This dissertation explores the organizational factors that influence alignment or misalignment between IT services strategy and corporate strategy. The author conducted a quantitative study using an online questionnaire to investigate 16 organizational factors and their impact. The results were analyzed to develop a framework for integrating and managing the factors to mitigate misalignment risks. The framework is intended to help organizations better align IT services with business strategic objectives.
This document analyzes the issue of low performance among consultants at CompanyX. It examines the external context including political, economic, social, technological, and environmental factors impacting the organization. Internally, it looks at stakeholders and culture, noting that the HR department lacks skills and training. The analysis suggests HR practices may be contributing to low consultant performance by not supporting line management effectively. Recommendations will be proposed to address this issue by improving HR processes and measuring the benefits.
This dissertation examines the factors that affect knowledge transfer about resources among assignment managers in a medium-sized management consultancy. The author conducted a literature review on knowledge transfer and competitive advantage. He then interviewed eight senior consultants to evaluate the applicability of the literature. The interviews found support for social networks being important for knowledge sharing and that electronic systems cannot fully convey contextual knowledge. The author was able to offer recommendations to improve knowledge sharing and identify areas for further study.
This document is a dissertation submitted by Zaid Adeogun to Sheffield Hallam University for the degree of Master of Science in Enterprise Systems Professional. The dissertation investigates the extent to which ontology and semantics in enterprise modelling is aided by LEADing Practice and Essential Project. It includes an acknowledgement, abstract, table of contents, and 5 chapters. Chapter 1 introduces the background and research question. Chapter 2 provides a literature review on relevant topics. Chapter 3 describes the research methodology of using case studies and interviews. Chapter 4 presents the case study findings. Chapter 5 concludes the research and objectives. The appendices include the research proposal, ethics checklist, interview questions, and requirements composition.
This report analyzes the current financial health of Japan Airlines (JAL) and evaluates options to prevent bankruptcy. The report was commissioned by JAL and sponsored by Japanese state-backed institutions. The aims are to identify the root causes of JAL's financial problems through research, and provide recommendations to eliminate causes and overcome problems. This includes increasing revenue, cutting costs, and improving competitiveness. The recommendations consider JAL's corporate strategy and address operational, resource allocation, and human resource issues. If successfully implemented, the recommendations could restore JAL's profitability and financial stability.
1. The consultancy report analyzes the bankruptcy of Japan Airline Ltd and provides recommendations for reorganization.
2. Root cause analysis using tools like fishbone diagrams and 5 whys identified high fixed costs, inefficient management, and lack of visionary leadership as contributing factors.
3. Literature on organizational distress phases and turnaround management informed the analysis. A matrix structure was recommended to improve adaptability compared to JAL's mechanistic structure.
Party World is a small business that provides party supplies and rentals out of its 12,000 square foot warehouse facility. The consulting report provides an industry analysis of the party supply and rental industry, a comprehensive marketing plan for Party World, and a succession plan to prepare for the future transfer of the business. The marketing plan utilizes several tools to analyze Party World's strengths, weaknesses, opportunities, and threats. It also provides recommendations to improve the business's website and social media presence. The succession plan offers options for keeping the business in the family or selling the business.
The document provides an abstract for a thesis about employer branding on social media. Specifically, it examines how 8 Finnish companies considered ideal employers by Universum portray their employer brands and target new talent through social media channels. The thesis uses qualitative content analysis to analyze the companies' websites and social media profiles. It aims to understand how these companies use social media to build their employer brands and reputations, the type of content they post, and how they appeal to new talent, particularly Generation Y. The abstract indicates the thesis will provide insight into how companies from different industries utilize social media for employer branding purposes.
Architecting the it governance plan slp assignment as a consultanaman341480
The document provides guidance for an assignment to analyze strategic issues and their impact on IT governance for a selected organization. Students are asked to identify and discuss two important strategic issues faced by the organization, and how consideration or lack of consideration of these issues has positively or negatively affected the organization. The document lists required reading materials on topics like IT governance, security, business continuity, data governance, and enterprise architecture to help inform the analysis.
This document analyzes the issue of low performance among consultants at CompanyX. It examines the external context including political, economic, social, technological, and environmental factors impacting the organization. Internally, it looks at stakeholders and culture, noting that the HR department lacks skills and training. The analysis suggests HR practices may be contributing to low consultant performance by not supporting line management effectively. Recommendations will be proposed to address this issue by improving HR processes and measuring the benefits.
This dissertation examines the factors that affect knowledge transfer about resources among assignment managers in a medium-sized management consultancy. The author conducted a literature review on knowledge transfer and competitive advantage. He then interviewed eight senior consultants to evaluate the applicability of the literature. The interviews found support for social networks being important for knowledge sharing and that electronic systems cannot fully convey contextual knowledge. The author was able to offer recommendations to improve knowledge sharing and identify areas for further study.
This document is a dissertation submitted by Zaid Adeogun to Sheffield Hallam University for the degree of Master of Science in Enterprise Systems Professional. The dissertation investigates the extent to which ontology and semantics in enterprise modelling is aided by LEADing Practice and Essential Project. It includes an acknowledgement, abstract, table of contents, and 5 chapters. Chapter 1 introduces the background and research question. Chapter 2 provides a literature review on relevant topics. Chapter 3 describes the research methodology of using case studies and interviews. Chapter 4 presents the case study findings. Chapter 5 concludes the research and objectives. The appendices include the research proposal, ethics checklist, interview questions, and requirements composition.
This report analyzes the current financial health of Japan Airlines (JAL) and evaluates options to prevent bankruptcy. The report was commissioned by JAL and sponsored by Japanese state-backed institutions. The aims are to identify the root causes of JAL's financial problems through research, and provide recommendations to eliminate causes and overcome problems. This includes increasing revenue, cutting costs, and improving competitiveness. The recommendations consider JAL's corporate strategy and address operational, resource allocation, and human resource issues. If successfully implemented, the recommendations could restore JAL's profitability and financial stability.
1. The consultancy report analyzes the bankruptcy of Japan Airline Ltd and provides recommendations for reorganization.
2. Root cause analysis using tools like fishbone diagrams and 5 whys identified high fixed costs, inefficient management, and lack of visionary leadership as contributing factors.
3. Literature on organizational distress phases and turnaround management informed the analysis. A matrix structure was recommended to improve adaptability compared to JAL's mechanistic structure.
Party World is a small business that provides party supplies and rentals out of its 12,000 square foot warehouse facility. The consulting report provides an industry analysis of the party supply and rental industry, a comprehensive marketing plan for Party World, and a succession plan to prepare for the future transfer of the business. The marketing plan utilizes several tools to analyze Party World's strengths, weaknesses, opportunities, and threats. It also provides recommendations to improve the business's website and social media presence. The succession plan offers options for keeping the business in the family or selling the business.
The document provides an abstract for a thesis about employer branding on social media. Specifically, it examines how 8 Finnish companies considered ideal employers by Universum portray their employer brands and target new talent through social media channels. The thesis uses qualitative content analysis to analyze the companies' websites and social media profiles. It aims to understand how these companies use social media to build their employer brands and reputations, the type of content they post, and how they appeal to new talent, particularly Generation Y. The abstract indicates the thesis will provide insight into how companies from different industries utilize social media for employer branding purposes.
Architecting the it governance plan slp assignment as a consultanaman341480
The document provides guidance for an assignment to analyze strategic issues and their impact on IT governance for a selected organization. Students are asked to identify and discuss two important strategic issues faced by the organization, and how consideration or lack of consideration of these issues has positively or negatively affected the organization. The document lists required reading materials on topics like IT governance, security, business continuity, data governance, and enterprise architecture to help inform the analysis.
The document is a training manual for T-SQL and MSBI training provided by Orane Intelli Solutions on June 7, 2016. It provides an overview of the company, upcoming events, recent achievements and work in progress. It also outlines the content, chapters and hours for various courses on T-SQL, SSRS, Qlikview basics, business dashboards, Access training and advanced Access programming. Other courses offered by the company include business intelligence, data warehousing, data analytics, business analysis and tools like MS Office, MS SQL Server, T-SQL, SSRS and Power BI.
Master Thesis proposal Agile TransformationHammad Saif
The motivation for this research project is twofold. First, the curiosity of learning and getting the knowledge about why more and more companies are moving towards becoming agile and secondly, how the agile practices and Manifestos can be aligned and implemented with the company objectives with effectiveness.
This document provides information about a Business Analytics and Intelligence certificate program offered by IIM Bangalore beginning on July 8, 2013. The program consists of 6 modules covering topics such as business statistics, predictive analytics, optimization, stochastic models, and advanced analytics. An optional SAS module is also available. The program is designed to provide in-depth knowledge of analytical techniques and tools for fact-based decision making. Participants will learn how to analyze data, use various models and software, and apply analytics across different business functions and industries. The fee for the residential program is Rs. 3,92,500 and for the non-residential program is Rs. 3,70,000.
This document provides an introduction and summary of the book "The Performance Manager". It discusses how the book builds on insights from "The Multidimensional Manager" published over 10 years ago. The introduction highlights that global competition has intensified the need for companies to have deep customer insights and focus on profitability. It also summarizes McKinsey research finding that competitive advantage is now hardest to achieve in industries involving complex "tacit" work rather than standardized transactions. The Performance Manager aims to provide lessons on how companies can better leverage information to support high-value decision-makers and deliver sustainable competitive advantages through higher revenue, lower costs, and optimized assets.
Research paper you research should be on equal employment oppoSHIVA101531
The grant proposal requests $20,000 to fund a curricular technology integration project at a networked charter school. The funds will be used to purchase 29 computer hardware units ($10,000) for classrooms and a computer lab. The remaining $10,000 will support software, staff development, technical support, and maintenance costs. The project aims to enhance student learning through improved access to technology resources and a more engaging teaching approach. It will be implemented over six months through hardware/software installation, staff training, and system configuration. Partnerships with government and private funders will provide the requested funding.
Section 1 describe the process (steps) you would use in any organizSHIVA101531
The document provides guidance on developing a business continuity and disaster recovery (BCDR) plan for an organization. It outlines a 7-step process for contingency planning including developing policies, conducting a business impact analysis, creating contingency strategies, and ensuring plan testing and maintenance. It also reviews the Texas A&M University disaster recovery plan and suggests improvements such as referencing continuity policies, describing critical processes, defining realistic recovery time objectives based on testing, specifying recovery point objectives based on criticality, defining the disaster recovery team structure, and including mitigation plans and alternative strategies.
Social Business in the Cloud: Achieving Measurable ResultsRawn Shah
As social technologies have evolved, they have increased in adoption across a wide spectrum of
businesses, industries, and geographies. Some organizations, usually with strong business and IT
alignment, are realizing that social technologies initiated for one business activity can spark innovative
uses in other areas. This insight creates motivation to widen the reach and adoption of these
investments. Unfortunately, this is not always the case; many organizations are still struggling with how
to justify social business investments in a way that reflects their actual business value. This inability to
quantify the business impact of social technology has become a key inhibitor to adoption.
The document provides an introduction to key concepts in the MBT (Masters of Business and Technology) program. It explains that the MBT integrates both business and technology because technological changes significantly influence how business is managed today. It defines business as creating and retaining satisfied customers or stakeholders, whether in commercial or non-commercial organizations. The document introduces concepts of corporate strategy, including Porter's Five Forces model and value chain. It also briefly discusses corporate governance and its importance. The overall aim is to give new MBT students a basic understanding of core theories that underpin the program's courses.
Latest news and developments relating to Business, Organisation, Team & Digital Transformation & Change for Q1 2021. Digital Transformation Pocketbook announced for April publishing.
This roadmap is a tool to help organizations effectively develop social business processes and to help identify and address potential issues before they become real problems.
This roadmap is a tool to help organizations effectively develop social business processes and to help identify and address potential issues before they become real problems.
The roadmap is designed as a framework – that is, it addresses a wide variety of issues and challenges, not all of which will be applicable to every organization. Organizations are encouraged to use this roadmap as a starting point, but to customize it to their particular circumstances including their regulatory environment, organizational culture, level of familiarity with different tools, and of course their overall strategic goals and objectives.
Organizations that follow this roadmap will move from tactical, ad hoc, and suboptimal approaches to social business technologies to a more strategic and systematic implementation.
Business and IT Alignment using ArchitectureSudhir Nilekar
White paper written when Architecture Function was in its infancy. The focus of the white paper is on Business -IT Alignment of Enterprise Architecture
The document discusses establishing architecture for large enterprise solutions in an agile environment. It notes that while agile approaches help deliver software faster, large complex systems still require upfront architecture and design work to avoid excessive rework. It recommends using architecture runway and architectural runways to plan architecture for 6-12 months and 18-24 months respectively, to guide iterative development. Architects work with product owners to refine architecture runways based on market changes and new requirements.
Running Header TECHNOLOGY AND BUSINESS .docxjeffsrosalyn
Running Header: TECHNOLOGY AND BUSINESS 1
TECHNOLOGY AND BUSINESS 7
Technology and Business
Casey Lee
American Public University
BUSN410: Critical Thinking for Business Decisions
01/17/2020
Introduction
The success of a business depends on many factors in the environment. The implication of the factors like technology is significantly dependent on the decision-making system used by the management. Among the many factors affecting the performance of business organizations, technology happens to be one of the main factors. There have been discussions for quite a long period of time investors, entrepreneurs and managers trying to examine the adverse implications the technology element has brought in the business (Blanco, 2016). It is quite true that technology has two sides in the business organizations. Despite the many reasons on the negative effects technology has brought in business, it is quite clear that the direction the effect takes is dependent on the decision-making systems on the technology and the implementation strategies.
Role of Decision-Making in Technology Effectiveness in Business
Technology and its related effects are timely issues in the business sector. The management and other stakeholders in the business world give technology key priority in the strategic formulations. Technology is one of the key elements the business organizations use to gain competitive advantage in the market and the industry. In as much as this element is so important and plays crucial role in ensuring the success of the business, decision making tool determines the direction it goes with its impacts. When the decision-making system is effective and sound, the implementation process of the technological strategies will work out effectively. So basically, when the decision-making process is well structured, the technology will prove to be effective and beneficial to the business.
