Evaluation of IT Investment Methods and Proposing a
Decision Making Model
Shirin Nasher, Mehrdad Kalantarian, Ahmad Akbari, Ali Suzangar, Mohammad
Kajbaf and Negar Madani
Infoamn IT Consultancy CO., Tehran, Iran
shirin_nasher@vu.iust.ac.ir
mehrdad_kalantarian@vu.iust.ac.ir
akbari@iust.ac.ir
a.suzangar@infoamn.com
m.kajbaf@infoamn.com
n.madani@infoamn.com
Abstract: Information technology investment decision making is one of the significant issues. Since the IT
investment evaluation is not just based on direct and tangible factors and many other intangible and indirect
qualitative criteria influence this evaluation. Generally, there are two different approaches in evaluation methods with
their own advantages and disadvantages: tangible methods such as Discounted Cash Flow, Net Present Value,
Information Economics, etc. and intangible methods such as Value Analysis, Multi Objective Multi Criteria, Critical
Success Factors, etc. But a more effective and precise road map is to guide decision makers to choose an
appropriate multi criteria model that consider both tangible and intangible factors together. In this paper by literature
review of these mentioned methods, various tangible and intangible factors were determined from different academic
papers and practitioner resources and then were classified in two domains and a number of sub-domains. In order to
obtain complete and applicable criteria, five reduction factors were defined, i.e. clarity, completeness, non–
redundancy and operationality. Then this criteria list was delivered among a number of mangers and information
technology specialists. According to the given answers, a new criteria list was obtained with eliminating nonapplicable criteria. As a consequence, to assess the importance of each criterion for creating the model, the rating
scores, one to five were defined and added to the new lists. Then these new criteria lists were conducted among
CIO, CEO, CFO and other related specialists in different Iranian companies to customize these criteria according to
their business strategies and requirements. Score one represents not important and five represents very important.
The results are assumed as the minimum level of criteria with maximum coverage in different information technology
projects. In the next step, based on the results, we developed an analytic hierarchy decision making model. The
results of this research indicate that this model is applicable and can be easily expanded by aggregating new sub
criteria to be customized for different IT investment evaluations.
Keywords: IT investment, evaluation of IT project, intangible benefits, decision making model, economic factors,
rational decision making
1. Introduction
Information technology is actively applied in various segments of society that has a strong impact on the
global performance of the businesses. In the past few years, the rapid growth of IT investment is one of
the most incredible issues in different business units and organizations. On the other hand, its adoption is
based on tangible and intangible aspects. But there is a strong persistency to concentrate on tangible
aspects, but the fact is that intangible factors often are the most important one associated to investment.
Indeed, it is not easy for administrations to evaluate the real return of IT investment, so convincing
organization chief managers to allocate their budget to information technology projects is difficult. Even
though organizations are eager to spend considerable amount of time and money to select appropriate IT
project, but they may not include all relevant criteria in evaluating the IT investment (Wu and Ong
2008).Hence even nowadays aligning IT investment strategies with business policies is an important
issue in organizations (Borenstein and Baptista Betencourt 2005), (Goh and Kauffman 2005), (Joseph
Wen, Yen and Lin 1998).
Although there are different methods and tools developed for IT investment evaluation, but the majority
only take easily measured financial aspects into account without any attention to strategic or operational
aspects. Among these methods, the multi criteria multi objective method combines various criteria in
general specific and applied to a unique situation. Hence the existence of a model based on the validated
tangible and intangible criteria, independent from the context related to the specific IT investment seems
very important to support a decision (Chen, Zhang and Lai 2009), (Schniederjans and Hamaker 2003),
(Schniederjans , Hamaker and Schniederjans 2004).
324
Shirin Nasher et al.
The main goal of this study is to identify and structure a set of relevant and validated minimal measurable
set of criteria and sub criteria to formulate a hierarchy decision making model for a specific IT investment.
These criteria were raised from different research and practitioner resources and validated through the
evaluation of specialist to support and develop decision makers confidence in the selection of the most
suitable project for a particular case (Goldstein, Katz and Olson 2003), (Mahmood and Szewczak 1999).
In this paper, first in the literature review section, different tangible or intangible IT investment evaluation
methods will be introduced. Then the advantages and disadvantages of these methods will be compared
to each other.
Second, the methodology of this research will be described in the consequence. At last in the conclusion
the benefits of the proposed model will be presented.
2. Literature review
The best IT investments are those which help to maximize the value of the firm. They also contend that to
maximize the value of the firm, IT investment decisions need to be able to maximize IT benefits while
minimize IT risks (Joseph Wen, Yen and Lin 1998).
