phases DDAO: Discover
Do, Act, and Optimize, as shown in Table 11. Our goal is to develop a quality
approach to a continuous IT improvement. Starting with the auditing of all the
functional and practical aspects of the management of the organization’s services
and the desired need, including the implementation of a roadmap for the desired
organizations levels of maturity in terms of management of services, assets, and
IT security. The authors define an agile approach based on DevOps, to guarantee
a continuous improvement of the processes, services, security and organization,
and contribution to the business of the organization.
Discover: The following section presents the part of the empirical study that
identifies the current status of the organization ITSM. IT managers described
yhat different parts of ITIL are incorporated in the fields of IT Support, ser-
vice desk Service Level Agreements (SLAs), incident and problem management,
and deployment fields, asset business, activities, operational maintenance, etc.
Another aspect that could be measured is the service improvement by provid-
ing surveys based on a yearly basis (on process and maintenance object level) to
improve and monitor the overall performance of the systems.
ITSM audit score: The ITSM audit was piloted based on the maturity model
described in Appendix 2, in order to identify the current levels of maturity and
Organizational Agility
Staff competency and skills
Up-to-Dateness of Technology Systems
Flexibility of Structure
Strategy and process
Compliance Management
Vulnerability and Risk Management
IT Asset Security
IT Service Security Management
Asset lifecycle
IT Financial Management
Asset Discovery and inventory
Configuration management database CMDB
Capacity Management
Availability Management
Service Level Management
Configuration Management
Release and Deployment Management
Change Management
Problem Management
Incident Management
Self-Service Desk
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5
to define the desired level to be attained by the organization. Fig. 41 below shows
the current ITSM maturity level. The maturity score 1 indicates the initial level
(ad hoc), and the score 5 indicates the high score of maturity level (optimized).
As shown in Fig. 42 above, the ITSM maturity level still at the initial and
reproducible levels 1 and 2. The objective is to set up service management and
achieve level 4.
The result of the organization’s ITSM audit is at the initial level. Asset man-
agement is done manually, which negatively influences costs and increases risk
and weakens the quality of service. The target objective is to define an improve-
ment strategy enabling the organization to automate and efficiently manage their
IT assets in order to position the organization in the managed level of maturity
(level 3).
The IT security maturity runs between the basic and intermediate level, which
proves that the organization is aware of IT security issues. The target objective is
to achieve an improved level of ITSM security and to be part of the overall gov-
ernance of the organization’s information security.
The current level of maturity of agility shows a huge lack of organizational
commitment. Managing the aspects of flexibility, technology, processes, and
people are characterized by a basic and fundamental level. The IT department
cannot cope with environmental and technological changes. Our objective is to
implement a continuous improvement strategy based on DevOps in order to
reach the level of control (level 3) in term of maturity and deliver a flexible and
agile ITSM.
Developing Improvement Action Plans: The output from the framework’s
assessment supports understanding the actions necessary to drive improvement
112 Strategic Information System Agility
and enable the organization to move systematically from its current state to its
target maturity. This is achieved by implementing a series of industry-validated
practices that allow organizations to improve incrementally, and monitoring
and tracking progress over time using a number of industry-validated metrics.
Table A1 (Appendix 1) includes sample practices and metrics for the four objec-
tives highlighted for prioritized improvement. For each of these objective prac-
tices, the figure outlines the currently reported maturity and the practices required
to transition to the next maturity state. Note that additional practices are
available to support transitioning to the desired maturity state as described in
Table A2 (Appendix 2).
To reach the desired level of maturity. The organization implemented some
programs during each phase of the rollout. During this phase of the project, the
following initiatives were adopted for the first phase (months 0–12) as shown in
Table 12.
Table 12. Target Objectives of Phase 1 (Months 0–12) to Achieve the Target
Maturity Level.
Act: This step will evaluate the decisions taken and the approach was taken.
The quality department and management will study the results and judge the rel-
evance of the decisions made. Moreover, this stage is required to reduce the gaps
and dysfunctions deployed during each review or audit. The planned manage-
ment review each year takes into account the steps taken during the year or the
last six months in trying to define opportunities for improvement. The authors
exploit DevOps approach to set up this step. DevOps brings fundamental changes
to how application and execution teams interact and execute processes. It requires
changes in technology, processes, and culture. The authors measure the organiza-
tion agility level by the proposed ITSM maturity framework for further measure-
ment and improvement of the organization.
The organization’s level of agility is initial; our objective is to orient the ACT
part toward an agile approach, in order to ensure a delicate change management
and consequently a continuous improvement by supporting people, process, and
technology drivers. To create an agile IT service center that delivers quicker reso-
lutions increases user satisfaction and evolves with rapidly changing technologies,
the authors suggest following these steps described in Fig. 42 below.
The obtained results can be improved agile by adopting our agile approach
based on DevOps. This approach will allow any organization to measure, control,
and manage IT services, asset and endpoint security costs and process.
Optimize: The most important thing that organizations adopt agile practices
is that there is no end to the journey and that they need to improve and remain
leaders continuously. Customers always expect more, and competitors will always
be there to deliver it if you don’t do it first. Remaining a leader requires adapting
114 Strategic Information System Agility
to customer feedback and continually improving products and practices, and rec-
ognizing when it’s time to pivot. New metrics are defined to measure and manage
improvement, as well as value delivered.
Framework efficacy from organization benefices: The proposed framework is
currently being adopted by the IT department of the National Port Agency in
Morocco. We highlight some benefits after the implementation of the proposed
ITSM framework.
User and client expectations have changed, and the IT department has to
develop other ways of communicating with them. The goal is to provide IT ser-
vice management with a tool to anticipate their requests, optimize productivity,
reduce downtime, and have all the necessary ITSM processes, including inci-
dent management, problem management, changes, requests, self-service, as well
as SLA management, etc. The benefits of the adoption of the practical ITSM
framework are:
⦁⦁ increase the satisfaction rate of computer users by 75%–90% since 2016, ensur-
ing the quality of the services delivered through a survey quality system;
⦁⦁ make the profiles versatile (admin driver) internal or for client projects;
⦁⦁ continue to improve the management of releases (business case, decision,
planning, monitoring, deliverables, etc.);
⦁⦁ continue to improve the configuration management process in accordance with
operational practices (car inventory, life sheets, and ITSM tool);
⦁⦁ with the Quality Manager, continue to strengthen reporting;
⦁⦁ making the management system more efficient;
⦁⦁ replace the performance evaluation based on user experience XLA instead of
complex SLA documents;
⦁⦁ review the incident/problem relationship (status of the incident after opening
a problem);
⦁⦁ formalize any type of structure to manage all goods, regardless of the type of
goods, business applications, or equipment, etc.;
⦁⦁ provide decision-makers with detailed information on the allocation, cost, and
forecast of assets;
⦁⦁ reduce risk by avoiding penalties and expensive litigation due to regulatory or
contractual non-compliance, especially in software licensing;
⦁⦁ implement asset responsibility with management reporting to optimize the use
of assets and protect against the malicious use and/or theft;
⦁⦁ reduce costs by eliminating unnecessary acquisitions if the property already
exists;
⦁⦁ proactively manage the warranty and support and maintenance contracts for
optimal utility;
⦁⦁ negotiate better contracts by properly managing assets and suppliers;
⦁⦁ improve productivity by automating the movement of goods in the business
environment;
⦁⦁ ensure that assets and services meet the baseline configuration for vulnerability
patches, antivirus policies, and user security are well-addressed to meet compli-
ance standards such as PCI and ISO 2700x;
⦁⦁ facilitate data-based internal compliance and accountability audits to continu-
ously improve processes; and
⦁⦁ implement a continuous improvement strategy DDAO.
Summary
In the age of digitization, the world is evolving at a constant pace. Companies
need to respond to changing conditions and often agility is the only guarantee of
survival. Globalization means more competition. The product life cycle is shorter
than ever. Disruptive technology can change markets overnight.
A company faces significant challenges in maintaining security and compli-
ance while achieving its business objectives, ensuring compliance with applicable
regulations, and managing its people and technology. IT staff must be able to
respond quickly to changing business needs while maintaining the existing infra-
structure. The oft-cited management goal, “Doing more with less,” is not just a
116 Strategic Information System Agility
Abstract
Since 2007, the cloud computing term had been introduced to the informa-
tion technology (IT) dictionary. The theme is attracting growing interest
from both the IT world and the business players, who need to enhance in-
formation systems agility, reduced costs, or even less dependence on internal
IT teams when they are judged too slow. However, the fact that cloud com-
puting, as presented by providers, increases the agility, is unclear. Business
Managers; IT professional, and academics are querying about relationship
between cloud computing and IT agility. This chapter aims to answer two
major concerns: Factors that influence cloud computing adoption in medium
and large organizations, and the cloud computing role to improve the agility
of information systems. This chapter argues that cloud computing impacts
Information System (IS) performance by organizational capabilities (agility).
One of the primary motivations of this chapter is the lack of fieldwork when
considering how cloud computing improves the information systems’ agility.
6.1 Introduction
Since 2007, the two leaders in cloud computing, IBM and Google, have invested
in the construction of large data centers that can be used by students over the
Internet to remotely program and research, known as cloud computing (Lohr,
2007). The cloud infrastructure was also recognized as a cost-effective model for
delivering information services, reducing information technology (IT) manage-
ment complexity, promoting innovation, and improving real-time responsiveness.
For many organizations (Buxmann, Diefenbach, & Hess, 2015) and countries
(Changchit & Chuchuen, 2018), cloud infrastructure has served as a platform for
developing innovation and a highly qualified human resource capacity. In 2011,
the US federal government estimated that 20 billion dollars of the IT investment
budget, which is 80 billion dollars, would be a potential target for cloud computing
solutions migration (Metheny, 2013).
Cloud Computing has had a significant impact on IT during recent decades
as leading companies such as Google, Amazon, and Microsoft have focused on
providing more efficient, secure, and cost-effective cloud platforms for organiza-
tions that are trying to redefine their business models using the concept. Cloud
Computing is one of the major technologies that has revolutionized the world
of computing. The IT service delivery model provides significant benefits, which
enables today’s organizations to adapt their IT infrastructure proactively to
face a rapidly changing environment and business requirements. Importantly,
it significantly reduces the complexity of IT management, enabling more use of
IT. Cloud-based services also offer interesting reuse opportunities and design
challenges for application developers and platform providers. Cloud Computing
has, therefore, generated much enthusiasm among technologists and researchers
in general.
For many organizations, cloud computing can be a driving factor of change,
enabling them to make optimal use of information and communication technol-
ogies without investing massively at the outset and avoiding the risks of getting
stuck with obsolete technologies. With cloud computing, providers can provide
an information and communication technology infrastructure as a service to end
customers (Fernando, Loke, & Rahayu, 2013; Kim, Beloglazov, & Buyya, 2009).
By using cloud computing, organizations can reduce the cost of information and
communications technology acquisition and maintenance, attracting new custom-
ers, increasing revenue, preserving profitability, and improving agility (Goyal &
Dadizadeh, 2009; Marston, Li, Bandyopadhyay, Zhang, & Ghalsasi, 2011).
Companies that have made lower investments in information and communications
technology infrastructure are more apt to adopt and use cloud computing (Bhat,
2013). Large enterprises are increasingly adopting cloud computing (Alshamaila,
Papagiannidis, & Li, 2013; Gupta, Seetharaman, & Raj, 2013).
In 2017, the situation changed radically. Forty-eight companies of the fifteen
“Fortune Global 50” (Brinda & Heric, 2017), companies have publicly announced
their cloud adoption plans. Today, cloud computing is increasingly becoming
the leading technology to do business for the next generation. The agility of the
cloud enables enterprises to accelerate time to the marketplace by reaching vari-
ous parts of the development chain. Due to promises of IT efficiency and busi-
ness agility, they are integrating cloud computing into their IT strategies (Lynn
et al., 2018). Cloud computing is a combination of two fundamental IT tenden-
cies: IT efficiency, where IT performance is used more efficiently, and business
agility, where IT is a competitive tool through rapid deployment, batch parallel-
ism, and business intensive analytics (Avram, 2014).
Cloud computing infrastructures can improve the efficiency with which com-
panies can use their investments in information technologies through the unifica-
tion of separate systems and automation of the management of the group of
systems as a unified entity. Cloud infrastructure can be a cost-effective model for
delivering information services, reducing IT management complexity, promoting
innovation, and increasing responsiveness through real-time.
Cloud Computing as a Drive for Strategic Agility 119
of being able to provide all the elements of software development (design, testing,
version control, maintenance, and hosting) via the Internet (Stanoevska et al.,
2009). SaaS (“Software as a Service”) is necessarily the ability to access cloud-
based applications using a thin client (such on a web browser or mobile applica-
tion) instead installing software to their computer (e.g., Joyent and SalesForce
CRM). Among its advantages are centralized configuration and hosting, updates
to current software versions without the need for reinstallation, and accelerated
feature delivery (Dillon, Wu, & Chang, 2010).
Cloud computing represents the intersection of IT effectiveness and business
agility (Kim, 2009). IT performance results from the use of scalable hardware
and software resources (Marston, Bandyopadhyay, & Ghalsasi, 2011), improved
work efficiency and coordination between firms (Abdollahzadehgan, Che Hus-
sin, Gohary, & Amini, 2013), and highly available services (Armbrust et al.,
2010). The business agility of cloud computing is the ability to rapidly deploy
computing tools, reduce initial capital expenditures (Hoberg, Wollersheim, &
Krcmar, 2012; Lin & Chen, 2012), and respond quickly to changing market
needs (Armbrust et al., 2010; Hoberg et al., 2012). Cloud Computing removes
traditional boundaries between enterprises. This ability to seamlessly, deliver IT
functions as cloud-based solutions has proven to be viable and cost-effective,
as demonstrated by its growing adoption. Li, Zhang, O’Brien, Cai, and Flint
(2013) aimed at evaluating and comparing commercial cloud services, compiled
a de facto metrics catalogue using a systematic literature review of current cloud
services assessment work. Yang et al. (2013) looked at conceptualizing IS agility
based on previous research to assess the contribution of different cloud comput-
ing services to IS agility.
