You are on page 1of 86

JEIM_cover_(i).

qxd 8/5/04 3:08 PM Page 1

Volume 17 Number 4 2004 ISBN 0-86176-996-1 ISSN 1741-0398

Journal of

Enterprise
Information
Management
Formerly Logistics Information Management:
An International Journal

Information systems evaluation: getting closer to the


organisation
Guest Editors: Dr Stephen Jones and Dr Jim Hughes

www.emeraldinsight.com
Journal of Enterprise Information Management
Volume 17, Number 4, 2004 ISSN 1741-0398

Information systems evaluation: getting closer


to the organisation
Guest Editors: Dr Stephen Jones and Dr Jim Hughes

Contents
242 Access this journal online 283 Narratives in ERP systems
evaluation
243 Abstracts & keywords
Jonas Hedman and Andreas Borell
245 Guest editorial
249 An integrative, iterative approach Other papers
to IS evaluation for 291 Online point-of-click Web
pharmaceutical clinical trials usability mining with PopEval
Catherine Dymoke-Bradshaw and (C-Assure Co-design
Benita Cox methodology)
258 Defining ICT proposals Atta Badii
Fred J. Heemstra and Rob J. Kusters 301 Benefits and barriers of electronic
269 A hedonic wage model-based marketplace participation: an
methodology for evaluating the SME perspective
benefits of IT investments Rosemary Stockdale and Craig Standing
in public-sector organisations 312 Information technology
Peter Cilek, Wolfgang Janko, evaluation: classifying indirect
Stefan Koch, Andreas Mild and costs using the structured case
Alfred Taudes method
276 Information systems evaluation Peter E.D. Love, Ahmad Ghoneim and
and the information systems Zahir Irani
development process
Paul Beynon-Davies, Ian Owens and
Michael D. Williams

Access this journal electronically

The current and past volumes of this journal are available at:
www.emeraldinsight.com/1741-0398.htm
You can also search over 100 additional Emerald journals in Emerald Fulltext:
www.emeraldinsight.com/ft
See page following contents for full details of what your access includes.
www.emeraldinsight.com/jeim.htm

As a subscriber to this journal, you can benefit from instant, E-mail alert services
electronic access to this title via Emerald Fulltext. Your access These services allow you to be kept up to date with the latest
includes a variety of features that increase the value of your additions to the journal via e-mail, as soon as new material
journal subscription. enters the database. Further information about the services
available can be found at www.emeraldinsight.com/
How to access this journal electronically usertoolkit/emailalerts
To benefit from electronic access to this journal you first need Emerald WIRE (World Independent Reviews)
to register via the Internet. Registration is simple and full A fully searchable subject specific database, brought to you
instructions are available online at www.emeraldinsight.com/ by Emerald Management Reviews, providing article reviews
rpsv/librariantoolkit/emeraldadmin Once registration from the world’s top management journals.
is completed, your institution will have instant access
to all articles through the journal’s Table of Contents Research register
page at www.emeraldinsight.com/1741-0398.htm More A Web-based research forum that provides insider
information about the journal is also available at information on research activity world-wide located at
www.emeraldinsight.com/jeim.htm www.emeraldinsight.com/researchregister You can also
register your research activity here.
Our liberal institution-wide licence allows everyone within
your institution to access your journal electronically, making User services
your subscription more cost effective. Our Web site has been Comprehensive librarian and user toolkits have been created
designed to provide you with a comprehensive, simple system to help you get the most from your journal subscription.
that needs only minimum administration. Access is available For further information about what is available visit
via IP authentication or username and password. www.emeraldinsight.com/usagetoolkit
Choice of access
Electronic access to this journal is available via a number of
Key features of Emerald electronic journals channels. Our Web site www.emeraldinsight.com is the
Automatic permission to make up to 25 copies of recommended means of electronic access, as it provides fully
individual articles searchable and value added access to the complete content
This facility can be used for training purposes, course of the journal. However, you can also access and search the
notes, seminars etc. This only applies to articles of which article content of this journal through the following journal
Emerald owns copyright. For further details visit delivery services:
www.emeraldinsight.com/copyright EBSCOHost Electronic Journals Service
ejournals.ebsco.com
Online publishing and archiving Huber E-Journals
As well as current volumes of the journal, you can also gain e-journals.hanshuber.com/english/index.htm
access to past volumes on the internet via Emerald Fulltext.
Informatics J-Gate
Archives go back to 1994 and abstracts back to 1989. You can
www.j-gate.informindia.co.in
browse or search the database for relevant articles.
Ingenta
Key readings www.ingenta.com
This feature provides abstracts of related articles chosen by Minerva Electronic Online Services
the journal editor, selected to provide readers with current www.minerva.at
awareness of interesting articles from other publications in
OCLC FirstSearch
the field.
www.oclc.org/firstsearch
Reference linking SilverLinker
Direct links from the journal article references to abstracts of www.ovid.com
the most influential articles cited. Where possible, this link is SwetsWise
to the full text of the article. www.swetswise.com
E-mail an article TDnet
Allows users to e-mail links to relevant and interesting articles www.tdnet.com
to another computer for later use, reference or printing
purposes. Emerald Customer Support
For customer support and technical help contact:
Additional complementary services available E-mail support@emeraldinsight.com
Web www.emeraldinsight.com/customercharter
Your access includes a variety of features that add to the
Tel +44 (0) 1274 785278
functionality and value of your journal subscription:
Fax +44 (0) 1274 785204
The evaluation of existing ICT assessment methods
Abstracts & keywords showed that there was not any method that would
meet the expectations and demands of the Ministry.
The main points of criticism concentrated on the
limitation of applying a fixed set of data for describing
a project proposal and the absence of a process to
support the selection of a meaningful set of data to
describe a project. Inspired by the multi-criteria score
method of Parker a tailor-made approach for defining
ICT investment proposals was developed, taking into
account the characteristics of the governmental
organization. In this paper, the approach as well as the
developmental process with regard to this approach
are presented. The overall conclusion is that a tailor-
made approach, which is developed with the full
cooperation of the user organization, has considerable
advantages since local knowledge and expertise is
incorporated in this type of approach.
An integrative, iterative approach to IS evaluation
for pharmaceutical clinical trials
A hedonic wage model-based methodology
Catherine Dymoke-Bradshaw and Benita Cox for evaluating the benefits of IT investments
Keywords Information systems, in public-sector organisations
Pharmaceuticals industry
Peter Cilek, Wolfgang Janko, Stefan Koch, Andreas Mild
and Alfred Taudes
This paper proposes an “innovative” approach to the
evaluation of information systems projects to support Keywords Information systems,
pharmaceutical clinical trials. The IS evaluation Public sector organizations, Investment appraisal,
process for these projects closely follows that Cost benefit analysis
described in the Management of Innovation literature
using methods which are highly iterative and are an The economic justification of investments in
integral component of the project. The development information technology (IT) is a basic issue for IT
of organization-technology fit is core and evaluation management in private and in public-sector
for this purpose can be thought of as a coupling organisations. Usually, the expenses made for any
mechanism between use and design and as a tool for investment are compared to the cost saved. While the
continuous learning and improvement. This costs for implementing a new system are uncertain,
integrative, iterative approach is applied to a project only a small percentage of the benefits accrues as cost
undertaken at Glaxo Wellcome Research and savings given the type of IT systems used today and
Development. the particularities of the public-sector. In this paper,
we present a methodology for the monetary
quantification of the benefits resulting from the
Defining ICT proposals introduction of a modern IT application and
demonstrate its use on the basis of a case of prison
Fred J. Heemstra and Rob J. Kusters administration.
Keywords Cost benefit analysis,
Investment appraisal, Communication technologies
Information systems evaluation and the
The paper presents an approach for defining ICT information systems development process
investment proposals. The approach was developed
on the authority of the Dutch Ministry of Transport, Paul Beynon-Davies, Ian Owens and Michael D. Williams
Public Works and Water Management. The Ministry Keywords Information systems, Modelling,
was confronted with a growing amount of ICT Life cycle costs
investment proposals. Since there was no format for
describing a proposal and no procedure for obtaining In this paper, we consider the synergy between two
the data on the basis of which a proposal was areas of information system (IS) literature: that
described, the decision to select proposals for funding concerned with the evaluation of IS and that
missed any kind of rationality. Proposals differed concerned with explaining the phenomenon of IS
enormously and hence were incomparable. failure. On the basis of an analysis of both areas,
a model is presented which attempts to integrate IS
Journal of Enterprise Information Management evaluation into the life cycle of IS development.
Volume 17 · Number 4 · 2004 · Abstracts & keywords The model links the issue of failure assessment with
q Emerald Group Publishing Limited · ISSN 1741-0398 the evaluation process and constitutes a strategy for
243
Abstracts & keywords Journal of Enterprise Information Management
Volume 17 · Number 4 · 2004 · 243 – 244

stimulating organisational learning in relation to IS Benefits and barriers of electronic marketplace


development. The paper concludes with a description participation: an SME perspective
of our attempts to validate aspects of the model and
Rosemary Stockdale and Craig Standing
plans for further empirical work in this area.
Keywords Small to medium-sized enterprises,
Electronic commerce, Trade barriers
Narratives in ERP systems evaluation
There are concerns that despite government
Jonas Hedman and Andreas Borell initiatives to promote adoption of electronic
Keywords Narratives, Information systems, commerce, SMEs still fail to realise e-commerce
Manufacturing resource planning related benefits. It may therefore, seem premature to
discuss electronic marketplaces in the context of
The purpose of evaluating enterprise resource SMEs. However, if SMEs ignore e-marketplaces a
planning (ERP) systems ought to be to improve the number of problems can result. E-marketplaces
systems’ life cycles. In this paper, narratives are present a significant threat to SMEs since they
proposed as a means of improving ERP systems as a increase competition and leave non-participants
complement to traditional evaluation methods. vulnerable to more e-enabled firms. This paper
The potential of narratives is that they can convey examines the barriers and benefits of e-marketplace
meanings, interpretations, and knowledge of the participation by SMEs. The nature of e-marketplaces
system, which may lead to action. Even though is addressed and the benefits of participation are
narratives belong to an interpretive research tradition, examined. Drawing on the literature, the barriers
this paper takes a pragmatic view of evaluation on the facing smaller firms in this environment are discussed.
basis of three assumptions about evaluation: Identification of these barriers, such as lack of
evaluations should form the basis for action; standards, supply chain integration and global
narratives can make evaluation more relevant; and trading, enables a greater understanding of how
evaluations should be made with the purpose of SMEs can plan effective strategies to gain from
improving selection, implementation and use of the e-marketplace participation.
system. The conclusion reached is that narratives can
advance evaluation practice by providing a richer
evaluation picture which conveys meanings not
included in traditional evaluations, and improve the
use of ERP systems by changing users’ mental maps. Information technology evaluation: classifying
indirect costs using the structured case method
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani
Online point-of-click Web usability mining with
PopEval (C-Assure Co-design methodology) Keywords Electronic commerce,
Competitive advantage, Costs, Research methods
Atta Badii
Keywords Online operation, User interfaces, Many companies are increasing their expenditure on
User satisfaction information technology and information systems
(IT/IS) to obtain or even sustain a competitive
Earlier research has shown that human judgements, advantage in their respective marketplaces. Many
particularly retrospective as distinct from real-time managers, however, are often left with the quandary
evaluations of painful experiences, are fundamentally of how to evaluate their investments in technologies.
flawed when superseded by other experiences. Reasons of this difficulty have been suggested in the
Describes a methodology for the evaluation of user normative literature as centring on the socio-technical
experiences, assisted by a user-centered co-design tool (human, organisational and technical) dimensions
for planning, creating and conducting wide-ranging associated with the adoption of IT/IS. The inability of
usability data acquisition throughout the system life managers to determine the true costs of deploying
cycle from inception to replacement. The results from IT/IS is considered attributable to a lack of knowledge
the tests in this study were found to support the and understanding of IT/IS related costs. In
findings from recent cognitive psychology research on developing a broader picture of such cost dimensions
J/DM-PPR theoretic biasing effects. The importance and their respective taxonomies, the research
of the findings for software systems, and for interactive presented in this paper uses a structured case method
Web site development, is that if the interactive features to gain an understanding of how a construction firm
which tax the user’s patience and cognitive capability embraced the IT evaluation process. A review of the
are not severely restraining, then users will be left with IT cost literature is presented and a conceptual IT
a better impression of the usability of the system than evaluation framework that focuses on indirect costs is
would be the case otherwise. proposed.

244
Information systems evaluation: getting
Guest editorial closer to the organisation
The deployment of information systems (IS) has
been heralded as the solution to a myriad of
problems associated with the modern business and
organisation. IS industry observers predict that the
significant global IS expenditure will continue to
About the Guest Editors increase. However, despite this investment, there is
Stephen Jones is the Chief Information Systems Officer and widespread concern, especially amongst senior
heads the Information Technology Department of Conwy County executives, that IS investment does not always
Borough Council, a Welsh Unitary Authority in the UK. He has deliver value or realise the anticipated benefits.
worked in several roles in a career over 25 years as an IS Indeed, it is often perceived that IS
practitioner, including programming, systems analysis, project implementation leads to disbenefits. This
management, systems development management, consultancy phenomenon has been labelled the “IT
and IT Departmental Head. His work has been predominately in
productivity paradox” and is most accurately
the public sector, where he has worked for several large
organisations. He holds a BSc with first class honours in Business
linked to IS research studies in the early nineties.
Information Systems Management from Salford University, a IS expenditure, is usually both costly and risky,
MSc with distinction in Information Systems from Liverpool and any IS investment should therefore, be
University and a PhD in Information Systems from Salford examined for its contribution, value and benefit to
University. He is a chartered engineer (CEng) and a member of an organisation. How then, can IS be evaluated.
the British Computer Society (MBCS), Chartered Institute of The Oxford English Dictionary defines
Management (MCMI) and Society of Information Technology evaluation as “the action of working out the value
Managers (SOCITM). He was instrumental in establishing an IT of something”. This leads to the notion that
benchmarking initiative for IT Departments in Welsh Unitary
evaluation is a subjective process, which is
Authorities and undertook preparatory work to define Key
Performance Indicators (KPI’s) for the IT service in Local
undertaken to assess the value of an object or the
Government. Dr Jones has undertaken guest lectures at several merit of a situation. That is to say that
UK Universities in the area of IS management, IS evaluation, measurement is not evaluation. This is an
systems analysis, project management, e-Government, IS ethics important issue, which is often overlooked in IS
and IS law. He is a member of several academic and practitioner evaluation processes.
working groups. He sits on editorial boards, has edited Traditionally, evaluation has been associated
international journals and written book chapters. He has written with management practice, in an attempt to
several refereed papers at national and international improve management decision-making and
conferences, has chaired conference sessions and serves on
accountability, and organizational efficiency and
international conference committees. His research interest is in
the area of IT investment appraisal and evaluation.
effectiveness. Both intuitive and explicate
Jim Hughes works in the UK for the Cheshire and Merseyside evaluation is an integral part of the role of
Strategic Health Authority as Head of Knowledge Management. management. This evaluation helps to allocate
He has a degree in Computer Science from Liverpool University resources correctly to maintain or improve
and a PhD in Information Systems from the University of Salford. performance. For example, large capital
He has worked as a software engineer and systems analyst for expenditures are rarely made without an
the Ford Motor Company and has consulted extensively in the accompanying economic evaluation. However, the
public and private sectors to a number of small and medium
literature illustrates that IS evaluation has not been
sized enterprises in the fields of information systems and
undertaken to the same extent.
knowledge management. Jim was until recently a lecturer and
researcher at Salford University in the field of Information Organisations often tacitly assume that IS
Systems, and retains his research links there. He has published evaluation is the task of the IS function. However,
over 30 papers. Whilst at Salford he founded a spin-out in practice IS evaluation has been given little
knowledge management technology company. Jim is particularly attention, with the emphasis being on project
interested in the situated – contextual – nature of information management, systems analysis and programming.
and in the course of his PhD, he explored a methodology for Moreover, where IS evaluation is undertaken by
eliciting situated requirements. Jim’s research work is the IS function, the focus is usually upon the
interpretive and action-based. An interest in the situated nature
technical aspects. However, even though it may be
of information has led to his involvement in considering a
possible to demonstrate that IS are performing
situated hermeneutic approach to assessing IS value in the IS
evaluation process. well from a technical perspective, this does not
necessarily lead to successful use or organizational
improvements.
The Journal of Enterprise Information Management It is often perceived that it is difficult to
Volume 17 · Number 4 · 2004 · pp. 245–248 effectively evaluate IS unless there is a clearly
q Emerald Group Publishing Limited · ISSN 1741-0398 documented, systematic and formal approach.
245
Guest editorial The Journal of Enterprise Information Management
Volume 17 · Number 4 · 2004 · 245–248

However, many organisations have no Our interests are in the area of IS evaluation,
management processes to govern and measure the particularly in the public sector, and in the
outcome or processes to establish what benefits multidisciplinary and social aspects of IS and these
were actually achieved. Where IS evaluation has interests were expressed in the call for papers. In
been undertaken, traditional, formal, quantitative, the process of selecting the papers for inclusion in
mechanistic methods based on economics have the special issue we were conscious of the need to
been employed. include a range of papers in which we encouraged
At first sight this approach appears to be both articles that fell outside of the dominant paradigm.
necessary and appropriate and it would appear We feel this has been achieved. The five papers
difficult to argue against this method conceptually. each suggest either innovative approaches to the
However, in practice this is problematic because it process of Information Systems evaluation or
is difficult to predict IS costs, risks, benefits and present new ways of looking at old problems.
impact. Managers have difficulty in determining Through the papers as a whole two key themes
what aspect to measure, with the possible emerge which we believe are significant enough to
exception of economic metrics. However, although be taken seriously by those with an interest in this
appearing to be relatively straightforward to area. First, the theme of “narrative” or “story”.
calculate, these financial factors often become This is popularised in the interpretive tradition as a
problematic during the subsequent analysis. This means of presenting organizational richness in a
situation makes it difficult to assess the impact and form that enables the reader to interpret and learn.
contribution of IS. Furthermore, what is of Within this theme the case study is perhaps the
importance is not whether IS is cost justified, but most common method of “telling the
rather extent to which IS is useful and successful in organizational story” and whilst the author may
practice. provide analysis and discussion the reader also
This is particularly true of the UK public sector, engages by making their own connections from
where IS evaluation has traditionally been their own experience and background. The second
neglected and where economic value has little theme is one that we term “situated”. In this theme
meaning. However, the UK central government a number of the papers are concerned with
has recently introduced the Best Value and methods that cannot be seen as prescriptions.
Corporate Improvement initiative, which is rapidly Here we are concerned with the context in
raising the profile and importance of evaluation in which methods are used and are open to
general, including IS evaluation. IS evaluation the idea that established methods need to
theory and practice is now a key area, especially in be critically challenged and then adapted for
the public sector. specific local situations. The driver for the
Various models have been proposed to measure method is not its popularity, but its
IS efficiency and effectiveness. However, there appropriateness to the situation and the learning
seems to be little consensus among researchers and that emerges. For each of the papers, we next
practitioners as to which approach is appropriate. provide a synopsis and consider their contribution
Many IS practitioners and IS stakeholders are not to these themes and to the field of Information
concerned with the specifics of IS assessment Systems evaluation.
metrics, detailed benefit measurement formulae or Dymoke-Bradshaw and Cox propose an
mechanistic evaluation techniques. They are approach to Information Systems evaluation
concerned with the successful outcomes, in terms that has been developed specifically to deal with
of the introduction, operation and impact of IS. Information Systems projects that support
These issues should be considered to enable an pharmaceutical trials. Their research identifies
organisation to gauge the value of any IS that the evaluation processes that are associated
implementation. with traditional systems development life cycle are
We maintain that evaluation is a social lacking because of their emphasis on externality
process, as individuals have important opinions and also neutrality. In the specific context of the
based upon their own worldview. Evaluation pharmaceutical trials the evaluation process itself
therefore, occurs in everyday life and individuals is a highly integrated and dynamic part of the
evaluate based on their knowledge, experience, project. Specifically their observations in this
background, understanding and intuition. These domain led them to realize that the technology
are not formal, overt, evaluation processes but products underlying the projects were subject to
informal, covert processes. Nonetheless, they have change, whereas traditionally they are considered
significant importance to the individuals and peer to be stable. They develop a framework for the
groups concerned. With regard to IS evaluation, pharmaceutical trials projects in which they
these opinions may be of importance to an propose an iterative approach to the frequency and
organisation. timing of evaluation exercises. In their illustrative
246
Guest editorial The Journal of Enterprise Information Management
Volume 17 · Number 4 · 2004 · 245–248

case study with Glaxo Wellcome Research and Kusters urge the readers to understand each
Development they describe an electronic data situation, engage the organizational stakeholders
capture project to implement electronic data and adapt the methods where needed.
capture tools in clinical trials. The key learning Cilek et al., in their paper present a
point that emerges from this case is that, it is only methodology based on the hedonic wage model to
through the practical actions associated with the provide a monetary quantification of the benefits
evolution of the project that a deep understanding that result from the introduction of an IT
of requirements emerges. Additionally underlying application. In developing the methodology, the
technology may also be changing and these authors consider the particular circumstances of a
changes must also be accommodated. There are public-sector organisation and use as their
important lessons here related to the themes illustrative case study the introduction of an IT
above. First, the case study story engages the system covering several key administration systems
reader to question his or her own practice. in a prison. The authors argue that in such
Second, we are presented with a situation in environments other methods of monetary
which our intuitive assumptions regarding quantification would not be possible because they
evaluation, requirements and technology are depend on productivity gains being measured
challenged. Dymoke-Bradshaw and Cox against employee lay-offs. In their methodology,
suggest that their research may be useful to Cilek et al., calculate hedonic prices from external
practitioners and academics if it helps them to effects using historic data. What is interesting
question their assumptions about IS evaluation about the paper is that the authors have identified
and be brave enough to adapt traditional methods that a model extensively used in the private
when the organizational circumstances suggest sector becomes unworkable in the public sector
they should. because of the particular set of circumstances
Heemstra and Kusters’ paper is concerned with that prevail in such situations. They tentatively
an approach for defining investment proposals for suggest that their methodology could be of use
Information Communication and Technology in other public sector organisations or used for
(ICT) projects. The organisation they worked evaluating process change in organisations.
with, The Dutch Ministry of Transport, Public Benyon-Davis Owens and Williams’ paper is
Works and Water Management, had no means by more theoretical in nature. They consider two
which they could assess a growing number of areas of academic literature – IS evaluation and
disparate ICT investment proposals that they the phenomena of IS failure. They propose a
received. The authors’ research led them to the model which links assessment of IS failure with the
view that despite the number of methods IS evaluation process. They go on to develop a
explicated in the literature there was not a single strategy that integrates IS evaluation into the
method that would satisfactorily meet the systems development life cycle. Through the
demands of the Ministry. In the face of these literature they identify that many organisations do
challenges the authors took a candidate method not learn from failure other than by modifying
(Parker’s multi-criteria score method) as a starting strategies and assumptions within accepted
point and tailored it for the specific organisation. normative boundaries. An important part of their
Their paper takes the reader through the process proposed model is that evaluation processes are
of adoption. They note that a key to producing the closely linked to IS development activities to
appropriate method was the full cooperation of the encourage organizational learning. They go on to
organizational stakeholders since it is they who distinguish between strategic formative,
have the specific local knowledge that an outsider summative and post-mortem evaluation as key
could not possibly have. They outline two key processes in facilitating the learning of
lessons from their research. The first lesson relates stakeholders. What is interesting about the paper is
to data and is concerned with being able to answer that the authors explicitly draw attention to IS
for the specific domain what data needs to be used evaluation as a situated process.
for the evaluation. They lament the fact that many Hedman and Borell’s paper is also theoretical in
traditional approaches answer this simply by nature. They propose the use of narratives to
suggesting financial data. The second lesson complement traditional evaluation methods in
relates to the process of evaluation. During the Enterprise Resource Planning systems. They
process they took the perspective that the process contend that narratives as an intuitive means of
of evaluation was a human information-processing expression can help in IS evaluation by conveying
activity and not simply a mechanistic or formal meaning and knowledge about a system. They
process. In terms of the themes for this special outline their assumptions about IS evaluation with
issue the main resonance is that associated with a key assumption claiming that narratives can give
situation and attention to context. Heemstra and a better understanding of ERP systems than
247
Guest editorial The Journal of Enterprise Information Management
Volume 17 · Number 4 · 2004 · 245–248

methods commonly associated with traditional IS Hedman and Borell conclude their paper by
evaluation. They note that narratives can be focusing on the knowledge sharing and learning
written at any time before during or after a project characteristics of the narrative approach that are
and that the crucial role that they play is that one particularly appropriate for ERP, and other such
can keep track of meta-information and large complex IS implementations that have such
interdependencies in the project. The authors a profound affect on organizational life.
identify different narrative (story) types and the Dr Stephen Jones
ways in which these may be used to support, Chief Information Systems Officer, Conwy County
persuade, overcome problems and disseminate Borough Council; E-mail: steve.jones@
knowledge. The paper is strongly embedded in the conwy.gov.uk
interpretive paradigm and for readers it may be Dr Jim Hughes
challenging since it proposes a new, perhaps even Head of Knowledge Management, Cheshire and
tangential, way of looking at familiar problems. Merseyside Strategic Health Authority

248
Introduction
An integrative, iterative This paper proposes an “innovative” approach to
approach to IS the evaluation of information systems (IS) to
support pharmaceutical clinical trials. The need for
evaluation for such an approach results from an observation that
pharmaceutical clinical the methods used for evaluation of the IS to support
these trials differ from those described in the
trials current academic literature in a number of ways.
First, the IS evaluation process traverses three
major phases – initiation, adoption and
Catherine Dymoke-Bradshaw and implementation (Rogers, 1983). This process is
Benita Cox akin to that described in the Management of
Innovation literature and differs from evaluation
exercises conducted for those projects that follow a
traditional systems development life cycle (SDLC)
development process. Whilst similarities exist in the
evaluation methods used during the initiation and
The authors adoption phases of the process, differences in
Catherine Dymoke-Bradshaw is based at Glaxo SmithKline, emphasis occur during the implementation stage.
Middlesex, UK. Traditional evaluation methods tend to view
Benita Cox is based at The Management School, Imperial implementation as the final step in the process
College of Science, Technology and Medicine, London, UK. which is hardly elaborated upon. Evaluation in the
literature implies that once a system is developed
Keywords and implemented it is “good” if it requires little
Information systems, Pharmaceuticals industry subsequent change. Our observations suggest that
in pharmaceutical clinical trials it often is not until
Abstract practical experience in using the system has been
This paper proposes an “innovative” approach to the evaluation gained that the requirements are really understood.
of information systems projects to support pharmaceutical Evaluation methods described for traditional
clinical trials. The IS evaluation process for these projects closely SDLC projects are broadly described as “external”
follows that described in the Management of Innovation to the project. In pharmaceutical clinical trials the
literature using methods which are highly iterative and are an IS evaluation process is both tightly integrated
integral component of the project. The development of within the project and highly dynamic – a kind of
organization-technology fit is core and evaluation for this “bootstrapping” process of learning as you go and
purpose can be thought of as a coupling mechanism between
there is a tight coupling between the design and use
use and design and as a tool for continuous learning and
of the IS product or service (Orlikowski, 1992).
improvement. This integrative, iterative approach is applied to a
project undertaken at Glaxo Wellcome Research and Further, the current evaluation literature says little
Development. about changes in the underlying technology
products, implicitly assuming them to be stable,
Electronic access whereas we observed that not only were products
changing during the evaluation process but that
The Emerald Research Register for this journal is
available at opportunities were sought to influence the
www.emeraldinsight.com/researchregister direction of such change.
There are many similarities in the purpose of the
The current issue and full text archive of this journal is evaluation undertaken for SDLC projects and IS
available at projects to support clinical trials, however, there are
www.emeraldinsight.com/1741-0398.htm
also a number of differences. In SDLC projects,
evaluation may be carried out for the purposes of
justification, as part of project control or for
learning for future projects or evaluation exercises
(Farbey et al., 1993). However, in clinical trial
projects these purposes are extended to include
evaluation of organization-technology fit where the
evaluation process itself can be thought of as a
The Journal of Enterprise Information Management mechanism for achieving coupling between design
Volume 17 · Number 4 · 2004 · pp. 249–257
q Emerald Group Publishing Limited · ISSN 1741-0398 The authors would like to thank Glaxo Wellcome
DOI 10.1108/17410390410548652 R&D for their support in sponsoring this research.
249
An integrative, iterative approach to IS evaluation The Journal of Enterprise Information Management
Catherine Dymoke-Bradshaw and Benita Cox Volume 17 · Number 4 · 2004 · 249–257

and use and as a tool for continuous learning and is developed and applied to a case study of
improvement. Evaluation for the purpose of electronic data capture carried out at Glaxo
strategic justification of the project is important in Wellcome Research and Development.
both types of project, however, equally important in
clinical trials is evaluation to support decision
making at an operational level. For example, to Purpose and timing of IS evaluation
support decisions on options within the project, exercises
such as the funding of feasibility studies, the setting
up of pilots or the approach to be taken to initial The purpose of IS evaluation is primarily to assess
implementation and subsequent roll-out. the costs and benefits of IS investments (Remenyi
The timing and frequency of the evaluation et al., 1993). Other reasons for evaluation cited in
process also differs. The evaluation process is the academic literature include justification for an
similar in the very early stages of the project and in existing or proposed new system, comparison
the later, post-implementation phases of routine between projects competing for resources or to
operational use. However, significant differences provide benchmarks and control procedures
occur in that in SDLC projects, the development (Baker, 1995; Clemons, 1991; Farbey, et al., 1995;
and implementation phases are separate, with Hawgood and Land, 1988; Targett, 1996;
evaluation occurring during development but Willcocks and Graeser, 2001). Some authors cite
conducted less rigorously during implementation. the use of the evaluation process as a tool for
In clinical trial projects, however, development organisational learning (Argyris and Schon, 1996;
and implementation become tightly integrated and Earl, 1989; Galliers, 1991) or for understanding
a high level of evaluation during implementation is and learning about an IS which is already in use
essential because it is the feedback mechanism for (Edzerodt and Madsen, 1988) or for political
continuous learning. The evaluation exercises are reasons (Gregory and Jackson, 1992; Powell, 1992;
iterative and there are likely to be a number of Symons, 1993; Walsham, 1993). Serafeimidis and
separate decisions that will be subjected to review Smithson (2000) suggest that a further purpose of
as circumstances change (Figure 1). IS evaluation might be to learn about the
In this paper, an approach to the evaluation of organisation and its business dimensions.
IS projects to support pharmaceutical clinical trials Whilst the purposes of the evaluation exercises in

Figure 1 The purpose and timing of evaluation in PCT projects

250
An integrative, iterative approach to IS evaluation The Journal of Enterprise Information Management
Catherine Dymoke-Bradshaw and Benita Cox Volume 17 · Number 4 · 2004 · 249–257

clinical trials are, in many instances, the same as (1) screening the environment for possible
those highlighted in the academic literature, we problems or solutions to problems that may
noted a number of further purposes, namely to exist;
assess the extent of organisation-technology fit, for (2) assessment, comparison and selection of
project justification and decision making at an appropriate options; and
operational as well as a strategic level and as an (3) continuous learning and improvement.
iterative tool for project monitoring and control.
As mentioned earlier the typical life cycle of these
Similarities and differences also occur in the
projects consists of three major phases, namely
timing and frequency of evaluation. It is generally
initiation, adoption and implementation. Within
recognised that evaluation should be carried out at
these phases are a number of stages – agenda-
all stages of an IS project and many authors
setting, matching, redefining/restructuring,
distinguish between appraisals which are
clarifying and routinising (Rogers, 1983)
conducted ex ante, ex post or continuously
(Figure 1). Evaluation for assessing organisation-
throughout the project life cycle (Earl, 1989;
technology fit is therefore, conducted throughout
Farbey et al., 1992). However, organisations tend
these phases.
to complete evaluation at the feasibility stage, but
there is then a fall-off in later stages (Remenyi et al.,
1993; Willcocks, 1994). A number of studies Screening
suggest that there are linkages between the timing Screening for possible problems or solutions
occurs at the agenda-setting stage of the project.
and purpose of evaluation exercises (Hochstrasser
Evaluation is driven either from the perceived need
and Griffiths, 1991; Kumar, 1990). In clinical
for a solution to a specific business problem or
trials project, however, the evaluation process is
from the awareness of a potentially valuable new IS
conducted iteratively throughout all stages of the
product or service. In the problem-focused case,
project life cycle. This process is similar to that of
the first target of evaluation is likely to be the
the formative evaluation methods described for
development of a clearer understanding of the
active benefits realisation which encapsulates the
problem. Thereupon, an active search for
notion of continuous assessment and co-evolution
solutions can be undertaken and the focus of
(Remenyi et al., 1997).
evaluation will then move to the development of
“awareness knowledge”, i.e. “principles
knowledge” and “how-to knowledge” for each
Purpose and timing of IS evaluation for potential solution (Rogers, 1983).
In the technically-focused case, awareness of a
clinical trials
new IS product or service may occur in one of a
In the following section, a framework which number of ways: through routine monitoring of
integrates the purpose and timing of evaluation technological advances; as a result of publicity/
exercises is proposed. It extends the existing contact from potential providers of a particular
literature by incorporating additional purposes for product or service; through monitoring of
evaluation and proposes an iterative approach to competitors; or as a result of routine professional
the frequency and timing of evaluation exercises. contact. Once relevant business problems and
The framework was developed specifically for potential solutions have been identified, the focus
pharmaceutical clinical trials, but we believe it also then moves to identifying and developing an
has applicability for similar projects which do not understanding of relevant business problems that
follow a traditional systems development life cycle the product or service may address. In both cases,
in other sectors. the information gathered may be used to justify
funding for the next stage of the project, possibly
allowing for trialing of the most promising
solutions. Evaluation is likely to be iterative, with
Organization-Technology Fit the emphasis shifting between internal and
external foci as knowledge of both business
An important requirement of IS projects for problems and potential solutions increases.
pharmaceutical clinical trials is to achieve a close
fit between the organization and the technology Assessment, comparison and selection of
(Orlikowski, 1992). People use technology and options
therefore, have the potential to continuously At the matching stage the focus is on information
impact on the degree of fit. Hence, the evaluation gathering. In the problem-focused case, a number
process must iteratively assess any changes in the of possible solutions may be matched against the
degree of fit throughout the various stages of the business problem. In the technically-focused case,
project. This is achieved in three ways, through: potential solutions may be matched against a
251
An integrative, iterative approach to IS evaluation The Journal of Enterprise Information Management
Catherine Dymoke-Bradshaw and Benita Cox Volume 17 · Number 4 · 2004 · 249–257

number of problems to determine which, if any, a source of input to project justification and
should be further investigated. decision-making. This is an ongoing process
Evaluation will assess the feasibility of each recognising that the information upon which
solution, its flexibilities and constraints, risks and decisions are made will change over time.
opportunities and any obstacles to In the agenda-setting and matching stages, prior
implementation. Stakeholder groups and potential to any decision to adopt a particular solution,
costs and benefits will need to be identified and decisions to experiment with or trial particular
understood. The purpose of evaluation will be to options will be made on limited information.
eliminate infeasible options and to compare Justification for a particular course of action may
alternative viable options to select the best to take be primarily based on information buying or risk
forward to the adoption phase. Piloting can be reduction at relatively low cost. As the project
particularly valuable. progresses, however, and more information
Although at a high level the IS product or becomes available this will be used to develop the
service to be implemented will have been selected business case.
by the end of the initiation phase, it is likely that for By the end of the initiation phase, all necessary
some sub-components of the project alternative information should have been gathered to support
options remain. Thus, this type of evaluation is the decision on adoption of an IS product or
likely to continue, but at a more detailed level, into service, to plan for its initial implementation and to
implementation. There may also be subsequent justify the necessary funding. The primary purpose
re-evaluation of options in the light of experience of evaluation at this point is to provide the
in use. necessary support to management to enable them
to take the adoption decision. This is not
Continuous learning and improvement necessarily a straightforward choice between
As the project moves into the redefining/ adoption and rejection of the IS product or service
restructuring stage of implementation, the fit for several reasons.
between organization and technology continues to .
Although one course of action may be
be evaluated and developed. Information is preferred and recommended, alternatives may
actively sought as more “principles” and “how-to” need to be considered.
knowledge is acquired through experience in use. .
It may be felt that the time is not right to move
Not only may the IS product or service be adapted forward into implementation. This may be
to better fit the organization, but the structure of because more information is needed or
the organization and its ways of working may have because the plans for implementation are not
to be changed to accommodate the new product or yet sufficiently developed, i.e. the project
service: evaluation can be thought of as a feedback effectively moves back to initiation.
mechanism between use and design. If significant Alternatively, if the products being considered
gaps in fit are found (these could arise through are undergoing rapid changes, a “wait and
changes either internal or external to the project or see” strategy may be better.
be a result of unanticipated problems experienced .
There may be choices in scale of
in the field), it may be necessary to re-evaluate the implementation – too large and the project
options. can become difficult to manage and control;
At the clarifying stage, as the product or service too small and the full benefits will not be
is put into wider use, the fit between organization realised.
and technology should be well defined, although
The timing of the adoption decision is critical to
there may be minor improvements to be made.
success. If it is taken too early, with insufficient
The focus moves to supporting large-scale use.
knowledge, there is a risk that the product or
Any misunderstandings, unwanted side effects, or
service will be misused and will consequently, fail
barriers need to be quickly identified and assessed
leading to disenchantment and loss of confidence.
so that corrective action can be taken.
If the decision is taken too late, the costs will be
At the routinising stage, the product or service is
higher and the achievement of potential benefits
in wide use within the organization. By this stage,
delayed.
evaluation for the purpose of developing
An important difference between clinical trial IS
organization-technology fit will have effectively
projects and conventional IS projects is that
ceased.
adoption decisions in clinical trial projects are
likely to be subject to subsequent confirmation.
Justification and decision-making This may be a pre-planned review, a response to
changing circumstances external to the project or
Much of the information gathered in the as a result of problems during implementation. As
development of organization-technology fit will be a consequence, evaluation will continue for the
252
An integrative, iterative approach to IS evaluation The Journal of Enterprise Information Management
Catherine Dymoke-Bradshaw and Benita Cox Volume 17 · Number 4 · 2004 · 249–257

purpose of justification of the project. As the patient. Speeding up the clinical trials process is a
project moves through the implementation phase, key goal for most pharmaceutical companies and
performance targets may be set and a performance the use of EDC is seen as a potential way of
measurement programme introduced. As achieving this goal.
experience grows and evidence is gathered, earlier The start of the project can be traced back to
assessments of costs and benefits will be refined to 1993 in Glaxo Research and Development, prior
strengthen the business case. to the merger with Wellcome, when a small
Clinical Data Capture Strategy team was set-up in
the UK Medical Operations Division to review
options for electronic data capture.
Project monitoring and control Overall, 14 major evaluation exercises were
identified in the EDC project and these have been
Evaluation for the purpose of monitoring and mapped against their evaluation purpose as shown
control of the project will start in the matching in Figure 2.
stage, as experimentation with or trialing of
potential solutions is undertaken and associated
costs start to be incurred. An important aspect of
evaluation at this stage is to ensure that the specific Organization-technology fit
objectives of experimentation are met and that the
necessary principles knowledge is gathered. Of the major evaluation exercises identified, nine
At the redefining/restructuring stage, monitoring were primarily concerned with the evaluation of
and managing the implementation process is organization-technology fit. Although in most
particularly critical: making sure that information cases the information gathered was also used to
is communicated to the right people, that support evaluation for other purposes, this still
processes and working practices are correctly gives a clear indication of the importance of this
followed, technical aspects run smoothly, etc. kind of evaluation.
Performance targets and measurement
programmes may be instigated. Screening
At the clarifying stage, the focus moves to In 1993, one of the first actions of the Clinical
monitoring performance targets and supporting Data Capture Strategy team was to commission an
the management of large-scale use. Any unwanted in-house review of emerging technologies. The
side effects or barriers to meeting targets need to purpose of this was two fold: first, to identify
be quickly identified and assessed. available options and, secondly, to gain an insight
At the routinising stage, the product or service is into the way other companies were implementing
in wide use within the organization and the project these technologies. Subsequently, the team focused
will be drawing to a close. Once the project has on fax technology and combined CRF and data
been completed, a post-implementation review is entry screen design as areas offering most potential
likely to be conducted. As with conventional IS for significant business benefit. One electronic
projects, this will be primarily concerned with CRF (eCRF) product, based on a pen-computer,
product and process review (Earl, 1989). was demonstrated but it was felt that the
technologies used, in particular handwriting
recognition, were not sufficiently mature at that
time. The team reported their findings in early 1994
An illustrative example: electronic data and recommended that implementation proceed
capture for pharmaceutical clinical trials only for fax-based CRF return, but that a small pilot
of an eCRF system can also be considered. A pilot
To illustrate the IS evaluation life cycle for clinical implementation of the pen-computer based system
trial projects we present a case study carried out in was subsequently approved.
Glaxo Wellcome Research and Development The initial review was driven primarily by the
(GWRD) and, prior to the merger in 1995 of the belief that the capture and entry of clinical data
Glaxo Group with Wellcome plc, in Glaxo Research was the main remaining target for potentially
and Development. (Dymoke-Bradshaw, 1999) useful exploitation of IT, given that IS supporting
The case study describes the electronic data data processing and reporting for clinical trials
capture (EDC) project, a major project to were already well established. There was also an
implement EDC tools in clinical trials. Clinical awareness that the majority of other major
trials data have traditionally been and still are pharmaceutical companies were already active in
largely collected on paper, using case record forms the area of clinical data capture and that a number
(CRFs), which are completed by the investigator, of commercial products capable of conferring
or diary cards, which are usually completed by the significant business benefit were becoming
253
An integrative, iterative approach to IS evaluation The Journal of Enterprise Information Management
Catherine Dymoke-Bradshaw and Benita Cox Volume 17 · Number 4 · 2004 · 249–257

