Critical Success Factors Evaluation by Multi-Criteria Decision-Making: A Strategic Information System Planning and Strategy-As-Practice Perspective
Abstract
:1. Introduction
2. Literature Review
2.1. Strategic Information System Planning (SISP)
2.2. Critical Success Factor (CSF)
2.3. Multi-Criteria Decision-Making (MCDM)
3. Methodology
3.1. Research Context
3.2. Evaluation Framework and Analytical Approach
- Define scope (IS mission and vision). In this stage, the mission and vision of the firm’s mission-critical system are identified. Caralli [31] suggested the following five-step method for deriving CSFs; (a) define scope, (b) collect data, (c) analyze data, (d) derive CSFs, and (e) analyze CSFs. Therefore, the organizational mission and vision should be clarified and reconfirmed among the stakeholders before the IS mission and vision are defined for the rest of the strategic planning process. The researcher and six business analysts in charge of the firm’s information systems participated in this step. This analysis included; (a) defining the company’s mission, domain, core value, vision, and strategy, and (b) aligning the mission-critical system’s mission and vision with the firm’s strategic direction. The business analysts checked the purpose, background, and history of its mission-critical system development while formulating the mission and vision from the IS standpoint, and used this as the primary data for the following process.
- Define scope (PEST-SWOT). PEST-SWOT analysis was performed based on the derived IS mission and vision, reviewing its current status. The six analysts divided the PEST aspects (political, economic, social, and technological) as internal and external factors, combining them with the positive (+) and negative (−) factors of the SWOT (strength, weakness, opportunities, and threat) framework to stimulate emergent strategic thoughts. The results were shared with the 23 experts who attended the following CLA process to draw CSF dimensions and sub-criteria.
- Collect data based on CLA. This stage applied CLA methodology [96] to derive the qualitative data and expert opinions surrounding the firm’s mission-critical system. To this end, 23 experts with various IS/IT backgrounds participated in the session. CSFs can be derived by qualitative approaches such as document review or discourses based on interviews with management personnel or specific stakeholders asking about the barriers or hurdles to the organizational objectives [97]. CLA, which effectively enables stakeholders to search for the hidden drivers and assumptions for a particular surface/superficial issue, was considered a way to collect primary data through a workshop setting. This session consisted of the following five steps; (a) environmental scan, which is a preliminary session for the following four steps, (b) litany, (c) system causes, (d) worldview, and (e) myth/metaphor layer.
- Analyze data. This step focused on finding components from the qualitative data collected in the previous session. The researcher grouped the similar drivers found in the CLA’s second step (system causes), based on the consensus of participants, and coded the essential ingredients (hidden thoughts and ideas) to build sub-criteria in the next stage.
- Derive CSFs. A dimension-reducing process led to finalizing the CSF dimensions and sub-criteria from the analyzed qualitative information. The participants linked the relevant dimensions (level 1 hierarchy) with sub-criteria (level 2 hierarchy), finishing the preparation for the evaluation and prioritization of CSFs in the next stage, which is essential in the SISP process.
- Evaluate CSFs. The next stage carried out an MCDM quantitative evaluation of the CSF dimensions and sub-criteria derived from qualitatively collected data. AHP, a widely accepted decision-making MCDM methodology, was applied, as described in Section 2 of this study. The final dimensions and criteria were sent to the participants by email to be evaluated by the pairwise scoring. Lastly, after the recollection of the respondents’ data, the AHP-based weighted values were created.
- Strategic proposal. Finally, this stage synthesized the qualitative approach and quantitative evaluation results, presenting the study’s findings with theoretical implications and practical suggestions based on long-term strategic information system planning. The detailed research framework is presented as follows (see Figure 1).
4. Results
4.1. Extracting Critical Success Factors
4.1.1. Mission and Vision Analysis
- Business domain: Regional distributor supporting sales, service, and spare parts;
- Mission: Producing happiness for all customers, employees, and stakeholders;
- Vision: Mobility for all and the most respected brand;
- Core value: Always customer-first and customer delight;
- Strategy: Maximize profit based on managed customer and vehicle lifecycle.
- IS Mission: To design, provide, manage, and maintain the mission-critical system that can foster a business environment where secure collection, storage, use, and transaction of the data for customers, dealers, and the headquarters takes place and that flexibly meets the needs of the customers and the system users to maximize customer delight and the productivity of the fieldwork teams.
- IS Vision: Become the top-level information systems provider in the town, who would go beyond the competition with the most advanced, personalized, foresighted, flexible, adaptable state-of-the-art technology, which would generate strategic advantage based on the continuous improvement and respect for people, which is the company’s most substantial philosophical value.
4.1.2. PEST-SWOT Analysis
4.1.3. CLA Process and Results
- Agility in business applications. Required business systems are not developed nor provided promptly. The experts identified the significance of providing field-support applications to adapt to rapid change.
- Performance-enhancing UX. A business application that is not user-friendly is degrading business efficiency. It is also vital to provide a flow-generating environment through a usability strategy.
- Technical complexity. More and more unheard-of technologies are applied and integrated with the existing information systems, which requires extraordinary effort in understanding and using the technology.
- Resource management. Managing workforce (HR) and internal resources efficiently from an integrative management perspective is essential and should be considered in the system design.
- Shifting way of work. Due to social distancing measures during the COVID-19, diverse operational options such as remote work and supporting contactless customer services have become indispensable IS responsibilities.
- Increasing cyber threats/incidents. Under the ever-spreading digital connectivity driven by the pandemic, illegal/unauthorized access efforts, intrusions, and cyberattacks on vital corporate IS/IT assets have increased.
- Privacy protection issues. A very high level of personal information protection policies in major EU countries/advanced economies is requested, and meeting these requirements in the SISP process becomes fundamental.
- Demand for data-driven DB and interface. As the need to interconnect numerous existing applications, sub-systems, and databases intensifies and the demands for data analysis inside and outside the enterprise are constantly increasing, the inherent flexibility to utilize data must be secured.
- Integrative view for business insights. The ability to sense meaningful signals in real-time interactive data and transform them into business intelligence is becoming a competitive advantage for modern enterprises.
- IS Myopia. IS/IT teams are obsessed with request-based development, focusing only on operational improvement, not being transformational.
- Bureaucracy, top-down, and big-bang. It is difficult to respond to urgent IS/IT issues due to the bureaucratic budget allocation and management that does not allow for exceptions. Only budgets for predictable/concrete investment plans such as infrastructure are reflected. In addition, top-down decision-making and big-bang-type project operation may limit flexible operation.