There are three reasons why being familiar with IT benefits and risks is important. First, some IT benefits
are lost through inappropriate management, while some are lost because they are not recognized by the
management in the early IT planning stage. Second, it is important to identify the benefits to be measured
prior to selecting applicable evaluation methods. This is because some methods are suitable for
evaluating tangible benefits while others are more suitable for intangible benefits. Finally, the recognition
of risk as an important component in IT investment decision making has long been recognized (Epstein
and Rejc 2004-2005), (Joseph Wen, Yen and Lin 1998).
2.1 Information technology benefits and risks
In general, the benefits of IT investments can be classified into five broad classes, the purpose of which
is to (1) increase productivity and operating process performance; (2) facilitate management support; (3)
gain competitive advantages; (4) provide a good framework for business restructure or transformation
and (5) provide clearance of expenditures (Epstein and Rejc 2004-2005).
IT has provided many benefits to corporations over the years. Since we are living in a global information
society with a global economy, which is increasingly dependent on the creation, management and
distribution of information resource. However, investments in information technology are subject to higher
risks than any other capital investments for several reasons. First, their components are comparatively
fragile. Second, information systems are likely to be the target of disgruntled workers, protester, and even
criminals. They can also fall in the hands of the competitors. Finally, the decentralization of information
systems and the use of distributed processing have increased the difficulty of design, development,
management, and protecting information systems. IT risks are classified into two general classes: (1)
physical risks; and (2) managerial risks (Epstein and Rejc 2004-2005).
2.2 Information technology investment evaluation methods
Given countless existing methods, a broader framework for categorizing and understanding evaluation
techniques seems highly desirable. Such a framework by dividing IT evaluation approaches into two
broad categories based upon their underlying assumptions: objective/rational or subjective/political. In the
objective/rational category, they further divided the objective/rational category into two zones: efficiency
i.e., doing things correctly and effectiveness i.e., doing the correct things. The subjective/political
category described as the understanding zone i.e., discovering why things are done (Tuten 2009).
Traditional IT evaluation practice operates from an objective/rational point of view, focusing on the
efficiency and effectiveness of solutions. Such evaluation approaches are grounded in a positivist
epistemology—an epistemology that, when applied to this context, holds that information systems are
inherently objective and rational. Therefore, practitioners should evaluate information systems using
objective/rational methods (Tuten 2009).
Overall, researchers have tended to describe traditional evaluation methods as formal, overt, ritualistic,
mechanistic, quantitative, and/or prescriptive in their efforts to determine the costs, benefits, and risks
associated with IT investments (Tuten 2009).
325
Shirin Nasher et al.
Nevertheless, researchers have suggested that formal evaluation frequently fails to be undertaken with
rigor and is completely avoided by practitioners in many cases. In a recent study IT evaluation practices
in European companies, researchers found that only one third of the organizations surveyed conducted
formal evaluations. Yet, when organizations perform IT evaluation, they tend to employ traditional
methods that hold considerable legitimacy with executives and managers. This finding found that
quantitative evaluation methods were widely used by the organizations conducting formal evaluations
(Tuten 2009). Table1 shows these methods based on mentioned categorize.
As Table1 shows, these rational/objective effectiveness methods may be subcategorized into one of
three groups of methods: economic, non-economic, and hybrid.
Table 1: The information technology investment evaluation methods (Tuten 2009)
Effectiveness Zone
Efficiency Zone
Economic
Non-economic
Hybrid
Discounted Cash Flow
Cost Benefit Analysis
Payback Period
SEASAME
Return on Management
Return on Investment
Options Theory
Risk/Sensitivity Analysis
User Information
Satisfaction
Balanced Score Card
Critical Success Factors
Information Economics
Multi-Criteria Approaches
Value Analysis
Simulation
TQM/Software
Metrics
2.2.1 Economic methods
In particular, the researcher discussed each of the following widely cited methods: Discounted Cash Flow
(DCF) techniques, Cost/Benefit Analysis (CBA), payback period, Systems Effectiveness Study and
Management Endorsement (SESAME), Return on Management (ROM), Return on Investment (ROI),
options theory, and risk sensitivity analysis (Tuten 2009).
2.2.2 Non-economic method
In the rational/objective literature stream, techniques for measuring user satisfaction, particularly the User
Information Satisfaction (UIS) method, provide the notable exception (Tuten 2009).