From the reduced complexity and unlimited scalability to the on-demand capac-
ity and cost savings of CapEx, Cloud Computing delivers all the promise. While
there are still many unanswered questions about cloud computing, many compa-
nies are optimistic about their ability to deliver on these promises. Regardless of
how well cloud-computing delivers on its promise, one thing is sure: organizations
are not willing to sacrifice security, visibility, and control to move to the cloud. They
need to know what is happening in the cloud, how their applications are delivered,
and how traffic is controlled and directed. A must-have in cloud computing is agil-
ity: the capacity that enables enterprises to respond rapidly and accurately to unex-
pected and changing business demands. Agile enterprises, those that can provide
on-demand IT services under all workload conditions, can seize new opportunities
and remain competitive. This fact prompted us to continue this research in order to
verify whether cloud computing can improve IT agility. Table 13 summarizes our
literature review, highlighting the different methodologies and contributions.
Skafi, Yunis, and Cloud adoption Complexity, security, top management Confirmatory factor Data collected from 139
Zekri (2020) support and prior IT experienc analysis and logistic respondents working in
123
Technology context means the internal and external technologies pertinent to the
organization and those that could be adopted. Organizational context relates to
company descriptive characteristics (i.e., size, organizational structure, and level
of centralization), resources (human and insufficient resources), and communica-
tion process (formal and informal) among employees. Concerning the environ-
ment, this context includes environmental market elements, competitors, and the
regulatory framework (Oliveira & Martins, 2010, 2011; Tornatzky et al., 1990;
Zhu & Kraemer, 2005).
Several research studies have examined technical and operational issues related
to cloud computing, involving topics such as selecting cloud computing services in
terms of cost and risk (Martens & Teuteberg, 2012), secure storage audit protocol,
and computing in the cloud. Cost of cloud computing ownership models (Mazhelis
& Tyrväinen, 2012; Tan & Ai, 2011; Walterbusch, Martens, & Teuteberg, 2013), and
security issues, privacy risks, and information loss (Chong, Ooi, Lin, & Raman, 2009;
Wang, 2010). Our search of scholarly databases found only a few published journal
articles addressing cloud computing adoption from an organizational perspective, as
shown in Table 13. Abdollahzadehgan et al. (2013) used the DOI and TOE frame-
work to study the adoption of cloud computing in Taiwan’s high-tech industry. Their
research model was not expansive, because it did not address critical factors such
as cost savings and security concerns that are critical to the enterprise’s adoption
of cloud computing. They also assessed cloud adoption as a dynamic dependent
variable rather than a continuous process. Lin and Chen (2012) interviewed 19 IT
professionals in Taiwan using a semi-structured interview format. According to their
qualitative assessment, IT organizations are hesitant to adopt cloud computing until
the uncertainties associated with cloud computing (e.g., security and standardiza-
tion) are further resolved, and useful business models emerge. Trigueros-Preciado,
Pérez-González, and Solana-González (2013) use a qualitative and quantitative anal-
ysis methodology to identify barriers to cloud adoption. They surveyed 94 Spanish
Small Medium Enterprises and concluded that knowledge of cloud computing was
low among companies and that companies knew nothing about cloud computing.
Our search of scholarly databases found only a few published journal arti-
cles that assess cloud-computing adoption from an organizational perspective as
shown in Table 13. Abdollahzadehgan et al. (2013) used the DOI and TOE frame-
work to study the adoption of cloud computing in Taiwan’s high-tech industry.
Their research model was not expansive, because it did not address critical factors
such as cost savings and security concerns that are critical to the enterprise’s adop-
tion of cloud computing. They also assessed cloud adoption as a dynamic depend-
ent variable rather than a continuous process. Lin and Chen (2012) interviewed 19
IT professionals in Taiwan using a semi-structured interview format. According
to their qualitative assessment, IT organizations are hesitant to adopt cloud com-
puting until the uncertainties associated with cloud computing (e.g., security and
standardization) are further resolved, and useful business models emerge.
Trigueros-Preciado et al. (2013) used a qualitative and quantitative analysis
methodology to identify barriers to cloud adoption. They surveyed 94 Span-
ish SMEs and concluded that knowledge of cloud computing was low among
companies and that companies knew nothing about cloud computing adoption.
Cloud Computing as a Drive for Strategic Agility 125
Nkhoma, and Dang (2013) used secondary data from the survey of a large ser-
vices company to study the drivers and barriers to cloud computing adoption.
Wu, Cegielski, Hazen, and Hall (2013) investigated whether the information pro-
cessing requirements and capacity affect the firm’s intention to adopt cloud com-
puting; they used the DOI theory and information processing view to conduct
their study in the supply chain domain.
Abdollahzadehgan et al. (2013) proposed using the TOE framework to evalu-
ate the barriers to cloud computing adoption in SMEs; their study did not include
hypobook testing or empirical validation. Kshetri (2013) used the institutional
theory to investigate the perception and security issues based on the context pro-
vided by formal and informal institutions; no empirical assessment was provided.
The review of published journal articles indicates that most studies empirically
evaluate the direct effects of innovation, contextual factors or conduct analysis
using qualitative methods or secondary data on the adoption of cloud comput-
ing. No study has taken a holistic approach to empirically validate the direct and
indirect effects of the innovation characteristics and the underlying technology,
organization, and environmental contexts. Yang and Tate (2012) voice similar
concerns by classifying the published journal articles on cloud computing into
four research themes: technological, business issues, domains, and applications,
and conceptualization.
Based on a descriptive literature review of 205 refereed journal articles, their
study indicates that research on cloud computing is skewed mostly toward tech-
nological issues. They highlight the paucity of cumulative research to address
the social, organizational, and environmental perspectives of cloud computing.
In this study, we address this crucial research gap by developing an integrative
research model that combines the theoretical perspectives of the DOI and the
technology, organization, and environmental contexts.
Agility
Security, Privacy
and Trust
Cost-Saving
Top Management
Support
Competitive pres-
sure
Firm Size
Technological
Readiness
Relative advantage
Competence and
Awareness
Compatibility
Complexity
Data Sovereignty
had received ongoing empirical support. Also, The value of context integration
(TOE) to reinforce DOI theory is recognized (H.-F. Lin & Lin, 2008; Oliveira &
Martins, 2011; Wu et al., 2013). Implicitly, the technological context is the same
idea as Rogers (2003). The DOI has the same internal and external organizational
characteristics as the TDE organizational context (Hsu, Kraemer, & Dunkle,
2006). There are also significant differences between the two theories. The TOE
does not specify the role of individual characteristics (e.g., senior management
support). At this point, DOI suggests that executive support is included in the
context of the organization. Likewise, the DOI ignores the impact of the environ-
mental context. As a result of the limitations of DOI, TOE provides more insight
into IT adoption by including technology, organizational and environmental con-
texts (Zhu, Dong, Xu, & Kraemer, 2006). Consequently, the two theories signifi-
cantly complement each other (Oliveira & Martins, 2011).
Of the five DOI attributes, there are three innovation characteristics applicable
to cloud adoption: relative advantage, complexity, and compatibility. Experimen-
tation and observational capacity are not widely used in IT innovation studies
(Chong et al., 2009). Thus, by following general information and systems research
guidelines, we ignore these two attributes because they are not relevant to cloud
computing technology. Rogers (2003) states that “the nature of the innovation
determines the type of relative benefit that is important to the adopter” and that
the relative benefit of the innovation can be “expressed in terms of economic
profitability, social prestige or by other means.” In our study, we postulate that
cloud computing can lead to an economic advantage in terms of cost reduction
(Ifinedo, 2011a) that it is capable of improving IS agility (Yang et al., 2013).
Similarly, security concerns can reduce the relative benefits of cloud comput-
ing. We, therefore, include two additional attributes, namely cost savings, and
security as antecedents to the relative advantage of cloud computing. They deter-
mine whether cloud computing can be relatively beneficial in achieving cost sav-
ings, improving IT agility to meet change, seize new opportunities, and remain
competitive. Table 14 below studied the fatcors influencing cloud adoption.
TECHNOLOGICAL
READINESS
INNOVATION
Technological CHARACTERISTICS
readiness
Agility
H5
ORGANIZATIONAL
CONTEXT
Top Management H1
Support
Compatibility
H6 H4
Competence and
DECISION Relative
Awareness H8 Advantage
H3
H2b
ENVIRONMENTAL Cost-Saving
CONTEXT H9
Complexity
Competitive
Pressure H10
Data Sovereignty
The most important advantage of Cloud computing is that it adds to the agil-
ity of an organization. With the use of cloud computing, enterprise systems are
being transformed, allowing organizations greater flexibility in the use of services,
greater flexibility, and higher productivity (Kunio, 2010). According to Sitaram
and Manjunath (2012), agility and innovation are considered the main growth
drivers offered by cloud computing. Companies willing to reconfigure around
cloud computing would be more adaptable to changing external markets and bet-
ter positioned to exploit new opportunities by leveraging the scalability and agil-
ity of cloud computing (Altaf & Schuff, 2010; Weinhardt et al., 2009).
Thus, H1. Agility can positively influence the relative benefits of cloud
computing.
130 Strategic Information System Agility
⦁⦁ Relative Advantage
Therefore, H2. The relative advantage will have a positive influence on cloud
computing adoption.
Hence; H2a. The security and privacy issues will have a negative impact in
terms of cloud computing’s relative advantage.
⦁⦁ Cost-Savings
⦁⦁ Complexity
⦁⦁ Compatibility
So, H6. Top management support will have a positive influence on cloud
adoption.
⦁⦁ Firm size
Hence H7. Firm size will have a positive influence on cloud adoption.
One of the main challenges of the adoption of cloud computing is the lack of
competent cloud profiles. These issues are crucial today for companies that want
to stand out from the crowd in order to recruit and retain the best candidates
and meet the expectations of new generations. The university’s role is crucial to
continue the evolution and help companies in educating and training on cloud
computing concepts and application (Abolfazli et al., 2015).
Hence H8. Firm size will have a positive influence on cloud adoption.
Cloud Computing as a Drive for Strategic Agility 133
That is why H9. The competitive pressure will influence the adoption of cloud
computing positively.
⦁⦁ Data Sovereignty
Data sovereignty is the respect of rights associated with data based on the loca-
tion of the entity that has control over it. Governments generally apply data
sovereignty to limit the cross-border storage of (sensitive) data, limiting organi-
zations to operating local data centers only when external services may be more
efficient and affordable (Abolfazli et al., 2015).
Guaranteeing the ownership, security, and sovereignty of data has become a
vital issue for companies, especially governments, which have decided to demate-
rialize their information systems in the cloud (Zhu, Kraemer et al., 2006). Several
organizations are still asking questions about the storage and sovereignty of data
in the cloud. Answering these questions and clarifying misunderstandings around
data sovereignty promote better cloud adoption.
not allowed to explain their responses (Tashakkori & Creswell, 2007). There are
various ways to collect quantitative data, such as questionnaires and scientific
experiments. Using this approach, researchers can measure participants’ opin-
ions, and decisions and different strategies can be used to analyze numerical data
(Venkatesh & Brown, 2013).
Mixed methods are a combination of quantitative and qualitative meth-
ods. By combining the two methods, researchers can gain more knowledge and
more accurate results and provide a clearer picture of the problem (Venkatesh &
Brown, 2013; Zhu, 2004). According to Mack, Woodsong, MacQueen, Guest,
and Namey (2005), some researchers have used qualitative methods to gain an
overview of the problem and an in-depth understanding of the results obtained
using quantitative methods. In this study, different techniques can be used to col-
lect qualitative and quantitative data.
Our research focuses on various aspects that influence the adoption of cloud
computing in information systems and their impact on IT agility. We have there-
fore chosen a research methodology that integrates several methods, as shown in
Fig. 44. A combination of research methods, especially in both cases, qualitative
and quantitative paradigms have been proven in the IS discipline to be active
LITERATURE
REVIEW
PROPOSED
MODEL
QUANTITATIVE Data
SUDY Analysis
Data
Analysis FINDING
Exploratory Study
Interview:
Semi-Structured
Data
Analysis
FINDING
Evaluation Study
and contribute to a broad and deep understanding (cf. Galliers, 1991; Kaplan &
Duchon, 1988; Landry & Banville, 1992; Mingers, 2001). The qualitative study
was used to obtain additional information on the results of a quantitative study
(Venkatesh & Brown, 2013).
6.7.3 Results
The purpose of this study (Table 17) is to assess the determinants of cloud adop-
tion using a methodology that combines the innovative characteristics of cloud
136 Strategic Information System Agility
6.7.4 Finding
⦁⦁ Innovation characteristics
system
CT4 – Cloud computing will be compatible with existing company hardware and
137
software
Table 16. (Continued)
138
Factors Mean SD
Agility 3.33 0.87
Security, privacy, and trust concerns 3.76 1.11
Cost savings 3.14 0.79
Complexity 2.26 0.80
Compatibility 2.90 0.80
Technology readiness 4.27 1.19
Top management support 2.89 0.96
Firm size 2.54 0.86
Competence and awareness 2.72 1.02
Competitive pressure 2.30 0.86
Regulatory support 2.58 0.85
Data Sovereignty 3.81 0.81
Cloud computing adoption 2.40 1.61
Table 17 presents the Mean and Standard Deviation of Full and Subsamples.
The survey confirms that organizations realize the benefits of cloud computing
agility. The benefits identified by the study include improved quality of business
operations, faster task execution, increased productivity, and the creation of new
business opportunities.
Concerning the two variables that constitute advantages related to cloud tech-
nology, security concerns (H2a) do not prevent cloud adoption due to recent
advances in privacy technologies, surveillance, and encryption systems to ensure
confidentiality, integrity, and data protection in the cloud (Muñoz, Gonzalez, &
Maña, 2012; Sonehara, Echizen, & Wohlgemuth, 2011; Wang, 2010). Also, new
federal standards and regulations such as the GDPR (Tankard & Pathways, 2016)
and FedRampt (Montalbano, 2012). Act help build trust and organizational con-
trol over data when adopting cloud-based solutions which can explain why secu-
rity and privacy are not a concern when a cloud computing strategy is considered.
