Relationship Between Business Strategy And IT Strategy Commerce Essay

The relationship between Business scheme and IT scheme and the influence of administration civilization on this strategic alliance in Saudi houses will organize the footing of the research in this research. As such, the literature reviewed here will study major research and pattern in the business-IT strategic alliance sphere for the intent of deducing a research model, or theoretical account, of business-IT strategic alliance that will unify the cardinal rules contained within the literature. The purpose is to develop a theoretical account simple plenty for application that will supply a practical tool both for direction and IT practicians.


Survey on the strategic alliance construct will shortly be making a one-fourth of a decennary ‘s worth of cognition. Henderson & A ; Sifonis ( 1988 ) began analyzing this impression during the late 80 ‘s when ”alignment emerged from a focal point on strategic concern planning and long-range IT planning..

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

. where IT plans were created in support of corporate schemes ” Chan & A ; Reich ( 2007, p. 298 ) . Nevertheless, strategic alliance has retained its involvement and value in the concern and IT communities and is still a popular subject today for administrations ; possibly even more so every bit technological promotion continues to rule the exchange of information. Not surprisingly, its development has followed closely the developmental advancement of IT itself which began with the operational epoch go oning through the re-engineering point of view and the new economic system as figure 2.1 illustrates:

Business Focus

Operational epoch | Reengineering view| New economic system | Today

Figure 2.1 The development of Strategic Alignment ( Hoque, 2002 )The initial stage, the operational epoch, was concerned chiefly with the operations that an administration performed and focused on puting up mainframes, pull offing webs of Personal computers, and endorsing up organizational informations.

IT provided the nuts and bolts to ease mechanization of back-office maps through the development of package and had merely a supportive function. Strategic alliance was therefore viewed simply as a supporting act for every-day operations with its package applications.The 2nd stage, re-engineering, arose from the increasing tendency toward dependence on the mechanization of concern procedures by IT which non merely offered back-office maps support but the promise of entire mechanization within an organisation as a whole through IT package applications. At this phase, IT was still viewed merely as a supportive tool with no representation in the concern terminal of an administration. For illustration, concern directors expressed their system needs which the IT section embraced and went on to develop and deploy a new package application – in isolation. These early strategic alignment undertakings were non ever successful.

It was discovered that the development of package ( with embedded procedures ) for mechanization of a concern map was no warrant of betterment over its earlier manual operation, so it could stop up being more time-consuming and hence less efficient as operators were non needfully au fait with the application. There was non a full apprehension of what IT could make and how it could heighten a company ‘s place beyond rushing up communications and thereby making more ‘time ‘ for production or interfacing. A ‘Them and Us ‘ ambiance prevailed with the ‘techies ‘ in a separate universe to the troughs or drivers of the concern, neither to the full understanding the others needs [ elements that are besides considered further in the administration civilization facet of this research and dealt with in the following chapter ] . In the 1990s, Baets ‘ survey of European Bankss ( Baets, 1996 ) supported the findings of Vitale and co-workers ten old ages before ( Vitale et al. , 1986 ) that cognition of IT had to be on a par with adept concern cognition for the two to make any comprehension and thereby effectual application of strategic alliance in administrations.The 3rd stage, new economic system, saw IT commanding greater importance and position as administrations began to emerge that were encompassing e-commerce. The demands of the new e-business undertakings required engagement of IT representatives in their direction and strategic planning. The execution of Internet engineerings to augment concern procedures for productiveness or profitableness betterments brought the function of IT into the limelight, harmonizing it acknowledgment and strategic duty.

Along with the freshly elevated position of the old IT section at that place was a greater acquaintance with engineering and its capablenesss and the bias that had antecedently scorned the ‘nerds ‘ dissipated slightly as directors and forces became more knowing and the IT personnel more indispensable beyond a lab coat and a screwdriver [ californium: artefacts doing division, Schein ( 1992 ) and Trompenaars ( 1997 ) in chapter 3 ] . Despite the current planetary economic crisis and the death of the new economic system IT continues to presume new duties and administrations have even more demand for strategic alignment undertakings. An IT section in 2010 must pull off dealingss with spouses and bear concern duties concerned with the development and customisation of package that will better how a concern maps ; pattern effectual undertaking direction to command costs and maximize efficiency and guarantee that the debut of any new hardware or package support operations and substructure, “ .

.. keeping the important corporate informations that helps directors throughout the endeavor to do intelligent and informed determinations ” Hoque ( 2002, p. 31 ) . Kearns & A ; Lederer, ( 2003 ) and Seggie et Al. ( 2006 ) agree that strategic alliance is a agency to derive competitory advantage and Sabherwal & A ; Chan ( 2001 ) , Wagner et Al. ( 2005 ) and Zhou et Al.

( 2008 ) further add that it improves organizational public presentation.


