Advertisement

A Rethink of the Nature and Value of IT Assets – Critical Realism Approach

  • A. Kayode AdesemowoEmail author
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 558)

Abstract

In the era of fourth industrial revolution, knowledge economy and beyond, information gets increasingly prevalent and ubiquitously important. Inevitably, stakeholders’ interest is increasing, which results in greater reputation risk. Do we still view IT assets in the narrowed view as we do or do we broaden our horizon? Should we not be guided by how information technology was ‘coined’ in the late fifties, even though the reality is that IT assets have evolved and keep evolving. More than ever before, information is now an integral part of IT assets, and IT assets must be treated and accounted for considering the critical strategic importance (of information and IT assets) to organizations. Nonetheless being ubiquitous, there is a challenge in the identification process of IT assets. There is no agreed identification metrics and common understanding on the nature, structure and mechanisms of IT assets. The impact of this challenge is that IT assets value, or benefit realization from IT assets remain underrated or risk treatments remain at risk. This research study, based on critical realism philosophy investigates the nature, structures and mechanisms of IT assets. The four domains of IT capability maturity framework was used and to an extent asset specificity, to assist with phenomena and boundaries. The study of the nature of IT assets, based on critical realism, provides better insight into dual-contrasting nature of IT assets and contributes to the discourse on assets specificity and IT assets management. The derived classification, will contribute to the areas of infonomics, information risk and IT value/diffusion.