Cost savings (H2b) is confirmed as an essential factor to explain the relative
advantage of cloud computing. This finding is consistent with studies that have
shown that cost savings are a powerful driver of cloud-based solutions adoption
in sectors such in technology, manufacturing, financial, logistical, services and
educational industries (Benlian & Hess, 2011; Garrison, Kim, & Wakefield, 2012;
Lyytinen & Damsgaard, 2011).
The compatibility (H4) is considered a factor that was facilitating the adoption
of cloud computing for the service sector, but not significant for the manufactur-
ing sector. Its importance in the service industry can be explained by the work
style preferences and Internet business transactions that prevail among com-
panies in this sector(Lee & Kim, 2007). In the case of manufacturing, the lack
Cloud Computing as a Drive for Strategic Agility 141
In contrast, small businesses generally lack the resources to build knowledge and
to implement and test cloud computing (Thiesse et al., 2011).
The competence and awareness (H8) is a very critical factor in the adoption of
the cloud in different organizations. The adoption of the cloud by organizations
is well underway worldwide (Abolfazli et al., 2015; Cragg et al., 2011). This trend
is expected to continue through talent attraction and retention, and performance
management. These issues are crucial today for companies that want to stand out
from the crowd in order to recruit and retain the best candidates and meet the
expectations of new generations.
It was essential to identify the sample size before conducting this study. In order
to determine the minimum sample size, G*Power software was used. G*Power
is software that enables researchers to compute the required sample size and
increase the accuracy of their results (Bourque & Fielder, 2003). The parameters
identified to compute the minimum sample size were as follows:
⦁⦁ Effect size: According to Faul, Erdfelder, Lang, & Buchner (2007), there are
three parameters of effect size small, medium and large. The appropriate effect
size for this exploratory study is 0.8 (i.e., large).
⦁⦁ Type I error, also known as alpha (α for 95% confidence level α=0.05. This
means the probability of rejecting the null hypobook when it is true is 5%
(0.05). Type one error means false rejection of the null hypobook.
⦁⦁ Type II error (i.e., 1-β err prob): Type two error indicates that the null hypo-
book will not be rejected when it is false (Banerjee, Ghosh, & Banerjee, 2012).
In other words, type two error means false acceptance of the null hypobook.
This is conventionally set at 20%.; so (1-β err prob) = 0.8.
In this study, the calculation was performed under a t-test family (one sam-
ple case). The results indicated that the minimum sample size for the question-
naire was 15 participants. Table 18 illustrates the statistical calculation of the
sample.
In terms of interviews, there is no typical sample size for data collection from
interviews; thus, there is no set number for participants in interviews. However,
Tashakkori and Creswell (2007) recommend that from 5 to 25 interviewees are
acceptable, while Morse (1994) suggests that six is the minimum for participants
in interviews. Furthermore, Thomson (2010) conducted a review of one hun-
dred studies regarding sample size in interviews and found that the point at
which any increase in some interviews will lead to repeated material, and data
saturation occurs between 10 and 30 interviews(Thomson, 2010). Strauss and
Corbin (1998) also state that the saturation of data is dependent on a research-
er’s decision. In this present study, the researcher has taken into account these
suggestions and conducted interviews until there was no new data to be added
to the study.
⦁⦁ Interview Design
The purpose of the semi-structured interviews was to examine the extent to which
the adoption of cloud computing will increase information systems agility. Interview
questions were prepared before the interviews and included closed and open-ended
questions. According to W. Foddy and Foddy (1994), the five-point Likert scale is
the optimal choice for cases that require decisions; Lietz (2008) also mentioned that
this scale could increase reliability and validity of results. Therefore, in this study the
closed-ended questions were designed using a five-point Likert scale: (very important
= 5; important = 4; may be important = 3; not important = 2; and not relevant = 1).
The other questions were open, which helped the researcher to understand an organi-
zation’s requirements and attitude toward cloud adoption. Table 19 presents an outline
of the interview questions. The interview questions are developed in English to verify
the clarity of the questions. Adjustments based on the pilot interviews were made to
the interview questions, including rephrasing and deleting some wrong questions.
⦁⦁ Questionnaire Design
Number Questions
Q1 • Cloud computing has enabled the organization to manage business
activities in an efficient and flexible way?
Q2 • Do Cloud computing services improve the quality of operations?
Q3 • The employee have the possibility to quickly access applications data
and the possibility of recovering them rapidly?
Q4 • The compatibility with the cloud provider has a negative impact on
the cloud adoption?
Q5 • The organization has the ability to respond to the growing demand
of customer in terms of computing ressources?
Q6 • Using cloud-computing helps the organzation to adapt the change
in information systems through system development, implementation,
modification, and maintenance activities?
Q7 • Using cloud-computing helps the organzation facilitate planning
process in the organization?
Q8 • IT staff are well trained and agile to follow technical advances, and
have the ability to deal with unexpected changes?
Q9 • The adoption of cloud increases the organization’s ability to cope
with unexpected changes?
Q10 • The organization has the ability to remain competitive?
Cloud Computing as a Drive for Strategic Agility 145
factors that already exist in the cloud adoption model, as well as other factors that
were identified in interviews with IT experts. The questionnaire was divided into
two sections: demographic information and 28 closed-ended questions concern-
ing 17 factors. These factors are security, relative advantage, agility, compatibility,
complexity, senior management support, organizational size, technological readi-
ness, regulatory compliance, and competitive pressure. The reason there were 28
closed-ended questions was that some factors were measured by more than one
question. For example, Agility has two questions, one measuring the impact of
agility on cost by predicting changes and the other on responsiveness. Closed-
ended questions were designed based on interview results and using a five-point
Likert scale: (strongly agree = 5; Agree = 4; neutral = 3; neutral = 3; Disagree = 2;
and strongly disagree = 1): The questions used were as follows:
⦁⦁ Demographic Information
6.7.10 Hypobook
In the aim to response a second research question, the following assumptions
were made and tested at a 90% confidence level. The hypotheses (H1) include
the different associations between agility categories and cloud computing models
formulated as follows:
IT Agility
interoperability link the local environment to the cloud environment while maintaining a
level of security
Elasticity The organization must manage these expansions to the growing demand 3.90 <0.001
of customers and have the ability to accelerate the necessary increase in
bandwidth allocation and computing resources from the cloud service provider
Strategic Information System Agility
Maintenance Ability to adapt to change in information systems through system 4.03 <0.001
Process development, implementation, modification, and maintenance activities.
Agility An organization with such IT agility can effectively modify its system,
enabling it to respond more effectively to changing market opportunities
Planning Process • Reduction of time and effort for application support and maintenance 3.23 0.257
Agility
• The integration of new branches in the company must be less complicated
• IT should easily assess and prioritize proposed changes
Monitoring & Recall that the essential forces of environmental change include competitor 4.17 <0.001
IT Process Agility
Assessment actions, strategic changes, and changes in consumer preferences or IS staff
Process skills, economic changes, regulatory and legal changes, and technological
Agility advances. These different changes require a standby to detect any potential
changes regarding each of these types
Training & Staff – Conducted training and internships for IT staff to manage different 4.73 <0.001
systems and applications
– IT staff will have the ability to translate business problems into a
technical solution
Business and IT staff should have the ability to deal with unexpected changes and 4.47 <0.001
Humain Agility
Technical Skill efficiency seize emerging opportunities
Response The use of cloud computing increases the organization’s ability to cope 4.53 <0.001
with unexpected changes (i.e., unexpected events such as corrections and
reconfigurations)
Customer service Organizational mechanisms must be able to support service delivery that 4.13 <0.001
meets client needs
Competitive status The ability to remain competitive by providing answers under any 4.53 <0.001
Business Agility
conditions will seize new opportunities and remain competitive
Cloud Computing as a Drive for Strategic Agility
147
148 Strategic Information System Agility
6.7.11 Results
The following section summarizes these findings. Figs. 45 and 46 illustrate the
usage frequencies and percentages for various cloud computing service models and
deployment models. Fig. 47 shows answers to aggregated categories of IS agility.
As can be seen in Figs. 45 and 46, the percentage of usage is mainly attributable
to infrastructure as a service within the private cloud. In addition, an interesting
observation in Fig. 45 includes the high percentage of responses in the business
agility category, including: greater user confidence to faced unexpected changes
(i.e., unexpected events such as fixes and re-configurations), greater satisfaction
with efficiency and effectiveness in seizing emerging opportunities, and a positive
contribution of using clouds to align IT strategies with business strategies. Fig. 47
shows the responses to the aggregated IS agility categories.
business information, customers, partners, and each other, using virtually any
device, from virtually anywhere and from anywhere. Therefore, users can give
priority to the most critical business tasks first.
However, IaaS focuses more on reducing the burden of managing anticipation
and building excess IT infrastructure, resulting in reduced management, mainte-
nance, and deployment time, with the added benefit of greater scalability to more
efficiently manage peak demand, studies have also shown the lack of association
between SaaS and any category of agility. This conclusion is supported by the fact
that SaaS is seen more as an economical option than an improvement in agility.
Unlike conventional financial models of software vendors that rely on license
fees to support their profits and losses, SaaS allows users to pay only for what is
used during a given period while being much less dependent on local IT staff and
services, which would increase some limits on agility in general.
Surveys indicate that there is an improvement in user confidence in the face of
unexpected changes, efficiency, and effectiveness of taking advantage of emerg-
ing opportunities and aligning IT strategies with business strategies. Additionally,
cloud computing has allowed organizations to reduce the time and effort spent
on support and maintenance, decrease efforts to assess and prioritize proposed
changes, facilitate capacity planning and performance information collection,
and simplify service management.
Summary
Cloud computing is an essential evolution of IS technology. It boasts attractive
properties such as agility, scalability, pay-per-use, and cost-efficiency. This study
sought to identify the determinants of cloud-computing adoption based on inno-
vation characteristics and the technology, organization, and environmental con-
texts of organizations, and evaluate how cloud computing changes are agility,
it started. A research model was developed that integrates the DOI theory and
the TOE framework. The model was evaluated through a quantitative study col-
lected from 200 different medium and large companies in MENA region. The
results indicated that Agility, cost-saving, security, privacy and trust, technologi-
cal readiness, and data sovereignty have a direct effect on a firm’s adoption of
cloud computing. The analysis of results validated the direct effect of Agility on
cloud-computing adoption. The second part of this study focuses more on how
cloud computing affects the agility of information systems. The qualitative data
were collected through semi-structured interviews with 20 experts from 10 major
organizations in the MENA region that have already adopted cloud technology.
Drawing on research findings, we concluded that some cloud computing service
models improve specific dimensions of agility, for example, IaaS increases techni-
cal infrastructure agility. PaaS improves human characteristics, while SaaS does
not associate with any category.
For decision-makers in the organization who are considering cloud-based ini-
tiatives, our results provide a solid foundation for assessing the direct and indirect
effects of cloud computing innovation features and the literature related to its
adoption in various industries.
Cloud Computing as a Drive for Strategic Agility 151
Our Results also indicate that cloud computing will increase the agility of
information systems which allows the company to realize cost savings resulting
from reduced IT capital expenditures, reduced negotiation costs, and reduced
maintenance and energy costs. The benefits of environmental responsibility by
reducing environmental impacts through the adoption of cloud computing.
In general, it seems that cloud computing brings improvement to the agility
aspects of the information systems of organizations that adopt cloud computing
technology, specifically for SaaS.
This page intentionally left blank
Appendix 1
Table A1. ITSM Maturity Assessment Interview (Sample).
Self-Service Desk Is there a service center in your organization (formal or informal)? Yes we do it every few years
Are calls that are taken at the Service Desk recorded in an electronic system? Yes at least half of them are/do
Does the service center log incoming calls and emails in a helpdesk system? Yes we do it every few years
Incident Does IT staff have a clear understanding of the incident management process? Yes at least half of them are/do
Management Is there enough information recorded incidents when they are registered? Yes we did it once
Is there a classification code assigned to incidents that can indicate the Yes at least half of them are/do
probable cause of the incident?
Problem Does IT staff have a clear understanding of the problem management Yes we do it every few years
Management process?
Is it clear to whom in the organization should the problems be attributed? Yes at least half of them are/do
Are the time and budget allocated to staff training in this area sufficient? Yes at least half of them are/do
Does the process owner analyze incident information to identify trends in Yes a small percentage are/do
incidents?
Release Is there sufficient time and budget allowed for training staff in this process area? Yes at least half of them are/do
Management Is there a published and accepted list of what is considered to be the highest Yes a small percentage are/do
priority components of the infrastructure?
Is there a known and documented naming convention for all configuration Yes at least half of them are/do
elements (CIs)?
Is there a clear release management process within the organization? Yes a small percentage are/do
Table A1. (Continued)
154
Change Does IT staff have a clear understanding of the change management process? Yes we do it every few years
Management Are change requests checked and verified before submission? Yes at least half of them are/do
Is there sufficient time and budget allowed for training staff in this process Yes we do it every few years
area?
Appendix
The Advisory Council on Change (ACC) establishes an appropriate mandate Yes at least half of them are/do
(meeting time, authority, etc.)?
Service Level Does IT staff have a clear understanding of the SLA management process? Yes teams write/run their own
Management Is there a regular review of the activities associated with this process? Yes we do it every few years
Are there Service Level Agreements (SLAs) that follow a defined structure? Yes we do it every few years
Does this process area exchange information with a variety of other Yes we do it every few years
process areas?
Availability Are there regular reviews of the performance of this process area against Yes at least half of them are/do
Management documented Key Performance Indicators (KPIs) regularly?
Are the availability objectives set by the organization SMART (Simple, Yes a small percentage are/do
Measurable, Achievable, Realistic, Time-bound)?
Are electronic tools used in this process field well utilized? Yes at least half of them are/do
Capacity Alarm thresholds are in place for systems that alert personnel to Yes at least half of them are/do
Management approaching maximum capacity limits?
Are the differences between operational capability, service capability and Yes a small percentage are/do
resource management well defined?