Determining a conclusive definition for alliance is every bit ambitious as its map and application. There are many positions and multiple definitions including in chronological order: strategic alliance ( Henderson and Venkatraman, 1993 ) ; harmoniousness ( Luftman, 1996 ) ; tantrum ( Porter, 1996 ) ; span ( Ciborra, 1997 ) ; integrating ( Weill and Broadbend, 1988 ) ; merger ( Smaczny, 2001 ) ; IS alliance ( Chan et al. , 2006 ; Benbya and McKelvey, 2006 ) business-IT alliance ( Luftman, 2007 ) ; and IT alliance ( Chan, 2007 ) . It is apprehensible that there is such diverseness as definitions depend on our apprehension of linguistic communication. The semantics involved are unstable because the new engineerings are frequently described in proficient footings and using simplistic equivalent word to explicate the purpose of alliance in the context of concern IT in nomenclature that is understood without associated slang is really hard.

Overall, the definitions offered, though they have niceties of difference between them, make associate to the betterment of organizational capableness through engineering.Broadbent and Weill ‘s ( 1993 ) early definition, purports that it is the grade to which information schemes support, stimulate and/or enable any concern schemes. A ulterior definition offered by Reich and Benbasat ( 1996 ) asserts much the same but frames it in footings of the missions of the IT and concern aims and programs on both sides. Luftman ( 2000 ) was the first to present the component of development into the definition and argued that it required strength [ as the cardinal component ] from leading, senior direction and working relationships, combined with a complete apprehension of the concern and proficient environments, suiting prioritisation, common trust, and of class, effectual communicating. Hirschheim and Sabherwal ‘s ( 2001 ) definition included the thought of a mutual agreement as cardinal to its significance and stated that alliance was the achieved between scheme and back uping constructions that allowed both IS ( information systems ) and concern to map and pass on responsively each manner to one another.

Most recognized definitions do highlight the alignment duality described by Kearns and Lederer, ( 2000 ) , where the statement is that the IS program ought to aline with the concern program ( ISP-BP ) and frailty versa ( BP-ISP ) the concern program ought to aline with the IS program. Each position serves to increase the apprehension of IT at organizational degree and help the prioritisation of IT undertakings. Reich and Benbasat ( 1996 ) were supporters of the ISP-BP theoretical account, which they declared signified, IS direction ‘s comprehension of the concern scheme. Whereas Bensaou and Earl ( 1998 ) perversely preferred the BP-ISP alliance theoretical account as they believed it assumed a greater apprehension on the portion of the concern ‘ comprehension of the IT aspects and therefore the program and the resources would ally more efficaciously together as a consequence of this cognition, understanding and committedness. These elements are believed to be enablers of alliance ( Luftman et al. , 1999 ) . In the definitions offered some position alliance as a specific occurrence or event and others regard it is an on-going procedure.Duffy ( 2001 ) saw BITA as a procedure of accomplishing competitory advantage through a developed and sustained concern and IT mutualism.

Maes et Al. ( 2000 ) claimed BITA to be a uninterrupted and continual procedure that involved direction and design sub-processes with witting and consistent interrelatedness of all elements and mechanisms within the business/IT relationship offering part to the on-going public presentation of the administration. Moody ‘s ( 2003 ) definition saw BITA as a signifier of comprehensive resources direction ( people/ technology/ outside resources ) that provides a set of IT services and capablenesss that are in line with the concern demands and precedences. And Senn ( 2003 ) was assured that each action executed by IT persons was to concentrate on the creative activity and bringing of shareholder/stakeholder value through back uping concern operations and/or accomplishing concern ends.


With the diverseness of definitions offered to explicate the significance of the strategic alliance construct, as outlined in the old subdivision, there is a demand to foster research the differences to detect why there is such assortment. Part of the account may be that as the construct has evolved it has been closely linked to the development of technological capablenesss. Attitudes have changed as administrations have adopted new engineerings and forces have become more familiar with their possible and their operation.

These kineticss and the development of strategic alliance are reflected in the figure of conceptualizations and their definitions will be analysed in the context of the differing positions afforded to them. BITA with respect to its perceptual experience as a scheme, an event, a uninterrupted procedure, a public presentation index, an assessment tool, a societal influence and as an operation will be briefly outlined below to spread out on the definitions in the literature from their different dimensions.



It has been a tradition for literature to mention to Business-IT alliance as ‘strategic alliance ‘ . Sing it in these footings frames it as an rational impression instead than something more concrete or practical and as such it can be high-jacked to stand for whatever scheme suits the administration that is sing alignment.

There is no injury in citing alliance in this mode for it allows argument and therefore alteration, indispensable for development and following a ‘strategy ‘ suited to the construction, civilization and degree of alliance required. By mentioning to it in this manner nevertheless, the literature suggests that strategic alliance is dependent on the tantrum between IT scheme and concern scheme, and on how the IS programs are established to back up such a tantrum ( Teo and King, 1997 ) . Many writers in the strategic alignment field attack alliance strictly at the strategic degree, e.g.