There is need to have the right resources in the business organization that will facilitate the implementation of the technological needs and strategies. The resources are also needed to ensure the decision-making process is effective in the business organization. Technology is normally brought in to ensure that the business processes are enhanced, and the productivity improved. The benefits that technology comes with in business are so many and, in many occasions, they are quite challenging to install. The business management need to make sound decision and gather the right resources to initiate the implementation. The resources are needed in decision-making process which include the right personnel to make recommendations. In order for the technology to work out effective for the business, it is important to have the quality resources. The challenges like leakages in the systems and some information getting to t.
This document analyzes resource allocation processes at CompanyX. It finds issues with the current process, lack of systems perspective, and impact of demand fluctuations. The author recommends improving the resource allocation process through redesigning it, improving process technology, and redefining job design. An implementation plan is proposed to develop a business case, manage stakeholders, implement the project, manage risk, and measure improvements through critical success factors. The author reflects on how this systems approach influenced their thinking about management.
Guiding Principles for Enterprise "Bring Your Own Device" (BYOD) InitiativesHelena Sefcovicova
This document provides a literature review on Bring Your Own Device (BYOD) initiatives within organizations. It begins by defining IT consumerization and tracing its evolution, driven by factors like the rise of cloud computing and mobile devices. Surveys find BYOD programs for smartphones and tablets have been most widely implemented. Key adoption drivers include improving employee productivity and enabling mobile workforces. Organizations typically measure BYOD's impact on expenses like software licensing fees and device reimbursements. The review also examines implications for IT departments, as they must adapt to supporting uncontrolled consumer technologies on corporate networks. Overall, the literature establishes the context around BYOD and identifies common benefits, challenges, practices and considerations for implementing BYOD programs.
Martha Rogers’ Science of Unitary Human BeingsFOR THE THEORY CRI.docxtienboileau
Martha Rogers’ Science of Unitary Human Beings
FOR THE THEORY CRITIQUE of Martha Rogers’ Science of Unitary Human Beings
SUGGESTION: Get article/s which are CRITIQUES of the THEORY ASSIGNED TO YOU
CRITERIA
UNITS OF ANALYSIS
CRITIQUE ARTICLE NO. 1
(Author of Critique)
CRITIQUE ARTICLE NO. 2
(Author of Critique)
MY VIEWPOINT
(3.1) Relationship between
structure and function
(3.1.1) Clarity
(3.1.2) Consistency
(3.1.3) Simplicity / Complexity
(3.1.4) Tautology / Teleology
(3.2) Diagram of Theory
(3.2.1) Visual and Graphic Presentation
(3.2.2) Logical Representation
(3.2.3) Clarity
(3.3) Circle of Contagiousness
(3.3.1) Graphical origin of theory and geographical spread
(3.3.2) Influence of theorist versus theory
(4) Usefulness
(4.1) Practice
(4.1.1) Direction
(4.1.2) Applicability
(4.1.3) Generalizability
(4.1.4) Cost Effectiveness
(4.1.5) Relevance
(4.2) Research
(4.2.1) Consistency
(4.2.2) Testability
(4.2.3)
Predictability
(4.3) Education
(4.3.1) Philosophical Statement
(4.3.2) Objectives
(4.3.3) Concepts
(4.4) Administration
(4.4.1) Structure of Care
(4.4.2) Organization of Care
(4.4.3) Guidelines for Patient Care
(4.4.4) Patient Classification System
(5) External Components of Theory
(5.1) Personal Values
(5.1.1) Theorist implicit/explicit values
(5.2) Congruence with other professional values
(5.2.1) Comlementarity
(5.2.2) Esoterism
(5.2.3)
Competition
(5.3) Congruence with social values
(5.3.1) Beliefs
(5.3.2) Values
(5.3.3) Customs
(5.4) Social Significance
ISM 645 Mission, Vision, and Time Horizon Statement (MVTH)
Worksheet
The following information is provided to assist you in writing the Mission, Vision, and Time Horizon
Statements.
Writing the Mission Statement – Comparisons
The mission statement describes the purpose of the organization and the reason the business or business
unit exists. You will be creating an IT mission statement for the Acme Company. Review the article,
“Mission Statements.” Then, based on what you have learned, evaluate the mission statements of the
following service companies:
• Microsoft®
“At Microsoft, our mission and values are to help people and businesses throughout the
world realize their full potential.”
• Apple®
“Apple designs Macs, the best personal computers in the world, along with OS X, iLife, iWork
and professional software. Apple leads the digital music revolution with its iPods and iTunes
online store. Apple has reinvented the mobile phone with its revolutionary iPhone and App
store, and is defining the future of mobile media and computing devices with iPad.”
In your evaluation, consider the positive aspects as well as the shortfalls of the statements. Do your own
additional research on these companies and consider whether the company’s strategic approach aligns
with its mission statement.
Writing the Vision Statement – Comparisons
The vision statement describes the business o.
The document is a training manual for T-SQL and MSBI training provided by Orane Intelli Solutions on June 7, 2016. It provides an overview of the company, upcoming events, recent achievements and work in progress. It also outlines the content, chapters and hours for various courses on T-SQL, SSRS, Qlikview basics, business dashboards, Access training and advanced Access programming. Other courses offered by the company include business intelligence, data warehousing, data analytics, business analysis and tools like MS Office, MS SQL Server, T-SQL, SSRS and Power BI.
Master Thesis proposal Agile TransformationHammad Saif
The motivation for this research project is twofold. First, the curiosity of learning and getting the knowledge about why more and more companies are moving towards becoming agile and secondly, how the agile practices and Manifestos can be aligned and implemented with the company objectives with effectiveness.
This document provides information about a Business Analytics and Intelligence certificate program offered by IIM Bangalore beginning on July 8, 2013. The program consists of 6 modules covering topics such as business statistics, predictive analytics, optimization, stochastic models, and advanced analytics. An optional SAS module is also available. The program is designed to provide in-depth knowledge of analytical techniques and tools for fact-based decision making. Participants will learn how to analyze data, use various models and software, and apply analytics across different business functions and industries. The fee for the residential program is Rs. 3,92,500 and for the non-residential program is Rs. 3,70,000.
This document provides an introduction and summary of the book "The Performance Manager". It discusses how the book builds on insights from "The Multidimensional Manager" published over 10 years ago. The introduction highlights that global competition has intensified the need for companies to have deep customer insights and focus on profitability. It also summarizes McKinsey research finding that competitive advantage is now hardest to achieve in industries involving complex "tacit" work rather than standardized transactions. The Performance Manager aims to provide lessons on how companies can better leverage information to support high-value decision-makers and deliver sustainable competitive advantages through higher revenue, lower costs, and optimized assets.
Research paper you research should be on equal employment oppoSHIVA101531
The grant proposal requests $20,000 to fund a curricular technology integration project at a networked charter school. The funds will be used to purchase 29 computer hardware units ($10,000) for classrooms and a computer lab. The remaining $10,000 will support software, staff development, technical support, and maintenance costs. The project aims to enhance student learning through improved access to technology resources and a more engaging teaching approach. It will be implemented over six months through hardware/software installation, staff training, and system configuration. Partnerships with government and private funders will provide the requested funding.
Section 1 describe the process (steps) you would use in any organizSHIVA101531
The document provides guidance on developing a business continuity and disaster recovery (BCDR) plan for an organization. It outlines a 7-step process for contingency planning including developing policies, conducting a business impact analysis, creating contingency strategies, and ensuring plan testing and maintenance. It also reviews the Texas A&M University disaster recovery plan and suggests improvements such as referencing continuity policies, describing critical processes, defining realistic recovery time objectives based on testing, specifying recovery point objectives based on criticality, defining the disaster recovery team structure, and including mitigation plans and alternative strategies.
Social Business in the Cloud: Achieving Measurable ResultsRawn Shah
As social technologies have evolved, they have increased in adoption across a wide spectrum of
businesses, industries, and geographies. Some organizations, usually with strong business and IT
alignment, are realizing that social technologies initiated for one business activity can spark innovative
uses in other areas. This insight creates motivation to widen the reach and adoption of these
investments. Unfortunately, this is not always the case; many organizations are still struggling with how
to justify social business investments in a way that reflects their actual business value. This inability to
quantify the business impact of social technology has become a key inhibitor to adoption.
The document provides an introduction to key concepts in the MBT (Masters of Business and Technology) program. It explains that the MBT integrates both business and technology because technological changes significantly influence how business is managed today. It defines business as creating and retaining satisfied customers or stakeholders, whether in commercial or non-commercial organizations. The document introduces concepts of corporate strategy, including Porter's Five Forces model and value chain. It also briefly discusses corporate governance and its importance. The overall aim is to give new MBT students a basic understanding of core theories that underpin the program's courses.
Latest news and developments relating to Business, Organisation, Team & Digital Transformation & Change for Q1 2021. Digital Transformation Pocketbook announced for April publishing.
This roadmap is a tool to help organizations effectively develop social business processes and to help identify and address potential issues before they become real problems.
This roadmap is a tool to help organizations effectively develop social business processes and to help identify and address potential issues before they become real problems.
The roadmap is designed as a framework – that is, it addresses a wide variety of issues and challenges, not all of which will be applicable to every organization. Organizations are encouraged to use this roadmap as a starting point, but to customize it to their particular circumstances including their regulatory environment, organizational culture, level of familiarity with different tools, and of course their overall strategic goals and objectives.
Organizations that follow this roadmap will move from tactical, ad hoc, and suboptimal approaches to social business technologies to a more strategic and systematic implementation.
Business and IT Alignment using ArchitectureSudhir Nilekar
White paper written when Architecture Function was in its infancy. The focus of the white paper is on Business -IT Alignment of Enterprise Architecture
The document discusses establishing architecture for large enterprise solutions in an agile environment. It notes that while agile approaches help deliver software faster, large complex systems still require upfront architecture and design work to avoid excessive rework. It recommends using architecture runway and architectural runways to plan architecture for 6-12 months and 18-24 months respectively, to guide iterative development. Architects work with product owners to refine architecture runways based on market changes and new requirements.
Running Header TECHNOLOGY AND BUSINESS .docxjeffsrosalyn
Running Header: TECHNOLOGY AND BUSINESS 1
TECHNOLOGY AND BUSINESS 7
Technology and Business
Casey Lee
American Public University
BUSN410: Critical Thinking for Business Decisions
01/17/2020
Introduction
The success of a business depends on many factors in the environment. The implication of the factors like technology is significantly dependent on the decision-making system used by the management. Among the many factors affecting the performance of business organizations, technology happens to be one of the main factors. There have been discussions for quite a long period of time investors, entrepreneurs and managers trying to examine the adverse implications the technology element has brought in the business (Blanco, 2016). It is quite true that technology has two sides in the business organizations. Despite the many reasons on the negative effects technology has brought in business, it is quite clear that the direction the effect takes is dependent on the decision-making systems on the technology and the implementation strategies.
Role of Decision-Making in Technology Effectiveness in Business
Technology and its related effects are timely issues in the business sector. The management and other stakeholders in the business world give technology key priority in the strategic formulations. Technology is one of the key elements the business organizations use to gain competitive advantage in the market and the industry. In as much as this element is so important and plays crucial role in ensuring the success of the business, decision making tool determines the direction it goes with its impacts. When the decision-making system is effective and sound, the implementation process of the technological strategies will work out effectively. So basically, when the decision-making process is well structured, the technology will prove to be effective and beneficial to the business.
There is need to have the right resources in the business organization that will facilitate the implementation of the technological needs and strategies. The resources are also needed to ensure the decision-making process is effective in the business organization. Technology is normally brought in to ensure that the business processes are enhanced, and the productivity improved. The benefits that technology comes with in business are so many and, in many occasions, they are quite challenging to install. The business management need to make sound decision and gather the right resources to initiate the implementation. The resources are needed in decision-making process which include the right personnel to make recommendations. In order for the technology to work out effective for the business, it is important to have the quality resources. The challenges like leakages in the systems and some information getting to t.
This document analyzes resource allocation processes at CompanyX. It finds issues with the current process, lack of systems perspective, and impact of demand fluctuations. The author recommends improving the resource allocation process through redesigning it, improving process technology, and redefining job design. An implementation plan is proposed to develop a business case, manage stakeholders, implement the project, manage risk, and measure improvements through critical success factors. The author reflects on how this systems approach influenced their thinking about management.
Guiding Principles for Enterprise "Bring Your Own Device" (BYOD) InitiativesHelena Sefcovicova
This document provides a literature review on Bring Your Own Device (BYOD) initiatives within organizations. It begins by defining IT consumerization and tracing its evolution, driven by factors like the rise of cloud computing and mobile devices. Surveys find BYOD programs for smartphones and tablets have been most widely implemented. Key adoption drivers include improving employee productivity and enabling mobile workforces. Organizations typically measure BYOD's impact on expenses like software licensing fees and device reimbursements. The review also examines implications for IT departments, as they must adapt to supporting uncontrolled consumer technologies on corporate networks. Overall, the literature establishes the context around BYOD and identifies common benefits, challenges, practices and considerations for implementing BYOD programs.