Does this process area exchange information with a variety of other Yes a small percentage are/do
process areas?
IT Asset Management Answer
Asset Discovery Is there a defined procedure for managing the organization’s information Yes a small percentage are/do
and inventory assets?
Which tool do you currently use to discover your software and hardware Yes but on an ad hoc basis
assets?
Configuration Is there a published and accepted list of what are considered to be the most Yes there is a standard set
Management critical components of the infrastructure?
Is there a known and documented naming convention in place for all Yes, a small percentage are/do
Configuration items (CI’s)?
Are there procedures to ensure that the configuration management process Yes there is a standard set
cannot be bypassed?
IT Financial Do you have effective control over the operating costs of the IT Yes, a small percentage are/do
Management environment?
Can the costs of providing current services to the business be demonstrated Yes, localized to business areas
easily?
Are actual costs compared to budgeted costs regularly? No
Asset Lifecycle Has the organization implemented, or plan to implement an asset Yes on an ad hoc basis
management system?
Does the organization have an asset management inventory/database, or No
does it plan to develop one?
IT Security Management Answer
IT Service Security Is there a procedure for IT services security management? Yes we do it every few years
Management Are there any security applications implemented in the organization? Yes at least half of them are/do
Appendix
155
Table A1. (Continued) 156
Are there physical barriers in place preventing unauthorized access to critical Yes a small percentage are/do
IT equipment?
Vulnerability and Is there an automated risk management process conforms to international Yes at least half of them are/do
Risk Management standards?
Does the organization define the system criticality according to its risk? Yes a small percentage are/do
Compliance Is there a formal policy containing, or referring to all security requirements Yes a small percentage are/do
Management to ensure compliance with the organization’s security standards?
Agility Management Answer
Strategy and Does IT staff have a clear understanding of the agility management process? Yes on an ad hoc basis
Process Is there a regular review of the activities associated with this process? Yes a small percentage are/do
Flexibility of The organization has qualified and motivated people at its disposal, enabling No
Structure it to provide agile solutions for changing the business situation?
Does the organization provide processes, plans, and responsibilities for agile Yes on an ad hoc basis
responses to a changing business environment?
Up-to-Dateness Are IT services provided in accordance with business needs? Yes teams write/run their own
of Technology Do the organization’s IT-focused programs deliver benefits promptly and Yes a small percentage are/do
Systems meet quality requirements and standards?
Does the IT service center provide knowledge, expertise, and initiatives for No
business innovation?
Are the benefits derived from IT investments and the IT services portfolio? No
Agility Management Answer
Staff Competency Does the organization cultivate its expertise through effective training? Yes at least half of them are/do
and Skills Does the organization motivate and maintain proficient employees? Yes a small percentage are/do
Are IT staff encouraged to improve their technical skills and are trained in Yes a small percentage are/do
development methods and tools to support agile development technics?
Organizational Are IT resources optimized to meet the organization’s agility objectives? No
Agility Does the organization provide effective business processes? Yes on an ad hoc basis
Does the organization define, maintain and approve functional requirements No
after a quick analysis of feasibility and alternate solutions?
Appendix
157
158 Appendix
Appendix 2
Table A2. ITSM Maturity Assessment Roadmap.
Abdelkebir, S., Maleh, Y., & Belaissaoui, M. (2019). Towards an agile and secure IT service
management. In J. Zhang (Ed.), Global information diffusion and management in
contemporary society (pp. 125–152). Hershey, PA: IGI Global.
Abdollahzadehgan, A., Che Hussin, A. R., Gohary, M. M., & Amini, M. (2013). The
organizational critical success factors for adopting cloud computing in SMEs.
Journal of Information Systems Research and Innovation, 4(1), 67–74. https://doi.
org/https://ssrn.com/abstract=2333028
Abolfazli, S., Sanaei, Z., Tabassi, A., Rosen, S., Gani, A., & Khan, S. U. (2015). Cloud adop-
tion in Malaysia: Trends, opportunities, and challenges. IEEE Cloud Computing,
2(1), 60–68. https://doi.org/10.1109/MCC.2015.1
Adalı, O. E., Özcan-Top, O., & Demirörs, O. (2016). Evaluation of agility assessment
tools: A multiple case study. In Communications in computer and information science,
Berlin/Heidelberg, Germany, pp. 135–149. Retrieved from http://link.springer.com/
10.1007/978-3-319-38980-6_11.
Adams, D. A., Nelson, R. R., Todd, P. A., Ahmi, A., Kent, S., Al-Ansi, A. A., … Willborn,
W. W. (2009). Factors affecting the adoption of open systems: An exploratory study.
MIS Quarterly, 16(2), 1521–1552. https://doi.org/10.1108/02686900510606092
Adamson, G., Wang, L., Holm, M., & Moore, P. (2017). Cloud manufacturing – A
critical review of recent development and future trends. International Journal of
Computer Integrated Manufacturing, 30(4–5), 347–380. https://doi.org/10.1080/095
1192X.2015.1031704
Aiken, M. W., Liu Sheng, O. R., & Vogel, D. R. (1991). Integrating expert systems with
group decision support systems. ACM Transactions on Information Systems (TOIS),
9(1), 75–95.
Alaceva, C., & Rusu, L. (2015). Barriers in achieving business/IT alignment in a large
Swedish company: What we have learned? Computers in Human Behavior, 51,
715–728. https://doi.org/https://doi.org/10.1016/j.chb.2014.12.007
Alam, S. S. (2009). Adoption of internet in Malaysian SMEs. Journal of Small Business and
Enterprise Development, 16(2), 240–255. https://doi.org/10.1108/14626000910956038
Alavi, M., & Leidner, D. E. (2001). Knowledge management and knowledge management
systems: Conceptual foundations and research issues. MIS Quarterly, 25, 107–136.
Albrecht, C. C., Dean, D. L., & Hansen, J. V. (2005). Marketplace and technology standards
for B2B e-commerce: progress, challenges, and the state of the art. Information &
Management, 42(6), 865–875.
Ali, S., & Green, P. (2012). Effective information technology (IT) governance mechanisms:
An IT outsourcing perspective. Information Systems Frontiers, 14(2), 179–193.
Allen, B. R., & Boynton, A. C. (1991). Information architecture: In search of efficient flex-
ibility. MIS Quarterly: Management Information Systems, 15(4), 435–445. Retrieved
from https://www.jstor.org/stable/249447?origin=crossref
Alewine, N., Ruback, H., & Deligne, S. (2004). Pervasive speech recognition. IEEE
Pervasive Computing, 3(4), 78–81.
Allen, J. P. (2003). The evolution of new mobile applications: A sociotechnical perspective.
International Journal of Electronic Commerce, 8(1), 23–36.
Alshamaila, Y., Papagiannidis, S., & Li, F. (2013). Cloud computing adoption by SMEs
in the north east of England: A multi-perspective framework. Journal of Enterprise
Information Management, 26(3), 250–275. https://doi.org/10.1108/17410391311325225
Altaf, F., & Schuff, D. (2010). Taking a flexible approach to ASPs. Communications of the
ACM, 53(2), 139–143.
160 Reference
Amron, M. T., Ibrahim, R., Abu Bakar, N. A., & Chuprat, S. (2019). Determining factors
influencing the acceptance of cloud computing implementation. Procedia Computer
Science, 161, 1055–1063. https://doi.org/https://doi.org/10.1016/j.procs.2019.11.216
Anderson, C. (2010). Presenting and evaluating qualitative research. American Journal of
Pharmaceutical Education, 74(8), 141.
Anderson, J., & Bishop, R. (2018). An ITSM for a new era: Leaving a self-supported
internal legacy system for a brighter future in the Cloud(S)’. In Proceedings ACM
SIGUCCS user services conference, IEEE Xplore, Orlando, FL, USA, pp. 111–113.
Ang, A., Brandt, M., & Denison, D. F. (2014). Review of the active management of the
Norwegian government pension fund global. Report to the Norwegian Ministry of
Finance, New York, NY, USA.
Anthony Byrd, T., Lewis, B. R., & Bryan, R. W. (2006). The leveraging influence of
strategic alignment on IT investment: An empirical examination. Information and
Management, 43(3), 308–321. https://doi.org/10.1016/j.im.2005.07.002
Aoyama, M. (1998). Agile software engineering environment over the internet. In 1CSE
98 workshop on software engineering over the internet, April, New York, NY, USA.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., … Rabkin,
A. (2010). A view of cloud computing clearing the clouds away from the true poten-
tial and obstacles posed by this computing capability. Communications of the ACM,
53(4), 50–58. https://doi.org/10.1145/1721654.1721672
Arteta, B. M., & Giachetti, R. E. (2004). A measure of agility as the complexity of
the enterprise system. Robotics and Computer-Integrated Manufacturing, 20(6),
495–503. https://doi.org/10.1016/J.rcim.2004.05.008
Ashrafi, A., Ravasan, A. Z., Trkman, P., & Afshari, S. (2019). The role of business analyt-
ics capabilities in bolstering firms’ agility and performance. International Journal of
Information Management, 47, 1–15.
Atapattu, M., & Sedera, D. (2014). Agility in consumer retail: Sense-response alignment
through the eyes of customers. Australasian Journal of Information Systems, 18(2),
111–132.
Atkinson, P. E. (1990). Creating culture change: The key to successful total quality manage-
ment. San Francisco, CA: Pfeiffer/Jossey-Bass.
Attaran, M. (2004). Exploring the relationship between information technology and busi-
ness process reengineering. Information & Management, 41(5), 585–596.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529–534. https://doi.org/10.1016/
j.protcy.2013.12.525
Azadegan, A., & Teich, J. (2010). Effective benchmarking of innovation adoptions: A theo-
retical framework for e-procurement technologies. Benchmarking: An International
Journal, 17(4), 472–490. https://doi.org/10.1108/14635771011060558
Bakos, Y., Lucas, H. C. Jr, Oh, W., Simon, G., Viswanathan, S., & Weber, B. W. (2005). The
impact of e-commerce on competition in the retail brokerage industry. Information
Systems Research, 16(4), 352–371.
Bamber, C. J., Hides, M. T., & Sharp, J. M. (2000). Integrated management systems: An
agile manufacturing enabler. In 1st International Conference on Systems Thinking in
Management (pp. 83–88). Citeseer.
Bamber, C. J., Sharp, J. M., & Hides, M. T. (2000). Developing management systems towards
integrated manufacturing: a case study perspective. Integrated Manufacturing
Systems, 11(7), 454–461.
Banerjee, A., Ghosh, S. C., & Banerjee, N. (2012). Pack your sack for the cloud. In
Proceedings of the 5th India Software Engineering Conference (pp. 116–157), Kanpur,
India. https://doi.org/10.1145/2134254.2134283
Barreto, L., Amaral, A., & Pereira, T. (2017). Industry 4.0 implications in logistics: An
overview. Procedia Manufacturing, 13, 1245–1252.
Reference 161
Barreto, L., Scheunemann, L., Fraga, J., & Siqueira, F. (2017). Secure storage of user
credentials and attributes in federation of clouds. In Proceedings of the ACM
symposium on applied computing, Marrakech, Morocco, pp. 364–369.
Bartolini, C., Sallé, M., & Trastour, D. (2006). IT service management driven by business
objectives: An application to incident management. In IEEE symposium record on
network operations and management, Vancouver, Canada, pp. 45–55.
Baskerville, R., & Pries-Heje, J. (2004). Short cycle time systems development. Information
Systems Journal, 14(3), 237–264.
Basson, G., Walker, A., McBride, T., & Oakley, R. (2012). ISO/IEC 15504 measurement
applied to COBIT process maturity. Benchmarking: An International Journal, 19(2),
159–176. https://doi.org/10.1108/14635771211224518
Batra, D., Hoffer, J. A., & Bostrom, R. P. (1988). A comparison of user performance
between the relational and the extended entity relationship models in the discovery
phase of database design. In Proceedings of ICIS (p. 43) Auckland, New Zealand.
Bauer, M. J., Poirier, C. C., Lapide, L., & Bermudez, J. (2001). E-business: The strategic
impact on supply chain and logistics. Lombard, IL: Council of Supply Chain
Management Professionals.
Beatty, S. E., & Smith, S. M. (1987). External search effort: An investigation across several
product categories. Journal of Consumer Research, 14(1), 83–95.
Beck, K., Beedle, M., Van Bennekum, A., Cockburn, A., Cunningham, W., Fowler, M., …
& Kern, J. (2001). Manifesto for agile software development.
Beck, K., & Boehm, B. (2003). Agility through discipline: A debate. Computer, 36(6), 44–46.
Beloglazov, A., Banerjee, D., Hartman, A., & Buyya, R. (2014). Improving produc-
tivity in design and development of information technology (IT) service deliv-
ery simulation models. Journal of Service Research, 18(1), 75–89. https://doi.
org/10.1177/1094670514541002
Benamati, J., & Lederer, A. L. (2001). Coping with rapid changes in IT. Communications of
the ACM, 44(8), 83–88.
Benaroch, M., & Chernobai, A. (2017). Operational IT failures, IT value destruction,
and board-level it governance changes. MIS Quarterly, 41(3), 729–762. https://doi.
org/10.25300/MISQ/2017/41.3.04
Benlian, A., & Hess, T. (2011). Opportunities and risks of software-as-a-service: Findings
from a survey of IT executives. Decision Support Systems, 52(1), 232–246. https://
doi.org/10.1016/j.dss.2011.07.007
Benlian, A., Kettingaer, W. J., Sunyaev, A., Winkler, T. J., & Editors, G. (2018). The transform-
ative value of cloud computing: a decoupling, platformization, and recombination
theoretical framework. Journal of Management Information Systems, 35(3), 719–739.
Berger, H., & Beynon-Davies, P. (2009). The utility of rapid application development in
large-scale, complex projects. Information Systems Journal, 19(6), 549–570.
Bernard, M., & Le Moigne, J-L. (1978). La théorie du système général (théorie de la
modélisation). Collection Systèmes-Décisions, 1977. Communication Information,
2(3), 217–218.
Bessant, J., & Francis, D. (1999). Developing strategic continuous improvement capability.