- Lack of user orientation. The firm’s weak business analyst capabilities limit the complete reflection of real-world business processes and needs towards the mission-critical system.
- No look back. Lack of PDCA (plan-do-check-act) cycle matters. In reality, “check” and “act” might be of more significance than plan and do. Regular system evaluation and performance review should follow suit.
- Difficulties in system maintenance. Because each pillar of information service requires clients to make rapid decisions on adopting and applying new technologies, it is almost impossible to respond to technical needs with internal resources alone. Strategic partnerships, links with vendors, or external ecosystems should be prioritized.
- Path-dependency on a legacy system. Decision-makers (client-side) often fail to realize modeling real-world business operations within the business system due to the inertia within the organization, leading to lagged support and inefficiency.
- Shifting to the new normal. Due to uncontrollable and unpredictable socio-economic events, such as COVID-19, customers continue to request new channels (i.e., digitized omnichannel service) and contactless sales/service while the employees need to work remotely.
- Less human processes. It is deemed that the introduction of business process automation becomes substantial to deal with workforce unavailability. Further, organizations are expected to increase system dependence with simplified standard work procedures to improve organizational effectiveness, reducing human errors.
- Inborn deficiencies. Legacy systems were not inherently designed to keep up with the severe cyber threats, attacks, and penetration efforts that we experience today, nor the high standards of privacy protection requested by government authorities. Security aspects should be considered together with applications development or infrastructure configuration.
- Phantom menace. Organizations need extended internal capabilities for organized responses to the existing threats. Flexible and convenient system usability that responds to users’ needs is critical. However, internal capabilities to remove invisible threats must be stressed.
- Loose control. There is a tendency to downplay the importance of policy management on the client side. Efforts for risk management, such as establishing, controlling, and reconfirming system access control based on periodic inspection, are still insufficient.
- Where is what? Organizations should be able to gain the information whenever they need it in the desired form. In addition, it is necessary to have an active data platform structure to collect, converge, classify, and analyze endogenous and exogenous data generated throughout the business process. Many organizations are transforming themselves into data companies. Building a standardized interface to respond to national initiatives such as “myData”, a project that allows industries to share personal data to create added value, will become increasingly critical.
- Machine intelligence for human intelligence. Systems that use artificial intelligence and machine learning in crucial decision-making processes will increase. Artificial intelligence will become essential in almost every process along the value chain to maximize organizational effectiveness, and flexible business intelligence becomes paramount to all members.
- Customers, out of nowhere. The growing effort to trace and leverage the digital footprint of every step of the customer journey requires redesigning the existing information systems, focusing on the front-end of the business, and requesting the review towards the overhaul or reconfiguration of the database.
- IS? Information status-quo (company inertia). One may wonder if there is a strong will for the next generation of the mission-critical system within the client organization. Management talks about the critical necessity for the IS development strategy, but the executives are always reluctant and conservative on any changes relevant to long-term investment. Hence, only a mere operational transformation is achieved, following the competitors.
- Sometime later (low priority). Even after deciding to proceed with SISP, its priority eventually lowers because many stakeholders do not see IS/IT planning as a project with business impact and priority. As a result, an isomorphism occurs, seeking to level themselves only at the competition capabilities level.
- A perfect storm (digital connectivity). The importance of IS/IT has become more substantial than ever. Organizations that stand still and satisfy themselves with the status quo will gradually fall behind. The need for long-term strategic planning of information systems will come to the forefront.
- A frog in the well. A company’s information system is no longer just a mere “system,” but is instead everything that connects the organization to external systems based on connectivity. Technology such as blockchain or distributed ledger will gradually strengthen belief over data connectivity. To survive, businesses should focus more on the “ecosystem” perspective rather than the “just a system” view.
4.1.4. Finalizing CSF Dimensions and Sub-Criteria
4.2. Evaluating CSFs Using MCDM
4.2.1. Dimension (Level 1) Analysis
4.2.2. Sub-Criteria (Level 2) Analysis
4.2.3. Global Priorities
- Enhanced expertise and CISO organization (16.1%);
- Data-driven decision-making (AI/ML), business intelligence (11.6%);
- Security involvement in initial designs (DevSecOps) (9.1%);
- Reinforcement of internal controls and policies (7.6%);
- Outsourcing for integrated system operation and management (7.3%).
5. Discussions
6. Conclusions
7. Limitations and Future Research
Funding
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
AHP | Analytic Hierarchy Process (AHP) |
AI | Artificial Intelligence |
ARAS | Additive Ratio Assessment |
CI | Consistency Index |
CLA | Causal Layered Analysis |
CSF | Critical Success Factor (CSF) |
CR | Consistency Ratio |
DB | Database |