2.2.3 Hybrid methods
Hybrid approaches may utilize financial/economic factors and/or non-economic dimensions to evaluate
information systems. All of the following methods have been associated with the rational/objective stream
of IT evaluation techniques. These approaches vary considerably with respect to their degree of apparent
objectivity, as demonstrated by either their reliance on quantitative measures or empirically observable
outcomes. For example, in practice Information Economics relies heavily on their quantitative enhanced
ROI metric. In contrast, Critical Success Factors (CSF) method utilizes a dialogic approach to uncover
executives’ explicit and implicit goals and objectives. In this sense, the term hybrid provides an apt
description for this group’s diversity of methods and measures. These methods are such as Balanced
Score Card (BSC), Critical Success Factors (CSF), Information Economics (Parker and Besnson 1988)
and etc. (Tuten 2009).
Note that, the focus of this paper is on the effectiveness zone methods, so it has preferred to eliminate
describing other zone. Since there are differences between these more applicable methods, Table2 has
summarized the previous discussions based on methods attributes.
In Table2, the IT benefit factors column shows that which of the mentioned above methods concentration
is on tangible or intangible criteria. Therefore these benefit factors can determine the criteria that are
required for IT investment evaluation and decision making lastly.
326
Shirin Nasher et al.
Table 2: Differences among information technology investment evaluation methods (Joseph Wen, Yen
and Lin 1998)
Evaluation
category
Model/procedure
examples
Measures of IT
benefits factors
Measures of
IT risks
Major
advantages
ROI
NPV, DCF, pay-back
period formulas
tangible
discount
rates,
surrogate
measures
CBA
cost/benefits formulas
tangible factors
same as ROI
mainly
quantitative
focus on
efficiency
mainly
quantitative
focus on
effectiveness
ROM
Productivity based
formulas
tangible, labor
value-added as
intangible
Not
addressed
mostly qualitative
measures of
efficiency
IE
same as ROI
supplemented with
ranking and scoring
tangible and
some intangible
surrogate
measures,
risks with
ranking and
scoring
qualitative and
quantitative
measures
MOMC
math models and
multistage iterative
processes
tangible and
intangible
several
measures
of utility and
risks
mainly
quantitative,
multiple and
conflicting
objectives
relatively new
in MIS, still in
development
Major limitations
no intangible,
reliance
on accounting
data
surrogate
measures
for intangible
factors
limited
quantitative
measures,
assumptions
hard to meet
major
simplifying
assumptions
and
models
VA
multistage, evolutionary
process
tangible factors
not
addressed
tangible factors
prototyping,
need
several
revisions to
final results
CSF
multistage,
evolutionary process
user’s surrogate
measures
user’s
surrogate
measures
intangible
factors,
centered on
effectiveness
highly
qualitative
process
RO
Multistage process
tangible and
intangible
factors
many intangible,
centered
on effectiveness
highly
subjective and
qualitative
PA
Financial models
measures for
cost
savings
higher efficiency
mainly
quantitative
Delphi
approach
multistage,
evolutionary process
user’s surrogate
measures
tangible and
intangible
factors
highly
qualitative
surrogate
measures
for risks
and costs
direct
measures
of risks
user’s
surrogate
measures
3. Methodology
In this paper, IT investment decision making problem has been presented. The methodology of problem
solving with the purpose of building the model to evaluate IT investments would be described here. This
methodology has three steps that would be explained as follows:
Gathering and reducing criteria
Weighting
Proposing model
3.1 Gathering and reducing criteria
This stage has comprised of two steps. At first by reviewing pervious research studies concerning IT
investment evaluation, many of the criteria and sub criteria were identified (Renkema and Berghoutb
1997), (Kraemer and Dedrick 1994), (Joseph Wen, Yen and Lin 1998), (Henderson and Venkatraman
1990). More than 250 criteria were enlisted in an excel file that were concerned both tangible and
intangible factors. After that these criteria were classified into four domains in the separated excel sheets,
327
Shirin Nasher et al.
i.e., operational, tactical, strategic and risk. Each domain has its own criteria and relative sub criteria. The
definitions and characteristics of the criteria were described in each sheet. The first sheet was considered
for the brief description about this research.
Second, because this raw list has many unrealistic and non-applicable criteria, a reduction process was
conducted to identify clear and operational criteria list. Therefore, reduction factors were defined as
follows: the clarity, completeness, non–redundancy and operationality. In the consequence, these factors
have been added for each criterion in the new columns with check boxes to that excel sheet.
This file has delivered among ten managers and information technology specialists. Based on the
gathered results, these actions were done:
1. If the most specialists had voted that the criterion is not clear, it must be defined clear.
2. If the most specialists had voted that the criterion is not complete, it must be completed.
3. If the most specialists had voted that the criterion is redundant, it must be eliminated.
4. If the most specialists had voted that the criterion is not operational, it must be changed or at last
eliminated.
