You are currently viewing a new version of our website. To view the old version click .
Information
  • Article
  • Open Access

25 May 2022

Critical Success Factors Evaluation by Multi-Criteria Decision-Making: A Strategic Information System Planning and Strategy-As-Practice Perspective

1
The Institute for Industrial Policy Studies, Seoul 03767, Korea
2
Business School Lausanne, 1022 Chavannes, Switzerland
3
aSSIST Business School, Seoul 03767, Korea
This article belongs to the Special Issue Evaluating Methods and Decision Making

Abstract

Strategic information system planning (SISP) is a central process that enables organizations to identify the strategic alignment of their IT portfolio to achieve their business needs and objectives. The extant SISP literature has focused on theoretical and processual aspects and has left methodological ambiguity about how SISP is practiced. This paper contributes to the current knowledge by providing a mixed-methods SISP framework labeled CSF-MCDM for company-wide strategic alignment. The paper conducts a methodological synthesis, embracing an expert-based qualitative approach based on a PEST-SWOT and causal layered analysis to draw the critical success factors of a next-generation business system for an automotive company in South Korea. The derived CSF dimensions and sub-criteria are evaluated by the multi-criteria decision-making model, engaging a strategy-as-practice lens to SISP to enable an integrative analysis of IS strategy formulation, planning, and implementation. The findings reveal the relative strategic priorities of dimensions, the following core activities, and the global priorities for resource distribution planning for IS strategy of the firm. This paper argues that bringing replicability with SISP and diversifying methodological approaches within the organization is substantial. This paper also suggests that future researchers validate the suggested framework for scientific replicability and expand the SISP research stream within the entire IS/IT ecosystem.

1. Introduction

A firm’s information systems (IS) significantly affect business results in the modern management environment. The information systems substantially shape the way the organizations work, and their performance is embodied and realized through those systems [1]. The rapid penetration of information technology has resulted in considerable attention on digitized data and business intelligence [2], and the enabled digital connectivity has changed how businesses and people work, expediting the proliferation of business information systems to increase efficiency, value, and innovation opportunities [3,4]. Therefore, modern businesses actively aim at improving their performance through adequate information systems [1] as an innovative and core means to secure competitive advantage [5,6,7], and an undoubtable de facto element of success [8].
However, contrary to the expectations, the introduction of all information systems does not necessarily lead to desired performance. The information systems consist of infrastructure, data, applications, and, most importantly, the people who embrace the technology services within the organization [9,10]. IT assets, such as a newly adopted mission-critical system whose usage is often mandated, may lead to dissatisfactory results if the system design is not aligned with the strategic direction or fails to meet the requirements of its users [11,12,13,14]. Furthermore, businesses undergo unprecedented technological changes with their information systems under COVID-19 [15]. Business systems face new technological challenges, such as infrastructure that enables remote work, virtual meetings, contactless commerce, privacy protection, cybersecurity, data analytics, and data-driven decision-making processes [16]. Therefore, it becomes imperative for firms to entrench the new system in the desired organizational practices and processes, while achieving continued system usage from the employees [14,17,18] in the “New Normal,” the post-COVID-19 era.
Strategic information system planning (SISP) becomes central for any business when an organization faces an inflection point concerning its information system. Overall, SISP is a process through which an organization identifies its IT applications portfolio to achieve its organizational objectives and to help execute its business plans [7]. Changing environments enforce organizations to entail significant investments from their revenue and R&D budgets to develop strategic information systems [10,19,20]. Estimating the effectiveness of the investments has been the primary purpose of strategic planning for IS/IT decision-makers [21,22], and the proliferation of new IT technologies since the 1990s has further strengthened the value and contribution of the SISP practice in organizations [20,23]. IS long-term planning that is well-aligned with business strategy has been one of the top management concerns for decades [24].
Moreover, desired performance generated from the information systems in which all the resources are shared and interconnected with the users is crucial for firms [20]. Hence, today’s organizations include SISP as an essential process to improve their performance in designing the elements in information system development, seeking the best effectiveness and efficiency available [7]. As a result, it is understood that aligning the firm’s strategy with the core business system based on a SISP perspective becomes critical for organizations.
A firm’s management can consider various methodological approaches to identify and evaluate the priorities in developing an information system, and one of the vital issues in the SISP is to choose the best-suited method for the stakeholders [25]. In exploring the business needs for IS, various analytical frameworks and techniques may help managers find insight into maximizing organizational effectiveness. The critical success factors (CSFs) approach [26] is widely utilized in implementing the SISP process. Rockart [26] defined CSFs as the crucial areas of business activities that require constant and careful attention from top management. Identifying the CSFs is substantial to businesses [27,28]; the approach has been broadly accepted in the IS literature for a long time [29,30], and is believed to be a valid research methodology to make sense of finding latent elements for competitive advantage [27,31,32].
After analyzing the organizational goals and objectives and the stakeholders having extracted the key CSFs, prioritizing those dimensions would be an issue of significance [31]. Then, a multi-criteria decision-making (MCDM) model can be considered to evaluate the factors drawn [33]. MCDM has helped to overcome the choice problem in various research fields [33,34]. MCDM methodologies support the decision-makers in resolving problems in situations where multiple conflicting criteria exist that need coordination. It is of practical value, capable of being utilized under certain or uncertain situations, and enables stakeholders to scientifically make critical decisions, in line with quantitative and qualitative analyses [34]. Among the various MCDM methods available, AHP [35] has been chosen as a viable technique, proving its compatibility with other methods [33]. In a general sense, a synthesis of methodologies can help researchers to overcome the limitations of a single method and enable a better understanding of a phenomenon, e.g., [25,36,37,38].
Although the extant literature has dealt with SISP as a research topic, most have focused on theorizing SISP in an academic sense and focused on the literature research. There is an information asymmetry in the IS literature on how SISP can occur in reality [39,40], leaving methodological ambiguity. Despite the large pool of literature dealing with SISP, many studies are concerned with its general processual characteristics, i.e., [41], leaving the detailed procedures of how SISP is practiced out of focus, loosening the links between the SISP process and underexplored macro-level contexts. Moreover, there is a strong need for IS researchers to consider connecting SISP with largely uncertain societal factors [42]. Therefore, this study embraces a strategy-as-practice (SAP) method, e.g., [43,44,45], as a theoretical lens to explore SISP through an empirical case study. SAP allows scholars to shift their strategic focus from a mere concentration on effects to organizational performance, while enabling a more comprehensive, in-depth analysis of the real-world details of strategy formulation, planning, and implementation. Ultimately, this study seeks to find a theoretical contribution to the existing literature, providing a practical and comprehensive case of SISP and a novel framework labeled CSF-MCDM. Relatively few academic efforts have been made to present the managerial benefits of a SISP based on the integrative and practical framework as presented in this paper. With this gap in mind, to theoretically contribute to the current knowledge, the primary objective of this study is twofold. First, the study aims to discover the CSFs in SISP practices that will enhance the suitability and effectiveness of the business core system required in the post-COVID-19 era. Second, the study attempts to encapsulate the identified CSFs with a novel framework based on an MCDM model that would help businesses to acquire strategic alignment within the internal needs and existing resources to respond to the rapidly changing business environment, sustaining successful business results stemming from the newly developed information systems.
To address the theoretical gap in the body of the literature and to fulfill the research aim, this study proposes a novel mixed-method—a qualitative dimension and criteria development further enhanced by a quantitative MCDM approach—to enrich and make the existing SISP concept more applicable. Therefore, the study conducts an expert-based qualitative approach, including a comprehensive PEST and SWOT analysis and causal layered analysis (CLA) [37,46,47] to draw CSFs of a next-generation mission-critical system for an automotive company in South Korea. Next, the identified CSFs are evaluated by an MCDM method to present the prioritized relative weights and significance among dimensions and criteria for strategic decision-making.
Ultimately, the study presents the following research questions; (a) What are the corporate mission-critical system’s strategic direction and CSFs in the post-COVID-19 era? (b) What are the relative and weighted priorities of strategically derived factors based on the CSF-MCDM framework? The rest of this paper is organized as follows. First, the theoretical background required for the research framework development is discussed in Section 2. Section 3 deals with research context and methodology for academic replicability. Section 4 presents the qualitative and quantitative results, while Section 5 summarizes the findings. Lastly, the theoretical and practical implications are discussed in Section 6 and Section 7 presents the limitations and suggestions for future researchers.