DEMATEL | Decision Making Trial and Evaluation Laboratory |
DevSecOps | Development, Security, and Operations |
ELECTRE | Elimination Et Choix Traduisant la Realité |
IS | Information Systems |
ISM | Interpretive Structural Modeling |
IT | Information Technology |
MCDM | Multi-Criteria Decision-Making |
MICMAC | Matrix Impact of Cross-Multiplication Applied to Classification |
ML | Machine Learning |
PEST | Political, Economic, Social, and Technological |
PROMETHEE | Preference Ranking Organization Method for Enrichment Evaluation |
RI | Random Consistency Index |
SISP | Strategic Information System Planning |
SWOT | Strength, Weakness, Opportunity, Threat |
TOPSIS | Technique for Order of Preference by Similarity to Ideal Solution |
UX | User Experience |
WASPAS | Weighted Aggregated Sum Product Assessment |
References
- Beynon-Davies, P. Business Information Systems, 3rd ed.; Red Globe Press: New York, NY, USA, 2020. [Google Scholar]
- Liang, T.-P.; Liu, Y.-H. Research Landscape of Business Intelligence and Big Data analytics: A bibliometrics study. Expert Syst. Appl. 2018, 111, 2–10. [Google Scholar] [CrossRef]
- Schmidt, E.; Cohen, J. The New Digital Age: Reshaping the Future of People, Nations and Business; John Murray: London, UK, 2014. [Google Scholar]
- Schwertner, K. Digital transformation of business. Trakia J. Sci. 2017, 15, 388–393. [Google Scholar] [CrossRef]
- Selamat, M.H.; Suhaimi, A.; Hussin, H. Strategic Information Systems Planning (SISP) and Strategic Information Security Planning (SISecP) In Malaysian Government Agencies. In Proceedings of the Regional Postgraduate Conference on Engineering and Science (RPCES 2006), Johore, Malaysia, 26–27 July 2006. [Google Scholar]
- Issa-Salwe, A.M.; Sharif, L.; Ahmed, M. Strategic information systems planning as the centre of information systems strategies. Int. J. Res. Rev. Comput. Sci. 2011, 2, 156–162. [Google Scholar]
- Harun, H.; Hashim, M.K. Strategic information systems planning: A review of its concept, definitions and stages of development. Int. J. Res. Sci. Eng. 2017, 3, 432–441. [Google Scholar]
- Legner, C.; Eymann, T.; Hess, T.; Matt, C.; Böhmann, T.; Drews, P.; Mädche, A.; Urbach, N.; Ahlemann, F. Digitalization: Opportunity and Challenge for the Business and Information Systems Engineering Community. Bus. Inf. Syst. Eng. 2017, 59, 301–308. [Google Scholar] [CrossRef]
- Davis, G.B. Information Systems Conceptual Foundations: Looking Backward and Forward. In Organizational and Social Perspectives on Information Technology: IFIP TC8 WG8.2 International Working Conference on the Social and Organizational Perspective on Research and Practice in Information Technology June 9–11, 2000, Aalborg, Denmark; Baskerville, R., Stage, J., DeGross, J.I., Eds.; Springer: Boston, MA, USA, 2000; pp. 61–82. [Google Scholar]
- Chen, D.Q.; Mocker, M.; Preston, D.S.; Teubner, A. Information Systems Strategy: Reconceptualization, Measurement, and Implications. MIS Q. 2010, 34, 233. [Google Scholar] [CrossRef] [Green Version]
- Malaurent, J.; Avison, D. From an apparent failure to a success story: ERP in China—Post implementation. Int. J. Inf. Manag. 2015, 35, 643–646. [Google Scholar] [CrossRef]
- Recker, J. Continued use of process modeling grammars: The impact of individual difference factors. Eur. J. Inf. Syst. 2010, 19, 76–92. [Google Scholar] [CrossRef] [Green Version]
- Liang, H.; Xue, Y.; Wu, L. Ensuring Employees’ IT Compliance: Carrot or Stick? Inf. Syst. Res. 2013, 24, 279–294. [Google Scholar] [CrossRef]
- Rezvani, A.; Dong, L.; Khosravi, P. Promoting the continuing usage of strategic information systems: The role of supervisory leadership in the successful implementation of enterprise systems. Int. J. Inf. Manag. 2017, 37, 417–430. [Google Scholar] [CrossRef]
- Soto-Acosta, P. COVID-19 Pandemic: Shifting Digital Transformation to a High-Speed Gear. Inf. Syst. Manag. 2020, 37, 260–266. [Google Scholar] [CrossRef]
- O’Leary, D.E. Evolving Information Systems and Technology Research Issues for COVID-19 and Other Pandemics. J. Organ. Comput. Electron. Commer. 2020, 30, 1–8. [Google Scholar] [CrossRef]
- Arvidsson, V.; Holmström, J.; Lyytinen, K. Information systems use as strategy practice: A multi-dimensional view of strategic information system implementation and use. J. Strat. Inf. Syst. 2014, 23, 45–61. [Google Scholar] [CrossRef] [Green Version]
- Kim, S. How a company’s gamification strategy influences corporate learning: A study based on gamified MSLP (Mobile social learning platform). Telemat. Informt. 2020, 57, 101505. [Google Scholar] [CrossRef]
- Kleis, L.; Chwelos, P.; Ramirez, R.V.; Cockburn, I. Information Technology and Intangible Output: The Impact of IT Investment on Innovation Productivity. Inf. Syst. Res. 2012, 23, 42–59. [Google Scholar] [CrossRef] [Green Version]
- Amrollahi, A.; Ghapanchi, A.H.; Najaftorkaman, M. A Generic Framework for Developing Strategic Information System Plans: Insights from Past Three Decades. In Proceedings of the PACIS, Chengdu, China, 24–28 June 2014. [Google Scholar]
- Earl, M.J. Experiences in Strategic Information Systems Planning. MIS Q. 1993, 17, 1–24. [Google Scholar] [CrossRef] [Green Version]
- Krell, K.; Matook, S. Competitive advantage from mandatory investments: An empirical study of Australian firms. J. Strat. Inf. Syst. 2009, 18, 31–45. [Google Scholar] [CrossRef] [Green Version]
- Grover, V.; Segars, A.H. An empirical evaluation of stages of strategic information systems planning: Patterns of process design and effectiveness. Inf. Manag. 2005, 42, 761–779. [Google Scholar] [CrossRef]
- Luftman, J.; Ben-Zvi, T. Key Issues for IT Executives 2011: Cautious optimism in uncertain economic times. MIS Q. Exec. 2011, 10, 203–212. [Google Scholar]
- Al-Aboud, F.N. Strategic information systems planning: A brief review. Int. J. Comput. Sci. Netw. Secur. 2011, 11, 179–183. [Google Scholar]
- Rockart, J.F. Chief executives define their own data needs. Harv. Bus. Rev. 1979, 57, 81–93. [Google Scholar] [PubMed]