After applying reduction factors to the set of 250 criteria and these actions, several criteria were
eliminated and several were changed or completed. At last the new minimal measurable list of criteria
was obtained. This new list has two domains, i.e. “strategic” and “operational and tactical” with eleven
criteria and forty two sub criteria. A brief description of each eleven criteria is as follows:
1. Strategic alignment: This criterion is related to this crucial point that which investment can align
with organizational strategy and also the possibility of IT providing opportunities for businesses.
2. Competitive advantages: It refers to the organization competitive position among market and
supplier and other related items that mentioned in this criterion.
3. Organizational productivity: It is about the organizational productivity improvement.
4. Market assessment: This criterion deals with the pervious background of the specific IT project
and mentions its former customers and their credit in the market. Also, investigates the ability of
project in the market anticipating.
5. Compliance: It seeks to identify the compliance between proposed investment with the current
internal or external requirements and standards.
6. Quality: It tends to focus on the IT performance characteristics and the impact of it on the services
improvement to support business processes.
7. Security: This criterion and its related items refer to three main aspects (Confidentiality, Integrity
and availability) of security in information systems.
8. Flexibility and compatibility: This criterion and its related items refer to assess program
reliability.
9. Cost: It is related to the different costs associated with a particular investment.
10. Satisfaction: It considers external customers or internal user’s satisfaction about the new
proposed investment.
11. Effects: This criterion tends to focus on the effects of investment on the internal organizational
culture and communications.
The primary model based on these minimal measurable validated criteria was shown in figure1.
3.2 Weighting
In this step to determine domains, criteria and sub criteria importance in order to proposing a model, 5
importance degrees were defined in new lists for each criterion i.e., very important, important, relatively
important, less important and not important. Then these new lists were conducted among twenty of IT
experts with minimum 10 years professional experience in Iran. They determined importance degree for
each criterion based on their own organizational strategies and business requirements. The scores one
to five were defined that score one represents not important and five represents very important. After
answer sheet gathering, first the stability of given answers was calculated by SPSS. It was 91.2 percent
which indicates that IT expert’s answers were at minimum deviation.
328
Shirin Nasher et al.
Figure1: The multi criteria model for IT investment evaluation
3.3 Weighting
In this step to determine domains, criteria and sub criteria importance in order to proposing a model, 5
importance degrees were defined in new lists for each criterion i.e., very important, important, relatively
important, less important and not important. Then these new lists were conducted among twenty of IT
experts with minimum 10 years professional experience in Iran. They determined importance degree for
each criterion based on their own organizational strategies and business requirements. The scores one
to five were defined that score one represents not important and five represents very important. After
answer sheet gathering, first the stability of given answers was calculated by SPSS. It was 91.2 percent
which indicates that IT expert’s answers were at minimum deviation.
Second, the mean value of each criterion and domains were calculated. The cut off value of 3.0 within
values was assumed and those criteria which their mean values are greater or equal 3.0 were identified
and ignored. The 3.0 value is almost moderate importance of each criterion. Based on this assumption,
just one of the sub criteria has been eliminated and excluded from the model. This criterion was
“improvement in organizational communication” from the “effects” criteria. This condition shows that all
these criteria are important and reduction process in the previous step was successful to capture a
minimal set of attributes for IT investment evaluation.
Third, as a consequence based on mean values the entire criterions were ranked. Table3 shows the
gathered results. According to this table, security criteria are the most important and “Improvements
internal and external organizational culture” criterion has less importance within all criteria.
After that, the overall weighting of criteria and domains were calculated with dividing each mean value by
the total sum of its related criteria and sub criteria mean values. This is called prioritizing. By prioritizing
them, the level of each criterion would be determined in its criteria and in an analysis hierarchy model
they would be shown at decreasing level. Figure2 illustrates the hierarchy model based on the
decreasing prioritization.
According to mentioned model, strategic domain has more impact on the investment final decision
making than operational domain. Indeed, nowadays it is the fact organization strategy and IT investment
alignments with strategies are so important for chief managers.
329
Shirin Nasher et al.