Figure 2 Mapping of EDC evaluation exercises against evaluation purpose

available. The purpose of the exercise was “to and selecting options within the project: the
review options and to produce a proposal for the evaluation of pilot use of the pen-based eCRF
integrated use of appropriate technologies” within system previously identified, the piloting of a
a time frame of 5 months, to fit in with the number of other, alternative eCRF products, the
organization’s internal budget cycle. This involved review of eCRF experience arising from the pilots,
identifying and developing awareness knowledge and the selection of the hardware service provider.
of potential solutions, either commercially- The clinical trial chosen for the pen-based
available products, in-house development, or eCRF pilot was conducted during the second half
collaborative ventures with other pharmaceutical of 1994 in two European countries at 13
companies. An important component of the review investigator sites. Although the particular system
was understanding how other companies were chosen for the pilot was unsuitable for use as
using these technologies and learning from their piloted, the feasibility and potential benefits of
experiences. eCRF systems in principle were clearly
It is interesting to note that by August 1995, demonstrated.
when interviews for this case study commenced, The objectives of the pen-based eCRF pilot
attention was clearly focussed on eCRF systems, were again focused on information gathering:
which were seen as offering the ability to shorten .
to identify by how much the technology could
clinical development programmes by several shorten time to market;
months. Fax technology and combined CRF and .
to assess the effects of the technology on
data entry screen design, which had originally been working practices;
given a high profile, had not been as successful as .
to determine the acceptability of the
anticipated and were no longer being actively technology in the clinic; and
pursued. .
to consider options for pen-based CRF
processing and their associated costs and
Assessment, comparison and selection of
benefits.
options
Four major evaluation exercises were initially The second evaluation exercise, piloting a
conducted for the purpose of assessing, comparing number of alternative eCRF products, started in
254
An integrative, iterative approach to IS evaluation The Journal of Enterprise Information Management
Catherine Dymoke-Bradshaw and Benita Cox Volume 17 · Number 4 · 2004 · 249–257

April 1995. Products from three different vendors user feedback from eCRF studies was set-up and
were used in four clinical trials, ranging from a data were collected on an ongoing basis for more
short, single-site study in the US to a major, than a year. Experience was also captured through
18-month long clinical trial conducted in 50 informal communication between members of the
centres in six European countries. The main EDC team and the project teams. Two metrics
objective at this stage was to determine how to reviews were conducted, one in mid 1997 and a
select and scale up on one eCRF system for second at the end of that year, which drew on and
“production use” (the term used by the EDC summarised the evaluation data. These exercises
project team for routine use within the were all strongly focused on learning for
organization). improvement.
In October 1995, a major review of eCRF Objectives for the routine collection of metrics
experience to date was held. The primary objective and user feedback included measuring the impact
of this meeting, which drew heavily on the of eCRFs on clinical trial timelines and resources,
information gathered from the previous pilots, was collecting feedback from various stakeholders and
to select one or more preferred eCRF software making recommendations for improvement.
vendor for production use of EDC. Other The objectives of the first metrics review were to
objectives included the development of scenarios take a critical look at the current status of eCRF
for working processes and use of technology, implementation, to demonstrate the successes and
determining implementation plans, considering to identify the issues being addressed with the
the further evaluation of new technology overall aim of providing a baseline against which
(especially for non-CRF data) and reviewing the improvement in the use of eCRFs could be
key lessons from the pilots. The review was held measured over time. The second review had similar
jointly with the US and UK representatives and a objectives, concentrating on changes since the first
great deal of time was spent ensuring that there review. Standard spreadsheets were used to collect
was a common view of the technology within the cycle time and resource metrics from clinical trials
team through sharing information and agreeing project teams, together with interviews with project
selection criteria. Following the review, a contract team members to gather “soft” metrics.
for the provision of software and software services Questionnaires were used to collect feedback from
was negotiated with the selected eCRF software clinical trial monitors working in the field and from
vendor and finalised in May 1996, when funding clinical investigators and study nurses.
for the next 2 years of the project was approved. Later, as the EDC transition team was planning
The process of selecting a hardware service for the transfer of the eCRF system into routine
provider was also initiated, following the review. use, helpdesk and hardware and software service
Initially, the service requirements were defined at a provision were reviewed with the objective of
fairly high-level, but these were specified in greater revising the services to match the current needs,
detail as the selection process progressed and which had changed significantly since they were
understanding increased through discussion, both first implemented.
within the EDC team and with the potential
service providers. The final selection was made in
August 1996 and the contract was signed in
November 1996. Project justification and decision-making
Finally, there was one additional evaluation
exercise, the identification and assessment of An incremental approach was taken for the
electronic systems for the capture of data recorded justification of the EDC project. Much of the
directly by the patient (diary cards, quality of life supporting information came from the evaluation
questionnaires, etc.). This was conducted in a exercises already described for the development of
sub-component of the project determining EDC organization-technology fit. In the initiation phase
options for non-CRF data. This was carried out in of the project, justification of the early fax and pen-
the first half of 1997, when the implementation of computer pilots and the subsequent pilots of
eCRFs was well under way, with the objectives of alternative eCRF products was primarily an “act of
defining requirements for different types of diary faith”, recognising that the necessary information
cards and questionnaires and of identifying the was not yet available to build a solid business case.
most promising potential solutions. In applying funding for the pilots, the emphasis
was primarily on estimating costs, not benefits.
Although some potential benefits were identified,
Continuous learning and improvement it was not possible to quantify them and an
In late 1996, as the EDC project moved into important objective of the pilots was to acquire the
production use, a programme for the routine information and understanding necessary to
collection of milestone and workload metrics and develop the business case.
255
An integrative, iterative approach to IS evaluation The Journal of Enterprise Information Management
Catherine Dymoke-Bradshaw and Benita Cox Volume 17 · Number 4 · 2004 · 249–257

The adoption of the selected eCRF product for cycle of the project; as more information became
large-scale implementation was based on a capital available, understanding of the implications of
expenditure proposal which was reviewed and EDC increased and the business case developed to
approved through the standard internal GWRD reflect this.
mechanisms in May 1996. The proposal was
supported by a cost-benefit analysis based on
reduced clinical development time and hence,
earlier regulatory submission and ultimately,
Project monitoring and control
product launch.
Many of the evaluation exercises concerned with
At the end of 1996, EDC became a component
the development of organization-technology fit also
project within core process redesign (CPR), a
provided information which was used to support
major medical operations process improvement
project monitoring and control. This was
project. This transfer of responsibility prompted a particularly true of the routine collection of
review of EDC within the broader context of the standard metrics, which included data on
redesign framework. The project justification was resources, time lines and costs incurred as well as on
reconsidered and the validity of implementing the the realisation of benefits which could be compared
eCRF system was re-examined and confirmed. with earlier estimates and used to monitor project
The routine evaluation of the early eCRF trials progress. By February 1998, when the last case
played an important part in the review by study data were collected, the project team was
providing evidence showing that expectations were being disbanded and the recruitment of staff for the
being met and an active programme for continuous new organizational structures was under way.
improvement was in place. CPR placed particular Evaluation was planned to continue with the
emphasis on the need for a stronger cost-benefit objectives of routine performance monitoring and
case as the business climate within GWRD providing information and support for decision-
changed. making on data handling strategies.
Over 1997, the senior management view of the
eCRF system in use changed as experience grew
and its limitations were recognised. The strategic
focus within the organization moved to “next Postscript – an update on the use of EDC
generation” EDC and the investigation of future at Glaxo Wellcome 1998-2002
EDC solutions became a separate project. The
primary focus of the EDC project became the The level of use of the selected EDC system has
implementation of the selected eCRF system as a not increased significantly from 1997, when the
tactical, short-term tool and as a way of building case study described in this paper was completed.
skills and knowledge in preparation for the piloting Take-up within the organization has been patchy –
and subsequent scaling up of future EDC some project teams have made heavy use of the
technologies. Implementation proceeded steadily technology whilst others have remained with
over the year and by December 1997, the eCRF paper-based studies. Some newer, Web-based
solution was implemented between 10 and 15 technologies were used for one or two clinical
percent of clinical studies. trials, but did not replace the original system.
In parallel with the implementation activities, When Glaxo Welcome merged with
an EDC transition team was set-up in May 1997 SmithKlineBeecham (SB) in 2001 to form
to make recommendations on how the GlaxoSmithKline (GSK), the original GWRD
management and use of the selected eCRF EDC system was nearing the end of its life and the
solution should move from the EDC project organization decided to develop and consolidate
team to integration within the Glaxo Wellcome on an integrated version of the former SB in-house
system, RDMi. The original GWRD system was
line functions. The team re-evaluated the eCRF
finally decommissioned in late 2001. At the time of
business case and extended the metrics collection
writing, in January 2003, EDC continues to be a
to develop a clearer understanding of the costs
key component of GSK’s clinical data
and benefits incurred in using the eCRF system
management strategy.
compared to paper-based studies and contract
research organizations. The team also developed
tools that could be used to support decision-
making on the use of eCRFs for future studies, Conclusion
drawing on the re-evaluation and on earlier work
on eCRF study selection criteria. The evaluation of clinical trial projects requires a
To summarise, evaluation for justification and different set of methods to those used for
decision-making occurred throughout the life conventional projects. This requirement stems
256
An integrative, iterative approach to IS evaluation The Journal of Enterprise Information Management
Catherine Dymoke-Bradshaw and Benita Cox Volume 17 · Number 4 · 2004 · 249–257

from the fact that the underlying project processes Farbey, B., Land, F. and Targett, D. (1993), How to Assess your IT
are different. Investment. A Study of Methods and Practice,
A critical point about IS projects for clinical Butterworth-Heinemann, Oxford.
trials is that often a full understanding of Farbey, B., Land, F. and Targett, D. (1995), “A taxonomy of
requirements can only be developed through information systems applications: the benefits evaluation
ladder”, European Journal of Information Systems, No. 4,
practical experience gained as the project evolves –
pp. 41-50.
the project process is complex and iterative and IS
Galliers, R. (1991), “Strategic information systems planning:
evaluation is an integral part thereof. Further, the myths, reality and guidelines for successful
underlying technology may be changing and this, implementation”, European Journal of Information
together with any opportunities for influencing the Systems, Vol. 1 No. 1, pp. 55-64.
direction of change, needs to be understood and Gregory, A. and Jackson, M. (1992), “Evaluation methodologies:
accommodated. a system for use”, Journal of Operational Research
The development of organization-technology fit Society, Vol. 43 No. 1, pp. 19-28.
lies at the core of these projects. Evaluation for this Hawgood, J. and Land, F. (1988), “A multivalent approach for
purpose can be thought of as a coupling information systems assessment”, in Bjorn-Anderson, N.
mechanism between use and design and as a tool and Davis, G. (Eds), Information Systems Assessment:
for continuous learning and improvement. It also Issues and Challenges, North Holland, Amsterdam,
provides information to support evaluation for the pp. 103-24.
Hochstrasser, B. and Griffiths, C. (1991), Controlling IT
traditional purposes of project justification and
investment: Strategy and Management, Chapman & Hall,
project control. The importance of evaluating the
London.
fit between organization and technology on an Kumar, K. (1990), “Post implementation evaluation of computer-
ongoing basis from project initiation through to based information systems: current practices”,
routine operation is clearly illustrated in the case of Communications of the ACM, Vol. 33 No. 2, pp. 203-12.
Glaxo Wellcome’s EDC project. Of the 14 major Orlikowski, W. (1992), “The duality of technology: rethinking the
evaluation exercises identified in the project, nine concept of technology in organizations”, Organization
were primarily conducted for this purpose. Science, Vol. 3 No. 3, pp. 398-427.
This leads us to the conclusion that in Powell, P. (1992), “Information technology evaluation: is it
developing methods for evaluation of IS projects in different?”, Journal of the Operational Research Society,
pharmaceutical clinical trials there is a need to Vol. 43 No. 1, pp. 29-42.
draw more extensively on the established body of Remenyi, D., Money, A. and Twite, A. (1993), A Guide to
academic literature in the field of innovation. Measuring and Managing IT Benefits, NCC Blackwell,
Oxford.
Remenyi, D., Sherwood-Smith, M. and White, T. (1997),
Achieving Maximum Value From Information Systems,
References Wiley, Chichester.
Rogers, E.M. (1983), Diffusion of Innovations, 3rd ed., The Free
Argyris, C. and Schon, D. (1996), Organizational Learning II: Press, New York, NY.
Theory, Method and Practice, Addison-Wesley, Reading, Serafeimidis, V. and Smithson, S. (2000), “Information systems
MA. evaluation in practice: a case study of organizational
Baker, B. (1995), “The role of feedback in assessing information change”, Journal of Information Technology, Vol. 15 No. 2.
systems planning effectiveness”, Journal of Strategic Symons, V. (1993), “Evaluation and the failure of control:
Information Systems, Vol. 4 No. 1, pp. 61-80. information systems development in the processing
Clemons, E. (1991), “Evaluation of strategic investments in company”, Accounting, Management and Information
information technology”, Communications of the ACM, Technology, Vol. 3 No. 1, pp. 51-76.
Vol. 43 No. 1, pp. 23-36. Targett, D. (1996), Keynote Address, Third European conference
Dymoke-Bradshaw, C. (1999), Evaluation in Information Systems on the evaluation of information technology, University of
Innovation Projects, Imperial College, London.
Bath.
Earl, M.J. (1989), Management Strategies for Information
Walsham, G. (1993), Interpreting Information Systems in
Technology, Prentice-Hall, London.
Edzerodt, P. and Madsen, K. (1988), “Information systems Organizations, Wiley, Chichester.
assessment as a learning process”, Information Systems Willcocks, L. (1994), Information Management. The Evaluation of
Assessment: Issues and Challenges, Elsevier, Amsterdam. Information Systems Investments, Chapman & Hall,
Farbey, B., Land, F. and Targett, D. (1992), “Evaluating London.
investments in IT”, Journal of Information Technology, Willcocks, L. and Graeser, V. (2001), Delivering IT and e-business
Vol. 7 No. 3, pp. 109-22. Value, Butterworth-Heinemann, Boston, MA.

257
1. Definition of the problem and research
Defining ICT proposals questions
The research described in this paper was
Fred J. Heemstra and commissioned by the Dutch Ministry of
Rob J. Kusters Transport, Public Works and Water Management
(DMT). This Ministry is one of the largest
ministries in The Netherlands with regard to its
number of employees and budget. The
organisation is characterised by a decentralised
structure with local and regional offices, which on
The authors
the one hand have a high-level of autonomy and on
Fred J. Heemstra and Rob J. Kusters are Professors based at the other hand depend on the central headquarters
the Open University, The Netherlands.
for funding (larger) projects. In many projects the
information and communication technology
Keywords
(ICT) is an important component. Each year tens
Cost benefit analysis, Investment appraisal, of millions of euros are invested in ICT. This
Communication technologies amount pales beside the total number of all ICT
investment proposals that are submitted to the
Abstract
central headquarters by the decentralised offices
The paper presents an approach for defining ICT investment each year for acceptance and funding.
proposals. The approach was developed on the authority of the Regarding the substantial sums of money
Dutch Ministry of Transport, Public Works and Water
in ICT investments and the necessity to spend
Management. The Ministry was confronted with a growing
amount of ICT investment proposals. Since there was no format the (relatively) limited budget as optimally as
for describing a proposal and no procedure for obtaining the possible, it is vital to have a good mechanism
data on the basis of which a proposal was described, the for defining and selecting ICT investment
decision to select proposals for funding missed any kind of proposals for the DMT. However, in practice it
rationality. Proposals differed enormously and hence were is the case that:
incomparable. The evaluation of existing ICT assessment (1) DMT has no guidelines how ICT proposals
methods showed that there was not any method that would submitted by decentralised offices must be
meet the expectations and demands of the Ministry. The main
defined, described, presented, etc.;
points of criticism concentrated on the limitation of applying a
fixed set of data for describing a project proposal and the
(2) as a consequence proposals differ enormously
absence of a process to support the selection of a meaningful set with regard to the applied format, level of
of data to describe a project. Inspired by the multi-criteria score detail, language/vocabulary used, etc.; and
method of Parker a tailor-made approach for defining ICT (3) the decision makers at the headquarters are
investment proposals was developed, taking into account the confronted with a situation in which
characteristics of the governmental organization. In this paper, .
a choice has to be made between
the approach as well as the developmental process with regard incomparable proposals,
to this approach are presented. The overall conclusion is that a .
no criteria exist for making an objective
tailor-made approach, which is developed with the full
choice, and
cooperation of the user organization, has considerable
advantages since local knowledge and expertise is incorporated
. no guidelines/procedures are available to
in this type of approach. support the selection process.
It is in this situation that the research presented
Electronic access here took place. Research focused on a part of the
cost-benefit analysis, which consists of the
The Emerald Research Register for this journal is
following elements (Renkema, 1999).
available at
www.emeraldinsight.com/researchregister
(1) Definition phase. Defining a proposal:
.
customizing the approach,
The current issue and full text archive of this journal is .
gathering and analysing data required to
available at describe a proposal,
www.emeraldinsight.com/1741-0398.htm .
assessing the data, and
.
achieving consensus on results.
(2) Assessing phase. Selecting proposals:
.
achieving consensus on selection criteria
The Journal of Enterprise Information Management
and weighing factors,
Volume 17 · Number 4 · 2004 · pp. 258–268
.
comparing different proposals,
q Emerald Group Publishing Limited · ISSN 1741-0398
.
ranking proposals, and
DOI 10.1108/17410390410548661 .
selection.
258
Defining ICT proposals The Journal of Enterprise Information Management
Fred J. Heemstra and Rob J. Kusters Volume 17 · Number 4 · 2004 · 258–268

We focused on the definition phase. In this phase, applying these results and taking the specific
we can identify two relevant issues. The first issue circumstances and requirements of DMT into
deals with data. If the top management wants to account we obtained requirements for the design
base its decisions on the data described in the of a DMT-specific approach and used them to
project proposal, the proposals should be design both data and process. The survey and its
comparable. This can be achieved when all conclusions are presented in Section 2. The
proposals are required to apply an identical format. resulting design is presented in Section 3. The
It is not so much the use of an identical proposal design evaluation is presented in Section 4.
format layout that is essential, but rather the use of The results obtained are specifically applicable
identical data sets based on published and to DMT. However, we could also identify a
accepted (within the DMT) definitions. number of more generally applicable lessons when
Therefore, a key element of the design is the reviewing the research in hindsight. These are
decision as to what data should be collected to presented in Section 5.
provide a description of the proposed
development. This data should be sufficiently
comprehensive to capture the costs and benefits 2. Design requirements
while at the same time allowing comparison
between proposals. On the basis of this we can In this section, we will identify design
formulate the first research question as follows: requirements that will lead to the design of a data
set and data collection process that is specific for
Design a data set that results in a sufficiently the DMT. With regard to the data set we first
complete ICT-project proposal.
examined relevant literature in the field of the cost-
The second issue deals with process. This aspect of benefit analysis. A short survey of this literature
completeness is not sufficient in itself. If the top will be presented in Section 2.1. In Section 2.2, we
management wants to be able to base its decisions draw a number of conclusions for the DMT
on the data described in the project proposal, they setting.
will need some kind of assurance that the data Next, we identified requirements regarding the
presented are correct in the sense that the data process of collecting and assessing data for an ICT
offers a reliable picture of the actual available investment proposal. This process can be seen as a
knowledge. The mere fact that a manager requires specific instance of a human information-
an ICT investment proposal to be submitted processing activity. This is a research field that has
according to a prescribed format does not imply been studied in depth and in which practical
that the data collected and assessed in this way are results are available. So for the purpose of this
reliable. Wholehearted support from professionals study, rather than exploring the process aspects
is unlikely to be obtained by invoking authority discussed in the literature on cost-benefit analysis,
(Mintzberg, 1983). This led to the realisation that we decided to return to the original source of
a reliable and accepted process for gathering and information. Section 2.3 includes a brief overview
selecting data was required. This process should of relevant literature in this field, followed by a
match the organizational language, culture and number of identifiable requirements in Section
habits and way of working and thinking. On the 2.4. Section 2.5 summarises the resulting
basis of this we can formulate the second research requirements.
question:
2.1 Approaches towards an IT cost-benefit
Design a data collection process that will provide
sufficiently reliable data for ICT-project proposals. analysis
Many methods and techniques have been
The approach taken to answer these design proposed for assessing ICT investment proposals.
questions was as follows. The research was aimed As early as 1961, the International Federation of
at deriving a workable solution for DMT, Information Processing devoted its first conference
considering its specific situation and requirements. to evaluation issues (Frielink, 1961) and Joslin
First of all, an extensive requirement study was (1986) wrote a book on computer selection.
carried out. This study focused on two areas. An Ever since a vast amount of literature has been
obvious first field for study is that of ICT produced on the subject. For example, Renkema
evaluation. An extensive body of literature in this and Berghout (1997) identified 67 different
field is available and this provided valuable insights methods for cost-benefit analysis, which can be
into the data issue. For the process issue we distinguished as follows.
decided to rely on literature describing the subject .
The traditional financial methods (Brealy and
of processing human information, since their Myers, 1988), completed by the balanced
expertise in designing data collection and scorecard (Kaplan, 1986) and/or the option
evaluation processes can be found. Next, by theory (Renkema, 1999).
259
Defining ICT proposals The Journal of Enterprise Information Management
Fred J. Heemstra and Rob J. Kusters Volume 17 · Number 4 · 2004 · 258–268

.
The multi-criteria score methods (Parker et al., After some discussion this led to the selection of
1989, Ward and Peppard, 2002). The the data set described by Parker et al. (1989) as the
approach described in the paper can be basis for the data set specific to DMT.
considered as an example of the multi-criteria
score method.
. The portfolio methods (Bedell, 1985). 2.3 Defining ICT proposals: a human
.
The ratio methods (Strassman, 1990). information-processing activity
Processing information is a difficult task. In this
section, we will show arguments to support the
2.2 Design requirements derived from assumption that a team has more information/
current approaches to an IT cost-benefit knowledge at its disposal than an individual.
analysis Defining ICT and, more specifically, assessing the
Defining ICT proposals requires agreement on the defined data should therefore, be carried out by a
data that, when combined, describe a proposal. team rather than by an individual.
In most assessment methods these data are This assumption will be further examined in
defined as criteria. We feel that data/criteria this section, by using a general information-
form the basis for defining ICT project processing model from the field of social
proposals and they are therefore of crucial psychology, which shows a number of major
importance. When exploring current approaches limitations on individual information processing,
on identifying relevant data, we drew the following arguing that teams or groups may remedy such
conclusions. limitations. The model presents a number of
. Most methods have a tendency to apply a agreed conditions for group effectiveness
fixed set of data. and efficiency for carrying out processing
.
However, there is no agreement as to what information, and translating such conditions
data should be applied (Irani, 2002). into specifications for the practical design of
.
There is a general agreement on the instruments and procedures to be used in defining
importance of financial criteria, however, ICT proposals.
non-financial criteria also play an important
role in many approaches (Ward and Peppard, 2.3.1 Individual information processing: perception
2002). An individual who values the data in a proposal,
.
The scope covered by the data varies widely, forms a judgement on the basis of what he sees, in
with a substantial number of approaches only combination with what he (or she) knows, or
taking money into account (Brealy and Myers, rather: he combines what he thinks and sees with
1988), while others also take other aspects that what he thinks and knows With this we mean
into account (Irani, 2002; Parker et al., 1989; that “seeing data” is not just a simple observation,
Willcocks, 1994). but the outcome of a process of perception, which
.
No solid theoretical foundation is provided for goes through a number of stages. Figure 1 shows
the selection of (the set of) data. such a model as described by Janis et al. (1999).
This model implies that two observers of the
Based on these findings we concluded that there is
same proposal are likely to form different
no winner among the many advocated methods on
judgements with regard to the data that define the
the basis of theoretical considerations. This
proposal, due to:
prompted us to take the following design decisions: .
selective focus on people, events and objects;
.
select the best type of approach on offer, and .
the interpretation of what is perceived; and
.
take this as a starting-point, but accept that .
selective memory, which is retained in
changes will probably be needed to match the
memory
specific DMT circumstances.
In selecting the “best type of approach” we applied Figure 1 The perception model
the criteria:
.
of acceptance in practice, as shown by the
approach used in practice either under its own
name or disguised as a proprietary method,
.
of acceptance in theory, as shown by the
number of references made,
. of clearness, as demonstrated by an
understandable description, and
.
finally, the readiness to which this approach
leant itself to adaptation to local
circumstances (specific to DMT).
260
Defining ICT proposals The Journal of Enterprise Information Management
Fred J. Heemstra and Rob J. Kusters Volume 17 · Number 4 · 2004 · 258–268

People focus selectively on stimuli, which are interaction of specialized individuals who share
congruent with their needs, and these depend in their knowledge, by turning private knowledge into
turn on position, role and tasks. People in different public knowledge and tacit knowledge into explicit
functions or on different levels in the hierarchy knowledge (Nonaka and Takeuchi, 1995). This
may select different stimuli that could later be also applies to defining ICT proposals, but this
interpreted as “risky” or “costly”. does not make it an easy task for a group. In order
People have different schemata to order the for groups to outperform individuals, we must be
stimuli on which they selectively focus, influenced able to use the advantages of groups by creating the
by personality and prior socialisation (education, necessary conditions for effectiveness and
training, group membership). By hiring people efficiency of group performance for the specific
from specific backgrounds and organising them in type of task.
groups, the organization reinforces differential
interpretation of data by different members.
2.4 Design requirements for group
What is used of these interpretations
effectiveness and efficiency
constructed by persons on the bases of their
The effectiveness of a group can only be measured
selective attention to stimuli depends on what they
in terms of a specified task. In our case this task
selectively store and retrieve from their memories.
consists of the definition, analysis and valuation of
Selective memory and selective forgetting in
data in a proposal. What kind of task is this? It is
organizations is again dependent on positions,
certainly not a task in which the outcome consists
tasks and roles.
of the only “correct answers”. Neither is it a
Selective memory determines a selective focus
political task in which resolving conflicts of
on stimuli and differential interpretation. It is this
interests between the actors is central to the
self-reinforcing character of selective processes
process. However, the task involves the resolution
which makes human perception very vulnerable to
of substantive conflicts required to integrate
bias. Stimuli that are not attended to will not lead
knowledge from different backgrounds and
to interpretive schemata and not create memories
reconciling different frames of actors: it has
that will help to see such stimuli in the future!
characteristics of a so-called “cognitive conflict
Blindness tends to be self-perpetuating in
task” (McGrath, 1984).
individual perception (see the “jelly model of
The effectiveness of a group carrying out such a
retention”, inspired by De Bono as described in
task can be judged in terms of:
Weick (1979)). .
the degree in which the cognitive input of
This makes the responsibility of an individual for
participants has been used, and
the total cost-benefit analysis phase problematic. .
the degree of integration of this knowledge as a
How can we guarantee that bias with regard to the
result of group discussion
assessment and valuation of data is excluded? This
would require access to a very wide range of stimuli, We call a group efficient when it is effective with
openness towards different interpretational relatively few resources in terms of participant time
schemata and a very strong memory. and effort.
A general model of group functioning
2.3.2 Defining ICT proposals as a group task (van Zanten, 1996) links group results with
It seems more reasonable therefore, to define the group processes and input (Figure 2).
tasks of defining proposal and data valuation as a
2.4.1 Input
group task. A group of individuals with a sufficient
First of all, the task definition must be clear for all
diversity in disciplinary backgrounds, position,
involved at the very start. This may involve a
roles and tasks, will counterbalance the perceptual
formal task assignment, briefing of new group
one-sidedness of individuals. A group can improve
members, etc. The composition of the group must
the phase of defining ICT proposals by:
be in line with this task. In our case, the variety of
.
paying attention to a larger range of potentially
backgrounds and the representation of all relevant
relevant stimuli, experienced by people in
different positions with various backgrounds
Figure 2 A general model of group functioning
and different tasks;
.
employing a larger collection of interpretative
schemata to the available range of stimuli; and
.
retaining a broader range of interpretations in
a (collective, shared) memory
What we are suggesting here, is one of the core
ideas in knowledge management: we can use the
group to create superior knowledge through the
261
Defining ICT proposals The Journal of Enterprise Information Management
Fred J. Heemstra and Rob J. Kusters Volume 17 · Number 4 · 2004 · 258–268

knowledge must be warranted. The structure and control patterns must therefore, be corrected in
rules of the team must support the task. In our such groups.
case, where the task demands a free flow of Applying procedures may decrease the
information and open communication, there likelihood of such negative group dynamics
should be no hierarchical structure. The group occurring and promote discussion rules that favour
culture should support the requirements of the criticism and debate, like the devil’s advocate and
task. One decision about the group structure is the dialectic method (Janis et al., 1999).
leadership. Here a facilitator can play a role, as will A facilitator, i.e. a person with the specialized
be discussed later. Group size is also a variable. In role of enabling the processes that lead to required
our case diversity calls for relatively large groups, group outcomes, may be essential for maintaining
but this should be balanced with efficiency: each procedures for effective group work and correcting
new member makes communication more possible negative group dynamics that may arise.
complex. Facilitators may, among others, correct defensive
patterns and win-lose dynamics in groups,
guarantee the equal participation of all group
2.4.2 Process members or deal with emotional problems that
The central processes in this type of group involve: block effective functioning.
.
eliciting individual (private, maybe tacit)
knowledge from participants,
.
sharing this knowledge through 2.5 Summary of design requirements
communication in the group, and The design requirements derived until now can be
.
combining, integrating this knowledge divided into two categories as follows.
through group discussion. (1) Data requirements. No data set based on a
These processes can be promoted by adequate generic data set found in the literature could
procedures and techniques: be identified. It was decided to take the data
.
procedures to “tap” knowledge from set suggested by Parker et al. (1989) as the
participants prior to meetings, starting-point for a follow-up specific to
.
techniques to summarize and present shared DMT.
knowledge to support group discussion, and (2) Process requirements. From a human
.
procedures to ensure the quality of group information-processing perspective more
discussion. conclusive theoretical support for process
design requirements can be identified. We
The fact that much knowledge is local, i.e. specific accepted these requirements and used them as
to the context of an organization or a project, the starting-point for process design.
implies that procedures to elicit, integrate, share Requirements were identified in the following
and discuss knowledge should be expected to be areas:
effective and efficient insofar as they are designed .
clarity of task description,
to deal with local knowledge: they should deal with .
team composition,
locally relevant themes and use the frames of . structure and rules for team behaviour,
reference of the participants. .
team culture,
Procedures should be designed so as to .
use of a facilitator, and
counteract the natural tendency of groups toward .
procedures and techniques that support
inefficiency. For example, groups tend to block the eliciting individual knowledge, sharing
production of ideas by individuals. This may be a this, and knowledge by communication in
reason to combine group work with individual the group and combining and integrating
work. this knowledge through group discussion.
The nature of the task demands that procedures
favour diversity in information and interpretations. In Section 3, we will describe the way in which
Actual group dynamics may negatively impinge these requirements were implemented.
on group effectiveness and efficiency. One problem
frequently mentioned is that of the destruction of
the necessary (cognitive) variety in the group. This 3. The approach to defining ICT project
is also known as groupthink (Janis et al., 1999). proposals
Anxiety and pressures on individuals to conform
may lead to inferior reasoning in groups in difficult The theoretical design requirements identified in
situations. Patterns of defensive reasoning may the previous section were enhanced by
obstruct the necessary learning processes in groups requirements specific to DMT in order to meet the
dealing with difficult cognitive tasks (Argyris, expectations and demands of the DMT. These
1983, 1990). Win-lose dynamics and unilateral requirements were identified by:
262
Defining ICT proposals The Journal of Enterprise Information Management
Fred J. Heemstra and Rob J. Kusters Volume 17 · Number 4 · 2004 · 258–268

.
interviews with key players in the DMT, Table I Non-financial criteria
.
studies of existing project proposals Proposed by Parker et al. (1989) Used by DMT
documentation, and
.
evaluations of existing ICT investment Risk factors
methods. Organizational risk Organizational risk
Specification risk Specification risk
The choice for the most suitable way of eliciting Complexity of field of application Complexity of field of application
requirements was based on the approach of Technical risk Technical risk
Davis (1982). He refers to several strategies for Infrastructure risk Infrastructure risk
determining requirements; three of these Non-financial benefits
requirements fit in with the approach to eliciting Strategic match Strategic match
requirements we used: “asking” (interviews), Management information Management information
“based on characteristics of their own Competitive advantage Political pressure
organisation” (studying documentation) and Competitive response Political information
“reference approach (studying existing Infrastructure match Infrastructure match
methods)”.
Based on the design requirements mentioned in Table II Developmental costs: staffing
Section 2, it was concluded that a tailor-made Internal staffing costs
approach to defining ICT project proposals had to Direct Indirect External
be developed for the DMT. In this section, we will Phase (in days) (in days) staffing costs
focus on what we think are the two most important
issues of the approach. Project preparation
Definition study
(1) Developing a support mechanism to select
Basic design
relevant data for defining a proposal and
Detailed design
estimating the value of the data.
Realisation
(2) Developing the process for defining ICT
Implementation
project proposals. Conversion
3.1 Selection of relevant data for defining Training
proposals Column total (days) –––
Based on the generic data set presented in Internal tariff (per day) X euro per day –––
Parker’s approach, a set of localised data was Total (euro)
defined Localisation took place in two areas.
The first area where adaptations were made was a number of representative project proposals it was
that of quantitative financial data. In fact a decided that the risks identified by Parker et al.
significant part of the effort went into were sufficiently applicable to the DMT situation.
structuring and detailing data on financial costs However, when examining non-financial criteria it
and benefits in such a way as to provide a was deemed necessary to make a number of
sufficiently detailed starting-point for estimating alterations. The issue of competition is not an
costs and benefits, while at the same time aspect that is relevant for DMT. On the
achieving a match with the current financial other hand, issues were added that referred to
reporting structure of DMT. This resulted in
defining detailed costs and earning tables, an Figure 3 Developmental costs: other
extensive system of checklists set-up in a local
language and linked to the existing registration
and accounting systems. Tables I and II are
examples of this. Overall 22 tables were required
to cover all relevant data. Financial data will
probably suffice when looking at applications
that further the efficiency of current processes.
If a more innovative application area is
suggested this will usually not suffice. To
identify systems where non-financial aspects
could be more important systems are
characterised as either innovative or supportive
(Figure 3).
The approach by Parker et al. also proposes
using specific qualitative data in order to describe
risks and non-financial benefits. Based on the
discussions with DMT stakeholders and a study of
263
Defining ICT proposals The Journal of Enterprise Information Management
Fred J. Heemstra and Rob J. Kusters Volume 17 · Number 4 · 2004 · 258–268

political information, indicating that the proposed requested using the (localised) data sets
system was put into effect to answer a request introduced in Section 3.2.
for information from either government or (4) Analysis and consolidation of results. The
parliament, and political pressure, indicating that a process facilitator consolidates the inputs
system has been put into effect as required by the from all parties identifying points of
government. Table I shows the original proposal by agreement and discussion. A report is sent to
Parker and the choice made with regard to DMT. all people involved.
All results are consolidated and are shown in (5) Defining and assessing collaborative data.
Figure 4. A general meeting is held based on the report
and chaired by the process facilitator The
3.2 Developing the process for defining ICT objective of the meeting is to confront the
project proposals team members with each other’s perception of
Based on the requirements identified in the the data assessment, to initiate a discussion on
previous section a process for defining an ICT differences in perception and, last but not
project proposal was developed. We will limit our least, to agree upon the most likely data
discussion to the presentation of the basic steps of values.
this process. An extended description of the (6) Reporting. A final report is drawn up
process can be found in Heemstra and Kusters containing the final and agreed ICT
(2000). investment proposal.
(1) Selecting the group of people. The goal of the first (7) Assessing the proposals. As mentioned
step is the composition of a “proposal earlier, the paper deals with the definition
definition team” that will perform the phase of the ICT selection process. We will
activities of the definition phase of the ICT not explain the assessment phase of the
selection approach. An important issue here is approach here.
insuring representation of each stakeholder 3.3 From requirements to approach
group and knowledge area involved in the When developing the ICT proposal selection
project by at least one agent. approach, we took care that all design
(2) Explaining the approach and planning tasks. requirements were met. Table III summarizes how
The goal of step 2 is twofold. First of all it is the design requirements were implemented into
important to inform all stakeholders about the the approach.
work procedure. Secondly, it is necessary to
acquire commitment.
(3) Defining and assessing data. The process
facilitator interviews all people involved. 4. Evaluation
In this interview, each person’s opinion is
The evaluation of the method consisted of three
parts:
Figure 4 Consolidation form (1) a so-called internal acceptance test,
(2) an application test, and
(3) an acceptance test.
In the remainder of this section the three tests will
be discussed briefly.