- Alhassan, I.; Sammon, D.; Daly, M. Critical Success Factors for Data Governance: A Theory Building Approach. Inf. Syst. Manag. 2019, 36, 98–110. [Google Scholar] [CrossRef]
- Trkman, P. The critical success factors of business process management. Int. J. Inf. Manag. 2010, 30, 125–134. [Google Scholar] [CrossRef]
- Shah, M.H.; Braganza, A.; Morabito, V. A survey of critical success factors in e-Banking: An organisational perspective. Eur. J. Inf. Syst. 2007, 16, 511–524. [Google Scholar] [CrossRef]
- Tan, W.G.; Catersteel, A.; Toleman, M. Implementing IT service management: A case study focussing on critical success factors. J. Comput. Inf. Syst. 2009, 50, 1–12. [Google Scholar] [CrossRef]
- Caralli, R. The Critical Success Factor Method: Establishing A Foundation for Enterprise Security Management; Carnegie Mellon University: Pittsburgh, PA, USA, 2004. [Google Scholar]
- Banihashemi, S.; Hosseini, M.R.; Golizadeh, H.; Sankaran, S. Critical success factors (CSFs) for integration of sustainability into construction project management practices in developing countries. Int. J. Proj. Manag. 2017, 35, 1103–1119. [Google Scholar] [CrossRef]
- Kabassi, K. Application of Multi-Criteria Decision-Making Models for the Evaluation Cultural Websites: A Framework for Comparative Analysis. Information 2021, 12, 407. [Google Scholar] [CrossRef]
- Sitorus, F.; Cilliers, J.J.; Brito-Parada, P.R. Multi-criteria decision making for the choice problem in mining and mineral processing: Applications and trends. Expert Syst. Appl. 2018, 121, 393–417. [Google Scholar] [CrossRef]
- Sałabun, W.; Wątróbski, J.; Shekhovtsov, A. Are MCDA Methods Benchmarkable? A Comparative Study of TOPSIS, VIKOR, COPRAS, and PROMETHEE II Methods. Symmetry 2020, 12, 1549. [Google Scholar] [CrossRef]
- Liebovitch, L.S.; Coleman, P.T.; Fisher, J. Approaches to Understanding Sustainable Peace: Qualitative Causal Loop Diagrams and Quantitative Mathematical Models. Am. Behav. Sci. 2019, 64, 123–144. [Google Scholar] [CrossRef]
- Kim, S.; Connerton, T.P.; Park, C. Exploring the impact of technological disruptions in the automotive retail: A futures studies and systems thinking approach based on causal layered analysis and causal loop diagram. Technol. Forecast. Soc. Chang. 2021, 172, 121024. [Google Scholar] [CrossRef]
- Dhirasasna, N.; Sahin, O. A Multi-Methodology Approach to Creating a Causal Loop Diagram. Systems 2019, 7, 42. [Google Scholar] [CrossRef] [Green Version]
- Peppard, J.; Galliers, R.D.; Thorogood, A. Information systems strategy as practice: Micro strategy and strategizing for IS. J. Strat. Inf. Syst. 2014, 23, 1–10. [Google Scholar] [CrossRef]
- Ravichandran, T. Exploring the relationships between IT competence, innovation capacity and organizational agility. J. Strat. Inf. Syst. 2018, 27, 22–42. [Google Scholar] [CrossRef]
- Shimada, T.; Soo-Keng, J.A.; Ee, D. Exploring the impact of IS function maturity and IS planning process on IS planning success: An ACE analysis. Eur. J. Inf. Syst. 2018, 28, 457–472. [Google Scholar] [CrossRef]
- Seidl, D.; Whittington, R. Enlarging the Strategy-as-Practice Research Agenda: Towards Taller and Flatter Ontologies. Organ. Stud. 2014, 35, 1407–1421. [Google Scholar] [CrossRef] [Green Version]
- Jarzabkowski, P.; Spee, A.P. Strategy-as-practice: A review and future directions for the field. Int. J. Manag. Rev. 2009, 11, 69–95. [Google Scholar] [CrossRef]
- Whittington, R. Information Systems Strategy and Strategy-as-Practice: A joint agenda. J. Strat. Inf. Syst. 2014, 23, 87–91. [Google Scholar] [CrossRef]
- Hughes, J.; McDonagh, J. SISP as practice: De-isolating SISP activity across multiple levels. J. Strat. Inf. Syst. 2021, 30, 101658. [Google Scholar] [CrossRef]
- Inayatullah, S. Ensuring Culture Does Not Eat Strategy for Breakfast. World Future. Rev. 2015, 7, 351–361. [Google Scholar] [CrossRef]
- Inayatullah, S. Causal Layered Analysis A Four-Level Approach to Alternative Futures Relevance and Use in Foresight; Futuribles: Paris, France, 2017. [Google Scholar]
- Doherty, N.; Marples, C.; Suhaimi, A. The relative success of alternative approaches to strategic information systems planning: An empirical analysis. J. Strat. Inf. Syst. 1999, 8, 263–283. [Google Scholar] [CrossRef] [Green Version]
- Salmela, H.; Lederer, A.L.; Reponen, T. Information systems planning in a turbulent environment. Eur. J. Inf. Syst. 2000, 9, 3–15. [Google Scholar] [CrossRef]
- Lederer, A.L.; Sethi, V. The Implementation of Strategic Information Systems Planning Methodologies. MIS Q. 1988, 12, 445. [Google Scholar] [CrossRef]
- Alamri, S.; Almutiri, N.; Ballahmar, H.; Zafar, A. Strategic Information System Planning: A Case Study of a Service Delivery Company. IARJSET 2016, 3, 78–84. [Google Scholar] [CrossRef]
- Hoque, R.; Hossin, E.; Khan, W. Strategic Information Systems Planning (SISP) Practices in Health Care Sectors of Bangladesh. Eur. Sci. J. ESJ 2016, 12. [Google Scholar] [CrossRef]
- Hakimpoor, H. Strategic Planning Process Dimensions and SMEs Performance. In Proceedings of the 10th Global and Social Science Research Conference, Beijing, China, 23–24 June 2014. [Google Scholar]
- Hammouri, Q.; Shraideh, L.; Abu-Shanab, E. Evaluating the Success of Information Strategic Information System Planning. In Proceedings of the the 7th International Conference on Information Technology (ICIT), Hyderabad, India, 29–30 October 2015. [Google Scholar]
- Maharaj, S.; Brown, I. The impact of shared domain knowledge on strategic information systems planning and alignment. SA J. Inf. Manag. 2015, 17. [Google Scholar] [CrossRef]
- Galliers, R.D. Strategic information systems planning: Myths, reality and guidelines for successful implementation. Eur. J. Inf. Syst. 1991, 1, 55–64. [Google Scholar] [CrossRef]
- Rogerson, S.; Fidler, C. Strategic Information Systems Planning: Its Adoption and Use. Inf. Manag. Comput. Secur. 1994, 2, 12–17. [Google Scholar] [CrossRef]
- Pita, Z. Strategic Information Systems Planning (SISP) in Australia: Assessment and Measurement; RMIT University: Melbourne, Australia, 2007. [Google Scholar]