Table 3: Evaluation criteria and statistical results
Domain
Criteria
Strategic Alignment
0.287
Strategi
c
0.516
Competitive
Advantages
0.167
Rank
Weight
4.5
6
0.181
4.65
2
0.184
4.14
17
0.166
4.1
18
0.165
3.72
30
0.150
3.7
31
0.149
4.55
4.35
3.4
4.3
3.1
5
8
35
11
40
0.231
0.221
0.172
0.218
0.157
4.63
3
1
3.91
21
0.258
3.55
3.85
3.83
34
25
26
0.234
0.254
0.253
Internal standards and requirements
3.11
39
0.493
External standards and requirements
Response Time
Turnaround Time
Error Rates
Program Code Quality
Quality Assurance
Customization of Outputs
Outputs Format
Comparability of output produced
Easy output format
Security( Confidentiality, Integrity,
Availability)
Flexibility against technological change
compatibility
Ability to customize
Update Feature
Facilitate changes in the code
Buy
Implementation
Human Resources Training
Maintenance
Time
Internal satisfaction
External satisfaction
Improvements internal and external
organizational culture
3.2
4.23
3.90
4.31
3.75
4.05
3.73
3.89
3.18
4.17
37
13
22
10
28
19
29
23
38
15
0.507
0.120
0.111
0.122
0.107
0.115
0.106
0.110
0.090
0.118
4.85
1
1
4.25
4.4
4.2
3.68
3.35
4.33
4.6
3.8
4.15
3.95
3.65
3.88
12
7
14
32
36
9
4
27
16
20
33
24
0.214
0.221
0.211
0.185
0.168
0.208
0.221
0.182
0.199
0.190
0.483
0.516
3
41
1
Impact on achieving IT strategic
objectives
Impact on aligning IT with organization
strategy
Organization governance
Improved efficiency of current business
process
Improved efficiency of changed business
process
Improved efficiency of new business
process
Customers
Partners
Suppliers
Competitors
New incoming
Organizational
productivity
0.267
Increase organizational productivity
Market Assessment
0.148
The number and credit of previous
customers
Competitor opinion
Define market
Market anticipating
Compliance
0.131
Quality
0.217
Operati
onal
and
Tactical
0.484
Importance
Average
Sub Criteria
Security
0.247
Flexibility
and
compatibility
0.133
Cost
0.183
Satisfaction
0.117
Effects
0.103
The security criteria are the most important criteria and the impact of it on the choosing IT project is much
more. Also, the prioritizing sub criteria can help to have a scale to understand the impact of them on the
investment decision. Note that, the sum of sub criteria weights is one and it shows their overall impacts
are considered on the final investment decision making.
330
Shirin Nasher et al.
Figure 2: Analytic hierarchy decision making model
3.4 Proposing model
Since the model wants to illustrate the criteria importance level on the final decision making process,
another hierarchy model was proposed. In this model, two domains were determined on the top of the
model. This model is comprised hierarchical level based on five unit intervals that the mean value of each
criterion determine its own level. By comparing these values, they have been assigned to their
appropriate level as shown in Figure3.
There was an unanimous consensus that this proposed model has improved the decision process in
order to have consistent and complete criteria based on different tangible and intangible factors for IT
investment evaluation. Note that this proposed model is general model and independent from the specific
IT investment to aid investment decision making process.
4. Conclusion
Adoption of the new information technology requires investment justification. Also, IT investment decision
making is based on evaluating tangible and intangible criteria. But the intangible criteria are complex to
evaluate and therefore this action may take a long time and efforts. So many managers prefer to neglect
them and just focus on the financial factors. They think that IT investment affects on their organization
and enhances productivity efficiency in situ. But indeed return on IT investment has a potential latency to
create value just because of these intangible factors. So it shows the importance of these criteria to have
an appropriate investment evaluation. The existence of the pre-defined criteria hierarchy model based on
the consensus of many specialist, can structured the decision making process systematically. Hence this
article proposed criteria list and model can significantly decrease times and efforts for managers and
organizations.
So in this paper, we first determine these tangible and intangible criteria and then categorize them in
different criteria and sub criteria. As a consequence, we give importance rank to them according to the
experiment of chief managers in Iran. Based on these ranking, at last we proposed the hierarchy model in
331
Shirin Nasher et al.
order to consider all these tangible and intangible criteria in IT investment evaluation. Note that since
there are many sub criteria and they may be changed from one IT evaluation to another, we try to
consider general criteria to create a generic model. So this proposed model is applicable and can be
easily expanded by aggregating new sub criteria to be customized for different IT investment evaluations.
Figure 3: Final hierarchy decision making model
References
Borenstein, D. and Baptista Betencourt, P. R. (2005) “A Multi-criteria Model for the Justification of IT Investments”,
INFOR Journal, Vol. 43, No. 1, Feb, pp. 1-21.
Chen, T., Zhang, J. and Lai, K. (2009) “An Integrated Real Options Evaluating Model for Information Technology
Projects under Multiple Risks”, International Journal of Project Management, Vol. 27, Issue 8, pp.776–786.
Epstein, M. and Rejc, A. (2004-2005) “Measuring the payoffs of IT investments”, CMA Management Journal, Vol. 78,
No. 8, pp. 20-25.