Keywords

IT assets Identification Structure and mechanisms Critical realism 

References

  1. 1.
    Wallace, P.R.: Paradox Lost: Images of the Quantum. Springer, New York (2011).  https://doi.org/10.1007/978-1-4612-4014-3CrossRefzbMATHGoogle Scholar
  2. 2.
    Bhaskar, R.: A Realist Theory of Science. Routledge, Oxon, Oxford (2013)CrossRefGoogle Scholar
  3. 3.
    Leavitt, H.J., Whisler, T.L.: Management in the 1980’s. Harv. Bus. Rev. 36, 41–48 (1958)Google Scholar
  4. 4.
    OECD: New Building Blocks for Jobs and Economic Growth : Intangible Assets as Sources of Increased Productivity and Enterprise Value. Presented at the September (2011)Google Scholar
  5. 5.
    Stevenson, A. (ed.): Oxford Dictionary of English. Oxford University Press, Oxon, Oxford (2010)Google Scholar
  6. 6.
    Lee, M., et al.: How to respond to the fourth industrial revolution, or the second information technology revolution? dynamic new combinations between technology, market, and society through open innovation. J. Open Innov. Technol. Mark. Complex. 4, 21 (2018).  https://doi.org/10.3390/joitmc4030021CrossRefGoogle Scholar
  7. 7.
    Adesemowo, A.K., von Solms, R., Botha, R.A.: ITAOFIR: IT asset ontology for information risk in knowledge economy and beyond. In: Jahankhani, H., et al. (eds.) ICGS3 2017. CCIS, vol. 630, pp. 173–187. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-51064-4_15CrossRefGoogle Scholar
  8. 8.
    Borch, K.: The theory of risk. J. R. Stat. Soc. 29, 432–467 (1967)MathSciNetzbMATHGoogle Scholar
  9. 9.
    Aven, T., Baraldi, P., Flage, R., Zio, E.: Uncertainty in Risk Assessment. Wiley, Chichester (2014).  https://doi.org/10.1002/9781118763032CrossRefGoogle Scholar
  10. 10.
    Archer, M.S., Bhaskar, R., Collier, A., Lawson, T., Norrie, A., (eds.): Critical Realism: Essential Readings. Routledge (2013)Google Scholar
  11. 11.
    Vandenberghe, F. (ed.): What’s Critical About Critical Realism?: Essays in Reconstructive Social Theory. Routledge, Oxon (2013).  https://doi.org/10.4324/9780203798508. OX14 4RNCrossRefGoogle Scholar
  12. 12.
    Oates, B.J.: Researching Information Systems and Computing. SAGE Publications, London (2006)Google Scholar
  13. 13.
    Thapa, D., Omland, H.O.: Four steps to identify mechanisms of ICT4D: a critical realism-based methodology. Electron. J. Inf. Syst. Dev. Countries 84, e12054 (2018).  https://doi.org/10.1002/isd2.12054CrossRefGoogle Scholar
  14. 14.
    Heeks, R., Wall, P.J.: Critical realism and ICT4D research. Electron. J. Inf. Syst. Dev. Countries 84, e12051 (2018).  https://doi.org/10.1002/isd2.12051CrossRefGoogle Scholar
  15. 15.
    Faulkner, P., Runde, J.: Technological objects, social positions, and the transformational model of social activity. MIS Q. 37, 803–818 (2013)CrossRefGoogle Scholar
  16. 16.
    Mingers, J., Mutch, A., Willcocks, L.: Critical realism in information systems research. MIS Q. 37, 795–802 (2013)CrossRefGoogle Scholar
  17. 17.
    Reips, U.-D.: Using the Internet to collect data. In: Cooper, H., Camic, P.M., Long, D.L., Panter, A.T., Rindskopf, D., Sher, K.J. (eds.) APA Handbook of Research Methods in Psychology. Research Designs: Quantitative, Qualitative, Neuropsychological, and Biological, Washington D.C., vol. 2, pp. 291–310 (2012).  https://doi.org/10.1037/13620-017CrossRefGoogle Scholar
  18. 18.
    Arksey, H., O’Malley, L.: Scoping studies: towards a methodological framework. Int. J. Soc. Res. Methodol. 8, 19–32 (2005).  https://doi.org/10.1080/1364557032000119616CrossRefGoogle Scholar
  19. 19.
    Levac, D., Colquhoun, H., O’Brien, K.K.: Scoping studies: advancing the methodology. Implementation Sci. 5, 69 (2010).  https://doi.org/10.1186/1748-5908-5-69CrossRefGoogle Scholar
  20. 20.
    Krippendorff, K.: Content Analysis: An Introduction to Its Methodology. SAGE Publications, Thousand Oaks (2012)Google Scholar
  21. 21.
    Saunders, M.N.K., Lewis, P., Thornhill, A.: Research Methods for Business Students. Pearson, London (2015)Google Scholar
  22. 22.
    Babbie, E.R.: The Practice of Social Research. Cengage Learning, Belmont (2012)Google Scholar
  23. 23.
    Kuechler, W., Vaishnavi, V.: A Framework for Theory Development in Design Science Research: Multiple Perspectives. J. Assoc. Inf. Syst. 13, 395–423 (2012)Google Scholar
  24. 24.
    Walton, D.N.: Methods of Argumentation. Cambridge University Press, New York (2013). 10013CrossRefGoogle Scholar
  25. 25.
    Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28, 1030–1044 (1985).  https://doi.org/10.1145/4372.4373CrossRefGoogle Scholar
  26. 26.
    Saunders, A., Brynjolfsson, E.: Valuing information technology related intangible assets. Manag. Inf. Syst. Q. 40, 83–110 (2016)CrossRefGoogle Scholar
  27. 27.
    Dwivedi, Y.K., Levine, L., Williams, M.D., Singh, M., Wastell, D.G., Bunker, D.: Toward an understanding of the evolution of IFIP WG 8.6 research. In: Pries-Heje, J., Venable, J., Bunker, D., Russo, N.L., DeGross, J.I. (eds.) TDIT 2010. IAICT, vol. 318, pp. 225–242. Springer, Heidelberg (2010).  https://doi.org/10.1007/978-3-642-12113-5_14CrossRefGoogle Scholar
  28. 28.
    Institute of Directors in Southern Africa: King IV: report on corporate governance for South Africa 2016. Institute of Directors in Southern Africa, Johannesburg, South Africa (2016)Google Scholar
  29. 29.
    Tillquist, J., Rodgers, W.: Using asset specificity and asset scope to measure the value of IT. Commun. ACM 48, 75–80 (2005).  https://doi.org/10.1145/1039539.1039542CrossRefGoogle Scholar
  30. 30.
    Ross, J.W., Beath, C.M., Goodhue, D.L.: Develop long-term competitiveness through IT assets. MIT Sloan Manag. Rev. 38, 31–42 (1996)Google Scholar
  31. 31.
    De Vita, G., Tekaya, A., Wang, C.L.: The many faces of asset specificity: a critical review of key theoretical perspectives. Int. J. Manag. Rev. 13, 329–348 (2011).  https://doi.org/10.1111/j.1468-2370.2010.00294.xCrossRefGoogle Scholar
  32. 32.
    Higson, C., Dave, W.: Valuing Information as An Asset. Bucks (2010). SL7 2 EBGoogle Scholar
  33. 33.
    AXELOS: ITIL ® glossary and abbreviations (2011)Google Scholar
  34. 34.
    Adesemowo, A.K., Von Solms, R., Botha, R.A.: Safeguarding information as an asset: do we need a redefinition in the knowledge economy and beyond? SA J. Inf. Manag. 18, 1–12 (2016).  https://doi.org/10.4102/sajim.v18i1.706CrossRefGoogle Scholar
  35. 35.
    Bankole, F.O., Osei-Bryson, K.-M., Brown, I.: The impact of ICT investments on human development: a regression splines analysis. J. Glob. Inf. Technol. Manag. 16, 59–85 (2014).  https://doi.org/10.1080/1097198X.2013.10845636CrossRefGoogle Scholar
  36. 36.
    Kim, S., Poon, S., Young, R.: Issues around firm level classification of IT investment. In: Seltsikas, P., Bunker, D., Dawson, L., Indulska, M. (eds.) Proceedings of the 22nd Australiasian Conference on Information Systems ACIS 2011. p. Paper 81. Australasian Conference on Information Systems, Sydney, Australia (2011)Google Scholar
  37. 37.
    Curley, M., Kenneally, J., Carcary, M. (eds.): IT Capability Maturity Framework (IT-CMF): The Body of Knowledge Guide, 2nd edn. Van Haren Publishing, 's-Hertogenbosch (2016)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2019

Authors and Affiliations

  1. 1.Nelson Mandela UniversityPort ElizabethSouth Africa

Personalised recommendations