Martha Rogers’ Science of Unitary Human BeingsFOR THE THEORY CRI.docxtienboileau
Martha Rogers’ Science of Unitary Human Beings
FOR THE THEORY CRITIQUE of Martha Rogers’ Science of Unitary Human Beings
SUGGESTION: Get article/s which are CRITIQUES of the THEORY ASSIGNED TO YOU
CRITERIA
UNITS OF ANALYSIS
CRITIQUE ARTICLE NO. 1
(Author of Critique)
CRITIQUE ARTICLE NO. 2
(Author of Critique)
MY VIEWPOINT
(3.1) Relationship between
structure and function
(3.1.1) Clarity
(3.1.2) Consistency
(3.1.3) Simplicity / Complexity
(3.1.4) Tautology / Teleology
(3.2) Diagram of Theory
(3.2.1) Visual and Graphic Presentation
(3.2.2) Logical Representation
(3.2.3) Clarity
(3.3) Circle of Contagiousness
(3.3.1) Graphical origin of theory and geographical spread
(3.3.2) Influence of theorist versus theory
(4) Usefulness
(4.1) Practice
(4.1.1) Direction
(4.1.2) Applicability
(4.1.3) Generalizability
(4.1.4) Cost Effectiveness
(4.1.5) Relevance
(4.2) Research
(4.2.1) Consistency
(4.2.2) Testability
(4.2.3)
Predictability
(4.3) Education
(4.3.1) Philosophical Statement
(4.3.2) Objectives
(4.3.3) Concepts
(4.4) Administration
(4.4.1) Structure of Care
(4.4.2) Organization of Care
(4.4.3) Guidelines for Patient Care
(4.4.4) Patient Classification System
(5) External Components of Theory
(5.1) Personal Values
(5.1.1) Theorist implicit/explicit values
(5.2) Congruence with other professional values
(5.2.1) Comlementarity
(5.2.2) Esoterism
(5.2.3)
Competition
(5.3) Congruence with social values
(5.3.1) Beliefs
(5.3.2) Values
(5.3.3) Customs
(5.4) Social Significance
ISM 645 Mission, Vision, and Time Horizon Statement (MVTH)
Worksheet
The following information is provided to assist you in writing the Mission, Vision, and Time Horizon
Statements.
Writing the Mission Statement – Comparisons
The mission statement describes the purpose of the organization and the reason the business or business
unit exists. You will be creating an IT mission statement for the Acme Company. Review the article,
“Mission Statements.” Then, based on what you have learned, evaluate the mission statements of the
following service companies:
• Microsoft®
“At Microsoft, our mission and values are to help people and businesses throughout the
world realize their full potential.”
• Apple®
“Apple designs Macs, the best personal computers in the world, along with OS X, iLife, iWork
and professional software. Apple leads the digital music revolution with its iPods and iTunes
online store. Apple has reinvented the mobile phone with its revolutionary iPhone and App
store, and is defining the future of mobile media and computing devices with iPad.”
In your evaluation, consider the positive aspects as well as the shortfalls of the statements. Do your own
additional research on these companies and consider whether the company’s strategic approach aligns
with its mission statement.
Writing the Vision Statement – Comparisons
The vision statement describes the business o.
This document provides an executive summary of a World Economic Forum white paper on digital transformation of industries and becoming a digital enterprise. The summary includes:
1) The white paper focuses on digital business models, digital operating models, digital talent and skills, and digital traction metrics that are important for companies to consider when undergoing a digital transformation.
2) It provides recommendations for companies, such as identifying and launching new digital business models, examining all aspects of operations, understanding and leveraging data, and establishing the right digital metrics.
3) It also includes questions for companies to consider in relation to these recommendations, such as evaluating strategic options, agility of approval processes, leveraging analytics, and ensuring cultural transformation.
This document introduces 13 digital papers by Declan Kavanagh on topics related to digital transformation. It provides short summaries of each paper, which address issues such as implementing social collaboration platforms, embedded systems as a growth market, creating digital advantage, assessing digital business maturity, and developing a digital transformation roadmap. Contact information is also provided for accessing the full papers and learning more about the author's related book and consulting services.
This document provides an overview and table of contents for a hospital management system project. The project aims to develop a computerized system for patient registration, storing patient details, computerized billing in the pharmacy and labs, and providing search capabilities. The system will assign a unique ID to each patient and store staff details. Users can search for patient and doctor availability and view patient details by ID. The system requires username and password login and can only be accessed and edited by administrators and receptionists.
The passage discusses organizational design and introduces nine tests that can be used to evaluate organizational design choices and their effectiveness. These nine tests proposed by Michael Goold and Andrew Campbell provide a rigorous framework for assessing organizational design decisions. The nine tests cut through the complexity of organizational design research and insights and provide a new approach to organizational design.
Technological Progress and Dealing With Clients In Consulting EnvironmentHabib Abou Saleh
This document discusses how disruptive technologies will change management consulting. It identifies mobile internet, automation, IoT, cloud computing and robotics as technologies that will significantly impact businesses. As these technologies provide clients new analytical capabilities, consulting firms will need to adopt new technologies to provide differentiated insights. Clients will also demand more specialized expertise. The rise of virtual work will change how consulting services are delivered and how clients and consultants interact. To survive, consulting firms will need to continually reinvent themselves by embracing new technologies, specializing expertise, standardizing prices, and adapting to virtual environments.
We offer ONLINE assignment help, final year project help, academic writing, game design/development and programming help for UK, US, Australia, middle east, etc.
What do we guarantee?
Quality GUARANTEED – All our works are well written by experienced Ph.D. doctors who are experts both in knowledge-wise and writing skills.
Unlimited Revision – Some works need continuous revision especially when it comes with referencing style, formatting, design tactics, animation, logo, essence of logic in coding and etc We will help you to accomplish your goal in any cause.
Before the deadline- Some works need in 24 hrs and some way below or above. Our experts are ready to deliver on time easily through their skill and interest.
Programming code with comments- All our coding works are done with extra effort and we don’t want our students to be in pain without the comments. So we will include all possible explanations.
Value for money- Due to time input and hard work the quality is really high. But at the same time payment is really minimal.
All experts are well trained and highly qualified- We only select our experts with a proven track record.
Specialized quality checking team to review each task before submission – We can’t compromise quality, so we provide immense care on it for satisfaction and scoring high grade.
No plagiarism guaranteed – We use premium software to re-check all the originality of the work so that students don't piss off later.
Excellent assignment help service worldwide for international students ONLINE .
please <a href=https://qualityassignmenthelp.com/project-upload/>UPLOAD your assignments here </a>
"Excellent assignment help service worldwide for international students ONLINE including US, UK, Australia, middle east etc.
please <a href=https://qualityassignmenthelp.com/project-upload/>UPLOAD your assignments here </a>
How does big data disrupt marketing : the modification of a marketer’s job Nicolas Suchaud
Companies have just started to understand the new approach of Big Data and its application on strategies. New competitors have grown on the market and they keep on offering new tools and solutions. Work of marketers has switched to a lot of intents and a lot of expectations for business growth. This thesis compiles the different fundamental approaches of the digital marketing strategies as well as the marketing analytics. It will review the data driven marketing changes which have been accelerated by the Big Data trends.
The methodology and results conducted in this study will provide us with instructions on the influencing factors and the determinism on the marketer job.
Similar to The organisational factors that influence the alignment or misalignment between IT services strategy and corporate strategy (20)
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...my Pandit
Dive into the steadfast world of the Taurus Zodiac Sign. Discover the grounded, stable, and logical nature of Taurus individuals, and explore their key personality traits, important dates, and horoscope insights. Learn how the determination and patience of the Taurus sign make them the rock-steady achievers and anchors of the zodiac.
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Tastemy Pandit
Know what your zodiac sign says about your taste in food! Explore how the 12 zodiac signs influence your culinary preferences with insights from MyPandit. Dive into astrology and flavors!
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfthesiliconleaders
In the recent edition, The 10 Most Influential Leaders Guiding Corporate Evolution, 2024, The Silicon Leaders magazine gladly features Dejan Štancer, President of the Global Chamber of Business Leaders (GCBL), along with other leaders.
Top mailing list providers in the USA.pptxJeremyPeirce1
Discover the top mailing list providers in the USA, offering targeted lists, segmentation, and analytics to optimize your marketing campaigns and drive engagement.
How MJ Global Leads the Packaging Industry.pdfMJ Global
MJ Global's success in staying ahead of the curve in the packaging industry is a testament to its dedication to innovation, sustainability, and customer-centricity. By embracing technological advancements, leading in eco-friendly solutions, collaborating with industry leaders, and adapting to evolving consumer preferences, MJ Global continues to set new standards in the packaging sector.
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...Aleksey Savkin
The Strategy Implementation System offers a structured approach to translating stakeholder needs into actionable strategies using high-level and low-level scorecards. It involves stakeholder analysis, strategy decomposition, adoption of strategic frameworks like Balanced Scorecard or OKR, and alignment of goals, initiatives, and KPIs.
Key Components:
- Stakeholder Analysis
- Strategy Decomposition
- Adoption of Business Frameworks
- Goal Setting
- Initiatives and Action Plans
- KPIs and Performance Metrics
- Learning and Adaptation
- Alignment and Cascading of Scorecards
Benefits:
- Systematic strategy formulation and execution.
- Framework flexibility and automation.
- Enhanced alignment and strategic focus across the organization.
The Genesis of BriansClub.cm Famous Dark WEb PlatformSabaaSudozai
BriansClub.cm, a famous platform on the dark web, has become one of the most infamous carding marketplaces, specializing in the sale of stolen credit card data.
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesHolger Mueller
Holger Mueller of Constellation Research shares his key takeaways from SAP's Sapphire confernece, held in Orlando, June 3rd till 5th 2024, in the Orange Convention Center.
SATTA MATKA SATTA FAST RESULT KALYAN TOP MATKA RESULT KALYAN SATTA MATKA FAST RESULT MILAN RATAN RAJDHANI MAIN BAZAR MATKA FAST TIPS RESULT MATKA CHART JODI CHART PANEL CHART FREE FIX GAME SATTAMATKA ! MATKA MOBI SATTA 143 spboss.in TOP NO1 RESULT FULL RATE MATKA ONLINE GAME PLAY BY APP SPBOSS
IMPACT Silver is a pure silver zinc producer with over $260 million in revenue since 2008 and a large 100% owned 210km Mexico land package - 2024 catalysts includes new 14% grade zinc Plomosas mine and 20,000m of fully funded exploration drilling.
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...APCO
The Radar reflects input from APCO’s teams located around the world. It distils a host of interconnected events and trends into insights to inform operational and strategic decisions. Issues covered in this edition include:
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf46adnanshahzad
How to Start Up a Company: A Step-by-Step Guide Starting a company is an exciting adventure that combines creativity, strategy, and hard work. It can seem overwhelming at first, but with the right guidance, anyone can transform a great idea into a successful business. Let's dive into how to start up a company, from the initial spark of an idea to securing funding and launching your startup.
Introduction
Have you ever dreamed of turning your innovative idea into a thriving business? Starting a company involves numerous steps and decisions, but don't worry—we're here to help. Whether you're exploring how to start a startup company or wondering how to start up a small business, this guide will walk you through the process, step by step.
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Final ank Satta Matka Dpbos Final ank Satta Matta Matka 143 Kalyan Matka Guessing Final Matka Final ank Today Matka 420 Satta Batta Satta 143 Kalyan Chart Main Bazar Chart vip Matka Guessing Dpboss 143 Guessing Kalyan night
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....Lacey Max
“After being the most listed dog breed in the United States for 31
years in a row, the Labrador Retriever has dropped to second place
in the American Kennel Club's annual survey of the country's most
popular canines. The French Bulldog is the new top dog in the
United States as of 2022. The stylish puppy has ascended the
rankings in rapid time despite having health concerns and limited
color choices.”
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
The organisational factors that influence the alignment or misalignment between IT services strategy and corporate strategy
1. Mohamed AbdelMoneim
Identify and explore the organisational factors
that influence the alignment or misalignment
between IT services strategy and corporate
strategy
University of Liverpool
Dissertation
Mohamed AbdelMoneim
2015
2. Mohamed AbdelMoneim
Identify and explore the organisational factors that influence the
alignment or misalignment between IT services strategy and corporate
strategy
University of Liverpool
Dissertation
Dissertation Advisor: Robin MacDonald
Student: Mohamed AbdelMoneim
Student ID: H00032445
2015
4. ACKNOWLEDGMENT
Thanks very much Dr. Robin MacDonald for his tremendous effort and help; without his
instruction, this dissertation would haven’t been in such comprehensiveness. Thanks a lot my
family, specially my parents, who supported me during the entire MBA programme.
5. ABSTRACT
Today, IT is no longer a collection of tools developed by programmers to deliver some
technical functions. However, IT became a strategic business enabler that drives today’s
organisations towards success. In other words, IT differentiates organisations and helps substation
competitive advantages. Hence, IT services & business strategies alignment is the key point that
organisations should implement to be agile, dynamic and innovative. In addition, IT shouldn’t be
considered as some technical tools that enable technical deliverables, however, IT is about
realising values and solutions that position organisations in today’s fierce competitions by
achieving the business strategic initiatives. In this very dissertation, the author addressed the
organisational factors that influence the alignment and/or misalignment between IT services and
business strategies. Put it another way, when IT services deliverables weren’t alignment with the
overall business strategic outcomes then IT services fail to realise the required value the business
planned for and IT investments will be see as overhead then questioned. The author, however,
investigated what are those factors that influence the alignment and/or misalignment, how those
factors influence the alignment and/or misalignment, how organisations can manage those factors
to mitigate the misalignment and achieve quality alignment, and finally the author provided some
recommendations on how those factors can be managed, optimised and controlled. The author
adopted a quantitative research methodology to conduct his research and investigation
crystallised by a list of questions published online to several industries and participants in form of
a digital questionnaire. The author found that there are 16 organisational factors that influence
the alignment between IT services and business strategies, and overlooking them leads to
misaligning IT services and business strategies, and potentially affects the business performance.
In return, the author presented a framework that integrates, manages and implements those
factors to help today’s organisations mitigate the risk of misaligning IT services and business
strategies and the author suggested a modern toolset that realise that framework so today’s
organisation can implement that framework.