Baets ( 1992 ) , Broadbent and Weill ( 1993 ) , Chan et Al. ( 1997 ) , and Luftman ( 2003 ) . At the nucleus of their conceptualizations is the impression that concern scheme itself must foremost be analysed and merely thenceforth be used to find a complementary IT scheme. In this scenario the concern scheme is paramount and the IT scheme part secondary, it is a agency to an terminal instead than a agency in its ain right. However, despite the alliance between concern scheme and IT scheme – where accent is laid on shaping IS scheme programs ( Benbya and Mckelvey, 2006 ) – strategic alliance continues to be debatable in many administrations. Therefore, making an in agreement definition that inside informations IS strategic programs is of import for strategic alliance ; nevertheless, is it non plenty on its ain for the accomplishment of such alliance ( van der Zee and de Jong, 1999 ) .



The literature frequently takes for granted the strategic component of the construct and delves further into its deductions for administrations, concentrating on the behavior and nature of BITA – what it does when you introduce it [ and besides is a strong characteristic of the organizational civilization types discussed in the undermentioned chapter ] . This depends mostly on what type of a construction into which it is introduced. A formal construction, an informal construction or a intercrossed construction, each holding its ain virtues and each being capable of effectual map when the fortunes and environment are contributing to the pick made ( Brown and Magill, 1994 ) . Against their three identified constructions, Earl ( 1989 ) identified five potentially suited constructions: centralized, concern unit, concern venture, decentralised, and federal. Tavakolian ( 1989 ) found a direct correlativity between competitory and conservative schemes within an environment and the corresponding decentralised or centralised IT structures apparent in an administration and this determination is supported to some extent by Bergeron et Al. ( 2001 ) with the caution that it is non entirely the complexness of construction that impacts public presentation but that other factors are influential excessively.

Chan ‘s ( 2001 ) position is that informal construction, “ aˆ¦relationship-based constructions that transcend the formal division of labor and coordination of tasksaˆ¦ ” ( Chan, 2001, p67 ) can be merely every bit effectual as formal construction with the human component instead than intellectualised theoretical accounts and procedures driving alliance, frequently with more impact and success than a formal agreement.Structure, hence can add a new dimension to the position of alliance as it places it in a scene that will enforce its ain restraints on the pattern and executing of alignment exercisings and ideals.


For some writers it alliance does n’t look to ‘do ‘ anything instead it is a concern unit that lacks the kineticss others see in it. The deduction is that it is something that is ‘brought in ‘ like an object concrete and physical and recognised by its inactive terminal province where some kind of equilibrium is achieved between the IT and concern sides in an administration. In the old subdivision, some of the definitions merely present strategic alliance as an result achieved through the employment and acceptance of different theoretical accounts, techniques and procedures ( Ortiz, 2003 ) . Broadbent and Weill ( 1993 ) , Chan et Al.

( 1997 ) , Luftman ( 2003 ) and Reich and Benbasat ( 1996 ) , besides see strategic alliance as something to be arrived at, a finish that is terminated when an optimum state of affairs has been achieved. This may be a misinterpretation of the full significance as the attitude that holding strategic alignment – the concern married with the engineering required for effectual fulfilment of aims – can non stand entirely and it would be naA?ve to believe that BITA was a Panacea for all concern jobs so possibly the writers see it as an optimum accomplishment when all the other factors, or positions, besides come into drama to do BITA a worthwhile ‘thing ‘ in itself.



If a concern is inactive it will stagnate and if a concern wants to turn, like IT, it must ever go on to germinate through a of course happening kineticss that are built-in to the execution of policies such as strategic alliance. Baets ( 1996 ) , Luftman et Al. ( 1999 ) , and Rondinelli ( 2001 ) agree that these kineticss require changeless monitoring and appropriate accommodation. Therefore, strategic alliance is non something come-at-able but something invariably in development, as it is diversely described by Henderson and Venkatraman ( 1993 ) , Baets 1996, Maes et Al. ( 2000 ) , Duffy ( 2001 ) , Moody ( 2003 ) , and Senn ( 2004 ) .

“ An issue that has remained comparatively undisputed and undisputed is how to aline IT that is comparatively fixed one time implemented in an organisation, with a concern scheme and associated information demands that are invariably in demand of accommodation ” Galliers ( 2007, p. 228 ) .Even within this position there are two schools of idea ; the classical school of idea with accent on eventuality versions and the ‘processual ‘ attack ( Whittington, 1993 ) that emphasises the importance of turn toing internal and power issues, peculiarly how cultural elements act upon the formal elements of reason and the determination procedure in strategic alliance and rejects IT as simply an version but gives it greater weight as a resource.

Furthermore, practicians are being advised to follow a position of strategic alliance as a continual procedure. In Pearlman ‘s ( 2004 ) article advice to CIO ‘s, in drumhead, is that they should pass on, show, take, collaborate, govern and construct if they wish to accomplish alliance.