2. Literature Review

2.1. Strategic Information System Planning (SISP)

Strategic information system planning (SISP) has been a vital concept and interest for information systems managers since the 1980s [20], and the advent of new technologies such as internet-based computing further promoted IS/IT strategic planning in the 1990s, expediting the value of SISP practice [20,23]. Many scholars and the relevant literature have proposed various definitions of SISP. However, it can be generally defined as a process of identifying a computer-based portfolio/applications aligned with a firm’s strategy, which ultimately create a competitive advantage or help the organizations to perform their business by realizing their objectives, e.g., [6,7,48,49,50,51].
The concept of SISP arose with the unavoidable investment pressure to develop strategic information systems [10,19,20], with requirements for the evaluation of the investments becoming the primary drivers of strategic planning for IS/IT assets [21,22,52]. Therefore, SISP has gained considerable recognition and acceptance as an essential management practice and process for improving organizational performance in various fields [7]. Previous scholars stated a that focus and emphasis on SISP could help organizations to enhance their performance, productivity, efficiency, and effectiveness [7,53,54,55].
A large body of the literature has dealt with SISP, providing slightly different definitions from each author. However, some substantial elements are commonly found at its core throughout the research stream, highlighting SISP’s significance. SISP is an integrative and continuous planning activity, a review [20,56,57,58], or an analytical, evaluating exercise [59], which integrates technological elements [56,60], such as a computer-based portfolio/applications [5,6,7,48,49]. SISP is strategic thinking, planning, or deciding a direction for desirable information management and policies [61,62,63,64], which aligns, supports, and influences the business strategy for competitive advantage [55,56,57,60,65], benefiting organizations with superior IS/IT evaluation [25]. From the above, it can be understood that the following common elements are crucial in the SISP process; (a) identification of IS/IT elements, (b) alignment with strategy, (c) decision, review, and process for long-term planning, and (d) being based on the business’ needs and requirements. SISP’s definitions in the literature are presented as follows (see Table 1).
Table 1. SISP definitions in the literature.
The existing SISP literature pool has proposed numerous methodologies to help organizations with strategic plans for information systems [20]. Often, the typical SISP process engages the following five stages; (a) strategic business planning, (b) setting the information systems’ mission and vision, (c) current information system assessment, (d) resource guidelines for the new information system, and (e) long-term strategic proposal [51]. The overall planning process should ensure that technology-related elements are well-aligned with the organization’s needs and strategy [25]. The success of SISP depends on the developers’ ability to ensure a proper alignment among the relevant components [51]. Moreover, as a critical part, the SISP process should define the planning objectives and environmental analysis that connects to the new strategy for the business systems [25,66,67].

2.2. Critical Success Factor (CSF)

Identifying critical success factors is substantial for businesses [27,28]. It is required for the top management to identify the performance factors and priorities in the information systems development strategy to stay competitive. Rockart [26] defines the critical success factors (CSFs) as the limited number of activity areas that must receive continuous and persistent attention from management and may ensure the organization’s successful competitive performance when satisfactory. The author argues that CSFs are substantial performance factors that would bring a competitive advantage to firms. Identifying CSFs allows management to determine the direction of the business focus, develop adequate measurements, and decide the scope of the required business data [26]. Daniel [68] first suggested the CSF concept, which was then further developed by Rockart [26], adding its value to business practices. Usually, the CSF is identified by four major factors; industry, environmental, strategic, and temporal factors.
Choosing an appropriate methodology is one of the vital issues for IS project managers before entering the SISP activities [25]. In implementing SISP to develop the information systems, researchers can consider various methodological options, such as the competitive forces model, value chain analysis, or the scenario planning method [25], to provide a long-term and integrative perspective. However, the CSF method is one of the most widely utilized methods for the SISP process. In particular, the CSF approach has been broadly accepted and utilized as a methodology in the IS/IT literature, has proved itself legitimate for a long time [29,30], and remains valid for the sense-making of a problem based in identifying potential factors for business success [27,31,69]. The CSF method has practical value and influence that enables project managers to integrate sustainability exploration into projects [32,70].
Thus, this study considers the CSF approach a legitimate way to induce critical dimensions to be prioritized in the SISP process by the MCDM-based approach. Additionally, it is known that a synthesis of methodologies can help researchers overcome the limitations of a single method, e.g., [25,36,37,38]. Methodological synthesis is also applicable in the SISP process to provide IT managers with information to carefully plan, review, and align information system development with their business strategy. As a result, after drawing the CSFs, this study tries to combine an MCDM method to evaluate the factors to provide more validity and theoretical robustness.

2.3. Multi-Criteria Decision-Making (MCDM)

Multi-criteria decision-making (MCDM) is a line of research methodology that enables decision-makers to resolve complex problems with multiple conflicting criteria that need to be prioritized based on evaluation values, e.g., [33,34]. It is a powerful and practical tool that can be applied to decision situations where both certainties and uncertainties prevail, and can be incorporated with other quantitative and qualitative methods to provide more scientific rigor [34]. Despite the differences in choosing the methodologies, in the recent literature, there have been efforts to embrace the MCDM approach to prioritize CSFs in other domains [71,72,73,74].
In general, a decision-making process based on MCDM engages the following three stages [75,76,77]; (a) structure the decision problem, (b) choose the best MCDM model, and (c) review the final result with prioritization pointing at preferable alternative orders, decided by the weighted scores. The literature has proposed multiple MCDM methods surrounding the complexity in decision problems. AHP (analytic hierarchy process) [78,79], the ELECTRE (Elimination Et Choix Traduisant la Realité) method [80,81] and its variants (e.g., ELECTRE I, II, III, IV, and Tri), PROMETHEE (preference ranking organization method for enrichment evaluation) [82,83] and its variations, TOPSIS (technique for order of preference by similarity to ideal solution) proposed by Hwang and Yoon [84], and the WASPAS (weighted aggregated sum product assessment) method suggested by Zavadskas et al. [85] are all among the prominent ways that are applicable to the solving of decision problems.
However, despite multiple decision-making methods, there is no single best approach applicable to all decision-making situations [34,86]. It is true that regarding its flexibility for applying it as a stand-alone method or as a part of a combined research strategy, e.g., [35,87], AHP has been the most applied in the relevant research stream, e.g., [34,88,89,90]. Furthermore, among various MCDM methods available in the literature, AHP [35,78,79] has been chosen as a principal MCDM technique, proving its compatibility with other methods [33]. Thus, based on prior discussions, this study evaluates the CSFs discovered throughout the SISP process based on a synthesis with an MCDM method, the AHP.

3. Methodology

3.1. Research Context

Company A, a local affiliate of the world’s largest carmaker that sells over 10 million cars [91] and is an automotive distributor based in South Korea, was established in 2000. It handles two brands (luxury and non-luxury) with a 5.4% market share in the passenger car sector [92]. The company partners with 16 dealers while operating 51 showrooms and 56 service facilities (24 showrooms and 25 service centers for the non-luxury brand, and 27 showrooms and 31 service centers for the luxury brand). The company’s nationwide network hires approximately 1,500 employees, accounting for about 6.8% of all automotive retail sector employment [92].
Based on the 3S concept (sales, service, and spare parts), the company has tried to establish an integrative information system to support the nationwide dealer network. Unlike other global brands in the market, the company has developed and maintained its own locally developed mission-critical system (DMS—dealer management system). This system, connecting the global headquarters network and the local dealers, has undergone two full-scale development stages in 2006 and 2009. However, under the pressure of the rapid environmental changes, the company management team decided to develop the next-generation information system. The DMS processes real-time transactions of critical data such as vehicle production, logistics, sales, service, and detailed information of over 20,000 parts, and provides a comprehensive central system that enables the distributor and the dealers to share and utilize the vast customer information database, connecting other sub-systems, e.g., accounting and human resources. As such, the core system becomes one of the most crucial IS/IT assets of the company, providing substantial strategic values. Further, it can be considered appropriate that this study’s research questions aim to identify the critical success factors of the aforementioned corporate information system as part of the SISP perspective and present an analysis framework to derive the strategic priorities with empirical examples. Therefore, this study decides to utilize the case of Company A in the planning process for strategic information system development, assessing the critical success factors based on the analytical framework explained in the next section.