International Journal of Operations & Production Management, 19(11), 1106–1119.
Bhat, J. M. (2013). Adoption of cloud computing by SMEs in India: A study of the institu-
tional factors. In 19th Americas Conference on Information Systems, AMCIS 2013 -
Hyperconnected World: Anything, Anywhere, Anytime (Vol. 1, pp. 271–278). Retrieved
from http://www.scopus.com/inward/record.url?eid=2-s2.0-84893328840&partner
ID=tZOtx3y1
Bhatt, G., Emdad, A., Roberts, N., & Grover, V. (2010). Building and leveraging infor-
mation in dynamic environments: The role of IT infrastructure flexibility as ena-
bler of organizational responsiveness and competitive advantage. Information &
Management, 47(7–8), 341–349.
162 Reference
Bicheno, J. (1994). Cause and effect JIT: The essentials of lean manufacturing. Johannesburg:
Picsie Books.
Bishop, M. (2002). Computer security: Art and science. In the 2nd International Conference
on Bioinformatics and Biomedical Engineering, ICBBE 2008 Boston, MA. https://
doi.org/10.1002/ejoc.201200111
Boar, B. H. (1998). Redesigning the IT organization for the information age. Information
Systems Management, 15(3), 23–30. Retrieved from http://www.tandfonline.com/
doi/abs/10.1201/1078/43185.15.3.19980601/31131.4
Borgman, H. P., Bahli, B., Heier, H., & Schewski, F. (2013). Cloudrise: Exploring cloud
computing adoption and governance with the TOE framework. In Proceedings of
the Annual Hawaii International Conference on System Sciences (pp. 4425–4435)
Maui, HI. https://doi.org/10.1109/HICSS.2013.132
Börjesson, A., Martinsson, F., & Timmerås, M. (2006). Agile improvement practices
in software organizations. European Journal of Information Systems, 15(2),
169–182.
Bottani, E. (2009). A fuzzy QFD approach to achieve agility. International Journal of
Production Economics, 119(2), 380–391.
Bourque, L., & Fielder, E. P. (2003). How to conduct self-administered and mail surveys
(Vol. 3). Thousand Oaks, CA: Sage.
Boyer, L. (2004). Avenir du management et management de l’avenir: La place du métier.
Management & Avenir, 1, 7–21.
Bradley, S. P. (1998). Sense & respond: Capturing value in the network era. Brighton,
MA: Harvard Business School Press. Retrieved from https://books.google.com/
books?id=n17rLNY6ro4C&pgis=1
Brinda, M., & Heric, M. (2017). The changing faces of the cloud. Bain & Company, (Bain
Co.). Retrieved from http://www.bain.com/Images/BAIN_BRIEF_The_Changing_
Faces_of_the_Cloud.pdf%0Ahttp://www.bain.com/publications/articles/the-changing-
faces-of-the-cloud.aspx
Broadbent, M., & Weill, P. (1997). Management by maxim: How business and IT managers
can create IT infrastructures. Sloan Management Review, 38, 77–92.
Broadbent, M., Weill, P., & St. Clair, D. (1999). The implications of information technol-
ogy infrastructure for business process redesign. MIS Quarterly, 23(2), 159–182.
Brooks, P. (2006). Metrics for IT service management. ’s-Hertogenbosch: Van Haren.
Brown, A. E., Grant, G. G., & Sprott, E. (2005). Framing the frameworks: A review of it
governance research. Communications of the Association for Information Systems,
15, 696–712. https://doi.org/Article
Brown, S., & Bessant, J. (2003). The manufacturing strategy-capabilities links in mass cus-
tomisation and agile manufacturing–an exploratory study. International Journal of
Operations & Production Management, 23(7), 707–730.
Bruce, K. (1998). Can you align IT with business strategy? Strategy & Leadership, 26(5),
16–20. https://doi.org/10.1108/eb054620
Brustbauer, J. (2016). Enterprise risk management in SMEs: Towards a structural
model. International Small Business Journal, 34(1), 70–85. https://doi.org/10.1177/
0266242614542853
Buhalis, D. (2004). eAirlines: Strategic and tactical use of ICTs in the airline industry.
Information & Management, 41(7), 805–825.
Butler, B. S., & Gray, P. H. (2006). Reliability, mindfulness, and information systems. Mis
Quarterly, 30, 211–224.
Butt, S. A., Tariq, M. I., Jamal, T., Ali, A., Martinez, J. L. D., & De-La-Hoz-Franco,
E. (2019). Predictive variables for agile development merging cloud comput-
ing services. IEEE Access, 7, 99273–99282. https://doi.org/10.1109/ACCESS.
2019.2929169
Buxmann, P., Diefenbach, H., & Hess, T. (2015). Cloud computing. Die Softwareindustrie,
221–256. https://doi.org/10.1007/978-3-662-45589-0_7
Reference 163
Byrd, T. A., & Turner, D. E. (2000). Measuring the flexibility of information technology infra-
structure: Exploratory analysis of a construct. Journal of Management Information
Systems, 17(1), 167–208. https://doi.org/10.1080/07421222.2000.11045632
Cadete, G. R., & da Silva, M. M. (2017). In M. Themistocleous & V. Morabito (Eds.),
Assessing IT governance processes using a COBIT5 model BT - Information systems.
(pp. 447–460) Cham: Springer International Publishing.
Cao, L., Mohan, K., Xu, P., & Ramesh, B. (2009). A framework for adapting agile devel-
opment methodologies. European Journal of Information Systems, 18(4), 332–343.
Carter, C. B., & Lorsch, J. W. (2004). Back to the drawing board. Boston, MA: Harvard
Business School Press.
Castka, P., Bamber, C. J., Sharp, J. M., Belohoubek, P., Bessant, J., Francis, D., &
Robinson, A. G. (1991). Factors affecting successful implementation of high perfor-
mance teams. International Journal of Operations & Production Management, 19(11),
1106–1119.
Cater-Steel, A. (2009). IT service departments struggle to adopt a service-oriented philoso-
phy. International Journal of Information Systems in the Service Sector (IJISSS),
1(2), 69–77.
Celen, M., & Djurdjanovic, D. (2012). Operation-dependent maintenance scheduling
in flexible manufacturing systems. CIRP Journal of Manufacturing Science and
Technology, 5(4), 296–308.
Cervone, H. F. (2010). An overview of virtual and cloud computing. OCLC Systems &
Services: International Digital Library Perspectives, 26(3), 162–165.
Chamanifard, R., Nikpour, A., Chamanifard, S., & Nobarieidishe, S. (2015). Impact of
organizational agility dimensions on employee’s organizational commitment in
Foreign Exchange Offices of Tejarat Bank, Iran. European Online Journal of Natural
and Social Science, 4(1), 199–207.
Chang, V., De Roure, D., Wills, G., & Walters, R. J. (2011). Case studies and organisa-
tional sustainability modelling presented by cloud computing business framework.
International Journal of Web Services Research, 8(3), 26–53. https://doi.org/10.4018/
IJWSR.2011070102
Changchit, C., & Chuchuen, C. (2018). Cloud computing: An examination of factors
impacting users’ adoption. Journal of Computer Information Systems, 58(1), 1–9.
https://doi.org/10.1080/08874417.2016.1180651
Chemjor, E. M., & Lagat, C. (2017). Determinants of level of cloud computing adoption in
small and medium enterprises in Nairobi county. International Journal of Economics,
Commerce and Management. 5(4), 248–265.
Chen, P. P. S. (1976). The entity-relationship model – Toward a unified view of data. ACM
Transactions on Database Systems (TODS), 1(1), 9–36.
Cheng, T. C., & Podolsky, S. (1996). Just-in-time manufacturing: An introduction. Berlin:
Springer Science & Business Media.
Chenoweth, T., Corral, K., & Demirkan, H. (2006). Seven key interventions for data ware-
house success. Communications of the ACM, 49(1), 114–119.
Chiang, R. H. L., Grover, V., Liang, T.-P., & Zhang, D. (2018). Special issue: Strategic value
of big data and business analytics. Park Drive: Taylor & Francis.
Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). A partial least squares latent
variable modeling approach for measuring interaction effects: results from a
Monte Carlo simulation study and an electronic-mail emotion/ adoption study.
Information Systems Research, 14(2), 189–217. https://doi.org/10.1287/isre.
14.2.189.16018
Chiu, T., & Wang, T. D. (2019). The COSO framework in emerging technology envi-
ronments: An effective in-class exercise on internal control. Journal of Emerging
Technologies in Accounting, 16(2), 89–98. https://doi.org/10.2308/jeta-52500
Cho, V., & Chan, A. (2015). An integrative framework of comparing SaaS adoption for
core and non-core business operations: An empirical study on Hong Kong industries.
164 Reference
Dove, R. (1992). The 21st century manufacturing enterprise strategy – Volume 2 (pp. 1–8).
Bethlehem, PA: Japan Management Association Research.
Dove, R. (1991). The 21st century manufacturing enterprise strategy. Iacocca Institute,
Lehigh University.
Dove, R. (1995). Rick dove agility forum best agile practice reference base – 1994: Challenge
models and benchmarks Rick Dove. In 4th Annual Agility Conference. Director
Strategic Analysis, Agility Forum, Bethlehem, PA.
Dove, R. (2002). Response ability: The language, structure, and culture of the agile enter-
prise. Hoboken, NJ: John Wiley & Sons.
Drucker, P. F. (1995). The new productivity challenge. Quality in Higher Education, 37, 45–53.
Duncan, N. B. (1995). Capturing flexibility of information technology infrastructure: A study
of resource characteristics and their measure. Journal of Management Information
Systems, 12(2), 37–57. Retrieved from http://www.jstor.org/stable/40398165
Dybå, T., & Dingsøyr, T. (2008). Empirical studies of agile software development: A sys-
tematic review. Information and Software Technology, 50(9–10), 833–859.
Ebert, C., Gallardo, G., Hernantes, J., & Serrano, N. (2016). DevOps. Ieee Software, 33(3),
94–100.
Elhasnaoui, S., Medromi, H., Chakir, A., & Sayouti, A. (2015). A new IT governance
architecture based on multi agents system to support project management. In
International Conference on Electrical and Information Technologies (ICEIT)
(pp. 43–46). Marrakech, Morocco. https://doi.org/10.1109/EITech.2015.7162957
Evans, J. S. (1991). Strategic flexibility for high technology manoeuvres: A conceptual
framework. Journal of Management Studies, 28(1), 69–89.
Faul, F., Erdfelder, E., Lang, A.-G., & Buchner, A. (2007). G* Power 3: A flexible statistical
power analysis program for the social, behavioral, and biomedical sciences. Behavior
Research Methods, 39(2), 175–191.
Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey.
Future Generation Computer Systems, 29(1), 84–106. https://doi.org/10.1016/
j.future.2012.05.023
Fichman, R. (2004). Going beyond the dominant paradigm for information technology
innovation research: Emerging Concepts. Journal of the Association for Information
Systems, 5(8), 314–355. https://doi.org/Article
Fink, L., & Neumann, S. (2009). Taking the high road to web services implementation: An
exploratory investigation of the organizational impacts. ACM SIGMIS Database:
The DATABASE for Advances in Information Systems, 40(3), 84–108.
Foddy, W., & Foddy, W. H. (1994). Constructing questions for interviews and questionnaires:
Theory and practice in social research. Cambridge: Cambridge University Press.
Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008). Cloud computing and grid computing
360-degree compared. In Grid Computing Environments Workshop, GCE 2008.
Austin, TX https://doi.org/10.1109/GCE.2008.4738445
Foster, R., & Kaplan, S. (2001). Creative destruction, from built-to-last to built-to-perform.
London: Pearson Education Limited.
Fowler, M., & Highsmith, J. (2001). The agile manifesto. Software Development, 9(8), 28–35.
Frank, A. G., Dalenogare, L. S., & Ayala, N. F. (2019). Industry 4.0 technologies:
Implementation patterns in manufacturing companies. International Journal of
Production Economics, 210, 15–26.
Friedman, T. L. (2005). The world is flat, A brief history of the twenty-first century. 1–10.
Friedman, T. L. (2015). It’s a flat world after all. Internal Audit Reports Post Sarbanes-
Oxley, 3, 149–150.
Galliers, R. D. (1991). Strategic information systems planning: myths, reality and guidelines
for successful implementation. European Journal of Information Systems, 1(1), 55–64.
Galliers, R. D. (2006). Strategizing for agility: Confronting information. Agile Information
Systems, 1.
Reference 167
Gallupe, R. B., DeSanctis, G., & Dickson, G. W. (1988). Computer-based support for
group problem-finding: An experimental investigation. MIS Quarterly, 12, 277–296.
Garrison, G., Kim, S., & Wakefield, R. L. (2012). Success factors for deploying cloud comput-
ing. Communications of the ACM, 55(9), 62. https://doi.org/10.1145/2330667.2330685
Gartner. (2017). Gartner insights on how and why leaders must implement cloud comput-
ing cloud strategy leadership have you or your cio expressed any of these concerns?
Retrieved from http://www.gartner.com/imagesrv/books/cloud/cloud_strategy_lead-
ership.pdf
Gebauer, J., & Lee, F. (2008). Enterprise system flexibility and implementation strategies:
Aligning theory with evidence from a case study. Information Systems Management,
25(1), 71–82.
Gene, K., Jez, H., Patrick, D., & John, W. (2016). The DevOps handbook. How to create
world-class agility, reliability & security in technology organizations. Portland, OR:
IT Revolution.
Gerth, A. B., & Rothman, S. (2007). The future IS organization in a flat world. Information
Systems Management, 24(2), 103–111.
Ghobakhloo, M. (2018). The future of manufacturing industry: A strategic roadmap
toward industry 4.0. Journal of Manufacturing Technology Management, 29(6),
910–936. https://doi.org/10.1108/JMTM-02-2018-0057.
Ghobakhloo, M., Arias-Aranda, D., & Benitez-Amado, J. (2011). Adoption of e-commerce
applications in SMEs. In Industrial management and data systems (Vol. 111). Bingley:
Emerald. https://doi.org/10.1108/02635571111170785
Goldman, S. L. (1994). ‘Agile manufacturing concept’. In Coupling technology to national
need (Vol. 2102, pp. 30–40). Bellingham, WA: International Society for Optics and
Photonics.