It is the consideration of several writers that strategic alliance is non merely a procedure but besides a tool whereby they can reflect on the concern value that administrations might possess, or non.

In surveies analysed the relationship between strategic alliance and competitory advantage or organizational public presentation were tracked, ( Venkatraman, 1989 ; Sabherwal and Chan, 2001 ; Kearns and Lederer, 2003 ; Wagner, 2005 ; Seggie et al. , 2006 ; Zhou, 2008 ) . Tallon and Kraemer ( 2003 ) were responsible for the extra construct of concern value being included as an component to the public presentation indicant point of position of strategic alliance and analyse concern value by associating it to organisational IT ends and mensurating the IT return of investing from a strategic alignment point of view.


In response to the inquiry: `how do administrations cognize how good their strategic alliance is? ‘ different writers have developed Maturity Models ( MMs ) ( de Koning and der Mark, 2002 ; Duffy, 2001 ; Luftman, 2003 ; van der Raadt et al. , 2005 ) . MMs describe the development of a specific sphere over clip.

This position is in itself a more mature mentality than other positions as it has to see many of the kineticss before being able to build an effectual strategic alliance. Because of the in-built reappraisal and rating required for this position it has to look at all facets that the alliance may impact. Researchwork and systems are capable to appraisal and alteration through these adulthood theoretical accounts and their monitoring. On the footing of the appraisals of those MMs, administrations can ticket melody and graduate their strategic alliance:Identify any alignment-related aspects/processes betterments required to obtain a higher degree of strategic alignment adulthood.

Initiate any alteration processes to guarantee that the identified betterments eventuate.In much the same manner, credence of the cyclical nature of strategic alliance as posited by Burn ‘s ( 1996 ) ‘lead-lag ‘ theoretical account implies assessment in response to intermittent predictable and unpredictable alterations as does the ‘punctuated equilibrium ‘ theoretical account of Sabherwal et Al. ( 2001 ) where breaks to stableness demand a fresh expression at the long term program and ends of strategic alliance.



If an administration intends to work toward accomplishing strategic alliance it will ask communicating that will affect dialogue, coaction and common apprehension – elements non ever show a specific organizational construction or civilization. This communicating can film over the boundaries of traditional or conventional attacks and hence becomes a drive force behind societal attitudes and perceptual experiences. Chan ( 2002 ) and Huang and Hu ( 2007 ) uphold this position that keeping effectual communicating in an administration will impact on corporate strategic alignment civilization. Concord must be developed for effectual channels of communicating, transparence in the exchange of cognition and sharing of acquisition ( Hoque, 2002 ; Daneva and Hu, 2007 ) , and the usage of informal communicating is merely every bit of import a factor for accommodation and control ( Mintzberg, 1993 ; Chan, 2002 ; vander Raadt et al. , 2005 ) , to bring forth an ambiance of trust and an effectual response to concern demands from an IT position.

Reich and Benbasats ( 2000 ) survey further confirms that strategic alliance is more likely to win when concern and IT executives have an [ significantly ] expressed and [ understood ] shared common vision of IT ‘s part.


Strategic alliance [ when it is across-the-board and embraced by all as portion of an organizational civilization ] needfully involves organizational issues of communicating, construction and, peculiarly, coordination procedures that are operational to the concern in specifically performed actions ( Wieringa, 2008 ) . Operational strategic alliance consists of alining the operational activities of IT and concern people with each other so that optimal IT support for concern demands is achieved.

In this context, Peak and Guynes ( 2003 ) put the burden of success on the IT side of the equation, though it does connote some reciprocality in the initial communicating of ‘quality ‘ demands and they province that strategic alliance will merely be attained when an administration ‘s IT staff can present choice information and quality IT merchandises and services to the concern side.


2.4.1 MIT90S FRAMEWORK ( 1991 )

During the 1980s, research conducted at the universe renowned MIT ( Massachusetts Institute of Technology ) initiated involvement in the academic community to the potency of the strategic power of IT.

In the effort to work the possibilities revealed in the theoretical account from the research it was suggested that extremist invention affecting IT investing could transport significant wages if cardinal elements of scheme, construction, engineering, direction procedures and persons and their functions were kept in alliance ( Morton, 1991 ) .Figure 2.2 shows how an administration can be visualised as a set of five forces in dynamic equilibrium topic to external influences from the technological environment and the socio-economic environment. In this position, a nucleus undertaking of general direction is to guarantee that all five ‘forces ‘ ( represented by the boxes ) , can flux without limitation or hindrance in order to accomplish the administration ‘s ends and aims.Figure 2.2 The MIT90s model ( Morton, 1991 p20 )With direction at the Centre of the theoretical account its function is cardinal excessively. Though some countries might non needfully be in direct contact with each other they are connected via the direction procedure which plays the chief function and ensures organizational response to displacements in demands from the external variables.