Goh, K.H. and Kauffman, R.J. (2005) “Towards a Theory of Value Latency for IT Investments”, Proceedings of the
38th Hawaii International Conference on System Sciences, pp. 1-9.
Goldstein, Ph., Katz, R.N. and Olson, M. (2003) Understanding the Value of IT, EDUCAUSE Quarterly magazine,
Number 3, pp. 14-18.
Henderson, J. and Venkatraman, N. (1990) Strategic Alignment: A model for Organizational transformation Via
information technology,
Joseph Wen, H., Yen, D.C. and Lin, B. (1998) “Methods for measuring information technology investment payoff”,
Human Systems Management Journal, Vol. 17, No. 2, January, pp. 145–153.
Kraemer, K. and Dedrick. J. (1994) “Payoffs from Investment in Information Technology: Lessons from the AsiaPacific Region”, World Development Journal, Vol. 22, No. 12, pp. 1921-1931.
Mahmood, M.A., Szewczak, E.J. (1999) Measuring Information Technology Investment Payoff: Contemporary
Approaches, Idea Group Publishing, London.
Parker, M.M. and Benson, R.J. (1988) Information Economics: linking business performance to information
technology, Prentice-Hall.
Renkema, Th. J.W. and Berghoutb, E.W. (1997) “Methodologies for information systems investment evaluation at the
proposal stage: a comparative review”, Information and Software Technology Journal, Vol. 39, Issue 1, pp. 113.
Schniederjans, M. and Hamaker, J. (2003) “A new strategic information technology investment model”, Management
Decision Journal, Vol. 41, No. 1, pp. 8-17.
Schniederjans, M.J., Hamaker, J.L. and Schniederjans, A.M. (2004) Information Technology Investment DecisionMaking Methodology, World Scientific Publishing Co., London.
Tuten, P. M. (2009) “A Model for the Evaluation of IS/IT Investments”, A dissertation submitted in partial fulfillment of
the requirements for the degree of Doctor of Philosophy in Information Systems, Graduate School of Computer
and Information Sciences Nova Southeastern University, USA.
Wu, L.C. and Ong, C.S. (2008) “Management of information technology investment: A framework based on a Real
Options and Mean–Variance theory perspective”, Technovation Journal, Vol. 28, Issue 3, March, pp. 122-134.
332
Waldo Rocha Flores received his B.Sc. in Business Administration and Economics from the Stockholm
University in 2007 and his M.Sc. in Electrical Engineering from the Royal Institute of Technology (KTH) in
Stockholm in 2008. He is now pursuing a Ph.D. in Industrial Information and Control Systems.
Wakari Gikenye, B.A. M.A. University of Nairobi, PGD University of Wales, is a Senior Librarian at the
University of Nairobi Library, Nairobi, Kenya, and a PhD Student at University of Zululand, South Africa. Has
recently presented papers on the diffusion of Information and Communication Technologies in the informal
sector in Kenya.
Amir Honarpour is currently a PhD. Student at Faculty of Management and Human Resource Development
(FPPMS) University Technology Malaysia. Amir graduated with a M.Sc. in system management in 2009.
After graduation, he worked in a project to help Design an integrated research system among Iran's
universities. His research interests include: Knowledge Management, Web-based Courseware Tools, Quality
Management and Research information Systems.
Sajid Iqbal received his Masters degree in computer science from University of Peshawar Pakistan.
Currently he is a research student at Department of computer science, university of Peshawar Pakistan. His
area of interest includes information security, relational database watermarking and data mining.
Sarmad Istephan is a Computer Science PhD student at Oakland University. His research focuses on the
storage and querying of Medical Images (e.g., MRI). In addition to being a PhD student, Istephan was a
Java/C# Software Engineer and currently is a Senior SQL Server Database Engineer at Quicken Loans.
Istephan eagerly awaits publishing more scientific papers in his field.
Tiko Iyamu is a Professor of Information Systems at the Tshwane University of Technology, Pretoria. His
research interests include Mobile Computing, Enterprise Architecture and Information Technology Strategy.
Theoretically, he focuses on Actor Network Theory (ANT) and Structuration Theory (ST). Iyamu is author of
numerous peer-reviewed journal and conference proceedings articles.
Veit Jahns has a German Diploma in Computer Science and works as a software developer and consultant
at the otris software AG in Dortmund, Germany. Additionally, he is finishing his Ph.D. thesis at the University
of Duisburg-Essen. His research interests are the all aspects of information systems interoperability, in
particular between information systems in public authorities.
Srimal Jayawardena obtained his BSc Engineering from the University of Peradeniya and BIT from the
University of Colombo School of Computing, both with first class honours. He has served in the Central Bank
of Sri Lanka as an Assistant Director/IT d and at the Information and Communication Technology Agency of
Sri Lanka as a Technology Specialist. He is currently a PhD candidate at the Australian National University.