3.2. Evaluation Framework and Analytical Approach

This section presents CSF-MCDM, a generalized framework for evaluating the critical success factors in the strategic information system planning process, and a detailed research approach for replicability. As discussed in the previous Section 2, the SISP process reflects the firm’s strategic business planning. It requires clarification of the information systems’ mission/vision analysis based on the current system assessment to propose a long-term strategic proposal that would lead to the organization’s competitive advantage. The CSF-MCDM framework presented in this study streamlines the overall process to induce the dimensions and their subsequent criteria for CSFs and assess them based on the MCDM’s proposed weighted priorities of items, aligned with the firm’s strategic needs.
Researchers may embrace mixed methods for social sciences [93], and extant studies have adopted a mixed-methods design that integrates quantitative and qualitative methodology in a single study [94,95], presenting the best of both worlds [93]. Hence, this study first induces the CSFs of the company’s information systems based on the qualitative approach, using methods such as causal layered analysis [47,96], which will be introduced in Section 4, and moves on to the quantitative MCDM method to analyze the derived CSFs to suggest implications for information systems development based on a SISP perspective. The detailed processes of the CSF-MCDM framework presented in this study are;
  • Define scope (IS mission and vision). In this stage, the mission and vision of the firm’s mission-critical system are identified. Caralli [31] suggested the following five-step method for deriving CSFs; (a) define scope, (b) collect data, (c) analyze data, (d) derive CSFs, and (e) analyze CSFs. Therefore, the organizational mission and vision should be clarified and reconfirmed among the stakeholders before the IS mission and vision are defined for the rest of the strategic planning process. The researcher and six business analysts in charge of the firm’s information systems participated in this step. This analysis included; (a) defining the company’s mission, domain, core value, vision, and strategy, and (b) aligning the mission-critical system’s mission and vision with the firm’s strategic direction. The business analysts checked the purpose, background, and history of its mission-critical system development while formulating the mission and vision from the IS standpoint, and used this as the primary data for the following process.
  • Define scope (PEST-SWOT). PEST-SWOT analysis was performed based on the derived IS mission and vision, reviewing its current status. The six analysts divided the PEST aspects (political, economic, social, and technological) as internal and external factors, combining them with the positive (+) and negative (−) factors of the SWOT (strength, weakness, opportunities, and threat) framework to stimulate emergent strategic thoughts. The results were shared with the 23 experts who attended the following CLA process to draw CSF dimensions and sub-criteria.
  • Collect data based on CLA. This stage applied CLA methodology [96] to derive the qualitative data and expert opinions surrounding the firm’s mission-critical system. To this end, 23 experts with various IS/IT backgrounds participated in the session. CSFs can be derived by qualitative approaches such as document review or discourses based on interviews with management personnel or specific stakeholders asking about the barriers or hurdles to the organizational objectives [97]. CLA, which effectively enables stakeholders to search for the hidden drivers and assumptions for a particular surface/superficial issue, was considered a way to collect primary data through a workshop setting. This session consisted of the following five steps; (a) environmental scan, which is a preliminary session for the following four steps, (b) litany, (c) system causes, (d) worldview, and (e) myth/metaphor layer.
  • Analyze data. This step focused on finding components from the qualitative data collected in the previous session. The researcher grouped the similar drivers found in the CLA’s second step (system causes), based on the consensus of participants, and coded the essential ingredients (hidden thoughts and ideas) to build sub-criteria in the next stage.
  • Derive CSFs. A dimension-reducing process led to finalizing the CSF dimensions and sub-criteria from the analyzed qualitative information. The participants linked the relevant dimensions (level 1 hierarchy) with sub-criteria (level 2 hierarchy), finishing the preparation for the evaluation and prioritization of CSFs in the next stage, which is essential in the SISP process.
  • Evaluate CSFs. The next stage carried out an MCDM quantitative evaluation of the CSF dimensions and sub-criteria derived from qualitatively collected data. AHP, a widely accepted decision-making MCDM methodology, was applied, as described in Section 2 of this study. The final dimensions and criteria were sent to the participants by email to be evaluated by the pairwise scoring. Lastly, after the recollection of the respondents’ data, the AHP-based weighted values were created.
  • Strategic proposal. Finally, this stage synthesized the qualitative approach and quantitative evaluation results, presenting the study’s findings with theoretical implications and practical suggestions based on long-term strategic information system planning. The detailed research framework is presented as follows (see Figure 1).
    Figure 1. Research design.

4. Results

4.1. Extracting Critical Success Factors

4.1.1. Mission and Vision Analysis

The analytical procedure took place in April 2021. The researcher has over 20 years of experience in the sector and has served as the company’s information service manager. The company has six business analysts responsible for various areas of the firm’s mission-critical system. The company’s existing strategic direction, including its mission and vision, was confirmed;
  • Business domain: Regional distributor supporting sales, service, and spare parts;
  • Mission: Producing happiness for all customers, employees, and stakeholders;
  • Vision: Mobility for all and the most respected brand;
  • Core value: Always customer-first and customer delight;
  • Strategy: Maximize profit based on managed customer and vehicle lifecycle.
To this end, the firm’s following IS mission and vision were reconfirmed.
  • IS Mission: To design, provide, manage, and maintain the mission-critical system that can foster a business environment where secure collection, storage, use, and transaction of the data for customers, dealers, and the headquarters takes place and that flexibly meets the needs of the customers and the system users to maximize customer delight and the productivity of the fieldwork teams.
  • IS Vision: Become the top-level information systems provider in the town, who would go beyond the competition with the most advanced, personalized, foresighted, flexible, adaptable state-of-the-art technology, which would generate strategic advantage based on the continuous improvement and respect for people, which is the company’s most substantial philosophical value.

4.1.2. PEST-SWOT Analysis

As a next step, the company’s business analysts attempted a PEST-SWOT analysis regarding the current situation. PEST is often used to analyze and objectify situations affected by the political, economic, social, and technological macro environments in the areas of interest [98], while SWOT analysis addresses the internal strengths and weaknesses with the external threats and opportunities of organizations that lead to tactics to achieve the strategic goals [25]. SWOT can also be utilized as an analytic technique based on and combined with internal and external environmental analysis [99] to develop logical strategic alternatives. Previous researchers strived to synthesize environmental analytical frameworks such as PEST or STEEP (socio-cultural, technological, economic, environmental/ecological, and political) to map the environmental factors with the organizational internal and external aspects derived from SWOT, e.g., [100,101,102]. The best illustration of integrating PEST and SWOT is to divide internal and external PEST factors into positive (strengths and opportunities) and negative factors (weaknesses and threats) to maintain the logical consistency of the analysis. As a result, this study conducted an integrative analysis to enrich the explanatory power of the AS-IS situation of Company A’s information system. Five positive internal aspects were identified in PEST-Strength, while nine negativities were found in PEST-Weakness. Moreover, the PEST-Opportunity quadrant pointed at ten positive aspects, while the PEST-Threat area identified seven negativities. The summarized result of the PEST-SWOT framework is presented below (see Table 2).
Table 2. PEST-SWOT analysis result.