4.1 The internal acceptance test


After completion of the development it was tested
whether the approach met the requirements
postulated in the design. Table III was used as a
tool for validation and verification. In order to
guarantee an objective judgement an external
auditor supervised the internal acceptance test.
The test result showed that all requirements were
met satisfactorily.

4.2 The application test


The goal of the application was to find out if the
stakeholders could estimate the value of data
in the tables. In order to handle this general
264
Defining ICT proposals The Journal of Enterprise Information Management
Fred J. Heemstra and Rob J. Kusters Volume 17 · Number 4 · 2004 · 258–268

Table III How requirements are used to develop the approach stakeholders were involved in the application test:
Data requirements the client, developer, project manager and project
Locally defined data set Using checklists based on generic data sets consultant.
from existing ICT assessment methods Table IV shows the format in which the results
Adapting these checklists to local circumstances were presented. As mentioned above, the table
Process requirements caption refers to the evaluation questions; row 1
Task definition Clear design of the method coupled with an represents the 22 designed tables, while the
explicit explanation of tasks and responsibilities opinions/answers of the stakeholders with regard
Group composition Selection of participants aimed at covering all to the questions are formulated in the cells (answer
major roles and knowledge areas options: yes, no, no answer). The row “Total”
Rules, structure Use of an independent facilitator with no political counts the answers per question.
ties to the project As can be concluded from Table IV (row
Individual interview between participants and “Total”), the users were quite satisfied with the
facilitator as a basis for group discussion to usefulness of the tables. About 75 per cent of the
promote open communication respondents judged the tables as significant and
Group size to be kept reasonably low so as to only 11 per cent as insignificant. Despite this
facilitate an efficient group meeting positive feedback, 33 per cent had problems with
Culture, leadership Use of an independent facilitator with no political answering/completing the tables (too many, in our
ties to the project
opinion) and only 56 per cent regarded the
Elicitation Individual interviews as the basis for further
documentation as sufficiently clear. These two
discussion to prevent blocking and groupthink
negative aspects resulted in many suggestions for
Use of a checklist specific to the type of project
improvement. On the basis of these results the
in order to promote the motivation of participants
by showing relevance
tables and documentation were adapted.
Use of a checklist based on the jargon of the
organization in order to promote efficiency by 4.3 The acceptance test
remaining within the frame of reference of the After correcting the tables and documentation a
participants, hence promoting understanding formal acceptance was performed. The
Sharing All interview results are made available to all participants of the application test were
participants interviewed through a questionnaire. The
Interview results are used anonymously to prevent participants were familiar with the approach
pressures of having to conform
towards defining ICT project proposals after
The facilitator also summarizes interview results in
having applied this approach during the
order to provide a discussion list of potential risks
application test.
specific to the project
The acceptance showed that all people involved
Combining Use of an independent facilitator to chair the
meeting in order to correct defensive patterns and
were generally positive about the approach,
win-lose dynamics, ensure equal participation specifically about the extensive use of practicable
and deal with emotional problems that block tables, the interviews, which yielded more
effective functioning productive data than through a written collection
Process guidance Use of an independent facilitator of data, and the group meeting, which made it
Communication Sharing of knowledge and expertise in team possible to discuss issues in a sound way.
meetings Respondents felt that applying the method was
Discussion on relevant data in the jargon of the successful in giving them a greater “grip” on the
organisation project. They mentioned the following strong
features of the method:
.
the group meetings,
question, the question was subdivided into five .
the surfacing of unexpected data,
simple questions as formulated in the caption of
.
the resultant overview of costs, benefits, and
Table IV. risks,
During the application test three “real life”
.
an increased understanding of the proposed
projects were applied. All projects were in the stage project, and
of defining a proposal. Instead of using their own
.
an increased objectivity due to the presence of
informal way of describing an ICT investment the process facilitator.
proposal, the project participants were asked to use They also mentioned the following weak points:
the developed approach. This implied that the .
initial problems with an abstract formulation
steps 1-6 of the ICT selection process were of the data,
performed for three different project proposals and .
labour intensiveness, and
that the checklists, containing the relevant data, .
the process facilitator being unfamiliar with
were completed for these projects. All in all, eight the project.
265
Defining ICT proposals The Journal of Enterprise Information Management
Fred J. Heemstra and Rob J. Kusters Volume 17 · Number 4 · 2004 · 258–268

Table IV Results of the application test


Question 2 Question 3 Question 4
Question 1 Problems with- Clear Table Question 5
Table significant? answering? documentation? incomplete? Any comments?
Yes No N.a. Yes No N.a. Yes No N.a. Yes No N.a. Yes No N.a.
Table 1 7 0 1 0 6 2 5 0 3 2 3 3 3 4 1
Table 2A 8 0 0 5 3 0 6 1 1 1 6 1 0 7 1
Etc.
Total (per cent) 75 11 14 33 43 24 56 10 34 8 58 34 15 51 34

The respondents were divided on the issue of the different data are presented, although the methods
process facilitator. Some were of the opinion differ strongly. It is our contention that the lack of
that the support offered by a neutral outsider agreement is not the result of an insufficient
(outside the project, but not necessarily outside the theoretical insight into factors influencing ICT
organisation) could just as well be offered by investment decisions. It is more likely the result
the project champion. Others stated that the of the different circumstances in which
neutrality and focus of the outsider process different organisations find themselves, which
facilitator on the process itself provided a valuable dictate that other arguments have to be used
contribution. The authors support the latter view, to underpin an investment decision.
also based on additional evidence from other areas A different version of this thesis is suggested by
such as risk management (Heemstra and Kusters, Irani (2002) who suggests a number of criteria
1996). based not on the (type of) organisation but on the
The acceptance test resulted in a number type of system involved, in his case MRPII
of minor adaptations. Finally, the approach systems.
was implemented at the Ministry of Transport, This in turn means that each organisation will
Public Works and Water Management as a have to decide which data will be used in the
standard procedure for selecting ICT proposals. definition process. It is, however, possible to
provide a picture of the structure of the type of data
that can be considered. This structure can be used
5. Lessons learned as a starting-point when designing a local
approach.
The first lesson we derived from this study deals Such an approach should at least account
with the data. As mentioned earlier, we concluded for the financial consequences of the proposed
that current methods did not provide sufficient investment (costs and earnings). Explicit care
support to answer the question “what data should should be taken to define this data in such a way
be used in a specific situation”. We selected a well- that they match the current reporting
known approach, that of Parker and Benson, procedures and are in line with locally
which was considered (not only by us) to be the accepted usage of language. Next, relevant
“best of the breed”. However, we found the non-financial data should be selected and, last
following. but not least, relevant risk factors should be
(1) Much work was needed to (re-) define included.
financial data in such a way as to match the We feel that it was no coincidence that the
reporting practices and language and jargon approach presented by Parker et al. need to
used in the specific DMT setting; and be adapted. Local circumstances will determine
(2) The non-financial benefits were only partially what is relevant here. In order to support this
applicable in the specific DMT setting. Some selection process a result of the literature survey
criteria were irrelevant while other relevant shown in Section 2 is presented in Table V,
criteria had to be added. which shows the types of non-financial criteria
A traditional answer to the question “what data are encountered. This generic data set can form the
relevant for deciding which project proposal to basis for a set of data that are specific to an
fund”, is money. However, this answer is no longer organisation.
accepted even in “traditional” investment A second lesson learned in this study deals
literature (Bower, 1970; Kaplan, 1986). In with process. The notion of viewing the
addition, the shortcomings of a purely financial collection of data and evaluation aspects of defining
analysis are recognised in other specific segments an ICT investment proposal as a human
(Ansoff, 1971; Nagel, 1992). When examining information – processing activity paid off. Based on
current investment methods, we notice that many this notion a number of process requirements were
266
Defining ICT proposals The Journal of Enterprise Information Management
Fred J. Heemstra and Rob J. Kusters Volume 17 · Number 4 · 2004 · 258–268

Table V Overview of data used to strengthen current successful


Category Examples approaches such as benefit analysis (Ward and
Peppard, 2002).
Costs Development
Training
Implementation
Operations References
Maintenance
Security Argyris, C. (1983), Reasoning, Learning and Action:
Phasing out Individual and Organization, Jossey-Bass,
Earnings Cost savings San Francisco, CA.
Time savings Argyris, C. (1990), Overcoming Organizational Defenses:
Increased output Facilitating Organizational Learning, Allyn and Bacon,
Boston, MA.
Different output
Ansoff, H.I. (1971), Corporate Strategy, McGraw-Hill,
Effectiveness Product/service quality enhancement
New York, NY.
Increased customer service Bedell, E.F. (1985), The Computer Solution: Strategies for
Management information and decision Success in the Information Age, Dow (Jones & Irwin),
making Homewood, IL.
Improved communications Bower, J.L. (1970), Managing the Resource Allocation Process,
Competitive necessity Harvard University.
Competitive advantage Brealy, R.A. and Myers, S.C. (1988), Principles of Corporate
Increased market share Finance, McGraw-Hill, New York, NY.
Transformation New markets and products/services Davis, G.B. (1982), “Strategies for information
requirements determination”, IBM Systems Journal,
Influencing the value chain
Vol. 21 No. 1.
Redesigning the business processes
Frielink, A.B. (1961), Economics of Informatics, North-Holland,
Technology Technological necessity Amsterdam.
Technological flexibility Heemstra, F.J. and Kusters, R.J. (1996), “Dealing with risk: a
Infrastructure availability practical approach”, Journal of Information Technology,
Integration and standardisation Vol. 11, pp. 333-46.
Compliance Political pressure Heemstra, F.J. and Kusters, R.J. (2000), “Assessing
Legal necessity IT-investments: costs, benefits, risks”, Project control:
Wider human and organizational Organizational learning The Human Factor, Proceedings of the 11th European
impacts Political and cultural impacts Software Control and Metrics Conference, 18-20 April,
Munich, Shaker Publishing, Maastricht.
New work contents
Heemstra, F.J., Kusters, R.J. and Trienekens, J.J.M. (1995),
Organizational structure
“Defining systems quality: involving end-users”,
Risk area Examples of risk factors in Rosca, I.G. and Ivan, I. (Eds), Software Engineering and
Development Commitment of stakeholders Applications, Proceedings of the 2nd International
Application risk Symposium of Economics Informatics, Ase, Boekarest,
Technological risk pp. 110-21.
Irani, Z. (2002), “Information systems evaluation: navigating
Development staff
through the problem domain”, Information and
External suppliers Management, Vol. 20, pp. 11-24.
Implementation Resistance to change Janis, I., Kreitner, R., Angelo, K. and Buelens, M. (1999),
Conversion Organizational Behavior, 1st European Edition,
Lack of application knowledge McGraw-Hill, Maidenhead.
External Competitive risk Joslin, E.O. (1986), Computer Selection, Addison-Wesley,
Structural economic risk Reading, MA.
Kaplan, R.S. (1986), “Must CIM be justified by faith alone?”,
Harvard Business Review.
McGrath, J.E. (1984), Groups: Interaction and Performance,
identified that were used as a starting-point for the Prentice-Hall, Englewood Cliffs, NJ.
design of a process for collecting and evaluating Mintzberg, H. (1983), Structures in Five: Designing Effective
data (Table III). The evaluation discussed in the Organizations, Prentice-Hall, Englewood Cliffs, NJ.
previous section shows that this process is suited for Nagel, A.P. (1992), “Increasing strategy innovation ability”,
(in Dutch), Thesis TUE.
its purpose, which suggests that it is advisable to Nonaka, I. and Takeuchi, H. (1995), The Knowledge Creating
observe these requirements. The usefulness of Company, Oxford University Press, Oxford.
these requirements was not tested only in the area of Parker, M., Benson, R. and Trainor, H. (1989),
cost-benefit analysis. Similar results were Information Economics, Prentice-Hall, Englewood Cliffs,
obtained by experimenting in the fields of risk NJ.
Renkema, T. and Berghout, E. (1997), “Methodologies for
management (Heemstra and Kusters, 1996) and information-systems evaluation at the proposal stage: a
requirements engineering (Heemstra et al., 1995). comparative review”, Information and Software
We feel that the lessons identified here can also be Technology, Vol. 39 No. 1, pp. 1-13.
267
Defining ICT proposals The Journal of Enterprise Information Management
Fred J. Heemstra and Rob J. Kusters Volume 17 · Number 4 · 2004 · 258–268

Renkema, T. (1999), The IT Value Quest: How to Capture the van Zanten, W.P.C. (1996), Group Decision in Management and
Business Value of IT-based Infrastructure, Wiley, Chichester. Administration (in Dutch), H. Nelissen/Open Universiteit,
Strassmann, P.A. (1990), The Business Value of Computers, Baarn/Heerlen.
The Information Economics Press, New Canaan, CT.
Ward, J. and Peppard, J. (2002), Strategic Planning for
Information Systems, Wiley, Chichester.
Weick, K.E. (1979), The Social Psychology of Organizing, 2nd ed., Further reading
Addison-Wesley, Reading, MA.
Willcocks, L. (1994), Information Management: The Evaluation of Nagel, A.P. (1983), “Increasing strategy innovation ability
Information Systems Investments, Chapman & Hall, (in Dutch)”, PhD thesis, Eindhoven University of
London. Technology.

268
Introduction
A hedonic wage Usually, organisations in the public-sector are
model-based faced with challenges differing from those of
private firms. They have to meet multiple, often
methodology for conflicting goals such as providing better service
evaluating the benefits with reduced budgets and reduced staff, or they
are forced to provide a certain service to persons
of IT investments in entitled to it by law, without consideration of
economic aspects. Moreover, public-sector
public-sector organisations have a limited ability to use freed
capacity for introducing newly developed products
organisations or services. Several of these challenges hold true
for the private sector as well, but in the latter case
Peter Cilek an overriding goal of profit maximisation exists.
Moreover, public-sector organisations are subject
Wolfgang Janko to constraints of financial, legal/regulatory,
Stefan Koch contractual, personnel and institutional nature.
Normally, those constraints are much more
Andreas Mild and binding than in private firms (Kock and McQueen,
Alfred Taudes 1996; Luck and Peabody, 2000). For example, due
to legislative constraints, there might be no
possibility to reduce staff according to a new
The authors
situation, which indicates that any time saved
Peter Cilek, Wolfgang Janko, Stefan Koch, Andreas Mild due to the introduction of a new technology
and Alfred Taudes are all based at the Institute for Information has to be fully reallocated to other duties.
Processing and Information Economics, University of Economics Nevertheless, also in the public-sector the use of
and BA, Vienna, Austria.
information technology increases and, in fact, is
seen as a possibility to achieve higher efficiency.
Keywords
In this context, an evaluation model therefore,
Information systems, Public sector organizations, has to determine the most effective way of
Investment appraisal, Cost benefit analysis spending the time saved and the resulting value
for the organisation and not to calculate the
Abstract
savings by staff reductions. So far, the lack of
The economic justification of investments in information staff reduction following an information
technology (IT) is a basic issue for IT management in private and technology (IT) investment or a re-engineering
in public-sector organisations. Usually, the expenses made for attempt has sometimes been seen as a sign for
any investment are compared to the cost saved. While the costs
failure (Kock and McQueen, 1996). Using only
for implementing a new system are uncertain, only a small
the number of layoffs as a measure for evaluating
percentage of the benefits accrues as cost savings given the type
of IT systems used today and the particularities of the public- the success of an IT investment might not
sector. In this paper, we present a methodology for the monetary represent the whole picture, as any time saved
quantification of the benefits resulting from the introduction of a might be used more effectively, thus generating
modern IT application and demonstrate its use on the basis of additional value for the organisation. In the case
a case of prison administration. we describe in this paper, a public-sector
organisation is considered which faces the
restrictions mentioned above.
Electronic access
A taxonomy of evaluation techniques,
The Emerald Research Register for this journal is introduced by Bannister and Remenyi (1999),
available at will be used to constitute the choice of the
www.emeraldinsight.com/researchregister methodology to be applied. Three basic groups
The current issue and full text archive of this journal is of evaluation methods are distinguished.
available at (1) Fundamental methods attempt to parameterise
www.emeraldinsight.com/1741-0398.htm one single characteristic or a set of closely
related characteristics down to one single
measure or score. The most common scores
The Journal of Enterprise Information Management are financial measures.
Volume 17 · Number 4 · 2004 · pp. 269–275
q Emerald Group Publishing Limited · ISSN 1741-0398 The authors thank the co-editors and two anonymous
DOI 10.1108/17410390410548670 referees for their valuable comments and suggestions.
269
A hedonic wage model-based methodology The Journal of Enterprise Information Management
Peter Cilek et al. Volume 17 · Number 4 · 2004 · 269–275

(2) Composite methods combine several studies examining the benefits of office
fundamental measures to get an overall automation systems and CAD systems (Janko et al.,
picture of an investment’s effects. 1989; Redlein and Rohrhofer, 1995;
These methods include approaches like the Sassone, 1987; Stickel, 1992; Taudes and
Balanced Scorecard or Portfolio Methods. Lukanowicz, 1994).
(3) Meta methods help to select a suitable In the next section, we give a short introduction
evaluation method for a certain decision, to the hedonic wage model. Its application
depending on the structure of the problem. necessitates a differentiation of salaries and work
An example for a meta method is described in profiles which is not always given, especially in
the work of Farbey and Targett (1994). public-sector organisations where one type of
employee is responsible for all activities.
As most IT implementations also entail the
We therefore, propose a modification of this model
redesign of the respective business processes,
and demonstrate its usage via a case study on
different process design scenarios need to be
IT implementation in prison management.
compared. To this end, a quantitative evaluation of
the strategy and performance of the organisation’s
business processes is required (MacArthur et al.,
1994). Regarding quantitative measures,
The hedonic wage model
monetary terms are to be preferred to other scores,
since only a monetary result of an evaluation Description
allows the application of investment analysis Sassone’s (1984, 1987) hedonic wage model is
methods. Of course, this is necessary to compare based on the assumption that every employee
an IT investment with other investment carries out a set of different types of activities, each
possibilities (Hares and Royle, 1994; Hauser, of them being of a different value for the
1996). Hence, no meta methods can be used in our enterprise. The combination of activities
case, because they are only useful for the selection performed (and their respective share of total
of an appropriate evaluation model and do not working time) by an employee makes up his or
provide any ranking of the processes considered.
her “work profile”. An employee’s salary
On the other hand, composite methods cannot be
(including fringe benefits, etc.) can be regarded
used, since they will give only ordinal utility results
as the price paid for a certain bundle of activities
allowing to sort the actions of choice and not
represented by the work profile. This salary is
a result on a cardinal scale. This indicates that we
known to the organisation.
have to use one or more fundamental methods
In order to apply the hedonic wage model, three
delivering a financial measure for the evaluation of
assumptions about the economic model of the firm
the new technology.
have to be made:
Of course, not all success factors of an
(1) management allocates resources efficiently,
enterprise can directly be expressed in monetary
(2) workers allocate their time among activities
terms (Remenyi et al., 2000). Especially, this holds
efficiently, and
true for public-sector organisations. They have to
(3) work comparable in value to current work
provide services for which sometimes no kind of
remains to be done (Sassone, 1987).
market exists. As a consequence, non-monetary
benefits can be capitalised by estimating their It is also assumed that for each category of
impact on the organisation’s market situation, employees (e.g. managers, professionals and
e.g. by calculating the raise of the contribution secretaries) there is a corresponding set of activities
margin caused by providing better service to proper to that category. This means that there is
customers. Owing to this fact, we have to find a set of activities that can be categorised as
other micro- or macro-economic measures management-type work, another one that can be
allowing a transformation of qualitative benefits called professional-type work, and so on. In this
to monetary terms. way, if there are N categories of employees, there
One approach to quantifying changes in are N corresponding sets of activities plus one
efficiency and effectivity in administrative additional activity called non-productive.
processes is the hedonic wage model as introduced Non-productive activities, such as searching for
by Sassone (1984, 1987). It is based on a information, copying or travelling to and from
times-savings-times-salary model (TSTS) which meetings are assumed to provide no positive
estimates the return of an IS as the time saved contribution to the company’s profit (Sassone,
multiplied by an average salary. In contrast to the 1987).
TSTS model, the hedonic wage model is able to The following notation will be used to
value returns caused by an increased effectiveness explain the theoretical basis of the method
as well. It has been applied several times in case (Sassone, 1987):
270
A hedonic wage model-based methodology The Journal of Enterprise Information Management
Peter Cilek et al. Volume 17 · Number 4 · 2004 · 269–275

i ¼ 1,. . .,I ¼ index of categories of employees each category is supposed to be optimal under the
j ¼ 1,. . ., J ¼ index of sets of activities present technical and organisational conditions
Aj ¼ amount of the jth activity in the and, therefore, the budget constraints are not
firm (measured in man-years or in binding (Sassone, 1987).
another dimension) The first step for the practical application of the
MVj ¼ marginal value for the firm of hedonic wage model is to identify the categories of
activity Aj employees including their respective salaries and
R(Aj,. . .,Aj) ¼ revenue for the firm when activity main activities in the firm or department. Later,
amounts Aj and j¼1, . . ., J are the key activities identified have to be grouped into
accomplished adequate categories. As a next step, the work
Li ¼ amount of labour used by the profiles for the different categories of employees
organisation in the I category of have to be set-up. They can be achieved by logging
employees (measured in the same the time spent on various activities, questionnaires,
dimension as Aj) or the use of simulation models.
Pij ¼ work profile matrix, where Pij
gives the percentage of time spent Example
by workers Li doing activity Aj Janko et al. (1989) have described an example for
B ¼ budget for Li, i¼1, . . ., I applying the hedonic wage model in the context
u ¼ Lagrange multiplier of the introduction of an office automation
To maximize the firms profit, the following system in university setting. An analysis has shown
problem must be solved: that there are four categories of employees
X 
(scientific manager, scientific specialist, scientific
max RðA1 ; . . .; Aj Þ 2 C i · Li assistant and secretary) who perform four main
i
categories of work (managerial, senior specialist,
subject to junior specialist and administrative). Based on a
X
Aj ¼ P ij · Li for j ¼ 1; . . .j questionnaire, the work profiles shown in Table I
i have been derived (a difference of 100 per cent is
X the fifth category of non-productive work, which
B$ C i · Li is not shown):
i
For example, the scientific manager spends
The first assumption indicates that employees 39 per cent of his time on managerial duties like
allocate their time efficiently, whereas the preparing and making decisions, co-ordination
second constraint represents the budget etc., 36 per cent on specialist work, 10 per cent on
limitation. The relevant Lagrange expression can junior specialist tasks and 3 per cent on
be stated as administrative work. The remaining 12 per cent
X  X  are non-productive.
Z ¼R P i1 · Li ; . . .; P iJ · Li : As a next step, the (hedonic) price for one unit
i i
of each category of labour ( pman, psen, pjun and
X   X  padmin) can be calculated, using the work profiles
2 C i · Li 2 u· B 2 C i · Li and the employee category’s average loaded
i i salaries, by solving the resulting system of
equations:
The first-order conditions are
X dR 0:39pman þ 0:36psen þ 0:10pjun þ 0:03padmin
dZ
¼ · P ij 2 ð1 þ uÞ · C i ¼ 0
dLi i dAj þ 0:12pn2p ¼ 70; 000

0:10pman þ 0:40psen þ 0:26pjun þ 0:12padmin


for j ¼ 1; . . .; J
þ 0:12pn2p ¼ 50; 000
With dR=dAj ¼ MVj these conditions can be
rewritten as Table I
X Category of labour
P ij · MVj ¼ ð1 þ uÞ · Ci for i ¼ 1; . . .; I
Category of Mana. Sen. spec. Jun. spec. Admin.
i
employee (per cent) (per cent) (per cent) (per cent) Salary
By solving the resulting system of equations, the
marginal values for the different types of activities Sc. Manager 39 36 10 3 70,000
can be computed. In practice, the value for the Sc. Specialist 10 40 26 12 50,000
Lagrange multipliers u is often assumed to be zero. Sc. Assistant 2 20 43 23 35,000
Secretary 0 0 18 70 20,000
This means that the current number of workers in
271
A hedonic wage model-based methodology The Journal of Enterprise Information Management
Peter Cilek et al. Volume 17 · Number 4 · 2004 · 269–275

0:02pman þ 0:20psen þ 0:43pjun þ 0:23padmin However, the hedonic values can only be
calculated if the number of categories of labour
þ 0:12pn2p ¼ 35; 000 equals the number of categories of employees
(in fact, the equations need to be linear
0:00pman þ 0:00psen þ 0:18pjun þ 0:70padmin independent). Otherwise, the system of equations
has no unique solution, and the hedonic wage
þ 0:12pn2p ¼ 20; 000 model cannot be applied. Redlein and Rohrhofer
(1995) use the average hedonic values of the
0:00pman þ 0:00psen þ 0:00pjun þ 0:00padmin industry concerned in the case of small
organisations where not all types of employees are
þ 1:00pn2p ¼ 0 present. However, this is only possible if a market
price for the specific categories exists.
Solving the resulting set of equations gives the
hedonic values (Table II) for the different
categories of labour (the value for non-productive
work is zero): Description of the methodology
Now, the revised work profiles have to be set-up,
since introducing a new technology will cause a Assumptions
shift in the work profiles by replacing low-value The following assumptions are made for the new
activities with duties in a category of higher value methodology proposed. Instead of assuming that
(i.e. shifting the percentages of the working time). different categories of activities are carried out by
This can be interpreted as the change in different classes of employees, we allow for all
effectiveness and measured in monetary terms by activities to be performed by one single class of
means of the hedonic prices through calculating employees with the same salary. Therefore, we
the values of all new work profiles and summing allow for situations where only one type of
the differences to the old situation. A raise in employee exists, which will more often be the case
efficiency can be measured by calculating the in public-sector organisations. Furthermore, we
“equivalent hours”, which indicate the time taken assume that it is possible to compute a relationship
in the old process to do the same amount of work. between the different categories of activities and
For example, an employee spending 30 h a week on the achievement of goals of the organisation.
professional work with a new system that provides The main idea of the proposed methodology is
a 10 per cent raise in efficiency would have needed to calculate pseudo hedonic values using these
33 h to produce the same output when using an old relationships by evaluating the “external” effects of
and inefficient system. a shift in the working profile.
The projected new work profiles after
implementation of the office automation system is Model
assumed to be achieved over a period of 5 years by The following steps are performed.
linear improvement from the date of .
Defining goals of the organisation and
implementation. This accounts for some effort appropriate metrics for them (for example, the
for learning the new system the first time after goal/question/metric approach (Basili and
introduction. Applying an interest rate of Rombach, 1988) developed for software
8 per cent, the value of the system was estimated at measurement or a similar framework could be
7,362,000 monetary units. used to guide this process). For example, the
goals of prison management might include
Limitations reducing the offences committed while jailed.
In public-sector organisations, there are often no This might be best represented by the number
different categories of employees but one type that of days of additional custody imposed due to
performs all types of activities. This violates the these offences.
assumption that there are different categories of .
Defining a set of n categories of activities
activities and employees within the organisation, within the organisation.
whereby each class of employees can be .
Retrieving the current vector
characterised by a group of activities. a ¼ ða1 ; a2 ; . . .; an Þ of the amount of labour
per activity category measured in man-months
or any other appropriate measure.
Table II The methods possibly used include
Category of labour questionnaires, interviews, analyses of the
Mana. Sen. spec. Jun. spec. Admin. existing data like time sheets, multi-moment
observation studies, or other similar
Hedonic value 102,960 72,290 32,120 20,310 techniques.
272
A hedonic wage model-based methodology The Journal of Enterprise Information Management
Peter Cilek et al. Volume 17 · Number 4 · 2004 · 269–275

.
Computing the goal function of the which can easily be accomplished by a trained
organisation from past data. The goal individual.
function is a function r of the vector a.
Then the value of the current vector r(a)
can be computed. The coefficients of the Example
different activities are the pseudo hedonic The following example details the application
values. of the proposed model within the environment of
.
Estimating the possible time saved after the prison management (due to privacy reasons, the
implementation of the information system. figures have been modified for this presentation).
This is best done after the implementation of In the country considered, prison management is
at least a working prototype, using direct governed by federal law and performed by the
measurement of new activity times of the Ministry of Justice. The benefits of an investment
employees. Other possibilities include in an IT system covering several administrative
alternatives to direct measurement after functions like reception, dismissal and payroll
the implementation, e.g. questionnaires, administration for prisoners were to be evaluated.
or working with the development team and Layoffs of employees were not considered as all
especially users who are part of it and who functions prescribed by law have not yet been fully
might already give first estimates as to the implemented due to a lack of staff. In addition,
possible saving. Of course, their input might layoffs would also have been very difficult, if not in
be distorted due to their respective many cases impossible, due to legal constraints.
motivations. Using the work profiles of similar The following three major activities have been
organisations as described by Redlein and defined: administration, custody and social care.
Rohrhofer (1995) might also be possible but The vector of current distribution of labour has
fails when the information system considered been retrieved using a questionnaire sent to all
is unique or similar organisations are missing. prisons. The time to be gained by the
This latter point might especially apply for implementation of the information system was
the public-sector, where a search for similar analysed based on the interviews with experts from
organisations would need to span several the field which were part of the software
countries which might not be comparable due development team and first results from a test
to legal differences. deployment of the software. The experts from the
.
Defining any constraints in the new field were prison employees from several prisons
distribution of working time. For example, who participated in the development as users and
a fixed ratio between the professional activities testers, i.e. they belonged to the category
and secretarial work could be assumed. considered. Table III shows the distribution of
.
Maximising the value of the new vector a0 by work before the possible introduction of the new
maximising the function r(a0 ) subject to the system and the expected new distribution (the new
constraints defined above. In a simple case, values for administration and non-productive):
this results in a linear program. While it was clear that the system would reduce
.
Comparing the values of r(a) and r(a0 ). the administrative effort and non-productive time
The difference indicates the additional value (mostly due to reduction in time waiting for
of the information system. Furthermore, the information), the optimal allocation of the
new distribution a0 gives the optimal usage for remaining time and, thus, the value of the
the time saved. information system had to be calculated.
For the calculation of pseudo-hedonic values,
Many of these steps have been performed already typical costs arising during detention had to be
during a business process analysis as a basis for the identified. The costs resulting from drug abuse
development of a new system. For example, many (medical treatment) and costs caused by additional
data concerning the activities and maybe even custody imposed due to administrative offences
process times will already be available. Also, the are considerably high. Therefore, the goal function
goals of the organisation and metrics for them was to be constructed to minimise these costs by
might be known from other activities like the optimally locating custody and social care. We have
introduction of a Balanced Scorecard (Kaplan and also considered including any effects of the work
Norton, 1996). The data for constructing the goal profile on relapse, but the costs associated with this
function will also be available, as historical data are not easily measured, as costs for the new jail
are explicitly called for. In most projects, the term do not include all aspects. Especially the state
possible time saved will have to be determined, faces high additional costs, as the offence removes
which probably will be the cause for the biggest the perpetrator from the work force, thus resulting
effort in using the proposed methodology. in a loss of taxes and plus any costs associated with
The other steps are mathematical computations, the offence itself, in the worst case human life.
273
A hedonic wage model-based methodology The Journal of Enterprise Information Management
Peter Cilek et al. Volume 17 · Number 4 · 2004 · 269–275

Table III
Administration Custody Social care Non-productive
Old absolute values 500 2,600 500 400
Percentage 12.50 65.00 12.50 10.00
New absolute values 400 – – 300

Then, the relationship between custody and social situations where other approaches cannot be
care activities and the occurrence of these costs applied, especially in public-sector organisations.
had to be determined. Based on internal statistics, The main restriction often faced in the
we found a negative correlation between both public-sector is that layoffs of employees are not
activities and resulting costs. Of course, one can possible due to legal or political restraints.
also use external studies in this process. Therefore, the gains in productivity made due to
For example, several performance measures have the introduction of a new information system
been developed for the criminal justice system, cannot be quantified by calculating the salaries of
(Logan, 1993). Especially for recidivism, several these employees.
prediction models have been developed (Maloof, As a result, the hedonic wage model has been
1999). proposed to arrive at a quantification of the
However, the allocation of time also has to take resulting shifts in the employees’ work profiles
into account several constraints. For example, from activities of lower value to activities of higher
social care activities also require an additional value. While this model is successful in doing so,
amount of custody, or a minimum level of custody, it cannot be applied if the number of employee
has to be ensured. On the basis of this information, categories is smaller than that of the activities.
which was either retrieved by interviews or derived Especially in public-sector organisations, it is often
from internal directives, such constraints were the case that one type of employee is responsible
formulated. for fulfilling all kinds of duties, thus preventing the
The optimal allocation was then found by usage of this approach.
solving the following program: We have, therefore, presented a new
methodology related to the hedonic wage
min K ¼ Ca ða* SC þ b* CUÞ þ Cb ðc* SC þ d* CUÞ
approach. This methodology uses the main idea of
subject to the constraints: the hedonic wage model for evaluating the benefit
CU $ CUmin of an information system based on the changes in
the value of the employees’ work profiles using the
CU hedonic prices for each activity. To overcome
$f the limitations described, we calculate the hedonic
SC
prices not based on a system of equations derived
where SC are the hours allocated to social care,
from different employee categories, but from
CU the hours for custody, Ca and Cb are the costs
“external” effects using past data. Most of the data
for one drug abuse and one additional day of
necessary are also a prerequisite for other methods
custody imposed due to administrative offences,
like the balanced scorecard or re-engineering
respectively, a,b,c,d are the factors determining
initiatives.
the estimated occurrence of the additional costs
We have demonstrated the application of this
for a given number of hours for SC and CU.
methodology in the context of prison
Solving the program now gives the optimal new
management, where the main effects of changing
allocation of hours (Table IV). Furthermore, the
a work profile, i.e. less administrative work and
difference in total costs can be discounted and
more social care, were reduced costs for medical
gives the value of the information system.
treatment and less detention due to offences in
prison.
As each step in the evaluation process is
potentially associated with a certain level of
Conclusions and future directions
uncertainty, project controlling should carefully
In this paper, we have presented a new analyse whether the parameter estimates proved
methodology for evaluating IT investments in are reasonable in view of the business process data
observed. If this is not done, project advocates
might have an incentive to overstate certain project
Table IV
benefits.
New absolute 400 2,400 900 300 It would be interesting to see future research
New percentage 10.00 60.00 22.50 7.50 applying the methodology presented to additional
274
A hedonic wage model-based methodology The Journal of Enterprise Information Management
Peter Cilek et al. Volume 17 · Number 4 · 2004 · 269–275

public-sector organisations showing similar Kock, N.F. Jr and McQueen, R.J. (1996), “Is re-engineering
restrictions. Conceivable examples could include possible in the public sector? A Brazilian case study”,
police work in public safety, where again one type Business Change and Re-engineering, Vol. 3 No. 3,
pp. 3-12.
of employee is responsible for all types of activities Logan, C.H. et al. (1993), “Criminal justice performance
especially including administration, health care, or measures for prisons”, in DiIulio, J.J. Jr, et al. (Ed),
organisational units performing standard clerical Performance Measures for the Criminal Justice System:
work like issuing of passports. Discussion Papers from the BJS-Princeton Project,
Besides these efforts, future developments NCJ-143505, Bureau of Justice Statistics, Princeton
for the approach taken with the presented University, NJ.
Luck, J. and Peabody, J.W. (2000), “Improving the public sector:
methodology can also be undertaken. For example,
can re-engineering identify how to boost efficiency at a VA
the methodology could be adapted for evaluating medical center?”, Health Care Management Review,
or even initiating changes in work profiles not Vol. 25 No. 2, pp. 34-44.
due to information system implementations. MacArthur, P.J., Crosslin, R.L. and Warren, J.R. (1994), “A strategy
In this way, the methodology could be used for for evaluating alternative information system designs
evaluating process innovations or even strategy for business process re-engineering”, International
Journal of Information Management, Vol. 14 No. 4,
changes.
pp. 237-51.
Maloof, M.A. (1999), “A machine learning researcher’s foray
into recidivism prediction”, Technical Report,
References CS-99-02, Department of Computer Science,
Georgetown University.
Bannister, F. and Remenyi, D. (2000), “Value perception in Redlein, A. and Rohrhofer, R. (1995), “The use of CAD-systems –
IT investment decisions”, The Electronic Journal of economic and organizational impact”, in von Barsani,
Information Systems Evaluation, Vol. 3, available at: K.R., MacConaill, P.A. and Thierney, K. (Eds), Opening
http://is.twi.tudelft.nl/ejise (accessed 26 May 2000) Productive Partnerships, IOS Press, Amsterdam.
Basili, V.R. and Rombach, H.D. (1988), “The TAME project: Remenyi, D., Money, A., Sherwood-Smith, M. and Irani, Z.
towards improvement-oriented software environments”, (2000), The Effective Measurement and Management of
IEEE Transactions on Software Engineering, Vol. 14 No. 6, IT Costs and Benefits, 2nd ed., Butterworth-Heinemann,
pp. 758-73. Oxford, UK.
Farbey, B. and Targett, D. (1994), “Matching an IT project with Sassone, P.G. (1984), “Cost-benefit analysis for office
an appropriate method of evaluation: a research note on information systems”, Proceedings of the International
evaluating investments in IT”, Journal of Information Conference on Office Automation, pp. 145-53.
Technology, Vol. 9, pp. 239-43. Sassone, P.G. (1987), “Cost-benefit methodology for office
Hares, J. and Royle, D. (1994), Measuring the Value of systems”, ACM Transactions on Information Systems,
Information Technology, Wiley, Chichester. Vol. 5 No. 3, pp. 273-89.
Hauser, C. (1996), Marktorientierte Bewertung von Stickel, E. (1992), “Verfahren zur ermittlung der
Unternehmensprozessen, Verlag Josef Eul, Bergisch wirtschaftlichkeit von informationssystemen”, in
Gladbach. Schweiggert, F. (Ed.), Wirtschaftlichkeit von Software-
Janko, W., Pönighaus, R. and Taudes, A. (1989), “Der nutzen von Entwicklung und-Einsatz, Teubner, Stuttgart, p. 47.
büroautomation – eine fallstudie”, Angewandte Taudes, A. and Lukanowicz, M. (1994), “Cost-benefit analysis of
Informatik, No. 10, pp. 436-45. CAD Systems – a hedonic wage approach”, The 10th ISPE/
Kaplan, R.S. and Norton, D.P. (1996), The Balanced Scorecard: IFAC International Conference on CAD/CAM, Robotics and
Translating Strategy into Action, Harvard Business Factories of the Future, CARs&FOF’94, 21-24 August 1994,
School Press, Boston, MA. Ottawa, Canada.