Henderson & A ; Venkatraman ‘s ( 1993 ) strategic theoretical account ( Figure 2.3 ) is a widely used four-part illustration favoured by many research workers and administrations for the appraisal of the degree of alliance in a company.Figure 2.

3 The Henderson and Venkatraman strategic alliance theoretical account ( Henderson, Venkatraman, 1993, p476 )Each of the four parts [ quarters ] contain three distinct and persons elements which, when jointly analysed, can be used to specify each one-fourth operationally. These twelve elements- farther expanded in Table 1 are used to set up the degree and type of alliance within a corporation ( Henderson & A ; Venkatraman, 1993 ; Papp, 1995 ) .Table 1 Components of the Strategic Alignment ModelWithin the theoretical account it can be seen how external influences may impact alteration on either procedures [ lower sectors ] or schemes [ upper sectors ] . A perpendicular nexus couples the upper and lowers sectors and shows the relationship between strategic tantrum to suit scheme with substructure. A horizontal nexus for functional integrating shows how IT strategies must accommodate as concern schemes change, and displays the dependance and required response of each sector upon another ‘s versions peculiarly in relation to accomplishments and operation. Giving focal point to three of the four quarters of the theoretical account at a given clip can allow a coincident reference to both strategic tantrum and functional integrating ( Papp, 1995 ; Luftman et al. , 1999 ) .The SAM ( Strategic Alignment Model ) theoretical account has proven empirical genuineness and has provided valid conceptual and practical value ( Goedvolk et al, .

1997 ; Avison et al. , 2004 ) . However, it is capable to confines, eg, the pertinence of the SAM theoretical account may change depending on the IT-intensity of an industry and the premises expounded might non be relevant to the fortunes ( Burn and Szeto, 2000 ) .As mentioned, the theoretical account does hold acknowledgment and a figure of bookmans have farther elaborated on it ( e.g. , Luftman et al. , 1993 ) .

Goedvolk et Al. ‘s ( 1997 ) extension of the SAM theoretical account gave greater focal point to proficient and architectural properties. Avison et Al. ‘s ( 2004 ) add-on to the SAM theoretical account was able to supply practicians and faculty members with farther practical ways to achieve alliance in their protagonism of analyzing undertakings retrospectively to find alliance. This signifier of alignment monitoring, can let preemption in a alteration in scheme and execution of a new alliance position by re-allocation of undertaking resources.

The SAM theoretical account inspired Maes et Al. ( 2000 ) to bring forth a model that incorporates even more beds pertinent to map and scheme where information suppliers are separated from the systems supplying information in a new information sphere stand foring cognition, [ and exchange of information through ] communicating and coordination. Their 3rd dimension references specific sub-architecture countries.


Figure 2.4, Peppard and Ward ‘s theoretical account ( 2004 ) shows IS capableness at the nucleus of everything, inherently impacting competences and emanating an influence on all countries that interrelate [ concern strategy/business operations/IT operations and services/IS/IT scheme ] and impact upon the organizational public presentation. Such focal point on the importance of this nucleus component demonstrates the value IS capablenesss can make and is hence an organisation-wide duty that can non be delegated to the IS map entirely ( Peppard et al. , 2000 ) .

Peppard and Ward ( 2004 ) subsequently asserted that though an administration might imagine an IT based advanced scheme, it will be their IS capablenesss that permit such a vision to come to fruition.Figure 2.4 Model of IS Capability ( Peppard and Ward, 2004 )


By 2006 the theoretical account suggested by Benbya and McKelvey ( 2006 ) through its in writing presentation appears a more unstable representation suggesting, even visually, that there is more of a flow between relationships in alliance. It still addresses the demand to analyze relationships between concern and IT ( horizontal IS alliance ) but introduces a demand to unify the positions at different degrees [ strategic/operational/individual ] of analysis ( perpendicular IS alliance ) through shared apprehension and communicating.

The co-evolutionary IS alignment position conveys the necessity for common version within a dynamic interplay of co-evolving elements. Co-evolution does non needfully seek harmoniousness between the elements but a regard for their place and the invention that may ensue from the fortunes and environments in which they function.Figure 2.5 Co-evolutionary IS alliance ( Benbya and McKelvey, 2006 )



In this subdivision MMs ( adulthood theoretical accounts ) are referred to that have been developed for the appraisal of BITA.

2.5.1 DUFFY ‘S MM ( 2001 )

Duffy ‘s ( 2001 ) MM is founded on the rule that a reliable, reciprocally compatible partnership between IT and concern executives is simple in order to accomplish a worthwhile BITA. Without this premiss at that place can non be a successful coveted result.