4.1.3. CLA Process and Results

Participants: The mission–vision and PEST-SWOT analysis results were used as primary data for the qualitative data collection process through CLA, which is the following process. The choice of research participants and the sharing of available up-to-date information is critical to the qualitative research’s effectiveness because the stakeholders’ higher engagement means more valuable insights and foresight [103]. This study invited 23 IS/IT experts to conduct a CLA workshop for CSF derivation. All of the experts were directly/indirectly involved in the operation of the company’s information system and were judged to have sufficient knowledge to proceed with the discussion. The detailed information for the expert group is presented as follows (see Table 3).
Table 3. Descriptive statistics of participants.
Causal layered analysis: The CLA process conducted for this study aimed to identify the latent dimensions and sub-criteria related to CSFs, and the qualitative methods are regarded as the most appropriate technique for collecting rich and detailed data from experts [104]. CLA is an approach that generates foresight to effectively reshape the future [47]. It is one of the newest [105] and most well-known future theories and methodologies [96]; it is a structured method to look through the surface-level issues and dig deep down to the understanding/misunderstanding that may define/constrain the surface issues [105]. CLA classifies the different concerns and views of the stakeholders to inspect multiple strategic options, identifying driving factors and people’s worldviews that affect the surface issue [37]. CLA encourages discourses visualizing the unseen causalities of the variables, leading to a more robust strategy based on a better understanding of stakeholders, and creating a different, desirable future state [46].
The CLA process consists of four layers; litany, system causes, worldview, and myth/metaphor [37]. In the litany layer, stakeholders share a superficial description of reality that best describes the current issue (the official description or the topic). The system causes layer lets participants discuss and identify what drivers cause the problem. Worldview explores and summarizes various stakeholders’ hidden thoughts and views on reality. Eventually, the myth/metaphor layer deals with hidden myths behind the worldviews. Usually, a new litany (redesigned reality) and the subsequent layers can be discussed to create a new future state. However, this paper only focuses on the analytical process, including the four layers mentioned above, because scenario building is not the scope of this paper nor the interest. The detailed CLA process is presented in the following illustration (see Figure 2).
Figure 2. Illustration of CLA process (Source: Author’s elaboration).
Environmental scan: Beginning with an explicit picture of the topics is essential in qualitative research [103]. Before commencing the CLA workshop, previously collected data (IS mission, vision, and PEST-SWOT results) were delivered to the participants through email as an initial understanding effort of the environmental factors affecting the mission-critical system strategy. Before participating in the CLA workshop, the experts were asked to contemplate the issues.
Litany: The litany layer in the CLA process discusses the visible surface issues that arise as imminent problems for organizations and seeks a consensus in facing the issue among the stakeholders. Various stakeholders’ perspectives on Company A’s information system formulated in the environmental scan stage were reviewed. The workshop facilitator again displayed the prevailing issues found previously and led the group with questioning skills, letting the experts brainstorm and respond to the topics based on their experiences and knowledge. The participants revealed that the firm’s information system is under severe pressure to change to immediately provide long-term plans for a next-generation business system with a strategic roadmap to ensure the change. Significantly, the whole group agreed that to strive with the mission and vision that the company holds, strategically aligned success factors should be drawn and reviewed based on the internal/external elements that the organization had induced with management effort to secure a future competitive advantage with information service.
System causes: After reaching consensus in the litany layer, the drivers for the surface issues were examined and explored, while the experts tried to review the complex dynamics regarding IS/IT tasks. As a result, the expert group identified nine factors as presented below.
  • Agility in business applications. Required business systems are not developed nor provided promptly. The experts identified the significance of providing field-support applications to adapt to rapid change.
  • Performance-enhancing UX. A business application that is not user-friendly is degrading business efficiency. It is also vital to provide a flow-generating environment through a usability strategy.
  • Technical complexity. More and more unheard-of technologies are applied and integrated with the existing information systems, which requires extraordinary effort in understanding and using the technology.
  • Resource management. Managing workforce (HR) and internal resources efficiently from an integrative management perspective is essential and should be considered in the system design.
  • Shifting way of work. Due to social distancing measures during the COVID-19, diverse operational options such as remote work and supporting contactless customer services have become indispensable IS responsibilities.
  • Increasing cyber threats/incidents. Under the ever-spreading digital connectivity driven by the pandemic, illegal/unauthorized access efforts, intrusions, and cyberattacks on vital corporate IS/IT assets have increased.
  • Privacy protection issues. A very high level of personal information protection policies in major EU countries/advanced economies is requested, and meeting these requirements in the SISP process becomes fundamental.
  • Demand for data-driven DB and interface. As the need to interconnect numerous existing applications, sub-systems, and databases intensifies and the demands for data analysis inside and outside the enterprise are constantly increasing, the inherent flexibility to utilize data must be secured.
  • Integrative view for business insights. The ability to sense meaningful signals in real-time interactive data and transform them into business intelligence is becoming a competitive advantage for modern enterprises.
Worldview: In this session, participants discussed the invisible structures behind the drivers, revealing their impacts on imminent surface issues. Often, the industry’s common assumptions and views about “how the world is or should be” emerge throughout the session [96]. Finally, the experts presented fourteen critical views behind the system causes layer.
  • IS Myopia. IS/IT teams are obsessed with request-based development, focusing only on operational improvement, not being transformational.
  • Bureaucracy, top-down, and big-bang. It is difficult to respond to urgent IS/IT issues due to the bureaucratic budget allocation and management that does not allow for exceptions. Only budgets for predictable/concrete investment plans such as infrastructure are reflected. In addition, top-down decision-making and big-bang-type project operation may limit flexible operation.
  • Lack of user orientation. The firm’s weak business analyst capabilities limit the complete reflection of real-world business processes and needs towards the mission-critical system.
  • No look back. Lack of PDCA (plan-do-check-act) cycle matters. In reality, “check” and “act” might be of more significance than plan and do. Regular system evaluation and performance review should follow suit.
  • Difficulties in system maintenance. Because each pillar of information service requires clients to make rapid decisions on adopting and applying new technologies, it is almost impossible to respond to technical needs with internal resources alone. Strategic partnerships, links with vendors, or external ecosystems should be prioritized.
  • Path-dependency on a legacy system. Decision-makers (client-side) often fail to realize modeling real-world business operations within the business system due to the inertia within the organization, leading to lagged support and inefficiency.
  • Shifting to the new normal. Due to uncontrollable and unpredictable socio-economic events, such as COVID-19, customers continue to request new channels (i.e., digitized omnichannel service) and contactless sales/service while the employees need to work remotely.
  • Less human processes. It is deemed that the introduction of business process automation becomes substantial to deal with workforce unavailability. Further, organizations are expected to increase system dependence with simplified standard work procedures to improve organizational effectiveness, reducing human errors.
  • Inborn deficiencies. Legacy systems were not inherently designed to keep up with the severe cyber threats, attacks, and penetration efforts that we experience today, nor the high standards of privacy protection requested by government authorities. Security aspects should be considered together with applications development or infrastructure configuration.
  • Phantom menace. Organizations need extended internal capabilities for organized responses to the existing threats. Flexible and convenient system usability that responds to users’ needs is critical. However, internal capabilities to remove invisible threats must be stressed.
  • Loose control. There is a tendency to downplay the importance of policy management on the client side. Efforts for risk management, such as establishing, controlling, and reconfirming system access control based on periodic inspection, are still insufficient.
  • Where is what? Organizations should be able to gain the information whenever they need it in the desired form. In addition, it is necessary to have an active data platform structure to collect, converge, classify, and analyze endogenous and exogenous data generated throughout the business process. Many organizations are transforming themselves into data companies. Building a standardized interface to respond to national initiatives such as “myData”, a project that allows industries to share personal data to create added value, will become increasingly critical.
  • Machine intelligence for human intelligence. Systems that use artificial intelligence and machine learning in crucial decision-making processes will increase. Artificial intelligence will become essential in almost every process along the value chain to maximize organizational effectiveness, and flexible business intelligence becomes paramount to all members.
  • Customers, out of nowhere. The growing effort to trace and leverage the digital footprint of every step of the customer journey requires redesigning the existing information systems, focusing on the front-end of the business, and requesting the review towards the overhaul or reconfiguration of the database.
Myths/metaphors: Lastly, the bottom layer of CLA was examined, revealing the myths/metaphors unseen behind the worldviews. The following four relevant images/descriptions appeared in this layer.
  • IS? Information status-quo (company inertia). One may wonder if there is a strong will for the next generation of the mission-critical system within the client organization. Management talks about the critical necessity for the IS development strategy, but the executives are always reluctant and conservative on any changes relevant to long-term investment. Hence, only a mere operational transformation is achieved, following the competitors.
  • Sometime later (low priority). Even after deciding to proceed with SISP, its priority eventually lowers because many stakeholders do not see IS/IT planning as a project with business impact and priority. As a result, an isomorphism occurs, seeking to level themselves only at the competition capabilities level.
  • A perfect storm (digital connectivity). The importance of IS/IT has become more substantial than ever. Organizations that stand still and satisfy themselves with the status quo will gradually fall behind. The need for long-term strategic planning of information systems will come to the forefront.
  • A frog in the well. A company’s information system is no longer just a mere “system,” but is instead everything that connects the organization to external systems based on connectivity. Technology such as blockchain or distributed ledger will gradually strengthen belief over data connectivity. To survive, businesses should focus more on the “ecosystem” perspective rather than the “just a system” view.
All the variables, surface issues, drivers, hidden reasons, and unrevealed stakeholders’ thoughts surrounding the information systems in the entire CLA process are summarized below (see Table 4).
Table 4. Summary of CLA results.

4.1.4. Finalizing CSF Dimensions and Sub-Criteria

While deciding CSFs in a strategic planning process, it is advised that organizations limit their focus areas to a small number, ideally less than 10 [106]. Four CSF dimensions were induced based on the nine variables derived from the system causes (SC1~SC9) (see Table 5). After closing the CLA session, the researcher, facilitator, and the 23 experts compressed the similarly grouped variables to reduce the dimensions based on the discussion. As a result, four dimensions (D1~D4) emerged; applications development (from SC1 and 2), business operation (SC 3, 4, and 5), compliance and cybersecurity (SC 6 and 7), and lastly, data-driven flexibility (SC 8 and 9). The participants labeled the strategy as the “ABCD” of information systems based on these four dimensions.
Table 5. CSFs derived from key issues of CLA (dimensions and sub-criteria).
After that, the participants agreed to match relevant sub-criteria derived from 14 findings of the worldview layer (WV1~WV14) under each dimension. Consequently, the statements were refined to become representative criteria. The following table shows the matching results (see Table 5). Finally, the CSF dimensions and sub-criteria were defined and neatly arranged for the relative weighted priority analyses based on the MCDM method in the next section (see Figure 3).
Figure 3. Critical success factors hierarchy.

4.2. Evaluating CSFs Using MCDM

AHP, one of the most broadly used MCDM methods, was adopted to evaluate and prioritize the derived CSF dimensions. AHP was initially designed and proposed by Saaty [78] to propose a reasonable solution to a complicated problem for decision-making, and has been widely applied in a variety of research fields [107]. It provides a systematic process to comprise factors (e.g., logic, experience, and knowledge) with a sense of optimized result as a decision-making method [34]. AHP simplifies a multi-criteria problem into a hierarchy with levels. “Hierarchy” represents a complex problem in a multi-level structure where often the top level means a goal or an objective having sub-levels down to the last level of the alternatives [79], making a complex problem visible and structured into a form of hierarchy with more clarity and visibility. Typically, AHP goes through the following four steps; (a) modeling a hierarchy, (b) conducting a pairwise comparison among the dimensions or sub-level criteria, (c) summarizing the evaluation results, and (d) synthesizing the priorities derived from the normalized evaluation matrix [108].
There are two indices that a researcher may want to consider in interpreting the AHP result; consensus and consistency ratio (CR). Goepel [109] suggested the idea of group consensus levels to present an estimate of the agreement on the decided priorities among evaluators; low (50% to 65%), moderate (65% to 75%), and high (75% to 85%). Researchers must pay attention to values lower than 50% because it means that there is no consensus within the group and the diversity of judgment is high. AHP accepts logical inconsistencies in judgments evaluated by the CR indicator. Theoretically, there is no problem when the “consensus” is zero because it simply means that the population is divided into two opposing groups. However, as a golden rule in AHP, CR should be equal to or smaller than 10% [108] because the CR indicator relates to the confidence level of the analytical results [110]. CR should be strictly distinguished from a consensus because CR looks at the subjective evaluation consistency of participants. CR is calculated by dividing CI (consistency index) by RI (random consistency index). One may need to change the survey participants or consider increasing the number of evaluators to produce a sufficient sample size when CR is not acceptable.

4.2.1. Dimension (Level 1) Analysis

This paper checked the consensus level and CR ratios in all dimensions and sub-criteria comparisons. As for the analytical tool, AHP-OS (AHP online system) by Goepel [111] was used. A total of 23 experts who participated in the previous CLA workshop received an email to conduct a pairwise comparison of all dimensions and sub-criteria and were asked to provide their opinion using the standard AHP 9-point linear scale (the chosen factor is more critical than the other; 1 = even, 3 = slightly, 5 = moderately, 7 = significantly, and 9 = absolutely).
As for level 1 priorities (CR = 1.9%), compliance and cyber security (D3) appeared to be the dimension of top priority (34.2%), followed by business operation (D2, 26.6%), data-driven flexibility (D4, 22.2%), and applications development (D1, 17.0%). The final consolidated decision matrix and priorities for the CSF dimensions (level 1 hierarchy) are presented (see Table 6 and Table 7).
Table 6. Consolidated decision matrix for main CSF dimensions.
Table 7. Consolidated priorities for main CSF dimensions.