275
1. Introduction
Information systems
According to Willcocks (1992), evaluation may be
evaluation and the defined as “establishing by quantitative and/or
qualitative means the worth of information
information systems technology (IT) to the organisation”. The notion
development process of worth is inherently associated with definitions of
success or failure. In terms of information systems
(IS) we can distinguish between the worth of the
Paul Beynon-Davies product (the IS), and the worth of the process
Ian Owens and (the activities involved in producing the IS).
In practice, it is clearly difficult to separate the two.
Michael D. Williams The worth of the IS development process is
normally evaluated in terms of an assessment of
some features of the worth of the product.
Evaluation is critical to process organizational
The authors learning in terms of IS/IT in that it is only through
effective evaluation that an organisation may
Paul Beynon-Davies, Ian Owens, Michael D. Williams are all
based at the European Business Management School, University develop an effective knowledge based on which
of Wales Swansea, Singleton Park, Swansea, UK. successful development practice can be achieved.
Current evidence suggests that the worth of IS
Keywords (both as a product and a process) is open to
question (Brynjolfson, 1993) that evaluation is not
Information systems, Modelling, Life cycle costs
treated seriously by organisations, and
Abstract consequently that organisational learning in terms
of IS/IT is limited. For instance, Willcocks (1992)
In this paper, we consider the synergy between two areas of
finds a fall-off in evaluation at the project stages
information system (IS) literature: that concerned with the
following feasibility, little attempt to link
evaluation of IS and that concerned with explaining the
phenomenon of IS failure. On the basis of an analysis of both evaluation across the life cycle of systems and a
areas, a model is presented which attempts to integrate IS fragmented approach to learning from the
evaluation into the life cycle of IS development. The model links evaluation experience. He recommends an
the issue of failure assessment with the evaluation process and integrative approach to evaluation across the life
constitutes a strategy for stimulating organisational learning in cycle. However, there is little in the way of a
relation to IS development. The paper concludes with a coherent set of recommendations as to how this
description of our attempts to validate aspects of the model and integration is to be achieved.
plans for further empirical work in this area. The aims of the paper are as follows. First, to
review the literature on IS evaluation, particularly
Electronic access
in the light of lessons learned from the areas of IS
The Emerald Research Register for this journal is failure and organizational learning. Secondly, to
available at present a preliminary model that attempts to
www.emeraldinsight.com/researchregister integrate approaches to IS evaluation into the life
The current issue and full text archive of this journal is cycle of the development process, incorporate the
available at ideas of failure assessment into the evaluation
www.emeraldinsight.com/1741-0398.htm process, and build a number of organizational
feedback loops into the model with the aim of
promoting organizational learning. Finally,
current experience and plans for validating
elements of this model in further empirical work
are discussed.

2. Existing literature
In this section, we give a brief review of lessons
The Journal of Enterprise Information Management
learned from two areas of IS literature: that
Volume 17 · Number 4 · 2004 · pp. 276–282 concerned with the evaluation of IS and that
q Emerald Group Publishing Limited · ISSN 1741-0398 concerned with explaining the phenomenon of
DOI 10.1108/17410390410548689 IS failure.
276
Information systems evaluation and the information systems development The Journal of Enterprise Information Management
Paul Beynon-Davies, Ian Owens and Michael D. Williams Volume 17 · Number 4 · 2004 · 276–282

2.1 Lessons learned from the literature on IS themselves, the purpose being to resolve the
evaluation inconsistency between the existing norms and
According to Willcocks (1996), contemporary IS make a new set of norms realisable (Figure 1).
literature appears to be focused upon issues of There currently appears to be a less evidence of
evaluating the utility of an IS (that is to say, does organisations engaging in double-loop learning as
the information deliver key business benefit for the far as IS development practice is concerned.
organisation?). The literature tends to assume the
evaluation of two other dimensions against which 2.2 Lessons learned from the literature on IS
an IS may be evaluated, namely functionality (does failure
the IS do what is required?) and usability (is the IS IS failure and success (DeLone and McLean,
useable by its intended population?). Assessing the 1995) are clearly opposite sides of the same coin.
degree to which a system is functionally complete Having insufficient space available to discuss the
and consistent is a classic concern of the systems material on IS success here, we concentrate on the
development community. Assessing the usability issue of IS failure.
of systems has become increasingly important with A survey conducted by the US Government’s
the continuing progress and use of graphical user Accounting Agency (1985) in 1979 (ACM) found
interfaces and multimedia interfaces. that less than 3 per cent of the software that the US
Assessing the utility of IS is something which government had paid for was actually used as
most organisations conduct at the pre- delivered. More than half of the software was never
implementation stage of a project, but seldom used at all. In an international survey conducted by
subsequently. Pre-implementation evaluation is Coopers and Lybrand (1996), 60 per cent of
becoming increasingly important due to greater organisations internationally and 67 per cent of
pressure being placed on the IS function to more organisations within the UK had suffered at least
closely account in financial terms for its activities. one systems project that had failed to deliver
Hence, both practice of IS evaluation and research planned business benefits or had experienced cost
conducted in this area focuses primarily on and time overruns.
strategic evaluation (Ballantine and Stray, 1998). It is important to understand that failure is not
The extant literature provides little practical an objective concept. The definition of failure
advice on how evaluation should be integrated into depends on the position and perspective of the
the life cycle of IS development. This literature definer – it is an intersubjective concept. Hence,
appears to offer a less advice, for instance, as to Lyytinen and Hirschheim’s (1987) concept of
how proposed practices may be integrated with expectation failure is critical. Expectation failure
traditional issues of project management. We refers to the inability of an IS to meet a specific
believe that the effective integration of evaluation stakeholder group’s expectations.
with life cycle issues is likely to lead to a greater As a consequence of the definition of
adoption of evaluation approaches amongst expectation failure, the identification of
organisations. stakeholders and their likely impact on the
Although rarely explicitly stated as such, trajectory of an IS project is extremely important.
evaluation of both IS and the processes by which
they are developed are inherently associated with Figure 1 Single and double loop learning
the issues of IS success and failure (Lyytinen and
Hirschheim, 1987). However, there appears to be
a lack of material which attempts to integrate
lessons from the literature on the issue of IS failure
with lessons from the material on IS evaluation.
The limited evidence that exists suggests that
organisations appear to engage little with the issue
of IS evaluation, and appear to learn little from IS
successes and failures (Owens and Davies, 1999).
What learning does occur appears to be in the form
that Argyris and Schon (1978) refer to as single-
loop learning. In single-loop learning, individuals
respond to error by modifying strategies and
assumptions within constant organizational
norms. Such learning is directed at increasing
organizational effectiveness. In double-loop
learning, response to detected error takes the form
of a joint inquiry into the organizational norms
277
Information systems evaluation and the information systems development The Journal of Enterprise Information Management
Paul Beynon-Davies, Ian Owens and Michael D. Williams Volume 17 · Number 4 · 2004 · 276–282

IS failures signify a gap between some existing organizational learning and the avoidance of IS
situation and a desired situation for members of a failure.
particular stakeholder group. Stakeholders are any
group of people who share a pool of values that
3.1 Importance of the model
define what the desirable features of an IS are, and
This model is important for a number of reasons.
how they should be obtained.
It incorporates processes of evaluation more
The trajectory of a project is defined as the
closely into the development activities of
historical shaping of an IS both before and after
organisations. It does this by distinguishing
delivery. Frequently, the shape of an IS is
between a number of distinct types of evaluation
determined by the power play between different
and defining their rightful place within the
stakeholder groups (Ballantine and Stray, 1998;
development life cycle. The model builds upon the
Keen, 1981). It should be recognised that an IS, lessons learned from the extensive literature on IS
and an IS project, are a significant power-resource failure, particularly the fact that the participation
in organisations. Failure can occur prior to the of representatives of stakeholder groups (including
delivery of the IS. This is the notion of project end-users) is critical to all processes of evaluation.
abandonment or what Lyytinen and Hirschheim Stakeholders need to be the explicit evaluators of
(1987) refer to as development failure. Sauer’s IS products. It emphasises a number of feedback
(1993) conception of termination failure loops that encourage elements of organizational
corresponds to the idea of total abandonment of a learning and it acknowledges the fact that
project. However, projects may be substantially or development failure is in a commonplace. Failure
partially abandoned. In this case, the goals of the is not just about total abandonment of projects.
IS may be reduced or reconfigured. Failure may It is important for organisations to evaluate
also occur after an IS has been delivered to its user reasons for the substantial or partial abandonment
community. This is the idea of use failure of development projects.
(Lyytinen, 1988). Use failure normally occurs
because the end-user stakeholders feel that the
IS does not match their expectations (Kling and 3.2 Types of evaluation
Iacono, 1984). The model makes a distinction between four types
IS projects are frequently the subject of of IS evaluation activity, primarily in terms of when
escalation in decision-making. Drummond (1994) they take place in a standard linear model of the IS
defines escalation as “the predicament where life cycle. First, strategic evaluation, which is
decision-makers find themselves trapped in a sometimes referred to as pre-implementation
losing course of action as a result of previous evaluation. This type of evaluation primarily
decisions. Costs are incurred; there is an involves assessing or appraising an IS/IT
opportunity to withdraw or persist; and the investment in terms of its potential for delivering
consequences of withdrawal or persistence are benefits against estimated costs. To do this some
uncertain. Typically, the response to such preliminary idea of the functionality and likely
dilemmas is irrational persistence”. The important usability of the system needs to be established.
point about escalation is that support for an Second, formative evaluation involves assessing
IS project can continue even in the face of major the shape of an IS whilst in the development
system flaws. Major stakeholders in a project may process itself. Formative evaluation may be used to
be reluctant to withdraw support due to heavy make crucial changes to the design of an IS or to
investment in personnel and other resources make critical decisions concerning the degree of
devoted to a project (Keil, 1995; Newman and project abandonment. Although formative
Sabherwal, 1996). evaluation will primarily review issues of
functionality, this assessment will continuously be
shaped by notions of a systems usability and utility
formulated in the changing context of some
3. A model of IS evaluation organisation.
The third type of evaluation identified occurs
A model of IS evaluation closely aligned to the life after an IS has been implemented. For this reason
cycle of IS development is shown in Figure 2. This it is sometimes referred to as post-implementation
model is based on, but much extended from that evaluation. Traditional approaches to summative
proposed by Ewusi-Mensah and Przansnyski evaluation involve signing off some system against
(1995). It constitutes a preliminary attempt to its specification. More recently, there has emerged
utilise the lessons from both literature on IS failure an emphasis on usability testing. Ideally,
and IS evaluation and attempts to specify summative evaluation involves returning to the
necessary organizational processes which embody costs and benefits established in strategic
the importance of evaluation to processes of evaluation after a period of use of the IS.
278
Information systems evaluation and the information systems development The Journal of Enterprise Information Management
Paul Beynon-Davies, Ian Owens and Michael D. Williams Volume 17 · Number 4 · 2004 · 276–282

Figure 2 IS evaluation and organisational learning

Summative evaluation may also produce ideas for evaluate aspects of utility and cannot be done
new systems and/or components. Finally, we without some early notions of functionality.
identify post mortem analysis. This is a variant of Strategic evaluation is an activity that attempts
summative evaluation particularly directed at to establish the balance of predicted costs and
organisations learning from their partially or benefits in terms of an intended IS project. We have
totally abandoned projects. called it strategic evaluation because of its ideal
role in determining elements of both long-term
and short-term IS strategy. Strategic evaluation is
normally used to initiate a go/no-go decision in
4. Discussion terms of a given development project. It may also
be used to prioritise a number of IS investments.
The model (Figure 2) is an attempt to build clear The most popular techniques applied in this
formulations of distinct forms of evaluation process are return on investment and payback period.
appropriate to various parts of the IS development Such techniques are effective ways of evaluating
life cycle. In particular we distinguish between the tangible costs against tangible benefits. One of the
processes of strategic, formative and summative most popular strategic evaluation frameworks that
evaluations. Strategic evaluation is a necessary pre- include facilities for an assessment of intangible
development activity, formative evaluation is a costs and benefits is Information Economics
necessary part of the development activity itself (Parker and Benson, 1988).
and summative evaluation a necessary post-
development activity. We also include in the model
a necessary evaluation activity which, following
4.2 Formative evaluation
Ewusi-Mensah, we have chosen to call here, post-
Formative evaluation should be an inherent part of
mortem analysis, which is a variant of summative
the project management process in the sense that
evaluation. This type of evaluation is essential in
development and evaluation should be parallel
developing an understanding of the reasons for full
activities. Development projects should be
or partial abandonment of IS projects.
continually assessed against objectives and careful
attention should be paid to this activity to avoid
4.1 Strategic evaluation project escalation. Project escalation is defined as
Most organisations conduct some form of strategic the continued commitment to an IS project in the
evaluation of IS projects (Ballantine and Stray, face of continual negative information from
1998). Strategic evaluation may be conducted as formative evaluation exercises. Major stakeholders
part of strategic planning process, more usually as in an IS project may be reluctant to withdraw
part of some project selection or feasibility study. support because of heavy investment in personnel
Strategic evaluation is designed primarily to and other resources devoted to a project.
279
Information systems evaluation and the information systems development The Journal of Enterprise Information Management
Paul Beynon-Davies, Ian Owens and Michael D. Williams Volume 17 · Number 4 · 2004 · 276–282

Formative evaluation may focus on issues of under consideration should conduct this analysis.
process or that of the product. Traditional Alternatively, an external body or consultant
approaches to project management tend to should undertake it.
emphasise the formative evaluation of process Wherever possible post-mortem information
elements. The emphasis is in decomposing a should be made public. This is important in
project into a series of tasks or activities that are enabling the validation of IS development practice
evaluated against performance at regular intervals. and the effective progression of the profession of IS.
Alternative approaches to formative evaluation,
popular in such development methods such as
rapid applications development (RAD), take a 4.4 Summative evaluation
product-based focus. Here, the emphasis is in The figure also emphasises another important
defining a series of project deliverables and organizational learning feedback loop. Even if a
negotiating the so-called time-boxes (fixed project reaches completion, it may fail in some
deadlines) for the delivery of these system products sense when it comes to be delivered (what
(Stapleton, 1997). Lyytinen calls use failure).
Therefore, at some suitable time after a system
has been delivered the organisation should engage
4.3 Post-mortem analysis in a summative evaluation of the system and its
At some point in the development process a project. One framework proposed for the
decision may be made to either wholly or partially summative evaluation of IS is benefits management
abandon a project (what Lyytinen and Hirschheim (Ward, 1990). Even at this point it is possible that
call development failure). the system may be wholly or partially abandoned,
In terms of development failure (project in which case it should also be the subject of a post-
abandonment), Ewusi-Mensah and Przasnyski mortem analysis, as above.
(1995) distinguish between three types of project It is important to emphasise that no system is
abandonment. Complete termination of all ever complete. A summative evaluation is likely to
activities on a project prior to full implementation suggest a number of ways in which the system may
is referred to as total abandonment. Substantial be modified or extended – normally both classed
abandonment describes major truncation or as systems maintenance. This is the third feedback
simplification of the project to make it radically loop illustrated on the diagram. The conclusion is
different from the original specification prior to full that effective evaluation leads to effective
implementation. Finally, partial abandonment is management of maintenance.
used to describe reduction of the original scope of Kumar (1990) conducted an empirical study of
the project without entailing significant changes to the prevalence and form of evaluation of IS after
the IS original specification, prior to full they have been implemented amongst major
implementation. companies in the US. Three major results are
In each case, the organisation should engage in evident from the data he collected. The major
another form of IS evaluation called here a post- reason for performing post-implementation
mortem analysis. Collier and DeMarco (1996) evaluation amongst the companies he surveyed
equates the idea of what they call a post-mortem was the formalisation of the completion of the
review with summative evaluation. They quote one development project. Evaluation was treated as a
of Alan Davies’ 201 principles for software major tactic in a project disengagement strategy.
development: Much of the evaluation was managed and
Principle 172: Conduct a post-mortem. . .. At the performed by those who had designed the system
end of every project, give all the key project players being implemented. The most frequently
a three or four-day assignment to analyse every evaluated criteria seem to be that of information
problem that occurred during the project.
quality criteria (accuracy, timelines, adequacy and
This should attempt to determine the key reasons appropriateness) along with facilitating criteria
for such total or partial failure. The results of such such as user satisfaction and attitudes. Socio-
analysis are important in suggesting ways in which technical criteria such as the system’s impact on
the organisation may improve its development the user and the organisation were evaluated much
practice. It is for this reason that the document less frequently.
produced from such a post-mortem analysis needs Hirschheim and Smithson (1988) maintain that
to be disseminated to senior management, project although there appears to be widespread
management and members of the project team. agreement regarding the need to evaluate both
This, of course, can only be done effectively if products and processes of IS work, there is little
assurances of non-recrimination are given to all agreement as to the appropriate ways of
project participants. Ideally, a reputable senior conducting such evaluations. In one sense, the area
executive that was not involved in the project of evaluation is a very wide one, encompassing
280
Information systems evaluation and the information systems development The Journal of Enterprise Information Management
Paul Beynon-Davies, Ian Owens and Michael D. Williams Volume 17 · Number 4 · 2004 · 276–282

many processes that take place during the life of an development project, but there was little evidence
IS project, including selection, procurement and of systematic formative evaluation activity being
testing. In their analysis of the literature on post- conducted during this phase and no systematic
implementation evaluation they organise the summative evaluation was conducted after the
material on a dimension beginning at those which implementation of phase one. An informal
take a highly rational and objective stance on the assessment of the success of the IS was made at the
evaluation process and ending at those which time, primarily in terms of meeting its functional
regard evaluation as very subjective or political. specification and some vague expressions of user
They identified three approaches to evaluation. satisfaction with the system.
Those who approach evaluation in terms of A number of problems gradually emerged in the
efficiency assume that the function and goals of 2 years of use of the IS after phase one and a
evaluation are non-controversial and that the second phase of development work was initiated.
overall aim is to achieve precise measurement of One could argue that this was an example of single-
performance, efficiency or reliability. A second loop learning. However, no strategic evaluation is
approach is to look at evaluation in terms of evident for this second phase. No form of
effectiveness. This approach attempts to evaluate summative evaluation was conducted after the
the effectiveness of IS in terms of usage or utility, implementation of the second phase of the project.
costs and benefits, or some notions of increases in This study provides some evidence that
job satisfaction. The third approach looks at organisations fail to take IS evaluation seriously.
evaluation in terms of understanding. Here, the It is important to determine why this is the case.
aim is to understand the function and aims of Some of the reasons applicable to OTIS were
evaluation itself, particularly how evaluations are found to be a lack of sufficient people with the
performed within the political and social requisite expertise able to conduct effective
environment of an organisation. evaluation; pressures exerted on the IS service by
Evaluation in terms of understanding is clearly the business to get the system in quickly; and the
the perspective that lies closest to our emphasis on perceived low status of evaluation activity amongst
stakeholders and their expectations. A project both business and IT staff within OTIS.
should be continuously monitored in terms of the
degree to which it is likely to satisfy stakeholder
expectations. Also, at the completion of a project, 5. Conclusions and further work
the project needs to be evaluated in terms of what
it tells the organisation about development In this paper, we have considered some of the
processes. inherent relationships between the literature on
Ideally, the issue of evaluation should be built IS evaluation: that on IS failure and that on
into a project profile from the start. One clear way organizational learning. From such an analysis we
of doing this is to build in clear measures of success have developed a model of IS evaluation that arises
at the start of the project. This should indicate at from this work and distinguished between a
some appropriate point clear and straightforward number of distinct types of IS evaluation. We have
measurements we make to assess whether we have demonstrated a number of anchorage points for
been successful or not. lessons from the literature on IS failure and
indicated how each type of evaluation fits with the
IS development life cycle.
4.5 Empirical study of evaluation activity in Part of the reason for the low adoption rates of
real-world settings evaluation activity within organisations may be the
Compared to a vast amount of prescriptive current gap between other established IS
material published there is little empirical work on development (ISD) approaches, methods,
IS evaluation (Ward and Taylor, 1996). An early techniques and tools and the suggestions produced
attempt to validate elements of the model is by the IS evaluation community. One direction for
described in some detail in Owens and Davies further work is therefore, to consider the degree to
(1999). In this paper, an historical analysis of the which it is feasible to integrate evaluation activity
evaluation activity conducted within a large-scale with existing methods for IS planning, project
development project was undertaken. The paper management and IS development. More specific
examined the development and implementation questions and areas for further work are described
of a two-phase mission-critical IS that spanned below.
a decade of development work conducted by To what extent can we integrate our IS
OTIS PLC. evaluation model with conventional ISD methods
The conclusions of this study found that a like structured systems analysis and design method
strategic evaluation had been undertaken as part of (SSADM) or unified modelling language (UML)?
the initiation activity for phase one of the To attempt this we first aim to convert our model
281
Information systems evaluation and the information systems development The Journal of Enterprise Information Management
Paul Beynon-Davies, Ian Owens and Michael D. Williams Volume 17 · Number 4 · 2004 · 276–282

into a more generic and transportable form as Ewusi-Mensah, K. and Przansnyski, Z.H. (1995), “Learning from
discussed in Dori (1995). We would like to abandoned information system development projects”,
discover as what degree do project management Journal of Information Technology, Vol. 10, pp. 3-14.
Hirschheim, R. and Smithson, S. (1988), “A critical analysis of
methods currently acknowledge evaluation as a information systems evaluation”, in Bjorn-Anderson, N.
process and to what extent can evaluation be and Davis, G.B. (Eds), Information Systems Assessment:
melded with such approaches? Issues and Challenges, North Holland, Amsterdam,
We would also like to discover to what extent pp. 17-37.
does our model of evaluation fit with different Keil, M. (1995), “Pulling the plug: software project management
models of the development life cycle than the and the problem of project escalation”, MIS Quarterly,
Vol. 19 No. 4.
linear model utilised in this paper. It might be
Keen, P. (1981), “Information systems and organisational
argued that that the separation of evaluation from change”, Comm. ACM, Vol. 24 No. 1.
development activity is encouraged by linear Kling, R. and Iacono, S. (1984), “The control of IS developments
models of the life cycle. However, our interest is in after implementation”, Comm. ACM, Vol. 27 No. 12,
particularly examining large-scale development pp. 1218-26.
projects that while being the most likely to fail Kumar, K. (1990), “Post implementation evaluation of computer-
(Cash et al., 1992) are also the most likely to be based information systems: current practices”, CACM,
Vol. 33 No. 2, pp. 236-52.
conducted in a linear manner. However, it is Lyytinen, K. and Hirschheim, R. (1987), “Information systems
particularly important to assess the degree of failures: a survey and classification of the empirical
efficacy of applying the model in iterative literature”, Oxford Surveys in Information Technology,
approaches such as rapid application development Vol. 4, pp. 257-309.
(Stapleton, 1997), particularly where such Lyytinen, K. (1988), “The expectation failure concept and
approaches are scaled-up to address larger systems analysts view of information systems failures:
results of an exploratory study”, Information and
projects.
Management, Vol. 14, pp. 45-55.
A key question we wish to pursue in further Newman, M. and Sabherwal, R. (1996), “Determinants of
work is to what degree organisations conform to commitment to information systems development: a
our ideal-type? For actual projects, can we track longitudinal investigation”, MIS Quarterly, pp. 23-54.
the history of strategic, formative and summative Owens, I. and Davies, P.B. (1999), “The post-implementation
evaluation activities in organisations? We are evaluation of mission-critical information systems”,
European Conference of Information Systems,
currently employing the model presented in this
Copenhagen.
paper to evaluate a large IS development project at Parker, M. and Benson, R. (1988), Information Economics:
the National Assembly for Wales. Linking Business Performance to Information Technology,
Prentice-Hall, NJ.
Stapleton, J. (1997), DSDM – Dynamic Systems Development
Method: The Method in Practice, Addison-Wesley, Harlow,
References England.
Sauer, C. (1993), Why Information Systems Fail: A Case Study
Argyris, C. and Schon, D. (1978), Organisational Learning: A Approach, Henley-On-Thames, Alfred Waller.
Theory of Action Perspective, Addison-Wesley, Reading, US Government Accounting Agency (1985), “US Government
MA. Accounting Office Report, FGMSD-80-4”, ACM Sigsoft
Ballantine, J.A. and Stray, S. (1998), “A comparative analysis of Software Engineering Notes, Vol. 10 No. 5.
the evaluation of information systems and other capital Ward, J.M. (1990), “A portfolio approach to evaluating
investments: empirical evidence”, European Conference information systems investments and setting priorities”,
on Information Systems, Aix-en-Provence. Journal of Information Technology, pp. 122-31.
Brynjolfson, E. (1993), “The productivity paradox of information Ward, J. and Taylor, P. (1996), “Evaluation and realisation of IS/IT
technology”, Comm. ACM, Vol. 36 No. 12, pp. 67-77. benefits: an empirical study of current practice”, European
Cash, J.I., Mcfarlan, F.W. and McKeney, J.L. (1992), Corporate Journal of Information Systems, Vol. 4 No. 1, pp. 214-25.
Information Systems Management, Richard D. Irwin, Willcocks, L. (1992), “Evaluating information technology
Homewood, IL. investments: research findings and reappraisal”,
Collier, B. and DeMarco, T. (1996), “A defined process for project Information Systems Journal, Vol. 1 No. 2.
post-mortem review”, IEEE Software, pp. 65-72. Willcocks, L. (Ed.) (1996), Investing in Information Systems:
Coopers and Lybrand (1996), Managing Information and Evaluation and Management, Chapman & Hall, London.
Systems Risks: Results of an International Survey of Large
Organisations, Technical Report.
DeLone, W.H. and McLean, E.R. (1995), “Information systems
success: the quest for the dependent variable”, Further reading
Information Systems Research, Vol. 3 No. 1, pp. 60-95.
Dori, D. (1995), “Object-process analysis: maintaining the Ewusi-Mensah, K. (1991), “On information systems project
balance between system structure and behaviour”, abandonment: an exploratory study of organisational
Journal of Logic and Computation, Vol. 5 No. 2, pp. 227-49. practices”, MIS Quarterly, Vol. 15 No. 1, pp. 67-85.
Drummond, H. (1994), “Escalation in organisational decision- Hirschheim, R. and Newman, M. (1988), “Information systems
making: a case of recruiting an incompetent employee”, and user resistance: theory and practice”, Computer
Journal of Behavioural Decision-Making, Vol. 7, pp. 43-55. Journal, Vol. 31 No. 5, pp. 398-408.

282
Introduction
Narratives in ERP
The purpose of evaluating enterprise resource
systems evaluation planning (ERP) systems, or any other form or type
of information systems (IS), ought to be to improve
Jonas Hedman and their selection, development, implementation and
usage. In this paper, narratives are proposed as a
Andreas Borell means of improving ERP systems, i.e. the systems’
life cycles. This paper explores the potential of
narratives and proposes their use in ERP systems
evaluation. The contribution of narratives is that
they can convey meanings, interpretations, and
knowledge (learning) of the system, which can be
The authors
used for further action. Interest in ERP systems
Jonas Hedman is based at the Department of Informatics, evaluation stems from the new problems and
School of Economics and Management, Lund University, challenges they are posing as regards to IS
Sweden.
evaluation (Stefanou, 2001). ERP systems affect all
Andreas Borell is at Tetra Pak Global Information Management,
Sweden.
aspects of a business, including organizational
structure, activities and processes, and the
Keywords environment (Davenport, 2000; Hedman and
Kalling, 2002; Hong and Kim, 2002).
Narratives, Information systems,
Independently of ERP systems, IS evaluation is
Manufacturing resource planning
a problematic (Irani and Love, 2001) and complex
Abstract process (Jones and Hughes, 2001), which becomes
more and more difficult with the increased
The purpose of evaluating enterprise resource planning (ERP)
complexity of the IS (Farbey et al., 1995).
systems ought to be to improve the systems’ life cycles. In this
paper, narratives are proposed as a means of improving ERP
Furthermore, there is growing concern amongst
systems as a complement to traditional evaluation methods. academics and practitioners that IS do not deliver
The potential of narratives is that they can convey meanings, business value (Irani and Love, 2001; Kennerley
interpretations, and knowledge of the system, which may lead to and Neely, 2001; Murphy and Simon, 2002a;
action. Even though narratives belong to an interpretive research Poston and Grabski, 2001). Thus, the overall
tradition, this paper takes a pragmatic view of evaluation on the research question is: “Can narratives be used as
basis of three assumptions about evaluation: evaluations should means of improving ERP systems evaluation?”
form the basis for action; narratives can make evaluation more This paper builds on research gleaned from
relevant; and evaluations should be made with the purpose of
interpretive research in IS, e.g. Klein and Meyer
improving selection, implementation and use of the system. The
conclusion reached is that narratives can advance evaluation (1999) and Walsham (1993, 1995, 1999), on post-
practice by providing a richer evaluation picture which conveys modern institutional theory (Meyer and Rowan,
meanings not included in traditional evaluations, and improve 1977), and on narratives in accounting (Llewellyn,
the use of ERP systems by changing users’ mental maps. 1998), knowledge management (Snowden, 2002;
Swap et al., 2001), and requirements engineering
Electronic access (Jark et al., 1998). The interpretive research and
post-modern institutional theory are primarily used
The Emerald Research Register for this journal is
available at as theoretical grounds for the use and relevance of
www.emeraldinsight.com/researchregister narratives, whereas the latter is used as a source of
practical and methodological inspiration.
The current issue and full text archive of this journal is The approach to evaluate ERP implementation
available at in this paper is pragmatic: once a particular system
www.emeraldinsight.com/1741-0398.htm
has been selected, the focus should be on
continuously improving the benefits received. This
pragmatic approach is based on three assumptions
about evaluation in this context. First, evaluations
should form the basis for action: do not measure if
you cannot act upon the measurement. Secondly,
evaluations should in practice be carried out with
the goal of improving selection, development,
The Journal of Enterprise Information Management
Volume 17 · Number 4 · 2004 · pp. 283–290 implementation, and use of the system. Thirdly,
q Emerald Group Publishing Limited · ISSN 1741-0398 narratives can grasp the complexity of ERP
DOI 10.1108/17410390410548698 systems better than traditional evaluation
283
Narratives in ERP systems evaluation The Journal of Enterprise Information Management
Jonas Hedman and Andreas Borell Volume 17 · Number 4 · 2004 · 283–290

approaches, e.g. return on investment. Thus, the contributed to any significant positive financial
aim of this paper is not to try to improve the benefits.
understanding of the evaluation process as such, Existing ERP systems research has mainly
which is common in interpretive research addressed issues such as implementation (Markus
(Walsham, 1993), but to provide input regarding and Tanis, 2000; Ross and Vitale, 2000), critical
how we can conceptually advance IS evaluation in success factors (Hong and Kim, 2002; Nah et al.,
general, and ERP system evaluation in particular 2001), business impact (Francalanci, 2001; Hitt
(March and Smith, 1995). et al., 2002; Kennerley and Neely, 2001; Poston
The paper is organised as follows. The next and Grabski, 2001), implementation failures
section addresses and discusses ERP systems, (Scott and Vessey, 2000), and requirements
evaluation, and the role of measurement. specification (Borell and Hedman, 2001; Rolland
Following this, the theory of action and learning is and Prakash, 2000). Despite the impact and
described, which is the theoretical ground for organizational importance of ERP systems, ERP
improvement-driven evaluation. Narratives and systems evaluation is a neglected research area
the use of narratives in evaluations, which should (Stefanou, 2001). The are a few exceptions,
be interpreted as the means for action, are then namely; Stefanou (2001) who proposes an ex ante
explored and discussed. The paper ends with a evaluation framework for ERP systems evaluation,
discussion and conclusion regarding the practical Murphy and Simon (2002a), who examine an
implications for ERP systems evaluation. attempt to incorporate intangibles into traditional
cost-benefit analysis in an ERP project, and Borell
and Hedman (2001) who suggest the use of
interpretative evaluation approaches.
Evaluation and measurements
ERP systems and ERP systems evaluation General IS evaluation: current state and
ERP systems have had, and will continue to have, issues
an enormous impact on businesses around the Remenyi and Sherwood-Smith (1999) described
world (Davenport, 2000). For instance, Nestlé two practical issues in IS evaluation. The first is
invested US $500 million on an ERP system. known as the evaluation gap. This occurs when the
Initially, the American subsidiary started on the evaluators distance themselves from the project
project in 1997, then spent over US $200 million and lose sight of the business objectives. For
and will complete by 2003. In 2000, the global instance, when the implementation project is
parent decided to invest an additional US $200 evaluated rather than the business impact of the
million, plus US $80 million in consulting and IS, the focus is on the means, not the ends.
maintenance for a global solution (Worthen, 2002). The second issue is that the business objectives of
According to Nestlé’s CIO, the savings made by the the IS project, e.g. organizational change and
system have so far reached US $325 million for the change management, are often forgotten or
American subsidiary. This type of global considered only superficially during evaluations. In
investment will affect the entire organisation – its addition, evaluations may have many purposes,
culture and structure, business processes, e.g. control projects, governing change
strategies, and financial position (Davenport, management, communication, improvements,
1998). The economic rationale for this type of resource allocation, motivation, and long-term
investment is that organisations believe that there is planning (Sinclair and Zairi, 1995). Another issue
more value in buying ERP systems than other IS. in evaluations is when to evaluate – ex ante or ex
There are other reasons for selecting a particular post. This dichotomy is less important today, since
system, including institutional pressure and there is an increased awareness of the importance
individual aspirations (Nilsson, 1991). of an ongoing evaluation process (Remenyi, 1999).
While it is reasonably easy to evaluate tangible The academic view of the purpose of IS evaluation
implementation costs, e.g. software licences, is to assess and improve the design and use of IS
hardware, consultancy, and training, other costs (Remenyi and Sherwood-Smith, 1999). However,
like productivity dip and resistance to change are Kumar (1990) found that, in practice, the purpose
much more difficult to measure (Murphy and of IS evaluation was often to close the project, with
Simon, 2002b). It is uncertain whether ERP the emphasis on ROI. The focus on project closure
systems contribute to any improvement. For and ROI has been confirmed by Seddon et al.’s
instance, Kennerley and Neely’s (2001) 2-year (2002) study on evaluation practice in Europe and
study of an SAP R/3 implementation at four plants North America. Hirschheim and Smithson (1988)
in Europe by a multinational corporation showed argue that this is partly because of the widespread
operational benefits by users, but the corporation belief that IS are fundamentally technical systems.
was still doubtful whether the system had Consequently, this has led to “a more ‘technical’
284
Narratives in ERP systems evaluation The Journal of Enterprise Information Management
Jonas Hedman and Andreas Borell Volume 17 · Number 4 · 2004 · 283–290

interpretation of evaluation” (Hirschheim and the implementation of systems on the 8th level
Smithson, 1998, p. 402) focusing on tools and (business transformation), “. . .benefits stem from
techniques and thereby omitting the social the transformation as a whole. IS provides only one
domain. This makes it unlikely to produce a “true” component of what is often a complex series of
or meaningful evaluation picture (Hirschheim and changes. It is not possible to attribute a portion of
Smithson, 1998). the benefits gained to any one factor” (Farbey et al.,
1995, p. 49).
The art of measurements and measuring We argue that, in the taxonomy of Farbey et al.
We argue that the deeper meaning of evaluation is (1995) ERP systems have the potential impact of
“to do better next time” – i.e. evaluation has to be the 8th level and thus, the potential benefits and
followed by action. At the same time, evaluation accumulated uncertainty of all the strata below.
requires the use of measurements (Venkatraman Therefore, it is highly unlikely that any two
and Ramanujam, 1986), but “figures never are implementations will have identical requirements
facts” (Hoebeke, 1990). So, while Strassmann or consequences, even if they are based on the same
(1985) stresses that: “You cannot measure what is generic software packages. While the potential
not defined. You also cannot tell whether you have benefits might be articulated, it makes the actual
improved something if you have not measured its benefits of implementing an ERP system hard to
performance”, it is important to remember that define, predict, and measure. Furthermore, ERP
numbers do not always tell the whole truth. Thus, system implementations are only limited in time in
there is a need for an operational definition of a the most abstract sense and governed by other
measurement. But, as measurements are organizational activities – project plans, budget
invariably used in socially complex processes years, top management changes and organizational
wherein translations as well as interpretations take strategic decisions. Implementing an ERP system is
place, the concept of relevance, as Hoebeke (1990) deeply interconnected with organizational change,
points out, is a lot more important than objectivity. and, for the lifetime of the system, it remains a large
In addition, there has to be a shared understanding part of the organisation’s formalised internal
of the intentions, and their impacts, by those who framework. Evaluation in this context should be
play a role in the process of collecting, translating performed continuously, combined with process
and interpreting the measurements, as well as reviews and organizational development which
those who act on decisions based on the said aims to obtain the desired alignment and fit over
measurements. These activities are iterated, as can time. To get the most out of a large organisation, the
be seen in Figure 1. results of evolution have to be evaluated and new
There have been many attempts to stratify or requirements are formulated in an iterative process.
classify IS measurements and evaluations. For The key to getting the most out of any IS lies in its
instance, Farbey et al. (1995) proposed a model use; use in this perspective is regarded in the
that related specifically to evaluation based on the broadest sense, including other use, misuse, abuse
idea of a fit between organizational change and the and non-use of the system by humans and
IS. The model consists of eight levels; mandatory connected IS. To achieve the intended use of the
changes, automation, direct value systems, MIS system in the organizational context, organizational
and DSS, infrastructure, inter-organizational goals and beliefs have to be communicated to the
systems, strategic systems, and business members of the organisation.
transformation. The classification is not rigid, but
still implies that, while higher levels of change
increase the potential benefits, they also increase Theory of action and learning
the uncertainty of the outcome. Potential benefits
and levels of uncertainty are cumulative. Systems However, human actions are not always what they
classified on a certain level may have all the seem to be. Argyris and Schön (1974) suggest that
accumulated benefits and uncertainty from any or people act in accordance with their mental maps
all of the previous levels. They conclude that, for rather than the theories they espouse. People are not