Goldman, S. L., & Nagel, R. N. (1993). Management, technology and agility: The emergence
of a new era in manufacturing. International Journal of Technology Management, 8,
18–38. https://doi.org/10.1504/IJTM.1993.025758
Goldman, S. L., Nagel, R. N., & Preiss, K. (1995). Agile competitors and virtual organizations:
Strategies for enriching the customer (Vol. 8). New York, NY: Van Nostrand Reinhold.
Gong, C., Liu, J., Zhang, Q., Chen, H., & Gong, Z. (2010). The characteristics of cloud
computing. In 39th International Conference on Parallel Processing Workshops
(pp. 275–279). San Diego, CA. https://doi.org/10.1109/ICPPW.2010.45
Goodhue, D. L., Quillard, J. A., & Rockart, J. F. (1988). Managing the data resource: A
contingency perspective. MIS Quarterly, 12, 373–392.
Goranson, H. T., & Goranson, T. (1999). The agile virtual enterprise: cases, metrics, tools.
Westport, CT: Greenwood Publishing Group.
Goscinski, A., & Brock, M. (2010). Toward dynamic and attribute based publication, dis-
covery and selection for cloud computing. Future Generation Computer Systems,
26(7), 947–970. https://doi.org/https://doi.org/10.1016/j.future.2010.03.009
Goyal, A., & Dadizadeh, S. (2009). A survey on cloud computing. Technical Report for CS,
58, December, pp. 55–58. https://doi.org/10.17148/IJARCCE.2016.54261
Grandon, E. E., & Pearson, J. M. (2004). Electronic commerce adoption: an empirical
study of small and medium US businesses. Information & Management, 42(1),
197–216. https://doi.org/https://doi.org/10.1016/j.im.2003.12.010
Grant, G., Brown, A., Uruthirapathy, A., Mcknight, S., & Grant, G. G. (2007). Association
for information systems AIS electronic Library (AISeL). An extended model of
IT governance: A conceptual proposal. In Proceedings of AMCIS 2007 (p. 215).
Keystone, CO. Retrieved from http://aisel.aisnet.org/amcis2007%0Ahttp://aisel.ais-
net.org/amcis2007/215
Greenhalgh, T., Robert, G., Macfarlane, F., Bate, P., & Kyriakidou, O. (2004). Diffusion of
innovations in service organizations: Systematic review and recommendations. The
Milbank Quarterly, 82(4), 581–629.
168 Reference
Gregor, S., & Benbasat, I. (1999). Explanations from intelligent systems: Theoretical foun-
dations and implications for practice. MIS Quarterly, 23, 497–530.
Group, O. M. (1997). The common object request broker: Architecture and specification,
revision 2.0. February. Retrieved from https://www.omg.org/spec/CORBA/3.4/
Beta1/About-CORBA.rdf
Guldentops, E. (2002). Governing information technology through CobiT BT. In
M. Gertz, E. Guldentops, & L. Strous (Eds.), Integrity, internal control and secu-
rity in information systems: Connecting Governance and Technology (pp. 115–159).
Boston, MA: Springer. https://doi.org/10.1007/978-0-387-35583-2_8
Gunasekaran, A. (1999). Agile manufacturing: A framework for research and develop-
ment. International Journal of Production Economics, 62(1), 87–105. https://doi.
org/10.1016/S0925-5273(98)00222-9
Gunasekaran, A., & Yusuf, Y. Y. (2002). Agile manufacturing: A taxonomy of strategic
and technological imperatives. International Journal of Production Research, 40(6),
1357–1385. https://doi.org/10.1080/00207540110118370
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud com-
puting by small and medium businesses. International Journal of Information
Management, 33(5), 861–874.
Hagel, J., & Brown, J. S. (2003). From tightly bound to loosely coupled. Software
Development-San Francisco, 11(9), 39.
Hagel, J., & Brown, J. S. (2001). Your next IT strategy. Harvard Business Review, 79(9),
105–115.
Hagel, J., & Brown, J. S. (2003). The agile dance of architectures – Reframing IT enabled
business opportunities. SAP design guild, Edition on composite applications.
Halawi, L. A., Aronson, J. E., & McCarthy, R. V. (2005). Resource-based view of knowl-
edge management for competitive advantage. The Electronic Journal of Knowledge
Management, 3(2), 75.
Halpin, T. A. (2001). Microsoft’s new database modeling tool: Part 8. Journal of Conceptual
Modeling, 20. Retrieved from http://www.orm.net/pdf/jcm2002dec.pdf
Hank, M. (2006). ITIL: What it is and what it isn’t. Business Communications Review,
36(12), 49.
Hansen-Magnusson, H. (2010). Governance in the European Union: The European blood
directive as an evolving practice. Clinics in Laboratory Medicine, 30(2), 489–497.
Hasselbring, W. (2000). Information system integration. Communications of the ACM,
43(6), 32–38. https://doi.org/10.1145/336460.336472
Hayes, D. C., Hunton, J. E., & Reck, J. L. (2001). Market reaction to ERP implementation
announcements. Journal of Information Systems, 15(1), 3–18.
Heeks, R., Foster, C., & Nugroho, Y. (2014). New models of inclusive innovation for
development. Oxford: University of Oxford.
Hemlata, G., Hema, D., & Ramaswamy, R. (2015). Understanding determinants of
cloud computing adoption using an integrated TAM-TOE model. Journal of
Enterprise Information Management, 28(1), 107–130. https://doi.org/10.1108/
JEIM-08-2013-0065
Hiererra, S. E. (2012). Assessment of IT governance using COBIT 4.1 framework methodol-
ogy: Case study university IS development in IT directorate. Masters Thesis, BINUS
University, Jakarta, Indonesia.
Ho, S. K. M. (1999a). Change for the better via ISO 9000 and TQM. Management Decision,
37(4), 381–388.
Ho, S. K. M. (1999b). Total learning organisation. The Learning Organization, 6(3),
116–120.
Hobbs, B., & Petit, Y. (2017). Agile methods on large projects in large organizations. Project
Management Journal, 48(3), 3–19.
Reference 169
Hoberg, P., Wollersheim, J., & Krcmar, H. (2012). The business perspective on cloud
computing-a literature review of research on cloud computing. In AMCIS 2012
Proceedings, Paper 5. Seattle, WA
Hohpe, G., & Woolf, B. (2004). Enterprise integration patterns: Designing, building, and
deploying messaging solutions. Boston, MA: Addison-Wesley Professional.
Holmqvist, M., & Pessi, K. (2006). Agility through scenario development and continuous
implementation: A global aftermarket logistics case. European Journal of Information
Systems, 15(2), 146–158.
Hong, W., Thong, J. Y., Chasalow, L. C., & Dhillon, G. (2011). User acceptance of
agile information systems: A model and empirical test. Journal of Management
Information Systems, 28(1), 235–272.
Hooper, M. J., & Steeple, D. (1997). Agile manufacturing-manufacturing for the new mil-
lennium-a critical review. In IEEE Portland International Conference on Management
and Technology Innovation in Technology Management-The Key to Global Leadership
(PICMET’97) (pp. 635–637). Portland, OR
Hormozi, A. M. (2001). Agile manufacturing: The next logical step. Benchmarking: An
International Journal, 8(2), 132–143.
Hsu, P.-F., Kraemer, K. L., & Dunkle, D. (2006). Determinants of e-business use in
U.S. firms. International Journal of Electronic Commerce, 10(4), 9–45. https://doi.
org/10.2753/JEC1086-4415100401
Humble, J., & Farley, D. (2010). Continuous delivery: Reliable software releases through
build, test, and deployment automation. New York, NY: Pearson Education.
Hsu, P.-F., Ray, S., & Li-Hsieh, Y.-Y. (2014). Examining cloud computing adoption
intention, pricing mechanism, and deployment model. International Journal of
Information Management, 34(4), 474–488. https://doi.org/https://doi.org/10.1016/
j.ijinfomgt.2014.04.006
Ifinedo, P. (2011a). Internet/e-business technologies acceptance in Canada’s SMEs:
an exploratory investigation. Internet Research, 21(3), 255–281. https://doi.
org/10.1108/10662241111139309
Ifinedo, P. (2011b). An empirical analysis of factors influencing internet/e-business
technologies adoption by SMES in Canada. International Journal of Information
Technology & Decision Making, 10(04), 731–766. https://doi.org/10.1142/
S0219622011004543
Imache, R., Izza, S., & Ahmed-Nacer, M. (2012). An enterprise information system agil-
ity assessment model. Computer Science and Information Systems, 9(1), 107–133.
https://doi.org/10.2298/CSIS101110041I
Imai, K., Nonaka, I., & Takeuchi, H. (1984). Managing the new product development pro-
cess: How Japanese companies learn and unlearn. Boston, MA: Division of Research,
Harvard Business School.
ISACA. (2012). COBIT 5: A business framework for the governance and management of enter-
prise IT. Rolling Meadows, IL: Information Systems Audit and Control Association.
Isakowitz, T., Stohr, E. A., & Balasubramanian, P. (1995). RMM: A methodology for
structured hypermedia design. Communications of the ACM, 38(8), 34–44.
Ishikawa, D. K. (1985). What Is total quality control?: The Japanese way (business manage-
ment). Upper Sadle River, NJ: Prentice Hall Trade.
ITGI. (2007). COBIT mapping overview of international IT guidance (2nd ed.). Rolling
Meadows, IL: IT Governance Institute.
Jacobson, I., Booch, G., & Rumbaugh, J. (1999). The unified software development process.
Addison-Wesley Longman Publishing Co., Inc.
Jacobson, I., Booch, G., & Rumbaugh, J. (1999). The unified process. IEEE Software, 16(3), 96.
Izza, S., & Imache, R. (2010). An approach to achieve IT agility by combining SOA with ITSM.
International Journal of Information Technology and Management, 9(4), 423–445.
170 Reference
Knapp, K., Morris, R., E. Marshall, T., & Byrd, T. (2009). Information security policy: An
organizational-level process model. In Computers & Security, 28, 493–508. https://
doi.org/10.1016/j.cose.2009.07.001
Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions
and institutional evolution. Telecommunications Policy, 37(4), 372–386. https://doi.
org/https://doi.org/10.1016/j.telpol.2012.04.011
Kuan, K. K. Y., & Chau, P. Y. K. (2001). A perception-based model for EDI adoption
in small businesses using a technology–organization–environment framework.
Information & Management, 38(8), 507–521. https://doi.org/https://doi.org/10.1016/
S0378-7206(01)00073-8
Kumar, R. L., & Stylianou, A. C. (2014). A process model for analyzing and managing
flexibility in information systems. European Journal of Information Systems, 23(2),
151–184. https://doi.org/10.1057/ejis.2012.53
Kumbakara, N. (2008). Managed IT services: The role of IT standards. Information
Management and Computer Security, 16(4), 336–359. https://doi.org/10.1108/
09685220810908778.
Kunio, T. (2010). NEC cloud computing system. NEC Technical Journal, 5(2), 10–15.
Lacity, M. C., Willcocks, L. P., & Feeny, D. F. (1996). The value of selective IT sourcing.
Sloan Management Review, 37, 13–25.
Lahtela, A., Jäntti, M., & Kaukola, J. (2010). Implementing an ITIL-based IT service
management measurement system. In 4th International conference on digital society,
ICDS 2010, Includes CYBERLAWS 2010: The 1st International conference on tech-
nical and legal aspects of the e-society, St. Maarten, Netherlands. IEEE, pp. 249–254.
Landry, M., & Banville, C. (1992). A disciplined methodological pluralism for MIS
research. Accounting, Management and Information Technologies, 2(2), 77–97.
Lee, G., & Xia, W. (2005). The ability of information systems development project teams
to respond to business and technology changes: A study of flexibility measures.
European Journal of Information Systems, 14(1), 75–92.
Lee, S., & Kim, K. (2007). Factors affecting the implementation success of Internet-based
information systems. Computers in Human Behavior, 23(4), 1853–1880. https://doi.
org/https://doi.org/10.1016/j.chb.2005.12.001
Lengnick-Hall, C. A., Beck, T. E., & Lengnick-Hall, M. L. (2011). Developing a capac-
ity for organizational resilience through strategic human resource management.
Human Resource Management Review, 21(3), 243–255. https://doi.org/https://doi.
org/10.1016/j.hrmr.2010.07.001
Li, Y., Jia, X., Chen, Y., & Yin, C. (2014). Frequency agility MIMO-SAR imaging and anti-
deception jamming performance. In 2014 31th URSI general assembly and scientific
symposium, URSI GASS 2014, Beijing, China, pp. 1–4.
Li, Z., Zhang, H., O’Brien, L., Cai, R., & Flint, S. (2013). On evaluating commercial Cloud
services: A systematic review. Journal of Systems and Software, 86(9), 2371–2393.
Lian, J.-W., Yen, D. C., & Wang, Y.-T. (2014). An exploratory study to understand the
critical factors affecting the decision to adopt cloud computing in Taiwan hospi-
tal. International Journal of Information Management, 34(1), 28–36. https://doi.org/
https://doi.org/10.1016/j.ijinfomgt.2013.09.004
Lietz, P. (2008). Questionnaire design in attitude and opinion research: Current state of an
art. Citeseer. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.
1.1.477.1797&rep=rep1&type=pdf
Lim, K. H. (2009). Knowledge management systems diffusion in Chinese enterprises: A
multistage approach using the technology-organization-environment framework.
Journal of Global Information Management (JGIM), 17(1), 70–84.