Accepting that there is a degree of mutuality between IT and concern aims, any split or division between IT and non-IT countries would undermine any attempts to set up alliance. This theoretical account is arranged about a series of cardinal success drivers ( the spheres: human resources administration and management/innovation and reclamation strategy/IT/business architecture/IT/business partnership/operational excellence/ROI scheme direction ) which are operationalised in KPIs ( cardinal public presentation indexs ) that each contain five contributory factors – facets designed to turn to expressed and important inquiries within the KPI where it is included. The six spheres are briefly explained below:Human resources administration and direction. In this sphere mention is made to an administration ‘s forces and accent is given to the importance of work force enlisting, keeping and direction by an administration.Invention and reclamation scheme. The focal point here is how advanced an administration is with an accent on currency and cogency holding a bearing upon understanding when reclamation is required to procedures and capablenesss in an administration.IT/business architecture. This sphere is concerned with the relationship and interaction of entities involved in the information and applications in the concern environment of an administration.

IT/business partnership. This sphere reflects how the recent upgrading of the function of the IT map affects an administration “ Technology is critical to concern success and this co-dependency drives the demand for the IT and non-IT executives to prosecute a win/win relationship ” Duffy ( 2003, p. 4 ) .Operational excellence. This domain trades with the public presentation results of the administration. Duffy recognises that operational excellence can merely be achieved if an administration can recognize the value of ideals embedded in larning and partnerships, and can react to market demands quickly.

ROI scheme and direction. This sphere investigates the importance of the prosodies and procedures required for efficient and effectual fiscal direction within administrations and accepting IT costs and benefits as holding para with concern 1s.Duffy ‘s six spheres address the “ IT and non-IT ” averment every bit good as certain strategic elements within an administration but there are no explicitly stated adulthood degrees for them. Alternatively, Duffy merges the six spheres of the theoretical account into four BITA scenarios where administrations fall into the undermentioned classs: “ uneasy confederation ” , “ supplier/consumer relationship ” , “ co-dependence/grudging regard ” , and “ united we win, divided we fail ” . These layperson ‘s footings are loose at best and though intended to be descriptive merely serve to confound in their reading.

Such scenarios are the adulthood degrees in the theoretical account.

2.5.2 LUFTMAN ‘S MM ( 2003 )

Luftman ‘s theoretical account ( 2003 ) was constructed on the footing of practical experience and research into enablers and inhibitors of alliance ( Luftman et al, 1999 ) , integrating mention to assorted other theoretical accounts [ here listed chronologically and non in order of importance or influence ] : Nolan ‘s phases of growing theoretical account ( Nolan, 1979 ) , SAM ( Henderson and Venkatraman, 1993 ) and CMM ‘s ( Capability Maturity Model ) range and scope construct of ( Keen, 1996 ) . Luftman ‘s MM is an enterprise based in six spheres ( skills/technology scope/partnership/governance/competency measurements/communications ) to detect a specific administration ‘s BITA profile.

A brief description of each sphere follows:Skills: references practical human resources issues such as cross-training in IT and concern issues sing the cultural environment and its impact on invention and organizational alteration.Technology range: refers to how much proviso of comprehendible and flexible substructure comes from IT, the execution of emergent engineerings and IT criterions.Partnership: Centres on how the perceptual experiences in the relationship and parts between IT and concern sides affect the behavior of effectual and efficient direction of an administration.

Administration: pertains to the authorization accorded to the function of IT and its executing and bringing of activity-supporting resources in the administration.Competence and value measuring: refers to the accountable value given to the part of the IT side to the concern side of an administration.Communication: references transparence and comprehension in cognition sharing and apprehension to guarantee attainability of declared concern and IT schemes and ends.Each sphere is so assigned these following five degrees of alliance:1. Initial/ad hoc: is the lowest graded procedure of alliance where IT and concern are non-aligned and processes for betterment are merely ad hoc and random in nature.2.

Committed procedure degree reveals a degree of purpose – how far an administration has committed itself to the publicity of a planetary BITA vision.3. Established focussed procedure degree reveals an existing, established BITA procedure that has a focal point on concern ends.4. Improved/managed procedure degree reveals use of a tenable BITA procedure that endorses the credence of engineering as a value Godhead for the administration.

5. Optimised is the highest graded procedure of alliance and reveals a to the full incorporate and co-adaptive strategic BITA procedure between both IT and concern sides in an administration.[ This theoretical account will be used by the writer in this research to measure the influence of organizational civilization in BITA. ]


Sanchez Ortiz ( 2003 ) developed a 20 inquiries based instrument to mensurate the degree of alliance between strategic aims declared [ and shared ] by concern and IT. The inquiries are founded on analytical survey of the countries in literature offering domains that addressed BITA and the construct of entire quality direction ( Henderson and Venkatraman, 1993 ; Chan et al. , 1997 ; Bruce, 1998 ; Luftman et al.