6. TABLE OF CONTENTS
1. Chapter One: Introduction......................................................................................................................................... 8
1.1 Background ......................................................................................................................................................... 8
1.2 Context of the Problem....................................................................................................................................... 8
1.3 Statement of the Problem .................................................................................................................................. 9
1.4 Aims & Objectives............................................................................................................................................. 10
1.5 Significance of the Research ............................................................................................................................. 12
1.6 Research Overview ........................................................................................................................................... 12
1.7 Motivations behind the Research..................................................................................................................... 12
1.8 Chapter by Chapter........................................................................................................................................... 13
2. Chapter 2: Literature Review................................................................................................................................... 15
2.1 Introduction ...................................................................................................................................................... 15
2.2 Literatures Analysis........................................................................................................................................... 15
2.3 Summary........................................................................................................................................................... 24
3. Chapter 3: Research Methodologies........................................................................................................................ 27
3.1 Introduction ...................................................................................................................................................... 27
3.2 Management Research Methodologies............................................................................................................ 27
3.3 Research Methodology..................................................................................................................................... 28
3.4 Tools & Techniques........................................................................................................................................... 28
3.5 The Researcher Roles........................................................................................................................................ 29
3.6 Questionnaire Design........................................................................................................................................ 30
3.7 Participants & Industries................................................................................................................................... 34
3.8 Trustworthiness ................................................................................................................................................ 35
3.9 Data Analysis..................................................................................................................................................... 35
3.10 Summary ........................................................................................................................................................ 36
4. Chapter 4: Results & Analysis................................................................................................................................... 37
4.1 Introduction ...................................................................................................................................................... 37
4.2 Data Outlook..................................................................................................................................................... 37
4.3 Data Analytics ................................................................................................................................................... 44
4.4 Summary........................................................................................................................................................... 48
5. Chapter 5: Conclusion & Recommendation............................................................................................................. 49
5.1 Introduction ...................................................................................................................................................... 49
5.2 Conclusion......................................................................................................................................................... 49
5.3 Recommendation.............................................................................................................................................. 52
5.4 Summary........................................................................................................................................................... 54
6. References ............................................................................................................................................................... 56
7. Appendix A............................................................................................................................................................... 61
7.1 Introduction ...................................................................................................................................................... 61
7.2 Questionnaire Questions List............................................................................................................................ 61
8. Appendix B............................................................................................................................................................... 68
7. LIST OF FIGURES
Figure 2.2-1 Enterprise engineering and its architecture (Cuenca et al., 2011)...............................................................16
Figure 2.2-2 IT Strategy Components (Cuenca et al., 2011) .............................................................................................17
Figure 2.2-3 Portfolio Management Process (Long, 2012) ...............................................................................................17
Figure 2.2-4 Governance and Management bodies: Roles & responsibilities (Lainhart et al., 2012)...............................18
Figure 2.2-5 The 7 phases of implementation life cycle (Lainhart et al., 2012)................................................................19
Figure 2.2-6 ITIL Strategic Alignment Model (Kashanchi & Toland, 2006) .......................................................................20
Figure 2.2-7 Key Roles, Responsibilities and Relationships (Lainhart et al., 2012)...........................................................21
Figure 2.2-8 Enterprise Architecture – Modelling (Martin et al., 2009) ...........................................................................22
Figure 2.2-9 Goals Cascade (Lainhart, 2012) .................................................................................................................... 22
Figure 2.2-10 Business-IT Alignment (Trienkens et al., 2014)...........................................................................................23
Figure 2.3-1 Holistic Enterprise Alignment (Trienekens et al., 2014) ...............................................................................26
Figure 3.6-1 Questionnaire Core Factors (The Author, 2015) ..........................................................................................32
Figure 3.6-2 Meta-Architecture Design process (The Author, 2015)................................................................................33
Figure 3.10-1 Chapter 3 Elements (The Author, 2015).....................................................................................................36
Figure 4.2-1 Number of Employees (The Author, 2015)...................................................................................................37
Figure 4.2-2 Industries & Sectors (The Author, 2015) ......................................................................................................38
Figure 4.2-3 Process Maturity Levels (The Author, 2015) ................................................................................................39
Figure 4.2-4 Challenges in Creating Value of IT (The Author, 2015).................................................................................39
Figure 4.2-5 ISO/IEC Standards (The Author, 2015) ......................................................................................................... 40
Figure 4.2-6 Organisational Cultures (The Author, 2015).................................................................................................41
Figure 4.2-7 Financial Evaluation Tools (The Author, 2015).............................................................................................42
Figure 5.3-1 An Integrated Framework (The Author, 2015).............................................................................................52
Figure 5.3-2 Integration between different frameworks (Lainhart et al., 2012) ..............................................................54
Figure 5.4-1 ITIL & TOGAF Integration (Ermers et al., 2009) ............................................................................................55
Figure 7.2-1 Processes for Managemed of Enterprise IT (Lainhart et al., 2012) ..............................................................68
LIST OF TABLES
Table 1.4-1 Factors Matrix (The Author, 2015) ................................................................................................................ 11
Table 1.4-2 Factor Implications Matrix (The Author, 2015)..............................................................................................11
Table 3.2-1 Qualitative & Quantitative analysis (Bernard, 2011).....................................................................................28
Table 4.2-1 ITIL Service Strategy Processes (The Author, 2015).......................................................................................43
Table 4.2-2 ITIL Service Design Processes (The Author, 2015) .........................................................................................43
Table 4.2-3 ITIL Service Transition Processes (The Author, 2015)....................................................................................43
Table 4.2-4 ITIL Service Operations Processes (The Author, 2015) ..................................................................................43
Table 4.2-5 Service Operations Functions (The Author, 2015).........................................................................................43
Table 4.3-1 Summary of How Factors Align / Misalign IT services and business strategies (The Author, 2015)..............46
Table 4.3-2 Proposed Controls & Recommendations (The Author, 2015) .......................................................................47
8. Chapter 1: Introduction
Mohamed AbdelMoneim – University of Liverpool - 2015 8
1. Chapter One: Introduction
1.1 Background
The technology proved its vital role in any business model, for example, using the email
services and web-based applications was seen as the foundation of any business infrastructure. In
addition, the significant development and improvement that mobile phones embraced recently
introduced a new generation of smartphones, which were capable of utilising any sort of
technologies. For instance, money transfer and banking services don’t demand any physical
interaction with the bank agent. In addition, technology enabled many organisations to establish
worldwide operations, for example, cloud services and globalised operations centres blurred the
physical boundaries between continents and approached a diverse number of customers. Hence,
managing the technology within any business is no longer a trivial process, however, losing control
over technology and poorly managing it would certainly introduce pitfalls and setbacks.
The term technology is quite generic since it does contain several categories and practices; for
example, the microprocessors and communications industries are tightly coupled with different
kind of technologies that matter only in certain sectors. However, information technology (IT)
became the enabler that determines organisations performance and capabilities (Ho-Chang et al.,
2014). In light of the revolutionary development of services the originations offer to their
customers across the world, it is significantly important to adopt and implement very
sophisticated solutions that enable the organisations promoting the marketing practice to
confront the fierce competitions and introduce innovative services. Therefore, information
technology (IT) solutions brought a lot of new capabilities such as business intelligence, data
analytics and marketing intelligence that realised only when IT solutions are aligned with the
business strategies (Albescu & Pugna, 2014).
1.2 Context of the Problem
It is quite interesting to highlight and emphasise on the fact that IT solutions should realise
values to the business once implemented and deployed. Each business describes the value-added
in different terminologies and critical success factors (CSFs). However, the ultimate value-added to
any kind of business is the customer satisfaction since without that the business would straggle to
generate wealth to its stakeholders and eventually would run of customers (Setia et al., 2013). In
other words, IT solutions and services offer a diverse number of capabilities, however, adopting
those capabilities and services should address the business vision, goals, objectives and tactics in a
very cost-effective approach. IT solutions and services realise a significant number of values and
opportunities, however, the cost of IT should be aligned with the overall business budgets and
investment plans in order to achieve a win-win scenario where mutual benefits to customers and
business are realised (Jafari, 2014).
Furthermore, IT services became more strategically important to today’s business since they
enable the organisations to achieve competitive advantages in many different ways (Clemons &
Weber, 1990). Also IT services utilise the organisational resources in order to create new business
opportunities and support the operational activities (Clemons & Weber, 1990). Therefore, if IT
services and solutions fail to utilise organisations resources, create new opportunities and achieve
competitive advantages then the IT services and solutions will impede the organisations from any
further growth. Ultimately, this would risk the organisations performance and their market shares,
9. Chapter 1: Introduction
Mohamed AbdelMoneim – University of Liverpool - 2015 9
and introduce an unacceptable increase in the operational expense (OPEX), which will initiate the
‘fire fighting’ processes in order to reduce and control the OPEX. Consequently, that scenario
would lead to blocking any investments in the capital expenditure (CAPEX), customer satisfaction
programmes, business agility frameworks and quality of service improvements.
1.3 Statement of the Problem
Therefore, it’s worth mentioning that IT practice is no longer a function that today’s
organisations utilise to achieve the business visions and goals, however, IT services became a
strategic partner that enable the business to achieve operations efficiency and effective outcomes
(Drnevich & Croson, 2013). In other words, the strategic planning of IT investments and projects
should be implemented and considered as any business critical strategic planning disciplines
(Clemons & Weber, 1990). Although IT services capitalise on realising the strategic business
objectives and sound performance but there is a significant risk that IT solutions and services
aren’t aligned with the strategic business objectives (Otim et al., 2012). The misalignment
between IT solutions and business objectives and strategies could affect the business negatively,
for example, unjustified investments and costs without any tangible returns or profits.
The problem could expand behind the scope of just unjustified investments and costs, for
example, in banking industry the business objectives could be to introduce a secure online
transactions, anti-fraud systems, multi-authentication mechanisms that ensure the highest
protection against online hacking. Consequently, IT solutions and services must comply with those
critical business objectives to avoid any operational risks such as credit cards hacking (Thiel, 2008).
Ultimately, the extreme misalignment could put the entire business under a critical risk of losing
its reputation, customers trust and eventually being out of business. In addition, IT services and
solutions play a critical role in today’s healthcare systems, for example, patients’ records and
history, medical perceptions and treatments, and surgeries are all stored and maintained by
utilising IT services and solutions (Turan & Palvia, 2014). However, if IT services and solutions
failed to keep patients’ records consistent and available the patients’ lives could be in a severe risk
(Turan & Palvia, 2014).
Clemons & Weber (1990) discussed that IT services investments should be aligned with certain
criteria and aspects, for example, risk mitigation, cost-reduction, and resources optimisation and
value creation. Today’s IT solutions utilise a diverse number of organisations resources and assets,
for example, people, process and another technologies in order to sustain the business and
provide innovative and agile opportunities. However, without a control system, governance and IT
management system the IT services would significantly diverge from the main business strategic
plans and goals (Juiz & Toomey, 2015). In order words, IT services could introduce a digital
solution such as customer relationship management (CRM) package in order to satisfy a business
requirement, which could enhance the customer services. However, the IT solution mightn’t be
cost-effective, prone to security threats and privacy theft and very complex to deploy.
Thus the IT services instead of driving the business goals and objectives, they became an
obstacle and showstopper. Similarly, when IT services was introduced without incorporating the
strategic and long-term vision of the business, those solutions and services mightn’t be agile
enough to enable the business to grow and expand. For example, when IT services don’t adopt
loose-coupling, service oriented architecture (SOA) and building blocks mind-set, then the
business would be staggered and couldn’t approach any innovative solutions or opportunities. On
the other hand, beginning with the end in mind philosophy would address many critical elements
10. Chapter 1: Introduction
Mohamed AbdelMoneim – University of Liverpool - 2015 10
such as why, how, what and who questions that determine the answers for long-term strategic IT
solutions planning that enables the IT practice to be agile and dynamic rather than providing and
delivering one-off and on-spot solutions (Shirazi et al., 2009). Ultimately, that leads to
acknowledging the critical issue in today’s enterprises, which is the alignment or misalignment
between IT services and business strategies.
1.4 Aims & Objectives
Many organisations consider IT services investments difficult to be justified (Dos Santos, 1991).
Hence the problem of IT expenditures and costs come across the executives’ agenda and the fix
that most of executives would mandate is cutting IT costs and expenditures. Although there are a
number of models that enable IT executives to justify the expenditures and costs but the
relationship between IT services and business strategies might be blurred and not well defined,
which put the entire business in a significant risk. For example, an organisation could decide to
invest in a monitoring package, which measures the performance and availability key performance
indicators (KPIs) of its online website to sustain a certain level of customers satisfaction based on a
contractual service level agreement (SLA). However, the IT services strategy during the
implementation of that monitoring package fails to consider that business strategy even though
the monitoring package is technically implemented, which eventually would lead to breaching the
SLA and loosing the customers.
This phenomenon is critical since the misalignment between IT services and the business
strategy has a crucial number of implications, for example, financial risks and performance
degradation. Therefore, it became strategically important and critical to identifying and exploring
the organisational factors and drivers that influence the alignment or misalignment between IT
services and the business strategy to run, develop, and optimise the business. Once those factors
and drivers are identified then they need to be quarantined and diagnosed so that their scope of
influence will be examined. In other words, the factors and drivers that influence the alignment or
misalignment between IT services and business strategies wouldn’t have the same magnitude and
impact. Thus each factor or driver needs to be addressed and a level of critically or severity will be
assigned to it. Then mitigation plans would be formulated and articulated to address those factors
and drivers on different levels, for example, micromanagement of the very critical factors.
Hence, addressing the alignment or misalignment between IT services and business strategies
require a specific and to the point set of questions that elicit and identify the influencing factors.
The first question that comes in this process is:
• “What are the organisational factors that influence the alignment or misalignment between IT
services strategy and corporate strategy?”
This question will have a different number of factors and drivers that influence the alignment
or misalignment between IT services and business strategies. Thus, consolidating the findings into
a matrix would introduce a level of modularity and structured approach when addressing those
factors and drivers. For example, the matrix below will be beneficial to list the factors and drivers,
and correlate each of them to the corresponding module.
11. Chapter 1: Introduction
Mohamed AbdelMoneim – University of Liverpool - 2015 11
Table 1.4-1 Factors Matrix (The Author, 2015)
Factor / Driver
Align IT services and solutions
strategies, and business strategies
Misalign IT services and solutions
strategies, and business strategies
Once the alignment and/or misalignment matrix is completed, then the next process should
engage by asking the following question:
• “How do these organisational factors influence the alignment or misalignment between IT
services strategy and corporate strategy?”