Mehrdad Kalantarian is ITSM specialist of Infoamn CO., a consulting firm that provides services and
solutions for security, compliance & IT Management. He works with a professional team studying on IT fields
such as ITIL, ISMS, COBIT and Val IT. His experimental field is COBIT. He has M.S. degree in ICT
engineering and lives in Tehran.
Farnoosh Khodakarami has an MSc in Management from Queen’s School of Business, Queen's University,
Canada. Currently, she is working as a researcher at The Monieson Centre, Queen’s University. Her
research interests include customer relationship management, e-commerce, information systems and
knowledge management.
Ya-Ying Kuo is a master of Healthcare Information Management at National Chung Cheng University,
Chiayi, Taiwan. Her current research interests include hospital information systems and patient privacy.
Michael Kyobe is an associate Professor in the department of Information Systems, University of Cape
Town. He holds a PhD and an MBA. Prior to joining academia, Michael worked for over 15 years in the
public and private sectors in the IS and Computer forensics fields. His research include information security,
business alignment and KM
Mouhsine Lakhdissi is a Partner in a consulting firm specialized in IT Architecture. He received a Master
degree in Software Engineering in a leading engineering school in Morocco. He also served as Chief IT
Architecture in many companies with international exposure. His research interests include Enterprise
Architecture, IT Governance and processes and Software industrialization.
ix
Aron Larsson, Ph.D. in Computer and Systems Science and MBA. Senior lecturer and researcher at
Stockholm University and Mid Sweden University. Research interests include methods, procedures and
applications of computer based decision support, as well as risk and decision analysis. Research projects
include process models and methods for public decision making, landmine clearance activities, procurement
processes, and distributed artificial intelligence in wireless networks.
Chih-Yu Lin is a Doctoral Student in the MIS program at the National Chung Cheng University in Taiwan.
His current research interests include hospital information systems, knowledge management and decision
support system
Sizakele Untonette Mathaba has competed her degree in Bsc Information Systems (2007) honours degree
in Computer Science (2008) at the University of Zululand. In 2009, she joined CSIR (Council for Scientific
and Industrial Research) as an internship student. Currently, she is registered for her Masters degree in
Computer Science. She is working with the Internet of Things Engineering Group at CSIR (Meraka).
Fatemeh Mohammadi has a Ph.D in Educational management. Faculty member of Islamic Azad UniversityShiraz Branch, Iran.He is an inventor with 5 registered inventories. The author of 6 books and 24 essays
articles and papers with 12 presentations in National Conferences. Instructor of 38 educational terms for
faculty members and Theory builder of Human Information Life.
Siti Asma Mohammed is currently a PhD student at National University of Malaysia. She finished Masters of
IT specializing in Information Systems at University of Sydney, Australia. She worked as a Test Engineer for
one year and Assistant Lecturer in Information Systems for four years before pursuing PhD. Her research
interests are IS Evaluation and information quality.
Maryam Nakhoda is a PhD candidate in Library and Information Science (LIS) at University of Tehran,
faculty of Psychology and Education. She is the author of papers in Persian and English. Her research
interests include Information Technology (IT) application in academic libraries, library management, and
managing change in academic libraries.
Shirin Nasher is ITSM specialist of Infoamn CO., a consulting firm that provides services and solutions for
security, compliance & IT Management. She works with a professional team studying on IT fields such as
ITIL, ISMS and COBIT. Her experimental field is Val IT. She has M.S. degree in IT management and lives in
Tehran.
Mário Carrilho Negas is an assistant professor of management at the Open University (Portugal). He
received his Ph.D. in Management. His main research interests include the adoption of systems and
information technology in SMEs, strategic planning of information systems and management of Innovation.
Phathutshedzo Nemutanzhela is a Masters student at the Tshwane University of Technology. She has a
Baccalaureus Technologies (BTech): Information Technology (Informatics). Her principle research interest is
Competitive Intelligence and Information Systems.
Hesbon Nyagowa is a Ph.D student at the University of Zululand, South Africa specializing in Information
Studies. He obtained Master of Business and Administration specializing in Management Information
Systems at University of Nairobi Kenya in 2002. His Bachelor’s degree was in Education (Science) obtained
at Kenyatta University, Kenya in 1988. Is currently the Academic Registrar, Kenya Polytechnic University
College.
Jonathan Oni is a Post Graduate student and researcher at the Cape Peninsula University of Technology,
Cape Town, South Africa, with an interest in e-business. He holds a BSc Honors in Computer Science.