, 1999 ; Burn and Szeto, 2000 ; Creteau and Bergeron, 2001 ; and Chan, 2001 ; Kearns and Lederer, 2003 ) .The instrument efforts to definitively mensurate BITA with due consideration to the countries uncovered by Henderson and Venkatraman ( 1993 ) , the quality position of the MBNQA model Prybutok et Al. ( 2001 ) and Chan ( 2002 ) . The inquiries in the instrument were designed specifically to parallel some dimensions of the MBNQA:LeadershipStrategic PlanningCustomer and Market FocusInformation and AnalysisHuman Resources“ aˆ¦but reflecting the tantrum between the precedences and activities of IT with those of the concern ” Sanchez Ortiz ( 2003, p. 52 ) . Thus the inquiries would illicit a qualitative attitudinal response and offer degrees of understanding with statements of purpose. For illustration, some questions/statement posed direct the respondent to measure suggested intents of the usage of IT ‘to achieve high quality public presentation ‘ , ‘to communicate values and outlooks ‘ , ‘to support organisational and employee acquisition ‘ , ‘to addition customer/citizen satisfaction ‘ , ‘to find current product/service demands ‘ and ‘to promote cooperation, invention, and flexibleness ‘ . To reply the inquiries, those reacting gave evaluations on a seven point likert-scale with 1 = ‘strongly disagree ‘ to 7 = ‘strongly agree ‘ and Not Applicable ( N/A ) option besides included.

Sanchez Ortiz ‘s BITA instrument has been later amended with input from IT research workers, direction, and psychological science supplying polishs ensuing in proof through a pilot appraisal conducted in the Denton City Government. However, as it is oriented to individual administrations and is merely a list of albeit, pertinent and relevant disclosure inquiries, it fails to place procedure countries and accordingly restricts that peculiar administration ‘s betterment program to limited BITA activities and denies it any replies to procedure and map issues.

2.5.4 COBIT ( Control Objectives for Information and Related Technology )

COBIT foremost came to detect with its initial version in 1996 but it appears here harmonizing to the chronology with mention to the current ( May 2007 ) version. It was issued by the IT Governance Institute and is a toolset based on business-oriented criterions and best pattern that administrations can use for successful bringing of IT against concern demands and measuring of IT processes. “ The concern orientation of COBIT consists of associating concern ends to IT ends, supplying prosodies and MMs to mensurate their accomplishment, and placing the associated duties of concern and IT procedure proprietors ” Information Systems Audit and Control Association [ ISACA ] ( 2006, p.

5 ) . Version 4.1 succeeds the earlier version 4.0 with alterations to the ‘Goals ‘ description – doing it simpler and including now a cascade of procedures and ( bidirectional ) dealingss between the ‘IT Processes ‘ , the ‘IT Goals ‘ and the ‘Business ‘ .This comprehensive model provides expressed support in clearly stated points identified by their association with 34 specific of course sorted countries: Plan and Organise [ 10 procedures ] ( PO ) , Acquire and Implement ( AI ) [ 7 procedures ] , Deliver and Support ( DS ) [ 13 procedures ] and Monitor and Evaluation ( ME ) [ 4 procedures ] doing up the spheres.

Between them they control applications, information, substructure and people with most of the IT resources controlled by procedure in AI and DS.The tabular array below lists the specific elements of each country. Procedures [ non exemplify here ] are farther sub-divided into elaborate control objectives [ 210 contained in COBIT 4.1 ]Table 2 List of COBIT Framework Areas


Plan and Form


Specify a Strategic IT Plan and way


Specify the Information Architecture


Determine Technological Direction


Specify the IT Processes, Organization and Relationships


Manage the IT Investment


Communicate Management Aims and Direction


Manage IT Human Resources


Manage Quality


Assess and Manage IT Risks


Manage Undertakings


Acquire and Implement


Identify Automated Solutions


Acquire and Maintain Application Software


Acquire and Maintain Technology Infrastructure


Enable Operation and Use


Procure IT Resources


Manage Changes


Install and Accredit Solutions and Changes


Deliver and Support


Define and Manage Service Levels


Manage Third-party Services


Manage Performance and Capacity


Ensure Continuous Service


Ensure Systems Security


Identify and Allocate Costss


Educate and Train Users


Manage Service Desk and Incidents


Pull off the Configuration


Manage Problems


Manage Datas


Pull off the Physical Environment


Manage Operationss


Monitor and Evaluate


Monitor and Evaluate IT Processes


Monitor and Evaluate Internal Control


Ensure Regulatory Compliance


Supply IT Governance

COBIT has been successful for many concerns wishing to place its demands for the accomplishment of BITA ; cardinal end indexs, cardinal public presentation indexs, adulthood degrees [ mensurable ] and audit guidelines are among the procedures employed.COBIT aims to back up both direction and procedure proprietors through IT administration whereby a finding of the degree of attachment to the control objectives by either self-assessment or in concurrence with an independent reappraisal to set up mention can be easy conducted. The appraisal can be placed in context by comparing to the industry and the environment in which they reside, or by comparing to where international criterions and ordinances are germinating.