Figure 1 Chain of activities taking place in organizational sense-making

285
Narratives in ERP systems evaluation The Journal of Enterprise Information Management
Jonas Hedman and Andreas Borell Volume 17 · Number 4 · 2004 · 283–290

aware of the mental maps or theories they use (1) the discovery of espoused theory and theory-
(Argyris, 1980). One could say that there is a split in-use;
between theory and action. Argyris and Schön (2) the invention of new meanings;
(1974) suggest that two theories of action are (3) the production of new actions; and
involved. “When someone is asked how he would (4) the generalization of results.
behave under certain circumstances, the answer he
Double loop learning involves applying each of
usually gives is his espoused theory of action for that
these steps to itself. In double loop learning,
situation. This is the theory of action to which he
assumptions underlying current views are
gives allegiance, and which, on request, he
questioned and hypotheses regarding behaviour are
communicates to others. However, the theory that
tested publicly. The result of double loop learning
actually governs action is theory-in-use” (Argyris
should be the increased effectiveness of action and
and Schön, 1974, p. 6-7, our italics). As humans
the improved acceptance of failures and mistakes.
invariably think and express themselves using the
full depth of language – by telling “stories” – it is
therefore conceivable that, unless external
observations “verify” the stories, the stories told Narratives
will not reflect theory-in-use but espoused theory.
Argyris (1980) makes the case that effectiveness Narratives are used to persuade, convince, and
results from developing congruence between make people act and behave in certain ways. The
theory-in-use and espoused theory. Reflection is a key alternative to narratives for reasoning, learning,
tool for revealing the theory-in-use and exploring and persuading is to use numbers and calculations,
the gulf between espoused theory and theory-in-use, including financial statements, investment
or in bringing the latter to the surface. Provided calculations and time reports (Llewellyn, 1998).
the two remain connected, the gap will create a Clausen (1994, p. 45) states that: “Using
dynamic for reflection and dialogue (Figure 2). narratives in the system development process
A model of the processes involved is required in seems to be a way in which designers will be able to
order to fully appreciate theory-in-use. Argyris and come up with the kind of descriptions that are
Schön (1974) initially looked at three elements: asked for.” Besides everyday life narratives that are
governing variables, action strategies and used by all people, a theoretical ground for
consequences. Argyris (1976) proposed the double narratives can be found in institutional theory.
loop learning theory, which concerns the changing Meyer and Rowan (1977) suggest that
of underlying values and assumptions, i.e. “rationalised myths” contribute to the
learning, (Figure 3). The focus of the theory is on understanding of organisations. Narratives or
solving problems which are complex and poorly stories conveying myths are powerful tools that
structured and which change as problem-solving make the irrational rational (Llewellyn, 1998).
advances. Typically, interaction with others is Narratives are common in accounting,
necessary to identify the conflict. management, human computer interaction (HCI),
There are four basic steps in the action theory knowledge management, strategic management,
learning process: and software engineering. Llewellyn (1998)
discusses how narratives are best understood,
Figure 2 Espoused theory and theory-in-use constructed, and used in accounting and
management research. In HCI, research narratives
are used to improve communication between
end-users and developers in the design of user
interfaces, task modelling and prototyping, and in
supporting the specification of user interfaces
(Bødker, 2000). The role of narratives as the
conveyers of tacit knowledge is explored in
knowledge management (Swap et al., 2001).
Figure 3 Double loop and single loop learning
In strategic management, scenarios are used to
explore future alternatives wherein scenarios are
“tools” in the “strategist’s arsenal” (Porter, 1985,
p. 481). Software engineering, on the other hand,
uses narratives and scenarios to gather and validate
requirements (Antón and Potts, 1998; Jarke et al.,
1998). It should be noted that there are different
underlying philosophical reasons for using
narratives. Bødker (2000), Clausen (1994) and
Llewellyn (1998) represent an interpretive
286
Narratives in ERP systems evaluation The Journal of Enterprise Information Management
Jonas Hedman and Andreas Borell Volume 17 · Number 4 · 2004 · 283–290

research tradition, whereas Antón and Potts best-suited measurement vehicle for making
(1998), Jarke et al. (1998) and Porter (1985) works continuous improvements to both subject and
can be classified as belonging to a more positivistic evaluation process. In fact, narratives might be
research tradition. the only way to capture invaluable input regarding
Narratives have also emerged as an alternative a project of the size and complexity of an ERP
approach within IS research. Hirschheim and implementation.
Newman (1991) use the concept of myth to
interpret social processes during IS projects.
Clausen (1994) develops a model for how IS Discussion
designers can use narratives to make descriptions
of IS that people understand; traditional methods This paper suggests the use of narratives in ERP
such as structured languages and formal systems evaluation by building on research gleaned
specifications. Brown (1998) examines the use of from interpretive IS research, post-modern
narratives to explain and create meaning in power institutional theory, and the use of narratives in
struggles within IS implementations. Dubé and reference disciplines. Narratives belong to the
Robey (1999) analyse the stories of competing interpretative research traditions and are used to
groups in IS development projects as symbols of reason, teach, and persuade (Llewellyn, 1998).
organizational values or myths to gain insights into Organisations use myths and narratives to make
the interpretation of management styles. Alvarez sense of equivocal situations. They are also used as
and Urla (2002) describe the use of narratives in precedents for future actions, serving as
ERP system requirements specification. Finally, “blueprints” for desirable behaviour (Alvarez and
Urla, 2002). The following section discusses the
Alvarez (2002) examines the role of myths in
practical implications of the proposed use of
constructing an ERP system as an integrated
narratives in ERP systems evaluation and some
system and in elaborating the existing
research issues.
organizational values.
The actual implications for practice might not
Narratives regarding ERP implementation
be so great, since narratives are used in business to
projects can be written before, during and after a
convey meanings and to persuade people to act.
project. Participants in the project, or external
The use of narratives as an approach to measuring
auditors, can write narratives, making it clear that
and evaluating ERP systems might involve
one crucial component of using narratives in
paradigm shifts in the existing control system, as
evaluation is the means of keeping track of meta-
well as how to evaluate IS. Changes to the existing
information about narratives, including their
norms, behaviours, and procedures are difficult
perceived interdependencies. (Weick, 1996). Resistance to change is likely to
Narratives written prior to a project would emerge. This is a rational behaviour for those who
typically be used to express requirements, as well are affected by change, not a dysfunctional one
as to build and control expectation and support. (Markus, 1983). The formalisation of narratives
Narratives from this phase form the basis for might also create new positions, e.g. that of chief
decisions and action, and assume the role of storyteller. The storyteller might become the new
defining the strategic objectives, vision and power position. Narratives are powerful tales that
mission of a project. During an implementation can be manipulated by different stakeholders,
project, narratives are used to express the project e.g. managers, project leaders, and storytellers.
status, the need for further improvements, and The process of changing the organizational
refinement of scope, as well as to track the culture so that it accepts narratives will be a
decisions made. During the end phase of an ERP challenging process for most organizations and
implementation project (if there is such a thing), business managers. Besides changing the culture,
narratives are used to persuade and justify; the there is also a need to develop support tools,
outcome of the project and the “defining of the e.g. storyboards, and procedures to create, store,
next steps” are often expressed in narratives, which and disseminate stories (Snowden, 2002; Swap
should then form the basis for future actions and et al., 2001). There is a need for a lot of stories
learning. Before, during and after a project, there is along the system’s life cycle, with different
thus a need to record, analyse, classify and, not purposes. Based on Markus and Tanis’s (2000)
least, create narratives that are used to describe the “Enterprise Systems Experience Cycle”, it is
perceptions of a project’s current and future state. possible to outline four types of stories during
Narratives can carry a lot of information and, the life cycle.
when handled with care, they can be used to (1) Chartering stories are aimed at selecting and
achieve procedural results and process funding an enterprise system. These stories
improvements at the same time. Used for can convey the myths of the system, e.g. the
evaluation purposes, they are perhaps the myths of integration (Alvarez, 2002), which
287
Narratives in ERP systems evaluation The Journal of Enterprise Information Management
Jonas Hedman and Andreas Borell Volume 17 · Number 4 · 2004 · 283–290

can be used to promote a certain system or the which can represent a suitable approach when
opposite. Stories about the benefits of ERP there is a high degree of uncertainty and
systems can promote the idea. Furthermore, equivocality (Daft and Lengel, 1986; Daft et al.,
stories can be used to obtain the commitment 1987). Other stories might reveal institutionalised
of top management. work practices, system inefficiencies, and how
(2) Project stories are aimed at supporting the users manage these inefficiencies, and they might
configuration and implementation of the also be used to convince consultants or managers
system. During this phase, the initial training as regards to necessary changes to the system,
takes place. Thus, it is important to obtain the where narratives can be used as tools for making
acceptance of and commitment to the system the irrational rational.
within the organisation to decrease user
resistance and transfer knowledge. Swap et al.
(2001) described the role of mentors (super Conclusion
users) and stories in knowledge transfer.
Furthermore, these stories should have two A number of researchers have proposed
target groups. One group is the consultants, interpretive approaches to IS evaluation (Borell
who actually carry out the development and and Hedman, 2001; Hirschheim and Smithson,
implementation. The other group is the users, 1988; Walsham, 1993). Hirschheim and Smithson
who require different types of stories. User (1988) suggest that interpretative approaches are a
stories should include and convey the meaning way of gaining a deeper understanding of the
and role of the system by addressing questions process itself. Symons (1991) supports this by
such as what problems we are solving, why we suggesting that evaluation means understanding
selected this solution, how the system works the different perspectives of individuals, while
and what role the user plays in this. Walsham (1993, p. 179) states “interpretive
(3) Shakedown stories are crucial, since these are evaluation designs focus on learning and
at the beginning of use and often associated understanding.” However, no one has yet explicitly
with productivity dips, which can be overcome mentioned narratives as an interpretive evaluation
through extensive training. The aim of these approach. Neither has “doing better next time”
stories is to overcome problems and issues (which would be a typical process improvement)
associated with learning and using a new been replaced by “doing better all the time”.
technology. Continuously learning about the possibilities and
(4) Onward and upward stories are aimed at difficulties is, we believe, the key to successfully
obtaining payback by improving the use. These understanding an ERP before and during
stories will continue to grow and be installation, and its use after installation.
disseminated until the enterprise system has Narratives appear to be well suited as tools for
been replaced by a different system. Stories are furthering the understanding of, as well as the
probably even used in the replacement of ERP support for, system implementation projects.
systems, e.g. all the Y2K horror stories used in Nevertheless, there are research implications
the replacement of legacy systems by ERP and opportunities in acknowledging narratives as
systems. One example of a story used during an evaluation approach to ERP and IS. The
the shakedown and onward and upward phases implication is that narratives should not only be
is provided by Austin et al. (2001): used as an input into research, which is the
traditional input in case research, they should also
Elizabeth Benson. . . turned quickly to her desktop be used as a research output. Quantitative data can
computer. She had just received word of fire in a
also form the bases of narratives. For instance,
manufacturing plant belonging to a key vendor. . ..
Fast action was needed. . .. Three hours after she instead of stating the correlation between x and y
had. . . processed information from Procurement, in statistical terms, this can be expressed in words.
Engineering, Inventory Management, Finance, The consequence of using narratives as a research
and Manufacturing. Without the high levels of output is that researchers have to be able to
integration and standardization offered by Tristen’s interpret and evaluate stories in the same way as
new information systems, days or weeks would any other research output.
have passed before they could act. . .
Thus, we conclude that ERP systems evaluation
This story might inspire other users of ERP is highly contextual, and that measurements of the
systems, within the organisation or within other impact are interchangeable with the measurements
organisations, to investigate the possibilities of of general improvements. For such measurements
ERP systems and ultimately change their mental to be relevant, they will have to be used over a long
models, possibly leading to the improved use of period of time, and measurements would have to be
ERP systems. Narrative is a communication initiated before the implementation is started
medium with a high degree of media richness, (Hoebeke, 1990), e.g. during the requirements
288
Narratives in ERP systems evaluation The Journal of Enterprise Information Management
Jonas Hedman and Andreas Borell Volume 17 · Number 4 · 2004 · 283–290

specification phase. Returning to the quote by Davenport, T.H. (2000), Mission Critical: Realizing the Promise of
Strassmann (1985), we argue that we need to Enterprise Systems, Harvard Business School Press,
measure the impact of ERP systems using the same Boston, MA.
Dubé, L. and Robey, D. (1999), “Software stories: three cultural
measurements employed in a specific organisation
perspectives on the organizational practices of software
prior to implementation, and that any changes development”, Accounting, Management and Information
recorded will be attributable to a combination of IS Technologies, Vol. 9 No. 4.
implementation, organizational changes and Farbey, B., Land, F.F. and Targett, D. (1995), “A taxonomy of
changes in the method of measurement. Thus, the information systems applications: the benefits of
measuring or quantifying of isolated impacts evaluation ladder”, European Journal of Information
by ERP systems implementation is close to Systems, Vol. 4 No. 1, pp. 41-50.
Francalanci, C. (2001), “Predicting the implementation effort of
impossible. Instead of trying to measure the
ERP projects: empirical evidence on SAP/R3”, Journal of
impossible, we propose the use of narratives as Information Technology, Vol. 16 No. 1, pp. 33-48.
the means of disseminating knowledge, which Hedman, J. and Kalling, T. (2002), IT and Business Models:
ought to lead to improvements and enhanced Concepts and Theories, Liber and Abstrakt, Malmö,
action during the implementation and usage of Sweden.
enterprise systems. Hirschheim, R.A. and Newman, M. (1991), “Symbolism and
information systems development: myth, metaphor and
magic”, Information Systems Research, Vol. 2 No. 1,
pp. 29-62.
References Hirschheim, R.A. and Smithson, S. (1988), “A critical analysis of
information systems evaluation”, in Bjørn-Andersen, N.
and Davis, G.B. (Eds), Information Systems Assessment:
Alvarez, R. (2002), “The myth of integration: a case study of an
ERP implementation”, in Hossain, L., Patrick, J. and Issues and Challenges, pp. 17-37.
Rashid, M. (Eds), Enterprise Resource Planning: Global Hirschheim, R.A. and Smithson, S. (1998), “Evaluation of
Opportunities and Challenges, Idea Group Publishing, information systems: a critical assessment”, in Willcocks,
Hershey, PA, pp. 17-42. L. and Lester, S. (Eds), Beyond the IT Productivity Paradox,
Alvarez, R. and Urla, J. (2002), “Tell me a good story: using pp. 381-409.
narrative analysis to examine information requirements Hitt, L.M., Wu, D.J. and Zhou, X. (2002), “Investment in
interviews during an ERP implementation”, The DATA enterprise resource planning: business impact and
BASE for Advances in Information Systems, Vol. 33 No. 1, productivity measures”, Journal of Management
pp. 38-52. Information Systems, Vol. 19 No. 1, pp. 71-98.
Antón, A. and Potts, C. (1998), “A representational framework Hoebeke, L. (1990), “Measuring in organisations”, Journal of
for scenarios of systems use”, Requirements Engineering, Applied Systems Analysis, Vol. 17, pp. 115-22.
Vol. 3 Nos 3/4, pp. 219-41. Hong, K.K. and Kim, Y.G. (2002), “The critical success factors for
Argyris, C. (1976), Increasing Leadership Effectiveness, Wiley, ERP implementation: an organizational fit perspective”,
New York, NY. Information and Management, Vol. 40 No. 1, pp. 25-40.
Argyris, C. (1980), Inner Contradictions of Rigorous Research, Irani, Z. and Love, P.E.D. (2001), “Information systems
Academic Press, New York, NY. evaluation: past, present and future”, European Journal of
Argyris, C. and Schön, D. (1974), Theory in Practice: Increased Information Systems, Vol. 10, pp. 183-8.
Professional Effectiveness, Jossey-Bass, San Francisco, CA. Jarke, M., Bui, X. and Caroll, J. (1998), “Scenario management:
Austin, R.D., Cotteleer, M.J. and Escalle, C.X. (2001), Enterprise an interdisciplinary approach”, Requirements Engineering,
Resource Planning: Technology Note, Harvard College, Vol. 3 Nos 3/4, pp. 154-73.
Boston, MA. Jones, S. and Hughes, J. (2001), “Understanding IS evaluation as
Bødker, S. (2000), “Scenarios in user-centered design: setting the a complex social process: a case study of a UK local
stage for reflection and action”, Interaction with authority”, European Journal of Information Systems,
Computers, Vol. 13 No. 1, pp. 61-76. Vol. 10 No. 4, p. 189.
Borell, A. and Hedman, J. (2001), Artefact Evaluation of ES Kennerley, M. and Neely, A. (2001), “Enterprise resource
Impact on Organizational Effectiveness, Americas planning: analysing the impact”, Integrated
Conference on Information Systems, Boston, MA. Manufacturing Systems, Vol. 12 No. 2, pp. 103-13.
Brown, A. (1998), “Narrative, politics and legitimacy in an IT Klein, H.K. and Meyer, M. (1999), “A set of principles for
implementation”, Journal of Management Studies, Vol. 35 conducting and evaluating interpretive field studies in
No. 1, pp. 35-59. information systems”, MIS Quarterly, Vol. 23 No. 1,
Clausen, H. (1994), “Designing computer systems from a human pp. 67-94.
perspective: the use of narratives”, Scandinavian Journal Kumar, K. (1990), “Post-implementation evaluation of computer
of Information Systems, Vol. 6 No. 2, pp. 37-44. based information systems (CBIS): current practices”,
Daft, R.L. and Lengel, R.H. (1986), “Organizational information Communications of the ACM, Vol. 33 No. 2, pp. 203-12.
requirements, media richness and structural design”, Llewellyn, S. (1998), “Narratives in accounting and management
Management Science, Vol. 32 No. 5, pp. 554-71. research”, Accounting, Auditing and Accountability
Daft, R.L., Lengel, R.H. and Trevino, L.K. (1987), “Message Journal, Vol. 12 No. 2, pp. 220-36.
equivocality, media selection, and manager performance: March, S. and Smith, G.F. (1995), “Design and natural science
implications for information systems”, MIS Quarterly, research on information technology”, Decision Support
Vol. 11 No. 3, pp. 355-66. Systems, Vol. 15 No. 4, pp. 251-66.
Davenport, T.H. (1998), “Putting the enterprise into the Markus, M.L. (1983), “Power, politics, and MIS
enterprise system”, Harvard Business Review, Vol. 76 implementation”, Communications of the ACM, Vol. 26,
No. 4, pp. 121-31. pp. 430-44.
289
Narratives in ERP systems evaluation The Journal of Enterprise Information Management
Jonas Hedman and Andreas Borell Volume 17 · Number 4 · 2004 · 283–290

Markus, M.L. and Tanis, C. (2000), “The enterprise systems Scott, J.E. and Vessey, I. (2000), “Implementing enterprise
experience-from adoption to success”, in Zmud, R.W. resource planning systems: the role of learning from
(Ed.), Framing the Domains of IT Management: Projecting failure”, Information Systems Frontiers, Vol. 2 No. 2,
the Future. . .. Through the Past, Pinnaflex Educational pp. 213-32.
Resources, Inc., Cincinnati, OH, pp. 173-207. Seddon, P.B., Graeser, V. and Willcocks, L.P. (2002), “Measuring
Meyer, J.W. and Rowan, B. (1977), “Institutionalized organizational IS effectiveness: an overview and update of
organizations: formal structure as myth and ceremony”, senior management perspectives”, The DATA BASE for
American Journal of Sociology, Vol. 82 No. 2, pp. 340-63. Advances in Information Systems, Vol. 33 No. 2, pp. 11-27.
Murphy, K.E. and Simon, S.J. (2002a), “Intangible benefits Sinclair, D. and Zairi, M. (1995), “Performance measurement as
valuation in ERP projects”, Information Systems Journal, an obstacle to TQM”, The TQM Magazine, Vol. 7 No. 2,
Vol. 12 No. 4, pp. 301-20. pp. 42-5.
Murphy, K.E. and Simon, S.J. (2002b), “Using cost benefit Snowden, D. (2002), “Complex acts of knowing: paradox and
analysis for enterprise resource planning project descriptive self-awareness”, Journal of Knowledge
evaluation: a case for including intangibles”, in Hossain, Management, Vol. 6 No. 2.
L., Patrick, J.D. and Rashid, M.A. (Eds), Enterprise Resource Stefanou, C.J. (2001), “A framework for the ex-ante evaluation
Planning: Global Opportunities and Challenges, Idea of ERP software”, European Journal of Information
Group Publishing, Hershey, PA, pp. 245-66. Systems, Vol. 10 No. 4, pp. 204-15.
Nah, F.F-H., Lau, J.L-S. and Kuang, J. (2001), “Critical factors for Strassmann, P.A. (1985), Information Payoff: The Transformation
successful implementation of enterprise systems”, of Work in the Electronic Age, Free Press, New York, NY.
Business Process Management Journal, Vol. 7 No. 3,
Swap, W., Leomard, D., Shields, M. and Abrams, L. (2001),
pp. 285-96.
“Using mentoring and storytelling to transfer knowledge
Nilsson, A.G. (1991), “Anskaffning av standardsystem för att
in the workplace”, Journal of Management Information
utveckla verksamheter: utveckling och prövning av SIV-
Systems, Vol. 18 No. 1, pp. 95-114.
metoden”, Ekonomiska forskningsinstitutet vid
Symons, V.J. (1991), “A review of information systems
Handelshögskolan i Stockholm: Stockholm.
evaluation: content, context and process”, European
Porter, M.E. (1985), Competitive Advantage: Creating and
Sustaining Superior Performance, Free Press, New York, Journal of Information Systems, Vol. 1 No. 3, pp. 205-12.
NY. Venkatraman, N. and Ramanujam, V. (1986), “Measurement of
Poston, R. and Grabski, S. (2001), “Financial impacts of business performance in strategy research: a comparison
enterprise resource planning implementations”, of approaches”, Academy of Management Review, Vol. 11
International Journal of Accounting Information Systems, No. 4, pp. 801-14.
Vol. 2, pp. 271-94. Walsham, G. (1993), Interpreting Information Systems in
Remenyi, D. (1999), Stop IT Project Failure Through Risk Organisations, Wiley, Chichester.
Management, Butterworth Heinemann, Boston, MA. Walsham, G. (1995), “The emergence of interpretivism in IS
Remenyi, D. and Sherwood-Smith, M. (1999), “Maximise research”, Information Systems Research, Vol. 6 No. 4,
information systems value by continuous participative pp. 376-94.
evaluation”, Logistics Information Management, Vol. 12 Walsham, G. (1999), “Interpretive evaluation design for
No. 1, pp. 14-31. information systems”, in Willcocks, L. and Lester, S. (Eds),
Rolland, C. and Prakash, N. (2000), “Bridging the gap between Beyond the IT Productivity Paradox, Wiley, Chichester.
organisational needs and ERP functionality”, Weick, K.E. (1996), “Drop your tools: an allegory for
Requirements Engineering, Vol. 5 No. 3, pp. 180-93. organizational studies”, Administrative Science Quarterly,
Ross, J.W. and Vitale, M.R. (2000), “The ERP revolution, Vol. 41 No. 2, pp. 301-31.
surviving vs thriving”, Information Systems Frontiers, Worthen, B. (2002), “Nestlé’s ERP Odyssey”, CIO, available at:
Vol. 2 No. 2, pp. 233-41. www.cio.com/research/erp/

290
1. Introduction
Other papers
Why should the use of information systems (IS)
Online point-of-click and technology appear to so many as a challenging
Web usability mining and stressful part of life? Interactive software and
systems should be a lot easier for users to use and
with PopEval (C-Assure less problematic for organisations to integrate into
their transformed processes for competitive
Co-design methodology) advantage. Figure 1 is a model of emerging
applications of interactive online systems and
Atta Badii services. It illustrates how for global optimisation
of online services management, as distinct from
shifting bottlenecks, new standards and tools are
needed, e.g. using online evaluation and profiling
tools such as PopEval as deployed here for
dynamic usability evaluation. In any service
scenario we need to find out what makes users tick/
click. For this, we need to understand what, if
The author
anything, could suppress the memory of some
Atta Badii is based at Intelligent Media Systems and Services aversive experiences and contribute to some
Research Group, Informatics Research Centre, University of non-aversive ones becoming more dominant and
Reading, Massachusetts, USA. persistent in the user’s memory and thus, in the
collective memory of a user group. Saliency and
Keywords
recency effects in human memory and differential
Online operation, User interfaces, User satisfaction foregrounding influences in memory re-call have
been the subjects of research in cognitive
Abstract psychology (Ahlawat, 1999; Lange-Kuettner and
Earlier research has shown that human judgements, particularly Martin, 1999; Mahrer and Miles, 1999). Thus,
retrospective as distinct from real-time evaluations of painful various correlations have been observed and
experiences, are fundamentally flawed when superseded by theories established on the effect of sequential order
other experiences. Describes a methodology for the evaluation of (recency-primacy), or stimulus novelty and
user experiences, assisted by a user-centered co-design tool for significance (saliency), in memory recall as the
planning, creating and conducting wide-ranging usability data delay between exposure and test increases.
acquisition throughout the system life cycle from inception to
Similarly, the research on the psychology of human
replacement. The results from the tests in this study were found
to support the findings from recent cognitive psychology
J/DM-PPR has investigated the effects of any
research on J/DM-PPR theoretic biasing effects. The importance sequential order and/or duration sensitivities on
of the findings for software systems, and for interactive Web site human real-time or retrospective judgements of
development, is that if the interactive features which tax the serial experiences, which caused a sequence of
user’s patience and cognitive capability are not severely aversive and/or non-aversive affects. Thus, the
restraining, then users will be left with a better impression of the central motivation in our work here has been to
usability of the system than would be the case otherwise. devise a tool to facilitate the study of the root
causes of, and the routes to, the aggregated
Electronic access perceptions of system usability by users, over time;
The Emerald Research Register for this journal is i.e. users’ current salient impression (SI) of
available at (dis)satisfaction, at any point in the usability
www.emeraldinsight.com/researchregister relationship timeline Tn.
The current issue and full text archive of this journal is
available at
www.emeraldinsight.com/1741-0398.htm
2. Dynamic usability evaluation;
theoretical foundations
Most reasonable people prefer any experience in
life to be as painless, and as fruitful as possible, be
it using a piece of software or having a surgical
The Journal of Enterprise Information Management
operation (Kahneman and Fredrickson, 1993a).
Volume 17 · Number 4 · 2004 · pp. 291–300 The primary objective of an interactive system is to
q Emerald Group Publishing Limited · ISSN 1741-0398 allow the user to achieve particular goals in the
DOI 10.1108/17410390410548706 application domain, i.e. the interactive system
291
Online point-of-click Web usability with PopEval The Journal of Enterprise Information Management
Atta Badii Volume 17 · Number 4 · 2004 · 291–300

Figure 1 Online service management architecture

must be usable (Dix et al., 1993). Usability is sufficiently, richly defined to cope with the
defined as follows. increasingly volatile click-happy user environment
(1) Classic usability. A system is usable if it that pertains to WMS, for example, in online
incorporates learnability, flexibilty and shopping. It is important for manufacturers, users,
robustness (Dix, 1993c). online services, and, change/churn managers to
(2) Dynamic Usability (Badii, 1999) added three have a facility for developing a high perceived
new criteria to the above classic definition of usability or comfort factor (PCF) for interactive
usability, as follows. systems. Several approaches to evaluation exist as
.
High Mutual Man-Machine Intelligibility addressed by researchers (Draper et al., 1996).
and Scanability (M*IS). Our primary focus here is online user-led
.
Mutually Productive Balance of Power, evaluations as distinct from following traditional
Privacy and Patterns-of-Relating (MP*oR) HCI guidelines on general usability do’s and
between the man and machine personas, as dont’s, divorced from the situated context. These
transactors HCI heuristics, which have remained unchanged
.
High Sustainability of both M*IS and for at least the past 25 years, assess the extent to
MP*oR i.e. SMP*. which a system incorporates classically expected
This dynamic usability expands on the classic interaction features which are considered by HCI
definition to provide a view of instantaneous or experts to be user-friendly in general, e.g. Direct
transient usability, which is necessary in dynamic Manipulation (Shneiderman, 1982), and WIMP
process-centred analysis. It aids formulation and interface (Dix et al., 1993). Contextually sensitive
testing of spatio-temporal-causal models of usability, usability evaluation is, on the other hand, what
for it is more expressive of the complex psycho- characterises our approach here. Ideally we would
socio-technical dynamics of situated usability. expect both smart (i.e. re-adaptive) interactive
Further, the SMP* criterion allows it to explain the systems and smart organisations running smart
effects of such J/DM-PPR theoretic saliency- projects to remain contextually aware with some
recency, on instantaneous versus steady-state or capability for reflexive reasoning and re-learning.
quiescent usability. Thus, this dynamic usability is Users can share some common attributes and
292
Online point-of-click Web usability with PopEval The Journal of Enterprise Information Management
Atta Badii Volume 17 · Number 4 · 2004 · 291–300

expectations as well as have attitudinal, mindset (Kahneman et al., 1993b). The findings from this
and cultural idiosyncrasies, which require piece of research were that a person’s memories of
contextually sensitive usability evaluation on a painful episodes are in fact imperfect and
quantitative, qualitative and interpretivist basis. susceptible to bias. Similar effects can be found in
A prerequisite for global mass usability research concerning judgements about painful
improvement must be to ensure the existence of episodes (Algom and Lubel, 1994v; Corli et al.,
contextually richly defined data from a large 1986; Varey and Kahneman, 1992). Here the
enough user base to help mass-personalisation of above studies attempted to establish whether some
new technology development and the attendant peak-and-end evaluation bias as well as duration
change management involved in its successful neglect bias, occur in the memories of patients who
adoption. So, in this research, we have studied the have been through a painful medical procedure.
results from J/DM-PPR, as sub-fields of cognitive This indeed proved to be the case; the patients’
science to see what judgement theoretic insights, memories of a medical procedure were affected by
regarding human bias in evaluations are applicable the most painful part of the procedure, as well as
to the contextually sensitive usability evaluation of how painful the last 3 min of the procedure were.
interactive systems. As indicated earlier, human For example, take the following discomfort ratings
decision-making is in fact subject to many biases 2-5-8-4, which indicate sequential periods in
(Kahneman et al., 1982) but the influence of such minutes of aversive experiences ending with a
biases have to date remained largely unexplored discomfort rating of four. Patients judged their
within the HCI community. Thus, so far human exposure to this series of discomfort as much less
J/DM-PPR biases have not been formally explored of an uncomfortable experience than was the case
in relation to the study of interactive software with the series 2-5-8, although the duration of their
systems evaluation. The study of pleasure and pain exposure to discomfort in the 2-5-8 series was
recall (PPR) has also been researched from a J/DM shorter overall. The significant fact here is that
perspective. The three most relevant pieces of subjects underestimated the duration of certain
research here have looked into the effect of real- experiences and the effect of a more aversive
time evaluations of affective episodes compared ending in a scenario made it just seem worse. This
with their retrospective evaluations (Kahneman result indicates that the evaluation of an aversive
et al., 1993a, b; Redelmeier et al., 1996). Also episode could be improved by adding a period of
explored are the effects of “duration neglect” in diminishing discomfort to the end of the
retrospective evaluations of affective episodes. experience; whereby more pain is perceived as less!
Significant insights exist on how time influences In fact, Redelmeier et al. (1996) proved that the
our thoughts about affective experiences (Coombs above influences still held when the subjects were
and Avrunin, 1977; Hsee, 1990/91; Johnson and given a direct choice of more pain over less;
unknowingly preferring an actually more painful,
Sherman, 1990). The basic finding of Kahneman’s
but differently choreographed treatment scenario
research, as reported in two experiments, was that
– thus, confirming human PPR biases.
a person’s global evaluation of an affective
experience is subject to the phenomenon of
“duration neglect”. His two experiments involved
32 subjects each, who were asked to watch a 3. J/DM-PPR in co-design, the hypotheses
selection of film clips that varied in length,
intensity and aversiveness. The results showed that The important research question for HCI and
retrospective evaluations made from memory usability as targeted here is:
seemed to underestimate the duration of an Can human J/DM-PPR bias effects be successfully
aversive experience – in this case, an unpleasant exploited for more meaningful usability evaluations
video clip. This would seem irrational as most in various task and cultural contexts in
reasonable people would prefer to experience organisations as well as in the attendant change
shorter aversive experiences rather than a longer management life cycle?
one, but the results argue that the length To investigate such research questions initially a
sometimes does not matter. variety of instruments and protocols were
The importance of this result is that human considered. These involved paper-based surveys,
memory may not keep a comprehensive time based video recording of task series, tape-recorded
“film” of events, but instead “photographs” or interviews as well as designing and integrating the
snapshots, which represent experiences by the PopEval online usability evaluation tool. Such a
selected salient points. Patients’ memories of tool was to provide a facility for periodic or event-
painful medical treatments were investigated by triggered online usability self-reports/mining,
analysis of real-time and retrospective running concurrently with the interactive system
evaluations of two minimally invasive procedures such as the Web site that was being subjected to
293
Online point-of-click Web usability with PopEval The Journal of Enterprise Information Management
Atta Badii Volume 17 · Number 4 · 2004 · 291–300

usability evaluation. Following some initial theoretic global evaluations of a user’s affective
experiments with run-time interviews/walk- experiences over the transaction interval
throughs and paper-based surveys, it was (i.e. inclusive of natural biases over the scenario of
concluded that these traditional HCI approaches user’s various exposures to the system; one or a
to capturing usability data, did indeed introduce series of service scenarios). Thus, H1 states that if
more constraints and distortions, as they were H0 were to hold, then this would imply the validity
more disruptive, more costly and less easily of the above dynamic usability process model.
manageable and certainly in no way as socially H2. If H0 were to hold, and, a tool such as
scalable as using an online evaluation tool. Under PopEval could perform online usability
the above survey type protocols, subjects evaluations, this should provide more
registered a higher annoyance factor as they felt reliable usability-critical data intelligence,
repeatedly forced into a major focus switch between more cost-effectively and more scalably than
the screen and a piece of paper on the desk, or the manual paper-based methods, without
interviewer; they found this too disruptive. Thus, causing significant user disruption and/or
to study the hypotheses as stated below, it was annoyance. (i.e. without the process
decided to use PopEval as an unobtrusive online suffering the consequences of J/DM-PPR
evaluation tool to keep tracking events, and/or distortions and the problems of the
elapsed time, in attempting a least disruptive disruptive usability survey methods).
capture of the most usability-critical data in near
real-time when it was likely to be most reliably In this work, we fully expected our usability
remembered and articulated. This research aimed to evaluations to provide finer-grain usability data
test the following hypotheses: that was remedially prescriptive and effectively
H0. This stated that J/DM-PPR bias effects as actionable; captured with human distortions/
proven in other domains are also applicable nuisance minimised; allowing the exploitation of
to the usability evaluations of interactive natural J/DM-PPR theoretic biases in evolutionary
software and in particular, to dynamic systems co-design. The potential savings in the
usability evaluation of Web Mediated dynamic maintenance of higher usability online
Systems. services and churn management motivated the
deployment of PopEval. This is crucial particularly
H1. This states that the above dynamic usability in highly volatile markets such as mobile telecom
theory lends itself to a more readily and online media services but also generally in
computable analysis of transitional usability, technology acceptance by organisations as well as
which can exploit the J/DM-PPR saliency- in marketing of services and their uptake across
recency type effects being investigated in diverse cultures.
this research. Thus, we postulate a dynamic
usability process model, which can be stated
as: 4. Methodology
UeT n / ðMP* oRÞT ðn21Þ
Two mutually supportive methodologies
h i
constitute the paradigmatic basis to this research.
/ F ðPCFÞT 0 ; . . .; ðPCFÞT ðn21Þ
Here, we first outline the methodological elements
h i of the C-Assure user-centred co-design framework
F ðPCFÞT 0 ; . . .; ðPCFÞT ðn21Þ that inspired our research into the design of online
evaluation tools and J/DM-PPR. Next, we describe
h i
/ F ðSIÞT 0 ; . . .; ðSIÞT ðn21Þ our methodology in investigating the usability of
PopEval and the applicability of JD/M-PPR biases
This states that usability as evaluated at any time to usability evaluation, i.e. in testing the
(Tn) i.e. UeTn is a function F of the mutual hypotheses H0-H2.
man-machine patterns-of-relating, i.e. (MP*oR) The C-Assure framework adopts a multilayered,
as established at the previous instant T(n2 1); this in component-based approach to IS design,
turn depends on the value of the user’s PCF as a development, diffusion and change management
global (aggregated) evaluation over the interval (Badii, 1999, 2000; Badii and Rolfe, 1996; Badii
[T0, T(n2 1)] and that such PCF is itself a function et al., 2000). It aims to integrate a toolkit of
of the salient impression (SI) formed by the methodologies for minimising IS failure risks using
user about the system over the same period smart project planning (re-adaptive, contingent
(i.e. from the beginning to the previous instant). methods). C-Assure specifies a number of
The non-monotonic function F as applied here to infrastructural psychosocio-technical layers as
both SI and PCF denotes the non-linear essential components for an IS planning,
relationship that modulates the J/DM-PPR development and diffusion support environment
294
Online point-of-click Web usability with PopEval The Journal of Enterprise Information Management
Atta Badii Volume 17 · Number 4 · 2004 · 291–300