Asking this question leads to understand the scope and dimension of each factor and driver. In
other words, once the factors and drivers are identified then the need to understand the scale and
the magnitude that each of those factors and drivers will affect the alignment or misalignment
between IT services and business strategies. For instance, if IT governance is identified as a factor
that aligns IT services and business strategies then this question scrutinises the ‘how’ element that
describes the actual alignment that IT governance will participate, for example, a corporate policy
defines the return on investment (ROI) on IT services by a certain percentage, otherwise those IT
services are not feasible. The matrix below helps capture the ‘how’ element and maps each factor
and driver accordingly.
Table 1.4-2 Factor Implications Matrix (The Author, 2015)
Factor / Driver How align or misalign IT services and solutions, and business strategies
After getting the full picture and understanding the factors and drivers that align and/or
misalign IT services and business strategies then the next critical question comes into the process
by addressing the question below:
• “How can these organisational factors be managed in order to improve the alignment between
IT services strategy and corporate strategy?”
The first two questions are the measuring and probing part and this question is the managing
part. This part consolidates all factors and drivers, and how they influence IT services and business
strategies alignment and/or misalignment into a managerial framework in order to control and
manage them so that organisations can work on improving the alignment between IT services and
business strategies. The management framework would consider the factors and drivers that align
IT services and business strategies and supports those factors and drivers. On the other hand, the
management framework would work on those factors and drivers that misalign IT services and
business strategies to mitigate their influence and eliminate them entirely. Thus, this part leads to
the final process throughout the following question:
• “What are the recommendations on how organisational factors can be managed in order to
improve the alignment between IT services strategy and corporate strategy?”
Ultimately, those recommendations would be the guidance that organisations could
implement to avoid any misalignment between IT services and business strategies or to enrich and
empower the alignment IT services and solutions, and business strategies.
12. Chapter 1: Introduction
Mohamed AbdelMoneim – University of Liverpool - 2015 12
1.5 Significance of the Research
The recommendations create the management framework that integrates other managerial
frameworks to address the alignment and/or misalignment between IT services and business
strategies. For example, if IT governance practice is absent or not functioning then COBIT 5
framework would be the starting point to address IT governance factor (Sakagawa & Yonekawa,
2014). In addition, the recommendations module introduces practical suggestions and solutions
that enable a holistic approach to align IT services and business strategies, for example, integrating
ISO/IEC 20K service management framework and other IT service management frameworks.
Finally, there would be some recommendations regarding IT financial management, cost effective,
agility and adopting different business models such as outsourcing to sustain and maintain the
alignment between IT services and business strategies.
1.6 Research Overview
There is a diverse number of data sources and information that the author utilised to construct
this research, and it is very important to identify the data collection methodology and approach,
which allowed the author to focus on those defined techniques. Data gathering approaches are
categorised into two main mainstreams, which are qualitative and quantitative data sources
(Easterby-Smith et al., 2012). In nutshell, quantitative data sources depend on population of data
collected then apply sampling techniques, which then produce statistical figures regarding the
research topic. On the other hand, qualitative data gathering demands interviews, observations
and surveys or questionnaires as sources of data. In this very research, the author adopted the
qualitative data source and, in particular, the observation approach. Once the data is collected
throughout the observation, then the author conducted a deep analysis about how the observed
organisations manage the IT strategies and align them to the business strategies. Afterwards,
finding the gaps and pitfalls according to today’s standards and frameworks were carried out.
The observation process conducts several questionnaires in order to explore the implemented
processes, the maturity of those processes, the actual execution of the processes, the
understanding of the processes, for example, the questionnaires addressed if the processes were
executed or not, communicated clearly and documented. In addition, the efficiency and
effectiveness of those processes were examined throughout the questionnaires. In addition,
eliciting how IT operations teams and IT managers understood the overall corporate strategies and
how IT should benefit the organisation is mandatory since the lack of understanding could result in
‘just do the job’ attitude, which might affect the overall organisation negatively. In other words,
observing how the IT and business strategies are communicated top-down will reflect how the
operations align the IT and business strategies bottom-up. The captured processes, practices,
behaviours, norms, strategies and execution plans then should be analysed according to today’s
world-class frameworks and standards to find out the gaps between how IT services and business
strategies.
1.7 Motivations behind the Research
It is worth mentioning that the author engaged in many of IT services projects, which means
that the author had a real-life experience in the IT services field. However, the end results of those
IT services projects weren’t the same since there were projects that failed and others that
succeeded. The author didn’t explicitly mean the technical deliverables of the projects; however,
the author went deeper and analysed the value-added to the business after all as a measuring
13. Chapter 1: Introduction
Mohamed AbdelMoneim – University of Liverpool - 2015 13
criteria. For example, some projects weren’t alignment with business objectives and goals because
the business users weren’t satisfied, and others were just kind of investments to utilise the
available IT department budgets without any solid and profound business value realisation, which
were indications of a huge misalignment between IT and business.
Although there is a lot of IT frameworks that drive IT services and solutions projects to be
aligned with business strategies but there weren’t effectively implemented. Hence, the author
decided to identify and explore the factors that influence the alignment or misalignment between
IT services and business strategies. The author wanted to understand in a greater depth and
details why the alignment or misalignment problem happened even through any organisation
could adopt a cohesive roadmap to work on IT services and business strategies alignment by
utilising IT service management best practices and frameworks. In addition, the author targeted to
find out why some organisations work in silos rather than adopting an integrated and structured
processes, which will enable a solid communication flow between IT services and business
strategies.
1.8 Chapter by Chapter
By this we reach the end of Chapter One: Introduction, which covered the areas of:
Background of technology and information technology (IT) in particular, Context of the Problem
and how the alignment or misalignment between IT services and business strategies is a critical
when organisations come to make decisions about IT investments and their implications on the
business performance, Statement of the Problem, which explained the problem in more details,
Aims & Objectives behind the research and what are the questions the author conducted the
research to find out the missing part between IT services and business strategies alignment
process, and the author completed this chapter by highlighting the Significance of the Research,
Overview of the Research, and the Motivation behind the Research.
In Chapter 2: Literature Review, the author examined the literatures that were relevant and
related to identifying and exploring the organisational factors that influence the alignment or
misalignment between IT services and business strategies. The author analysed the materials and
the information written and presented some views and ideas regarding the studied literatures. In
other words, the author worked on those literatures and evaluated how those literatures and the
previous work products helped or didn’t help in identifying and exploring the organisational
factors that influence the alignment or misalignment between IT services and business strategies.
Chapter 3: Methodology is about how the author conducted the research. The main objective of
Chapter 3 is to explain the ways that the author answered the questions, which are listed in
Chapter 1 section 1.4 Aims & Objectives. It also covered the techniques that the author adopted to
collect the required information and data.
Next, Chapter 4: Results & Analysis is about describing and examining the results. The author
scrutinised the date, analysed the findings and presented conclusions and his own perspectives
about the results. The analysis examined also if the questions that are listed in Chapter 1 section
1.4 Aims & Objectives were answered or not, and why. In case if those questions are answered
then the author built upon the answers a practical guidance that would be ready for
implementation in real life. This research ended by Chapter 5: Conclusions and Recommendations,
which summarised the effort done throughout the research and literatures reviews outcome. In
addition, the final chapter reflected on the author experience throughout the research, for
example, what the author personally gained from the research, what the author saw as the
14. Chapter 1: Introduction
Mohamed AbdelMoneim – University of Liverpool - 2015 14
limitations to what he did, and how the author would have done the work differently if the author
was to undertake it again.
“Give me six hours to chop down a tree and I will spend the first four sharpening the axe”
Abraham Lincoln.
15. Chapter 2: Literature Review
Mohamed AbdelMoneim – University of Liverpool - 2015 15
2. Chapter 2: Literature Review
2.1 Introduction
Information technology (IT) services were around for several decades and we witnessed a
number of improvements during those decades, for example, the fast growing of the Internet,
mobile, wireless communication and fingerprint authentication (Lientz & Larssen, 2004). In
addition, a lot of organisations adopted IT services rapidly to realise tangible benefits to their
business and customers. Despite of the varieties of the available new IT services, around 40% of
those IT services fail to deliver tangible benefits to the business (Lientz & Larssen, 2004). The
alignment between IT services and business strategies was studied and analysed for more than a
decade until now, however, it still frustrates business executives even after multiple approaches
to model IT and business strategies (Tallon, 2007). In this chapter, the author examined the
literatures that are related to the alignment between IT services and business strategies.
2.2 Literatures Analysis
There are a significant number of work products that addressed the alignment between IT
services & business strategies to elicit those factors that influence the alignment or misalignment
dilemma (Cuenca et al., 2011). One of them is the enterprise engineering (EE) approach that
facilitated a formal dialog in enterprise design (Cuenca et al., 2011). EE utilises enterprise
architecture (EA) frameworks to integrate IT and business domains using a common enterprise
modelling (EM), which enables the organisation to identify the current state ‘as-is’, the desired
state ‘to-be’ and the gap between the two states (Cuenca et al., 2011). Once the gap is analysed
then the organisation will be able to articulate a strategic roadmap to align IT and business
strategies. According to Cuenca et al. (2011), there are two pivotal factors that influence the
alignment between IT services and business strategies, which are external and internal factors.
The external factors are business and IT strategies. The internal factors are the organisation’s
infrastructure and processes, and IT infrastructure and process (Cuenca et al., 2011).
16. Chapter 2: Literature Review
Mohamed AbdelMoneim – University of Liverpool - 2015 16
Figure 2.2-1 Enterprise engineering and its architecture (Cuenca et al., 2011)
According to Cuenca et al. (2011) the alignment between IT services and business strategies
wouldn’t be fully achieved using the EE approach since the EA such as The Open Group
Architecture Framework (TOGAF) and Zachman don’t define how to align, what to align, and the
life-cycle phases that could define the IT strategy. In addition, the enterprise modelling (EM)
reference architectures poorly define the IT strategy and its key components (Cuenca et al., 2011).
Therefore, the poor definition of IT strategy including all its aspects and components leads to the
misalignment between IT services and business strategies since the organisation would not have
any guidelines about what to align between IT and business strategies. Thus Cuenca et al. (2011)
introduced a set of new components that define IT strategy and then those components are used
to develop new building blocks in order to be used when aligning IT and business strategies.
According to Cuenca et al. (2011) IT strategy components should be: technology scope, capability
and skills, IT governance, portfolio, alignment maturity model, and data strategy.
Technology scope defines the strategic technologies that could be in line with the business
strategies to support them or could create new strategic opportunities in the future, for example,
cloud services and data analytics (Cuenca et al., 2011). The capability and skills component defines
the required competencies that could participate in creating new business strategies or support
the existing ones (Cuenca et al., 2011). As for the IT governance component, it implements the
required governance over IT strategies to keep them aligned with the business strategies (Cuenca
et al., 2011). They described the portfolio component as the collection of projects and
programmes that enable the business strategic objectives. For the maturity model component, it
assesses the maturity of the alignment between IT and business strategies (Cuenca et al., 2011).
Finally, data strategy component handles the information life cycle within organisations, for
example, creation, protection, storage and security.
17. Chapter 2: Literature Review
Mohamed AbdelMoneim – University of Liverpool - 2015 17
Figure 2.2-2 IT Strategy Components (Cuenca et al., 2011)
Although Cuenca et al. (2011) provided a greater insight about IT strategy articulation,
however, it lacked a lot of substantial details. Firstly, the portfolio component wasn’t defined by
any means since portfolio management didn’t consider projects and programmes only, however,
portfolio management includes: applications portfolio, market space the business operates in,
customers portfolio, which the business covers, planned IT projects, existing IT services, retiring IT
services, IT services catalogues and IT services pipelines (Long, 2012). The poor definition of
portfolio component would affect the entire IT strategy (Long, 2012). In addition, technology
scope wasn’t defined in terms of cost & benefits analysis; for example, technologies don’t come
free of charge or risks. The financial management for technology wasn’t included in Cuenca et al.
(2011) model. Critically important topics such as enterprise financial management, outsourcing,
internal or external funding, net present value (NPV) and other financial evaluation processes
were’t mentioned, which makes the implementation of those components difficult.
Figure 2.2-3 Portfolio Management Process (Long, 2012)
The outcome of Cuenca et al. (2011) proposal didn’t address the critical success factors (CSFs)
that IT strategy should achieve to be aligned with the business strategy, for example, cost
reduction, standardised processes, sustain repeatable service levels, risk control, and gain
competitive advantages (Beveridge, 2006). Also, the IT strategy life cycle proposed by Cuenca et
al. (2011) didn’t include continual service improvement (CSI) process, which is a key process to
enable the business agility and cope with the diverse number of challenges that the business has
to confront (Long, 2012). The author saw that there are insufficient execution techniques in
18. Chapter 2: Literature Review
Mohamed AbdelMoneim – University of Liverpool - 2015 18
Cuenca et al. (2011) proposal since the IT strategy has to be realised and the transition phase
between the planning and the operation is significantly vital. Hence the proposal introduced
another factor that could lead to a substantial misalignment between IT services and business
strategy. Therefore, Cuenca et al. (2011) identified one factor, which is the poor definition of IT
strategy and its implications, and the author identified the impractically of implementing the
proposal.
Rotim & Komnenić (2011) explained additional factors that Cuenca et al. (2011) didn’t address
while articulating and formulating the IT strategy, which are: the involvement, commitment and
support of the top management, availability of a business strategy, and the vital role of business
analysis before adopting a certain technology (Rotim & Komnenić, 2011). That is, top management
and executives commitment is one of those factors that influence the alignment between IT
services and business strategy. Without the commitment of the top management and the
executives supported by a reliable balanced scorecard (BSC) and solid IT governance framework,
the organisations wouldn’t have the controls about IT investments that ensure detections of
wrong directions and activities, which aren’t aligned with the business strategies (Rotim &
Komnenić, 2011).