Lim, S. (2014). Impact of information technology infrastructure flexibility on the com-
petitive advantage of small and medium sized-enterprises. Journal of Business &
Management, 3(1), 1–12. https://doi.org/10.12735/jbm.v3i1p1
172 Reference
Lin, A., & Chen, N.-C. (2012). Cloud computing as an innovation: Percepetion, attitude,
and adoption. International Journal of Information Management, 32(6), 533–540.
https://doi.org/https://doi.org/10.1016/j.ijinfomgt.2012.04.001
Lin, H.-F., & Lin, S.-M. (2008). Determinants of e-business diffusion: A test of the tech-
nology diffusion perspective. Technovation, 28(3), 135–145. https://doi.org/https://
doi.org/10.1016/j.technovation.2007.10.003
Lippert, S. K., & Govindrajulu, C. (2006). Technological, organizational, and environ-
mental antecedents to web services adoption. Communications of the IIMA, 6(1),
146–158. https://doi.org/10.1017/CBO9781107415324.004
Lohr, B. S. (2007). Google and I.B.M. Join in ‘cloud computing’ research. New York Times,
October 8, pp. 9–10.
Low, C., Wu, M., & Chen, Y. (2011). Understanding the determinants of cloud computing
adoption. Industrial Management & Data Systems, 111(7), 1006–1023. https://doi.
org/10.1108/02635571111161262
Lowenstein, D., & Slater, C. (2016). Reducing the cost of test through strategic asset man-
agement. In AUTOTESTCON (Proceedings), Anaheim, Canada: IEEE, pp. 1–5.
Luo, X., Gurung, A., & Shim, J. P. (2010). Understanding the determinants of user
acceptance of enterprise instant messaging: An empirical study. Journal of
Organizational Computing and Electronic Commerce, 20(2), 155–181. https://doi.
org/10.1080/10919391003709179
Lynn, T., Liang, X., Gourinovitch, A., Morrison, J. P., Fox, G., & Rosati, P. (2018, January).
Understanding the determinants of cloud computing adoption for high performance
computing. In 51st Hawaii International Conference on System Sciences (HICSS-
51) (pp. 3894–3903). University of Hawai’i at Manoa.
Lyytinen, K., & Damsgaard, J. (2011). Inter-organizational information systems adoption–
a configuration analysis approach. European Journal of Information Systems, 20(5),
496–509.
Lyytinen, K., & Rose, G. M. (2003). The disruptive nature of information technology inno-
vations: the case of internet computing in systems development organizations. MIS
Quarterly, 27, 557–596.
Ma, Q., Pearson, J. M., & Tadisina, S. (2005). An exploratory study into factors of service
quality for application service providers. Information & Management, 42(8), 1067–1080.
Maas, J. (1998). Leveraging the new infrastructure: How market leaders capitalize on infor-
mation technology. MIT Sloan Management Review, 40(1), 104.
Mack, N., Woodsong, C., MacQueen, K. M., Guest, G., & Namey, E. (2005). Qualitative research
methods: A data collectors field guide. Durham, NC: Family Health International.
Maes, K., De Haes, S., & Van Grembergen, W. (2013). Investigating a process approach
on business cases: An exploratory case study at Barco. International Journal of IT/
Business Alignment and Governance (IJITBAG), 4(2), 37–53.
Markus, M. L., & Benjamin, R. I. (1996). Change agentry-the next IS frontier. MIS
Quarterly, 20, 385–407.
Marrone, M., Gacenga, F., Cater-Steel, A., & Kolbe, L. (2014). IT service management:
A cross-national study of ITIL adoption. Communications of the Association for
Information Systems, 34(1), 865–892.
Marrone, M., & Kolbe, L. M. (2011). Uncovering ITIL claims: IT executives’ percep-
tion on benefits and Business-IT alignment. Information Systems and E-Business
Management, 9(3), 363–380. https://doi.org/10.1007/s10257-010-0131-7
Marston, S, Bandyopadhyay, S., & Ghalsasi, A. (2011). Cloud computing – The business
perspective. In 44th Hawaii International Conference on System Sciences (pp. 1–11).
Hawaii, USA https://doi.org/10.1109/HICSS.2011.102
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud comput-
ing – The business perspective. Decision Support Systems, 51(1), 176–189. https://
doi.org/10.1016/j.dss.2010.12.006
Reference 173
Murphy, K., Lyytinen, K., & Somers, T. (2018). A socio-technical model for project-based
executive IT governance. In Proceedings of the 51st Hawaii International Conference
on System Sciences (Vol. 9, pp. 4825–4834). Hawaii, USA
Nagel, R. N. (1992). 21st century manufacturing enterprise strategy report. Report no. 53.
US Defence Technical Information Center. Retrieved from https://doi.org/http://
books.google.co.uk/books?id=dSjsn_ECSSsC&pg=PP2&lpg=PP2&dq=Iacocca+
Institute,+21st+Century+Manufacturing+Enterprise+Strategy,+Lehigh+University,+
Bethlehem,+PA,+1991&source=bl&ots=uvnVNNf99X&sig=n-ssc_wIoQcntirxsH
yi7xUPHbU&hl=en&sa=X&ei=WKHPUtj1GMSB
Nagel, R. N., & Dove, R. (1991). 21st century manufacturing enterprise strategy: An industry-
led view. Darby, PA: Diane Publishing.
Narain, R., Yadav, R. C., Sarkis, J., & Cordeiro, J. J. (2000). The strategic implications
of flexibility in manufacturing systems. International Journal of Agile Management
Systems, 2(3), 202–213.
Nelson, A., & Harvey, F. A. (1995). Technologies for training and supporting your
agile workforce. In 4th Agility Forum Annual Conference on Creating the Agile
Organization: Models, Metrics and Pilots. (pp. 92–100). Atlanta, GA.
Neto, J. S., CGEIT, C., Assessor, C. C., & de Luca Ribeiro, C. H. (2014). Is COBIT 5 pro-
cess implementation a wicked problem? COBIT Focus, 2, 8–10.
Newcomer, E. (2002). Understanding web services: XML, Wsdl, Soap, and UDDI. Boston,
MA: Addison-Wesley Professional.
Newkirk, H. E., & Lederer, A. L. (2006). The effectiveness of strategic information sys-
tems planning under environmental uncertainty. Information & Management, 43(4),
481–501.
Nfuka, E. N., & Rusu, L. (2011). The effect of critical success factors on IT governance
performance. Industrial Management & Data Systems, 111(9), 1418–1448. https://
doi.org/10.1108/02635571111182773
Nkhoma, M., & Dang, D. (2013). Contributing factors of cloud computing adoption: A
technology-organisation-environment framework approach. International Journal
of Information Systems and Engineering (IJISE), 1(1), 38–49.
Oetzel, J. M. (2004). Differentiation advantages in the on-line brokerage industry.
International Journal of Electronic Commerce, 9(1), 105–126.
Ohno, T. (1988). Toyota production system: Beyond large-scale production. Boca Raton, FL:
CRC Press.
Oliveira, T., & Martins, M. F. (2011). Literature review of information technology adop-
tion models at firm level. The Electronic Journal Information Systems Evaluation
(EJISE), 14(1), 110–121.
Oliveira, T., & Martins, M. F. (2010). Understanding e-business adoption across indus-
tries in European countries. Industrial Management and Data Systems, 110(9),
1337–1354. https://doi.org/10.1108/02635571011087428
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud com-
puting adoption: An analysis of the manufacturing and services sectors. Information
and Management, 51(5), 497–510. https://doi.org/10.1016/j.im.2014.03.006
Oliver, D., & Lainhart, J. (2012). COBIT 5: Adding value through effective geit. EDPACS,
46(3), 1–12. https://doi.org/10.1080/07366981.2012.706472
Olson, M. H. (1985). Management information systems: Conceptual foundations, structure,
and development. New York, NY: McGraw-Hill.
Omari, L. A., Barnes, P. H., & Pitman, G. (2012). An exploratory study into audit chal-
lenges in IT governance: A Delphi approach. In the Symposium on IT Governance,
Management and Audit. Retrieved from https://eprints.qut.edu.au/53110/
Otto, B. (2010). IT governance and organizational transformation: Findings from an action
research study. In AMCIS (p. 421). Lima, Peru.
Reference 175
Overby, E., Bharadwaj, A., & Sambamurthy, V. (2006). Enterprise agility and the enabling
role of information technology. European Journal of Information Systems, 15(2),
120–131.
Oztemel, E., & Gursev, S. (2020). Literature review of Industry 4.0 and related technolo-
gies. Journal of Intelligent Manufacturing, 31(1), 127–182.
Park, J. O., Kim, S. G., Choi, B. H., & Jun, M. S. (2008). The study on the maturity
measurement method of security management for ITSM. In Proceedings – 2008
International conference on convergence and hybrid information technology, ICHIT
2008, Busan, Korea: IEEE, pp. 826–830.
Park, Y., El Sawy, O. A., & Fiss, P. C. (2017). The role of business intelligence and com-
munication technologies in organizational agility: A Configurational Approach.
Journal of the Association for Information Systems, 18(9), 648–686.
Parker, G. (1996). The military revolution: Military innovation and the rise of the west, 1500-
1800. Cambridge: Cambridge University Press.
Pearlson, K. E., & Saunders, C. S. (2006). Managing and using information systems.
Hoboken, NJ: Wiley.
Pereira, A. C., & Romero, F. (2017). A review of the meanings and the implications of the
industry 4.0 concept. Procedia Manufacturing, 13, 1206–1214.
Peters, T. J., & Waterman, R. H. (1984). In search of excellence. Nursing Administration
Quarterly, 8(3), 85–86.
Peterson, R. R. (2001). Configurations and coordination for global information technology
governance: Complex designs in a transnational european context. In Proceedings
of the Hawaii International Conference on System Sciences (p. 217). https://doi.
org/10.1109/HICSS.2001.927133
Pinsonneault, A., & Rivard, S. (1998). Information technology and the nature of manage-
rial work: From the productivity paradox to the Icarus paradox? MIS Quarterly, 22,
287–311.
Prager, K. P. (1996). Managing for flexibility: the new role of the aligned IT organization.
Information Systems Management, 13(4), 41–46.
Premkumar, G., & Roberts, M. (1999). Adoption of new information technologies in rural
small businesses. Omega, 27(4), 467–484. https://doi.org/https://doi.org/10.1016/
S0305-0483(98)00071-1
Prerna, L., & Shah, B. S. (2016). Understanding the impact of cloud-based services adoption
on organizational flexibility: An exploratory study. Journal of Enterprise Information
Management, 29(4), 566–588. https://doi.org/10.1108/JEIM-04-2015-0028
Queiroz, M., Tallon, P. P., Sharma, R., & Coltman, T. (2018). The role of IT application
orchestration capability in improving agility and performance. Journal of Strategic
Information Systems, 27(1), 4–21. https://doi.org/10.1016/j.jsis.2017.10.002
Raghupathi, W. (2007). Corporate governance of IT: A framework for development.
Communications of the ACM, 50(8), 94–99. https://doi.org/10.1145/1278201.1278212
Ramasesh, R., Kulkarni, S., Jayakumar, M., Jin-Hai, L., Anderson, A. R., & Harrison,
R. T. (2001). Integrated manufacturing systems agility in manufacturing systems:
An exploratory modeling framework and simulation. International Journal of
Operations & Production Management, 12(5), 534–548. https://doi.org/10.1108/
EUM0000000006236
Ramdani, B., Kawalek, P., & Lorenzo, O. (2009). Predicting SMEs’ adoption of enter-
prise systems. Journal of Enterprise Information Management, 22, 10–24. https://doi.
org/10.1108/17410390910922796
Ramesh, B., Mohan, K., & Cao, L. (2012). Ambidexterity in agile distributed development:
An empirical investigation. Information Systems Research, 23(2), 323–339.
Ramesh, J. V, Singh, S. K., & Sharma, M. (2011). Development of private cloud for edu-
cational institution using aneka grid container. In Proceedings of the International
176 Reference
Shore, B. (2006). Enterprise integration across the globally disbursed service organization.
Communications of the ACM, 49(6), 102–106.
Sia, S. K., Koh, C., & Tan, C. X. (2008). Strategic maneuvers for outsourcing flexibility: An
empirical assessment. Decision Sciences, 39(3), 407–443.
Siegel, J., & Perdue, J. (2012). Cloud services measures for global use: the service
measurement index (SMI). In IEEE SRII Global Conference (SRII) Annual
(pp. 411–415). San Jose, CA.
Sila, I. (2010). Do organisational and environmental factors moderate the effects of
Internet-based interorganisational systems on firm performance? European Journal
of Information Systems, 19(5), 581–600.
Silva Molina, E. J., Plazaola, L., Flores, J., & Vargas, N. (2005). How to identify and
measure the level of alignment between IT and business governance. In PICMET.
Portland, OR, USA.
Simonsson, M., & Johnson, P. (2006). Assessment of IT governance – A prioritization
of cobit. In Proceedings of the Conference on Systems Engineering Research. Los
Angeles, CA, December. Retrieved from http://sse.stevens.edu/fileadmin/cser/2006/
papers/151-Simonsson-Assessment of IT Governance.pdf
Simonsson, M., Johnson, P., & Wijkström, H. (2007). Model-based IT governance matu-
rity assessments with COBIT. In ECIS (pp. 1276–1287). St. Gallen, Switzerland.
Singh, M. P., Huhns, M. N., & Huhns, M. N. (2005). Service-oriented computing: semantics,
processes, agents. Hoboken, NJ: John Wiley & Sons.
Sitaram, D., & Manjunath, G. (2012). Moving to the cloud. Moving To The Cloud, 2(1),
1–10. https://doi.org/10.1016/C2010-0-66389-9
Skafi, M., Yunis, M. M., & Zekri, A. (2020). Factors influencing SMEs’ adoption of cloud
computing services in Lebanon: An empirical analysis using TOE and contextual the-
ory. IEEE Access, 8, 79169–79181. https://doi.org/10.1109/ACCESS.2020.2987331
Skinner, W. (1969). Manufacturing-missing link in corporate strategy. Harvard Business
Review, 47(3), 136–145.
Small, A. W., & Downey, E. A. (1996). Orchestrating multiple changes: A framework for
managing concurrent changes of varied type and scope. In IEMC 96 proceedings.
International conference on engineering and technology management. managing vir-
tual enterprises: A convergence of communications, computing, and energy technolo-
gies, Atlanta, GA, USA. IEEE, pp. 627–634.