The item of COBIT can be overpowering and counterproductive to its purposes but it is still utile and independent groups nevertheless realise the demand for pilotage information and arrows to where FAQs are answered suitably and applicably such as the forums led by Debra Mallette [ CISA – Certified Information Systems Auditor ] a talker in joint session with ISACA ( ISACA, 2008 ) .

2.6 Barriers TO BITA

Despite the many variables referred to in the literature cultural barriers are likely among the most hard to place, analyse and overcome when presenting new Information Technologies. Administrations can happen solutions to most of the proficient barriers through different agencies of support and accomplishment development, but organizational cultural barriers are frequently unseeable, impossible for many to divide from national civilization and harder to cover with.Religion is frequently the foundation for the development of a civilization. The land of Saudi Arabia ( KSA ) epitomises the Arabic Islamic civilization because it witnessed the birth of the dominant faith of the part, Islam.

It provides a symbol of Islam to the universe. KSA besides holds the Islamic sacred topographic points for all Muslims across the Earth and is viewed by many as the most spiritual state of Islam. Islam has a strong influence on the people in KSA through Islamic instructions, and this has impacted their manner of life and the manner things are done ( Abdul-Gader, 1999 ) . In add-on, KSA has ne’er been occupied or conquered by Western states, as have many other states in this part.An of import barrier or reluctance may in some step be due to a deficiency of available beginnings for presenting IT systems. There are deficient IT assets in administrations in different parts of KSA, which limits their ability to implement and present new engineerings. IT systems are ill-reputed, being widely known for their expensive cost, time-consuming demands, and high rate of failure. Decision shapers worldwide are acute to implement new systems, but the deficiency of certainty and vagueness of successful execution reduces their enthusiasm ( Reinig & A ; Mejias, 2003 ) .

Another barrier is a deficiency of BITA consciousness perchance because of cultural issues. Without publicity of the benefits and administrations selling the speedy wins and demoing the effects of such a strategic alliance between both concern and IT strategies, administrations are left in a vacuity where advancement in line with technological development will confront arrested development. Part of the deficiency of consciousness might besides be tied up in construction and direction manner coupled with cultural facets of communications but concern and IT objectives and ends should be known and explained to directors and staff through all degrees of administrations and any presentment of alterations in those ends should be exchanged and explained.Lack of skilled forces is another barrier to BITA that the literature suggests. A work force incorporating forces with IT skill-specific properties back uping first-class merchandise cognition in their field in order to pull off and implement IT systems successfully is a relevant factor in assisting administrations understand the comparative easiness and possible value of encompassing engineering ( Kelegai & A ; Middleton, 2004 ) .

Countries with a deficit of skilled IT forces suffer the concern and economic effects and they really much on foreign expertness, a double-edged blade which brings with it an international cultural dimension that may supply advanced solutions but may besides do struggle within administrations if managed inefficaciously.In add-on, the absence of dependable quality substructure ( organizational, and IT ) is considered a barrier to BITA. Organisations runing without nice IT substructure could confront unsurmountable fiscal troubles [ something that can hold its reluctance steeped in cultural perceptual experience ] to present and implement wholly new systems such as telecommunications systems, Internet, and other hardware every bit good as the associated costs of the forces or preparation required to convey accomplishment degrees up to standard. Additionally, administrations without basic organizational substructure would hold trouble in accomplishing its ends.

The literature in this field identifies many other barriers that to a greater or lesser extent block advancement toward developing or efficaciously deploying BITA and have been referred to earlier ; in-between and upper direction mentality toward IT ; concerns sing the benefits realised by IT ; struggle of political relations ; touchable benefits/ROI ; vouching the meeting of users ‘ demands ; and swear issues. The literature besides specifically points to cultural factors and issues as peculiarly pertinent elements that may supply barriers to the debut and execution of IT ( Gefen et al. , 2005 ; Hwang, 2005 ; Jain & A ; Kanungo, 2005 ; Karahanna et al. , 2005 ; Mann, 2005 ; Shanks et al. , 2000 ) .


7 Summary

This chapter reviewed a choice of related literature on BITA relevant to this research survey sourced from academic publications, industry diaries and information on the web. A chronology of BITA history was delivered, BITA definitions presented, and BITA positions were given. In add-on, BITA theoretical accounts were discussed.

Brief accounts of BITA appraisal instruments were given. Finally the chapter addressed Barriers to BITA from organizational civilizations.Luftman ‘s MM will be used in the current survey to measure the indirect influence of organizational civilization in KSA ; it will help in measuring adulthood degrees of alliance in administrations. Luftman ‘s MM has strong empirical support, which is valid, dependable, and widely cited. This will be used to observe statistically important effects on BITA with respect to the independent variable of organizational civilization.

Chapter three explores the literature reappraisal for the independent variable considered in this research, viz. the organizational civilization.


I'm Ruth!

Would you like to get a custom essay? How about receiving a customized one?

Check it out