Figure 2.2-4 Governance and Management bodies: Roles & responsibilities (Lainhart et al., 2012)
Rotim & Komnenić (2011) adopted a set of COBIT processes, IT BSC and SWOT analysis to
develop an alignment model to clearly define IT strategies and apply key controls. However, the
author argued that the model didn’t identify clearly the roles and responsibilities of the
governance and management bodies respectively (Lainhart et al., 2012). For instance, the
development of IT BSC wasn’t assigned to a certain body, and the following up and evaluation
actions items weren’t determined. According to Lainhart et al. (2012), there is a separation
between the governance and the management bodies as shown in Fig 2.2-4. In addition, Rotim &
Komnenić (2011) model overlooked entirely the vital role of strategy implementation approaches,
for example, bold strokes or long march (Backham, 2008). Consequently, the model didn’t discuss
the resistance and change management due to the implementation of a new strategy. The author
suggested that integrating change & programme management techniques would ensure the
successful implementation of the defined strategies, Fig 2.2-5.
Although Rotim & Komnenić (2011) model mentioned the vital role of enterprise architecture
methodologies but the author saw a substantial insufficient integration with COBIT or ITIL. In other
words, Rotim & Komnenić (2011) didn’t introduce the concept of analysing the current business
state ‘as-is’, articulate and envision the future state ‘to-be’, and find the gaps between the two
19. Chapter 2: Literature Review
Mohamed AbdelMoneim – University of Liverpool - 2015 19
architectures to develop a solid roadmap and feasible IT strategy in line with the business strategy
(Gregor et al., 2007). Rotim & Komnenić (2011) identified a critical component in IT and business
strategies development, which is the business analysis practice that handles the business
requirements. However, Rotim & Komnenić (2011) model had no clear process that manages the
requirements management and business analysis practice. Also, TOGAF framework integrates
tightly with requirements management and business analysis practice but Rotim & Komnenić
(2011) didn’t incorporate TOGAF or other framework as an enterprise architecture framework.
Figure 2.2-5 The 7 phases of implementation life cycle (Lainhart et al., 2012)
Kashanchi & Toland (2006) adopted the Strategic Alignment Model (SAM) and worked on the
Information Systems (IS) processes quadrant so that ITIL framework would fit into it and bridges
the gap between IT services and business strategies Fig 2.2-6. The participation of ITIL provides IT
infrastructure guidance about how Information Systems (IS) processes deal with the configuration
of software, hardware, communication and data architectures (Kashanchi & Toland, 2006). In
addition, ITIL processes enable the IT organisations to design and execute business strategies
(Kashanchi & Toland, 2006). The integration between ITIL framework and Strategic Alignment
Model (SAM) enables the IT organisations to develop the required skills to engage with the
business units and formulate a cohesive managerial and operational mind-set (Kashanchi &
Toland, 2006). However, the author argued that the proposed model lacks very crucial elements.
ITIL and Strategic Alignment Model (SAM) integration model didn’t consider the enterprise
architecture end-to-end (Bernard, 2012).
The author argued that Kashanchi & Toland (2006) approach didn’t consider strategy,
business, and technology integration and think about the enterprise holistically. Instead,
Kashanchi & Toland (2006) focused mainly on a single quadrant and overlooked IT strategy,
business strategy, and organisational infrastructure and processes quadrants. That is, the
enterprise wouldn’t be able to address its 'as-is’ state, ‘to-be’ state and find out the gaps between
the two states, which will enable the enterprise to align IT services and business strategies
(Bernard, 2012). Kashanchi & Toland (2006) model didn’t incorporate ITIL as an IT governance
framework (Nabiollahi & bin Sahibuddin, 2008), which introduced a significant risk of misaligning
IT services and business strategies (Lainhart, 2012). Additionally, the author argued that the
interfaces between IT and business to work collaboratively and consistently weren’t introduced as
part of ITIL, for example, Business Relationship Management (BRM), demand management and
financial management processes (Nabiollahi & bin Sahibuddin, 2008).
20. Chapter 2: Literature Review
Mohamed AbdelMoneim – University of Liverpool - 2015 20
Figure 2.2-6 ITIL Strategic Alignment Model (Kashanchi & Toland, 2006)
Holland & Skarke (2008) identified a critical organisational factor that influences the alignment
between IT services and business strategies, which is the importance of envisioning the IT
initiatives as business projects enabled by IT project (BPITs) and not as only IT projects. This
approach is a significant paradigm shift and mandates a solid redefinition of executives’ roles and
responsibilities (Holland & Skarke, 2008). In addition, BPITs proposal suggested reengineering the
IT organisation structure to adhering to Run the Business (RTB), Grow the Business (GTB), Change
the Business (CTB), and Transform the Business (TTB) processes (Holland & Skarke, 2008). Thus
Holland & Skarke (2008) articulated a 4 steps model to enable a cohesive IT-business alignment.
First, preparing the IT organisation for the alignment, which means the readiness to accept the
changes, adopt innovative solutions, and mitigate risks (Holland & Skarke, 2008). Secondly, senior
executives should be accountable for the IT-business alignment initiative by assigning roles and
responsibilities to them and involve them in that project (Holland & Skarke, 2008).
Thirdly, leadership and how this paradigm shift requires innovative and visionary leaders to
enable this initiative (Holland & Skarke, 2008). Finally, senior executive should advocate and
support the IT-business alignment initiative (Holland & Skarke, 2008). In principle, Holland &
Skarke (2008) model seemed to be unique since they addressed the IT services and business
strategies alignment dilemma through a top-down approach, however, the author argued that
some substantial components were missing, specially when addressing the roles and
responsibilities for senior executives, Fig 2.2-7 is an example (Van Grembergen et al., 2003). The
model provided by Holland & Skarke (2008) isn’t practically implementable because it lacks the
measurement component and how the Balanced Scorecard is tremendously vital to enable senior
executives aligning IT services and business strategies (Van Grembergen et al., 2003). In addition,
preparing the IT services to align with business strategies without a solid and very well established
configuration management (CM) practice and configuration management database (CMDB) would
harm the project drastically (Nagendra et al., 2013).
21. Chapter 2: Literature Review
Mohamed AbdelMoneim – University of Liverpool - 2015 21
Figure 2.2-7 Key Roles, Responsibilities and Relationships (Lainhart et al., 2012)
Holland & Skarke (2008) model didn’t mention the critical and vital role of governance and
how a consistent government model should overarch the IT services to be aligned with business
strategies (Lainhart et al., 2012). In addition, the author saw that project portfolio management
process wasn’t positioned within Holland & Skarke (2008), which drastically leads to the
misalignment between IT services and business strategies (Murer et al., 2011). Holland & Skarke
(2008) suggested preparing the IT organisation, however, they didn’t discuss any organisational
structures, for example, Service Provider Type 1, Type 2 or Type 3 (Cannon, 2011). The author
commented on the 4 steps model and argued that the IT strategy definition and articulation
weren’t disused, for example, every organisation should have IT strategy, IT service strategy, and
IT service management strategy, which define the IT strategic goals in line with the business goals,
design how IT services should realise values to business services, and develop how IT services are
managed and maintained in order to support the business operations respectively (Cannon, 2011).
Luftman & Brier (1999) identified a set of factors that inhibit the alignment between IT services
and business strategy, which are: IT and business lack close relationship, IT management doesn’t
demonstrate leadership, IT and business don’t understand each other, IT can’t commit on
projects, senior executives don’t support IT, and IT fails to prioritise projects (Luftman & Brier,
1999). They created a list of factors that enable the alignment between IT services and business
strategy, which are the opposite of the inhibitors (Luftman & Brier, 1999). It is worth mentioning
that Luftman & Brier (1999) crystallised an approach that considered IT and business strategic
alignment as a process and it has 6 steps, which are: setting the goals and establishing teams,
understanding the business and IT relationship, analysing and prioritising any gaps between IT and
business, determining the required actions and implementing a solid project management
practice, choosing and evaluating critical success factors (CSFs), and finally sustain the alignment
(Luftman & Brier, 1999).
The problem that the author found about this approach is the order of the steps. Practically, it
is unrealistic to set goals without understanding the relationship between IT and business, for
example, building an enterprise architecture that models the business services and IT solutions
would help IT and business understand the relationship and dependencies between each other Fig
2.2-8 (Bernard, 2012). Once the IT solutions and business services are modelled, then senior
executives would gain a deeper understanding of how IT solutions affect the business and where
the misalignment happens (Martin et al., 2009). This leads to the next step, which is carrying out
the gap analysis between the current model ‘as-is’ and the future model ‘to-be’ in order to align IT
services with business strategy such as reduce cost and increase customer (Martin et al., 2009).
Accordingly, the goals would be very well defined and the corresponding team should be
established in order to work on a strategic roadmap that fulfils the business requirements and
support the initiative, which has Chief Information Officer (CIO), Chief Architect and Architecture
board (Martin et al., 2009).
22. Chapter 2: Literature Review
Mohamed AbdelMoneim – University of Liverpool - 2015 22
Figure 2.2-8 Enterprise Architecture – Modelling (Martin et al., 2009)
The authors claimed that defining the critical success factors (CSFs) and key performance
indicators (KPIs) should be defined before embarking the implementation project by establishing a
service portfolio management practice, which assesses and evaluates the feasibility of any IT
project and how this project is inline with the overall business strategy (Cannon, 2011). That is, the
project management office (PMO) should be established with a clear scope of work and defined
objectives of the entire project. Luftman & Brier (1999) didn’t address the importance of
governance practice to overarch the implementation and control any divergence that could
happen (Cannon, 2011). Once the implementation is complete, a continual service improvement
(CSI) practice should be established in order to keep IT services innovative and inline with the
business strategy (Cannon, 2011). In order to sustain the alignment, a goal-based approach should
be adopted, for example, any new initiative should be linked to the entire organisation goals and
track the value ‘end-to-end’ that initiative would realise, see Fig 2.2-9 (Lainhart, 2012).
Figure 2.2-9 Goals Cascade (Lainhart, 2012)
Sandkuhl et al. (2014) claimed IT-business alignment should embrace and revamp the business
capabilities. Thus today’s organisations should consider the business services that deliver values to
23. Chapter 2: Literature Review
Mohamed AbdelMoneim – University of Liverpool - 2015 23
their customers and aligned with the overall organisation’s strategic goals (Sandkuhl et al., 2014).
Hence the enterprise IT would be a strategic enabler to those customers-centric business services
to achieve the enterprise’s strategic goals and objectives. Ultimately, the IT solutions should be in
line with the business strategies (Sandkuhl et al., 2014). The missing parts in Sandkuhl et al. (2014)
proposal are: enterprise IT control objects (De Haes et al., 2010) and IT criteria for evaluating,
selecting and monitoring enterprise IT solutions and services (Dutta & Koritala, 2010). The author
argued that without solid and robust evaluation, selection and monitoring processes; IT services
would fail to meet the business services’ requirements, which leads to a significant misalignment
afterwards (Dutta & Koritala, 2010). Metrics such as capabilities, usability, security, and Return on
Investment (ROI) are missing in Sandkuhl et al. (2014) model.
Figure 2.2-10 Business-IT Alignment (Trienkens et al., 2014)
Trienekens et al. (2014) model addressed significant factors that influence the alignment
between IT services and business strategies. For instance, Trienekens et al. (2014) showed that IT
projects and solutions should be in connection with the business requirements. In addition, the IT
side isn’t the only responsible about the alignment exercise; however, the business side also
shares the responsibility with the IT side (Trienekens et al., 2014). They found that many strategic
alignment models are very conceptual and very difficult to be transformed to a practical
implementation. The author strongly agreed with Trienekens et al. (2014) later finding since many
scholars addressed the alignment problem hypothetically and didn’t introduce a guideline about
the actual delivery of such models (Trienekens et al., 2014). In order to achieve the strategic
24. Chapter 2: Literature Review
Mohamed AbdelMoneim – University of Liverpool - 2015 24
alignment between IT services and business strategies, Trienekens et al. (2014) proposed a
framework that covers some certain pillars, which are: Intention & Support, Working Relationship,
Share Domain Knowledge, IT Projects & Planning, and IT Performance, Fig 2.2-10.
The model in Fig 2.2-10 covered almost many factors that influence the alignment between IT
services and business strategies; for example, Intention & Support dimension addressed the
resources allocation, value realisation and vision communication (Trienekens et al., 2014). In
addition, Working Relationship dimension handled the communication issues between the
business owners and IT experts in addition to the partnership between the two domains such as
project prioritisation, business case, and SWOT analysis (Trienekens et al., 2014). The author found
the Shared Domain Knowledge is very vital since IT should understand the business end-to-end,
and also the business should understand the IT solutions holistically. IT Projects & Planning pillar
was always missing in several research, however, Trienekens et al. (2014) introduced this part as a
significant factor that enables the alignment between IT services and business strategies. Finally,
IT Performance dimension is the discipline that enforces innovation, creativity and agility in IT
services in order to introduce ‘fit-for-purpose’ solutions, which support the business strategies
(Trienekens et al., 2014).
Although the proposed model by Trienekens et al. (2014) seemed to be complete, however,
the author had some crucial comments about the model. First, the model wasn’t processes-based,
which makes it difficult to adopt. In other words, IT Projects & Planning factor, as an example,
didn’t have any clear processes that describe the workflow of project management and planning,
which could negatively affect the entire proposed model (PMI, 2013). Furthermore, the author
described the Intention & Support, and Working Relationship dimensions as one pillar, which is
Governance for Enterprise IT (De Haes et al., 2010). Incorporating IT Governance, Risk and
Compliance (GRC) wasn’t clearly addressed by Trienekens et al. (2014) model, which introduced a
critical risk of having IT services and business strategies misaligned (Lainhart et al., 2012). Even
though the proposed model addressed many critical factors, the author argued that without the
enterprise architecture and modelling practice of the enterprise, the alignment discipline would
not be able to find the gaps and then articulates a roadmap in order to manage these gaps
(Bernard, 2012).