4.2.2. Sub-Criteria (Level 2) Analysis

Regarding level 2 priorities, the weights distributed among D1 (CR = 2%) are; early detection and instant support for system requirements (C3, 28.2%), periodic review of the application development roadmap (C4, 27.3%), development-oriented decision-making and authority (C1, 25.3%), and enhanced development resources and budget (C2, 19.3%). The consolidated priorities for D2 (CR = 1.3%) are; outsourcing for integrated system operation and management (C5, 28.6%), as-a-service expansion (cloud-based) (C6, 27.5%), extended business process automation (C8, 24.6%), and system support for contactless, distant work (C7, 19.4%). D3 (CR = 0.0%) priorities appeared to be in the order of; enhanced expertise and CISO organization (C10, 47.2%), security involvement in initial designs (DevSecOps) (C9, 26.5%), and reinforcement of internal controls and policies (C11, 26.3%). Lastly, priorities for D4 (CR = 0.9%) were; data-driven decision-making (AI/ML), business intelligence (C13, 52.3%), digital leads, integrated database (C14, 31.8%), and standardized data provision platform (C12, 15.9%). AHP consensus for all four dimensions (D1~D4) was 65%, which is moderate. The final consolidated decision matrices and consolidated priorities for CSF criteria (level 2 hierarchy) are presented in the following tables (see Table 8, Table 9, Table 10, Table 11, Table 12, Table 13, Table 14 and Table 15).
Table 8. Consolidated decision matrix for D1 sub-criteria.
Table 9. Consolidated priorities for D1 sub-criteria.
Table 10. Consolidated decision matrix for D2 sub-criteria.
Table 11. Consolidated priorities for D2 sub-criteria.
Table 12. Consolidated decision matrix for D3 sub-criteria.
Table 13. Consolidated priorities for D3 sub-criteria.
Table 14. Consolidated decision matrix for D4 sub-criteria.
Table 15. Consolidated priorities for D4 sub-criteria.

4.2.3. Global Priorities

Lastly, the global priorities of all sub-criteria are provided (see Table 16). The top five criteria identified as contributing to the upper level of critical success factors, the so-called “ABCD” of strategic information systems planning, are as follows;
Table 16. CSF hierarchy for dimensions and sub-criteria.
  • Enhanced expertise and CISO organization (16.1%);
  • Data-driven decision-making (AI/ML), business intelligence (11.6%);
  • Security involvement in initial designs (DevSecOps) (9.1%);
  • Reinforcement of internal controls and policies (7.6%);
  • Outsourcing for integrated system operation and management (7.3%).

5. Discussions

This paper aimed to discover the CSFs of a company business system based on SISP and present a novel evaluation framework by MCDM for company-wide strategic alignment, answering the two primary research questions. Among various factor-developing techniques that range from the competitive forces model to the scenario planning and MCDM methods such as ELECTRE [80,81], PROMETHEE [82,83], TOPSIS [84], and WASPAS [85], this study presented a synthesized mixed-method framework based on CSF and AHP to enrich and make the existing SISP concept more applicable. Based on the CSF-MCDM framework, the researcher followed six steps, combining the qualitative approach to derive CSFs that incorporated PEST-SWOT and CLA procedures and the quantitative approach to prioritize and evaluate the main pillars of IS/IT strategy. The results and findings of the paper are as follows.
First, the structured SISP process based on the framework presented in this study completed the IS strategy formulation based on the insider/stakeholders’ perspectives. The qualitative process reflected diverse opinions, views, assumptions, and environmental drivers to draw the main four dimensions of CSFs that consist of future IS strategy. After internal business analysts thoroughly reviewed the firm’s strategy pillars (mission, domain, core value, vision, and business strategy), environmental factors combined with strengths and weaknesses (PEST-SWOT) were analyzed to be proposed as fundamental data for the other qualitative process (CLA). A total of 23 IS/IT professionals then discussed the importance of imminent IS planning and the strategic roadmap, providing qualitative data for inducing relevant dimensions and sub-criteria that make up a CSF hierarchy. As a result, new IS strategic pillars such as applications development, business operation, compliance and cybersecurity, and data-driven flexibility were derived.
Second, the analysis of layer one presented relative strategic priorities among dimensions based on the MCDM method. The quantitative process revealed that among the CSF dimensions, compliance and cybersecurity take the top priority in preparing the next-generation mission-critical system. Understandably, businesses have faced life-or-death situations with risk management of their information systems since COVID-19 [15]. Further, it was also found that issues with efficiencies and effectiveness in business operation and data-driven flexibility come before applications development in terms of strategic priority.
Third, the sub-criteria (level 2) findings indicated the core activities to support the respective CSF dimensions drawn for IS strategy. Early detection and instant support for system requirements (C3 for D1), outsourcing for integrated system operation and management (C5 for D2), enhanced expertise and CISO organization (C10 for D3), and data-driven decision-making (AI/ML) and business intelligence (C13 for D4) were chosen as the result of the weighted distribution. As a supporting layer that makes up the higher layers connecting to the IS strategy and the firm’s business strategy, the priorities decided in this layer seemed to bring more alignment with the organizational direction.
Lastly, the global priorities analysis results pointed at the optimized resource distribution planning in the overall IS strategy. The top five sub-criteria found to have relative weights were; (a) three items in D3: security involvement in initial designs (DevSecOps), enhanced expertise and CISO organization, and reinforcement of internal controls and policies, (b) one item in D1: outsourcing for integrated system operation and management, and (c) data-driven decision-making (AI/ML) and business intelligence. The result shows that D3 takes approximately 60% of the weight among the four dimensions of CSFs. It also hints at the experts’ concern that enhancing compliance and risk management against the cyber threats are the commonly set priorities in modern IS/IT implementations.

6. Conclusions

This paper has significant theoretical implications, as follows. First, this paper contributes to the current knowledge regarding SISP by proposing a novel mixed-method research framework consisting of a qualitative dimension and sub-criteria development enhanced by a quantitative MCDM to provide rich context and more applicability. To this end, the study conducted a PEST and SWOT analysis (endogenous view) and an expert-based CLA (exogenous view) [37,46] to draw CSFs of a next-generation information system, followed by evaluation by AHP to present prioritized relative weights and significance for strategic decision-making. The recent literature dealing with CSFs evaluated by MCDM includes studies based on (a) fuzzy interpretive structural modeling (ISM) combined with matrix impact of cross-multiplication applied to classification (MICMAC) analysis [74], (b) expert Delphi and Additive Ratio Assessment (ARAS) method [73], (c) literature reviewed factor selection and DEMATEL (decision making trial and evaluation laboratory) approach [72], and (d) policy framework derived by fuzzy DEMATEL method [71]. However, despite their unique contributions to the relevant knowledge, none considered strategic alignment with higher-level company-wide strategy, neglecting the details of the strategic alignment process. In light of the above, the value and contribution of this paper that further distinguishes itself from the other research are rich, integrative, and comprehensive strategy processes. Further, prior studies focused on the “evaluating and analyzing” of CSFs, weighing on the statistical procedures of MCDM rather than “reflecting and inferencing” rich contexts and unseen causalities to build CSFs characterized by qualitative methodologies as presented in this study. No prior research that attempted to synthesize CLA and MCDM methods for SISP is found in the literature. Further, this paper enriches the existing literature by engaging a strategy-as-practice perspective, e.g., [43,44,45], as a theoretical lens for making SISP a more manageable and predictable process rather than a mere conceptual research agenda for scholars. This study also removes information asymmetry and methodological ambiguity in IS literature [39,40] by providing an applicable micro-level, multi-method framework labeled CSF-MCDM for SISP.
This paper also presents several managerial applications. First, this study highlighted a real-world case for the SISP process that would further strengthen the replicability of organizations. As pointed out by diverse scholars, how organizations deal with SISP processes remains in question, leaving IS/IT managers confused about implementing an effective strategy. As described in this research, future managers will be able to conduct their SISP with more focus and effectiveness while reducing uncertainties. Second, the approach adopted in this research project may allow managers to diversify their methodological approaches further to formulate, plan, and implement IS/IT strategies. Mintzberg [112] pointed out that creative strategies are born from emergent and diverse thoughts. In this regard, managers can utilize qualitative methodologies, such as CLA used in this study, to incorporate each stakeholder’s diverse view and expertise to enhance the existing information system. Because the business phenomenon is multi-layered and multi-faceted [37], it would not be effective for a manager to adopt only one method for decision-making of importance. The different views drawn along the strategy formulation process can also be effectively evaluated and prioritized by MCDM, providing more concrete and practical management decisions for the future. As exemplified in this research, managers can involve stakeholders with different views and backgrounds and include those opinions in the strategy process to enhance organizational effectiveness. Third, the variables, drivers, and hidden thoughts made visible in this research represent the must-review agenda of the “New Normal era.” Business systems face new technological challenges regarding remote work, virtual meetings, contactless commerce, privacy protection, cybersecurity issues, data analytics, and data-driven capabilities [16]. It becomes more apparent that organizations must seek alignment with the upper-level strategy while satisfying the IS users to secure continued usage [18] for the desired organizational performance in the post-COVID-19 era. The CSFs derived in this research may match modern businesses’ needs to enhance the technology-supported business performance required in today’s competitive business environment.