(IPDSE). These layers are to help provide high promoting user-centred co-design of systems
transparency of alternative design and (Badii, 2000; Badii and Rolfe, 1996).
development choices and their rationale; making C-Assure views the psychosocio-technical
choices readily revisitable by all stakeholders acceptance and thus, sustainable adoption of such
(Badii, 1999; Hounat and Badii, 1996). This is to a meta-system as depending critically on two
provide a capability for both short- and long-pan properties:
organizational memory recall and re-learning from (1) the level of sustainable system
IS intervention choices and outcomes. Thus, such accommodation of the target user’s important
an IPDSE platform requires layers for contingent and deeply valued needs afforded by the new
(re)planning, latencies/epochs modelling and IS through its design features.
benign control to help achieve culturally (2) the expected level of the adaptation potential
comfortable IS-mediated enterprise of a target user group – reachable without
transformations. For example, the IPDSE must them suffering perceived intolerable cultural
offer reliable semiotics analysis and process/ stress/distress (user’s reachabilities).
cultural-match audit tools to enable the Thus, the ideal IS would aim to reduce the level of
interpretation and appropriate response to any IS man-machine P*oR imbalance or cultural/process
change-push, a market-led “IS Persona”, mismatch by attempting to strike realisable and
compatible with the explicit or implicit change- affordable co-design trade-offs for the whole
pull from users towards their own future user-led situated meta-system. Accordingly, the IPDSE
“Group Persona” or collective wish for process/ should provide cost-effective access to meta-
cultural change (Badii, 1999). This is predicated models, tools, repositories, ontologies and
on the expectation that IS development should business/process logics to support mass
promote user ownership, actability, re-negotiation of stakeholder needs; not confining
empowerment, mutually beneficial balances of user involvement to “focus groups” only. This
power and co-operative patterns-of-relating within will significantly aid a sense of ownership born of
the system (man, machine, process) as a whole co-operative sense making and widely shared
(Badii, 1998; Badii and Rolfe, 1996). understandings in co-design, and thus, more likely,
In this way C-Assure supports the a higher PCF and cross-cultural interoperability of
organizational strivings for such ideals as the resulting system.
emancipation from unproductive processes and Naturally, C-Assure relies on an ontological
patterns of power towards constructive and framework to serve contingent co-design method
profitable P*oR. However, C-Assure extends this deployment in dynamic situated contexts. This
support also to man-machine or user-system requires a pattern language representation of
relationship management (Badii and Rolfe, 1996). suitable system development methods and their
sub-methods, triggers and effects; referred to as a
Accordingly within this framework, the mutuality
Co-Design methodologies framework (Badii,
assumption is that both types of transactors, the
2000). C-Assure demands that the “meta-system”
IS, and the user, should offer, and expect to
undertakes only smart projects capable of exploiting
receive, co-operative patterns-of-relating, and
the above layers whilst executing sets of
discourse modalities to support constructive
conditional co-design plan segments supported by
dialogue in user-centred co-design (Badii, 1999).
a framework for just-in-time, least-committed and
Each transactor (i.e. user or system) should
anticipatory usability knowledge exchange. This
attempt to offer some of the preferred comfort would allow functions such as usability mining,
modalities of the other transactor impact/risks modelling, serendipity management,
(i.e. accommodations), whilst expecting some degradation tracking and anticipation. IS
reciprocal effort by the other transactor to reach interventions, managed as smart projects, need to
out to cope with such comfort modalities which, in foresee and manage the effects, side-effects and affects
this way, emerge as realisable by it within system/ that follow each design choice that they make
user’s resource/cognitive constraints i.e. within throughout their life cycle; from inception through
their reachabilities (Badii, 1999, 2000). post-deployment maintenance. Such smart
The distinctive mindset here is the insistence on projects need these capabilities for failure
man-machine mutuality of intelligibility and pre-emption/recovery and time-critical risks/
scanability (accessibility, transparency) to allow resources balancing.
meaningful dynamic assessment of usability, Clearly the required knowledge basis for a
strategic-fit, process-fit, power balance, privacy/ C-Assure smart project framework would include
identity/self-disclosure rights, and benefits, for all design patterns and their contingent selection rules
stakeholder relationships within the entire (e.g. situated contraindications, confluences,
organisational setting – viewed as a meta-system triggers and consequences, etc). Another
295
Online point-of-click Web usability with PopEval The Journal of Enterprise Information Management
Atta Badii Volume 17 · Number 4 · 2004 · 291–300

infrastructural layer would perform a situated of an interpretivist-iterative basis for mass-


semiotics appraisal and the modelling of consultation, exploration and analysis of competing
comfortable cultural transformation trajectories IS design routes and their situated impact. This will
for workgroups. The support environment also be greatly aided by the integration of the IPDSE
includes a model of requirement elicitation tools with a business process re-engineering simulation
and their applicability criteria including a library of platform. Such an integrated system will aid
elicitation scripts to support the dynamic enquiry efficient and dynamic projection of IS development
process. Negotiation of users’ current needs is thus paths using a managed mix of development models
facilitated by the elicitation of a consensus and methods. Such a framework for visualisation
specification of collective and personal and renegotiation can be used to aid cost-effective
compromises about system features. The matchmaking and failure avoidance/recovery in IS-
justification roots for the above compromise sets, mediated change management. This approach
version (sub)spaces, and the routes whereby such would be particularly recommended in first-mover
versions were arrived at can be made transparent innovation management, as in IS-mediated
and readily re-examinable by using a framework enterprise transformations for efficient integrated
such as the multimedia requirements engineering electronic and mobile commerce (e/m-commerce).
assistant, MMREA (Hounat and Badii, 1996).
Accordingly, C-Assure is deployed to achieve the
best current trade-off between realisable system 5. Experimental procedure
accommodations of users’ chief needs, and user-led
To investigate the hypotheses (H0-H2), a
relaxations of selected constraints through
methodology of simulation and testing was
compromises on secondary user benefits (semantic-
conducted through an empirically grounded study
cooperative negotiations and discoveries). In this way
involving multi-modal and multimedia usability
systems rethinking in C-Assure is fundamentally
data capture and triangulation of results. This used
based on providing the infrastructural layers to
PopEval (Badii, 2000) in the context of both Web
support an ongoing psychosocio-technical multi-
and non-Web application domains in parallel
logue and maximising the transparency of the
usability experiments as follows: the Web site
information relevant to user-centred co-design applications comprised 15 major online interactive
(the roots and routes to current specification); as in shopping sites and the non-Web application was a
boundary sensitised information relationship typical interactive desktop publishing tool
management for mutual benefit, i.e. BSIRM_MB (MS PowerPoint). The two tasks, desktop
(Badii and Rolfe, 1996). publishing and online shopping were chosen
This approach is thus, strongly wedded to because they constituted a reasonable and
maintaining socio-technically inclusivist and manageable set of challenges familiar to most users
dynamic information accessibility patterns within irrespective of their level of everyday exposure to
and across sub-cultural groups. Full transparency computing.
of the justification hierarchies for IS co-design A stratified random sample of 127 participants,
trade-offs and intervention choices is a prerequisite including both computer/Internet savvies, and,
for this. The transparent balancing of affordable naive users of both genders covering the age
system accommodations with expected user’s groups 20-70, were recruited. All 127 users filled
reachabilities helps C-Assure achieve and sustain two separate questionnaires each. One set of pre-
usability and cultural/process matchmaking. Over experiment questionnaires allowed us to plan the
time this allows the organisation to update the conduct of the experiment and the balancing of the
repositories in the Co-Design methodologies mix of users for each experiment through prior
framework, to allow learning from experience i.e. to knowledge of each user’s background and their
know what type of IS-mediated change would prove level of experience with computing in general and
socially/culturally scalable and comfortable for a with online Internet shopping in particular.
particular sector or sub-group. In this way, user-led Accordingly, we ensured that a wide variety of
cultural/process migration wishes can first be made goods, for example, music, books, clothing, and
explicit, using the online negotiation tool, and then food, were available from the Web sites chosen for
such wishes can be aided by consensual IS the experiment; to include the type of items each
interventions that are in tune with the user user would be most interested in buying online.
environment and respect the limits of users’ cultural The second set of questionnaires, supplemented
elasticity and their goals. Implicitly the C-Assure by a video-recorded interview, post-experiment,
research focus is to support dynamic user-centred were to provide an additional instrument for
co-design through (nested) spiral models of system discovering users’ experiences during their
development led by dynamic (online) assessment of respective sessions doing online shopping or using
fit. This is best achievable through the routinisation the desktop publishing software. This was done so
296
Online point-of-click Web usability with PopEval The Journal of Enterprise Information Management
Atta Badii Volume 17 · Number 4 · 2004 · 291–300

as to provide triangulation with the results from element or pause each frame at any stage along the
the automated online usability evaluations carried session as their 30 min split screen video played
out by PopEval. Of the 127 subjects, 62 took part out. Thus, throughout this nested-video interview
in usability evaluation experiments using the the earlier video recording of the sessions was
Web sites and 65 participated in usability being used as a reminder in seeking to elicit specific
experiments for MS PowerPoint. The 62 users situated evaluations given user’s affects/salient
participating in the online shopping experiment impressions arising from user’s latest experience
had a wide choice of Web sites, including their with the Web sites services. The primary video
preferred retailer sites, all preset in the browser as recording round resulted after 22 h of video
favourites. This allowed the users to be just a click recordings; reduced to 11 h after split screen
away from leaving or resuming their interaction compilation. The subsequent 22 nested video
with any online shopping Web site whilst recording sessions generated a further 19 h of
attempting to spend their nominal budget. Of this secondary video recordings. Thus, the resulting
group 22 were video recorded using various online total of 41 h of video recorded data together with
shopping sites with a time limit of 30 min each and its audio track of user verbalisations constituted a
another limit of £100 nominal budget to spend. very rich data source lending itself, as it did, to
Whichever limit to be reached first terminated situated interpretations by means of conversation
their online shopping after which they filled their analysis, gesture analysis, transaction analysis, and
post-experiment questionnaire followed by a attitude analysis. Additionally the transcriptions of
video-recorded interview. At the start of all video the audiotapes were subjected to extensive
recording sessions, the users had been encouraged, discourse analysis. Another 40 users carried out a
but not forced, to think aloud about, i.e. verbalise, similar online shopping exercise under the same
their intentions, actions and experiences, pleasant protocols of 30 min time limit and £100 nominal
or otherwise; all the video-taping sessions were budget limit, except that here instead of the video
separately audio-taped for transcription purposes. recording, PopEval was being used to record data
As an experiment, the online shopping sessions from each user regarding their intentions, actions
did not involve actual payment procedures as once and experiences.
a user had completed the task of selecting and The remaining 65 users completed a desktop
inserting an item into their shopping basket and publishing task using MS PowerPoint with
the item was deemed to have been purchased PopEval running in the background so as to
and its price was deducted from the user’s budget. provide automated usability elicitation and
An indication of how much money and shopping evaluation. These users had experience of using
time was left to be spent by each user was made various types of software on the same PC platform
available on a separate monitor, located close by, as used in the experiment (Windows 98/NT
to enable each user to check their own progress at a systems). In this way the users would have the
glance whenever they wished. These 22 online necessary basic experience of the computing
shopping sessions were video recorded in dual environment and sufficient familiarity with the
channels, using two cameras for each session; operating system. The only other requirement was
thereby recording both user’s face, down to their that those taking part in this phase of the
shoulders, as well as their monitor screen experiment had not used earlier the software
simultaneously throughout each session. package, MS PowerPoint, which was to be
Subsequent video processing yielded a evaluated, i.e. they were novices as far as MS
synchronised split screen video recording showing, PowerPoint was concerned.
on one screen, both user’s facial expression and Each user’s workstation was located in an
their utterances, on left half of the screen, with the informal setting so that they would be as relaxed as
current Web page and the user’s mouse possible. Again to ensure that there was an
movements over it appearing on the right half of appropriate context, as a “productivity baseline”
the screen – from the first click to the last. for the exercise, to help relate user’s perception of
After each user’s online shopping session, personal progress and goal-driven focus, they were
following a simple distractor task, the users were all supplied with an instruction sheet explaining
invited to take part in what we termed NVUs: what actions they were expected to attempt to
i.e. “nested video usability data capture sessions”. perform using the MS PowerPoint during the
These entailed each user taking part in a video- 30 min session; together with a guide sheet on the
recorded interview whilst watching the above split use of MS PowerPoint. The PopEval tool then
screen video recording of their own earlier 30 min asked the subjects to enter their pre-allocated
session, thus re-living their experiences by talking userID, gender and age. They were then told to
through their feelings about system usability whilst launch MS PowerPoint and to attempt the tasks
being able to point at each click and each screen outlined on the instruction sheet requiring them to
297
Online point-of-click Web usability with PopEval The Journal of Enterprise Information Management
Atta Badii Volume 17 · Number 4 · 2004 · 291–300

perform a set of typical desktop publishing actions its process model as postulated in this work. The
with increasing degrees of challenge; using the MS second set of results concerned the validity of H2
PowerPoint Package to the full. Prior to the session i.e. the performance of the PopEval prototype,
the PopEval experiment editor had been used to which was judged satisfactory as will be described
plan, edit and set-up a questionnaire file for the later. Specifically, the results from the tests in this
PopEval to run during the experiment. The users study were found to support the findings from
had been informed that they would be invited by recent cognitive psychology research on J/DM-
PopEval to make their feelings of (dis)comfort with PPR theoretic biasing effects including “duration
the experiment known by selecting a value on a neglect” bias and the “peak-and-end evaluation”
scale, in the PopEval window, at certain points bias. Here too, our results showed that the global
during the exercise, if they wished. For this evaluation was not linearly dependent on (e.g. was
experiment at a set interval of 6 min the subjects not a statistical mean or a median of) the real-time
were asked for their optional evaluations using the evaluations as might have been suspected. Some
following request: “Please select a value on the kind of non-monotonic “judgement process” was
scale below to indicate your level of comfort/ having an effect on the global (aggregated)
satisfaction and type a word or a phrase to give any evaluations given by our users, just as had been
reasons”. The Likert scale that appeared below predicted in the studies by J/DM-PPR researchers,
this request, in the PopEval window, displayed the as detailed earlier. The results also showed only a
following anchor labels: left anchor label: marginal difference between the last real-time
“Content”, right anchor label: “Unhappy” and it evaluation and the global evaluation, again
was thus possible for users to indicate their level of confirming the expected influence of this
(dis)satisfaction along the scales. User’s selection particular recency or “end-effect” type of human
of a position along this interval scale was also recall bias. Thus, our results confirmed the validity
supported by an animation of increasingly happier of J/DM-PPR bias theories in user’s perception of
or unhappier faces and colour changes in system usability; i.e. both dynamic theory
sympathy with user’s movement of the cursor hypotheses H0 and H1 were proven.
along this “thermometer scale” up or down from As for H2, the results of the annoyance ratings
one extreme to another (using direct sensing/ for PopEval amongst this mixed user group of 127
manipulation modes). The users could thus easily were very similar ranging from two to three within
indicate how they felt about any given usability a 0-10 interval scale. This indicated that our
aspect being probed in the respective questions. PopEval evaluation tool itself did not cause a
Immediately after the attempt of last set tasks, the significant distortion effect, unlike paper-based
users were asked to close down MS PowerPoint and interview surveys that were found to do so.
and leave the computer system. A distracter task Thus, this supported the H2 hypothesis.
was then used to take the users’ minds off the Regarding MS PowerPoint (the software being
experiment. Thereafter, all the users were evaluated) the worst ratings were all given in the
provided with two requests for retrospective first 6 min of the experiment. This could be taken
evaluations to be made by them with reference to to suggest that for the users in this study MS
appropriate interval scales as follows. PowerPoint tended to appear relatively difficult
(1) “Please give your overall (global) evaluation of initially, but once they had got past the first few
the time you have spent as a participant in this steps they found it relatively less problematic to
experiment, indicate the level along the scale explore and use in order to perform their tasks.
as appropriate, the leftmost rating counts as Alternatively it could be said that all users tend to
pleasant and the rightmost as unpleasant”. find the steep start-off period of (re) familiarising
(2) “Please give your overall opinion of the themselves with an interactive software system, say
PopEval tool where 0 stands as not annoying the first 10 min, a relatively more challenging
and 10 as very annoying”. period.
This last scale was used to obtain users’ assessment The PopEval experiments produced a wealth of
of the annoyance ratings for PopEval. other results regarding purchase-specific triggers
in the Web space, as did the NVU protocol.
A notable example, however, of how the online
shopping experiments supported the hypotheses
6. Results and conclusions was the frequent observation that once a shopper
had happily located a desirable item then they
The results of this research came in three forms. tended to be relatively less affected by the minor
The first type of results related to H0 and H1, difficulties in locating the shopping basket and
i.e. the J/DM-PPR biasing effects and thus, the completing the purchase. For example, finding a
validity of the new dynamic usability definition and much desired item such as the latest sportswear
298
Online point-of-click Web usability with PopEval The Journal of Enterprise Information Management
Atta Badii Volume 17 · Number 4 · 2004 · 291–300

affected a user’s “salient impression” so positively about the more specific causes of user
that even a subsequently arduous search to (dis)satisfaction in the evolving user-system
eventually locate a “not-so-well-designed relationships. This can cost-effectively inform the
shopping basket” was tolerated well, provided that collaborative usability choreography (co-design) of
they were able to effect “the purchase” in the end affordable service features for the highest possible
i.e. drop the item in the basket. The search to perceived usability and process-fit for given user
locate the shopping basket each time became less groups – to the mutual satisfaction and benefit of
uncomfortable than the intervening difficulties in all stakeholders.
finding a desired item; so was relatively forgotten/ The “peak-and-end evaluation” and “duration
forgiven particularly as it was superseded by a neglect” are the two most significant insights to
satisfactory closure, i.e. finding the desired item have immediate exploitation potential in software
and completing its purchase by dropping it in the engineering and in particular, in the design of Web
shopping basket. The results of this study offer Systems and Services such as Virtual Shopping
immediately available insights applicable to Malls, etc.
usability research, and indeed to other domains as Online self-report and evaluation tools such as
well such as business process re-engineering, PopEval as a component of a user-centred
eCRM/churn and change management. Co-design methodology such as C-Assure, can be
The importance of the above findings for run from an evaluation server for asynchronous,
software systems, and in particular, for interactive online mass-consultation supporting the design of
Web site development, is that if the interactive dynamically personalised user-intimate systems.
features which tax the user’s patience and cognitive This facilitates iterative renegotiation of all
capability are not severely restraining and the task stakeholder needs whilst minimising nuisance and
closures, particularly, are “reasonably smooth”, bias. It will ensure efficient and effective
then users will be left with a better impression of attainment of high usability, user-intimate systems
the usability of the system than would be the case which remain aware of dynamically usability-
otherwise. As for the optimisation of user-centred critical features to be accommodated over given
Co-design, the results enable significant insights to (sectorial) service scenario for given classes of
be gained about how to assess where and what users or individuals. This is to serve the new era of
design trade-offs most matter to users (i.e. spot the ubiquitous user-intimate intelligent media systems
dynamically more memorable system affordances and services that is now looming on the horizon.
over the service scenario). They also provide
insights about the circumstances whereby users
would be happier to forego certain system References
capabilities (i.e. spot the dynamically less
memorable system affordances over the service Ahlawat (1999), “Order effects and memory for evidence in
scenario) provided certain other more deeply individual versus group decision making in auditing”,
Journal of Behaviour and Decision Making.
valued or well-placed system capabilities can be Badii (1998), “Information relationship symmetry management
available. for success in outsourcing”, Proceedings of Americas
In short dynamic usability evaluation can be Conference on Information Systems Annual Conference,
exploited to satisfy users more cost-effectively by AMCIS98, August 1998, Baltimore.
identifying those interactive features that matter Badii (1999), “A framework for cultural accommodation with
most within evolving sector-specific service sensitised systems for usability relationships evaluation
(C-Assure)”, UKAIS Midlands Research Seminar Series,
scenarios and those features about which users can
De Montfort University, October 1999; abstract in
become more forgiving thus making them Summary Proceedings of UKAIS (Midlands), UKAIS
relatively less usability-critical. Newsletter, June 2000.
The most valuable insight is however that the Badii (2000), “Dynamic Usability Mining with PopEval and the
issues that are the key determinants of user C-Assure Methodology”, EnCKompass Internal Report
(dis)satisfaction, and thus, productivity, are indeed 2000-MM2, EETDT, December 2000.
Badii and Rolfe (1996), “Boundary sensitised information
dynamic in nature. That is, in the highly dynamic
relationship management”, Proceedings of the 1st United
open-world of ubiquitous accessibility such as Kingdom Academy of Information Systems Annual
www, usability evaluation based on traditional Conference, UKAIS’96, April 1996, Cranfield University,
static HCI guidelines can be powerfully supported Cranfield.
with dynamic usability models to allow a more Badii et al. (2000), “Online usability evaluation and content
meaningful evaluation of user experiences and the management for mass-personalisation in e-everything”,
Proceedings of the 5th United Kingdom Academy of
current status of the evolving stakeholder usability
Information Systems Annual Conference, UKAIS 2000,
relationships. In this way dynamic usability theory April 2000, Cardiff University, Cardiff.
will help integrate results from the established Dix et al. (1993), Human-Computer Interaction, Prentice-Hall,
psychosocio-technical models to allow inferences Englewood Cliffs, NJ.
299
Online point-of-click Web usability with PopEval The Journal of Enterprise Information Management
Atta Badii Volume 17 · Number 4 · 2004 · 291–300

Draper et al. (1996), “Integrative evaluation: an emerging role Mahrer and Miles (1999), “Memorial and strategic determinants
for classroom studies of CAL”, Journal of Computers and of tactile recency”, J. of Exp. Psych., May 1999.
Education, Vol. 26, pp. 1-3. Redelmeier et al. (1996), “Patients’ memories of painful medical
Hounat and Badii (1996), “Multimedia requirement elicitation treatments: real-time and retrospective evaluations of two
assistant (MMREA)”, Proceedings of the 1st International minimally invasive procedures”, Journal of Pain, Vol. 1
Conference on Knowledge Transfer, KT’96, July 1996, No. 66, pp. 3-8.
London University, London. Shneiderman (1982), “The future of interactive systems and
Kahneman et al. (1982), Judgement Under Uncertainty: emergence of direct manipulation”, Journal of Behaviour
Heuristics and Biases, CUP, USA. and IT, Vol. 1, p. 3.
Kahneman et al. (1993a), “Duration neglect in retrospective
evaluations of affective episodes”, J. Pers. and Soc. Psych.,
Vol. 65.
Kahneman et al. (1993b), “When more pain is preferred to less:
adding a better end”, J. of Psyc. Sci., Vol. 4, p. 6.
Lange-Kuettner and Martin (1999), “Reversed effects of Further reading
familiarity and novelty in visual and auditory working
memory for words”, Journal of Brain and Cognition, Knoedler et al. (1999), “The shift from recency to primacy with
June 1999. increasing delay”, J. of Exp. Psych, March.

300
Introduction
Other papers
Small to medium-sized firms (SMEs) make
Benefits and barriers of substantial contributions to national economies
electronic marketplace (Poon and Swatman, 1999) and are estimated to
account for 80 per cent of global economic growth
participation: an SME ( Jutla et al., 2002). However, despite a wealth of
initiatives from governments, significant concerns
perspective remain as to how smaller businesses can benefit
from the electronic environment (van Akkeren and
Rosemary Stockdale and Cavaye, 1999; Korchak and Rodman, 2001; Lewis
and Cockrill, 2002).
Craig Standing Although the availability and falling costs of
personal computers have had a major effect on the
ability of SMEs to compete in electronic
commerce (Cragg and King, 1993; Poon and
Swatman, 1999), the impact of this has been
The authors a mixed blessing for many firms. The breadth and
speed of the changes brought by the Internet
Rosemary Stockdale and Craig Standing are based at the
have radically altered the business landscape.
School of Management Information Systems, Edith Cowan
University, Perth, Australia.
Firms need to plan effective strategies to realise
benefits from the dynamic and information rich
Keywords environment (Downes and Mui, 1998).
The electronic environment can be intimidating
Small to medium-sized enterprises, Electronic commerce,
to many smaller firms and the development of
Trade barriers
information systems such as electronic
Abstract marketplaces remain a mystery to many SMEs.
It may seem premature to discuss e-marketplace
There are concerns that despite government initiatives to
adoption by SMEs since many SMEs are not yet
promote adoption of electronic commerce, SMEs still fail to
realise e-commerce related benefits. It may therefore, seem
secure with other, perhaps simpler, applications of
premature to discuss electronic marketplaces in the context e-commerce. However, there are problems
of SMEs. However, if SMEs ignore e-marketplaces a number of associated with a decision to ignore e-marketplace
problems can result. E-marketplaces present a significant threat opportunities. Larger organisations, with their
to SMEs since they increase competition and leave more extensive resources, are looking to
non-participants vulnerable to more e-enabled firms. This paper e-marketplaces to take advantage of the significant
examines the barriers and benefits of e-marketplace trading benefits offered and anticipate that
participation by SMEs. The nature of e-marketplaces is addressed suppliers will be available through such
and the benefits of participation are examined. Drawing on the
marketplaces. The ability of such marketplaces
literature, the barriers facing smaller firms in this environment
are discussed. Identification of these barriers, such as lack of to facilitate trading over regional and geographic
standards, supply chain integration and global trading, enables boundaries at low cost and without regard to the
a greater understanding of how SMEs can plan effective size of the firm opens up all markets to broader
strategies to gain from e-marketplace participation. competition. While this supports firms in seeking
new markets, it also leaves traditional markets
open to outside competition. In short, the problem
Electronic access for SMEs is not just one of lost opportunities but
The Emerald Research Register for this journal is encroachment on their markets in a fiercer,
available at competitive environment.
www.emeraldinsight.com/researchregister The contribution of this paper is to define the
The current issue and full text archive of this journal is potential benefits that can be obtained by SMEs
available at that participate in e-marketplaces and to examine
www.emeraldinsight.com/1741-0398.htm the barriers that smaller firms need to overcome to
benefit from participation. SMEs in the context
of this paper are defined according to the
Australian Bureau of Statistics as firms employing
less than 200 full time equivalent workers and
The Journal of Enterprise Information Management
Volume 17 · Number 4 · 2004 · pp. 301–311 are not subsidiaries, public companies, or
q Emerald Group Publishing Limited · ISSN 1741-0398 incorporated bodies (ABS, 2003). SMEs need
DOI 10.1108/17410390410548715 to understand e-marketplace opportunities to
301
Benefits and barriers of electronic marketplace participation The Journal of Enterprise Information Management
Rosemary Stockdale and Craig Standing Volume 17 · Number 4 · 2004 · 301–311

develop informed strategies (Brunn et al., 2002). of several definitions (Federal Trade Commission,
This will enable decisions regarding participation 2000; Grieger, 2003; Raisch, 2001; Sculley and
to be taken more effectively by smaller firms Woods, 2001; Weill and Vitale, 2001). Based on
seeking to extend their markets, to retain contracts this an e-marketplace is defined as:
with larger organisations or to deal with An interorganisational information system that
competition from non-traditional competitors. allows multiple buyers and sellers, and other
stakeholders, to communicate and transact
through a dynamic central market space, supported
by additional services.
Electronic marketplaces
The existence of marketplaces in human society
has a long history from before the Agora of The structure of electronic marketplaces
Ancient Greece to the online trading places of the
21st century. Trading of goods and services for Despite the differences and wide variety in market
other goods or for money is central to the concept makers’ business models three main elements in
of human socialisation (McMillan, 2002). the structure of an e-marketplace are identified
The advent of the electronic environment has not by the literature:
changed the principles of markets and marketplace (1) the origins of the marketplace, who owns and
trading, merely the way society goes about trading. operates it;
In essence, the technology facilitates the business (2) the transaction mechanisms that are offered
of the market, but it is not the reason for the by the marketplace; and
market to exist. Online markets must offer an (3) the additional facilities that a marketplace
advantage over traditional markets if they are offers to its participants.
to succeed and encourage firms to overcome any
difficulties arising from using the technology.
Consequently, an online market must be as rich, Ownership models
complex and complete as a traditional market and Ownership models have become more diverse as
must create extra value for its users (Kambil and the number of marketplaces have increased and
van Heck, 2002). market makers have reviewed and refined their
The development of electronic marketplaces business models. Four identifiable marketplace
followed swiftly on the use of the Internet for structures have been recognised.
business purposes. The initial proliferation of
Intermediaries
e-marketplaces proved to be unsustainable and
Intermediary marketplaces, one of the earlier
a forecasted period of consolidation is now
models of ownership, operate services across
underway (Forrester Research, 2000).
industry sectors concentrating on delivering
The number of marketplaces in any one industry
generic services such as auction facilities or
sector has been considerably reduced and the
value add services (Skjott-Larsen et al., 2003).
methods of transacting business and generating
They bring together buyers and sellers to allow
revenue have matured. In addition, the scope of
trading to take place through a variety of
the value added facilities has increased and
mechanisms (Figure 1).
become more targeted to the market. In this
evolving environment there is some confusion as to Consortia
what constitutes an electronic marketplace. Bakos’ The intermediary marketplaces were soon
(1991) early definition of “an interorganisational followed by large multinational organisations
information system that allows the participating investing in partnerships to form unprecedented
buyers and sellers to exchange information about collaborations with competitors to launch
prices and product offerings” has been widely industry specific marketplaces (Raisch, 2001).
accepted (Choudhury et al., 1998; Clemons et al., The structure of the consortium style marketplace
1993; Forrester Research, 2000). This definition gives advantages to the owners by providing a focal
has been refined and updated to take account of trading point to attract suppliers to a specific
the changes in the e-marketplace environment, industry. Suppliers’ advantage lies in access to
and the terminology, that have arisen from supply chains of large organisations (Figure 2).
developments of the World Wide Web. Terms such
as e-hubs, portal, exchange and auction are used in Hierarchies
different contexts with contradictory meanings A more recent development has been the increase
assigned to them. To avoid confusion, but with due in the number of private marketplaces or
acknowledgement of the complexity of the hierarchies. Large organisations invest in and host
environment, the paper incorporates key elements their own marketplaces thereby retaining control
302
Benefits and barriers of electronic marketplace participation The Journal of Enterprise Information Management
Rosemary Stockdale and Craig Standing Volume 17 · Number 4 · 2004 · 301–311

Figure 1 Intermediary style structure for an e-marketplace

Figure 2 Consortia style structure of an e-marketplace

of the facilities they develop and offer to Transaction mechanisms


suppliers (Bar, 2002). Such marketplaces require a There are several different transaction
large investment of time, money and technical mechanisms evident in electronic marketplaces,
expertise and are beyond the scope of many the most common being online catalogues,
organisations. However, the development of auctions, negotiation facilities and exchange.
off-the-shelf software may enable smaller There is a great variety within each of these
companies to launch less complex versions mechanisms. For example, over 30 types of online
(Figure 3). auction have been identified (Davis, 2001) and the
Included in the hierarchical model is the types and features of catalogues are numerous
increasing number of government e-marketplaces. (Stanoevska-Slabeva and Schmid, 2000).
These fall into two categories: e-procurement hubs Currently, there is little empirical evidence of the
for government and government hosted sites to optimum type of mechanism for different goods
support and encourage e-commerce. and services, although categorisations of
e-marketplace types have been made (Kaplan and
Cooperatives Sawhney, 2000; Sculley and Woods, 2001).
The cooperative or large group ownership Some market makers specialise in one
structure of e-marketplace is anticipated to arise in mechanism, for example, FreeMarkets
the near future. This model is based on a group of (www.FreeMarkets.com) specialises in auctions
stakeholders cooperating as market makers for while others offer a range of mechanisms.
common interest. Common interest may lie within For example, Quadrem (www.Quadrem.com)
the type of industry, a geographic area, or a specific offers negotiation, catalogues and auction.
goal (Standing et al., 2003) (Figure 4). The exchange mechanism tends to be more
303
Benefits and barriers of electronic marketplace participation The Journal of Enterprise Information Management
Rosemary Stockdale and Craig Standing Volume 17 · Number 4 · 2004 · 301–311

Figure 3 Hierarchical style structure of an e-marketplace

Figure 4 Cooperative ownership style structure of an e-marketplace

prevalent where established exchanges have customs paperwork, data warehousing and
established a Web presence, such as the London tracking of deliveries. E-marketplaces can
Metals Exchange (www.lme.co.uk). contribute to the enhancement of trust by offering
verifications services and screening of potential
Additional facilities trading partners (Choudhury et al., 1998). Some
Market makers use value-add facilities to enhance market makers adopt the community site model,
the attractiveness of their Web sites in pursuit of the well described by Hagel and Armstrong (1997),
competitive advantage necessary to survive in offering a complete range of facilities relevant to a
the developing environment of e-marketplaces specific industry or regional area. Market makers
(Bakos, 1991). The facilities on offer range from who have a good understanding of their target
information services, such as a listing of industry participants develop market models to enhance the
events, research papers, tutorials and news, to value proposition for marketplace members.
transaction orientated facilities. These include Value-add facilities play an important role in
insurance, online payment, escrow, completion of creating such models.
304
Benefits and barriers of electronic marketplace participation The Journal of Enterprise Information Management
Rosemary Stockdale and Craig Standing Volume 17 · Number 4 · 2004 · 301–311

Income models Benefits that can be of relevance to SMEs are


An additional factor that may influence the identified, and are given in Table I.
selection of an e-marketplace by any prospective Overall, the range of benefits that can be
participant is the method of income generation. achieved from participation in e-marketplaces is
There are several methods of income generation extensive, although not all will apply to every
including transaction fees, licence fees, advertising company. SMEs can realise benefits but it may
and the sale of marketing data. The most common take time for them to be recognised within the
method is the transaction related fee where buyers company. A steep learning curve will precede any
or suppliers pay a percentage of the transaction benefit gain for many companies and it should
value to the market maker (Kambil and van Heck, not be expected that this can be achieved in
2002). Licence fees are less attractive to smaller the short-term. A longer, slower approach may be
firms who are reluctant to commit to an untested a more reliable way to achieve sustainable
trading platform. These two methods of income advantages from e-marketplace participation.
generation are seen to deter buyers and sellers from Nevertheless, recognition of the advantages to be
entering marketplaces and this is influencing gained from e-marketplaces is desirable from an
market makers toward generating income from early point of developing e-commerce to enable
service fees on value-add facilities where business strategies for selection of suitable
participants are seen to be more willing to pay electronic marketplaces to be put in place.
(Federal Trade Commission, 2000; Kambil and
van Heck, 2002).
Barriers to E-marketplace participation
Many SMEs are not achieving even minimal levels
of e-commerce adoption raising concerns as to why
The benefits and barriers in adoption programmes, many of them government
E-marketplaces led, are not more successful ( Jutla et al., 2002;
Korchak and Rodman, 2001; Van Beveren and
SMEs seeking to develop a strategy to support Thomson, 2002). Major barriers to increasing
participation in electronic marketplaces require an adoption remain: lack of resources and knowledge
understanding of both benefits to be gained and (Cragg and King, 1993; Mehrtens et al., 2001), the
barriers to be overcome. This section of the paper skill levels of business operators (Darch and Lucas,
examines the literature to identify the benefits and 2002; Duan et al., 2002), lack of trust in the IT
barriers. industry (van Akkeren and Cavaye, 1999; Bode and
Burn, 2002), and the lack of e-commerce readiness
Benefits of E-marketplace participation in some industry sectors (Lewis and Cockrill,
The advantages of e-commerce participation for 2002). A further barrier is the lack of recognition
SMEs relate to their ability to keep pace with of the potential to improve business appropriate
a changing business landscape. Brought about by to the effort and costs of adoption and lack of
information technology (IT), these changes understanding of the realisable benefits
include facilitated access to global markets, (Goode, 2002; Poon, 2000).
changed production methods and costs, enhanced Those SMEs that have overcome these barriers
communication, reduced transaction costs and and started along the road to online business often
stimulated competition (Sculley and Woods, 2001; remain reluctant to move into the electronic
Timmers, 1999; Tumolo, 2001). The size of the marketplace environment. The evidence for this is
firms enable SMEs to be more adaptable and being increasingly reported in the business press
responsive to changing conditions than large (Erbschloe, 1999; Howarth, 2002), but remains
organisations (Walczuch et al., 2000) and to largely anecdotal. However, research into the
benefit from the speed and flexibility that the effects of global markets and supply chains is
electronic environment offers. beginning to examine more aspects of SMEs’
The new environment promises much to SMEs involvement in e-marketplaces (Fariselli et al.,
from e-commerce, but adoption levels remain low 1999; Gulledge, 2002; Stockdale and Standing,
(Levy and Powell, 2003; Mehrtens et al., 2001; 2003a).
Poon, 2000). This is partially due to lack of The barriers to e-marketplace participation
understanding of the benefits SMEs can achieve sometimes reflect the more generalised barriers of
(Goode, 2002) and of unrealistic expectations of e-commerce adoption, but are discussed here
benefits and the difficulties of evaluating them specifically in relation to the marketplace.
(Poon, 2000). In contrast, the literature on
electronic marketplaces does not differentiate Lack of support from market makers
between size of firm, but rather takes a “one size Market makers often aim their marketing at
fits all” approach to benefits (Fariselli et al., 1999). the larger corporations and do not perceive
305
Benefits and barriers of electronic marketplace participation The Journal of Enterprise Information Management
Rosemary Stockdale and Craig Standing Volume 17 · Number 4 · 2004 · 301–311