2.3 Summary
The alignment between IT services and business strategies is one of the critical problems that
today’s executives are struggling to find a consistent and persistent framework in order to enable
them transform the business (Lientz & Larssen, 2004). However, the author found a noticeable
disconnection between the scholars’ work and models because each model considered only one
perspective of the organisation and developed the hypotheses to match that perspective.
Overlooking Services Portfolio Management (SPM) leads to missing enterprise financial
management, funding strategies, services evaluation methodologies such as NPV or IRR (Long,
2012). Furthermore, the proposed model by Cuenca et al. (2011) didn’t shape how CSFs of an IT
Strategy should be developed, delivered and managed. Since the involvement of executives and
senior executives is mandatory to realise the alignment. Rotim & Komnenić (2011) proposed a
cohesive integration of COBIT, IT BSC and EA to achieve the alignment, however, they emphasised
that without defining executives and senior executives roles & responsibilities such alignment
wouldn’t be realised.
The pitfall of Rotim & Komnenić (2011) model relied on the lack of IT governance and IT
management definition (Lainhart et al., 2012), In other words, roles & responsibilities matrix
25. Chapter 2: Literature Review
Mohamed AbdelMoneim – University of Liverpool - 2015 25
wasn’t introduced (Lainhart et al., 2012). Kashanchi & Toland (2006) didn’t incorporate other
potential factors such as the implementation approaches to realise IT strategy, enterprise-
modelling techniques, and the gap analysis processes and strategic roadmap definition practice.
But they positioned ITIL processes within the Strategic Alignment Model (SAM) Information
Systems (IS) processes quadrant. However, the implementation of this positioning is very weak
because many ITIL processes were omitted (Long, 2012). In addition, the model completely
overlooked the enterprise architecture and modelling practices (Bernard, 2012). However, the
author saw that approach is significantly weak because it was another theoretical and hypothetical
trial without any real-life implementation guidance (Trienekens et al., 2014). The most critical
pitfall in this model was the complete absence of governance of enterprise IT, which is the main
driver towards IT and business alignment in today’s ubiquitous IT (De Haes et al., 2010).
Holland & Skarke (2008) approach was about the importance of envisioning the IT projects as
business projects enabled by those IT projects (BPITs). Also the initiation of any IT project should
be linked to a business project that requires the introduction of a new business service or the
realisation of a new business strategy (Holland & Skarke, 2008). They argued that IT projects
should be inline with the business lifecycles such as Run the Business (RTB), Grow the Business
(GTB), and Transform the Business (TTB) processes, and any IT projects that don’t fulfil such
categories should be discarded. The author strongly supported this perspective, however, this
approach lacked the practically and it was just a visionary approach that today’s executives should
adopt (Holland & Skarke, 2008). That perspective didn’t incorporate any roles & responsibly matrix
to enforce that approach (Van Grembergen et al., 2003).
Luftman & Brier (1999) proposed a model that had 6 steps approach to align IT services and
business strategies, which are: setting the goals and establishing teams, understanding the
business and IT relationship, analysing and prioritising any gaps between IT and business,
determining the required actions and implementing a solid project management practice,
choosing and evaluating CSFs, and finally sustain the alignment (Luftman & Brier, 1999). The
author argued that this approach wasn’t implementable and it was very theoretic in nature. For
example, the processes should be rearranged in order to reflect the enterprise vision, business
strategies, and IT services end-to-end then understand how each component interacts with the
other (Bernard, 2012) Consequently, the goals and objectives of IT services could be architected
inline with the business strategies that enable the enterprise vision (Martin et al., 2009). Luftman
& Brier (1999) didn’t address the importance of governance practice to overarch the
implementation and control any divergence that could happen (Cannon, 2011).
According to Sandkuhl et al. (2014), IT-business alignment should embrace and revamp the
business capabilities. In other words, today’s organisations should consider the business services
that deliver values to their customers and aligned with the overall organisation’s strategic goals
(Sandkuhl et al., 2014). The missing parts in Sandkuhl et al. (2014) proposal were: enterprise IT
control objects, IT criteria for evaluating, selecting and monitoring enterprise IT solutions (Dutta &
Koritala, 2010). The author argued that without solid and robust evaluation, selection and
monitoring processes; IT services and solutions would fail to meet the business services’
requirements, which leads to a significant misalignment afterwards (Dutta & Koritala, 2010).
Trienekens et al. (2014) showed that IT projects and solutions should be in connection with the
business requirements. In addition, the IT side isn’t the only responsible about the alignment
exercise; however, the business side also shares the responsibility with the IT side (Trienekens et
al., 2014).
26. Chapter 2: Literature Review
Mohamed AbdelMoneim – University of Liverpool - 2015 26
Figure 2.3-1 Holistic Enterprise Alignment (Trienekens et al., 2014)
However, the author had some crucial comments about the model. First, the model wasn’t
processes-based, which makes it difficult to adopt (Bernard, 2012). Even though the proposed
model addressed many critical factors, the author argued that without the enterprise architecture
and modelling practice of the enterprise, the alignment discipline wouldn’t be able to find the
gaps and then articulates a roadmap to manage these gaps (Bernard, 2012). Eventually, it was
crystal clear that all the proposed models mainly focused on the IT-Business units of the
organisation and overlooked the organisational factors such as culture, management, people,
skills, and policies & processes (Lee, 2013). The author also identified a lack of implementation
guidance that enables transforming IT and business towards effective alignment and efficient
operations. Additionally, the scholars didn’t mention any practical tools. It means adopting any
models or framework would need a great investigation to find the right tools, which would
introduce another cost, risk and overhead.
“You have to learn the rules of the game. And then you have to play better than anyone else”
Albert Einstein.
27. Chapter 3: Research Methodologies
Mohamed AbdelMoneim – University of Liverpool - 2015 27
3. Chapter 3: Research Methodologies
3.1 Introduction
The author reviewed the literatures related to identifying and exploring the organisational
factors that influence the alignment and/or misalignment between IT services and business
strategies in Chapter 2: Literatures Review. Yet the author began explaining the processes and
ways required to answer the questions introduced in Chapter 1: Introduction section 1.4: Aims &
Objectives pages 10,11 and 12. The purpose of Chapter 3: Research Methodologies is to describe
the research design and techniques. In addition, the author explained the research methodologies
used throughout the research and the reasons behind choosing those methodologies.
Furthermore, Chapter 3: Research Methodologies identified the key participants in the research
and their attributes, for example, locations and industries. The author described his role and
participation during the research and how his prior experience affected the research. Chapter 3:
Research Methodologies covered a detailed description of data gathering techniques and the tools
used. Finally, the author explained the data analysis approaches and the rational behind involving
those approaches as well as the trustworthiness of the methodologies used.
3.2 Management Research Methodologies
A quality research has some certain attributes that the author incorporated to produce a high
standard research (Easterby-Smith et al., 2012). For instance, designing the research outline and
deciding the methodology or methodologies required to gathering the information are key
features of any research (Easterby-Smith et al., 2012). In addition, there is a political part while
conducting any research and the author had to sustain and control any resistance that affected his
research due to political concerns (Easterby-Smith et al., 2012). Before discussing the research
methodologies, the author addressed the data types that any researcher manipulated, which are
qualitative and quantitative (Bernard, 2011). Quantitative data has a numerical characteristic,
therefore, it requires a quantitative research to generate and manipulate numbers using statistical
analysis (van Griensven et al., 2014). Quantitative research mandates the researchers to emphasis
on experiments to either confirm or reject a pre-determined hypothesis, measurements, and
statistical analysis (Easterby-Smith et al., 2012).
On the other hand, the research methodologies consist of another research type, which
handles the quantitative data. In essence, quantitative data has some kind of material and
information that can’t be quantified, for example, interviews, texts, observations, and other non-
verbal communications (van Griensven et al., 2014). Therefore, the qualitative research integrates
with personal experience, meanings and social context rather than numbers or statistical analysis
(van Griensven et al., 2014). However, it could happen to conduct a qualitative analysis using a
quantitative data in order to search for and presentation of meaning in results of quantitative
processing (Bernard, 2011). Additionally, quantitative analysis could be conducted using
qualitative data, which could turn worlds into numbers (Bernard, 2011). It’s worth mentioning that
each data type differs in how it’s collected (Easterby-Smith et al., 2012). For instance, qualitative
data could be gathered using natural language, for example, interviews, and observations. On the
other hand, qualitative data requires a different set of gathering techniques, for example,
sampling, surveys ‘questionnaires’ and observational data (Easterby-Smith et al., 2012).
28. Chapter 3: Research Methodologies
Mohamed AbdelMoneim – University of Liverpool - 2015 28
Table 3.2-1 Qualitative & Quantitative analysis (Bernard, 2011)
Analysis Data
Qualitative Quantitative
Qualitative Interpretive text studies.
Hermeneutics, Grounded
Theory
Search for and presentation of
meaning in results of
quantitative processing
Quantitative Turning words into numbers.
Classic Content Analysis, Word
Counts, Free Lists, etc.
Statistical and mathematical
analysis of numeric data
3.3 Research Methodology
The author conducted a quantitative research to identify and explore the organisational
factors that influence the alignment and/or misalignment between IT services and business
strategies. The reasons behind using quantitative research were: the author argued that
qualitative research mandates conducting interviews and questioning participants regarding the IT
services performance and their alignment with the business, which could be seen as criticising
their work and that would lead to inconsistent answers (Easterby-Smith et al., 2012). In addition,
the author confronted some senior managers who turned the interview to be a ‘non-directive’
interview and that wouldn’t lead to elicit any solid answers, and would change the course of the
interview (Easterby-Smith et al., 2012). Also many managers and executives were very busy with
limited time to attend face-to-face interview and lock themselves in their office to run a single
interview. That is, the author found arranging a face-to-face interview very difficult and required
traveling to many locations and countries.
In addition, quantitative research enabled the author to incorporate some flexibility in
examining and assessing the relationship amongst different and multiple variables (Chebrolu &
Ness, 2013). That is, quantitative research allowed the author to build statistical reports and
charts that assign weight to variable and map them to the alignment and/or misalignment
percentage accordingly. Furthermore, implementing a quantitative research methodology gave
the author a significant opportunity to manipulate the collected data to elicit the factors that were
deployed and/or not deployed within organisations throughout scoring techniques and easily
represent that data in a scorecard. Quantitative research methodology provided a substantial
feature, which is the capability of utilising sampling techniques in order to collect the data (Khaiata
& Zualkernan, 2009). In that regards, sampling enabled the author to specify groups of participants
and plot the data respectively. The author, adopting quantitative research, had the capability to
generate different scenarios and analyse diverse probabilities to be able to articulate
recommendations based on solid mathematical equations.
3.4 Tools & Techniques
In this section, the author explained the tools & techniques used in his research. Since the
author decided to utilise a quantitative research methodology, then the available tools &
techniques were: surveys, observational data and databases (Easterby-Smith et al., 2012). Surveys
have more than one approach, for example, self-completion questionnaires and interviewer-
administrated questionnaires (Easterby-Smith et al., 2012). Each approach has sub-categories, for
example, self-completion questionnaires could be postal questionnaire surveys or web-based
surveys (Easterby-Smith et al., 2012). On the other hand, interviewer-administrated
questionnaires have two sub-categories, which are structured interview surveys and telephone
29. Chapter 3: Research Methodologies
Mohamed AbdelMoneim – University of Liverpool - 2015 29
interview surveys (Easterby-Smith et al., 2012). The author, however, found the web-based
surveys more convenient and flexible to implement since that approach enabled the author to
send an electronic-based questionnaire throughout the Internet and reach many participants
more than the other approaches. The Internet-based questionnaire completed online and the data
was automatically stored in an online database, which gave the author a significant mobility and
dynamic access to the questionnaire results (Easterby-Smith et al., 2012).
In addition, Internet-based questionnaire enabled the author to build and design user-friendly
survey that incorporated drop-down menus, check boxes and multiple-choice questions (Easterby-
Smith et al., 2012). Moreover, using the technology gave the author the power of integrating the
survey data results with spread sheet packages to run sophisticated analysis and fine the results
(Easterby-Smith et al., 2012). The author went through the exercise of finding an appropriate web-
based survey provider and there are many providers that offer different flavours of web-based
survey capabilities such as Qualtrics (www.qualtrics.com) and Surveymonkey
(www.surveymonkey.com) (Easterby-Smith et al., 2012). However, the author decided to use
FreeOnlineSurveys (www.freeonlinesurveys.com) due to several reasons. First of all, it provided a
student bundle, which had a reduced cost but comes with full features. Secondly,
FreeOnlineSurveys enabled the author to design the questionnaire incorporating unlimited
number of questions and pages. Thirdly, the author filtered the results, got full individual results,
ran live results analysis and modelled the responses using overlay technology.
3.5 The Researcher Roles
The author wore multiple hats during his research. In other words, the author roles varied
depending on the research requirements and needs. For instance, the author incorporated his
personal experience and observations during managing several projects across different countries.
In addition, there were a lot of situations that the author confronted over the years, which
affected the research course and introduced a significant spectrum of information. Therefore,
consolidating the author personal experience and incorporate it with the research design
supported shaping the questionnaire, identifying the critical questions and topics to emphasise,
and articulating the required participants and industries who benefited the research. The author
personal experience added a layer of ‘sense-making’ when designing the questions and the
suggested answers within the questionnaire’s body; for example, the author used his experience
to judge how the participants understood the questions and how the suggested answers were
sufficient.
The author, however, adopted a philosophical position to undertake his research. According to
Easterby-Smith et al. (2012), a researcher would wear the ontology hat or epistemology hat. In
essence, ontology is a philosophical perspective that sets assumptions about the nature of reality
(Easterby-Smith et al., 2012). On the other hand, epistemology perspective articulates some
statements about some tools and ways of elicitation the nature of the world (Easterby-Smith et
al., 2012). The author, on the other hand, utilised the epistemology perspective since the author
designed some statements in form of a questionnaire, which enabled him to understand the
behaviour of the organisations regarding the alignment and/or misalignment between IT services
and business strategies. However, epistemology perspective has two different contrasting views,
which are positivism and social constructionism that indicate how a research would be conducted
(Easterby-Smith et al., 2012).