7. Limitations and Future Research

This paper presents several limitations as follows. First, it may be difficult to remove the subjectivity of the stakeholders entirely. Generally, it is known that qualitative research is subject to validity problems. Moreover, a method such as CLA has its weaknesses of presenting “collective futures” or failing to examine an individual’s psychological aspects [113]. However, integrated qualitative research models may be of more value when supported by other quantitative methods [37], bringing more academic interest and business practicality. Moreover, future researchers may want to repeat the SISP processes based on the CSF-MCDM framework to secure more validity and the scientific replicability required for the subsequent studies. Second, a more diverse approach to implementing SISP could be considered. This study adopted a CSF-MCDM framework that assumes the merits of combining qualitative–quantitative methods. However, future researchers may diversify the SISP by adopting a new perspective, i.e., a quantitative–quantitative combination. Inducing CSFs using technology could be one suggestion that enables researchers to maximize the potential of AI/ML techniques, including text-mining. Third, the SISP literature pool needs to be enhanced by studies conducted in diverse cultures, countries, and contexts. This paper argues that to answer the academic call from Hughes and McDonagh [45], the SISP research stream should be diversified and enriched, expanding upstream and downstream of the entire IS/IT ecosystem regarding the significance of the technological advancements.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Acknowledgments

The author is thankful to the Institute for Industrial Policy Studies, aSSIST Business School, and Business School Lausanne for their support.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

AHPAnalytic Hierarchy Process (AHP)
AIArtificial Intelligence
ARASAdditive Ratio Assessment
CIConsistency Index
CLACausal Layered Analysis
CSFCritical Success Factor (CSF)
CRConsistency Ratio
DBDatabase
DEMATELDecision Making Trial and Evaluation Laboratory
DevSecOpsDevelopment, Security, and Operations
ELECTREElimination Et Choix Traduisant la Realité
ISInformation Systems
ISMInterpretive Structural Modeling
ITInformation Technology
MCDMMulti-Criteria Decision-Making
MICMACMatrix Impact of Cross-Multiplication Applied to Classification
MLMachine Learning
PESTPolitical, Economic, Social, and Technological
PROMETHEEPreference Ranking Organization Method for Enrichment Evaluation
RIRandom Consistency Index
SISPStrategic Information System Planning
SWOTStrength, Weakness, Opportunity, Threat
TOPSISTechnique for Order of Preference by Similarity to Ideal Solution
UXUser Experience
WASPASWeighted Aggregated Sum Product Assessment