- Pant, S.; Hsu, C. An Integrated Framework for Strategic Information Systems Planning and Development. Inf. Resour. Manag. J. 1999, 12, 15–25. [Google Scholar] [CrossRef]
- Segars, A.H.; Grover, V. Strategic Information Systems Planning Success: An Investigation of the Construct and Its Measurement. MIS Q. 1998, 22, 139. [Google Scholar] [CrossRef]
- Lederer, A.L.; Sethi, V. Critical Dimensions of Strategic Information Systems Planning. Decis. Sci. 1991, 22, 104–119. [Google Scholar] [CrossRef]
- Warr, A. Strategic IS Planning in UK Organizations: Current approaches and their relative success. In Proceedings of the 14th European Conference on Information Systems, Goteborg, Sweden, 12–14 June 2006; pp. 972–983. [Google Scholar]
- Sabherwal, R.; Chan, Y. Alignment Between Business and IS Strategies: A Study of Prospectors, Analyzers, and Defenders. Inf. Syst. Res. 2001, 12, 11–33. [Google Scholar] [CrossRef]
- Bechor, T.; Neumann, S.; Zviran, M.; Glezer, C. A contingency model for estimating success of strategic information systems planning. Inf. Manag. 2010, 47, 17–29. [Google Scholar] [CrossRef]
- Gufroni, A.I. Information systems strategic planning at the Siliwangi University Tasikmalaya. Int. J. Adv. Eng. Sci. Technol. 2011, 6, 53–59. [Google Scholar]
- E Newkirk, H.; Lederer, A.L.; Johnson, A.M. Rapid business and IT change: Drivers for strategic information systems planning? Eur. J. Inf. Syst. 2008, 17, 198–218. [Google Scholar] [CrossRef]
- Newkirk, H.E.; Lederer, A.L.; Srinivasan, C. Strategic information systems planning: Too little or too much? J. Strat. Inf. Syst. 2003, 12, 201–228. [Google Scholar] [CrossRef]
- Daniel, D.R. Management Information Crisis. Harv. Bus. Rev. 1961, 39, 111–121. [Google Scholar]
- Lam, W. Investigating success factors in enterprise application integration: A case-driven analysis. Eur. J. Inf. Syst. 2005, 14, 175–187. [Google Scholar] [CrossRef]
- Robichaud, L.B.; Anantatmula, V.S. Greening project management practices for sustainable construction. J. Manag. Eng. 2011, 27, 48–57. [Google Scholar] [CrossRef]
- Singh, S.; Dasgupta, M.S.; Routroy, S. Analysis of Critical Success Factors to Design E-waste Collection Policy in India: A Fuzzy DEMATEL Approach. Environ. Sci. Pollut. Res. 2021, 29, 10585–10604. [Google Scholar] [CrossRef]
- Raval, S.J.; Kant, R.; Shankar, R. Analyzing the critical success factors influencing Lean Six Sigma implementation: Fuzzy DEMATEL approach. J. Model Manag. 2021, 16, 728–764. [Google Scholar] [CrossRef]
- Yazdi, A.K.; Muneeb, F.M.; Wanke, P.F.; Figueiredo, O.; Mushtaq, I. Critical Success Factors for Competitive Advantage in Iranian Pharmaceutical Companies: A Comprehensive MCDM Approach. Math. Probl. Eng. 2021, 2021, 1–17. [Google Scholar] [CrossRef]
- Sharma, S.; Darbari, J.D. Fuzzy MCDM Model for Analysis of Critical Success Factors for Sustainable Collaboration with Third Party Reverse Logistics Providers. Soft Comput. Probl. Solving 2021, 2, 651–662. [Google Scholar] [CrossRef]
- Dodgson, J.S.; Spackman, M.; Pearman, A.; Phillips, L.D. Multi-Criteria Analysis: A Manual; Pitman: London, UK, 2009. [Google Scholar]
- Keeney, R.L. Feature Article—Decision Analysis: An Overview. Oper. Res. 1982, 30, 803–838. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Tsoukiàs, A. On the concept of decision aiding process: An operational perspective. Ann. Oper. Res. 2007, 154, 3–27. [Google Scholar] [CrossRef]
- Saaty, T.L. The Analytic Hierarchy Process; McGraw-Hill: New York, NY, USA, 1980. [Google Scholar]
- Saaty, T.L.; Vargas, L.G. Models, Methods, Concepts & Applications of the Analytic Hierarchy Process; Kluwer Academic Publishers: Boston, MA, USA, 2001. [Google Scholar]
- Benayoun, R.; Roy, B.; Sussman, N. ELECTRE: Une méthode pour guider le choix en présence de points de vue multiples. Note Trav. 1966, 49, 2–120. [Google Scholar]
- Roy, B. Classement et choix en presence de points de vue multiples (La methode ELECTRE). Rev. Fr. D Inform. De Rech. Oper. 1968, 2, 57–75. [Google Scholar]
- Brans, J. L’ingénièrie de la décision; Elaboration d’instruments d’aide àla décision: La méthode Promethee; Presses de l’Université Laval: Québec, QC, Canada, 1982. [Google Scholar]
- Brans, J.P.; Vincke, P. Note—A Preference Ranking Organisation Method. Manag. Sci. 1985, 31, 647–656. [Google Scholar] [CrossRef] [Green Version]
- Hwang, C.L.; Yoon, K. Multiple Attribute Decision Making: Methods and Applications; Springer: Berlin, Germany, 1981. [Google Scholar]
- Zavadskas, E.K.; Turskis, Z.; Antucheviciene, J.; Zakarevicius, A. Optimization of weighted aggregated sum product assessment. Elektron. Elektrotech. 2012, 122, 3–6. [Google Scholar] [CrossRef]
- Németh, B.; Molnár, A.; Bozóki, S.; Wijaya, K.; Inotai, A.; Campbell, J.D.; Kaló, Z. Comparison of weighting methods used in multicriteria decision analysis frameworks in healthcare with focus on low- and middle-income countries. J. Comp. Eff. Res. 2019, 8, 195–204. [Google Scholar] [CrossRef] [Green Version]
- Kiourexidou, M.; Antonopoulos, N.; Kiourexidou, E.; Piagkou, M.; Kotsakis, R.; Natsis, K. Websites with Multimedia Content: A Heuristic Evaluation of the Medical/Anatomical Museums. Multimodal Technol. Interact. 2019, 3, 42. [Google Scholar] [CrossRef] [Green Version]
- Altuzarra, A.; Moreno-Jiménez, J.M.; Salvador, M. Consensus Building in AHP-Group Decision Making: A Bayesian Approach. Oper. Res. 2010, 58, 1755–1773. [Google Scholar] [CrossRef]
- Ishizaka, A.; Labib, A. Analytical hierarchy process and expert choice: Benefits and limitations. Oper. Res. Insight 2009, 22, 201–220. [Google Scholar] [CrossRef] [Green Version]
- Wang, Y.-M.; Elhag, T.M. An approach to avoiding rank reversal in AHP. Decis. Support Syst. 2006, 42, 1474–1480. [Google Scholar] [CrossRef]
- Fung, D. Who Won the Global Automotive Sales Race in 2021? Available online: https://www.carexpert.com.au/car-news/who-won-the-automotive-global-sales-race-in-2021 (accessed on 21 April 2022).