30. Chapter 3: Research Methodologies
Mohamed AbdelMoneim – University of Liverpool - 2015 30
On one hand, positivism view is considered about the social world existence and how it does
exist externally, however, the properties of that world should be measured using some objective
methodologies instead of gathering their criteria using reflection or intuition (Easterby-Smith et
al., 2012). On the other hand, social constructionism considers reality or the social world as
socially constructed and not objective, and people give it its meaning (Easterby-Smith et al., 2012).
In essence, social constructionism is about people experience and thinking about the reality since
it is not objective (Easterby-Smith et al., 2012). The author’s role was adopting social
constructionist perspective to elicit how people give meaning to the IT services and business
strategies alignment and/or misalignment and how different factors can influence such dilemma.
As a social constructionist, the author was part of the problem under research since he had a
significant experience facing the problem in his real-life implementations and projects.
The reasons behind adopting social constructionist perspective were: it enabled the author to
understand the organisational factors that influence the alignment and/or misalignment between
IT services and business strategies. In addition, social constructionism view depends on gathering
rich data then the ideas and recommendations will be induced, which actually what the author
aimed to conduct through the research questionnaire (Easterby-Smith et al., 2012). As a social
constructionist, the author incorporated a diverse number of IT and business stakeholders
perspectives, which were captured via the web-based questionnaire. However, social
constructionism view has its own variation, for example, as a social constructionist, a researcher
could adopt either constructionism or strong constructionism (Easterby-Smith et al., 2012). Yet
strong constructionism has some implications and difficulties, for example, strong constructionism
could be very time consuming, and an author has a limited timeframe to conclude the research
(Easterby-Smith et al., 2012). In addition, the analysis and interpretations of the collected data
could be difficult (Easterby-Smith et al., 2012). Therefore, the author aimed to conclude the
research adopting constructionism view.
The pivotal role and the heart of what the author conducted was the questionnaire
administration part. For instance, the author was the key orchestrator of questionnaire design;
sending invitations to participants, live data monitoring, and data analysis and results reporting
processes. In addition, the author had the administration privilege to FreeOnlineSurveys
(www.freeonlinesurveys.com) website. Furthermore, the author had the full access to
FreeOnlineSurveys (www.freeonlinesurveys.com) website database, which was the online
repository that stored the collected data from the participants and it was the database that the
author used in order to plot different chars, tables and graphs. The author, however, had the
access to upload the contacts, which were the questionnaire participants and he tracked
individuals’ responses, applied overlay filters and different data mining and analysis techniques
using external tools. Finally, the author was responsible of questionnaire branding and
customisations such as adding unique logo, creating new templates and controlling the colour
schemes.
3.6 Questionnaire Design
Yet the author explained the meta-architecture of the questionnaire and how the
questionnaire was designed. Before the author started and dig deeply into the heart of the
questionnaire design and architecture, it was worth mentioning some questionnaire design ‘best
practices’ that the author adopted and took them into consideration while articulating and
forming the building blocks of the questionnaire. In order to comply with the principles of good
design, the author adhered to expressing only one idea per question during designing the entire
31. Chapter 3: Research Methodologies
Mohamed AbdelMoneim – University of Liverpool - 2015 31
questionnaire (Easterby-Smith et al., 2012). That is, each question was clear and ‘to the point’
without any ambiguity or multiple possible answers. The second critical principle the author
adhered was to avoiding any jargon and colloquialisms (Easterby-Smith et al., 2012). Any complex
and unknown expressions might affect the questions negatively and put the questionnaire
integrity at risk. The third key principle is to use simple expressions such as active tense rather
than the passive tense (Easterby-Smith et al., 2012). Criticality, the author avoided any negatives
while building the questions in order to avoid any misleading answers or confusion. Finally, the
golden rule was to ask questions that were not leading questions (Easterby-Smith et al., 2012).
Fig 3.6-1 Questionnaire Core Factors demonstrated the meta-architecture of the questionnaire
and showed the factors that the author identified and collected through Chapter 2: Literature
Review. The ultimate goal of Fig 3.6-1 Questionnaire Core Factors was to act as a ‘gateway’ to the
web-based version of the questionnaire, which used FreeOnlineSurveys
(www.freeonlinesurveys.com). The author used Fig 3.6-1 Questionnaire Core Factors building
blocks and translated them into questions that enabled the participates to contribute in the
questionnaire. Hence, once the questionnaire was fully developed using FreeOnlineSurveys
(www.freeonlinesurveys.com), the author sent invitations to the participants to complete the
online questionnaire. Fig 3.6-1 Questionnaire Core Factors had some critical dimensions such as
enterprise architecture practice, project management, business analysis, IT service management,
skills & developments, roles & responsibilities, IT strategy, business strategy and leadership. Each
dimension of these was critical and vital in order to alignment IT services and business strategies
as concluded in Chapter 2: Literature Review.
In order to produce a quality questionnaire, the author embarked in comprehensive processes,
which enabled the author to complete the questionnaire design phase covering all aspects and
elements. Fig 3.6-2 Questionnaire Design Processes illustrated the processes and steps that the
author implemented to complete and finalise the questionnaire design phase, for example, the
author started his work with literature review process, which fed the results & conclusion process.
In the results and conclusion process, the author got the capability to extract the required
information and data to build and design the meta-architecture building blocks, see Fig 3.6-1
Questionnaire Core Factors. Once the factors were defined, the author started his documentation
process and Fig 3.6-2 is the work product of Meta-Architecture Design process. Then the author
started the next process, which is the Questions Design phase that inherited the key principles
explained earlier in section 1.6 Questionnaire Design. The outcome of Questions Design phase
enabled the author to start utilising FreeOnlineSurveys (www.freeonlinesurveys.com) to draft the
online version of the questionnaire.
32. Chapter 3: Research Methodologies
Mohamed AbdelMoneim – University of Liverpool - 2015 32
Figure 3.6-1 Questionnaire Core Factors (The Author, 2015)
33. Chapter 3: Research Methodologies
Mohamed AbdelMoneim – University of Liverpool - 2015 33
The process, Draft Questionnaire, had a loop-based property since the author was keen
enough to ensure that all questions were covered by the online version. Once the questions were
captured and implemented in the web-based tool FreeOnlineSurveys the author started the
validation and reviewing process, which allowed the author to perform consistency check and
correct any mistakes such as spelling, grammar, etc. Hence, the web-based version of the
questionnaire was ready and the author prepared a list of participants in order to send
participation invitations along side with publishing the questionnaire URL. The author launched
the Live Results tool, which is part of the FreeOnlineSurveys portal in order to keep tracking the
data feeds and the collected data. The data was stored electronically on FreeOnlineSurveys online
database, which gave the author the full access to the results anytime, anywhere. The author
monitored the results and data to evaluate the inputs and determine if the inputs were enough to
start the analysis process.
Figure 3.6-2 Meta-Architecture Design process (The Author, 2015)
34. Chapter 3: Research Methodologies
Mohamed AbdelMoneim – University of Liverpool - 2015 34
The estimated timeframe for the data collection and analysis was 2 months, which gave the
author the time required to get a decent amount of samples. After that, the author initiated the
process of storing the data into different forms and formats such as pie charts and graphs as a
preparation to the next process, which was building reports and conclusion. The process, results
and conclusion, was a pivotal process and very critical when the author started building Chapter 4:
Results & Analysis since it incorporated different activities, for example, data mining, statistical
analysis and correlating the data capture towards the core purpose of the questionnaire. The final
process was storing the final data and results into FreeOnlineSurveys online database alongside
with extracting all work packages and reports in order to store and archive them for further needs.
The author listed the questions and samples of the online questionnaire in Appendix A. In
addition, the author added a sample screenshot of FreeOnlineSurveys design studio as shown in
Fig 3.6-3.
Figure 3.6-3 FreeOnlineSurveys (www.freeonlinesurveys.com, 2015)
3.7 Participants & Industries
The scope that the author indented to include was the organisation end-to-end. In other
words, the scope of the questionnaire included different participants across the organisation and
it wasn’t limited to a certain sector or group of personas. For example, the author engaged with
many stakeholders during his projects and he got several contacts and connections that he utilised
to conduct the questionnaire. As a matter of fact, any IT organisation the author worked with had
networks and systems administrators, operations supervisors and heads of IT operations. In
addition, today’s IT organisations, professionals services organisations and systems integrations
got a significant amount of projects in form of ‘outsourcing’ different IT functions, for example,
the author was one of those systems integrators in EMEA market and had the opportunity to
implement diverse number of projects across different industries. The participants’ scope,
however, extended to include executives and senior managers whom were accessible via email or
had time to complete the questionnaire.
Bottom line is, the author made a comprehensive usage of his contacts that he gained over the
years and the list of contacts covered all stakeholders that any IT organisation had as mentioned
35. Chapter 3: Research Methodologies
Mohamed AbdelMoneim – University of Liverpool - 2015 35
earlier. Furthermore, the author experience included heterogeneous industries, for example, the
author had the opportunity to implement complex project in oil & gas sectors as well as banking
institutes. Moreover, the author vertical experience focused on telecommunication organisations
and services providers across EMEA. That is, the author leveraged the questionnaire across several
industries that captured the IT services and business strategies alignment and/or misalignment
dilemma from different perspectives and cultures. Interestingly, the industries the author
incorporated didn’t operate within a single market, however, those industries operated in many
markets across the EMEA. Therefore, the data captured throughout the questionnaire did not
present a single spectrum of markets, however, the data covered was rich and complete since the
industries were different and diverse. The full list of participants and industries added in
conjunction with the questionnaire questions in Appendix A.
3.8 Trustworthiness
Exposing the organisational details and strategies was a significant challenge that the author
had to deal with in a professional manner. For instance, conducting a questionnaire that asked
about IT strategies, business strategies, governance and other core factors that the author
identified in his questionnaire’s meta-architecture Fig 1.6-3 Questionnaire Core Factors raised
some political concerns and data sensitivity issue. It was seen as a security breach or part of
organisation’s confidential assets and consequently the author decided to omit all confidential
information. In addition, organisations details such as name, industry and market were all
removed from the analysis. Furthermore, the participants’ data and details were hidden and not
exposed to any 3rd
party. The author implemented a security mechanism to protect his
questionnaire by applying a ‘password protected’ questionnaire, which prevented any anonymous
attempt to complete the questionnaire without providing the password. The author, in addition,
applied another layer of security and data integrity by disabling participants’ responses tracking
feature, which blocked any attempt to edit the responses. Finally, the author implemented
another security control, which was preventing participants from responding to the questionnaire
more than one time using the same computer.
3.9 Data Analysis
Here the author explained and described the data analysis function and how he applied
different data manipulation to scrutinise the collected data. First of all, utilising FreeOnlineSurveys
portal enabled the author to run different types of reports and filters; for example, the author
filtered the results by date, answer choices and country. In addition, the author incorporated the
visualisation capability that FreeOnlineSurveys provided to visualise the locations statistics and
represent the data easily. The ‘Live Results’ dashboard enabled the author to keep an eye on the
progress of the questionnaire and dynamically manipulate the data and the corresponding
reports. FreeOnlineSurveys allowed the author to regenerate the data in many formats such as
bar, column, line, and pie charts. Furthermore, the author applied different customisations by
dragging and dropping multiple fields and categories altogether in order to consolidate the data
from different sources, which acted as a single scorecard. The author exported the required data
to Microsoft Excel, which leveraged another layer of data manipulation and statistical calculations.
Finally, the author added and annotated the reports in order to give them a meaningful
representation and make them easy to understand.
36. Chapter 3: Research Methodologies
Mohamed AbdelMoneim – University of Liverpool - 2015 36
3.10 Summary
In this section, the author summarised the work package throughout this chapter, Chapter 3:
Research Methodologies. Chapter 3: Research Methodologies started with introduction, which
covered the purpose of the chapter, for example, a description of the research design and
techniques. In addition, the introduction section addressed the data gathering and the author
role. The second section of Chapter 3: Research Methodologies gave an overview of Management
Research Methodologies, which were quantitative and qualitative research methodologies. In
section 1.3 Research Methodology, the author explained his research method, which was
quantitative methodology and how he implemented a questionnaire based data collection
technique. Then the author started section 1.4 Tools & Techniques and illustrated how the
questionnaire was implemented via FreeOnlineSurveys, which is an online questionnaire tool. The
author roles were explained in section 1.5 and a comparison between positivism and social
constructionism perspective was explained. The author, on the other hand, adopted social
constructionism view in order to conduct his research.
Furthermore, the author extended his role to include questionnaire administration, design,
and orchestrating the processes illustrated in Fig 1.6-2 Questionnaire Design Processes. The
author then started section 1.6 Questionnaire Design, which was the core of this chapter since it
identified the key elements and processes that required completing the questionnaire. In addition,
section 1.6 Questionnaire Design illustrated the utilisation of FreeOnlineSurveys and its core tools,
which allowed the author to conduct his activities. Also section 1.6 Questionnaire Design
highlighted how the data reported and stored. The fundamental part of section 1.6 Questionnaire
Design was the meta-architecture of the questionnaire since it explained the questionnaire map
visually. Furthermore, section 1.6 Questionnaire Design had a significant workflow chart that
identified the key and the underlying processes that the author implemented throughout the
questionnaire design phase. Section 1.7 Participants & Industries described the key participants
completed the questionnaire and the core industries, which the questionnaire covered. Sections
1.8 illustrated the importance of trustworthiness and data integrity of the research and finally
section 1.9 highlighted the data analysis part of the research.
Figure 3.10-1 Chapter 3 Elements (The Author, 2015)
“If you can't explain it simply, you don't understand it well enough” … Albert Einstein.