Soltero, C., & Boutier, P. (2017). The 7 Kata: Toyota Kata, TWI, and lean training. Boca
Raton, FL: CRC Press.
Sonehara, N., Echizen, I., & Wohlgemuth, S. (2011). Isolation in cloud computing and
privacy-enhancing technologies: Suitability of privacy-enhancing technologies
for separating data usage in business processes. Business and Information Systems
Engineering, 3(3), 155–162. https://doi.org/10.1007/s12599-011-0160-x
Stanoevska, K., Wozniak, T., & Ristol, S. (2009). Grid and cloud computing: a business per-
spective on technology and applications. Berlin: Springer Science & Business Media.
Stein, M. K., Galliers, R. D., & Whitley, E. A. (2016). Twenty years of the European infor-
mation systems academy at ECIS: Emergent trends and research topics. European
Journal of Information Systems, 25(1), 1–15. https://doi.org/10.1057/ejis.2014.25
Stettina, C. J., & Kroon, E. (2013, June). Is there an agile handover? An empirical study of
documentation and project handover practices across agile software teams. In 2013
International Conference on Engineering, Technology and Innovation (ICE) & IEEE
International Technology Management Conference (pp. 1–12). IEEE.
Stettina, C. J., Zhao, Z., Back, T., & Katzy, B. (2013). Academic education of software
engineering practices: Towards planning and improving capstone courses based
upon intensive coaching and team routines. In Software engineering education con-
ference, proceedings, San Francisco, USA, pp. 169–178.
Reference 179
Steuperaert, D. (2019). COBIT 2019: A significant update. EDPACS, 59(1), 14–18. https://
doi.org/10.1080/07366981.2019.1578474
Strange, R., & Zucchella, A. (2017). Industry 4.0, global value chains and international
business. Multinational Business Review, 25(3), 174–184.
Strauss, A., & Corbin, J. (1998). Basics of qualitative research: Procedures and techniques for
developing grounded theory. Thousand Oaks, CA: Sage.
Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of
Information Management, 30(2), 109–116. https://doi.org/10.1016/j.ijinfomgt.2009.09.004
Susarla, A., Barua, A., & Whinston, A. B. (2006). Understanding the ‘service’component
of application service provision: an empirical analysis of satisfaction with ASP ser-
vices. In R. Hirschheim, A. Heinzl, & J. Dibbern (Eds.), Information systems out-
sourcing (pp. 481–521). Berlin: Springer.
Swafford, P. M. (2004). Theoretical development and empirical investigation of supply chain
agility. Atlanta, GA: Georgia Institute of Technology.
Swafford, P. M., Ghosh, S., & Murthy, N. (2008). Achieving supply chain agility through
IT integration and flexibility. International Journal of Production Economics, 116(2),
288–297. https://doi.org/https://doi.org/10.1016/j.ijpe.2008.09.002
Takeuchi, H., & Nonaka, I. (1986). The new product development game. Harvard Business
Review, 64(1), 137–146.
Tan, B., Pan, S. L., Lu, X., & Huang, L. (2009). Leveraging digital business ecosystems for
enterprise agility: The tri-logic development strategy of Alibaba.Com. In ICIS 2009
proceedings - Thirtieth international conference on information systems, Phoenix,
AZ, USA.
Tan, C., & Sia, S. K. (2006). Managing flexibility in outsourcing. Journal of the Association
for Information Systems, 7(4), 10.
Tan, W. G., Cater-Steel, A., & Toleman, M. (2009). Implementing IT service management:
A case study focussing on critical success factors. Journal of Computer Information
Systems, 50(2), 1–12.
Tan, X., & Ai, B. (2011). The issues of cloud computing security in high-speed railway.
In IEEE International Conference on Electronic and Mechanical Engineering and
Information Technology (EMEIT) (Vol. 8, pp. 4358–4363).
Tankard, C., & Pathways, D. (2016). What the GDPR means for. Network Security, 2016(6),
5–8. https://doi.org/10.1016/S1353-4858(16)30056-3
Tanriverdi, H., Rai, A., & Venkatraman, N. (2010). Research commentary – Reframing
the dominant quests of information systems strategy research for complex adaptive
business systems. Information Systems Research, 21(4), 822–834.
Tashakkori, A., & Creswell, J. W. (2007). Editorial: The new era of mixed methods. Journal
of Mixed Methods Research, 1, 3–7. https://doi.org/10.1177/2345678906293042
Teece, D., & Pisano, G. (1994). The dynamic capabilities of firms: An introduction.
Industrial and Corporate Change, 3(3), 537–556.
Termini, M. J. (1996). The new manufacturing Engineer: Coming of age in an agile environ-
ment. ISBN: 978-0872634794. Southfield, MI: Society of Manufacturing Engineers.
Thiesse, F., Staake, T., Schmitt, P., & Fleisch, E. (2011). The rise of the “next-generation
bar code”: An international RFID adoption study. Supply Chain Management,
16(5), 328–345. https://doi.org/10.1108/13598541111155848
Thomas, M. A., Redmond, R. T., & Weistroffer, H. R. (2009). Moving to the cloud:
Transitioning from client-server to service architecture. Journal of Service Science,
2(1), 1–10.
Thomson, S. B. (2010). Grounded theory - Sample size. Journal of Administration and
Governance, 5(1), 45–52.
Tidd, J. B., & Bessant, J. (1997). Managing innovation, integrating technological, market and
organisational change. Chichester: John Wiley & Sons.
180 Reference
Tiwana, A., Konsynski, B., & Bush, A. A. (2010). Research commentary – Platform evolu-
tion: Coevolution of platform architecture, governance, and environmental dynam-
ics. Information Systems Research, 21(4), 675–687.
Towill, D., & Christopher, M. (2002). The supply chain strategy conundrum: To be lean or
agile or to be lean and agile? International Journal of Logistics, 5(3), 299–309.
Tornatzky, L. G., Fleischer, M., & Chakrabarti, A. K. (1990). The processes of techno-
logical innovation. Issues in organization and management series. Lexington Books.
Retrieved from Http://Www.Amazon.Com/Processes-Technological-Innovation-
Organization/Management/Dp/0669203483. Accessed on June 10, 2013.
Trabelsi, L., & Abid, I. H. (2013). Urbanization of information systems as a trigger for
enhancing agility: A state in the Tunisian firms. European Journal of Business and
Management, 5(5), 63–77.
Trigueros-Preciado, S., Pérez-González, D., & Solana-González, P. (2013). Cloud computing in
industrial SMEs: Identification of the barriers to its adoption and effects of its applica-
tion. Electronic Markets, 23(2), 105–114. https://doi.org/10.1007/s12525-012-0120-4
Trisha, G., Glenn, R., Fraser, M., Paul, B., & Olivia, K. (2004). Diffusion of innovations
in service organizations: systematic review and recommendations. The Milbank
Quarterly, 82(4), 581–629. https://doi.org/10.1111/j.0887-378X.2004.00325.x
Truex, D. P., Baskerville, R., & Klein, H. (1999). Growing systems in emergent organiza-
tions. Communications of the ACM, 42(8), 117–123.
Tsai, M.-C., Lee, W., & Wu, H.-C. (2010). Determinants of RFID adoption intention:
Evidence from Taiwanese retail chains. Information & Management, 47(5), 255–261.
https://doi.org/https://doi.org/10.1016/j.im.2010.05.001
Tucci, J., Mitchell, J., & Goddard, C. (2007). Children’s fears, hopes and heroes. Melbourne:
Australian Childhood Foundation, June.
Turban, E. (2007). Information technology for management: Transforming organizations in
the digital economy. Hoboken, NJ: John Wiley & Sons, Inc.
Turel, O., & Bart, C. (2014). Board-level IT governance and organizational performance.
European Journal of Information Systems, 23(2), 223–239.
Upton, D. M. (1994). The management of manufacturing flexibility. California Management
Review, 36(2), 72–89.
Valentine, E. L. H. (2016). Enterprise technology governance: New information and technol-
ogy core competencies for boards of directors. Doctoral Dissertation, Queensland
University of Technology, Brisbane, Australia (pp. 1–295). https://doi.org/10.13140/
RG.2.2.34027.95529
Van Grembergen, W. (Ed.). (2004). Strategies for information technology governance. Igi
Global.
van Grembergen, W., & De Haes, S. (2009a). Enterprise governance of information tech-
nology: achieving strategic alignment and value. Springer Science & Business Media.
van Grembergen, W., & De Haes, S. (2009b). COBIT as a framework for enterprise govern-
ance of IT BT. In S. De Haes & W. Van Grembergen (Eds.), Enterprise governance
of information technology: Achieving strategic alignment and value (pp. 137–164).
Boston, MA: Springer. https://doi.org/10.1007/978-0-387-84882-2_5
van Grembergen, W., De Haes, S., & Guldentops, E. (2004). Structures, processes and rela-
tional mechanisms for IT governance. In Strategies for information technology gov-
ernance (pp. 1–36). Hershey, PA: Igi Global.
Van Hoek, R. I., Harrison, A., & Christopher, M. (2001). Measuring agile capabilities in
the supply chain. International Journal of Operations and Production Management,
21(1–2), 126–147.
Vaughan-Nichols, S. J. (2002). Web services: Beyond the hype. Computer, 35(2), 18–21.
Vázquez-Bustelo, D., Avella, L., & Fernández, E. (2007). Agility drivers, enablers and
outcomes. International Journal of Operations & Production Management, 27(12),
1303–1332. https://doi.org/10.1108/01443570710835633
Reference 181
Venkatesh, V., & Brown, S. A. (2013). Research essay bridging the qualitative – Quantitative
divide: Guidelines for conducting mixed methods. MIS Quarterly, 37, 21–54.
Von Solms, B. (2005). Information security governance: COBIT or ISO 17799 or both?
Computers and Security, 24(2), 99–104. https://doi.org/10.1016/j.cose.2005.02.002
Vouk, M. A. (2008). Cloud computing –Issues, research and implementations. In ITI 2008
– 30th International Conference on Information Technology Interfaces (pp. 235–246).
Dubrovnik, Croatia. https://doi.org/10.1109/ITI.2008.4588381
Wagire, A. A., Rathore, A. P. S., & Jain, R. (2019). Analysis and synthesis of industry 4.0
research landscape. Journal of Manufacturing Technology Management.
Wagire, A. A., Rathore, A. P.S., & Jain, R. (2020). Analysis and synthesis of industry 4.0
research landscape: Using latent semantic analysis approach. Journal of Manufacturing
Technology Management, 31(1), 31–51.
Walls, J. G., Widmeyer, G. R., & El Sawy, O. A. (1992). Building an information system
design theory for vigilant EIS. Information Systems Research, 3(1), 36–59.
Walterbusch, M., Martens, B., & Teuteberg, F. (2013). Evaluating cloud computing services
from a total cost of ownership perspective. Management Research Review, 36(6),
613–638. https://doi.org/10.1108/01409171311325769
Walters, G. J. (2001). Privacy and security: An ethical analysis. ACM SIGCAS Computers
and Society, 31(2), 8–23.
Wang, H. (2010). Privacy-preserving data sharing in cloud computing. Journal of
Computer Science and Technology, 25(3), 401–414. https://doi.org/10.1007/s11390-
010-9333-1
Wang, N., Xue, Y., Liang, H., & Ge, S. (2011). The road to business-IT alignment: A
case study of two chinese companies. Communications of AIS, 2011(28), 415–436.
Retrieved from http://content.ebscohost.com/ContentServer.asp?T=P&P=AN&
K=70400209&S=R&D=buh&EbscoContent=dGJyMNLe80Sep7A4yOvqOLC
mr0qeprJSsai4TLSWxWXS&ContentCustomer=dGJyMPGnr0m0r7JJuePfgeyx
44Dt6fIA%5Cnhttp://www.redi-bw.de/db/ebsco.php/search.ebscohost.com/login.
aspx?d
Wang, X., Conboy, K., & Pikkarainen, M. (2012). Assimilation of agile practices in use.
Information Systems Journal, 22(6), 435–455.
Wang, Y.-M., Wang, Y.-S., & Yang, Y.-F. (2010). Understanding the determinants of
RFID adoption in the manufacturing industry. Technological Forecasting and Social
Change, 77(5), 803–815.
Wang, Z., Li, B., Sun, L., & Yang, S. (2012). Cloud-based social application deployment
using local processing and global distribution. In Proceedings of the 8th International
Conference on Emerging Networking Experiments and Technologies (pp. 301–312).
Nice, France. https://doi.org/10.1145/2413176.2413211
Warland, C., & Ridley, G. (2005). Awareness of IT control frameworks in an australian
state government: A qualitative case study. In Proceedings of the 38th Annual Hawaii
International Conference on System Sciences (pp. 236b–236b). Big Island, HI, USA.
https://doi.org/10.1109/HICSS.2005.116
Webb, P., Pollard, C., & Ridley, G. (2006). Attempting to define IT governance: Wisdom
or folly? In Proceedings of the Annual Hawaii International Conference on System
Sciences (Vol. 8(C), pp. 1–10). Kauai, HI, USA. https://doi.org/10.1109/HICSS.
2006.68
Weill, P., & Ross, J. W. (2004). How top performers manage IT decisions rights for superior
results. In IT Governance (pp. 1–10). Boston, MA: Harvard Business School Press.
https://doi.org/10.2139/ssrn.664612
Weinhardt, C., Anandasivam, A., Blau, B., Borissov, N., Meinl, T., Michalk, W., & Stößer,
J. (2009). Cloud computing – A classification, business models, and research direc-
tions. Business & Information Systems Engineering, 1(5), 391–399. https://doi.
org/10.1007/s12599-009-0071-2
182 Reference
Zhu, Y., Li, Y., Wang, W., & Chen, J. (2010). What leads to post-implementation success
of ERP? An empirical study of the Chinese retail industry. International Journal of
Information Management, 30(3), 265–276.
Zviran, M. (1990). Relationships between organizational and information systems objec-
tives: some empirical evidence. Journal of Management Information Systems, 7(1),
65–84.
Zwass, V. (1992). Management information systems. Dubuque, IA: William C. Brown
Publishers.
Index