- KAIDA. KAIDA 2021 Fact book; Korea Automobile Importers & Distributors Association: Seoul, Korea, 2021. [Google Scholar]
- Creswell, J.W.; Creswell, J.D. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches; Sage Publications: Thousand Oaks, CA, USA, 2018. [Google Scholar]
- Onwuegbuzie, A.J.; Corrigan, J.A. Improving the Quality of Mixed Research Reports in the Field of Human Resource Development and Beyond: A Call for Rigor as an Ethical Practice. Hum. Resour. Dev. Q. 2014, 25, 273–299. [Google Scholar] [CrossRef]
- Reio, T.G.; Werner, J.M. Publishing Mixed Methods Research: Thoughts and Recommendations Concerning Rigor. Hum. Resour. Dev. Q. 2017, 28, 439–449. [Google Scholar] [CrossRef]
- Inayatullah, S. The Causal Layered Analysis (CLA) Reader: Theory and Case Studies of an Intergrative and Transformative Methodology; Tamkang University Press: Taipei, Taiwan, 2004. [Google Scholar]
- Baporikar, N. CSF Approach for IT Strategic Planning. Int. J. Strat. Inf. Technol. Appl. 2013, 4, 35–47. [Google Scholar] [CrossRef] [Green Version]
- Lao, G.; Jiang, S. Risk Analysis of Third-Party Online Payment Based on PEST Model. In Proceedings of the 2009 International Conference on Management and Service Science, Wuhan/Beijing, China, 16–18 September 2009; pp. 1–5. [Google Scholar]
- Markovska, N.; Taseska, V.; Pop-Jordanov, J. SWOT analyses of the national energy sector for sustainable energy development. Energy 2009, 34, 752–756. [Google Scholar] [CrossRef]
- Singh, M.K.; Kumar, H.; Gupta, M.P.; Madaan, J. A Glimpse of Sustainable Electronics Manufacturing for India: A Study Using PEST-SWOT Analysis. In Global Value Chains, Flexibility and Sustainability; Connell, J., Agarwal, R., Sushil, D.S., Eds.; Springer: Singapore, 2018; pp. 271–281. [Google Scholar]
- Ha, H.; Coghill, K. E-Government in Singapore–A Swot and Pest Analysis. Asia-Pac Soc. Sci. Rev. 2008, 6. [Google Scholar] [CrossRef] [Green Version]
- Ghazinoory, S.; Divsalar, A.; Soofi, A. A new definition and framework for the development of a national technology strategy: The case of nanotechnology for Iran. Technol. Forecast. Soc. Chang. 2009, 76, 835–848. [Google Scholar] [CrossRef]
- Kosow, H.; Gaßner, R. Methods of Future and Scenario Analysis: Overview, Assessment, and Selection Criteria; German Development Institute: Bonn, Germany, 2008. [Google Scholar]
- Koh, S.; Gunasekaran, A.; Goodman, T. Drivers, barriers and critical success factors for ERPII implementation in supply chains: A critical analysis. J. Strat. Inf. Syst. 2011, 20, 385–402. [Google Scholar] [CrossRef]
- Dator, J. Futures Studies. In Leadership in Science and Technology; Bainbridge, W.S., Ed.; Sage Publications: Thousand Oaks, CA, USA, 2011; pp. 32–40. [Google Scholar]
- King, W.R. Planning for Information Systems; Routledge: New York, NY, USA, 2009. [Google Scholar]
- Zyoud, S.; Fuchs-Hanusch, D. A bibliometric-based survey on AHP and TOPSIS techniques. Expert Syst. Appl. 2017, 78, 158–181. [Google Scholar] [CrossRef]
- Saaty, R.W. The analytic hierarchy process—What it is and how it is used. Math. Model. 1987, 9, 161–176. [Google Scholar] [CrossRef] [Green Version]
- Goepel, K.D. Implementing the Analytic Hierarchy Process as a Standard Method for Multi-Criteria Decision Making in Corporate Enterprises–A New AHP Excel Template with Multiple Inputs. In Proceedings of the International Symposium on the Analytic Hierarchy Process, Kuala Lumpur, Malaysia, 23–26 June 2013. [Google Scholar]
- Teknomo, K. Analytic Hierarchy Process (AHP) Tutorial. Available online: https://people.revoledu.com/kardi/tutorial/AHP/ (accessed on 1 April 2022).
- Goepel, K.D. AHP-OS (AHP Online System). Available online: https://bpmsg.com/ahp/ahp.php (accessed on 22 April 2021).