References

  1. Beynon-Davies, P. Business Information Systems, 3rd ed.; Red Globe Press: New York, NY, USA, 2020. [Google Scholar]
  2. Liang, T.-P.; Liu, Y.-H. Research Landscape of Business Intelligence and Big Data analytics: A bibliometrics study. Expert Syst. Appl. 2018, 111, 2–10. [Google Scholar] [CrossRef]
  3. Schmidt, E.; Cohen, J. The New Digital Age: Reshaping the Future of People, Nations and Business; John Murray: London, UK, 2014. [Google Scholar]
  4. Schwertner, K. Digital transformation of business. Trakia J. Sci. 2017, 15, 388–393. [Google Scholar] [CrossRef]
  5. Selamat, M.H.; Suhaimi, A.; Hussin, H. Strategic Information Systems Planning (SISP) and Strategic Information Security Planning (SISecP) In Malaysian Government Agencies. In Proceedings of the Regional Postgraduate Conference on Engineering and Science (RPCES 2006), Johore, Malaysia, 26–27 July 2006. [Google Scholar]
  6. Issa-Salwe, A.M.; Sharif, L.; Ahmed, M. Strategic information systems planning as the centre of information systems strategies. Int. J. Res. Rev. Comput. Sci. 2011, 2, 156–162. [Google Scholar]
  7. Harun, H.; Hashim, M.K. Strategic information systems planning: A review of its concept, definitions and stages of development. Int. J. Res. Sci. Eng. 2017, 3, 432–441. [Google Scholar]
  8. Legner, C.; Eymann, T.; Hess, T.; Matt, C.; Böhmann, T.; Drews, P.; Mädche, A.; Urbach, N.; Ahlemann, F. Digitalization: Opportunity and Challenge for the Business and Information Systems Engineering Community. Bus. Inf. Syst. Eng. 2017, 59, 301–308. [Google Scholar] [CrossRef]
  9. Davis, G.B. Information Systems Conceptual Foundations: Looking Backward and Forward. In Organizational and Social Perspectives on Information Technology: IFIP TC8 WG8.2 International Working Conference on the Social and Organizational Perspective on Research and Practice in Information Technology June 9–11, 2000, Aalborg, Denmark; Baskerville, R., Stage, J., DeGross, J.I., Eds.; Springer: Boston, MA, USA, 2000; pp. 61–82. [Google Scholar]
  10. Chen, D.Q.; Mocker, M.; Preston, D.S.; Teubner, A. Information Systems Strategy: Reconceptualization, Measurement, and Implications. MIS Q. 2010, 34, 233. [Google Scholar] [CrossRef]
  11. Malaurent, J.; Avison, D. From an apparent failure to a success story: ERP in China—Post implementation. Int. J. Inf. Manag. 2015, 35, 643–646. [Google Scholar] [CrossRef]
  12. Recker, J. Continued use of process modeling grammars: The impact of individual difference factors. Eur. J. Inf. Syst. 2010, 19, 76–92. [Google Scholar] [CrossRef]
  13. Liang, H.; Xue, Y.; Wu, L. Ensuring Employees’ IT Compliance: Carrot or Stick? Inf. Syst. Res. 2013, 24, 279–294. [Google Scholar] [CrossRef]
  14. Rezvani, A.; Dong, L.; Khosravi, P. Promoting the continuing usage of strategic information systems: The role of supervisory leadership in the successful implementation of enterprise systems. Int. J. Inf. Manag. 2017, 37, 417–430. [Google Scholar] [CrossRef]
  15. Soto-Acosta, P. COVID-19 Pandemic: Shifting Digital Transformation to a High-Speed Gear. Inf. Syst. Manag. 2020, 37, 260–266. [Google Scholar] [CrossRef]
  16. O’Leary, D.E. Evolving Information Systems and Technology Research Issues for COVID-19 and Other Pandemics. J. Organ. Comput. Electron. Commer. 2020, 30, 1–8. [Google Scholar] [CrossRef]
  17. Arvidsson, V.; Holmström, J.; Lyytinen, K. Information systems use as strategy practice: A multi-dimensional view of strategic information system implementation and use. J. Strat. Inf. Syst. 2014, 23, 45–61. [Google Scholar] [CrossRef]
  18. Kim, S. How a company’s gamification strategy influences corporate learning: A study based on gamified MSLP (Mobile social learning platform). Telemat. Informt. 2020, 57, 101505. [Google Scholar] [CrossRef]
  19. Kleis, L.; Chwelos, P.; Ramirez, R.V.; Cockburn, I. Information Technology and Intangible Output: The Impact of IT Investment on Innovation Productivity. Inf. Syst. Res. 2012, 23, 42–59. [Google Scholar] [CrossRef]
  20. Amrollahi, A.; Ghapanchi, A.H.; Najaftorkaman, M. A Generic Framework for Developing Strategic Information System Plans: Insights from Past Three Decades. In Proceedings of the PACIS, Chengdu, China, 24–28 June 2014. [Google Scholar]
  21. Earl, M.J. Experiences in Strategic Information Systems Planning. MIS Q. 1993, 17, 1–24. [Google Scholar] [CrossRef]
  22. Krell, K.; Matook, S. Competitive advantage from mandatory investments: An empirical study of Australian firms. J. Strat. Inf. Syst. 2009, 18, 31–45. [Google Scholar] [CrossRef]
  23. Grover, V.; Segars, A.H. An empirical evaluation of stages of strategic information systems planning: Patterns of process design and effectiveness. Inf. Manag. 2005, 42, 761–779. [Google Scholar] [CrossRef]
  24. Luftman, J.; Ben-Zvi, T. Key Issues for IT Executives 2011: Cautious optimism in uncertain economic times. MIS Q. Exec. 2011, 10, 203–212. [Google Scholar]
  25. Al-Aboud, F.N. Strategic information systems planning: A brief review. Int. J. Comput. Sci. Netw. Secur. 2011, 11, 179–183. [Google Scholar]
  26. Rockart, J.F. Chief executives define their own data needs. Harv. Bus. Rev. 1979, 57, 81–93. [Google Scholar] [PubMed]
  27. Alhassan, I.; Sammon, D.; Daly, M. Critical Success Factors for Data Governance: A Theory Building Approach. Inf. Syst. Manag. 2019, 36, 98–110. [Google Scholar] [CrossRef]
  28. Trkman, P. The critical success factors of business process management. Int. J. Inf. Manag. 2010, 30, 125–134. [Google Scholar] [CrossRef]
  29. Shah, M.H.; Braganza, A.; Morabito, V. A survey of critical success factors in e-Banking: An organisational perspective. Eur. J. Inf. Syst. 2007, 16, 511–524. [Google Scholar] [CrossRef]
  30. Tan, W.G.; Catersteel, A.; Toleman, M. Implementing IT service management: A case study focussing on critical success factors. J. Comput. Inf. Syst. 2009, 50, 1–12. [Google Scholar] [CrossRef]
  31. Caralli, R. The Critical Success Factor Method: Establishing A Foundation for Enterprise Security Management; Carnegie Mellon University: Pittsburgh, PA, USA, 2004. [Google Scholar]
  32. Banihashemi, S.; Hosseini, M.R.; Golizadeh, H.; Sankaran, S. Critical success factors (CSFs) for integration of sustainability into construction project management practices in developing countries. Int. J. Proj. Manag. 2017, 35, 1103–1119. [Google Scholar] [CrossRef]
  33. Kabassi, K. Application of Multi-Criteria Decision-Making Models for the Evaluation Cultural Websites: A Framework for Comparative Analysis. Information 2021, 12, 407. [Google Scholar] [CrossRef]
  34. Sitorus, F.; Cilliers, J.J.; Brito-Parada, P.R. Multi-criteria decision making for the choice problem in mining and mineral processing: Applications and trends. Expert Syst. Appl. 2018, 121, 393–417. [Google Scholar] [CrossRef]
  35. Sałabun, W.; Wątróbski, J.; Shekhovtsov, A. Are MCDA Methods Benchmarkable? A Comparative Study of TOPSIS, VIKOR, COPRAS, and PROMETHEE II Methods. Symmetry 2020, 12, 1549. [Google Scholar] [CrossRef]
  36. Liebovitch, L.S.; Coleman, P.T.; Fisher, J. Approaches to Understanding Sustainable Peace: Qualitative Causal Loop Diagrams and Quantitative Mathematical Models. Am. Behav. Sci. 2019, 64, 123–144. [Google Scholar] [CrossRef]
  37. Kim, S.; Connerton, T.P.; Park, C. Exploring the impact of technological disruptions in the automotive retail: A futures studies and systems thinking approach based on causal layered analysis and causal loop diagram. Technol. Forecast. Soc. Chang. 2021, 172, 121024. [Google Scholar] [CrossRef]
  38. Dhirasasna, N.; Sahin, O. A Multi-Methodology Approach to Creating a Causal Loop Diagram. Systems 2019, 7, 42. [Google Scholar] [CrossRef]
  39. Peppard, J.; Galliers, R.D.; Thorogood, A. Information systems strategy as practice: Micro strategy and strategizing for IS. J. Strat. Inf. Syst. 2014, 23, 1–10. [Google Scholar] [CrossRef]
  40. Ravichandran, T. Exploring the relationships between IT competence, innovation capacity and organizational agility. J. Strat. Inf. Syst. 2018, 27, 22–42. [Google Scholar] [CrossRef]
  41. Shimada, T.; Soo-Keng, J.A.; Ee, D. Exploring the impact of IS function maturity and IS planning process on IS planning success: An ACE analysis. Eur. J. Inf. Syst. 2018, 28, 457–472. [Google Scholar] [CrossRef]
  42. Seidl, D.; Whittington, R. Enlarging the Strategy-as-Practice Research Agenda: Towards Taller and Flatter Ontologies. Organ. Stud. 2014, 35, 1407–1421. [Google Scholar] [CrossRef]
  43. Jarzabkowski, P.; Spee, A.P. Strategy-as-practice: A review and future directions for the field. Int. J. Manag. Rev. 2009, 11, 69–95. [Google Scholar] [CrossRef]
  44. Whittington, R. Information Systems Strategy and Strategy-as-Practice: A joint agenda. J. Strat. Inf. Syst. 2014, 23, 87–91. [Google Scholar] [CrossRef]
  45. Hughes, J.; McDonagh, J. SISP as practice: De-isolating SISP activity across multiple levels. J. Strat. Inf. Syst. 2021, 30, 101658. [Google Scholar] [CrossRef]
  46. Inayatullah, S. Ensuring Culture Does Not Eat Strategy for Breakfast. World Future. Rev. 2015, 7, 351–361. [Google Scholar] [CrossRef]
  47. Inayatullah, S. Causal Layered Analysis A Four-Level Approach to Alternative Futures Relevance and Use in Foresight; Futuribles: Paris, France, 2017. [Google Scholar]
  48. Doherty, N.; Marples, C.; Suhaimi, A. The relative success of alternative approaches to strategic information systems planning: An empirical analysis. J. Strat. Inf. Syst. 1999, 8, 263–283. [Google Scholar] [CrossRef]
  49. Salmela, H.; Lederer, A.L.; Reponen, T. Information systems planning in a turbulent environment. Eur. J. Inf. Syst. 2000, 9, 3–15. [Google Scholar] [CrossRef]
  50. Lederer, A.L.; Sethi, V. The Implementation of Strategic Information Systems Planning Methodologies. MIS Q. 1988, 12, 445. [Google Scholar] [CrossRef]
  51. Alamri, S.; Almutiri, N.; Ballahmar, H.; Zafar, A. Strategic Information System Planning: A Case Study of a Service Delivery Company. IARJSET 2016, 3, 78–84. [Google Scholar] [CrossRef]
  52. Hoque, R.; Hossin, E.; Khan, W. Strategic Information Systems Planning (SISP) Practices in Health Care Sectors of Bangladesh. Eur. Sci. J. ESJ 2016, 12. [Google Scholar] [CrossRef]
  53. Hakimpoor, H. Strategic Planning Process Dimensions and SMEs Performance. In Proceedings of the 10th Global and Social Science Research Conference, Beijing, China, 23–24 June 2014. [Google Scholar]
  54. Hammouri, Q.; Shraideh, L.; Abu-Shanab, E. Evaluating the Success of Information Strategic Information System Planning. In Proceedings of the the 7th International Conference on Information Technology (ICIT), Hyderabad, India, 29–30 October 2015. [Google Scholar]