Jonathan consults for various Information Technology companies and involved in managing IT projects. He
is also a part-time lecturer at a higher educational institution.
Farnaz Rahimi is studying IT management in Alzahra University(MS degree) and work in contract
department in Mashhad Gas Company. Farnaz is interested in the field of "knowledge management" and
"implementing new IT technologies in organization"
Azhar Rauf received his doctorate degree in computer science from Colorado Technical University,
Colorado Springs CO, USA in 2007. Currently he is teaching as Assistant Professor at the Department of
Computer Science, University of Peshawar, Peshawar, Khyber Pakhtunkhwa, Pakistan. His areas of interest
include Relational Database Watermarking, Fine-Grained Security techniques in Relational Databases,
Encryption, Anonymity and Information Security.
x
Ari Riabacke, Ph.D. in Risk- and Decision Analysis (Computer Science), Head of Business Intelligence at
the largest Swedish Management and IT Consultant Company, also has a M.Sc. in Organizational Decision
Making, and is a member of the DECIDE Research Group at Stockholm University.
Martyn Roberts spent the first few years of his career in industry working in information systems, but
transferred to academia over 20 years ago. He is now Principal Lecturer at the University of Portsmouth. He
has taught various aspects of IS on a wide of programmes at both undergraduate and post graduate levels.
He has published mainly in the areas of strategic information systems and eCommerce.
Klaokanlaya Silachan works at the Computer technology department, Facultly of Science Nakorn pathom
Rajabhat University, Thailand. She is currently pursuing in computer information technology, Silpakorn
University,Thailand major in data mining, Health medical data, ontology. She received her master’s degree in
Information Management Technology from Mahidol University, Thailand, in 1998. She has publication in
national conference and international conference proceedings.
Ali Suzangar is a Chief System Officer of Infoamn CO., a consulting firm that provides services and
solutions for security, compliance & IT Management. He works with a professional team studying on IT fields
such as ITIL, ISMS and COBIT. His experimental field is Val IT. He has M.S. degree in IT management and
lives in Tehran.
Panjai Tantassanawong is currently pursuing his doctoral degree in Computer Science majoring in
networking and software engineering at AIT . He received his master’s degree in Computer science from
Chulalongkorn University, Thailand in 1992. He is Assistant Professional the Computing Program, Facultly
of Science, Silpakorn University, Thailand. He has publications in national and international conference
proceedings
Hsiao-Ting Tseng is a graduate student of Healthcare Information Management at National Chung Cheng
University, Chiayi, Taiwan. Her current research interests include patient privacy, electronic medical records
and exchange of medical images.
Ngozi Ukachi is a librarian at University of Lagos, and presently doing her PhD at University of Nigeria,
Nsukka. A member of International Federation of Library Associations (IFLA), American Library Association
(ALA) and, Nigerian Library Association (NLA). She was IFLA 2010 Essay Competition Award Winner
(organized by IFLA Academic and Research Section).
Chris Upfold is currently a lecturer in the Department of Information Systems at Rhodes University, South
Africa. He also teaches in the Rhodes Business School. His areas of interest and research are Information
Security, Radio Frequency Identification (RFID), Project Management, Virtual Teams and Corporate
Communications.
Huan Vo-Tran is a lecturer and the program director of the Bachelor of Business (Information and
Knowledge Management) within the School of Business IT & Logistics at RMIT University. He is currently
completing a PhD in business computing. Prior to becoming an academic he worked in various fields, which
included project management, systems analysis and high school teaching. His areas of interest include
information management and Web 2.0.
Harris Wang is an associate professor in the School of Computing and Information Systems at Athabasca
University, Canada. He received a PhD in computer science from the Australian National University,
Australia. His research interests include advanced technology for education, information systems and
information security.
Joseph Woodside is a Doctoral candidate in Information Systems at Cleveland State University, with
publications and research interests in topics of business intelligence, informatics, healthcare systems
integration, geo-spatial-temporal modeling, HIT adoption, machine learning, and object-oriented database
technology. Joseph is employed with KePRO, a national care management company, as the Director of
Healthcare Informatics and Business Intelligence.
Hossein Zadeh has taught undergraduate and postgraduate courses in Australia, Hong Kong, Vietnam,
Singapore, and Sweden. Hossein is the recipient of 2008 University Team Teaching Award and 2009
University Certificate of Achievement in innovative teaching. In 2004, Hossein was a visiting scholar at
Linkoping University, Sweden, and in 2009/2010, was a Distinguished Visiting Scholar at IBM Almaden
Research Labs, Silicon Valley (San Jose), USA. Hossein is the recipient of the prestigious 2010 IBM Faculty
Award.
xi
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.