- Mintzberg, H. The fall and rise of strategic planning. Harv. Bus. Rev. 1994, 72, 107–114. [Google Scholar]
- Riedy, C. An Integral extension of causal layered analysis. Futures 2008, 40, 150–159. [Google Scholar] [CrossRef]
No. | Description | Author |
---|---|---|
1 | An integrative process that includes a firm’s various strategies such as IT, information management, change management, and human resources | [56] |
2 | A continuous planning activity, ensuring the implementation of information and communication technology (ICT) in an organization, aligning to business strategies, improving organizational process effectiveness, creating business opportunities, and contributing to an organizational competitiveness | [57] |
3 | A way of supporting and influencing a firm’s strategic direction that identifies value-adding information systems and integrates organizational technologies through holistic information architecture development for successful systems applications | [60] |
4 | An analysis or an exercise of the corporate process using the business information models with the evaluation regarding risk, needs, and organizational requirements, enabling organizations to develop IS development priorities | [59] |
5 | A process of deciding the direction for development and policies regarding the organization’s information use, management, and networking technologies | [62] |
6 | A continuous review of the need to prepare, acquire, transfer, store, retrieve, access, present, and manipulate information in all forms | [58] |
7 | A strategic thinking process or a mechanism that identifies the most desirable IS development through which a firm implements its long-term IT activities and policies, aligning the evolving organizational needs and strategies | [50,63,64] |
8 | A process that helps to develop the information systems aligned with the organization’s strategic planning, including objectives and policies | [65] |
9 | A process to create IS deployment plans to fulfill a firm’s strategic objectives | [55] |
10 | A process of identifying a computer-based portfolio/applications aligned with corporate strategy, which is capable of creating a competitive advantage or helping organizations to execute their business, realizing their business goals | [5,6,7,48,49] |
SWOT | ||
---|---|---|
PEST (Inner) | Strength (+) | Weakness (−) |
Political | (PS1) Risk management system and accumulated experience that has been developed in line with the gradually strengthening local regulation, such as the Private Information Protection Act (PIPA) | (PW1) Absence of a dedicated organization to keep up with domestic legal compliance and compliance pressure, limitations in management support (PW2) Higher compliance standards applied to foreign companies, resulting in a lower effectiveness of information systems |
Economic | (ES1) Low IS/IT applications development cost stemmed from taking advantage of the mature and competitive local ecosystem | (EW1) High applications/infrastructure management cost due to high complexity system architecture (EW2) Lagging in productivity improvement based on the introduction of high value-added applications due to too conservative IS/IT policies that heavily focus on cost-performance analysis |
Social | (SS1) Internal IS/IT support system that responds to the organization’s internal needs for remote work (i.e., work from home and distance meetings) and flexible working system | (SW1) Strong demand for efficient and fast decision-making structure and work support system by millennials and Gen Z employees |
Technological | (TS1) Immediate technical support available based on longstanding partnerships with a local vendor network (TS2) Locally developed and customized dealer management system that best suits the existing needs for the current operation and working scope | (TW1) Severe dependence on existing vendors, leading to low capabilities in developing the new third-party vendors and weakness in diversification (TW2) Limitations of on-premise-based core system (TW3) Difficult system maintenance due to complex infrastructure design (TW4) Limitations in expansion due to closed system architecture |
PEST (Outer) | Opportunity (+) | Threat (−) |
Political | (PO1) Cross-border privacy and compliance regulations standardization efforts (PO2) A national initiative to support data utilization and information exchange between industries (i.e., the MyData project led by the government looks at the integration of cross-sector big data) | (PT1) Accelerating central control efforts on IS/IT strategic assets by global headquarters to minimize risk (PT2) Difficulties in ensuring the security of cross-border movement of personal information, simultaneously complying with regulations in multiple countries, and building infrastructure for connected car services |
Economic | (EO1) Satisfying customer needs and raising satisfaction by introducing new services (EO2) Possible commercialization/sales opportunities for developed applications within the local industry or throughout the global network | (ET1) Delayed decision-making in IS/IT investment due to increased economic uncertainty |
Social | (SO1) Increased usage of front-end services based on the enhanced customers’ digital literacy (SO2) Social receptivity to the growing demand for direct-to-customer service | (ST1) Increased pressure to respond to rapidly changing customer needs since the new normal in the COVID-19 era (i.e., contactless sales and service procedures or protocols) (ST2) Forced to minimize human error resulting from the existing process (replacing employees with technology) |
Technological | (TO1) Introduction of online payment and direct sales system (TO2) Adoption of distributed ledger (i.e., blockchain) technology for payment, transaction of data, and information connectivity (TO3) Productivity improvement or business process automation (i.e., RPA) (TO4) Reinforcing data analytics through Big Data + ML/AI | (TT1) Pressure to replace the existing mission-critical system with ready-made applications, solutions, or infrastructure (e.g., SaaS, PaaS, and IaaS) for further efficiency (TT2) Rapid disposal/necessity to review the existing mid-/long-term IS/IT projects and initiatives |
Category | Levels | Counts | % |
---|---|---|---|
Expertise | Developer | 6 | 26.1% |
IT Maintenance | 7 | 30.4% | |
IT Planning/management | 6 | 26.1% | |
Infrastructure/network | 3 | 13.0% | |
Executive/Supervisor | 1 | 4.3% | |
Working experience (current position) | Under 3 years | 8 | 34.8% |
10~15 years | 7 | 30.4% | |
3~5 years | 5 | 21.7% | |
5~10 years | 2 | 8.7% | |
15~20 years | 1 | 4.3% | |
Working experience (career) | Under 3 years | 6 | 26.1% |
10~15 years | 6 | 26.1% | |
3~5 years | 6 | 26.1% | |
Over 20 years | 2 | 8.7% | |
5~10 years | 2 | 8.7% | |
15~20 years | 1 | 4.3% |
Litany | System Causes | Worldview | Myth/Metaphor | |
---|---|---|---|---|
Causality | Surface issues | ← drivers | ← hidden reasons | ← unrevealed thoughts |
Factor | Imminent long-term planning | (SC1) Agility in business applications | (WV1) Information Service “Myopia” | IS? Information status-quo (company inertia) |