  55. Maharaj, S.; Brown, I. The impact of shared domain knowledge on strategic information systems planning and alignment. SA J. Inf. Manag. 2015, 17. [Google Scholar] [CrossRef]
  56. Galliers, R.D. Strategic information systems planning: Myths, reality and guidelines for successful implementation. Eur. J. Inf. Syst. 1991, 1, 55–64. [Google Scholar] [CrossRef]
  57. Rogerson, S.; Fidler, C. Strategic Information Systems Planning: Its Adoption and Use. Inf. Manag. Comput. Secur. 1994, 2, 12–17. [Google Scholar] [CrossRef]
  58. Pita, Z. Strategic Information Systems Planning (SISP) in Australia: Assessment and Measurement; RMIT University: Melbourne, Australia, 2007. [Google Scholar]
  59. Pant, S.; Hsu, C. An Integrated Framework for Strategic Information Systems Planning and Development. Inf. Resour. Manag. J. 1999, 12, 15–25. [Google Scholar] [CrossRef]
  60. Segars, A.H.; Grover, V. Strategic Information Systems Planning Success: An Investigation of the Construct and Its Measurement. MIS Q. 1998, 22, 139. [Google Scholar] [CrossRef]
  61. Lederer, A.L.; Sethi, V. Critical Dimensions of Strategic Information Systems Planning. Decis. Sci. 1991, 22, 104–119. [Google Scholar] [CrossRef]
  62. Warr, A. Strategic IS Planning in UK Organizations: Current approaches and their relative success. In Proceedings of the 14th European Conference on Information Systems, Goteborg, Sweden, 12–14 June 2006; pp. 972–983. [Google Scholar]
  63. Sabherwal, R.; Chan, Y. Alignment Between Business and IS Strategies: A Study of Prospectors, Analyzers, and Defenders. Inf. Syst. Res. 2001, 12, 11–33. [Google Scholar] [CrossRef]
  64. Bechor, T.; Neumann, S.; Zviran, M.; Glezer, C. A contingency model for estimating success of strategic information systems planning. Inf. Manag. 2010, 47, 17–29. [Google Scholar] [CrossRef]
  65. Gufroni, A.I. Information systems strategic planning at the Siliwangi University Tasikmalaya. Int. J. Adv. Eng. Sci. Technol. 2011, 6, 53–59. [Google Scholar]
  66. E Newkirk, H.; Lederer, A.L.; Johnson, A.M. Rapid business and IT change: Drivers for strategic information systems planning? Eur. J. Inf. Syst. 2008, 17, 198–218. [Google Scholar] [CrossRef]
  67. Newkirk, H.E.; Lederer, A.L.; Srinivasan, C. Strategic information systems planning: Too little or too much? J. Strat. Inf. Syst. 2003, 12, 201–228. [Google Scholar] [CrossRef]
  68. Daniel, D.R. Management Information Crisis. Harv. Bus. Rev. 1961, 39, 111–121. [Google Scholar]
  69. Lam, W. Investigating success factors in enterprise application integration: A case-driven analysis. Eur. J. Inf. Syst. 2005, 14, 175–187. [Google Scholar] [CrossRef]
  70. Robichaud, L.B.; Anantatmula, V.S. Greening project management practices for sustainable construction. J. Manag. Eng. 2011, 27, 48–57. [Google Scholar] [CrossRef]
  71. Singh, S.; Dasgupta, M.S.; Routroy, S. Analysis of Critical Success Factors to Design E-waste Collection Policy in India: A Fuzzy DEMATEL Approach. Environ. Sci. Pollut. Res. 2021, 29, 10585–10604. [Google Scholar] [CrossRef]
  72. Raval, S.J.; Kant, R.; Shankar, R. Analyzing the critical success factors influencing Lean Six Sigma implementation: Fuzzy DEMATEL approach. J. Model Manag. 2021, 16, 728–764. [Google Scholar] [CrossRef]
  73. Yazdi, A.K.; Muneeb, F.M.; Wanke, P.F.; Figueiredo, O.; Mushtaq, I. Critical Success Factors for Competitive Advantage in Iranian Pharmaceutical Companies: A Comprehensive MCDM Approach. Math. Probl. Eng. 2021, 2021, 1–17. [Google Scholar] [CrossRef]
  74. Sharma, S.; Darbari, J.D. Fuzzy MCDM Model for Analysis of Critical Success Factors for Sustainable Collaboration with Third Party Reverse Logistics Providers. Soft Comput. Probl. Solving 2021, 2, 651–662. [Google Scholar] [CrossRef]
  75. Dodgson, J.S.; Spackman, M.; Pearman, A.; Phillips, L.D. Multi-Criteria Analysis: A Manual; Pitman: London, UK, 2009. [Google Scholar]
  76. Keeney, R.L. Feature Article—Decision Analysis: An Overview. Oper. Res. 1982, 30, 803–838. [Google Scholar] [CrossRef] [PubMed]
  77. Tsoukiàs, A. On the concept of decision aiding process: An operational perspective. Ann. Oper. Res. 2007, 154, 3–27. [Google Scholar] [CrossRef]
  78. Saaty, T.L. The Analytic Hierarchy Process; McGraw-Hill: New York, NY, USA, 1980. [Google Scholar]
  79. Saaty, T.L.; Vargas, L.G. Models, Methods, Concepts & Applications of the Analytic Hierarchy Process; Kluwer Academic Publishers: Boston, MA, USA, 2001. [Google Scholar]
  80. Benayoun, R.; Roy, B.; Sussman, N. ELECTRE: Une méthode pour guider le choix en présence de points de vue multiples. Note Trav. 1966, 49, 2–120. [Google Scholar]
  81. Roy, B. Classement et choix en presence de points de vue multiples (La methode ELECTRE). Rev. Fr. D Inform. De Rech. Oper. 1968, 2, 57–75. [Google Scholar]
  82. Brans, J. L’ingénièrie de la décision; Elaboration d’instruments d’aide àla décision: La méthode Promethee; Presses de l’Université Laval: Québec, QC, Canada, 1982. [Google Scholar]
  83. Brans, J.P.; Vincke, P. Note—A Preference Ranking Organisation Method. Manag. Sci. 1985, 31, 647–656. [Google Scholar] [CrossRef]
  84. Hwang, C.L.; Yoon, K. Multiple Attribute Decision Making: Methods and Applications; Springer: Berlin, Germany, 1981. [Google Scholar]
  85. Zavadskas, E.K.; Turskis, Z.; Antucheviciene, J.; Zakarevicius, A. Optimization of weighted aggregated sum product assessment. Elektron. Elektrotech. 2012, 122, 3–6. [Google Scholar] [CrossRef]
  86. Németh, B.; Molnár, A.; Bozóki, S.; Wijaya, K.; Inotai, A.; Campbell, J.D.; Kaló, Z. Comparison of weighting methods used in multicriteria decision analysis frameworks in healthcare with focus on low- and middle-income countries. J. Comp. Eff. Res. 2019, 8, 195–204. [Google Scholar] [CrossRef]
  87. Kiourexidou, M.; Antonopoulos, N.; Kiourexidou, E.; Piagkou, M.; Kotsakis, R.; Natsis, K. Websites with Multimedia Content: A Heuristic Evaluation of the Medical/Anatomical Museums. Multimodal Technol. Interact. 2019, 3, 42. [Google Scholar] [CrossRef]
  88. Altuzarra, A.; Moreno-Jiménez, J.M.; Salvador, M. Consensus Building in AHP-Group Decision Making: A Bayesian Approach. Oper. Res. 2010, 58, 1755–1773. [Google Scholar] [CrossRef]
  89. Ishizaka, A.; Labib, A. Analytical hierarchy process and expert choice: Benefits and limitations. Oper. Res. Insight 2009, 22, 201–220. [Google Scholar] [CrossRef]
  90. Wang, Y.-M.; Elhag, T.M. An approach to avoiding rank reversal in AHP. Decis. Support Syst. 2006, 42, 1474–1480. [Google Scholar] [CrossRef]
  91. Fung, D. Who Won the Global Automotive Sales Race in 2021? Available online: https://www.carexpert.com.au/car-news/who-won-the-automotive-global-sales-race-in-2021 (accessed on 21 April 2022).
  92. KAIDA. KAIDA 2021 Fact book; Korea Automobile Importers & Distributors Association: Seoul, Korea, 2021. [Google Scholar]
  93. Creswell, J.W.; Creswell, J.D. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches; Sage Publications: Thousand Oaks, CA, USA, 2018. [Google Scholar]
  94. Onwuegbuzie, A.J.; Corrigan, J.A. Improving the Quality of Mixed Research Reports in the Field of Human Resource Development and Beyond: A Call for Rigor as an Ethical Practice. Hum. Resour. Dev. Q. 2014, 25, 273–299. [Google Scholar] [CrossRef]
  95. Reio, T.G.; Werner, J.M. Publishing Mixed Methods Research: Thoughts and Recommendations Concerning Rigor. Hum. Resour. Dev. Q. 2017, 28, 439–449. [Google Scholar] [CrossRef]
  96. Inayatullah, S. The Causal Layered Analysis (CLA) Reader: Theory and Case Studies of an Intergrative and Transformative Methodology; Tamkang University Press: Taipei, Taiwan, 2004. [Google Scholar]
  97. Baporikar, N. CSF Approach for IT Strategic Planning. Int. J. Strat. Inf. Technol. Appl. 2013, 4, 35–47. [Google Scholar] [CrossRef][Green Version]
  98. Lao, G.; Jiang, S. Risk Analysis of Third-Party Online Payment Based on PEST Model. In Proceedings of the 2009 International Conference on Management and Service Science, Wuhan/Beijing, China, 16–18 September 2009; pp. 1–5. [Google Scholar]
  99. Markovska, N.; Taseska, V.; Pop-Jordanov, J. SWOT analyses of the national energy sector for sustainable energy development. Energy 2009, 34, 752–756. [Google Scholar] [CrossRef]
  100. Singh, M.K.; Kumar, H.; Gupta, M.P.; Madaan, J. A Glimpse of Sustainable Electronics Manufacturing for India: A Study Using PEST-SWOT Analysis. In Global Value Chains, Flexibility and Sustainability; Connell, J., Agarwal, R., Sushil, D.S., Eds.; Springer: Singapore, 2018; pp. 271–281. [Google Scholar]
  101. Ha, H.; Coghill, K. E-Government in Singapore–A Swot and Pest Analysis. Asia-Pac Soc. Sci. Rev. 2008, 6. [Google Scholar] [CrossRef][Green Version]
  102. Ghazinoory, S.; Divsalar, A.; Soofi, A. A new definition and framework for the development of a national technology strategy: The case of nanotechnology for Iran. Technol. Forecast. Soc. Chang. 2009, 76, 835–848. [Google Scholar] [CrossRef]
  103. Kosow, H.; Gaßner, R. Methods of Future and Scenario Analysis: Overview, Assessment, and Selection Criteria; German Development Institute: Bonn, Germany, 2008. [Google Scholar]
  104. Koh, S.; Gunasekaran, A.; Goodman, T. Drivers, barriers and critical success factors for ERPII implementation in supply chains: A critical analysis. J. Strat. Inf. Syst. 2011, 20, 385–402. [Google Scholar] [CrossRef]
  105. Dator, J. Futures Studies. In Leadership in Science and Technology; Bainbridge, W.S., Ed.; Sage Publications: Thousand Oaks, CA, USA, 2011; pp. 32–40. [Google Scholar]
  106. King, W.R. Planning for Information Systems; Routledge: New York, NY, USA, 2009. [Google Scholar]
  107. Zyoud, S.; Fuchs-Hanusch, D. A bibliometric-based survey on AHP and TOPSIS techniques. Expert Syst. Appl. 2017, 78, 158–181. [Google Scholar] [CrossRef]
  108. Saaty, R.W. The analytic hierarchy process—What it is and how it is used. Math. Model. 1987, 9, 161–176. [Google Scholar] [CrossRef]
  109. Goepel, K.D. Implementing the Analytic Hierarchy Process as a Standard Method for Multi-Criteria Decision Making in Corporate Enterprises–A New AHP Excel Template with Multiple Inputs. In Proceedings of the International Symposium on the Analytic Hierarchy Process, Kuala Lumpur, Malaysia, 23–26 June 2013. [Google Scholar]
  110. Teknomo, K. Analytic Hierarchy Process (AHP) Tutorial. Available online: https://people.revoledu.com/kardi/tutorial/AHP/ (accessed on 1 April 2022).
  111. Goepel, K.D. AHP-OS (AHP Online System). Available online: https://bpmsg.com/ahp/ahp.php (accessed on 22 April 2021).
  112. Mintzberg, H. The fall and rise of strategic planning. Harv. Bus. Rev. 1994, 72, 107–114. [Google Scholar]
  113. Riedy, C. An Integral extension of causal layered analysis. Futures 2008, 40, 150–159. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.