Table I Benefits to be gained from SMEs participation in e-marketplaces


Advantage Benefits Source
Access to a wider range of markets For suppliers there is the potential to Brunn et al. (2002), Essig and Arnold
broaden the company’s target market (2001), Fariselli et al. (1999), Senn (2000)
globally by seeking out marketplaces and Tumolo (2001)
with a global reach
For buyers there is potential to widen the
supplier base to find lower prices or new
product line
Greater potential for partnerships Electronic communication enhances the Hurwitz (2000) and Tumolo (2001)
ability to maintain geographically distant
relationships through e-mail and
multimedia programs, thereby widening
support for the supply/seller base
Flexibility in administration and The use of the electronic environment Brunn et al. (2002), Hermanek et al.
communication enhances the flexibility and accuracy of (2001) and Hurwitz (2000)
administration procedures and facilitates
communication within a company and
across partnerships
Convenience (24/7 accessibility) Convenience in interaction with partners. Deeter-Schmelz et al. (2001), Hurwitz
For example, time zones are less (2000) and Lin and Hsieh (2000)
problematic when communicating
electronically and customers can submit
orders in their own time.
(It should be noted that a number of
issues such as timing for global auctions
require some concessions to normal
working hours)
Information An advantage of many e-marketplaces is Bakos (1998), Brunn et al. (2002), Burton
the accumulation of information into one and Mooney (1998), Essig and Arnold
site. It is in the interest of both market (2001), Lin and Hsieh (2000) and Weill
maker and participants that all parties are and Vitale (2001)
well informed, although a level of trust in
the marketplace must be established to
maintain confidence in the sources of
information. In addition, information
exchange is enhanced through the
offering of multimedia applications for
marketing, tendering, and design
purposes. Designs and plans can be
presented via site for tendering purposes
using software drawing packages. Some
sites offer Web services to develop
marketing for their participants
Improved customer services The ability to tailor customer services to Bakos (1998), Burton and Mooney (1998)
individuals is well supported as online and Tumolo (2001)
and e-marketplaces facilitate this ability.
For example, Ford anticipates that it will
be able to supply car dealerships with
special order models within 2 weeks
through receiving online specifications
Updating of information Many marketplaces support instant Baron et al. (2000), Stanoevska-Slabeva
updates of catalogues and price lists, and Schmid (2000) and Tumolo (2001)
product specifications and
configurations. Traditional catalogues are
expensive to print and distribute and
require additional printing costs to
update them. Cost of online updates are
substantially lower
(continued)

306
Benefits and barriers of electronic marketplace participation The Journal of Enterprise Information Management
Rosemary Stockdale and Craig Standing Volume 17 · Number 4 · 2004 · 301–311

Table I
Advantage Benefits Source
Lower transaction costs Search costs for new buyers/suppliers are Bakos (1998), Clemons et al. (1993),
substantially lower. Additionally, Malone et al. (1987), Modahl (2000) and
electronic transaction processing such as Tumolo (2001)
order entries, online payment options
and order tracking are seen as more
efficient and less expensive
Differentiation of products and The transparency of information in Brunn et al. (2002), Burton and Mooney
services/customisation e-marketplaces enables companies to (1998) and Korchak and Rodman (2001)
identify where they can differentiate their
products and services from competing
companies within the same marketplace
Ability to enter supply chain for Large companies have broadened their Erbschloe (1999) and
larger companies supplier bases through the use of Korchak and Rodman (2001)
e-marketplaces. The advantages of cost
and speed that can be gained from
trading on online are available to
companies of all sizes and reduce the
barriers that have hindered smaller
companies attempting to enter the
supply chains of larger companies

the difficulties of smaller companies and their For the majority of business the Internet is a
differing needs (Howarth, 2002; Stockdale and complementary tool that can enhance their current
Standing, 2003b). Although some marketplaces business.
carry statements that they support smaller
businesses, they may charge initial fees that are Supply chain integration
beyond the resources of many or require an Smaller companies do not often see themselves as
understanding of, and commitment to, specialist part of a large supply chain. They underestimate
software. SMEs are unlikely to commit resources how e-commerce can facilitate interaction with
without a recognisable return of benefits for the larger firms within a supply chain by enabling the
investment of time and money (Korchak and sharing of information, electronic ordering
Rodman, 2001). (thereby dispensing with a paper system),
electronic fulfilment, tracking, and efficiencies in
Lack of standards cost and time (Korchak and Rodman, 2001).
The lack of a common framework for buyers and If SMEs do not understand that e-commerce
sellers hinders the development of many competencies will support their ability to function
marketplaces. Currently, e-marketplaces often within the larger supply chain they will lose out to
adopt their own platforms without regard to any other firms which can operate in the electronic
industry or technological standards. market.
Gulledge (2002) reports that over 120 standards
that extend XML have been identified. Such Industry environment
variety can deter participation by large and small Many SMEs operate within a relationship
firms, unwilling to commit to software and training environment that does not encourage innovation
before they can identify returns on their and there is little incentive to be the first mover in
investment (Howarth, 2002; Lucking-Reiley and the transition to e-marketplaces. For example,
Spulber, 2001). while small companies that supply Ford or Renault
must go to the major automobile marketplace,
Understanding of the environment Covisint, to maintain that relationship, there is
SMEs often do not have an understanding of the little incentive for publishers to go online as few of
nature of the Internet and how it interacts with their buyers (bookshops) are sophisticated
other methods of trading (Stockdale and Standing, e-commerce users.
2003b), although this is not confined to smaller
businesses (Porter, 2001). It is important for Identification of benefits
SMEs to understand that the Internet is not The perceived instability of the electronic
a substitute for established methods of trading environment hinders the progress of e-marketplace
except for companies that are created specifically adoption. SMEs rarely benefit from being first
for the Internet environment such as Amazon. movers unless action is in response to innovations
307
Benefits and barriers of electronic marketplace participation The Journal of Enterprise Information Management
Rosemary Stockdale and Craig Standing Volume 17 · Number 4 · 2004 · 301–311

in their external networks (North and Smallbone, processes to incorporate e-commerce components.
2000) and therefore, there is no incentive to Chau (2003) further found that business planning
undertake risk. There has to be some realistic and strategic goals enable SMEs to establish their
immediate benefits to encourage the first move, businesses at a desired level of participation,
before longer-term benefits become an issue thereby by-passing the stages of growth models
(Korchak and Rodman, 2001). (McKay et al., 2000; Poon and Swatman, 1997)
familiar to researchers in this area.
Global trading There are different motivations for SMEs to
The ability to trade globally is often associated move into online trading through e-marketplaces
with the electronic environment. While and this may have an influence on the level of
e-marketplaces can support many of the processes strategic planning achieved by a firm. It is only
required to achieve global purchases and sales recently that motivations for e-commerce adoption
through offering customs advice, currency in smaller businesses have been addressed
exchange and shipping services, many pitfalls (Levy and Powell, 2003; Mehrtens et al., 2001).
remain (Ives and Jarvenpaa, 1991; Peppard, Stockdale and Standing (2003b) identified two
1999). These can include language difficulties, groups of SMEs that have overcome the barriers to
cultural differences and import/export legislation. e-marketplace participation. The first group are
These are not insurmountable obstacles, but recognisable in Chau’s (2003) description of firms
require recognition and understanding. that have made some changes to business practices
to benefit from a recognised level of e-commerce
Financial constraints participation. These firms identify a need to
There may be an adverse effect on credit lines from participate either because their industry sector is
trading through e-marketplaces for SMEs that do active in online or because they recognise an
not have the financial backup to appreciate any opportunity to grow their business through
differences in the trading environment. There is e-marketplace activity. The second group are those
some anecdotal evidence that SME credit lines are SMEs that follow trading partners online in order
not geared to frequently changing buyer/supplier to retain a relationship. Where the larger partner
relationships and financial institutions may be has moved to an e-marketplace, smaller trading
wary of extending credit for Internet-based partners are forced into the electronic
trading. environment, often at a sophisticated level.
There is a wide variety of potential benefits and Strategic planning in these cases is less evident.
barriers to e-marketplace participation for small The eight barriers to e-marketplace
and medium sized businesses and there is no easy participation identified in this paper fall into two
recipe for overcoming the challenges and realising groups (Figure 5). Three of the barriers are
the benefits. Some barriers relate to recognised
generally specific and not within the capability of
problems common to SME e-commerce adoption,
individual firms to overcome, although knowledge
such as connectivity, while others are more specific
of them will contribute to a more effective strategy.
to the individual company such as lack of
These are lack of understanding of SMEs’ needs,
resources. In contrast, the realisation of the
the lack of a common technological standard
benefits of participation generally rests with the
and the level of e-competencies within industry
ability of individual SMEs to identify opportunities
sectors. Nevertheless, an understanding of these
and to plan their online trading effectively within
barriers will enable SMEs to more effectively select
the constraints of their industry environment.
an e-marketplace to participate by researching the
Effective planning of a participation strategy is
way a prospective marketplace supports individual
therefore of critical importance if an SME is
firms, the technology required to participate and
to realise benefits.
the types of marketplace servicing a particular
industry. An SME in an industry sector that is slow
in e-commerce uptake may still choose to seek out
Strategies for e-marketplace a marketplace that will enable it to source goods or
participation extend its market. Conversely, a smaller firm in a
technologically advanced industry sector will need
SMEs’ participation in e-commerce is not often to research the different types of marketplace
characterised by formal strategic planning (Hall, available and have an understanding of what each
1995), although by using a broader definition of offers.
strategy, Chau (2003) found wide evidence of The remaining five barriers constitute elements
some element of strategic planning in SMEs in that require a measure of strategic planning if
Australia. His definition included businesses that participation is to bring benefits to the firm.
have made significant alterations to business For example, SMEs require an understanding of
308
Benefits and barriers of electronic marketplace participation The Journal of Enterprise Information Management
Rosemary Stockdale and Craig Standing Volume 17 · Number 4 · 2004 · 301–311

Figure 5 SME barriers to e-marketplace participation

the environment in which they intend to operate. can be a major advantage. An understanding of the
This includes consideration of: where use of the complex social, cultural and economic issues and
e-marketplace sits within the business processes of the advantages to be gained will contribute to the
the firm and how use of it can contribute. Use of an planning process and the realisation of benefits.
e-marketplace in itself will not enable realisation of The perception that operating in a global market is
benefits if there is no understanding of the an extension of operating within regional
environment and what benefits are available. boundaries may hold true in the short-term, but
This is particularly true of SMEs that have been sustained benefit realisation requires greater
forced into a marketplace to retain a trading understanding (Peppard, 1999). This will be
partnership. With an understanding of the particularly true for SMEs with their limited
environment and the potential benefits to be resources, although the flexibility and innovation
gained, the e-competencies forced on them can that characterises many SMEs (North and
be used to further explore the marketplace and Smallbone, 2000) can be of particular advantage
gain the advantages of new partners and markets. in the global market.
In essence, if the SME is proactive rather than
reactive in the enforced situation then much can
be gained from the skills they have learned.
Conclusions
These firms are often within the supply chains of
large organisations, but may fail to recognise that, Although many SMEs are struggling with
with e-competencies, they are attractive to other e-commerce adoption, understanding of the
organisations seeking to broaden their supplier e-marketplace environment is important.
bases. SMEs moving online to enhance their The opportunities to extend trading beyond
businesses can also benefit from studying the traditional market boundaries make all firms
supply chains of large organisations, many of vulnerable to new sources of competition. Many
which are e-enabled. There may be financial smaller firms that supply large organisations are
constraints on smaller firms extending their being forced into the e-environment to retain their
business to non-traditional markets and trading partners, while other firms seek to extend
consideration of credit lines, payments and even their markets or to enhance their businesses by
currencies is a vital part of the planning process. trading beyond their traditional customer bases.
Electronic marketplaces that support financial A recognition of both benefits and barriers that
services can be of great value to smaller firms that firms face in entering the e-marketplace
have limited resources. However, technology environment will enable SMEs to more effectively
advances in e-money and e-payment systems are plan their participation and realise the benefits of
predicted to overcome many of the financial e-marketplace trading. Where firms follow an
constraints facing smaller firms (Fariselli et al., established partner online, they can gain further
1999). benefits and seek new relationships if they
For SMEs seeking to move into global markets, understand the environment in which they find
seen as a major benefit of electronic marketplaces, themselves and use their e-competencies to
careful selection of an e-marketplace that can actively participate in what the e-marketplace has
facilitate payment, logistics and other such services to offer.
309
Benefits and barriers of electronic marketplace participation The Journal of Enterprise Information Management
Rosemary Stockdale and Craig Standing Volume 17 · Number 4 · 2004 · 301–311

Implications for future research Internet-based electronic commerce within the American
independent insurance agency system”, Australian Journal
It is beyond the scope of this paper to determine of Information Systems, (Special ed.), pp. 20-42.
Chau, S. (2003), “The use of e-commerce amongst thirty-four
the reasons for low e-commerce adoption levels,
Australian SMEs: an experiment or a strategic business
but they are a serious hindrance to the use of tool?”, Journal of Systems and Information Technology,
e-marketplaces and challenge the ability of SMEs Vol. 7 No. 1, pp. 49-66.
to compete effectively in a global market. The Choudhury, V., Hartzel, K.S. and Konsynski, B.R. (1998), “Uses
literature shows that there is good understanding, and consequences of electronic markets: an empirical
at least at academic and government levels, of the investigation in the aircraft parts industry”, MIS Quarterly,
benefits and barriers to e-commerce. Therefore, Vol. 22 No. 4, pp. 471-507.
Clemons, E.K., Reddi, S.P. and Row, M.C. (1993), “The impact of
empirical research into SMEs’ motivations to
information technology on the organization of economic
adopt and use e-commerce will enhance initiatives activity: the ‘move to the middle’ hypothesis”, Journal of
to encourage participation in e-marketplaces. Management Information Systems, Vol. 10 No. 2.
An understanding of the benefits and barriers of Cragg, P.B. and King, M. (1993), “Small-firm computing:
e-marketplaces is the first step for SMEs in the motivators and inhibitors”, MIS Quarterly, Vol. 17 No. 1,
move to online trading. There is a significant need pp. 47-60.
for smaller firms to trade online either to follow Darch, H. and Lucas, T. (2002), “Training as an e-commerce
existing partners, compete effectively for their enabler”, Journal of Workplace Learning, Vol. 14 No. 4,
pp. 148-56.
traditional markets or to enter new markets. Davis, B. (2001), “Under the hammer”, Professional Engineering,
Although research into e-marketplaces is Vol. 14 No. 3, pp. 45-6.
underway it is mainly confined to the activities of Deeter-Schmelz, D.R., Bizzari, A., Graham, R. and Howdyshell, C.
large organisations and the impact on SMEs has (2001), “Business-to-business online purchasing:
yet to be addressed. Empirical evidence is required suppliers’ impact on buyers’ adoption and usage intent”,
to determine why SMEs trade through Journal of Supply Chain Management, Vol. 37 No. 1,
e-marketplaces, and their levels of use and pp. 4-10.
Downes, L. and Mui, C. (1998), Unleashing the Killer App: Digital
competency in doing so. Studies of the threats to
Strategies for Market Dominance, Harvard Business School
SMEs in regional areas from outside competition Press, Boston, MA.
and the ability of SMEs to extend their markets are Duan, Y., Mullins, R., Hamblin, D. and Stanek, S. (2002),
needed to inform frameworks to encourage more “Addressing ICTs skill challenges in SMEs: insights from
participation. three country investigations”, Journal of European
Industrial Training, Vol. 26 Nos 8/9, pp. 430-45.
Erbschloe, M. (1999), “Working with SMEs in the supply chain”,
Digital Systems Report, Vol. 21 No. 4, pp. 22-3.
References Essig, M. and Arnold, U. (2001), “Electronic procurement in
supply chain management: an information economics-
ABS (2003), Business Use of Information Technology, Bureau of based analysis of electronic markets”, Journal of Supply
Statistics, Canberra. Chain Management, Vol. 37 No. 4, pp. 43-9.
van Akkeren, J. and Cavaye, A.L.M. (1999), “Factors affecting Fariselli, P., Oughton, C., Picory, C. and Sugden, R. (1999),
entry-level Internet technology adoption by small business “Electronic commerce and the future for SMEs in a global
in Australia – evidence from three cases”, Journal of market place: networking and public policies”, Small
Systems and Information Technology, Vol. 3 No. 2, Business Economics, Vol. 12 No. 3, pp. 261-76.
pp. 33-48. Federal Trade Commission (2000), “Entering the 21st century:
Bakos, J.Y. (1991), “A strategic analysis of electronic competition policy in the world of B2B electronic
marketplaces”, MIS Quarterly, Vol. 15 No. 3, pp. 295-310. marketplaces”, The Federal Trade Commission B2B Public
Bakos, J.Y. (1998), “The emerging role of electronic marketplaces Workshop.
on the Internet”, Communications of the ACM, Vol. 41 Forrester Research (2000), “The e-marketplace shakeout”,
No. 8, pp. 35-42. available at: www.forrester.com/ER/Baseline, (accessed
Bar, F. (2002), “The construction of marketplace architecture”, 19 April 2001).
available at: www.standford.edu/,fbar/Publications/ Goode, S. (2002), “Management attitudes toward the World
Brookings-e-marketplace.pdf, (accessed 23 May 2002) Wide Web in Australian small business”, Information
Baron, J.P., Shaw, M.J. and Bailey, A.D. (2000), “Web-based Systems Management, pp. 45-8.
e-catolog systems in B2B procurement”, Communications Grieger, M. (2003), “Electronic marketplaces: a literature review
of the ACM, Vol. 43 No. 5, pp. 93-100. and a call for supply chain management research”,
Bode, S. and Burn, J.M. (2002), “Strategies for consultancy European Journal of Operational Research, Vol. 144,
engagement for e-business development – a case analysis pp. 280-94.
of Australian SMEs”, in Burgess, S. (Ed.), Managing Gulledge, T. (2002), “B2B e-marketplaces and small and medium
Information Technology in Small Business: Challenges and sized enterprises”, Computers in Industry, Vol. 49 No. 1,
Solutions, Ideas Group, Melbourne. pp. 47-58.
Brunn, P., Jensen, M. and Skovgaard, J. (2002), “E-marketplaces: Hagel, J. and Armstrong, A.G. (1997), Net Gain: Expanding
crafting a winning strategy”, European Management Markets Through Virtual Communities, Harvard Business
Journal, Vol. 20 No. 3, pp. 286-98. School Press, Boston, MA.
Burton, A.F. and Mooney, J.G. (1998), “The evolution of Hall, G. (1995), Surviving and Prospering in the Small Firm Sector,
electronic marketplaces: an exploratory study of Routledge, London.
310
Benefits and barriers of electronic marketplace participation The Journal of Enterprise Information Management
Rosemary Stockdale and Craig Standing Volume 17 · Number 4 · 2004 · 301–311

Hermanek, M., Schlemmer, C., Hope, B. and Huff, S.L. (2001), Poon, S. (2000), “Business environment and Internet commerce
“Critical success factors in business-to-business benefit – a small business perspective”, European Journal
e-commerce: the view of IS managers”, paper presented of Information Systems, Vol. 9, pp. 72-81.
at the PACIS, Seoul. Poon, S. and Swatman, P. (1997), “Determinants of small
Howarth, B. (2002), “E-survivors: get ‘e’ or get out”, available at: business Internet usage: a multimedia investigation of
www.aconex.com.au/Aconex/news/brw_ecommerce, perceived benefits”, paper presented at the 10th
(accessed 28 October 2002) International Bled Electronic Commerce Conference, Bled,
Hurwitz (2000), “E-marketplaces: Issues, risks, and requirements June.
for success”, White Paper, Hurwitz Group Inc., Poon, S. and Swatman, P. (1999), “An exploratory study of small
Framingham, MA. business Internet commerce issues”, Information and
Ives, B. and Jarvenpaa, S.L. (1991), “Applications of global Management, Vol. 35, pp. 9-18.
information technology: key issues for management”, Porter, M.E. (2001), “Strategy and the Internet”, Harvard
MIS Quarterly, Vol. 15 No. 1. Business Review, pp. 63-78.
Jutla, D., Bodorik, P. and Dhaliqal, J. (2002), “Supporting the Raisch, W.D. (2001), The e-marketplace. Strategies for Success in
e-business readiness of small and medium-sized B2B ecommerce, McGraw-Hill, New York, NY.
enterprises: approaches and metrics”, Internet Research: Sculley, A.B. and Woods, W.A. (2001), B2B Exchanges. The Killer
Electronic Networking Applications and Policy, Vol. 12 Application in the Business-to-Business Internet
No. 2, pp. 139-64. Revolution, Harper & Collins, New York, NY.
Kambil, A. and van Heck, E. (2002), Making Markets. How Firms Senn, J.A. (2000), “Business to business e-commerce”,
can Design and Profit From Online Auctions and Information Systems Management, pp. 23-32.
Exchanges, Harvard Business School Press, Boston, MA. Skjott-Larsen, T., Kotzab, H. and Grieger, M. (2003),
Kaplan, S. and Sawhney, M. (2000), “E-hubs: the new B2B “Electronic marketplaces and supply chain
marketplaces”, Harvard Business Review. relationships”, Industrial Marketing Management, Vol. 32,
Korchak, R. and Rodman, R. (2001), “E-business adoption pp. 199-210.
among US small manufacturers and the role of Standing, C., Sims, I., Stockdale, R. and Wassenaar, A. (2003),
manufacturing extension”, Economic Development “Can e-marketplaces bridge the digital divide?”, paper
Review, Vol. 17 No. 3, pp. 20-5. presented at the Organizational Information Systems in
Levy, M. and Powell, P. (2003), “Exploring SME Internet the Context of Globalization. IFIP TC8 and TC9 Working
adoption: towards a contingent model”, Electronic Conference, Athens.
Markets, Vol. 13 No. 2, pp. 173-81. Stanoevska-Slabeva, K. and Schmid, B. (2000), “Internet
Lewis, R. and Cockrill, A. (2002), “Going global – remaining electronic product catalogs: an approach beyond simple
local: the impact of e-commerce on small retail firms in keywords and multimedia”, Computer Networks, Vol. 32,
Wales”, International Journal of Information pp. 701-15.
Management, Vol. 22, pp. 195-209. Stockdale, R. and Standing, C. (2003a), “The effect of B2B online
Lin, B. and Hsieh, C-T. (2000), “Online procurement: reverse auctions on buyer-supplier relationships”, paper
implementation and managerial implications”, Human presented at the 14th Australian Conference on
Systems Management, Vol. 19 No. 2, pp. 105-10. Information Systems, Perth.
Lucking-Reiley, D. and Spulber, D.F. (2001), “Business-to- Stockdale, R. and Standing, C. (2003b), “Increasing the adoption
business electronic commerce”, Journal of Economic of electronic commerce by SMEs: reflections from an
Perspectives, Vol. 15 No. 1, pp. 55-68. empirical study”, paper presented at the 4th International
McKay, J., Prananto, A. and Marshall, P. (2000), “E-business We-B Conference, Perth, 24-25 November.
maturity, the SOG-e model”, paper presented at the 11th Timmers, P. (1999), Electronic Commerce, Wiley, Chichester.
Australasian Conference on Information Systems, Tumolo, M. (2001), “Business-to-business exchanges”,
December, Brisbane. Information Systems Management, pp. 54-62.
McMillan, J. (2002), Reinventing the Bazaar. A Natural History of Van Beveren, J. and Thomson, H. (2002), “The use of electronic
Markets, W. W. Norton and Company Inc., New York, NY. commerce by SMEs in Victoria, Australia”, Journal of Small
Malone, T.W., Yates, J. and Benjamin, R.I. (1987), “Electronic Business Management, Vol. 40 No. 3, pp. 250-3.
markets and electronic hierarchies”, Communications of Walczuch, R., Van Braven, G. and Lundgren, H. (2000),
the ACM, Vol. 30 No. 6, pp. 484-97. “Internet adoption barriers for small firms in
Mehrtens, J., Cragg, P.B. and Mills, A. (2001), “A model of The Netherlands”, European Management Journal, Vol. 18
Internet adoption by SMEs”, Information and No. 5, pp. 561-72.
Management, Vol. 39, pp. 165-76. Weill, P. and Vitale, M. (2001), Place to Space. Migrating to
Modahl, M. (2000), Now or Never. How Companies Must e-business Models, Harvard Business School Press,
Change Today to Win the Battle for the Internet Consumer, Boston, MA.
Orion, London.
North, D. and Smallbone, D. (2000), “Innovative activity in SMEs
and rural economic development: some evidence from
England”, European Planning Studies, Vol. 8 No. 1, Further reading
pp. 87-106.
Peppard, J. (1999), “Information management in the global Standing, C. and Stockdale, R. (2003), Electronic Marketplaces
enterprise: an organising framework”, European Journal and SMEs, Rural Industries Research and Development
of Information Systems, Vol. 8, pp. 77-94. Corporation, Perth.

311
Introduction
Other papers
The problems of evaluating and justifying
Information technology investments in information technology and
evaluation: classifying information systems (IT/IS) are not new.
Information systems have always been taking too
indirect costs using the long to develop, cost too much to implement and
maintain, and are frequently not perceived to be
structured case method delivering the business benefits which were initially
intended. In recent years, however, the changing
Peter E.D. Love role of IS in organisations has given new impetus to
the problem of IT/IS evaluation. The high
Ahmad Ghoneim and expenditure on IT/IS, the growing usage that
penetrates to the core of organisational
Zahir Irani functioning, together with disappointed
expectations about IT/IS impact, have all served to
raise the profile of how IT/IS investments can be
The authors evaluated. Over a decade back, Willcocks (1994)
Peter E.D. Love is based at We-B Centre, School of stated that “IS evaluation is not only an
Management Information Systems, Edith Cowan University, underdeveloped, but also an undermanaged
Joondalup, Australia. area which organisations can increasingly ill-afford
Ahmad Ghoneim and Zahir Irani are both based at the to neglect”. This observation is still pertinent
Department of Information Systems and Computing Brunel
today, perhaps even more so due to the
University, Middlesex, United Kingdom.
proliferation of information and communication
Keywords technology innovations that have penetrated the
marketplace.
Electronic commerce, Competitive advantage, Costs, The increased complexity of IT/IS combined
Research methods
with the uncertainty and unpredictability
associated with its benefits point to the need for
Abstract
improved IS evaluation. According to David
Many companies are increasing their expenditure on information (1990), there is often a time lag from the adoption
technology and information systems (IT/IS) to obtain or even
of IT and when the expected benefits are achieved.
sustain a competitive advantage in their respective
In fact, David’s research has shown that
marketplaces. Many managers, however, are often left with the
quandary of how to evaluate their investments in technologies. productivity benefits begin to emerge within an
Reasons of this difficulty have been suggested in the normative industry sector once the diffusion rate of
literature as centring on the socio-technical (human, technology surpasses 50 per cent. Brynjolfsson and
organisational and technical) dimensions associated with the Hitt (1996) and Stirroh (2001) have shown that it
adoption of IT/IS. The inability of managers to determine the takes time for the productivity benefits associated
true costs of deploying IT/IS is considered attributable to a with the adoption of IT to be achieved and diffused
lack of knowledge and understanding of IT/IS related costs. throughout the value chair. Stirroh (2001) noted
In developing a broader picture of such cost dimensions and that the agriculture and construction sectors have
their respective taxonomies, the research presented in this paper
been the only sectors in the US that have not
uses a structured case method to gain an understanding of how
a construction firm embraced the IT evaluation process. A review
experienced increases in productivity between
of the IT cost literature is presented and a conceptual IT 1995 and 1999. These industries have lagged other
evaluation framework that focuses on indirect costs is proposed. industries in embracing IT and consequently have
not been able to acquire the benefits of increased
Electronic access productivity. Like the US, the construction sector
in Australia is “laggard” in terms of its productivity
The Emerald Research Register for this journal is
available at
output and adoption of IT, when compared to
www.emeraldinsight.com/researchregister other sectors of the economy (DIST, 1998; Yellow
Pages, 2002).
The current issue and full text archive of this journal is The construction industry, through the
available at products that it creates, its size and ability to create
www.emeraldinsight.com/1741-0398.htm
employment, has the potential to influence an

The Journal of Enterprise Information Management The authors acknowledge the financial support
Volume 17 · Number 4 · 2004 · pp. 312–325 provided by the Australian Research Council and
q Emerald Group Publishing Limited · ISSN 1741-0398 Engineering and Physical Sciences Research Council
DOI 10.1108/17410390410548724 (GR/M95066 and GR/R08025).
312
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

economy’s gross domestic product (GDP) more Figure 1 IT investment stakeholders


than any other service industry. Stoeckerl
and Quirke (1992) explain that an increase
of 10 per cent in the Australian construction
industry’s efficiency, would improve the
economy’s service industry contribution to GDP
by over 2.5 per cent. Consequently, it is essential
that the industry operate in an efficient and
productive way. The Latham (1994) Report,
which investigated ways of improving the UK’s
construction industry, suggested that the effective
implementation of IT could reduce project costs
by as much as 30 per cent. The industry’s
conservative nature and the short-term focus of
organisations (i.e. a focus on winning the next
project) has tended to inhibit investments in IT,
even though there have been calls from the
Australian Federal Government to increase IT
adoption rates and investments in supporting
infrastructure (DIST, 1998). While many
construction organisations are readily aware of the
strategic benefits that can be leveraged from ITand
e-commerce applications, many are reluctant to
invest in such technologies. The reasons for this
centre around the hidden costs involved with expectations from the IT/IS investment. This
implementation (Ghoneim et al., 2003a, b; concept demonstrates that any form of evaluation
Mohamed and Irani, 2002). There is a need to must be multifaceted and seek to have their
identify the indirect costs of developing an IT/IS inclusion whilst considering the agendas of the
infrastructure, so that such cost factors can be different stakeholders involved.
included in the investment justification process. .
Organization (Management) – are interested in
In doing so, this can enable key decision-makers the gains [financial / and other] generated by
to manage the potential risk of cost increases that the investment. They seek to ensure that the
may occur throughout an IT/IS projects life cycle. project is implemented on time, within budget
Against the contextual backdrop a conceptual IT and according to user requirements.
evaluation framework for classifying the indirect .
Users – the technology should meet their
costs of an IS is examined using a structured case requirements while integrating flexibility to
method, with reference to an organisation from the adapt to the changing requirements of users/
Australian construction industry. customers.
.
Project team (Implementers) – focus on short-
term criteria set by sponsors (used to judge
their performance).
IT investments stakeholders .
Supporters (Subcontractors) – focus on short-
term criteria
Information system projects are increasingly a .
Stakeholders (Non-benefiting, non-influencing)
multi-stakeholder investment that impacts the – consists of many groups, each with its
organisation and increasingly its supply or service own goals and objectives. They might
chain. According to Milis and Mercken (2004), support or oppose the investment, which
there are five parties involved in information might possibly be in the form of covert
technology investments; each having their own set resistance.
of objectives and expectations. If the evaluation of
IT/IS investments is only financially based, and
centre on the use of traditional appraisal IT/IS evaluation: a focus on indirect costs
techniques then, the process only serves the
objective of management. This means neglecting The implications of ignoring “indirect” costs can
all other parties’ objectives and accordingly, failing have far-reaching consequences for companies.
to incorporate crucial factors that might affect the For example, reduced productivity may result
willingness of these parties to cooperate in realising from employees who have not been sufficiently
the objectives of the investment. Figure 1 shows trained, and loss of experienced employees to
the different parties (stakeholders) and their competitors. Li et al. (2000) suggests that firms
313
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

may only realise the significance of these cost employees developing new skills, and therefore,
factors once they start to develop an IT increasing their flexibility/overall contribution
infrastructure. Fundamentally, poor IT towards the organisation. These employees may
decision-making can result in financial losses, then request revised pay scales and benefit
which can translate into a loss in competitiveness, packages, which the organisation may have to offer
and even jobs. The costs associated with such to retain expertise. Clearly, such “indirect” costs
losses are invariably passed on to the customer. associated with employee pay and rewards,
Research undertaken by Dier and Mooney together with the cost implications of increases in
(1994) revealed that on-going costs staff turnover need capturing, and bringing into
(i.e. maintaining and modifying an application) are the IT evaluation arena.
incurred from year to year and can account for as Mohamed and Irani (2002) proposed a two-tier
much as 80 per cent of the lifetime cost of in-house system for classifying indirect human costs. The
developed systems and 91 per cent of the lifetime first tier refers to management, employee, financial
cost of software packages systems. Dier and and maintenance, with a second tier to particular
Mooney (1994) also found that managers tended cost components. In the first tier, management
to overestimate the initial costs (i.e. hardware, decides on the amount of IT expenditure;
software and systems developments costs) and employees refers to all people related issues within
underestimate ongoing costs and as a result lead to the organisation; financial refers to the allocation
a huge gap between the estimated allocated budget of budgets; and maintenance to the development
and the actual cost experienced by organizations. and implementation of technology. The second
This could be attributed to the fact that managers tier identifies indirect cost components with a
regard the investment justification process as a number of cost classifications, which are as
hurdle that needs to overcome, and not as follows.
technique for evaluating the worth of .
Time. Management time is an indirect cost in
implementing IT. Ghoneim et al. (2003c) argued terms of the transfer of skills through training
that a major difficulty associated with IT costing among staff, as neither staff nor management
related to identification costs, particularly those of will be doing their routine jobs during that
an indirect nature. According to Hochstrasser period. Bannister (1999) supports this view
(1992), indirect costs can be four times greater by stating that the introduction of a new
than those of a direct nature. Whilst some system will require training. Unless the
managers may be unaware of indirect costs, others organisation obtains a time recording
simply choose to ignore them to gain senior system, the indirect cost of the time spent
management’s support by trying to minimize this in training would not usually show up as
cost portfolio and at the same time increasing the an IS cost, but identified as a hidden or
benefits portfolio (Alshawi et al., 2000). personnel related cost. Such costs include
Indirect costs are typically comprised of human the time spent reading manuals, self-help
and organisational factors. One of the largest activities, and informal job training, which are
“indirect” human cost being that of management untraceable.
time (Irani et al., 1999). In other words, that time .
Learning costs. As new users or new systems
was specifically spent on integrating new systems are introduced to the organisation, users are
into current work practices. In the case of newly likely to embrace a learning curve. As a result,
adopted technologies, management may spend a temporary loss in productivity may be
time revising, approving and subsequently, experienced, as the user becomes familiar with
amending their IT related strategies. the new system. There is also the possibility
A significant amount of resource will also be that mistakes will occur during the
used to investigate the potential of the IT, and in implementation, migration or running of the
experimenting with new information flows and system. It takes time to rectify problems as
modified reporting structures (Love and well as become familiar with the peculiarities
Gunasekaran, 1997; Love et al., 1998). Wheatley of a system.
(1997) suggests that a further “indirect” human .
Costs of resistance. The introduction of a new
cost, which is often overlooked, is that of system IS could result in an unexpected political
support and trouble-shooting. Wheatley (1997) power shift that can result in some individuals
revealed that many organisations could not or groups resisting the change initiative.
estimate the additional cost of supporting IT in As a result, staff engage in other staff
relation to its original purchase price. According to interdependently uses behaviour that
Wheatley (1997), typical lifetime support costs are endeavours to result in disruption or removal
at least 400 per cent of the original purchase price. of an entire system. This is an influential
Further “indirect” costs may result from indirect human cost, as it has a great impact
314
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

on the social fabric of the organisation. Not them to determine their job market value
only does management have to rectify the rather than being interested in organisational
consequences of resistance but also bear the benefits. It could occur when decision rights
cost of resolving the actual resistance. are appointed to individuals that are expert.
Moreover, lack of commitment to change Managers may use their decision right to
could result in a non-operational working maintain their own interest rather than trying
environment, user resistance resulting in to meet organisational objectives (Dirks and
escalating operational costs. Van Lent, 1997; Irani and Love, 2001).
.
Effort and dedication. This occurs when a new . Deskilling. This is the inability to fully utilise
system is introduced, as management at all the potential skills of employees. For example,
levels spend time exploring its boundaries, as a result of a new system being introduced,
discovering the business potential, absorbing the organisation may assign high skilled staff
the transition from the old system to the new to undertake low skilled tasks (Kaye et al.,
system, as well as identifying integration 1995). As a result, either the employee may
issues. Here managers are being less seek a different job or the organisation
productive and thus not adding transparent continues to assign high salaries for less worth
value to the organisation. The time utilised by job roles. Investing in IT at the expense of
management and staff incorporating the new reduction in labour cost may lead to a
system into the existing organisational setting situation where it is difficult to predict
results in an indirect cost. Those members of accurately the costs involved, as there is less
staff influenced by the new system will take transparency. As an outcome, significant costs
time to become familiar with it and as a result could result from losing time and money
this hinders their daily operations. already invested in the employee that has left
.
Cost of redefining roles. The introduction of IS as well as requiring the same amount of money
in some cases can lead to organisational (if not more) for recruiting a substitute
restructuring. The dismantling of an employee.
organisations’ hierarchy and reduction in the
number of managerial levels, can lead to Because of the complexity associated with IS
middle management being somewhat exposed projects, various authors have been reserved in
and therefore, lead to a change in roles and recommending guidelines for evaluation purposes.
responsibilities. Kaye et al. (1995) suggests Examples of recommendations that have been put
that it may also lead to the introduction of forward are summarised as follows.
training, redundancy, or perhaps promotion. .
Kaplan (1984) explained that management
. Missed-costs. Bannister (1999) states that one should not loose sight of the short-term
of the major problems in tracing IS costs is financial returns from IT while being
mis-assigning them. Displacement costs (also overwhelmed with its wider long term
called re-allocation) are proposed as being one strategic implications.
of these mis-assigned costs, and are explained .
Farbey et al. (1993) stated that intangible
through the following example. If a member of benefits are valuable organizational assets that
the IS staff goes on training abroad, then cost cannot be quantified in monitory term.
of the aircraft is recorded as a travel expense, . Renkema and Berghout (1997) identified a
the accommodation as miscellaneous and plethora of investment appraisal techniques
other expenses as entertainment, when for the appraisal process, but there is no
essentially they are all actually IS training consensus on a single best approach.
costs. Bannister (1999) refers to disruption .
Weill and Broadbent (1998) stated that IS
and displacement costs as missed costs. should be seen as an integral part of an
.
Reduction in knowledge base. This is usually a organizational infrastructure.
result of high staff turnover, or redundancies, .
Hides et al. (2000) described the difficulties
in the organisation. Some organisations may in maximizing the portfolio of IS benefits
reduce labour costs, believing that they are and that minimizing the cost of IS is a
justifying their investment in IT. Nevertheless, major constraint on organizational
this is impossible to measure in financial IT investment.
terms, and can result in a significant change in .
Irani and Love (2001) presented empirical
the knowledge base of the organisation. evidence that managers are increasingly aware
.
Moral hazard. Mende et al. (1994) refers to that investment related costs occur during the
this as “professionalism”. It is defined to be systems life cycle and as such, they find it
the state in which the IS managers are difficult to identify, manage and control IT/IS
interested in gaining knowledge that will help related costs.
315
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