Strategic roadmap required | (SC2) Performance enhancing UX | (WV2) Bureaucracy, top-down, and big-bang | Sometime later (low priority) | |
(SC3) Technical complexity | (WV3) Lack of user-orientation | A perfect storm (digital connectivity) | ||
(SC4) Resource management | (WV4) No look back | A frog in the well | ||
(SC5) Shifting way of work | (WV5) Difficulties in system maintenance | |||
(SC6) Increasing cyber threats/incidents | (WV6) Path-dependency on a legacy system | |||
(SC7) Privacy protection issues | (WV7) Shifting to the new normal | |||
(SC8) Demand for data-driven DB and interface | (WV8) Less human processes | |||
(SC9) Integrative view for business insights | (WV9) Inborn deficiencies | |||
(WV10) Phantom menace | ||||
(WV11) Loose control | ||||
(WV12) Where is what? | ||||
(WV13) Machine intelligence for human intelligence | ||||
(WV14) Customers, out of nowhere |
No. | CSF-Dimension | CLA Code | No. | CSF-Criteria | CLA Code |
---|---|---|---|---|---|
D1 | Applications development | SC 1, 2 | C1 | Development-oriented decision-making and authority | WV1 |
C2 | Enhanced development resources and budget | WV2 | |||
C3 | Early detection and instant support for system requirements | WV3 | |||
C4 | Periodic review of the application development roadmap | WV4 | |||
D2 | Business operation | SC 3, 4, 5 | C5 | Outsourcing for integrated system operation and management | WV5 |
C6 | As-a-service expansion (cloud-based) | WV6 | |||
C7 | System support for contactless, distant work | WV7 | |||
C8 | Extended business process automation | WV8 | |||
D3 | Compliance and cybersecurity | SC 6, 7 | C9 | Security involvement in initial designs (DevSecOps) | WV9 |
C10 | Enhanced expertise and CISO organization | WV10 | |||
C11 | Reinforcement of internal controls and policies | WV11 | |||
D4 | Data-driven flexibility | SC 8, 9 | C12 | Standardized data provision platform | WV12 |
C13 | Data-driven decision-making (AI/ML), business intelligence | WV13 | |||
C14 | Digital leads, integrated database | WV14 |
Category | D1 | D2 | D3 | D4 |
---|---|---|---|---|
Applications development (D1) | 1.000 | 0.823 | 0.498 | 0.587 |
Business operation (D2) | 1.215 | 1.000 | 0.923 | 1.296 |
Compliance and cybersecurity (D3) | 2.010 | 1.083 | 1.000 | 1.855 |
Data-driven flexibility (D4) | 1.703 | 0.772 | 0.539 | 1.000 |
Category | Priority | Rank |
---|---|---|
Applications development (D1) | 0.170 | 4 |
Business operation (D2) | 0.266 | 2 |
Compliance and cybersecurity (D3) | 0.342 | 1 |
Data-driven flexibility (D4) | 0.222 | 3 |
Category | C1 | C2 | C3 | C4 |
---|---|---|---|---|
Development-oriented decision-making and authority (C1) | 1.000 | 1.704 | 0.814 | 0.783 |
Enhanced development resources and budget (C2) | 0.587 | 1.000 | 0.900 | 0.684 |
Early detection and instant support for system requirements (C3) | 1.228 | 1.111 | 1.000 | 1.230 |
Periodic review of the application development roadmap (C4) | 1.276 | 1.462 | 0.813 | 1.000 |
Category | Priority | Rank |
---|---|---|
Development-oriented decision-making and authority (C1) | 0.253 | 3 |
Enhanced development resources and budget (C2) | 0.193 | 4 |
Early detection and instant support for system requirements (C3) | 0.282 | 1 |
Periodic review of the application development roadmap (C4) | 0.273 | 2 |
Category | C5 | C6 | C7 | C8 |
---|---|---|---|---|
Outsourcing for integrated system operation and management (C5) | 1.000 | 1.233 | 1.564 | 0.915 |
As-a-service expansion (cloud-based) (C6) | 0.811 | 1.000 | 1.584 | 1.203 |
System support for contactless, distant work (C7) | 0.639 | 0.631 | 1.000 | 0.941 |
Extended business process automation (C8) | 1.093 | 0.831 | 1.063 | 1.000 |
Category | Priority | Rank |
---|---|---|
Outsourcing for integrated system operation and management (C5) | 0.286 | 1 |
As-a-service expansion (cloud-based) (C6) | 0.275 | 2 |
System support for contactless, distant work (C7) | 0.194 | 4 |
Extended business process automation (C8) | 0.246 | 3 |
Category | C9 | C10 | C11 |
---|---|---|---|
Security involvement in initial designs (DevSecOps) (C9) | 1.000 | 0.572 | 0.989 |
Enhanced expertise and CISO organization (C10) | 1.749 | 1.000 | 1.828 |
Reinforcement of internal controls and policies (C11) | 1.011 | 0.547 | 1.000 |
Category | Priority | Rank |
---|---|---|
Security involvement in initial designs (DevSecOps) (C9) | 0.265 | 2 |
Enhanced expertise and CISO organization (C10) | 0.472 | 1 |
Reinforcement of internal controls and policies (C11) | 0.263 | 3 |
Category | C12 | C13 | C14 |
---|---|---|---|
Standardized data provision platform (C12) | 1.000 | 0.278 | 0.550 |
Data-driven decision-making (AI/ML), business intelligence (C13) | 3.596 | 1.000 | 1.501 |
Digital leads, integrated database (C14) | 1.819 | 0.666 | 1.000 |
Category | Priority | Rank |
---|---|---|
Standardized data provision platform (C12) | 0.159 | 3 |
Data-driven decision-making (AI/ML), business intelligence (C13) | 0.523 | 1 |
Digital leads, integrated database (C14) | 0.318 | 2 |
Level 0 | Level 1 | Priority | Level 2 | Priority | Global Priority |
---|---|---|---|---|---|
CSFs | Applications development | 0.170 | Development-oriented decision-making and authority | 0.253 | 0.043 |
Enhanced development resources and budget | 0.193 | 0.033 | |||
Early detection and instant support for system requirements | 0.282 | 0.048 | |||
Periodic review of the application development roadmap | 0.273 | 0.046 | |||
Business operation | 0.266 | Outsourcing for integrated system operation and management | 0.286 | 0.076 | |
As-a-service expansion (cloud-based) | 0.275 | 0.073 | |||
System support for contactless, distant work | 0.194 | 0.051 | |||
Extended business process automation | 0.246 | 0.065 | |||
Compliance and cybersecurity | 0.342 | Security involvement in initial designs (DevSecOps) | 0.265 | 0.091 | |
Enhanced expertise and CISO organization | 0.472 | 0.161 | |||
Reinforcement of internal controls and policies | 0.263 | 0.090 | |||
Data-driven flexibility | 0.222 | Standardized data provision platform | 0.159 | 0.035 | |
Data-driven decision-making (AI/ML), business intelligence | 0.523 | 0.116 | |||
Digital leads, integrated database | 0.318 | 0.071 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kim, S. Critical Success Factors Evaluation by Multi-Criteria Decision-Making: A Strategic Information System Planning and Strategy-As-Practice Perspective. Information 2022, 13, 270. https://doi.org/10.3390/info13060270
Kim S. Critical Success Factors Evaluation by Multi-Criteria Decision-Making: A Strategic Information System Planning and Strategy-As-Practice Perspective. Information. 2022; 13(6):270. https://doi.org/10.3390/info13060270
Chicago/Turabian StyleKim, Sehoon. 2022. "Critical Success Factors Evaluation by Multi-Criteria Decision-Making: A Strategic Information System Planning and Strategy-As-Practice Perspective" Information 13, no. 6: 270. https://doi.org/10.3390/info13060270
APA StyleKim, S. (2022). Critical Success Factors Evaluation by Multi-Criteria Decision-Making: A Strategic Information System Planning and Strategy-As-Practice Perspective. Information, 13(6), 270. https://doi.org/10.3390/info13060270