Cost taxonomies According to Table II, there is no single cost


factor that is identified by all eight models. This
Table I gives a summary of the limited research does not necessarily imply that the least cited cost
surrounding cost taxonomies. Notably, there has factors are insignificant or less important. For
been limited identification of associated costs instance, organizational restructuring, overheads,
elements within the taxonomies identified (with modifications, productivity loss, and management
the exception of Irani and Love, 2001). Thus, the time among others were the least cited. One reason
taxonomies reported in the literature are of little could be that academics are not aware of these
use to decision-makers in their current form. costs and/or the organizations studied for
Hence, there is much need for further research to developing the taxonomies were not familiar with
identify cost elements and establish new and these cost factors. The three most cited cost factors
validate current taxonomies. The identification of were found to be the hardware, training, and
such costs and appropriate grouping into software costs, which are easy to identify and
taxonomies will therefore, support improved financially quantify. According to the literature,
ex-ante investment decision-making, and the these costs represent the direct initial investment
controlling and reduction of IT/IS costs through costs of IS projects.
benchmarking during post-implementation It also noticed that the academics are
evaluation. increasingly aware of the indirect costs associated
Each of the cost taxonomies encompasses a with IT/IS investments, which are cited in some
different set of cost factors, since they all have their cases by five models in the case of covert resistance
different way of classifying costs. Yet, there are a and changes in salaries. Nevertheless, the majority
number of cost elements that are shared between of the indirect costs are still relatively new to
most of the eight cost elements. Table II outlines academics, which raises doubts about the level of
those cost elements that are shared by two or more awareness of practitioners and their knowledge of
cost taxonomies, and represents the cost factors such costs.
ordered descending from the most to the least cited The inability of managers to identify these
by authors. The table also indicates the number of various cost factors can be an indirect driver for
cost elements that shared the same number of other costs to occur. For example, when
occurrences in the literature taxonomies. implementing a new system, employees acquire

Table I IT/IS cost taxonomies


Cost taxonomies Reference
Financial/Non-financial activities. These costs are classified according Kusters and Renkema (1996)
to the activities causing them thus, emphasising a causal relationship.
Hence, reactive in nature
Initial/Ongoing costs. These costs are identified and assigned during Dier and Mooney (1994)
the systems life cycle. However, they tend to be retrospective, which
make their consideration during ex-ante evaluation difficult. Yet, as
legacy systems and enterprise solutions become more integrated,
such cost taxonomies warrant closer consideration in terms of
identifying their respective cost elements
Direct/Indirect: human and organisational. The direct cost element Irani and Love (2001)
is assigned to the information technology component, whereas the
indirect elements relates to the effect of the information system
on the organisation and people
IS cost divisions – management, employee, finance, and maintenance. Mohamed and Irani (2002)
This cost taxonomy identifies a set of cost factors and sub-systems
that impact the organisation. However, this taxonomy falls short of
identifying performance measures
Initial investment/Ongoing costs. These are based around the costs Remenyi et al. (1996)
relating to the development of an information system infrastructure
(initial investment) and operation of the infrastructure (ongoing cost)
Development/Hidden costs. Costs related to the purchasing, installing, Anandarajan and Wen (1999)
training, and testing the system
Social subsystem costs. The costs that reflect the changes in the social Ryan and Harrison (2000)
subsystem bought about by a new information technology
Acquisition/Administration: control and operations costs. This taxonomy David et al. (2002)
identifies a set of cost factors that constitute the total cost of
ownership (TCO) of information technology

316
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

Table II Cost factors shared by two or more cost taxnomoies involved in IT (Irani and Love, 2001). Bearing this
Cost factors shared by two or more Number of in mind, the authors adopted a research
taxonomies occurrences methodology that would involve and enfranchise
an organisation and their senior staff so that theory
2 Training 7 and knowledge about the decision-making process
Hardware 7
for IT could be derived to develop an effective
1 Package software 6
model for IT evaluation that considers both direct
3 Maintenance 5
and indirect benefits and costs. In this paper, we
Implementation risks (covert resistance) 5
explore how indirect IT cost was incurred, so we
Staff related costs (changes in salaries, 5
etc.)
can build a framework to map their occurrence.
2 Communication 4 Noteworthy, the framework is not developed in
Employee time 4 isolation and possible benefits that can arise
5 Development 3 when evaluating IT/IS have been included to
Support 3 demonstrate how the benefits are integral to cost
Upgrades 3 identification. However, the case that is presented
Installation and configuration 3 focuses on the indirect cost identification of IT/IS.
Business process re-engineering (BPR) 3
14 Operations 2
Systems software 2 Structured case method
Modifications 2 The structured-case seeks to build theory, which
Overheads 2 may be seen as “a system of interconnected ideas
Management/Staff resource 2 that condense and organise knowledge” (Neuman,
Management time 2 1991, p. 30) that attempts to explain, predict and/
Cost of ownership: system support 2 or provide understanding. The aim of adopting
Management effort and dedication 2 such an approach is to discover and discuss
Productivity loss 2 relationships between concepts, so as to build a
Organizational restructuring 2 “web of meaning” with respect to the human and
Infrastructure 2 organisational issues of IT evaluation (Carroll and
Accommodation/travel 2 Swatman, 2000). The development of a series of
Displacement and disruption 2 conceptual frameworks (CF) as shown in Figure 2,
Learning 2
from CF1, CF2, . . ., CFn is used to demonstrate the
process of knowledge and theory building where
new skills due to the training they underwent to CFn is the latest version of the theory built to date
use the system effectively and efficiently. Managers (Carroll and Swatman, 2000; Carroll et al., 1998).
have to take into consideration that the employees The theory-building process is not only inductive
may ask for a raise in salary for improved skillful but is interrelated with practice (Carroll and
levels. If managers are not aware of this possibility Swatman, 2000; Carroll et al., 1998). Applied
(which in this case is an indirect cost), then they research can lead to theory building, which can
might not be able to offer these employees their lead to further field research and more theory
required remuneration. Consequently, this may building. Thus, the research cycle can lead to
have an impact on employee retention (another changes to the CF. Each new CF expresses the
indirect cost). Staff turnover will lead to pre-understanding for the next cycle, as part of
recruitment expenses and training expenses for the hermeneutic circle (Gummesson, 1998).
new staff. The point here is that not paying That is, the natural human act and process of
attention to or trying to avoid indirect costs can interpretation and understanding of the world
indirectly lead to a more increase in the total cost (Carroll et al., 1998). Essentially, what is enacted is
of a project. Managers should try to identify and a spiral towards understanding, as current
plan for these costs at the beginning of the project’s knowledge and theory lay the foundations for yet
life cycle. Better management will lead to better another research cycle that will expand, revise or
control of costs, which may translate into increased validate the authors’ understanding of IT
profits. evaluation in construction. This is particularly
appropriate for IT, as it is an area distinguished by
rapid changes in practice, which suggest the need
Research methodology for theory, and practice to become closely
intertwined (Galliers, 1997). It is envisaged that
Earlier research suggests that a firm’s “failure” with the structured-case will enable theory to be
IT is primarily attributable to not meeting user developed that will reflect the concerns, problems
expectations, which underlines the significance of and issues facing construction firms (Carroll and
the “soft” human and organisational issues Swatman, 2000).
317
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

Figure 2 The conceptual framework (CF1) for IT evaluation: incorporation of indirect cost factors

Initial conceptual framework taxonomies that take into consideration human


As limited research has examined IT indirect and organisational aspects is a significant
costs, the conceptual framework developed by departure from conventional approaches used to
Irani et al. (2000) was adapted by including evaluate technological systems. By taking a
indirect cost factors to explore those costs stakeholder perspective, it is suggested that the
experienced by a construction organisation at process of investment and implementation of
an enterprise level. As mentioned above, the IT should be driven by the organisations
authors’ particular interests centre on the capability, the level of competency available
importance of the human and organisational and the inherent culture, values and level of
dimensions associated with the evaluation process, experience available within the construction firm.
as it is considered that the implementation of It is therefore of vital importance that the following
IT can have cascading effects throughout an entire
steps are closely adhered to in preparation of
organisation if these issues are not adequately
introducing change based on the implementation
addressed.
of IT.
.
Corporate commitment by “selling” the need
Justification of CF1 for change and the importance of such an
The case for looking at a stakeholder perspective investment.
during the evaluation process itself has been well .
Communicating clearly the value, benefits and
justified through the literature ( Willcocks and implications for such investments on people
Lester, 1996). The importance of establishing and the organisation.
318
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

.
Leading the change proactively by store information on a central server for
ensuring that the culture per se is estimating, cost planning, contract administration,
not averse to modernisation and investment of and document control purposes. ABC has
IT. upgraded and introduced new hardware and
.
The level of employee involvement and software during the last 2 years, for example,
participation, empowerment of employees document imaging systems, videoconference
at various levels within the organisation. systems, e-mail and Internet and Intranet
.
A skill audit will have to take place prior to systems. The direct financial cost of
major investments and a necessary strategy of implementing these technologies was estimated
skill upgrade and development. to be $650,000 for the state office involved in
this study, which had an estimated turnover of
A stakeholder perspective during IT/IS investment
$60 million in 2002. ABC’s management team
programs cannot and should not be considered
did not undertake a rigorous IT evaluation
as a one off, project-based approach. It is process and as a result, has encountered several
evidently clear that as construction firms enter difficulties especially with the software system
an era based on IT, a continuous process of used to support strategic the management of
technological appraisal, evaluation, upgrading business processes.
and integration needs to be adopted. This
therefore, indicates that stakeholder orientation
should be a continuous process. Collective Data collection
experience, expertise, experimentation, The data collection procedure has followed the
continuous improvement initiatives will all major prescriptions by most textbooks in doing
gradually impact the benefits that can be derived fieldwork research (Yin, 1989). A variety of
from IT adoption. The cost taxonomies proposed secondary data sources were used to collect
in CF1 are the scope of consideration in this data with regard to the development of IT
research. Evaluating IT investments is no longer taxonomies for evaluating IT investments, such
appropriate to include only conventional, as internal reports, budget reports, and filed
economically-based costs as the justification accounts. A variety of data sources have been
process needs to focus on a variety of benefits, used to derive the findings presented in this
which may lie at a strategic, tactical and/or paper, which include interviews, observations,
operational level (Figure 2). illustrative materials (e.g. newsletters and other
publications that form part of the case study
organisation’s history), and past project
documentation. The authors have extensive
The research cycle industrial experience in the construction industry
and have used this, together with a predefined
The research cycle aimed to validate or further interview protocol to determine the data needed
revise the proposed CF1. The construction firm for the research.
(ABC) used was a large construction and Interviews were conducted with the
engineering contractor that has constructed many regional manager, company accountant,
of Australia’s best known building’s and quality manager, estimating manager,
landmarks. In 2001, the annual turnover for construction managers, project managers, and
ABC was approximately $430 million, and in general support staff at the enterprise-level. The
2002, it was approximately $475 million. ABC has duration of each interview was approximately
a solid client base, and it estimates that 80 per cent 30 min, where every interview was conducted
of its current projects are for repeat clients. on a one-to-one basis, so as to stimulate
ABC has offices throughout Australia and conversation and breakdown any barriers that
South East Asia. may have existed between the interviewer and
ABC has an extensive IT infrastructure in place. interviewee. The authors acted as a neutral
At a project level, ABC only uses basic medium through which questions and answers
technologies as devices for inter-organisational were transmitted and therefore, endeavoured to
communication. While ABC acknowledges the eliminate bias. In considering this, bias in
importance of IT as a mechanism for improving interviews occurs when the interviewer tries to
inter-organisational communication, the financial adjust the wording of the question to fit the
rewards that may be obtained from using IT are respondent or records only selected portions of
not considered to be beneficial in the short-term. the respondent’s answers. Most often, however,
At an enterprise level a packaged software system interviewer bias results from the use of probes,
supports ABC’s management information system where these are follow-up questions and are
(MIS). The package software system is used to typically used by interviewers to get respondents to
319
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

elaborate on ambiguous or incomplete answers Table IV Classification of indirect organisational costs


(Jick, 1979; Shaughnessy and Zechmeister, 1994). Indirect organisational costs IT cost factor
In trying to clarify the respondent’s answers the
interviewer was careful not to introduce any Productivity losses Developing and adapting to new systems,
ideas that may form part of the respondent’s procedures and guidelines
Strains on resources Maximising the potential of the new technology
subsequent answer. Furthermore, the interviewer
through integrating information flows and
was also mindful of the feedback respondents
increasing information availability
gained from their verbal and non-verbal responses.
Process redesign The redesign of organisational functions,
As a result, the interviewer avoided giving
processes and reporting structures
overt signals such as smiling and nodding Organisational restructuring Covert resistance to change
approvingly when a respondent failed to answer
a question.

Decision-making
While reaping the benefits of their quality
Findings and discussions program ABC senior management (regional
manager, company accountant, and construction
The variables identified in the CF1 were found manager) considered that it was time to embrace
to be interdependent and thus, impossible to the new millennium with a revised business
them. We use the generic headings from the strategy that centred on the strategic use of IT.
proposed framework to present our initial Senior management was convinced that IT
findings and discussion. Taxonomies of would improve their organisation’s business
indirect costs that were found to be experienced performance. Attendance at business seminars
can be found in Tables II-IV. ABC considers on the strategic use of IT, as well as the
itself to be a pro-active and innovative construction encouragement of State Governments to
and engineering organisation. They have a adopt IT were factors that influenced
corporate philosophy founded on quality and managements decision to invest and develop
as result operate a continuous improvement and an extensive IT infrastructure. Senior
philosophy. The implementation of quality management considered that they were taking
assurance and subsequently CI was a long a long term view when they decided to invest
and arduous task, but ABC are now reaping in IT. The regional manager stated that
the benefits, e.g. reduced rework, repeat “. . .investing in IT will improve communication
client’s, increased market share and increased within the organisation, especially our sites.
profitability. We consider this to be a long term investment
and are committed to being an innovative
organisation”. This statement contradicts the
Table III Classification of indirect human costs claim made by Lefley (1994) that managers
Indirect human costs IT cost factor are more susceptible to make short-term
decisions with respect to new technology
Management/Staff resource Integrating computerised administration and
than any other aspect of their company.
control into work practices
Lefley (1994) further states that management
Management time Devising, approving and amending
IT/IS and marketing and procurement
is often reluctant to make long term investments,
strategies as they are more amenable to their shareholders
Cost of ownership: system Vendor support/trouble shooting costs by investing in low risk short-term projects,
support management effort and Exploring the potential of the system which show high profits. This did not appear to
dedication be the case in ABC, as the investment in IT was
Employee time Detailing, approving and amending considered to be a strategic decision that
the computerisation of estimating, would enable long term benefits to be achieved.
cost planning, planning and The company accountant stated that the
project/contract administration decision to extend and implement IT was
Employee training Being trained to manipulate considered “. . .a must, if the firm is to remain
vendor software and training others competitive in the future”. A budget was
Employee motivation Interest in computer-aided estimating prepared by the company accountant and then
and planning reduces as time passes different IT requirements were ranked in order of
Changes in salaries Pay increases based on improved preference and in terms of the greatest perceived
employee flexibility benefit by department heads (quality manager,
Staff turnover Increases in interview costs, induction costs, estimating manager, etc.). After each requirement
training costs based on the need
was ranked a cost was then allocated, albeit a
for skilled human resource
nominal figure.
320
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

Employee involvement Communication


At no point did those people ranking the The reasons why ABC introduced new
various technologies consider the indirect technologies were deemed to be obvious
costs of implementation. Moreover, it was by management but not so to employees.
revealed that end-users had not been invited to Meetings were held to discuss the implementation
participate in the decision-making process. process after the decision to invest had been made.
The authors’ found this surprising as ABC There was little communication between
had always involved their employees in the management and employees, especially those on
organisation’s decision-making process. In fact, site. One project manager made the following
employee involvement was seen to have been the comment “. . .I do realise that IT can improve
key to ABC’s success. So why were they not the way we do things, but what am I going to
included in deciding the IT requirements of do. I’ve never used a computer in my life.
the firm? It was difficult to obtain an answer to There’s no way I can start using one now. . . I’m
this question and is something that the authors’ almost 50”. What management had failed to do in
found puzzling to say the least. From the this instance was they did not inform staff that they
interviews undertaken with employees and would provide training and support for those using
management it was simply a case “management the new IMS.
knew best” in this instance. It was also observed
from the interviews that certain managers
had hidden agenda’s to push, as they sought Resource development
particular technologies to improve the Time was a factor that was overlooked during
effectiveness of business processes they were the implementation process. It was assumed that
involved with. Promotions and bonuses within employees would conduct their day-to-day
ABC were related to performance, so if activities as well as become involved with the
departments were performing well the installation of new systems and technologies.
respective departmental manager would be Many employees found themselves working
given due credit. overtime during the implementation phase.
Expertise was brought in from outside to
assist with the installation of software and
Leadership hardware systems. However, this was not
There was a lack of leadership during the considered enough, as users had specific
decision-making and implementation process. software and hardware requirements that
As a result there was a degree of confusion had not been considered. While it was
within the organisation as to who was responsible acknowledged during the initial decision-making
for leading the IT project. Essentially, process that an IT manager and a technician
departmental managers were responsible for were needed they were not employed until
implementing IT within their specific areas. 6 months after the initial implementation phase.
This created a degree of confusion as the company This was because it was difficult to recruit
accountant and quality manager, who were experienced IT personnel, as there was a shortage
responsible for implementing the packaged of IT personnel with construction industry
computer system, did not coordinate the experience.
installation of software to individual machines Training costs were not considered during the
with departmental managers. This resulted in a evaluation phase, they were simply overlooked.
delay to the systems operation, which subsequently The costs of training were found to be
had negative consequences on employee morale. considerable, as almost all people within the
Software glitches were also encountered, which in organisation had to be sent on an IT training
turn had an impact on the productivity of course. Employees using the new technologies
employees. In hindsight ABC should have and software programs stated that their
developed bespoke software that matched the productivity had decreased and that they had
requirements and needs of end-users. It was, to work longer hours. Moreover, it was revealed
however, considered cheaper (reduced that while employees were away from their jobs
development costs) to purchase packaged due to retraining their colleagues work patterns
software and amend it to suit the requirements of were also disturbed. During this unfamiliarity
the firm. However, this has been a cumbersome phase, the losses in productivity did not go
and time-consuming task. The costs associated unnoticed by senior management. The regional
with amending the software are ongoing. manager stated:
ABC acknowledges the problems associated We made a mistake thinking that employees
with purchasing packaged software and are now would automatically take to the new technology.
considering bespoke software. Morale was poor at one stage because we failed
321
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

to communicate our intentions. We are now way individuals react to change and not IT itself.
doing our best to provide assistance and support To some extent this was the case at ABC, as
those employees that need it. You’ll always get employees were not confident in the decisions
teething problems when you introduce something
made by senior management because they had not
new into an organisation, but sometimes you
have to take a risk and deal with the consequences communicated the reasons why change, in the
as they arise. In hindsight we should have done form of IT, was being introduced. But, however,
things differently. good a firm is, at least some employees will always
suspect the motives of management, simply
These consequences could have been accounted
because that is how people behave when
for during the evaluation stage, which in turn
confronted with change.
would have reduced the firm’s overhead and
The findings presented have resulted in a
operating costs. Noteworthy, it is estimated
modification of the initial CF1. The revised
that the total cost (which is ongoing) for
framework, CF2, can be seen in Figure 3. Here it
implementing IT may well be in excess of
can be seen that we have separated indirect costs
$2 million, which is three times that originally
into organisational and human costs and have
budgeted for by ABC.
modified the cost factors in accordance with the
The implementation of the packaged software
findings reported. This revised framework can now
IMS and Intranet system meant that information
form the basis of future research into the area of
was more readily available, which improved
indirect related IT costs within a holistic IT
decision-making and communication. The
evaluation framework. An area that also needs to
introduction of the new systems meant that single be examined in conjunction with indirect costs is
departments were no longer needed. ABC’s the intangible benefits associated with IT
organisational structure was redesigned to implementation. This aspect of evaluation will be
enable teams to be formed for particular projects. examined in the authors’ future work with the case
The new systems required employees to become study organisation.
multi-skilled, as information was readily available.
The organisational boundaries that had earlier
existed within ABC essentially acted as obstacles
to information flow and decision-making. Conclusions
Business process needed to be redesigned,
as there was no further need for functional Construction firms need to undertake a rigorous
departments. The change in organisational evaluation process before implementing IT if they
structure meant that multi-skilled teams were are to achieve improvements in their business
formed to perform activities for specific performance, otherwise inefficiencies in decision-
projects. The internal layout of ABC’s making and resource deployment will prevail. In
head office has become more open and over addition, management needs to look beyond the
time it is anticipated that this will influence use of traditional modes of investment justification
the culture of the firm. The redesign of the (which are based on the use of economic appraisal
ABC’s organisational structure resulted in techniques) and consider the introduction of
management spending time on integrating indirect costs into the formal decision-making
new systems into current work practice; a cost process. This should then provide a more realistic
that had not been allowed for during the view of the investments’ implications rather than
evaluation phase. providing a selective picture of quantifiable project
Two estimators that were close to retirement benefits and costs. Failure to include indirect cost
found the notion of using IT to perform their work implications not only questions the value of
too daunting, and as a result took earlier traditional justification processes but also has
retirement. If staff had been involved in the implications regarding the actual successes of
decision-making process then these employees many IT deployments. The case study identified
would have been able to prepare themselves for the problems that arose from not undertaking a
change that had been cast upon them. In this rigorous investment evaluation process,
instance, it is very difficult to demonstrate that IT particularly in the context of indirect costs.
caused these employees to retire. However, the Problems associated with the deployment IT such
changes imposed on the organisation would have as training, lack of end-user involvement, process
probably favoured newer, younger employees who redesign have been addressed by case study firm,
were able to learn more quickly. Thus, the older but at a cost! Despite the associated cost the
employees may have lost their credibility because construction firm has experienced many benefits
their knowledge and experience would have been such as quality of service improvements, cost
tied to the earlier work methods. The disbenefits savings (reduction in clerical salaries, etc.), and
often associated with IT are largely caused by the improved communication.
322
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

Figure 3 Revised conceptual framework (CF2) for IT evaluation: incorporation of indirect costs

References Carroll, J., Dawson, L.L. and Swatman, P.A. (1998), “Using
case studies to build theory: structure and rigour”,
Anandarajan, A. and Wen, H.J. (1999), “Evaluation of Proceedings of 9th Australasian Conference on
information technology investment”, Management Information Systems, 30 September-2 October,
Decision, Vol. 37 No. 4, pp. 329-37. University of NSW, Sydney.
Alshawi, S., Irani, Z. and Jassim, A. (2000), “Novel cluster David, P. (1990), “The dynamo and the computer: an historical
performance matrix: a decision aid for evaluating perspective on the modern productivity paradox”,
computer hardware”, Journal of Intelligent Systems, American Economic Review, pp. 355-61.
Vol. 10 Nos 5/6, pp. 543-60. David, J.S., Schuff, D. and St Louis, R. (2002), “Managing your IT
Bannister, F. (1999), “What did we pay for that? The awkward total cost of ownership”, Communications of the ACM,
problem of IT cost”, Proceedings of the 6th European Vol. 45 No. 1, pp. 101-6.
Conference on Information Technology Evaluation, 4-5 Dier, D.H. and Mooney, J.G. (1994), “Enhancing the evaluation of
September, Brunel University, Uxbridge. information technology investment through
Brynjolfsson, B.L. and Hitt, L. (1996), “Paradox lost? Firm level comprehensive cost analysis”, Proceedings of the 1st
evidence on the returns of IS spending”, Management European Conference for IT Evaluation, 13-14 September,
Science, Vol. 42 No. 4, pp. 541-58. Henley Management College, Henley on Thames, UK.
Carroll, J. and Swatman, P. (2000), “Structured-case: a Dirks, P. and Van Lent, L. (1997), “Control of the information
methodological framework for building theory in systems function: the role of the cost allocation”,
information systems research”, European Journal of Proceedings of the 4th European Conference on IT
Information Systems, Vol. 9 No. 4, pp. 235-42. Evaluation, University of Delft, Delft.
323
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

DIST (1998), Building for Growth. A Draft Strategy for the Latham, M. (1994), Constructing the Team: Joint Review of
Building and Construction Industry, Department of Procurement and Contractual Arrangements in the UK
Industry, Science and Tourism, Commonwealth of Construction Industry, Department of the Environment,
Australia Publication, Canberra. London.
Farbey, B., Land, F. and Targett, D. (1993), IT Investment: A Study Lefley, F. (1994), “Capital investment appraisal of manufacturing
of Methods and Practices, Published with Management technology”, International Journal of Production Research,
Today and Butterworth-Heinemann, London. Vol. 32 No. 12, pp. 2751-6.
Galliers, R.D. (1997), “Reflection on information systems: twelve Li, H., Love, P.E.D. and Irani, Z. (2000), “The relationship between
points to debate”, in Mingers, J. and Stowell, F. (Eds), the use of IT/IS and the productivity of consulting firms in
Information Systems: An Emerging Discipline, McGraw- construction”, International Journal of Construction
Hill, Berkshire, pp. 113-36. Information Technology, Vol. 8 No. 1, pp. 15-27.
Ghoneim, A., Irani, Z. and Love, P.E.D. (2003a), “Identifying and Love, P.E.D. and Gunasekaran, A. (1997), “Process re-
classifying IS life cycle costs”, Association for Information engineering: a review of enablers”, International Journal
Systems, Americas Conference on Information Systems of Production Economics, Vol. 50 Nos 2/3, pp. 183-97.
(AMCIS 2003), 9-11 August, New Orleans, LA. Love, P.E.D., Gunasekaran, A. and Li, H. (1998), “Putting an
Ghoneim, A., Irani, Z. and Love, P.E.D. (2003b), A Review of engine into re-engineering: toward a process based
Indirect Cost Taxonomies for Information Systems Projects, organisation”, International Journal of Operations and
The 14th Australasian Conference on Information Systems Production Management, Vol. 18 No. 9, pp. 937-49.
(ACIS’ 2003), Perth. Mende, M.W., Brecht, L. and Osterle, H. (1994), Evaluating
Ghoneim, A., Irani, Z. and Love, P.E.D. (2003c), “IT/IS evaluation: Existing Systems from a Business Process Perspective,
the cost identification dilemma”, International Business Virginia.
Information Management Conference (IBIM) on Milis, K. and Mercken, R. (2004), “The use of the balanced
E-Business and Organizations in the 21st Century, scorecard for the evaluation of information and
16-18 December, Cairo. communication technology projects”, International
Gummerson, E. (1998), Qualitative Methods in Management Journal of Project Management, Vol. 22, pp. 87-97.
Research, Sage, Newbury Park, CA. Mohamed, S. and Irani, Z. (2002), “Developing taxonomies of
Hides, M.T., Irani, Z. and Love, P.E.D. (2000), “Supporting information system indirect human costs”, paper
investment evaluation and project management: presented at the International Conference on Systems
framework of IT/IS costs”, International Conference
Thinking in Management, University of Salford, Salford,
on Systems Thinking in Management (ICSTM-2000)
3-5 April.
Deakin University Waterfront Campus, Geelong,
Neuman, W.L. (1991), Social Research Methods: Qualitative and
pp. 240-4.
Quantitative Approaches, Allyn and Bacon, Boston, MA.
Hochstrasser, B. (1992), “Justifying IT investments”, Conference
Remenyi, D., Michaek, S. and Terry, W. (1996), “Outcomes and
Proceedings: AIS, The New Technologies in Today’s
benefits for information systems investment”,
Business Environment, pp. 17-28.
Proceedings of the 3rd European Conference for IT
Irani, Z. and Love, P.E.D. (2001), “The propagation of technology
Evaluation, Bath University School of Management,
management taxonomies for evaluating investments in
Bath University, Bath.
manufacturing resource planning (MRPII)”, Journal of
Renkema, J.W. and Berghout, E.W. (1997), “Methodologies for
Management Information Systems, Vol. 17 No. 3,
information systems investment evaluation at the
pp. 161-77.
Irani, Z., Love, P.E.D. and Li, H. (1999), “IT/IS investment barriers proposal stage: a comparative review”, Information and
to the decision-making process”, Proceedings of the Software Technology, Vol. 39, pp. 1-13.
Business Information Technology: The Global Imperative Ryan, S.D. and Harrison, D.A. (2000), “Considering social
Conference, 30 June-2 July, [CD-Proceedings] The subsystem costs and benefits in information technology
Department of Information Systems at the University of investment decisions: a view from the field on anticipated
the Western Cape, Cape Town. payoffs”, Journal of Management Information Systems,
Irani, Z., Love, P.E.D. and Hides, M.T. (2000), “Investment Vol. 16 No. 4, pp. 11-40.
evaluation of new technology: a conceptual model for Shaughnessy, J.J. and Zechmeister, E.B. (1994), Research
managing IT/IS cost”, paper presented at the Americas Methods in Psychology, 3rd ed., McGraw-Hill, New York,
Conference on Information Systems (AMCIS 2000), NY.
[CD-ROM Proceedings], Long Beach, CA, 10-13 August. Stoeckerl, A. and Quirke, D. (1992), “Services: setting the agenda
Jick, T.D. (1979), “Mixing qualitative and quantitative methods: for reform”, Report No. 2, Services Industries Research
triangulation in accumulation”, Administrative Science Program, Department of Industry, Technology and
Quarterly, Vol. 24, pp. 602-11. Commerce, Canberra.
Kaplan, R.S. (1984), “Yesterday’s accounting undermines Stirroh, K.J. (2001), “Investing in information technology:
production”, Harvard Business Review, Vol. 62 No. 4, productivity payoffs for US industries”, Current Issues in
pp. 95-101. Economics and Finance, Vol. 7 No. 6, June, Federal Bank of
Kaye, G., Hinton, C. and Armstrong, S. (1995), “The hidden New York, New York, NY.
investments in IT: dependency, legacy and heritage”, Wheatley, M. (1997), “Hidden costs of the humble PC”,
Proceedings of the 2nd European Conference on IT Management Today, pp. 52-4.
Investments Evaluation, pp. 249-59. Weill, P. and Broadbent, M. (1998), Leveraging the New
Kusters, R.J. and Renkema, T.J.W. (1996), “Managing IT Infrastructure: How Market Leaders Capitalize on IT,
investment decisions in their organizational context: the Harvard Business School Press, Boston, MA.
design of local for local evaluation models”, Proceedings Willcocks, L. (1996), “Introduction: of capital importance”,
of the 3rd European Conference for IT Evaluation, in Willcocks, L. (Ed.), Information Management: The
Bath University School of Management, Bath University, Evaluation of Information Systems Investments, Chapman
Bath, UK. & Hall, London, pp. 1-27.
324
Information technology evaluation: classifying indirect costs The Journal of Enterprise Information Management
Peter E.D. Love, Ahmad Ghoneim and Zahir Irani Volume 17 · Number 4 · 2004 · 312–325

Willcocks, L. and Lester, S. (1996), “The evaluation and the Building Industry, 19-21 October, Building Research
management of IS investments: from feasibility to routine Establishment Ltd, Watford.
operations”, in Willcocks, L. (Ed.), Investing in Information Hogbin, G. and Thomas, D.V. (1994), Investing in Information
Systems: Evaluation and Management, Chapman & Hall, Technology: Managing the Decision-making Process’,
London. McGraw-Hill/IBM Series, Cambridge.
Yellow Pages (2002), Yellow Pagesw E-business Report: The Irani, Z. and Love, P.E.D. (2002), “Developing a frame of
On-line Experience of Small and Medium Enterprises, reference for ex-ante IT/IS investment evaluation”,
Yellow Pages Business Index Small and Medium European Journal of Information Systems, Vol. 11 No. 1,
Enterprises, Australia, July. pp. 74-82.
Yin, R.K. (1989), Case Study Research – Design and Methods, Irani, Z., Ezingeard, J.N. and Grieve, R.J. (1997), “Integrating the
Applied Social Research Method Series, Vol. 34, Sage costs of an IT/IS infrastructure into the investment
Publications, Newbury Park, CA. decision-making process”, The International Journal of
Technological Innovation, Entrepreneurship and
Technology Management (Technovation), Vol. 17
Nos 11/12, pp. 695-706.
Further reading Irani, Z., Love, P.E.D., Sharif, A.M. and Li, H. (2001), “The failure
and success of a manufacturing information system: a
Alter, S. (1999), Information Systems: A Management case study”, European Journal of Information Systems,
Perspective, 3rd ed., Addison-Wesley, Reading, MA. Vol. 10 No. 1, pp. 55-66.
Andresen, J. (2000), “The unidentified value of IT in construction Lefley, F. and Sarkis, J. (1997), “Short-termism and the appraisal
industry”, Proceedings of the International Conference on of AMT capital projects in the US and UK”, International
Information Technology in Construction: Implementing IT Journal of Production Research, Vol. 35 No. 2, pp. 341-55.
to Gain a Competitive Advantage in the 21st Century, Primrose, P.L. (1991), Investment in Manufacturing Technology,
17-18 January, Department of Building and Real Estate, Total Technology Department, UMIST, Manchester,
Hong Kong Polytechnic University, Hong Kong, pp. 93-105. Chapman & Hall, London.
Ballantine, J. and Stray, S. (1999), “Information systems and Rivard, H. (1999), A Survey of Information Technology in the
other capital investments: evaluation practice compared”, Canadian Construction Industry, in Lacasse, M.A. and
Logistics and Information Management, Vol. 12 Nos 1/2, Vanier, D.J. (Eds), National Research Council of Canada,
pp. 78-93. Vancouver, pp. 2339-47.
Berghout, E.T. and Renkema, T.J. (2001), “Methodologies for Small, M.H. and Chen, J. (1995), “Investment justification of
investment evaluation: a review and assessment”, in Van advanced manufacturing technology: an empirical
Grembergen, W. (Ed.), Information Technology Evaluation analysis”, Journal of Engineering and Technology
Methods and Management, Idea Group Publishing, Management, Vol. 12 Nos 1/2, pp. 27-55.
Hershey, PA, pp. 26-43. Silverman, D. (1998), “Qualitative research: meanings or
Checkland, P. (1995), “Soft systems methodology and its practice?”, Information Systems Journal, Vol. 8 No. 1,
relevance to information systems”, in Stowell, F. (Ed.), pp. 3-20.
Information Systems Provisions: The Contribution of Soft Strassmann, P. (1992), “The politics of downsizing”,
Systems, McGraw-Hill, London, pp. 1-17. Datamation, pp. 106-10.
Debras, P., Moneceyron, J-L., Bauer, F. and Ballesta, P. (1998), Stratopoulos, T. and Dehning, T. (2000), “Does successful
“An information server for the building industry: interest of investment in information technology solve the
a STEP/IFC based approach”, Proceedings of 2nd productivity paradox?”, Information and Management,
European Conference on Product and Process Modelling in Vol. 38, pp. 103-17.

325

You might also like